WorldWideScience

Sample records for account-based digital signature

  1. Attribute-Based Digital Signature System

    NARCIS (Netherlands)

    Ibraimi, L.; Asim, Muhammad; Petkovic, M.

    2011-01-01

    An attribute-based digital signature system comprises a signature generation unit (1) for signing a message (m) by generating a signature (s) based on a user secret key (SK) associated with a set of user attributes, wherein the signature generation unit (1) is arranged for combining the user secret

  2. A Digital Signature Scheme Based on MST3 Cryptosystems

    Directory of Open Access Journals (Sweden)

    Haibo Hong

    2014-01-01

    Full Text Available As special types of factorization of finite groups, logarithmic signature and cover have been used as the main components of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2, and MST3. Recently, Svaba et. al proposed a revised MST3 encryption scheme with greater security. Meanwhile, they put forward an idea of constructing signature schemes on the basis of logarithmic signatures and random covers. In this paper, we firstly design a secure digital signature scheme based on logarithmic signatures and random covers. In order to complete the task, we devise a new encryption scheme based on MST3 cryptosystems.

  3. Construction of Graduation Certificate Issuing System Based on Digital Signature Technique

    Directory of Open Access Journals (Sweden)

    Mohammed Issam Younis

    2015-06-01

    Full Text Available With the development of computer architecture and its technologies in recent years, applications like e-commerce, e-government, e-governance and e-finance are widely used, and they act as active research areas. In addition, in order to increase the quality and quantity of the ordinary everyday transactions, it is desired to migrate from the paper-based environment to a digital-based computerized environment. Such migration increases efficiency, saves time, eliminates paperwork, increases safety and reduces the cost in an organization. Digital signatures are playing an essential role in many electronic and automatic based systems and facilitate this migration. The digital signatures are used to provide many services and solutions that would not have been possible by the conventional hand-written signature. In the educational environment, the process of issuing the graduation certificates can no longer be restricted to the traditional methods. Hence, a computerized system for issuing certificates of graduation in an electronic form is needed and desired. This paper proposes a Graduation Certificates Issuing System (GCIS based on digital signature technology. In doing so, this research highlights the state-of-the-art and the art-of-the-practice for some existing digital signature-based systems in the literatures. In addition, eight intertwined elected services are identified, namely: message authentication, entity authentication, integrity, non-repudiation, time stamping, distinguished signing authorities, delegating signing capability and supporting workflow systems. Moreover, this research examines nine existing systems, showing their merits and demerits in terms of these elected services. Furthermore, the research describes the architectural design using the Unified Modeling Language (UML and provides the concrete implementation of the proposed GCIS. The GCIS is implemented using Visual Basic.Net programming language and SQL Server database

  4. Extending the similarity-based XML multicast approach with digital signatures

    DEFF Research Database (Denmark)

    Azzini, Antonia; Marrara, Stefania; Jensen, Meiko

    2009-01-01

    This paper investigates the interplay between similarity-based SOAP message aggregation and digital signature application. An overview on the approaches resulting from the different orders for the tasks of signature application, verification, similarity aggregation and splitting is provided....... Depending on the intersection between similarity-aggregated and signed SOAP message parts, the paper discusses three different cases of signature application, and sketches their applicability and performance implications....

  5. Practical quantum digital signature

    Science.gov (United States)

    Yin, Hua-Lei; Fu, Yao; Chen, Zeng-Bing

    2016-03-01

    Guaranteeing nonrepudiation, unforgeability as well as transferability of a signature is one of the most vital safeguards in today's e-commerce era. Based on fundamental laws of quantum physics, quantum digital signature (QDS) aims to provide information-theoretic security for this cryptographic task. However, up to date, the previously proposed QDS protocols are impractical due to various challenging problems and most importantly, the requirement of authenticated (secure) quantum channels between participants. Here, we present the first quantum digital signature protocol that removes the assumption of authenticated quantum channels while remaining secure against the collective attacks. Besides, our QDS protocol can be practically implemented over more than 100 km under current mature technology as used in quantum key distribution.

  6. Digital Signature Schemes with Complementary Functionality and Applications

    OpenAIRE

    S. N. Kyazhin

    2012-01-01

    Digital signature schemes with additional functionality (an undeniable signature, a signature of the designated confirmee, a signature blind, a group signature, a signature of the additional protection) and examples of their application are considered. These schemes are more practical, effective and useful than schemes of ordinary digital signature.

  7. Measurement-device-independent quantum digital signatures

    Science.gov (United States)

    Puthoor, Ittoop Vergheese; Amiri, Ryan; Wallden, Petros; Curty, Marcos; Andersson, Erika

    2016-08-01

    Digital signatures play an important role in software distribution, modern communication, and financial transactions, where it is important to detect forgery and tampering. Signatures are a cryptographic technique for validating the authenticity and integrity of messages, software, or digital documents. The security of currently used classical schemes relies on computational assumptions. Quantum digital signatures (QDS), on the other hand, provide information-theoretic security based on the laws of quantum physics. Recent work on QDS Amiri et al., Phys. Rev. A 93, 032325 (2016);, 10.1103/PhysRevA.93.032325 Yin, Fu, and Zeng-Bing, Phys. Rev. A 93, 032316 (2016), 10.1103/PhysRevA.93.032316 shows that such schemes do not require trusted quantum channels and are unconditionally secure against general coherent attacks. However, in practical QDS, just as in quantum key distribution (QKD), the detectors can be subjected to side-channel attacks, which can make the actual implementations insecure. Motivated by the idea of measurement-device-independent quantum key distribution (MDI-QKD), we present a measurement-device-independent QDS (MDI-QDS) scheme, which is secure against all detector side-channel attacks. Based on the rapid development of practical MDI-QKD, our MDI-QDS protocol could also be experimentally implemented, since it requires a similar experimental setup.

  8. Perancangan Aplikasi Undeniable Digital Signature Dengan Algoritma Chaum’s Blind Signature

    OpenAIRE

    Simanjuntak, Martin Dennain

    2012-01-01

    Desperaty need a securiry system in the exchange of information via computer media, so that information can not be accessed by unauthorized parties. One of the security system is to use a system of digital signatures as a means of authenticating the authenticity of digital document that are exchanged. By using a digital a digital signature system is undeniable, the security system can be generated digital document exchange, where the system is free from the from of rejection...

  9. A Fast lattice-based polynomial digital signature system for m-commerce

    Science.gov (United States)

    Wei, Xinzhou; Leung, Lin; Anshel, Michael

    2003-01-01

    The privacy and data integrity are not guaranteed in current wireless communications due to the security hole inside the Wireless Application Protocol (WAP) version 1.2 gateway. One of the remedies is to provide an end-to-end security in m-commerce by applying application level security on top of current WAP1.2. The traditional security technologies like RSA and ECC applied on enterprise's server are not practical for wireless devices because wireless devices have relatively weak computation power and limited memory compared with server. In this paper, we developed a lattice based polynomial digital signature system based on NTRU's Polynomial Authentication and Signature Scheme (PASS), which enabled the feasibility of applying high-level security on both server and wireless device sides.

  10. Photonic quantum digital signatures operating over kilometer ranges in installed optical fiber

    Science.gov (United States)

    Collins, Robert J.; Fujiwara, Mikio; Amiri, Ryan; Honjo, Toshimori; Shimizu, Kaoru; Tamaki, Kiyoshi; Takeoka, Masahiro; Andersson, Erika; Buller, Gerald S.; Sasaki, Masahide

    2016-10-01

    The security of electronic communications is a topic that has gained noteworthy public interest in recent years. As a result, there is an increasing public recognition of the existence and importance of mathematically based approaches to digital security. Many of these implement digital signatures to ensure that a malicious party has not tampered with the message in transit, that a legitimate receiver can validate the identity of the signer and that messages are transferable. The security of most digital signature schemes relies on the assumed computational difficulty of solving certain mathematical problems. However, reports in the media have shown that certain implementations of such signature schemes are vulnerable to algorithmic breakthroughs and emerging quantum processing technologies. Indeed, even without quantum processors, the possibility remains that classical algorithmic breakthroughs will render these schemes insecure. There is ongoing research into information-theoretically secure signature schemes, where the security is guaranteed against an attacker with arbitrary computational resources. One such approach is quantum digital signatures. Quantum signature schemes can be made information-theoretically secure based on the laws of quantum mechanics while comparable classical protocols require additional resources such as anonymous broadcast and/or a trusted authority. Previously, most early demonstrations of quantum digital signatures required dedicated single-purpose hardware and operated over restricted ranges in a laboratory environment. Here, for the first time, we present a demonstration of quantum digital signatures conducted over several kilometers of installed optical fiber. The system reported here operates at a higher signature generation rate than previous fiber systems.

  11. Model of informational system for freight insurance automation based on digital signature

    OpenAIRE

    Maxim E. SLOBODYANYUK

    2009-01-01

    In the article considered a model of informational system for freight insurance automation based on digital signature, showed architecture, macro flowchart of information flow in model, components (modules) and their functions. Described calculation method of costs on interactive cargo insurance via proposed system, represented main characteristics and options of existing transport management systems, conceptual cost models.

  12. Model of informational system for freight insurance automation based on digital signature

    Directory of Open Access Journals (Sweden)

    Maxim E. SLOBODYANYUK

    2009-01-01

    Full Text Available In the article considered a model of informational system for freight insurance automation based on digital signature, showed architecture, macro flowchart of information flow in model, components (modules and their functions. Described calculation method of costs on interactive cargo insurance via proposed system, represented main characteristics and options of existing transport management systems, conceptual cost models.

  13. DIGITAL SIGNATURE IN THE WAY OF LAW

    Directory of Open Access Journals (Sweden)

    Ruya Samlı

    2013-01-01

    Full Text Available Signature can be defined as a person’s name or special signs that he/she writes when he/she wants to indicate he/she wrote or confirm that writing. A person signs many times in his/her life. A person’s signature that is used for thousands of times for many things from formal documents to exams has importance for that person. Especially, signing in legal operations is an operation that can build important results. If a person’s signature is imitated by another person, he/she can become beholden, donate his/her whole wealth, commits offences or do some judicial operations. Today, because many operations can be done with digital environments and internet, signature operation that provides identity validation must also be carried to digital environment. In this paper digital signature concept that is approved for this reason and its situation in international areas and Turkish laws are investigated.

  14. ANALYSIS OF DIGITAL SIGNATURE RULE IN THE ELECTRONIC COMMERCE LAW OF INDONESIA

    Directory of Open Access Journals (Sweden)

    Irna Nurhayati

    2015-02-01

    Full Text Available The Indonesian legislature has enacted the Information and Electronic Transaction Bill (the Bill in 2003, in which digital signature as a technology specific electronic (e commerce has been promoted. The promotion of digital signature is still problematic, since there is an uncertainty whether Indonesia can develop well a required viable technology of digital signature. Moreover, there is a gap between the actual use of digital signature and the projections of future utilization of digital signature by interested parties on e-commerce. This paper will discuss the reason of the Indonesian legislature promotes digital signature. It will then analyse the gap between the actual use of digital signature and the projections of future utilization of digital signature by interested parties on e-commerce. This paper will finally argue whether the promotion of digital signature of the Bill is useful for the growth of e-commerce in Indonesia.

  15. Digital signature feasibility study

    Science.gov (United States)

    2008-06-01

    The purpose of this study was to assess the advantages and disadvantages of using digital signatures to assist the Arizona Department of Transportation in conducting business. The Department is evaluating the potential of performing more electronic t...

  16. Quantum Digital Signatures for Unconditional Safe Authenticity Protection of Medical Documentation

    Directory of Open Access Journals (Sweden)

    Arkadiusz Liber

    2015-12-01

    Full Text Available Modern medical documentation appears most often in an online form which requires some digital methods to ensure its confidentiality, integrity and authenticity. The document authenticity may be secured with the use of a signature. A classical handwritten signature is directly related to its owner by his/her psychomotor character traits. Such a signature is also connected with the material it is written on, and a writing tool. Because of these properties, a handwritten signature reflects certain close material bonds between the owner and the document. In case of modern digital signatures, the document authentication has a mathematical nature. The verification of the authenticity becomes the verification of a key instead of a human. Since 1994 it has been known that classical digital signature algorithms may not be safe because of the Shor’s factorization algorithm. To implement the modern authenticity protection of medical data, some new types of algorithms should be used. One of the groups of such algorithms is based on the quantum computations. In this paper, the analysis of the current knowledge status of Quantum Digital Signature protocols, with its basic principles, phases and common elements such as transmission, comparison and encryption, was outlined. Some of the most promising protocols for signing digital medical documentation, that fulfill the requirements for QDS, were also briefly described. We showed that, a QDS protocol with QKD components requires the equipment similar to the equipment used for a QKD, for its implementation, which is already commercially available. If it is properly implemented, it provides the shortest lifetime of qubits in comparison to other protocols. It can be used not only to sign classical messages but probably it could be well adopted to implement unconditionally safe protection of medical documentation in the nearest future, as well.

  17. Quantum multi-signature protocol based on teleportation

    International Nuclear Information System (INIS)

    Wen Xiao-jun; Liu Yun; Sun Yu

    2007-01-01

    In this paper, a protocol which can be used in multi-user quantum signature is proposed. The scheme of signature and verification is based on the correlation of Greenberger-Horne-Zeilinger (GHZ) states and the controlled quantum teleportation. Different from the digital signatures, which are based on computational complexity, the proposed protocol has perfect security in the noiseless quantum channels. Compared to previous quantum signature schemes, this protocol can verify the signature independent of an arbitrator as well as realize multi-user signature together. (orig.)

  18. Quantum random oracle model for quantum digital signature

    Science.gov (United States)

    Shang, Tao; Lei, Qi; Liu, Jianwei

    2016-10-01

    The goal of this work is to provide a general security analysis tool, namely, the quantum random oracle (QRO), for facilitating the security analysis of quantum cryptographic protocols, especially protocols based on quantum one-way function. QRO is used to model quantum one-way function and different queries to QRO are used to model quantum attacks. A typical application of quantum one-way function is the quantum digital signature, whose progress has been hampered by the slow pace of the experimental realization. Alternatively, we use the QRO model to analyze the provable security of a quantum digital signature scheme and elaborate the analysis procedure. The QRO model differs from the prior quantum-accessible random oracle in that it can output quantum states as public keys and give responses to different queries. This tool can be a test bed for the cryptanalysis of more quantum cryptographic protocols based on the quantum one-way function.

  19. Security Analysis of Randomize-Hash-then-Sign Digital Signatures

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Knudsen, Lars Ramkilde

    2012-01-01

    At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the security of digital signature algorithms based on these constructions. They showed that the security of signature schemes based on the two randomized hash function modes relies on properties similar...... functions, such as for the Davies-Meyer construction used in the popular hash functions such as MD5 designed by Rivest and the SHA family of hash functions designed by the National Security Agency (NSA), USA and published by NIST in the Federal Information Processing Standards (FIPS). We show an online...... 800-106. We discuss some important applications of our attacks and discuss their applicability on signature schemes based on hash functions with ‘built-in’ randomization. Finally, we compare our attacks on randomize-hash-then-sign schemes with the generic forgery attacks on the standard hash...

  20. Digital Game-Based Learning in Accounting and Business Education

    Science.gov (United States)

    Carenys, Jordi; Moya, Soledad

    2016-01-01

    This article presents a review of the accounting and business literature on digital game-based learning (DGBL). The article classifies what is already settled in the literature about the theoretical foundations of DGBL's effectiveness and its practical use into three categories. The first comprises what is known about the evaluation of digital…

  1. An in fiber experimental approach to photonic quantum digital signatures that does not require quantum memory

    Science.gov (United States)

    Collins, Robert J.; Donaldon, Ross J.; Dunjko, Vedran; Wallden, Petros; Clarke, Patrick J.; Andersson, Erika; Jeffers, John; Buller, Gerald S.

    2014-10-01

    Classical digital signatures are commonly used in e-mail, electronic financial transactions and other forms of electronic communications to ensure that messages have not been tampered with in transit, and that messages are transferrable. The security of commonly used classical digital signature schemes relies on the computational difficulty of inverting certain mathematical functions. However, at present, there are no such one-way functions which have been proven to be hard to invert. With enough computational resources certain implementations of classical public key cryptosystems can be, and have been, broken with current technology. It is nevertheless possible to construct information-theoretically secure signature schemes, including quantum digital signature schemes. Quantum signature schemes can be made information theoretically secure based on the laws of quantum mechanics, while classical comparable protocols require additional resources such as secret communication and a trusted authority. Early demonstrations of quantum digital signatures required quantum memory, rendering them impractical at present. Our present implementation is based on a protocol that does not require quantum memory. It also uses the new technique of unambiguous quantum state elimination, Here we report experimental results for a test-bed system, recorded with a variety of different operating parameters, along with a discussion of aspects of the system security.

  2. Comparison of Fingerprint and Iris Biometric Authentication for Control of Digital Signatures

    OpenAIRE

    Zuckerman, Alan E.; Moon, Kenneth A.; Eaddy, Kenneth

    2002-01-01

    Biometric authentication systems can be used to control digital signature of medical documents. This pilot study evaluated the use of two different fingerprint technologies and one iris technology to control creation of digital signatures on a central server using public private key pairs stored on the server. Documents and signatures were stored in XML for portability. Key pairs and authentication certificates were generated during biometric enrollment. Usability and user acceptance were gua...

  3. Digital "Testimonio" as a Signature Pedagogy for Latin@ Studies

    Science.gov (United States)

    Benmayor, Rina

    2012-01-01

    This article proposes the curricular integration of digital "testimonio" as a "signature" pedagogy in Latin@ Studies. The "testimonio" tradition of urgent narratives and the creative multimedia languages of digital storytelling--text, voice, image, and sound--invite historically marginalized subjects, especially younger generations, to author and…

  4. Measurement-Device Independency Analysis of Continuous-Variable Quantum Digital Signature

    Directory of Open Access Journals (Sweden)

    Tao Shang

    2018-04-01

    Full Text Available With the practical implementation of continuous-variable quantum cryptographic protocols, security problems resulting from measurement-device loopholes are being given increasing attention. At present, research on measurement-device independency analysis is limited in quantum key distribution protocols, while there exist different security problems for different protocols. Considering the importance of quantum digital signature in quantum cryptography, in this paper, we attempt to analyze the measurement-device independency of continuous-variable quantum digital signature, especially continuous-variable quantum homomorphic signature. Firstly, we calculate the upper bound of the error rate of a protocol. If it is negligible on condition that all measurement devices are untrusted, the protocol is deemed to be measurement-device-independent. Then, we simplify the calculation by using the characteristics of continuous variables and prove the measurement-device independency of the protocol according to the calculation result. In addition, the proposed analysis method can be extended to other quantum cryptographic protocols besides continuous-variable quantum homomorphic signature.

  5. Basis for the implementation of digital signature in Argentine's health environment

    International Nuclear Information System (INIS)

    Escobar, P P; Formica, M

    2007-01-01

    The growth of telemedical applications and electronic transactions in health environments is paced by the constant technology evolution. This implies a big cultural change in traditional medicine and in hospital information systems' users which arrival is delayed, basically, by the lack of solid laws and a well defined role-based infrastructure. The use of digital signature as a mean of identification, authentication, confidentiality and non-repudiation is the most suitable tool for assuring the electronic transactions and patient's data protection. The implementation of a Public Key Infrastructure (PKI) in health environment allows for authentication, encryption and use of digital signature for assuring confidentiality and control of the movement of sensitive information. This work defines the minimum technological, legal and procedural basis for a successful PKI implementation and establishes the roles for the different actors in the chain of confidence in the public health environment of Argentine

  6. On the security of pairing-free certificateless digital signature schemes using ECC

    Directory of Open Access Journals (Sweden)

    Namita Tiwari

    2015-09-01

    Full Text Available I cryptanalyze the pairing-free digital signature scheme of Islam et al. which is proven secure against “adaptive chosen message attacks”. I introduce this type of forgery to analyze their scheme. Furthermore, I comment on general security issues that should be considered when making improvements on their scheme. My security analysis is also applicable to other digital signatures designed in a similar manner.

  7. Comparison of Fingerprint and Iris Biometric Authentication for Control of Digital Signatures

    Science.gov (United States)

    Zuckerman, Alan E.; Moon, Kenneth A.; Eaddy, Kenneth

    2002-01-01

    Biometric authentication systems can be used to control digital signature of medical documents. This pilot study evaluated the use of two different fingerprint technologies and one iris technology to control creation of digital signatures on a central server using public private key pairs stored on the server. Documents and signatures were stored in XML for portability. Key pairs and authentication certificates were generated during biometric enrollment. Usability and user acceptance were guarded and limitations of biometric systems prevented use of the system with all test subjects. The system detected alternations in the data content and provided future signer re-authentication for non-repudiation.

  8. Method of Anti-Virus Protection Based on (n, t Threshold Proxy Signature with an Arbitrator

    Directory of Open Access Journals (Sweden)

    E. A. Tolyupa

    2014-01-01

    Full Text Available The article suggests the method of anti-virus protection of mobile devices based on the usage of proxy digital signatures and an (n;t-threshold proxy signature scheme with an arbitrator. The unique feature of the suggested method is in the absence of necessity to install anti-virus software in a mobile device. It will be enough only to have the software verifying digital signatures and the Internet. The method is used on the base of public keys infrastructure /PKI/, thus minimizing implementation expenses.

  9. Key-Insulated Undetachable Digital Signature Scheme and Solution for Secure Mobile Agents in Electronic Commerce

    Directory of Open Access Journals (Sweden)

    Yang Shi

    2016-01-01

    Full Text Available Considering the security of both the customers’ hosts and the eShops’ servers, we introduce the idea of a key-insulated undetachable digital signature, enabling mobile agents to generate undetachable digital signatures on remote hosts with the key-insulated property of the original signer’s signing key. From the theoretical perspective, we provide the formal definition and security notion of a key-insulated undetachable digital signature. From the practical perspective, we propose a concrete scheme to secure mobile agents in electronic commerce. The scheme is mainly focused on protecting the signing key from leakage and preventing the misuse of the signature algorithm on malicious servers. Agents do not carry the signing key when they generate digital signatures on behalf of the original signer, so the key is protected on remote servers. Furthermore, if a hacker gains the signing key of the original signer, the hacker is still unable to forge a signature for any time period other than the key being accessed. In addition, the encrypted function is combined with the original signer’s requirement to prevent the misuse of signing algorithm. The scheme is constructed on gap Diffie–Hellman groups with provable security, and the performance testing indicates that the scheme is efficient.

  10. Adaptive Digital Signature Design and Short-Data-Record Adaptive Filtering

    National Research Council Canada - National Science Library

    Pados, Dimitiris A

    2008-01-01

    This report covers the research performed to create and develop a digital signature design analysis and development methodology that will support robust multi-user communications in rapidly changing environments...

  11. Design And Implementation of Low Area/Power Elliptic Curve Digital Signature Hardware Core

    Directory of Open Access Journals (Sweden)

    Anissa Sghaier

    2017-06-01

    Full Text Available The Elliptic Curve Digital Signature Algorithm(ECDSA is the analog to the Digital Signature Algorithm(DSA. Based on the elliptic curve, which uses a small key compared to the others public-key algorithms, ECDSA is the most suitable scheme for environments where processor power and storage are limited. This paper focuses on the hardware implementation of the ECDSA over elliptic curveswith the 163-bit key length recommended by the NIST (National Institute of Standards and Technology. It offers two services: signature generation and signature verification. The proposed processor integrates an ECC IP, a Secure Hash Standard 2 IP (SHA-2 Ip and Random Number Generator IP (RNG IP. Thus, all IPs will be optimized, and different types of RNG will be implemented in order to choose the most appropriate one. A co-simulation was done to verify the ECDSA processor using MATLAB Software. All modules were implemented on a Xilinx Virtex 5 ML 50 FPGA platform; they require respectively 9670 slices, 2530 slices and 18,504 slices. FPGA implementations represent generally the first step for obtaining faster ASIC implementations. Further, the proposed design was also implemented on an ASIC CMOS 45-nm technology; it requires a 0.257 mm2 area cell achieving a maximum frequency of 532 MHz and consumes 63.444 (mW. Furthermore, in this paper, we analyze the security of our proposed ECDSA processor against the no correctness check for input points and restart attacks.

  12. Cognitive Hacking and Digital Government: Digital Identity

    OpenAIRE

    Paul Thompson

    2004-01-01

    Recently the National Center for Digital Government held a workshop on "The Virtual Citizen: Identity, Autonomy, and Accountability: A Civic Scenario Exploration of the Role of Identity in On-Line. Discussions at the workshop focused on five scenarios for future authentication policies with respect to digital identity. The underlying technologies considered for authentication were: biometrics: cryptography, with a focus on digital signatures; secure processing/computation; and reputation syst...

  13. A Sociomaterial Account of Partnership, Signatures and Accountability in Practice

    Directory of Open Access Journals (Sweden)

    Nick Hopwood

    2014-06-01

    Full Text Available Professional work is often heralded as undergoing radical transformation. This paper focuses on partnership between health professionals and families as a specific instance of changes aimed at delivering shared responsibility and joint knowledge work. An ethnographic study of a residential child and family health services provides the empirical basis for a detailed examination of what is signed, by whom, and with what effects. I show how signing and signatures provide fertile starting points for sociomaterial analysis, a rich empirical reference point for what Nicolini calls “zooming in” on particular instances, and “zooming out” to understand their connections to other practices. Schatzki’s practice theory is used as a theoretical basis, drawing also on Kemmis’ notions of practice architectures and ecologies of practices to elaborate such connections. I trace how acts of signing and signatures as artefacts are produced through and reflect partnership, indeed pointing to significant changes in professional work. However I also show that wider ecologies of practices present architectures that challenge diffuse accountability and shared epistemic work. 

  14. An Enhanced Data Integrity Model In Mobile Cloud Environment Using Digital Signature Algorithm And Robust Reversible Watermarking

    Directory of Open Access Journals (Sweden)

    Boukari Souley

    2017-10-01

    Full Text Available the increase use of hand held devices such as smart phones to access multimedia content in the cloud is increasing with rise and growth in information technology. Mobile cloud computing is increasingly used today because it allows users to have access to variety of resources in the cloud such as image video audio and software applications with minimal usage of their inbuilt resources such as storage memory by using the one available in the cloud. The major challenge faced with mobile cloud computing is security. Watermarking and digital signature are some techniques used to provide security and authentication on user data in the cloud. Watermarking is a technique used to embed digital data within a multimedia content such as image video or audio in order to prevent authorized access to those content by intruders whereas digital signature is used to identify and verify user data when accessed. In this work we implemented digital signature and robust reversible image watermarking in order enhance mobile cloud computing security and integrity of data by providing double authentication techniques. The results obtained show the effectiveness of combining the two techniques robust reversible watermarking and digital signature by providing strong authentication to ensures data integrity and extract the original content watermarked without changes.

  15. Implementation of QR Code and Digital Signature to Determine the Validity of KRS and KHS Documents

    Directory of Open Access Journals (Sweden)

    Fatich Fazlur Rochman

    2017-05-01

    Full Text Available Universitas Airlangga students often find it difficult to verify the mark that came out in the Kartu Hasil Studi (KHS is called Study Result Card or courses taken in the Kartu Rencana Studi (KRS is called Study Plan Card, if there are changes to the data on the system used Universitas Airlangga. This complicated KRS and KHS verification process happened because the KRS and KHS documents that owned by student is easier to counterfeit than the data in the system. Implementation digital signature and QR Code technology as a solution that can prove the validity of KRS or KHS. The KRS and KHS validation system developed by Digital Signature and QR Code. QR Code is a type of matrix code that was developed as a code that allows its contents to be decoded at high speed while the Digital Signature has a function as a marker on the data to ensure that the data is the original data. The verification process was divided into two types are reading the Digital Signature and printing document that works by scanning the data from QR Code. The application of the system is carried out were the addition of the QR Code on KRS and KHS, required a readiness of human resources. 

  16. A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents

    Science.gov (United States)

    Kabir, Muhammad N.; Alginahi, Yasser M.

    2014-01-01

    This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. Such issues were largely addressed in the literature for images, audio, and video, with only a few papers addressing the challenge of sensitive plain-text media under known constraints. Specifically, with text as the predominant online communication medium, it becomes crucial that techniques are deployed to protect such information. A number of digital-signature, hashing, and watermarking schemes have been proposed that essentially bind source data or embed invisible data in a cover media to achieve its goal. While many such complex schemes with resource redundancies are sufficient in offline and less-sensitive texts, this paper proposes a hybrid approach based on zero-watermarking and digital-signature-like manipulations for sensitive text documents in order to achieve content originality and integrity verification without physically modifying the cover text in anyway. The proposed algorithm was implemented and shown to be robust against undetected content modifications and is capable of confirming proof of originality whilst detecting and locating deliberate/nondeliberate tampering. Additionally, enhancements in resource utilisation and reduced redundancies were achieved in comparison to traditional encryption-based approaches. Finally, analysis and remarks are made about the current state of the art, and future research issues are discussed under the given constraints. PMID:25254247

  17. A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents

    Directory of Open Access Journals (Sweden)

    Omar Tayan

    2014-01-01

    Full Text Available This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. Such issues were largely addressed in the literature for images, audio, and video, with only a few papers addressing the challenge of sensitive plain-text media under known constraints. Specifically, with text as the predominant online communication medium, it becomes crucial that techniques are deployed to protect such information. A number of digital-signature, hashing, and watermarking schemes have been proposed that essentially bind source data or embed invisible data in a cover media to achieve its goal. While many such complex schemes with resource redundancies are sufficient in offline and less-sensitive texts, this paper proposes a hybrid approach based on zero-watermarking and digital-signature-like manipulations for sensitive text documents in order to achieve content originality and integrity verification without physically modifying the cover text in anyway. The proposed algorithm was implemented and shown to be robust against undetected content modifications and is capable of confirming proof of originality whilst detecting and locating deliberate/nondeliberate tampering. Additionally, enhancements in resource utilisation and reduced redundancies were achieved in comparison to traditional encryption-based approaches. Finally, analysis and remarks are made about the current state of the art, and future research issues are discussed under the given constraints.

  18. Development of multigene expression signature maps at the protein level from digitized immunohistochemistry slides.

    Directory of Open Access Journals (Sweden)

    Gregory J Metzger

    Full Text Available Molecular classification of diseases based on multigene expression signatures is increasingly used for diagnosis, prognosis, and prediction of response to therapy. Immunohistochemistry (IHC is an optimal method for validating expression signatures obtained using high-throughput genomics techniques since IHC allows a pathologist to examine gene expression at the protein level within the context of histologically interpretable tissue sections. Additionally, validated IHC assays may be readily implemented as clinical tests since IHC is performed on routinely processed clinical tissue samples. However, methods have not been available for automated n-gene expression profiling at the protein level using IHC data. We have developed methods to compute expression level maps (signature maps of multiple genes from IHC data digitized on a commercial whole slide imaging system. Areas of cancer for these expression level maps are defined by a pathologist on adjacent, co-registered H&E slides, allowing assessment of IHC statistics and heterogeneity within the diseased tissue. This novel way of representing multiple IHC assays as signature maps will allow the development of n-gene expression profiling databases in three dimensions throughout virtual whole organ reconstructions.

  19. Unconditionally Secure Quantum Signatures

    Directory of Open Access Journals (Sweden)

    Ryan Amiri

    2015-08-01

    Full Text Available Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols—signatures based on the Rivest–Adleman–Shamir (RSA algorithm, the digital signature algorithm (DSA, and the elliptic curve digital signature algorithm (ECDSA—are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally securesecure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  20. Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain

    Directory of Open Access Journals (Sweden)

    Nehad Hameed Hussein

    2015-04-01

    Full Text Available Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they are less sensitive to the Human Visual System (HVS and preserve high image fidelity. MD-5 and RSA algorithms are used for generating the digital signature from the watermark data that is also embedded in the medical image. We apply the algorithm on number of medical images. The Electronic Patient Record (EPR is used as watermark data. Experiments demonstrate the effectiveness of our algorithm in terms of robustness, invisibility, and fragility. Watermark and digital signature can be extracted without the need to the original image.

  1. Learning Global-Local Distance Metrics for Signature-Based Biometric Cryptosystems

    Directory of Open Access Journals (Sweden)

    George S. Eskander Ekladious

    2017-11-01

    Full Text Available Biometric traits, such as fingerprints, faces and signatures have been employed in bio-cryptosystems to secure cryptographic keys within digital security schemes. Reliable implementations of these systems employ error correction codes formulated as simple distance thresholds, although they may not effectively model the complex variability of behavioral biometrics like signatures. In this paper, a Global-Local Distance Metric (GLDM framework is proposed to learn cost-effective distance metrics, which reduce within-class variability and augment between-class variability, so that simple error correction thresholds of bio-cryptosystems provide high classification accuracy. First, a large number of samples from a development dataset are used to train a global distance metric that differentiates within-class from between-class samples of the population. Then, once user-specific samples are available for enrollment, the global metric is tuned to a local user-specific one. Proof-of-concept experiments on two reference offline signature databases confirm the viability of the proposed approach. Distance metrics are produced based on concise signature representations consisting of about 20 features and a single prototype. A signature-based bio-cryptosystem is designed using the produced metrics and has shown average classification error rates of about 7% and 17% for the PUCPR and the GPDS-300 databases, respectively. This level of performance is comparable to that obtained with complex state-of-the-art classifiers.

  2. An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model

    Directory of Open Access Journals (Sweden)

    Guomin Zhou

    2017-01-01

    Full Text Available Digital signature schemes with additional properties have broad applications, such as in protecting the identity of signers allowing a signer to anonymously sign a message in a group of signers (also known as a ring. While these number-theoretic problems are still secure at the time of this research, the situation could change with advances in quantum computing. There is a pressing need to design PKC schemes that are secure against quantum attacks. In this paper, we propose a novel code-based threshold ring signature scheme with a leader-participant model. A leader is appointed, who chooses some shared parameters for other signers to participate in the signing process. This leader-participant model enhances the performance because every participant including the leader could execute the decoding algorithm (as a part of signing process upon receiving the shared parameters from the leader. The time complexity of our scheme is close to Courtois et al.’s (2001 scheme. The latter is often used as a basis to construct other types of code-based signature schemes. Moreover, as a threshold ring signature scheme, our scheme is as efficient as the normal code-based ring signature.

  3. Towards Trustable Digital Evidence with PKIDEV: PKI Based Digital Evidence Verification Model

    Science.gov (United States)

    Uzunay, Yusuf; Incebacak, Davut; Bicakci, Kemal

    How to Capture and Preserve Digital Evidence Securely? For the investigation and prosecution of criminal activities that involve computers, digital evidence collected in the crime scene has a vital importance. On one side, it is a very challenging task for forensics professionals to collect them without any loss or damage. On the other, there is the second problem of providing the integrity and authenticity in order to achieve legal acceptance in a court of law. By conceiving digital evidence simply as one instance of digital data, it is evident that modern cryptography offers elegant solutions for this second problem. However, to our knowledge, there is not any previous work proposing a systematic model having a holistic view to address all the related security problems in this particular case of digital evidence verification. In this paper, we present PKIDEV (Public Key Infrastructure based Digital Evidence Verification model) as an integrated solution to provide security for the process of capturing and preserving digital evidence. PKIDEV employs, inter alia, cryptographic techniques like digital signatures and secure time-stamping as well as latest technologies such as GPS and EDGE. In our study, we also identify the problems public-key cryptography brings when it is applied to the verification of digital evidence.

  4. Generation of a Skeleton Corpus of Digital Objects for the Validation and Evaluation of Format Identification Tools and Signatures

    Directory of Open Access Journals (Sweden)

    Ross Spencer

    2013-06-01

    Full Text Available To preserve digital information it is vital that the format of that information can be identified, in-perpetuity. This is the major focus of research within the field of Digital Preservation. The National Archives of the UK called for the Digital Preservation and Digital Curation communities to develop a test corpus of digital objects to help further develop tools to aid this purpose. Following that call, an attempt has been made to develop the suite.This paper initially outlines a methodology to generate a skeleton corpus using simple user-generated digital objects. It then explores the lessons learnt in the generation of a corpus using scripting language techniques from the file format signatures described in The National Archives PRONOM technical registry. It will also discuss the use of the digital signature for this purpose, the benefits of developing a test corpus using this technique. Finally, this paper will outline a methodology for future research before exploring how the community can best make use of the output of this project and how this project needs to be taken forward to completion.

  5. Lattice-Based Revocable Certificateless Signature

    Directory of Open Access Journals (Sweden)

    Ying-Hao Hung

    2017-10-01

    Full Text Available Certificateless signatures (CLS are noticeable because they may resolve the key escrow problem in ID-based signatures and break away the management problem regarding certificate in conventional signatures. However, the security of the mostly previous CLS schemes relies on the difficulty of solving discrete logarithm or large integer factorization problems. These two problems would be solved by quantum computers in the future so that the signature schemes based on them will also become insecure. For post-quantum cryptography, lattice-based cryptography is significant due to its efficiency and security. However, no study on addressing the revocation problem in the existing lattice-based CLS schemes is presented. In this paper, we focus on the revocation issue and present the first revocable CLS (RCLS scheme over lattices. Based on the short integer solution (SIS assumption over lattices, the proposed lattice-based RCLS scheme is shown to be existential unforgeability against adaptive chosen message attacks. By performance analysis and comparisons, the proposed lattice-based RCLS scheme is better than the previously proposed lattice-based CLS scheme, in terms of private key size, signature length and the revocation mechanism.

  6. Implementation of RSA 2048-bit and AES 256-bit with Digital Signature for Secure Electronic Health Record Application

    Directory of Open Access Journals (Sweden)

    Mohamad Ali Sadikin

    2016-10-01

    Full Text Available This research addresses the implementation of encryption and digital signature technique for electronic health record to prevent cybercrime such as robbery, modification and unauthorised access. In this research, RSA 2048-bit algorithm, AES 256-bit and SHA 256 will be implemented in Java programming language. Secure Electronic Health Record Information (SEHR application design is intended to combine given services, such as confidentiality, integrity, authentication, and nonrepudiation. Cryptography is used to ensure the file records and electronic documents for detailed information on the medical past, present and future forecasts that have been given only to the intended patients. The document will be encrypted using an encryption algorithm based on NIST Standard. In the application, there are two schemes, namely the protection and verification scheme. This research uses black-box testing and whitebox testing to test the software input, output, and code without testing the process and design that occurs in the system.We demonstrated the implementation of cryptography in SEHR. The implementation of encryption and digital signature in this research can prevent archive thievery.

  7. Assuring image authenticity within a data grid using lossless digital signature embedding and a HIPAA-compliant auditing system

    Science.gov (United States)

    Lee, Jasper C.; Ma, Kevin C.; Liu, Brent J.

    2008-03-01

    A Data Grid for medical images has been developed at the Image Processing and Informatics Laboratory, USC to provide distribution and fault-tolerant storage of medical imaging studies across Internet2 and public domain. Although back-up policies and grid certificates guarantee privacy and authenticity of grid-access-points, there still lacks a method to guarantee the sensitive DICOM images have not been altered or corrupted during transmission across a public domain. This paper takes steps toward achieving full image transfer security within the Data Grid by utilizing DICOM image authentication and a HIPAA-compliant auditing system. The 3-D lossless digital signature embedding procedure involves a private 64 byte signature that is embedded into each original DICOM image volume, whereby on the receiving end the signature can to be extracted and verified following the DICOM transmission. This digital signature method has also been developed at the IPILab. The HIPAA-Compliant Auditing System (H-CAS) is required to monitor embedding and verification events, and allows monitoring of other grid activity as well. The H-CAS system federates the logs of transmission and authentication events at each grid-access-point and stores it into a HIPAA-compliant database. The auditing toolkit is installed at the local grid-access-point and utilizes Syslog [1], a client-server standard for log messaging over an IP network, to send messages to the H-CAS centralized database. By integrating digital image signatures and centralized logging capabilities, DICOM image integrity within the Medical Imaging and Informatics Data Grid can be monitored and guaranteed without loss to any image quality.

  8. Supervised Multi-Authority Scheme with Blind Signature for IoT with Attribute Based Encryption

    Science.gov (United States)

    Nissenbaum, O. V.; Ponomarov, K. Y.; Zaharov, A. A.

    2018-04-01

    This article proposes a three-side cryptographic scheme for verifying device attributes with a Supervisor and a Certification Authority (CA) for attribute-based encryption. Two options are suggested: using a message authentication code and using a digital signature. The first version is suitable for networks with one CA, and the second one for networks with several CAs, including dynamic systems. Also, the addition of this scheme with a blind signature is proposed to preserve the confidentiality of the device attributes from the CA. The introduction gives a definition and a brief historical overview of attribute-based encryption (ABE), addresses the use of ABE in the Internet of Things.

  9. On the Theory and Practice of Personal Digital Signatures

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Mikkelsen, Gert Læssøe

    2009-01-01

    and the PC are not both corrupted at the same time. In other words, our solution cannot be broken by phising or key-logging via the PC. The protocol allows for mobile units with very small computing power by securely outsourcing computation to the PC and also allows usage of any PC that can communicate...... digital signatures on behalf of the user. This protocol is proactively UC-secure assuming at most one player is corrupted in every operational phase. In more practical terms, this means that one can securely sign using terminals (PC’s) that are not necessarily trusted, as long as the mobile unit...

  10. 78 FR 43145 - Announcing Approval of Federal Information Processing Standard 186-4, Digital Signature Standard

    Science.gov (United States)

    2013-07-19

    ...-01] Announcing Approval of Federal Information Processing Standard 186-4, Digital Signature Standard.... SUMMARY: This notice announces the Secretary of Commerce's approval of Federal Information Processing... changes are effective on July 19, 2013. FOR FURTHER INFORMATION CONTACT: Elaine Barker (301) 975-2911...

  11. On Randomizing Hash Functions to Strengthen the Security of Digital Signatures

    DEFF Research Database (Denmark)

    Halevi and Krawczyk proposed a message randomization algorithm called RMX as a front-end tool to the hash-then-sign digital signature schemes such as DSS and RSA in order to free their reliance on the collision resistance property of the hash functions. They have shown that to forge a RMX-hash-th...... that use Davies-Meyer schemes and a variant of RMX published by NIST in its Draft Special Publication (SP) 800-106. We discuss some important applications of our attack....

  12. On randomizing hash functions to strengthen the security of digital signatures

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Knudsen, Lars Ramkilde

    2009-01-01

    Halevi and Krawczyk proposed a message randomization algorithm called RMX as a front-end tool to the hash-then-sign digital signature schemes such as DSS and RSA in order to free their reliance on the collision resistance property of the hash functions. They have shown that to forge a RMX-hash-th...... schemes that use Davies-Meyer schemes and a variant of RMX published by NIST in its Draft Special Publication (SP) 800-106. We discuss some important applications of our attack....

  13. 78 FR 39200 - Authentication of Electronic Signatures on Electronically Filed Statements of Account

    Science.gov (United States)

    2013-07-01

    ... LIBRARY OF CONGRESS Copyright Office 37 CFR Part 201 [Docket No. 2013-5] Authentication of Electronic Signatures on Electronically Filed Statements of Account AGENCY: U.S. Copyright Office, Library of Congress. ACTION: Notice of proposed rulemaking; correction. SUMMARY: The U.S. Copyright Office published a...

  14. Cognitive Hacking and Digital Government: Digital Identity

    Directory of Open Access Journals (Sweden)

    Paul Thompson

    2004-04-01

    Full Text Available Recently the National Center for Digital Government held a workshop on "The Virtual Citizen: Identity, Autonomy, and Accountability: A Civic Scenario Exploration of the Role of Identity in On-Line. Discussions at the workshop focused on five scenarios for future authentication policies with respect to digital identity. The underlying technologies considered for authentication were: biometrics: cryptography, with a focus on digital signatures; secure processing/computation; and reputation systems. Most discussion at the workshop focused on issues related to authentication of users of digital government, but, as implied by the inclusion of a scenario related to ubiquitous identity theft, there was also discussion of problems related to misinformation, including cognitive hacking. Cognitive hacking refers to a computer or information system attack that relies on changing human users' perceptions and corresponding behaviors in order to succeed. This paper describes cognitive hacking, suggests countermeasures, and discusses the implications of cognitive hacking for identity in digital government. In particular, spoofing of government websites and insider misuse are considered.

  15. 2nd German-Japanese Workshop on Digital Signatures 1999: ATR (Advanced Telecommunications Research Institute International), Kyoto, 21st/22nd of September, 1999

    OpenAIRE

    Thielmann, H.; Mennicken, J.-B.

    2000-01-01

    This report contains the proceedings of a second German-Japanese Workshop on digital signatures held in Kyoto, September 21./22. 1999. The workshop aimed at legal, technical and economic aspects of digital signatures as a means to promote electronic commerce. Special attention was devoted to Identification and classification of requirements on the technical platform and requirements for international interoperability, Identification of legal requirements and other social environments that nee...

  16. 31 CFR 370.40 - Can I be held accountable if my negligence contributes to a forged signature?

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Can I be held accountable if my negligence contributes to a forged signature? 370.40 Section 370.40 Money and Finance: Treasury Regulations... if my negligence contributes to a forged signature? (a) General. If your failure to exercise ordinary...

  17. Lung Cancer Signature Biomarkers: tissue specific semantic similarity based clustering of Digital Differential Display (DDD data

    Directory of Open Access Journals (Sweden)

    Srivastava Mousami

    2012-11-01

    Full Text Available Abstract Background The tissue-specific Unigene Sets derived from more than one million expressed sequence tags (ESTs in the NCBI, GenBank database offers a platform for identifying significantly and differentially expressed tissue-specific genes by in-silico methods. Digital differential display (DDD rapidly creates transcription profiles based on EST comparisons and numerically calculates, as a fraction of the pool of ESTs, the relative sequence abundance of known and novel genes. However, the process of identifying the most likely tissue for a specific disease in which to search for candidate genes from the pool of differentially expressed genes remains difficult. Therefore, we have used ‘Gene Ontology semantic similarity score’ to measure the GO similarity between gene products of lung tissue-specific candidate genes from control (normal and disease (cancer sets. This semantic similarity score matrix based on hierarchical clustering represents in the form of a dendrogram. The dendrogram cluster stability was assessed by multiple bootstrapping. Multiple bootstrapping also computes a p-value for each cluster and corrects the bias of the bootstrap probability. Results Subsequent hierarchical clustering by the multiple bootstrapping method (α = 0.95 identified seven clusters. The comparative, as well as subtractive, approach revealed a set of 38 biomarkers comprising four distinct lung cancer signature biomarker clusters (panel 1–4. Further gene enrichment analysis of the four panels revealed that each panel represents a set of lung cancer linked metastasis diagnostic biomarkers (panel 1, chemotherapy/drug resistance biomarkers (panel 2, hypoxia regulated biomarkers (panel 3 and lung extra cellular matrix biomarkers (panel 4. Conclusions Expression analysis reveals that hypoxia induced lung cancer related biomarkers (panel 3, HIF and its modulating proteins (TGM2, CSNK1A1, CTNNA1, NAMPT/Visfatin, TNFRSF1A, ETS1, SRC-1, FN1, APLP2, DMBT1

  18. A Robust Iris Identification System Based on Wavelet Packet Decomposition and Local Comparisons of the Extracted Signatures

    Directory of Open Access Journals (Sweden)

    Rossant Florence

    2010-01-01

    Full Text Available Abstract This paper presents a complete iris identification system including three main stages: iris segmentation, signature extraction, and signature comparison. An accurate and robust pupil and iris segmentation process, taking into account eyelid occlusions, is first detailed and evaluated. Then, an original wavelet-packet-based signature extraction method and a novel identification approach, based on the fusion of local distance measures, are proposed. Performance measurements validating the proposed iris signature and demonstrating the benefit of our local-based signature comparison are provided. Moreover, an exhaustive evaluation of robustness, with regards to the acquisition conditions, attests the high performances and the reliability of our system. Tests have been conducted on two different databases, the well-known CASIA database (V3 and our ISEP database. Finally, a comparison of the performances of our system with the published ones is given and discussed.

  19. Quantum signature scheme for known quantum messages

    International Nuclear Information System (INIS)

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  20. Digital image envelope: method and evaluation

    Science.gov (United States)

    Huang, H. K.; Cao, Fei; Zhou, Michael Z.; Mogel, Greg T.; Liu, Brent J.; Zhou, Xiaoqiang

    2003-05-01

    Health data security, characterized in terms of data privacy, authenticity, and integrity, is a vital issue when digital images and other patient information are transmitted through public networks in telehealth applications such as teleradiology. Mandates for ensuring health data security have been extensively discussed (for example The Health Insurance Portability and Accountability Act, HIPAA) and health informatics guidelines (such as the DICOM standard) are beginning to focus on issues of data continue to be published by organizing bodies in healthcare; however, there has not been a systematic method developed to ensure data security in medical imaging Because data privacy and authenticity are often managed primarily with firewall and password protection, we have focused our research and development on data integrity. We have developed a systematic method of ensuring medical image data integrity across public networks using the concept of the digital envelope. When a medical image is generated regardless of the modality, three processes are performed: the image signature is obtained, the DICOM image header is encrypted, and a digital envelope is formed by combining the signature and the encrypted header. The envelope is encrypted and embedded in the original image. This assures the security of both the image and the patient ID. The embedded image is encrypted again and transmitted across the network. The reverse process is performed at the receiving site. The result is two digital signatures, one from the original image before transmission, and second from the image after transmission. If the signatures are identical, there has been no alteration of the image. This paper concentrates in the method and evaluation of the digital image envelope.

  1. HYBRID CHRIPTOGRAPHY STREAM CIPHER AND RSA ALGORITHM WITH DIGITAL SIGNATURE AS A KEY

    Directory of Open Access Journals (Sweden)

    Grace Lamudur Arta Sihombing

    2017-03-01

    Full Text Available Confidentiality of data is very important in communication. Many cyber crimes that exploit security holes for entry and manipulation. To ensure the security and confidentiality of the data, required a certain technique to encrypt data or information called cryptography. It is one of the components that can not be ignored in building security. And this research aimed to analyze the hybrid cryptography with symmetric key by using a stream cipher algorithm and asymmetric key by using RSA (Rivest Shamir Adleman algorithm. The advantages of hybrid cryptography is the speed in processing data using a symmetric algorithm and easy transfer of key using asymmetric algorithm. This can increase the speed of transaction processing data. Stream Cipher Algorithm using the image digital signature as a keys, that will be secured by the RSA algorithm. So, the key for encryption and decryption are different. Blum Blum Shub methods used to generate keys for the value p, q on the RSA algorithm. It will be very difficult for a cryptanalyst to break the key. Analysis of hybrid cryptography stream cipher and RSA algorithms with digital signatures as a key, indicates that the size of the encrypted file is equal to the size of the plaintext, not to be larger or smaller so that the time required for encryption and decryption process is relatively fast.

  2. Signature-based User Authentication

    OpenAIRE

    Hámorník, Juraj

    2015-01-01

    This work aims on missing handwritten signature authentication in Windows. Result of this work is standalone software that allow users to log into Windows by writing signature. We focus on security of signature authentification and best overall user experience. We implemented signature authentification service that accept signature and return user access token if signature is genuine. Signature authentification is done by comparing given signature to signature patterns by their similarity. Si...

  3. A Circulating microRNA Signature Predicts Age-Based Development of Lymphoma.

    Directory of Open Access Journals (Sweden)

    Afshin Beheshti

    Full Text Available Extensive epidemiological data have demonstrated an exponential rise in the incidence of non-Hodgkin lymphoma (NHL that is associated with increasing age. The molecular etiology of this remains largely unknown, which impacts the effectiveness of treatment for patients. We proposed that age-dependent circulating microRNA (miRNA signatures in the host influence diffuse large B cell lymphoma (DLBCL development. Our objective was to examine tumor development in an age-based DLBCL system using an inventive systems biology approach. We harnessed a novel murine model of spontaneous DLBCL initiation (Smurf2-deficient at two age groups: 3 and 15 months old. All Smurf2-deficient mice develop visible DLBCL tumor starting at 15 months of age. Total miRNA was isolated from serum, bone marrow and spleen and were collected for all age groups for Smurf2-deficient mice and age-matched wild-type C57BL/6 mice. Using systems biology techniques, we identified a list of 10 circulating miRNAs being regulated in both the spleen and bone marrow that were present in DLBCL forming mice starting at 3 months of age that were not present in the control mice. Furthermore, this miRNA signature was found to occur circulating in the blood and it strongly impacted JUN and MYC oncogenic signaling. In addition, quantification of the miRNA signature was performed via Droplet Digital PCR technology. It was discovered that a key miRNA signature circulates throughout a host prior to the formation of a tumor starting at 3 months old, which becomes further modulated by age and yielded calculation of a 'carcinogenic risk score'. This novel age-based circulating miRNA signature may potentially be leveraged as a DLBCL risk profile at a young age to predict future lymphoma development or disease progression as well as for potential innovative miRNA-based targeted therapeutic strategies in lymphoma.

  4. Novel Perspectives on the Characterization of Species-Dependent Optical Signatures of Bacterial Colonies by Digital Holography.

    Directory of Open Access Journals (Sweden)

    Igor Buzalewicz

    Full Text Available The use of light diffraction for the microbiological diagnosis of bacterial colonies was a significant breakthrough with widespread implications for the food industry and clinical practice. We previously confirmed that optical sensors for bacterial colony light diffraction can be used for bacterial identification. This paper is focused on the novel perspectives of this method based on digital in-line holography (DIH, which is able to reconstruct the amplitude and phase properties of examined objects, as well as the amplitude and phase patterns of the optical field scattered/diffracted by the bacterial colony in any chosen observation plane behind the object from single digital hologram. Analysis of the amplitude and phase patterns inside a colony revealed its unique optical properties, which are associated with the internal structure and geometry of the bacterial colony. Moreover, on a computational level, it is possible to select the desired scattered/diffracted pattern within the entire observation volume that exhibits the largest amount of unique, differentiating bacterial features. These properties distinguish this method from the already proposed sensing techniques based on light diffraction/scattering of bacterial colonies. The reconstructed diffraction patterns have a similar spatial distribution as the recorded Fresnel patterns, previously applied for bacterial identification with over 98% accuracy, but they are characterized by both intensity and phase distributions. Our results using digital holography provide new optical discriminators of bacterial species revealed in one single step in form of new optical signatures of bacterial colonies: digital holograms, reconstructed amplitude and phase patterns, as well as diffraction patterns from all observation space, which exhibit species-dependent features. To the best of our knowledge, this is the first report on bacterial colony analysis via digital holography and our study represents an

  5. Novel Perspectives on the Characterization of Species-Dependent Optical Signatures of Bacterial Colonies by Digital Holography.

    Science.gov (United States)

    Buzalewicz, Igor; Kujawińska, Małgorzata; Krauze, Wojciech; Podbielska, Halina

    2016-01-01

    The use of light diffraction for the microbiological diagnosis of bacterial colonies was a significant breakthrough with widespread implications for the food industry and clinical practice. We previously confirmed that optical sensors for bacterial colony light diffraction can be used for bacterial identification. This paper is focused on the novel perspectives of this method based on digital in-line holography (DIH), which is able to reconstruct the amplitude and phase properties of examined objects, as well as the amplitude and phase patterns of the optical field scattered/diffracted by the bacterial colony in any chosen observation plane behind the object from single digital hologram. Analysis of the amplitude and phase patterns inside a colony revealed its unique optical properties, which are associated with the internal structure and geometry of the bacterial colony. Moreover, on a computational level, it is possible to select the desired scattered/diffracted pattern within the entire observation volume that exhibits the largest amount of unique, differentiating bacterial features. These properties distinguish this method from the already proposed sensing techniques based on light diffraction/scattering of bacterial colonies. The reconstructed diffraction patterns have a similar spatial distribution as the recorded Fresnel patterns, previously applied for bacterial identification with over 98% accuracy, but they are characterized by both intensity and phase distributions. Our results using digital holography provide new optical discriminators of bacterial species revealed in one single step in form of new optical signatures of bacterial colonies: digital holograms, reconstructed amplitude and phase patterns, as well as diffraction patterns from all observation space, which exhibit species-dependent features. To the best of our knowledge, this is the first report on bacterial colony analysis via digital holography and our study represents an innovative approach

  6. Accounting Professor Qualification in Digital Age: A Perception Study on Brazilian Professors

    Science.gov (United States)

    Vendruscolo, Maria Ivanice; Behar, Patrícia Alejandra

    2015-01-01

    This papers aims at analyzing the perception of Accounting professors about the necessary qualifications in Accounting undergraduate courses. The contribution of this study is to theoretically discuss the education of Accounting professors, with empirical data, because Accounting teaching requires specific competencies in the digital area. The…

  7. Signature-based store checking buffer

    Science.gov (United States)

    Sridharan, Vilas; Gurumurthi, Sudhanva

    2015-06-02

    A system and method for optimizing redundant output verification, are provided. A hardware-based store fingerprint buffer receives multiple instances of output from multiple instances of computation. The store fingerprint buffer generates a signature from the content included in the multiple instances of output. When a barrier is reached, the store fingerprint buffer uses the signature to verify the content is error-free.

  8. DIGITAL SIGNATURE IN THE WAY OF LAW

    OpenAIRE

    Ruya Samlı

    2013-01-01

    Signature can be defined as a person’s name or special signs that he/she writes when he/she wants to indicate he/she wrote or confirm that writing. A person signs many times in his/her life. A person’s signature that is used for thousands of times for many things from formal documents to exams has importance for that person. Especially, signing in legal operations is an operation that can build important results. If a person’s signature is imitated by another person, he/she can be...

  9. Re-examining the security of blind quantum signature protocols

    International Nuclear Information System (INIS)

    Wang Mingming; Chen Xiubo; Niu Xinxin; Yang Yixian

    2012-01-01

    Recently, blind quantum signature (BQS) protocols have been proposed with the help of a third-party verifier. However, our research shows that some of the BQS protocols are unable to complete the blind signature task fairly if the verifier is dishonest. Indeed, these protocols can be viewed as variants of the classical digital signature scheme of symmetric-key cryptography. If nobody is trusted in such protocols, digital signature cannot be implemented since disagreements cannot be solved fairly.

  10. A Lattice-Based Identity-Based Proxy Blind Signature Scheme in the Standard Model

    Directory of Open Access Journals (Sweden)

    Lili Zhang

    2014-01-01

    Full Text Available A proxy blind signature scheme is a special form of blind signature which allowed a designated person called proxy signer to sign on behalf of original signers without knowing the content of the message. It combines the advantages of proxy signature and blind signature. Up to date, most proxy blind signature schemes rely on hard number theory problems, discrete logarithm, and bilinear pairings. Unfortunately, the above underlying number theory problems will be solvable in the postquantum era. Lattice-based cryptography is enjoying great interest these days, due to implementation simplicity and provable security reductions. Moreover, lattice-based cryptography is believed to be hard even for quantum computers. In this paper, we present a new identity-based proxy blind signature scheme from lattices without random oracles. The new scheme is proven to be strongly unforgeable under the standard hardness assumption of the short integer solution problem (SIS and the inhomogeneous small integer solution problem (ISIS. Furthermore, the secret key size and the signature length of our scheme are invariant and much shorter than those of the previous lattice-based proxy blind signature schemes. To the best of our knowledge, our construction is the first short lattice-based identity-based proxy blind signature scheme in the standard model.

  11. Spectral features based tea garden extraction from digital orthophoto maps

    Science.gov (United States)

    Jamil, Akhtar; Bayram, Bulent; Kucuk, Turgay; Zafer Seker, Dursun

    2018-05-01

    The advancements in the photogrammetry and remote sensing technologies has made it possible to extract useful tangible information from data which plays a pivotal role in various application such as management and monitoring of forests and agricultural lands etc. This study aimed to evaluate the effectiveness of spectral signatures for extraction of tea gardens from 1 : 5000 scaled digital orthophoto maps obtained from Rize city in Turkey. First, the normalized difference vegetation index (NDVI) was derived from the input images to suppress the non-vegetation areas. NDVI values less than zero were discarded and the output images was normalized in the range 0-255. Individual pixels were then mapped into meaningful objects using global region growing technique. The resulting image was filtered and smoothed to reduce the impact of noise. Furthermore, geometrical constraints were applied to remove small objects (less than 500 pixels) followed by morphological opening operator to enhance the results. These objects served as building blocks for further image analysis. Finally, for the classification stage, a range of spectral values were empirically calculated for each band and applied on candidate objects to extract tea gardens. For accuracy assessment, we employed an area based similarity metric by overlapping obtained tea garden boundaries with the manually digitized tea garden boundaries created by experts of photogrammetry. The overall accuracy of the proposed method scored 89 % for tea gardens from 10 sample orthophoto maps. We concluded that exploiting the spectral signatures using object based analysis is an effective technique for extraction of dominant tree species from digital orthophoto maps.

  12. Tightly Secure Signatures From Lossy Identification Schemes

    OpenAIRE

    Abdalla , Michel; Fouque , Pierre-Alain; Lyubashevsky , Vadim; Tibouchi , Mehdi

    2015-01-01

    International audience; In this paper, we present three digital signature schemes with tight security reductions in the random oracle model. Our first signature scheme is a particularly efficient version of the short exponent discrete log-based scheme of Girault et al. (J Cryptol 19(4):463–487, 2006). Our scheme has a tight reduction to the decisional short discrete logarithm problem, while still maintaining the non-tight reduction to the computational version of the problem upon which the or...

  13. Imprecise system reliability and component importance based on survival signature

    International Nuclear Information System (INIS)

    Feng, Geng; Patelli, Edoardo; Beer, Michael; Coolen, Frank P.A.

    2016-01-01

    The concept of the survival signature has recently attracted increasing attention for performing reliability analysis on systems with multiple types of components. It opens a new pathway for a structured approach with high computational efficiency based on a complete probabilistic description of the system. In practical applications, however, some of the parameters of the system might not be defined completely due to limited data, which implies the need to take imprecisions of component specifications into account. This paper presents a methodology to include explicitly the imprecision, which leads to upper and lower bounds of the survival function of the system. In addition, the approach introduces novel and efficient component importance measures. By implementing relative importance index of each component without or with imprecision, the most critical component in the system can be identified depending on the service time of the system. Simulation method based on survival signature is introduced to deal with imprecision within components, which is precise and efficient. Numerical example is presented to show the applicability of the approach for systems. - Highlights: • Survival signature is a novel way for system reliability and component importance • High computational efficiency based on a complete description of system. • Include explicitly the imprecision, which leads to bounds of the survival function. • A novel relative importance index is proposed as importance measure. • Allows to identify critical components depending on the service time of the system.

  14. An Efficient Homomorphic Aggregate Signature Scheme Based on Lattice

    Directory of Open Access Journals (Sweden)

    Zhengjun Jing

    2014-01-01

    Full Text Available Homomorphic aggregate signature (HAS is a linearly homomorphic signature (LHS for multiple users, which can be applied for a variety of purposes, such as multi-source network coding and sensor data aggregation. In order to design an efficient postquantum secure HAS scheme, we borrow the idea of the lattice-based LHS scheme over binary field in the single-user case, and develop it into a new lattice-based HAS scheme in this paper. The security of the proposed scheme is proved by showing a reduction to the single-user case and the signature length remains invariant. Compared with the existing lattice-based homomorphic aggregate signature scheme, our new scheme enjoys shorter signature length and high efficiency.

  15. Time Series Based for Online Signature Verification

    Directory of Open Access Journals (Sweden)

    I Ketut Gede Darma Putra

    2013-11-01

    Full Text Available Signature verification system is to match the tested signature with a claimed signature. This paper proposes time series based for feature extraction method and dynamic time warping for match method. The system made by process of testing 900 signatures belong to 50 participants, 3 signatures for reference and 5 signatures from original user, simple imposters and trained imposters for signatures test. The final result system was tested with 50 participants with 3 references. This test obtained that system accuracy without imposters is 90,44897959% at threshold 44 with rejection errors (FNMR is 5,2% and acceptance errors (FMR is 4,35102%, when with imposters system accuracy is 80,1361% at threshold 27 with error rejection (FNMR is 15,6% and acceptance errors (average FMR is 4,263946%, with details as follows: acceptance errors is 0,391837%, acceptance errors simple imposters is 3,2% and acceptance errors trained imposters is 9,2%.

  16. Research on a New Signature Scheme on Blockchain

    Directory of Open Access Journals (Sweden)

    Chao Yuan

    2017-01-01

    Full Text Available With the rise of Bitcoin, blockchain which is the core technology of Bitcoin has received increasing attention. Privacy preserving and performance on blockchain are two research points in academia and business, but there are still some unresolved issues in both respects. An aggregate signature scheme is a digital signature that supports making signatures on many different messages generated by many different users. Using aggregate signature, the size of the signature could be shortened by compressing multiple signatures into a single signature. In this paper, a new signature scheme for transactions on blockchain based on the aggregate signature was proposed. It was worth noting that elliptic curve discrete logarithm problem and bilinear maps played major roles in our signature scheme. And the security properties of our signature scheme were proved. In our signature scheme, the amount will be hidden especially in the transactions which contain multiple inputs and outputs. Additionally, the size of the signature on transaction is constant regardless of the number of inputs and outputs that the transaction contains, which can improve the performance of signature. Finally, we gave an application scenario for our signature scheme which aims to achieve the transactions of big data on blockchain.

  17. Color digital halftoning taking colorimetric color reproduction into account

    Science.gov (United States)

    Haneishi, Hideaki; Suzuki, Toshiaki; Shimoyama, Nobukatsu; Miyake, Yoichi

    1996-01-01

    Taking colorimetric color reproduction into account, the conventional error diffusion method is modified for color digital half-toning. Assuming that the input to a bilevel color printer is given in CIE-XYZ tristimulus values or CIE-LAB values instead of the more conventional RGB or YMC values, two modified versions based on vector operation in (1) the XYZ color space and (2) the LAB color space were tested. Experimental results show that the modified methods, especially the method using the LAB color space, resulted in better color reproduction performance than the conventional methods. Spatial artifacts that appear in the modified methods are presented and analyzed. It is also shown that the modified method (2) with a thresholding technique achieves a good spatial image quality.

  18. Signature scheme based on bilinear pairs

    Science.gov (United States)

    Tong, Rui Y.; Geng, Yong J.

    2013-03-01

    An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.

  19. Signature Schemes Secure against Hard-to-Invert Leakage

    DEFF Research Database (Denmark)

    Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus

    2012-01-01

    of the secret key. As a second contribution, we construct a signature scheme that achieves security for random messages assuming that the adversary is given a polynomial-time hard to invert function. Here, polynomial-hardness is required even when given the entire public-key – so called weak auxiliary input......-theoretically reveal the entire secret key. In this work, we propose the first constructions of digital signature schemes that are secure in the auxiliary input model. Our main contribution is a digital signature scheme that is secure against chosen message attacks when given an exponentially hard-to-invert function...... security. We show that such signature schemes readily give us auxiliary input secure identification schemes...

  20. Optical/Infrared Signatures for Space-Based Remote Sensing

    National Research Council Canada - National Science Library

    Picard, R. H; Dewan, E. M; Winick, J. R; O'Neil, R. R

    2007-01-01

    This report describes work carried out under the Air Force Research Laboratory's basic research task in optical remote-sensing signatures, entitled Optical / Infrared Signatures for Space-Based Remote Sensing...

  1. An ID-based Blind Signature Scheme from Bilinear Pairings

    OpenAIRE

    B.Umaprasada Rao; K.A.Ajmath

    2010-01-01

    Blind signatures, introduced by Chaum, allow a user to obtain a signature on a message without revealing any thing about the message to the signer. Blind signatures play on important role in plenty of applications such as e-voting, e-cash system where anonymity is of great concern. Identity based(ID-based) public key cryptography can be a good alternative for certified based public key setting, especially when efficient key management and moderate security are required. In this paper, we prop...

  2. Characteristics and Validation Techniques for PCA-Based Gene-Expression Signatures

    Directory of Open Access Journals (Sweden)

    Anders E. Berglund

    2017-01-01

    Full Text Available Background. Many gene-expression signatures exist for describing the biological state of profiled tumors. Principal Component Analysis (PCA can be used to summarize a gene signature into a single score. Our hypothesis is that gene signatures can be validated when applied to new datasets, using inherent properties of PCA. Results. This validation is based on four key concepts. Coherence: elements of a gene signature should be correlated beyond chance. Uniqueness: the general direction of the data being examined can drive most of the observed signal. Robustness: if a gene signature is designed to measure a single biological effect, then this signal should be sufficiently strong and distinct compared to other signals within the signature. Transferability: the derived PCA gene signature score should describe the same biology in the target dataset as it does in the training dataset. Conclusions. The proposed validation procedure ensures that PCA-based gene signatures perform as expected when applied to datasets other than those that the signatures were trained upon. Complex signatures, describing multiple independent biological components, are also easily identified.

  3. Electronic Signature (eSig)

    Data.gov (United States)

    Department of Veterans Affairs — Beginning with the Government Paperwork Elimination Act of 1998 (GPEA), the Federal government has encouraged the use of electronic / digital signatures to enable...

  4. Quantum signature scheme based on a quantum search algorithm

    International Nuclear Information System (INIS)

    Yoon, Chun Seok; Kang, Min Sung; Lim, Jong In; Yang, Hyung Jin

    2015-01-01

    We present a quantum signature scheme based on a two-qubit quantum search algorithm. For secure transmission of signatures, we use a quantum search algorithm that has not been used in previous quantum signature schemes. A two-step protocol secures the quantum channel, and a trusted center guarantees non-repudiation that is similar to other quantum signature schemes. We discuss the security of our protocol. (paper)

  5. Efficient Fair Exchange from Identity-Based Signature

    Science.gov (United States)

    Yum, Dae Hyun; Lee, Pil Joong

    A fair exchange scheme is a protocol by which two parties Alice and Bob exchange items or services without allowing either party to gain advantages by quitting prematurely or otherwise misbehaving. To this end, modern cryptographic solutions use a semi-trusted arbitrator who involves only in cases where one party attempts to cheat or simply crashes. We call such a fair exchange scheme optimistic. When no registration is required between the signer and the arbitrator, we say that the fair exchange scheme is setup free. To date, the setup-free optimist fair exchange scheme under the standard RSA assumption was only possible from the generic construction of [12], which uses ring signatures. In this paper, we introduce a new setup-free optimistic fair exchange scheme under the standard RSA assumption. Our scheme uses the GQ identity-based signature and is more efficient than [12]. The construction can also be generalized by using various identity-based signature schemes. Our main technique is to allow each user to choose his (or her) own “random” public key in the identitybased signature scheme.

  6. THE ELECTRONIC SIGNATURE

    Directory of Open Access Journals (Sweden)

    Voiculescu Madalina Irena

    2009-05-01

    Full Text Available Article refers to significance and the digital signature in electronic commerce. Internet and electronic commerce open up many new opportunities for the consumer, yet, the security (or perceived lack of security of exchanging personal and financial data

  7. Atmospheric Signatures and Effects of Space-based Relativistic Electron Beam Injection

    Science.gov (United States)

    Marshall, R. A.; Sanchez, E. R.; Kero, A.; Turunen, E. S.; Marsh, D. R.

    2017-12-01

    Future relativistic electron beam injection experiments have the potential to provide groundbreaking insights into the physics of wave-particle interactions and beam-neutral interactions, relevant to space physics and to fundamental plasma physics. However, these experiments are only useful if their signatures can be detected. In this work, we use a physics-based forward modeling framework to investigate the observable signatures of a relativistic beam interacting with the upper atmosphere. The modeling framework is based around the Electron Precipitation Monte Carlo (EPMC) model, used to simulate electron precipitation in the upper atmosphere. That model is coupled to physics-based models of i) optical emission production; ii) bremsstrahlung photon production and propagation; iii) D-region ion chemistry; and iv) VLF wave propagation in the Earth-ionosphere waveguide. Using these modeling tools, we predict the optical, X-ray, chemical, radar, and VLF signatures of a realistic beam injection, based on recent space-based accelerator designs. In particular, we inject a beam pulse of 10 mA for a duration of 500 μs at an energy of 1 MeV, providing a total pulse energy of 5 J. We further investigate variations in these parameters, in particular the total energy and the electron energy. Our modeling shows that for this 5 J pulse injection at 1 MeV electron energy, the optical signal is easily detectable from the ground in common emission bands, but the X-ray signal is likely too weak to be seen from either balloons or LEO orbiting spacecraft. We further predict the optical signal-to-noise ratio that would be expected in different optical systems. Chemical signatures such as changes to NOx and HOx concentrations are too short-lived to be detectable; however our modeling provides a valuable estimate of the total chemical response. Electron density perturbations should be easily measurable from ground-based high-power radars and via VLF subionospheric remote sensing

  8. Analysis of signature wrapping attacks and countermeasures

    DEFF Research Database (Denmark)

    Gajek, Sebastian; Jensen, Meiko; Liao, Lijun

    2009-01-01

    In recent research it turned out that Boolean verification, of digital signatures in the context of WSSecurity, is likely to fail: If parts of a SOAP message, are signed and the signature verification applied to, the whole document returns true, then nevertheless the, document may have been...

  9. An Efficient Identity-Based Proxy Blind Signature for Semioffline Services

    Directory of Open Access Journals (Sweden)

    Hongfei Zhu

    2018-01-01

    Full Text Available Fog computing extends the cloud computing to the network edge and allows deploying a new type of semioffline services, which can provide real-time transactions between two entities, while the central cloud server is offline and network edge devices are online. For an e-payment system and e-voting with such feature, proxy blind signature is a cornerstone to protect users’ privacy. However, the signature based on number theorem, such as hard mathematical problems on factoring problem, discrete logarithm problem, and bilinear pairings, cannot defeat quantum computers attack. Meanwhile, these schemes need to depend on complex public key infrastructure. Thus, we construct an identity-based proxy blind signature scheme based on number theorem research unit lattice, which can defeat quantum computers attack and does not need to depend on public key infrastructure. The security of the proposed scheme is dependent on Ring-Small Integer Solution problem over number theorem research unit lattice. The proposed scheme meets the properties of blind signature and proxy signature. Then we compare the proposed scheme with other existing proxy blind signature schemes; the result shows that the proposed scheme outperforms ZM scheme except in proxy signer’s signature size and can be more secure than TA scheme and MMHP scheme.

  10. A signature-based method for indexing cell cycle phase distribution from microarray profiles

    Directory of Open Access Journals (Sweden)

    Mizuno Hideaki

    2009-03-01

    Full Text Available Abstract Background The cell cycle machinery interprets oncogenic signals and reflects the biology of cancers. To date, various methods for cell cycle phase estimation such as mitotic index, S phase fraction, and immunohistochemistry have provided valuable information on cancers (e.g. proliferation rate. However, those methods rely on one or few measurements and the scope of the information is limited. There is a need for more systematic cell cycle analysis methods. Results We developed a signature-based method for indexing cell cycle phase distribution from microarray profiles under consideration of cycling and non-cycling cells. A cell cycle signature masterset, composed of genes which express preferentially in cycling cells and in a cell cycle-regulated manner, was created to index the proportion of cycling cells in the sample. Cell cycle signature subsets, composed of genes whose expressions peak at specific stages of the cell cycle, were also created to index the proportion of cells in the corresponding stages. The method was validated using cell cycle datasets and quiescence-induced cell datasets. Analyses of a mouse tumor model dataset and human breast cancer datasets revealed variations in the proportion of cycling cells. When the influence of non-cycling cells was taken into account, "buried" cell cycle phase distributions were depicted that were oncogenic-event specific in the mouse tumor model dataset and were associated with patients' prognosis in the human breast cancer datasets. Conclusion The signature-based cell cycle analysis method presented in this report, would potentially be of value for cancer characterization and diagnostics.

  11. Security analysis of boolean algebra based on Zhang-Wang digital signature scheme

    International Nuclear Information System (INIS)

    Zheng, Jinbin

    2014-01-01

    In 2005, Zhang and Wang proposed an improvement signature scheme without using one-way hash function and message redundancy. In this paper, we show that this scheme exits potential safety concerns through the analysis of boolean algebra, such as bitwise exclusive-or, and point out that mapping is not one to one between assembly instructions and machine code actually by means of the analysis of the result of the assembly program segment, and which possibly causes safety problems unknown to the software

  12. Security analysis of boolean algebra based on Zhang-Wang digital signature scheme

    Energy Technology Data Exchange (ETDEWEB)

    Zheng, Jinbin, E-mail: jbzheng518@163.com [School of Mathematics and Computer Science, Long Yan University, Longyan 364012 (China)

    2014-10-06

    In 2005, Zhang and Wang proposed an improvement signature scheme without using one-way hash function and message redundancy. In this paper, we show that this scheme exits potential safety concerns through the analysis of boolean algebra, such as bitwise exclusive-or, and point out that mapping is not one to one between assembly instructions and machine code actually by means of the analysis of the result of the assembly program segment, and which possibly causes safety problems unknown to the software.

  13. Revocable identity-based proxy re-signature against signing key exposure.

    Science.gov (United States)

    Yang, Xiaodong; Chen, Chunlin; Ma, Tingchun; Wang, Jinli; Wang, Caifen

    2018-01-01

    Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key. Due to this transformation function, IDPRS is very useful in constructing privacy-preserving schemes for various information systems. Key revocation functionality is important in practical IDPRS for managing users dynamically; however, the existing IDPRS schemes do not provide revocation mechanisms that allow the removal of misbehaving or compromised users from the system. In this paper, we first introduce a notion called revocable identity-based proxy re-signature (RIDPRS) to achieve the revocation functionality. We provide a formal definition of RIDPRS as well as its security model. Then, we present a concrete RIDPRS scheme that can resist signing key exposure and prove that the proposed scheme is existentially unforgeable against adaptive chosen identity and message attacks in the standard model. To further improve the performance of signature verification in RIDPRS, we introduce a notion called server-aided revocable identity-based proxy re-signature (SA-RIDPRS). Moreover, we extend the proposed RIDPRS scheme to the SA-RIDPRS scheme and prove that this extended scheme is secure against adaptive chosen message and collusion attacks. The analysis results show that our two schemes remain efficient in terms of computational complexity when implementing user revocation procedures. In particular, in the SA-RIDPRS scheme, the verifier needs to perform only a bilinear pairing and four exponentiation operations to verify the validity of the signature. Compared with other IDPRS schemes in the standard model, our SA-RIDPRS scheme greatly reduces the computation overhead of verification.

  14. Securing Digital Images Integrity using Artificial Neural Networks

    Science.gov (United States)

    Hajji, Tarik; Itahriouan, Zakaria; Ouazzani Jamil, Mohammed

    2018-05-01

    Digital image signature is a technique used to protect the image integrity. The application of this technique can serve several areas of imaging applied to smart cities. The objective of this work is to propose two methods to protect digital image integrity. We present a description of two approaches using artificial neural networks (ANN) to digitally sign an image. The first one is “Direct Signature without learning” and the second is “Direct Signature with learning”. This paper presents the theory of proposed approaches and an experimental study to test their effectiveness.

  15. Reexamining the language account of cross-national differences in base-10 number representations.

    Science.gov (United States)

    Vasilyeva, Marina; Laski, Elida V; Ermakova, Anna; Lai, Weng-Feng; Jeong, Yoonkyung; Hachigian, Amy

    2015-01-01

    East Asian students consistently outperform students from other nations in mathematics. One explanation for this advantage is a language account; East Asian languages, unlike most Western languages, provide cues about the base-10 structure of multi-digit numbers, facilitating the development of base-10 number representations. To test this view, the current study examined how kindergartners represented two-digit numbers using single unit-blocks and ten-blocks. The participants (N=272) were from four language groups (Korean, Mandarin, English, and Russian) that vary in the extent of "transparency" of the base-10 structure. In contrast to previous findings with older children, kindergartners showed no cross-language variability in the frequency of producing base-10 representations. Furthermore, they showed a pattern of within-language variability that was not consistent with the language account and was likely attributable to experiential factors. These findings suggest that language might not play as critical a role in the development of base-10 representations as suggested in earlier research. Copyright © 2014 Elsevier Inc. All rights reserved.

  16. Research on Signature Verification Method Based on Discrete Fréchet Distance

    Science.gov (United States)

    Fang, J. L.; Wu, W.

    2018-05-01

    This paper proposes a multi-feature signature template based on discrete Fréchet distance, which breaks through the limitation of traditional signature authentication using a single signature feature. It solves the online handwritten signature authentication signature global feature template extraction calculation workload, signature feature selection unreasonable problem. In this experiment, the false recognition rate (FAR) and false rejection rate (FRR) of the statistical signature are calculated and the average equal error rate (AEER) is calculated. The feasibility of the combined template scheme is verified by comparing the average equal error rate of the combination template and the original template.

  17. SOFIA: MQ-based signatures in the QROM

    NARCIS (Netherlands)

    Chen, Ming Shing; Hülsing, Andreas; Rijneveld, Joost; Samardjiska, Simona; Schwabe, Peter

    2018-01-01

    We propose SOFIA, the first MQ -based signature scheme provably secure in the quantum-accessible random oracle model (QROM). Our construction relies on an extended version of Unruh’s transform for 5-pass identification schemes that we describe and prove secure both in the ROM and QROM. Based on a

  18. E-learning platform for automated testing of electronic circuits using signature analysis method

    Science.gov (United States)

    Gherghina, Cǎtǎlina; Bacivarov, Angelica; Bacivarov, Ioan C.; Petricǎ, Gabriel

    2016-12-01

    Dependability of electronic circuits can be ensured only through testing of circuit modules. This is done by generating test vectors and their application to the circuit. Testability should be viewed as a concerted effort to ensure maximum efficiency throughout the product life cycle, from conception and design stage, through production to repairs during products operating. In this paper, is presented the platform developed by authors for training for testability in electronics, in general and in using signature analysis method, in particular. The platform allows highlighting the two approaches in the field namely analog and digital signature of circuits. As a part of this e-learning platform, it has been developed a database for signatures of different electronic components meant to put into the spotlight different techniques implying fault detection, and from this there were also self-repairing techniques of the systems with this kind of components. An approach for realizing self-testing circuits based on MATLAB environment and using signature analysis method is proposed. This paper analyses the benefits of signature analysis method and simulates signature analyzer performance based on the use of pseudo-random sequences, too.

  19. Digital Correlation based on Wavelet Transform for Image Detection

    International Nuclear Information System (INIS)

    Barba, L; Vargas, L; Torres, C; Mattos, L

    2011-01-01

    In this work is presented a method for the optimization of digital correlators to improve the characteristic detection on images using wavelet transform as well as subband filtering. It is proposed an approach of wavelet-based image contrast enhancement in order to increase the performance of digital correlators. The multiresolution representation is employed to improve the high frequency content of images taken into account the input contrast measured for the original image. The energy of correlation peaks and discrimination level of several objects are improved with this technique. To demonstrate the potentiality in extracting characteristics using the wavelet transform, small objects inside reference images are detected successfully.

  20. XMSS : a practical forward secure signature scheme based on minimal security assumptions

    NARCIS (Netherlands)

    Buchmann, Johannes; Dahmen, Erik; Hülsing, Andreas; Yang, B.-Y.

    2011-01-01

    We present the hash-based signature scheme XMSS. It is the first provably (forward) secure and practical signature scheme with minimal security requirements: a pseudorandom and a second preimage resistant (hash) function family. Its signature size is reduced to less than 25% compared to the best

  1. Developing a Signature Based Safeguards Approach for the Electrorefiner and Salt Cleanup Unit Operations in Pyroprocessing Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Murphy, Chantell Lynne-Marie [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-01-27

    Traditional nuclear materials accounting does not work well for safeguards when applied to pyroprocessing. Alternate methods such as Signature Based Safeguards (SBS) are being investigated. The goal of SBS is real-time/near-real-time detection of anomalous events in the pyroprocessing facility as they could indicate loss of special nuclear material. In high-throughput reprocessing facilities, metric tons of separated material are processed that must be accounted for. Even with very low uncertainties of accountancy measurements (<0.1%) the uncertainty of the material balances is still greater than the desired level. Novel contributions of this work are as follows: (1) significant enhancement of SBS development for the salt cleanup process by creating a new gas sparging process model, selecting sensors to monitor normal operation, identifying safeguards-significant off-normal scenarios, and simulating those off-normal events and generating sensor output; (2) further enhancement of SBS development for the electrorefiner by simulating off-normal events caused by changes in salt concentration and identifying which conditions lead to Pu and Cm not tracking throughout the rest of the system; and (3) new contribution in applying statistical techniques to analyze the signatures gained from these two models to help draw real-time conclusions on anomalous events.

  2. Reconfiguring waveguide-gratings-based M-signature codecs to enhance OCDMA network confidentiality

    Science.gov (United States)

    Huang, Jen-Fa; Chen, Kai-Sheng; Lin, Ying-Chen; Li, Chung-Yu

    2014-02-01

    A reconfiguration scheme based on composite signature codes over waveguide-gratings-based optical code-division multiple-access (OCDMA) network coder/decoders (codecs) is proposed in the paper. By using central control node to monitor network traffic condition and reconfigure the composite signature codes made up of maximal-length sequence (M-sequence) component codes and random changing the signature codes assigned for each user to improve the confidentiality performance in an OCDMA system. The proposed scheme is analyzed with some practical eavesdroppers' attacks.

  3. A Quantum Multi-Proxy Weak Blind Signature Scheme Based on Entanglement Swapping

    Science.gov (United States)

    Yan, LiLi; Chang, Yan; Zhang, ShiBin; Han, GuiHua; Sheng, ZhiWei

    2017-02-01

    In this paper, we present a multi-proxy weak blind signature scheme based on quantum entanglement swapping of Bell states. In the scheme, proxy signers can finish the signature instead of original singer with his/her authority. It can be applied to the electronic voting system, electronic paying system, etc. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. It could guarantee not only the unconditionally security but also the anonymity of the message owner. The security analysis shows the scheme satisfies the security features of multi-proxy weak signature, singers cannot disavowal his/her signature while the signature cannot be forged by others, and the message owner can be traced.

  4. Digital time stamping system based on open source technologies.

    Science.gov (United States)

    Miskinis, Rimantas; Smirnov, Dmitrij; Urba, Emilis; Burokas, Andrius; Malysko, Bogdan; Laud, Peeter; Zuliani, Francesco

    2010-03-01

    A digital time stamping system based on open source technologies (LINUX-UBUNTU, OpenTSA, OpenSSL, MySQL) is described in detail, including all important testing results. The system, called BALTICTIME, was developed under a project sponsored by the European Commission under the Program FP 6. It was designed to meet the requirements posed to the systems of legal and accountable time stamping and to be applicable to the hardware commonly used by the national time metrology laboratories. The BALTICTIME system is intended for the use of governmental and other institutions as well as personal bodies. Testing results demonstrate that the time stamps issued to the user by BALTICTIME and saved in BALTICTIME's archives (which implies that the time stamps are accountable) meet all the regulatory requirements. Moreover, the BALTICTIME in its present implementation is able to issue more than 10 digital time stamps per second. The system can be enhanced if needed. The test version of the BALTICTIME service is free and available at http://baltictime. pfi.lt:8080/btws/ and http://baltictime.lnmc.lv:8080/btws/.

  5. 37 CFR 201.28 - Statements of Account for digital audio recording devices or media.

    Science.gov (United States)

    2010-07-01

    ... conjunction with an annual audit of the manufacturing or importing party's financial statements. (ii) The CPA... Certified Public Accountants. (5) Manufacturing or importing party refers to any person or entity that... general class of products made up of functionally equivalent digital audio recording products with...

  6. Digital curation: a proposal of a semi-automatic digital object selection-based model for digital curation in Big Data environments

    Directory of Open Access Journals (Sweden)

    Moisés Lima Dutra

    2016-08-01

    Full Text Available Introduction: This work presents a new approach for Digital Curations from a Big Data perspective. Objective: The objective is to propose techniques to digital curations for selecting and evaluating digital objects that take into account volume, velocity, variety, reality, and the value of the data collected from multiple knowledge domains. Methodology: This is an exploratory research of applied nature, which addresses the research problem in a qualitative way. Heuristics allow this semi-automatic process to be done either by human curators or by software agents. Results: As a result, it was proposed a model for searching, processing, evaluating and selecting digital objects to be processed by digital curations. Conclusions: It is possible to use Big Data environments as a source of information resources for Digital Curation; besides, Big Data techniques and tools can support the search and selection process of information resources by Digital Curations.

  7. Security analysis and improvements of arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Zou Xiangfu; Qiu Daowen

    2010-01-01

    A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. For signing quantum messages, some arbitrated quantum signature (AQS) schemes have been proposed. It was claimed that these AQS schemes could guarantee unconditional security. However, we show that they can be repudiated by the receiver Bob. To conquer this shortcoming, we construct an AQS scheme using a public board. The AQS scheme not only avoids being disavowed by the receiver but also preserves all merits in the existing schemes. Furthermore, we discover that entanglement is not necessary while all these existing AQS schemes depend on entanglement. Therefore, we present another AQS scheme without utilizing entangled states in the signing phase and the verifying phase. This scheme has three advantages: it does not utilize entangled states and it preserves all merits in the existing schemes; the signature can avoid being disavowed by the receiver; and it provides a higher efficiency in transmission and reduces the complexity of implementation.

  8. Exploring digital professionalism.

    Science.gov (United States)

    Ellaway, Rachel H; Coral, Janet; Topps, David; Topps, Maureen

    2015-01-01

    The widespread use of digital media (both computing devices and the services they access) has blurred the boundaries between our personal and professional lives. Contemporary students are the last to remember a time before the widespread use of the Internet and they will be the first to practice in a largely e-health environment. This article explores concepts of digital professionalism and their place in contemporary medical education, and proposes a series of principles of digital professionalism to guide teaching, learning and practice in the healthcare professions. Despite the many risks and fears surrounding their use, digital media are not an intrinsic threat to medical professionalism. Professionals should maintain the capacity for deliberate, ethical, and accountable practice when using digital media. The authors describe a digital professionalism framework structured around concepts of proficiency, reputation, and responsibility. Digital professionalism can be integrated into medical education using strategies based on awareness, alignment, assessment, and accountability. These principles of digital professionalism provide a way for medical students and medical practitioners to embrace the positive aspects of digital media use while being mindful and deliberate in its use to avoid or minimize any negative consequences.

  9. A group signature scheme based on quantum teleportation

    International Nuclear Information System (INIS)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu

    2010-01-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  10. A group signature scheme based on quantum teleportation

    Energy Technology Data Exchange (ETDEWEB)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu, E-mail: wxjun36@gmail.co [Information Countermeasure Technique Research Institute, Harbin Institute of Technology, Harbin 150001 (China)

    2010-05-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  11. Mirage: a visible signature evaluation tool

    Science.gov (United States)

    Culpepper, Joanne B.; Meehan, Alaster J.; Shao, Q. T.; Richards, Noel

    2017-10-01

    This paper presents the Mirage visible signature evaluation tool, designed to provide a visible signature evaluation capability that will appropriately reflect the effect of scene content on the detectability of targets, providing a capability to assess visible signatures in the context of the environment. Mirage is based on a parametric evaluation of input images, assessing the value of a range of image metrics and combining them using the boosted decision tree machine learning method to produce target detectability estimates. It has been developed using experimental data from photosimulation experiments, where human observers search for vehicle targets in a variety of digital images. The images used for tool development are synthetic (computer generated) images, showing vehicles in many different scenes and exhibiting a wide variation in scene content. A preliminary validation has been performed using k-fold cross validation, where 90% of the image data set was used for training and 10% of the image data set was used for testing. The results of the k-fold validation from 200 independent tests show a prediction accuracy between Mirage predictions of detection probability and observed probability of detection of r(262) = 0:63, p Pearson correlation) and a MAE = 0:21 (mean absolute error).

  12. Digital control card based on digital signal processor

    International Nuclear Information System (INIS)

    Hou Shigang; Yin Zhiguo; Xia Le

    2008-01-01

    A digital control card based on digital signal processor was developed. Two Freescale DSP-56303 processors were utilized to achieve 3 channels proportional- integral-differential regulations. The card offers high flexibility for 100 MeV cyclotron RF system development. It was used as feedback controller in low level radio frequency control prototype, with the feedback gain parameters continuously adjustable. By using high precision analog to digital converter with 500 kHz sampling rate, a regulation bandwidth of 20 kHz was achieved. (authors)

  13. Digital displacements

    DEFF Research Database (Denmark)

    Pors, Anja Svejgaard

    2014-01-01

    In recent years digital reforms are being introduced in the municipal landscape of Denmark. The reforms address the interaction between citizen and local authority. The aim is, that by 2015 at least 80 per cent of all correspondence between citizens and public authority will be transmitted through...... digital interface. However, the transformation of citizen services from traditional face-to-face interaction to digital self-service gives rise to new practices; some citizens need support to be able to manage self-service through digital tools. A mixture of support and teaching, named co......-service, is a new task in public administration, where street level bureaucrats assist citizens in using the new digital solutions. The paper is based on a case study conducted primarily in a citizen service centre in Copenhagen, Denmark. Based on ethnography the paper gives an empirical account of the ongoing...

  14. From 5-pass MQ-based identification to MQ-based signatures

    NARCIS (Netherlands)

    Chen, M.S.; Hülsing, A.; Rijneveld, J.; Samardjiska, S.; Schwabe, P.

    2016-01-01

    This paper presents MQDSS, the first signature scheme with a security reduction based on the problem of solving a multivariate system of quadratic equations (MQ problem). In order to construct this scheme we give a new security reduction for the Fiat-Shamir transform from a large class of 5-pass

  15. Analysis of specific features of digital instrumentation and control systems and possibilities of accounting for them within PSA

    International Nuclear Information System (INIS)

    Hustak, S.

    2002-10-01

    The report is structured as follows: Basic information on the peculiarities of digital technology for the I and C system at an NPP (Digital signal; Digital communication; Communication protocols; Examples of practical tools for creation of I and C digital systems); Peculiarities of the digital I and C technology from the reliability viewpoint (Software as a new component of implementation of a system function; Problems with the assessment or demonstration of reliability of software components of an I and C system); Possibilities of accounting for the specific features of digital I and C technology within PSA (Relevant PSA components; Using PSA as a supporting tool in designing new NPPs; Categorization of NPP I and C system tasks with respect to the defence-in-depth principle). (P.A.)

  16. Signatures of Extended Storage of Used Nuclear Fuel in Casks

    Energy Technology Data Exchange (ETDEWEB)

    Rauch, Eric Benton [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-09-28

    As the amount of used nuclear fuel continues to grow, more and more used nuclear fuel will be transferred to storage casks. A consolidated storage facility is currently in the planning stages for storing these casks, where at least 10,000 MTHM of fuel will be stored. This site will have potentially thousands of casks once it is operational. A facility this large presents new safeguards and nuclear material accounting concerns. A new signature based on the distribution of neutron sources and multiplication within casks was part of the Department of Energy Office of Nuclear Energy’s Material Protection, Account and Control Technologies (MPACT) campaign. Under this project we looked at fingerprinting each cask's neutron signature. Each cask has a unique set of fuel, with a unique spread of initial enrichment, burnup, cooling time, and power history. The unique set of fuel creates a unique signature of neutron intensity based on the arrangement of the assemblies. The unique arrangement of neutron sources and multiplication produces a reliable and unique identification of the cask that has been shown to be relatively constant over long time periods. The work presented here could be used to restore from a loss of continuity of knowledge at the storage site. This presentation will show the steps used to simulate and form this signature from the start of the effort through its conclusion in September 2016.

  17. A network-based gene expression signature informs prognosis and treatment for colorectal cancer patients.

    Directory of Open Access Journals (Sweden)

    Mingguang Shi

    Full Text Available Several studies have reported gene expression signatures that predict recurrence risk in stage II and III colorectal cancer (CRC patients with minimal gene membership overlap and undefined biological relevance. The goal of this study was to investigate biological themes underlying these signatures, to infer genes of potential mechanistic importance to the CRC recurrence phenotype and to test whether accurate prognostic models can be developed using mechanistically important genes.We investigated eight published CRC gene expression signatures and found no functional convergence in Gene Ontology enrichment analysis. Using a random walk-based approach, we integrated these signatures and publicly available somatic mutation data on a protein-protein interaction network and inferred 487 genes that were plausible candidate molecular underpinnings for the CRC recurrence phenotype. We named the list of 487 genes a NEM signature because it integrated information from Network, Expression, and Mutation. The signature showed significant enrichment in four biological processes closely related to cancer pathophysiology and provided good coverage of known oncogenes, tumor suppressors, and CRC-related signaling pathways. A NEM signature-based Survival Support Vector Machine prognostic model was trained using a microarray gene expression dataset and tested on an independent dataset. The model-based scores showed a 75.7% concordance with the real survival data and separated patients into two groups with significantly different relapse-free survival (p = 0.002. Similar results were obtained with reversed training and testing datasets (p = 0.007. Furthermore, adjuvant chemotherapy was significantly associated with prolonged survival of the high-risk patients (p = 0.006, but not beneficial to the low-risk patients (p = 0.491.The NEM signature not only reflects CRC biology but also informs patient prognosis and treatment response. Thus, the network-based

  18. Shape signature based on Ricci flow and optimal mass transportation

    Science.gov (United States)

    Luo, Wei; Su, Zengyu; Zhang, Min; Zeng, Wei; Dai, Junfei; Gu, Xianfeng

    2014-11-01

    A shape signature based on surface Ricci flow and optimal mass transportation is introduced for the purpose of surface comparison. First, the surface is conformally mapped onto plane by Ricci flow, which induces a measure on the planar domain. Second, the unique optimal mass transport map is computed that transports the new measure to the canonical measure on the plane. The map is obtained by a convex optimization process. This optimal transport map encodes all the information of the Riemannian metric on the surface. The shape signature consists of the optimal transport map, together with the mean curvature, which can fully recover the original surface. The discrete theories of surface Ricci flow and optimal mass transportation are explained thoroughly. The algorithms are given in detail. The signature is tested on human facial surfaces with different expressions accquired by structured light 3-D scanner based on phase-shifting method. The experimental results demonstrate the efficiency and efficacy of the method.

  19. Some Proxy Signature and Designated verifier Signature Schemes over Braid Groups

    OpenAIRE

    Lal, Sunder; Verma, Vandani

    2009-01-01

    Braids groups provide an alternative to number theoretic public cryptography and can be implemented quite efficiently. The paper proposes five signature schemes: Proxy Signature, Designated Verifier, Bi-Designated Verifier, Designated Verifier Proxy Signature And Bi-Designated Verifier Proxy Signature scheme based on braid groups. We also discuss the security aspects of each of the proposed schemes.

  20. The signature-based radiation-scanning approach to standoff detection of improvised explosive devices

    International Nuclear Information System (INIS)

    Brewer, R.L.; Dunn, W.L.; Heider, S.; Matthew, C.; Yang, X.

    2012-01-01

    The signature-based radiation-scanning technique for detection of improvised explosive devices is described. The technique seeks to detect nitrogen-rich chemical explosives present in a target. The technology compares a set of “signatures” obtained from a test target to a collection of “templates”, sets of signatures for a target that contain an explosive in a specific configuration. Interrogation of nitrogen-rich fertilizer samples, which serve as surrogates for explosives, is shown experimentally to be able to discriminate samples of 3.8 L and larger. - Highlights: ► Signature-based radiation-scanning techniques applied to detection of explosives. ► Nitrogen-rich fertilizer samples served as surrogate explosive samples. ► Signatures of a target compared to collections of templates of surrogate explosives. ► Figure-of-merit determined for neutron and neutron-induced gamma-ray signatures. ► Discrimination of surrogate explosive from inert samples of 3.8 L and larger.

  1. FROM TRADITIONAL ACCOUNTING TO KNOWLEDGE BASED ACCOUNTING ORGANIZATIONS

    Directory of Open Access Journals (Sweden)

    NICOLETA RADNEANTU

    2010-01-01

    Full Text Available Nowadays, we may observe that the rules of traditional economy have changed. The new economy – the knowledge based economy determine also major change in organizations resources, structure, strategic objectives, departments, accounting, goods. In our research we want to underline how the accounting rules, regulations and paradigms have changed to cope with political, economic and social challenges, as well as to the emergence of knowledge based organization. We also try to find out where Romanian accounting is on the hard road of evolution from traditional to knowledge based.

  2. A Rational Threshold Signature Model and Protocol Based on Different Permissions

    Directory of Open Access Journals (Sweden)

    Bojun Wang

    2014-01-01

    Full Text Available This paper develops a novel model and protocol used in some specific scenarios, in which the participants of multiple groups with different permissions can finish the signature together. We apply the secret sharing scheme based on difference equation to the private key distribution phase and secret reconstruction phrase of our threshold signature scheme. In addition, our scheme can achieve the signature success because of the punishment strategy of the repeated rational secret sharing. Besides, the bit commitment and verification method used to detect players’ cheating behavior acts as a contributing factor to prevent the internal fraud. Using bit commitments, verifiable parameters, and time sequences, this paper constructs a dynamic game model, which has the features of threshold signature management with different permissions, cheat proof, and forward security.

  3. Streaming-based verification of XML signatures in SOAP messages

    DEFF Research Database (Denmark)

    Somorovsky, Juraj; Jensen, Meiko; Schwenk, Jörg

    2010-01-01

    approach for XML processing, the Web Services servers easily become a target of Denial-of-Service attacks. We present a solution for these problems: an external streaming-based WS-Security Gateway. Our implementation is capable of processing XML Signatures in SOAP messages using a streaming-based approach...

  4. Method for Lumped Parameter simulation of Digital Displacement pumps/motors based on CFD

    DEFF Research Database (Denmark)

    Rømer, Daniel; Johansen, Per; Pedersen, Henrik C.

    2013-01-01

    Digital displacement fluid power pumps/motors offers improved efficiency and performance compared to traditional variable displacement pump/motors. These improvements are made possible by using efficient electronically controlled seat valves and careful design of the flow geometry. To optimize...... the design and control of digital displacement machines, there is a need for simulation models, preferably models with low computational cost. Therefore, a low computational cost generic lumped parameter model of digital displacement machine is presented, including a method for determining the needed model...... parameters based on steady CFD results, in order to take detailed geometry information into account. The response of the lumped parameter model is compared to a computational expensive transient CFD model for an example geometry....

  5. Arbitrated Quantum Signature with Hamiltonian Algorithm Based on Blind Quantum Computation

    Science.gov (United States)

    Shi, Ronghua; Ding, Wanting; Shi, Jinjing

    2018-03-01

    A novel arbitrated quantum signature (AQS) scheme is proposed motivated by the Hamiltonian algorithm (HA) and blind quantum computation (BQC). The generation and verification of signature algorithm is designed based on HA, which enables the scheme to rely less on computational complexity. It is unnecessary to recover original messages when verifying signatures since the blind quantum computation is applied, which can improve the simplicity and operability of our scheme. It is proved that the scheme can be deployed securely, and the extended AQS has some extensive applications in E-payment system, E-government, E-business, etc.

  6. Revocable ID-Based Signature with Short Size over Lattices

    Directory of Open Access Journals (Sweden)

    Ying-Hao Hung

    2017-01-01

    Full Text Available In the past, many ID-based signature (IBS schemes based on the integer factorization or discrete logarithm problems were proposed. With the progress on the development of quantum technology, IBS schemes mentioned above would become vulnerable. Recently, several IBS schemes over lattices were proposed to be secure against attacks in the quantum era. As conventional public-key settings, ID-based public-key settings have to offer a revocation mechanism to revoke misbehaving or malicious users. However, in the past, little work focuses on the revocation problem in the IBS schemes over lattices. In this article, we propose a new revocable IBS (RIBS scheme with short size over lattices. Based on the short integer solution (SIS assumption, we prove that the proposed RIBS scheme provides existential unforgeability against adaptive chosen-message attacks. As compared to the existing IBS schemes over lattices, our RIBS scheme has better performance in terms of signature size, signing key size, and the revocation mechanism with public channels.

  7. Orthogonally Based Digital Content Management Applicable to Projects-bases

    Directory of Open Access Journals (Sweden)

    Daniel MILODIN

    2009-01-01

    Full Text Available There is defined the concept of digital content. The requirements of an efficient management of the digital content are established. There are listed the quality characteristics of digital content. Orthogonality indicators of digital content are built up. They are meant to measure the image, the sound as well as the text orthogonality as well. Projects-base concept is introduced. There is presented the model of structuring the content in order to maximize orthogonality via a convergent iterative process. The model is instantiated for the digital content of a projects-base. It is introduced the application used to test the model. The paper ends with conclusions.

  8. Digital watermarks in electronic document circulation

    Directory of Open Access Journals (Sweden)

    Vitaliy Grigorievich Ivanenko

    2017-07-01

    Full Text Available This paper reviews different protection methods for electronic documents, their good and bad qualities. Common attacks on electronic documents are analyzed. Digital signature and ways of eliminating its flaws are studied. Different digital watermark embedding methods are described, they are divided into 2 types. The solution to protection of electronic documents is based on embedding digital watermarks. Comparative analysis of this methods is given. As a result, the most convenient method is suggested – reversible data hiding. It’s remarked that this technique excels at securing the integrity of the container and its digital watermark. Digital watermark embedding system should prevent illegal access to the digital watermark and its container. Digital watermark requirements for electronic document protection are produced. Legal aspect of copyright protection is reviewed. Advantages of embedding digital watermarks in electronic documents are produced. Modern reversible data hiding techniques are studied. Distinctive features of digital watermark use in Russia are highlighted. Digital watermark serves as an additional layer of defense, that is in most cases unknown to the violator. With an embedded digital watermark, it’s impossible to misappropriate the authorship of the document, even if the intruder signs his name on it. Therefore, digital watermarks can act as an effective additional tool to protect electronic documents.

  9. Development of DUPIC safeguards technology; development of web based nuclear material accounting program

    Energy Technology Data Exchange (ETDEWEB)

    Kim, J. T.; Choi, S. H.; Choi, S. J. [Kongju National University, Kongju (Korea)

    2002-04-01

    The purpose of this project is to develop the web-based digital image processing system with the client/server architecture based on TCP/IP to be able to search and manage image data at the remote place. This system provides a nuclear facility with the ability to track the movement of nuclear material and to control and account nuclear material at anywhere and anytime. Also, this system will be helpful to increase the efficiency of safeguards affairs. The developed web-based digital image processing system for tracking the movement of nuclear material and MC and A can be applied to DUPIC facility. The result of this project will eventually contribute to similar nuclear facilities as well as the effective implementation of DUPIC safeguards. In addition, it will be helpful to enhance international confidence build-up in the peaceful use of spent fuel material. 15 refs., 33 figs., 4 tabs. (Author)

  10. Accrual-based accounting system versus cash-based accounting: An empirical study in municipality organization

    Directory of Open Access Journals (Sweden)

    Mahbobeh Arab

    2013-01-01

    Full Text Available There are many cases, where we may wish to choose a good accounting system and would like to learn how they work and the advantages and disadvantages of each so we can choose the better one for a business. In this paper, we present an empirical survey to understand whether we can choose accrual or cash accounting system. The proposed study designs a questionnaire among 220 experts in area of accounting affairs. The survey considers four sub hypotheses and one main hypothesis to see whether there are reliable rules and regulations in accrual-based accounting compared with cash accounting or not. Similarly, the survey investigates whether accrual-based accounting is more informative, comprehensive and provides better comparative results compared with cash accounting. The results indicate that accrual-based account performs better in terms of all mentioned criteria and it is a better method for managing accounting affairs compared with cash accounting systems.

  11. The curse of namespaces in the domain of XML signature

    DEFF Research Database (Denmark)

    Jensen, Meiko; Liao, Lijun; Schwenk, Jörg

    2009-01-01

    The XML signature wrapping attack is one of the most discussed security issues of the Web Services security community during the last years. Until now, the issue has not been solved, and all countermeasure approaches proposed so far were shown to be insufficient. In this paper, we present yet...... another way to perform signature wrapping attacks by using the XML namespace injection technique. We show that the interplay of XML Signature, XPath, and the XML namespace concept has severe flaws that can be exploited for an attack, and that XML namespaces in general pose real troubles to digital...... signatures in the XML domain. Additionally, we present and discuss some new approaches in countering the proposed attack vector....

  12. A feature based comparison of pen and swipe based signature characteristics.

    Science.gov (United States)

    Robertson, Joshua; Guest, Richard

    2015-10-01

    Dynamic Signature Verification (DSV) is a biometric modality that identifies anatomical and behavioral characteristics when an individual signs their name. Conventionally signature data has been captured using pen/tablet apparatus. However, the use of other devices such as the touch-screen tablets has expanded in recent years affording the possibility of assessing biometric interaction on this new technology. To explore the potential of employing DSV techniques when a user signs or swipes with their finger, we report a study to correlate pen and finger generated features. Investigating the stability and correlation between a set of characteristic features recorded in participant's signatures and touch-based swipe gestures, a statistical analysis was conducted to assess consistency between capture scenarios. The results indicate that there is a range of static and dynamic features such as the rate of jerk, size, duration and the distance the pen traveled that can lead to interoperability between these two systems for input methods for use within a potential biometric context. It can be concluded that this data indicates that a general principle is that the same underlying constructional mechanisms are evident. Copyright © 2015 Elsevier B.V. All rights reserved.

  13. SecurePhone: a mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly

    Science.gov (United States)

    Ricci, R.; Chollet, G.; Crispino, M. V.; Jassim, S.; Koreman, J.; Olivar-Dimas, M.; Garcia-Salicetti, S.; Soria-Rodriguez, P.

    2006-05-01

    This article presents an overview of the SecurePhone project, with an account of the first results obtained. SecurePhone's primary aim is to realise a mobile phone prototype - the 'SecurePhone' - in which biometrical authentication enables users to deal secure, dependable transactions over a mobile network. The SecurePhone is based on a commercial PDA-phone, supplemented with specific software modules and a customised SIM card. It integrates in a single environment a number of advanced features: access to cryptographic keys through strong multimodal biometric authentication; appending and verification of digital signatures; real-time exchange and interactive modification of (esigned) documents and voice recordings. SecurePhone's 'biometric recogniser' is based on original research. A fused combination of three different biometric methods - speaker, face and handwritten signature verification - is exploited, with no need for dedicated hardware components. The adoption of non-intrusive, psychologically neutral biometric techniques is expected to mitigate rejection problems that often inhibit the social use of biometrics, and speed up the spread of e-signature technology. Successful biometric authentication grants access to SecurePhone's built-in esignature services through a user-friendly interface. Special emphasis is accorded to the definition of a trustworthy security chain model covering all aspects of system operation. The SecurePhone is expected to boost m-commerce and open new scenarios for m-business and m-work, by changing the way people interact and by improving trust and confidence in information technologies, often considered intimidating and difficult to use. Exploitation plans will also explore other application domains (physical and logical access control, securised mobile communications).

  14. Digital game-based learning in secondary education

    NARCIS (Netherlands)

    Huizenga, J.C.

    2017-01-01

    This PhD thesis presents research on digital game-based learning in secondary education. The main research question is: How do digital games contribute to learning, engagement and motivation to learn? The thesis contains seven chapters. Chapter one is an introduction to digital game-based learning

  15. A survey of passive technology for digital image forensics

    Institute of Scientific and Technical Information of China (English)

    LUO Weiqi; QU Zhenhua; PAN Feng; HUANG Jiwu

    2007-01-01

    Over the past years,digital images have been widely used in the Internet and other applications.Whilst image processing techniques are developing at a rapid speed,tampering with digital images without leaving any obvious traces becomes easier and easier.This may give rise to some problems such as image authentication.A new passive technology for image forensics has evolved quickly during the last few years.Unlike the signature-based or watermark-based methods,the new technology does not need any signature generated or watermark embedded in advance,it assumes that different imaging devices or processing would introduce different inherent patterns into the output images.These underlying patterns are consistent in the original untampered images and would be altered after some kind of manipulations.Thus,they can be used as evidence for image source identification and alteration detection.In this paper,we will discuss this new forensics technology and give an overview of the prior literatures.Some concluding remarks are made about the state of the art and the challenges in this novel technology.

  16. Domesticating Digital Game-based Learning

    Directory of Open Access Journals (Sweden)

    Helga Dís Sigurdardottir

    2016-07-01

    Full Text Available This paper analyses the use of digital game-based learning (DGBL in schools in Norway. It investigates the types of games used in Norwegian schools and how pupils experience that practice. Digital game-based learning is being widely employed throughout Norway as a result of the increased focus on digital skills in Norwegian education. This paper analyses that development by way of focus group interviews with a total of sixty-four pupils at four schools. Drawing upon domestication and actor-network theory, the paper provides a novel approach to the study of DGBL. The broad empirical investigation into DGBL practices furthermore provides a contribution to scholarly literature on the subject. A noteworthy finding of this study is the diversity of games employed in schools—around 30 different titles— indicating that the choice of games lies at the discretion of individual teachers. Findings from this research show that the domestication of digital game-based learning occurs through the construction of complex game-based learning assemblages. This includes the classroom and home as gaming sites, group work and individual assignments as practices, and PCs and iPads as platforms.

  17. Ethical Issues for Direct-to-Consumer Digital Psychotherapy Apps: Addressing Accountability, Data Protection, and Consent.

    Science.gov (United States)

    Martinez-Martin, Nicole; Kreitmair, Karola

    2018-04-23

    This paper focuses on the ethical challenges presented by direct-to-consumer (DTC) digital psychotherapy services that do not involve oversight by a professional mental health provider. DTC digital psychotherapy services can potentially assist in improving access to mental health care for the many people who would otherwise not have the resources or ability to connect with a therapist. However, the lack of adequate regulation in this area exacerbates concerns over how safety, privacy, accountability, and other ethical obligations to protect an individual in therapy are addressed within these services. In the traditional therapeutic relationship, there are ethical obligations that serve to protect the interests of the client and provide warnings. In contrast, in a DTC therapy app, there are no clear lines of accountability or associated ethical obligations to protect the user seeking mental health services. The types of DTC services that present ethical challenges include apps that use a digital platform to connect users to minimally trained nonprofessional counselors, as well as services that provide counseling steered by artificial intelligence and conversational agents. There is a need for adequate oversight of DTC nonprofessional psychotherapy services and additional empirical research to inform policy that will provide protection to the consumer. ©Nicole Martinez-Martin, Karola Kreitmair. Originally published in JMIR Mental Health (http://mental.jmir.org), 23.04.2018.

  18. Practical implementation of a methodology for digital images authentication using forensics techniques

    OpenAIRE

    Francisco Rodríguez-Santos; Guillermo Delgado-Gutierréz; Leonardo Palacios-Luengas; Rubén Vázquez Medina

    2015-01-01

    This work presents a forensics analysis methodology implemented to detect modifications in JPEG digital images by analyzing the image’s metadata, thumbnail, camera traces and compression signatures. Best practices related with digital evidence and forensics analysis are considered to determine if the technical attributes and the qualities of an image are consistent with each other. This methodology is defined according to the recommendations of the Good Practice Guide for Computer-Based Elect...

  19. Searchable Signatures: Context and the Struggle for Recognition

    Directory of Open Access Journals (Sweden)

    Gina Schlesselman-Tarango

    2013-09-01

    Full Text Available Social networking sites made possible through Web 2.0 allow for unique user-generated tags called “searchable signatures.”  These tags move beyond the descriptive and act as means for users to assert online individual and group identities.  A study of searchable signatures on the Instagram application demonstrates that these types of tags are valuable not only because they allow for both individuals and groups to engage in what social theorist Axel Honneth calls the struggle for recognition, but also because they provide contextual use data and sociohistorical information so important to the understanding of digital objects.  This article explores how searchable signatures might be used by both patrons and staff in library environments.

  20. Understanding Platform-Based Digital Currencies

    OpenAIRE

    Ben Fung; Hanna Halaburda

    2014-01-01

    Given technological advances and the widespread use of the Internet, various digital currencies have emerged. In most cases, Internet platforms such as Facebook and Amazon restrict the functionality of their digital currencies to enhance the business model and maximize their profits. While platform-based digital currencies could increase the efficiency of retail payments, they could also raise some important policy issues if they were to become widely used outside of the platform. Thus, it is...

  1. Creation of a Cell-Based Digital Cadastral Mapping System (Digital ...

    African Journals Online (AJOL)

    Digital cadastre enhances land transaction activities to be conducted in a business manner. Similarly, land subdivision or boundary redefinition, land registration and land marketing are achieved with better accuracy. This paper discusses the need to introduce a national Cell-Based Digital Cadastral Mapping System model ...

  2. An RNA-Based Digital Circulating Tumor Cell Signature Is Predictive of Drug Response and Early Dissemination in Prostate Cancer.

    Science.gov (United States)

    Miyamoto, David T; Lee, Richard J; Kalinich, Mark; LiCausi, Joseph A; Zheng, Yu; Chen, Tianqi; Milner, John D; Emmons, Erin; Ho, Uyen; Broderick, Katherine; Silva, Erin; Javaid, Sarah; Kwan, Tanya Todorova; Hong, Xin; Dahl, Douglas M; McGovern, Francis J; Efstathiou, Jason A; Smith, Matthew R; Sequist, Lecia V; Kapur, Ravi; Wu, Chin-Lee; Stott, Shannon L; Ting, David T; Giobbie-Hurder, Anita; Toner, Mehmet; Maheswaran, Shyamala; Haber, Daniel A

    2018-03-01

    Blood-based biomarkers are critical in metastatic prostate cancer, where characteristic bone metastases are not readily sampled, and they may enable risk stratification in localized disease. We established a sensitive and high-throughput strategy for analyzing prostate circulating tumor cells (CTC) using microfluidic cell enrichment followed by digital quantitation of prostate-derived transcripts. In a prospective study of 27 patients with metastatic castration-resistant prostate cancer treated with first-line abiraterone, pretreatment elevation of the digital CTC M score identifies a high-risk population with poor overall survival (HR = 6.0; P = 0.01) and short radiographic progression-free survival (HR = 3.2; P = 0.046). Expression of HOXB13 in CTCs identifies 6 of 6 patients with ≤12-month survival, with a subset also expressing the ARV7 splice variant. In a second cohort of 34 men with localized prostate cancer, an elevated preoperative CTC L score predicts microscopic dissemination to seminal vesicles and/or lymph nodes ( P digital quantitation of CTC-specific transcripts enables noninvasive monitoring that may guide treatment selection in both metastatic and localized prostate cancer. Significance: There is an unmet need for biomarkers to guide prostate cancer therapies, for curative treatment of localized cancer and for application of molecularly targeted agents in metastatic disease. Digital quantitation of prostate CTC-derived transcripts in blood specimens is predictive of abiraterone response in metastatic cancer and of early dissemination in localized cancer. Cancer Discov; 8(3); 288-303. ©2018 AACR. See related commentary by Heitzer and Speicher, p. 269 This article is highlighted in the In This Issue feature, p. 253 . ©2018 American Association for Cancer Research.

  3. Fully Digital Chaotic Differential Equation-based Systems And Methods

    KAUST Repository

    Radwan, Ahmed Gomaa Ahmed; Zidan, Mohammed A.; Salama, Khaled N.

    2012-01-01

    Various embodiments are provided for fully digital chaotic differential equation-based systems and methods. In one embodiment, among others, a digital circuit includes digital state registers and one or more digital logic modules configured to obtain a first value from two or more of the digital state registers; determine a second value based upon the obtained first values and a chaotic differential equation; and provide the second value to set a state of one of the plurality of digital state registers. In another embodiment, a digital circuit includes digital state registers, digital logic modules configured to obtain outputs from a subset of the digital shift registers and to provide the input based upon a chaotic differential equation for setting a state of at least one of the subset of digital shift registers, and a digital clock configured to provide a clock signal for operating the digital shift registers.

  4. Fully Digital Chaotic Differential Equation-based Systems And Methods

    KAUST Repository

    Radwan, Ahmed Gomaa Ahmed

    2012-09-06

    Various embodiments are provided for fully digital chaotic differential equation-based systems and methods. In one embodiment, among others, a digital circuit includes digital state registers and one or more digital logic modules configured to obtain a first value from two or more of the digital state registers; determine a second value based upon the obtained first values and a chaotic differential equation; and provide the second value to set a state of one of the plurality of digital state registers. In another embodiment, a digital circuit includes digital state registers, digital logic modules configured to obtain outputs from a subset of the digital shift registers and to provide the input based upon a chaotic differential equation for setting a state of at least one of the subset of digital shift registers, and a digital clock configured to provide a clock signal for operating the digital shift registers.

  5. Signatures of Extended Storage of Used Nuclear Fuel Comprehensive Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Rauch, Eric Benton [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-09-21

    This report serves as a comprehensive overview of the Extended Storage of Used Nuclear Fuel work performed for the Material Protection, Accounting and Control Technologies campaign under the Department of Energy Office of Nuclear Energy. This paper describes a signature based on the source and fissile material distribution found within a population of used fuel assemblies combined with the neutron absorbers found within cask design that is unique to a specific cask with its specific arrangement of fuel. The paper describes all the steps used in producing and analyzing this signature from the beginning to the project end.

  6. A Signature Comparing Android Mobile Application Utilizing Feature Extracting Algorithms

    Directory of Open Access Journals (Sweden)

    Paul Grafilon

    2017-08-01

    Full Text Available The paper presented one of the application that can be done using smartphones camera. Nowadays forgery is one of the most undetected crimes. With the forensic technology used today it is still difficult for authorities to compare and define what a real signature is and what a forged signature is. A signature is a legal representation of a person. All transactions are based on a signature. Forgers may use a signature to sign illegal contracts and withdraw from bank accounts undetected. A signature can also be forged during election periods for repeated voting. Addressing the issues a signature should always be secure. Signature verification is a reduced problem that still poses a real challenge for researchers. The literature on signature verification is quite extensive and shows two main areas of research off-line and on-line systems. Off-line systems deal with a static image of the signature i.e. the result of the action of signing while on-line systems work on the dynamic process of generating the signature i.e. the action of signing itself. The researchers have found a way to resolve the concerns. A mobile application that integrates the camera to take a picture of a signature analyzes it and compares it to other signatures for verification. It will exist to help citizens to be more cautious and aware with issues regarding the signatures. This might also be relevant to help organizations and institutions such as banks and insurance companies in verifying signatures that may avoid unwanted transactions and identity theft. Furthermore this might help the authorities in the never ending battle against crime especially against forgers and thieves. The project aimed to design and develop a mobile application that integrates the smartphone camera for verifying and comparing signatures for security using the best algorithm possible. As the result of the development the said smartphone camera application is functional and reliable.

  7. Arabic CWR Based on Correlation of Normalized Signatures of Words Images

    Directory of Open Access Journals (Sweden)

    Hala S. Zaghloul

    2007-12-01

    Full Text Available The traditional methods for Arabic OCR (AOCR based on segmentation of each word into a set of characters. The Arabic language is of cursive nature, and the character's shape depends on its position in the word. There are about 100 shape of the characters have to be classified, and some of them may be overlapped. Our approach use a normalized signature of the time signal of the pulse coupled neural network PCNN, supported with some shape primitives to represent the number of the word complementary and their positions within the image of the word. A lookup dictionary of words with its signatures was constructed, and structured in groups using a decision tree. The tested signature was routed through the tree to the nearest group, and then the signature and its related word with higher correlation within the selected group will be the classified. This method overcome many difficulties arise in cursive word recognition CWR for printed script with different font type and size; also it shows higher accuracy for the classification process, 96%.

  8. Verifiable Distribution of Material Goods Based on Cryptology

    Directory of Open Access Journals (Sweden)

    Radomír Palovský

    2015-12-01

    Full Text Available Counterfeiting of material goods is a general problem. In this paper an architecture for verifiable distribution of material goods is presented. This distribution is based on printing such a QR code on goods, which would contain digitally signed serial number of the product, and validity of this digital signature could be verifiable by a customer. Extension consisting of adding digital signatures to revenue stamps used for state-controlled goods is also presented. Discussion on possibilities in making copies leads to conclusion that cryptographic security needs to be completed by technical difficulties of copying.

  9. The Perception of the Accounting Students on the Image of the Accountant and the Accounting Profession

    Directory of Open Access Journals (Sweden)

    Lucian Cernuşca

    2015-01-01

    Full Text Available This study aims to present the perception of the accounting students on the accountant image and the accounting profession, thus contributing to a better understanding of the option for the field of accounting and the motivations for choosing this profession. The paper consists of the following parts: introduction, literature review, research methodology, research findings, conclusions and bibliography. The accounting profession must be aligned to the current conditions the Romanian accounting system is going through to harmonize to the IFRS and European regulations and the development of information technologies and the transition to digital era. The role of the accountant changes from a simple digit operator to a modern one. This will be part of the managerial team, provide strategic and financial advice and effective solutions for the proper functioning of the organization, the modern stereotype involving creativity in the accounting activities. The research aims at understanding the role of the accounting profession as a social identity and as a social phenomenon and the implications for academia and professional bodies.

  10. Fair quantum blind signatures

    International Nuclear Information System (INIS)

    Tian-Yin, Wang; Qiao-Yan, Wen

    2010-01-01

    We present a new fair blind signature scheme based on the fundamental properties of quantum mechanics. In addition, we analyse the security of this scheme, and show that it is not possible to forge valid blind signatures. Moreover, comparisons between this scheme and public key blind signature schemes are also discussed. (general)

  11. Efficient Signature Based Malware Detection on Mobile Devices

    Directory of Open Access Journals (Sweden)

    Deepak Venugopal

    2008-01-01

    Full Text Available The threat of malware on mobile devices is gaining attention recently. It is important to provide security solutions to these devices before these threats cause widespread damage. However, mobile devices have severe resource constraints in terms of memory and power. Hence, even though there are well developed techniques for malware detection on the PC domain, it requires considerable effort to adapt these techniques for mobile devices. In this paper, we outline the considerations for malware detection on mobile devices and propose a signature based malware detection method. Specifically, we detail a signature matching algorithm that is well suited for use in mobile device scanning due to its low memory requirements. Additionally, the matching algorithm is shown to have high scanning speed which makes it unobtrusive to users. Our evaluation and comparison study with the well known Clam-AV scanner shows that our solution consumes less than 50% of the memory used by Clam-AV while maintaining a fast scanning rate.

  12. Experimental OAI-Based Digital Library Systems

    Science.gov (United States)

    Nelson, Michael L. (Editor); Maly, Kurt (Editor); Zubair, Mohammad (Editor); Rusch-Feja, Diann (Editor)

    2002-01-01

    The objective of Open Archives Initiative (OAI) is to develop a simple, lightweight framework to facilitate the discovery of content in distributed archives (http://www.openarchives.org). The focus of the workshop held at the 5th European Conference on Research and Advanced Technology for Digital Libraries (ECDL 2001) was to bring researchers in the area of digital libraries who are building OAI based systems so as to share their experiences, problems they are facing, and approaches they are taking to address them. The workshop consisted of invited talks from well-established researchers working in building OAI based digital library system along with short paper presentations.

  13. SIGNATURE: A workbench for gene expression signature analysis

    Directory of Open Access Journals (Sweden)

    Chang Jeffrey T

    2011-11-01

    Full Text Available Abstract Background The biological phenotype of a cell, such as a characteristic visual image or behavior, reflects activities derived from the expression of collections of genes. As such, an ability to measure the expression of these genes provides an opportunity to develop more precise and varied sets of phenotypes. However, to use this approach requires computational methods that are difficult to implement and apply, and thus there is a critical need for intelligent software tools that can reduce the technical burden of the analysis. Tools for gene expression analyses are unusually difficult to implement in a user-friendly way because their application requires a combination of biological data curation, statistical computational methods, and database expertise. Results We have developed SIGNATURE, a web-based resource that simplifies gene expression signature analysis by providing software, data, and protocols to perform the analysis successfully. This resource uses Bayesian methods for processing gene expression data coupled with a curated database of gene expression signatures, all carried out within a GenePattern web interface for easy use and access. Conclusions SIGNATURE is available for public use at http://genepattern.genome.duke.edu/signature/.

  14. Do two machine-learning based prognostic signatures for breast cancer capture the same biological processes?

    Science.gov (United States)

    Drier, Yotam; Domany, Eytan

    2011-03-14

    The fact that there is very little if any overlap between the genes of different prognostic signatures for early-discovery breast cancer is well documented. The reasons for this apparent discrepancy have been explained by the limits of simple machine-learning identification and ranking techniques, and the biological relevance and meaning of the prognostic gene lists was questioned. Subsequently, proponents of the prognostic gene lists claimed that different lists do capture similar underlying biological processes and pathways. The present study places under scrutiny the validity of this claim, for two important gene lists that are at the focus of current large-scale validation efforts. We performed careful enrichment analysis, controlling the effects of multiple testing in a manner which takes into account the nested dependent structure of gene ontologies. In contradiction to several previous publications, we find that the only biological process or pathway for which statistically significant concordance can be claimed is cell proliferation, a process whose relevance and prognostic value was well known long before gene expression profiling. We found that the claims reported by others, of wider concordance between the biological processes captured by the two prognostic signatures studied, were found either to be lacking statistical rigor or were in fact based on addressing some other question.

  15. Do two machine-learning based prognostic signatures for breast cancer capture the same biological processes?

    Directory of Open Access Journals (Sweden)

    Yotam Drier

    2011-03-01

    Full Text Available The fact that there is very little if any overlap between the genes of different prognostic signatures for early-discovery breast cancer is well documented. The reasons for this apparent discrepancy have been explained by the limits of simple machine-learning identification and ranking techniques, and the biological relevance and meaning of the prognostic gene lists was questioned. Subsequently, proponents of the prognostic gene lists claimed that different lists do capture similar underlying biological processes and pathways. The present study places under scrutiny the validity of this claim, for two important gene lists that are at the focus of current large-scale validation efforts. We performed careful enrichment analysis, controlling the effects of multiple testing in a manner which takes into account the nested dependent structure of gene ontologies. In contradiction to several previous publications, we find that the only biological process or pathway for which statistically significant concordance can be claimed is cell proliferation, a process whose relevance and prognostic value was well known long before gene expression profiling. We found that the claims reported by others, of wider concordance between the biological processes captured by the two prognostic signatures studied, were found either to be lacking statistical rigor or were in fact based on addressing some other question.

  16. Identification of Application Areas of the Steganalytic Approach Based on the Analysis of Spatial Domain of Digital Contents

    Directory of Open Access Journals (Sweden)

    Akhmamet’eva A.V.

    2016-08-01

    Full Text Available In this paper the identification of application areas of previously developed steganalytic approach based on accounting of quantity of consecutive triads in the matrix of unique colors of digital images, from the point of view of formats of digital contents is carried out. The influence of the size of the digital contents, which are used as containers for the embedding of additional information, on the detection efficiency during steganalysis is analyzed. As a result of fulfilled computational experiments, it has beet stated that the developed approach is effective for digital content in losses formats, and it has been turned out a restriction on size of the containers. Results of computational experiments are demonstrated.

  17. Content-based image retrieval using a signature graph and a self-organizing map

    Directory of Open Access Journals (Sweden)

    Van Thanh The

    2016-06-01

    Full Text Available In order to effectively retrieve a large database of images, a method of creating an image retrieval system CBIR (contentbased image retrieval is applied based on a binary index which aims to describe features of an image object of interest. This index is called the binary signature and builds input data for the problem of matching similar images. To extract the object of interest, we propose an image segmentation method on the basis of low-level visual features including the color and texture of the image. These features are extracted at each block of the image by the discrete wavelet frame transform and the appropriate color space. On the basis of a segmented image, we create a binary signature to describe the location, color and shape of the objects of interest. In order to match similar images, we provide a similarity measure between the images based on binary signatures. Then, we present a CBIR model which combines a signature graph and a self-organizing map to cluster and store similar images. To illustrate the proposed method, experiments on image databases are reported, including COREL,Wang and MSRDI.

  18. A Prototype of Mathematical Treatment of Pen Pressure Data for Signature Verification.

    Science.gov (United States)

    Li, Chi-Keung; Wong, Siu-Kay; Chim, Lai-Chu Joyce

    2018-01-01

    A prototype using simple mathematical treatment of the pen pressure data recorded by a digital pen movement recording device was derived. In this study, a total of 48 sets of signature and initial specimens were collected. Pearson's correlation coefficient was used to compare the data of the pen pressure patterns. From the 820 pair comparisons of the 48 sets of genuine signatures, a high degree of matching was found in which 95.4% (782 pairs) and 80% (656 pairs) had rPA > 0.7 and rPA > 0.8, respectively. In the comparison of the 23 forged signatures with their corresponding control signatures, 20 of them (89.2% of pairs) had rPA values prototype could be used as a complementary technique to improve the objectivity of signature examination and also has a good potential to be developed as a tool for automated signature identification. © 2017 American Academy of Forensic Sciences.

  19. A new time-digital convert circuit based on digital delay line

    International Nuclear Information System (INIS)

    Liu Haifeng; Guo Ying; Zhang Zhi

    2004-01-01

    An introduction of a new method of time-digital convert circuit based on digital delay line is given. High precision and good reliability can be realized when it is combined with traditional counting convert method in the measurement of large scale pulse width and low frequency self-excitation oscillator. (authors)

  20. Accuracy of Digital Impressions and Fitness of Single Crowns Based on Digital Impressions

    Science.gov (United States)

    Yang, Xin; Lv, Pin; Liu, Yihong; Si, Wenjie; Feng, Hailan

    2015-01-01

    In this study, the accuracy (precision and trueness) of digital impressions and the fitness of single crowns manufactured based on digital impressions were evaluated. #14-17 epoxy resin dentitions were made, while full-crown preparations of extracted natural teeth were embedded at #16. (1) To assess precision, deviations among repeated scan models made by intraoral scanner TRIOS and MHT and model scanner D700 and inEos were calculated through best-fit algorithm and three-dimensional (3D) comparison. Root mean square (RMS) and color-coded difference images were offered. (2) To assess trueness, micro computed tomography (micro-CT) was used to get the reference model (REF). Deviations between REF and repeated scan models (from (1)) were calculated. (3) To assess fitness, single crowns were manufactured based on TRIOS, MHT, D700 and inEos scan models. The adhesive gaps were evaluated under stereomicroscope after cross-sectioned. Digital impressions showed lower precision and better trueness. Except for MHT, the means of RMS for precision were lower than 10 μm. Digital impressions showed better internal fitness. Fitness of single crowns based on digital impressions was up to clinical standard. Digital impressions could be an alternative method for single crowns manufacturing. PMID:28793417

  1. Accuracy of Digital Impressions and Fitness of Single Crowns Based on Digital Impressions

    Directory of Open Access Journals (Sweden)

    Xin Yang

    2015-06-01

    Full Text Available In this study, the accuracy (precision and trueness of digital impressions and the fitness of single crowns manufactured based on digital impressions were evaluated. #14-17 epoxy resin dentitions were made, while full-crown preparations of extracted natural teeth were embedded at #16. (1 To assess precision, deviations among repeated scan models made by intraoral scanner TRIOS and MHT and model scanner D700 and inEos were calculated through best-fit algorithm and three-dimensional (3D comparison. Root mean square (RMS and color-coded difference images were offered. (2 To assess trueness, micro computed tomography (micro-CT was used to get the reference model (REF. Deviations between REF and repeated scan models (from (1 were calculated. (3 To assess fitness, single crowns were manufactured based on TRIOS, MHT, D700 and inEos scan models. The adhesive gaps were evaluated under stereomicroscope after cross-sectioned. Digital impressions showed lower precision and better trueness. Except for MHT, the means of RMS for precision were lower than 10 μm. Digital impressions showed better internal fitness. Fitness of single crowns based on digital impressions was up to clinical standard. Digital impressions could be an alternative method for single crowns manufacturing.

  2. A signature-based power model for MPSoC on FPGA

    NARCIS (Netherlands)

    Piscitelli, R.; Pimentel, A.D.

    2012-01-01

    This paper presents a framework for high-level power estimation of multiprocessor systems-on-chip (MPSoC) architectures on FPGA. The technique is based on abstract execution profiles, called event signatures, and it operates at a higher level of abstraction than, for example, commonly used

  3. Digital signal integrity and stability in the ATLAS Level-1 Calorimeter Trigger

    CERN Document Server

    Achenbach, R; Aharrouche, M; Andrei, V; Åsman, B; Barnett, B M; Bauss, B; Bendel, M; Bohm, C; Booth, J R A; Bracinik, J; Brawn, I P; Charlton, D G; Childers, J T; Collins, N J; Curtis, C J; Davis, A O; Eckweiler, S; Eisenhandler, E F; Faulkner, P J W; Fleckner, J; Föhlisch, F; Gee, C N P; Gillman, A R; Goringer, C; Groll, M; Hadley, D R; Hanke, P; Hellman, S; Hidvegi, A; Hillier, S J; Johansen, M; Kluge, E E; Kühl, T; Landon, M; Lendermann, V; Lilley, J N; Mahboubi, K; Mahout, G; Meier, K; Middleton, R P; Moa, T; Morris, J D; Müller, F; Neusiedl, A; Ohm, C; Oltmann, B; Perera, V J O; Prieur, D P F; Qian, W; Rieke, S; Rühr, F; Sankey, D P C; Schäfer, U; Schmitt, K; Schultz-Coulon, H C; Silverstein, S; Sjölin, J; Staley, R J; Stamen, R; Stockton, M C; Tan, C L A; Tapprogge, S; Thomas, J P; Thompson, P D; Watkins, P M; Watson, A; Weber, P; Wessels, M; Wildt, M

    2008-01-01

    The ATLAS Level-1 calorimeter trigger is a hardware-based system with the goal of identifying high-pT objects and to measure total and missing ET in the ATLAS calorimeters within an overall latency of 2.5 microseconds. This trigger system is composed of the Preprocessor which digitises about 7200 analogue input channels and two digital processors to identify high-pT signatures and to calculate the energy sums. The digital part consists of multi-stage, pipelined custom-built modules. The high demands on connectivity between the initial analogue stage and digital part and between the custom-built modules are presented. Furthermore the techniques to establish timing regimes and verify connectivity and stable operation of these digital links will be described.

  4. DIGITAL FILTERS IMPLEMENTATION IN MICROPROCESSOR-BASED RELAY PROTECTION

    Directory of Open Access Journals (Sweden)

    Yu. V. Rumiantsev

    2016-01-01

    Full Text Available This article presents the implementation of digital filters used in digital relay protection current measuring elements. Mathematical descriptions of the considered digital filters as well as the computer programs for their coefficients calculation are described. It has been shown that in order to reliable estimate the digital filter performance its input signals waveforms must be close to the actual secondary current waveform of the current transformer to which the digital protection with the estimated digital filter is connected. For these purposes in MatLab–Simulink dynamic simulation environment the power system and the current measuring element models were developed. Performed calculations allowed to reveal that the exponentially decaying DC component which in some cases contains in primary fault current drives the current transformer core into saturation even when its nominal parameters are not exceeded. This results in distortion of the current transformer secondary current which in this case contains higher and inter-harmonics. Moreover, such harmonic content is not completely taking into account during coefficients calculation of the considered digital filters what results in signal magnitude estimation inaccuracy. Comparison of the digital filters response to the above-mentioned input signals allowed to find out such digital filter implementations which enable signal magnitude estimation with a minimum error. Ways of filtering quality improvement concerned with the window functions are proposed. Thus, the joint usage of digital filter and Hamming window allows to achieve the zero value of the signal magnitude gain factor in high-frequency range and substantially suppress all spectral components above 100 Hz. The increasing of the signal magnitude settling time in this case can be reduced by choosing the most optimal parameters of the all components of the current measuring element.

  5. A Quantum Proxy Weak Blind Signature Scheme Based on Controlled Quantum Teleportation

    Science.gov (United States)

    Cao, Hai-Jing; Yu, Yao-Feng; Song, Qin; Gao, Lan-Xiang

    2015-04-01

    Proxy blind signature is applied to the electronic paying system, electronic voting system, mobile agent system, security of internet, etc. A quantum proxy weak blind signature scheme is proposed in this paper. It is based on controlled quantum teleportation. Five-qubit entangled state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, so it could guarantee not only the unconditional security of the scheme but also the anonymity of the messages owner.

  6. A Third-Party E-Payment Protocol Based on Quantum Group Blind Signature

    Science.gov (United States)

    Zhang, Jian-Zhong; Yang, Yuan-Yuan; Xie, Shu-Cui

    2017-09-01

    A third-party E-payment protocol based on quantum group blind signature is proposed in this paper. Our E-payment protocol could protect user's anonymity as the traditional E-payment systems do, and also have unconditional security which the classical E-payment systems can not provide. To achieve that, quantum key distribution, one-time pad and quantum group blind signature are adopted in our scheme. Furthermore, if there were a dispute, the manager Trent can identify who tells a lie.

  7. Comment on ‘A technique for image encryption using digital signature’

    Science.gov (United States)

    Hernández Encinas, L.; Peinado Domínguez, A.

    2006-12-01

    The security of a recently proposed technique for encryption images by Sinha and Singh [A. Sinha, K. Singh, Opt. Commun. 218 (2003) 229], based on the use of digital signatures and error correcting codes, is analyzed. The proposed cryptosystem is shown to have some weakness. In fact, the secret key and the original image can be recovered efficiently by a brute force attack.

  8. Radiation signatures

    International Nuclear Information System (INIS)

    McGlynn, S.P.; Varma, M.N.

    1992-01-01

    A new concept for modelling radiation risk is proposed. This concept is based on the proposal that the spectrum of molecular lesions, which we dub ''the radiation signature'', can be used to identify the quality of the causal radiation. If the proposal concerning radiation signatures can be established then, in principle, both prospective and retrospective risk determination can be assessed on an individual basis. A major goal of biophysical modelling is to relate physical events such as ionization, excitation, etc. to the production of radiation carcinogenesis. A description of the physical events is provided by track structure. The track structure is determined by radiation quality, and it can be considered to be the ''physical signature'' of the radiation. Unfortunately, the uniqueness characteristics of this signature are dissipated in biological systems in ∼10 -9 s. Nonetheless, it is our contention that this physical disturbance of the biological system eventuates later, at ∼10 0 s, in molecular lesion spectra which also characterize the causal radiation. (author)

  9. Quantifying radionuclide signatures from a γ–γ coincidence system

    International Nuclear Information System (INIS)

    Britton, Richard; Jackson, Mark J.; Davies, Ashley V.

    2015-01-01

    A method for quantifying gamma coincidence signatures has been developed, and tested in conjunction with a high-efficiency multi-detector system to quickly identify trace amounts of radioactive material. The γ–γ system utilises fully digital electronics and list-mode acquisition to time–stamp each event, allowing coincidence matrices to be easily produced alongside typical ‘singles’ spectra. To quantify the coincidence signatures a software package has been developed to calculate efficiency and cascade summing corrected branching ratios. This utilises ENSDF records as an input, and can be fully automated, allowing the user to quickly and easily create/update a coincidence library that contains all possible γ and conversion electron cascades, associated cascade emission probabilities, and true-coincidence summing corrected γ cascade detection probabilities. It is also fully searchable by energy, nuclide, coincidence pair, γ multiplicity, cascade probability and half-life of the cascade. The probabilities calculated were tested using measurements performed on the γ–γ system, and found to provide accurate results for the nuclides investigated. Given the flexibility of the method, (it only relies on evaluated nuclear data, and accurate efficiency characterisations), the software can now be utilised for a variety of systems, quickly and easily calculating coincidence signature probabilities. - Highlights: • Monte-Carlo based software developed to easily create/update a coincidence signal library for environmental radionuclides. • Coincidence library utilised to accurately quantify gamma coincidence signatures. • All coincidence signature probabilities are corrected for cascade summing, conversion electron emission and pair production. • Key CTBTO relevant radionuclides have been tested to verify the calculated correction factors. • Accurately quantifying coincidence signals during routine analysis will allow dramatically improved detection

  10. Towards effective and robust list-based packet filter for signature-based network intrusion detection: an engineering approach

    DEFF Research Database (Denmark)

    Meng, Weizhi; Li, Wenjuan; Kwok, Lam For

    2017-01-01

    Network intrusion detection systems (NIDSs) which aim to identify various attacks, have become an essential part of current security infrastructure. In particular, signature-based NIDSs are being widely implemented in industry due to their low rate of false alarms. However, the signature matching...... this problem, packet filtration is a promising solution to reduce unwanted traffic. Motivated by this, in this work, a list-based packet filter was designed and an engineering method of combining both blacklist and whitelist techniques was introduced. To further secure such filters against IP spoofing attacks...... in traffic filtration as well as workload reduction, and is robust against IP spoofing attacks....

  11. Imaging-based surrogate markers of transcriptome subclasses and signatures in hepatocellular carcinoma. Preliminary results

    Energy Technology Data Exchange (ETDEWEB)

    Taouli, Bachir [Icahn School of Medicine at Mount Sinai, Department of Radiology, New York, NY (United States); Icahn School of Medicine at Mount Sinai, Translational and Molecular Imaging Institute, New York, NY (United States); Icahn School of Medicine at Mount Sinai, Liver Cancer Program, Tisch Cancer Institute, New York, NY (United States); Hoshida, Yujin; Chen, Xintong; Sun, Xiaochen; Kojima, Kensuke; Toffanin, Sara; Hirschfield, Hadassa [Icahn School of Medicine at Mount Sinai, Liver Cancer Program, Tisch Cancer Institute, New York, NY (United States); Icahn School of Medicine at Mount Sinai, Division of Liver Diseases, Department of Medicine, New York, NY (United States); Kakite, Suguru [Icahn School of Medicine at Mount Sinai, Translational and Molecular Imaging Institute, New York, NY (United States); Tottori University, Division of Radiology, Department of Pathophysiological and Therapeutic Science, Faculty of Medicine, Yonago City (Japan); Tan, Poh Seng [Icahn School of Medicine at Mount Sinai, Liver Cancer Program, Tisch Cancer Institute, New York, NY (United States); Icahn School of Medicine at Mount Sinai, Division of Liver Diseases, Department of Medicine, New York, NY (United States); National University Health System, Division of Gastroenterology and Hepatology, University Medicine Cluster, Singapore (Singapore); Kihira, Shingo [Icahn School of Medicine at Mount Sinai, Department of Radiology, New York, NY (United States); Fiel, M.I. [Icahn School of Medicine at Mount Sinai, Department of Pathology, New York, NY (United States); Wagner, Mathilde [Icahn School of Medicine at Mount Sinai, Translational and Molecular Imaging Institute, New York, NY (United States); Sorbonne Universites, UPMC, Department of Radiology, Hopital Pitie-Salpetriere, Paris (France); Llovet, Josep M. [Icahn School of Medicine at Mount Sinai, Liver Cancer Program, Tisch Cancer Institute, New York, NY (United States); Icahn School of Medicine at Mount Sinai, Division of Liver Diseases, Department of Medicine, New York, NY (United States); Universitat de Barcelona, HCC Translational Research Laboratory, Barcelona-Clinic Liver Cancer Group Institut d' Investigacions Biomediques August Pi i Sunyer (IDIBAPS), Hospital Clinic de Barcelona, Barcelona (Spain); Institucio Catalana de Recerca i Estudis Avancats, Barcelona (Spain)

    2017-11-15

    In this preliminary study, we examined whether imaging-based phenotypes are associated with reported predictive gene signatures in hepatocellular carcinoma (HCC). Thirty-eight patients (M/F 30/8, mean age 61 years) who underwent pre-operative CT or MR imaging before surgery as well as transcriptome profiling were included in this IRB-approved single-centre retrospective study. Eleven qualitative and four quantitative imaging traits (size, enhancement ratios, wash-out ratio, tumour-to-liver contrast ratios) were assessed by three observers and were correlated with 13 previously reported HCC gene signatures using logistic regression analysis. Thirty-nine HCC tumours (mean size 5.7 ± 3.2 cm) were assessed. Significant positive associations were observed between certain imaging traits and gene signatures of aggressive HCC phenotype (G3-Boyault, Proliferation-Chiang profiles, CK19-Villanueva, S1/S2-Hoshida) with odds ratios ranging from 4.44-12.73 (P <0.045). Infiltrative pattern at imaging was significantly associated with signatures of microvascular invasion and aggressive phenotype. Significant but weak associations were also observed between each enhancement ratio and tumour-to-liver contrast ratios and certain gene expression profiles. This preliminary study demonstrates a correlation between phenotypic imaging traits with gene signatures of aggressive HCC, which warrants further prospective validation to establish imaging-based surrogate markers of molecular phenotypes in HCC. (orig.)

  12. Imaging-based surrogate markers of transcriptome subclasses and signatures in hepatocellular carcinoma. Preliminary results

    International Nuclear Information System (INIS)

    Taouli, Bachir; Hoshida, Yujin; Chen, Xintong; Sun, Xiaochen; Kojima, Kensuke; Toffanin, Sara; Hirschfield, Hadassa; Kakite, Suguru; Tan, Poh Seng; Kihira, Shingo; Fiel, M.I.; Wagner, Mathilde; Llovet, Josep M.

    2017-01-01

    In this preliminary study, we examined whether imaging-based phenotypes are associated with reported predictive gene signatures in hepatocellular carcinoma (HCC). Thirty-eight patients (M/F 30/8, mean age 61 years) who underwent pre-operative CT or MR imaging before surgery as well as transcriptome profiling were included in this IRB-approved single-centre retrospective study. Eleven qualitative and four quantitative imaging traits (size, enhancement ratios, wash-out ratio, tumour-to-liver contrast ratios) were assessed by three observers and were correlated with 13 previously reported HCC gene signatures using logistic regression analysis. Thirty-nine HCC tumours (mean size 5.7 ± 3.2 cm) were assessed. Significant positive associations were observed between certain imaging traits and gene signatures of aggressive HCC phenotype (G3-Boyault, Proliferation-Chiang profiles, CK19-Villanueva, S1/S2-Hoshida) with odds ratios ranging from 4.44-12.73 (P <0.045). Infiltrative pattern at imaging was significantly associated with signatures of microvascular invasion and aggressive phenotype. Significant but weak associations were also observed between each enhancement ratio and tumour-to-liver contrast ratios and certain gene expression profiles. This preliminary study demonstrates a correlation between phenotypic imaging traits with gene signatures of aggressive HCC, which warrants further prospective validation to establish imaging-based surrogate markers of molecular phenotypes in HCC. (orig.)

  13. Research on accounting transition from computerization to informationization

    Directory of Open Access Journals (Sweden)

    Shu Chen

    2017-11-01

    Full Text Available The application for computer technology, digitalization technology and network technology in the accounting field has promoted the development of accounting informationization. Accounting informationization is a product integrated with traditional accounting theory and modern information technology, which is an inevitable trend of continuous development of modern accounting. This paper discusses the basic concepts and characteristics of accounting computerization and informationization based on the normative research method and literature data method, analyzes the feasibility of accounting transition from computerization to informationization, and finally puts forward the specific approaches and ultimate goals of accounting transition from computerization to informationization.

  14. Aequorin-based measurements of intracellular Ca2+-signatures in plant cells

    Directory of Open Access Journals (Sweden)

    Mithöfer Axel

    2002-01-01

    Full Text Available Due to the involvement of calcium as a main second messenger in the plant signaling pathway, increasing interest has been focused on the calcium signatures supposed to be involved in the patterning of the specific response associated to a given stimulus. In order to follow these signatures we described here the practical approach to use the non-invasive method based on the aequorin technology. Besides reviewing the advantages and disadvantages of this method we report on results showing the usefulness of aequorin to study the calcium response to biotic (elicitors and abiotic stimuli (osmotic shocks in various compartments of plant cells such as cytosol and nucleus.

  15. Rank-Based miRNA Signatures for Early Cancer Detection

    Directory of Open Access Journals (Sweden)

    Mario Lauria

    2014-01-01

    Full Text Available We describe a new signature definition and analysis method to be used as biomarker for early cancer detection. Our new approach is based on the construction of a reference map of transcriptional signatures of both healthy and cancer affected individuals using circulating miRNA from a large number of subjects. Once such a map is available, the diagnosis for a new patient can be performed by observing the relative position on the map of his/her transcriptional signature. To demonstrate its efficacy for this specific application we report the results of the application of our method to published datasets of circulating miRNA, and we quantify its performance compared to current state-of-the-art methods. A number of additional features make this method an ideal candidate for large-scale use, for example, as a mass screening tool for early cancer detection or for at-home diagnostics. Specifically, our method is minimally invasive (because it works well with circulating miRNA, it is robust with respect to lab-to-lab protocol variability and batch effects (it requires that only the relative ranking of expression value of miRNA in a profile be accurate not their absolute values, and it is scalable to a large number of subjects. Finally we discuss the need for HPC capability in a widespread application of our or similar methods.

  16. Quantum dual signature scheme based on coherent states with entanglement swapping

    International Nuclear Information System (INIS)

    Liu Jia-Li; Shi Rong-Hua; Shi Jin-Jing; Lv Ge-Li; Guo Ying

    2016-01-01

    A novel quantum dual signature scheme, which combines two signed messages expected to be sent to two diverse receivers Bob and Charlie, is designed by applying entanglement swapping with coherent states. The signatory Alice signs two different messages with unitary operations (corresponding to the secret keys) and applies entanglement swapping to generate a quantum dual signature. The dual signature is firstly sent to the verifier Bob who extracts and verifies the signature of one message and transmits the rest of the dual signature to the verifier Charlie who verifies the signature of the other message. The transmission of the dual signature is realized with quantum teleportation of coherent states. The analysis shows that the security of secret keys and the security criteria of the signature protocol can be greatly guaranteed. An extensional multi-party quantum dual signature scheme which considers the case with more than three participants is also proposed in this paper and this scheme can remain secure. The proposed schemes are completely suited for the quantum communication network including multiple participants and can be applied to the e-commerce system which requires a secure payment among the customer, business and bank. (paper)

  17. A sessional blind signature based on quantum cryptography

    Science.gov (United States)

    Khodambashi, Siavash; Zakerolhosseini, Ali

    2014-01-01

    In this paper, we present a sessional blind signature protocol whose security is guaranteed by fundamental principles of quantum physics. It allows a message owner to get his message signed by an authorized signatory. However, the signatory is not capable of reading the message contents and everyone can verify authenticity of the message. For this purpose, we took advantage of a sessional signature as well as quantum entangled pairs which are generated with respect to it in our proposed protocol. We describe our proposed blind signature through an example and briefly discuss about its unconditional security. Due to the feasibility of the protocol, it can be widely employed for e-payment, e-government, e-business and etc.

  18. Raman spectral signatures of cervical exfoliated cells from liquid-based cytology samples

    Science.gov (United States)

    Kearney, Padraig; Traynor, Damien; Bonnier, Franck; Lyng, Fiona M.; O'Leary, John J.; Martin, Cara M.

    2017-10-01

    It is widely accepted that cervical screening has significantly reduced the incidence of cervical cancer worldwide. The primary screening test for cervical cancer is the Papanicolaou (Pap) test, which has extremely variable specificity and sensitivity. There is an unmet clinical need for methods to aid clinicians in the early detection of cervical precancer. Raman spectroscopy is a label-free objective method that can provide a biochemical fingerprint of a given sample. Compared with studies on infrared spectroscopy, relatively few Raman spectroscopy studies have been carried out to date on cervical cytology. The aim of this study was to define the Raman spectral signatures of cervical exfoliated cells present in liquid-based cytology Pap test specimens and to compare the signature of high-grade dysplastic cells to each of the normal cell types. Raman spectra were recorded from single exfoliated cells and subjected to multivariate statistical analysis. The study demonstrated that Raman spectroscopy can identify biochemical signatures associated with the most common cell types seen in liquid-based cytology samples; superficial, intermediate, and parabasal cells. In addition, biochemical changes associated with high-grade dysplasia could be identified suggesting that Raman spectroscopy could be used to aid current cervical screening tests.

  19. An Anonymous Access Authentication Scheme Based on Proxy Ring Signature for CPS-WMNs

    Directory of Open Access Journals (Sweden)

    Tianhan Gao

    2017-01-01

    Full Text Available Access security and privacy have become a bottleneck for the popularization of future Cyber-Physical System (CPS networks. Furthermore, users’ need for privacy-preserved access during movement procedure is more urgent. To address the anonymous access authentication issue for CPS Wireless Mesh Network (CPS-WMN, a novel anonymous access authentication scheme based on proxy ring signature is proposed. A hierarchical authentication architecture is presented first. The scheme is then achieved from the aspect of intergroup and intragroup anonymous mutual authentication through proxy ring signature mechanism and certificateless signature mechanism, respectively. We present a formal security proof of the proposed protocol with SVO logic. The simulation and performance analysis demonstrate that the proposed scheme owns higher efficiency and adaptability than the typical one.

  20. The Role of Digital Certificates in EGoverning. The Case of the Romanian Regulation and Surveillance Authority

    Directory of Open Access Journals (Sweden)

    Andra Marin

    2012-08-01

    Full Text Available The implementation of electronic governance related projects implies user authentication,accounts activation and personal data verification. Certain public services, particularly thoseinvolving financial transactions or statements, require a high security level. The use of the PKI technology and, consequently, of digital signatures, constitutes the most viable solution, meeting the required security standards, protecting, on the one hand, the signatory’s identity, and, on the other hand, the integrity of the transmitted message. Due to the use of the digital certificate, the development of online public services is now possible, especially since it meets the requirements of security standards, but also because it is highly trusted by users. This article intends to analyze the impact of the digital certificate on the improvement of communication between state authorities, including specific transactional relations, and also to consider its influence on security improvement of dataflow. The study demonstrates that the digital certificate is closely connected to the information society, directly determining the dynamics of the development of new applications that provide a better interface between the state and its citizens.

  1. Online Signature Verification on MOBISIG Finger-Drawn Signature Corpus

    Directory of Open Access Journals (Sweden)

    Margit Antal

    2018-01-01

    Full Text Available We present MOBISIG, a pseudosignature dataset containing finger-drawn signatures from 83 users captured with a capacitive touchscreen-based mobile device. The database was captured in three sessions resulting in 45 genuine signatures and 20 skilled forgeries for each user. The database was evaluated by two state-of-the-art methods: a function-based system using local features and a feature-based system using global features. Two types of equal error rate computations are performed: one using a global threshold and the other using user-specific thresholds. The lowest equal error rate was 0.01% against random forgeries and 5.81% against skilled forgeries using user-specific thresholds that were computed a posteriori. However, these equal error rates were significantly raised to 1.68% (random forgeries case and 14.31% (skilled forgeries case using global thresholds. The same evaluation protocol was performed on the DooDB publicly available dataset. Besides verification performance evaluations conducted on the two finger-drawn datasets, we evaluated the quality of the samples and the users of the two datasets using basic quality measures. The results show that finger-drawn signatures can be used by biometric systems with reasonable accuracy.

  2. New Format, Same Old Story?: An Analysis of Traditional and Digital U.S. History Textbook Accounts of Slavery

    Science.gov (United States)

    Lathan, Jamie L.

    2013-01-01

    While the distortions and omissions in traditional U. S. history textbook accounts of slavery have been well documented (Alexander, 2002; Brown & Brown, 2010; Banks, 1969; Council on Interracial Books for Children, 1977; Elson, 1964; Gordy & Pritchard, 1995; Kane, 1970; Kochlin, 1998; Washburn, 1997), no study has analyzed digital U. S.…

  3. Research on Digital Forensic Readiness Design in a Cloud Computing-Based Smart Work Environment

    Directory of Open Access Journals (Sweden)

    Sangho Park

    2018-04-01

    computing-based smart work environment by mapping the components of digital forensic readiness to each area. To verify the draft of the designed model, we create a survey targeting digital forensic field-related professionals, analyze their validity, and deduce a digital forensic readiness model of the cloud computing-based smart work environment consisting of seven detailed areas and 44 components. Finally, through an analytic hierarchy process analysis, we deduce the areas that should be emphasized compared to the existing work environment to heighten the forensic readiness in the cloud computing-based smart work environment. As a result, the weightings of the terminal information Universal Subscriber Identity Module(USIM card, collect/gain virtual machine image, etc., user information (user account information analysis, analysis of user’s used service, etc., and usage information (mobile OS artifact timeline analysis, action analysis through timeline, etc. appear to be higher than those of the existing work environment. This is analyzed for each organization to preemptively prepare for the components of digital forensic readiness in the corresponding areas.

  4. The Location of Digital Ethnography

    Directory of Open Access Journals (Sweden)

    Dana M. Walker

    2010-10-01

    Full Text Available Qualitative researchers interested in digitally-located social and cultural practices have struggled with ways in which to design studies that can account for the digital aspect of cultural practices while also taking into account that those digital practices do not exist as separate (or separable in terms of our research from other social and cultural practices. As such, one of the primary and ongoing challenges facing internet-based ethnographic research is the question of how to construct the location of a project when the sites, technologically-mediated practices, and people we study exist and flow through a wider information ecology that is neither fixed nor can easily be located as “online” or “offline.” This is as much a methodological challenge as a theoretical one. If one accepts that a rigid distinction between online and offline makes little theoretical sense, then drawing a methodological line between online and offline only reifies such a dualism. While there is a developing body of internet-related ethnographic literature which is attempting to take into account the fluid nature of our information ecology (e.g. Burrell, 2009, Leander and McKim, 2003, Hine, 2007, we continue to operate on shifting ground. This article uses the case of my own work on city-specific discussion forums in Philadelphia, Pennsylvania to highlight the complexities of locating digital ethnographic work and also argue for the necessity of accounting for both movement and placed-ness.

  5. Accounting standards and earnings management : The role of rules-based and principles-based accounting standards and incentives on accounting and transaction decisions

    NARCIS (Netherlands)

    Beest, van F.

    2012-01-01

    This book examines the effect that rules-based and principles-based accounting standards have on the level and nature of earnings management decisions. A cherry picking experiment is conducted to test the hypothesis that a substitution effect is expected from accounting decisions to transaction

  6. Watershed Boundaries - WATERSHEDS_HUC06_USGS_IN: 6-Digit Accounting Units, Hydrologic Units, in Indiana, (Derived from US Geological Survey, 1:24,000 Polygon Shapefile)

    Data.gov (United States)

    NSGIC State | GIS Inventory — WATERSHEDS_HUC06_USGS_IN is a polygon shapefile showing the boundaries of accounting units (HUA) in Indiana. Accounting units are noted by a 6-digit hydrologic unit....

  7. Thermal-Signature-Based Sleep Analysis Sensor

    Directory of Open Access Journals (Sweden)

    Ali Seba

    2017-10-01

    Full Text Available This paper addresses the development of a new technique in the sleep analysis domain. Sleep is defined as a periodic physiological state during which vigilance is suspended and reactivity to external stimulations diminished. We sleep on average between six and nine hours per night and our sleep is composed of four to six cycles of about 90 min each. Each of these cycles is composed of a succession of several stages of sleep that vary in depth. Analysis of sleep is usually done via polysomnography. This examination consists of recording, among other things, electrical cerebral activity by electroencephalography (EEG, ocular movements by electrooculography (EOG, and chin muscle tone by electromyography (EMG. Recordings are made mostly in a hospital, more specifically in a service for monitoring the pathologies related to sleep. The readings are then interpreted manually by an expert to generate a hypnogram, a curve showing the succession of sleep stages during the night in 30s epochs. The proposed method is based on the follow-up of the thermal signature that makes it possible to classify the activity into three classes: “awakening,” “calm sleep,” and “restless sleep”. The contribution of this non-invasive method is part of the screening of sleep disorders, to be validated by a more complete analysis of the sleep. The measure provided by this new system, based on temperature monitoring (patient and ambient, aims to be integrated into the tele-medicine platform developed within the framework of the Smart-EEG project by the SYEL–SYstèmes ELectroniques team. Analysis of the data collected during the first surveys carried out with this method showed a correlation between thermal signature and activity during sleep. The advantage of this method lies in its simplicity and the possibility of carrying out measurements of activity during sleep and without direct contact with the patient at home or hospitals.

  8. Quantum dual signature scheme based on coherent states with entanglement swapping

    Science.gov (United States)

    Liu, Jia-Li; Shi, Rong-Hua; Shi, Jin-Jing; Lv, Ge-Li; Guo, Ying

    2016-08-01

    A novel quantum dual signature scheme, which combines two signed messages expected to be sent to two diverse receivers Bob and Charlie, is designed by applying entanglement swapping with coherent states. The signatory Alice signs two different messages with unitary operations (corresponding to the secret keys) and applies entanglement swapping to generate a quantum dual signature. The dual signature is firstly sent to the verifier Bob who extracts and verifies the signature of one message and transmits the rest of the dual signature to the verifier Charlie who verifies the signature of the other message. The transmission of the dual signature is realized with quantum teleportation of coherent states. The analysis shows that the security of secret keys and the security criteria of the signature protocol can be greatly guaranteed. An extensional multi-party quantum dual signature scheme which considers the case with more than three participants is also proposed in this paper and this scheme can remain secure. The proposed schemes are completely suited for the quantum communication network including multiple participants and can be applied to the e-commerce system which requires a secure payment among the customer, business and bank. Project supported by the National Natural Science Foundation of China (Grant Nos. 61272495, 61379153, and 61401519) and the Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20130162110012).

  9. PC-based digital feedback control for scanning force microscope

    International Nuclear Information System (INIS)

    Mohd Ashhar Khalid

    2002-01-01

    In the past, most digital feedback implementation for scanned-probe microscope were based on a digital signal processor (DSP). At present DSP plug-in card with the input-output interface module is still expensive compared to a fast pentium PC motherboard. For a magnetic force microscope (MFM) digital feedback has an advantage where the magnetic signal can be easily separated from the topographic signal. In this paper, a simple low-cost PC-based digital feedback and imaging system for Scanning Force Microscope (SFM) is presented. (Author)

  10. Expressiveness considerations of XML signatures

    DEFF Research Database (Denmark)

    Jensen, Meiko; Meyer, Christopher

    2011-01-01

    XML Signatures are used to protect XML-based Web Service communication against a broad range of attacks related to man-in-the-middle scenarios. However, due to the complexity of the Web Services specification landscape, the task of applying XML Signatures in a robust and reliable manner becomes...... more and more challenging. In this paper, we investigate this issue, describing how an attacker can still interfere with Web Services communication even in the presence of XML Signatures. Additionally, we discuss the interrelation of XML Signatures and XML Encryption, focussing on their security...

  11. Data protection for the digital age: comprehensive effects of the evolving law of accountability

    Directory of Open Access Journals (Sweden)

    Nina GUMZEJ

    2012-12-01

    Full Text Available The law of personal data protection has for years been lagging behind technology, which is evolving propulsively and with high speed. A number of new challenges arising from the post-modern digital age have been identified for rights and freedoms of individuals with respect to processing of their personal data and thus a need for adapting the relevant legal-regulatory regime and ensuring a workable and systematic data protection system for the third millennium. After examination of the current legal framework and supporting systems at the level of European Union law, this paper focuses on recently proposed reforms. Proposed new EU legal-regulatory regime towards a potent data protection ecosystem is strongly supported by stricter accountability of those who are responsible for personal data. As one of the core legal principles supporting the new regime, accountability denotes, in a nutshell, a number of legally enforceable duties to implement and verify measures and procedures that can ensure operative and demonstrable data protection compliance. Selected highlights of the proposed accountability measures are therefore examined in this paper and arguments provided for a shift towards organizational data protection management and governance already today.

  12. A Methodology for Calculating Radiation Signatures

    Energy Technology Data Exchange (ETDEWEB)

    Klasky, Marc Louis [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Wilcox, Trevor [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Bathke, Charles G. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); James, Michael R. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-05-01

    A rigorous formalism is presented for calculating radiation signatures from both Special Nuclear Material (SNM) as well as radiological sources. The use of MCNP6 in conjunction with CINDER/ORIGEN is described to allow for the determination of both neutron and photon leakages from objects of interest. In addition, a description of the use of MCNP6 to properly model the background neutron and photon sources is also presented. Examinations of the physics issues encountered in the modeling are investigated so as to allow for guidance in the user discerning the relevant physics to incorporate into general radiation signature calculations. Furthermore, examples are provided to assist in delineating the pertinent physics that must be accounted for. Finally, examples of detector modeling utilizing MCNP are provided along with a discussion on the generation of Receiver Operating Curves, which are the suggested means by which to determine detectability radiation signatures emanating from objects.

  13. Selection signatures in worldwide sheep populations.

    Science.gov (United States)

    Fariello, Maria-Ines; Servin, Bertrand; Tosser-Klopp, Gwenola; Rupp, Rachel; Moreno, Carole; San Cristobal, Magali; Boitard, Simon

    2014-01-01

    The diversity of populations in domestic species offers great opportunities to study genome response to selection. The recently published Sheep HapMap dataset is a great example of characterization of the world wide genetic diversity in sheep. In this study, we re-analyzed the Sheep HapMap dataset to identify selection signatures in worldwide sheep populations. Compared to previous analyses, we made use of statistical methods that (i) take account of the hierarchical structure of sheep populations, (ii) make use of linkage disequilibrium information and (iii) focus specifically on either recent or older selection signatures. We show that this allows pinpointing several new selection signatures in the sheep genome and distinguishing those related to modern breeding objectives and to earlier post-domestication constraints. The newly identified regions, together with the ones previously identified, reveal the extensive genome response to selection on morphology, color and adaptation to new environments.

  14. Arbitrated quantum signature scheme based on χ-type entangled states

    International Nuclear Information System (INIS)

    Zuo, Huijuan; Huang, Wei; Qin, Sujuan

    2013-01-01

    An arbitrated quantum signature scheme, which is mainly applied in electronic-payment systems, is proposed and investigated. The χ-type entangled states are used for quantum key distribution and quantum signature in this protocol. Compared with previous quantum signature schemes which also utilize χ-type entangled states, the proposed scheme provides higher efficiency. Finally, we also analyze its security under various kinds of attacks. (paper)

  15. Signature splitting in nuclear rotational bands: Neutron i13/2 systematics

    International Nuclear Information System (INIS)

    Mueller, W.F.; Jensen, H.J.; Reviol, W.; Riedinger, L.L.; Yu, C.; Zhang, J.; Nazarewicz, W.; Wyss, R.

    1994-01-01

    Experimental values of signature splitting in νi 13/2 rotational bands in odd-N even-Z nuclei in the Z=62--78 region are collected and presented. A procedure is introduced to calculate signature splitting within the cranked deformed Woods-Saxon model. In the theoretical treatment, deformation parameters are obtained by minimizing the total Routhians of individual νi 13/2 bands, and the procedure accounts for the possibility that the two signatures have different deformations and pairing gaps. Experimental signature splitting data for νi 13/2 bands in Dy, Er, Yb, Hf, W, and Os nuclei are compared with calculated values. The sensitivity of calculated signature splitting to changes in deformation, pairing, and other model parameters is presented

  16. Field-Programmable Gate Array-based fluxgate magnetometer with digital integration

    Science.gov (United States)

    Butta, Mattia; Janosek, Michal; Ripka, Pavel

    2010-05-01

    In this paper, a digital magnetometer based on printed circuit board fluxgate is presented. The fluxgate is pulse excited and the signal is extracted by gate integration. We investigate the possibility to perform integration on very narrow gates (typically 500 ns) by using digital techniques. The magnetometer is based on field-programmable gate array (FPGA) card: we will show all the advantages and disadvantages, given by digitalization of fluxgate output voltage by means of analog-to-digital converter on FPGA card, as well as digitalization performed by external digitizer. Due to very narrow gate, it is shown that a magnetometer entirely based on a FPGA card is preferable, because it avoids noise due to trigger instability. Both open loop and feedback operative mode are described and achieved results are presented.

  17. Variability of grip kinetics during adult signature writing.

    Directory of Open Access Journals (Sweden)

    Bassma Ghali

    Full Text Available Grip kinetics and their variation are emerging as important considerations in the clinical assessment of handwriting pathologies, fine motor rehabilitation, biometrics, forensics and ergonomic pen design. This study evaluated the intra- and inter-participant variability of grip shape kinetics in adults during signature writing. Twenty (20 adult participants wrote on a digitizing tablet using an instrumented pen that measured the forces exerted on its barrel. Signature samples were collected over 10 days, 3 times a day, to capture temporal variations in grip shape kinetics. A kinetic topography (i.e., grip shape image was derived per signature by time-averaging the measured force at each of 32 locations around the pen barrel. The normalized cross correlations (NCC of grip shape images were calculated within- and between-participants. Several classification algorithms were implemented to gauge the error rate of participant discrimination based on grip shape kinetics. Four different grip shapes emerged and several participants made grip adjustments (change in grip shape or grip height or rotated the pen during writing. Nonetheless, intra-participant variation in grip kinetics was generally much smaller than inter-participant force variations. Using the entire grip shape images as a 32-dimensional input feature vector, a K-nearest neighbor classifier achieved an error rate of 1.2±0.4% in discriminating among participants. These results indicate that writers had unique grip shape kinetics that were repeatable over time but distinct from those of other participants. The topographic analysis of grip kinetics may inform the development of personalized interventions or customizable grips in clinical and industrial applications, respectively.

  18. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  19. Autonomy and Accountability in Standards-Based Reform

    Directory of Open Access Journals (Sweden)

    Susan Watson

    2001-08-01

    Full Text Available In this article we discuss the effects of one urban school district's efforts to increase the autonomy and accountability of schools and teams of teachers through a standards-based reform known as team- based schooling. Team-based schooling is designed to devolve decision-making authority down to the school level by increasing teachers' autonomy to make decisions. Increased accountability is enacted in the form of a state-level standards-based initiative. Based on our evaluation over a two-year period involving extensive fieldwork and quantitative analysis, we describe the ways that teachers, teams and school administrators responded to the implementation of team-based schooling. What are the effects of increasing school-level autonomy and accountability in the context of standards- based reform? Our analysis highlights several issues: the "lived reality" of teaming as it interacts with the existing culture within schools, the ways that teachers respond to the pressures created by increased internal and external accountability, and the effects of resource constraints on the effectiveness of implementation. We conclude by using our findings to consider more broadly the trade-off between increased autonomy and accountability on which standards-based reforms like team-based schooling are based.

  20. Fast reconstruction of off-axis digital holograms based on digital spatial multiplexing.

    Science.gov (United States)

    Sha, Bei; Liu, Xuan; Ge, Xiao-Lu; Guo, Cheng-Shan

    2014-09-22

    A method for fast reconstruction of off-axis digital holograms based on digital multiplexing algorithm is proposed. Instead of the existed angular multiplexing (AM), the new method utilizes a spatial multiplexing (SM) algorithm, in which four off-axis holograms recorded in sequence are synthesized into one SM function through multiplying each hologram with a tilted plane wave and then adding them up. In comparison with the conventional methods, the SM algorithm simplifies two-dimensional (2-D) Fourier transforms (FTs) of four N*N arrays into a 1.25-D FTs of one N*N arrays. Experimental results demonstrate that, using the SM algorithm, the computational efficiency can be improved and the reconstructed wavefronts keep the same quality as those retrieved based on the existed AM method. This algorithm may be useful in design of a fast preview system of dynamic wavefront imaging in digital holography.

  1. Accounting bases of theory: Why they matter

    Directory of Open Access Journals (Sweden)

    Zafeer Nagdee

    2016-11-01

    Full Text Available It is widely agreed that contemporary accounting practice is largely based on the application of professional accounting standards rather than on the application of sound, academic bases of theory. This has led to uncertainty within the field which has in turn inhibited the ability of accounting to develop into a more robust academic discipline. In conducting a thematic analysis of existing literature, this study will identify and expand on three key themes which will collectively establish the argument positing that a lacking basis of accounting theory has impaired the scholastic development of accounting practice worldwide. By introducing this argument to the academic community, this study will expose the economic risks associated with accounting’s absent bases of theory and will consequently add value by highlighting the need for additional research into the development, clarification and refinement of accounting theories that will result in more useful accounting practices worldwide

  2. The benefit of accounting for DQE variations in simulated dose reduction of digital radiographic systems

    International Nuclear Information System (INIS)

    Svalkvist, A.; Baath, M.

    2010-01-01

    Adding noise to clinical radiographs to simulate dose reduction can be used to investigate the relationship between dose level and clinical image quality without exposing patients to additional radiation. The purpose of the present paper was to examine the benefits of using a method that accounts for detective quantum efficiency (DQE) variations that may occur in different dose ranges in the simulated dose reduction process. A method initially intended for simulated dose reduction in tomo-synthesis was applied to extremely low-dose posterio-anterior radiographs of an anthropomorphic chest phantom, selected from a group of projection images included in a tomo-synthesis examination and compared with a previous method that do not account for DQE variations. A comparison of images simulated to be collected at a lower dose level (73% of the original dose level) and images actually collected at this lower dose level revealed that the error in the integrated normalised noise power spectrum was smaller than 4% for the method that accounts for DQE variations in the simulated dose reduction, whereas the error was larger than 20% for the previous method. This indicates that an increased validity in dose reduction simulation of digital radiographic systems is obtained with a method accounting for DQE variations. (authors)

  3. Authentication, Time-Stamping and Digital Signatures

    Science.gov (United States)

    Levine, Judah

    1996-01-01

    Time and frequency data are often transmitted over public packet-switched networks, and the use of this mode of distribution is likely to increase in the near future as high-speed logical circuits transmitted via networks replace point-to-point physical circuits. ALthough these networks have many technical advantages, they are susceptible to evesdropping, spoofing, and the alteration of messages enroute using techniques that are relatively simple to implement and quite difficult to detect. I will discuss a number of solutions to these problems, including the authentication mechanism used in the Network Time Protocol (NTP) and the more general technique of signing time-stamps using public key cryptography. This public key method can also be used to implement the digital analog of a Notary Public, and I will discuss how such a system could be realized on a public network such as the Internet.

  4. Assessing Digital Student Productions, a Design-Based Research Study on the Development of a Criteria-Based Assessment Tool for Students’ Digital Multimodal Productions

    DEFF Research Database (Denmark)

    Hoffmeyer, Mikkeline; Jensen, Jesper Juellund; Olsen, Marie Veisegaard

    2017-01-01

    Digital multimodal production is becoming increasingly important as a 21st century skill and as a learning condition in school (K-12). Moreover, there is a growing attention to the significance of criteria-based assessment for learning. Nevertheless, assessment of students’ digital multimodal...... productions is often vague or lacking. Therefore, the research project aims at developing a tool to support assessment of student’s digital multimodal productions through a design-based research method. This paper presents a proposal for issues to be considered through a prototyping phase, based on interviews...

  5. On school choice and test-based accountability.

    Directory of Open Access Journals (Sweden)

    Damian W. Betebenner

    2005-10-01

    Full Text Available Among the two most prominent school reform measures currently being implemented in The United States are school choice and test-based accountability. Until recently, the two policy initiatives remained relatively distinct from one another. With the passage of the No Child Left Behind Act of 2001 (NCLB, a mutualism between choice and accountability emerged whereby school choice complements test-based accountability. In the first portion of this study we present a conceptual overview of school choice and test-based accountability and explicate connections between the two that are explicit in reform implementations like NCLB or implicit within the market-based reform literature in which school choice and test-based accountability reside. In the second portion we scrutinize the connections, in particular, between school choice and test-based accountability using a large western school district with a popular choice system in place. Data from three sources are combined to explore the ways in which school choice and test-based accountability draw on each other: state assessment data of children in the district, school choice data for every participating student in the district choice program, and a parental survey of both participants and non-participants of choice asking their attitudes concerning the use of school report cards in the district. Results suggest that choice is of benefit academically to only the lowest achieving students, choice participation is not uniform across different ethnic groups in the district, and parents' primary motivations as reported on a survey for participation in choice are not due to test scores, though this is not consistent with choice preferences among parents in the district. As such, our results generally confirm the hypotheses of choice critics more so than advocates. Keywords: school choice; accountability; student testing.

  6. 41 CFR 301-71.3 - May we use electronic signatures on travel documents?

    Science.gov (United States)

    2010-07-01

    ... signatures on travel documents? 301-71.3 Section 301-71.3 Public Contracts and Property Management Federal Travel Regulation System TEMPORARY DUTY (TDY) TRAVEL ALLOWANCES AGENCY RESPONSIBILITIES 71-AGENCY TRAVEL ACCOUNTABILITY REQUIREMENTS General § 301-71.3 May we use electronic signatures on travel documents? Yes, if you...

  7. Collaborative learning model inquiring based on digital game

    Science.gov (United States)

    Yuan, Jiugen; Xing, Ruonan

    2012-04-01

    With the development of computer education software, digital educational game has become an important part in our life, entertainment and education. Therefore how to make full use of digital game's teaching functions and educate through entertainment has become the focus of current research. The thesis make a connection between educational game and collaborative learning, the current popular teaching model, and concludes digital game-based collaborative learning model combined with teaching practice.

  8. Random number generation based on digital differential chaos

    KAUST Repository

    Zidan, Mohammed A.; Radwan, Ahmed G.; Salama, Khaled N.

    2012-01-01

    In this paper, we present a fully digital differential chaos based random number generator. The output of the digital circuit is proved to be chaotic by calculating the output time series maximum Lyapunov exponent. We introduce a new post processing

  9. Consideration of the Change of Material Emission Signatures due to Longterm Emissions for Enhancing VOC Source Identification

    DEFF Research Database (Denmark)

    Han, K. H.; Zhang, J. S.; Knudsen, Henrik Nellemose

    2011-01-01

    The objectives of this study were to characterize the changes of VOC material emission profiles over time and develop a method to account for such changes in order to enhance a source identification technique that is based on the measurements of mixed air samples and the emission signatures of in...

  10. DNA methylation–based immune response signature improves patient diagnosis in multiple cancers

    Science.gov (United States)

    Jeschke, Jana; Bizet, Martin; Calonne, Emilie; Dedeurwaerder, Sarah; Garaud, Soizic; Koch, Alexander; Larsimont, Denis; Salgado, Roberto; Van den Eynden, Gert; Willard Gallo, Karen; Defrance, Matthieu; Sotiriou, Christos

    2017-01-01

    BACKGROUND. The tumor immune response is increasingly associated with better clinical outcomes in breast and other cancers. However, the evaluation of tumor-infiltrating lymphocytes (TILs) relies on histopathological measurements with limited accuracy and reproducibility. Here, we profiled DNA methylation markers to identify a methylation of TIL (MeTIL) signature that recapitulates TIL evaluations and their prognostic value for long-term outcomes in breast cancer (BC). METHODS. MeTIL signature scores were correlated with clinical endpoints reflecting overall or disease-free survival and a pathologic complete response to preoperative anthracycline therapy in 3 BC cohorts from the Jules Bordet Institute in Brussels and in other cancer types from The Cancer Genome Atlas. RESULTS. The MeTIL signature measured TIL distributions in a sensitive manner and predicted survival and response to chemotherapy in BC better than did histopathological assessment of TILs or gene expression–based immune markers, respectively. The MeTIL signature also improved the prediction of survival in other malignancies, including melanoma and lung cancer. Furthermore, the MeTIL signature predicted differences in survival for malignancies in which TILs were not known to have a prognostic value. Finally, we showed that MeTIL markers can be determined by bisulfite pyrosequencing of small amounts of DNA from formalin-fixed, paraffin-embedded tumor tissue, supporting clinical applications for this methodology. CONCLUSIONS. This study highlights the power of DNA methylation to evaluate tumor immune responses and the potential of this approach to improve the diagnosis and treatment of breast and other cancers. FUNDING. This work was funded by the Fonds National de la Recherche Scientifique (FNRS) and Télévie, the INNOVIRIS Brussels Region BRUBREAST Project, the IUAP P7/03 program, the Belgian “Foundation against Cancer,” the Breast Cancer Research Foundation (BCRF), and the Fonds Gaston Ithier

  11. Information processing through a bio-based redox capacitor: signatures for redox-cycling.

    Science.gov (United States)

    Liu, Yi; Kim, Eunkyoung; White, Ian M; Bentley, William E; Payne, Gregory F

    2014-08-01

    Redox-cycling compounds can significantly impact biological systems and can be responsible for activities that range from pathogen virulence and contaminant toxicities, to therapeutic drug mechanisms. Current methods to identify redox-cycling activities rely on the generation of reactive oxygen species (ROS), and employ enzymatic or chemical methods to detect ROS. Here, we couple the speed and sensitivity of electrochemistry with the molecular-electronic properties of a bio-based redox-capacitor to generate signatures of redox-cycling. The redox capacitor film is electrochemically-fabricated at the electrode surface and is composed of a polysaccharide hydrogel with grafted catechol moieties. This capacitor film is redox-active but non-conducting and can engage diffusible compounds in either oxidative or reductive redox-cycling. Using standard electrochemical mediators ferrocene dimethanol (Fc) and Ru(NH3)6Cl3 (Ru(3+)) as model redox-cyclers, we observed signal amplifications and rectifications that serve as signatures of redox-cycling. Three bio-relevant compounds were then probed for these signatures: (i) ascorbate, a redox-active compound that does not redox-cycle; (ii) pyocyanin, a virulence factor well-known for its reductive redox-cycling; and (iii) acetaminophen, an analgesic that oxidatively redox-cycles but also undergoes conjugation reactions. These studies demonstrate that the redox-capacitor can enlist the capabilities of electrochemistry to generate rapid and sensitive signatures of biologically-relevant chemical activities (i.e., redox-cycling). Published by Elsevier B.V.

  12. OLS DIGITAL DERIVED LIGHTNING FROM DMSP F10 V1

    Data.gov (United States)

    National Aeronautics and Space Administration — The OLS Digital Derived Lightning from DMSP F10 dataset consists of global lightning signatures from the Defense Meteorological Satellite Program (DMSP) Operational...

  13. Microbiota-based Signature of Gingivitis Treatments: A Randomized Study.

    Science.gov (United States)

    Huang, Shi; Li, Zhen; He, Tao; Bo, Cunpei; Chang, Jinlan; Li, Lin; He, Yanyan; Liu, Jiquan; Charbonneau, Duane; Li, Rui; Xu, Jian

    2016-04-20

    Plaque-induced gingivitis can be alleviated by various treatment regimens. To probe the impacts of various anti-gingivitis treatments on plaque microflora, here a double blinded, randomized controlled trial of 91 adults with moderate gingivitis was designed with two anti-gingivitis regimens: the brush-alone treatment and the brush-plus-rinse treatment. In the later group, more reduction in both Plaque Index (TMQHI) and Gingival Index (mean MGI) at Day 3, Day 11 and Day 27 was evident, and more dramatic changes were found between baseline and other time points for both supragingival plaque microbiota structure and salivary metabonomic profiles. A comparison of plaque microbiota changes was also performed between these two treatments and a third dataset where 50 subjects received regimen of dental scaling. Only Actinobaculum, TM7 and Leptotrichia were consistently reduced by all the three treatments, whereas the different microbial signatures of the three treatments during gingivitis relieve indicate distinct mechanisms of action. Our study suggests that microbiota based signatures can serve as a valuable approach for understanding and potentially comparing the modes of action for clinical treatments and oral-care products in the future.

  14. Enhanced DET-Based Fault Signature Analysis for Reliable Diagnosis of Single and Multiple-Combined Bearing Defects

    Directory of Open Access Journals (Sweden)

    In-Kyu Jeong

    2015-01-01

    Full Text Available To early identify cylindrical roller bearing failures, this paper proposes a comprehensive bearing fault diagnosis method, which consists of spectral kurtosis analysis for finding the most informative subband signal well representing abnormal symptoms about the bearing failures, fault signature calculation using this subband signal, enhanced distance evaluation technique- (EDET- based fault signature analysis that outputs the most discriminative fault features for accurate diagnosis, and identification of various single and multiple-combined cylindrical roller bearing defects using the simplified fuzzy adaptive resonance map (SFAM. The proposed comprehensive bearing fault diagnosis methodology is effective for accurate bearing fault diagnosis, yielding an average classification accuracy of 90.35%. In this paper, the proposed EDET specifically addresses shortcomings in the conventional distance evaluation technique (DET by accurately estimating the sensitivity of each fault signature for each class. To verify the efficacy of the EDET-based fault signature analysis for accurate diagnosis, a diagnostic performance comparison is carried between the proposed EDET and the conventional DET in terms of average classification accuracy. In fact, the proposed EDET achieves up to 106.85% performance improvement over the conventional DET in average classification accuracy.

  15. Carbon Nanotubes-Based Digitally Programmable Current Follower

    Directory of Open Access Journals (Sweden)

    S. K. Tripathi

    2018-01-01

    Full Text Available The physical constraints of ever-shrinking CMOS transistors are rapidly approaching atomistic and quantum mechanical limits. Therefore, research is now directed towards the development of nanoscale devices that could work efficiently in the sub-10 nm regime. This coupled with the fact that recent design trend for analog signal processing applications is moving towards current-mode circuits which offer lower voltage swings, higher bandwidth, and better signal linearity is the motivation for this work. A digitally controlled DVCC has been realized using CNFETs. This work exploited the CNFET’s parameters like chirality, pitch, and numbers of CNTs to perform the digital control operation. The circuit has minimum number of transistors and can control the output current digitally. A similar CMOS circuit with 32 nm CMOS parameters was also simulated and compared. The result shows that CMOS-based circuit requires 418.6 μW while CNFET-based circuit consumes 352.1 μW only. Further, the proposed circuit is used to realize a CNFET-based instrumentation amplifier with digitally programmable gain. The amplifier has a CMRR of 100 dB and ICMR equal to 0.806 V. The 3 dB bandwidth of the amplifier is 11.78 GHz which is suitable for the applications like navigation, radar instrumentation, and high-frequency signal amplification and conditioning.

  16. An experimental magnetic moment determination method based on spatial harmonic analysis of magnetic flux density signatures

    Directory of Open Access Journals (Sweden)

    A.V. Getman

    2013-12-01

    Full Text Available Theoretical aspects of an experimental determination method for residual and inductive magnetic moments of a technical object are considered. As input data, the technical object magnetic induction signatures obtained under its linear movement near a pair of three-component sensors are used. A magnetic signature integration technique based on spatial harmonic analysis of the magnetic field represented by twenty-four multipole coefficients is introduced.

  17. Toward a hyperspectral optical signature of extra virgin olive oil

    Science.gov (United States)

    Mignani, A. G.; Ciaccheri, L.; Thienpont, H.; Ottevaere, H.; Attilio, C.; Cimato, A.

    2007-05-01

    Italian extra virgin olive oils bearing labels of certified area of origin were considered. Their multispectral digital signature was measured by means of absorption spectroscopy in the 200-1700 nm spectral range. The instrumentation was a fiber optic-based, cheap, and compact device. The spectral data were processed by means of multivariate analysis and plotted on a 2D classification map. The map showed sharp clusters according to the geographical origin of the oils, thus demonstrating the potentials of UV-VIS-NIR spectroscopy for optical fingerprinting. Then, the spectral data were correlated to the content of the most important fatty acids. The good fitting achieved demonstrated that the optical fingerprinting can be used also for predicting nutritional and chemical parameters.

  18. 21 CFR 11.200 - Electronic signature components and controls.

    Science.gov (United States)

    2010-04-01

    ... signature components and controls. (a) Electronic signatures that are not based upon biometrics shall: (1) Employ at least two distinct identification components such as an identification code and password. (i... signatures based upon biometrics shall be designed to ensure that they cannot be used by anyone other than...

  19. Assessing the robustness of quantitative fatty acid signature analysis to assumption violations

    Science.gov (United States)

    Bromaghin, Jeffrey F.; Budge, Suzanne M.; Thiemann, Gregory W.; Rode, Karyn D.

    2016-01-01

      Knowledge of animal diets can provide important insights into life history and ecology, relationships among species in a community and potential response to ecosystem change or perturbation. Quantitative fatty acid signature analysis (QFASA) is a method of estimating diets from data on the composition, or signature, of fatty acids stored in adipose tissue. Given data on signatures of potential prey, a predator diet is estimated by minimizing the distance between its signature and a mixture of prey signatures. Calibration coefficients, constants derived from feeding trials, are used to account for differential metabolism of individual fatty acids. QFASA has been widely applied since its introduction and several variants of the original estimator have appeared in the literature. However, work to compare the statistical properties of QFASA estimators has been limited.

  20. Are there signature limits in early theory of mind?

    Science.gov (United States)

    Fizke, Ella; Butterfill, Stephen; van de Loo, Lea; Reindl, Eva; Rakoczy, Hannes

    2017-10-01

    Current theory-of-mind research faces the challenge of reconciling two sets of seemingly incompatible findings: Whereas children come to solve explicit verbal false belief (FB) tasks from around 4years of age, recent studies with various less explicit measures such as looking time, anticipatory looking, and spontaneous behavior suggest that even infants can succeed on some FB tasks. In response to this tension, two-systems theories propose to distinguish between an early-developing system, tracking simple forms of mental states, and a later-developing system, based on fully developed concepts of belief and other propositional attitudes. One prediction of such theories is that the early-developing system has signature limits concerning aspectuality. We tested this prediction in two experiments. The first experiment showed (in line with previous findings) that 2- and 3-year-olds take into account a protagonist's true or false belief about the location of an object in their active helping behavior. In contrast, toddlers' helping behavior did not differentiate between true and false belief conditions when the protagonist's belief essentially involved aspectuality. Experiment 2 replicated these findings with a more stringent method designed to rule out more parsimonious explanations. Taken together, the current findings are compatible with the possibility that early theory-of-mind reasoning is subject to signature limits as predicted by the two-systems account. Copyright © 2017 Elsevier Inc. All rights reserved.

  1. Can specific transcriptional regulators assemble a universal cancer signature?

    Science.gov (United States)

    Roy, Janine; Isik, Zerrin; Pilarsky, Christian; Schroeder, Michael

    2013-10-01

    Recently, there is a lot of interest in using biomarker signatures derived from gene expression data to predict cancer progression. We assembled signatures of 25 published datasets covering 13 types of cancers. How do these signatures compare with each other? On one hand signatures answering the same biological question should overlap, whereas signatures predicting different cancer types should differ. On the other hand, there could also be a Universal Cancer Signature that is predictive independently of the cancer type. Initially, we generate signatures for all datasets using classical approaches such as t-test and fold change and then, we explore signatures resulting from a network-based method, that applies the random surfer model of Google's PageRank algorithm. We show that the signatures as published by the authors and the signatures generated with classical methods do not overlap - not even for the same cancer type - whereas the network-based signatures strongly overlap. Selecting 10 out of 37 universal cancer genes gives the optimal prediction for all cancers thus taking a first step towards a Universal Cancer Signature. We furthermore analyze and discuss the involved genes in terms of the Hallmarks of cancer and in particular single out SP1, JUN/FOS and NFKB1 and examine their specific role in cancer progression.

  2. Network-based Arbitrated Quantum Signature Scheme with Graph State

    Science.gov (United States)

    Ma, Hongling; Li, Fei; Mao, Ningyi; Wang, Yijun; Guo, Ying

    2017-08-01

    Implementing an arbitrated quantum signature(QAS) through complex networks is an interesting cryptography technology in the literature. In this paper, we propose an arbitrated quantum signature for the multi-user-involved networks, whose topological structures are established by the encoded graph state. The determinative transmission of the shared keys, is enabled by the appropriate stabilizers performed on the graph state. The implementation of this scheme depends on the deterministic distribution of the multi-user-shared graph state on which the encoded message can be processed in signing and verifying phases. There are four parties involved, the signatory Alice, the verifier Bob, the arbitrator Trent and Dealer who assists the legal participants in the signature generation and verification. The security is guaranteed by the entanglement of the encoded graph state which is cooperatively prepared by legal participants in complex quantum networks.

  3. Image Processing Based Signature Verification Technique to Reduce Fraud in Financial Institutions

    Directory of Open Access Journals (Sweden)

    Hussein Walid

    2016-01-01

    Full Text Available Handwritten signature is broadly utilized as personal verification in financial institutions ensures the necessity for a robust automatic signature verification tool. This tool aims to reduce fraud in all related financial transactions’ sectors. This paper proposes an online, robust, and automatic signature verification technique using the recent advances in image processing and machine learning. Once the image of a handwritten signature for a customer is captured, several pre-processing steps are performed on it including filtration and detection of the signature edges. Afterwards, a feature extraction process is applied on the image to extract Speeded up Robust Features (SURF and Scale-Invariant Feature Transform (SIFT features. Finally, a verification process is developed and applied to compare the extracted image features with those stored in the database for the specified customer. Results indicate high accuracy, simplicity, and rapidity of the developed technique, which are the main criteria to judge a signature verification tool in banking and other financial institutions.

  4. Hyperheat: a thermal signature model for super- and hypersonic missiles

    Science.gov (United States)

    van Binsbergen, S. A.; van Zelderen, B.; Veraar, R. G.; Bouquet, F.; Halswijk, W. H. C.; Schleijpen, H. M. A.

    2017-10-01

    In performance prediction of IR sensor systems for missile detection, apart from the sensor specifications, target signatures are essential variables. Very often, for velocities up to Mach 2-2.5, a simple model based on the aerodynamic heating of a perfect gas was used to calculate the temperatures of missile targets. This typically results in an overestimate of the target temperature with correspondingly large infrared signatures and detection ranges. Especially for even higher velocities, this approach is no longer accurate. Alternatives like CFD calculations typically require more complex sets of inputs and significantly more computing power. The MATLAB code Hyperheat was developed to calculate the time-resolved skin temperature of axisymmetric high speed missiles during flight, taking into account the behaviour of non-perfect gas and proper heat transfer to the missile surface. Allowing for variations in parameters like missile shape, altitude, atmospheric profile, angle of attack, flight duration and super- and hypersonic velocities up to Mach 30 enables more accurate calculations of the actual target temperature. The model calculates a map of the skin temperature of the missile, which is updated over the flight time of the missile. The sets of skin temperature maps are calculated within minutes, even for >100 km trajectories, and can be easily converted in thermal infrared signatures for further processing. This paper discusses the approach taken in Hyperheat. Then, the thermal signature of a set of typical missile threats is calculated using both the simple aerodynamic heating model and the Hyperheat code. The respective infrared signatures are compared, as well as the difference in the corresponding calculated detection ranges.

  5. A secure quantum group signature scheme based on Bell states

    International Nuclear Information System (INIS)

    Zhang Kejia; Song Tingting; Zuo Huijuan; Zhang Weiwei

    2013-01-01

    In this paper, we propose a new secure quantum group signature with Bell states, which may have applications in e-payment system, e-government, e-business, etc. Compared with the recent quantum group signature protocols, our scheme is focused on the most general situation in practice, i.e. only the arbitrator is trusted and no intermediate information needs to be stored in the signing phase to ensure the security. Furthermore, our scheme has achieved all the characteristics of group signature—anonymity, verifiability, traceability, unforgetability and undeniability, by using some current developed quantum and classical technologies. Finally, a feasible security analysis model for quantum group signature is presented. (paper)

  6. The Role of IT Literacy in Defining Digital Divide Policy Needs

    Science.gov (United States)

    Ferro, Enrico; Helbig, Natalie C.; Gil-Garcia, J. Ramon

    2011-01-01

    This article expands our current understanding of the digital divide by examining differences in individuals' IT skills acquisition. In the last two decades scholars have gradually refined the conceptualization of the digital divide, moving from a dichotomous model mainly based on access, to a multidimensional model accounting for differences in…

  7. Investigating User Interfaces of Non-Iranian Digital Libraries based on Social Bookmarking Capabilities and Characteristics to Use by Iranian Digital Libraries

    Directory of Open Access Journals (Sweden)

    Zahra Naseri

    2016-08-01

    Full Text Available Current study aims to investigate the status of user interfaces of non-Iranian digital libraries’ based on social bookmarking capabilities and characteristics to use by Iranian digital libraries. This research studies the characteristics and capabilities of top digital libraries’ user interfaces in the world based on social bookmarking used by library users. This capability facilitates producing, identifying, organizing, and sharing contents using tags. Survey method was used with descriptive-analytical approach in this study. Populations include non-Iranian digital libraries interfaces. Top ten digital libraries’ interfaces were selected as the sample. A researcher-made checklist prepared based on literature review and investigating four distinguished websites (Library Thing, Delicious, Amazon, and Google Book. Faced validity evaluated by 10 experts’ viewpoints, then reliability calculated 0.87.Findings of this study are important because of two reasons: first, it provides a comprehensive and an unambiguous vision for recognizing user interfaces’ basic capabilities and characteristics based on social bookmarking. Second, it can provide a base for designing digital libraries in Iran. The results showed that the majority of digital libraries around the world had not used web 2.0 characteristics such as producing, identifying, organizing, and sharing contents except two digital libraries (Google Books, and Ibiblio.

  8. Development of prototype induced-fission-based Pu accountancy instrument for safeguards applications.

    Science.gov (United States)

    Seo, Hee; Lee, Seung Kyu; An, Su Jung; Park, Se-Hwan; Ku, Jeong-Hoe; Menlove, Howard O; Rael, Carlos D; LaFleur, Adrienne M; Browne, Michael C

    2016-09-01

    Prototype safeguards instrument for nuclear material accountancy (NMA) of uranium/transuranic (U/TRU) products that could be produced in a future advanced PWR fuel processing facility has been developed and characterized. This is a new, hybrid neutron measurement system based on fast neutron energy multiplication (FNEM) and passive neutron albedo reactivity (PNAR) methods. The FNEM method is sensitive to the induced fission rate by fast neutrons, while the PNAR method is sensitive to the induced fission rate by thermal neutrons in the sample to be measured. The induced fission rate is proportional to the total amount of fissile material, especially plutonium (Pu), in the U/TRU product; hence, the Pu amount can be calibrated as a function of the induced fission rate, which can be measured using either the FNEM or PNAR method. In the present study, the prototype system was built using six (3)He tubes, and its performance was evaluated for various detector parameters including high-voltage (HV) plateau, efficiency profiles, dead time, and stability. The system's capability to measure the difference in the average neutron energy for the FNEM signature also was evaluated, using AmLi, PuBe, (252)Cf, as well as four Pu-oxide sources each with a different impurity (Al, F, Mg, and B) and producing (α,n) neutrons with different average energies. Future work will measure the hybrid signature (i.e., FNEM×PNAR) for a Pu source with an external interrogating neutron source after enlarging the cavity size of the prototype system to accommodate a large-size Pu source (~600g Pu). Copyright © 2016 Elsevier Ltd. All rights reserved.

  9. Genome signature analysis of thermal virus metagenomes reveals Archaea and thermophilic signatures.

    Science.gov (United States)

    Pride, David T; Schoenfeld, Thomas

    2008-09-17

    Metagenomic analysis provides a rich source of biological information for otherwise intractable viral communities. However, study of viral metagenomes has been hampered by its nearly complete reliance on BLAST algorithms for identification of DNA sequences. We sought to develop algorithms for examination of viral metagenomes to identify the origin of sequences independent of BLAST algorithms. We chose viral metagenomes obtained from two hot springs, Bear Paw and Octopus, in Yellowstone National Park, as they represent simple microbial populations where comparatively large contigs were obtained. Thermal spring metagenomes have high proportions of sequences without significant Genbank homology, which has hampered identification of viruses and their linkage with hosts. To analyze each metagenome, we developed a method to classify DNA fragments using genome signature-based phylogenetic classification (GSPC), where metagenomic fragments are compared to a database of oligonucleotide signatures for all previously sequenced Bacteria, Archaea, and viruses. From both Bear Paw and Octopus hot springs, each assembled contig had more similarity to other metagenome contigs than to any sequenced microbial genome based on GSPC analysis, suggesting a genome signature common to each of these extreme environments. While viral metagenomes from Bear Paw and Octopus share some similarity, the genome signatures from each locale are largely unique. GSPC using a microbial database predicts most of the Octopus metagenome has archaeal signatures, while bacterial signatures predominate in Bear Paw; a finding consistent with those of Genbank BLAST. When using a viral database, the majority of the Octopus metagenome is predicted to belong to archaeal virus Families Globuloviridae and Fuselloviridae, while none of the Bear Paw metagenome is predicted to belong to archaeal viruses. As expected, when microbial and viral databases are combined, each of the Octopus and Bear Paw metagenomic contigs

  10. Uncertainty in hydrological signatures for gauged and ungauged catchments

    Science.gov (United States)

    Westerberg, Ida K.; Wagener, Thorsten; Coxon, Gemma; McMillan, Hilary K.; Castellarin, Attilio; Montanari, Alberto; Freer, Jim

    2016-03-01

    Reliable information about hydrological behavior is needed for water-resource management and scientific investigations. Hydrological signatures quantify catchment behavior as index values, and can be predicted for ungauged catchments using a regionalization procedure. The prediction reliability is affected by data uncertainties for the gauged catchments used in prediction and by uncertainties in the regionalization procedure. We quantified signature uncertainty stemming from discharge data uncertainty for 43 UK catchments and propagated these uncertainties in signature regionalization, while accounting for regionalization uncertainty with a weighted-pooling-group approach. Discharge uncertainty was estimated using Monte Carlo sampling of multiple feasible rating curves. For each sampled rating curve, a discharge time series was calculated and used in deriving the gauged signature uncertainty distribution. We found that the gauged uncertainty varied with signature type, local measurement conditions and catchment behavior, with the highest uncertainties (median relative uncertainty ±30-40% across all catchments) for signatures measuring high- and low-flow magnitude and dynamics. Our regionalization method allowed assessing the role and relative magnitudes of the gauged and regionalized uncertainty sources in shaping the signature uncertainty distributions predicted for catchments treated as ungauged. We found that (1) if the gauged uncertainties were neglected there was a clear risk of overconditioning the regionalization inference, e.g., by attributing catchment differences resulting from gauged uncertainty to differences in catchment behavior, and (2) uncertainty in the regionalization results was lower for signatures measuring flow distribution (e.g., mean flow) than flow dynamics (e.g., autocorrelation), and for average flows (and then high flows) compared to low flows.

  11. CANDID: Comparison algorithm for navigating digital image databases

    Energy Technology Data Exchange (ETDEWEB)

    Kelly, P.M.; Cannon, T.M.

    1994-02-21

    In this paper, we propose a method for calculating the similarity between two digital images. A global signature describing the texture, shape, or color content is first computed for every image stored in a database, and a normalized distance between probability density functions of feature vectors is used to match signatures. This method can be used to retrieve images from a database that are similar to an example target image. This algorithm is applied to the problem of search and retrieval for database containing pulmonary CT imagery, and experimental results are provided.

  12. Facebook e accountability: um estudo de caso da fanpage da presidente Dilma Rousseff

    Directory of Open Access Journals (Sweden)

    Brenda Parmeggiani

    2015-04-01

    Full Text Available The emergence of new digital technologies creates expectations about new forms of communication, including in politics and political communication. Including, the public clamors for accountability mechanisms nowadays. Therefore, we ask: Can Facebook be used as an accountability tool? The study, firstly, requires a discussion on key concepts such as accountability, transparency and publicity, as well as a brief history of the Social Networking Sites (SRS. Based on these considerations, we conclude that Facebook can indeed be used as an instrument of accountability, but it is not by nature. Thus, we develop an analysis of the case of Dilma Rousseff’s fanpage. While the potential of digital media to perform such a task is clear, it appears that the page of the Brazilian president in SRS does not accomplish this purpose.

  13. Computational Account of Spontaneous Activity as a Signature of Predictive Coding.

    Directory of Open Access Journals (Sweden)

    Veronika Koren

    2017-01-01

    Full Text Available Spontaneous activity is commonly observed in a variety of cortical states. Experimental evidence suggested that neural assemblies undergo slow oscillations with Up ad Down states even when the network is isolated from the rest of the brain. Here we show that these spontaneous events can be generated by the recurrent connections within the network and understood as signatures of neural circuits that are correcting their internal representation. A noiseless spiking neural network can represent its input signals most accurately when excitatory and inhibitory currents are as strong and as tightly balanced as possible. However, in the presence of realistic neural noise and synaptic delays, this may result in prohibitively large spike counts. An optimal working regime can be found by considering terms that control firing rates in the objective function from which the network is derived and then minimizing simultaneously the coding error and the cost of neural activity. In biological terms, this is equivalent to tuning neural thresholds and after-spike hyperpolarization. In suboptimal working regimes, we observe spontaneous activity even in the absence of feed-forward inputs. In an all-to-all randomly connected network, the entire population is involved in Up states. In spatially organized networks with local connectivity, Up states spread through local connections between neurons of similar selectivity and take the form of a traveling wave. Up states are observed for a wide range of parameters and have similar statistical properties in both active and quiescent state. In the optimal working regime, Up states are vanishing, leaving place to asynchronous activity, suggesting that this working regime is a signature of maximally efficient coding. Although they result in a massive increase in the firing activity, the read-out of spontaneous Up states is in fact orthogonal to the stimulus representation, therefore interfering minimally with the network

  14. An Embedded Based Digital Controller for Thermal Process

    Directory of Open Access Journals (Sweden)

    A. Lakshmi Sangeetha

    2008-01-01

    Full Text Available This paper describes a low cost virtual instrumentation (VI system to monitor and control the electrically heated water bath temperature. The PIC16F877 based digital microcontroller is used as thermostat which controls and monitors the temperature. The digital controller also allows the user to modify the sensor (PT100 calibration data values if necessary. The developed programmable on/off control function provides on-line display of measuring temperature, set point as well as the control function output plots through the parallel port. This bus interaction is realized in Visual Basic/Assembly Language and uses a 16 bit, 10 ms sampling analog-to-digital converter (ADS 7805 for monitoring and controlling the parameters of the temperature local digital controller.

  15. Forum: Is Test-Based Accountability Dead?

    Science.gov (United States)

    Polikoff, Morgan S.; Greene, Jay P.; Huffman, Kevin

    2017-01-01

    Since the 2001 passage of the No Child Left Behind Act (NCLB), test-based accountability has been an organizing principle--perhaps "the" organizing principle--of efforts to improve American schools. But lately, accountability has been under fire from many critics, including Common Core opponents and those calling for more multifaceted…

  16. Maximizing biomarker discovery by minimizing gene signatures

    Directory of Open Access Journals (Sweden)

    Chang Chang

    2011-12-01

    Full Text Available Abstract Background The use of gene signatures can potentially be of considerable value in the field of clinical diagnosis. However, gene signatures defined with different methods can be quite various even when applied the same disease and the same endpoint. Previous studies have shown that the correct selection of subsets of genes from microarray data is key for the accurate classification of disease phenotypes, and a number of methods have been proposed for the purpose. However, these methods refine the subsets by only considering each single feature, and they do not confirm the association between the genes identified in each gene signature and the phenotype of the disease. We proposed an innovative new method termed Minimize Feature's Size (MFS based on multiple level similarity analyses and association between the genes and disease for breast cancer endpoints by comparing classifier models generated from the second phase of MicroArray Quality Control (MAQC-II, trying to develop effective meta-analysis strategies to transform the MAQC-II signatures into a robust and reliable set of biomarker for clinical applications. Results We analyzed the similarity of the multiple gene signatures in an endpoint and between the two endpoints of breast cancer at probe and gene levels, the results indicate that disease-related genes can be preferably selected as the components of gene signature, and that the gene signatures for the two endpoints could be interchangeable. The minimized signatures were built at probe level by using MFS for each endpoint. By applying the approach, we generated a much smaller set of gene signature with the similar predictive power compared with those gene signatures from MAQC-II. Conclusions Our results indicate that gene signatures of both large and small sizes could perform equally well in clinical applications. Besides, consistency and biological significances can be detected among different gene signatures, reflecting the

  17. Similar digit-based working memory in deaf signers and hearing non-signers despite digit span differences

    Directory of Open Access Journals (Sweden)

    Josefine eAndin

    2013-12-01

    Full Text Available Similar working memory (WM for lexical items has been demonstrated for signers and non-signers while short-term memory (STM is regularly poorer in deaf than hearing individuals. In the present study, we investigated digit-based WM and STM in Swedish and British deaf signers and hearing non-signers. To maintain good experimental control we used printed stimuli throughout and held response mode constant across groups. We showed that deaf signers have similar digit-based WM performance, despite shorter digit spans, compared to well-matched hearing non-signers. We found no difference between signers and non-signers on STM span for letters chosen to minimize phonological similarity or in the effects of recall direction. This set of findings indicates that similar WM for signers and non-signers can be generalized from lexical items to digits and suggests that poorer STM in deaf signers compared to hearing non-signers may be due to differences in phonological similarity across the language modalities of sign and speech.

  18. An Incomplete Cryptography based Digital Rights Management with DCFF

    OpenAIRE

    Thanh, Ta Minh; Iwakiri, Munetoshi

    2014-01-01

    In general, DRM (Digital Rights Management) system is responsible for the safe distribution of digital content, however, DRM system is achieved with individual function modules of cryptography, watermarking and so on. In this typical system flow, it has a problem that all original digital contents are temporarily disclosed with perfect condition via decryption process. In this paper, we propose the combination of the differential codes and fragile fingerprinting (DCFF) method based on incompl...

  19. Inverter-based successive approximation capacitance-to-digital converter

    KAUST Repository

    Omran, Hesham

    2017-03-23

    An energy-efficient capacitance-to-digital converter (CDC) is provided that utilizes a capacitance-domain successive approximation (SAR) technique. Unlike SAR analog- to-digital converters (ADCs), analysis shows that for SAR CDCs, the comparator offset voltage will result in signal-dependent and parasitic-dependent conversion errors, which necessitates an op-amp-based implementation. The inverter-based SAR CDC contemplated herein provides robust, energy-efficient, and fast operation. The inverter- based SAR CDC may include a hybrid coarse-fine programmable capacitor array. The design of example embodiments is insensitive to analog references, and thus achieves very low temperature sensitivity without the need for calibration. Moreover, this design achieves improved energy efficiency.

  20. Mechanics of evolutionary digit reduction in fossil horses (Equidae).

    Science.gov (United States)

    McHorse, Brianna K; Biewener, Andrew A; Pierce, Stephanie E

    2017-08-30

    Digit reduction is a major trend that characterizes horse evolution, but its causes and consequences have rarely been quantitatively tested. Using beam analysis on fossilized centre metapodials, we tested how locomotor bone stresses changed with digit reduction and increasing body size across the horse lineage. Internal bone geometry was captured from 13 fossil horse genera that covered the breadth of the equid phylogeny and the spectrum of digit reduction and body sizes, from Hyracotherium to Equus To account for the load-bearing role of side digits, a novel, continuous measure of digit reduction was also established-toe reduction index (TRI). Our results show that without accounting for side digits, three-toed horses as late as Parahippus would have experienced physiologically untenable bone stresses. Conversely, when side digits are modelled as load-bearing, species at the base of the horse radiation through Equus probably maintained a similar safety factor to fracture stress. We conclude that the centre metapodial compensated for evolutionary digit reduction and body mass increases by becoming more resistant to bending through substantial positive allometry in internal geometry. These results lend support to two historical hypotheses: that increasing body mass selected for a single, robust metapodial rather than several smaller ones; and that, as horse limbs became elongated, the cost of inertia from the side toes outweighed their utility for stabilization or load-bearing. © 2017 The Author(s).

  1. Nonintrusive Load Monitoring Based on Advanced Deep Learning and Novel Signature

    Directory of Open Access Journals (Sweden)

    Jihyun Kim

    2017-01-01

    Full Text Available Monitoring electricity consumption in the home is an important way to help reduce energy usage. Nonintrusive Load Monitoring (NILM is existing technique which helps us monitor electricity consumption effectively and costly. NILM is a promising approach to obtain estimates of the electrical power consumption of individual appliances from aggregate measurements of voltage and/or current in the distribution system. Among the previous studies, Hidden Markov Model (HMM based models have been studied very much. However, increasing appliances, multistate of appliances, and similar power consumption of appliances are three big issues in NILM recently. In this paper, we address these problems through providing our contributions as follows. First, we proposed state-of-the-art energy disaggregation based on Long Short-Term Memory Recurrent Neural Network (LSTM-RNN model and additional advanced deep learning. Second, we proposed a novel signature to improve classification performance of the proposed model in multistate appliance case. We applied the proposed model on two datasets such as UK-DALE and REDD. Via our experimental results, we have confirmed that our model outperforms the advanced model. Thus, we show that our combination between advanced deep learning and novel signature can be a robust solution to overcome NILM’s issues and improve the performance of load identification.

  2. Intermediate Frequency Digital Receiver Based on Multi-FPGA System

    Directory of Open Access Journals (Sweden)

    Chengchang Zhang

    2016-01-01

    Full Text Available Aiming at high-cost, large-size, and inflexibility problems of traditional analog intermediate frequency receiver in the aerospace telemetry, tracking, and command (TTC system, we have proposed a new intermediate frequency (IF digital receiver based on Multi-FPGA system in this paper. Digital beam forming (DBF is realized by coordinated rotation digital computer (CORDIC algorithm. An experimental prototype has been developed on a compact Multi-FPGA system with three FPGAs to receive 16 channels of IF digital signals. Our experimental results show that our proposed scheme is able to provide a great convenience for the design of IF digital receiver, which offers a valuable reference for real-time, low power, high density, and small size receiver design.

  3. Effect of External Vibration on PZT Impedance Signature

    Directory of Open Access Journals (Sweden)

    Yaowen Yang

    2008-11-01

    Full Text Available Piezoelectric ceramic Lead Zirconate Titanate (PZT transducers, working on the principle of electromechanical impedance (EMI, are increasingly applied for structural health monitoring (SHM in aerospace, civil and mechanical engineering. The PZT transducers are usually surface bonded to or embedded in a structure and subjected to actuation so as to interrogate the structure at the desired frequency range. The interrogation results in the electromechanical admittance (inverse of EMI signatures which can be used to estimate the structural health or integrity according to the changes of the signatures. In the existing EMI method, the monitored structure is only excited by the PZT transducers for the interrogating of EMI signature, while the vibration of the structure caused by the external excitations other than the PZT actuation is not considered. However, many structures work under vibrations in practice. To monitor such structures, issues related to the effects of vibration on the EMI signature need to be addressed because these effects may lead to misinterpretation of the structural health. This paper develops an EMI model for beam structures, which takes into account the effect of beam vibration caused by the external excitations. An experimental study is carried out to verify the theoretical model. A lab size specimen with different external excitations is tested and the effect of vibration on EMI signature is discussed.

  4. Effect of External Vibration on PZT Impedance Signature.

    Science.gov (United States)

    Yang, Yaowen; Miao, Aiwei

    2008-11-01

    Piezoelectric ceramic Lead Zirconate Titanate (PZT) transducers, working on the principle of electromechanical impedance (EMI), are increasingly applied for structural health monitoring (SHM) in aerospace, civil and mechanical engineering. The PZT transducers are usually surface bonded to or embedded in a structure and subjected to actuation so as to interrogate the structure at the desired frequency range. The interrogation results in the electromechanical admittance (inverse of EMI) signatures which can be used to estimate the structural health or integrity according to the changes of the signatures. In the existing EMI method, the monitored structure is only excited by the PZT transducers for the interrogating of EMI signature, while the vibration of the structure caused by the external excitations other than the PZT actuation is not considered. However, many structures work under vibrations in practice. To monitor such structures, issues related to the effects of vibration on the EMI signature need to be addressed because these effects may lead to misinterpretation of the structural health. This paper develops an EMI model for beam structures, which takes into account the effect of beam vibration caused by the external excitations. An experimental study is carried out to verify the theoretical model. A lab size specimen with different external excitations is tested and the effect of vibration on EMI signature is discussed.

  5. Dynamic thermal signature prediction for real-time scene generation

    Science.gov (United States)

    Christie, Chad L.; Gouthas, Efthimios (Themie); Williams, Owen M.; Swierkowski, Leszek

    2013-05-01

    At DSTO, a real-time scene generation framework, VIRSuite, has been developed in recent years, within which trials data are predominantly used for modelling the radiometric properties of the simulated objects. Since in many cases the data are insufficient, a physics-based simulator capable of predicting the infrared signatures of objects and their backgrounds has been developed as a new VIRSuite module. It includes transient heat conduction within the materials, and boundary conditions that take into account the heat fluxes due to solar radiation, wind convection and radiative transfer. In this paper, an overview is presented, covering both the steady-state and transient performance.

  6. A Hybrid Semi-Digital Transimpedance Amplifier With Noise Cancellation Technique for Nanopore-Based DNA Sequencing.

    Science.gov (United States)

    Hsu, Chung-Lun; Jiang, Haowei; Venkatesh, A G; Hall, Drew A

    2015-10-01

    Over the past two decades, nanopores have been a promising technology for next generation deoxyribonucleic acid (DNA) sequencing. Here, we present a hybrid semi-digital transimpedance amplifier (HSD-TIA) to sense the minute current signatures introduced by single-stranded DNA (ssDNA) translocating through a nanopore, while discharging the baseline current using a semi-digital feedback loop. The amplifier achieves fast settling by adaptively tuning a DC compensation current when a step input is detected. A noise cancellation technique reduces the total input-referred current noise caused by the parasitic input capacitance. Measurement results show the performance of the amplifier with 31.6 M Ω mid-band gain, 950 kHz bandwidth, and 8.5 fA/ √Hz input-referred current noise, a 2× noise reduction due to the noise cancellation technique. The settling response is demonstrated by observing the insertion of a protein nanopore in a lipid bilayer. Using the nanopore, the HSD-TIA was able to measure ssDNA translocation events.

  7. Gradient based filtering of digital elevation models

    DEFF Research Database (Denmark)

    Knudsen, Thomas; Andersen, Rune Carbuhn

    We present a filtering method for digital terrain models (DTMs). The method is based on mathematical morphological filtering within gradient (slope) defined domains. The intention with the filtering procedure is to improbé the cartographic quality of height contours generated from a DTM based...

  8. A network-based predictive gene-expression signature for adjuvant chemotherapy benefit in stage II colorectal cancer.

    Science.gov (United States)

    Cao, Bangrong; Luo, Liping; Feng, Lin; Ma, Shiqi; Chen, Tingqing; Ren, Yuan; Zha, Xiao; Cheng, Shujun; Zhang, Kaitai; Chen, Changmin

    2017-12-13

    The clinical benefit of adjuvant chemotherapy for stage II colorectal cancer (CRC) is controversial. This study aimed to explore novel gene signature to predict outcome benefit of postoperative 5-Fu-based therapy in stage II CRC. Gene-expression profiles of stage II CRCs from two datasets with 5-Fu-based adjuvant chemotherapy (training dataset, n = 212; validation dataset, n = 85) were analyzed to identify the indicator. A systemic approach by integrating gene-expression and protein-protein interaction (PPI) network was implemented to develop the predictive signature. Kaplan-Meier curves and Cox proportional hazards model were used to determine the survival benefit of adjuvant chemotherapy. Experiments with shRNA knock-down were carried out to confirm the signature identified in this study. In the training dataset, we identified 44 PPI sub-modules, by which we separate patients into two clusters (1 and 2) having different chemotherapeutic benefit. A predictor of 11 PPI sub-modules (11-PPI-Mod) was established to discriminate the two sub-groups, with an overall accuracy of 90.1%. This signature was independently validated in an external validation dataset. Kaplan-Meier curves showed an improved outcome for patients who received adjuvant chemotherapy in Cluster 1 sub-group, but even worse survival for those in Cluster 2 sub-group. Similar results were found in both the training and the validation dataset. Multivariate Cox regression revealed an interaction effect between 11-PPI-Mod signature and adjuvant therapy treatment in the training dataset (RFS, p = 0.007; OS, p = 0.006) and the validation dataset (RFS, p = 0.002). From the signature, we found that PTGES gene was up-regulated in CRC cells which were more resistant to 5-Fu. Knock-down of PTGES indicated a growth inhibition and up-regulation of apoptotic markers induced by 5-Fu in CRC cells. Only a small proportion of stage II CRC patients could benefit from adjuvant therapy. The 11-PPI-Mod as

  9. Real Traceable Signatures

    Science.gov (United States)

    Chow, Sherman S. M.

    Traceable signature scheme extends a group signature scheme with an enhanced anonymity management mechanism. The group manager can compute a tracing trapdoor which enables anyone to test if a signature is signed by a given misbehaving user, while the only way to do so for group signatures requires revealing the signer of all signatures. Nevertheless, it is not tracing in a strict sense. For all existing schemes, T tracing agents need to recollect all N' signatures ever produced and perform RN' “checks” for R revoked users. This involves a high volume of transfer and computations. Increasing T increases the degree of parallelism for tracing but also the probability of “missing” some signatures in case some of the agents are dishonest.

  10. Becoming digital

    DEFF Research Database (Denmark)

    Pors, Anja Svejgaard

    2015-01-01

    . An ethnographic account of how digital reforms are implemented in practice shows how street-level bureaucrat’s classic tasks such as specialized casework are being reconfigured into educational tasks that promote the idea of “becoming digital”. In the paper, the author argues that the work of “becoming digital....... Originality/value: The study contributes to ethnographic research in public administration by combining two separate subfields, e-government and street-level bureaucracy, to discern recent transformations in public service delivery. In the digital era, tasks, control and equality are distributed in ways...

  11. Research of Digital Interface Layout Design based on Eye-tracking

    Directory of Open Access Journals (Sweden)

    Shao Jiang

    2015-01-01

    Full Text Available The aim of this paper is to improve the low service efficiency and unsmooth human-computer interaction caused by currently irrational layouts of digital interfaces for complex systems. Also, three common layout structures for digital interfaces are to be presented and five layout types appropriate for multilevel digital interfaces are to be summarized. Based on the eye tracking technology, an assessment was conducted in advantages and disadvantages of different layout types through subjects’ search efficiency. Based on data and results, this study constructed a matching model which is appropriate for multilevel digital interface layout and verified the fact that the task element is a significant and important aspect of layout design. A scientific experimental model of research on digital interfaces for complex systems is provided. Both data and conclusions of the eye movement experiment provide a reference for layout designs of interfaces for complex systems with different task characteristics.

  12. Accrual based accounting implementation: An approach for modelling major decisions

    Directory of Open Access Journals (Sweden)

    Ratno Agriyanto

    2016-12-01

    Full Text Available Over the last three decades the main issues of implementation of accrual based accounting government institutions in Indonesia. Implementation of accrual based accounting in government institutions amid debate about the usefulness of accounting information for decision-making. Empirical study shows that the accrual based of accounting information on a government institution is not used for decision making. The research objective was to determine the impact of the implementation of the accrual based accounting to the accrual basis of accounting information use for decision-making basis. We used the survey questionnaires. The data were processed by SEM using statistical software WarpPLS. The results showed that the implementation of the accrual based accounting in City Government Semarang has significantly positively associated with decision-making. Another important finding is the City Government officials of Semarang have personality, low tolerance of ambiguity is a negative effect on the relationship between the implementation of the accrual based accounting for decision making

  13. Signature Balancing

    NARCIS (Netherlands)

    Noordkamp, H.W.; Brink, M. van den

    2006-01-01

    Signatures are an important part of the design of a ship. In an ideal situation, signatures must be as low as possible. However, due to budget constraints it is most unlikely to reach this ideal situation. The arising question is which levels of signatures are optimal given the different scenarios

  14. Curriculum-based neurosurgery digital library.

    Science.gov (United States)

    Langevin, Jean-Philippe; Dang, Thai; Kon, David; Sapo, Monica; Batzdorf, Ulrich; Martin, Neil

    2010-11-01

    Recent work-hour restrictions and the constantly evolving body of knowledge are challenging the current ways of teaching neurosurgery residents. To develop a curriculum-based digital library of multimedia content to face the challenges in neurosurgery education. We used the residency program curriculum developed by the Congress of Neurological Surgeons to structure the library and Microsoft Sharepoint as the user interface. This project led to the creation of a user-friendly and searchable digital library that could be accessed remotely and throughout the hospital, including the operating rooms. The electronic format allows standardization of the content and transformation of the operating room into a classroom. This in turn facilitates the implementation of a curriculum within the training program and improves teaching efficiency. Future work will focus on evaluating the efficacy of the library as a teaching tool for residents.

  15. Genome signature analysis of thermal virus metagenomes reveals Archaea and thermophilic signatures

    Directory of Open Access Journals (Sweden)

    Pride David T

    2008-09-01

    Full Text Available Abstract Background Metagenomic analysis provides a rich source of biological information for otherwise intractable viral communities. However, study of viral metagenomes has been hampered by its nearly complete reliance on BLAST algorithms for identification of DNA sequences. We sought to develop algorithms for examination of viral metagenomes to identify the origin of sequences independent of BLAST algorithms. We chose viral metagenomes obtained from two hot springs, Bear Paw and Octopus, in Yellowstone National Park, as they represent simple microbial populations where comparatively large contigs were obtained. Thermal spring metagenomes have high proportions of sequences without significant Genbank homology, which has hampered identification of viruses and their linkage with hosts. To analyze each metagenome, we developed a method to classify DNA fragments using genome signature-based phylogenetic classification (GSPC, where metagenomic fragments are compared to a database of oligonucleotide signatures for all previously sequenced Bacteria, Archaea, and viruses. Results From both Bear Paw and Octopus hot springs, each assembled contig had more similarity to other metagenome contigs than to any sequenced microbial genome based on GSPC analysis, suggesting a genome signature common to each of these extreme environments. While viral metagenomes from Bear Paw and Octopus share some similarity, the genome signatures from each locale are largely unique. GSPC using a microbial database predicts most of the Octopus metagenome has archaeal signatures, while bacterial signatures predominate in Bear Paw; a finding consistent with those of Genbank BLAST. When using a viral database, the majority of the Octopus metagenome is predicted to belong to archaeal virus Families Globuloviridae and Fuselloviridae, while none of the Bear Paw metagenome is predicted to belong to archaeal viruses. As expected, when microbial and viral databases are combined, each of

  16. Digital Signature : Comparative study of its usage in developed and developing countries

    OpenAIRE

    Thangavel, Jayakumar

    2014-01-01

    The online trading is growing widely day by day, which makes safety the biggest concern while carrying out trading by electronic means. As many other operations can be done with digital environment and internet, operation that provides identity validation should also be added to the digital environment. When data are transferred, the user should make sure that there are no changes in the original data while transferring them from sender to receiver. And it has also become necessary to authent...

  17. Can New Digital Technologies Support Parasitology Teaching and Learning?

    Science.gov (United States)

    Jabbar, Abdul; Gasser, Robin B; Lodge, Jason

    2016-07-01

    Traditionally, parasitology courses have mostly been taught face-to-face on campus, but now digital technologies offer opportunities for teaching and learning. Here, we give a perspective on how new technologies might be used through student-centred teaching approaches. First, a snapshot of recent trends in the higher education is provided; then, a brief account is given of how digital technologies [e.g., massive open online courses (MOOCs), flipped classroom (FC), games, quizzes, dedicated Facebook, and digital badges] might promote parasitology teaching and learning in digital learning environments. In our opinion, some of these digital technologies might be useful for competency-based, self-regulated, learner-centred teaching and learning in an online or blended teaching environment. Copyright © 2016 Elsevier Ltd. All rights reserved.

  18. Uncertainty in hydrological signatures

    Science.gov (United States)

    McMillan, Hilary; Westerberg, Ida

    2015-04-01

    Information that summarises the hydrological behaviour or flow regime of a catchment is essential for comparing responses of different catchments to understand catchment organisation and similarity, and for many other modelling and water-management applications. Such information types derived as an index value from observed data are known as hydrological signatures, and can include descriptors of high flows (e.g. mean annual flood), low flows (e.g. mean annual low flow, recession shape), the flow variability, flow duration curve, and runoff ratio. Because the hydrological signatures are calculated from observed data such as rainfall and flow records, they are affected by uncertainty in those data. Subjective choices in the method used to calculate the signatures create a further source of uncertainty. Uncertainties in the signatures may affect our ability to compare different locations, to detect changes, or to compare future water resource management scenarios. The aim of this study was to contribute to the hydrological community's awareness and knowledge of data uncertainty in hydrological signatures, including typical sources, magnitude and methods for its assessment. We proposed a generally applicable method to calculate these uncertainties based on Monte Carlo sampling and demonstrated it for a variety of commonly used signatures. The study was made for two data rich catchments, the 50 km2 Mahurangi catchment in New Zealand and the 135 km2 Brue catchment in the UK. For rainfall data the uncertainty sources included point measurement uncertainty, the number of gauges used in calculation of the catchment spatial average, and uncertainties relating to lack of quality control. For flow data the uncertainty sources included uncertainties in stage/discharge measurement and in the approximation of the true stage-discharge relation by a rating curve. The resulting uncertainties were compared across the different signatures and catchments, to quantify uncertainty

  19. Graphic Symbol Recognition using Graph Based Signature and Bayesian Network Classifier

    OpenAIRE

    Luqman, Muhammad Muzzamil; Brouard, Thierry; Ramel, Jean-Yves

    2010-01-01

    We present a new approach for recognition of complex graphic symbols in technical documents. Graphic symbol recognition is a well known challenge in the field of document image analysis and is at heart of most graphic recognition systems. Our method uses structural approach for symbol representation and statistical classifier for symbol recognition. In our system we represent symbols by their graph based signatures: a graphic symbol is vectorized and is converted to an attributed relational g...

  20. Development of FPGA-based digital signal processing system for radiation spectroscopy

    International Nuclear Information System (INIS)

    Lee, Pil Soo; Lee, Chun Sik; Lee, Ju Hahn

    2013-01-01

    We have developed an FPGA-based digital signal processing system that performs both online digital signal filtering and pulse-shape analysis for both particle and gamma-ray spectroscopy. Such functionalities were made possible by a state-of-the-art programmable logic device and system architectures employed. The system performance as measured, for example, in the system dead time and accuracy for pulse-height and rise-time determination, was evaluated with standard alpha- and gamma-ray sources using a CsI(Tl) scintillation detector. It is resulted that the present system has shown its potential application to various radiation-related fields such as particle identification, radiography, and radiation imaging. - Highlights: ► An FPGA-based digital processing system was developed for radiation spectroscopy. ► Our digital system has a 14-bit resolution and a 100-MHz sampling rate. ► The FPGA implements the online digital filtering and pulse-shape analysis. ► The pileup rejection is implemented in trigger logic before digital filtering process. ► Our digital system was verified in alpha-gamma measurements using a CsI detector

  1. Time-dependent delayed signatures from energetic photon interrogations

    International Nuclear Information System (INIS)

    Norman, Daren R.; Jones, James L.; Blackburn, Brandon W.; Haskell, Kevin J.; Johnson, James T.; Watson, Scott M.; Hunt, Alan W.; Spaulding, Randy; Harmon, Frank

    2007-01-01

    Pulsed photonuclear interrogation environments generated by 8-24 MeV electron linac are rich with time-dependent, material-specific, radiation signatures. Nitrogen-based explosives and nuclear materials can be detected by exploiting these signatures in different delayed-time regions. Numerical and experimental results presented in this paper show the unique time and energy dependence of these signatures. It is shown that appropriate delayed-time windows are essential to acquire material-specific signatures in pulsed photonuclear assessment environments. These developments demonstrate that pulsed, high-energy, photon-inspection environments can be exploited for time-dependent, material-specific signatures through the proper operation of specialized detectors and detection methods

  2. Design-based learning in classrooms using playful digital toolkits

    NARCIS (Netherlands)

    Scheltenaar, K.J.; van der Poel, J.E.C.; Bekker, Tilde

    2015-01-01

    The goal of this paper is to explore how to implement Design Based Learning (DBL) with digital toolkits to teach 21st century skills in (Dutch) schools. It describes the outcomes of a literature study and two design case studies in which such a DBL approach with digital toolkits was iteratively

  3. A kind of video image digitizing circuit based on computer parallel port

    International Nuclear Information System (INIS)

    Wang Yi; Tang Le; Cheng Jianping; Li Yuanjing; Zhang Binquan

    2003-01-01

    A kind of video images digitizing circuit based on parallel port was developed to digitize the flash x ray images in our Multi-Channel Digital Flash X ray Imaging System. The circuit can digitize the video images and store in static memory. The digital images can be transferred to computer through parallel port and can be displayed, processed and stored. (authors)

  4. Single-gene prognostic signatures for advanced stage serous ovarian cancer based on 1257 patient samples.

    Science.gov (United States)

    Zhang, Fan; Yang, Kai; Deng, Kui; Zhang, Yuanyuan; Zhao, Weiwei; Xu, Huan; Rong, Zhiwei; Li, Kang

    2018-04-16

    We sought to identify stable single-gene prognostic signatures based on a large collection of advanced stage serous ovarian cancer (AS-OvCa) gene expression data and explore their functions. The empirical Bayes (EB) method was used to remove the batch effect and integrate 8 ovarian cancer datasets. Univariate Cox regression was used to evaluate the association between gene and overall survival (OS). The Database for Annotation, Visualization and Integrated Discovery (DAVID) tool was used for the functional annotation of genes for Gene Ontology (GO) terms and Kyoto Encyclopedia of Genes and Genomes (KEGG) pathways. The batch effect was removed by the EB method, and 1257 patient samples were used for further analysis. We selected 341 single-gene prognostic signatures with FDR matrix organization, focal adhesion and DNA replication which are closely associated with cancer. We used the EB method to remove the batch effect of 8 datasets, integrated these datasets and identified stable prognosis signatures for AS-OvCa.

  5. Experience with digital acoustic monitoring systems for PWRs and BWRs

    International Nuclear Information System (INIS)

    Olma, B.J.

    1998-01-01

    Substantial progress could be reached both in system technics and in application of digital acoustic monitoring systems for assessing mechanical integrity of reactor primary systems. For the surveillance of PWRs and BWRs during power operation of the plants, acoustic signals of Loose Parts Monitoring System sensors are continuously monitored for signal bursts associated with metallic impacts. ISTec/GRS experience with its digital systems MEDEA and RAMSES has shown that acoustic signature analysis is very successful for detecting component failures at an early stage. Methods for trending and classification of digital burst signals are shown, experience with their practical use will be presented. (author)

  6. Digital case-based learning system in school.

    Science.gov (United States)

    Gu, Peipei; Guo, Jiayang

    2017-01-01

    With the continuing growth of multi-media learning resources, it is important to offer methods helping learners to explore and acquire relevant learning information effectively. As services that organize multi-media learning materials together to support programming learning, the digital case-based learning system is needed. In order to create a case-oriented e-learning system, this paper concentrates on the digital case study of multi-media resources and learning processes with an integrated framework. An integration of multi-media resources, testing and learning strategies recommendation as the learning unit is proposed in the digital case-based learning framework. The learning mechanism of learning guidance, multi-media materials learning and testing feedback is supported in our project. An improved personalized genetic algorithm which incorporates preference information and usage degree into the crossover and mutation process is proposed to assemble the personalized test sheet for each learner. A learning strategies recommendation solution is proposed to recommend learning strategies for learners to help them to learn. The experiments are conducted to prove that the proposed approaches are capable of constructing personalized sheets and the effectiveness of the framework.

  7. Digital case-based learning system in school.

    Directory of Open Access Journals (Sweden)

    Peipei Gu

    Full Text Available With the continuing growth of multi-media learning resources, it is important to offer methods helping learners to explore and acquire relevant learning information effectively. As services that organize multi-media learning materials together to support programming learning, the digital case-based learning system is needed. In order to create a case-oriented e-learning system, this paper concentrates on the digital case study of multi-media resources and learning processes with an integrated framework. An integration of multi-media resources, testing and learning strategies recommendation as the learning unit is proposed in the digital case-based learning framework. The learning mechanism of learning guidance, multi-media materials learning and testing feedback is supported in our project. An improved personalized genetic algorithm which incorporates preference information and usage degree into the crossover and mutation process is proposed to assemble the personalized test sheet for each learner. A learning strategies recommendation solution is proposed to recommend learning strategies for learners to help them to learn. The experiments are conducted to prove that the proposed approaches are capable of constructing personalized sheets and the effectiveness of the framework.

  8. Librarian-Initiated Publications Discovery: How Do Digital Depository Librarians Discover and Select Web-Based Government Publications for State Digital Depositories?

    Science.gov (United States)

    Lin, Chi-Shiou; Eschenfelder, Kristin R.

    2010-01-01

    This paper reports on a study of librarian initiated publications discovery (LIPD) in U.S. state digital depository programs using the OCLC Digital Archive to preserve web-based government publications for permanent public access. This paper describes a model of LIPD processes based on empirical investigations of four OCLC DA-based digital…

  9. Digital Printing Quality Detection and Analysis Technology Based on CCD

    Science.gov (United States)

    He, Ming; Zheng, Liping

    2017-12-01

    With the help of CCD digital printing quality detection and analysis technology, it can carry out rapid evaluation and objective detection of printing quality, and can play a certain control effect on printing quality. It can be said CDD digital printing quality testing and analysis of the rational application of technology, its digital printing and printing materials for a variety of printing equipments to improve the quality of a very positive role. In this paper, we do an in-depth study and discussion based on the CCD digital print quality testing and analysis technology.

  10. Detection of chemical explosives using multiple photon signatures

    International Nuclear Information System (INIS)

    Loschke, K.W.; Dunn, W.L.

    2008-01-01

    Full text: A template-matching procedure to aid in rapid detection of improvised explosive devices (IEDs) is being investigated. Multiple photon-scattered and photon-induced positron annihilation radiation responses are being used as part of a photon-neutron signature-based radiation scanning (SBRS) approach (see companion reference for description of the neutron component), in an attempt to detect chemical explosives at safe standoff distances. Many past and present photon interrogation methods are based on imaging. Imaging techniques seek to determine at high special resolution the internal structure of a target of interest. Our technique simply seeks to determine if an unknown target contains a detectable amount of chemical explosives by comparing multiple responses (signatures) that depend on both density and composition of portions of a target. In the photon component, beams of photons are used to create back-streaming signatures, which are dependent on the density and composition of part of the target being interrogated. These signatures are compared to templates, which are collections of the same signatures if the interrogated volume contained a significant amount of explosives. The signature analysis produces a figure-of-merit and a standard deviation of the figure-of-merit. These two metrics are used to filter safe from dangerous targets. Experiments have been conducted that show that explosive surrogates (fertilizers) can be distinguished from several inert materials using these photon signatures, demonstrating that these signatures can be used effectively to help IEDs

  11. The electronic identification, signature and security of information systems

    Directory of Open Access Journals (Sweden)

    Horovèák Pavel

    2002-12-01

    Full Text Available The contribution deals with the actual methods and technologies of information and communication systems security. It introduces the overview of electronic identification elements such as static password, dynamic password and single sign-on. Into this category belong also biometric and dynamic characteristics of verified person. Widespread is authentication based on identification elements ownership, such as various cards and authentication calculators. In the next part is specified a definition and characterization of electronic signature, its basic functions and certificate categories. Practical utilization of electronic signature consists of electronic signature acquirement, signature of outgoing email message, receiving of electronic signature and verification of electronic signature. The use of electronic signature is continuously growing and in connection with legislation development it exercises in all resorts.

  12. The digital media handbook

    CERN Document Server

    Dewdney, Andrew

    2013-01-01

    The new edition of The Digital Media Handbook presents an essential guide to the historical and theoretical development of digital media, emphasising cultural continuity alongside technological change, and highlighting the emergence of new forms of communication in contemporary networked culture.Andrew Dewdney and Peter Ride present detailed critical commentary and descriptive historical accounts, as well as a series of interviews from a range of digital media practitioners, including producers, developers, curators and artists.The Digital Media Handbook highlights key concerns of today's prac

  13. Modeling Multi-Mobile Agents System Based on Coalition Signature Mechanism Using UML

    Institute of Scientific and Technical Information of China (English)

    SUNZhixin; HUANGHaiping; WANGRuchuan

    2004-01-01

    With the development of electronic commerce and agent techniques, multi-mobile agents cooperation can not only improve the efficiency of electronic business trade, but more importantly, it has a comprehensive applicative value in solving the security issues of mobile agent system. This paper firstly describes the mechanism of multi-mobile agents coalition signature aiming at the system security. Subsequently it brings forward a basic architecture of Multi-mobile agents system (MMAS) based on the design pattern of multi-mobile agents. The paper uses the diagrs_rn of UML, such as use case diagram, class diagram and sequence diagram to build the detailed model of the coalition signature and multi-mobile agents cooperation results. Through security analysis, we find that multimobile agents cooperation and interaction can solve some security problems of mobile agents in transfer, and also it can improve the efficiency of business trade. These results indicate that MMAS has a high security performance and can be widely used in E-commerce trade.

  14. Digital Resonant Controller based on Modified Tustin Discretization Method

    Directory of Open Access Journals (Sweden)

    STOJIC, D.

    2016-11-01

    Full Text Available Resonant controllers are used in power converter voltage and current control due to their simplicity and accuracy. However, digital implementation of resonant controllers introduces problems related to zero and pole mapping from the continuous to the discrete time domain. Namely, some discretization methods introduce significant errors in the digital controller resonant frequency, resulting in the loss of the asymptotic AC reference tracking, especially at high resonant frequencies. The delay compensation typical for resonant controllers can also be compromised. Based on the existing analysis, it can be concluded that the Tustin discretization with frequency prewarping represents a preferable choice from the point of view of the resonant frequency accuracy. However, this discretization method has a shortcoming in applications that require real-time frequency adaptation, since complex trigonometric evaluation is required for each frequency change. In order to overcome this problem, in this paper the modified Tustin discretization method is proposed based on the Taylor series approximation of the frequency prewarping function. By comparing the novel discretization method with commonly used two-integrator-based proportional-resonant (PR digital controllers, it is shown that the resulting digital controller resonant frequency and time delay compensation errors are significantly reduced for the novel controller.

  15. Low Power Systolic Array Based Digital Filter for DSP Applications

    Directory of Open Access Journals (Sweden)

    S. Karthick

    2015-01-01

    Full Text Available Main concepts in DSP include filtering, averaging, modulating, and correlating the signals in digital form to estimate characteristic parameter of a signal into a desirable form. This paper presents a brief concept of low power datapath impact for Digital Signal Processing (DSP based biomedical application. Systolic array based digital filter used in signal processing of electrocardiogram analysis is presented with datapath architectural innovations in low power consumption perspective. Implementation was done with ASIC design methodology using TSMC 65 nm technological library node. The proposed systolic array filter has reduced leakage power up to 8.5% than the existing filter architectures.

  16. Selection signatures in worldwide sheep populations.

    OpenAIRE

    Fariello, Maria-Ines; Servin, Bertrand; Tosser-Klopp, Gwenola; Rupp, Rachel; Moreno, Carole; San Cristobal, Magali; Boitard, Simon; Drögemüller, Cord; The International Sheep Genomics Consortium, ISGC

    2014-01-01

    The diversity of populations in domestic species offers great opportunities to study genome response to selection. The recently published Sheep HapMap dataset is a great example of characterization of the world wide genetic diversity in sheep. In this study, we re-analyzed the Sheep HapMap dataset to identify selection signatures in worldwide sheep populations. Compared to previous analyses, we made use of statistical methods that (i) take account of the hierarchical structure of sheep popula...

  17. Selection Signatures in Worldwide Sheep Populations

    OpenAIRE

    Fariello, Maria-Ines; Servin, Bertrand; Tosser-Klopp, Gwenola; Rupp, Rachel; Moreno, Carole; Cristobal, Magali San; Boitard, Simon

    2014-01-01

    The diversity of populations in domestic species offers great opportunities to study genome response to selection. The recently published Sheep HapMap dataset is a great example of characterization of the world wide genetic diversity in sheep. In this study, we re-analyzed the Sheep HapMap dataset to identify selection signatures in worldwide sheep populations. Compared to previous analyses, we made use of statistical methods that (i) take account of the hierarchical structure of sheep popula...

  18. An evaporation based digital microflow meter

    NARCIS (Netherlands)

    Nie, C; Frijns, A J H; Mandamparambil, R; Zevenbergen, M A G; den Toonder, J M J

    2015-01-01

    In this work, we present a digital microflow meter operating in the range 30-250 nl min-1 for water. The principle is based on determining the evaporation rate of the liquid via reading the number of wetted pore array structures in a microfluidic system, through which continuous evaporation takes

  19. An evaporation based digital microflow meter

    NARCIS (Netherlands)

    Nie, C.; Frijns, A.J.H.; Mandamparambil, R.; Zevenbergen, M.A.G.; Toonder, den J.M.J.

    2015-01-01

    In this work, we present a digital microflow meter operating in the range 30–250 nl min-1 for water. The principle is based on determining the evaporation rate of the liquid via reading the number of wetted pore array structures in a microfluidic system, through which continuous evaporation takes

  20. Securing optical code-division multiple-access networks with a postswitching coding scheme of signature reconfiguration

    Science.gov (United States)

    Huang, Jen-Fa; Meng, Sheng-Hui; Lin, Ying-Chen

    2014-11-01

    The optical code-division multiple-access (OCDMA) technique is considered a good candidate for providing optical layer security. An enhanced OCDMA network security mechanism with a pseudonoise (PN) random digital signals type of maximal-length sequence (M-sequence) code switching to protect against eavesdropping is presented. Signature codes unique to individual OCDMA-network users are reconfigured according to the register state of the controlling electrical shift registers. Examples of signature reconfiguration following state switching of the controlling shift register for both the network user and the eavesdropper are numerically illustrated. Dynamically changing the PN state of the shift register to reconfigure the user signature sequence is shown; this hinders eavesdroppers' efforts to decode correct data sequences. The proposed scheme increases the probability of eavesdroppers committing errors in decoding and thereby substantially enhances the degree of an OCDMA network's confidentiality.

  1. Research of Digital Interface Layout Design based on Eye-tracking

    OpenAIRE

    Shao Jiang; Xue Chengqi; Wang Fang; Wang Haiyan; Tang Wencheng; Chen Mo; Kang Mingwu

    2015-01-01

    The aim of this paper is to improve the low service efficiency and unsmooth human-computer interaction caused by currently irrational layouts of digital interfaces for complex systems. Also, three common layout structures for digital interfaces are to be presented and five layout types appropriate for multilevel digital interfaces are to be summarized. Based on the eye tracking technology, an assessment was conducted in advantages and disadvantages of different layout types through subjects’ ...

  2. Synchronisation Strategy in Complex Digital Voter-based Systems

    Directory of Open Access Journals (Sweden)

    SZÁSZ Csaba

    2017-10-01

    Full Text Available Researchers in microelectronics generally agree that reliability and computing power are the two most important factors for next generation digital systems. Redundancy techniques are implemented widely to increase the reliability and fault tolerance of these systems. In this paper a triple modular redundancy (TMR majority voter based fault-tolerant digital system architecture is presented and analyzed. The vast majority of researchers that design and implement such systems usually assume that in these configurations the voter operates perfectly while is not true. This presentation outlines a specific situation when under same conditions the digital voter is exposed to misleading operation generating wrong information on its output. To overcome such situations there a versatile method has been proposed and implemented that is well suited to overcome the improper operation of TMR structures. The experimental results prove the theoretical assumptions and validate the initial expectations regarding the considered digital system fault-tolerant operation.

  3. DIGITAL GAME-BASED LANGUAGE LEARNING IN FOREIGN LANGUAGE TEACHER EDUCATION

    OpenAIRE

    ALYAZ, Yunus; GENC, Zubeyde Sinem

    2016-01-01

    New technologies including digital game-based language learning have increasingly received attention. However, their implementation is far from expected and desired levels due to technical, instructional, financial and sociological barriers. Previous studies suggest that there is a strong need to establish courses in order to support adaptation of game-based learning pedagogy through helping teachers experience digital games themselves before they are expected to use them in teaching. This st...

  4. Accrual based accounting implementation: An approach for modelling major decisions

    OpenAIRE

    Ratno Agriyanto; Abdul Rohman; Dwi Ratmono; Imam Ghozali

    2016-01-01

    Over the last three decades the main issues of implementation of accrual based accounting government institutions in Indonesia. Implementation of accrual based accounting in government institutions amid debate about the usefulness of accounting information for decision-making. Empirical study shows that the accrual based of accounting information on a government institution is not used for decision making. The research objective was to determine the impact of the implementation of the accrual...

  5. Student Accountability in Team-Based Learning Classes

    Science.gov (United States)

    Stein, Rachel E.; Colyer, Corey J.; Manning, Jason

    2016-01-01

    Team-based learning (TBL) is a form of small-group learning that assumes stable teams promote accountability. Teamwork promotes communication among members; application exercises promote active learning. Students must prepare for each class; failure to do so harms their team's performance. Therefore, TBL promotes accountability. As part of the…

  6. Restorative Justice as Strength-Based Accountability

    Science.gov (United States)

    Ball, Robert

    2003-01-01

    This article compares strength-based and restorative justice philosophies for young people and their families. Restorative justice provides ways to respond to crime and harm that establish accountability while seeking to reconcile members of a community. Restorative approaches are an important subset of strength-based interventions.

  7. Digital preservation putting it to work

    CERN Document Server

    Ogryczak, Włodzimierz; Pałka, Piotr; Śliwiński, Tomasz

    2017-01-01

    This book addresses the process of maintaining digital objects through time to ensure continued access, an aspect that has become a crucial issue in recent years. It offers a concise yet comprehensive discussion of key concepts and requirements for long-term digital preservation, and presents a pioneering framework for digital repositories that enables the long-term archiving and metadata management for large volumes of digital resources based on a system that has already been completely designed and launched. In the framework, the reliability of information readouts is ensured by the repository with two-level data recording replication and monitoring mechanisms in the repository management system (RMS) and the file systems, and by the RMS’s distributed nature. The advanced RMS allows operations on the archival storage to be scheduled, while also taking into account low energy consumption requirements. After presenting the framework in detail, the book assesses and demonstrates the approach’s viability ...

  8. Digital pathology: DICOM-conform draft, testbed, and first results.

    Science.gov (United States)

    Zwönitzer, Ralf; Kalinski, Thomas; Hofmann, Harald; Roessner, Albert; Bernarding, Johannes

    2007-09-01

    Hospital information systems are state of the art nowadays. Therefore, Digital Pathology, also labelled as Virtual Microscopy, has gained increased attention. Triggered by radiology, standardized information models and workflows were world-wide defined based on DICOM. However, DICOM-conform integration of Digital Pathology into existing clinical information systems imposes new problems requiring specific solutions concerning the huge amount of data as well as the special structure of the data to be managed, transferred, and stored. We implemented a testbed to realize and evaluate the workflow of digitized slides from acquisition to archiving. The experiences led to the draft of a DICOM-conform information model that accounted for extensions, definitions, and technical requirements necessary to integrate digital pathology in a hospital-wide DICOM environment. Slides were digitized, compressed, and could be viewed remotely. Real-time transfer of the huge amount of data was optimized using streaming techniques. Compared to a recent discussion in the DICOM Working Group for Digital Pathology (WG26) our experiences led to a preference of a JPEG2000/JPIP-based streaming of the whole slide image. The results showed that digital pathology is feasible but strong efforts by users and vendors are still necessary to integrate Digital Pathology into existing information systems.

  9. A Modified Design of a Thermocouple Based Digital Temperature Indicator with Opto-Isolation

    Directory of Open Access Journals (Sweden)

    S. C. BERA

    2008-01-01

    Full Text Available In the conventional thermocouple based digital temperature indicator the millivolt signal obtained from a thermocouple is first amplified and then converted into a digital signal by using analog-to-digital converter (ADC. This digital signal is then indicated as digital display of temperature using digital counter circuit or microprocessor/microcontroller based circuitry. In the present paper a modified AD conversion technique along with opto-isolation is used to indicate digitally the temperature without using any conventional analog-to-digital converter. The theory and design of the measuring technique are described in the paper. The non-linearity of thermocouple is eliminated by using look-up table within software program. The performance of the circuit has been experimentally tested by using mV input signal instead of a thermocouple as well as using a K-type thermocouple. The experimental results are reported in the paper.

  10. The utilization of activity-based cost accounting in hospitals.

    Science.gov (United States)

    Emmett, Dennis; Forget, Robert

    2005-01-01

    Healthcare costs are being examined on all fronts. Healthcare accounts for 11% of the gross national product and will continue to rise as the "babyboomers" reach retirement age. While ascertaining costs is important, most research shows that costing methods have not been implemented in hospitals. This study is concerned with the use of costing methods; particularly activity-based cost accounting. A mail survey of CFOs was undertaken to determine the type of cost accounting method they use. In addition, they were asked whether they were aware of activity-based cost accounting and whether they had implemented it or were planning to implement it. Only 71.8% were aware of it and only 4.7% had implemented it. In addition, only 52% of all hospitals report using any cost accounting systems. Education needs to ensure that all healthcare executives are cognizant of activity-based accounting and its importance in determining costs. Only by determining costs can hospitals strive to contain them.

  11. Signature detection and matching for document image retrieval.

    Science.gov (United States)

    Zhu, Guangyu; Zheng, Yefeng; Doermann, David; Jaeger, Stefan

    2009-11-01

    As one of the most pervasive methods of individual identification and document authentication, signatures present convincing evidence and provide an important form of indexing for effective document image processing and retrieval in a broad range of applications. However, detection and segmentation of free-form objects such as signatures from clustered background is currently an open document analysis problem. In this paper, we focus on two fundamental problems in signature-based document image retrieval. First, we propose a novel multiscale approach to jointly detecting and segmenting signatures from document images. Rather than focusing on local features that typically have large variations, our approach captures the structural saliency using a signature production model and computes the dynamic curvature of 2D contour fragments over multiple scales. This detection framework is general and computationally tractable. Second, we treat the problem of signature retrieval in the unconstrained setting of translation, scale, and rotation invariant nonrigid shape matching. We propose two novel measures of shape dissimilarity based on anisotropic scaling and registration residual error and present a supervised learning framework for combining complementary shape information from different dissimilarity metrics using LDA. We quantitatively study state-of-the-art shape representations, shape matching algorithms, measures of dissimilarity, and the use of multiple instances as query in document image retrieval. We further demonstrate our matching techniques in offline signature verification. Extensive experiments using large real-world collections of English and Arabic machine-printed and handwritten documents demonstrate the excellent performance of our approaches.

  12. Digitized self-oscillating loop for piezoelectric transformer-based power converters

    DEFF Research Database (Denmark)

    Ekhtiari, Marzieh; Andersen, Thomas; Zhang, Zhe

    2016-01-01

    A new method is implemented in designing of self-oscillating loop for driving piezoelectric transformers. The implemented method is based on combining both analog and digital control systems. Digitized delay, or digitized phase shift through the self-oscillating loop results in a very precise...... frequency control and ensures an optimum operation of the piezoelectric transformer in terms of voltage gain and efficiency. In this work, additional time delay is implemented digitally for the first time through 16 bit digital-to-analog converter to the self-oscillating loop. Delay control setpoints...... updates at a rate of 417 kHz. This allows the control loop to dynamically follow frequency changes of the transformer in each resonant cycle. The operation principle behind self-oscillating is discussed in this paper. Moreover, experimental results are reported....

  13. Signature molecular descriptor : advanced applications.

    Energy Technology Data Exchange (ETDEWEB)

    Visco, Donald Patrick, Jr. (Tennessee Technological University, Cookeville, TN)

    2010-04-01

    In this work we report on the development of the Signature Molecular Descriptor (or Signature) for use in the solution of inverse design problems as well as in highthroughput screening applications. The ultimate goal of using Signature is to identify novel and non-intuitive chemical structures with optimal predicted properties for a given application. We demonstrate this in three studies: green solvent design, glucocorticoid receptor ligand design and the design of inhibitors for Factor XIa. In many areas of engineering, compounds are designed and/or modified in incremental ways which rely upon heuristics or institutional knowledge. Often multiple experiments are performed and the optimal compound is identified in this brute-force fashion. Perhaps a traditional chemical scaffold is identified and movement of a substituent group around a ring constitutes the whole of the design process. Also notably, a chemical being evaluated in one area might demonstrate properties very attractive in another area and serendipity was the mechanism for solution. In contrast to such approaches, computer-aided molecular design (CAMD) looks to encompass both experimental and heuristic-based knowledge into a strategy that will design a molecule on a computer to meet a given target. Depending on the algorithm employed, the molecule which is designed might be quite novel (re: no CAS registration number) and/or non-intuitive relative to what is known about the problem at hand. While CAMD is a fairly recent strategy (dating to the early 1980s), it contains a variety of bottlenecks and limitations which have prevented the technique from garnering more attention in the academic, governmental and industrial institutions. A main reason for this is how the molecules are described in the computer. This step can control how models are developed for the properties of interest on a given problem as well as how to go from an output of the algorithm to an actual chemical structure. This report

  14. A new NMIS characteristic signature acquisition method based on time-domain fission correlation spectrum

    International Nuclear Information System (INIS)

    Wei Biao; Feng Peng; Yang Fan; Ren Yong

    2014-01-01

    To deal with the disadvantages of the homogeneous signature of the nuclear material identification system (NMIS) and limited methods to extract the characteristic parameters of the nuclear materials, an enhanced method using the combination of the Time-of-Flight (TOF) and the Pulse Shape Discrimination (PSD) was introduced into the traditional characteristic parameters extraction and recognition system of the NMIS. With the help of the PSD, the γ signal and the neutron signal can be discriminated. Further based on the differences of the neutron-γ flight time of the detectors in various positions, a new time-domain signature reflecting the position information of unknown nuclear material was investigated. The simulation result showed that the algorithm is feasible and helpful to identify the relative position of unknown nuclear material. (authors)

  15. Multiple access chaotic digital communication based on generalized synchronization

    International Nuclear Information System (INIS)

    Lu Junguo

    2005-01-01

    A novel method for multiple access chaotic digital communication based on the concept of chaos generalized synchronization and the on-line least square method is proposed. This method can be used for transmitting multiple digital information signals concurrently. We illustrate the method using a Lorenz system driving a Chua's circuit and then examine the robustness of the proposed method with respect to noise in communication channel

  16. The G20 countries should engage with blockchain technologies to build an inclusive, transparent, and accountable digital economy for all

    OpenAIRE

    Maupin, Julie

    2017-01-01

    Blockchain technologies hold the key to building an inclusive global digital economy that is auditably secure and transparently accountable to the world's citizens. At a time when governments must fight to restore the public's faith in cross-border economic cooperation, blockchains can play a critical role in strengthening economic resilience while ensuring the global economy works to the benefit of all. The G20 must take decisive steps to harness this technology in service of its policy goal...

  17. A Digital Power Quality Monitoring Equipment Designed for Digital Substation

    Science.gov (United States)

    Li, Wei; Wang, Xin; Geng, Jiewen

    2018-01-01

    Taking into account both current status and development trend of digital substation, this paper proposed a design of a new multi-channelled digital power quality monitoring equipment with high compatibility. The overall functional structure, hardware architecture, software architecture, interface architecture and some key techniques such as IEC 61850 modelling of transient event and harmonic measurement method under the condition of non-synchronous sampling are described in this paper.

  18. Changing from a Rules-based to a Principles-based Accounting Logic: A Review

    Directory of Open Access Journals (Sweden)

    Marta Silva Guerreiro

    2014-06-01

    Full Text Available We explore influences on unlisted companies when Portugal moved from a code law, rules-based accounting system, to a principles-based accounting system of adapted International Financial Reporting Standards (IFRS. Institutionalisation of the new principles-based system was generally facilitated by a socio-economic and political context that increasingly supported IFRS logic. This helped central actors gain political opportunity, mobilise important allies, and accommodate major protagonists. The preparedness of unlisted companies to adopt the new IFRS-based accounting system voluntarily was explained by their desire to maintain social legitimacy. However, it was affected negatively by the embeddedness of rule-based practices in the ‘old’ prevailing institutional logic.

  19. Searches with long-lived or unusual signatures

    CERN Document Server

    Haug, S; The ATLAS collaboration

    2013-01-01

    We present recent ATLAS and CMS results from searches with long-lived and unusual signatures. They are based on analysis of LHC proton-proton collisions at center of mass energies at 7 and 8 TeV. Long-lived and heavy particles may cause peculiar signatures in the detectors, but are in several Standard Model extensions well motivated.

  20. Modeling T cell antigen discrimination based on feedback control of digital ERK responses.

    Directory of Open Access Journals (Sweden)

    2005-11-01

    Full Text Available T-lymphocyte activation displays a remarkable combination of speed, sensitivity, and discrimination in response to peptide-major histocompatibility complex (pMHC ligand engagement of clonally distributed antigen receptors (T cell receptors or TCRs. Even a few foreign pMHCs on the surface of an antigen-presenting cell trigger effective signaling within seconds, whereas 1 x 10(5-1 x 10(6 self-pMHC ligands that may differ from the foreign stimulus by only a single amino acid fail to elicit this response. No existing model accounts for this nearly absolute distinction between closely related TCR ligands while also preserving the other canonical features of T-cell responses. Here we document the unexpected highly amplified and digital nature of extracellular signal-regulated kinase (ERK activation in T cells. Based on this observation and evidence that competing positive- and negative-feedback loops contribute to TCR ligand discrimination, we constructed a new mathematical model of proximal TCR-dependent signaling. The model made clear that competition between a digital positive feedback based on ERK activity and an analog negative feedback involving SH2 domain-containing tyrosine phosphatase (SHP-1 was critical for defining a sharp ligand-discrimination threshold while preserving a rapid and sensitive response. Several nontrivial predictions of this model, including the notion that this threshold is highly sensitive to small changes in SHP-1 expression levels during cellular differentiation, were confirmed by experiment. These results combining computation and experiment reveal that ligand discrimination by T cells is controlled by the dynamics of competing feedback loops that regulate a high-gain digital amplifier, which is itself modulated during differentiation by alterations in the intracellular concentrations of key enzymes. The organization of the signaling network that we model here may be a prototypic solution to the problem of achieving

  1. Hyperspectral signature analysis of skin parameters

    Science.gov (United States)

    Vyas, Saurabh; Banerjee, Amit; Garza, Luis; Kang, Sewon; Burlina, Philippe

    2013-02-01

    The temporal analysis of changes in biological skin parameters, including melanosome concentration, collagen concentration and blood oxygenation, may serve as a valuable tool in diagnosing the progression of malignant skin cancers and in understanding the pathophysiology of cancerous tumors. Quantitative knowledge of these parameters can also be useful in applications such as wound assessment, and point-of-care diagnostics, amongst others. We propose an approach to estimate in vivo skin parameters using a forward computational model based on Kubelka-Munk theory and the Fresnel Equations. We use this model to map the skin parameters to their corresponding hyperspectral signature. We then use machine learning based regression to develop an inverse map from hyperspectral signatures to skin parameters. In particular, we employ support vector machine based regression to estimate the in vivo skin parameters given their corresponding hyperspectral signature. We build on our work from SPIE 2012, and validate our methodology on an in vivo dataset. This dataset consists of 241 signatures collected from in vivo hyperspectral imaging of patients of both genders and Caucasian, Asian and African American ethnicities. In addition, we also extend our methodology past the visible region and through the short-wave infrared region of the electromagnetic spectrum. We find promising results when comparing the estimated skin parameters to the ground truth, demonstrating good agreement with well-established physiological precepts. This methodology can have potential use in non-invasive skin anomaly detection and for developing minimally invasive pre-screening tools.

  2. Identification of the vital digital assets based on PSA results analysis

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Moon Kyoung; Seong, Poong Hyun [KAIST, Daejeon (Korea, Republic of); Son, Han Seong [Joongbu Univiersity, Geumsan (Korea, Republic of); Kim, Hyundoo [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2016-10-15

    As the main systems for managing totally about the operation, control, monitoring, measurement, and safety function in an emergency, instrumentation and control systems (I and C) in nuclear power plants have been digitalized gradually for the precise operation and its convenience. The digitalization of infrastructure makes systems vulnerable to cyber threats and hybrid attacks. According to ICS-CERT report, as time goes by, the number of vulnerabilities in ICS industries increases rapidly. Recently, due to the digitalization of I and C, it has begun to rise the need of cyber security in the digitalized I and C in NPPs. However, there are too many critical digital assets (CDAs) in NPPs. More than 60% of the total critical systems are digital system. Addressing more than 100 security controls for each CDA needs too much effort for both licensee and inspector. It is necessary to focus on more significant CDAs for effective regulation. Probabilistic Safety Analysis (PSA) results are analyzed in order to identify more significant CDAs which could evoke an accident of NPPs by digital malfunction or cyber-attacks. By eliciting minimal cut sets using fault tree analyses, accident-related CDAs are drawn. Also the CDAs that must be secured from outsiders are elicited in case of some accident scenario. It is expected that effective cyber security regulation based on the graded approach can be implemented. Furthermore, defense-in-depth of digital assets for NPPs safety can be built up. Digital technologies such as computers, control systems, and data networks currently play essential roles in modern NPPs. Further, the introduction of new digitalized technologies is also being considered. These digital technologies make the operation of NPPs more convenient and economical; however, they are inherently susceptible to problems such as digital malfunction of components or cyber-attacks. Recently, needs for cyber security on digitalized nuclear Instrumentation and Control (I and C

  3. Identification of the vital digital assets based on PSA results analysis

    International Nuclear Information System (INIS)

    Choi, Moon Kyoung; Seong, Poong Hyun; Son, Han Seong; Kim, Hyundoo

    2016-01-01

    As the main systems for managing totally about the operation, control, monitoring, measurement, and safety function in an emergency, instrumentation and control systems (I and C) in nuclear power plants have been digitalized gradually for the precise operation and its convenience. The digitalization of infrastructure makes systems vulnerable to cyber threats and hybrid attacks. According to ICS-CERT report, as time goes by, the number of vulnerabilities in ICS industries increases rapidly. Recently, due to the digitalization of I and C, it has begun to rise the need of cyber security in the digitalized I and C in NPPs. However, there are too many critical digital assets (CDAs) in NPPs. More than 60% of the total critical systems are digital system. Addressing more than 100 security controls for each CDA needs too much effort for both licensee and inspector. It is necessary to focus on more significant CDAs for effective regulation. Probabilistic Safety Analysis (PSA) results are analyzed in order to identify more significant CDAs which could evoke an accident of NPPs by digital malfunction or cyber-attacks. By eliciting minimal cut sets using fault tree analyses, accident-related CDAs are drawn. Also the CDAs that must be secured from outsiders are elicited in case of some accident scenario. It is expected that effective cyber security regulation based on the graded approach can be implemented. Furthermore, defense-in-depth of digital assets for NPPs safety can be built up. Digital technologies such as computers, control systems, and data networks currently play essential roles in modern NPPs. Further, the introduction of new digitalized technologies is also being considered. These digital technologies make the operation of NPPs more convenient and economical; however, they are inherently susceptible to problems such as digital malfunction of components or cyber-attacks. Recently, needs for cyber security on digitalized nuclear Instrumentation and Control (I and C

  4. A Signature-Based Power Model for MPSoC on FPGA

    Directory of Open Access Journals (Sweden)

    Roberta Piscitelli

    2012-01-01

    Full Text Available This paper presents a framework for high-level power estimation of multiprocessor systems-on-chip (MPSoC architectures on FPGA. The technique is based on abstract execution profiles, called event signatures, and it operates at a higher level of abstraction than, for example, commonly used instruction-set simulator (ISS-based power estimation methods and should thus be capable of achieving good evaluation performance. As a consequence, the technique can be very useful in the context of early system-level design space exploration. We integrated the power estimation technique in a system-level MPSoC synthesis framework. Subsequently, using this framework, we designed a range of different candidate architectures which contain different numbers of MicroBlaze processors and compared our power estimation results to those from real measurements on a Virtex-6 FPGA board.

  5. Collaboration between student art teachers and communication and digital media students promoting subject specific didactics in digital visual learning design

    DEFF Research Database (Denmark)

    Skov, Kirsten; Buhl, Mie

    into account. Our discussion of the potential for developing digital learning application from a collaborative approach is based on the visual design products, interviews and written reports, as well as shared experiences from the stakeholders in the project. Results: The project revealed three digital visual......=pdf Dunleavy, M. & Dede, C. (2014). Augmented reality teaching and learning. in. J.M. Spector, M.D. Merrill, J. Elen & M.J. Bishop (eds), The handbook og research for educational communications and technology New York: Springer http://isites.harvard.edu/fs/docs/icb.topic1116077.files....../DunleavyDedeARfinal.pdf Rasmussen, H. (2015). Digital Picture Production and Picture aesthetic Competency in It-didactic Design. Risk and opportunities for visual arts education in Europe. Proceedings, InSEA conferene, Lisbon, Portugal...

  6. AT89S52 Microcontroller Based Digital Compass With Voice Output

    Directory of Open Access Journals (Sweden)

    Fahmi Fardiyan Arief

    2008-04-01

    Full Text Available In this paper, the design of digital compass with voice output is described, so that the blind can also use it. The digital compass is designed based on up-graded conventional compass. In the axis direction of conventional compass be added a disc as source of wind direction information, and phototransistor as sensor. The digital compass system is designed, based on AT89S52 microcontroller, as control of all interfaces and read sensor. The LCD component is used as display and ISD 2590 IC as voice recorder. The IC can record with maximum capacity 90 seconds. The voices output of compass is divided into 8 direction from the north, southwest, west and the next. The result showed that the design of digital compass work as like conventional compass completely by voice feature.

  7. Experience with CANDID: Comparison algorithm for navigating digital image databases

    Energy Technology Data Exchange (ETDEWEB)

    Kelly, P.; Cannon, M.

    1994-10-01

    This paper presents results from the authors experience with CANDID (Comparison Algorithm for Navigating Digital Image Databases), which was designed to facilitate image retrieval by content using a query-by-example methodology. A global signature describing the texture, shape, or color content is first computed for every image stored in a database, and a normalized similarity measure between probability density functions of feature vectors is used to match signatures. This method can be used to retrieve images from a database that are similar to a user-provided example image. Results for three test applications are included.

  8. PRECONDITIONS FOR THE INTRODUCTION OF ACCOUNTING AND TAXATION OF CRYPTOCURRENCIES TRANSACTIONS IN UKRAINE

    Directory of Open Access Journals (Sweden)

    Kostyuchenko V.

    2018-01-01

    Full Text Available Introduction. The worldwide expansion of digital technologies and the development of the cyber economy led to emergence of a new digital assets – the cryptographic currency that rapidly growing popularity. The phenomenon of cryptocurrency is relatively new and little investigated. Purpose. The purpose of the article is to substantiate the preconditions for the introduction of accounting and taxation of transactions with cryptic currencies in Ukraine. Results. The article considers the economic preconditions for the introduction of accounting and taxation of cryptocurrencies transactions in Ukraine. The definition of the economic content of cryptocurrency has been researched. On the basis of the definitions analysis, an author’s definition of cryptocurrency is proposed. In particular, the cryptocurrency is understood as the digital (virtual currency, with the unit “coin”, which is emitted in the network according to certain principles of cryptography to provide transactions and control the creation of new coins. The advantages and disadvantages of cryptocurrency as a digital currency have been analyzed. The common and distinctive characteristics of cryptocurrencies and gold were determined. The mechanism of cryptocurrencies functioning was disclosed and a glossary of terms used in cryptocurrencies transactions was provided. The cryptocurrencies development in the world and in Ukraine was investigated. Legal and tax bases for the cryptocurrencies introduction into the activities of small business entities was given. Conclusions. The cryptocurrency exists outside the jurisdiction of Ukraine and in the majority world countries. The state should adopt it, acknowledge either as a digital (virtual currency or as another digital asset, to regulate the taxation system and introduce an accounting methodology of cryptocurrencies transactions for integration into the global economic environment.

  9. Design of a digital PAD based on I/Q demodulation principle

    International Nuclear Information System (INIS)

    Geng Zheqiao; Cui Yanyan; Hou Mi; Pei Guoxi

    2005-01-01

    Conventional analog I/Q demodulator suffers from phase and amplitude imbalance and DC offset, which cause big error into the measurement. A digital PAD is designed. Based on I/Q demodulation principle, using digital algorithms, such as digital filter and Hilbert transform, the conventional measurement error can basically be removed. Measuremental results show that the digital PAD has a maximum phase error of ±0.5 degree and a resolution of 0.2 degree. Its temperature coefficient is -0.1 degree/degree C. Its dynamic ranges for phase-measurement and amplitude-measurement are -1825 dBm and -2020 dBm, respectively. The digital PAD can meet the need of the BEPC II phasing system. (authors)

  10. Digital Game-Based Language Learning in Foreign Language Teacher Education

    Directory of Open Access Journals (Sweden)

    Yunus ALYAZ

    2016-10-01

    Full Text Available New technologies including digital game-based language learning have increasingly received attention. However, their implementation is far from expected and desired levels due to technical, instructional, financial and sociological barriers. Previous studies suggest that there is a strong need to establish courses in order to support adaptation of game-based learning pedagogy through helping teachers experience digital games themselves before they are expected to use them in teaching. This study was conducted to investigate educational digital games in foreign language teaching, to identify the determining reasons behind the pittfalls in applications and to explore the contribution of a serious game to the development of professional language skills of pre-service teachers. Pre- and post-tests were applied to measure the contribution of the game to the development of their language skills. In addition, a game diary and semi-structured interviews were used to elicit information about the problems pre-service teachers had and their perceptions on the whole process. The analysis of the data illustrated that there was great improvement in pre-service teachers’ professional language skills and attitudes towards using these games while teaching in the future. This is important in foreign language teacher education in terms of enhancing digital game-based language learning pedagogy for teachers.

  11. CMOS based capacitance to digital converter circuit for MEMS sensor

    Science.gov (United States)

    Rotake, D. R.; Darji, A. D.

    2018-02-01

    Most of the MEMS cantilever based system required costly instruments for characterization, processing and also has large experimental setups which led to non-portable device. So there is a need of low cost, highly sensitive, high speed and portable digital system. The proposed Capacitance to Digital Converter (CDC) interfacing circuit converts capacitance to digital domain which can be easily processed. Recent demand microcantilever deflection is part per trillion ranges which change the capacitance in 1-10 femto farad (fF) range. The entire CDC circuit is designed using CMOS 250nm technology. Design of CDC circuit consists of a D-latch and two oscillators, namely Sensor controlled oscillator (SCO) and digitally controlled oscillator (DCO). The D-latch is designed using transmission gate based MUX for power optimization. A CDC design of 7-stage, 9-stage and 11-stage tested for 1-18 fF and simulated using mentor graphics Eldo tool with parasitic. Since the proposed design does not use resistance component, the total power dissipation is reduced to 2.3621 mW for CDC designed using 9-stage SCO and DCO.

  12. The Impact of a Participant-Based Accounting Cycle Course on Student Performance in Intermediate Financial Accounting I

    Science.gov (United States)

    Siagian, Ferdinand T.; Khan, Mohammad

    2016-01-01

    The authors investigated whether students in an Intermediate Financial Accounting I course who took a 1-credit, participant-based accounting cycle course performed better than students who did not take the accounting cycle course. Results indicate a higher likelihood of earning a better grade for students who took the accounting cycle course even…

  13. Vehicle recognition by using acoustic signature and classic DSP techniques

    Directory of Open Access Journals (Sweden)

    María Fernanda Díaz Velásquez

    2016-06-01

    Full Text Available This paper shows the application of the classic technique of digital signal processing (DSP, the cross-correlation, used for the detection of acoustic signatures of road traffic in Cali city, Colombia. Future goal is to build a detection software that through real time measures allows us estimate the levels of acoustic pollution in the city by using simulation models of road traffic, in the framework of environmentally-friendly smart cities. Final results of the experimental tests showed an accuracy of 71.43% for specific vehicle detection.

  14. Study on HRA-based method for assessing digital man-machine interface

    International Nuclear Information System (INIS)

    Li Pengcheng; Dai Licao; Zhang Li; Zhao Ming; Hu Hong

    2014-01-01

    In order to identify the design flaws of digital man-machine interface (MMI) that may trigger human errors or weaken the performance of operators, a HRA-based method (namely HCR + CREAM + HEC) for assessing digital MMI was established. Firstly, the HCR method was used to identify the risk scenarios of high human error probability from the overall event as a whole perspective. Then, for the identified high-risk scenarios, the CREAM was adopted to determine the various error modes and its error probability, and the failure probability was ranked. Finally, the human factors engineering checklist of digital MMI was established according to the characteristics of digital MMI, it was used to check the digital MMI with high error probability in order to identify the design flaws of digital MMI, and the suggestions of optimization were provided. The results show that the provided assessment method can quickly and efficiently identify the design flaws of digital MMI which easily trigger human errors, and the safety of operation of the digital control system for nuclear power plants can be enhanced by optimization of design. (authors)

  15. 14 CFR Sec. 1-4 - System of accounts coding.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false System of accounts coding. Sec. 1-4 Section... General Accounting Provisions Sec. 1-4 System of accounts coding. (a) A four digit control number is assigned for each balance sheet and profit and loss account. Each balance sheet account is numbered...

  16. Quantification of 235U and 238U activity concentrations for undeclared nuclear materials by a digital gamma-gamma coincidence spectroscopy.

    Science.gov (United States)

    Zhang, Weihua; Yi, Jing; Mekarski, Pawel; Ungar, Kurt; Hauck, Barry; Kramer, Gary H

    2011-06-01

    The purpose of this study is to investigate the possibility of verifying depleted uranium (DU), natural uranium (NU), low enriched uranium (LEU) and high enriched uranium (HEU) by a developed digital gamma-gamma coincidence spectroscopy. The spectroscopy consists of two NaI(Tl) scintillators and XIA LLC Digital Gamma Finder (DGF)/Pixie-4 software and card package. The results demonstrate that the spectroscopy provides an effective method of (235)U and (238)U quantification based on the count rate of their gamma-gamma coincidence counting signatures. The main advantages of this approach over the conventional gamma spectrometry include the facts of low background continuum near coincident signatures of (235)U and (238)U, less interference from other radionuclides by the gamma-gamma coincidence counting, and region-of-interest (ROI) imagine analysis for uranium enrichment determination. Compared to conventional gamma spectrometry, the method offers additional advantage of requiring minimal calibrations for (235)U and (238)U quantification at different sample geometries. Crown Copyright © 2011. Published by Elsevier Ltd. All rights reserved.

  17. Blind Quantum Signature with Blind Quantum Computation

    Science.gov (United States)

    Li, Wei; Shi, Ronghua; Guo, Ying

    2017-04-01

    Blind quantum computation allows a client without quantum abilities to interact with a quantum server to perform a unconditional secure computing protocol, while protecting client's privacy. Motivated by confidentiality of blind quantum computation, a blind quantum signature scheme is designed with laconic structure. Different from the traditional signature schemes, the signing and verifying operations are performed through measurement-based quantum computation. Inputs of blind quantum computation are securely controlled with multi-qubit entangled states. The unique signature of the transmitted message is generated by the signer without leaking information in imperfect channels. Whereas, the receiver can verify the validity of the signature using the quantum matching algorithm. The security is guaranteed by entanglement of quantum system for blind quantum computation. It provides a potential practical application for e-commerce in the cloud computing and first-generation quantum computation.

  18. Feed particle size evaluation: conventional approach versus digital holography based image analysis

    Directory of Open Access Journals (Sweden)

    Vittorio Dell’Orto

    2010-01-01

    Full Text Available The aim of this study was to evaluate the application of image analysis approach based on digital holography in defining particle size in comparison with the sieve shaker method (sieving method as reference method. For this purpose ground corn meal was analyzed by a sieve shaker Retsch VS 1000 and by image analysis approach based on digital holography. Particle size from digital holography were compared with results obtained by screen (sieving analysis for each of size classes by a cumulative distribution plot. Comparison between particle size values obtained by sieving method and image analysis indicated that values were comparable in term of particle size information, introducing a potential application for digital holography and image analysis in feed industry.

  19. A model for a PC-based, universal-format, multimedia digitization system: moving beyond the scanner.

    Science.gov (United States)

    McEachen, James C; Cusack, Thomas J; McEachen, John C

    2003-08-01

    Digitizing images for use in case presentations based on hardcopy films, slides, photographs, negatives, books, and videos can present a challenging task. Scanners and digital cameras have become standard tools of the trade. Unfortunately, use of these devices to digitize multiple images in many different media formats can be a time-consuming and in some cases unachievable process. The authors' goal was to create a PC-based solution for digitizing multiple media formats in a timely fashion while maintaining adequate image presentation quality. The authors' PC-based solution makes use of off-the-shelf hardware applications to include a digital document camera (DDC), VHS video player, and video-editing kit. With the assistance of five staff radiologists, the authors examined the quality of multiple image types digitized with this equipment. The authors also quantified the speed of digitization of various types of media using the DDC and video-editing kit. With regard to image quality, the five staff radiologists rated the digitized angiography, CT, and MR images as adequate to excellent for use in teaching files and case presentations. With regard to digitized plain films, the average rating was adequate. As for performance, the authors recognized a 68% improvement in the time required to digitize hardcopy films using the DDC instead of a professional quality scanner. The PC-based solution provides a means for digitizing multiple images from many different types of media in a timely fashion while maintaining adequate image presentation quality.

  20. A compact wideband precision impedance measurement system based on digital auto-balancing bridge

    International Nuclear Information System (INIS)

    Hu, Binxin; Wang, Jinyu; Song, Guangdong; Zhang, Faxiang

    2016-01-01

    The ac impedance spectroscopy measurements are predominantly taken by using impedance analyzers based on analog auto-balancing bridge. However, those bench-top analyzers are generally complicated, bulky and expensive, thus limiting their usage in industrial field applications. This paper presents the development of a compact wideband precision measurement system based on digital auto-balancing bridge. The methods of digital auto-balancing bridge and digital lock-in amplifier are analyzed theoretically. The overall design and several key sections including null detector, direct digital synthesizer-based sampling clock, and digital control unit are introduced in detail. The results show that the system achieves a basic measurement accuracy of 0.05% with a frequency range of 20 Hz–2 MHz. The advantages of versatile measurement capacity, fast measurement speed, small size and low cost make it quite suitable for industrial field applications. It is demonstrated that this system is practical and effective by applying in determining the impedance-temperature characteristic of a motor starter PTC thermistor. (paper)

  1. Calibration of high resolution digital camera based on different photogrammetric methods

    International Nuclear Information System (INIS)

    Hamid, N F A; Ahmad, A

    2014-01-01

    This paper presents method of calibrating high-resolution digital camera based on different configuration which comprised of stereo and convergent. Both methods are performed in the laboratory and in the field calibration. Laboratory calibration is based on a 3D test field where a calibration plate of dimension 0.4 m × 0.4 m with grid of targets at different height is used. For field calibration, it uses the same concept of 3D test field which comprised of 81 target points located on a flat ground and the dimension is 9 m × 9 m. In this study, a non-metric high resolution digital camera called Canon Power Shot SX230 HS was calibrated in the laboratory and in the field using different configuration for data acquisition. The aim of the calibration is to investigate the behavior of the internal digital camera whether all the digital camera parameters such as focal length, principal point and other parameters remain the same or vice-versa. In the laboratory, a scale bar is placed in the test field for scaling the image and approximate coordinates were used for calibration process. Similar method is utilized in the field calibration. For both test fields, the digital images were acquired within short period using stereo and convergent configuration. For field calibration, aerial digital images were acquired using unmanned aerial vehicle (UAV) system. All the images were processed using photogrammetric calibration software. Different calibration results were obtained for both laboratory and field calibrations. The accuracy of the results is evaluated based on standard deviation. In general, for photogrammetric applications and other applications the digital camera must be calibrated for obtaining accurate measurement or results. The best method of calibration depends on the type of applications. Finally, for most applications the digital camera is calibrated on site, hence, field calibration is the best method of calibration and could be employed for obtaining accurate

  2. MATLAB-SIMULINK BASED INFORMATION SUPPORT FOR DIGITAL OVERCURRENT PROTECTION TEST SETS

    Directory of Open Access Journals (Sweden)

    I. V. Novash

    2017-01-01

    Full Text Available The implementation of information support for PC-based and hardware-software based sets for digital overcurrent protection devices and their models testing using MatLab-Simulink environment is considered. It is demonstrated that the mathematical modeling of a part of the power system – viz. of the generalized electric power object – could be based on rigid and flexible models. Rigid models implemented on the basis of mathematical description of electrical and magnetic circuits of a power system can be considered as a reference model for the simulation results that have been obtained with the aid of another simulation system to be compared with. It is proposed to implement flexible models for generalized electric power object in the MatLabSimulink environment that includes the SimPowerSystems component library targeted to power system modeling. The features of the parameters calculation of the SimPowerSystems component library blocks that the power system model is formed of are considered. Out of the Simulink standard blocks the models of a wye-connected current transformers were composed as well as the digital overcurrent protection, missing in the component library. A comparison of simulation results of one and the same generalized electric power object implemented in various PC-based software packages was undertaken. The divergence of simulation results did not exceed 3 %; the latter allows us to recommend the MatLab-Simulink environment for information support creation for hardware-software based sets for digital overcurrent protection devices testing. The structure of the hardware-software based set for digital overcurrent protection device testing using the Omicron CMC 356 has been suggested. Time to trip comparison between the real digital protection device МР 801 and the model with the parameters which are exactly match the parameters of the prototype device was carried out using the identical test inputs. The results of the tests

  3. Signatures of High-Scale Supersymmetry at the LHC

    CERN Multimedia

    CERN. Geneva; Spiropulu, Maria; Treille, D

    2004-01-01

    I will discuss the experimental signatures at the LHC of a novel paradigm-shift away from naturalness, suggested by the cosmological constant problem and the multitude of vacua in string theory. In the new paradigm supersymmetry can be broken near the unification scale, and the only light superparticles are the gauginos and higgsinos, which account for the successful unification of gauge couplings. This framework removes all the phenomenological difficulties of standard SUSY. The mass of the Higgs is in the range 120-160 GeV. Measuring the couplings of the Higgs to the gauginos and higgsinos precicely tests for high-scale SUSY. The gluino is strikingly long lived, and a measurement of its lifetime can determine the SUSY breaking scale. Signatures at the LHC detectors include out-of-time energy depositions, displaced vertices, and intermittent tracks.

  4. Improved method for SNR prediction in machine-learning-based test

    NARCIS (Netherlands)

    Sheng, Xiaoqin; Kerkhoff, Hans G.

    2010-01-01

    This paper applies an improved method for testing the signal-to-noise ratio (SNR) of Analogue-to-Digital Converters (ADC). In previous work, a noisy and nonlinear pulse signal is exploited as the input stimulus to obtain the signature results of ADC. By applying a machine-learning-based approach,

  5. How digital design shapes political participation: A natural experiment with social information.

    Science.gov (United States)

    Hale, Scott A; John, Peter; Margetts, Helen; Yasseri, Taha

    2018-01-01

    Political behaviour increasingly takes place on digital platforms, where people are presented with a range of social information-real-time feedback about the behaviour of peers and reference groups-which can stimulate (or depress) participation. This social information is hypothesized to impact the distribution of political activity, stimulating participation in mobilizations that are increasing in popularity, and depressing participation in those that appear to be less popular, leading to a non-normal distribution. Changes to these platforms can generate natural experiments allowing for an estimate of the impact of different kinds of social information on participation. This paper tests the hypothesis that social information shapes the distribution of political mobilizations by examining the introduction of trending information to the homepage of the UK government petition platform. The introduction of the trending feature did not increase the overall number of signatures per day, but the distribution of signatures across petitions changed significantly-the most popular petitions gained more signatures at the expense of those with fewer signatories. We further find significant differences between petitions trending at different ranks on the homepage. This evidence suggests that the ubiquity of trending information on digital platforms is introducing instability into political markets, as has been shown for cultural markets. As well as highlighting the importance of digital design in shaping political behaviour, the findings suggest that a non-negligible group of individuals visit the homepage of the site looking for petitions to sign, without having decided the issues they wish to support in advance. These 'aimless petitioners' are particularly susceptible to changes in social information.

  6. Design of Genomic Signatures of Pathogen Identification & Characterization

    Energy Technology Data Exchange (ETDEWEB)

    Slezak, T; Gardner, S; Allen, J; Vitalis, E; Jaing, C

    2010-02-09

    This chapter will address some of the many issues associated with the identification of signatures based on genomic DNA/RNA, which can be used to identify and characterize pathogens for biodefense and microbial forensic goals. For the purposes of this chapter, we define a signature as one or more strings of contiguous genomic DNA or RNA bases that are sufficient to identify a pathogenic target of interest at the desired resolution and which could be instantiated with particular detection chemistry on a particular platform. The target may be a whole organism, an individual functional mechanism (e.g., a toxin gene), or simply a nucleic acid indicative of the organism. The desired resolution will vary with each program's goals but could easily range from family to genus to species to strain to isolate. The resolution may not be taxonomically based but rather pan-mechanistic in nature: detecting virulence or antibiotic-resistance genes shared by multiple microbes. Entire industries exist around different detection chemistries and instrument platforms for identification of pathogens, and we will only briefly mention a few of the techniques that we have used at Lawrence Livermore National Laboratory (LLNL) to support our biosecurity-related work since 2000. Most nucleic acid based detection chemistries involve the ability to isolate and amplify the signature target region(s), combined with a technique to detect the amplification. Genomic signature based identification techniques have the advantage of being precise, highly sensitive and relatively fast in comparison to biochemical typing methods and protein signatures. Classical biochemical typing methods were developed long before knowledge of DNA and resulted in dozens of tests (Gram's stain, differential growth characteristics media, etc.) that could be used to roughly characterize the major known pathogens (of course some are uncultivable). These tests could take many days to complete and precise resolution

  7. Research on Methodology to Prioritize Critical Digital Assets based on Nuclear Risk Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Wonjik; Kwon, Kookheui; Kim, Hyundoo [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2016-10-15

    Digital systems are used in nuclear facilities to monitor and control various types of field devices, as well as to obtain and store vital information. Therefore, it is getting important for nuclear facilities to protect digital systems from cyber-attack in terms of safety operation and public health since cyber compromise of these systems could lead to unacceptable radiological consequences. Based on KINAC/RS-015 which is a cyber security regulatory standard, regulatory activities for cyber security at nuclear facilities generally focus on critical digital assets (CDAs) which are safety, security, and emergency preparedness related digital assets. Critical digital assets are estimated over 60% among all digital assets in a nuclear power plant. Therefore, it was required to prioritize critical digital assets to improve efficiency of regulation and implementation. In this paper, the research status on methodology development to prioritize critical digital assets based on nuclear risk assessment will be introduced. In this paper, to derive digital asset directly affect accident, PRA results (ET, FT, and minimal cut set) are analyzed. According to result of analysis, digital systems related to CD are derived ESF-CCS (safety-related component control system) and Process-CCS (non-safety-related component control system) as well as Engineered Safety Features Actuation System (ESFAS). These digital assets can be identified Vital Digital Asset (VDA). Hereafter, to develop general methodology which was identified VDA related to accident among CDAs, (1) method using result of minimal cut set in PRA model will be studied and (2) method quantifying result of Digital I and C PRA which is performed to reflect all digital cabinet related to system in FT will be studied.

  8. Research on Methodology to Prioritize Critical Digital Assets based on Nuclear Risk Assessment

    International Nuclear Information System (INIS)

    Kim, Wonjik; Kwon, Kookheui; Kim, Hyundoo

    2016-01-01

    Digital systems are used in nuclear facilities to monitor and control various types of field devices, as well as to obtain and store vital information. Therefore, it is getting important for nuclear facilities to protect digital systems from cyber-attack in terms of safety operation and public health since cyber compromise of these systems could lead to unacceptable radiological consequences. Based on KINAC/RS-015 which is a cyber security regulatory standard, regulatory activities for cyber security at nuclear facilities generally focus on critical digital assets (CDAs) which are safety, security, and emergency preparedness related digital assets. Critical digital assets are estimated over 60% among all digital assets in a nuclear power plant. Therefore, it was required to prioritize critical digital assets to improve efficiency of regulation and implementation. In this paper, the research status on methodology development to prioritize critical digital assets based on nuclear risk assessment will be introduced. In this paper, to derive digital asset directly affect accident, PRA results (ET, FT, and minimal cut set) are analyzed. According to result of analysis, digital systems related to CD are derived ESF-CCS (safety-related component control system) and Process-CCS (non-safety-related component control system) as well as Engineered Safety Features Actuation System (ESFAS). These digital assets can be identified Vital Digital Asset (VDA). Hereafter, to develop general methodology which was identified VDA related to accident among CDAs, (1) method using result of minimal cut set in PRA model will be studied and (2) method quantifying result of Digital I and C PRA which is performed to reflect all digital cabinet related to system in FT will be studied

  9. Detecting Hacked Twitter Accounts based on Behavioural Change

    NARCIS (Netherlands)

    Nauta, Meike; Habib, Mena Badieh; van Keulen, Maurice

    Social media accounts are valuable for hackers for spreading phishing links, malware and spam. Furthermore, some people deliberately hack an acquaintance to damage his or her image. This paper describes a classification for detecting hacked Twitter accounts. The model is mainly based on features

  10. Digital Simulation-Based Training: A Meta-Analysis

    Science.gov (United States)

    Gegenfurtner, Andreas; Quesada-Pallarès, Carla; Knogler, Maximilian

    2014-01-01

    This study examines how design characteristics in digital simulation-based learning environments moderate self-efficacy and transfer of learning. Drawing on social cognitive theory and the cognitive theory of multimedia learning, the meta-analysis psychometrically cumulated k?=?15 studies of 25 years of research with a total sample size of…

  11. Fermilab Recycler Ring BPM Upgrade Based on Digital Receiver Technology

    Science.gov (United States)

    Webber, R.; Crisp, J.; Prieto, P.; Voy, D.; Briegel, C.; McClure, C.; West, R.; Pordes, S.; Mengel, M.

    2004-11-01

    Electronics for the 237 BPMs in the Fermilab Recycler Ring have been upgraded from a log-amplifier based system to a commercially produced digitizer-digital down converter based system. The hardware consists of a pre-amplifier connected to a split-plate BPM, an analog differential receiver-filter module and an 8-channel 80-MHz digital down converter VME board. The system produces position and intensity with a dynamic range of 30 dB and a resolution of ±10 microns. The position measurements are made on 2.5-MHz bunched beam and barrier buckets of the un-bunched beam. The digital receiver system operates in one of six different signal processing modes that include 2.5-MHz average, 2.5-MHz bunch-by-bunch, 2.5-MHz narrow band, unbunched average, un-bunched head/tail and 89-kHz narrow band. Receiver data is acquired on any of up to sixteen clock events related to Recycler beam transfers and other machine activities. Data from the digital receiver board are transferred to the front-end CPU for position and intensity computation on an on-demand basis through the VME bus. Data buffers are maintained for each of the acquisition events and support flash, closed orbit and turn-by-turn measurements. A calibration system provides evaluation of the BPM signal path and application programs.

  12. Random number generation based on digital differential chaos

    KAUST Repository

    Zidan, Mohammed A.

    2012-07-29

    In this paper, we present a fully digital differential chaos based random number generator. The output of the digital circuit is proved to be chaotic by calculating the output time series maximum Lyapunov exponent. We introduce a new post processing technique to improve the distribution and statistical properties of the generated data. The post-processed output passes the NIST Sp. 800-22 statistical tests. The system is written in Verilog VHDL and realized on Xilinx Virtex® FPGA. The generator can fit into a very small area and have a maximum throughput of 2.1 Gb/s.

  13. Signatures of Majorana bound states in one-dimensional topological superconductors

    International Nuclear Information System (INIS)

    Pientka, Falko

    2014-01-01

    Topological states of matter have fascinated condensed matter physicists for the past three decades. Famous examples include the integer and fractional quantum Hall states exhibiting a spectacular conductance quantization as well as topological insulators in two and three dimensions featuring gapless Dirac fermions at the boundary. Very recently, novel topological phases in superconductors have been subject of intense experimental and theoretical investigation. One-dimensional topological superconductors are particularly intriguing as they host exotic Majorana end states. These are zero-energy bound states with nonabelian exchange statistics potentially useful for topologically protected quantum computing. Recent theoretical and experimental advances have put the realization of Majorana states within reach of current measurement techniques. In this thesis we investigate signatures of Majorana bound states in realistic experiments aiming to improve the theoretical understanding of ongoing experimental efforts and to design novel measurement schemes, which exhibit convincing signatures of Majoranas. In particular we account for nonideal experimental conditions which can lead to qualitatively new features. Possible signatures of Majoranas can be accessed in the Josephson current through a weak link between two topological superconductors although the signatures in the dc Josephson effect are typically obscured by inevitable quasiparticle relaxation in the superconductor. Here we propose a measurement scheme in mesoscopic superconducting rings, where Majorana signatures persist even for infinitely fast relaxation. In a separate project we outline an alternative to the standard Josephson experiment in topological superconductors based on quantum wires. We delineate how Majoranas can be detected, when the Josephson current is induced by noncollinear magnetic fields applied to the two banks of the junction instead of a superconducting phase difference. Another important

  14. Estimating physiological skin parameters from hyperspectral signatures

    Science.gov (United States)

    Vyas, Saurabh; Banerjee, Amit; Burlina, Philippe

    2013-05-01

    We describe an approach for estimating human skin parameters, such as melanosome concentration, collagen concentration, oxygen saturation, and blood volume, using hyperspectral radiometric measurements (signatures) obtained from in vivo skin. We use a computational model based on Kubelka-Munk theory and the Fresnel equations. This model forward maps the skin parameters to a corresponding multiband reflectance spectra. Machine-learning-based regression is used to generate the inverse map, and hence estimate skin parameters from hyperspectral signatures. We test our methods using synthetic and in vivo skin signatures obtained in the visible through the short wave infrared domains from 24 patients of both genders and Caucasian, Asian, and African American ethnicities. Performance validation shows promising results: good agreement with the ground truth and well-established physiological precepts. These methods have potential use in the characterization of skin abnormalities and in minimally-invasive prescreening of malignant skin cancers.

  15. Digital Image Processing Technique for Breast Cancer Detection

    Science.gov (United States)

    Guzmán-Cabrera, R.; Guzmán-Sepúlveda, J. R.; Torres-Cisneros, M.; May-Arrioja, D. A.; Ruiz-Pinales, J.; Ibarra-Manzano, O. G.; Aviña-Cervantes, G.; Parada, A. González

    2013-09-01

    Breast cancer is the most common cause of death in women and the second leading cause of cancer deaths worldwide. Primary prevention in the early stages of the disease becomes complex as the causes remain almost unknown. However, some typical signatures of this disease, such as masses and microcalcifications appearing on mammograms, can be used to improve early diagnostic techniques, which is critical for women’s quality of life. X-ray mammography is the main test used for screening and early diagnosis, and its analysis and processing are the keys to improving breast cancer prognosis. As masses and benign glandular tissue typically appear with low contrast and often very blurred, several computer-aided diagnosis schemes have been developed to support radiologists and internists in their diagnosis. In this article, an approach is proposed to effectively analyze digital mammograms based on texture segmentation for the detection of early stage tumors. The proposed algorithm was tested over several images taken from the digital database for screening mammography for cancer research and diagnosis, and it was found to be absolutely suitable to distinguish masses and microcalcifications from the background tissue using morphological operators and then extract them through machine learning techniques and a clustering algorithm for intensity-based segmentation.

  16. Digital Humanities and networked digital media

    DEFF Research Database (Denmark)

    Finnemann, Niels Ole

    2014-01-01

    This article discusses digital humanities and the growing diversity of digital media, digital materials and digital methods. The first section describes the humanities computing tradition formed around the interpretation of computation as a rule-based process connected to a concept of digital...... materials centred on the digitisation of non-digital, finite works, corpora and oeuvres. The second section discusses “the big tent” of contemporary digital humanities. It is argued that there can be no unifying interpretation of digital humanities above the level of studying digital materials with the help...... of software-supported methods. This is so, in part, because of the complexity of the world and, in part, because digital media remain open to the projection of new epistemologies onto the functional architecture of these media. The third section discusses the heterogeneous character of digital materials...

  17. Towards a Holistic Cortical Thickness Descriptor: Heat Kernel-Based Grey Matter Morphology Signatures.

    Science.gov (United States)

    Wang, Gang; Wang, Yalin

    2017-02-15

    In this paper, we propose a heat kernel based regional shape descriptor that may be capable of better exploiting volumetric morphological information than other available methods, thereby improving statistical power on brain magnetic resonance imaging (MRI) analysis. The mechanism of our analysis is driven by the graph spectrum and the heat kernel theory, to capture the volumetric geometry information in the constructed tetrahedral meshes. In order to capture profound brain grey matter shape changes, we first use the volumetric Laplace-Beltrami operator to determine the point pair correspondence between white-grey matter and CSF-grey matter boundary surfaces by computing the streamlines in a tetrahedral mesh. Secondly, we propose multi-scale grey matter morphology signatures to describe the transition probability by random walk between the point pairs, which reflects the inherent geometric characteristics. Thirdly, a point distribution model is applied to reduce the dimensionality of the grey matter morphology signatures and generate the internal structure features. With the sparse linear discriminant analysis, we select a concise morphology feature set with improved classification accuracies. In our experiments, the proposed work outperformed the cortical thickness features computed by FreeSurfer software in the classification of Alzheimer's disease and its prodromal stage, i.e., mild cognitive impairment, on publicly available data from the Alzheimer's Disease Neuroimaging Initiative. The multi-scale and physics based volumetric structure feature may bring stronger statistical power than some traditional methods for MRI-based grey matter morphology analysis. Copyright © 2016 Elsevier Inc. All rights reserved.

  18. A Robust Blind Quantum Copyright Protection Method for Colored Images Based on Owner's Signature

    Science.gov (United States)

    Heidari, Shahrokh; Gheibi, Reza; Houshmand, Monireh; Nagata, Koji

    2017-08-01

    Watermarking is the imperceptible embedding of watermark bits into multimedia data in order to use for different applications. Among all its applications, copyright protection is the most prominent usage which conceals information about the owner in the carrier, so as to prohibit others from assertion copyright. This application requires high level of robustness. In this paper, a new blind quantum copyright protection method based on owners's signature in RGB images is proposed. The method utilizes one of the RGB channels as indicator and two remained channels are used for embedding information about the owner. In our contribution the owner's signature is considered as a text. Therefore, in order to embed in colored image as watermark, a new quantum representation of text based on ASCII character set is offered. Experimental results which are analyzed in MATLAB environment, exhibit that the presented scheme shows good performance against attacks and can be used to find out who the real owner is. Finally, the discussed quantum copyright protection method is compared with a related work that our analysis confirm that the presented scheme is more secure and applicable than the previous ones currently found in the literature.

  19. A qualitative signature for early diagnosis of hepatocellular carcinoma based on relative expression orderings.

    Science.gov (United States)

    Ao, Lu; Zhang, Zimei; Guan, Qingzhou; Guo, Yating; Guo, You; Zhang, Jiahui; Lv, Xingwei; Huang, Haiyan; Zhang, Huarong; Wang, Xianlong; Guo, Zheng

    2018-04-23

    Currently, using biopsy specimens to confirm suspicious liver lesions of early hepatocellular carcinoma are not entirely reliable because of insufficient sampling amount and inaccurate sampling location. It is necessary to develop a signature to aid early hepatocellular carcinoma diagnosis using biopsy specimens even when the sampling location is inaccurate. Based on the within-sample relative expression orderings of gene pairs, we identified a simple qualitative signature to distinguish both hepatocellular carcinoma and adjacent non-tumour tissues from cirrhosis tissues of non-hepatocellular carcinoma patients. A signature consisting of 19 gene pairs was identified in the training data sets and validated in 2 large collections of samples from biopsy and surgical resection specimens. For biopsy specimens, 95.7% of 141 hepatocellular carcinoma tissues and all (100%) of 108 cirrhosis tissues of non-hepatocellular carcinoma patients were correctly classified. Especially, all (100%) of 60 hepatocellular carcinoma adjacent normal tissues and 77.5% of 80 hepatocellular carcinoma adjacent cirrhosis tissues were classified to hepatocellular carcinoma. For surgical resection specimens, 99.7% of 733 hepatocellular carcinoma specimens were correctly classified to hepatocellular carcinoma, while 96.1% of 254 hepatocellular carcinoma adjacent cirrhosis tissues and 95.9% of 538 hepatocellular carcinoma adjacent normal tissues were classified to hepatocellular carcinoma. In contrast, 17.0% of 47 cirrhosis from non-hepatocellular carcinoma patients waiting for liver transplantation were classified to hepatocellular carcinoma, indicating that some patients with long-lasting cirrhosis could have already gained hepatocellular carcinoma characteristics. The signature can distinguish both hepatocellular carcinoma tissues and tumour-adjacent tissues from cirrhosis tissues of non-hepatocellular carcinoma patients even using inaccurately sampled biopsy specimens, which can aid early

  20. Towards Knowledge-Based Digital Libraries

    NARCIS (Netherlands)

    Feng, L.; Jeusfeld, M.A.; Hoppenbrouwers, J.

    From the standpoint of satisfying human's information needs, the current digital library (DL) systems suffer from the following two shortcomings: (i) inadequate high-level cognition support; (ii) inadequate knowledge sharing facilities. In this article, we introduce a two-layered digital library

  1. Race-Based Health Disparities and the Digital Divide: Implications for Nursing Practice.

    Science.gov (United States)

    Price, Zula

    2015-12-01

    Knowledge of the sources of race-based health disparities could improve nursing practice and education in minority underserved communities. This purpose of this paper was to consider if Black-nonBlack health disparities were at least in part explained by Black-nonBlack disparities in access to Internet-based health information. With data on the U.S. adult population from the 2012 General Social Survey, the parameters of a health production function in which computer usage as an input was estimated. It was found that while there are Black-nonBlack disparities in health, once computer usage was accounted for, Black-nonBlack health disparities disappeared. This suggests nursing and health interventions that improve Internet access for Black patients in underserved communities could improve the health of Black Americans and close the racial health disparities gap. These findings complement recent nursing researchfindings that suggest closing Black-nonBlack disparities in computer access, the "digital divide," can render nursing practice more effective in providing care to minority and underserved communities.

  2. Risk-Based Educational Accountability in Dutch Primary Education

    Science.gov (United States)

    Timmermans, A. C.; de Wolf, I. F.; Bosker, R. J.; Doolaard, S.

    2015-01-01

    A recent development in educational accountability is a risk-based approach, in which intensity and frequency of school inspections vary across schools to make educational accountability more efficient and effective by enabling inspectorates to focus on organizations at risk. Characteristics relevant in predicting which schools are "at risk…

  3. Dynamic reliability of digital-based transmitters

    Energy Technology Data Exchange (ETDEWEB)

    Brissaud, Florent, E-mail: florent.brissaud.2007@utt.f [Institut National de l' Environnement Industriel et des Risques (INERIS), Parc Technologique Alata, BP 2, 60550 Verneuil-en-Halatte (France) and Universite de Technologie de Troyes - UTT, Institut Charles Delaunay - ICD and UMR CNRS 6279 STMR, 12 rue Marie Curie, BP 2060, 10010 Troyes Cedex (France); Smidts, Carol [Ohio State University (OSU), Nuclear Engineering Program, Department of Mechanical Engineering, Scott Laboratory, 201 W 19th Ave, Columbus OH 43210 (United States); Barros, Anne; Berenguer, Christophe [Universite de Technologie de Troyes (UTT), Institut Charles Delaunay (ICD) and UMR CNRS 6279 STMR, 12 rue Marie Curie, BP 2060, 10010 Troyes Cedex (France)

    2011-07-15

    Dynamic reliability explicitly handles the interactions between the stochastic behaviour of system components and the deterministic behaviour of process variables. While dynamic reliability provides a more efficient and realistic way to perform probabilistic risk assessment than 'static' approaches, its industrial level applications are still limited. Factors contributing to this situation are the inherent complexity of the theory and the lack of a generic platform. More recently the increased use of digital-based systems has also introduced additional modelling challenges related to specific interactions between system components. Typical examples are the 'intelligent transmitters' which are able to exchange information, and to perform internal data processing and advanced functionalities. To make a contribution to solving these challenges, the mathematical framework of dynamic reliability is extended to handle the data and information which are processed and exchanged between systems components. Stochastic deviations that may affect system properties are also introduced to enhance the modelling of failures. A formalized Petri net approach is then presented to perform the corresponding reliability analyses using numerical methods. Following this formalism, a versatile model for the dynamic reliability modelling of digital-based transmitters is proposed. Finally the framework's flexibility and effectiveness is demonstrated on a substantial case study involving a simplified model of a nuclear fast reactor.

  4. CMOS cassette for digital upgrade of film-based mammography systems

    Science.gov (United States)

    Baysal, Mehmet A.; Toker, Emre

    2006-03-01

    While full-field digital mammography (FFDM) technology is gaining clinical acceptance, the overwhelming majority (96%) of the installed base of mammography systems are conventional film-screen (FSM) systems. A high performance, and economical digital cassette based product to conveniently upgrade FSM systems to FFDM would accelerate the adoption of FFDM, and make the clinical and technical advantages of FFDM available to a larger population of women. The planned FFDM cassette is based on our commercial Digital Radiography (DR) cassette for 10 cm x 10 cm field-of-view spot imaging and specimen radiography, utilizing a 150 micron columnar CsI(Tl) scintillator and 48 micron active-pixel CMOS sensor modules. Unlike a Computer Radiography (CR) cassette, which requires an external digitizer, our DR cassette transfers acquired images to a display workstation within approximately 5 seconds of exposure, greatly enhancing patient flow. We will present the physical performance of our prototype system against other FFDM systems in clinical use today, using established objective criteria such as the Modulation Transfer Function (MTF), Detective Quantum Efficiency (DQE), and subjective criteria, such as a contrast-detail (CD-MAM) observer performance study. Driven by the strong demand from the computer industry, CMOS technology is one of the lowest cost, and the most readily accessible technologies available for FFDM today. Recent popular use of CMOS imagers in high-end consumer cameras have also resulted in significant advances in the imaging performance of CMOS sensors against rivaling CCD sensors. This study promises to take advantage of these unique features to develop the first CMOS based FFDM upgrade cassette.

  5. Information Activities and Appropriation in Teacher Trainees' Digital, Group-Based Learning

    Science.gov (United States)

    Hanell, Fredrik

    2016-01-01

    Introduction: This paper reports results from an ethnographic study of teacher trainees' information activities in digital, group-based learning and their relation to the interplay between use and appropriation of digital tools and the learning environment. Method: The participants in the present study are 249 pre-school teacher trainees in…

  6. Digital pathology in nephrology clinical trials, research, and pathology practice.

    Science.gov (United States)

    Barisoni, Laura; Hodgin, Jeffrey B

    2017-11-01

    In this review, we will discuss (i) how the recent advancements in digital technology and computational engineering are currently applied to nephropathology in the setting of clinical research, trials, and practice; (ii) the benefits of the new digital environment; (iii) how recognizing its challenges provides opportunities for transformation; and (iv) nephropathology in the upcoming era of kidney precision and predictive medicine. Recent studies highlighted how new standardized protocols facilitate the harmonization of digital pathology database infrastructure and morphologic, morphometric, and computer-aided quantitative analyses. Digital pathology enables robust protocols for clinical trials and research, with the potential to identify previously underused or unrecognized clinically useful parameters. The integration of digital pathology with molecular signatures is leading the way to establishing clinically relevant morpho-omic taxonomies of renal diseases. The introduction of digital pathology in clinical research and trials, and the progressive implementation of the modern software ecosystem, opens opportunities for the development of new predictive diagnostic paradigms and computer-aided algorithms, transforming the practice of renal disease into a modern computational science.

  7. Digital Afterlife : A General Overview

    OpenAIRE

    Adhikari, Sandeep

    2012-01-01

    In this age of information, the means and mediums of exchanging information are adapting digital technologies that are developing at very rapid pace. Digital Afterlife can be understood as maintaining or transforming digital content of users present in the web-space according to users will in case of users deceased or incapability of operating their personal accounts which are considered to be a virtual representation of users in the web platforms. The user generated content can be termed as ...

  8. A digital bandlimited chaos-based communication system

    Science.gov (United States)

    Fontes, Rodrigo T.; Eisencraft, Marcio

    2016-08-01

    In recent years, many communication systems that use a function to encode an information in a chaotic signal were proposed. Since every transmission channel is bandlimited in nature, it is required to determine and to control the chaotic signal spectrum. This way, a bandlimited chaos-based communication system (CBCS) was proposed using digital filters and chaotic synchronization. As the filters modify the original chaotic system, it is necessary to study how their insertion affects chaotic synchronization. In this work, we present a digital discrete-time bandlimited CBCS system analysis, considering practical settings encountered in conventional communication systems. The proposed system is based on master-slave chaotic synchronization and the required conditions for its synchronization is obtained analytically for a general K-dimensional chaos generator map. The performance of this system is evaluated in terms of bit error rate. As a way to improve the signal to noise ratio, we also propose to filter the out-of-band noise in the receiver. Numerical simulations show the advantages of using such a scheme.

  9. FIR signature verification system characterizing dynamics of handwriting features

    Science.gov (United States)

    Thumwarin, Pitak; Pernwong, Jitawat; Matsuura, Takenobu

    2013-12-01

    This paper proposes an online signature verification method based on the finite impulse response (FIR) system characterizing time-frequency characteristics of dynamic handwriting features. First, the barycenter determined from both the center point of signature and two adjacent pen-point positions in the signing process, instead of one pen-point position, is used to reduce the fluctuation of handwriting motion. In this paper, among the available dynamic handwriting features, motion pressure and area pressure are employed to investigate handwriting behavior. Thus, the stable dynamic handwriting features can be described by the relation of the time-frequency characteristics of the dynamic handwriting features. In this study, the aforesaid relation can be represented by the FIR system with the wavelet coefficients of the dynamic handwriting features as both input and output of the system. The impulse response of the FIR system is used as the individual feature for a particular signature. In short, the signature can be verified by evaluating the difference between the impulse responses of the FIR systems for a reference signature and the signature to be verified. The signature verification experiments in this paper were conducted using the SUBCORPUS MCYT-100 signature database consisting of 5,000 signatures from 100 signers. The proposed method yielded equal error rate (EER) of 3.21% on skilled forgeries.

  10. A Secure and Efficient Certificateless Short Signature Scheme

    Directory of Open Access Journals (Sweden)

    Lin Cheng

    2013-07-01

    Full Text Available Certificateless public key cryptography combines advantage of traditional public key cryptography and identity-based public key cryptography as it avoids usage of certificates and resolves the key escrow problem. In 2007, Huang et al. classified adversaries against certificateless signatures according to their attack power into normal, strong and super adversaries (ordered by their attack power. In this paper, we propose a new certificateless short signature scheme and prove that it is secure against both of the super type I and the super type II adversaries. Our new scheme not only achieves the strongest security level but also has the shortest signature length (one group element. Compared with the other short certificateless signature schemes which have a similar security level, our new scheme has less operation cost.

  11. Optical spectral signatures of liquids by means of fiber optic technology for product and quality parameter identification

    Science.gov (United States)

    Mignani, A. G.; Ciaccheri, L.; Mencaglia, A. A.; Diaz-Herrera, N.; Garcia-Allende, P. B.; Ottevaere, H.; Thienpont, H.; Attilio, C.; Cimato, A.; Francalanci, S.; Paccagnini, A.; Pavone, F. S.

    2009-01-01

    Absorption spectroscopy in the wide 200-1700 nm spectral range is carried out by means of optical fiber instrumentation to achieve a digital mapping of liquids for the prediction of important quality parameters. Extra virgin olive oils from Italy and lubricant oils from turbines with different degrees of degradation were considered as "case studies". The spectral data were processed by means of multivariate analysis so as to obtain a correlation to quality parameters. In practice, the wide range absorption spectra were considered as an optical signature of the liquids from which to extract product quality information. The optical signatures of extra virgin olive oils were used to predict the content of the most important fatty acids. The optical signatures of lubricant oils were used to predict the concentration of the most important parameters for indicating the oil's degree of degradation, such as TAN, JOAP anti-wear index, and water content.

  12. Combating QR-Code-Based Compromised Accounts in Mobile Social Networks.

    Science.gov (United States)

    Guo, Dong; Cao, Jian; Wang, Xiaoqi; Fu, Qiang; Li, Qiang

    2016-09-20

    Cyber Physical Social Sensing makes mobile social networks (MSNs) popular with users. However, such attacks are rampant as malicious URLs are spread covertly through quick response (QR) codes to control compromised accounts in MSNs to propagate malicious messages. Currently, there are generally two types of methods to identify compromised accounts in MSNs: one type is to analyze the potential threats on wireless access points and the potential threats on handheld devices' operation systems so as to stop compromised accounts from spreading malicious messages; the other type is to apply the method of detecting compromised accounts in online social networks to MSNs. The above types of methods above focus neither on the problems of MSNs themselves nor on the interaction of sensors' messages, which leads to the restrictiveness of platforms and the simplification of methods. In order to stop the spreading of compromised accounts in MSNs effectively, the attacks have to be traced to their sources first. Through sensors, users exchange information in MSNs and acquire information by scanning QR codes. Therefore, analyzing the traces of sensor-related information helps to identify the compromised accounts in MSNs. This paper analyzes the diversity of information sending modes of compromised accounts and normal accounts, analyzes the regularity of GPS (Global Positioning System)-based location information, and introduces the concepts of entropy and conditional entropy so as to construct an entropy-based model based on machine learning strategies. To achieve the goal, about 500,000 accounts of Sina Weibo and about 100 million corresponding messages are collected. Through the validation, the accuracy rate of the model is proved to be as high as 87.6%, and the false positive rate is only 3.7%. Meanwhile, the comparative experiments of the feature sets prove that sensor-based location information can be applied to detect the compromised accounts in MSNs.

  13. Combating QR-Code-Based Compromised Accounts in Mobile Social Networks

    Directory of Open Access Journals (Sweden)

    Dong Guo

    2016-09-01

    Full Text Available Cyber Physical Social Sensing makes mobile social networks (MSNs popular with users. However, such attacks are rampant as malicious URLs are spread covertly through quick response (QR codes to control compromised accounts in MSNs to propagate malicious messages. Currently, there are generally two types of methods to identify compromised accounts in MSNs: one type is to analyze the potential threats on wireless access points and the potential threats on handheld devices’ operation systems so as to stop compromised accounts from spreading malicious messages; the other type is to apply the method of detecting compromised accounts in online social networks to MSNs. The above types of methods above focus neither on the problems of MSNs themselves nor on the interaction of sensors’ messages, which leads to the restrictiveness of platforms and the simplification of methods. In order to stop the spreading of compromised accounts in MSNs effectively, the attacks have to be traced to their sources first. Through sensors, users exchange information in MSNs and acquire information by scanning QR codes. Therefore, analyzing the traces of sensor-related information helps to identify the compromised accounts in MSNs. This paper analyzes the diversity of information sending modes of compromised accounts and normal accounts, analyzes the regularity of GPS (Global Positioning System-based location information, and introduces the concepts of entropy and conditional entropy so as to construct an entropy-based model based on machine learning strategies. To achieve the goal, about 500,000 accounts of Sina Weibo and about 100 million corresponding messages are collected. Through the validation, the accuracy rate of the model is proved to be as high as 87.6%, and the false positive rate is only 3.7%. Meanwhile, the comparative experiments of the feature sets prove that sensor-based location information can be applied to detect the compromised accounts in MSNs.

  14. Reliability analysis of digital based I and C system

    Energy Technology Data Exchange (ETDEWEB)

    Kang, I. S.; Cho, B. S.; Choi, M. J. [KOPEC, Yongin (Korea, Republic of)

    1999-10-01

    Rapidly, digital technology is being widely applied in replacing analog component installed in existing plant and designing new nuclear power plant for control and monitoring system in Korea as well as in foreign countries. Even though many merits of digital technology, it is being faced with a new problem of reliability assurance. The studies for solving this problem are being performed vigorously in foreign countries. The reliability of KNGR Engineered Safety Features Component Control System (ESF-CCS), digital based I and C system, was analyzed to verify fulfillment of the ALWR EPRI-URD requirement for reliability analysis and eliminate hazards in design applied new technology. The qualitative analysis using FMEA and quantitative analysis using reliability block diagram were performed. The results of analyses are shown in this paper.

  15. Digitized forensics: retaining a link between physical and digital crime scene traces using QR-codes

    Science.gov (United States)

    Hildebrandt, Mario; Kiltz, Stefan; Dittmann, Jana

    2013-03-01

    The digitization of physical traces from crime scenes in forensic investigations in effect creates a digital chain-of-custody and entrains the challenge of creating a link between the two or more representations of the same trace. In order to be forensically sound, especially the two security aspects of integrity and authenticity need to be maintained at all times. Especially the adherence to the authenticity using technical means proves to be a challenge at the boundary between the physical object and its digital representations. In this article we propose a new method of linking physical objects with its digital counterparts using two-dimensional bar codes and additional meta-data accompanying the acquired data for integration in the conventional documentation of collection of items of evidence (bagging and tagging process). Using the exemplary chosen QR-code as particular implementation of a bar code and a model of the forensic process, we also supply a means to integrate our suggested approach into forensically sound proceedings as described by Holder et al.1 We use the example of the digital dactyloscopy as a forensic discipline, where currently progress is being made by digitizing some of the processing steps. We show an exemplary demonstrator of the suggested approach using a smartphone as a mobile device for the verification of the physical trace to extend the chain-of-custody from the physical to the digital domain. Our evaluation of the demonstrator is performed towards the readability and the verification of its contents. We can read the bar code despite its limited size of 42 x 42 mm and rather large amount of embedded data using various devices. Furthermore, the QR-code's error correction features help to recover contents of damaged codes. Subsequently, our appended digital signature allows for detecting malicious manipulations of the embedded data.

  16. Electronic Signature Policy

    Science.gov (United States)

    Establishes the United States Environmental Protection Agency's approach to adopting electronic signature technology and best practices to ensure electronic signatures applied to official Agency documents are legally valid and enforceable

  17. Signature Pedagogy: A Literature Review of Social Studies and Technology Research

    Science.gov (United States)

    Beck, Dennis; Eno, Jenni

    2012-01-01

    A literature review of 121 peer-reviewed articles, books, and conference proceedings was conducted to determine the signature pedagogies of social studies education and technology integration. The authors found that the signature social studies pedagogy is based on two primary instructional models: direct-instruction and inquiry-based,…

  18. Server-Aided Verification Signature with Privacy for Mobile Computing

    Directory of Open Access Journals (Sweden)

    Lingling Xu

    2015-01-01

    Full Text Available With the development of wireless technology, much data communication and processing has been conducted in mobile devices with wireless connection. As we know that the mobile devices will always be resource-poor relative to static ones though they will improve in absolute ability, therefore, they cannot process some expensive computational tasks due to the constrained computational resources. According to this problem, server-aided computing has been studied in which the power-constrained mobile devices can outsource some expensive computation to a server with powerful resources in order to reduce their computational load. However, in existing server-aided verification signature schemes, the server can learn some information about the message-signature pair to be verified, which is undesirable especially when the message includes some secret information. In this paper, we mainly study the server-aided verification signatures with privacy in which the message-signature pair to be verified can be protected from the server. Two definitions of privacy for server-aided verification signatures are presented under collusion attacks between the server and the signer. Then based on existing signatures, two concrete server-aided verification signature schemes with privacy are proposed which are both proved secure.

  19. Digital radiography

    International Nuclear Information System (INIS)

    Brody, W.R.

    1984-01-01

    Digital Radiography begins with an orderly introduction to the fundamental concepts of digital imaging. The entire X-ray digital imagining system is described, from an overall characterization of image quality to specific components required for a digital radiographic system. Because subtraction is central to digital radiographic systems, the author details the use of various subtraction methods for image enhancement. Complex concepts are illustrated with numerous examples and presented in terms that can readily be understood by physicians without an advanced mathematics background. The second part of the book discusses implementations and applications of digital imagining systems based on area and scanned detector technologies. This section includes thorough coverage of digital fluoroscopy, scanned projection radiography, and film-based digital imaging systems, and features a state-of-the-art synopsis of the applications of digital subtraction angiography. The book concludes with a timely assessment of anticipated technological advances

  20. Algorithms for Hyperspectral Endmember Extraction and Signature Classification with Morphological Dendritic Networks

    Science.gov (United States)

    Schmalz, M.; Ritter, G.

    Accurate multispectral or hyperspectral signature classification is key to the nonimaging detection and recognition of space objects. Additionally, signature classification accuracy depends on accurate spectral endmember determination [1]. Previous approaches to endmember computation and signature classification were based on linear operators or neural networks (NNs) expressed in terms of the algebra (R, +, x) [1,2]. Unfortunately, class separation in these methods tends to be suboptimal, and the number of signatures that can be accurately classified often depends linearly on the number of NN inputs. This can lead to poor endmember distinction, as well as potentially significant classification errors in the presence of noise or densely interleaved signatures. In contrast to traditional CNNs, autoassociative morphological memories (AMM) are a construct similar to Hopfield autoassociatived memories defined on the (R, +, ?,?) lattice algebra [3]. Unlimited storage and perfect recall of noiseless real valued patterns has been proven for AMMs [4]. However, AMMs suffer from sensitivity to specific noise models, that can be characterized as erosive and dilative noise. On the other hand, the prior definition of a set of endmembers corresponds to material spectra lying on vertices of the minimum convex region covering the image data. These vertices can be characterized as morphologically independent patterns. It has further been shown that AMMs can be based on dendritic computation [3,6]. These techniques yield improved accuracy and class segmentation/separation ability in the presence of highly interleaved signature data. In this paper, we present a procedure for endmember determination based on AMM noise sensitivity, which employs morphological dendritic computation. We show that detected endmembers can be exploited by AMM based classification techniques, to achieve accurate signature classification in the presence of noise, closely spaced or interleaved signatures, and

  1. The New Digital-Receiver-Based System for Antiproton Beam Diagnostics

    CERN Document Server

    Angoletta, Maria Elena; Ludwig, M; Marqversen, O; Pedersen, F

    2001-01-01

    An innovative system to measure antiproton beam intensity, momentum spread and mean momentum in CERN's Antiproton Decelerator (AD) is described. This system is based on a state-of-the-art Digital Receiver (DRX) board, consisting of 8 Digital Down-Converter (DDC) chips and one Digital Signal Processor (DSP). An ultra-low-noise, wide-band AC beam transformer (0.2 MHz - 30 MHz) is used to measure AC beam current modulation. For bunched beams, the intensity is obtained by measuring the amplitude of the fundamental and second RF Fourier components. On the magnetic plateaus the beam is debunched for stochastic or electron cooling and longitudinal beam properties (intensity, momentum spread and mean momentum) are measured by FFT-based spectral analysis of Schottky signals. The system thus provides real time information characterising the machine performance; it has been used for troubleshooting and to fine-tune the AD, thus achieving further improved performances. This system has been operating since May 2000 and ty...

  2. Computer holography: 3D digital art based on high-definition CGH

    International Nuclear Information System (INIS)

    Matsushima, K; Arima, Y; Nishi, H; Yamashita, H; Yoshizaki, Y; Ogawa, K; Nakahara, S

    2013-01-01

    Our recent works of high-definition computer-generated holograms (CGH) and the techniques used for the creation, such as the polygon-based method, silhouette method and digitized holography, are summarized and reviewed in this paper. The concept of computer holography is proposed in terms of integrating and crystalizing the techniques into novel digital art.

  3. Blinding for unanticipated signatures

    NARCIS (Netherlands)

    D. Chaum (David)

    1987-01-01

    textabstractPreviously known blind signature systems require an amount of computation at least proportional to the number of signature types, and also that the number of such types be fixed in advance. These requirements are not practical in some applications. Here, a new blind signature technique

  4. Review and Analysis of Cryptographic Schemes Implementing Threshold Signature

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-03-01

    Full Text Available This work is devoted to the study of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, ellipt ic curves and bilinear pairings were investigated. Different methods of generation and verification of threshold signatures were explored, e.g. used in a mobile agents, Internet banking and e-currency. The significance of the work is determined by the reduction of the level of counterfeit electronic documents, signed by certain group of users.

  5. Cryocooled wideband digital channelizing radio-frequency receiver based on low-pass ADC

    International Nuclear Information System (INIS)

    Vernik, Igor V; Kirichenko, Dmitri E; Dotsenko, Vladimir V; Miller, Robert; Webber, Robert J; Shevchenko, Pavel; Talalaevskii, Andrei; Gupta, Deepnarayan; Mukhanov, Oleg A

    2007-01-01

    We have demonstrated a digital receiver performing direct digitization of radio-frequency signals over a wide frequency range from kilohertz to gigahertz. The complete system, consisting of a cryopackaged superconductor all-digital receiver (ADR) chip followed by room-temperature interface electronics and a field programmable gate array (FPGA) based post-processing module, has been developed. The ADR chip comprises a low-pass analog-to-digital converter (ADC) delta modulator with phase modulation-demodulation architecture together with digital in-phase and quadrature mixer and a pair of digital decimation filters. The chip is fabricated using a 4.5 kA cm -2 process and is cryopackaged using a commercial-off-the-shelf cryocooler. Experimental results in HF, VHF, UHF and L bands and their analysis, proving consistent operation of the cryopackaged ADR chip up to 24.32 GHz clock frequency, are presented and discussed

  6. 1 CFR 18.7 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 1 General Provisions 1 2010-01-01 2010-01-01 false Signature. 18.7 Section 18.7 General Provisions... PREPARATION AND TRANSMITTAL OF DOCUMENTS GENERALLY § 18.7 Signature. The original and each duplicate original... stamped beneath the signature. Initialed or impressed signatures will not be accepted. Documents submitted...

  7. THE ACCOUNTING POSTEMPLOYMENT BENEFITS BASED ON ACTUARIAL CALCULATIONS

    Directory of Open Access Journals (Sweden)

    Anna CEBOTARI

    2017-11-01

    Full Text Available The accounting post-employment benefits, based on actuarial calculations, at present remains a subject studied in Moldova only theoretically. Applying actuarial calculations of accounting in fact denotes its character of evolving. Because national accounting standards have been adapted to international, which, in turn, require the valuation of assets and debts at fair value, there is a need to draw up exact calculations on which stands the theory of probability and mathematical statistics. One of the main objectives of accounting information is reflected in its financial situations and providing internal and external users of the entity. Hence, arises the need to reflect highly reliable information that can be provided by applying actuarial calculations.

  8. Digital Communication Devices Based on Nonlinear Dynamics and Chaos

    National Research Council Canada - National Science Library

    Larson, Lawrence

    2003-01-01

    The final report of the ARO MURI "Digital Communications Based on Chaos and Nonlinear Dynamics" contains research results in the areas of chaos and nonlinear dynamics applied to wireless and optical communications...

  9. Method and apparatus for digitally based high speed x-ray spectrometer

    International Nuclear Information System (INIS)

    Warburton, W.K.; Hubbard, B.

    1997-01-01

    A high speed, digitally based, signal processing system which accepts input data from a detector-preamplifier and produces a spectral analysis of the x-rays illuminating the detector. The system achieves high throughputs at low cost by dividing the required digital processing steps between a ''hardwired'' processor implemented in combinatorial digital logic, which detects the presence of the x-ray signals in the digitized data stream and extracts filtered estimates of their amplitudes, and a programmable digital signal processing computer, which refines the filtered amplitude estimates and bins them to produce the desired spectral analysis. One set of algorithms allow this hybrid system to match the resolution of analog systems while operating at much higher data rates. A second set of algorithms implemented in the processor allow the system to be self calibrating as well. The same processor also handles the interface to an external control computer. 19 figs

  10. Digital image correlation based on a fast convolution strategy

    Science.gov (United States)

    Yuan, Yuan; Zhan, Qin; Xiong, Chunyang; Huang, Jianyong

    2017-10-01

    In recent years, the efficiency of digital image correlation (DIC) methods has attracted increasing attention because of its increasing importance for many engineering applications. Based on the classical affine optical flow (AOF) algorithm and the well-established inverse compositional Gauss-Newton algorithm, which is essentially a natural extension of the AOF algorithm under a nonlinear iterative framework, this paper develops a set of fast convolution-based DIC algorithms for high-efficiency subpixel image registration. Using a well-developed fast convolution technique, the set of algorithms establishes a series of global data tables (GDTs) over the digital images, which allows the reduction of the computational complexity of DIC significantly. Using the pre-calculated GDTs, the subpixel registration calculations can be implemented efficiently in a look-up-table fashion. Both numerical simulation and experimental verification indicate that the set of algorithms significantly enhances the computational efficiency of DIC, especially in the case of a dense data sampling for the digital images. Because the GDTs need to be computed only once, the algorithms are also suitable for efficiently coping with image sequences that record the time-varying dynamics of specimen deformations.

  11. Cost Model for Digital Curation: Cost of Digital Migration

    DEFF Research Database (Denmark)

    Kejser, Ulla Bøgvad; Nielsen, Anders Bo; Thirifays, Alex

    2009-01-01

    The Danish Ministry of Culture is currently funding a project to set up a model for costing preservation of digital materials held by national cultural heritage institutions. The overall objective of the project is to provide a basis for comparing and estimating future financial requirements...... for digital preservation and to increase cost effectiveness of digital preservation activities. In this study we describe an activity based costing methodology for digital preservation based on the OAIS Reference Model. In order to estimate the cost of digital migrations we have identified cost critical...

  12. Agriscience Teachers' Implementation of Digital Game-based Learning in an Introductory Animal Science Course

    Science.gov (United States)

    Webb, Angela W.; Bunch, J. C.; Wallace, Maria F. G.

    2015-12-01

    In today's technological age, visions for technology integration in the classroom continue to be explored and examined. Digital game-based learning is one way to purposefully integrate technology while maintaining a focus on learning objectives. This case study sought to understand agriscience teachers' experiences implementing digital game-based learning in an introductory animal science course. From interviews with agriscience teachers on their experiences with the game, three themes emerged: (1) the constraints of inadequate and inappropriate technologies, and time to game implementation; (2) the shift in teacher and student roles necessitated by implementing the game; and (3) the inherent competitive nature of learning through the game. Based on these findings, we recommend that pre-service and in-service professional development opportunities be developed for teachers to learn how to implement digital game-based learning effectively. Additionally, with the potential for simulations that address cross-cutting concepts in the next generation science standards, digital game-based learning should be explored in various science teaching and learning contexts.

  13. Accounting comparability and the accuracy of peer-based valuation models

    NARCIS (Netherlands)

    Young, S.; Zeng, Y.

    2015-01-01

    We examine the link between enhanced accounting comparability and the valuation performance of pricing multiples. Using the warranted multiple method proposed by Bhojraj and Lee (2002, Journal of Accounting Research), we demonstrate how enhanced accounting comparability leads to better peer-based

  14. Implementation Opportunities of Green Accounting for Activity-Based Costing (ABC in Romania

    Directory of Open Access Journals (Sweden)

    Sorinel Capusneanu

    2008-01-01

    Full Text Available This article refers to implementation opportunities of green accounting for the Activity- Based Costing method. It shows why we choose Activity-Based Costing method and what must be done in this way. Green accounting observes the specific principles of the Activity-Based Costing method. It also represents the advantages and disadvantages of the green accounting into an enterprise in case of Activity-Based Costing implementation. The paper describes the stages we must follow in case of implementation of green accounting alongside Activity-Based Costing method into an enterprise.

  15. TANDA TANGAN DIGITAL MENGGUNAKAN QR CODE DENGAN METODE ADVANCED ENCRYPTION STANDARD

    Directory of Open Access Journals (Sweden)

    Abdul Gani Putra Suratma

    2017-04-01

    Full Text Available Tanda tangan digital (digital signature adalah sebuah skema matematis yang secara unik mengidentifikasikan seorang pengirim, sekaligus untuk membuktikan keaslian dari pemilik sebuah pesan atau dokumen digital, sehingga sebuah tanda tangan digital yang autentik (sah, sudah cukup menjadi alasan bagi penerima un- tuk percaya bahwa sebuah pesan atau dokumen yang diterima adalah berasal dari pengirim yang telah diketahui. Perkembangan teknologi memungkinkan adanya tanda tangan digital yang dapat digunakan untuk melakukan pembuktian secara matematis, sehingga informasi yang didapat oleh satu pihak dari pihak lain dapat diidentifikasi untuk memastikan keaslian informasi yang diterima. Tanda tangan digital merupakan mekanisme otentikasi yang memungkinkan pembuat pesan menambahkan sebuah kode yang bertindak sebagai tanda tangannya. Tujuan dari penelitian ini menerapkan QR Code atau yang dikenal dengan istilah QR (Quick Respon dan Algoritma yang akan ditambahkan yaitu AES (Advanced Encryption Standard sebagai tanda tangan digital sehingga hasil dari penelitian penerapan QR Code menggunakan algoritma Advanced Encryption Standard sebagai tanda tangan digital dapat berfungsi sebagai otentikasi tanda tangan pimpinan serta ve- rivikasi dokumen pengambilan barang yang sah. dari penelitian ini akurasi klasifi- kasi QR Code dengan menggunakan naïve bayes classifier sebesar 90% dengan precision positif sebesar 80% dan precision negatif sebesar 100%.

  16. The Challenge of Acquisitions in the Digital Age

    Science.gov (United States)

    Whittaker, Martha

    2008-01-01

    People are now beginning to appreciate that acquisitions in the digital world is different. In addition to business acumen and accounting knowledge, a digital-age acquisitions librarian needs to understand scholarly communication and the emerging business models of digital publishing. In this article, the author discusses the challenges and the…

  17. ARMed SPHINCS computing a 41KB signature in 16KB of RAM

    NARCIS (Netherlands)

    Hülsing, A.T.; Rijneveld, J.; Schwabe, P.; Cheng, C.-M.; Chung, K.-M.; Persiano, G.; Yang, B.-Y.

    2016-01-01

    This paper shows that it is feasible to implement the stateless hash-based signature scheme SPHINCS-256 on an embedded microprocessor with memory even smaller than a signature and limited computing power. We demonstrate that it is possible to generate and verify the 41KB signature on an ARM Cortex

  18. Current Trends in the Detection of Sociocultural Signatures: Data-Driven Models

    Energy Technology Data Exchange (ETDEWEB)

    Sanfilippo, Antonio P.; Bell, Eric B.; Corley, Courtney D.

    2014-09-15

    The harvesting of behavioral data and their analysis through evidence-based reasoning enable the detection of sociocultural signatures in their context to support situation awareness and decision making. Harvested data are used as training materials from which to infer computational models of sociocultural behaviors or calibrate parameters for such models. Harvested data also serve as evidence input that the models use to provide insights about observed and future behaviors for targets of interest. The harvested data is often the result of assembling diverse data types and aggregating them into a form suitable for analysis. Data need to be analyzed to bring out the categories of content that are relevant to the domain being addressed in order to train or run a model. If, for example, we are modeling the intent of a group to engage in violent behavior using messages that the group has broadcasted, then these messages need to be processed to extract and measure indicators of violent intent. The extracted indicators and the associated measurements (e.g. rates or counts of occurrence) can then be used to train/calibrate and run computational models that assess the propensity for violence expressed in the source message. Ubiquitous access to the Internet, mobile telephony and technologies such as digital photography and digital video have enabled social media application platforms such as Facebook, YouTube, and Twitter that are altering the nature of human social interaction. The fast increasing pace of online social interaction introduces new challenges and opportunities for gathering sociocultural data. Challenges include the development of harvesting and processing techniques tailored to new data environments and formats (e.g. Twitter, Facebook), the integration of social media content with traditional media content, and the protection of personal privacy. As these and other challenges are addressed, a new wealth of behavioral data and data analysis methods becomes

  19. Consumer Perceptions of Digital Health Coaching

    Directory of Open Access Journals (Sweden)

    Ekaterina Volkova-Volkmar

    2015-10-01

    - The likelihood of the participant to consider general coaching for health and wellness, designed and tailored for them, on a 5-point Likert scale from 1- “extremely unlikely” to 5 – “extremely likely”, where 24.72% chose the “extremely likely” option. The perceived role of technology accounted for 13.5% (F(5,4880=152.86,p<.001 of the variance in the perceived usefulness of a digital coach. Post-hoc Tukey's HSD tests showed that participants who saw the role of technology as “coach” were significantly more likely to perceive digital coaching as useful (p<.01 for all group comparisons. New technology adopter levels accounted for 9.9% (F(4, 4878 = 134.70, p <.001 of the variance in the perceived usefulness of a digital coach. Post-hoc Tukey’s HSD tests showed that participants who reported to be “first adopters” were more likely to perceive digital coaching as useful (p<.001 for all group comparisons. Willingness to receive general health and wellness coaching, including programs tailored and designed for each specific user accounted for 25.3% (F(4, 4887 = 414.49, p<.001 and 22.1% (F(4, 4881 = 346.52, p<.001 respectively. For both factors, participants who ranked highest in their willingness to consider general health coaching found digital coaching more useful than other groups (p<.001 for all group comparisons. Gender, age, country of origin, income, reported state of general health, and other factors had negligible to no effect. Conclusions Our research shows that the perception of digital coaching does not vary between clean cut demographic groups, defined by gender or country of origin. Neither does the general health state pay a decisive factor. The factors that do impact user perception on digital coaching are mostly related to their attitude towards health coaching in general. Another set of influential factors are their opinion in digital technology and their readiness to explore new technological solutions.

  20. Evolutionary signatures amongst disease genes permit novel methods for gene prioritization and construction of informative gene-based networks.

    Directory of Open Access Journals (Sweden)

    Nolan Priedigkeit

    2015-02-01

    Full Text Available Genes involved in the same function tend to have similar evolutionary histories, in that their rates of evolution covary over time. This coevolutionary signature, termed Evolutionary Rate Covariation (ERC, is calculated using only gene sequences from a set of closely related species and has demonstrated potential as a computational tool for inferring functional relationships between genes. To further define applications of ERC, we first established that roughly 55% of genetic diseases posses an ERC signature between their contributing genes. At a false discovery rate of 5% we report 40 such diseases including cancers, developmental disorders and mitochondrial diseases. Given these coevolutionary signatures between disease genes, we then assessed ERC's ability to prioritize known disease genes out of a list of unrelated candidates. We found that in the presence of an ERC signature, the true disease gene is effectively prioritized to the top 6% of candidates on average. We then apply this strategy to a melanoma-associated region on chromosome 1 and identify MCL1 as a potential causative gene. Furthermore, to gain global insight into disease mechanisms, we used ERC to predict molecular connections between 310 nominally distinct diseases. The resulting "disease map" network associates several diseases with related pathogenic mechanisms and unveils many novel relationships between clinically distinct diseases, such as between Hirschsprung's disease and melanoma. Taken together, these results demonstrate the utility of molecular evolution as a gene discovery platform and show that evolutionary signatures can be used to build informative gene-based networks.

  1. Forensic accounting in the fraud auditing case

    Directory of Open Access Journals (Sweden)

    Nataša Simeunović

    2016-11-01

    Full Text Available This paper presents a real case of digital forensic analysis in organizational fraud auditing process investigated using two different forensic tools, namely Tableau TD3 Touch Screen Forensic Imager and Access Data FTK Imager. Fraud auditing is more of a mindset than a methodology and has different approaches from financial auditing. Fraud auditors are mostly focused on exceptions, accounting irregularities, and patterns of their conduct. Financial auditors place special emphasis on the audit trail and material misstatements. A fraud case investigation of non-cash misappropriations committed by an employee, the warehouseman, will be presented herein in order to highlight the usefulness of fraud auditing, which can reveal many forms of financial crime and can be used in both private and public sector companies. Due to the computerized accounting environment, fraud investigation requires a combination of auditing, computer crime and digital forensic investigation skills, which can be achieved through joint efforts and cooperation of both digital investigator and fraud auditor as proposed herein.

  2. Five Guidelines for Selecting Hydrological Signatures

    Science.gov (United States)

    McMillan, H. K.; Westerberg, I.; Branger, F.

    2017-12-01

    Hydrological signatures are index values derived from observed or modeled series of hydrological data such as rainfall, flow or soil moisture. They are designed to extract relevant information about hydrological behavior, such as to identify dominant processes, and to determine the strength, speed and spatiotemporal variability of the rainfall-runoff response. Hydrological signatures play an important role in model evaluation. They allow us to test whether particular model structures or parameter sets accurately reproduce the runoff generation processes within the watershed of interest. Most modeling studies use a selection of different signatures to capture different aspects of the catchment response, for example evaluating overall flow distribution as well as high and low flow extremes and flow timing. Such studies often choose their own set of signatures, or may borrow subsets of signatures used in multiple other works. The link between signature values and hydrological processes is not always straightforward, leading to uncertainty and variability in hydrologists' signature choices. In this presentation, we aim to encourage a more rigorous approach to hydrological signature selection, which considers the ability of signatures to represent hydrological behavior and underlying processes for the catchment and application in question. To this end, we propose a set of guidelines for selecting hydrological signatures. We describe five criteria that any hydrological signature should conform to: Identifiability, Robustness, Consistency, Representativeness, and Discriminatory Power. We describe an example of the design process for a signature, assessing possible signature designs against the guidelines above. Due to their ubiquity, we chose a signature related to the Flow Duration Curve, selecting the FDC mid-section slope as a proposed signature to quantify catchment overall behavior and flashiness. We demonstrate how assessment against each guideline could be used to

  3. iMusic: Living and Working as Musicians in Digital Capitalism

    Science.gov (United States)

    Sargent, Carey Lynn

    2010-01-01

    In the midst of overall decline in the United States economy, information and communication industries continued to grow in 2008, accounting for 30% of the increase in the nation's GDP. Creative and copyright-based industries constitute a significant portion of this industry. The anomaly of growth in digital culture industries amidst overall…

  4. Un système de vérification de signature manuscrite en ligne basé ...

    African Journals Online (AJOL)

    Administrateur

    online handwritten signature verification system. We model the handwritten signature by an analytical approach based on the Empirical Mode Decomposition (EMD). The organized system is provided with a training module and a base of signatures. The implemented evaluation protocol points out the interest of the adopted ...

  5. Digital Culture and Digital Library

    Directory of Open Access Journals (Sweden)

    Yalçın Yalçınkaya

    2016-12-01

    Full Text Available In this study; digital culture and digital library which have a vital connection with each other are examined together. The content of the research consists of the interaction of culture, information, digital culture, intellectual technologies, and digital library concepts. The study is an entry work to integrity of digital culture and digital library theories and aims to expand the symmetry. The purpose of the study is to emphasize the relation between the digital culture and digital library theories acting intersection of the subjects that are examined. Also the perspective of the study is based on examining the literature and analytical evaluation in both studies (digital culture and digital library. Within this context, the methodology of the study is essentially descriptive and has an attribute for the transmission and synthesis of distributed findings produced in the field of the research. According to the findings of the study results, digital culture is an inclusive term that describes the effects of intellectual technologies in the field of information and communication. Information becomes energy and the spectrum of the information is expanding in the vertical rise through the digital culture. In this context, the digital library appears as a new living space of a new environment. In essence, the digital library is information-oriented; has intellectual technology support and digital platform; is in a digital format; combines information resources and tools in relationship/communication/cooperation by connectedness, and also it is the dynamic face of the digital culture in time and space independence. Resolved with the study is that the digital libraries are active and effective in the formation of global knowing and/or mass wisdom in the process of digital culture.

  6. A genomic biomarker signature can predict skin sensitizers using a cell-based in vitro alternative to animal tests

    Directory of Open Access Journals (Sweden)

    Albrekt Ann-Sofie

    2011-08-01

    Full Text Available Abstract Background Allergic contact dermatitis is an inflammatory skin disease that affects a significant proportion of the population. This disease is caused by an adverse immune response towards chemical haptens, and leads to a substantial economic burden for society. Current test of sensitizing chemicals rely on animal experimentation. New legislations on the registration and use of chemicals within pharmaceutical and cosmetic industries have stimulated significant research efforts to develop alternative, human cell-based assays for the prediction of sensitization. The aim is to replace animal experiments with in vitro tests displaying a higher predictive power. Results We have developed a novel cell-based assay for the prediction of sensitizing chemicals. By analyzing the transcriptome of the human cell line MUTZ-3 after 24 h stimulation, using 20 different sensitizing chemicals, 20 non-sensitizing chemicals and vehicle controls, we have identified a biomarker signature of 200 genes with potent discriminatory ability. Using a Support Vector Machine for supervised classification, the prediction performance of the assay revealed an area under the ROC curve of 0.98. In addition, categorizing the chemicals according to the LLNA assay, this gene signature could also predict sensitizing potency. The identified markers are involved in biological pathways with immunological relevant functions, which can shed light on the process of human sensitization. Conclusions A gene signature predicting sensitization, using a human cell line in vitro, has been identified. This simple and robust cell-based assay has the potential to completely replace or drastically reduce the utilization of test systems based on experimental animals. Being based on human biology, the assay is proposed to be more accurate for predicting sensitization in humans, than the traditional animal-based tests.

  7. A genomic biomarker signature can predict skin sensitizers using a cell-based in vitro alternative to animal tests

    Science.gov (United States)

    2011-01-01

    Background Allergic contact dermatitis is an inflammatory skin disease that affects a significant proportion of the population. This disease is caused by an adverse immune response towards chemical haptens, and leads to a substantial economic burden for society. Current test of sensitizing chemicals rely on animal experimentation. New legislations on the registration and use of chemicals within pharmaceutical and cosmetic industries have stimulated significant research efforts to develop alternative, human cell-based assays for the prediction of sensitization. The aim is to replace animal experiments with in vitro tests displaying a higher predictive power. Results We have developed a novel cell-based assay for the prediction of sensitizing chemicals. By analyzing the transcriptome of the human cell line MUTZ-3 after 24 h stimulation, using 20 different sensitizing chemicals, 20 non-sensitizing chemicals and vehicle controls, we have identified a biomarker signature of 200 genes with potent discriminatory ability. Using a Support Vector Machine for supervised classification, the prediction performance of the assay revealed an area under the ROC curve of 0.98. In addition, categorizing the chemicals according to the LLNA assay, this gene signature could also predict sensitizing potency. The identified markers are involved in biological pathways with immunological relevant functions, which can shed light on the process of human sensitization. Conclusions A gene signature predicting sensitization, using a human cell line in vitro, has been identified. This simple and robust cell-based assay has the potential to completely replace or drastically reduce the utilization of test systems based on experimental animals. Being based on human biology, the assay is proposed to be more accurate for predicting sensitization in humans, than the traditional animal-based tests. PMID:21824406

  8. ARMed SPHINCS : computing a 41KB signature in 16KB of RAM

    NARCIS (Netherlands)

    Hülsing, A.T.; Rijneveld, J.; Schwabe, P.

    2015-01-01

    This paper shows that it is feasible to implement the stateless hash-based signature scheme SPHINCS-256 on a "very small device" with memory even smaller than a signature and limited computing power. We demonstrate that it is possible to generate and verify the 41\\,KB signature on an ARM Cortex M3

  9. Circulating neutrophil transcriptome may reveal intracranial aneurysm signature.

    Directory of Open Access Journals (Sweden)

    Vincent M Tutino

    Full Text Available Unruptured intracranial aneurysms (IAs are typically asymptomatic and undetected except for incidental discovery on imaging. Blood-based diagnostic biomarkers could lead to improvements in IA management. This exploratory study examined circulating neutrophils to determine whether they carry RNA expression signatures of IAs.Blood samples were collected from patients receiving cerebral angiography. Eleven samples were collected from patients with IAs and 11 from patients without IAs as controls. Samples from the two groups were paired based on demographics and comorbidities. RNA was extracted from isolated neutrophils and subjected to next-generation RNA sequencing to obtain differential expressions for identification of an IA-associated signature. Bioinformatics analyses, including gene set enrichment analysis and Ingenuity Pathway Analysis, were used to investigate the biological function of all differentially expressed transcripts.Transcriptome profiling identified 258 differentially expressed transcripts in patients with and without IAs. Expression differences were consistent with peripheral neutrophil activation. An IA-associated RNA expression signature was identified in 82 transcripts (p<0.05, fold-change ≥2. This signature was able to separate patients with and without IAs on hierarchical clustering. Furthermore, in an independent, unpaired, replication cohort of patients with IAs (n = 5 and controls (n = 5, the 82 transcripts separated 9 of 10 patients into their respective groups.Preliminary findings show that RNA expression from circulating neutrophils carries an IA-associated signature. These findings highlight a potential to use predictive biomarkers from peripheral blood samples to identify patients with IAs.

  10. Near real-time digital holographic microscope based on GPU parallel computing

    Science.gov (United States)

    Zhu, Gang; Zhao, Zhixiong; Wang, Huarui; Yang, Yan

    2018-01-01

    A transmission near real-time digital holographic microscope with in-line and off-axis light path is presented, in which the parallel computing technology based on compute unified device architecture (CUDA) and digital holographic microscopy are combined. Compared to other holographic microscopes, which have to implement reconstruction in multiple focal planes and are time-consuming the reconstruction speed of the near real-time digital holographic microscope can be greatly improved with the parallel computing technology based on CUDA, so it is especially suitable for measurements of particle field in micrometer and nanometer scale. Simulations and experiments show that the proposed transmission digital holographic microscope can accurately measure and display the velocity of particle field in micrometer scale, and the average velocity error is lower than 10%.With the graphic processing units(GPU), the computing time of the 100 reconstruction planes(512×512 grids) is lower than 120ms, while it is 4.9s using traditional reconstruction method by CPU. The reconstruction speed has been raised by 40 times. In other words, it can handle holograms at 8.3 frames per second and the near real-time measurement and display of particle velocity field are realized. The real-time three-dimensional reconstruction of particle velocity field is expected to achieve by further optimization of software and hardware. Keywords: digital holographic microscope,

  11. The "Digital Friend": A knowledge-based decision support system for space crews

    Science.gov (United States)

    Hoermann, Hans-Juergen; Johannes, Bernd; Petrovich Salnitski, Vyacheslav

    Space travel of far distances presents exceptional strain on the medical and psychological well-being of the astronauts who undertake such missions. An intelligent knowledge management system has been developed, to assist space crews on long-duration missions as an autonomous decision support system, called the "Digital Friend". This system will become available upon request for the purpose of coaching group processes and individual performance levels as well as aiding in tactical decision processes by taking crew condition parameters into account. In its initial stage, the "Digital Friend" utilizes interconnected layers of knowledge, which encompass relevant models of operational, situational, individual psycho-physiological as well as group processes. An example is the human life science model that contains historic, diagnostic, and prognostic knowledge about the habitual, actual, and anticipated patterns of physiological, cognitive, and group psychology parameters of the crew members. Depending on the available data derived from pre-mission screening, regular check-ups, or non-intrusive onboard monitoring, the "Digital Friend" can generate a situational analysis and diagnose potential problems. When coping with the effects of foreseeable and unforeseen stressors encountered during the mission, the system can provide feedback and support the crew with a recommended course of actions. The first prototype of the "Digital Friend" employs the Neurolab/Healthlab platform developed in a cooperation of DLR and IBMP. The prototype contains psycho-physiological sensors with multiple Heally Satellites that relay data to the intelligent Heally Masters and a telemetric Host station. The analysis of data from a long-term simulation study illustrates how the system can be used to estimate the operators' current level of skill reliability based on Salnitski's model [V. Salnitski, A. Bobrov, A. Dudukin, B. Johannes, Reanalysis of operators reliability in professional skills

  12. Progressive development of a digital cadastral data base

    NARCIS (Netherlands)

    Thompson, R.J.

    2013-01-01

    A Digital Cadastral Data Base (DCDB) is a big investment for a jurisdiction tasked with the administration of land boundaries. In the past, the development of such a database produced no real pay-back on investment until many years, and millions of dollars had been committed. The Land Administration

  13. From Process to Practice: Towards a Practice-Based Model of Digital Innovation

    DEFF Research Database (Denmark)

    Ciriello, Raffaele; Richter, Alexander; Schwabe, Gerhard

    2017-01-01

    companies and an extensive set of empirical data, this paper conceptualizes four interrelated digital innovation practices, namely making sense of an idea, aligning mental models, negotiating solution paths, and crafting an idea. We suggest a practice-based model of digital innovation, specify a set......The ongoing digitalization of many corporate functions, including the innovation process, brings about fundamental changes that urge us to rethink established theories. Facilitating digital innovation requires a deep understanding of the actual practices that are carried out by innovating people...... with the help of artifacts. In this paper, we study the use of artifacts and illustrate their different roles in the underlying innovation practices to provide rich insights into digital innovation from a practice perspective. Grounded in a nearly three year-long, qualitative case study at two Swiss software...

  14. Hyperspectral signatures and WorldView-3 imagery of Indian River Lagoon and Banana River Estuarine water and bottom types

    Science.gov (United States)

    Bostater, Charles R.; Oney, Taylor S.; Rotkiske, Tyler; Aziz, Samin; Morrisette, Charles; Callahan, Kelby; Mcallister, Devin

    2017-10-01

    Hyperspectral signatures and imagery collected during the spring and summer of 2017 and 2016 are presented. Ground sampling distances (GSD) and pixel sizes were sampled from just over a meter to less than 4.0 mm. A pushbroom hyperspectral imager was used to calculate bidirectional reflectance factor (BRF) signatures. Hyperspectral signatures of different water types and bottom habitats such as submerged seagrasses, drift algae and algal bloom waters were scanned using a high spectral and digital resolution solid state spectrograph. WorldView-3 satellite imagery with minimal water wave sun glint effects was used to demonstrate the ability to detect bottom features using a derivative reflectance spectroscopy approach with the 1.3 m GSD multispectral satellite channels centered at the solar induced fluorescence band. The hyperspectral remote sensing data collected from the Banana River and Indian River Lagoon watersheds represents previously unknown signatures to be used in satellite and airborne remote sensing of water in turbid waters along the US Atlantic Ocean coastal region and the Florida littoral zone.

  15. Creating a web-based digital photographic archive: one hospital library's experience.

    Science.gov (United States)

    Marshall, Caroline; Hobbs, Janet

    2017-04-01

    Cedars-Sinai Medical Center is a nonprofit community hospital based in Los Angeles. Its history spans over 100 years, and its growth and development from the merging of 2 Jewish hospitals, Mount Sinai and Cedars of Lebanon, is also part of the history of Los Angeles. The medical library collects and maintains the hospital's photographic archive, to which retiring physicians, nurses, and an active Community Relations Department have donated photographs over the years. The collection was growing rapidly, it was impossible to display all the materials, and much of the collection was inaccessible to patrons. The authors decided to make the photographic collection more accessible to medical staff and researchers by purchasing a web-based digital archival package, Omeka. We decided what material should be digitized by analyzing archival reference requests and considering the institution's plan to create a Timeline Wall documenting and celebrating the history of Cedars-Sinai. Within 8 months, we digitized and indexed over 500 photographs. The digital archive now allows patrons and researchers to access the history of the hospital and enables the library to process archival references more efficiently.

  16. A feature selection approach for identification of signature genes from SAGE data

    Directory of Open Access Journals (Sweden)

    Silva Paulo JS

    2007-05-01

    Full Text Available Abstract Background One goal of gene expression profiling is to identify signature genes that robustly distinguish different types or grades of tumors. Several tumor classifiers based on expression profiling have been proposed using microarray technique. Due to important differences in the probabilistic models of microarray and SAGE technologies, it is important to develop suitable techniques to select specific genes from SAGE measurements. Results A new framework to select specific genes that distinguish different biological states based on the analysis of SAGE data is proposed. The new framework applies the bolstered error for the identification of strong genes that separate the biological states in a feature space defined by the gene expression of a training set. Credibility intervals defined from a probabilistic model of SAGE measurements are used to identify the genes that distinguish the different states with more reliability among all gene groups selected by the strong genes method. A score taking into account the credibility and the bolstered error values in order to rank the groups of considered genes is proposed. Results obtained using SAGE data from gliomas are presented, thus corroborating the introduced methodology. Conclusion The model representing counting data, such as SAGE, provides additional statistical information that allows a more robust analysis. The additional statistical information provided by the probabilistic model is incorporated in the methodology described in the paper. The introduced method is suitable to identify signature genes that lead to a good separation of the biological states using SAGE and may be adapted for other counting methods such as Massive Parallel Signature Sequencing (MPSS or the recent Sequencing-By-Synthesis (SBS technique. Some of such genes identified by the proposed method may be useful to generate classifiers.

  17. Using Problem-Based Learning in Accounting

    Science.gov (United States)

    Hansen, James D.

    2006-01-01

    In this article, the author describes the process of writing a problem-based learning (PBL) problem and shows how a typical end-of-chapter accounting problem can be converted to a PBL problem. PBL uses complex, real-world problems to motivate students to identify and research the concepts and principles they need to know to solve these problems.…

  18. Microelectromechanical resonator based digital logic elements

    KAUST Repository

    Hafiz, Md Abdullah Al

    2016-10-20

    Micro/nano-electromechanical resonator based mechanical computing has recently attracted significant attention. However, its full realization has been hindered by the difficulty in realizing complex combinational logics, in which the logic function is constructed by cascading multiple smaller logic blocks. In this work we report an alternative approach for implementation of digital logic core elements, multiplexer and demultiplexer, which can be used to realize combinational logic circuits by suitable concatenation. Toward this, shallow arch shaped microresonators are electrically connected and their resonance frequencies are tuned based on an electrothermal frequency modulation scheme. This study demonstrates that by reconfiguring the same basic building block, the arch microresonator, complex logic circuits can be realized.

  19. Microelectromechanical resonator based digital logic elements

    KAUST Repository

    Hafiz, Md Abdullah Al; Kosuru, Lakshmoji; Younis, Mohammad I.; Fariborzi, Hossein

    2016-01-01

    Micro/nano-electromechanical resonator based mechanical computing has recently attracted significant attention. However, its full realization has been hindered by the difficulty in realizing complex combinational logics, in which the logic function is constructed by cascading multiple smaller logic blocks. In this work we report an alternative approach for implementation of digital logic core elements, multiplexer and demultiplexer, which can be used to realize combinational logic circuits by suitable concatenation. Toward this, shallow arch shaped microresonators are electrically connected and their resonance frequencies are tuned based on an electrothermal frequency modulation scheme. This study demonstrates that by reconfiguring the same basic building block, the arch microresonator, complex logic circuits can be realized.

  20. Angular relational signature-based chest radiograph image view classification.

    Science.gov (United States)

    Santosh, K C; Wendling, Laurent

    2018-01-22

    In a computer-aided diagnosis (CAD) system, especially for chest radiograph or chest X-ray (CXR) screening, CXR image view information is required. Automatically separating CXR image view, frontal and lateral can ease subsequent CXR screening process, since the techniques may not equally work for both views. We present a novel technique to classify frontal and lateral CXR images, where we introduce angular relational signature through force histogram to extract features and apply three different state-of-the-art classifiers: multi-layer perceptron, random forest, and support vector machine to make a decision. We validated our fully automatic technique on a set of 8100 images hosted by the U.S. National Library of Medicine (NLM), National Institutes of Health (NIH), and achieved an accuracy close to 100%. Our method outperforms the state-of-the-art methods in terms of processing time (less than or close to 2 s for the whole test data) while the accuracies can be compared, and therefore, it justifies its practicality. Graphical Abstract Interpreting chest X-ray (CXR) through the angular relational signature.

  1. Quantum messages with signatures forgeable in arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Kim, Taewan; Choi, Jeong Woon; Jho, Nam-Su; Lee, Soojoon

    2015-01-01

    Even though a method to perfectly sign quantum messages has not been known, the arbitrated quantum signature scheme has been considered as one of the good candidates. However, its forgery problem has been an obstacle to the scheme becoming a successful method. In this paper, we consider one situation, which is slightly different from the forgery problem, that we use to check whether at least one quantum message with signature can be forged in a given scheme, although all the messages cannot be forged. If there are only a finite number of forgeable quantum messages in the scheme, then the scheme can be secured against the forgery attack by not sending forgeable quantum messages, and so our situation does not directly imply that we check whether the scheme is secure against the attack. However, if users run a given scheme without any consideration of forgeable quantum messages, then a sender might transmit such forgeable messages to a receiver and in such a case an attacker can forge the messages if the attacker knows them. Thus it is important and necessary to look into forgeable quantum messages. We show here that there always exists such a forgeable quantum message-signature pair for every known scheme with quantum encryption and rotation, and numerically show that there are no forgeable quantum message-signature pairs that exist in an arbitrated quantum signature scheme. (paper)

  2. Computer Forensics for Graduate Accountants: A Motivational Curriculum Design Approach

    Directory of Open Access Journals (Sweden)

    Grover Kearns

    2010-06-01

    Full Text Available Computer forensics involves the investigation of digital sources to acquire evidence that can be used in a court of law. It can also be used to identify and respond to threats to hosts and systems. Accountants use computer forensics to investigate computer crime or misuse, theft of trade secrets, theft of or destruction of intellectual property, and fraud. Education of accountants to use forensic tools is a goal of the AICPA (American Institute of Certified Public Accountants. Accounting students, however, may not view information technology as vital to their career paths and need motivation to acquire forensic knowledge and skills. This paper presents a curriculum design methodology for teaching graduate accounting students computer forensics. The methodology is tested using perceptions of the students about the success of the methodology and their acquisition of forensics knowledge and skills. An important component of the pedagogical approach is the use of an annotated list of over 50 forensic web-based tools.

  3. The collaborative writing in @Elhombredetweed. A pragmatic analysis for the digital literature studies

    Directory of Open Access Journals (Sweden)

    Luis Felipe González Gutiérrez

    2018-05-01

    Full Text Available This article discusses the preliminary results of the analysis of the Twitter account @Elhombredetweed account, from the contributions of digital literature, specifically on digital poetry studies, social construccionism and cultural psychology. From these results indicates the importance of the collaborative writing in the actual studies in the digital humanities, especially in the digital literature field. The methodology of the study is centered in poetic research, like a qualitative approach. For the tweets analysis we worked with the social network analysis software Netlytic. The results indicate two stories in the account: the literary story-object of the Mexican writer Mauricio Montiel (account author and the series of projects and narrative sequences of the followers to @Elhombredetweed, which constitutes an example of transmedia narrative and shows the impact of social networks in the collective construction of stories and the formation of digital subjectivities, through the use of ICT as a potential for an online reality.

  4. Methods of Generating Key Sequences Based on Parameters of Handwritten Passwords and Signatures

    Directory of Open Access Journals (Sweden)

    Pavel Lozhnikov

    2016-10-01

    Full Text Available The modern encryption methods are reliable if strong keys (passwords are used, but the human factor issue cannot be solved by cryptographic methods. The best variant is binding all authenticators (passwords, encryption keys, and others to the identities. When a user is authenticated by biometrical characteristics, the problem of protecting a biometrical template stored on a remote server becomes a concern. The paper proposes several methods of generating keys (passwords by means of the fuzzy extractors method based on signature parameters without storing templates in an open way.

  5. VBSM: VCC-Based Black Box Service Model with Enhanced Data Integrity

    Directory of Open Access Journals (Sweden)

    Won Min Kang

    2014-10-01

    Full Text Available Recently, intelligent transport systems have been applied to vehicle cloud environments. Such technology is especially useful for the systematic management of road traffic. Moreover, automobiles are increasingly equipped with a black box for accident prevention and preservation of evidence. Vehicle black boxes have become mandatory because black box images and voice data have served as forensic evidence in courts. However, the data from black boxes can be forged or modified by man-in-the-middle (MITM attacks and message hijacking. In this paper, we propose a vehicle cloud computing-based black box service model that can provide integrity for black box data through digital signatures in vehicle cloud computing (VCC environments. Our proposed model protects against MITM attacks and message hijacking using only a hash value and digital signature. Moreover, a mirroring technique (RAID 1 provides backup and recovery to protect the data from a traffic accident.

  6. Does Digital Game Interactivity Always Promote Self-Efficacy?

    Science.gov (United States)

    Lee, Yu-Hao

    2015-11-01

    Interactive digital games can promote self-efficacy by engaging players in enactive and observational learning. However, interactivity does not always lead to greater self-efficacy. Important constructs in social cognitive theory, such as performance outcome and perceived similarity, are often not accounted for in studies that have tested the effect of digital game interactivity on self-efficacy. This study assessed the effects of interactive digital games compared with passive digital games based on video comparison, a common experimental design used to test the effect of digital game interactivity on self-efficacy. In addition, this study also evaluated player performance and measured perceived similarity to the observed player. Findings suggested that in general, digital game interactivity predicted higher self-efficacy compared with noninteractive passive games. However, in the noninteractive conditions, the effects of performance on self-efficacy were moderated by perceived similarity between the observer and the observed player. When the observed player was perceived to be similar to the observer, the effects of performance on self-efficacy were comparable to the interactive game, but when the observed player was perceived as dissimilar to the observer, observing the dissimilar player failed to increase observer self-efficacy. Implications for interactivity manipulations and game developers are discussed.

  7. Security of the arbitrated quantum signature protocols revisited

    International Nuclear Information System (INIS)

    Kejia, Zhang; Dan, Li; Qi, Su

    2014-01-01

    Recently, much attention has been paid to the study of arbitrated quantum signature (AQS). Among these studies, the cryptanalysis of some AQS protocols and a series of improved ideas have been proposed. Compared with the previous analysis, we present a security criterion, which can judge whether an AQS protocol is able to prevent the receiver (i.e. one participant in the signature protocol) from forging a legal signature. According to our results, it can be seen that most AQS protocols which are based on the Zeng and Keitel (ZK) model are susceptible to a forgery attack. Furthermore, we present an improved idea of the ZK protocol. Finally, some supplement discussions and several interesting topics are provided. (paper)

  8. The Source Signature Estimator - System Improvements and Applications

    Energy Technology Data Exchange (ETDEWEB)

    Sabel, Per; Brink, Mundy; Eidsvig, Seija; Jensen, Lars

    1998-12-31

    This presentation relates briefly to the first part of the joint project on post-survey analysis of shot-by-shot based source signature estimation. The improvements of a Source Signature Estimator system are analysed. The notional source method can give suboptimal results when not inputting the real array geometry, i.e. actual separations between the sub-arrays of an air gun array, to the notional source algorithm. This constraint has been addressed herein and was implemented for the first time in the field in summer 1997. The second part of this study will show the potential advantages for interpretation when the signature estimates are then to be applied in the data processing. 5 refs., 1 fig.

  9. Online calibration method for condition monitoring of nuclear reactor instrumentations based on electrical signature analysis

    International Nuclear Information System (INIS)

    Syaiful Bakhri

    2013-01-01

    Electrical signature analysis currently becomes an alternative in condition monitoring in nuclear power plants not only for stationary components such as sensors, measurement and instrumentation channels, and other components but also for dynamic components such as electric motors, pumps, generator or actuators. In order to guarantee the accuracy, the calibration of monitoring system is a necessary which practically is performed offline, under limited schedules and certain tight procedures. This research aims to introduce online calibration technique for electrical signature condition monitoring in order that the accuracy can be maintained continuously which in turn increases the reactor safety as a whole. The research was performed step by stepin detail from the conventional technique, online calibration using baseline information and online calibration using differential gain adjustment. Online calibration based on differential gain adjustment provides better results than other techniques even tough under extreme gain insertion as well as external disturbances such as supply voltages. (author)

  10. Neural Signature of Value-Based Sensorimotor Prioritization in Humans.

    Science.gov (United States)

    Blangero, Annabelle; Kelly, Simon P

    2017-11-01

    In situations in which impending sensory events demand fast action choices, we must be ready to prioritize higher-value courses of action to avoid missed opportunities. When such a situation first presents itself, stimulus-action contingencies and their relative value must be encoded to establish a value-biased state of preparation for an impending sensorimotor decision. Here, we sought to identify neurophysiological signatures of such processes in the human brain (both female and male). We devised a task requiring fast action choices based on the discrimination of a simple visual cue in which the differently valued sensory alternatives were presented 750-800 ms before as peripheral "targets" that specified the stimulus-action mapping for the upcoming decision. In response to the targets, we identified a discrete, transient, spatially selective signal in the event-related potential (ERP), which scaled with relative value and strongly predicted the degree of behavioral bias in the upcoming decision both across and within subjects. This signal is not compatible with any hitherto known ERP signature of spatial selection and also bears novel distinctions with respect to characterizations of value-sensitive, spatially selective activity found in sensorimotor areas of nonhuman primates. Specifically, a series of follow-up experiments revealed that the signal was reliably invoked regardless of response laterality, response modality, sensory feature, and reward valence. It was absent, however, when the response deadline was relaxed and the strategic need for biasing removed. Therefore, more than passively representing value or salience, the signal appears to play a versatile and active role in adaptive sensorimotor prioritization. SIGNIFICANCE STATEMENT In many situations such as fast-moving sports, we must be ready to act fast in response to sensory events and, in our preparation, prioritize courses of action that lead to greater rewards. Although behavioral effects of

  11. Digital Game-Based Learning for K-12 Mathematics Education: A Meta-Analysis

    Science.gov (United States)

    Byun, JaeHwan; Joung, Eunmi

    2018-01-01

    Digital games (e.g., video games or computer games) have been reported as an effective educational method that can improve students' motivation and performance in mathematics education. This meta-analysis study (a) investigates the current trend of digital game-based learning (DGBL) by reviewing the research studies on the use of DGBL for…

  12. Bandwidth tunable microwave photonic filter based on digital and analog modulation

    Science.gov (United States)

    Zhang, Qi; Zhang, Jie; Li, Qiang; Wang, Yubing; Sun, Xian; Dong, Wei; Zhang, Xindong

    2018-05-01

    A bandwidth tunable microwave photonic filter based on digital and analog modulation is proposed and experimentally demonstrated. The digital modulation is used to broaden the effective gain spectrum and the analog modulation is to get optical lines. By changing the symbol rate of data pattern, the bandwidth is tunable from 50 MHz to 700 MHz. The interval of optical lines is set according to the bandwidth of gain spectrum which is related to the symbol rate. Several times of bandwidth increase are achieved compared to a single analog modulation and the selectivity of the response is increased by 3.7 dB compared to a single digital modulation.

  13. A high-throughput pipeline for the design of real-time PCR signatures

    Directory of Open Access Journals (Sweden)

    Reifman Jaques

    2010-06-01

    Full Text Available Abstract Background Pathogen diagnostic assays based on polymerase chain reaction (PCR technology provide high sensitivity and specificity. However, the design of these diagnostic assays is computationally intensive, requiring high-throughput methods to identify unique PCR signatures in the presence of an ever increasing availability of sequenced genomes. Results We present the Tool for PCR Signature Identification (TOPSI, a high-performance computing pipeline for the design of PCR-based pathogen diagnostic assays. The TOPSI pipeline efficiently designs PCR signatures common to multiple bacterial genomes by obtaining the shared regions through pairwise alignments between the input genomes. TOPSI successfully designed PCR signatures common to 18 Staphylococcus aureus genomes in less than 14 hours using 98 cores on a high-performance computing system. Conclusions TOPSI is a computationally efficient, fully integrated tool for high-throughput design of PCR signatures common to multiple bacterial genomes. TOPSI is freely available for download at http://www.bhsai.org/downloads/topsi.tar.gz.

  14. The Key Success and Strategic Role of Accrual Based Accounting Implementation

    Directory of Open Access Journals (Sweden)

    Surepno Surepno

    2015-09-01

    Full Text Available Central Government policy to adopt accrual-based accounting system providing consequences for local governments to apply accrual accounting in the financial statements. Empirical evidence shows that the readiness of the local government in Indonesia in the process of implementation of accrual accounting is still relatively low. This study aimed to analyze the success of Semarang Government in implementing accrual accounting. This study also analyzes the offender's response to the implementation of the strategic role of accrual accounting in transparency and accountability. Furthermore, the method used in this study is a qualitative approach to perform a case study at the Department of Finance and Asset Management Area (DPKAD Semarang by means of interviewing the key actors of implementation. The results showed that the successful implementation of accrual accounting Semarang government is supported by four main strategies, namely management commitment, regulatory development, information systems development and human resource development. Furthermore, based on the conclusions of the implementers shows that accrual accounting has a strategic role in increasing transparency and accountability through financial reporting.

  15. Studies of electrical properties of low-resistivity sandstones based on digital rock technology

    Science.gov (United States)

    Yan, Weichao; Sun, Jianmeng; Zhang, Jinyan; Yuan, Weiguo; Zhang, Li; Cui, Likai; Dong, Huaimin

    2018-02-01

    Electrical properties are important parameters to quantitatively calculate water saturation in oil and gas reservoirs by well logging interpretation. It is usual that oil layers show high resistivity responses, while water layers show low-resistivity responses. However, there are low-resistivity oil zones that exist in many oilfields around the world, leading to difficulties for reservoir evaluation. In our research, we used digital rock technology to study different internal and external factors to account for low rock resistivity responses in oil layers. We first constructed three-dimensional digital rock models with five components based on micro-computed tomography technology and x-ray diffraction experimental results, and then oil and water distributions in pores were determined by the pore morphology method. When the resistivity of each component was assigned, rock resistivities were calculated by using the finite element method. We collected 20 sandstone samples to prove the effectiveness of our numerical simulation methods. Based on the control variate method, we studied the effects of different factors on the resistivity indexes and rock resistivities. After sensitivity analyses, we found the main factors which caused low rock resistivities in oil layers. For unfractured rocks, influential factors arranged in descending order of importance were porosity, clay content, temperature, water salinity, heavy mineral, clay type and wettability. In addition, we found that the resistivity index could not provide enough information to identify a low-resistivity oil zone by using laboratory rock-electric experimental results. These results can not only expand our understandings of the electrical properties of low-resistivity rocks from oil layers, but also help identify low-resistivity oil zones better.

  16. Research on key technologies for data-interoperability-based metadata, data compression and encryption, and their application

    Science.gov (United States)

    Yu, Xu; Shao, Quanqin; Zhu, Yunhai; Deng, Yuejin; Yang, Haijun

    2006-10-01

    With the development of informationization and the separation between data management departments and application departments, spatial data sharing becomes one of the most important objectives for the spatial information infrastructure construction, and spatial metadata management system, data transmission security and data compression are the key technologies to realize spatial data sharing. This paper discusses the key technologies for metadata based on data interoperability, deeply researches the data compression algorithms such as adaptive Huffman algorithm, LZ77 and LZ78 algorithm, studies to apply digital signature technique to encrypt spatial data, which can not only identify the transmitter of spatial data, but also find timely whether the spatial data are sophisticated during the course of network transmission, and based on the analysis of symmetric encryption algorithms including 3DES,AES and asymmetric encryption algorithm - RAS, combining with HASH algorithm, presents a improved mix encryption method for spatial data. Digital signature technology and digital watermarking technology are also discussed. Then, a new solution of spatial data network distribution is put forward, which adopts three-layer architecture. Based on the framework, we give a spatial data network distribution system, which is efficient and safe, and also prove the feasibility and validity of the proposed solution.

  17. Observation of a 27-day solar signature in noctilucent cloud altitude

    Science.gov (United States)

    Köhnke, Merlin C.; von Savigny, Christian; Robert, Charles E.

    2018-05-01

    Previous studies have identified solar 27-day signatures in several parameters in the Mesosphere/Lower thermosphere region, including temperature and Noctilucent cloud (NLC) occurrence frequency. In this study we report on a solar 27-day signature in NLC altitude with peak-to-peak variations of about 400 m. We use SCIAMACHY limb-scatter observations from 2002 to 2012 to detect NLCs. The superposed epoch analysis method is applied to extract solar 27-day signatures. A 27-day signature in NLC altitude can be identified in both hemispheres in the SCIAMACHY dataset, but the signature is more pronounced in the northern hemisphere. The solar signature in NLC altitude is found to be in phase with solar activity and temperature for latitudes ≳ 70 ° N. We provide a qualitative explanation for the positive correlation between solar activity and NLC altitude based on published model simulations.

  18. Human cancer cells express Slug-based epithelial-mesenchymal transition gene expression signature obtained in vivo

    International Nuclear Information System (INIS)

    Anastassiou, Dimitris; Rumjantseva, Viktoria; Cheng, Weiyi; Huang, Jianzhong; Canoll, Peter D; Yamashiro, Darrell J; Kandel, Jessica J

    2011-01-01

    The biological mechanisms underlying cancer cell motility and invasiveness remain unclear, although it has been hypothesized that they involve some type of epithelial-mesenchymal transition (EMT). We used xenograft models of human cancer cells in immunocompromised mice, profiling the harvested tumors separately with species-specific probes and computationally analyzing the results. Here we show that human cancer cells express in vivo a precise multi-cancer invasion-associated gene expression signature that prominently includes many EMT markers, among them the transcription factor Slug, fibronectin, and α-SMA. We found that human, but not mouse, cells express the signature and Slug is the only upregulated EMT-inducing transcription factor. The signature is also present in samples from many publicly available cancer gene expression datasets, suggesting that it is produced by the cancer cells themselves in multiple cancer types, including nonepithelial cancers such as neuroblastoma. Furthermore, we found that the presence of the signature in human xenografted cells was associated with a downregulation of adipocyte markers in the mouse tissue adjacent to the invasive tumor, suggesting that the signature is triggered by contextual microenvironmental interactions when the cancer cells encounter adipocytes, as previously reported. The known, precise and consistent gene composition of this cancer mesenchymal transition signature, particularly when combined with simultaneous analysis of the adjacent microenvironment, provides unique opportunities for shedding light on the underlying mechanisms of cancer invasiveness as well as identifying potential diagnostic markers and targets for metastasis-inhibiting therapeutics

  19. Comparative seasonal variations of spectral signatures of broad-leaved and coniferous stands from Landsat data. Comparison with other perennial environments

    International Nuclear Information System (INIS)

    Chaume, R.; Combeau, A.

    1984-01-01

    Spectral signatures of two distinct forest test areas were identified from digital data including 15 LANDSAT scenes covering the same geographical area: a broad-leaved forest (oak and beech) and a coniferous forest (scotch pine). Seasonal variations of the signatures were examined and were expressed in terms of various data: date, solar height and phenological state of vegetation cover. Results were compared to these obtained from other perennial surface conditions (grassland, bare soils) . Range of the seasonal variations of radiance is noted, as well as evolutionary peculiarities on each band and between themes. Rationing of spectral bands (particularly MSS 5 and 7) and their variation with time are specified [fr

  20. Accountability for Community-Based Programs for the Seriously Ill.

    Science.gov (United States)

    Teno, Joan M; Montgomery, Russ; Valuck, Tom; Corrigan, Janet; Meier, Diane E; Kelley, Amy; Curtis, J Randall; Engelberg, Ruth

    2018-03-01

    Innovation is needed to improve care of the seriously ill, and there are important opportunities as we transition from a volume- to value-based payment system. Not all seriously ill are dying; some recover, while others are persistently functionally impaired. While we innovate in service delivery and payment models for the seriously ill, it is important that we concurrently develop accountability that ensures a focus on high-quality care rather than narrowly focusing on cost containment. The Gordon and Betty Moore Foundation convened a meeting of 45 experts to arrive at guiding principles for measurement, create a starter measurement set, specify a proposed definition of the denominator and its refinement, and identify research priorities for future implementation of the accountability system. A series of articles written by experts provided the basis for debate and guidance in formulating a path forward to develop an accountability system for community-based programs for the seriously ill, outlined in this article. As we innovate in existing population-based payment programs such as Medicare Advantage and develop new alternative payment models, it is important and urgent that we develop the foundation for accountability along with actionable measures so that the healthcare system ensures high-quality person- and family-centered care for persons who are seriously ill.

  1. #digital_disruption @amnesty international: from digital to networked to hybrid activism - A case study of the meaning and adoption of digital activism in changing 20th century civil society organisations

    OpenAIRE

    Özkula, Suay Melisa

    2017-01-01

    Like many organisations in the 21st century, longstanding civil society organisations are facing new challenges in adapting to the digital age. This thesis addresses those concerns through an exploration of the social meaning and contextualised effects of digital activism at case study Amnesty International. It provides a socio-cultural account of AI and a conceptual perspective on digital activism as part of Amnesty's digitalisation processes. It explores existing concerns around the tension...

  2. ETHICS IN ACCOUNTING IN THE CONTEXT OF KNOWLEDGE-BASED ECONOMY

    Directory of Open Access Journals (Sweden)

    Marian TAICU

    2017-12-01

    Full Text Available The knowledge-based economy comes with a number of challenges in the field of accounting. Accounting must provide the information that internal and external users need for decision making and, in order to achieve this goal, it is necessary to integrate new IT technologies, standardize reporting and ensure compliance with ethical principles in the accounting profession. The paper aims at presenting the main ethical challenges in accounting in the present and foreseeable contexts.

  3. An improved procedure for detection and enumeration of walrus signatures in airborne thermal imagery

    Science.gov (United States)

    Burn, Douglas M.; Udevitz, Mark S.; Speckman, Suzann G.; Benter, R. Bradley

    2009-01-01

    In recent years, application of remote sensing to marine mammal surveys has been a promising area of investigation for wildlife managers and researchers. In April 2006, the United States and Russia conducted an aerial survey of Pacific walrus (Odobenus rosmarus divergens) using thermal infrared sensors to detect groups of animals resting on pack ice in the Bering Sea. The goal of this survey was to estimate the size of the Pacific walrus population. An initial analysis of the U.S. data using previously-established methods resulted in lower detectability of walrus groups in the imagery and higher variability in calibration models than was expected based on pilot studies. This paper describes an improved procedure for detection and enumeration of walrus groups in airborne thermal imagery. Thermal images were first subdivided into smaller 200 x 200 pixel "tiles." We calculated three statistics to represent characteristics of walrus signatures from the temperature histogram for each the. Tiles that exhibited one or more of these characteristics were examined further to determine if walrus signatures were present. We used cluster analysis on tiles that contained walrus signatures to determine which pixels belonged to each group. We then calculated a thermal index value for each walrus group in the imagery and used generalized linear models to estimate detection functions (the probability of a group having a positive index value) and calibration functions (the size of a group as a function of its index value) based on counts from matched digital aerial photographs. The new method described here improved our ability to detect walrus groups at both 2 m and 4 m spatial resolution. In addition, the resulting calibration models have lower variance than the original method. We anticipate that the use of this new procedure will greatly improve the quality of the population estimate derived from these data. This procedure may also have broader applicability to thermal infrared

  4. Spatially Resolved Isotopic Source Signatures of Wetland Methane Emissions

    Science.gov (United States)

    Ganesan, A. L.; Stell, A. C.; Gedney, N.; Comyn-Platt, E.; Hayman, G.; Rigby, M.; Poulter, B.; Hornibrook, E. R. C.

    2018-04-01

    We present the first spatially resolved wetland δ13C(CH4) source signature map based on data characterizing wetland ecosystems and demonstrate good agreement with wetland signatures derived from atmospheric observations. The source signature map resolves a latitudinal difference of 10‰ between northern high-latitude (mean -67.8‰) and tropical (mean -56.7‰) wetlands and shows significant regional variations on top of the latitudinal gradient. We assess the errors in inverse modeling studies aiming to separate CH4 sources and sinks by comparing atmospheric δ13C(CH4) derived using our spatially resolved map against the common assumption of globally uniform wetland δ13C(CH4) signature. We find a larger interhemispheric gradient, a larger high-latitude seasonal cycle, and smaller trend over the period 2000-2012. The implication is that erroneous CH4 fluxes would be derived to compensate for the biases imposed by not utilizing spatially resolved signatures for the largest source of CH4 emissions. These biases are significant when compared to the size of observed signals.

  5. Financial Management Reforms in the Health Sector: A Comparative Study Between Cash-based and Accrual-based Accounting Systems.

    Science.gov (United States)

    Abolhallaje, Masoud; Jafari, Mehdi; Seyedin, Hesam; Salehi, Masoud

    2014-10-01

    Financial management and accounting reform in the public sectors was started in 2000. Moving from cash-based to accrual-based is considered as the key component of these reforms and adjustments in the public sector. Performing this reform in the health system is a part of a bigger reform under the new public management. The current study aimed to analyze the movement from cash-based to accrual-based accounting in the health sector in Iran. This comparative study was conducted in 2013 to compare financial management and movement from cash-based to accrual-based accounting in health sector in the countries such as the United States, Britain, Canada, Australia, New Zealand, and Iran. Library resources and reputable databases such as Medline, Elsevier, Index Copernicus, DOAJ, EBSCO-CINAHL and SID, and Iranmedex were searched. Fish cards were used to collect the data. Data were compared and analyzed using comparative tables. Developed countries have implemented accrual-based accounting and utilized the valid, reliable and practical information in accrual-based reporting in different areas such as price and tariffs setting, operational budgeting, public accounting, performance evaluation and comparison and evidence based decision making. In Iran, however, only a few public organizations such as the municipalities and the universities of medical sciences use accrual-based accounting, but despite what is required by law, the other public organizations do not use accrual-based accounting. There are advantages in applying accrual-based accounting in the public sector which certainly depends on how this system is implemented in the sector.

  6. Financial Management Reforms in the Health Sector: A Comparative Study Between Cash-based and Accrual-based Accounting Systems

    Science.gov (United States)

    Abolhallaje, Masoud; Jafari, Mehdi; Seyedin, Hesam; Salehi, Masoud

    2014-01-01

    Background: Financial management and accounting reform in the public sectors was started in 2000. Moving from cash-based to accrual-based is considered as the key component of these reforms and adjustments in the public sector. Performing this reform in the health system is a part of a bigger reform under the new public management. Objectives: The current study aimed to analyze the movement from cash-based to accrual-based accounting in the health sector in Iran. Patients and Methods: This comparative study was conducted in 2013 to compare financial management and movement from cash-based to accrual-based accounting in health sector in the countries such as the United States, Britain, Canada, Australia, New Zealand, and Iran. Library resources and reputable databases such as Medline, Elsevier, Index Copernicus, DOAJ, EBSCO-CINAHL and SID, and Iranmedex were searched. Fish cards were used to collect the data. Data were compared and analyzed using comparative tables. Results: Developed countries have implemented accrual-based accounting and utilized the valid, reliable and practical information in accrual-based reporting in different areas such as price and tariffs setting, operational budgeting, public accounting, performance evaluation and comparison and evidence based decision making. In Iran, however, only a few public organizations such as the municipalities and the universities of medical sciences use accrual-based accounting, but despite what is required by law, the other public organizations do not use accrual-based accounting. Conclusions: There are advantages in applying accrual-based accounting in the public sector which certainly depends on how this system is implemented in the sector. PMID:25763194

  7. 76 FR 30542 - Adult Signature Services

    Science.gov (United States)

    2011-05-26

    ... POSTAL SERVICE 39 CFR Part 111 Adult Signature Services AGENCY: Postal Service\\TM\\. ACTION: Final..., Domestic Mail Manual (DMM[supreg]) 503.8, to add a new extra service called Adult Signature. This new service has two available options: Adult Signature Required and Adult Signature Restricted Delivery. DATES...

  8. Development of data base system for nuclear material accountancy data at PNC

    International Nuclear Information System (INIS)

    Hirosawa, N.; Akiba, Mitsunori; Nakagima, Kiyoshi; Usui, Shinichi; Tosa, Kiyofumi; Hashimoto, Kazuyuki.

    1993-01-01

    PNC is developing a wide area of nuclear fuel cycle. Therefore, much nuclear material with a various form exists at each facility in the Works, and the controls of the inventory changes and the physical inventories of nuclear material are important. Nuclear material accountancy is a basic measure in safeguards system based on Non-Proliferation Treaty(NPT). In the light of such importance of material accountancy, the data base of nuclear material control and the material accountancy report system for all facilities has been developed by using the computer. By this system, accountancy report to STA is being presented certainly and timely. Property management and rapid corresponding to inquiries from STA can be carried out by the data base system which has free item searching procedure. The present paper introduces 'Development of Data Base System for Nuclear Material Accountancy Data at PNC'. (author)

  9. Comparison of subset-based local and FE-based global digital image correlation: Theoretical error analysis and validation

    KAUST Repository

    Pan, B.; Wang, Bo; Lubineau, Gilles

    2016-01-01

    Subset-based local and finite-element-based (FE-based) global digital image correlation (DIC) approaches are the two primary image matching algorithms widely used for full-field displacement mapping. Very recently, the performances

  10. Cost Model for Digital Preservation: Cost of Digital Migration

    DEFF Research Database (Denmark)

    Kejser, Ulla Bøgvad; Nielsen, Anders Bo; Thirifays, Alex

    2011-01-01

    The Danish Ministry of Culture has funded a project to set up a model for costing preservation of digital materials held by national cultural heritage institutions. The overall objective of the project was to increase cost effectiveness of digital preservation activities and to provide a basis...... for comparing and estimating future cost requirements for digital preservation. In this study we describe an activity-based costing methodology for digital preservation based on the Open Archice Information System (OAIS) Reference Model. Within this framework, which we denote the Cost Model for Digital...... Preservation (CMDP), the focus is on costing the functional entity Preservation Planning from the OAIS and digital migration activities. In order to estimate these costs we have identified cost-critical activities by analysing the functions in the OAIS model and the flows between them. The analysis has been...

  11. Absolute quantification of DNA methylation using microfluidic chip-based digital PCR.

    Science.gov (United States)

    Wu, Zhenhua; Bai, Yanan; Cheng, Zule; Liu, Fangming; Wang, Ping; Yang, Dawei; Li, Gang; Jin, Qinghui; Mao, Hongju; Zhao, Jianlong

    2017-10-15

    Hypermethylation of CpG islands in the promoter region of many tumor suppressor genes downregulates their expression and in a result promotes tumorigenesis. Therefore, detection of DNA methylation status is a convenient diagnostic tool for cancer detection. Here, we reported a novel method for the integrative detection of methylation by the microfluidic chip-based digital PCR. This method relies on methylation-sensitive restriction enzyme HpaII, which cleaves the unmethylated DNA strands while keeping the methylated ones intact. After HpaII treatment, the DNA methylation level is determined quantitatively by the microfluidic chip-based digital PCR with the lower limit of detection equal to 0.52%. To validate the applicability of this method, promoter methylation of two tumor suppressor genes (PCDHGB6 and HOXA9) was tested in 10 samples of early stage lung adenocarcinoma and their adjacent non-tumorous tissues. The consistency was observed in the analysis of these samples using our method and a conventional bisulfite pyrosequencing. Combining high sensitivity and low cost, the microfluidic chip-based digital PCR method might provide a promising alternative for the detection of DNA methylation and early diagnosis of epigenetics-related diseases. Copyright © 2017 Elsevier B.V. All rights reserved.

  12. Novel immunohistochemistry-based signatures to predict metastatic site of triple-negative breast cancers.

    Science.gov (United States)

    Klimov, Sergey; Rida, Padmashree Cg; Aleskandarany, Mohammed A; Green, Andrew R; Ellis, Ian O; Janssen, Emiel Am; Rakha, Emad A; Aneja, Ritu

    2017-09-05

    Although distant metastasis (DM) in breast cancer (BC) is the most lethal form of recurrence and the most common underlying cause of cancer related deaths, the outcome following the development of DM is related to the site of metastasis. Triple negative BC (TNBC) is an aggressive form of BC characterised by early recurrences and high mortality. Athough multiple variables can be used to predict the risk of metastasis, few markers can predict the specific site of metastasis. This study aimed at identifying a biomarker signature to predict particular sites of DM in TNBC. A clinically annotated series of 322 TNBC were immunohistochemically stained with 133 biomarkers relevant to BC, to develop multibiomarker models for predicting metastasis to the bone, liver, lung and brain. Patients who experienced metastasis to each site were compared with those who did not, by gradually filtering the biomarker set via a two-tailed t-test and Cox univariate analyses. Biomarker combinations were finally ranked based on statistical significance, and evaluated in multivariable analyses. Our final models were able to stratify TNBC patients into high risk groups that showed over 5, 6, 7 and 8 times higher risk of developing metastasis to the bone, liver, lung and brain, respectively, than low-risk subgroups. These models for predicting site-specific metastasis retained significance following adjustment for tumour size, patient age and chemotherapy status. Our novel IHC-based biomarkers signatures, when assessed in primary TNBC tumours, enable prediction of specific sites of metastasis, and potentially unravel biomarkers previously unknown in site tropism.

  13. Digital reactivity meter construction based on PC

    International Nuclear Information System (INIS)

    Yusi-Eko-Yulianto; Kristedjo-Kurnianto

    2003-01-01

    The reactivitymeter is a core reactivity measuring equipment, which inform the reactor operator the neutron flux development in the core. This digital reactivitymeter is needed to replace analog reactivitymeter, whenever it fails in the future. The replacement of thus reactivitymeter can keep the continuation of reactor operation. The digital reactivitymeter is constructed by using the digital signal processing and computer. Thus real time signal processing is displayed on the monitor graphically. This reactivitymeter has been tested in RSG-GAS and perform a good work. This performance is worthy to use this digital reactivitymeter for RSG-GAS operation

  14. Teleseism-based Relative Time Corrections for Modern Analyses of Digitized Analog Seismograms

    Science.gov (United States)

    Lee, T. A.; Ishii, M.

    2017-12-01

    With modern-day instruments and seismic networks timed by GPS systems, synchronization of data streams is all but a forgone conclusion. However, during the analog era, when each station had its own clock, comparing data timing from different stations was a far more daunting prospect. Today, with recently developed methods by which analog data can be digitized, having the ability to accurately reconcile the timings of two separate stations would open decades worth of data to modern analyses. For example, one possible and exciting application would be using noise interferometry with digitized analog data in order to investigate changing structural features (on a volcano for example) over a much longer timescale than was previously possible. With this in mind, we introduce a new approach to sync time between stations based on teleseismic arrivals. P-wave arrivals are identified at stations for pairs of earthquakes from the digital and analog eras that have nearly identical distances, locations, and depths. Assuming accurate timing of the modern data, relative time corrections between a pair of stations can then be inferred for the analog data. This method for time correction depends upon the analog stations having modern equivalents, and both having sufficiently long durations of operation to allow for recording of usable teleseismic events. The Hawaii Volcano Observatory (HVO) network is an especially ideal environment for this, as it not only has a large and well-preserved collection of analog seismograms, but also has a long operating history (1912 - present) with many of the older stations having modern equivalents. As such, the scope of this project is to calculate and apply relative time corrections to analog data from two HVO stations, HILB (1919-present) and UWE (1928-present)(HILB now part of Pacific Tsunami network). Further application of this method could be for investigation of the effects of relative clock-drift, that is, the determining factor for how

  15. The Digital, the Virtual and the Naming of Knowledge

    Directory of Open Access Journals (Sweden)

    Darren Jorgensen

    2007-01-01

    Full Text Available Amidst changing regimes of disciplinarity, the digital has become a term used to delineate a mode of knowledge and educational methodology. Its currency comes from the technologies that share its name, yet the territory that it marks is much greater than this, referring to the cultural, economic and social. The digital is too proximate to the technological to adequately account for this territory. Instead, I argue for radical interventions in the naming of knowledge in order to defamiliarise the digital. Different accounts of the virtual by Pierre Lévy, Katherine Hayles and David Summers suggest that this term establishes a greater range of enquiry and contestation. The virtual is but one alternative to the digital as a means by which new disciplines, methodologies and pedagogies might be constituted.

  16. Bayesian Maximum Entropy Based Algorithm for Digital X-ray Mammogram Processing

    Directory of Open Access Journals (Sweden)

    Radu Mutihac

    2009-06-01

    Full Text Available Basics of Bayesian statistics in inverse problems using the maximum entropy principle are summarized in connection with the restoration of positive, additive images from various types of data like X-ray digital mammograms. An efficient iterative algorithm for image restoration from large data sets based on the conjugate gradient method and Lagrange multipliers in nonlinear optimization of a specific potential function was developed. The point spread function of the imaging system was determined by numerical simulations of inhomogeneous breast-like tissue with microcalcification inclusions of various opacities. The processed digital and digitized mammograms resulted superior in comparison with their raw counterparts in terms of contrast, resolution, noise, and visibility of details.

  17. SIGNIFICANCE OF THE ACCOUNTING PARADIGM IN THE DECISION-MAKING PROCESS IN COMPANY MANAGEMENT (BASED ONIAS ACCOUNTING PRACTICES IN POLAND AND OTHER COUNTRIES

    Directory of Open Access Journals (Sweden)

    Leszek Michalczyk

    2014-06-01

    Full Text Available In this article, we analyze the relations between modern trends in accounting and the decisionmaking process based on the classic profit-opportunity-cost-risk construction. In this aspect, four main types of accounting practices may be distinguished: bookkeeping (classic accounting, accounting engineering, creative accounting, and praxeological accounting. This study complements the author’s series of publications on accounting engineering (which is herein defined as a concept, the structure of economic auxiliary sciences, and causal relations in management practice and theory based on Bertalanffy’s general systems theory. The article covers accounting systems which emerged as a result of combining IAS solutions with domestic accounting standards and balance laws, and relates primarily to accounting theory and practice in Poland. Nevertheless, the Polish system is rooted in accounting solutions previously used in other countries, and as such may be perceived as more utilitarian, also on an international scale.

  18. A peak value searching method of the MCA based on digital logic devices

    International Nuclear Information System (INIS)

    Sang Ziru; Huang Shanshan; Chen Lian; Jin Ge

    2010-01-01

    Digital multi-channel analyzers play a more important role in multi-channel pulse height analysis technique. The direction of digitalization are characterized by powerful pulse processing ability, high throughput, improved stability and flexibility. This paper introduces a method of searching peak value of waveform based on digital logic with FPGA. This method reduce the dead time. Then data correction offline can improvement the non-linearity of MCA. It gives the α energy spectrum of 241 Am. (authors)

  19. A new MicroTCA-based waveform digitizer for the Muon g-2 experiment

    Energy Technology Data Exchange (ETDEWEB)

    Sweigart, David A. [Cornell U.

    2016-12-15

    We present the design of a new $\\mu$TCA-based waveform digitizer, which will be deployed in the Muon g-2 experiment at Fermilab and will allow our pileup identification requirement to be met. This digitizer features five independent channels, each with 12-bit, 800-MSPS digitization and a 1-Gbit memory buffer. The data storage and readout along with configuration are handled by six Xilinx Kintex-7 FPGAs. In addition, the digitizer is equipped with a mezzanine card for analog signal conditioning prior to digitization, further widening its range of possible applications. The performance results of this design are also presented, highlighting its $0.51 \\pm 0.13$ mV intrinsic noise level and $< 22$ ps intrinsic timing resolution between channels. We believe that its performance, together with its flexible design, could be of interest to future experiments in search of a cost-effective waveform digitizer.

  20. Forged Signature Distinction Using Convolutional Neural Network for Feature Extraction

    Directory of Open Access Journals (Sweden)

    Seungsoo Nam

    2018-01-01

    Full Text Available This paper proposes a dynamic verification scheme for finger-drawn signatures in smartphones. As a dynamic feature, the movement of a smartphone is recorded with accelerometer sensors in the smartphone, in addition to the moving coordinates of the signature. To extract high-level longitudinal and topological features, the proposed scheme uses a convolution neural network (CNN for feature extraction, and not as a conventional classifier. We assume that a CNN trained with forged signatures can extract effective features (called S-vector, which are common in forging activities such as hesitation and delay before drawing the complicated part. The proposed scheme also exploits an autoencoder (AE as a classifier, and the S-vector is used as the input vector to the AE. An AE has high accuracy for the one-class distinction problem such as signature verification, and is also greatly dependent on the accuracy of input data. S-vector is valuable as the input of AE, and, consequently, could lead to improved verification accuracy especially for distinguishing forged signatures. Compared to the previous work, i.e., the MLP-based finger-drawn signature verification scheme, the proposed scheme decreases the equal error rate by 13.7%, specifically, from 18.1% to 4.4%, for discriminating forged signatures.

  1. An algorithm to discover gene signatures with predictive potential

    Directory of Open Access Journals (Sweden)

    Hallett Robin M

    2010-09-01

    Full Text Available Abstract Background The advent of global gene expression profiling has generated unprecedented insight into our molecular understanding of cancer, including breast cancer. For example, human breast cancer patients display significant diversity in terms of their survival, recurrence, metastasis as well as response to treatment. These patient outcomes can be predicted by the transcriptional programs of their individual breast tumors. Predictive gene signatures allow us to correctly classify human breast tumors into various risk groups as well as to more accurately target therapy to ensure more durable cancer treatment. Results Here we present a novel algorithm to generate gene signatures with predictive potential. The method first classifies the expression intensity for each gene as determined by global gene expression profiling as low, average or high. The matrix containing the classified data for each gene is then used to score the expression of each gene based its individual ability to predict the patient characteristic of interest. Finally, all examined genes are ranked based on their predictive ability and the most highly ranked genes are included in the master gene signature, which is then ready for use as a predictor. This method was used to accurately predict the survival outcomes in a cohort of human breast cancer patients. Conclusions We confirmed the capacity of our algorithm to generate gene signatures with bona fide predictive ability. The simplicity of our algorithm will enable biological researchers to quickly generate valuable gene signatures without specialized software or extensive bioinformatics training.

  2. Sensors, empowerment, and accountability: a Digital Earth view from East Africa

    NARCIS (Netherlands)

    Georgiadou, P.Y.; Bana, Benson; Becht, Robert; Hoppe, Robertus; Ikingura, Justinian; Kraak, M.J.; Lance, Kate; Lemmens, R.; Lungo, Juma Hemed; McCall, M.K.; Miscione, Gianluca; Verplanke, J.J.

    2011-01-01

    Several innovative ‘participatory sensing’ initiatives are under way in East Africa. They can be seen as local manifestations of the global notion of Digital Earth. The initiatives aim to amplify the voice of ordinary citizens, improve citizens' capacity to directly influence public service delivery

  3. Nonlinear control of magnetic signatures

    Science.gov (United States)

    Niemoczynski, Bogdan

    Magnetic properties of ferrite structures are known to cause fluctuations in Earth's magnetic field around the object. These fluctuations are known as the object's magnetic signature and are unique based on the object's geometry and material. It is a common practice to neutralize magnetic signatures periodically after certain time intervals, however there is a growing interest to develop real time degaussing systems for various applications. Development of real time degaussing system is a challenging problem because of magnetic hysteresis and difficulties in measurement or estimation of near-field flux data. The goal of this research is to develop a real time feedback control system that can be used to minimize magnetic signatures for ferrite structures. Experimental work on controlling the magnetic signature of a cylindrical steel shell structure with a magnetic disturbance provided evidence that the control process substantially increased the interior magnetic flux. This means near field estimation using interior sensor data is likely to be inaccurate. Follow up numerical work for rectangular and cylindrical cross sections investigated variations in shell wall flux density under a variety of ambient excitation and applied disturbances. Results showed magnetic disturbances could corrupt interior sensor data and magnetic shielding due to the shell walls makes the interior very sensitive to noise. The magnetic flux inside the shell wall showed little variation due to inner disturbances and its high base value makes it less susceptible to noise. This research proceeds to describe a nonlinear controller to use the shell wall data as an input. A nonlinear plant model of magnetics is developed using a constant tau to represent domain rotation lag and a gain function k to describe the magnetic hysteresis curve for the shell wall. The model is justified by producing hysteresis curves for multiple materials, matching experimental data using a particle swarm algorithm, and

  4. Three Dimensional Digital Sieving of Asphalt Mixture Based on X-ray Computed Tomography

    Directory of Open Access Journals (Sweden)

    Chichun Hu

    2017-07-01

    Full Text Available In order to perform three-dimensional digital sieving based on X-ray computed tomography images, the definition of digital sieve size (DSS was proposed, which was defined as the minimum length of the minimum bounding squares of all possible orthographic projections of an aggregate. The corresponding program was developed to reconstruct aggregate structure and to obtain DSS. Laboratory experiments consisting of epoxy-filled aggregate specimens were conducted to investigate the difference between mechanical sieve analysis and the digital sieving technique. It was suggested that concave surface of aggregate was the possible reason for the disparity between DSS and mechanical sieve size. A comparison between DSS and equivalent diameter was also performed. Moreover, the digital sieving technique was adopted to evaluate the gradation of stone mastic asphalt mixtures. The results showed that the closest proximity of the laboratory gradation curve was achieved by calibrated DSS, among gradation curves based on calibrated DSS, un-calibrated DSS and equivalent diameter.

  5. Adaptive digital beamforming for a CDMA mobile communications payload

    Science.gov (United States)

    Munoz-Garcia, Samuel G.; Ruiz, Javier Benedicto

    1993-01-01

    In recent years, Spread-Spectrum Code Division Multiple Access (CDMA) has become a very popular access scheme for mobile communications due to a variety of reasons: excellent performance in multipath environments, high scope for frequency reuse, graceful degradation near saturation, etc. In this way, a CDMA system can support simultaneous digital communication among a large community of relatively uncoordinated users sharing a given frequency band. Nevertheless, there are also important problems associated with the use of CDMA. First, in a conventional CDMA scheme, the signature sequences of asynchronous users are not orthogonal and, as the number of active users increases, the self-noise generated by the mutual interference between users considerably degrades the performance, particularly in the return link. Furthermore, when there is a large disparity in received powers - due to differences in slant range or atmospheric attenuation - the non-zero cross-correlation between the signals gives rise to the so-called near-far problem. This leads to an inefficient utilization of the satellite resources and, consequently, to a drastic reduction in capacity. Several techniques were proposed to overcome this problem, such as Synchronized CDMA - in which the signature sequences of the different users are quasi-orthogonal - and power control. At the expense of increased network complexity and user coordination, these techniques enable the system capacity to be restored by equitably sharing the satellite resources among the users. An alternative solution is presented based upon the use of time-reference adaptive digital beamforming on board the satellite. This technique enables a high number of independently steered beams to be generated from a single phased array antenna, which automatically track the desired user signal and null the unwanted interference source. In order to use a time-reference adaptive antenna in a communications system, the main challenge is to obtain a

  6. Thermal signature measurements for ammonium nitrate/fuel mixtures by laser heating

    International Nuclear Information System (INIS)

    Nazarian, Ashot; Presser, Cary

    2016-01-01

    Highlights: • LDTR is a useful diagnostic for characterizing AN/fuel mixture thermochemical behavior. • Each AN/fuel mixture thermal signature was different. • AN/fuel mixture signature features were defined by the individual constituents. • Baseline signatures changed after an experiment. - Abstract: Measurements were carried out to obtain thermal signatures of several ammonium nitrate/fuel (ANF) mixtures, using a laser-heating technique referred to as the laser-driven thermal reactor (LDTR). The mixtures were ammonium nitrate (AN)/kerosene, AN/ethylene glycol, AN/paraffin wax, AN/petroleum jelly, AN/confectioner's sugar, AN/cellulose (tissue paper), nitromethane/cellulose, nitrobenzene/cellulose, AN/cellulose/nitromethane, AN/cellulose/nitrobenzene. These mixtures were also compared with AN/nitromethane and AN/diesel fuel oil, obtained from an earlier investigation. Thermograms for the mixtures, as well as individual constituents, were compared to better understand how sample thermal signature changes with mixture composition. This is the first step in development of a thermal-signature database, to be used along with other signature databases, to improve identification of energetic substances of unknown composition. The results indicated that each individual thermal signature was associated unambiguously with a particular mixture composition. The signature features of a particular mixture were shaped by the individual constituent signatures. It was also uncovered that the baseline signature was modified after an experiment due to coating of unreacted residue on the substrate surface and a change in the reactor sphere oxide layer. Thus, care was required to pre-oxidize the sphere prior to an experiment. A minimum sample mass (which was dependent on composition) was required to detect the signature characteristics. Increased laser power served to magnify signal strength while preserving the signature features. For the mixtures examined, the thermal

  7. Emergy-based ecological account for the Chinese economy in 2004

    Science.gov (United States)

    Jiang, M. M.; Zhou, J. B.; Chen, B.; Chen, G. Q.

    2008-12-01

    This paper provides an integrated study on the ecological account for the Chinese economy in 2004 based on emergy synthesis theory. The detailed flows of the Chinese economy is diagramed, accounted and analyzed in categories using the biophysically based ecological accounting. Through calculating environmental and economic inputs within and outside the Chinese economy, this paper discusses the Chinese international exchange, describes the resource structure, and assesses its sustainability as a whole. Also, the comparison of systematic indicators, such as emergy/dollar ratio, environmental load ratio, and emergy self-support ratio, with those of the other countries is tabled and explored to illustrate the general status of the Chinese economy in the world. Take, for example, the environmental load ratio, which was 9.29 in China 2004, it reveals that the Chinese economy put high pressure on the local environment compared with those of the environment-benign countries, such as Brazil (0.75), Australia (0.86) and New Zealand (0.81). In addition, in this paper, the accounting method of tourism is adjusted based on the previous researches.

  8. Circulating neutrophil transcriptome may reveal intracranial aneurysm signature

    Science.gov (United States)

    Tutino, Vincent M.; Poppenberg, Kerry E.; Jiang, Kaiyu; Jarvis, James N.; Sun, Yijun; Sonig, Ashish; Siddiqui, Adnan H.; Snyder, Kenneth V.; Levy, Elad I.; Kolega, John

    2018-01-01

    Background Unruptured intracranial aneurysms (IAs) are typically asymptomatic and undetected except for incidental discovery on imaging. Blood-based diagnostic biomarkers could lead to improvements in IA management. This exploratory study examined circulating neutrophils to determine whether they carry RNA expression signatures of IAs. Methods Blood samples were collected from patients receiving cerebral angiography. Eleven samples were collected from patients with IAs and 11 from patients without IAs as controls. Samples from the two groups were paired based on demographics and comorbidities. RNA was extracted from isolated neutrophils and subjected to next-generation RNA sequencing to obtain differential expressions for identification of an IA-associated signature. Bioinformatics analyses, including gene set enrichment analysis and Ingenuity Pathway Analysis, were used to investigate the biological function of all differentially expressed transcripts. Results Transcriptome profiling identified 258 differentially expressed transcripts in patients with and without IAs. Expression differences were consistent with peripheral neutrophil activation. An IA-associated RNA expression signature was identified in 82 transcripts (pIAs on hierarchical clustering. Furthermore, in an independent, unpaired, replication cohort of patients with IAs (n = 5) and controls (n = 5), the 82 transcripts separated 9 of 10 patients into their respective groups. Conclusion Preliminary findings show that RNA expression from circulating neutrophils carries an IA-associated signature. These findings highlight a potential to use predictive biomarkers from peripheral blood samples to identify patients with IAs. PMID:29342213

  9. Lesson 6: Signature Validation

    Science.gov (United States)

    Checklist items 13 through 17 are grouped under the Signature Validation Process, and represent CROMERR requirements that the system must satisfy as part of ensuring that electronic signatures it receives are valid.

  10. Secure Mobile Agent from Leakage-Resilient Proxy Signatures

    Directory of Open Access Journals (Sweden)

    Fei Tang

    2015-01-01

    Full Text Available A mobile agent can sign a message in a remote server on behalf of a customer without exposing its secret key; it can be used not only to search for special products or services, but also to make a contract with a remote server. Hence a mobile agent system can be used for electronic commerce as an important key technology. In order to realize such a system, Lee et al. showed that a secure mobile agent can be constructed using proxy signatures. Intuitively, a proxy signature permits an entity (delegator to delegate its signing right to another entity (proxy to sign some specified messages on behalf of the delegator. However, the proxy signatures are often used in scenarios where the signing is done in an insecure environment, for example, the remote server of a mobile agent system. In such setting, an adversary could launch side-channel attacks to exploit some leakage information about the proxy key or even other secret states. The proxy signatures which are secure in the traditional security models obviously cannot provide such security. Based on this consideration, in this paper, we design a leakage-resilient proxy signature scheme for the secure mobile agent systems.

  11. 21 CFR 11.50 - Signature manifestations.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Signature manifestations. 11.50 Section 11.50 Food... RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.50 Signature manifestations. (a) Signed electronic...: (1) The printed name of the signer; (2) The date and time when the signature was executed; and (3...

  12. Modem Signature Analysis.

    Science.gov (United States)

    1982-10-01

    AD-A127 993 MODEM SIGNATURE ANALISIS (U) PAR TECHNOLOGY CORP NEW / HARTFORD NY V EDWARDS ET AL. OCT 82 RADC-TR-82-269 F30602-80-C-0264 NCLASSIFIED F/G...as an indication of the class clustering and separation between different classes in the modem data base. It is apparent from the projection that the...that as the clusters disperse, the likelihood of a sample crossing the boundary into an adjacent region and causing a symbol decision error increases. As

  13. Examining live cell cultures during apoptosis by digital holographic phase imaging and Raman spectroscopy

    Science.gov (United States)

    Khmaladze, Alexander

    2017-11-01

    Cellular apoptosis is a unique, organized series of events, leading to programmed cell death. In this work, we present a combined digital holography/Raman spectroscopy technique to study live cell cultures during apoptosis. Digital holographic microscopy measurements of live cell cultures yield information about cell shape and volume, changes to which are indicative of alterations in cell cycle and initiation of cell death mechanisms. Raman spectroscopic measurements provide complementary information about cells, such as protein, lipid and nucleic acid content, and the spectral signatures associated with structural changes in molecules. Our work indicates that the chemical changes in proteins, which were detected by Raman measurements, preceded morphological changes, which were seen with digital holographic microscopy.

  14. L1000CDS2: LINCS L1000 characteristic direction signatures search engine.

    Science.gov (United States)

    Duan, Qiaonan; Reid, St Patrick; Clark, Neil R; Wang, Zichen; Fernandez, Nicolas F; Rouillard, Andrew D; Readhead, Ben; Tritsch, Sarah R; Hodos, Rachel; Hafner, Marc; Niepel, Mario; Sorger, Peter K; Dudley, Joel T; Bavari, Sina; Panchal, Rekha G; Ma'ayan, Avi

    2016-01-01

    The library of integrated network-based cellular signatures (LINCS) L1000 data set currently comprises of over a million gene expression profiles of chemically perturbed human cell lines. Through unique several intrinsic and extrinsic benchmarking schemes, we demonstrate that processing the L1000 data with the characteristic direction (CD) method significantly improves signal to noise compared with the MODZ method currently used to compute L1000 signatures. The CD processed L1000 signatures are served through a state-of-the-art web-based search engine application called L1000CDS 2 . The L1000CDS 2 search engine provides prioritization of thousands of small-molecule signatures, and their pairwise combinations, predicted to either mimic or reverse an input gene expression signature using two methods. The L1000CDS 2 search engine also predicts drug targets for all the small molecules profiled by the L1000 assay that we processed. Targets are predicted by computing the cosine similarity between the L1000 small-molecule signatures and a large collection of signatures extracted from the gene expression omnibus (GEO) for single-gene perturbations in mammalian cells. We applied L1000CDS 2 to prioritize small molecules that are predicted to reverse expression in 670 disease signatures also extracted from GEO, and prioritized small molecules that can mimic expression of 22 endogenous ligand signatures profiled by the L1000 assay. As a case study, to further demonstrate the utility of L1000CDS 2 , we collected expression signatures from human cells infected with Ebola virus at 30, 60 and 120 min. Querying these signatures with L1000CDS 2 we identified kenpaullone, a GSK3B/CDK2 inhibitor that we show, in subsequent experiments, has a dose-dependent efficacy in inhibiting Ebola infection in vitro without causing cellular toxicity in human cell lines. In summary, the L1000CDS 2 tool can be applied in many biological and biomedical settings, while improving the extraction of

  15. 21 CFR 11.70 - Signature/record linking.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Signature/record linking. 11.70 Section 11.70 Food... RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.70 Signature/record linking. Electronic signatures and handwritten signatures executed to electronic records shall be linked to their respective...

  16. Artistic Education and social transformation in the context of Digital Humanities

    Directory of Open Access Journals (Sweden)

    Rafael Marfil-Carmona

    2018-05-01

    Full Text Available The visual and audiovisual arts have an important presence on the Internet. For this reason, it is currently impossible to develop an Arts Education that does not take into account the relevance of digital culture. In the 21st century, the didactic approach to art requires the implementation of media literacy, visual and audiovisual processes. Media and Artistic Education come together to ensure individual and social transformation. Digital Humanities has much to do with this purpose. They are centred on the empowerment of citizens, made possible through learning and creativity processes. There is an urgent need to adapt Arts Education to digital culture and innovation, artistic and educational, through technological media and screens. This text proposes some conceptual bases that, from an interdisciplinary point of view, allow artistic education that takes into account the characteristics of a prosumer society. This society is immersed in processes of active participation in Social Media, but also tends to info-xication that produces the mass creation and diffusion of images. The transition from an educational and artistic model, eminently manual, to a new reality based on technology and the relational factor, must be considered as a constructionist evolution that allows implementing an integrating approach of old and new approaches. The objective is to consolidate creativity and artistic understanding as a factor for human development and social transformation, essential factors for critical citizenship.

  17. Simple and robust image-based autofocusing for digital microscopy.

    Science.gov (United States)

    Yazdanfar, Siavash; Kenny, Kevin B; Tasimi, Krenar; Corwin, Alex D; Dixon, Elizabeth L; Filkins, Robert J

    2008-06-09

    A simple image-based autofocusing scheme for digital microscopy is demonstrated that uses as few as two intermediate images to bring the sample into focus. The algorithm is adapted to a commercial inverted microscope and used to automate brightfield and fluorescence imaging of histopathology tissue sections.

  18. 500 MHz transient digitizers based on GaAs CCDs

    International Nuclear Information System (INIS)

    Bryman, D.; Cresswell, J.V.; LeNoble, M.; Poutissou, R.

    1990-10-01

    A wide bandwidth transient digitizer based on a recently produced gallium arsenide charged coupled device is under development. The CCDs have 128 pixels and operate at 500 MHz. Initial testing of prototype modules in Experiment 787 at Brookhaven National Laboratory is reported. (Author) (8 refs., 10 figs.)

  19. Digital differential confocal microscopy based on spatial shift transformation.

    Science.gov (United States)

    Liu, J; Wang, Y; Liu, C; Wilson, T; Wang, H; Tan, J

    2014-11-01

    Differential confocal microscopy is a particularly powerful surface profilometry technique in industrial metrology due to its high axial sensitivity and insensitivity to noise. However, the practical implementation of the technique requires the accurate positioning of point detectors in three-dimensions. We describe a simple alternative based on spatial transformation of a through-focus series of images obtained from a homemade beam scanning confocal microscope. This digital differential confocal microscopy approach is described and compared with the traditional Differential confocal microscopy approach. The ease of use of the digital differential confocal microscopy system is illustrated by performing measurements on a 3D standard specimen. © 2014 The Authors Journal of Microscopy © 2014 Royal Microscopical Society.

  20. Spectral signature barcodes based on S-shaped Split Ring Resonators (S-SRRs

    Directory of Open Access Journals (Sweden)

    Herrojo Cristian

    2016-01-01

    Full Text Available In this paper, it is shown that S-shaped split ring resonators (S-SRRs are useful particles for the implementation of spectral signature (i.e., a class of radiofrequency barcodes based on coplanar waveguide (CPW transmission lines loaded with such resonant elements. By virtue of its S shape, these resonators are electrically small. Hence S-SRRs are of interest for the miniaturization of the barcodes, since multiple resonators, each tuned at a different frequency, are used for encoding purposes. In particular, a 10-bit barcode occupying 1 GHz spectral bandwidth centered at 2.5 GHz, with dimensions of 9 cm2, is presented in this paper.

  1. Smartphone based scalable reverse engineering by digital image correlation

    Science.gov (United States)

    Vidvans, Amey; Basu, Saurabh

    2018-03-01

    There is a need for scalable open source 3D reconstruction systems for reverse engineering. This is because most commercially available reconstruction systems are capital and resource intensive. To address this, a novel reconstruction technique is proposed. The technique involves digital image correlation based characterization of surface speeds followed by normalization with respect to angular speed during rigid body rotational motion of the specimen. Proof of concept of the same is demonstrated and validated using simulation and empirical characterization. Towards this, smart-phone imaging and inexpensive off the shelf components along with those fabricated additively using poly-lactic acid polymer with a standard 3D printer are used. Some sources of error in this reconstruction methodology are discussed. It is seen that high curvatures on the surface suppress accuracy of reconstruction. Reasons behind this are delineated in the nature of the correlation function. Theoretically achievable resolution during smart-phone based 3D reconstruction by digital image correlation is derived.

  2. Development of Michelson interferometer based spatial phase-shift digital shearography

    Science.gov (United States)

    Xie, Xin

    Digital shearography is a non-contact, full field, optical measurement method, which has the capability of directly measuring the gradient of deformation. For high measurement sensitivity, phase evaluation method has to be introduced into digital shearography by phase-shift technique. Catalog by phase-shift method, digital phase-shift shearography can be divided into Temporal Phase-Shift Digital Shearography (TPS-DS) and Spatial Phase-Shift Digital Shearography (SPS-DS). TPS-DS is the most widely used phase-shift shearography system, due to its simple algorithm, easy operation and good phase-map quality. However, the application of TPS-DS is only limited in static/step-by-step loading measurement situation, due to its multi-step shifting process. In order to measure the strain under dynamic/continuous loading situation, a SPS-DS system has to be developed. This dissertation aims to develop a series of Michelson Interferometer based SPS-DS measurement methods to achieve the strain measurement by using only a single pair of speckle pattern images. The Michelson Interferometer based SPS-DS systems utilize special designed optical setup to introduce extra carrier frequency into the laser wavefront. The phase information corresponds to the strain field can be separated on the Fourier domain using a Fourier Transform and can further be evaluated with a Windowed Inverse Fourier Transform. With different optical setups and carrier frequency arrangements, the Michelson Interferometer based SPS-DS method is capable to achieve a variety of measurement tasks using only single pair of speckle pattern images. Catalog by the aimed measurand, these capable measurement tasks can be divided into five categories: 1) measurement of out-of-plane strain field with small shearing amount; 2) measurement of relative out-of-plane deformation field with big shearing amount; 3) simultaneous measurement of relative out-of-plane deformation field and deformation gradient field by using multiple

  3. Development of a PZT-based wireless digital monitor for composite impact monitoring

    International Nuclear Information System (INIS)

    Liu, Peipei; Yuan, Shenfang; Qiu, Lei

    2012-01-01

    One of the major concerns in the whole lifetime of composite materials in aircraft is their susceptibility to impact damage. And there has existed a need in recent years to develop an online structural health monitoring (SHM) system for impact monitoring. This paper proposes a new PZT-based wireless digital impact monitoring system development method aimed at giving a localized area for further inspection. Based on this method, a PZT-based wireless digital impact monitor (WDIM) with advantages of compactness, light weight, low power consumption and high efficiency is developed. Differently from conventional SHM systems, the complex analog circuits are removed and the whole process is achieved in a digital way by turning the output of the PZT sensor directly into a digital queue through a comparator. A simple but efficient sub-region location method is implemented in a field programmable gate array (FPGA) as the processing core of the WDIM to detect and record the impact events. In addition, wireless communication technology is used in the WDIM to transmit data and form a monitoring network. To illustrate the capability of the WDIM, a complete process dealing with an impact event is investigated and the stability of the WDIM is also evaluated in this paper. The WDIM shows its potential for real online applications in aircraft. (paper)

  4. 17 CFR 12.12 - Signature.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Signature. 12.12 Section 12.12... General Information and Preliminary Consideration of Pleadings § 12.12 Signature. (a) By whom. All... document on behalf of another person. (b) Effect. The signature on any document of any person acting either...

  5. High-speed high-security signatures

    NARCIS (Netherlands)

    Bernstein, D.J.; Duif, N.; Lange, T.; Schwabe, P.; Yang, B.Y.

    2011-01-01

    This paper shows that a $390 mass-market quad-core 2.4GHz Intel Westmere (Xeon E5620) CPU can create 108000 signatures per second and verify 71000 signatures per second on an elliptic curve at a 2128 security level. Public keys are 32 bytes, and signatures are 64 bytes. These performance figures

  6. Data Portal for the Library of Integrated Network-based Cellular Signatures (LINCS) program: integrated access to diverse large-scale cellular perturbation response data

    Science.gov (United States)

    Koleti, Amar; Terryn, Raymond; Stathias, Vasileios; Chung, Caty; Cooper, Daniel J; Turner, John P; Vidović, Dušica; Forlin, Michele; Kelley, Tanya T; D’Urso, Alessandro; Allen, Bryce K; Torre, Denis; Jagodnik, Kathleen M; Wang, Lily; Jenkins, Sherry L; Mader, Christopher; Niu, Wen; Fazel, Mehdi; Mahi, Naim; Pilarczyk, Marcin; Clark, Nicholas; Shamsaei, Behrouz; Meller, Jarek; Vasiliauskas, Juozas; Reichard, John; Medvedovic, Mario; Ma’ayan, Avi; Pillai, Ajay

    2018-01-01

    Abstract The Library of Integrated Network-based Cellular Signatures (LINCS) program is a national consortium funded by the NIH to generate a diverse and extensive reference library of cell-based perturbation-response signatures, along with novel data analytics tools to improve our understanding of human diseases at the systems level. In contrast to other large-scale data generation efforts, LINCS Data and Signature Generation Centers (DSGCs) employ a wide range of assay technologies cataloging diverse cellular responses. Integration of, and unified access to LINCS data has therefore been particularly challenging. The Big Data to Knowledge (BD2K) LINCS Data Coordination and Integration Center (DCIC) has developed data standards specifications, data processing pipelines, and a suite of end-user software tools to integrate and annotate LINCS-generated data, to make LINCS signatures searchable and usable for different types of users. Here, we describe the LINCS Data Portal (LDP) (http://lincsportal.ccs.miami.edu/), a unified web interface to access datasets generated by the LINCS DSGCs, and its underlying database, LINCS Data Registry (LDR). LINCS data served on the LDP contains extensive metadata and curated annotations. We highlight the features of the LDP user interface that is designed to enable search, browsing, exploration, download and analysis of LINCS data and related curated content. PMID:29140462

  7. Digital chaotic sequence generator based on coupled chaotic systems

    International Nuclear Information System (INIS)

    Shu-Bo, Liu; Jing, Sun; Jin-Shuo, Liu; Zheng-Quan, Xu

    2009-01-01

    Chaotic systems perform well as a new rich source of cryptography and pseudo-random coding. Unfortunately their digital dynamical properties would degrade due to the finite computing precision. Proposed in this paper is a modified digital chaotic sequence generator based on chaotic logistic systems with a coupling structure where one chaotic subsystem generates perturbation signals to disturb the control parameter of the other one. The numerical simulations show that the length of chaotic orbits, the output distribution of chaotic system, and the security of chaotic sequences have been greatly improved. Moreover the chaotic sequence period can be extended at least by one order of magnitude longer than that of the uncoupled logistic system and the difficulty in decrypting increases 2 128 *2 128 times indicating that the dynamical degradation of digital chaos is effectively improved. A field programmable gate array (FPGA) implementation of an algorithm is given and the corresponding experiment shows that the output speed of the generated chaotic sequences can reach 571.4 Mbps indicating that the designed generator can be applied to the real-time video image encryption. (general)

  8. TIMTEM - a digital program for the calculation of two-dimensional, non-linear temperature fields of reactor components of complex structure taking into account inhomogeneity and anisotropy

    International Nuclear Information System (INIS)

    Simon-Weidner, J.

    1975-05-01

    The digital program TIMTEM calculates twodimensional, nonlinear temperature fields of reactor components of complex structure; inhomogeneity and anisotropy are taken into account. Systems consisting of different materials and therefore having different temperature- and/or time-dependent material characteristics are allowed. Various local, time- and/or temperature-dependent boundary conditions can be considered, too, which may be locally different from each other or can be interconnected. (orig.) [de

  9. A Compton suppressed detector multiplicity trigger based digital DAQ for gamma-ray spectroscopy

    Science.gov (United States)

    Das, S.; Samanta, S.; Banik, R.; Bhattacharjee, R.; Basu, K.; Raut, R.; Ghugre, S. S.; Sinha, A. K.; Bhattacharya, S.; Imran, S.; Mukherjee, G.; Bhattacharyya, S.; Goswami, A.; Palit, R.; Tan, H.

    2018-06-01

    The development of a digitizer based pulse processing and data acquisition system for γ-ray spectroscopy with large detector arrays is presented. The system is based on 250 MHz 12-bit digitizers, and is triggered by a user chosen multiplicity of Compton suppressed detectors. The logic for trigger generation is similar to the one practised for analog (NIM/CAMAC) pulse processing electronics, while retaining the fast processing merits of the digitizer system. Codes for reduction of data acquired from the system have also been developed. The system has been tested with offline studies using radioactive sources as well as in the in-beam experiments with an array of Compton suppressed Clover detectors. The results obtained therefrom validate its use in spectroscopic efforts for nuclear structure investigations.

  10. PRINCIPLES- AND RULES-BASED ACCOUNTING DEBATE. IMPLICATIONS FOR AN EMERGENT COUNTRY

    Directory of Open Access Journals (Sweden)

    Deaconu Adela

    2011-07-01

    Full Text Available By a qualitative analysis, this research observes whether a principles-based system or a mixed version of it with the rules-based system, applied in Romania - an emergent country - is appropriate taking into account the mentalities, the traditions, and other cultural elements that were typical of a rules-based system. We support the statement that, even if certain contextual variables are common to other developed countries, their environments significantly differ. To be effective, financial reporting must reflect the firm's context in which it is functioning. The research has a deductive approach based on the analysis of the cultural factors and their influence in the last years. For Romania it is argue a lower accounting professionalism associated with a low level of ambiguity tolerance. For the stage analysed in this study (after the year 2005 the professional reasoning - a proxy for the accounting professional behaviour - took into consideration the fiscal and legal requirements rather than the accounting principles and judgments. The research suggest that the Romanian accounting practice and the professionals are not fully prepared for a principles-based system environment, associated with the ability to find undisclosed events, facing ambiguity, identifying inferred relationships and using intuition, respectively working with uncertainty. We therefore reach the conclusion that in Romania institutional amendments affecting the professional expertise would be needed. The accounting regulations must be chosen with great caution and they must answer and/ or be adjusted, even if the process would be delayed, to national values, behaviour of companies and individual expertise and beliefs. Secondly, the benefits of applying accounting reasoning in this country may be enhanced through a better understanding of their content and through practical exercise. Here regulatory bodies may intervene for organizing professional training programs and acting

  11. Telling time from analog and digital clocks: A multiple-route account

    NARCIS (Netherlands)

    Korvorst, M.H.W.; Roelofs, A.P.A.; Levelt, W.J.M.

    2007-01-01

    Does the naming of clocks always require conceptual preparation? To examine this question, speakers were presented with analog and digital clocks that had to be named in Dutch using either a relative (e.g., "quarter to four") or an absolute (e.g., "three forty-five") clock time expression format.

  12. Activty- versus Variability-Based Management Accounting

    DEFF Research Database (Denmark)

    Israelsen, Poul

    Bogen var blandt finalisterne til modtagelse af 1994-prisen “Contribution to Management Accounting Literature Award”, som uddeles af "The Management Accounting Section of the American Accounting Association"......Bogen var blandt finalisterne til modtagelse af 1994-prisen “Contribution to Management Accounting Literature Award”, som uddeles af "The Management Accounting Section of the American Accounting Association"...

  13. Security problem on arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Choi, Jeong Woon; Chang, Ku-Young; Hong, Dowon

    2011-01-01

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  14. Security problem on arbitrated quantum signature schemes

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Jeong Woon [Emerging Technology R and D Center, SK Telecom, Kyunggi 463-784 (Korea, Republic of); Chang, Ku-Young; Hong, Dowon [Cryptography Research Team, Electronics and Telecommunications Research Institute, Daejeon 305-700 (Korea, Republic of)

    2011-12-15

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  15. Spectral decomposition of MR spectroscopy signatures with use of eigenanalysis

    International Nuclear Information System (INIS)

    Hearshen, D.O.; Windham, J.P.; Roebuck, J.R.; Helpern, J.A.

    1989-01-01

    Partial-volume contamination and overlapping resonances are common problems in whole-body MR spectroscopy and can affect absolute or relative intensity and chemical-shift measurements. One technique, based on solution of constrained eigenvalue problems, treats spectra as N-dimensional signatures and minimizes contributions of undesired signatures while maximizing contributions of desired signatures in compromised spectra. Computer simulations and both high-resolution (400-MHz) and whole-body (63.8-MHz) phantom studies tested accuracy and reproducibility of spectral decomposition. Results demonstrated excellent decomposition and good reproducibility within certain constraints. The authors conclude that eigenanalysis may improve quantitation of spectra without introducing operator bias

  16. Developing a digital photography-based method for dietary analysis in self-serve dining settings.

    Science.gov (United States)

    Christoph, Mary J; Loman, Brett R; Ellison, Brenna

    2017-07-01

    Current population-based methods for assessing dietary intake, including food frequency questionnaires, food diaries, and 24-h dietary recall, are limited in their ability to objectively measure food intake. Digital photography has been identified as a promising addition to these techniques but has rarely been assessed in self-serve settings. We utilized digital photography to examine university students' food choices and consumption in a self-serve dining hall setting. Research assistants took pre- and post-photos of students' plates during lunch and dinner to assess selection (presence), servings, and consumption of MyPlate food groups. Four coders rated the same set of approximately 180 meals for inter-rater reliability analyses; approximately 50 additional meals were coded twice by each coder to assess intra-rater agreement. Inter-rater agreement on the selection, servings, and consumption of food groups was high at 93.5%; intra-rater agreement was similarly high with an average of 95.6% agreement. Coders achieved the highest rates of agreement in assessing if a food group was present on the plate (95-99% inter-rater agreement, depending on food group) and estimating the servings of food selected (81-98% inter-rater agreement). Estimating consumption, particularly for items such as beans and cheese that were often in mixed dishes, was more challenging (77-94% inter-rater agreement). Results suggest that the digital photography method presented is feasible for large studies in real-world environments and can provide an objective measure of food selection, servings, and consumption with a high degree of agreement between coders; however, to make accurate claims about the state of dietary intake in all-you-can-eat, self-serve settings, researchers will need to account for the possibility of diners taking multiple trips through the serving line. Copyright © 2017 Elsevier Ltd. All rights reserved.

  17. Designing Digital Problem Based Learning Tasks that Motivate Students

    Science.gov (United States)

    van Loon, Anne-Marieke; Ros, Anje; Martens, Rob

    2013-01-01

    This study examines whether teachers are able to apply the principles of autonomy support and structure support in designing digital problem based learning (PBL) tasks. We examine whether these tasks are more autonomy- and structure-supportive and whether primary and secondary school students experience greater autonomy, competence, and motivation…

  18. Dynamic Gesture Recognition with a Terahertz Radar Based on Range Profile Sequences and Doppler Signatures.

    Science.gov (United States)

    Zhou, Zhi; Cao, Zongjie; Pi, Yiming

    2017-12-21

    The frequency of terahertz radar ranges from 0.1 THz to 10 THz, which is higher than that of microwaves. Multi-modal signals, including high-resolution range profile (HRRP) and Doppler signatures, can be acquired by the terahertz radar system. These two kinds of information are commonly used in automatic target recognition; however, dynamic gesture recognition is rarely discussed in the terahertz regime. In this paper, a dynamic gesture recognition system using a terahertz radar is proposed, based on multi-modal signals. The HRRP sequences and Doppler signatures were first achieved from the radar echoes. Considering the electromagnetic scattering characteristics, a feature extraction model is designed using location parameter estimation of scattering centers. Dynamic Time Warping (DTW) extended to multi-modal signals is used to accomplish the classifications. Ten types of gesture signals, collected from a terahertz radar, are applied to validate the analysis and the recognition system. The results of the experiment indicate that the recognition rate reaches more than 91%. This research verifies the potential applications of dynamic gesture recognition using a terahertz radar.

  19. A natural approach to convey numerical digits using hand activity recognition based on hand shape features

    Science.gov (United States)

    Chidananda, H.; Reddy, T. Hanumantha

    2017-06-01

    This paper presents a natural representation of numerical digit(s) using hand activity analysis based on number of fingers out stretched for each numerical digit in sequence extracted from a video. The analysis is based on determining a set of six features from a hand image. The most important features used from each frame in a video are the first fingertip from top, palm-line, palm-center, valley points between the fingers exists above the palm-line. Using this work user can convey any number of numerical digits using right or left or both the hands naturally in a video. Each numerical digit ranges from 0 to9. Hands (right/left/both) used to convey digits can be recognized accurately using the valley points and with this recognition whether the user is a right / left handed person in practice can be analyzed. In this work, first the hand(s) and face parts are detected by using YCbCr color space and face part is removed by using ellipse based method. Then, the hand(s) are analyzed to recognize the activity that represents a series of numerical digits in a video. This work uses pixel continuity algorithm using 2D coordinate geometry system and does not use regular use of calculus, contours, convex hull and datasets.

  20. Development and validation of a smartphone-based digits-in-noise hearing test in South African English.

    Science.gov (United States)

    Potgieter, Jenni-Marí; Swanepoel, De Wet; Myburgh, Hermanus Carel; Hopper, Thomas Christopher; Smits, Cas

    2015-07-01

    The objective of this study was to develop and validate a smartphone-based digits-in-noise hearing test for South African English. Single digits (0-9) were recorded and spoken by a first language English female speaker. Level corrections were applied to create a set of homogeneous digits with steep speech recognition functions. A smartphone application was created to utilize 120 digit-triplets in noise as test material. An adaptive test procedure determined the speech reception threshold (SRT). Experiments were performed to determine headphones effects on the SRT and to establish normative data. Participants consisted of 40 normal-hearing subjects with thresholds ≤15 dB across the frequency spectrum (250-8000 Hz) and 186 subjects with normal-hearing in both ears, or normal-hearing in the better ear. The results show steep speech recognition functions with a slope of 20%/dB for digit-triplets presented in noise using the smartphone application. The results of five headphone types indicate that the smartphone-based hearing test is reliable and can be conducted using standard Android smartphone headphones or clinical headphones. A digits-in-noise hearing test was developed and validated for South Africa. The mean SRT and speech recognition functions correspond to previous developed telephone-based digits-in-noise tests.

  1. ADAGE signature analysis: differential expression analysis with data-defined gene sets.

    Science.gov (United States)

    Tan, Jie; Huyck, Matthew; Hu, Dongbo; Zelaya, René A; Hogan, Deborah A; Greene, Casey S

    2017-11-22

    Gene set enrichment analysis and overrepresentation analyses are commonly used methods to determine the biological processes affected by a differential expression experiment. This approach requires biologically relevant gene sets, which are currently curated manually, limiting their availability and accuracy in many organisms without extensively curated resources. New feature learning approaches can now be paired with existing data collections to directly extract functional gene sets from big data. Here we introduce a method to identify perturbed processes. In contrast with methods that use curated gene sets, this approach uses signatures extracted from public expression data. We first extract expression signatures from public data using ADAGE, a neural network-based feature extraction approach. We next identify signatures that are differentially active under a given treatment. Our results demonstrate that these signatures represent biological processes that are perturbed by the experiment. Because these signatures are directly learned from data without supervision, they can identify uncurated or novel biological processes. We implemented ADAGE signature analysis for the bacterial pathogen Pseudomonas aeruginosa. For the convenience of different user groups, we implemented both an R package (ADAGEpath) and a web server ( http://adage.greenelab.com ) to run these analyses. Both are open-source to allow easy expansion to other organisms or signature generation methods. We applied ADAGE signature analysis to an example dataset in which wild-type and ∆anr mutant cells were grown as biofilms on the Cystic Fibrosis genotype bronchial epithelial cells. We mapped active signatures in the dataset to KEGG pathways and compared with pathways identified using GSEA. The two approaches generally return consistent results; however, ADAGE signature analysis also identified a signature that revealed the molecularly supported link between the MexT regulon and Anr. We designed

  2. Reconstruction of a digital core containing clay minerals based on a clustering algorithm.

    Science.gov (United States)

    He, Yanlong; Pu, Chunsheng; Jing, Cheng; Gu, Xiaoyu; Chen, Qingdong; Liu, Hongzhi; Khan, Nasir; Dong, Qiaoling

    2017-10-01

    It is difficult to obtain a core sample and information for digital core reconstruction of mature sandstone reservoirs around the world, especially for an unconsolidated sandstone reservoir. Meanwhile, reconstruction and division of clay minerals play a vital role in the reconstruction of the digital cores, although the two-dimensional data-based reconstruction methods are specifically applicable as the microstructure reservoir simulation methods for the sandstone reservoir. However, reconstruction of clay minerals is still challenging from a research viewpoint for the better reconstruction of various clay minerals in the digital cores. In the present work, the content of clay minerals was considered on the basis of two-dimensional information about the reservoir. After application of the hybrid method, and compared with the model reconstructed by the process-based method, the digital core containing clay clusters without the labels of the clusters' number, size, and texture were the output. The statistics and geometry of the reconstruction model were similar to the reference model. In addition, the Hoshen-Kopelman algorithm was used to label various connected unclassified clay clusters in the initial model and then the number and size of clay clusters were recorded. At the same time, the K-means clustering algorithm was applied to divide the labeled, large connecting clusters into smaller clusters on the basis of difference in the clusters' characteristics. According to the clay minerals' characteristics, such as types, textures, and distributions, the digital core containing clay minerals was reconstructed by means of the clustering algorithm and the clay clusters' structure judgment. The distributions and textures of the clay minerals of the digital core were reasonable. The clustering algorithm improved the digital core reconstruction and provided an alternative method for the simulation of different clay minerals in the digital cores.

  3. Reconstruction of a digital core containing clay minerals based on a clustering algorithm

    Science.gov (United States)

    He, Yanlong; Pu, Chunsheng; Jing, Cheng; Gu, Xiaoyu; Chen, Qingdong; Liu, Hongzhi; Khan, Nasir; Dong, Qiaoling

    2017-10-01

    It is difficult to obtain a core sample and information for digital core reconstruction of mature sandstone reservoirs around the world, especially for an unconsolidated sandstone reservoir. Meanwhile, reconstruction and division of clay minerals play a vital role in the reconstruction of the digital cores, although the two-dimensional data-based reconstruction methods are specifically applicable as the microstructure reservoir simulation methods for the sandstone reservoir. However, reconstruction of clay minerals is still challenging from a research viewpoint for the better reconstruction of various clay minerals in the digital cores. In the present work, the content of clay minerals was considered on the basis of two-dimensional information about the reservoir. After application of the hybrid method, and compared with the model reconstructed by the process-based method, the digital core containing clay clusters without the labels of the clusters' number, size, and texture were the output. The statistics and geometry of the reconstruction model were similar to the reference model. In addition, the Hoshen-Kopelman algorithm was used to label various connected unclassified clay clusters in the initial model and then the number and size of clay clusters were recorded. At the same time, the K -means clustering algorithm was applied to divide the labeled, large connecting clusters into smaller clusters on the basis of difference in the clusters' characteristics. According to the clay minerals' characteristics, such as types, textures, and distributions, the digital core containing clay minerals was reconstructed by means of the clustering algorithm and the clay clusters' structure judgment. The distributions and textures of the clay minerals of the digital core were reasonable. The clustering algorithm improved the digital core reconstruction and provided an alternative method for the simulation of different clay minerals in the digital cores.

  4. Network based multi-channel digital flash X-ray imaging system

    International Nuclear Information System (INIS)

    Wang Jingjin; Yuan Jie; Liu Yaqiang; Lin Yong; Song Zheng; Liu Keyin; Zhang Qi; Zheng Futang

    2000-01-01

    A network based multi-channel digital flash X-ray imaging system has been developed. It can be used to acquire and digitize orthogonal flash X-ray images in multi-interval, and to distribute the images on the network. There is no need of films and chemical process, no anxiety of waiting and no trouble of film archiving. This system is useful for testing ballistics, jet, explode, armour-piercing and fast running machines. The system composing and acquired images are presented. The software for object separating, mass calculating, 3D positioning, speed determining and cavity reconstruction are described

  5. Network based multi-channel digital flash X-ray imaging system

    International Nuclear Information System (INIS)

    Wang Jingjin; Yuan Jie; Liu Yaqiang; Lin Yong; Song Zheng; Liu Keyin

    2003-01-01

    A network based multi-channel digital flash X-ray imaging system has been developed. It can be used to acquire and digitize orthogonal flash X-ray images in multi-interval, and to distribute the images on the network. There is no need of films and chemical process, no anxiety of waiting and no trouble of film archiving. This system is useful for testing ballistics, jet, explode, armour-piercing and fast running machines. The system composing and acquired images of terminal ballistics are presented. The software for object separating, profile calculating and 3D cavity reconstruction are described

  6. Gene Expression Signature in Endemic Osteoarthritis by Microarray Analysis

    Directory of Open Access Journals (Sweden)

    Xi Wang

    2015-05-01

    Full Text Available Kashin-Beck Disease (KBD is an endemic osteochondropathy with an unknown pathogenesis. Diagnosis of KBD is effective only in advanced cases, which eliminates the possibility of early treatment and leads to an inevitable exacerbation of symptoms. Therefore, we aim to identify an accurate blood-based gene signature for the detection of KBD. Previously published gene expression profile data on cartilage and peripheral blood mononuclear cells (PBMCs from adults with KBD were compared to select potential target genes. Microarray analysis was conducted to evaluate the expression of the target genes in a cohort of 100 KBD patients and 100 healthy controls. A gene expression signature was identified using a training set, which was subsequently validated using an independent test set with a minimum redundancy maximum relevance (mRMR algorithm and support vector machine (SVM algorithm. Fifty unique genes were differentially expressed between KBD patients and healthy controls. A 20-gene signature was identified that distinguished between KBD patients and controls with 90% accuracy, 85% sensitivity, and 95% specificity. This study identified a 20-gene signature that accurately distinguishes between patients with KBD and controls using peripheral blood samples. These results promote the further development of blood-based genetic biomarkers for detection of KBD.

  7. Does Participation in a Computer-Based Learning Program in Introductory Financial Accounting Course Lead to Choosing Accounting as a Major?

    Science.gov (United States)

    Owhoso, Vincent; Malgwi, Charles A.; Akpomi, Margaret

    2014-01-01

    The authors examine whether students who completed a computer-based intervention program, designed to help them develop abilities and skills in introductory accounting, later declared accounting as a major. A sample of 1,341 students participated in the study, of which 74 completed the intervention program (computer-based assisted learning [CBAL])…

  8. SIGNIFICANCE OF THE ACCOUNTING PARADIGM IN THE DECISION-MAKING PROCESS IN COMPANY MANAGEMENT (BASED ONIAS ACCOUNTING PRACTICES IN POLAND AND OTHER COUNTRIES)

    OpenAIRE

    Leszek Michalczyk

    2014-01-01

    In this article, we analyze the relations between modern trends in accounting and the decisionmaking process based on the classic profit-opportunity-cost-risk construction. In this aspect, four main types of accounting practices may be distinguished: bookkeeping (classic accounting), accounting engineering, creative accounting, and praxeological accounting. This study complements the author's series of publications on accounting engineering (which is herein defined as a concept), the structur...

  9. Topology and signatures of a model for flux transfer events based on vortex-induced reconnection

    International Nuclear Information System (INIS)

    Liu, Z.X.; Zhu, Z.W.; Li, F.; Pu, Z.Y.

    1992-01-01

    A model of the disturbed magnetic field and disturbed velocity of flux transfer events (FTEs) is deduced on the basis of the vortex-induced reconnection theory. The topology and signatures of FTEs are calculated and discussed. The authors propose that the observed forms of FTE signatures depend on the motional direction of the FTE tube, the positions of the spacecraft relative to the passing FTE tube, and which part of the FTE tube (the magnetosphere part, the magnetopause part, or the magnetosheath part) the spacecraft is passing through. It is found that when a FTE tube moves from south to north along a straight line in the northern hemisphere, positive FTEs appear for most passages; however, reverse FTEs are also observed occasionally while the signatures of B Z (B L ) appear as a single peak, and the irregular FTEs always correspond to oblique line motions of the FTE tube. The velocity signatures are similar to those of the magnetic field, but in the northern hemisphere their directions are all just opposite to the magnetic field. The calculated results for the magnetic field are compared with 61 observed FTEs. The observed signatures (B N and B L ) of 52 FTEs are consistent with the calculations. The results indicate that a majority of observed FTEs correspond to passages of spacecraft through the edges of FTE tubes

  10. A Computer-Assisted Learning Model Based on the Digital Game Exponential Reward System

    Science.gov (United States)

    Moon, Man-Ki; Jahng, Surng-Gahb; Kim, Tae-Yong

    2011-01-01

    The aim of this research was to construct a motivational model which would stimulate voluntary and proactive learning using digital game methods offering players more freedom and control. The theoretical framework of this research lays the foundation for a pedagogical learning model based on digital games. We analyzed the game reward system, which…

  11. The effects of extrinsic motivation on signature authorship opinions in forensic signature blind trials.

    Science.gov (United States)

    Dewhurst, Tahnee N; Found, Bryan; Ballantyne, Kaye N; Rogers, Doug

    2014-03-01

    Expertise studies in forensic handwriting examination involve comparisons of Forensic Handwriting Examiners' (FHEs) opinions with lay-persons on blind tests. All published studies of this type have reported real and demonstrable skill differences between the specialist and lay groups. However, critics have proposed that any difference shown may be indicative of a lack of motivation on the part of lay participants, rather than a real difference in skill. It has been suggested that qualified FHEs would be inherently more motivated to succeed in blinded validation trials, as their professional reputations could be at risk, should they perform poorly on the task provided. Furthermore, critics suggest that lay-persons would be unlikely to be highly motivated to succeed, as they would have no fear of negative consequences should they perform badly. In an effort to investigate this concern, a blind signature trial was designed and administered to forty lay-persons. Participants were required to compare known (exemplar) signatures of an individual to questioned signatures and asked to express an opinion regarding whether the writer of the known signatures wrote each of the questioned signatures. The questioned signatures comprised a mixture of genuine, disguised and simulated signatures. The forty participants were divided into two separate groupings. Group 'A' were requested to complete the trial as directed and were advised that for each correct answer they would be financially rewarded, for each incorrect answer they would be financially penalized, and for each inconclusive opinion they would receive neither penalty nor reward. Group 'B' was requested to complete the trial as directed, with no mention of financial recompense or penalty. The results of this study do not support the proposition that motivation rather than skill difference is the source of the statistical difference in opinions between individuals' results in blinded signature proficiency trials. Crown

  12. Handwritten Digit Recognition using Edit Distance-Based KNN

    OpenAIRE

    Bernard , Marc; Fromont , Elisa; Habrard , Amaury; Sebban , Marc

    2012-01-01

    We discuss the student project given for the last 5 years to the 1st year Master Students which follow the Machine Learning lecture at the University Jean Monnet in Saint Etienne, France. The goal of this project is to develop a GUI that can recognize digits and/or letters drawn manually. The system is based on a string representation of the dig- its using Freeman codes and on the use of an edit-distance-based K-Nearest Neighbors classifier. In addition to the machine learning knowledge about...

  13. Digital imaging in dentistry.

    Science.gov (United States)

    Essen, S Donovan

    2011-01-01

    Information technology is vital to operations, marketing, accounting, finance and administration. One of the most exciting and quickly evolving technologies in the modern dental office is digital applications. The dentist is often the business manager, information technology officer and strategic planning chief for his small business. The information systems triangle applies directly to this critical manager supported by properly trained ancillary staff and good equipment. With emerging technology driving all medical disciplines and the rapid pace at which it emerges, it is vital for the contemporary practitioner to keep abreast of the newest information technology developments. This article compares the strategic and operational advantages of digital applications, specifically imaging. The focus of this paper will be on digital radiography (DR), 3D computerized tomography, digital photography and digitally-driven CAD/CAM to what are now considered obsolescing modalities and contemplates what may arrive in the future. It is the purpose of this essay to succinctly evaluate the decisions involved in the role, application and implications of employing this tool in the dental environment

  14. Exotic signatures from supersymmetry

    International Nuclear Information System (INIS)

    Hall, L.J.

    1989-08-01

    Minor changes to the standard supersymmetric model, such as soft flavor violation and R parity violation, cause large changes in the signatures. The origin of these changes and the resulting signatures are discussed. 15 refs., 7 figs., 2 tabs

  15. Digital Preservation of Photojournalism Case Study of the Kompas Daily

    Directory of Open Access Journals (Sweden)

    Sintha Ratnawati

    2018-01-01

    Full Text Available Newspapers present information to the public on various topics, such as politics, economics, culture, and sports. Through its preaching, newspapers report a number of valuable events as historical records. Photos, complementing the news, come with a visual approach. Based on the rules of journalism, the photo meets the qualification as a reference source. Kompas Daily, published since June 28, 1965, immortalize various milestones in the work of photographs, stored in printed format, positive and negative, and digitized. Digitization becomes the preferred way to perpetuate the value contained in the printed photo work. Digitization is done for positive and negative photos taking into account the weight of journalism and the condition of the material. This activity is handled by Kompas Information Center through the process of media transfer, indexing, and synchronization. Two important issues to ensure optimization of the digitization result are metadata standardization and an integrated retrieval system. Metadata standardization is formulated based on guidelines developed specifically for the publishing industry, the IIM standard, combined with subject category modifications known as IPTC NewsCodes. Integrated retrieval systems are built to include the completeness of the source information of the publication as enrichment. This system connects to the full data of photo creation, storage procedure, and the mechanism of retrieval. The Information Lifecycle concept offers one more link, the utilization of digitization results to create new information.

  16. DIGITAL ONCOLOGY PATIENT RECORD - HETEROGENEOUS FILE BASED APPROACH

    Directory of Open Access Journals (Sweden)

    Nikolay Sapundzhiev

    2010-12-01

    Full Text Available Introduction: Oncology patients need extensive follow-up and meticulous documentation. The aim of this study was to introduce a simple, platform independent file based system for documentation of diagnostic and therapeutic procedures in oncology patients and test its function.Material and methods: A file-name based system of the type M1M2M3.F2 was introduced, where M1 is a unique identifier for the patient, M2 is the date of the clinical intervention/event, M3 is an identifier for the author of the medical record and F2 is the specific software generated file-name extension.Results: This system is in use at 5 institutions, where a total of 11 persons on 14 different workstations inputted 16591 entries (files for 2370. The merge process was tested on 2 operating systems - when copied together all files sort up as expected by patient, and for each patient in a chronological order, providing a digital cumulative patient record, which contains heterogeneous file formats.Conclusion: The file based approach for storing heterogeneous digital patient related information is an reliable system, which can handle open-source, proprietary, general and custom file formats and seems to be easily scalable. Further development of software for automatic checks of the integrity and searching and indexing of the files is expected to produce a more user-friendly environment

  17. Digital optical feeder links system for broadband geostationary satellite

    Science.gov (United States)

    Poulenard, Sylvain; Mège, Alexandre; Fuchs, Christian; Perlot, Nicolas; Riedi, Jerome; Perdigues, Josep

    2017-02-01

    An optical link based on a multiplex of wavelengths at 1.55μm is foreseen to be a valuable solution for the feeder link of the next generation of high-throughput geostationary satellite. The main satellite operator specifications for such link are an availability of 99.9% over the year, a capacity around 500Gbit/s and to be bent-pipe. Optical ground station networks connected to Terabit/s terrestrial fibers are proposed. The availability of the optical feeder link is simulated over 5 years based on a state-of-the-art cloud mask data bank and an atmospheric turbulence strength model. Yearly and seasonal optical feeder link availabilities are derived and discussed. On-ground and on-board terminals are designed to be compliant with 10Gbit/s per optical channel data rate taking into account adaptive optic systems to mitigate the impact of atmospheric turbulences on single-mode optical fiber receivers. The forward and return transmission chains, concept and implementation, are described. These are based on a digital transparent on-off keying optical link with digitalization of the DVB-S2 and DVB-RCS signals prior to the transmission, and a forward error correcting code. In addition, the satellite architecture is described taking into account optical and radiofrequency payloads as well as their interfaces.

  18. Un système de vérification de signature manuscrite en ligne basé ...

    African Journals Online (AJOL)

    Administrateur

    systems. The problem of cursive handwritten signatures verification can be approached on two main approaches one probabilistic. (analytical) and another structural. So, two methodologies ... do the classification is presented in [11].The online signature ..... Automatic on-line signature verification based on multiple models ...

  19. PERSEPSI GURU TENTANG DIGITAL NATIVES, SUMBER BELAJAR DIGITAL DAN MOTIVASI MEMANFAATKAN SUMBER BELAJAR DIGITAL

    Directory of Open Access Journals (Sweden)

    Ferdinandus Bate Dopo

    2016-06-01

    TEACHER’S PERCEPTION OF DIGITAL NATIVES, DIGITAL LEARNING RESOURCES AND MOTIVATION TO UTILIZE DIGITAL LEARNING RESOURCES Abstract This study aims to reveal (1 the influence of teacher's perception of digital natives toward teacher’s motivation to utilize digital learning resources. (2 the influence of teacher's perception of digital learning resources toward teacher’s motivation to utilize digital learning resources and (3 the influence both of teacher's perception of digital natives and digital learning resources toward teacher’s motivation to utilize digital learning resources. This study used the descriptive-correlational quantitative approach. The Population and sample were high school teachers of Regina Pacis Bajawa, SMA Seminari Mataloko and SMA Negeri 1 Golewa. Sampling technique in this research was proportional random sampling. A questionnaire was used to obtain the data. The data were analyzed using the Likert scale. The instrument was developed based on lattice theory of assessment instruments relevant to the study variables. The analysis technique used is a regression followed by statistic technique of t test and F test with the significance level of 0.05. The results are as follows. (1 There is a positive and significant influence of teacher's perception of digital natives toward teacher’s motivation to utilize digital learning resources. (2 There is a positive and significant influence of teacher's perception of digital learning resources and teacher’s motivation to utilize digital learning resources. (3 There is a positive and significant influence both of teacher's perception of digital learning resources and teacher’s motivation to utilize digital learning resources. Keywords: perception, digital natives, digital learning resources, motivation

  20. DrugSig: A resource for computational drug repositioning utilizing gene expression signatures.

    Directory of Open Access Journals (Sweden)

    Hongyu Wu

    Full Text Available Computational drug repositioning has been proved as an effective approach to develop new drug uses. However, currently existing strategies strongly rely on drug response gene signatures which scattered in separated or individual experimental data, and resulted in low efficient outputs. So, a fully drug response gene signatures database will be very helpful to these methods. We collected drug response microarray data and annotated related drug and targets information from public databases and scientific literature. By selecting top 500 up-regulated and down-regulated genes as drug signatures, we manually established the DrugSig database. Currently DrugSig contains more than 1300 drugs, 7000 microarray and 800 targets. Moreover, we developed the signature based and target based functions to aid drug repositioning. The constructed database can serve as a resource to quicken computational drug repositioning. Database URL: http://biotechlab.fudan.edu.cn/database/drugsig/.