WorldWideScience

Sample records for electronic signature user

  1. ELECTRONIC SIGNATURES

    African Journals Online (AJOL)

    10332324

    (a) facilitate ecommerce;2. (b) remove and prevent barriers to electronic communications in South Africa;3. (c) ensure that electronic transactions in the Republic conform to the highest international standards;4. (d) promote the development of electronic transactions services which are responsive to the needs of users and ...

  2. Electronic Signature (eSig)

    Data.gov (United States)

    Department of Veterans Affairs — Beginning with the Government Paperwork Elimination Act of 1998 (GPEA), the Federal government has encouraged the use of electronic / digital signatures to enable...

  3. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  4. Electronic health records: what does your signature signify?

    Directory of Open Access Journals (Sweden)

    Victoroff MD Michael S

    2012-08-01

    Full Text Available Abstract Electronic health records serve multiple purposes, including clinical communication, legal documentation, financial transaction capture, research and analytics. Electronic signatures attached to entries in EHRs have different logical and legal meanings for different users. Some of these are vestiges from historic paper formats that require reconsideration. Traditionally accepted functions of signatures, such as identity verification, attestation, consent, authorization and non-repudiation can become ambiguous in the context of computer-assisted workflow processes that incorporate functions like logins, auto-fill and audit trails. This article exposes the incompatibility of expectations among typical users of electronically signed information.

  5. Blind Signatures in Electronic Voting Systems

    Science.gov (United States)

    Kucharczyk, Marcin

    Electronic voting systems are created to facilitate the election, accelerate voting and counting votes and increase turnout for the election. The main problems of the electronic systems are related with the assurance of system security (cryptographic security and protection against frauds) and a guarantee that the voters are anonymous. The authorization of voters and the anonymity of them seem to be contradictory, but it is possible to create such a system where the both requirements are met. Some solutions, the most common e-voting systems, are presented in the paper. These models are adjusted to the demands and implemented in the polls system for quality of teaching evaluation where anonymity is very important. The blind signature protocol, model directed to user's anonymity, is a very good solution of the authorization and anonymity problem in the polls system with remote access only, as it was described in the paper.

  6. Electronic Commerce user manual

    Energy Technology Data Exchange (ETDEWEB)

    1992-04-10

    This User Manual supports the Electronic Commerce Standard System. The Electronic Commerce Standard System is being developed for the Department of Defense of the Technology Information Systems Program at the Lawrence Livermore National Laboratory, operated by the University of California for the Department of Energy. The Electronic Commerce Standard System, or EC as it is known, provides the capability for organizations to conduct business electronically instead of through paper transactions. Electronic Commerce and Computer Aided Acquisition and Logistics Support, are two major projects under the DoD`s Corporate Information Management program, whose objective is to make DoD business transactions faster and less costly by using computer networks instead of paper forms and postage. EC runs on computers that use the UNIX operating system and provides a standard set of applications and tools that are bound together by a common command and menu system. These applications and tools may vary according to the requirements of the customer or location and may be customized to meet the specific needs of an organization. Local applications can be integrated into the menu system under the Special Databases & Applications option on the EC main menu. These local applications will be documented in the appendices of this manual. This integration capability provides users with a common environment of standard and customized applications.

  7. Electronic Commerce user manual

    Energy Technology Data Exchange (ETDEWEB)

    1992-04-10

    This User Manual supports the Electronic Commerce Standard System. The Electronic Commerce Standard System is being developed for the Department of Defense of the Technology Information Systems Program at the Lawrence Livermore National Laboratory, operated by the University of California for the Department of Energy. The Electronic Commerce Standard System, or EC as it is known, provides the capability for organizations to conduct business electronically instead of through paper transactions. Electronic Commerce and Computer Aided Acquisition and Logistics Support, are two major projects under the DoD's Corporate Information Management program, whose objective is to make DoD business transactions faster and less costly by using computer networks instead of paper forms and postage. EC runs on computers that use the UNIX operating system and provides a standard set of applications and tools that are bound together by a common command and menu system. These applications and tools may vary according to the requirements of the customer or location and may be customized to meet the specific needs of an organization. Local applications can be integrated into the menu system under the Special Databases Applications option on the EC main menu. These local applications will be documented in the appendices of this manual. This integration capability provides users with a common environment of standard and customized applications.

  8. Tokenless Biometric Electronic Transactions Using an Audio Signature to Identify the Transaction Processor

    National Research Council Canada - National Science Library

    Hoffman, Ned

    2002-01-01

    ... for conducting an electronic transaction by the user. A stored audio signature is associated with a transaction processor entity, which the transaction processor entity is responsible for conducting the electronic transaction...

  9. Impact of Electronic Signatures and Time Stamping for the Protection of Electronic Agreements

    Directory of Open Access Journals (Sweden)

    Tadas Limba

    2012-12-01

    Full Text Available The article e495 valuates the impact of e-signatures and time stamping on electronic contracts and electronic documents for performing e-business opportunities and goals, and analyses e-signature application for business cases. Various electronic services, virtual shopping, electronic cash transactions are becoming increasingly popular as they allow users to quickly perform different actions, operations and functions. It is important not only for convenience, but also to ensure consumer data security and reliability. Security reasons are not enough for security transmitted data, since this method does not allow clarification of information about sender identity.Use of electronic signatures, electronic identities, checgs and ensures a very high level of data security in interchange data processes. E-signature allows e-business companies to transfer the company’s operation business processes and their application to the organization and management in the electronic environment, also automate internal and external compans processes, includinggon-going business processes.The object of paper is .-signature and time stamping application in the theoretical and practical way.The goal of this paper while evaluating and estimating the .-signature and time stamping application, i’s regulation and legal implementation worldwidesand in Lithuania—is to provideluseful recommendations for more efficient impact developing -commerce and -business in situations when -signature and time stamping is used for ensuring electronic contracs security.

  10. Impact of Electronic Signatures and Time Stamping for the Protection of Electronic Agreements

    Directory of Open Access Journals (Sweden)

    Tadas Limba

    2013-02-01

    Full Text Available The article e495 valuates the impact of e-signatures and time stamping on electronic contracts and electronic documents for performing e-business opportunities and goals, and analyses e-signature application for business cases. Various electronic services, virtual shopping, electronic cash transactions are becoming increasingly popular as they allow users to quickly perform different actions, operations and functions. It is important not only for convenience, but also to ensure consumer data security and reliability. Security reasons are not enough for security transmitted data, since this method does not allow clarification of information about sender identity. Use of electronic signatures, electronic identities, checgs and ensures a very high level of data security in interchange data processes. E-signature allows e-business companies to transfer the company’s operation business processes and their application to the organization and management in the electronic environment, also automate internal and external compans processes, includinggon-going business processes. The object of paper is .-signature and time stamping application in the theoretical and practical way. The goal of this paper while evaluating and estimating the .-signature and time stamping application, i’s regulation and legal implementation worldwidesand in Lithuania—is to provideluseful recommendations for more efficient impact developing -commerce and -business in situations when -signature and time stamping is used for ensuring electronic contracs security.

  11. Electronic Signatures: They're Legal, Now What?

    Science.gov (United States)

    Broderick, Martha A.; Gibson, Virginia R.; Tarasewich, Peter

    2001-01-01

    In the United States, electronic signatures recently became as legally binding as printed signatures. Reviews the status of electronic signatures in the United States, and compares it to work done by the United Nations. Summarizes the technology that can be used to implement electronic signatures. Discusses problems and open issues surrounding the…

  12. 76 FR 411 - Regulatory Guidance Concerning Electronic Signatures and Documents

    Science.gov (United States)

    2011-01-04

    ... information regarding FMCSA's acceptance of electronic signature on documents required by the Federal Motor... govern the Agency's implementation of electronic document and signature requirements. The Government... traditional paper or electronic form: (a) Contracts, (b) signatures, and (c) other legally-required documents...

  13. The electronic identification, signature and security of information systems

    Directory of Open Access Journals (Sweden)

    Horovèák Pavel

    2002-12-01

    Full Text Available The contribution deals with the actual methods and technologies of information and communication systems security. It introduces the overview of electronic identification elements such as static password, dynamic password and single sign-on. Into this category belong also biometric and dynamic characteristics of verified person. Widespread is authentication based on identification elements ownership, such as various cards and authentication calculators. In the next part is specified a definition and characterization of electronic signature, its basic functions and certificate categories. Practical utilization of electronic signature consists of electronic signature acquirement, signature of outgoing email message, receiving of electronic signature and verification of electronic signature. The use of electronic signature is continuously growing and in connection with legislation development it exercises in all resorts.

  14. Records Management Guidance for Agencies Implementing Electronic Signature Technologies

    National Research Council Canada - National Science Library

    2000-01-01

    The Government Paperwork Elimination Act (GPEA, P.L. 105-277) requires that, when practicable, Federal agencies use electronic forms, electronic filing, and electronic signatures to conduct official business with the public by 2003...

  15. Electronic signature for medical documents--integration and evaluation of a public key infrastructure in hospitals.

    Science.gov (United States)

    Brandner, R; van der Haak, M; Hartmann, M; Haux, R; Schmücker, P

    2002-01-01

    Our objectives were to determine the user-oriented and legal requirements for a Public Key Infrastructure (PKI) for electronic signatures for medical documents, and to translate these requirements into a general model for a signature system. A prototype of this model was then implemented and evaluated in clinical routine use. Analyses of documents, processes, interviews, observations, and of the available literature supplied the foundations for the development of the signature system model. Eight participants of the Department of Dermatology of the Heidelberg University Medical Center evaluated the implemented prototype from December 2000 to January 2001, during the course of an intervention study. By means of questionnaires, interviews, observations and database analyses, the usefulness and user acceptance of the electronic signature and its integration into electronic discharge letters were established. Since the major part of medical documents generated in a hospital are signature-relevant, they will require electronic signatures in the future. A PKI must meet the multitude of responsibilities and security needs required in a hospital. Also, the signature functionality must be integrated directly into the workflow surrounding document creation. A developed signature model, fulfilling user-oriented and legal requirements, was implemented using hard and software components that conform to the German Signature Law. It was integrated into the existing hospital information system of the Heidelberg University Medical Center. At the end of the intervention study, the average acceptance scores achieved were mean = 3.90; SD = 0.42 on a scale of 1 (very negative attitude) to 5 (very positive attitude) for the electronic signature procedure. Acceptance of the integration into computer-supported discharge letter writing reached mean = 3.91; SD = 0.47. On average, the discharge letters were completed 7.18 days earlier. The electronic signature is indispensable for the

  16. Electronic signatures and their specificity in national and European regulations

    Directory of Open Access Journals (Sweden)

    R. MATEFI

    2017-07-01

    Full Text Available The paper aims to emphasize the particularities of the electronic signature by reference to the national as well as to the European legislation, trying to point out its utility in the business environment as well as the controversies in this matter. The starting point of this analysis was the Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures, which establishes the legal framework for electronic signatures and the recognition of certification-service providers. Its main aim was to ease its use and help it become legally recognized within all EU countries.

  17. Electronic Signatures in Global and National Commerce Act. Public Law.

    Science.gov (United States)

    Congress of the U.S., Washington, DC.

    This document presents the text of Public Law 106-229, the "Electronic Signatures in Global and National Commerce Act." The act states that, with respect to any transaction in or affecting interstate or foreign commerce: a signature, contract, or other record relating to such transaction may not be denied legal effect, validity, or…

  18. Electronic Reporting and Signature under EPCRA Section 312

    Science.gov (United States)

    This memorandum provides guidance for State Emergency Response Commissions, Tribal Emergency Response Commissions, and local governments regarding electronic reporting and signature under the Emergency Planning and Community Right-to-Know Act.

  19. Fiddling with the ECT act – Electronic signatures | Eiselen ...

    African Journals Online (AJOL)

    Amongst the changes the Department of Trade and Industry is considering is an amendment of the definition of "electronic signature". Although the amendment seems to be in line with the provisions of the UNCITRAL Model Laws on eCommerce and the 2005 UN Convention on the Use of Electronic Communications in ...

  20. An r-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users

    Directory of Open Access Journals (Sweden)

    Keita Emura

    2014-01-01

    Full Text Available If there are many displaced workers in a company, then a person who goes for job hunting might not select this company. That is, the number of members who quit is quite negative information. Similarly, in revocable group signature schemes, if one knows (or guesses the number of revoked users (say r, then one may guess the reason behind such circumstances, and it may lead to harmful rumors. However, no previous revocation procedure can achieve hiding r. In this paper, we propose the first revocable group signature scheme, where r is kept hidden, which we call r-hiding revocable group signature. To handle this property, we newly define the security notion called anonymity with respect to the revocation which guarantees the unlinkability of revoked users.

  1. National Center for Electron Microscopy users' guide

    International Nuclear Information System (INIS)

    1987-01-01

    The National Center for Electron Microscopy (NCEM) in the Materials and Molecular Research Division of the Lawrence Berkeley Laboratory is a high voltage electron microscope facility for ultra-high resolution or dynamic in-situ studies. This guide describes the instruments and their specifications, support instrumentation, and user policies. Advice as to travel and accommodations is provided in the guide. (FI)

  2. Direction, Function, and Signature in Electronic Mail.

    Science.gov (United States)

    Sherblom, John

    1988-01-01

    Presents a content analysis performed on 157 electronic mail files received over the course of several months by a middle level manager in a computer services department of a large organization. Suggests that computer mediated communication changes communication function and context in certain specific ways, which are reflected throughout the…

  3. 17 CFR 1.4 - Use of electronic signatures.

    Science.gov (United States)

    2010-04-01

    ... REGULATIONS UNDER THE COMMODITY EXCHANGE ACT Definitions § 1.4 Use of electronic signatures. For purposes of... that requires a document to be signed by a customer of a futures commission merchant or introducing... by the customer, participant or client will be sufficient, if the futures commission merchant...

  4. Fiddling With the ECT Act – Electronic Signatures

    Directory of Open Access Journals (Sweden)

    Sieg Eiselen

    2014-12-01

    Full Text Available Amongst the changes the Department of Trade and Industry is considering is an amendment of the definition of "electronic signature". Although the amendment seems to be in line with the provisions of the UNCITRAL Model Laws on eCommerce and the 2005 UN Convention on the Use of Electronic Communications in International Contracts, the amendment sets additional and more onerous requirements for all electronic signatures. The note illustrates how this amendment undermines the key principles of functional equivalence, media neutrality and party autonomy, and how this innocuous looking amendment may have very harmful practical consequences. It is suggested that amendments to section 13 would be more appropriate to achieve the objectives of the legislature.

  5. User Interface of MUDR Electronic Health Record

    Czech Academy of Sciences Publication Activity Database

    Hanzlíček, Petr; Špidlen, Josef; Heroutová, Helena; Nagy, Miroslav

    2005-01-01

    Roč. 74, - (2005), s. 221-227 ISSN 1386-5056 R&D Projects : GA MŠk LN00B107 Institutional research plan: CEZ:AV0Z10300504 Keywords : electronic health record * user interface * data entry * knowledge base Subject RIV: BB - Applied Statistics, Operational Research Impact factor: 1.374, year: 2005

  6. Feedback from Users of Electronic Chart Technology

    Science.gov (United States)

    Edmonds, David

    This paper was presented at the Third Electronic Chart Technology Conference, SASMEX International, Brighton, 22-23 April 1998.Electronic Chart Systems have been used by mariners across the entire user spectrum without official standards or specifications for 10 years. In the last three years, the debate has centred on chart data and the merits of differing cartographic technologies. There is little new that can be said for or against raster or vector technologies except what actual users might say to support the requirements of their day-to-day operations. Today, we approach a new stage as ENCs start to become available but only for limited areas. This in turn means that ENCs are capable of supporting the only approved electronic chart system, ECDIS, in a limited way. There is an urgent need for alternatives to ECDIS to cover those areas where ENCs will continue to be unavailable for the foreseeable future. This paper therefore summarizes a feedback from users of RCDS and ECDIS-type systems to demonstrate the benefits which can be secured from official recognition of RCDS systems as the legal equivalent of paper chart navigation.

  7. Electronic Library of Embrapa Cerrados: user study

    Directory of Open Access Journals (Sweden)

    Maria Elisabeth Salviati

    2015-09-01

    Full Text Available Introduction: This paper presents the results of research conducted with Electronic Library users – website, created in 2004 by Embrapa Cerrados, that organizes, stores, and provides full text of the technical scientific production published by the Institution. Objective: To explore the user profile and to make an accurate assessment of the website. Methodology: Data collection of demographic aspects; habits; and search features: navigation, loading time of pages, help, layout and terminology by an online survey. Analysis by SPSS software - Statistical Package for the Social Sciences. Results: The main users are students and agronomists, young people up to 30 years old, coming from the Federal District, belonging to universities and high schools wishing to update knowledge. After, appear the users of public agencies; private companies; Embrapa; agribusiness; federal government; schools; associations and non-governmental organizations; rural extension; cooperatives and syndicates. These users have no difficulties to use the service. Conclusions: The service works well, but some suggestions are useful to improve it. In addition, little demand coming from farms, ranches, rural extension services, cooperatives and syndicates indicates the need to design new products and services oriented to such public.

  8. Examining Authenticity: An Initial Exploration of the Suitability of Handwritten Electronic Signatures.

    Science.gov (United States)

    Heckeroth, J; Boywitt, C D

    2017-06-01

    Considering the increasing relevance of handwritten electronically captured signatures, we evaluated the ability of forensic handwriting examiners (FHEs) to distinguish between authentic and simulated electronic signatures. Sixty-six professional FHEs examined the authenticity of electronic signatures captured with software by signotec on a smartphone Galaxy Note 4 by Samsung and signatures made with a ballpoint pen on paper (conventional signatures). In addition, we experimentally varied the name ("J. König" vs. "A. Zaiser") and the status (authentic vs. simulated) of the signatures in question. FHEs' conclusions about the authenticity did not show a statistically significant general difference between electronic and conventional signatures. Furthermore, no significant discrepancies between electronic and conventional signatures were found with regard to other important aspects of the authenticity examination such as questioned signatures' graphic information content, the suitability of the provided sample signatures, the necessity of further examinations and the levels of difficulty of the cases under examination. Thus, this study did not reveal any indications that electronic signatures captured with software by signotec on a Galaxy Note 4 are less well suited than conventional signatures for the examination of authenticity, precluding potential technical problems concerning the integrity of electronic signatures. Copyright © 2017 Elsevier B.V. All rights reserved.

  9. 78 FR 39200 - Authentication of Electronic Signatures on Electronically Filed Statements of Account

    Science.gov (United States)

    2013-07-01

    ... LIBRARY OF CONGRESS Copyright Office 37 CFR Part 201 [Docket No. 2013-5] Authentication of Electronic Signatures on Electronically Filed Statements of Account AGENCY: U.S. Copyright Office, Library of Congress. ACTION: Notice of proposed rulemaking; correction. SUMMARY: The U.S. Copyright Office published a...

  10. Awareness and use of electronic databases by public library users ...

    African Journals Online (AJOL)

    The study investigated awareness, access and use of electronic database by public library users in Ibadan Oyo State in Nigeria. The purpose of this study was to determine awareness of public library users' electronic databases, find out what these users used electronic databases to do and to identify problems associated ...

  11. ANALYSIS OF DIGITAL SIGNATURE RULE IN THE ELECTRONIC COMMERCE LAW OF INDONESIA

    Directory of Open Access Journals (Sweden)

    Irna Nurhayati

    2015-02-01

    Full Text Available The Indonesian legislature has enacted the Information and Electronic Transaction Bill (the Bill in 2003, in which digital signature as a technology specific electronic (e commerce has been promoted. The promotion of digital signature is still problematic, since there is an uncertainty whether Indonesia can develop well a required viable technology of digital signature. Moreover, there is a gap between the actual use of digital signature and the projections of future utilization of digital signature by interested parties on e-commerce. This paper will discuss the reason of the Indonesian legislature promotes digital signature. It will then analyse the gap between the actual use of digital signature and the projections of future utilization of digital signature by interested parties on e-commerce. This paper will finally argue whether the promotion of digital signature of the Bill is useful for the growth of e-commerce in Indonesia.

  12. Electronic cigarettes: a survey of users

    Directory of Open Access Journals (Sweden)

    Etter Jean-François

    2010-05-01

    Full Text Available Abstract Background Little is known about users of electronic cigarettes, or their opinions, satisfaction or how and why they use such products. Methods An internet survey of 81 ever-users of ecigarettes in 2009. Participants answered open-ended questions on use of, and opinions about, ecigarettes. Results Respondents (73 current and 8 former users lived in France, Canada, Belgium or Switzerland. Most respondents (77% were men; 63% were former smokers and 37% were current smokers. They had used e-cigarettes for 100 days (median and drew 175 puffs per day (median. Participants used the ecigarette either to quit smoking (53 comments, to reduce their cigarette consumption (14 comments, in order not to disturb other people with smoke (20 comments, or in smoke-free places (21 comments. Positive effects reported with ecigarettes included their usefulness to quit smoking, and the benefits of abstinence from smoking (less coughing, improved breathing, better physical fitness. Respondents also enjoyed the flavour of ecigarettes and the sensation of inhalation. Side effects included dryness of the mouth and throat. Respondents complained about the frequent technical failures of ecigarettes and had some concerns about the possible toxicity of the devices and about their future legal status. Conclusions Ecigarettes were used mainly to quit smoking, and may be helpful for this purpose, but several respondents were concerned about potential toxicity. There are very few published studies on ecigarettes and research is urgently required, particularly on the efficacy and toxicity of these devices.

  13. Integrating iris and signature traits for personal authentication using user-specific weighting.

    Science.gov (United States)

    Viriri, Serestina; Tapamo, Jules R

    2012-01-01

    Biometric systems based on uni-modal traits are characterized by noisy sensor data, restricted degrees of freedom, non-universality and are susceptible to spoof attacks. Multi-modal biometric systems seek to alleviate some of these drawbacks by providing multiple evidences of the same identity. In this paper, a user-score-based weighting technique for integrating the iris and signature traits is presented. This user-specific weighting technique has proved to be an efficient and effective fusion scheme which increases the authentication accuracy rate of multi-modal biometric systems. The weights are used to indicate the importance of matching scores output by each biometrics trait. The experimental results show that our biometric system based on the integration of iris and signature traits achieve a false rejection rate (FRR) of 0.08% and a false acceptance rate (FAR) of 0.01%.

  14. Integrating Iris and Signature Traits for Personal Authentication Using User-SpecificWeighting

    Directory of Open Access Journals (Sweden)

    Serestina Viriri

    2012-03-01

    Full Text Available Biometric systems based on uni-modal traits are characterized by noisy sensor data, restricted degrees of freedom, non-universality and are susceptible to spoof attacks. Multi-modal biometric systems seek to alleviate some of these drawbacks by providing multiple evidences of the same identity. In this paper, a user-score-based weighting technique for integrating the iris and signature traits is presented. This user-specific weighting technique has proved to be an efficient and effective fusion scheme which increases the authentication accuracy rate of multi-modal biometric systems. The weights are used to indicate the importance of matching scores output by each biometrics trait. The experimental results show that our biometric system based on the integration of iris and signature traits achieve a false rejection rate (FRR of 0.08% and a false acceptance rate (FAR of 0.01%.

  15. Signature properties of water: Their molecular electronic origins.

    Science.gov (United States)

    Sokhan, Vlad P; Jones, Andrew P; Cipcigan, Flaviu S; Crain, Jason; Martyna, Glenn J

    2015-05-19

    Water challenges our fundamental understanding of emergent materials properties from a molecular perspective. It exhibits a uniquely rich phenomenology including dramatic variations in behavior over the wide temperature range of the liquid into water's crystalline phases and amorphous states. We show that many-body responses arising from water's electronic structure are essential mechanisms harnessed by the molecule to encode for the distinguishing features of its condensed states. We treat the complete set of these many-body responses nonperturbatively within a coarse-grained electronic structure derived exclusively from single-molecule properties. Such a "strong coupling" approach generates interaction terms of all symmetries to all orders, thereby enabling unique transferability to diverse local environments such as those encountered along the coexistence curve. The symmetries of local motifs that can potentially emerge are not known a priori. Consequently, electronic responses unfiltered by artificial truncation are then required to embody the terms that tip the balance to the correct set of structures. Therefore, our fully responsive molecular model produces, a simple, accurate, and intuitive picture of water's complexity and its molecular origin, predicting water's signature physical properties from ice, through liquid-vapor coexistence, to the critical point.

  16. Electronic data management for the Hemochron Jr. Signature coagulation analyzer.

    Science.gov (United States)

    Searles, Bruce; Nasrallah, Fadi; Graham, Susan; Tozer, Michelle

    2002-09-01

    Point-of-care testing (POC, POCT) laboratory devices are being introduced into operating suites and critical care units in ever increasing numbers. The small, portable devices have gained in popularity because of their ease of use and the rapid availability of test results. POCT is an integral part of extracorporeal technology (ECT). A challenge associated with the growth of POC technology is related to management of the data generated by these devices. In the field of ECT, storing, retrieving, analyzing, viewing and charting quality control (QC) and patient test data generated with POC coagulation instruments is essential. We evaluated a premarket version of data management software developed for the Hemochron Jr. Signature coagulation analyzer, a PC-based software capable of fulfilling our objective. A database comprised of greater than 50 plasma and electronic QC results and greater than 140 patient sample results for ACT, PT, and aPTT tests was transferred from a Hemochron Jr. Signature device to two different PCs, each equipped with Hemochron ReportMaker software supplied by the manufacturer. Data files were transferred directly from the coagulation test unit to the PCs via an RS-232 cable. A variety of charts, reports, and file listings were created from the datasets using the software menus. Transfer of the complete database required less than 5 min. The relative speed and simplicity of the data interface promotes frequent charting of QC data, permitting real-time monitoring and early identification of data trends or values requiring intervention. If a subset of QC data is found to be incomplete, altered, or unacceptable, all patient samples tested during that period can be promptly identified. The software also includes data query tools useful for sorting and selecting specific subsets of patient and QC data. Electronic data management can facilitate compliance with quality control requirements and assist clinicians and laboratory personnel in the

  17. Users satisfaction with electronic information resources and services ...

    African Journals Online (AJOL)

    Users satisfaction with electronic information resources and services in A.B.U & UNIBEN MTN Net Libraries. ... Lastly, management of the MTN Net Libraries should conduct user studies annually in order to have feedback from users on how well the library is meeting their information needs. The results of the survey should ...

  18. The Changing Information Needs of Users in Electronic Information Environments.

    Science.gov (United States)

    Kebede, Gashaw

    2002-01-01

    Focuses on the information needs of users that are changing as a results of changes in the availability of information content in electronic form. Highlights the trend and nature of the physical form in which information content is currently being made available for users' access and use in electronic information environments. (Author/LRW)

  19. Users' Personal Conceptions of Usability and User Experience of Electronic and Software Products

    NARCIS (Netherlands)

    Haaksma, Tim R.; de Jong, Menno D.T.; Karreman, Joyce

    2018-01-01

    Research problem: Despite the abundance of research into usability and user experience (UX), there is still debate about the relationship between both concepts. The user perspective is underrepresented in all discussions. This study examines the personal conceptions that users of electronic and

  20. Identifying phenotypic signatures of neuropsychiatric disorders from electronic medical records.

    Science.gov (United States)

    Lyalina, Svetlana; Percha, Bethany; LePendu, Paea; Iyer, Srinivasan V; Altman, Russ B; Shah, Nigam H

    2013-12-01

    Mental illness is the leading cause of disability in the USA, but boundaries between different mental illnesses are notoriously difficult to define. Electronic medical records (EMRs) have recently emerged as a powerful new source of information for defining the phenotypic signatures of specific diseases. We investigated how EMR-based text mining and statistical analysis could elucidate the phenotypic boundaries of three important neuropsychiatric illnesses-autism, bipolar disorder, and schizophrenia. We analyzed the medical records of over 7000 patients at two facilities using an automated text-processing pipeline to annotate the clinical notes with Unified Medical Language System codes and then searching for enriched codes, and associations among codes, that were representative of the three disorders. We used dimensionality-reduction techniques on individual patient records to understand individual-level phenotypic variation within each disorder, as well as the degree of overlap among disorders. We demonstrate that automated EMR mining can be used to extract relevant drugs and phenotypes associated with neuropsychiatric disorders and characteristic patterns of associations among them. Patient-level analyses suggest a clear separation between autism and the other disorders, while revealing significant overlap between schizophrenia and bipolar disorder. They also enable localization of individual patients within the phenotypic 'landscape' of each disorder. Because EMRs reflect the realities of patient care rather than idealized conceptualizations of disease states, we argue that automated EMR mining can help define the boundaries between different mental illnesses, facilitate cohort building for clinical and genomic studies, and reveal how clear expert-defined disease boundaries are in practice.

  1. 17 CFR 230.160 - Registered investment company exemption from Section 101(c)(1) of the Electronic Signatures in...

    Science.gov (United States)

    2010-04-01

    ... exemption from Section 101(c)(1) of the Electronic Signatures in Global and National Commerce Act. 230.160...(c)(1) of the Electronic Signatures in Global and National Commerce Act. A prospectus for an... 101(c)(1) of the Electronic Signatures in Global and National Commerce Act. [65 FR 47284, Aug. 2, 2000] ...

  2. 41 CFR 301-71.3 - May we use electronic signatures on travel documents?

    Science.gov (United States)

    2010-07-01

    ... signatures on travel documents? 301-71.3 Section 301-71.3 Public Contracts and Property Management Federal Travel Regulation System TEMPORARY DUTY (TDY) TRAVEL ALLOWANCES AGENCY RESPONSIBILITIES 71-AGENCY TRAVEL ACCOUNTABILITY REQUIREMENTS General § 301-71.3 May we use electronic signatures on travel documents? Yes, if you...

  3. User Interface Program for secure electronic tags

    International Nuclear Information System (INIS)

    Cai, Y.; Koehl, E.R.; Carlson, R.D.; Raptis, A.C.

    1995-05-01

    This report summarizes and documents the efforts of Argonne National Laboratory (ANL) in developing a secure tag communication user interface program comprising a tag monitor and a communication tool. This program can perform the same functions as the software that was developed at the Lawrence Livermore National Laboratory (LLNL), but it is enhanced with a user-friendly screen. It represents the first step in updating the TRANSCOM Tracking System (TRANSCOM) by incorporating a tag communication screen menu into the main menu of the TRANSCOM user program. A working version of TRANSCOM, enhanced with ANL secure-tag graphics, will strongly support the Department of Energy Warhead Dismantlement/Special Nuclear Materials Control initiatives. It will allow commercial satellite tracking of the movements and operational activities of treaty-limited items and transportation vehicles throughout Europe and the former USSR, as well as the continental US

  4. User Interface Program for secure electronic tags

    Energy Technology Data Exchange (ETDEWEB)

    Cai, Y.; Koehl, E.R.; Carlson, R.D.; Raptis, A.C.

    1995-05-01

    This report summarizes and documents the efforts of Argonne National Laboratory (ANL) in developing a secure tag communication user interface program comprising a tag monitor and a communication tool. This program can perform the same functions as the software that was developed at the Lawrence Livermore National Laboratory (LLNL), but it is enhanced with a user-friendly screen. It represents the first step in updating the TRANSCOM Tracking System (TRANSCOM) by incorporating a tag communication screen menu into the main menu of the TRANSCOM user program. A working version of TRANSCOM, enhanced with ANL secure-tag graphics, will strongly support the Department of Energy Warhead Dismantlement/Special Nuclear Materials Control initiatives. It will allow commercial satellite tracking of the movements and operational activities of treaty-limited items and transportation vehicles throughout Europe and the former USSR, as well as the continental US.

  5. Electronic medical records system user acceptance

    CSIR Research Space (South Africa)

    Erasmus, L

    2015-06-01

    Full Text Available the change due to a lack of understanding of the system with usability of the system playing a large role. Even experienced user will resist a system if they perceive the system to be ineffective in assisting them with their primary task. Thus, based...

  6. User interface design of electronic appliances

    CERN Document Server

    Baumann, Konrad

    2002-01-01

    Foreword by Brenda Laurel. Part One: Introduction 1. Background, Bruce Thomas 2. Introduction, Konrad Baumann 3. The Interaction Design Process, Georg Rakers Part Two: User Interface Design 4. Creativity Techniques, Irene Mavrommati 5. Design Principals, Irene Mavrommati and Adrian Martel 6. Design of On-Screen Interfaces, Irene Mavrommati Part Three: Input Devices 7. Controls, Konrad Baumann 8. Keyboards, Konrad Baumann 9. Advanced Interaction Techniques, Christopher Baber and Konrad Baumann 10. Speech Control, Christopher Baber and Jan Noyes 11. Wearable Computers, Christopher Baber Part Fou

  7. [Prevalence and user profile of electronic cigarettes in Spain (2014)].

    Science.gov (United States)

    Lidón-Moyano, Cristina; Martínez-Sánchez, Jose M; Fu, Marcela; Ballbè, Montse; Martín-Sánchez, Juan Carlos; Fernández, Esteve

    To describe the prevalence and user profile of electronic cigarettes among Spanish adults and evaluate the potential dual use of these devices with combustible or conventional tobacco in 2014 in Spain. Cross-sectional study of a representative sample of the Spanish adult (16-75 years old) population (n=1,016). A computer-assisted telephone survey was conducted in 2014. The prevalence and 95% confidence intervals (95% CI) for the use of electronic cigarettes stratified by gender, age, tobacco consumption and social status were calculated. The sample was weighted and a logistic regression model adjusted to obtain the crude odds ratios (OR) adjusted by gender, age and social status. 10.3% (95% CI: 8.6-12.4) of the Spanish adult population stated being ever users of electronic cigarettes (2% current users, 3.2% past users and 5.1% experimental users). Among current electronic cigarette users, 57.2% also smoked combustible or conventional tobacco, 28% had never smoked and 14.8% were former smokers. The prevalence of electronic cigarette use was higher in the younger population (adjusted OR=23.8; 95% CI: 2.5-227.7) and smokers of combustible tobacco (adjusted OR=10.1; 95% CI: 5.8-17.5). The use of electronic cigarettes in Spain is scarce and is most prevalent among young people and tobacco smokers. Nevertheless, one out of four current electronic cigarette users have never smoked. Hence, the regulation of these devices should be reinforced to avoid a possible gateway to nicotine products among never smokers. Copyright © 2016 SESPAS. Publicado por Elsevier España, S.L.U. All rights reserved.

  8. Fiddling with the ECT act – Electronic signatures | Eiselen ...

    African Journals Online (AJOL)

    Potchefstroom Electronic Law Journal/Potchefstroomse Elektroniese Regsblad. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 17, No 6 (2014) >. Log in or Register to get access to full text downloads.

  9. Signature of electron-phonon interaction in high temperature superconductors

    Directory of Open Access Journals (Sweden)

    Vinod Ashokan

    2011-09-01

    Full Text Available The theory of thermal conductivity of high temperature superconductors (HTS based on electron and phonon line width (life times formulation is developed with Quantum dynamical approach of Green's function. The frequency line width is observed as an extremely sensitive quantity in the transport phenomena of HTS as a collection of large number of scattering processes. The role of resonance scattering and electron-phonon interaction processes is found to be most prominent near critical temperature. The theory successfully explains the spectacular behaviour of high Tc superconductors in the vicinity of transition temperature. A successful agreement between theory and experiment has been obtained by analyzing the thermal conductivity data for the sample La1.8Sr0.2CuO4 in the temperature range 0 − 200K. The theory is equally and successfully applicable to all other high Tc superconductors.

  10. Signature properties of water: Their molecular electronic origins

    OpenAIRE

    Sokhan, Vlad P.; Jones, Andrew P.; Cipcigan, Flaviu S.; Crain, Jason; Martyna, Glenn J.

    2015-01-01

    Water challenges our fundamental understanding of emergent materials properties from a molecular perspective. It exhibits a uniquely rich phenomenology including dramatic variations in behavior over the wide temperature range of the liquid into water's crystalline phases and amorphous states. We show that many-body responses arising from water's electronic structure are essential mechanisms harnessed by the molecule to encode for the distinguishing features of its condensed states. We treat t...

  11. Key-Insulated Undetachable Digital Signature Scheme and Solution for Secure Mobile Agents in Electronic Commerce

    Directory of Open Access Journals (Sweden)

    Yang Shi

    2016-01-01

    Full Text Available Considering the security of both the customers’ hosts and the eShops’ servers, we introduce the idea of a key-insulated undetachable digital signature, enabling mobile agents to generate undetachable digital signatures on remote hosts with the key-insulated property of the original signer’s signing key. From the theoretical perspective, we provide the formal definition and security notion of a key-insulated undetachable digital signature. From the practical perspective, we propose a concrete scheme to secure mobile agents in electronic commerce. The scheme is mainly focused on protecting the signing key from leakage and preventing the misuse of the signature algorithm on malicious servers. Agents do not carry the signing key when they generate digital signatures on behalf of the original signer, so the key is protected on remote servers. Furthermore, if a hacker gains the signing key of the original signer, the hacker is still unable to forge a signature for any time period other than the key being accessed. In addition, the encrypted function is combined with the original signer’s requirement to prevent the misuse of signing algorithm. The scheme is constructed on gap Diffie–Hellman groups with provable security, and the performance testing indicates that the scheme is efficient.

  12. Topological Signatures in the Electronic Structure of Graphene Spirals

    DEFF Research Database (Denmark)

    Avdoshenko, Stas.M.; Koskinen, Pekka; Sevincli, Haldun

    2013-01-01

    and graphene systems. Here, we introduce topologically distinct graphene forms - graphene spirals - and employ density-functional theory to investigate their geometric and electronic properties. We found that the spiral topology gives rise to an intrinsic Rashba spin-orbit splitting. Through a Hamiltonian...... constrained by space curvature, graphene spirals have topologically protected states due to time-reversal symmetry. In addition, we argue that the synthesis of such graphene spirals is feasible and can be achieved through advanced bottom-up experimental routes that we indicate in this work....

  13. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  14. PEDRO (Petroleum Electronic Data Reporting Option) user guide

    Energy Technology Data Exchange (ETDEWEB)

    1990-11-01

    PEDRO is an electronic data communications product that simplifies filing and transmission of petroleum survey data. Your burden is significantly reduced as PEDRO eliminates paperwork, provides immediate onsite correction of data errors, and reduces the need for followup calls and survey resubmission. PEDRO provides an online error-checking process that highlights discrepancies. This permits you to enter and check data before transmitting to EIA. EIA then combines and reformats the data from different users for use by analytical and reporting programs. PEDRO is available at no cost to the user. Formal training is not required since installation, data processing, and transmission are done by interactive, user-friendly menu options. The PEDRO system is divided into three functions: (1) data processing, (2) transmitting data to EIA, and (3) EIA processing. 28 figs.

  15. Machine learning to detect signatures of disease in liquid biopsies - a user's guide.

    Science.gov (United States)

    Ko, Jina; Baldassano, Steven N; Loh, Po-Ling; Kording, Konrad; Litt, Brian; Issadore, David

    2018-01-30

    New technologies that measure sparse molecular biomarkers from easily accessible bodily fluids (e.g. blood, urine, and saliva) are revolutionizing disease diagnostics and precision medicine. Microchip devices can measure more disease biomarkers with better sensitivity and specificity each year, but clinical interpretation of these biomarkers remains a challenge. Single biomarkers in 'liquid biopsy' often cannot accurately predict the state of a disease due to heterogeneity in phenotype and disease expression across individuals. To address this challenge, investigators are combining multiplexed measurements of different biomarkers that together define robust signatures for specific disease states. Machine learning is a useful tool to automatically discover and detect these signatures, especially as new technologies output increasing quantities of molecular data. In this paper, we review the state of the field of machine learning applied to molecular diagnostics and provide practical guidance to use this tool effectively and to avoid common pitfalls.

  16. Atmospheric Signatures and Effects of Space-based Relativistic Electron Beam Injection

    Science.gov (United States)

    Marshall, R. A.; Sanchez, E. R.; Kero, A.; Turunen, E. S.; Marsh, D. R.

    2017-12-01

    Future relativistic electron beam injection experiments have the potential to provide groundbreaking insights into the physics of wave-particle interactions and beam-neutral interactions, relevant to space physics and to fundamental plasma physics. However, these experiments are only useful if their signatures can be detected. In this work, we use a physics-based forward modeling framework to investigate the observable signatures of a relativistic beam interacting with the upper atmosphere. The modeling framework is based around the Electron Precipitation Monte Carlo (EPMC) model, used to simulate electron precipitation in the upper atmosphere. That model is coupled to physics-based models of i) optical emission production; ii) bremsstrahlung photon production and propagation; iii) D-region ion chemistry; and iv) VLF wave propagation in the Earth-ionosphere waveguide. Using these modeling tools, we predict the optical, X-ray, chemical, radar, and VLF signatures of a realistic beam injection, based on recent space-based accelerator designs. In particular, we inject a beam pulse of 10 mA for a duration of 500 μs at an energy of 1 MeV, providing a total pulse energy of 5 J. We further investigate variations in these parameters, in particular the total energy and the electron energy. Our modeling shows that for this 5 J pulse injection at 1 MeV electron energy, the optical signal is easily detectable from the ground in common emission bands, but the X-ray signal is likely too weak to be seen from either balloons or LEO orbiting spacecraft. We further predict the optical signal-to-noise ratio that would be expected in different optical systems. Chemical signatures such as changes to NOx and HOx concentrations are too short-lived to be detectable; however our modeling provides a valuable estimate of the total chemical response. Electron density perturbations should be easily measurable from ground-based high-power radars and via VLF subionospheric remote sensing

  17. Signatures of vibronic coupling in two-dimensional electronic-vibrational and vibrational-electronic spectroscopies

    Science.gov (United States)

    Gaynor, James D.; Khalil, Munira

    2017-09-01

    Two-Dimensional Electronic-Vibrational (2D EV) spectroscopy and Two-Dimensional Vibrational-Electronic (2D VE) spectroscopy are new coherent four-wave mixing spectroscopies that utilize both electronically resonant and vibrationally resonant field-matter interactions to elucidate couplings between electronic and vibrational degrees of freedom. A system Hamiltonian is developed here to lay a foundation for interpreting the 2D EV and 2D VE signals that arise from a vibronically coupled molecular system in the condensed phase. A molecular system consisting of one anharmonic vibration and two electronic states is modeled. Equilibrium displacement of the vibrational coordinate and vibrational frequency shifts upon excitation to the first electronic excited state are included in our Hamiltonian through linear and quadratic vibronic coupling terms. We explicitly consider the nuclear dependence of the electronic transition dipole moment and demonstrate that these spectroscopies are sensitive to non-Condon effects. A series of simulations of 2D EV and 2D VE spectra obtained by varying parameters of the system, system-bath, and interaction Hamiltonians demonstrate that one of the following conditions must be met to observe signals: (1) non-zero linear and/or quadratic vibronic coupling in the electronic excited state, (2) vibrational-coordinate dependence of the electronic transition dipole moment, or (3) electronic-state-dependent vibrational dephasing dynamics. We explore how these vibronic interactions are manifested in the positions, amplitudes, and line shapes of the peaks in 2D EV and 2D VE spectroscopies.

  18. Thermodynamic signature of Dirac electrons across a possible topological transition in ZrTe5

    Science.gov (United States)

    Nair, Nityan L.; Dumitrescu, Philipp T.; Channa, Sanyum; Griffin, Sinéad M.; Neaton, Jeffrey B.; Potter, Andrew C.; Analytis, James G.

    2018-01-01

    We combine transport, magnetization, and torque magnetometry measurements to investigate the electronic structure of ZrTe5, a system that is thought to be near a topological phase transition. At fields beyond the quantum limit, we observe a magnetization reversal from paramagnetic to diamagnetic response, which is characteristic of a Dirac semimetal. However, on increasing temperature across a corresponding transport anomaly, all signatures of this Dirac-like nature are completely suppressed, providing the first thermodynamic evidence of a possible topological phase transition in this compound. ZrTe5 may thus provide a rare, experimentally accessible example in which such phase transitions can be studied directly.

  19. 75 FR 64749 - Request for Comments on the Use of Electronic Signatures for NRC Documents Related to the Medical...

    Science.gov (United States)

    2010-10-20

    ... electronic equivalent of biometric information), provide authentication and non-repudiation, and assure data... are maintained at the licensee's facility (e.g., concerns with electronic storage; identification... document, the individual knows he/she is signing it, the physical signature provides biometric information...

  20. Controlling user access to electronic resources without password

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  1. Xyce parallel electronic simulator : users' guide.

    Energy Technology Data Exchange (ETDEWEB)

    Mei, Ting; Rankin, Eric Lamont; Thornquist, Heidi K.; Santarelli, Keith R.; Fixel, Deborah A.; Coffey, Todd Stirling; Russo, Thomas V.; Schiek, Richard Louis; Warrender, Christina E.; Keiter, Eric Richard; Pawlowski, Roger Patrick

    2011-05-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been designed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas: (1) Capability to solve extremely large circuit problems by supporting large-scale parallel computing platforms (up to thousands of processors). Note that this includes support for most popular parallel and serial computers; (2) Improved performance for all numerical kernels (e.g., time integrator, nonlinear and linear solvers) through state-of-the-art algorithms and novel techniques. (3) Device models which are specifically tailored to meet Sandia's needs, including some radiation-aware devices (for Sandia users only); and (4) Object-oriented code design and implementation using modern coding practices that ensure that the Xyce Parallel Electronic Simulator will be maintainable and extensible far into the future. Xyce is a parallel code in the most general sense of the phrase - a message passing parallel implementation - which allows it to run efficiently on the widest possible number of computing platforms. These include serial, shared-memory and distributed-memory parallel as well as heterogeneous platforms. Careful attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows. The development of Xyce provides a platform for computational research and development aimed specifically at the needs of the Laboratory. With Xyce, Sandia has an 'in-house' capability with which both new electrical (e.g., device model development) and algorithmic (e.g., faster time-integration methods, parallel solver algorithms) research and development can be performed. As a result, Xyce is

  2. Controlling user access to electronic resources without password

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Fred Hewitt

    2017-08-22

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.

  3. The "Golden Triangle"--Users, Librarians and Suppliers in the Electronic Information Era.

    Science.gov (United States)

    Smith, N. R.

    1993-01-01

    Discussion of the relationship between users, librarians, and vendors as it has been influenced by electronic databases and communications networks highlights experiences at Aston University (United Kingdom). Topics addressed include mediated searching; direct user access to databases; impacts on staff; user demand; costs; CD-ROM networks;…

  4. Xyce Parallel Electronic Simulator Users Guide Version 6.2.

    Energy Technology Data Exchange (ETDEWEB)

    Keiter, Eric R.; Mei, Ting; Russo, Thomas V.; Schiek, Richard Louis; Sholander, Peter E.; Thornquist, Heidi K.; Verley, Jason C.; Baur, David Gregory

    2014-09-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been de- signed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas: Capability to solve extremely large circuit problems by supporting large-scale parallel com- puting platforms (up to thousands of processors). This includes support for most popular parallel and serial computers. A differential-algebraic-equation (DAE) formulation, which better isolates the device model package from solver algorithms. This allows one to develop new types of analysis without requiring the implementation of analysis-specific device models. Device models that are specifically tailored to meet Sandia's needs, including some radiation- aware devices (for Sandia users only). Object-oriented code design and implementation using modern coding practices. Xyce is a parallel code in the most general sense of the phrase -- a message passing parallel implementation -- which allows it to run efficiently a wide range of computing platforms. These include serial, shared-memory and distributed-memory parallel platforms. Attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows. Trademarks The information herein is subject to change without notice. Copyright c 2002-2014 Sandia Corporation. All rights reserved. Xyce TM Electronic Simulator and Xyce TM are trademarks of Sandia Corporation. Portions of the Xyce TM code are: Copyright c 2002, The Regents of the University of California. Produced at the Lawrence Livermore National Laboratory. Written by Alan Hindmarsh, Allan Taylor, Radu Serban. UCRL-CODE-2002-59 All rights reserved. Orcad, Orcad Capture, PSpice and Probe are

  5. Xyce Parallel Electronic Simulator Users Guide Version 6.4

    Energy Technology Data Exchange (ETDEWEB)

    Keiter, Eric R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mei, Ting [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Russo, Thomas V. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Schiek, Richard [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sholander, Peter E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Thornquist, Heidi K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Verley, Jason [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Baur, David Gregory [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-12-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been de- signed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas: Capability to solve extremely large circuit problems by supporting large-scale parallel com- puting platforms (up to thousands of processors). This includes support for most popular parallel and serial computers. A differential-algebraic-equation (DAE) formulation, which better isolates the device model package from solver algorithms. This allows one to develop new types of analysis without requiring the implementation of analysis-specific device models. Device models that are specifically tailored to meet Sandia's needs, including some radiation- aware devices (for Sandia users only). Object-oriented code design and implementation using modern coding practices. Xyce is a parallel code in the most general sense of the phrase -- a message passing parallel implementation -- which allows it to run efficiently a wide range of computing platforms. These include serial, shared-memory and distributed-memory parallel platforms. Attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows. Trademarks The information herein is subject to change without notice. Copyright c 2002-2015 Sandia Corporation. All rights reserved. Xyce TM Electronic Simulator and Xyce TM are trademarks of Sandia Corporation. Portions of the Xyce TM code are: Copyright c 2002, The Regents of the University of California. Produced at the Lawrence Livermore National Laboratory. Written by Alan Hindmarsh, Allan Taylor, Radu Serban. UCRL-CODE-2002-59 All rights reserved. Orcad, Orcad Capture, PSpice and Probe are

  6. Signatures of the electron saddle swaps mechanism in the photon spectra following charge-exchange collisions

    Science.gov (United States)

    Otranto, Sebastian

    2014-10-01

    During the last few years, several experimental and theoretical studies have focused on state selective charge exchange processes between charged ions and alkali metals. These data are of particular importance for the tokamak nuclear fusion reactor program, since diagnostics on the plasma usually rely on charge-exchange spectroscopy. In this sense, alkali metals, have been proposed as potential alternatives to excited hydrogen/deuterium for which laboratory experiments are not feasible at present. In this talk, we present our recent work involving ion collisions with alkali metals. Oscillatory structures in the angular differential charge-exchange cross sections obtained using the MOTRIMS technique are correctly described by classical trajectory Monte Carlo simulations. These oscillations are found to originate from the number of swaps the electron undergoes around the projectile-target potential saddle before capture takes place and are very prominent at impact energies below 10 keV/amu. Moreover, cross sections of higher order of differentiability also indicate that the swaps leave distinctive signatures in the (n,l)-state selective cross sections and in the photon line emission cross sections. Oscillatory structures for the x-ray hardness ratio parameter are also predicted. In collaboration with Ronnie Hoekstra, Zernike Institute for Advanced Materials, University of Groningen and Ronald Olson, Department of Physics, Missouri University of Science and Technology.

  7. Users' satisfaction with the use of electronic database in university ...

    African Journals Online (AJOL)

    The study recommended that University libraries in North East zone, Nigeria, should intensify sensitization and orientation programmes to increase patronage of e-databasesby the users';up-to-date and relevant e-databases should be subscribed in time in accordance with the universities' programmes and Staff of ...

  8. Component-Level Electronic-Assembly Repair (CLEAR) Spacecraft Circuit Diagnostics by Analog and Complex Signature Analysis

    Science.gov (United States)

    Oeftering, Richard C.; Wade, Raymond P.; Izadnegahdar, Alain

    2011-01-01

    The Component-Level Electronic-Assembly Repair (CLEAR) project at the NASA Glenn Research Center is aimed at developing technologies that will enable space-flight crews to perform in situ component-level repair of electronics on Moon and Mars outposts, where there is no existing infrastructure for logistics spares. These technologies must provide effective repair capabilities yet meet the payload and operational constraints of space facilities. Effective repair depends on a diagnostic capability that is versatile but easy to use by crew members that have limited training in electronics. CLEAR studied two techniques that involve extensive precharacterization of "known good" circuits to produce graphical signatures that provide an easy-to-use comparison method to quickly identify faulty components. Analog Signature Analysis (ASA) allows relatively rapid diagnostics of complex electronics by technicians with limited experience. Because of frequency limits and the growing dependence on broadband technologies, ASA must be augmented with other capabilities. To meet this challenge while preserving ease of use, CLEAR proposed an alternative called Complex Signature Analysis (CSA). Tests of ASA and CSA were used to compare capabilities and to determine if the techniques provided an overlapping or complementary capability. The results showed that the methods are complementary.

  9. ADVISOR Users Conference Proceedings 2000 - Final Electronic version

    Energy Technology Data Exchange (ETDEWEB)

    NREL

    2000-09-26

    This is a compilation of papers presented at the ADVISOR (ADvanced Vehicle SimulatOR) Users Conference held in Costa Mesa, California, August 24-25, 2000. Major topics of the conference included modeling and simulation; partnering with the auto industry; co-simulation: partnering with the software industry in optimization and thermal modeling and geometric and mechanical modeling; forward-looking simulations coupled with ADVISOR; new concepts from universities; validation, vehicle development and applications.

  10. Signatures and mechanisms of plasmon-enhanced electron emission from clusters in few-cycle laser fields

    Science.gov (United States)

    Seiffert, Lennart; Köhn, Jörg; Peltz, Christian; Kling, Matthias F.; Fennel, Thomas

    2017-11-01

    Intense laser pulses with well-defined waveforms enable unprecedented control over electronic strong-field processes in atoms, molecules and nanostructures. In particular, carrier-envelope phase (CEP) controlled few-cycle pulses allow the modification of various features in high-harmonic or photoelectron spectra. Vice versa, such signatures open up the opportunity to identify the underlying physical processes. Here, we utilize this approach to investigate plasmon-enhanced electron emission from simple metal clusters under resonant few-cycle laser pulses. Photoelectron energy spectra extracted from our semiclassical trajectory simulations reveal a set of pronounced but strongly intertwined CEP-dependent signatures. We find, that electron trajectories associated with these signatures can be categorized by two characteristic timestamps, i.e. the escape from the cluster and the last transit through its central plane. A correlation analysis of these times enables us to disentangle the intertwined features and to associate them with different acceleration mechanisms. We expect that our results will support the interpretation of specific patterns in the photoelectron spectra of future CEP-resolved cluster experiments.

  11. Analyzing the User Behavior toward Electronic Commerce Stimuli.

    Science.gov (United States)

    Lorenzo-Romero, Carlota; Alarcón-Del-Amo, María-Del-Carmen; Gómez-Borja, Miguel-Ángel

    2016-01-01

    Based on the Stimulus-Organism-Response paradigm this research analyzes the main differences between the effects of two types of web technologies: Verbal web technology (i.e., navigational structure as utilitarian stimulus) versus non-verbal web technology (music and presentation of products as hedonic stimuli). Specific webmosphere stimuli have not been examined yet as separate variables and their impact on internal and behavioral responses seems unknown. Therefore, the objective of this research consists in analyzing the impact of these web technologies -which constitute the web atmosphere or webmosphere of a website- on shopping human behavior (i.e., users' internal states -affective, cognitive, and satisfaction- and behavioral responses - approach responses, and real shopping outcomes-) within the retail online store created by computer, taking into account some mediator variables (i.e., involvement, atmospheric responsiveness, and perceived risk). A 2 ("free" versus "hierarchical" navigational structure) × 2 ("on" versus "off" music) × 2 ("moving" versus "static" images) between-subjects computer experimental design is used to test empirically this research. In addition, an integrated methodology was developed allowing the simulation, tracking and recording of virtual user behavior within an online shopping environment. As main conclusion, this study suggests that the positive responses of online consumers might increase when they are allowed to freely navigate the online stores and their experience is enriched by animate gifts and music background. The effect caused by mediator variables modifies relatively the final shopping human behavior.

  12. Impact of CALS on Electronic Publishing Systems and Users.

    Science.gov (United States)

    Beazley, William G.

    1990-01-01

    The U.S. Department of Defense has begun using its buying power to enforce standards on the vendors and contractors of automatic data processing hardware and software. An example of this, the Computer-Aided Acquisition and Logistic Support (CALS) program, is described, and how it will affect electronic publishing systems is discussed. (five…

  13. Internet User and Electronic Journals Perception: An Inservice Science Teacher Study

    Science.gov (United States)

    Nuangchalerm, Prasart

    2010-01-01

    The growth and diversity of electronic academic journals had been widely distributed. It can be made our beliefs that future electronic scholarly journals will be different from their print antecedents and that both will fill a different niche of user, and will be necessary for the growth of any field knowledge. This study aims to investigate…

  14. Electronic medical record cancer incidence over six years comparing new users of glargine with new users of NPH insulin.

    Directory of Open Access Journals (Sweden)

    Soo Lim

    Full Text Available Recent studies suggested that insulin glargine use could be associated with increased risk of cancer. We compared the incidence of cancer in new users of glargine versus new users of NPH in a longitudinal clinical cohort with diabetes for up to 6 years.From all patients who had been regularly followed at Massachusetts General Hospital from 1/01/2005 to 12/31/2010, 3,680 patients who had a medication record for glargine or NPH usage were obtained from the electronic medical record (EMR. From those we selected 539 new glargine users (age: 60.1±13.6 years, BMI: 32.7±7.5 kg/m2 and 343 new NPH users (61.5±14.1 years, 32.7±8.3 kg/m2 who had no prevalent cancer during 19 months prior to glargine or NPH initiation. All incident cancer cases were ascertained from the EMR requiring at least 2 ICD-9 codes within a 2 month period. Insulin exposure time and cumulative dose were validated. The statistical analysis compared the rates of cancer in new glargine vs. new NPH users while on treatment, adjusted for the propensity to receive one or the other insulin. There were 26 and 28 new cancer cases in new glargine and new NPH users for 1559 and 1126 person-years follow-up, respectively. There were no differences in the propensity-adjusted clinical characteristics between groups. The adjusted hazard ratio for the cancer incidence comparing glargine vs. NPH use was 0.65 (95% CI: 0.36-1.19.Insulin glargine is not associated with development of cancers when compared with NPH in this longitudinal and carefully retrieved EMR data.

  15. Signatures of Ultrarelativistic Electron Loss in the Heart of the Outer Radiation Belt Measured by Van Allen Probes

    Science.gov (United States)

    Aseev, N. A.; Shprits, Y. Y.; Drozdov, A. Y.; Kellerman, A. C.; Usanova, M. E.; Wang, D.; Zhelavskaya, I. S.

    2017-10-01

    Up until recently, signatures of the ultrarelativistic electron loss driven by electromagnetic ion cyclotron (EMIC) waves in the Earth's outer radiation belt have been limited to direct or indirect measurements of electron precipitation or the narrowing of normalized pitch angle distributions in the heart of the belt. In this study, we demonstrate additional observational evidence of ultrarelativistic electron loss that can be driven by resonant interaction with EMIC waves. We analyzed the profiles derived from Van Allen Probe particle data as a function of time and three adiabatic invariants between 9 October and 29 November 2012. New local minimums in the profiles are accompanied by the narrowing of normalized pitch angle distributions and ground-based detection of EMIC waves. Such a correlation may be indicative of ultrarelativistic electron precipitation into the Earth's atmosphere caused by resonance with EMIC waves.

  16. Looking for Trouble in All the Right Places: The Legal Implications Associated with "Electronic Signatures" and High-Risk Clinical Situations

    National Research Council Canada - National Science Library

    Escobar, Gabriel J; Folck, Bruce F; Gardner, Marla N; Ma, June; Palmer, Larry I; Liang, Bryan; Nozick, Linda K

    2005-01-01

    .... Combinations of administrative data and laboratory test results ("electronic signatures") were employed to identify discrete, high-risk clinical situations among health plan members of a large managed care organization...

  17. Analyzing the user behavior towards Electronic Commerce stimuli

    Directory of Open Access Journals (Sweden)

    Carlota Lorenzo-Romero

    2016-11-01

    Full Text Available Based on the Stimulus-Organism-Response paradigm this research analyzes the main differences between the effects of two types of web technologies: Verbal web technology (i.e. navigational structure as utilitarian stimulus versus nonverbal web technology (music and presentation of products as hedonic stimuli. Specific webmosphere stimuli have not been examined yet as separate variables and their impact on internal and behavioral responses seems unknown. Therefore, the objective of this research consists in analyzing the impact of these web technologies –which constitute the web atmosphere or webmosphere of a website– on shopping human bebaviour (i.e. users’ internal states -affective, cognitive, and satisfaction- and behavioral responses - approach responses, and real shopping outcomes- within the retail online store created by computer, taking into account some mediator variables (i.e. involvement, atmospheric responsiveness, and perceived risk. A 2(free versus hierarchical navigational structure x2(on versus off music x2(moving versus static images between-subjects computer experimental design is used to test empirically this research. In addition, an integrated methodology was developed allowing the simulation, tracking and recording of virtual user behavior within an online shopping environment. As main conclusion, this study suggests that the positive responses of online consumers might increase when they are allowed to freely navigate the online stores and their experience is enriched by animate gifts and music background. The effect caused by mediator variables modifies relatively the final shopping human behavior.

  18. Analyzing the User Behavior toward Electronic Commerce Stimuli

    Science.gov (United States)

    Lorenzo-Romero, Carlota; Alarcón-del-Amo, María-del-Carmen; Gómez-Borja, Miguel-Ángel

    2016-01-01

    Based on the Stimulus-Organism-Response paradigm this research analyzes the main differences between the effects of two types of web technologies: Verbal web technology (i.e., navigational structure as utilitarian stimulus) versus non-verbal web technology (music and presentation of products as hedonic stimuli). Specific webmosphere stimuli have not been examined yet as separate variables and their impact on internal and behavioral responses seems unknown. Therefore, the objective of this research consists in analyzing the impact of these web technologies –which constitute the web atmosphere or webmosphere of a website– on shopping human behavior (i.e., users’ internal states -affective, cognitive, and satisfaction- and behavioral responses – approach responses, and real shopping outcomes-) within the retail online store created by computer, taking into account some mediator variables (i.e., involvement, atmospheric responsiveness, and perceived risk). A 2 (“free” versus “hierarchical” navigational structure) × 2 (“on” versus “off” music) × 2 (“moving” versus “static” images) between-subjects computer experimental design is used to test empirically this research. In addition, an integrated methodology was developed allowing the simulation, tracking and recording of virtual user behavior within an online shopping environment. As main conclusion, this study suggests that the positive responses of online consumers might increase when they are allowed to freely navigate the online stores and their experience is enriched by animate gifts and music background. The effect caused by mediator variables modifies relatively the final shopping human behavior. PMID:27965549

  19. The informational system model of Ukrainian national transport workflow improvement based on electronic signature introduction management

    Directory of Open Access Journals (Sweden)

    Grigoriy NECHAEY

    2007-01-01

    Full Text Available Proposed model of informational system supposes improvement of newconceptual method on the work with e-signature in transport nformational systems. Problems and aims that may be solved with the help of this system and the most important economical and technical advantages of the proposed system in comparison with traditional methods of e-signing use are marked out.

  20. Factors Influencing Electronic Government Adoption Perspectives Of Less Frequent Internet Users Of Pakistan

    Directory of Open Access Journals (Sweden)

    Farooq Alam Khan

    2015-01-01

    Full Text Available Abstract Much literature on electronic government services research could be found on adoptability issues from government and service providers point of view. Many studies have looked into adoptability factors from user perspectives and majority captured adoptability perspectives of frequent Internet users the ones who use Internet applications for more than 10 hours a week. On the contrary the perspectives of majority of Pakistani users which use Internet applications for less than 10 hours per week are never inquired. This paper tries to fill this gap by looking into electronic government adoptability perspectives and expectations of such Internet users of Pakistan which are much greater in numbers than others. An amended UTAUT model with all its moderators is used in this study and the results demonstrate that performance level ease of effort and social influence strongly effect behavioral intention of users in using electronic government services in Pakistan. The individuals behavioral intention along with presence of appropriate facilitating conditions triggers use behavior of users. The results show that only gender moderates majority of UTAUT relationships and accordingly a modified UTAUT model is presented. The paper provides certain insights for people making policies and academicians for performing further research while it stresses for service proliferation with special attention towards female population.

  1. Puffing Topography and Nicotine Intake of Electronic Cigarette Users

    Science.gov (United States)

    Behar, Rachel Z.; Hua, My; Talbot, Prue

    2015-01-01

    Background Prior electronic cigarette (EC) topography data are based on two video analyses with limited parameters. Alternate methods for measuring topography are needed to understand EC use and nicotine intake. Objectives This study evaluated EC topography with a CReSS Pocket device and quantified nicotine intake. Methods Validation tests on pressure drop, flow rate, and volume confirmed reliable performance of the CReSS Pocket device. Twenty participants used Blu Cigs and V2 Cigs for 10 minute intervals with a 10–15 minute break between brands. Brand order was reversed and repeated within 7 days Data were analyzed to determine puff duration, puff count, volume, flow rate, peak flow, and inter-puff interval. Nicotine intake was estimated from cartomizer fluid consumption and topography data. Results Nine patterns of EC use were identified. The average puff count and inter-puff interval were 32 puffs and 17.9 seconds. All participants, except one, took more than 20 puffs/10 minutes. The averages for puff duration (2.65 seconds/puff), volume/puff (51ml/puff), total puff volume (1,579 ml), EC fluid consumption (79.6 mg), flow rate (20 ml/s), and peak flow rate (27 ml/s) were determined for 10-minute sessions. All parameters except total puff count were significantly different for Blu versus V2 EC. Total volume for Blu versus V2 was four-times higher than for conventional cigarettes. Average nicotine intake for Blu and V2 across both sessions was 1.2 ± 0.5 mg and 1.4 ± 0.7 mg, respectively, which is similar to conventional smokers. Conclusions EC puffing topography was variable among participants in the study, but often similar within an individual between brands or days. Puff duration, inter-puff interval, and puff volume varied from conventional cigarette standards. Data on total puff volume and nicotine intake are consistent with compensatory usage of EC. These data can contribute to the development of a standard protocol for laboratory testing of EC products

  2. Implementation of RSA 2048-bit and AES 256-bit with Digital Signature for Secure Electronic Health Record Application

    Directory of Open Access Journals (Sweden)

    Mohamad Ali Sadikin

    2016-10-01

    Full Text Available This research addresses the implementation of encryption and digital signature technique for electronic health record to prevent cybercrime such as robbery, modification and unauthorised access. In this research, RSA 2048-bit algorithm, AES 256-bit and SHA 256 will be implemented in Java programming language. Secure Electronic Health Record Information (SEHR application design is intended to combine given services, such as confidentiality, integrity, authentication, and nonrepudiation. Cryptography is used to ensure the file records and electronic documents for detailed information on the medical past, present and future forecasts that have been given only to the intended patients. The document will be encrypted using an encryption algorithm based on NIST Standard. In the application, there are two schemes, namely the protection and verification scheme. This research uses black-box testing and whitebox testing to test the software input, output, and code without testing the process and design that occurs in the system.We demonstrated the implementation of cryptography in SEHR. The implementation of encryption and digital signature in this research can prevent archive thievery.

  3. User-Centered Design, Experience, and Usability of an Electronic Consent User Interface to Facilitate Informed Decision-Making in an HIV Clinic.

    Science.gov (United States)

    Ramos, S Raquel

    2017-11-01

    Health information exchange is the electronic accessibility and transferability of patient medical records across various healthcare settings and providers. In some states, patients have to formally give consent to allow their medical records to be electronically shared. The purpose of this study was to apply a novel user-centered, multistep, multiframework approach to design and test an electronic consent user interface, so patients with HIV can make more informed decisions about electronically sharing their health information. This study consisted of two steps. Step 1 was a cross-sectional, descriptive, qualitative study that used user-centric design interviews to create the user interface. This informed Step 2. Step 2 consisted of a one group posttest to examine perceptions of usefulness, ease of use, preference, and comprehension of a health information exchange electronic consent user interface. More than half of the study population had college experience, but challenges remained with overall comprehension regarding consent. The user interface was not independently successful, suggesting that in addition to an electronic consent user interface, human interaction may also be necessary to address the complexities associated with consenting to electronically share health information. Comprehension is key factor in the ability to make informed decisions.

  4. An electronic health record driven algorithm to identify incident antidepressant medication users.

    Science.gov (United States)

    Bobo, William V; Pathak, Jyotishman; Kremers, Hilal Maradit; Yawn, Barbara P; Brue, Scott M; Stoppel, Cynthia J; Croarkin, Paul E; St Sauver, Jennifer; Frye, Mark A; Rocca, Walter A

    2014-01-01

    We validated an algorithm designed to identify new or prevalent users of antidepressant medications via population-based drug prescription records. We obtained population-based drug prescription records for the entire Olmsted County, Minnesota, population from 2011 to 2012 (N=149,629) using the existing electronic medical records linkage infrastructure of the Rochester Epidemiology Project (REP). We selected electronically a random sample of 200 new antidepressant users stratified by age and sex. The algorithm required the exclusion of antidepressant use in the 6 months preceding the date of the first qualifying antidepressant prescription (index date). Medical records were manually reviewed and adjudicated to calculate the positive predictive value (PPV). We also manually reviewed the records of a random sample of 200 antihistamine users who did not meet the case definition of new antidepressant user to estimate the negative predictive value (NPV). 161 of the 198 subjects electronically identified as new antidepressant users were confirmed by manual record review (PPV 81.3%). Restricting the definition of new users to subjects who were prescribed typical starting doses of each agent for treating major depression in non-geriatric adults resulted in an increase in the PPV (90.9%). Extending the time windows with no antidepressant use preceding the index date resulted in only modest increases in PPV. The manual abstraction of medical records of 200 antihistamine users yielded an NPV of 98.5%. Our study confirms that REP prescription records can be used to identify prevalent and incident users of antidepressants in the Olmsted County, Minnesota, population. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  5. A Framework for Effective User Interface Design for Web-Based Electronic Commerce Applications

    Directory of Open Access Journals (Sweden)

    Justyna Burns

    2001-01-01

    Full Text Available Efficient delivery of relevant product information is increasingly becoming the central basis of competition between firms. The interface design represents the central component for successful information delivery to consumers. However, interface design for web-based information systems is probably more an art than a science at this point in time. Much research is needed to understand properties of an effective interface for electronic commerce. This paper develops a framework identifying the relationship between user factors, the role of the user interface and overall system success for web-based electronic commerce. The paper argues that web-based systems for electronic commerce have some similar properties to decision support systems (DSS and adapts an established DSS framework to the electronic commerce domain. Based on a limited amount of research studying web browser interface design, the framework identifies areas of research needed and outlines possible relationships between consumer characteristics, interface design attributes and measures of overall system success.

  6. Bringing Up Gopher: Access to Local & Remote Electronic Resources for University Library Users.

    Science.gov (United States)

    Brown, Melvin Marlo; And Others

    Some of the administrative and organizational issues in creating a gopher, specifically a library gopher for university libraries, are discussed. In 1993 the Electronic Collections Task Force of the New Mexico State University library administration began to develop a library-based gopher system that would enable users to have unlimited access to…

  7. Design of Electronic Medical Record User Interfaces: A Matrix-Based Method for Improving Usability

    Directory of Open Access Journals (Sweden)

    Kushtrim Kuqi

    2013-01-01

    Full Text Available This study examines a new approach of using the Design Structure Matrix (DSM modeling technique to improve the design of Electronic Medical Record (EMR user interfaces. The usability of an EMR medication dosage calculator used for placing orders in an academic hospital setting was investigated. The proposed method captures and analyzes the interactions between user interface elements of the EMR system and groups elements based on information exchange, spatial adjacency, and similarity to improve screen density and time-on-task. Medication dose adjustment task time was recorded for the existing and new designs using a cognitive simulation model that predicts user performance. We estimate that the design improvement could reduce time-on-task by saving an average of 21 hours of hospital physicians’ time over the course of a month. The study suggests that the application of DSM can improve the usability of an EMR user interface.

  8. 12 CFR 609.910 - Compliance with the Electronic Signatures in Global and National Commerce Act (Public Law 106-229...

    Science.gov (United States)

    2010-01-01

    ... Global and National Commerce Act (Public Law 106-229) (E-SIGN). 609.910 Section 609.910 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM ELECTRONIC COMMERCE General Rules § 609.910 Compliance with the Electronic Signatures in Global and National Commerce Act (Public Law 106-229) (E-SIGN). (a...

  9. Thermal Relaxation in Titanium Nanowires: Signatures of Inelastic Electron-Boundary Scattering in Heat Transfer

    Science.gov (United States)

    Elo, Teemu; Lähteenmäki, Pasi; Golubev, Dmitri; Savin, Alexander; Arutyunov, Konstantin; Hakonen, Pertti

    2017-11-01

    We have employed noise thermometry for investigations of thermal relaxation between the electrons and the substrate in nanowires patterned from 40-nm-thick titanium film on top of silicon wafers covered by a native oxide. By controlling the electronic temperature T_e by Joule heating at the base temperature of a dilution refrigerator, we probe the electron-phonon coupling and the thermal boundary resistance at temperatures T_e= 0.5-3 K. Using a regular T^5-dependent electron-phonon coupling of clean metals and a T^4-dependent interfacial heat flow, we deduce a small contribution for the direct energy transfer from the titanium electrons to the substrate phonons due to inelastic electron-boundary scattering.

  10. Electronic Raman signatures of valley polarization, shell filling in graphene quantum dots

    Science.gov (United States)

    Apalkov, V.; Chakraborty, T.

    2011-07-01

    Our theoretical studies of inelastic light scattering from few-electron graphene quantum dots indicate that the electronic Raman spectrum is governed both by the inter-electron Coulomb interaction and single-particle excitations. The spectral features depend on the number of electrons in the quantum dot (QD) and importantly, on the valley polarization. A closed-shell QD shows different properties in polarized and depolarized geometries. The intensity of the polarized Raman peaks is suppressed for closed-shell systems. We also show how Raman spectroscopy in graphene quantum dots can probe both single-particle and collective many-particle charge-density-type excitations.

  11. Diffusion of Messages from an Electronic Cigarette Brand to Potential Users through Twitter.

    Directory of Open Access Journals (Sweden)

    Kar-Hai Chu

    Full Text Available This study explores the presence and actions of an electronic cigarette (e-cigarette brand, Blu, on Twitter to observe how marketing messages are sent and diffused through the retweet (i.e., message forwarding functionality. Retweet networks enable messages to reach additional Twitter users beyond the sender's local network. We follow messages from their origin through multiple retweets to identify which messages have more reach, and the different users who are exposed.We collected three months of publicly available data from Twitter. A combination of techniques in social network analysis and content analysis were applied to determine the various networks of users who are exposed to e-cigarette messages and how the retweet network can affect which messages spread.The Blu retweet network expanded during the study period. Analysis of user profiles combined with network cluster analysis showed that messages of certain topics were only circulated within a community of e-cigarette supporters, while other topics spread further, reaching more general Twitter users who may not support or use e-cigarettes.Retweet networks can serve as proxy filters for marketing messages, as Twitter users decide which messages they will continue to diffuse among their followers. As certain e-cigarette messages extend beyond their point of origin, the audience being exposed expands beyond the e-cigarette community. Potential implications for health education campaigns include utilizing Twitter and targeting important gatekeepers or hubs that would maximize message diffusion.

  12. Assessing electronic cigarette effects and regulatory impact: Challenges with user self-reported device power.

    Science.gov (United States)

    Rudy, Alyssa K; Leventhal, Adam M; Goldenson, Nicholas I; Eissenberg, Thomas

    2017-10-01

    Electronic cigarettes (ECIGs) aerosolize liquids for user inhalation that usually contain nicotine. ECIG nicotine emission is determined, in part, by user behavior, liquid nicotine concentration, and electrical power. Whether users are able to report accurately nicotine concentration and device electrical power has not been evaluated. This study's purpose was to examine if ECIG users could provide data relevant to understanding ECIG nicotine emission, particularly liquid nicotine concentration (mg/ml) as well as battery voltage (V) and heater resistance (ohms, Ω) - needed to calculate power (watts, W). Adult ECIG users (N=165) were recruited from Los Angeles, CA for research studies examining the effects of ECIG use. We asked all participants who visited the laboratory to report liquid nicotine concentration, V, and Ω. Liquid nicotine concentration was reported by 89.7% (mean=9.5mg/ml, SD=7.3), and responses were consistent with the distribution of liquids available in commonly marketed products. The majority could not report voltage (51.5%) or resistance (63.6%). Of the 40 participants (24.8%) who reported voltage and resistance, there was a substantial power range (2.2-32,670W) the upper limit of which exceeds that of the highest ECIG reported by any user to our knowledge (i.e., 2512W). If 2512W is taken as the upper limit, only 30 (18.2%) reported valid results (mean 237.3W, SD=370.6; range=2.2-1705.3W). Laboratory, survey, and other researchers interested in understanding ECIG effects to inform users and policymakers may need to use methods other than user self-report to obtain information regarding device power. Copyright © 2017 Elsevier B.V. All rights reserved.

  13. Searching for Dark Matter Signatures in the GLAST LAT Electron Flux

    Science.gov (United States)

    Moiseev, Alexander; Profumo, Stefano

    2008-01-01

    We explored several viable scenarios of how LAT might observe DM, when the spectral feature is predicted to be observed in the HE electron flux It has been demonstrated elsewhere that LAT will be capable to detect HE electrons flux in energy range from 20 GeV to - 1 TeV with 520% energy resolution and good statistics If there is a DM-caused feature in the HE electron flux (in the range 20 GeV - 1 TeV), LAT will be the best current instrument to observe it!

  14. Search for Excited or Exotic Electron Production Using the Dielectron + Photon Signature at CDF in Run II

    Energy Technology Data Exchange (ETDEWEB)

    Gerberich, Heather Kay [Duke Univ., Durham, NC (United States)

    2004-01-01

    The author presents a search for excited or exotic electrons decaying to an electron and a photon with high transverse momentum. An oppositely charged electron is produced in association with the excited electron, yielding a final state dielectron + photon signature. The discovery of excited electrons would be a first indication of lepton compositeness. They use ~ 202 pb-1 of data collected in p$\\bar{p}$ collisions at √s = 1.96 TeV with the Collider Detector at Fermilab during March 2001 through September 2003. The data are consistent with standard model expectations. Upper limits are set on the experimental cross-section σ($\\bar{p}$p → ee* → eeγ) at the 95% confidence level in a contact-interaction model and a gauge-mediated interaction model. Limits are also presented as exclusion regions in the parameter space of the excited electron mass (Me*) and the compositeness energy scale (Λ). In the contact-interaction model, for which there are no previously published limits, they find Me* < 906 GeV is excluded for Me* = Λ. In the gauge-mediated model, the exclusion region in the Me* versus the phenomenological coupling f/Λ parameter space is extended to M{sub e*} < 430 GeV for f/Λ ~ 10-2 GeV-1. In comparison, other experiments have excluded Me* < 280 GeV for f/Λ ~ 10-2 GeV-1.

  15. Electronic cigarette use: comparing smokers, vapers, and dual users on characteristics and motivational factors

    OpenAIRE

    Claire Schoren; Karin Hummel; Hein de Vries

    2017-01-01

    Introduction This study examined vaping behaviour, precursors of vaping, and motivational differences between smokers, dual users and vapers. The objectives were to assess a) vaping characteristics and reasons for use, b) differences in motivational factors and behavioural precursors associated with e-cigarette use, and c) socio-demographic and motivational factors associated with electronic cigarette use. Methods A cross-sectional survey among 259 vapers, 135 smokers, and 83 dual u...

  16. Electronic Health Record System Contingency Plan Coordination: A Strategy for Continuity of Care Considering Users' Needs.

    Science.gov (United States)

    Fernández, Marcela T; Gómez, Adrián R; Santojanni, Américo M; Cancio, Alfredo H; Luna, Daniel R; Benítez, Sonia E

    2015-01-01

    Electronic Health Record system downtimes may have a great impact on patient care continuity. This paper describes the analysis and actions taken to redesign the Contingency Plan Procedure for the Electronic Health Record System of Hospital Italiano de Buenos Aires. After conducting a thorough analysis of the data gathered at post-contingency meetings, weaknesses were identified in the procedure; thus, strategic actions were recommended to redesign the Contingency Plan to secure an effective communications channel, as well as a formal structure for functions that may support the decision-making process. The main actions were: 1) to incorporate the IT Contingencies Committee (Plan management); 2) to incorporate the Coordinator (general supervision of the procedure); and 3) to redefine the role of the Clinical Informatics Resident, who will be responsible for managing communication between the technical team and Electronic Health Record users. As users need the information for continuity of care, key users evaluated the impact of the new strategy with an adapted survey.

  17. Signature of f -electron conductance in α -Ce single-atom contacts

    Science.gov (United States)

    Kuntz, Sebastian; Berg, Oliver; Sürgers, Christoph; Löhneysen, Hilbert v.

    2017-08-01

    Cerium is a fascinating element exhibiting, with its different phases, long-range magnetic order and superconductivity in bulk form. The coupling of the 4 f electron to s d conduction electrons and to the lattice is responsible for unique structural and electronic properties like the isostructural first-order solid-solid transition from the cubic γ phase to the cubic α phase, which is accompanied by a huge volume collapse of 14%. We report experiments aiming at disentangling the 4 f contribution to the electric conductance of the different phases. On single-atom Ce contacts we observe a strongly enhanced conductance G . By controlling the content of α -Ce employing different rates of cooling, we find a strong correlation between the fraction of α -Ce and the magnitude of G at the last conductance plateau before the contact breaks. We attribute the enhanced conductance of α -Ce to the additional contribution of the 4 f level.

  18. Electron Anisotropy as a Signature of Mode Specific Isomerization in Vinylidene

    Science.gov (United States)

    Gibson, Stephen T.; Laws, Benjamin A.; Mabbs, Richard; Neumark, Daniel; Lineberger, Carl; Field, Robert W.

    2016-06-01

    he nature of the isomerization process that turns vinylidene into acetylene has been awaiting advances in experimental methods, to better define fractionation widths beyond those available in the seminal 1989 photoelectron spectrum measurement. This has proven a challenge. The technique of velocity-map imaging (VMI) is one avenue of approach. Images of electrons photodetached from vinylidene negative-ions, at various wavelengths, 1064 nm shown, provide more detail, including unassigned structure, but only an incremental improvement in the instrument line width. Intriguingly, the VMIs demonstrate a mode dependent variation in the electron anisotropy. Most notable in the figure, the inner-ring transition clusters are discontinuously, more isotropic. Electron anisotropy may provide an alternative key to examine the character of vinylidene transitions, mediating the necessity for an extreme resolution measurement. Vibrational dependent anisotropy has previously been observed in diatomic photoelectron spectra, associated with the coupling of electronic and nuclear motions. Research supported by the Australian Research Council Discovery Project Grant DP160102585. K. M. Ervin, J. Ho, and W. C. Lineberger, J. Chem. Phys. 91, 5974 (1989). doi:10.1063/1.457415 M. van Duzor et al. J. Chem. Phys. 133, 174311 (2010). doi:10.1063/1.3493349

  19. Reasons for Using Electronic Cigarettes and Intentions to Quit Among Electronic Cigarette Users in Malaysia.

    Science.gov (United States)

    Wong, Li Ping; Mohamad Shakir, Sharina Mahavera; Alias, Haridah; Aghamohammadi, Nasrin; Hoe, Victor Cw

    2016-12-01

    The rapidly increasing uptake of e-cigarettes in Malaysia as of late demands a study to identify factors leading to its increased popularity and user intentions to quit smoking e-cigarettes. A convenience sample of e-cigarette smokers visiting e-cigarette retail shops in Selangor and Kuala Lumpur was recruited. The majority of e-cigarette smokers were youth in colleges or universities (39 %), and young professionals and managers (36 %). The main reasons for using e-cigarettes were to help the user quit tobacco cigarettes (88 %), the perception that e-cigarettes are not as intrusive as tobacco cigarettes (85 %) and can be used in public areas (70 %), the perception that e-cigarettes are healthier than tobacco cigarettes (85 %), and its relatively lower cost compared to tobacco cigarettes (65 %). A total of 65.3 % of respondents expressed intentions to quit e-cigarettes. In a multivariate analysis, the respondents who earned monthly income of RM1000 or less were significantly more likely to intend to quit smoking e-cigarettes [OR 1.551; 95 % CI 1.022-2.355; p = 0.015] compared to the respondents who earned a monthly income of more than RM2000. The respondents who disagreed with the statement 'Smoking e-cigs is relatively cheaper compared to tobacco cigarettes' were significantly more likely to intend to quit smoking e-cigarettes [OR 1.548; 95 % CI 1.045-2.293; p = 0.027] compared to respondents who did not agree. e-cigarette preventive interventions should target areas related to the identified main reasons for using e-cigarettes, namely as an aid for quitting tobacco cigarettes, the perception that e-cigarettes are not as intrusive as tobacco cigarettes and can be used in public areas, the idea that e-cigarettes are healthier than tobacco cigarettes, and its relatively lower cost compared to tobacco cigarettes.

  20. Identification of pristine and defective graphene nanoribbons by phonon signatures in the electron transport characteristics

    DEFF Research Database (Denmark)

    Christensen, Rasmus Bjerregaard; Frederiksen, Thomas; Brandbyge, Mads

    2015-01-01

    Inspired by recent experiments where electron transport was measured across graphene nanoribbons (GNRs) suspended between a metal surface and the tip of a scanning tunneling microscope [Koch, Nat. Nanotechnol.7, 713 (2012)], we present detailed first-principles simulations of inelastic electron...... tunneling spectroscopy (IETS) of long pristine and defective armchair and zigzag nanoribbons under a range of charge carrier conditions. For the armchair ribbons we find two robust IETS signals around 169 and 196 mV corresponding to the D and G modes of Raman spectroscopy as well as additional fingerprints...... due to various types of defects in the edge passivation. For the zigzag ribbons we show that the spin state strongly influences the spectrum and thus propose IETS as an indirect proof of spin polarization....

  1. Signatures of Herzberg-Teller coupling in three-dimensional electronic spectroscopy.

    Science.gov (United States)

    Bizimana, Laurie A; Carbery, William P; Gellen, Tobias A; Turner, Daniel B

    2017-02-28

    The coupling between electronic and nuclear variables is a key consideration in molecular dynamics and spectroscopy. However, simulations that include detailed vibronic coupling terms are challenging to perform, and thus a variety of approximations can be used to model and interpret experimental results. Recent work shows that these simplified models can be inadequate. It is therefore important to understand spectroscopic signals that can identify failures of those approximations. Here we use an extended response-function method to simulate coherent three-dimensional electronic spectroscopy (3D ES) and study the sensitivity of this method to the breakdown of the Franck-Condon approximation. The simulations include a coordinate-dependent transition dipole operator that produces nodes, phase shifts, and peak patterns in 3D ES that can be used to identify Herzberg-Teller coupling. Guided by the simulation results, we interpret measurements on a molecular aggregate.

  2. Review and Analysis of Cryptographic Schemes Implementing Threshold Signature

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-03-01

    Full Text Available This work is devoted to the study of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, ellipt ic curves and bilinear pairings were investigated. Different methods of generation and verification of threshold signatures were explored, e.g. used in a mobile agents, Internet banking and e-currency. The significance of the work is determined by the reduction of the level of counterfeit electronic documents, signed by certain group of users.

  3. Web-based DAQ systems: connecting the user and electronics front-ends

    International Nuclear Information System (INIS)

    Lenzi, Thomas

    2016-01-01

    Web technologies are quickly evolving and are gaining in computational power and flexibility, allowing for a paradigm shift in the field of Data Acquisition (DAQ) systems design. Modern web browsers offer the possibility to create intricate user interfaces and are able to process and render complex data. Furthermore, new web standards such as WebSockets allow for fast real-time communication between the server and the user with minimal overhead. Those improvements make it possible to move the control and monitoring operations from the back-end servers directly to the user and to the front-end electronics, thus reducing the complexity of the data acquisition chain. Moreover, web-based DAQ systems offer greater flexibility, accessibility, and maintainability on the user side than traditional applications which often lack portability and ease of use. As proof of concept, we implemented a simplified DAQ system on a mid-range Spartan6 Field Programmable Gate Array (FPGA) development board coupled to a digital front-end readout chip. The system is connected to the Internet and can be accessed from any web browser. It is composed of custom code to control the front-end readout and of a dual soft-core Microblaze processor to communicate with the client.

  4. Electronic and vibrational signatures of the Au102(p-MBA)44 cluster.

    Science.gov (United States)

    Hulkko, Eero; Lopez-Acevedo, Olga; Koivisto, Jaakko; Levi-Kalisman, Yael; Kornberg, Roger D; Pettersson, Mika; Häkkinen, Hannu

    2011-03-23

    Optical absorption of a gold nanocluster of 102 Au atoms protected by 44 para-mercaptobenzoic acid (p-MBA) ligands is measured in the range of 0.05-6.2 eV (mid-IR to UV) by a combination of several techniques for purified samples in solid and solution phases. The results are compared to calculations for a model cluster Au(102)(SMe)(44) based on the time-dependent density functional theory in the linear-response regime and using the known structure of Au(102)(p-MBA)(44). The measured and calculated molar absorption coefficients in the NIR-vis region are comparable, within a factor of 2, in the absolute scale. Several characteristic features are observed in the absorption in the range of 1.5-3.5 eV. The onset of the electronic transitions in the mid-IR region is experimentally observed at 0.45 ± 0.05 eV which compares well with the lowest calculated transition at 0.55 eV. Vibrations in the ligand layer give rise to fingerprint IR features below the onset of low-energy metal-to-metal electronic transitions. Partial exchange of the p-MBA ligand to glutathione does not affect the onset of the electronic transitions, which indicates that the metal core of the cluster is not affected by the ligand exchange. The full spectroscopic characterization of the Au(102)(p-MBA)(44) reported here for the first time gives benchmarks for further studies of manipulation and functionalization of this nanocluster to various applications.

  5. Impact and user satisfaction of a clinical information portal embedded in an electronic health record.

    Science.gov (United States)

    Tannery, Nancy H; Epstein, Barbara A; Wessel, Charles B; Yarger, Frances; LaDue, John; Klem, Mary Lou

    2011-01-01

    In 2008, a clinical information tool was developed and embedded in the electronic health record system of an academic medical center. In 2009, the initial information tool, Clinical-e, was superseded by a portal called Clinical Focus, with a single search box enabling a federated search of selected online information resources. To measure the usefulness and impact of Clinical Focus, a survey was used to gather feedback about users' experience with this clinical resource. The survey determined what type of clinicians were using this tool and assessed user satisfaction and perceived impact on patient care decision making. Initial survey results suggest the majority of respondents found Clinical Focus easy to navigate, the content easy to read, and the retrieved information relevant and complete. The majority would recommend Clinical Focus to their colleagues. Results indicate that this tool is a promising area for future development.

  6. Diagnosis of pneumonia with an electronic nose: correlation of vapor signature with chest computed tomography scan findings.

    Science.gov (United States)

    Hockstein, Neil G; Thaler, Erica R; Torigian, Drew; Miller, Wallace T; Deffenderfer, Olivia; Hanson, C William

    2004-10-01

    The electronic nose is a sensor of volatile molecules that is useful in the analysis of expired gases. The device is well suited to testing the breath of patients receiving mechanical ventilation and is a potential diagnostic adjunct that can aid in the detection of patients with ventilator-associated pneumonia. A prospective study. We performed a prospective study of patients receiving mechanical ventilation in a surgical intensive care unit who underwent chest computed tomography (CT) scanning. A single attending radiologist reviewed the chest CT scans, and imaging features were recorded on a standardized form. Within 48 hours of chest CT scan, five sets of exhaled gas were sampled from the expiratory limb of the ventilator circuit. The gases were assayed with a commercially available electronic nose. Both linear and nonlinear analyses were performed to identify correlations between imaging features and the assayed gas signatures. Twenty-five patients were identified, 13 of whom were diagnosed with pneumonia by CT scan. Support vector machine analysis was performed in two separate analyses. In the first analysis, in which a training set was identical to a prediction set, the accuracy of prediction results was greater than 91.6%. In the second analysis, in which the training set and the prediction set were different, the accuracy of prediction results was at least 80%, with higher accuracy depending on the specific parameters and models being used. The electronic nose is a new technology that continues to show promise as a potential diagnostic adjunct in the diagnosis of pneumonia and other infectious diseases.

  7. User Manuals for a Primary Care Electronic Medical Record System: A Mixed Methods Study of User- and Vendor-Generated Documents

    Science.gov (United States)

    Dow, Rustam; Barnsley, Jan; Tu, Karen; Domb, Sharon; Jadad, Alejandro R.; Lemieux-Charles, Louise

    2015-01-01

    Research problem Tutorials and user manuals are important forms of impersonal support for using software applications including electronic medical records (EMRs). Differences between user- and vendor documentation may indicate support needs, which are not sufficiently addressed by the official documentation, and reveal new elements that may inform the design of tutorials and user manuals. Research question What are the differences between user-generated tutorials and manuals for an EMR and the official user manual from the software vendor? Literature review Effective design of tutorials and user manuals requires careful packaging of information, balance between declarative and procedural texts, an action and task-oriented approach, support for error recognition and recovery, and effective use of visual elements. No previous research compared these elements between formal and informal documents. Methodology We conducted an mixed methods study. Seven tutorials and two manuals for an EMR were collected from three family health teams and compared with the official user manual from the software vendor. Documents were qualitatively analyzed using a framework analysis approach in relation to the principles of technical documentation described above. Subsets of the data were quantitatively analyzed using cross-tabulation to compare the types of error information and visual cues in screen captures between user- and vendor-generated manuals. Results and discussion The user-developed tutorials and manuals differed from the vendor-developed manual in that they contained mostly procedural and not declarative information; were customized to the specific workflow, user roles, and patient characteristics; contained more error information related to work processes than to software usage; and used explicit visual cues on screen captures to help users identify window elements. These findings imply that to support EMR implementation, tutorials and manuals need to be customized and

  8. User Manuals for a Primary Care Electronic Medical Record System: A Mixed Methods Study of User- and Vendor-Generated Documents.

    Science.gov (United States)

    Shachak, Aviv; Dow, Rustam; Barnsley, Jan; Tu, Karen; Domb, Sharon; Jadad, Alejandro R; Lemieux-Charles, Louise

    2013-06-04

    Tutorials and user manuals are important forms of impersonal support for using software applications including electronic medical records (EMRs). Differences between user- and vendor documentation may indicate support needs, which are not sufficiently addressed by the official documentation, and reveal new elements that may inform the design of tutorials and user manuals. What are the differences between user-generated tutorials and manuals for an EMR and the official user manual from the software vendor? Effective design of tutorials and user manuals requires careful packaging of information, balance between declarative and procedural texts, an action and task-oriented approach, support for error recognition and recovery, and effective use of visual elements. No previous research compared these elements between formal and informal documents. We conducted an mixed methods study. Seven tutorials and two manuals for an EMR were collected from three family health teams and compared with the official user manual from the software vendor. Documents were qualitatively analyzed using a framework analysis approach in relation to the principles of technical documentation described above. Subsets of the data were quantitatively analyzed using cross-tabulation to compare the types of error information and visual cues in screen captures between user- and vendor-generated manuals. The user-developed tutorials and manuals differed from the vendor-developed manual in that they contained mostly procedural and not declarative information; were customized to the specific workflow, user roles, and patient characteristics; contained more error information related to work processes than to software usage; and used explicit visual cues on screen captures to help users identify window elements. These findings imply that to support EMR implementation, tutorials and manuals need to be customized and adapted to specific organizational contexts and workflows. The main limitation of the study

  9. Electronic signature of the vacancy ordering in NbO (Nb3O3)

    Science.gov (United States)

    Efimenko, A. K.; Hollmann, N.; Hoefer, K.; Weinen, J.; Takegami, D.; Wolff, K. K.; Altendorf, S. G.; Hu, Z.; Rata, A. D.; Komarek, A. C.; Nugroho, A. A.; Liao, Y. F.; Tsuei, K.-D.; Hsieh, H. H.; Lin, H.-J.; Chen, C. T.; Tjeng, L. H.; Kasinathan, D.

    2017-11-01

    We investigated the electronic structure of the vacancy-ordered 4 d -transition-metal monoxide NbO (Nb3O3) using angle-integrated soft- and hard-x-ray photoelectron spectroscopies as well as ultraviolet angle-resolved photoelectron spectroscopy. We found that density-functional-based band-structure calculations can describe the spectral features accurately provided that self-interaction effects are taken into account. In the angle-resolved spectra we were able to identify the so-called `vacancy' band that characterizes the ordering of the vacancies. This together with the band-structure results indicate the important role of the very large inter-Nb-4 d hybridization for the formation of the ordered vacancies and the high thermal stability of the ordered structure of niobium monoxide.

  10. Patterns of electronic cigarette use and user beliefs about their safety and benefits: an internet survey.

    Science.gov (United States)

    Goniewicz, Maciej L; Lingas, Elena O; Hajek, Peter

    2013-03-01

    As the popularity of electronic cigarettes (e-cigarettes) increases, it is becoming important to find out more about the characteristics of e-cigarette users, why and how they use the product and whether e-cigarettes are used exclusively or in combination with conventional cigarettes. The objective of this study was to investigate patterns and effects of e-cigarette use and user beliefs about e-cigarette safety and benefits. E-cigarette users in Poland were recruited online and asked to participate in a web-based survey. The participants provided information on their smoking history, patterns of e-cigarette use, beliefs and attitudes regarding the product and information on concurrent use of conventional cigarettes. The survey was completed by 179 e-cigarette users. Almost all participants used e-cigarettes daily. E-cigarettes were primarily used to quit smoking or to reduce the harm associated with smoking (both 41%), and were successful in helping the surveyed users to achieve these goals with 66% not smoking conventional cigarettes at all and 25% smoking under five cigarettes a day. Most participants (82%) did not think that e-cigarettes were completely safe, but thought that they were less dangerous than conventional cigarettes. Sixty percent believed that e-cigarettes were addictive, but less so than conventional cigarettes. The participants primarily used e-cigarettes as a stop-smoking aid or as an alternative to conventional cigarettes, and the majority reported that they successfully stopped smoking. More data on e-cigarette safety and its efficacy in harm-reduction and smoking cessation are needed. © 2012 Australasian Professional Society on Alcohol and other Drugs.

  11. Understanding Providers' Interaction with Graphical User Interface Pertaining to Clinical Document Usage in an Electronic Health Record System

    Science.gov (United States)

    Rizvi, Rubina Fatima

    2017-01-01

    Despite high Electronic Health Record (EHR) system adoption rates by hospital and office-based practices, many users remain highly dissatisfied with the current state of EHRs. Sub-optimal EHR usability as a result of insufficient incorporation of User-Centered Design (UCD) approach during System Development Life Cycle process (SDLC) is considered…

  12. End-user expectations during an electronic health record implementation: a case study in two academic hospitals

    NARCIS (Netherlands)

    Joukes, Erik; Cornet, Ronald; Abu-Hanna, Ameen; de Bruijne, Martine; de Keizer, Nicolette

    2015-01-01

    Implementing an Electronic Health Record (EHR) is a sociotechnical process. End-users' expectations and attitudes need to be monitored during the implementation of a new EHR. It is not clear what end-users consider the most important determinants (both barriers and enablers for a successful EHR

  13. Optical signature of Weyl electronic structures in tantalum pnictides Ta P n (P n = P, As)

    Science.gov (United States)

    Kimura, Shin-ichi; Yokoyama, Hiroko; Watanabe, Hiroshi; Sichelschmidt, Jörg; Süß, Vicky; Schmidt, Marcus; Felser, Claudia

    2017-08-01

    To investigate the electronic structure of Weyl semimetals Ta P n (P n = P, As), optical conductivity [σ (ω )] spectra are measured over a wide range of photon energies and temperatures, and these measured values are compared with band calculations. Two significant structures can be observed: a bending structure at ℏ ω ˜85 meV in TaAs, and peaks at ℏ ω ˜ 50 meV (TaP) and ˜30 meV (TaAs). The bending structure can be explained by the interband transition between saddle points connecting a set of W2 Weyl points. The temperature dependence of the peak intensity can be fitted by assuming the interband transition between saddle points connecting a set of W1 Weyl points. Owing to the different temperature dependence of the Drude weight in both materials, it is found that the Weyl points of TaAs are located near the Fermi level, whereas those of TaP are further away.

  14. "Do Users Do What They Think They Do?"- A Comparative Study of User Perceived and Actual Information Searching Behaviour in the National Electronic Library of Infection

    Science.gov (United States)

    Roy, Anjana; Kostkova, Patty; Catchpole, Mike; Carson, Ewart

    In the last decade, the Internet has profoundly changed the delivery of healthcare. Medical websites for professionals and patients are playing an increasingly important role in providing the latest evidence-based knowledge for professionals, facilitating virtual patient support groups, and providing an invaluable information source for patients. Information seeking is the key user activity on the Internet. However, the discrepancy between what information is available and what the user is able to find has a profound effect on user satisfaction. The UK National electronic Library of Infection (NeLI, www.neli.org.uk) and its subsidiary projects provide a single-access portal for quality-appraised evidence in infectious diseases. We use this national portal, as test-bed for investigating our research questions. In this paper, we investigate actual and perceived user navigation behaviour that reveals important information about user perceptions and actions, in searching for information. Our results show: (i) all users were able to access information they were seeking; (ii) broadly, there is an agreement between "reported" behaviour (from questionnaires) and "observed" behaviour (from web logs), although some important differences were identified; (iii) both browsing and searching were equally used to answer specific questions and (iv) the preferred route for browsing for data on the NeLI website was to enter via the "Top Ten Topics" menu option. These findings provide important insights into how to improve user experience and satisfaction with health information websites.

  15. Digital Signature Management.

    Science.gov (United States)

    Hassler, Vesna; Biely, Helmut

    1999-01-01

    Describes the Digital Signature Project that was developed in Austria to establish an infrastructure for applying smart card-based digital signatures in banking and electronic-commerce applications. Discusses the need to conform to international standards, an international certification infrastructure, and security features for a public directory…

  16. Development of a tool to measure user experience following electronic health record implementation.

    Science.gov (United States)

    Xiao, Yan; Montgomery, Donna Cook; Philpot, Lindsey M; Barnes, Sunni A; Compton, Jan; Kennerly, Donald

    2014-01-01

    The aim of this study was to develop a survey tool to assess electronic health record (EHR) implementation to guide improvement initiatives. Survey tools are needed for ongoing improvement and have not been developed for aspects of EHR implementation. The Baylor EHR User Experience (UX) survey was developed to capture 5 concept domains: training and competency, usability, infrastructure, usefulness, and end-user support. Validation efforts included content validity assessment, a pilot study, and analysis of 606 nurse respondents. The revised tool was sent to randomly sampled EHR nurse-users in 11 acute care facilities. A total of 1,301 nurses responded (37%). Internal consistency of the survey tool was excellent (Cronbach's α = .892). Survey responses including 1,819 open comments were used to identify and prioritize improvement efforts in areas such as education, support, optimization of EHR functions, and vendor change requests. The Baylor EHR UX survey was a valid tool that can be useful for prioritizing improvement efforts in relation to EHR implementation.

  17. A framework for evaluating electronic health record vendor user-centered design and usability testing processes.

    Science.gov (United States)

    Ratwani, Raj M; Zachary Hettinger, A; Kosydar, Allison; Fairbanks, Rollin J; Hodgkins, Michael L

    2017-04-01

    Currently, there are few resources for electronic health record (EHR) purchasers and end users to understand the usability processes employed by EHR vendors during product design and development. We developed a framework, based on human factors literature and industry standards, to systematically evaluate the user-centered design processes and usability testing methods used by EHR vendors. We reviewed current usability certification requirements and the human factors literature to develop a 15-point framework for evaluating EHR products. The framework is based on 3 dimensions: user-centered design process, summative testing methodology, and summative testing results. Two vendor usability reports were retrieved from the Office of the National Coordinator's Certified Health IT Product List and were evaluated using the framework. One vendor scored low on the framework (5 pts) while the other vendor scored high on the framework (15 pts). The 2 scored vendor reports demonstrate the framework's ability to discriminate between the variabilities in vendor processes and to determine which vendors are meeting best practices. The framework provides a method to more easily comprehend EHR vendors' usability processes and serves to highlight where EHR vendors may be falling short in terms of best practices. The framework provides a greater level of transparency for both purchasers and end users of EHRs. The framework highlights the need for clearer certification requirements and suggests that the authorized certification bodies that examine vendor usability reports may need to be provided with clearer guidance. © The Author 2016. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  18. Enhancing user acceptance of mandated mobile health information systems: the ePOC (electronic point-of-care project) experience.

    Science.gov (United States)

    Burgess, Lois; Sargent, Jason

    2007-01-01

    From a clinical perspective, the use of mobile technologies, such as Personal Digital Assistants (PDAs) within hospital environments is not new. A paradigm shift however is underway towards the acceptance and utility of these systems within mobile-based healthcare environments. Introducing new technologies and associated work practices has intrinsic risks which must be addressed. This paper contends that intervening to address user concerns as they arise throughout the system development lifecycle will lead to greater levels of user acceptance, while ultimately enhancing the deliverability of a system that provides a best fit with end user needs. It is envisaged this research will lead to the development of a formalised user acceptance framework based on an agile approach to user acceptance measurement. The results of an ongoing study of user perceptions towards a mandated electronic point-of-care information system in the Northern Illawarra Ambulatory Care Team (TACT) are presented.

  19. Patterns of electronic cigarette use in current and ever users among college students in France: a cross?sectional study

    OpenAIRE

    Tavolacci, Marie-Pierre; Vasiliu, Anca; Romo, Lucia; Kotbagi, Gayatri; Kern, Laurence; Ladner, Jo?l

    2016-01-01

    Objective There is sparse information on electronic cigarette use and health behaviours among college student populations. Our objectives were to identify the patterns of electronic cigarette use in current and ever users among college students in France. Design Cross-sectional study. Settings A multicentre cross-sectional study was conducted on two major campuses in France. Students filled in an anonymous questionnaire on their use of electronic cigarettes and on targeted behaviours such as ...

  20. Electronic Field Guides and User Communities in the Eco-informatics Revolution

    Directory of Open Access Journals (Sweden)

    R. D. Stevenson

    2003-07-01

    Full Text Available The recognition that taxonomy is central to the conservation of biodiversity has reestablished the critical role of taxonomy in biology. However, many of the tools taxonomists produce for the identification and characterization of species, e.g., dichotomous keys, have been difficult to use and largely ignored by the general public in favor of field guides, which are essentially browsable picture guides. We review the role of field guides in species identification and discuss the application of a host of digital technologies to produce user-friendly tools for identification that are likely to greatly enhance species identification in the field by nonspecialists. We suggest that wider adoption of the citizen science model and the use of electronic field guides will enhance public understanding and participation in biodiversity monitoring.

  1. The differing privacy concerns regarding exchanging electronic medical records of internet users in Taiwan.

    Science.gov (United States)

    Hwang, Hsin-Ginn; Han, Hwai-En; Kuo, Kuang-Ming; Liu, Chung-Feng

    2012-12-01

    This study explores whether Internet users have different privacy concerns regarding the information contained in electronic medical records (EMRs) according to gender, age, occupation, education, and EMR awareness. Based on the Concern for Information Privacy (CFIP) scale developed by Smith and colleagues in 1996, we conducted an online survey using 15 items in four dimensions, namely, collection, unauthorized access, secondary use, and errors, to investigate Internet users' concerns regarding the privacy of EMRs under health information exchanges (HIE). We retrieved 213 valid questionnaires. The results indicate that the respondents had substantial privacy concerns regarding EMRs and their educational level and EMR awareness significantly influenced their privacy concerns regarding unauthorized access and secondary use of EMRs. This study recommends that the Taiwanese government organizes a comprehensive EMR awareness campaign, emphasizing unauthorized access and secondary use of EMRs. Additionally, to cultivate the public's understanding of EMRs, the government should employ various media, especially Internet channels, to promote EMR awareness, thereby enabling the public to accept the concept and use of EMRs. People who are highly educated and have superior EMR awareness should be given a comprehensive explanation of how hospitals protect patients' EMRs from unauthorized access and secondary use to address their concerns. Thus, the public can comprehend, trust, and accept the use of EMRs, reducing their privacy concerns, which should facilitate the future implementation of HIE.

  2. Reasons for Using Flavored Liquids among Electronic Cigarette Users: a Concept Mapping Study

    Science.gov (United States)

    Soule, Eric K.; Lopez, Alexa A.; Guy, Mignonne C.; Cobb, Caroline O.

    2016-01-01

    Background Electronic cigarettes (ECIGs) aerosolize liquids often containing flavorants for inhalation. Few studies have examined the role of flavors in ECIG use. This study’s purpose was to examine reasons for flavored ECIG use using a mixed-method approach, concept mapping (CM). Methods Forty-six past 30-day adult ECIG users recruited from vape forums/conferences completed three online CM tasks. Participants brainstormed responses to a prompt: “A specific reason I use flavored e-liquid in my electronic cigarette product is…”. The final 107 brainstormed statements were sorted by participants into groups of similar content. Participants rated each statement on a 7-point scale (1-Definitely NOT a reason to 7-Definitely a reason) based on a prompt: “This is a specific reason why I used flavored e-liquid in my electronic cigarette product in the past month.” A cluster map was generated from participants’ sorting and ratings using CM statistical software. Cluster mean ratings were compared. Results Analysis revealed five clusters of reasons for flavored ECIG use including Increased Satisfaction/Enjoyment, Better Feel/Taste than Cigarettes, Variety/Customization, Food Craving Suppression, and Social Impacts. Statements in the Increased Satisfaction/Enjoyment and Better Feel/Taste than Cigarettes clusters were rated significantly higher than statements from other clusters (psflavors were perceived as masking agents for nicotine or other bad tastes associated with cigarette smoking making ECIG use more palatable. Conclusions Flavored ECIGs are used for many reasons. Some statements suggested flavors may increase the risk of ECIG addiction. These results support continued examination of the role of flavors and ECIG use behaviors. PMID:27460860

  3. Reasons for using flavored liquids among electronic cigarette users: A concept mapping study.

    Science.gov (United States)

    Soule, Eric K; Lopez, Alexa A; Guy, Mignonne C; Cobb, Caroline O

    2016-09-01

    Electronic cigarettes (ECIGs) aerosolize liquids often containing flavorants for inhalation. Few studies have examined the role of flavors in ECIG use. This study's purpose was to examine reasons for flavored ECIG use using a mixed-method approach, concept mapping (CM). Forty-six past 30-day adult ECIG users recruited from vape forums/conferences completed three online CM tasks. Participants brainstormed responses to a prompt: "A specific reason I use flavored e-liquid in my electronic cigarette product is…". The final 107 brainstormed statements were sorted by participants into groups of similar content. Participants rated each statement on a 7-point scale (1-Definitely NOT a reason to 7-Definitely a reason) based on a prompt: "This is a specific reason why I used flavored e-liquid in my electronic cigarette product in the past month." A cluster map was generated from participants' sorting and ratings using CM statistical software. Cluster mean ratings were compared. Analysis revealed five clusters of reasons for flavored ECIG use including Increased Satisfaction/Enjoyment, Better Feel/Taste than Cigarettes, Variety/Customization, Food Craving Suppression, and Social Impacts. Statements in the Increased Satisfaction/Enjoyment and Better Feel/Taste than Cigarettes clusters were rated significantly higher than statements from other clusters (ps<0.05). Some statements indicated flavors were perceived as masking agents for nicotine or other bad tastes associated with cigarette smoking making ECIG use more palatable. Flavored ECIGs are used for many reasons. Some statements suggested flavors may increase the rewarding and possible addictive effects of ECIGs. These results support continued examination of the role of flavors and ECIG use behaviors. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  4. Electronic cigarette user plasma nicotine concentration, puff topography, heart rate, and subjective effects: Influence of liquid nicotine concentration and user experience.

    Science.gov (United States)

    Hiler, Marzena; Breland, Alison; Spindle, Tory; Maloney, Sarah; Lipato, Thokozeni; Karaoghlanian, Nareg; Shihadeh, Alan; Lopez, Alexa; Ramôa, Carolina; Eissenberg, Thomas

    2017-10-01

    Electronic cigarette (ECIG) nicotine delivery and other effects may depend on liquid nicotine concentration and user experience. This study is the first to systematically examine the influence of ECIG liquid nicotine concentration and user experience on nicotine delivery, heart rate, puff topography, and subjective effects. Thirty-three ECIG-experienced individuals and 31 ECIG-naïve cigarette smokers completed 4 laboratory conditions consisting of 2, 10-puff bouts (30-sec interpuff interval) with a 3.3-V ECIG battery attached to a 1.5-Ω "cartomizer" (7.3 W) filled with 1 ml ECIG liquid. Conditions differed by liquid nicotine concentration: 0, 8, 18, or 36 mg/ml. Participants' plasma nicotine concentration was directly related to liquid nicotine concentration and dependent on user experience, with significantly higher mean plasma nicotine increases observed in ECIG-experienced individuals relative to ECIG-naïve smokers in each active nicotine condition. When using 36 mg/ml, mean plasma nicotine increase for ECIG-experienced individuals was 17.9 ng/ml (SD = 17.2) and 6.9 (SD = 7.1; p users: collapsed across condition, mean puff duration was 5.6 sec (SD = 3.0) for ECIG-experienced and 2.9 (SD = 1.5) for ECIG-naïve individuals. ECIG use also suppressed nicotine/tobacco abstinence symptoms in both groups; the magnitude of abstinence symptom suppression depended on liquid nicotine concentration and user experience. These and other recent results suggest that policies intended to limit ECIG nicotine delivery will need to account for factors in addition to liquid nicotine concentration (e.g., device power and user behavior). (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  5. Characterizing use patterns and perceptions of relative harm in dual users of electronic and tobacco cigarettes.

    Science.gov (United States)

    Rass, Olga; Pacek, Lauren R; Johnson, Patrick S; Johnson, Matthew W

    2015-12-01

    Awareness and use of electronic cigarettes (e-cigarettes) is increasing. Questions regarding positive (e.g., smoking reduction/cessation) and negative (e.g., delay of cessation) potential public health consequences of e-cigarettes may be informed by studying dual users of e-cigarettes and tobacco cigarettes. A cross-sectional online survey assessed demographics, product use patterns, and beliefs about relative product benefits and harms among dual users (n = 350) in the United States using the website Amazon Mechanical Turk. Compared to tobacco cigarettes, e-cigarettes were used less often and were associated with lower dependence. Participants reported a 30% reduction in self-reported tobacco cigarette smoking since beginning to use e-cigarettes. Reported primary reasons for e-cigarette use were harm reduction and smoking cessation. E-cigarette use was reported as more likely in settings with smoking restrictions and when others' health could be adversely affected. Conversely, participants reported having used tobacco cigarettes more often than e-cigarettes in hedonic situations (e.g., after eating, drinking coffee or alcohol, or having sex), outdoors, or when stressed. Participants were twice as likely to report wanting to quit tobacco cigarettes compared to e-cigarettes in the next year and intended to quit tobacco cigarettes sooner. Tobacco cigarettes were described as more harmful and addictive, but also as more enjoyable than e-cigarettes. Participants provided evidence consistent with both positive and negative public health consequences of e-cigarettes, highlighting the need for experimental research, including laboratory studies and clinical trials. Policies should consider potential public health benefits of e-cigarettes, in addition to potential harms. (PsycINFO Database Record (c) 2015 APA, all rights reserved).

  6. Health-related effects reported by electronic cigarette users in online forums.

    Science.gov (United States)

    Hua, My; Alfi, Mina; Talbot, Prue

    2013-04-08

    The health effects caused by electronic cigarette (e-cigarette) use are not well understood. Our purpose was to document the positive and negative short-term health effects produced by e-cigarette use through an analysis of original posts from three online e-cigarettes forums. Data were collected into Microsoft Access databases and analyzed using Cytoscape association graphics, frequency distributions, and interactomes to determine the number and type of health effects reported, the organ systems affected the frequency of specific effects, and systems interactions. A total of 405 different symptoms due to e-cigarette use were reported from three forums. Of these, 78 were positive, 326 were negative, and one was neutral. While the reported health effects were similar in all three forums, the forum with the most posts was analyzed in detail. Effects, which were reported for 12 organ systems/anatomical regions, occurred most often in the mouth and throat and in the respiratory, neurological, sensory, and digestive systems. Users with negative symptoms often reported more than one symptom, and in these cases interactions were often seen between systems, such as the circulatory and neurological systems. Positive effects usually occurred singly and most frequently affected the respiratory system. This is the first compilation and analysis of the health effects reported by e-cigarette users in online forums. These data show that e-cigarette use can have wide ranging positive and negative effects and that online forums provide a useful resource for examining how e-cigarette use affects health.

  7. Integration of a nationally procured electronic health record system into user work practices

    Directory of Open Access Journals (Sweden)

    Cresswell Kathrin M

    2012-03-01

    Full Text Available Abstract Background Evidence suggests that many small- and medium-scale Electronic Health Record (EHR implementations encounter problems, these often stemming from users' difficulties in accommodating the new technology into their work practices. There is the possibility that these challenges may be exacerbated in the context of the larger-scale, more standardised, implementation strategies now being pursued as part of major national modernisation initiatives. We sought to understand how England's centrally procured and delivered EHR software was integrated within the work practices of users in selected secondary and specialist care settings. Methods We conducted a qualitative longitudinal case study-based investigation drawing on sociotechnical theory in three purposefully selected sites implementing early functionality of a nationally procured EHR system. The complete dataset comprised semi-structured interview data from a total of 66 different participants, 38.5 hours of non-participant observation of use of the software in context, accompanying researcher field notes, and hospital documents (including project initiation and lessons learnt reports. Transcribed data were analysed thematically using a combination of deductive and inductive approaches, and drawing on NVivo8 software to facilitate coding. Results The nationally led "top-down" implementation and the associated focus on interoperability limited the opportunity to customise software to local needs. Lack of system usability led users to employ a range of workarounds unanticipated by management to compensate for the perceived shortcomings of the system. These had a number of knock-on effects relating to the nature of collaborative work, patterns of communication, the timeliness and availability of records (including paper and the ability for hospital management to monitor organisational performance. Conclusions This work has highlighted the importance of addressing potentially adverse

  8. Xyce parallel electronic simulator : users' guide. Version 5.1.

    Energy Technology Data Exchange (ETDEWEB)

    Mei, Ting; Rankin, Eric Lamont; Thornquist, Heidi K.; Santarelli, Keith R.; Fixel, Deborah A.; Coffey, Todd Stirling; Russo, Thomas V.; Schiek, Richard Louis; Keiter, Eric Richard; Pawlowski, Roger Patrick

    2009-11-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been designed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas: (1) Capability to solve extremely large circuit problems by supporting large-scale parallel computing platforms (up to thousands of processors). Note that this includes support for most popular parallel and serial computers. (2) Improved performance for all numerical kernels (e.g., time integrator, nonlinear and linear solvers) through state-of-the-art algorithms and novel techniques. (3) Device models which are specifically tailored to meet Sandia's needs, including some radiation-aware devices (for Sandia users only). (4) Object-oriented code design and implementation using modern coding practices that ensure that the Xyce Parallel Electronic Simulator will be maintainable and extensible far into the future. Xyce is a parallel code in the most general sense of the phrase - a message passing parallel implementation - which allows it to run efficiently on the widest possible number of computing platforms. These include serial, shared-memory and distributed-memory parallel as well as heterogeneous platforms. Careful attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows. The development of Xyce provides a platform for computational research and development aimed specifically at the needs of the Laboratory. With Xyce, Sandia has an 'in-house' capability with which both new electrical (e.g., device model development) and algorithmic (e.g., faster time-integration methods, parallel solver algorithms) research and development can be performed. As a result, Xyce is a

  9. Xyce Parallel Electronic Simulator : users' guide, version 4.1.

    Energy Technology Data Exchange (ETDEWEB)

    Mei, Ting; Rankin, Eric Lamont; Thornquist, Heidi K.; Santarelli, Keith R.; Fixel, Deborah A.; Coffey, Todd Stirling; Russo, Thomas V.; Schiek, Richard Louis; Keiter, Eric Richard; Pawlowski, Roger Patrick

    2009-02-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been designed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas: (1) Capability to solve extremely large circuit problems by supporting large-scale parallel computing platforms (up to thousands of processors). Note that this includes support for most popular parallel and serial computers. (2) Improved performance for all numerical kernels (e.g., time integrator, nonlinear and linear solvers) through state-of-the-art algorithms and novel techniques. (3) Device models which are specifically tailored to meet Sandia's needs, including some radiation-aware devices (for Sandia users only). (4) Object-oriented code design and implementation using modern coding practices that ensure that the Xyce Parallel Electronic Simulator will be maintainable and extensible far into the future. Xyce is a parallel code in the most general sense of the phrase - a message passing parallel implementation - which allows it to run efficiently on the widest possible number of computing platforms. These include serial, shared-memory and distributed-memory parallel as well as heterogeneous platforms. Careful attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows. The development of Xyce provides a platform for computational research and development aimed specifically at the needs of the Laboratory. With Xyce, Sandia has an 'in-house' capability with which both new electrical (e.g., device model development) and algorithmic (e.g., faster time-integration methods, parallel solver algorithms) research and development can be performed. As a result, Xyce is a

  10. Lack of Training for a Downtime Procedure: End User's Perceptions of an Electronic Health Record Contingency Plan.

    Science.gov (United States)

    Cano, Rodrigo; Bejarano, Brenda; Vidal, Mercedes; Luna, Daniel; Benítez, Sonia

    2017-01-01

    The implementation of an Electronic Health Record has many benefits; but when it is not available, it can impact patient continuity of care. If there is no support, or a failure to guarantee the continuity of services, contingency plans have to be implemented to overcome the information disruption. End users are in direct contact with the information system, and are responsible for documenting patient clinical information. Focusing on them, we propose the design, development, and validation of a survey to evaluate the beliefs, knowledge, and perceptions of end users, about the Electronic Health Record contingency plan. Preliminary results showed that even when there were less downtime periods, end users perceived that they did not have adequate training or information about how to go through the downtime event.

  11. A Proposed Integration Environment for Enhanced User Interaction and Value-Adding of Electronic Documents: An Empirical Evaluation.

    Science.gov (United States)

    Liew, Chern Li; Chennupati, K. R.; Foo, Schubert

    2001-01-01

    Explores the potential and impact of an innovative information environment in enhancing user activities in using electronic documents for various tasks, and to support the value-adding of these e-documents. Discusses the conceptual design and prototyping of a proposed environment, PROPIE. Presents an empirical and formative evaluation of the…

  12. Xyce parallel electronic simulator users guide, version 6.1

    Energy Technology Data Exchange (ETDEWEB)

    Keiter, Eric R; Mei, Ting; Russo, Thomas V.; Schiek, Richard Louis; Sholander, Peter E.; Thornquist, Heidi K.; Verley, Jason C.; Baur, David Gregory

    2014-03-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been designed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas; Capability to solve extremely large circuit problems by supporting large-scale parallel computing platforms (up to thousands of processors). This includes support for most popular parallel and serial computers; A differential-algebraic-equation (DAE) formulation, which better isolates the device model package from solver algorithms. This allows one to develop new types of analysis without requiring the implementation of analysis-specific device models; Device models that are specifically tailored to meet Sandia's needs, including some radiationaware devices (for Sandia users only); and Object-oriented code design and implementation using modern coding practices. Xyce is a parallel code in the most general sense of the phrase-a message passing parallel implementation-which allows it to run efficiently a wide range of computing platforms. These include serial, shared-memory and distributed-memory parallel platforms. Attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows.

  13. Xyce™ Parallel Electronic Simulator Users' Guide, Version 6.5.

    Energy Technology Data Exchange (ETDEWEB)

    Keiter, Eric R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Electrical Models and Simulation; Aadithya, Karthik V. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Electrical Models and Simulation; Mei, Ting [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Electrical Models and Simulation; Russo, Thomas V. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Electrical Models and Simulation; Schiek, Richard L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Electrical Models and Simulation; Sholander, Peter E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Electrical Models and Simulation; Thornquist, Heidi K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Electrical Models and Simulation; Verley, Jason C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Electrical Models and Simulation

    2016-06-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been designed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas: Capability to solve extremely large circuit problems by supporting large-scale parallel computing platforms (up to thousands of processors). This includes support for most popular parallel and serial computers. A differential-algebraic-equation (DAE) formulation, which better isolates the device model package from solver algorithms. This allows one to develop new types of analysis without requiring the implementation of analysis-specific device models. Device models that are specifically tailored to meet Sandia's needs, including some radiation- aware devices (for Sandia users only). Object-oriented code design and implementation using modern coding practices. Xyce is a parallel code in the most general sense of the phrase -- a message passing parallel implementation -- which allows it to run efficiently a wide range of computing platforms. These include serial, shared-memory and distributed-memory parallel platforms. Attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows. The information herein is subject to change without notice. Copyright © 2002-2016 Sandia Corporation. All rights reserved.

  14. Xyce parallel electronic simulator users guide, version 6.0.

    Energy Technology Data Exchange (ETDEWEB)

    Keiter, Eric R; Mei, Ting; Russo, Thomas V.; Schiek, Richard Louis; Thornquist, Heidi K.; Verley, Jason C.; Fixel, Deborah A.; Coffey, Todd S; Pawlowski, Roger P; Warrender, Christina E.; Baur, David Gregory.

    2013-08-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been designed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas: Capability to solve extremely large circuit problems by supporting large-scale parallel computing platforms (up to thousands of processors). This includes support for most popular parallel and serial computers. A differential-algebraic-equation (DAE) formulation, which better isolates the device model package from solver algorithms. This allows one to develop new types of analysis without requiring the implementation of analysis-specific device models. Device models that are specifically tailored to meet Sandias needs, including some radiationaware devices (for Sandia users only). Object-oriented code design and implementation using modern coding practices. Xyce is a parallel code in the most general sense of the phrase a message passing parallel implementation which allows it to run efficiently a wide range of computing platforms. These include serial, shared-memory and distributed-memory parallel platforms. Attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows.

  15. Xyce parallel electronic simulator users' guide, Version 6.0.1.

    Energy Technology Data Exchange (ETDEWEB)

    Keiter, Eric R; Mei, Ting; Russo, Thomas V.; Schiek, Richard Louis; Thornquist, Heidi K.; Verley, Jason C.; Fixel, Deborah A.; Coffey, Todd S; Pawlowski, Roger P; Warrender, Christina E.; Baur, David Gregory.

    2014-01-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been designed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas: Capability to solve extremely large circuit problems by supporting large-scale parallel computing platforms (up to thousands of processors). This includes support for most popular parallel and serial computers. A differential-algebraic-equation (DAE) formulation, which better isolates the device model package from solver algorithms. This allows one to develop new types of analysis without requiring the implementation of analysis-specific device models. Device models that are specifically tailored to meet Sandias needs, including some radiationaware devices (for Sandia users only). Object-oriented code design and implementation using modern coding practices. Xyce is a parallel code in the most general sense of the phrase a message passing parallel implementation which allows it to run efficiently a wide range of computing platforms. These include serial, shared-memory and distributed-memory parallel platforms. Attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows.

  16. Xyce Parallel Electronic Simulator Users' Guide Version 6.8

    Energy Technology Data Exchange (ETDEWEB)

    Keiter, Eric R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Aadithya, Karthik Venkatraman [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mei, Ting [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Russo, Thomas V. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Schiek, Richard L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sholander, Peter E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Thornquist, Heidi K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Verley, Jason C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-10-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been de- signed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas: Capability to solve extremely large circuit problems by supporting large-scale parallel com- puting platforms (up to thousands of processors). This includes support for most popular parallel and serial computers. A differential-algebraic-equation (DAE) formulation, which better isolates the device model package from solver algorithms. This allows one to develop new types of analysis without requiring the implementation of analysis-specific device models. Device models that are specifically tailored to meet Sandia's needs, including some radiation- aware devices (for Sandia users only). Object-oriented code design and implementation using modern coding practices. Xyce is a parallel code in the most general sense of the phrase$-$ a message passing parallel implementation $-$ which allows it to run efficiently a wide range of computing platforms. These include serial, shared-memory and distributed-memory parallel platforms. Attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows.

  17. Design and Implementation of a Mobile Voting System Using a Novel Oblivious and Proxy Signature

    Directory of Open Access Journals (Sweden)

    Shin-Yan Chiou

    2017-01-01

    Full Text Available Electronic voting systems can make the voting process much more convenient. However, in such systems, if a server signs blank votes before users vote, it may cause undue multivoting. Furthermore, if users vote before the signing of the server, voting information will be leaked to the server and may be compromised. Blind signatures could be used to prevent leaking voting information from the server; however, malicious users could produce noncandidate signatures for illegal usage at that time or in the future. To overcome these problems, this paper proposes a novel oblivious signature scheme with a proxy signature function to satisfy security requirements such as information protection, personal privacy, and message verification and to ensure that no one can cheat other users (including the server. We propose an electronic voting system based on the proposed oblivious and proxy signature scheme and implement this scheme in a smartphone application to allow users to vote securely and conveniently. Security analyses and performance comparisons are provided to show the capability and efficiency of the proposed scheme.

  18. Dependence levels in users of electronic cigarettes, nicotine gums and tobacco cigarettes.

    Science.gov (United States)

    Etter, Jean-François; Eissenberg, Thomas

    2015-02-01

    To assess dependence levels in users of e-cigarettes, and compare them with dependence levels in users of nicotine gums and tobacco cigarettes. Self-reports from cross-sectional Internet and mail surveys. Comparisons of: (a) 766 daily users of nicotine-containing e-cigarettes with 30 daily users of nicotine-free e-cigarettes; (b) 911 former smokers who used the e-cigarette daily with 451 former smokers who used the nicotine gum daily (but no e-cigarette); (c) 125 daily e-cigarette users who smoked daily (dual users) with two samples of daily smokers who did not use e-cigarettes (2206 enrolled on the Internet and 292 enrolled by mail from the general population of Geneva). We used the Fagerström test for nicotine dependence, the nicotine dependence syndrome scale, the cigarette dependence scale and versions of these scales adapted for e-cigarettes and nicotine gums. Dependence ratings were slightly higher in users of nicotine-containing e-cigarettes than in users of nicotine-free e-cigarettes. In former smokers, long-term (>3 months) users of e-cigarettes were less dependent on e-cigarettes than long-term users of the nicotine gum were dependent on the gum. There were few differences in dependence ratings between short-term (≤3 months) users of gums or e-cigarettes. Dependence on e-cigarettes was generally lower in dual users than dependence on tobacco cigarettes in the two other samples of daily smokers. Some e-cigarette users were dependent on nicotine-containing e-cigarettes, but these products were less addictive than tobacco cigarettes. E-cigarettes may be as or less addictive than nicotine gums, which themselves are not very addictive. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  19. Comparison of user groups' perspectives of barriers and facilitators to implementing electronic health records: a systematic review

    Directory of Open Access Journals (Sweden)

    Leduc Yvan

    2011-04-01

    Full Text Available Abstract Background Electronic health record (EHR implementation is currently underway in Canada, as in many other countries. These ambitious projects involve many stakeholders with unique perceptions of the implementation process. EHR users have an important role to play as they must integrate the EHR system into their work environments and use it in their everyday activities. Users hold valuable, first-hand knowledge of what can limit or contribute to the success of EHR implementation projects. A comprehensive synthesis of EHR users' perceptions is key to successful future implementation. This systematic literature review was aimed to synthesize current knowledge of the barriers and facilitators influencing shared EHR implementation among its various users. Methods Covering a period from 1999 to 2009, a literature search was conducted on nine electronic databases. Studies were included if they reported on users' perceived barriers and facilitators to shared EHR implementation, in healthcare settings comparable to Canada. Studies in all languages with an empirical study design were included. Quality and relevance of the studies were assessed. Four EHR user groups were targeted: physicians, other health care professionals, managers, and patients/public. Content analysis was performed independently by two authors using a validated extraction grid with pre-established categorization of barriers and facilitators for each group of EHR users. Results Of a total of 5,695 potentially relevant publications identified, 117 full text publications were obtained after screening titles and abstracts. After review of the full articles, 60 publications, corresponding to 52 studies, met the inclusion criteria. The most frequent adoption factors common to all user groups were design and technical concerns, ease of use, interoperability, privacy and security, costs, productivity, familiarity and ability with EHR, motivation to use EHR, patient and health

  20. arriba-lib: Analyses of user interactions with an electronic library of decision aids on the basis of log data.

    Science.gov (United States)

    Hirsch, Oliver; Szabo, Elisabeth; Keller, Heidemarie; Kramer, Lena; Krones, Tanja; Donner-Banzhoff, Norbert

    2012-12-01

    Computerised log files are important for analysing user behaviour in health informatics to gain insight into processes that lead to suboptimal user patterns. This is important for software training programmes or for changes to improve usability. Technical user behaviour regarding decision aids has not so far been thoroughly investigated with log files. The aim of our study was to examine more detailed user interactions of primary-care physicians and their patients with arriba-lib, our multimodular electronic library of decision aids used during consultations, on the basis of log data. We analysed 184 consultation log files from 28 primary-care physicians. The average consultation time of our modules was about 8 min. Two-thirds of the consultation time were spent in the history information part of the programme. In this part, mainly bar charts were used to display risk information. Our electronic library of decision aids does not generate specific user behaviour based on physician characteristics such as age, gender, years in practice, or prior experience with decision aids. This supports the widespread use of our e-library in the primary-care sector and probably beyond.

  1. Xyce Parallel Electronic Simulator Users' Guide Version 6.7.

    Energy Technology Data Exchange (ETDEWEB)

    Keiter, Eric R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Aadithya, Karthik Venkatraman [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mei, Ting [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Russo, Thomas V. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Schiek, Richard [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sholander, Peter E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Thornquist, Heidi K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Verley, Jason [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-05-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been designed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas: Capability to solve extremely large circuit problems by supporting large-scale parallel com- puting platforms (up to thousands of processors). This includes support for most popular parallel and serial computers. A differential-algebraic-equation (DAE) formulation, which better isolates the device model package from solver algorithms. This allows one to develop new types of analysis without requiring the implementation of analysis-specific device models. Device models that are specifically tailored to meet Sandia's needs, including some radiation- aware devices (for Sandia users only). Object-oriented code design and implementation using modern coding practices. Xyce is a parallel code in the most general sense of the phrase -- a message passing parallel implementation -- which allows it to run efficiently a wide range of computing platforms. These include serial, shared-memory and distributed-memory parallel platforms. Attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows. The information herein is subject to change without notice. Copyright c 2002-2017 Sandia Corporation. All rights reserved. Trademarks Xyce TM Electronic Simulator and Xyce TM are trademarks of Sandia Corporation. Orcad, Orcad Capture, PSpice and Probe are registered trademarks of Cadence Design Systems, Inc. Microsoft, Windows and Windows 7 are registered trademarks of Microsoft Corporation. Medici, DaVinci and Taurus are registered trademarks of Synopsys Corporation. Amtec and TecPlot are trademarks of

  2. An Improved Digital Signature Protocol to Multi-User Broadcast Authentication Based on Elliptic Curve Cryptography in Wireless Sensor Networks (WSNs

    Directory of Open Access Journals (Sweden)

    Hamed Bashirpour

    2018-03-01

    Full Text Available In wireless sensor networks (WSNs, users can use broadcast authentication mechanisms to connect to the target network and disseminate their messages within the network. Since data transfer for sensor networks is wireless, as a result, attackers can easily eavesdrop deployed sensor nodes and the data sent between them or modify the content of eavesdropped data and inject false data into the sensor network. Hence, the implementation of the message authentication mechanisms (in order to avoid changes and injecting messages into the network of wireless sensor networks is essential. In this paper, we present an improved protocol based on elliptic curve cryptography (ECC to accelerate authentication of multi-user message broadcasting. In comparison with previous ECC-based schemes, complexity and computational overhead of proposed scheme is significantly decreased. Also, the proposed scheme supports user anonymity, which is an important property in broadcast authentication schemes for WSNs to preserve user privacy and user untracking.

  3. A User Study of the Design Issues of PROPIE: A Novel Environment for Enhanced Interaction and Value-Adding of Electronic Documents.

    Science.gov (United States)

    Liew, Chern Li; Foo, Schubert; Chennupati, K. R.

    2001-01-01

    Presents a proposed information environment (PROPIE) for enhanced interaction and value-adding of electronic documents that allows users multiple ways to query intuitively and navigate information in an electronic document. Highlights include user interface technologies; visualization and interactive techniques; query and browsing processes; and…

  4. Xyce Parallel Electronic Simulator Users' Guide Version 6.6.

    Energy Technology Data Exchange (ETDEWEB)

    Keiter, Eric R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Aadithya, Karthik Venkatraman [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mei, Ting [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Russo, Thomas V. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Schiek, Richard [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sholander, Peter E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Thornquist, Heidi K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Verley, Jason [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-11-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been de- signed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas: Capability to solve extremely large circuit problems by supporting large-scale parallel com- puting platforms (up to thousands of processors). This includes support for most popular parallel and serial computers. A differential-algebraic-equation (DAE) formulation, which better isolates the device model package from solver algorithms. This allows one to develop new types of analysis without requiring the implementation of analysis-specific device models. Device models that are specifically tailored to meet Sandia's needs, including some radiation- aware devices (for Sandia users only). Object-oriented code design and implementation using modern coding practices. Xyce is a parallel code in the most general sense of the phrase -- a message passing parallel implementation -- which allows it to run efficiently a wide range of computing platforms. These include serial, shared-memory and distributed-memory parallel platforms. Attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows. The information herein is subject to change without notice. Copyright c 2002-2016 Sandia Corporation. All rights reserved. Acknowledgements The BSIM Group at the University of California, Berkeley developed the BSIM3, BSIM4, BSIM6, BSIM-CMG and BSIM-SOI models. The BSIM3 is Copyright c 1999, Regents of the University of California. The BSIM4 is Copyright c 2006, Regents of the University of California. The BSIM6 is Copyright c 2015, Regents of the University of California. The BSIM-CMG is Copyright c

  5. A hybrid digital-signature and zero-watermarking approach for authentication and protection of sensitive electronic documents.

    Science.gov (United States)

    Tayan, Omar; Kabir, Muhammad N; Alginahi, Yasser M

    2014-01-01

    This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. Such issues were largely addressed in the literature for images, audio, and video, with only a few papers addressing the challenge of sensitive plain-text media under known constraints. Specifically, with text as the predominant online communication medium, it becomes crucial that techniques are deployed to protect such information. A number of digital-signature, hashing, and watermarking schemes have been proposed that essentially bind source data or embed invisible data in a cover media to achieve its goal. While many such complex schemes with resource redundancies are sufficient in offline and less-sensitive texts, this paper proposes a hybrid approach based on zero-watermarking and digital-signature-like manipulations for sensitive text documents in order to achieve content originality and integrity verification without physically modifying the cover text in anyway. The proposed algorithm was implemented and shown to be robust against undetected content modifications and is capable of confirming proof of originality whilst detecting and locating deliberate/nondeliberate tampering. Additionally, enhancements in resource utilisation and reduced redundancies were achieved in comparison to traditional encryption-based approaches. Finally, analysis and remarks are made about the current state of the art, and future research issues are discussed under the given constraints.

  6. Anything but engaged: user involvement in the context of a national electronic health record implementation

    Directory of Open Access Journals (Sweden)

    Kathrin Cresswell

    2011-07-01

    Conclusions This work has allowed us to further develop an existing model of user engagement from the commercial sector and adapt it to inform user engagement in the context of large-scale eHealth implementations. By identifying key points of possible engagement, disengagement and re-engagement, this model will we hope both help those planning similar large-scale EHR implementation efforts and act as a much needed catalyst to further research in this neglected field of enquiry.

  7. User testing and performance evaluation of the Electronic Quality Improvement Platform for Plans and Pharmacies.

    Science.gov (United States)

    Pringle, Janice L; Kearney, Shannon M; Grasso, Kim; Boyer, Annette D; Conklin, Mark H; Szymanski, Keith A

    2015-01-01

    To user-test and evaluate a performance information management platform that makes standardized, benchmarked medication use quality data available to both health plans and community pharmacy organizations. Multiple health/drug plans and multiple chain and independent pharmacies across the United States. During the first phase of the study, user experience was measured via user satisfaction surveys and interviews with key personnel (pharmacists, pharmacy leaders, and health plan leadership). Improvements were subsequently made to the platform based on these findings. During the second phase of the study, the platform was implemented in a greater number of pharmacies and by a greater number of payers. User experience was then reevaluated to gather information for further improvements. The surveys and interviews revealed that users found the Web-based platform easy to use and beneficial in terms of understanding and comparing performance metrics. Primary concerns included lack of access to real-time data and patient-specific data. Many users also expressed uncertainty as to how they could use the information and data provided by the platform. The study findings indicate that while information management platforms can be used effectively in both pharmacy and health plan settings, future development is needed to ensure that the provided data can be transferred to pharmacy best practices and improved quality care.

  8. Electronic Cigarettes as an Introductory Tobacco Product Among Eighth and 11th Grade Tobacco Users - Oregon, 2015.

    Science.gov (United States)

    Hines, Jonas Z; Fiala, Steven C; Hedberg, Katrina

    2017-06-16

    During 2011-2015, increased electronic cigarette (e-cigarette) and hookah use offset declines in cigarette and other tobacco product use among youths (persons aged cigarettes among Oregon youths who were tobacco users were assessed in the Oregon Healthy Teens 2015 survey, a cross-sectional survey of eighth and 11th grade students in Oregon. Respondents were asked, "The very first time you used any tobacco or vaping product, which type of product did you use?" Among students who had ever used any tobacco product (ever users), e-cigarettes were the most common introductory tobacco product reported by both eighth (43.5%) and 11th (34.4%) grade students. Among students who used a tobacco product for ≥1 day during the past 30 days (current users), e-cigarettes were the most common introductory tobacco product reported by eighth grade students (44.4%) and the second most common introductory tobacco product reported by 11th grade students (31.0%). Introductory use of e-cigarettes was commonly reported among youths in Oregon who were ever or current tobacco users, underscoring the importance of proven interventions to prevent all forms of tobacco use among youths (2,3).

  9. Characteristics of users and usage of different types of electronic cigarettes: findings from an online survey.

    Science.gov (United States)

    Etter, Jean-François

    2016-04-01

    Studying users of e-cigarettes is important to help determine whether these devices aid smoking cessation. Obtaining data in representative samples is difficult, but online surveys of users may begin to build a picture. Therefore, this study aimed, through a large online survey, to describe usage and characteristics of users of e-cigarettes. Cross-sectional internet survey between 2012 and 2014. A total of 2807 current e-cigarette users enrolled via e-cigarette and smoking cessation websites, who lived in France (n = 988), the United States (n = 579), Switzerland (n = 310), the United Kingdom (n = 143) and other countries (n = 787). Type of e-cigarette used: pre-filled cartridges (n = 71), unmodified refillable tanks (n = 758), modified refillable tanks (n = 392), patterns of use, perceived effects. Pre-filled models were perceived to be less effective than unmodified refillable tanks for smoking cessation by former smokers ('definitely helped': 74% vs. 94%, P Addiction.

  10. A communicational framework for evaluating interaction with IT by analyzing user-reception of electronic texts

    DEFF Research Database (Denmark)

    Wentzer, Helle

    2006-01-01

    through semiotic texts is presented, termed the poetics of the e-text. The poetics of the e-text offers a meta-communicational framework for identifying user constraints in the possibilities of interacting with the system. Identifying communicational problems with ICT-mediated interactions again offer...

  11. An exploration of online behaviors and social media use among hookah and electronic-cigarette users

    Directory of Open Access Journals (Sweden)

    Alissa R. Link

    2015-12-01

    Conclusions: Hookah and ENDS users actively use the Internet and social media to obtain and share information about nicotine/tobacco products. Study participants who use hookah were more likely to share photos and discuss hookah related activities via social media than those who use ENDS. Social networks also represent valuable and untapped potential resources for communicating with this group about risks and harm reduction related to emerging nicotine/tobacco products.

  12. An exploration of online behaviors and social media use among hookah and electronic-cigarette users

    OpenAIRE

    Link, Alissa; Cawkwell, Philip; R. Shelley, Donna; E. Sherman, Scott

    2017-01-01

    Introduction: The purpose of this study was to explore the relationship between social norms and attitudes towards ENDS and hookah and use of these products. Methods: We conducted surveys with hookah and ENDS users who regularly used the Internet and social media and analyzed the primary social media account (e.g. Facebook) of each participant, coding all references to nicotine or tobacco products. The survey included domains on perceived favorability, perceived vulnerability and subjectiv...

  13. Raman anomalies as signatures of pressure induced electronic topological and structural transitions in black phosphorus: Experiments and theory

    Science.gov (United States)

    Gupta, Satyendra Nath; Singh, Anjali; Pal, Koushik; Chakraborti, Biswanath; Muthu, D. V. S.; Waghmare, U. V.; Sood, A. K.

    2017-09-01

    We report high-pressure Raman experiments of black phosphorus up to 24 GPa. The linewidths of first-order Raman modes Ag1, B2 g, and Ag2 of the orthorhombic phase show a minimum at 1.1 GPa. Our first-principles density functional analysis reveals that this is associated with the anomalies in electron-phonon coupling at the semiconductor to topological insulator transition through inversion of valence and conduction bands marking a change from trivial to nontrivial electronic topology. The frequencies of B2 g and Ag2 modes become anomalous in the rhombohedral phase at 7.4 GPa, and new modes appearing in the rhombohedral phase show anomalous softening with pressure. This is shown to originate from unusual structural evolution of black phosphorous with pressure, based on first-principles theoretical analysis.

  14. Community-Based Study Recruitment of American Indian Cigarette Smokers and Electronic Cigarette Users.

    Science.gov (United States)

    Carroll, Dana Mowls; Brame, Lacy S; Stephens, Lancer D; Wagener, Theodore L; Campbell, Janis E; Beebe, Laura A

    2018-02-01

    Data on the effectiveness of strategies for the recruitment of American Indians (AIs) into research is needed. This study describes and compares methods for identifying and recruiting AI tobacco users into a pilot study. Community-based strategies were used to recruit smokers (n = 35), e-cigarette users (n = 28), and dual users (n = 32) of AI descent. Recruitment was considered proactive if study staff contacted the individual at a pow wow, health fair, or vape shop and participation on-site or reactive if the individual contacted the study staff and participation occurred later. Screened, eligible, participated and costs and time spent were compared with Chi square tests. To understand AI descent, the relationship between number of AI grandparents and AI blood quantum was examined. Number of participants screened via the proactive strategy was similar to the reactive strategy (n = 84 vs. n = 82; p-value = 0.8766). A significantly greater proportion of individuals screened via the proactive than the reactive strategy were eligible (77 vs. 50%; p-value = 0.0002) and participated (75 vs. 39%; p-value = < 0.0001). Per participant cost and time estimated for the proactive strategy was $89 and 87 min compared to $79 and 56 min for the reactive strategy. Proportion at least half AI blood quantum was 32, 33, and 70% among those with 2, 3, and 4 AI grandparents, respectively (p = 0.0017). Proactive strategies resulted in two-thirds of the sample, but required more resources than reactive strategies. Overall, we found both strategies were feasible and resulted in the ability to reach sample goals. Lastly, number of AI biological grandparents may be a good, non-invasive indicator of AI blood quantum.

  15. Development of an XUV-IR free-electron laser user facility for scientific research and industrial applications

    Energy Technology Data Exchange (ETDEWEB)

    Newnam, B.E.; Warren, R.W.; Conradson, S.D.; Goldstein, J.C.; McVey, B.D.; Schmitt, M.J.; Elliott, C.J.; Burns, M.J.; Carlsten, B.E.; Chan, K.C.; Johnson, W.J.; Wang, T.S.; Sheffield, R.L.; Meier, K.L.; Olsher, R.H.; Scott, M.L.; Griggs, J.E.

    1991-01-01

    Los Alamos has designed and proposes to establish an XUV-IR free- electron laser (FEL) user facility for scientific research and industrial applications based on coherent radiation ranging from soft x-rays as short as 1 nm to far-infrared wavelengths as long as 100 {mu}m. As the next-generation light source beyond low-emittance storage rings with undulator insertion devices, this proposed national FEL user facility should make available to researchers broadly tunable, picosecond-pulse, coherent radiation with 10{sup 4} to 10{sup 7} greater spectral flux and brightness. The facility design is based on two series of FEL oscillators including one regenerative amplifier. The primary series of seven FEL oscillators, driven by a single, 1-GeV rf linac, spans the short-wavelength range from 1 to 600 nm. A second 60-MeV rf linac, synchronized with the first, drives a series of three Vis/IR FEL oscillators to cover the 0. 5 to 100-{mu}m range. This paper presents the motivation for such a facility arising from its inherently high power per unit bandwidth and its potential use for an array of scientific and industrial applications, describes the facility design, output parameters, and user laboratories, makes comparisons with synchrotron radiation sources, and summarizes recent technical progress that supports the technical feasibility. 80 refs., 9 figs., 6 tabs.

  16. Second Line of Defense: Electronic Maintenance Reports, Local Maintenance Provider User Guide, Rev. 3

    Energy Technology Data Exchange (ETDEWEB)

    Leigh, Richard J.

    2012-09-01

    The Electronic Maintenance Report forms allow Local Maintenance Providers (LMP) and other program staff to enter maintenance information into a simple and secure system. This document describes the features and information required to complete the Maintenance Report forms. It is expected that all Corrective Maintenance Reports from LMPs will be submitted electronically into the SLD Portal. As an exception (e.g., when access to the SLD Portal is unavailable), Maintenance Reports can be submitted via a secure Adobe PDF form available through the Sustainability Manager assigned to each country.

  17. Radiation signatures

    International Nuclear Information System (INIS)

    McGlynn, S.P.; Varma, M.N.

    1992-01-01

    A new concept for modelling radiation risk is proposed. This concept is based on the proposal that the spectrum of molecular lesions, which we dub ''the radiation signature'', can be used to identify the quality of the causal radiation. If the proposal concerning radiation signatures can be established then, in principle, both prospective and retrospective risk determination can be assessed on an individual basis. A major goal of biophysical modelling is to relate physical events such as ionization, excitation, etc. to the production of radiation carcinogenesis. A description of the physical events is provided by track structure. The track structure is determined by radiation quality, and it can be considered to be the ''physical signature'' of the radiation. Unfortunately, the uniqueness characteristics of this signature are dissipated in biological systems in ∼10 -9 s. Nonetheless, it is our contention that this physical disturbance of the biological system eventuates later, at ∼10 0 s, in molecular lesion spectra which also characterize the causal radiation. (author)

  18. Signatures of electronic nematicity in (111) LaAlO3/SrTiO3 interfaces

    Science.gov (United States)

    Davis, S.; Huang, Z.; Han, K.; Ariando, Venkatesan, T.; Chandrasekhar, V.

    2018-01-01

    The two-dimensional conducting gas (2DCG) that forms at the interface between LaAlO3 (LAO) and SrTiO3 (STO) has been widely studied due to the multitude of in situ tunable phenomena that exist at the interface. Recently it has been shown that nearly every property of the 2DEG that forms at the interface of (111) oriented LAO/STO is strongly anisotropic with respect to the in-plane crystal direction. This in-plane rotational symmetry breaking points to the existence of an electronic nematic phase at the interface that can be modified by an in situ electrostatic back-gate potential. Here we show that the onset temperature of the anisotropy in the longitudinal resistance is T ≈22 K , which does not match up with any known structural transition, and coincides with the onset of anisotropy in the Hall response of the system. Furthermore, below 22 K, charge transport is activated in nature with different activation energies along the two in-plane crystal directions. Such a response implies that the band edges along the two directions are different and provides further evidence of an electronic nematic state at the interface.

  19. Development and empirical user-centered evaluation of semantically-based query recommendation for an electronic health record search engine.

    Science.gov (United States)

    Hanauer, David A; Wu, Danny T Y; Yang, Lei; Mei, Qiaozhu; Murkowski-Steffy, Katherine B; Vydiswaran, V G Vinod; Zheng, Kai

    2017-03-01

    The utility of biomedical information retrieval environments can be severely limited when users lack expertise in constructing effective search queries. To address this issue, we developed a computer-based query recommendation algorithm that suggests semantically interchangeable terms based on an initial user-entered query. In this study, we assessed the value of this approach, which has broad applicability in biomedical information retrieval, by demonstrating its application as part of a search engine that facilitates retrieval of information from electronic health records (EHRs). The query recommendation algorithm utilizes MetaMap to identify medical concepts from search queries and indexed EHR documents. Synonym variants from UMLS are used to expand the concepts along with a synonym set curated from historical EHR search logs. The empirical study involved 33 clinicians and staff who evaluated the system through a set of simulated EHR search tasks. User acceptance was assessed using the widely used technology acceptance model. The search engine's performance was rated consistently higher with the query recommendation feature turned on vs. off. The relevance of computer-recommended search terms was also rated high, and in most cases the participants had not thought of these terms on their own. The questions on perceived usefulness and perceived ease of use received overwhelmingly positive responses. A vast majority of the participants wanted the query recommendation feature to be available to assist in their day-to-day EHR search tasks. Challenges persist for users to construct effective search queries when retrieving information from biomedical documents including those from EHRs. This study demonstrates that semantically-based query recommendation is a viable solution to addressing this challenge. Published by Elsevier Inc.

  20. Health-Related Effects Reported by Electronic Cigarette Users in Online Forums

    OpenAIRE

    Hua, My; Alfi, Mina; Talbot, Prue

    2013-01-01

    Background The health effects caused by electronic cigarette (e-cigarette) use are not well understood. Objective Our purpose was to document the positive and negative short-term health effects produced by e-cigarette use through an analysis of original posts from three online e-cigarettes forums. Methods Data were collected into Microsoft Access databases and analyzed using Cytoscape association graphics, frequency distributions, and interactomes to determine the number and type of health ef...

  1. Quantum discord and classical correlation signatures of mobility edges in one-dimensional aperiodic single-electron systems

    International Nuclear Information System (INIS)

    Gong, Longyan; Zhu, Hao; Zhao, Shengmei; Cheng, Weiwen; Sheng, Yubo

    2012-01-01

    We investigate numerically the quantum discord and the classical correlation in a one-dimensional slowly varying potential model and a one-dimensional Soukoulis–Economou ones, respectively. There are well-defined mobility edges in the slowly varying potential model, while there are discrepancies on mobility edges in the Soukoulis–Economou ones. In the slowly varying potential model, we find that extended and localized states can be distinguished by both the quantum discord and the classical correlation. There are sharp transitions in the quantum discord and the classical correlation at mobility edges. Based on these, we study “mobility edges” in the Soukoulis–Economou model using the quantum discord and the classical correlation, which gives another perspectives for these “mobility edges”. All these provide us good quantities, i.e., the quantum discord and the classical correlation, to reflect mobility edges in these one-dimensional aperiodic single-electron systems. Moreover, our studies propose a consistent interpretation of the discrepancies between previous numerical results about the Soukoulis–Economou model. -- Highlights: ► Quantum discord and classical correlation can signal mobility edges in two models. ► An interpretation for mobility edges in the Soukoulis–Economou model is proposed. ► Quantum discord and classical correlation can reflect well localization properties.

  2. Identifying volatile metabolite signatures for the diagnosis of bacterial respiratory tract infection using electronic nose technology: A pilot study.

    Directory of Open Access Journals (Sweden)

    Joseph M Lewis

    Full Text Available New point of care diagnostics are urgently needed to reduce the over-prescription of antimicrobials for bacterial respiratory tract infection (RTI. We performed a pilot cross sectional study to assess the feasibility of gas-capillary column ion mobility spectrometer (GC-IMS, for the analysis of volatile organic compounds (VOC in exhaled breath to diagnose bacterial RTI in hospital inpatients.71 patients were prospectively recruited from the Acute Medical Unit of the Royal Liverpool University Hospital between March and May 2016 and classified as confirmed or probable bacterial or viral RTI on the basis of microbiologic, biochemical and radiologic testing. Breath samples were collected at the patient's bedside directly into the electronic nose device, which recorded a VOC spectrum for each sample. Sparse principal component analysis and sparse logistic regression were used to develop a diagnostic model to classify VOC spectra as being caused by bacterial or non-bacterial RTI.Summary area under the receiver operator characteristic curve was 0.73 (95% CI 0.61-0.86, summary sensitivity and specificity were 62% (95% CI 41-80% and 80% (95% CI 64-91% respectively (p = 0.00147.GC-IMS analysis of exhaled VOC for the diagnosis of bacterial RTI shows promise in this pilot study and further trials are warranted to assess this technique.

  3. Particle doses in the pulmonary lobes of electronic and conventional cigarette users

    International Nuclear Information System (INIS)

    Manigrasso, Maurizio; Buonanno, Giorgio; Stabile, Luca; Morawska, Lidia; Avino, Pasquale

    2015-01-01

    The main aim of the present study was to estimate size segregated doses from e-cigarette aerosols as a function of the airway generation number in lung lobes. After a 2-second puff, 7.7 × 10 10 particles (D Tot ) with a surface area of 3.6 × 10 3  mm 2 (S Tot ), and 3.3 × 10 10 particles with a surface area of 4.2 × 10 3  mm 2 were deposited in the respiratory system for the electronic and conventional cigarettes, respectively. Alveolar and tracheobronchial deposited doses were compared to the ones received by non-smoking individuals in Western countries, showing a similar order of magnitude. Total regional doses (D R ), in head and lobar tracheobronchial and alveolar regions, ranged from 2.7 × 10 9 to 1.3 × 10 10 particles and 1.1 × 10 9 to 5.3 × 10 10 particles, for the electronic and conventional cigarettes, respectively. D R in the right-upper lung lobe was about twice that found in left-upper lobe and 20% greater in right-lower lobe than the left-lower lobe. - Highlights: • Lobar doses were compared for mainstreams of electronic and conventional cigarettes. • Aerosol doses from e-cigarettes were more than double that from conventional ones. • Doses from a 2-s puff exceed the daily doses of a no smoking Australian subject. • Highest deposition densities occurred at the lobar bronchi. • Aerosol deposition was greater in the right than in the left lung lobes. - Lobar bronchi and right lung lobes represent sites where effects of the aerosol from e-cigarette smoke may be more likely to occur

  4. Time Series Based for Online Signature Verification

    Directory of Open Access Journals (Sweden)

    I Ketut Gede Darma Putra

    2013-11-01

    Full Text Available Signature verification system is to match the tested signature with a claimed signature. This paper proposes time series based for feature extraction method and dynamic time warping for match method. The system made by process of testing 900 signatures belong to 50 participants, 3 signatures for reference and 5 signatures from original user, simple imposters and trained imposters for signatures test. The final result system was tested with 50 participants with 3 references. This test obtained that system accuracy without imposters is 90,44897959% at threshold 44 with rejection errors (FNMR is 5,2% and acceptance errors (FMR is 4,35102%, when with imposters system accuracy is 80,1361% at threshold 27 with error rejection (FNMR is 15,6% and acceptance errors (average FMR is 4,263946%, with details as follows: acceptance errors is 0,391837%, acceptance errors simple imposters is 3,2% and acceptance errors trained imposters is 9,2%.

  5. Cherry-flavoured electronic cigarettes expose users to the inhalation irritant, benzaldehyde

    Science.gov (United States)

    Kosmider, Leon; Sobczak, Andrzej; Prokopowicz, Adam; Kurek, Jolanta; Zaciera, Marzena; Knysak, Jakub; Smith, Danielle; Goniewicz, Maciej L.

    2016-01-01

    Many non-cigarette tobacco products, including e-cigarettes, contain various flavorings, such as fruit flavours. Although many flavorings used in e-cigarettes are generally recognized as safe when used in food products, concerns have been raised about the potential inhalation toxicity of these chemicals. Benzaldehyde, which is a key ingredient in natural fruit flavors, has been shown to cause irritation of respiratory airways in animal and occupational exposure studies. Given the potential inhalation toxicity of this compound, we measured benzaldehyde in aerosol generated in a laboratory setting from flavored e-cigarettes purchased online and detected benzaldehyde in 108 out of 145 products. The highest levels of benzaldehyde were detected in cherry flavored products. The benzaldehyde doses inhaled with 30 puffs from flavored e-cigarettes were often higher than doses inhaled from a conventional cigarette. Levels in cherry flavored products were over 1000 times lower than doses inhaled in the workplace. While e-cigarettes seem to be a promising harm reduction tool for smokers, findings indicate that using these products could result in repeated inhalation of benzaldehyde, with long-term users risking regular exposure to the substance. Given the uncertainty surrounding adverse health effects stemming from long-term inhalation of flavoring ingredients such as benzaldehyde, clinicians need to be aware of this emerging risk and ask their patients about use of flavored e-cigarettes. PMID:26822067

  6. Clinician user involvement in the real world: Designing an electronic tool to improve interprofessional communication and collaboration in a hospital setting.

    Science.gov (United States)

    Tang, Terence; Lim, Morgan E; Mansfield, Elizabeth; McLachlan, Alexander; Quan, Sherman D

    2018-02-01

    User involvement is vital to the success of health information technology implementation. However, involving clinician users effectively and meaningfully in complex healthcare organizations remains challenging. The objective of this paper is to share our real-world experience of applying a variety of user involvement methods in the design and implementation of a clinical communication and collaboration platform aimed at facilitating care of complex hospitalized patients by an interprofessional team of clinicians. We designed and implemented an electronic clinical communication and collaboration platform in a large community teaching hospital. The design team consisted of both technical and healthcare professionals. Agile software development methodology was used to facilitate rapid iterative design and user input. We involved clinician users at all stages of the development lifecycle using a variety of user-centered, user co-design, and participatory design methods. Thirty-six software releases were delivered over 24 months. User involvement has resulted in improvement in user interface design, identification of software defects, creation of new modules that facilitated workflow, and identification of necessary changes to the scope of the project early on. A variety of user involvement methods were complementary and benefited the design and implementation of a complex health IT solution. Combining these methods with agile software development methodology can turn designs into functioning clinical system to support iterative improvement. Copyright © 2017 The Authors. Published by Elsevier B.V. All rights reserved.

  7. Particle doses in the pulmonary lobes of electronic and conventional cigarette users.

    Science.gov (United States)

    Manigrasso, Maurizio; Buonanno, Giorgio; Stabile, Luca; Morawska, Lidia; Avino, Pasquale

    2015-07-01

    The main aim of the present study was to estimate size segregated doses from e-cigarette aerosols as a function of the airway generation number in lung lobes. After a 2-second puff, 7.7 × 10(10) particles (DTot) with a surface area of 3.6 × 10(3) mm(2) (STot), and 3.3 × 10(10) particles with a surface area of 4.2 × 10(3) mm(2) were deposited in the respiratory system for the electronic and conventional cigarettes, respectively. Alveolar and tracheobronchial deposited doses were compared to the ones received by non-smoking individuals in Western countries, showing a similar order of magnitude. Total regional doses (D(R)), in head and lobar tracheobronchial and alveolar regions, ranged from 2.7 × 10(9) to 1.3 × 10(10) particles and 1.1 × 10(9) to 5.3 × 10(10) particles, for the electronic and conventional cigarettes, respectively. D(R) in the right-upper lung lobe was about twice that found in left-upper lobe and 20% greater in right-lower lobe than the left-lower lobe. Copyright © 2015 Elsevier Ltd. All rights reserved.

  8. Methylsulfonyl polychlorinated biphenyls in fish from an electronic waste-recycling site in South China: levels, congener profiles, and chiral signatures.

    Science.gov (United States)

    Zhang, Ying; Wu, Jiang-Ping; Luo, Xiao-Jun; She, Ya-Zhe; Mo, Ling; Mai, Bi-Xian

    2012-11-01

    Great concerns have been raised about the fate and effects of polychlorinated biphenyls (PCBs) and other organic contaminants contained in electronic waste (e-waste) exported from industrialized countries at midlatitudes to subtropical and tropical regions. Information on the metabolites of these chemicals, for example, methylsulfonyl-PCBs (MeSO(2)-PCBs) in wildlife from the later regions is scarce. In the present study, 17 MeSO(2)-PCBs, including five chiral congeners, were detected in the muscle, liver, and brain tissues of two benthic fish species--northern snakehead and mud carp--from a small pond near an electronic waste recycling site in South China. The mean concentrations of the sum of the MeSO(2)-PCBs ranged from 80 to 340 ng/g lipid weight in the tissues, with relative higher levels in the liver than the muscle and brain tissues. These levels were one order of magnitude greater than the highest levels of MeSO(2)-PCBs previously reported in fish. The 3'-MeSO(2)-CB 87, 3'- and 4'-MeSO(2)-CB 101, 4-MeSO(2)-CB 110, and 4-MeSO(2)-CB 149 were dominant, collectively comprising more than 55% of the total MeSO(2)-PCBs. Except for 4-MeSO(2)-CB149, all of the investigated chiral MeSO(2)-PCBs displayed a clear, congener-specific enantiomeric enrichment in the tissues. No tissue-specific enantioselective retention of the enantiomers was observed in the investigated fish. This is the first report on chiral signatures of MeSO(2)-PCBs in fish tissues. Copyright © 2012 SETAC.

  9. Extreme-ultraviolet and hard X-ray signatures of electron acceleration during the failed eruption of a filament

    Science.gov (United States)

    Netzel, A.; Mrozek, T.; Kołomański, S.; Gburek, S.

    2012-12-01

    sensitivity to enable such observations. Movies are available in electronic form at http://www.aanda.org

  10. A Modified Decomposed Theory of Planned Behaviour Model to Analyze User Intention towards Distance-Based Electronic Toll Collection Services

    Directory of Open Access Journals (Sweden)

    Chi-Chung Tao

    2017-02-01

    Full Text Available This study proposes a modified decomposed theory of planned behaviour model (DTPB that integrates satisfaction and trust into the original DTPB model to explore what kind of factors affect the user intention towards distance-based electronic toll collection (ETC services. The proposed model is empirically tested by using data collected from a questionnaire survey with a computer assisted telephone interview system. Empirical analysis is carried out in three stages that combine confirmatory factor analysis, structural equation modelling (SEM, and Bayesian network: (1 examination of reliability and validity of the measurement model; (2 analysis of structural model; (3 prediction of the probability of user intention change based on rigorous framework of SEM. The results confirm that the satisfaction and trust have positive effects on the behaviour intention, also validating that five constructs have indirect effects on the behaviour intention through attitude and perceived behaviour control. Compatibility is the most important influence factor, followed by perceived usefulness, facilitating conditions, self-efficacy, and perceived ease of use. The findings of this study identify potential improvements for ETC operator, such as contributing to the society to enhance the company image and trust of enterprise with charity activities, and simultaneously upgrading the information platform of website, software, and Apps.

  11. Online Signature Verification on MOBISIG Finger-Drawn Signature Corpus

    Directory of Open Access Journals (Sweden)

    Margit Antal

    2018-01-01

    Full Text Available We present MOBISIG, a pseudosignature dataset containing finger-drawn signatures from 83 users captured with a capacitive touchscreen-based mobile device. The database was captured in three sessions resulting in 45 genuine signatures and 20 skilled forgeries for each user. The database was evaluated by two state-of-the-art methods: a function-based system using local features and a feature-based system using global features. Two types of equal error rate computations are performed: one using a global threshold and the other using user-specific thresholds. The lowest equal error rate was 0.01% against random forgeries and 5.81% against skilled forgeries using user-specific thresholds that were computed a posteriori. However, these equal error rates were significantly raised to 1.68% (random forgeries case and 14.31% (skilled forgeries case using global thresholds. The same evaluation protocol was performed on the DooDB publicly available dataset. Besides verification performance evaluations conducted on the two finger-drawn datasets, we evaluated the quality of the samples and the users of the two datasets using basic quality measures. The results show that finger-drawn signatures can be used by biometric systems with reasonable accuracy.

  12. De-MA: a web Database for electron Microprobe Analyses to assist EMP lab manager and users

    Science.gov (United States)

    Allaz, J. M.

    2012-12-01

    Lab managers and users of electron microprobe (EMP) facilities require comprehensive, yet flexible documentation structures, as well as an efficient scheduling mechanism. A single on-line database system for managing reservations, and providing information on standards, quantitative and qualitative setups (element mapping, etc.), and X-ray data has been developed for this purpose. This system is particularly useful in multi-user facilities where experience ranges from beginners to the highly experienced. New users and occasional facility users will find these tools extremely useful in developing and maintaining high quality, reproducible, and efficient analyses. This user-friendly database is available through the web, and uses MySQL as a database and PHP/HTML as script language (dynamic website). The database includes several tables for standards information, X-ray lines, X-ray element mapping, PHA, element setups, and agenda. It is configurable for up to five different EMPs in a single lab, each of them having up to five spectrometers and as many diffraction crystals as required. The installation should be done on a web server supporting PHP/MySQL, although installation on a personal computer is possible using third-party freeware to create a local Apache server, and to enable PHP/MySQL. Since it is web-based, any user outside the EMP lab can access this database anytime through any web browser and on any operating system. The access can be secured using a general password protection (e.g. htaccess). The web interface consists of 6 main menus. (1) "Standards" lists standards defined in the database, and displays detailed information on each (e.g. material type, name, reference, comments, and analyses). Images such as EDS spectra or BSE can be associated with a standard. (2) "Analyses" lists typical setups to use for quantitative analyses, allows calculation of mineral composition based on a mineral formula, or calculation of mineral formula based on a fixed

  13. Xyce Parallel Electronic Simulator - Users' Guide Version 2.1.

    Energy Technology Data Exchange (ETDEWEB)

    Hutchinson, Scott A; Hoekstra, Robert J.; Russo, Thomas V.; Rankin, Eric; Pawlowski, Roger P.; Fixel, Deborah A; Schiek, Richard; Bogdan, Carolyn W.; Shirley, David N.; Campbell, Phillip M.; Keiter, Eric R.

    2005-06-01

    This manual describes the use of theXyceParallel Electronic Simulator.Xycehasbeen designed as a SPICE-compatible, high-performance analog circuit simulator, andhas been written to support the simulation needs of the Sandia National Laboratorieselectrical designers. This development has focused on improving capability over thecurrent state-of-the-art in the following areas:%04Capability to solve extremely large circuit problems by supporting large-scale par-allel computing platforms (up to thousands of processors). Note that this includessupport for most popular parallel and serial computers.%04Improved performance for all numerical kernels (e.g., time integrator, nonlinearand linear solvers) through state-of-the-art algorithms and novel techniques.%04Device models which are specifically tailored to meet Sandia's needs, includingmany radiation-aware devices.3 XyceTMUsers' Guide%04Object-oriented code design and implementation using modern coding practicesthat ensure that theXyceParallel Electronic Simulator will be maintainable andextensible far into the future.Xyceis a parallel code in the most general sense of the phrase - a message passingparallel implementation - which allows it to run efficiently on the widest possible numberof computing platforms. These include serial, shared-memory and distributed-memoryparallel as well as heterogeneous platforms. Careful attention has been paid to thespecific nature of circuit-simulation problems to ensure that optimal parallel efficiencyis achieved as the number of processors grows.The development ofXyceprovides a platform for computational research and de-velopment aimed specifically at the needs of the Laboratory. WithXyce, Sandia hasan %22in-house%22 capability with which both new electrical (e.g., device model develop-ment) and algorithmic (e.g., faster time-integration methods, parallel solver algorithms)research and development can be performed. As a result,Xyceis a unique electricalsimulation capability

  14. Modelling End-User of Electronic-Government Service: The Role of Information quality, System Quality and Trust

    Science.gov (United States)

    Witarsyah Jacob, Deden; Fudzee, Mohd Farhan Md; Aizi Salamat, Mohamad; Kasim, Shahreen; Mahdin, Hairulnizam; Azhar Ramli, Azizul

    2017-08-01

    Many governments around the world increasingly use internet technologies such as electronic government to provide public services. These services range from providing the most basic informational website to deploying sophisticated tools for managing interactions between government agencies and beyond government. Electronic government (e-government) aims to provide a more accurate, easily accessible, cost-effective and time saving for the community. In this study, we develop a new model of e-government adoption service by extending the Unified Theory of Acceptance and Use of Technology (UTAUT) through the incorporation of some variables such as System Quality, Information Quality and Trust. The model is then tested using a large-scale, multi-site survey research of 237 Indonesian citizens. This model will be validated by using Structural Equation Modeling (SEM). The result indicates that System Quality, Information Quality and Trust variables proven to effect user behavior. This study extends the current understanding on the influence of System Quality, Information Quality and Trust factors to researchers, practitioners, and policy makers.

  15. Cue-reactivity in experienced electronic cigarette users: Novel stimulus videos and a pilot fMRI study.

    Science.gov (United States)

    Nichols, Travis T; Foulds, Jonathan; Yingst, Jessica M; Veldheer, Susan; Hrabovsky, Shari; Richie, John; Eissenberg, Thomas; Wilson, Stephen J

    2016-05-01

    Some individuals who try electronic cigarettes (e-cigarettes) continue to use long-term. Previous research has investigated the safety of e-cigarettes and their potential for use in smoking cessation, but comparatively little research has explored chronic or habitual e-cigarette use. In particular, the relationship between e-cigarette cues and craving is unknown. We sought to bridge this gap by developing a novel set of e-cigarette (salient) and electronic toothbrush (neutral) videos for use in cue-reactivity paradigms. Additionally, we demonstrate the utility of this approach in a pilot fMRI study of 7 experienced e-cigarette users. Participants were scanned while viewing the cue videos before and after 10min use of their own e-cigarettes (producing an 11.7ng/ml increase in plasma nicotine concentration). A significant session (pre- and post-use) by video type (salient and neutral) interaction was exhibited in many sensorimotor areas commonly activated in other cue-reactivity paradigms. We did not detect significant cue-related activity in other brain regions notable in the craving literature. Possible reasons for this discrepancy are discussed, including the importance of matching cue stimuli to participants' experiences. Copyright © 2015 Elsevier Inc. All rights reserved.

  16. Converting a paper proforma template to a user friendly electronic database to collect traumatic brain injury data

    Directory of Open Access Journals (Sweden)

    Prasad M. Veera

    2014-12-01

    Full Text Available A structured reporting system which is based on a uniform template will permit uniform data collection and future statistics and will facilitate and validate independent or comparative audit of performance and quality of care. The successful establishment of a multi-center registry depends on the development of a concise data entry form, data entry system and data analysis to continuously maintain the registry. In the first phase we introduced the paper data collection form, in second phase this data form was converted to an electronic interface. In this second phase of the study the paper proforma which was developed in the first phase was converted into an electronic database by using the FileMaker Pro 13 Advanced®. The FileMaker Pro 13 Advanced® is capable to store the data, provides user friendly interface to enter data and can be converted the standalone runtime program to install in any other computer system. The next step is to explore the possibility whether it would be feasible to use this as a multicenter traumatic brain injury registry.

  17. Possibilities of dynamic biometrics for authentication and the circumstances for using dynamic biometric signature

    Directory of Open Access Journals (Sweden)

    Frantisek Hortai

    2018-01-01

    Full Text Available New information technologies alongside their benefits also bring new dangers with themselves. It is difficult to decide which authentication tool to use and implement in the information systems and electronic documents. The final decision has to compromise among the facts that it faces several conflicting requirements: highly secure tool, to be a user-friendly and user simplicity method, ensure protection against errors and failures of users, speed of authentication and provide these features for a reasonable price. Even when the compromised solution is found it has to fulfill the given technology standards. For the listed reasons the paper argues one of the most natural biometric authentication method the dynamic biometric signature and lists its related standards. The paper also includes measurement evaluation which solves the independence between the person’s signature and device on which it was created

  18. Using a Patient Portal to Transmit Patient Reported Health Information into the Electronic Record: Workflow Implications and User Experience.

    Science.gov (United States)

    Sorondo, Barbara; Allen, Amy; Bayleran, Janet; Doore, Stacy; Fathima, Samreen; Sabbagh, Iyad; Newcomb, Lori

    2016-01-01

    This project implemented an integrated patient self-reported screening tool in a patient portal and assessed clinical workflow and user experience in primary care practices. An electronic health risk assessment based on the CMS Annual Wellness Visit (AWV) was developed to integrate self-reported health information into the patient's electronic health record (EHR). Patients enrolled in care coordination tested the implementation. The evaluation plan included quantitative and qualitative measures of patient adoption, provider adoption, workflow impact, financial impact, and technology impact. Seventy-two patients completed the sample AWV, and 80% of the questionnaires had clinical findings that required provider follow-up. Patients expressed satisfaction with the portal, as it enabled them to view their health record and enter information. Implementation did not reduce office staff time. Providers and office staff agreed that an electronic system for adding information to their record would increase patient satisfaction, but they expressed concern with the need to promptly review the information and the time involved to accomplish this prior to an office visit. Despite satisfaction among patients, portal adoption is still low, due to technological limitations and to the lack of adaptability to primary care practice workflow. Notwithstanding those barriers, the use of the portal for completion of repetitive tasks, such as screening tools, should be encouraged. Patients can effectively use portals to complete the patient reported section of the CMS AWV. However, if the information is not completed during the same day of the office visit, the time required to address health findings outside of a regular office visit is uncompensated, and diminished the enthusiasm for this process among primary care practice staff.

  19. The SPRITE and POS-SPRITE user report: An extensible calculation of particle, positron and electron implantation in solids

    International Nuclear Information System (INIS)

    Ritley, K.A.; Ghosh, V.J.; Lynn, K.G.; McKewown, M.; Welch, D.O.

    1997-01-01

    SPRITE (Simulation of Particle Reemission, Implantation and Transmission--Extensible) is a Fortran computer program designed to model the transport of a stream of energetic particles as they scatter through a solid or multilayer. SPRITE is intended to be a user-friendly and easily-extensible engine for performing basic transport calculations, and SPRITE incorporates such physics as is required to simulate the transport process, but specifically omits the details of the scattering mechanisms. PSPRITE is a Fortran computer program, built around the SPRITE transport engine and incorporating physical information necessary for modeling the implantation and thermalization of a stream of positrons or electrons with a solid. This document is intended to be the primary source of information and the only operations manual for SPRITE and the POS-SPRITE family of programs. This information includes the mode of operation of SPRITE, the format of the required and optional file types, as well as information about the output and results of the calculation. Information about installing and running these programs on a variety of computer systems will not be addressed in this report. Such information is rapidly expanding as these programs are adapted to run on different platforms, and thus the user can expect such information to be contained with the source code distribution set. Detailed information about the calculations of the structure of the POS-SPRITE programs are provided in this report, but detailed benchmark comparisons between the output of these calculations and experimental data are an active topic of research, and they refer the reader to the published literature for this information

  20. Towards a better understanding of the e-health user: comparing USE IT and Requirements study for an Electronic Patient Record.

    NARCIS (Netherlands)

    Spil, Antonius A.M.; Schuring, R.W.; Stegwee, R.A.; Michel-Verkerke, Margreet B.

    2005-01-01

    This paper compares a traditional requirements study with 22 interviews for the design of an electronic patient record (EPR) and a USE IT analysis with 17 interviews trying to understand the end- user of an EPR. Developing, implementing and using information technology in organizations is a complex

  1. Comprehensive evaluation of electronic medical record system use and user satisfaction at five low-resource setting hospitals in ethiopia.

    Science.gov (United States)

    Tilahun, Binyam; Fritz, Fleur

    2015-05-25

    Electronic medical record (EMR) systems are increasingly being implemented in hospitals of developing countries to improve patient care and clinical service. However, only limited evaluation studies are available concerning the level of adoption and determinant factors of success in those settings. The objective of this study was to assess the usage pattern, user satisfaction level, and determinants of health professional's satisfaction towards a comprehensive EMR system implemented in Ethiopia where parallel documentation using the EMR and the paper-based medical records is in practice. A quantitative, cross-sectional study design was used to assess the usage pattern, user satisfaction level, and determinant factors of an EMR system implemented in Ethiopia based on the DeLone and McLean model of information system success. Descriptive statistical methods were applied to analyze the data and a binary logistic regression model was used to identify determinant factors. Health professionals (N=422) from five hospitals were approached and 406 responded to the survey (96.2% response rate). Out of the respondents, 76.1% (309/406) started to use the system immediately after implementation and user training, but only 31.7% (98/309) of the professionals reported using the EMR during the study (after 3 years of implementation). Of the 12 core EMR functions, 3 were never used by most respondents, and they were also unaware of 4 of the core EMR functions. It was found that 61.4% (190/309) of the health professionals reported over all dissatisfaction with the EMR (median=4, interquartile range (IQR)=1) on a 5-level Likert scale. Physicians were more dissatisfied (median=5, IQR=1) when compared to nurses (median=4, IQR=1) and the health management information system (HMIS) staff (median=2, IQR=1). Of all the participants, 64.4% (199/309) believed that the EMR had no positive impact on the quality of care. The participants indicated an agreement with the system and information

  2. A search algorithm for identifying likely users and non-users of marijuana from the free text of the electronic medical record.

    Science.gov (United States)

    Keyhani, Salomeh; Vali, Marzieh; Cohen, Beth; Woodbridge, Alexandra; Arenson, Melanie; Eilkhani, Elnaz; Aivadyan, Christina; Hasin, Deborah

    2018-01-01

    The harmful effects of marijuana on health and in particular cardiovascular health are understudied. To develop such knowledge, an efficient method of developing an informative cohort of marijuana users and non-users is needed. We identified patients with a diagnosis of coronary artery disease using ICD-9 codes who were seen in the San Francisco VA in 2015. We imported these patients' medical record notes into an informatics platform that facilitated text searches. We categorized patients into those with evidence of marijuana use in the past 12 months and patients with no such evidence, using the following text strings: "marijuana", "mjx", and "cannabis". We randomly selected 51 users and 51 non-users based on this preliminary classification, and sent a recruitment letter to 97 of these patients who had contact information available. Patients were interviewed on marijuana use and domains related to cardiovascular health. Data on marijuana use collected from the medical record was compared to data collected as part of the interview. The interview completion rate was 71%. Among the 35 patients identified by text strings as having used marijuana in the previous year, 15 had used marijuana in the past 30 days (positive predictive value = 42.9%). The probability of use in the past month increased from 8.8% to 42.9% in people who have these keywords in their medical record compared to those who did not have these terms in their medical record. Methods that combine text search strategies for participant recruitment with health interviews provide an efficient approach to developing prospective cohorts that can be used to study the health effects of marijuana.

  3. SIGNATURE: A workbench for gene expression signature analysis

    Directory of Open Access Journals (Sweden)

    Chang Jeffrey T

    2011-11-01

    Full Text Available Abstract Background The biological phenotype of a cell, such as a characteristic visual image or behavior, reflects activities derived from the expression of collections of genes. As such, an ability to measure the expression of these genes provides an opportunity to develop more precise and varied sets of phenotypes. However, to use this approach requires computational methods that are difficult to implement and apply, and thus there is a critical need for intelligent software tools that can reduce the technical burden of the analysis. Tools for gene expression analyses are unusually difficult to implement in a user-friendly way because their application requires a combination of biological data curation, statistical computational methods, and database expertise. Results We have developed SIGNATURE, a web-based resource that simplifies gene expression signature analysis by providing software, data, and protocols to perform the analysis successfully. This resource uses Bayesian methods for processing gene expression data coupled with a curated database of gene expression signatures, all carried out within a GenePattern web interface for easy use and access. Conclusions SIGNATURE is available for public use at http://genepattern.genome.duke.edu/signature/.

  4. Research on a New Signature Scheme on Blockchain

    Directory of Open Access Journals (Sweden)

    Chao Yuan

    2017-01-01

    Full Text Available With the rise of Bitcoin, blockchain which is the core technology of Bitcoin has received increasing attention. Privacy preserving and performance on blockchain are two research points in academia and business, but there are still some unresolved issues in both respects. An aggregate signature scheme is a digital signature that supports making signatures on many different messages generated by many different users. Using aggregate signature, the size of the signature could be shortened by compressing multiple signatures into a single signature. In this paper, a new signature scheme for transactions on blockchain based on the aggregate signature was proposed. It was worth noting that elliptic curve discrete logarithm problem and bilinear maps played major roles in our signature scheme. And the security properties of our signature scheme were proved. In our signature scheme, the amount will be hidden especially in the transactions which contain multiple inputs and outputs. Additionally, the size of the signature on transaction is constant regardless of the number of inputs and outputs that the transaction contains, which can improve the performance of signature. Finally, we gave an application scenario for our signature scheme which aims to achieve the transactions of big data on blockchain.

  5. Hair testing to assess both known and unknown use of drugs amongst ecstasy users in the electronic dance music scene.

    Science.gov (United States)

    Palamar, Joseph J; Salomone, Alberto; Gerace, Enrico; Di Corcia, Daniele; Vincenti, Marco; Cleland, Charles M

    2017-10-01

    Data on both known and unknown drug use in the electronic dance music (EDM) scene is important to inform prevention and harm reduction. While surveys are the most common method of querying drug use, additional biological data can help validate use and detect unknown/unintentional use of drugs such as new psychoactive substances (NPS). We sought to determine the extent of both known and unknown use of various substances in this high-risk scene. We hair-tested 90 self-reported past-year ecstasy/MDMA/Molly users attending EDM parties in New York City during the summer of 2016 using UHPLC-MS/MS. Results were compared to self-reported past-year use. Three quarters (74.4%) tested positive for MDMA, a third (33.3%) tested positive for an NPS, and 27.8% tested positive specifically for one or more synthetic cathinones (e.g., butylone, ethylone, pentylone, methylone, alpha-PVP). Half (51.1%) of participants tested positive for a drug not self-reported, with most testing positive for synthetic cathinones (72.0%), methamphetamine (69.0%), other NPS stimulants (e.g., 4-FA, 5/6-APB; 66.7%), or new dissociatives (e.g., methoxetamine, diphenidine; 60.0%). Attending parties every other week or more often, reporting higher-frequency ecstasy pill use, having tested one's ecstasy, and having found out one's ecstasy was adulterated, were risk factors for testing positive for synthetic cathinones and NPS in general. Hair testing appears to be a valuable addition to drug epidemiology studies. Many EDM party attendees-even those who test their ecstasy-are unknowingly using NPS and/or other drugs. Prevention information and harm reduction may help reduce unknown/unintentional use. Copyright © 2017 Elsevier B.V. All rights reserved.

  6. 27 CFR 73.32 - May I electronically sign forms I submit electronically to TTB?

    Science.gov (United States)

    2010-04-01

    ... ELECTRONIC SIGNATURES; ELECTRONIC SUBMISSION OF FORMS Electronic Filing of Documents with TTB § 73.32 May I electronically sign forms I submit electronically to TTB? You may electronically sign the electronic form you... use, that the electronic signatures or digital signatures in your system are intended to be the...

  7. Search for an mSUGRA signature in the electron + jets + missing transverse energy final state in $p\\bar{p}$ collisions at √s = 1.8TeV

    Energy Technology Data Exchange (ETDEWEB)

    Zhou, Zhang [Iowa State Univ., Ames, IA (United States)

    2001-01-01

    We describe a search for a Minimal Supergravity (mSUGRA) signature in Run 1 data taken by the D detector at the Fermilab Tevatron from 1995-1996. The total data luminosity is 92.7 pb-1. The data were examined for events with a single electron, four or more jets and large missing transverse energy. The major backgrounds are from W+jets, QCD, t$\\bar{t}$, and WW events. We observed no excess of events in our data. Based on the data and the expected signal rate we obtain new limits on new physics in terms of mSUGRA model parameters.

  8. The Converging Inflow Spectrum Is an Intrinsic Signature for a Black Hole: Monte Carlo Simulations of Comptonization on Free-falling Electrons

    Science.gov (United States)

    Laurent, Philippe; Titarchuk, Lev

    1999-01-01

    An accreting black hole is, by definition, characterized by the drain. Namely, matter falls into a black hole much the same way as water disappears down a drain: matter goes in and nothing comes out. As this can only happen in a black hole, it provides a way to see ``a black hole,'' a unique observational signature of black holes. The accretion proceeds almost in a free-fall manner close to the black hole horizon, where the strong gravitational field dominates the pressure forces. In this paper we calculate (by using Monte Carlo simulations) the specific features of X-ray spectra formed as a result of upscattering of the soft (disk) photons in the converging inflow (CI) within about 3 Schwarzschild radii of the black hole. The full relativistic treatment has been implemented to reproduce these spectra. We show that spectra in the soft state of black hole systems (BHS) can be described as the sum of a thermal (disk) component and the convolution of some fraction of this component with the CI upscattering spread (Green's) function. The latter boosted photon component is seen as an extended power law at energies much higher than the characteristic energy of the soft photons. We demonstrate the stability of the power spectral index (α=1.8+/-0.1) over a wide range of the plasma temperature, 0-10 keV, and mass accretion rates (higher than 2 in Eddington units). We also demonstrate that the sharp high-energy cutoff occurs at energies of 200-400 keV, which are related to the average energy of electrons mec2 impinging on the event horizon. The spectrum is practically identical to the standard thermal Comptonization spectrum (Hua & Titarchuk) when the CI plasma temperature is getting of order of 50 keV (the typical ones for the hard state of BHS). In this case one can see the effect of the bulk motion only at high energies, where there is an excess in the CI spectrum with respect to the pure thermal one. Furthermore, we demonstrate that the change of spectral shapes from

  9. Near-real time forecasts of MeV protons based on sub-relativistic electrons: communicating the outputs to the end users

    Science.gov (United States)

    Sarlanis, Christos; Heber, Bernd; Labrenz, Johannes; Kühl, Patrick; Marquardt, Johannes; Dimitroulakos, John; Papaioannou, Athanasios; Posner, Arik

    2017-04-01

    Solar Energetic Particle (SEP) events are one of the most important elements of space weather. Given that the complexity of the underlying physical processes of the acceleration and propagation of SEP events is still a very active research area, the prognosis of SEP event occurrence and their corresponding characteristics remains challenging. In order to provide up to an hour warning time before these particles arrive at Earth, relativistic electron and below 50 MeV proton data from the Electron Proton Helium Instrument (EPHIN) on SOHO were used to implement the 'Relativistic Electron Alert System for Exploration (REleASE)'. The REleASE forecasting scheme was recently rewritten in the open access programming language PYTHON and will be made publicly available. As a next step, along with relativistic electrons (v > 0.9 c) provided by SOHO, near-relativistic (v c) electron measurements from other instruments like the Electron Proton Alpha Monitor (EPAM) aboard the Advanced Composition Explorer (ACE) have been utilized. In this work, we demonstrate the real-time outputs derived by the end user from the REleASE using both SOHO/EPHIN and ACE/EPAM. We further, show a user friendly illustration of the outputs that make use of a "traffic light" to monitor the different warning stages: quiet, warning, alert offering a simple guidance to the end users. Finally, the capabilities offered by this new system, accessing both the pictorial and textural outputs REleASE are being presented. This work has received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 637324.

  10. Urinary Metabolite Levels of Flame Retardants in Electronic Cigarette Users: A Study Using the Data from NHANES 2013–2014

    Directory of Open Access Journals (Sweden)

    Binnian Wei

    2018-01-01

    Full Text Available Evaluating the safety of e-cigarettes and making informed judgement about developing potential standards require sufficient scientific evidence. Since e-cigarettes are highly engineered products containing plastic, glass and metal parts, and e-liquids are largely different matrices, many toxic compounds which are not typical hazards for the users of combustible tobacco products (e.g., cigarettes, could exist in e-liquids, and consequently, posing potential health risk to e-cigarette users. We combined the measurements of urinary metabolites of organophosphate flame retardants (OPFRs with questionnaire data collected in the National Health and Nutrition Examination Surveys (NHANES from 2013 to 2014, and we compared adjusted geometric means (GM for each biomarker in e-cigarette users with levels in non-users and users of various tobacco products using multiple regression analyses to adjust for potential confounders. We found diphenyl phosphate (DPhP, bis(1,3-dichloro-2-propyl phosphate (BDCPP, bis(2-chloroethyl phosphate (BCEP, and dibutyl phosphate (DBUP were detected in all e-cigarette users. The adjusted GM of BCEP, the metabolite of tris(2-chloroethyl phosphate (TCEP, was 81% higher than nonusers (p = 0.0124 and significantly higher than those for both cigarette and cigar users (p < 0.05. The findings in this pilot study suggest that certain OPFRs may present in e-cigarettes as contaminants, and consequently, resulting in higher exposure levels in e-cigarette users compared to nonusers. As we only identified 14 e-cigarette users in the survey, the findings in this study need to be confirmed in future study at a larger scale. A better examination of the types and levels of FRs and their potential contamination sources in e-cigarettes is also needed.

  11. Preliminary results of an examination of electronic cigarette user puff topography: the effect of a mouthpiece-based topography measurement device on plasma nicotine and subjective effects.

    Science.gov (United States)

    Spindle, Tory R; Breland, Alison B; Karaoghlanian, Nareg V; Shihadeh, Alan L; Eissenberg, Thomas

    2015-02-01

    Electronic cigarettes (ECIGs) heat a nicotine-containing solution; the resulting aerosol is inhaled by the user. Nicotine delivery may be affected by users' puffing behavior (puff topography), and little is known about the puff topography of ECIG users. Puff topography can be measured using mouthpiece-based computerized systems. However, the extent to which a mouthpiece influences nicotine delivery and subjective effects in ECIG users is unknown. Plasma nicotine concentration, heart rate, and subjective effects were measured in 13 experienced ECIG users who used their preferred ECIG and liquid (≥ 12 mg/ml nicotine) during 2 sessions (with or without a mouthpiece). In both sessions, participants completed an ECIG use session in which they were instructed to take 10 puffs with 30-second inter-puff intervals. Puff topography was recorded in the mouthpiece condition. Almost all measures of the effects of ECIG use were independent of topography measurement. Collapsed across session, mean plasma nicotine concentration increased by 16.8 ng/ml, and mean heart rate increased by 8.5 bpm (ps topography measurement equipment, ECIG-using participants took larger and longer puffs with lower flow rates. In experienced ECIG users, measuring ECIG topography did not influence ECIG-associated nicotine delivery or most measures of withdrawal suppression. Topography measurement systems will need to account for the low flow rates observed for ECIG users. © The Author 2014. Published by Oxford University Press on behalf of the Society for Research on Nicotine and Tobacco. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  12. Quantum signature scheme for known quantum messages

    International Nuclear Information System (INIS)

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  13. Signature simulation of mixed materials

    Science.gov (United States)

    Carson, Tyler D.; Salvaggio, Carl

    2015-05-01

    Soil target signatures vary due to geometry, chemical composition, and scene radiometry. Although radiative transfer models and function-fit physical models may describe certain targets in limited depth, the ability to incorporate all three signature variables is difficult. This work describes a method to simulate the transient signatures of soil by first considering scene geometry synthetically created using 3D physics engines. Through the assignment of spectral data from the Nonconventional Exploitation Factors Data System (NEFDS), the synthetic scene is represented as a physical mixture of particles. Finally, first principles radiometry is modeled using the Digital Imaging and Remote Sensing Image Generation (DIRSIG) model. With DIRSIG, radiometric and sensing conditions were systematically manipulated to produce and record goniometric signatures. The implementation of this virtual goniometer allows users to examine how a target bidirectional reflectance distribution function (BRDF) will change with geometry, composition, and illumination direction. By using 3D computer graphics models, this process does not require geometric assumptions that are native to many radiative transfer models. It delivers a discrete method to circumnavigate the significant cost of time and treasure associated with hardware-based goniometric data collections.

  14. User experience analysis of e-TB Manager, a nationwide electronic tuberculosis recording and reporting system in Ukraine

    Directory of Open Access Journals (Sweden)

    Niranjan Konduri

    2017-05-01

    Full Text Available Ukraine has successfully implemented e-TB Manager nationwide as its mandatory national tuberculosis registry after first introducing it in 2009. Our objective was to perform an end-of-programme evaluation after formal handover of the registry administration to Ukraine's Centre for Disease Control in 2015. We conducted a nationwide, cross-sectional, anonymous, 18-point user experience survey, and stratified the registry's transaction statistics to demonstrate usability. Contrary to initial implementation experience, older users (aged >50 years, often with limited or no computer proficiency prior to using the registry, had significantly better user experience scores for at least six of the 12 measures compared to younger users (aged 18–29 years. Using the registry for >3 years was associated with significantly higher scores for having capacity, adequacy of training received and satisfaction with the registry. Of the 5.9 million transactions over a 4-year period, nine out of 24 oblasts (regions and Kiev city accounted for 62.5% of all transactions, and corresponded to 59% of Ukraine's tuberculosis burden. There were 437 unique active users in 486 rayons (districts of Ukraine, demonstrating extensive reach. Our key findings complement the World Health Organization and European Respiratory Society's agenda for action on digital health to help implement the End TB Strategy.

  15. User experience analysis of e-TB Manager, a nationwide electronic tuberculosis recording and reporting system in Ukraine.

    Science.gov (United States)

    Konduri, Niranjan; Sawyer, Kelly; Nizova, Nataliya

    2017-04-01

    Ukraine has successfully implemented e-TB Manager nationwide as its mandatory national tuberculosis registry after first introducing it in 2009. Our objective was to perform an end-of-programme evaluation after formal handover of the registry administration to Ukraine's Centre for Disease Control in 2015. We conducted a nationwide, cross-sectional, anonymous, 18-point user experience survey, and stratified the registry's transaction statistics to demonstrate usability. Contrary to initial implementation experience, older users (aged >50 years), often with limited or no computer proficiency prior to using the registry, had significantly better user experience scores for at least six of the 12 measures compared to younger users (aged 18-29 years). Using the registry for >3 years was associated with significantly higher scores for having capacity, adequacy of training received and satisfaction with the registry. Of the 5.9 million transactions over a 4-year period, nine out of 24 oblasts (regions) and Kiev city accounted for 62.5% of all transactions, and corresponded to 59% of Ukraine's tuberculosis burden. There were 437 unique active users in 486 rayons (districts) of Ukraine, demonstrating extensive reach. Our key findings complement the World Health Organization and European Respiratory Society's agenda for action on digital health to help implement the End TB Strategy.

  16. User-composable Electronic Health Record Improves Efficiency of Clinician Data Viewing for Patient Case Appraisal: A Mixed-Methods Study.

    Science.gov (United States)

    Senathirajah, Yalini; Kaufman, David; Bakken, Suzanne

    2016-01-01

    Challenges in the design of electronic health records (EHRs) include designing usable systems that must meet the complex, rapidly changing, and high-stakes information needs of clinicians. The ability to move and assemble elements together on the same page has significant human-computer interaction (HCI) and efficiency advantages, and can mitigate the problems of negotiating multiple fixed screens and the associated cognitive burdens. We compare MedWISE-a novel EHR that supports user-composable displays-with a conventional EHR in terms of the number of repeat views of data elements for patient case appraisal. The study used mixed-methods for examination of clinical data viewing in four patient cases. The study compared use of an experimental user-composable EHR with use of a conventional EHR, for case appraisal. Eleven clinicians used a user-composable EHR in a case appraisal task in the laboratory setting. This was compared with log file analysis of the same patient cases in the conventional EHR. We investigated the number of repeat views of the same clinical information during a session and across these two contexts, and compared them using Fisher's exact test. There was a significant difference (puser-composable EHR (14.6 percent) and conventional EHR (72.6 percent). Users of conventional EHRs repeatedly viewed the same information elements in the same session, as revealed by log files. Our findings are consistent with the hypothesis that conventional systems require that the user view many screens and remember information between screens, causing the user to forget information and to have to access the information a second time. Other mechanisms (such as reduction in navigation over a population of users due to interface sharing, and information selection) may also contribute to increased efficiency in the experimental system. Systems that allow a composable approach that enables the user to gather together on the same screen any desired information elements

  17. Low Signature Tent Structures

    National Research Council Canada - National Science Library

    Cox, Randy

    1998-01-01

    .... Modeling shows that visual, near infrared, thermal, and radar signatures should be reduced when compared to other current tent designs. A brief treatise on the role of tent signatures and their results is included.

  18. End-user support for a primary care electronic medical record: a qualitative case study of a vendor’s perspective

    Directory of Open Access Journals (Sweden)

    Aviv Shachak

    2013-05-01

    Full Text Available Background In primary care settings, users often rely on vendors to provide support for health information technology (HIT. Yet, little is known about the vendors’ perspectives on the support they provide, how support personnel perceive their roles, the challenges they face and the ways they deal with them.Objective To provide in-depth insight into an electronic-medical record (EMR vendor’s perspective on end-user support.Methods As part of a larger case study research, we conducted nine semi-structured interviews with help desk staff, trainers and service managers of an EMR vendor, and observed two training sessions of a new client.Results With a growing client base, the vendor faced challenges of support staff shortage and high variance in users’ technical knowledge. Additionally, users sometimes needed assistance with infrastructure, and not just software problems. These challenges sometimes hindered the provision of timely support and required supporters to possess good interpersonal skills and adapt to diverse client population.Conclusion This study highlights the complexity of providing end-user support for HIT. With increased adoption, other vendors are likely to face similar challenges. To deal with these issues, supporters need not only strong technical knowledge of the systems, but also good interpersonal communication skills. Some responsibilities may be delegated to super-users. Users may find it useful to hire local IT staff, at least on an on-call basis, to provide assistance with infrastructure problems, which are not supported by the software vendor. Vendors may consider expanding their service packages to cover these elements.

  19. User's manual for EXALPHA (a code for calculating electronic properties of molecules). [Muscatel code, multiply scattered electron approximation

    Energy Technology Data Exchange (ETDEWEB)

    Jones, H.D.

    1976-06-01

    The EXALPHA procedures provide a simplified method for running the MUSCATEL computer code, which in turn is used for calculating electronic properties of simple molecules and atomic clusters, based on the multiply scattered electron approximation for the wave equations. The use of the EXALPHA procedures to set up a run of MUSCATEL is described.

  20. Have combustible cigarettes met their match? The nicotine delivery profiles and harmful constituent exposures of second-generation and third-generation electronic cigarette users

    Science.gov (United States)

    Wagener, Theodore L; Floyd, Evan L; Stepanov, Irina; Driskill, Leslie M; Frank, Summer G; Meier, Ellen; Leavens, Eleanor L; Tackett, Alayna P; Molina, Neil; Queimado, Lurdes

    2017-01-01

    Introduction Electronic cigarettes’ (e-cigarettes) viability as a public health strategy to end smoking will likely be determined by their ability to mimic the pharmacokinetic profile of a cigarette while also exposing users to significantly lower levels of harmful/potentially harmful constituents (HPHCs). The present study examined the nicotine delivery profile of third- (G3) versus second-generation (G2) e-cigarette devices and their users’ exposure to nicotine and select HPHCs compared with cigarette smokers. Methods 30 participants (10 smokers, 9 G2 and 11 G3 users) completed baseline questionnaires and provided exhaled carbon monoxide (eCO), saliva and urine samples. Following a 12-hour nicotine abstinence, G2 and G3 users completed a 2-hour vaping session (ie, 5 min, 10-puff bout followed by ad libitum puffing for 115 min). Blood samples, subjective effects, device characteristics and e-liquid consumption were assessed. Results Smokers, G2 and G3 users had similar baseline levels of cotinine, but smokers had 4 and 7 times higher levels of eCO (pvaped e-cigarette liquids with significantly lower nicotine concentrations. During the vaping session, G3 users achieved significantly higher plasma nicotine concentrations than G2 users following the first 10 puffs (17.5 vs 7.3 ng/mL, respectively) and at 25 and 40 min of ad libitum use. G3 users consumed significantly more e-liquid than G2 users. Vaping urges/withdrawal were reduced following 10 puffs, with no significant differences between device groups. Discussion Under normal use conditions, both G2 and G3 devices deliver cigarette-like amounts of nicotine, but G3 devices matched the amount and speed of nicotine delivery of a conventional cigarette. Compared with cigarettes, G2 and G3 e-cigarettes resulted in significantly lower levels of exposure to a potent lung carcinogen and cardiovascular toxicant. These findings have significant implications for understanding the addiction potential of these devices and

  1. Restrictive partially blind signature for resource-constrained information systems

    NARCIS (Netherlands)

    Qiu, Weidong; Gong, Zheng; Liu, Bozhong; Long, Yu; Chen, Kefei

    2010-01-01

    Restrictive partially blind signature, which is designed for privacy oriented information systems, allows a user to obtain a blind signature from a signer whilst the blind message must obey some certain rules. In order to reduce storage and communication costs, several public-key cryptosystems are

  2. Cue-reactivity in experienced electronic cigarette users: Novel stimulus videos and a pilot fMRI study

    OpenAIRE

    Nichols, Travis T.; Foulds, Jonathan; Yingst, Jessica; Veldheer, Susan; Hrabovsky, Shari; Richie, John; Eissenberg, Thomas; Wilson, Stephen J.

    2015-01-01

    Some individuals who try electronic cigarettes (e-cigarettes) continue to use long-term. Previous research has investigated the safety of e-cigarettes and their potential for use in smoking cessation, but comparatively little research has explored chronic or habitual e-cigarette use. In particular, the relationship between e-cigarette cues and craving is unknown. We sought to bridge this gap by developing a novel set of e-cigarette (salient) and electronic toothbrush (neutral) videos for use ...

  3. Report on the workshop for potential users of the Argonne Linear Free-Electron Laser Facility (ALFF)

    International Nuclear Information System (INIS)

    Kim, K. J.

    2004-01-01

    On October 30-31, 2003 over 60 scientists gathered at ANL to discuss potential science that could be done with a fully operational user facility dedicated to delivering widely tunable, short pulse, high peak power vacuum ultraviolet light. The charge given to the workshop by J. Murray Gibson, ANL Associate Lab Director for the Advanced Photon Source, included the following two points: (1) What are the scientifically important experiments that can only be done with the proposed ALFF facility? (2) Are the combined ALFF characteristics of pulse energy, tunability, pulse length, and coherence sufficiently unique to justify establishing a user facility at this time? To fulfill this two-point charge, special emphasis was placed by the workshop committee on two goals. First, scientists were invited who work in areas where the lack of powerful, tunable VUV is a limitation to speak about their current research and to speculate on the science that would be uniquely possible with the ALFF. Second, while many of the same scientists have expertise in using lasers and other VUV sources, it was considered crucial to invite scientists explicitly working on the development of tabletop VUV systems. In addition to addressing the second charge question, the purpose of inviting people with expertise in VUV source development was to raise awareness of the state of the art in tabletop VUV and soft x-ray sources, and to provide a discussion on potential combinations of FEL and tabletop sources (for example, in seeding and pump-probe arrangements). This report briefly summarizes the talks presented at this workshop and highlights some of the user needs that this facility can fulfill. The full presentations may be accessed online at www.aps.anl.gov/conferences/ALFFworkshop. The workshop was organized around four working groups to focus the discussions among scientists with similar backgrounds. These groups were: Atomic, Molecular, Optical (AMO) and Chemical Physics;. Cosmochemistry and

  4. Identity-Based Verifiably Encrypted Signatures without Random Oracles

    Science.gov (United States)

    Zhang, Lei; Wu, Qianhong; Qin, Bo

    Fair exchange protocol plays an important role in electronic commerce in the case of exchanging digital contracts. Verifiably encrypted signatures provide an optimistic solution to these scenarios with an off-line trusted third party. In this paper, we propose an identity-based verifiably encrypted signature scheme. The scheme is non-interactive to generate verifiably encrypted signatures and the resulting encrypted signature consists of only four group elements. Based on the computational Diffie-Hellman assumption, our scheme is proven secure without using random oracles. To the best of our knowledge, this is the first identity-based verifiably encrypted signature scheme provably secure in the standard model.

  5. Development of a user-friendly system for image processing of electron microscopy by integrating a web browser and PIONE with Eos.

    Science.gov (United States)

    Tsukamoto, Takafumi; Yasunaga, Takuo

    2014-11-01

    Eos (Extensible object-oriented system) is one of the powerful applications for image processing of electron micrographs. In usual cases, Eos works with only character user interfaces (CUI) under the operating systems (OS) such as OS-X or Linux, not user-friendly. Thus, users of Eos need to be expert at image processing of electron micrographs, and have a little knowledge of computer science, as well. However, all the persons who require Eos does not an expert for CUI. Thus we extended Eos to a web system independent of OS with graphical user interfaces (GUI) by integrating web browser.Advantage to use web browser is not only to extend Eos with GUI, but also extend Eos to work under distributed computational environment. Using Ajax (Asynchronous JavaScript and XML) technology, we implemented more comfortable user-interface on web browser. Eos has more than 400 commands related to image processing for electron microscopy, and the usage of each command is different from each other. Since the beginning of development, Eos has managed their user-interface by using the interface definition file of "OptionControlFile" written in CSV (Comma-Separated Value) format, i.e., Each command has "OptionControlFile", which notes information for interface and its usage generation. Developed GUI system called "Zephyr" (Zone for Easy Processing of HYpermedia Resources) also accessed "OptionControlFIle" and produced a web user-interface automatically, because its mechanism is mature and convenient,The basic actions of client side system was implemented properly and can supply auto-generation of web-form, which has functions of execution, image preview, file-uploading to a web server. Thus the system can execute Eos commands with unique options for each commands, and process image analysis. There remain problems of image file format for visualization and workspace for analysis: The image file format information is useful to check whether the input/output file is correct and we also

  6. Quantifying radionuclide signatures from a γ–γ coincidence system

    International Nuclear Information System (INIS)

    Britton, Richard; Jackson, Mark J.; Davies, Ashley V.

    2015-01-01

    A method for quantifying gamma coincidence signatures has been developed, and tested in conjunction with a high-efficiency multi-detector system to quickly identify trace amounts of radioactive material. The γ–γ system utilises fully digital electronics and list-mode acquisition to time–stamp each event, allowing coincidence matrices to be easily produced alongside typical ‘singles’ spectra. To quantify the coincidence signatures a software package has been developed to calculate efficiency and cascade summing corrected branching ratios. This utilises ENSDF records as an input, and can be fully automated, allowing the user to quickly and easily create/update a coincidence library that contains all possible γ and conversion electron cascades, associated cascade emission probabilities, and true-coincidence summing corrected γ cascade detection probabilities. It is also fully searchable by energy, nuclide, coincidence pair, γ multiplicity, cascade probability and half-life of the cascade. The probabilities calculated were tested using measurements performed on the γ–γ system, and found to provide accurate results for the nuclides investigated. Given the flexibility of the method, (it only relies on evaluated nuclear data, and accurate efficiency characterisations), the software can now be utilised for a variety of systems, quickly and easily calculating coincidence signature probabilities. - Highlights: • Monte-Carlo based software developed to easily create/update a coincidence signal library for environmental radionuclides. • Coincidence library utilised to accurately quantify gamma coincidence signatures. • All coincidence signature probabilities are corrected for cascade summing, conversion electron emission and pair production. • Key CTBTO relevant radionuclides have been tested to verify the calculated correction factors. • Accurately quantifying coincidence signals during routine analysis will allow dramatically improved detection

  7. Big Comsats for big jobs at low user cost. [considering wrist telephony, electronic mail transmission and educational television applications

    Science.gov (United States)

    Bekey, I.

    1979-01-01

    Three examples are used to illustrate what is possible with large space systems: (1) personal communications using wrist telephones, (2) electronic transmission of mail, and (3) wide dissemination of educational TV. Design concepts and costs are explored and compared to alternative ground-based concepts.

  8. Intentions to Smoke Cigarettes Among Never-Smoking US Middle and High School Electronic Cigarette Users: National Youth Tobacco Survey, 2011–2013

    Science.gov (United States)

    Agaku, Israel T.; Arrazola, René A.; Apelberg, Benjamin J.; Caraballo, Ralph S.; Corey, Catherine G.; Coleman, Blair N.; Dube, Shanta R.; King, Brian A.

    2015-01-01

    Introduction: Electronic cigarette (e-cigarette) use is increasing rapidly, and the impact on youth is unknown. We assessed associations between e-cigarette use and smoking intentions among US youth who had never smoked conventional cigarettes. Methods: We analyzed data from the nationally representative 2011, 2012, and 2013 National Youth Tobacco Surveys of students in grades 6–12. Youth reporting they would definitely not smoke in the next year or if offered a cigarette by a friend were defined as not having an intention to smoke; all others were classified as having positive intention to smoke conventional cigarettes. Demographics, pro-tobacco advertisement exposure, ever use of e-cigarettes, and ever use of other combustibles (cigars, hookah, bidis, kreteks, and pipes) and noncombustibles (chewing tobacco, snuff, dip, snus, and dissolvables) were included in multivariate analyses that assessed associations with smoking intentions among never-cigarette-smoking youth. Results: Between 2011 and 2013, the number of never-smoking youth who used e-cigarettes increased 3-fold, from 79,000 to more than 263,000. Intention to smoke conventional cigarettes was 43.9% among ever e-cigarette users and 21.5% among never users. Ever e-cigarette users had higher adjusted odds for having smoking intentions than never users (adjusted odds ratio = 1.70, 95% confidence interval = 1.24–2.32). Those who ever used other combustibles, ever used noncombustibles, or reported pro-tobacco advertisement exposure also had increased odds for smoking intentions. Conclusion: In 2013, more than a quarter million never-smoking youth used e-cigarettes. E-cigarette use is associated with increased intentions to smoke cigarettes, and enhanced prevention efforts for youth are important for all forms of tobacco, including e-cigarettes. PMID:25143298

  9. Intentions to smoke cigarettes among never-smoking US middle and high school electronic cigarette users: National Youth Tobacco Survey, 2011-2013.

    Science.gov (United States)

    Bunnell, Rebecca E; Agaku, Israel T; Arrazola, René A; Apelberg, Benjamin J; Caraballo, Ralph S; Corey, Catherine G; Coleman, Blair N; Dube, Shanta R; King, Brian A

    2015-02-01

    Electronic cigarette (e-cigarette) use is increasing rapidly, and the impact on youth is unknown. We assessed associations between e-cigarette use and smoking intentions among US youth who had never smoked conventional cigarettes. We analyzed data from the nationally representative 2011, 2012, and 2013 National Youth Tobacco Surveys of students in grades 6-12. Youth reporting they would definitely not smoke in the next year or if offered a cigarette by a friend were defined as not having an intention to smoke; all others were classified as having positive intention to smoke conventional cigarettes. Demographics, pro-tobacco advertisement exposure, ever use of e-cigarettes, and ever use of other combustibles (cigars, hookah, bidis, kreteks, and pipes) and noncombustibles (chewing tobacco, snuff, dip, snus, and dissolvables) were included in multivariate analyses that assessed associations with smoking intentions among never-cigarette-smoking youth. Between 2011 and 2013, the number of never-smoking youth who used e-cigarettes increased 3-fold, from 79,000 to more than 263,000. Intention to smoke conventional cigarettes was 43.9% among ever e-cigarette users and 21.5% among never users. Ever e-cigarette users had higher adjusted odds for having smoking intentions than never users (adjusted odds ratio = 1.70, 95% confidence interval = 1.24-2.32). Those who ever used other combustibles, ever used noncombustibles, or reported pro-tobacco advertisement exposure also had increased odds for smoking intentions. In 2013, more than a quarter million never-smoking youth used e-cigarettes. E-cigarette use is associated with increased intentions to smoke cigarettes, and enhanced prevention efforts for youth are important for all forms of tobacco, including e-cigarettes. Published by Oxford University Press on behalf of the Society for Research on Nicotine and Tobacco 2014. This work is written by (a) US Government employee(s) and is in the public domain in the US.

  10. Unconditionally Secure Quantum Signatures

    Directory of Open Access Journals (Sweden)

    Ryan Amiri

    2015-08-01

    Full Text Available Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols—signatures based on the Rivest–Adleman–Shamir (RSA algorithm, the digital signature algorithm (DSA, and the elliptic curve digital signature algorithm (ECDSA—are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally securesecure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  11. Radar Signature Calculation Facility

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: The calculation, analysis, and visualization of the spatially extended radar signatures of complex objects such as ships in a sea multipath environment and...

  12. Signatures of attosecond electronic-nuclear dynamics in the one-photon ionization of molecular hydrogen: analytical model versus ab initio calculations

    Science.gov (United States)

    Medišauskas, Lukas; Morales, Felipe; Palacios, Alicia; González-Castrillo, Alberto; Plimak, Lev; Smirnova, Olga; Martín, Fernando; Ivanov, Misha Yu

    2015-05-01

    We present an analytical model based on the time-dependent WKB approximation to reproduce the photoionization spectra of an H2 molecule in the autoionization region. We explore the nondissociative channel, which is the major contribution after one-photon absorption, and we focus on the features arising in the energy differential spectra due to the interference between the direct and the autoionization pathways. These features depend on both the timescale of the electronic decay of the autoionizing state and the time evolution of the vibrational wavepacket created in this state. With full ab initio calculations and with a one-dimensional approach that only takes into account the nuclear wavepacket associated to the few relevant electronic states we compare the ground state, the autoionizing state, and the background continuum electronic states. Finally, we illustrate how these features transform from molecular-like to atomic-like by increasing the mass of the system, thus making the electronic decay time shorter than the nuclear wavepacket motion associated with the resonant state. In other words, autoionization then occurs faster than the molecular dissociation into neutrals.

  13. Signatures of electron-magnon interaction in charge and spin currents through magnetic tunnel junctions: A nonequilibrium many-body perturbation theory approach

    Science.gov (United States)

    Mahfouzi, Farzad; Nikolić, Branislav K.

    2014-07-01

    We develop a numerically exact scheme for resumming certain classes of Feynman diagrams in the self-consistent perturbative expansion for the electron and magnon self-energies in the nonequilibrium Green function formalism applied to a coupled electron-magnon (e-m) system driven out of equilibrium by the applied finite bias voltage. Our scheme operates with the electronic and magnonic GFs and the corresponding self-energies viewed as matrices in the Keldysh space, rather than conventionally extracting their retarded and lesser components, which greatly simplifies translation of diagrams into compact mathematical expressions and their computational implementation. This is employed to understand the effect of inelastic e-m scattering on charge and spin current vs bias voltage Vb in F/I/F (F-ferromagnet; I-insulating barrier) magnetic tunnel junctions (MTJs), which are modeled on a quasi-one-dimensional (quasi-1D) tight-binding lattice for the electronic subsystem and quasi-1D Heisenberg model for the magnonic subsystem. For this purpose, we evaluate the Fock diagram for the electronic self-energy and the electron-hole polarization bubble diagram for the magnonic self-energy. The respective electronic and magnonic GF lines within these diagrams are the fully interacting ones, thereby requiring to solve the ensuing coupled system of nonlinear integral equations self-consistently. Despite using the quasi-1D model and treating e-m interaction in many-body fashion only within a small active region consisting of few lattice sites around the F/I interface, our analysis captures essential features of the so-called zero-bias anomaly observed [V. Drewello, J. Schmalhorst, A. Thomas, and G. Reiss, Phys. Rev. B 77, 014440 (2008), 10.1103/PhysRevB.77.014440] in both MgO- and AlOx-based realistic 3D MTJs where the second derivative d2I /dVb2 (i.e., inelastic electron tunneling spectrum) of charge current exhibits sharp peaks of opposite sign on either side Vb=0. We show that this

  14. Integrated Tiger Series of electron/photon Monte Carlo transport codes: a user's guide for use on IBM mainframes

    International Nuclear Information System (INIS)

    Kirk, B.L.

    1985-12-01

    The ITS (Integrated Tiger Series) Monte Carlo code package developed at Sandia National Laboratories and distributed as CCC-467/ITS by the Radiation Shielding Information Center (RSIC) at Oak Ridge National Laboratory (ORNL) consists of eight codes - the standard codes, TIGER, CYLTRAN, ACCEPT; the P-codes, TIGERP, CYLTRANP, ACCEPTP; and the M-codes ACCEPTM, CYLTRANM. The codes have been adapted to run on the IBM 3081, VAX 11/780, CDC-7600, and Cray 1 with the use of the update emulator UPEML. This manual should serve as a guide to a user running the codes on IBM computers having 370 architecture. The cases listed were tested on the IBM 3033, under the MVS operating system using the VS Fortran Level 1.3.1 compiler

  15. Electronic Signature and Electronic Government Applications in Turkey: An Evaluative Essay from the Viewpoint of Electronic Records Management2 Türkiye’de Elektronik İmza ve Elektronik Devlet Uygulamaları: Elektronik Belge Yönetimi Açısından Bir Değerlendirme Denemesi

    Directory of Open Access Journals (Sweden)

    Esin Altın

    2008-09-01

    Full Text Available The most important component that enables electronic government (e-government applications function is that of electronic record (e-record management. In accordance with the e-record management strategies, all information and records produced by the state are opened to public access. By means of electronic record management systems (ERMS, record supervision becomes easy and processing time becomes shorter. E-record applications bring along the absolute necessity of accomplishing total record security, integrity and so on. That’s where electronic signature (e-signature technologies come on scene. E-signature holds an important place in terms of implementing ERMS and, in a more general sense, electronic archive (e-archive applications securely, and in terms of legal validity. Taking this fact as a starting point, this paper is an attempt to create consciousness on the necessity of the e-record management by emphasizing its importance in the process of e-transformation. This study provides introductory information on e-government, e-signature and the relationship between the e-record management and e-government, and erecord managemnt and e-signature applications. Using the survey method, proceedings and governmental publications issued by the USA, England and Turkey between 1999 and 2006 were reviewed. It was concluded that the importance of the e-record management for e-government has not been fully appreciated in Turkey. More qualifi ed humanpower is needed during the e-transformation process to carry out the e-record management applications Elektronik devlet (e-devlet uygulamalarının işlerliğini sağlayan en önemli unsur elektronik belge (e-belge yönetimidir. E-belge yönetim stratejileri doğrultusunda devletin ürettiği her türlü bilgi ve belge kamu erişimine açılır. Bu stratejiler izlenerek oluşturulan e-belge yönetim sistemleri (EBYS sayesinde belgelerin denetimi kolaylaşır ve iş süreçleri hızlanır. EBYS ile e

  16. On the Theory and Practice of Personal Digital Signatures

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Mikkelsen, Gert Læssøe

    2009-01-01

    We take a step towards a more realistic modeling of personal digital signatures, where a human user, his mobile equipment, his PC and a server are all considered as independent players in the protocol, and where only the human user is assumed incorruptible. We then propose a protocol for issuing...

  17. Assessing electronic cigarette emissions: linking physico-chemical properties to product brand, e-liquid flavoring additives, operational voltage and user puffing patterns.

    Science.gov (United States)

    Zhao, Jiayuan; Nelson, Jordan; Dada, Oluwabunmi; Pyrgiotakis, Georgios; Kavouras, Ilias G; Demokritou, Philip

    2018-02-01

    Users of electronic cigarettes (e-cigs) are exposed to particles and other gaseous pollutants. However, major knowledge gaps on the physico-chemical properties of such exposures and contradictory data in published literature prohibit health risk assessment. Here, the effects of product brand, type, e-liquid flavoring additives, operational voltage, and user puffing patterns on emissions were systematically assessed using a recently developed, versatile, e-cig exposure generation platform and state-of-the-art analytical methods. Parameters of interest in this systematic evaluation included two brands (A and B), three flavors (tobacco, menthol, and fruit), three types of e-cigs (disposable, pre-filled, and refillable tanks), two puffing protocols (4 and 2 s/puff), and four operational voltages (2.2-5.7 V). Particles were generated at a high number concentration (10 6 -10 7 particles/cm 3 ). The particle size distribution was bi-modal (∼200 nm and 1 µm). Furthermore, organic species (humectants propylene glycol and glycerin, nicotine) that were present in e-liquid and trace metals (potassium and sodium) that were present on e-cig heating coil were also released into the emission. In addition, combustion-related byproducts, such as benzene and toluene, were also detected in the range of 100-38,000 ppbv/puff. Parametric analyzes performed in this study show the importance of e-cig brand, type, flavor additives, user puffing pattern (duration and frequency), and voltage on physico-chemical properties of emissions. This observed influence is indicative of the complexity associated with the toxicological screening of emissions from e-cigs and needs to be taken into consideration.

  18. The Experimental Tobacco Marketplace II: Substitutability and sex effects in dual electronic cigarette and conventional cigarette users.

    Science.gov (United States)

    Quisenberry, Amanda J; Koffarnus, Mikhail N; Epstein, Leonard H; Bickel, Warren K

    2017-09-01

    The aim of the current study was to evaluate tobacco product purchasing in the Experimental: Tobacco Marketplace (ETM) among male and female smokers who also use e-cigarettes. We hypothesized a high substitution profile for e-cigarettes and that males would purchase more Snus than females. The ETM is an online market used in clinical abuse liability research to mimic real-world purchasing patterns. Tobacco products, including each participant's usual choice of conventional and e-cigarettes, were presented along with a price and description of nicotine content. Participants were endowed with an account balance based on the number of cigarettes and e-cigarettes consumed per week. Each participant was exposed to four ETM sessions in random order during which the price of conventional cigarettes was manipulated. Cigarette consumption decreased as price increased. A mixed factor three-way ANOVA revealed a significant main effect of price (i.e., more alternative products were purchased at higher cigarette prices), product (i.e., more e-cigarettes were purchased than gum, lozenges, and Snus), and sex (i.e., males purchased more than females). A significant three-way interaction indicated that males purchased more e-cigarettes, Snus, and dip than females at higher cigarette prices. This study suggests that the user profile of cigarette smokers is associated with behavioral economic measures of alternative product substitution and indicates that the evaluation of nicotine replacement products should be considered for both males and females separately. Copyright © 2017 Elsevier B.V. All rights reserved.

  19. Life-threatening Vesicular Bronchial Injury Requiring Veno-venous Extracorporeal Membrane Oxygenation Rescue in an Electronic Nicotine Delivery System User

    Directory of Open Access Journals (Sweden)

    Thomas Carter

    2017-07-01

    Full Text Available The use of electronic nicotine delivery systems (ENDS is increasing across the United States as tobacco bans increase and more people use these devices in an attempt to quit smoking. They are unregulated by the Food and Drug Administration, and there is significant concern that ENDS could produce several toxic byproducts. In this case a 35-year-old female presented to the emergency department with sudden-onset dyspnea. She denied current tobacco smoking, but she was a user of ENDS. When bronchoscopy was performed, an extensive pattern of suspected chemical injury was noted in her airways. She required transfer to a tertiary center where she required extracorporeal membranous oxygenation. Despite public opinion that ENDS are generally safe, or at least safer than tobacco smoking, contrary evidence is mounting. We postulate that her injuries were likely suffered secondary to use of an ENDS.

  20. A Methodology for Calculating Radiation Signatures

    Energy Technology Data Exchange (ETDEWEB)

    Klasky, Marc Louis [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Wilcox, Trevor [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Bathke, Charles G. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); James, Michael R. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-05-01

    A rigorous formalism is presented for calculating radiation signatures from both Special Nuclear Material (SNM) as well as radiological sources. The use of MCNP6 in conjunction with CINDER/ORIGEN is described to allow for the determination of both neutron and photon leakages from objects of interest. In addition, a description of the use of MCNP6 to properly model the background neutron and photon sources is also presented. Examinations of the physics issues encountered in the modeling are investigated so as to allow for guidance in the user discerning the relevant physics to incorporate into general radiation signature calculations. Furthermore, examples are provided to assist in delineating the pertinent physics that must be accounted for. Finally, examples of detector modeling utilizing MCNP are provided along with a discussion on the generation of Receiver Operating Curves, which are the suggested means by which to determine detectability radiation signatures emanating from objects.

  1. UV Signature Mutations †

    Science.gov (United States)

    2014-01-01

    Sequencing complete tumor genomes and exomes has sparked the cancer field's interest in mutation signatures for identifying the tumor's carcinogen. This review and meta-analysis discusses signatures and their proper use. We first distinguish between a mutagen's canonical mutations – deviations from a random distribution of base changes to create a pattern typical of that mutagen – and the subset of signature mutations, which are unique to that mutagen and permit inference backward from mutations to mutagen. To verify UV signature mutations, we assembled literature datasets on cells exposed to UVC, UVB, UVA, or solar simulator light (SSL) and tested canonical UV mutation features as criteria for clustering datasets. A confirmed UV signature was: ≥60% of mutations are C→T at a dipyrimidine site, with ≥5% CC→TT. Other canonical features such as a bias for mutations on the non-transcribed strand or at the 3' pyrimidine had limited application. The most robust classifier combined these features with criteria for the rarity of non-UV canonical mutations. In addition, several signatures proposed for specific UV wavelengths were limited to specific genes or species; non-signature mutations induced by UV may cause melanoma BRAF mutations; and the mutagen for sunlight-related skin neoplasms may vary between continents. PMID:25354245

  2. 76 FR 9024 - Agency Information Collection Activities; Proposed Collection; Comment Request; Electronic...

    Science.gov (United States)

    2011-02-16

    ...] Agency Information Collection Activities; Proposed Collection; Comment Request; Electronic Records; Electronic Signatures AGENCY: Food and Drug Administration, HHS. ACTION: Notice. SUMMARY: The Food and Drug... relating to FDA's electronic records and electronic signatures. DATES: Submit either electronic or written...

  3. Machine Fault Signature Analysis

    Directory of Open Access Journals (Sweden)

    Pratesh Jayaswal

    2008-01-01

    Full Text Available The objective of this paper is to present recent developments in the field of machine fault signature analysis with particular regard to vibration analysis. The different types of faults that can be identified from the vibration signature analysis are, for example, gear fault, rolling contact bearing fault, journal bearing fault, flexible coupling faults, and electrical machine fault. It is not the intention of the authors to attempt to provide a detailed coverage of all the faults while detailed consideration is given to the subject of the rolling element bearing fault signature analysis.

  4. Piezoelectric sensor pen for dynamic signature verification

    Energy Technology Data Exchange (ETDEWEB)

    EerNisse, E.P.; Land, C.E.; Snelling, J.B.

    1977-01-01

    The concept of using handwriting dynamics for electronic identification is discussed. A piezoelectric sensor pen for obtaining the pen point dynamics during writing is described. Design equations are derived and details of an operating device are presented. Typical output waveforms are shown to demonstrate the operation of the pen and to show the dissimilarities between dynamics of a genuine signature and an attempted forgery.

  5. CERN Member States signatures at LEP inauguration

    CERN Multimedia

    1989-01-01

    The signatures of the dignitaries who represented CERN's Member States on the occasion of the Inauguration of LEP on 13 November 1989. The Large Electron-Positron (LEP) collider was inaugurated in the presence of some 1500 guests, including Heads of State and Ministers from all of CERN's 14 Member States.

  6. Signature of ferro–paraelectric transition in biferroic LuCrO3 from electron paramagnetic resonance and non-resonant microwave absorption

    International Nuclear Information System (INIS)

    Alvarez, G.; Montiel, H.; Durán, A.; Conde-Gallardo, A.; Zamorano, R.

    2014-01-01

    An electron paramagnetic resonance (EPR) study in the polycrystalline biferroic LuCrO 3 is carried out at X-band (8.8–9.8 GHz) in the 295–510 K temperature range. For all the temperatures, the EPR spectra show a single broad line attributable to Cr 3+ (S = 3/2) ions. The onset of a ferro–paraelectric transition has been determined from the temperature dependence of the parameters deduced from EPR spectra: the peak-to-peak linewidth (ΔH pp ), the g-factor and the integral intensity (I EPR ). Magnetically modulated microwave absorption spectroscopy (MAMMAS) and low-field microwave absorption (LFMA) are used to give further information on this material, where these techniques give also evidence of the ferro–paraelectric transition; indicating a behavior in agreement with a diffuse phase transition. - Highlights: • LuCrO 3 powders are obtained via auto-ignition synthesis. • EPR is employed to study the onset of the ferro–paraelectric transition. • MAMMAS and LFMA techniques are used to give further information on this material

  7. Electronic Voucher Approval - Financial Management

    Data.gov (United States)

    US Agency for International Development — This process provides a workflow and eSignature capability which allows the CFO to router vouchers for review and electronic signature approval to COTRs in AIDW. It...

  8. Advanced Missile Signature Center

    Data.gov (United States)

    Federal Laboratory Consortium — The Advanced Missile Signature Center (AMSC) is a national facility supporting the Missile Defense Agency (MDA) and other DoD programs and customers with analysis,...

  9. A possible signature of annihilating dark matter

    Science.gov (United States)

    Chan, Man Ho

    2018-02-01

    In this article, we report a new signature of dark matter annihilation based on the radio continuum data of NGC 1569 galaxy detected in the past few decades. After eliminating the thermal contribution of the radio signal, an abrupt change in the spectral index is shown in the radio spectrum. Previously, this signature was interpreted as an evidence of convective outflow of cosmic ray. However, we show that the cosmic ray contribution is not enough to account for the observed radio flux. We then discover that if dark matter annihilates via the 4-e channel with the thermal relic cross-section, the electrons and positrons produced would emit a strong radio flux which can provide an excellent agreement with the observed signature. The best-fitting dark matter mass is 25 GeV.

  10. Practical quantum digital signature

    Science.gov (United States)

    Yin, Hua-Lei; Fu, Yao; Chen, Zeng-Bing

    2016-03-01

    Guaranteeing nonrepudiation, unforgeability as well as transferability of a signature is one of the most vital safeguards in today's e-commerce era. Based on fundamental laws of quantum physics, quantum digital signature (QDS) aims to provide information-theoretic security for this cryptographic task. However, up to date, the previously proposed QDS protocols are impractical due to various challenging problems and most importantly, the requirement of authenticated (secure) quantum channels between participants. Here, we present the first quantum digital signature protocol that removes the assumption of authenticated quantum channels while remaining secure against the collective attacks. Besides, our QDS protocol can be practically implemented over more than 100 km under current mature technology as used in quantum key distribution.

  11. FLARE: a New User Facility for Studies of Magnetic Reconnection Through Simultaneous, in-situ Measurements on MHD Scales, Ion Scales and Electron Scales

    Science.gov (United States)

    Ji, H.; Bhattacharjee, A.; Goodman, A.; Prager, S.; Daughton, W. S.; Cutler, R.; Fox, W.; Hoffmann, F.; Kalish, M.; Kozub, T.; Jara-Almonte, J.; Myers, C. E.; Ren, Y.; Sloboda, P.; Yamada, M.; Yoo, J.; Bale, S. D.; Carter, T.; Dorfman, S. E.; Drake, J. F.; Egedal, J.; Sarff, J.; Wallace, J.

    2017-12-01

    The FLARE device (Facility for Laboratory Reconnection Experiments; flare.pppl.gov) is a new laboratory experiment under construction at Princeton for the studies of magnetic reconnection in the multiple X-line regimes directly relevant to space, solar, astrophysical, and fusion plasmas, as guided by a reconnection phase diagram [Ji & Daughton, (2011)]. The whole device has been successfully assembled with rough leak check completed. The first plasmas are expected in the fall to winter. The main diagnostic is an extensive set of magnetic probe arrays to cover multiple scales from local electron scales ( ˜2 mm), to intermediate ion scales ( ˜10 cm), and global MHD scales ( ˜1 m), simultaneously providing in-situ measurements over all these relevant scales. By using these laboratory data, not only the detailed spatial profiles around each reconnecting X-line are available for direct comparisons with spacecraft data, but also the global conditions and consequences of magnetic reconnection, which are often difficult to quantify in space, can be controlled or studied systematically. The planned procedures and example topics as a user facility will be discussed in detail.

  12. Theoretical Characterizaiton of Visual Signatures

    Science.gov (United States)

    Kashinski, D. O.; Chase, G. M.; di Nallo, O. E.; Scales, A. N.; Vanderley, D. L.; Byrd, E. F. C.

    2015-05-01

    We are investigating the accuracy of theoretical models used to predict the visible, ultraviolet, and infrared spectra, as well as other properties, of product materials ejected from the muzzle of currently fielded systems. Recent advances in solid propellants has made the management of muzzle signature (flash) a principle issue in weapons development across the calibers. A priori prediction of the electromagnetic spectra of formulations will allow researchers to tailor blends that yield desired signatures and determine spectrographic detection ranges. Quantum chemistry methods at various levels of sophistication have been employed to optimize molecular geometries, compute unscaled vibrational frequencies, and determine the optical spectra of specific gas-phase species. Electronic excitations are being computed using Time Dependent Density Functional Theory (TD-DFT). A full statistical analysis and reliability assessment of computational results is currently underway. A comparison of theoretical results to experimental values found in the literature is used to assess any affects of functional choice and basis set on calculation accuracy. The status of this work will be presented at the conference. Work supported by the ARL, DoD HPCMP, and USMA.

  13. Understanding users

    DEFF Research Database (Denmark)

    Johannsen, Carl Gustav Viggo

    2014-01-01

    Segmentation of users can help libraries in the process of understanding user similarities and differences. Segmentation can also form the basis for selecting segments of target users and for developing tailored services for specific target segments. Several approaches and techniques have been...... segmentation project using computer-generated clusters. Compared to traditional marketing texts, this article also tries to identify user segments or images or metaphors by the library profession itself....

  14. Statistical clumped isotope signatures

    NARCIS (Netherlands)

    Röckmann, T.; Popa, M.E.; Krol, M.C.; Hofmann, M.E.G.

    2016-01-01

    High precision measurements of molecules containing more than one heavy isotope may provide novel constraints on element cycles in nature. These so-called clumped isotope signatures are reported relative to the random (stochastic) distribution of heavy isotopes over all available isotopocules of

  15. Signatures of the Invisible

    CERN Multimedia

    Strom, D

    2003-01-01

    On the Net it is possible to take a look at art from afar via Virtual Museums. One such exhibition was recently in the New York Museum of Modern Art's branch, PS1. Entitled 'Signatures of the Invisible' it was a collaborative effort between artists and physicists (1/2 page).

  16. Massively parallel signature sequencing.

    Science.gov (United States)

    Zhou, Daixing; Rao, Mahendra S; Walker, Roger; Khrebtukova, Irina; Haudenschild, Christian D; Miura, Takumi; Decola, Shannon; Vermaas, Eric; Moon, Keith; Vasicek, Thomas J

    2006-01-01

    Massively parallel signature sequencing is an ultra-high throughput sequencing technology. It can simultaneously sequence millions of sequence tags, and, therefore, is ideal for whole genome analysis. When applied to expression profiling, it reveals almost every transcript in the sample and provides its accurate expression level. This chapter describes the technology and its application in establishing stem cell transcriptome databases.

  17. Searchable Signatures: Context and the Struggle for Recognition

    Directory of Open Access Journals (Sweden)

    Gina Schlesselman-Tarango

    2013-09-01

    Full Text Available Social networking sites made possible through Web 2.0 allow for unique user-generated tags called “searchable signatures.”  These tags move beyond the descriptive and act as means for users to assert online individual and group identities.  A study of searchable signatures on the Instagram application demonstrates that these types of tags are valuable not only because they allow for both individuals and groups to engage in what social theorist Axel Honneth calls the struggle for recognition, but also because they provide contextual use data and sociohistorical information so important to the understanding of digital objects.  This article explores how searchable signatures might be used by both patrons and staff in library environments.

  18. Network-based Arbitrated Quantum Signature Scheme with Graph State

    Science.gov (United States)

    Ma, Hongling; Li, Fei; Mao, Ningyi; Wang, Yijun; Guo, Ying

    2017-08-01

    Implementing an arbitrated quantum signature(QAS) through complex networks is an interesting cryptography technology in the literature. In this paper, we propose an arbitrated quantum signature for the multi-user-involved networks, whose topological structures are established by the encoded graph state. The determinative transmission of the shared keys, is enabled by the appropriate stabilizers performed on the graph state. The implementation of this scheme depends on the deterministic distribution of the multi-user-shared graph state on which the encoded message can be processed in signing and verifying phases. There are four parties involved, the signatory Alice, the verifier Bob, the arbitrator Trent and Dealer who assists the legal participants in the signature generation and verification. The security is guaranteed by the entanglement of the encoded graph state which is cooperatively prepared by legal participants in complex quantum networks.

  19. User 2020

    DEFF Research Database (Denmark)

    Porras, Jari; Heikkinen, Kari; Kinnula, Marianne

    2014-01-01

    determined by the era in which they were born. This is due to the fact that digital natives, born in an already “fully” digitalized world with a plethora of ICT services, have a much closer relationship to these solutions than generations before them. This has also shaped the users perspectives and had......The User 2020 vision is of the changing needs and habits of a user in the future digital world. In order to understand the needs of the future users, we need to look at how users and technology have changed during recent years. The different generations of users are products of their own time...... this evolutionary process. The basis of this Outlook lies in studies of user generations. Although it’s controversial to do so, users have been divided into generations based on their ability and willingness to use ICT solutions. Whether the users are digital ‘tourists’, ‘immigrants’ or ‘natives’ is mainly...

  20. [Does the digital signature of the DICOM standard meet the requirements of German law?].

    Science.gov (United States)

    Schütze, B; Kroll, M; Geisbe, T; Braun, M; Filler, T J

    2003-08-01

    The DICOM standard offers the possibilities to generate electronic signatures, valid according to German laws. This enhances the reliability of the correlation between image and patient data. However, only so called qualified electronic signatures--conveniently issued by an accredited supplier--are permissible and not rejectable as evidence in German jurisdiction and are completely equivalent to the handwritten signatures. These qualified electronic signatures can be executed only by individuals, whereas the former are not applicable to technical apparatus like image generating modalities. In consequence, a modality is able to provide its pictures with a "common or advanced signature" solely. This limits the use of the digital signature of the DICOM standard for further applications, e.g. the verifiability within the teleradiology.

  1. Signatures of topological superconductivity

    Energy Technology Data Exchange (ETDEWEB)

    Peng, Yang

    2017-07-19

    The prediction and experimental discovery of topological insulators brought the importance of topology in condensed matter physics into the limelight. Topology hence acts as a new dimension along which more and more new states of matter start to emerge. One of these topological states of matter, namely topological superconductors, comes into the focus because of their gapless excitations. These gapless excitations, especially in one dimensional topological superconductors, are Majorana zero modes localized at the ends of the superconductor and exhibit exotic nonabelian statistics, which can be potentially applied to fault-tolerant quantum computation. Given their highly interesting physical properties and potential applications to quantum computation, both theorists and experimentalists spend great efforts to realize topological supercondoctors and to detect Majoranas. In two projects within this thesis, we investigate the properties of Majorana zero modes in realistic materials which are absent in simple theoretical models. We find that the superconducting proximity effect, an essential ingredient in all existing platforms for topological superconductors, plays a significant role in determining the localization property of the Majoranas. Strong proximity coupling between the normal system and the superconducting substrate can lead to strongly localized Majoranas, which can explain the observation in a recent experiment. Motivated by experiments in Molenkamp's group, we also look at realistic quantum spin Hall Josephson junctions, in which charge puddles acting as magnetic impurities are coupled to the helical edge states. We find that with this setup, the junction generically realizes an exotic 8π periodic Josephson effect, which is absent in a pristine Josephson junction. In another two projects, we propose more pronounced signatures of Majoranas that are accessible with current experimental techniques. The first one is a transport measurement, which uses

  2. Signature CERN-URSS

    CERN Document Server

    Jentschke,W

    1975-01-01

    Le DG W.Jentschke souhaite la bienvenue à l'assemblée et aux invités pour la signature du protocole entre le Cern et l'URSS qui est un événement important. C'est en 1955 que 55 visiteurs soviétiques ont visité le Cern pour la première fois. Le premier DG au Cern, F.Bloch, et Mons.Amaldi sont aussi présents. Tandis que le discours anglais de W.Jentschke est traduit en russe, le discours russe de Mons.Morozov est traduit en anglais.

  3. Personal Identification and the Assessment of the Psychophysiological State While Writing a Signature

    Directory of Open Access Journals (Sweden)

    Pavel Lozhnikov

    2015-08-01

    Full Text Available This article discusses the problem of user identification and psychophysiological state assessment while writing a signature using a graphics tablet. The solution of the problem includes the creation of templates containing handwriting signature features simultaneously with the hidden registration of physiological parameters of a person being tested. Heart rate variability description in the different time points is used as a physiological parameter. As a result, a signature template is automatically generated for psychophysiological states of an identified person. The problem of user identification and psychophysiological state assessment is solved depending on the registered value of a physiological parameter.

  4. Expressiveness considerations of XML signatures

    DEFF Research Database (Denmark)

    Jensen, Meiko; Meyer, Christopher

    2011-01-01

    XML Signatures are used to protect XML-based Web Service communication against a broad range of attacks related to man-in-the-middle scenarios. However, due to the complexity of the Web Services specification landscape, the task of applying XML Signatures in a robust and reliable manner becomes...... more and more challenging. In this paper, we investigate this issue, describing how an attacker can still interfere with Web Services communication even in the presence of XML Signatures. Additionally, we discuss the interrelation of XML Signatures and XML Encryption, focussing on their security...

  5. An E-payment system based on quantum group signature

    Science.gov (United States)

    Xiaojun, Wen

    2010-12-01

    Security and anonymity are essential to E-payment systems. However, existing E-payment systems will easily be broken into soon with the emergence of quantum computers. In this paper, we propose an E-payment system based on quantum group signature. In contrast to classical E-payment systems, our quantum E-payment system can protect not only the users' anonymity but also the inner structure of customer groups. Because of adopting the two techniques of quantum key distribution, a one-time pad and quantum group signature, unconditional security of our E-payment system is guaranteed.

  6. An Assessment of Hazards Caused by Electromagnetic Interaction on Humans Present near Short-Wave Physiotherapeutic Devices of Various Types Including Hazards for Users of Electronic Active Implantable Medical Devices (AIMD

    Directory of Open Access Journals (Sweden)

    Jolanta Karpowicz

    2013-01-01

    Full Text Available Leakage of electromagnetic fields (EMF from short-wave radiofrequency physiotherapeutic diathermies (SWDs may cause health and safety hazards affecting unintentionally exposed workers (W or general public (GP members (assisting patient exposed during treatment or presenting there for other reasons. Increasing use of electronic active implantable medical devices (AIMDs, by patients, attendants, and workers, needs attention because dysfunctions of these devices may be caused by electromagnetic interactions. EMF emitted by 12 SWDs (with capacitive or inductive applicators were assessed following international guidelines on protection against EMF exposure (International Commission on Nonionizing Radiation Protection for GP and W, new European directive 2013/35/EU for W, European Recommendation for GP, and European Standard EN 50527-1 for AIMD users. Direct EMF hazards for humans near inductive applicators were identified at a distance not exceeding 45 cm for W or 62 cm for GP, but for AIMD users up to 90 cm (twice longer than that for W and 50% longer than that for GP because EMF is pulsed modulated. Near capacitive applicators emitting continuous wave, the corresponding distances were: 120 cm for W or 150 cm for both—GP or AIMD users. This assessment does not cover patients who undergo SWD treatment (but it is usually recommended for AIMD users to be careful with EMF treatment.

  7. Signature geometry and quantum engineering

    Science.gov (United States)

    Samociuk, Stefan

    2013-09-01

    As the operating frequency of electromagnetic based devices increase, physical design geometry is playing an ever more important role. Evidence is considered in support of a relationship between the dimensionality of primitive geometric forms, such as transistors, and corresponding electromagnetic coupling efficiency. The industry of electronics is defined as the construction of devices by the patterning of primitive forms to physical materials. Examples are given to show the evolution of these primitives, down to nano scales, are requiring exacting geometry and three dimensional content. Consideration of microwave monolithic integrated circuits,(MMIC), photonics and metamaterials,(MM), support this trend and also add new requirements of strict geometric periodicity and multiplicity. Signature geometries,(SG), are characterized by distinctive attributes and examples are given. The transcendent form transcode algorithm, (TTA) is introduced as a multi dimensional SG and its use in designing photonic integrated circuits and metamaterials is discussed . A creative commons licensed research database, TRANSFORM, containing TTA geometries in OASIS file formats is described. An experimental methodology for using the database is given. Multidimensional SG and extraction of three dimensional cross sections as primitive forms is discussed as a foundation for quantum engineering and the exploitation of phenomena other than the electromagnetic.

  8. Trace Explosives Signatures from World War II Unexploded Undersea Ordnance

    Science.gov (United States)

    Darrach, M. R.; Chutjian, A.; Plett, G. A.

    1998-01-01

    Trace explosives signatures of TNT and DNT have been extracted from multiple sediment samples adjacent to unexploded undersea ordnance at Halifax Harbor, Canada. The ordnance was hurled into the harbor during a massive explosion some 50 years earlier, in 1945 after World War II had ended. Laboratory sediment extractions were made using the solid-phase microextraction (SPME) method in seawater and detection using the Reversal Electron Attachment Detection (READ) technique and, in the case of DNT, a commercial gas chromatograph/mass spectrometer (GC/MS). Results show that, after more than 50 years in the environment, ordnance that appeared to be physically intact gave good explosives signatures at the parts per billion level, whereas ordnance that had been cracked open during the explosion gave no signatures at the 10 parts per trillion sensitivity level. These measurements appear to provide the first reported data of explosives signatures from undersea unexploded ordnance.

  9. A Provably Secure Aggregate Signature Scheme for Healthcare Wireless Sensor Networks.

    Science.gov (United States)

    Shen, Limin; Ma, Jianfeng; Liu, Ximeng; Miao, Meixia

    2016-11-01

    Wireless sensor networks (WSNs) are being used in a wide range of applications for healthcare monitoring, like heart rate monitors and blood pressure monitors, which can minimize the need for healthcare professionals. In medical system, sensors on or in patients produce medical data which can be easily compromised by a vast of attacks. Although signature schemes can protect data authenticity and data integrity, when the number of users involved in the medical system becomes huge, the bandwidth and storage cost will rise sharply so that existing signature schemes are inapplicability for WSNs. In this paper, we propose an efficient aggregate signature scheme for healthcare WSNs according to an improved security model, which can combine multiple signatures into a single aggregate signature. The length of such an aggregate signature may be as long as that of an individual one, which can greatly decrease the bandwidth and storage cost for networks.

  10. Multisensors signature prediction workbench

    Science.gov (United States)

    Latger, Jean; Cathala, Thierry

    2015-10-01

    Guidance of weapon systems relies on sensors to analyze targets signature. Defense weapon systems also need to detect then identify threats also using sensors. The sensors performance is very dependent on conditions e.g. time of day, atmospheric propagation, background ... Visible camera are very efficient for diurnal fine weather conditions, long wave infrared sensors for night vision, radar systems very efficient for seeing through atmosphere and/or foliage ... Besides, multi sensors systems, combining several collocated sensors with associated algorithms of fusion, provide better efficiency (typically for Enhanced Vision Systems). But these sophisticated systems are all the more difficult to conceive, assess and qualify. In that frame, multi sensors simulation is highly required. This paper focuses on multi sensors simulation tools. A first part makes a state of the Art of such simulation workbenches with a special focus on SE-Workbench. SEWorkbench is described with regards to infrared/EO sensors, millimeter waves sensors, active EO sensors and GNSS sensors. Then a general overview of simulation of targets and backgrounds signature objectives is presented, depending on the type of simulation required (parametric studies, open loop simulation, closed loop simulation, hybridization of SW simulation and HW ...). After the objective review, the paper presents some basic requirements for simulation implementation such as the deterministic behavior of simulation, mandatory to repeat it many times for parametric studies... Several technical topics are then discussed, such as the rendering technique (ray tracing vs. rasterization), the implementation (CPU vs. GP GPU) and the tradeoff between physical accuracy and performance of computation. Examples of results using SE-Workbench are showed and commented.

  11. Signatures of particles; Signatures de particules

    Energy Technology Data Exchange (ETDEWEB)

    Depasse, P

    2004-11-15

    This document reports the work made by the author in the field of the improvement of gamma detection. The first part is dedicated to experiments and testing performed at the nuclear physics institute in Lyon. It deals with photo-sensors, avalanche photo-diodes and drift chambers. The second part presents the implementation of active lead rings (ALR) to the L3 detector. Although ALR cover only a hundredth of the total solid angle, they are useful for detecting events in which one or several particles bring away a large part of the momentum in a strongly forward direction (between 4 and 9 degrees). The third part is dedicated to the design of the electromagnetic calorimeter barrel that will equip the CMS (compact muon solenoid) that is due to operate on the large hadron collider (LHC). The work made for the selection of scintillating materials (cerium fluoride, lead tungstate), of photo-sensors and for the design of front electronic equipment is particularly detailed. The last part is dedicated to how the knowledge cumulated about photon detection could be beneficial for medical imaging, particularly for the detection of 511 keV photon released in positron collisions. (A.C.)

  12. Realization of quantum digital signatures without the requirement of quantum memory.

    Science.gov (United States)

    Collins, Robert J; Donaldson, Ross J; Dunjko, Vedran; Wallden, Petros; Clarke, Patrick J; Andersson, Erika; Jeffers, John; Buller, Gerald S

    2014-07-25

    Digital signatures are widely used to provide security for electronic communications, for example, in financial transactions and electronic mail. Currently used classical digital signature schemes, however, only offer security relying on unproven computational assumptions. In contrast, quantum digital signatures offer information-theoretic security based on laws of quantum mechanics. Here, security against forging relies on the impossibility of perfectly distinguishing between nonorthogonal quantum states. A serious drawback of previous quantum digital signature schemes is that they require long-term quantum memory, making them impractical at present. We present the first realization of a scheme that does not need quantum memory and which also uses only standard linear optical components and photodetectors. In our realization, the recipients measure the distributed quantum signature states using a new type of quantum measurement, quantum state elimination. This significantly advances quantum digital signatures as a quantum technology with potential for real applications.

  13. Signatures de l'invisible

    CERN Multimedia

    CERN Press Office. Geneva

    2000-01-01

    "Signatures of the Invisible" is an unique collaboration between contemporary artists and contemporary physicists which has the potential to help redefine the relationship between science and art. "Signatures of the Invisible" is jointly organised by the London Institute - the world's largest college of art and design and CERN*, the world's leading particle physics laboratory. 12 leading visual artists:

  14. Arbitrated quantum signature scheme based on χ-type entangled states

    International Nuclear Information System (INIS)

    Zuo, Huijuan; Huang, Wei; Qin, Sujuan

    2013-01-01

    An arbitrated quantum signature scheme, which is mainly applied in electronic-payment systems, is proposed and investigated. The χ-type entangled states are used for quantum key distribution and quantum signature in this protocol. Compared with previous quantum signature schemes which also utilize χ-type entangled states, the proposed scheme provides higher efficiency. Finally, we also analyze its security under various kinds of attacks. (paper)

  15. A simple but highly effective approach to evaluate the prognostic performance of gene expression signatures.

    Directory of Open Access Journals (Sweden)

    Maud H W Starmans

    Full Text Available BACKGROUND: Highly parallel analysis of gene expression has recently been used to identify gene sets or 'signatures' to improve patient diagnosis and risk stratification. Once a signature is generated, traditional statistical testing is used to evaluate its prognostic performance. However, due to the dimensionality of microarrays, this can lead to false interpretation of these signatures. PRINCIPAL FINDINGS: A method was developed to test batches of a user-specified number of randomly chosen signatures in patient microarray datasets. The percentage of random generated signatures yielding prognostic value was assessed using ROC analysis by calculating the area under the curve (AUC in six public available cancer patient microarray datasets. We found that a signature consisting of randomly selected genes has an average 10% chance of reaching significance when assessed in a single dataset, but can range from 1% to ∼40% depending on the dataset in question. Increasing the number of validation datasets markedly reduces this number. CONCLUSIONS: We have shown that the use of an arbitrary cut-off value for evaluation of signature significance is not suitable for this type of research, but should be defined for each dataset separately. Our method can be used to establish and evaluate signature performance of any derived gene signature in a dataset by comparing its performance to thousands of randomly generated signatures. It will be of most interest for cases where few data are available and testing in multiple datasets is limited.

  16. The Potential for the Development of the X-ray Free Electron Laser Multi-User Photon Distribution System for XFEL Laboratory

    CERN Document Server

    Saldin, Evgeny L; Yurkov, Mikhail V

    2004-01-01

    X-ray photon beam from a SASE FEL undulator is in principle a single user tool, just like an optical laser. Therefore, the operation and amortization cost cannot be easily spread over many simultaneous experiments. To avoid prohibitive cost for each experiment, a new XFEL laboratory scheme is proposed. A photon beam distribution system based on movable multilayer X-ray mirrors can provide an efficient way to generate a multi-user facility. Distribution of photons is achieved on the basis of pulse trains and it is possible to partition the photon beam among a few tens independent beamlines thereby obtaining many users working in parallel. The second way to increase the number of simultaneous experiments is based on the working with a series of perfect crystals in transmission (Laue) geometry. The later concept is the basic idea of the Troika beamline at ESRF. In principle, a hundred of photon beamlines with different experiments can be served by a single XFEL source.

  17. Does the digital signature of the DICOM standard meet the requirements of German law?; Entspricht die digitale Signatur des DICOM-Standards dem deutschen Signaturgesetz?

    Energy Technology Data Exchange (ETDEWEB)

    Schuetze, B. [Fachbereich Informatik, Fachhochschule Dortmund (Germany); Fachbereich Informatik, Fachhochschule Dortmund, Emil-Figge-Str. 42, 44227, Dortmund (Germany); Kroll, M. [Fachbereich Informatik, Fachhochschule Dortmund (Germany); Geisbe, T.; Braun, M. [Lehrstuhl fuer Radiologie und Mikrotherapie, Universitaet Witten/Herdecke (Germany); Filler, T.J. [Institut fuer Anatomie, Universitaetsklinikum Muenster (Germany)

    2003-08-01

    The DICOM standard offers the possibilities to generate electronic signatures, valid according to German laws. This enhances the reliability of the correlation between image and patient data. However, only so called qualified electronic signatures - conveniently issued by an accredited supplier - are permissible and not rejectable as evidence in German jurisdiction and are completely equivalent to the handwritten signatures. These qualified electronic signatures can be executed only by individuals, whereas the former are not applicable to technical apparatus like image generating modalities. In consequence, a modality is able to provide its pictures with a ''common or advanced signature'' solely. This limits the use of the digital signature of the DICOM standard for further applications, e.g. the verifiability within the teleradiology. (orig.) [German] Der DICOM-Standard bietet die Moeglichkeiten, nach deutschem Recht gueltige Signaturen zu erzeugen. Dies stellt einen Gewinn hinsichtlich der Verlaesslichkeit der Zuordnung von Bilddaten zum Patienten fuer den befundenden Radiologen dar. Vor Gericht muessen jedoch als Beweismittel nur qualifizierte elektronische Signaturen - moeglichst von einem akkreditierten Anbieter ausgestellt - zugelassen werden und sind der handschriftlichen Unterschrift gleichgestellt. Solche qualifizierten elektronischen Signaturen koennen nach deutschem Recht nur natuerliche Personen, nicht jedoch Geraete, wie bildgebende Modalitaeten, erhalten. Modalitaeten koennen daher die von ihnen erzeugten Bilder nur mit einer einfachen bzw. fortgeschrittenen Signatur versehen. Dies begrenzt den Nutzen der digitalen Signatur des DICOM-Standards fuer weitergehende Anwendungen, z. B. zur Absicherung der Datenuebertragung in der Teleradiologie. (orig.)

  18. Optimizing the user interface of a data entry module for an electronic patient record for cardiac rehabilitation: A mixed method usability approach

    NARCIS (Netherlands)

    van Engen-Verheul, Mariëtte M.; Peute, Linda W. P.; de Keizer, Nicolette F.; Peek, Niels; Jaspers, Monique W. M.

    2016-01-01

    Cumbersome electronic patient record (EPR) interfaces may complicate data-entry in clinical practice. Completeness of data entered in the EPR determines, among other things, the value of computerized clinical decision support (CCDS). Quantitative usability evaluations can provide insight into

  19. Signatures for quark clustering in nuclei

    Energy Technology Data Exchange (ETDEWEB)

    Carlson, C.E. [College of William and Mary, Williamsburg, VA (United States); Lassila, K.E. [Iowa State Univ., Ames, IA (United States)

    1994-04-01

    As a signature for the presence of quark clusters in nuclei, the authors suggest studying backward protons produced by electron scattering off deuterons and suggest a ratio that cancels out much of the detailed properties of deuterons or 6-quark clusters. The test may be viewed as a test that the short range part of the deuteron is still a 2-nucleon system. They make estimates to show how it fails in characteristic and significant ways if the two nucleons at short range coalesce into a kneaded 6-quark cluster.

  20. Signatures for quark clustering in nuclei

    International Nuclear Information System (INIS)

    Carlson, C.E.; Lassila, K.E.

    1994-01-01

    As a signature for the presence of quark clusters in nuclei, the authors suggest studying backward protons produced by electron scattering off deuterons and suggest a ratio that cancels out much of the detailed properties of deuterons or 6-quark clusters. The test may be viewed as a test that the short range part of the deuteron is still a 2-nucleon system. They make estimates to show how it fails in characteristic and significant ways if the two nucleons at short range coalesce into a kneaded 6-quark cluster

  1. Accountable Metadata-Hiding Escrow: A Group Signature Case Study

    Directory of Open Access Journals (Sweden)

    Kohlweiss Markulf

    2015-06-01

    Full Text Available A common approach to demands for lawful access to encrypted data is to allow a trusted third party (TTP to gain access to private data. However, there is no way to verify that this trust is well placed as the TTP may open all messages indiscriminately. Moreover, existing approaches do not scale well when, in addition to the content of the conversation, one wishes to hide one’s identity. Given the importance of metadata this is a major problem. We propose a new approach in which users can retroactively verify cryptographically whether they were wiretapped. As a case study, we propose a new signature scheme that can act as an accountable replacement for group signatures, accountable forward and backward tracing signatures.

  2. Improving Patient Experience and Primary Care Quality for Patients With Complex Chronic Disease Using the Electronic Patient-Reported Outcomes Tool: Adopting Qualitative Methods Into a User-Centered Design Approach.

    Science.gov (United States)

    Steele Gray, Carolyn; Khan, Anum Irfan; Kuluski, Kerry; McKillop, Ian; Sharpe, Sarah; Bierman, Arlene S; Lyons, Renee F; Cott, Cheryl

    2016-02-18

    Many mHealth technologies do not meet the needs of patients with complex chronic disease and disabilities (CCDDs) who are among the highest users of health systems worldwide. Furthermore, many of the development methodologies used in the creation of mHealth and eHealth technologies lack the ability to embrace users with CCDD in the specification process. This paper describes how we adopted and modified development techniques to create the electronic Patient-Reported Outcomes (ePRO) tool, a patient-centered mHealth solution to help improve primary health care for patients experiencing CCDD. This paper describes the design and development approach, specifically the process of incorporating qualitative research methods into user-centered design approaches to create the ePRO tool. Key lessons learned are offered as a guide for other eHealth and mHealth research and technology developers working with complex patient populations and their primary health care providers. Guided by user-centered design principles, interpretive descriptive qualitative research methods were adopted to capture user experiences through interviews and working groups. Consistent with interpretive descriptive methods, an iterative analysis technique was used to generate findings, which were then organized in relation to the tool design and function to help systematically inform modifications to the tool. User feedback captured and analyzed through this method was used to challenge the design and inform the iterative development of the tool. Interviews with primary health care providers (n=7) and content experts (n=6), and four focus groups with patients and carers (n=14) along with a PICK analysis-Possible, Implementable, (to be) Challenged, (to be) Killed-guided development of the first prototype. The initial prototype was presented in three design working groups with patients/carers (n=5), providers (n=6), and experts (n=5). Working group findings were broken down into categories of what works

  3. Signature Evaluation Tool (SET: a Java-based tool to evaluate and visualize the sample discrimination abilities of gene expression signatures

    Directory of Open Access Journals (Sweden)

    Lin Chi-Hung

    2008-01-01

    Full Text Available Abstract Background The identification of specific gene expression signature for distinguishing sample groups is a dominant field in cancer research. Although a number of tools have been developed to identify optimal gene expression signatures, the number of signature genes obtained is often overly large to be applied clinically. Furthermore, experimental verification is sometimes limited by the availability of wet-lab materials such as antibodies and reagents. A tool to evaluate the discrimination power of candidate genes is therefore in high demand by clinical researchers. Results Signature Evaluation Tool (SET is a Java-based tool adopting the Golub's weighted voting algorithm as well as incorporating the visual presentation of prediction strength for each array sample. SET provides a flexible and easy-to-follow platform to evaluate the discrimination power of a gene signature. Here, we demonstrated the application of SET for several purposes: (1 for signatures consisting of a large number of genes, SET offers the ability to rapidly narrow down the number of genes; (2 for a given signature (from third party analyses or user-defined, SET can re-evaluate and re-adjust its discrimination power by selecting/de-selecting genes repeatedly; (3 for multiple microarray datasets, SET can evaluate the classification capability of a signature among datasets; and (4 by providing a module to visualize the prediction strength for each sample, SET allows users to re-evaluate the discrimination power on mis-grouped or less-certain samples. Information obtained from the above applications could be useful in prognostic analyses or clinical management decisions. Conclusion Here we present SET to evaluate and visualize the sample-discrimination ability of a given gene expression signature. This tool provides a filtration function for signature identification and lies between clinical analyses and class prediction (or feature selection tools. The simplicity

  4. Statistical clumped isotope signatures

    Science.gov (United States)

    Röckmann, T.; Popa, M. E.; Krol, M. C.; Hofmann, M. E. G.

    2016-01-01

    High precision measurements of molecules containing more than one heavy isotope may provide novel constraints on element cycles in nature. These so-called clumped isotope signatures are reported relative to the random (stochastic) distribution of heavy isotopes over all available isotopocules of a molecule, which is the conventional reference. When multiple indistinguishable atoms of the same element are present in a molecule, this reference is calculated from the bulk (≈average) isotopic composition of the involved atoms. We show here that this referencing convention leads to apparent negative clumped isotope anomalies (anti-clumping) when the indistinguishable atoms originate from isotopically different populations. Such statistical clumped isotope anomalies must occur in any system where two or more indistinguishable atoms of the same element, but with different isotopic composition, combine in a molecule. The size of the anti-clumping signal is closely related to the difference of the initial isotope ratios of the indistinguishable atoms that have combined. Therefore, a measured statistical clumped isotope anomaly, relative to an expected (e.g. thermodynamical) clumped isotope composition, may allow assessment of the heterogeneity of the isotopic pools of atoms that are the substrate for formation of molecules. PMID:27535168

  5. Experimental measurement-device-independent quantum digital signatures.

    Science.gov (United States)

    Roberts, G L; Lucamarini, M; Yuan, Z L; Dynes, J F; Comandar, L C; Sharpe, A W; Shields, A J; Curty, M; Puthoor, I V; Andersson, E

    2017-10-23

    The development of quantum networks will be paramount towards practical and secure telecommunications. These networks will need to sign and distribute information between many parties with information-theoretic security, requiring both quantum digital signatures (QDS) and quantum key distribution (QKD). Here, we introduce and experimentally realise a quantum network architecture, where the nodes are fully connected using a minimum amount of physical links. The central node of the network can act either as a totally untrusted relay, connecting the end users via the recently introduced measurement-device-independent (MDI)-QKD, or as a trusted recipient directly communicating with the end users via QKD. Using this network, we perform a proof-of-principle demonstration of QDS mediated by MDI-QKD. For that, we devised an efficient protocol to distil multiple signatures from the same block of data, thus reducing the statistical fluctuations in the sample and greatly enhancing the final QDS rate in the finite-size scenario.

  6. User studies for digital library development

    CERN Document Server

    Dobreva, Milena; Feliciati, Pierluigi

    2012-01-01

    As the information environment becomes increasingly electronic, digital libraries have proliferated, but the focus has often been on innovations in technology and not the user. This title provides a clear overview of the user studies domain and user issues in digital libraries.

  7. Retail applications of signature verification

    Science.gov (United States)

    Zimmerman, Thomas G.; Russell, Gregory F.; Heilper, Andre; Smith, Barton A.; Hu, Jianying; Markman, Dmitry; Graham, Jon E.; Drews, Clemens

    2004-08-01

    The dramatic rise in identity theft, the ever pressing need to provide convenience in checkout services to attract and retain loyal customers, and the growing use of multi-function signature captures devices in the retail sector provides favorable conditions for the deployment of dynamic signature verification (DSV) in retail settings. We report on the development of a DSV system to meet the needs of the retail sector. We currently have a database of approximately 10,000 signatures collected from 600 subjects and forgers. Previous work at IBM on DSV has been merged and extended to achieve robust performance on pen position data available from commercial point of sale hardware, achieving equal error rates on skilled forgeries and authentic signatures of 1.5% to 4%.

  8. Password-based digital signatures

    OpenAIRE

    Sivagnanasuntharam, Sangeepan

    2013-01-01

    This thesis is about implementing a digital signature scheme proposed by associate professor Kristian Gjøsteen and Oystein Thuen.The thesis explains the implementation, the challenges met and a security assessment of the implementation.

  9. Initial Semantics for Strengthened Signatures

    Directory of Open Access Journals (Sweden)

    André Hirschowitz

    2012-02-01

    Full Text Available We give a new general definition of arity, yielding the companion notions of signature and associated syntax. This setting is modular in the sense requested by Ghani and Uustalu: merging two extensions of syntax corresponds to building an amalgamated sum. These signatures are too general in the sense that we are not able to prove the existence of an associated syntax in this general context. So we have to select arities and signatures for which there exists the desired initial monad. For this, we follow a track opened by Matthes and Uustalu: we introduce a notion of strengthened arity and prove that the corresponding signatures have initial semantics (i.e. associated syntax. Our strengthened arities admit colimits, which allows the treatment of the λ-calculus with explicit substitution.

  10. Eliciting end-user expectations to guide the implementation process of a new electronic health record: A case study using concept mapping

    NARCIS (Netherlands)

    Joukes, Erik; Cornet, Ronald; de Bruijne, Martine C.; de Keizer, Nicolette F.

    2016-01-01

    To evaluate the usability of concept mapping to elicit the expectations of healthcare professionals regarding the implementation of a new electronic health record (EHR). These expectations need to be taken into account during the implementation process to maximize the chance of success of the EHR.

  11. Las revistas electrónicas: Impacto en los usuarios de la información en Camagüey (Cuba = Electronic journals: The impact on the users of information in Camagüey (Cuba

    Directory of Open Access Journals (Sweden)

    Kevin Sedeño Guillén

    2000-06-01

    Full Text Available Se realiza una aproximación al concepto y panorama actual de las revistas electrónicas en Cuba y el resto del mundo. Se presentan los resultados de una encuesta a usuarios de cuatro centros especializados de información de la provincia de Camagüey con el objetivo de recoger criterios sobre el uso de las revistas electrónicas. Se solicitaron aspectos generales para caracterizar la muestra y la opinión sobre el tema en matriz DAFO (Debilidades, Amenazas, Fortalezas, Oportunidades. Los resultados de la encuesta mostraron el alto grado de desconocimiento que existe sobre las revistas electrónicas y, por consecuencia, su poco uso. También se supo que los usuarios consideran los obstáculos tecnológicos y el acceso a las redes telemáticas como las principales limitaciones en el uso de estas publicaciones = It this paper the author carries out an approaching to concept and nowadays status of electronic magazines in Cuba and worldwide. The results of a poll are shown; this poll was conducted with the users of four information specialized centers in the province of Camagüey with the idea of collecting different opinions about the use of electronic magazines. General aspects to classify the sample were required, and the opinion about the topic in DAFO key (weakness, threats, strength, opportunities. The results of the sample showed the high degree of lack of knowledge about the of electronic magazines, and therefore their infrequent use. It was also detected that the users consider the technological obstacles and the access the telematic networks as the main limitation in then use of this publications.

  12. Fiscal 1999 achievement report on the venture business assisting type regional consortium - Minor business creation base type. Research and development of electronic signature collation system for signature on paper; 1999 nendo chiiki consortium kenkyu kaihatsu jigyo seika hokokusho. Shimen ni egaku denshi shomei shogoyo system no kenkyu kaihatsu

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-03-01

    The effort aims to develop and commercialize hardware and software for identifying the individual who during business transaction affixes his signature to a settlement form with a ballpoint pen or the like. Basic technologies of a tactile sensor are utilized in the construction of a ballpoint pen structured like a tactile sensor with an oscillator attached to the ink holding shaft for the pen to sense the touch of the paper. Fluctuation in the tool force exerted on the paper surface of specified hardness when writing or drawing letters or patterns are converted into frequency data. The small but highly sensitive 2-dimensional angle detecting system, developed Professor Satoshi Kiyono of Tohoku University, is incorporated into this ballpoint pen for achieving higher precision with the angle detection limits and the resolution taken into consideration. Since a strong correlation is to exist between the force exerted in the direction of roll of the ball and the angle of delicate inclination of the ink holding shaft end, tool force application and changes in the force may be continuously traced. When they are combined with a tool force detecting mechanism, a digital pen mechanism results which is capable of simultaneously reading parameters of the X, Y, and Z axes. (NEDO)

  13. Simulating realistic predator signatures in quantitative fatty acid signature analysis

    Science.gov (United States)

    Bromaghin, Jeffrey F.

    2015-01-01

    Diet estimation is an important field within quantitative ecology, providing critical insights into many aspects of ecology and community dynamics. Quantitative fatty acid signature analysis (QFASA) is a prominent method of diet estimation, particularly for marine mammal and bird species. Investigators using QFASA commonly use computer simulation to evaluate statistical characteristics of diet estimators for the populations they study. Similar computer simulations have been used to explore and compare the performance of different variations of the original QFASA diet estimator. In both cases, computer simulations involve bootstrap sampling prey signature data to construct pseudo-predator signatures with known properties. However, bootstrap sample sizes have been selected arbitrarily and pseudo-predator signatures therefore may not have realistic properties. I develop an algorithm to objectively establish bootstrap sample sizes that generates pseudo-predator signatures with realistic properties, thereby enhancing the utility of computer simulation for assessing QFASA estimator performance. The algorithm also appears to be computationally efficient, resulting in bootstrap sample sizes that are smaller than those commonly used. I illustrate the algorithm with an example using data from Chukchi Sea polar bears (Ursus maritimus) and their marine mammal prey. The concepts underlying the approach may have value in other areas of quantitative ecology in which bootstrap samples are post-processed prior to their use.

  14. Being an Informed Consumer of Health Information and Assessment of Electronic Health Literacy in a National Sample of Internet Users: Validity and Reliability of the e-HLS Instrument.

    Science.gov (United States)

    Seçkin, Gül; Yeatts, Dale; Hughes, Susan; Hudson, Cassie; Bell, Valarie

    2016-07-11

    The Internet, with its capacity to provide information that transcends time and space barriers, continues to transform how people find and apply information to their own lives. With the current explosion in electronic sources of health information, including thousands of websites and hundreds of mobile phone health apps, electronic health literacy is gaining an increasing prominence in health and medical research. An important dimension of electronic health literacy is the ability to appraise the quality of information that will facilitate everyday health care decisions. Health information seekers explore their care options by gathering information from health websites, blogs, Web-based forums, social networking websites, and advertisements, despite the fact that information quality on the Internet varies greatly. Nonetheless, research has lagged behind in establishing multidimensional instruments, in part due to the evolving construct of health literacy itself. The purpose of this study was to examine psychometric properties of a new electronic health literacy (ehealth literacy) measure in a national sample of Internet users with specific attention to older users. Our paper is motivated by the fact that ehealth literacy is an underinvestigated area of inquiry. Our sample was drawn from a panel of more than 55,000 participants maintained by Knowledge Networks, the largest national probability-based research panel for Web-based surveys. We examined the factor structure of a 19-item electronic Health Literacy Scale (e-HLS) through exploratory factor analysis (EFA) and confirmatory factor analysis, internal consistency reliability, and construct validity on sample of adults (n=710) and a subsample of older adults (n=194). The AMOS graphics program 21.0 was used to construct a measurement model, linking latent factors obtained from EFA with 19 indicators to determine whether this factor structure achieved a good fit with our entire sample and the subsample (age ≥ 60

  15. Being an Informed Consumer of Health Information and Assessment of Electronic Health Literacy in a National Sample of Internet Users: Validity and Reliability of the e-HLS Instrument

    Science.gov (United States)

    Yeatts, Dale; Hughes, Susan; Hudson, Cassie; Bell, Valarie

    2016-01-01

    Background The Internet, with its capacity to provide information that transcends time and space barriers, continues to transform how people find and apply information to their own lives. With the current explosion in electronic sources of health information, including thousands of websites and hundreds of mobile phone health apps, electronic health literacy is gaining an increasing prominence in health and medical research. An important dimension of electronic health literacy is the ability to appraise the quality of information that will facilitate everyday health care decisions. Health information seekers explore their care options by gathering information from health websites, blogs, Web-based forums, social networking websites, and advertisements, despite the fact that information quality on the Internet varies greatly. Nonetheless, research has lagged behind in establishing multidimensional instruments, in part due to the evolving construct of health literacy itself. Objective The purpose of this study was to examine psychometric properties of a new electronic health literacy (ehealth literacy) measure in a national sample of Internet users with specific attention to older users. Our paper is motivated by the fact that ehealth literacy is an underinvestigated area of inquiry. Methods Our sample was drawn from a panel of more than 55,000 participants maintained by Knowledge Networks, the largest national probability-based research panel for Web-based surveys. We examined the factor structure of a 19-item electronic Health Literacy Scale (e-HLS) through exploratory factor analysis (EFA) and confirmatory factor analysis, internal consistency reliability, and construct validity on sample of adults (n=710) and a subsample of older adults (n=194). The AMOS graphics program 21.0 was used to construct a measurement model, linking latent factors obtained from EFA with 19 indicators to determine whether this factor structure achieved a good fit with our entire sample

  16. A Quantum Proxy Weak Blind Signature Scheme Based on Controlled Quantum Teleportation

    Science.gov (United States)

    Cao, Hai-Jing; Yu, Yao-Feng; Song, Qin; Gao, Lan-Xiang

    2015-04-01

    Proxy blind signature is applied to the electronic paying system, electronic voting system, mobile agent system, security of internet, etc. A quantum proxy weak blind signature scheme is proposed in this paper. It is based on controlled quantum teleportation. Five-qubit entangled state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, so it could guarantee not only the unconditional security of the scheme but also the anonymity of the messages owner.

  17. Randomized Controlled Trial of Electronic Care Plan Alerts and Resource Utilization by High Frequency Emergency Department Users with Opioid Use Disorder

    Directory of Open Access Journals (Sweden)

    Niels Rathlev, MD

    2016-01-01

    Full Text Available Introduction: There is a paucity of literature supporting the use of electronic alerts for patients with high frequency emergency department (ED use. We sought to measure changes in opioid prescribing and administration practices, total charges and other resource utilization using electronic alerts to notify providers of an opioid-use care plan for high frequency ED patients. Methods: This was a randomized, non-blinded, two-group parallel design study of patients who had 1 opioid use disorder and 2 high frequency ED use. Three affiliated hospitals with identical electronic health records participated. Patients were randomized into “Care Plan” versus “Usual Care groups”. Between the years before and after randomization, we compared as primary outcomes the following: 1 opioids (morphine mg equivalents prescribed to patients upon discharge and administered to ED and inpatients; 2 total medical charges, and the numbers of; 3 ED visits, 4 ED visits with advanced radiologic imaging (computed tomography [CT] or magnetic resonance imaging [MRI] studies, and 5 inpatient admissions. Results: A total of 40 patients were enrolled. For ED and inpatients in the “Usual Care” group, the proportion of morphine mg equivalents received in the post-period compared with the pre-period was 15.7%, while in the “Care Plan” group the proportion received in the post-period compared with the pre-period was 4.5% (ratio=0.29, 95% CI [0.07-1.12]; p=0.07. For discharged patients in the “Usual Care” group, the proportion of morphine mg equivalents prescribed in the post-period compared with the pre-period was 25.7% while in the “Care Plan” group, the proportion prescribed in the post-period compared to the pre-period was 2.9%. The “Care Plan” group showed an 89% greater proportional change over the periods compared with the “Usual Care” group (ratio=0.11, 95% CI [0.01-0.092]; p=0.04. Care plans did not change the total charges, or, the numbers

  18. Reconfiguring waveguide-gratings-based M-signature codecs to enhance OCDMA network confidentiality

    Science.gov (United States)

    Huang, Jen-Fa; Chen, Kai-Sheng; Lin, Ying-Chen; Li, Chung-Yu

    2014-02-01

    A reconfiguration scheme based on composite signature codes over waveguide-gratings-based optical code-division multiple-access (OCDMA) network coder/decoders (codecs) is proposed in the paper. By using central control node to monitor network traffic condition and reconfigure the composite signature codes made up of maximal-length sequence (M-sequence) component codes and random changing the signature codes assigned for each user to improve the confidentiality performance in an OCDMA system. The proposed scheme is analyzed with some practical eavesdroppers' attacks.

  19. Signature molecular descriptor : advanced applications.

    Energy Technology Data Exchange (ETDEWEB)

    Visco, Donald Patrick, Jr. (Tennessee Technological University, Cookeville, TN)

    2010-04-01

    In this work we report on the development of the Signature Molecular Descriptor (or Signature) for use in the solution of inverse design problems as well as in highthroughput screening applications. The ultimate goal of using Signature is to identify novel and non-intuitive chemical structures with optimal predicted properties for a given application. We demonstrate this in three studies: green solvent design, glucocorticoid receptor ligand design and the design of inhibitors for Factor XIa. In many areas of engineering, compounds are designed and/or modified in incremental ways which rely upon heuristics or institutional knowledge. Often multiple experiments are performed and the optimal compound is identified in this brute-force fashion. Perhaps a traditional chemical scaffold is identified and movement of a substituent group around a ring constitutes the whole of the design process. Also notably, a chemical being evaluated in one area might demonstrate properties very attractive in another area and serendipity was the mechanism for solution. In contrast to such approaches, computer-aided molecular design (CAMD) looks to encompass both experimental and heuristic-based knowledge into a strategy that will design a molecule on a computer to meet a given target. Depending on the algorithm employed, the molecule which is designed might be quite novel (re: no CAS registration number) and/or non-intuitive relative to what is known about the problem at hand. While CAMD is a fairly recent strategy (dating to the early 1980s), it contains a variety of bottlenecks and limitations which have prevented the technique from garnering more attention in the academic, governmental and industrial institutions. A main reason for this is how the molecules are described in the computer. This step can control how models are developed for the properties of interest on a given problem as well as how to go from an output of the algorithm to an actual chemical structure. This report

  20. A Black Hole Spectral Signature

    Science.gov (United States)

    Titarchuk, Lev; Laurent, Philippe

    2000-03-01

    An accreting black hole is, by definition, characterized by the drain. Namely, the matter falls into a black hole much the same way as water disappears down a drain matter goes in and nothing comes out. As this can only happen in a black hole, it provides a way to see ``a black hole'', an unique observational signature. The accretion proceeds almost in a free-fall manner close to the black hole horizon, where the strong gravitational field dominates the pressure forces. In this paper we present analytical calculations and Monte-Carlo simulations of the specific features of X-ray spectra formed as a result of upscattering of the soft (disk) photons in the converging inflow (CI) into the black hole. The full relativistic treatment has been implemented to reproduce these spectra. We show that spectra in the soft state of black hole systems (BHS) can be described as the sum of a thermal (disk) component and the convolution of some fraction of this component with the CI upscattering spread (Greens) function. The latter boosted photon component is seen as an extended power-law at energies much higher than the characteristic energy of the soft photons. We demonstrate the stability of the power spectral index over a wide range of the plasma temperature 0 - 10 keV and mass accretion rates (higher than 2 in Eddington units). We also demonstrate that the sharp high energy cutoff occurs at energies of 200-400 keV which are related to the average energy of electrons mec2 impinging upon the event horizon. The spectrum is practically identical to the standard thermal Comptonization spectrum when the CI plasma temperature is getting of order of 50 keV (the typical ones for the hard state of BHS). In this case one can see the effect of the bulk motion only at high energies where there is an excess in the CI spectrum with respect to the pure thermal one. Furthermore we demonstrate that the change of spectral shapes from the soft X-ray state to the hard X-ray state is clearly to be

  1. Secure Mobile Agent from Leakage-Resilient Proxy Signatures

    Directory of Open Access Journals (Sweden)

    Fei Tang

    2015-01-01

    Full Text Available A mobile agent can sign a message in a remote server on behalf of a customer without exposing its secret key; it can be used not only to search for special products or services, but also to make a contract with a remote server. Hence a mobile agent system can be used for electronic commerce as an important key technology. In order to realize such a system, Lee et al. showed that a secure mobile agent can be constructed using proxy signatures. Intuitively, a proxy signature permits an entity (delegator to delegate its signing right to another entity (proxy to sign some specified messages on behalf of the delegator. However, the proxy signatures are often used in scenarios where the signing is done in an insecure environment, for example, the remote server of a mobile agent system. In such setting, an adversary could launch side-channel attacks to exploit some leakage information about the proxy key or even other secret states. The proxy signatures which are secure in the traditional security models obviously cannot provide such security. Based on this consideration, in this paper, we design a leakage-resilient proxy signature scheme for the secure mobile agent systems.

  2. Toward an automated signature recognition toolkit for mission operations

    Science.gov (United States)

    Cleghorn, T.; Laird, P.; Perrine, L.; Culbert, C.; Macha, M.; Saul, R.; Hammen, D.; Moebes, T.; Shelton, R.

    1994-10-01

    Signature recognition is the problem of identifying an event or events from its time series. The generic problem has numerous applications to science and engineering. At NASA's Johnson Space Center, for example, mission control personnel, using electronic displays and strip chart recorders, monitor telemetry data from three-phase electrical buses on the Space Shuttle and maintain records of device activation and deactivation. Since few electrical devices have sensors to indicate their actual status, changes of state are inferred from characteristic current and voltage fluctuations. Controllers recognize these events both by examining the waveform signatures and by listening to audio channels between ground and crew. Recently the authors have developed a prototype system that identifies major electrical events from the telemetry and displays them on a workstation. Eventually the system will be able to identify accurately the signatures of over fifty distinct events in real time, while contending with noise, intermittent loss of signal, overlapping events, and other complications. This system is just one of many possible signature recognition applications in Mission Control. While much of the technology underlying these applications is the same, each application has unique data characteristics, and every control position has its own interface and performance requirements. There is a need, therefore, for CASE tools that can reduce the time to implement a running signature recognition application from months to weeks or days. This paper describes our work to date and our future plans.

  3. The borderless online user

    DEFF Research Database (Denmark)

    Riis, Thomas; Schovsbo, Jens Hemmingsen

    2017-01-01

    Traditionally copyright has been exploited in separate geographical markets. This practice restricts the ability of users to access online services, music, movies and sports events on their electronic devices wherever they are in Europe and regardless of borders, viz. so called ‘portability...... of amending the current legal regime. This contribution argues, however, that existing EU rules and principles, in particular the rules of competition law, may deal with the challenges of the existing restrictions on the cross-border access to online services to such an extent that those challenges...

  4. Flexible Multi-Authority Attribute-Based Signature Schemes for Expressive Policy

    Directory of Open Access Journals (Sweden)

    Dan Cao

    2012-01-01

    Full Text Available Attribute-based signature (ABS is a new cryptographic primitive, in which a signer can sign a message with his attributes, and the verifier can only known whether the signer owns attributes satisfying his policy. Moreover, the signature cannot be forged by any user not having attributes satisfying the policy. ABS has many applications, such as anonymous authentication, and attribute-based messaging systems. But many applications may require a user obtaining attributes from different authorities, which calls for multi-authority ABS schemes.

  5. New Identity-Based Blind Signature and Blind Decryption Scheme in the Standard Model

    Science.gov (United States)

    Phong, Le Trieu; Ogata, Wakaha

    We explicitly describe and analyse blind hierachical identity-based encryption (blind HIBE) schemes, which are natural generalizations of blind IBE schemes [20]. We then uses the blind HIBE schemes to construct: (1) An identity-based blind signature scheme secure in the standard model, under the computational Diffie-Hellman (CDH) assumption, and with much shorter signature size and lesser communication cost, compared to existing proposals. (2) A new mechanism supporting a user to buy digital information over the Internet without revealing what he/she has bought, while protecting the providers from cheating users.

  6. Theoretical Characterizaiton of Visual Signatures (Muzzle Flash)

    Science.gov (United States)

    Kashinski, D. O.; Scales, A. N.; Vanderley, D. L.; Chase, G. M.; di Nallo, O. E.; Byrd, E. F. C.

    2014-05-01

    We are investigating the accuracy of theoretical models used to predict the visible, ultraviolet and infrared spectra of product materials ejected from the muzzle of currently fielded systems. Recent advances in solid propellants has made the management of muzzle signature (flash) a principle issue in weapons development across the calibers. A priori prediction of the electromagnetic spectra of formulations will allow researchers to tailor blends that yield desired signatures and determine spectrographic detection ranges. We are currently employing quantum chemistry methods at various levels of sophistication to optimize molecular geometries, compute vibrational frequencies, and determine the optical spectra of specific gas-phase molecules and radicals of interest. Electronic excitations are being computed using Time Dependent Density Functional Theory (TD-DFT). A comparison of computational results to experimental values found in the literature is used to assess the affect of basis set and functional choice on calculation accuracy. The current status of this work will be presented at the conference. Work supported by the ARL, and USMA.

  7. Five Guidelines for Selecting Hydrological Signatures

    Science.gov (United States)

    McMillan, H. K.; Westerberg, I.; Branger, F.

    2017-12-01

    Hydrological signatures are index values derived from observed or modeled series of hydrological data such as rainfall, flow or soil moisture. They are designed to extract relevant information about hydrological behavior, such as to identify dominant processes, and to determine the strength, speed and spatiotemporal variability of the rainfall-runoff response. Hydrological signatures play an important role in model evaluation. They allow us to test whether particular model structures or parameter sets accurately reproduce the runoff generation processes within the watershed of interest. Most modeling studies use a selection of different signatures to capture different aspects of the catchment response, for example evaluating overall flow distribution as well as high and low flow extremes and flow timing. Such studies often choose their own set of signatures, or may borrow subsets of signatures used in multiple other works. The link between signature values and hydrological processes is not always straightforward, leading to uncertainty and variability in hydrologists' signature choices. In this presentation, we aim to encourage a more rigorous approach to hydrological signature selection, which considers the ability of signatures to represent hydrological behavior and underlying processes for the catchment and application in question. To this end, we propose a set of guidelines for selecting hydrological signatures. We describe five criteria that any hydrological signature should conform to: Identifiability, Robustness, Consistency, Representativeness, and Discriminatory Power. We describe an example of the design process for a signature, assessing possible signature designs against the guidelines above. Due to their ubiquity, we chose a signature related to the Flow Duration Curve, selecting the FDC mid-section slope as a proposed signature to quantify catchment overall behavior and flashiness. We demonstrate how assessment against each guideline could be used to

  8. Justine user`s manual

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.R.

    1995-10-01

    Justine is the graphical user interface to the Los Alamos Radiation Modeling Interactive Environment (LARAMIE). It provides LARAMIE customers with a powerful, robust, easy-to-use, WYSIWYG interface that facilitates geometry construction and problem specification. It is assumed that the reader is familiar with LARAMIE, and the transport codes available, i.e., MCNPTM and DANTSYSTM. No attempt is made in this manual to describe these codes in detail. Information about LARAMIE, DANTSYS, and MCNP are available elsewhere. It i also assumed that the reader is familiar with the Unix operating system and with Motif widgets and their look and feel. However, a brief description of Motif and how one interacts with it can be found in Appendix A.

  9. Eliciting end-user expectations to guide the implementation process of a new electronic health record: A case study using concept mapping.

    Science.gov (United States)

    Joukes, Erik; Cornet, Ronald; de Bruijne, Martine C; de Keizer, Nicolette F

    2016-03-01

    To evaluate the usability of concept mapping to elicit the expectations of healthcare professionals regarding the implementation of a new electronic health record (EHR). These expectations need to be taken into account during the implementation process to maximize the chance of success of the EHR. Two university hospitals in Amsterdam, The Netherlands, in the preparation phase of jointly implementing a new EHR. During this study the hospitals had different methods of documenting patient information (legacy EHR vs. paper-based records). Concept mapping was used to determine and classify the expectations of healthcare professionals regarding the implementation of a new EHR. A multidisciplinary group of 46 healthcare professionals from both university hospitals participated in this study. Expectations were elicited in focus groups, their relevance and feasibility were assessed through a web-questionnaire. Nonmetric multidimensional scaling and clustering methods were used to identify clusters of expectations. We found nine clusters of expectations, each covering an important topic to enable the healthcare professionals to work properly with the new EHR once implemented: usability, data use and reuse, facility conditions, data registration, support, training, internal communication, patients, and collaboration. Average importance and feasibility of each of the clusters was high. Concept mapping is an effective method to find topics that, according to healthcare professionals, are important to consider during the implementation of a new EHR. The method helps to combine the input of a large group of stakeholders at limited efforts. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  10. Identity-based key-insulated aggregate signature scheme

    Directory of Open Access Journals (Sweden)

    P. Vasudeva Reddy

    2017-07-01

    Full Text Available Private key exposure can be the most devastating attack on cryptographic schemes; as such exposure leads to the breakage of security of the scheme as a whole. In the real world scenario, this problem is perhaps the biggest threat to cryptography. The threat is increasing with users operating on low computational devices (e.g. mobile devices which hold the corresponding private key for generating signatures. To reduce the damage caused by the key exposure problem in aggregate signatures and preserve the benefits of identity-based (ID-based cryptography, we hereby propose the first key-insulated aggregate signature scheme in ID-based setting. In this scheme the leakage of temporary private keys will not compromise the security of all the remaining time periods. The security of our scheme is proven secure in the random oracle paradigm with the assumption that the Computational Diffie–Hellman (CDH problem is intractable. The proposed scheme allows an efficient verification with constant signature size, independent of the number of signers.

  11. Revocable identity-based proxy re-signature against signing key exposure

    Science.gov (United States)

    Ma, Tingchun; Wang, Jinli; Wang, Caifen

    2018-01-01

    Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key. Due to this transformation function, IDPRS is very useful in constructing privacy-preserving schemes for various information systems. Key revocation functionality is important in practical IDPRS for managing users dynamically; however, the existing IDPRS schemes do not provide revocation mechanisms that allow the removal of misbehaving or compromised users from the system. In this paper, we first introduce a notion called revocable identity-based proxy re-signature (RIDPRS) to achieve the revocation functionality. We provide a formal definition of RIDPRS as well as its security model. Then, we present a concrete RIDPRS scheme that can resist signing key exposure and prove that the proposed scheme is existentially unforgeable against adaptive chosen identity and message attacks in the standard model. To further improve the performance of signature verification in RIDPRS, we introduce a notion called server-aided revocable identity-based proxy re-signature (SA-RIDPRS). Moreover, we extend the proposed RIDPRS scheme to the SA-RIDPRS scheme and prove that this extended scheme is secure against adaptive chosen message and collusion attacks. The analysis results show that our two schemes remain efficient in terms of computational complexity when implementing user revocation procedures. In particular, in the SA-RIDPRS scheme, the verifier needs to perform only a bilinear pairing and four exponentiation operations to verify the validity of the signature. Compared with other IDPRS schemes in the standard model, our SA-RIDPRS scheme greatly reduces the computation overhead of verification. PMID:29579125

  12. Motif signatures of transcribed enhancers

    KAUST Repository

    Kleftogiannis, Dimitrios

    2017-09-14

    In mammalian cells, transcribed enhancers (TrEn) play important roles in the initiation of gene expression and maintenance of gene expression levels in spatiotemporal manner. One of the most challenging questions in biology today is how the genomic characteristics of enhancers relate to enhancer activities. This is particularly critical, as several recent studies have linked enhancer sequence motifs to specific functional roles. To date, only a limited number of enhancer sequence characteristics have been investigated, leaving space for exploring the enhancers genomic code in a more systematic way. To address this problem, we developed a novel computational method, TELS, aimed at identifying predictive cell type/tissue specific motif signatures. We used TELS to compile a comprehensive catalog of motif signatures for all known TrEn identified by the FANTOM5 consortium across 112 human primary cells and tissues. Our results confirm that distinct cell type/tissue specific motif signatures characterize TrEn. These signatures allow discriminating successfully a) TrEn from random controls, proxy of non-enhancer activity, and b) cell type/tissue specific TrEn from enhancers expressed and transcribed in different cell types/tissues. TELS codes and datasets are publicly available at http://www.cbrc.kaust.edu.sa/TELS.

  13. Epigenetic Signatures of Cigarette Smoking

    NARCIS (Netherlands)

    R. Joehanes (Roby); Just, A.C. (Allan C.); R.E. Marioni (Riccardo); L.C. Pilling (Luke); L.M. Reynolds (Lindsay); Mandaviya, P.R. (Pooja R.); W. Guan (Weihua); Xu, T. (Tao); C.E. Elks (Cathy); Aslibekyan, S. (Stella); H. Moreno-Macías (Hortensia); J.A. Smith (Jennifer A); J. Brody (Jennifer); Dhingra, R. (Radhika); P. Yousefi (Paul); J.S. Pankow (James); Kunze, S. (Sonja); Shah, S.H. (Sonia H.); A.F. McRae (Allan F.); K. Lohman (Kurt); Sha, J. (Jin); D. Absher (Devin); L. Ferrucci (Luigi); Zhao, W. (Wei); E.W. Demerath (Ellen); J. Bressler (Jan); M.L. Grove (Megan); T. Huan (Tianxiao); C. Liu (Chunyu); Mendelson, M.M. (Michael M.); C. Yao (Chen); D.P. Kiel (Douglas P.); A. Peters (Annette); R. Wang-Sattler (Rui); P.M. Visscher (Peter); N.R. Wray (Naomi); J.M. Starr (John); Ding, J. (Jingzhong); Rodriguez, C.J. (Carlos J.); N.J. Wareham (Nick); Irvin, M.R. (Marguerite R.); Zhi, D. (Degui); M. Barrdahl (Myrto); P. Vineis (Paolo); Ambatipudi, S. (Srikant); A.G. Uitterlinden (André); A. Hofman (Albert); Schwartz, J. (Joel); Colicino, E. (Elena); Hou, L. (Lifang); Vokonas, P.S. (Pantel S.); D.G. Hernandez (Dena); A. Singleton (Andrew); S. Bandinelli (Stefania); S.T. Turner (Stephen); E.B. Ware (Erin B.); Smith, A.K. (Alicia K.); T. Klengel (Torsten); E.B. Binder (Elisabeth B.); B.M. Psaty (Bruce); K.D. Taylor (Kent); S.A. Gharib (Sina); Swenson, B.R. (Brenton R.); Liang, L. (Liming); D.L. Demeo (Dawn L.); G.T. O'Connor (George); Z. Herceg (Zdenko); Ressler, K.J. (Kerry J.); K.N. Conneely (Karen N.); N. Sotoodehnia (Nona); Kardia, S.L.R. (Sharon L. R.); D. Melzer (David); A.A. Baccarelli (Andrea A.); J.B.J. van Meurs (Joyce); I. Romieu (Isabelle); D.K. Arnett (Donna); Ong, K.K. (Ken K.); Y. Liu (YongMei); M. Waldenberger (Melanie); I.J. Deary (Ian J.); M. Fornage (Myriam); D. Levy (Daniel); S.J. London (Stephanie J.)

    2016-01-01

    textabstractBackground-DNA methylation leaves a long-term signature of smoking exposure and is one potential mechanism by which tobacco exposure predisposes to adverse health outcomes, such as cancers, osteoporosis, lung, and cardiovascular disorders. Methods and Results-To comprehensively determine

  14. Signature Pedagogy in Theatre Arts

    Science.gov (United States)

    Kornetsky, Lisa

    2017-01-01

    Critique in undergraduate theatre programs is at the heart of training actors at all levels. It is accepted as the signature pedagogy and is practiced in multiple ways. This essay defines critique and presents the case for why it is used as the single most important way that performers come to understand the language, values, and discourse of the…

  15. Galaxy interactions : The HI signature

    NARCIS (Netherlands)

    Sancisi, R; Barnes, JE; Sanders, DB

    1999-01-01

    HI observations are an excellent tool for investigating tidal interactions. Ongoing major and minor interactions which can lead to traumatic mergers or to accretion and the triggering of star formation, show distinct HI signatures. Interactions and mergers in the recent past can also be recognized

  16. Magnetic signature of surface defects at nanodiamonds

    Energy Technology Data Exchange (ETDEWEB)

    Vollmers, Nora Jenny; Gerstmann, Uwe; Schmidt, Wolf Gero [Theoretische Physik, Universitaet Paderborn (Germany)

    2011-07-01

    The n-type doping of diamond has been a long-standing issue, which recently gained attention in the context of nanodiamonds. Attempts of doping with nitrogen failed to result in the Electron paramagnetic Resonance (EPR) fingerprints expected from bulk material. Instead, the nanodiamond signals show a much larger deviation from the free-electron g-value and are believed to be related to intrinsic, carbon inherited defects. However, the absence of the bulk-like EPR spectra does not mean that nitrogen is not incorporated at all. The N atoms could be built in predominantly at or at least close to the surfaces yielding EPR spectra, very different from those measured in the bulk. In this work, we elucidate the situation by investigating the magnetic signature of paramagnetic defects in the nanodiamonds. We use the gauge-including projector augmented plane wave (GI-PAW) approach to calculate the hyperfine splittings and the elements of the electronic g-tensor. Taking the C(100) surface as a first model system, a possible contribution of nitrogen is discussed by comparing EPR parameters for different N incorporation depths: Incorporated directly at the surface, N gives rise to surface states similar to intrinsic carbon dangling bond-like states. Otherwise N is able to introduce surface conductivity as demonstrated by calculated effective mass tensors.

  17. On Hunting Animals of the Biometric Menagerie for Online Signature.

    Directory of Open Access Journals (Sweden)

    Nesma Houmani

    Full Text Available Individuals behave differently regarding to biometric authentication systems. This fact was formalized in the literature by the concept of Biometric Menagerie, defining and labeling user groups with animal names in order to reflect their characteristics with respect to biometric systems. This concept was illustrated for face, fingerprint, iris, and speech modalities. The present study extends the Biometric Menagerie to online signatures, by proposing a novel methodology that ties specific quality measures for signatures to categories of the Biometric Menagerie. Such measures are combined for retrieving automatically writer categories of the extended version of the Biometric Menagerie. Performance analysis with different types of classifiers shows the pertinence of our approach on the well-known MCYT-100 database.

  18. On Hunting Animals of the Biometric Menagerie for Online Signature.

    Science.gov (United States)

    Houmani, Nesma; Garcia-Salicetti, Sonia

    2016-01-01

    Individuals behave differently regarding to biometric authentication systems. This fact was formalized in the literature by the concept of Biometric Menagerie, defining and labeling user groups with animal names in order to reflect their characteristics with respect to biometric systems. This concept was illustrated for face, fingerprint, iris, and speech modalities. The present study extends the Biometric Menagerie to online signatures, by proposing a novel methodology that ties specific quality measures for signatures to categories of the Biometric Menagerie. Such measures are combined for retrieving automatically writer categories of the extended version of the Biometric Menagerie. Performance analysis with different types of classifiers shows the pertinence of our approach on the well-known MCYT-100 database.

  19. GESearch: An Interactive GUI Tool for Identifying Gene Expression Signature

    Directory of Open Access Journals (Sweden)

    Ning Ye

    2015-01-01

    Full Text Available The huge amount of gene expression data generated by microarray and next-generation sequencing technologies present challenges to exploit their biological meanings. When searching for the coexpression genes, the data mining process is largely affected by selection of algorithms. Thus, it is highly desirable to provide multiple options of algorithms in the user-friendly analytical toolkit to explore the gene expression signatures. For this purpose, we developed GESearch, an interactive graphical user interface (GUI toolkit, which is written in MATLAB and supports a variety of gene expression data files. This analytical toolkit provides four models, including the mean, the regression, the delegate, and the ensemble models, to identify the coexpression genes, and enables the users to filter data and to select gene expression patterns by browsing the display window or by importing knowledge-based genes. Subsequently, the utility of this analytical toolkit is demonstrated by analyzing two sets of real-life microarray datasets from cell-cycle experiments. Overall, we have developed an interactive GUI toolkit that allows for choosing multiple algorithms for analyzing the gene expression signatures.

  20. GESearch: An Interactive GUI Tool for Identifying Gene Expression Signature.

    Science.gov (United States)

    Ye, Ning; Yin, Hengfu; Liu, Jingjing; Dai, Xiaogang; Yin, Tongming

    2015-01-01

    The huge amount of gene expression data generated by microarray and next-generation sequencing technologies present challenges to exploit their biological meanings. When searching for the coexpression genes, the data mining process is largely affected by selection of algorithms. Thus, it is highly desirable to provide multiple options of algorithms in the user-friendly analytical toolkit to explore the gene expression signatures. For this purpose, we developed GESearch, an interactive graphical user interface (GUI) toolkit, which is written in MATLAB and supports a variety of gene expression data files. This analytical toolkit provides four models, including the mean, the regression, the delegate, and the ensemble models, to identify the coexpression genes, and enables the users to filter data and to select gene expression patterns by browsing the display window or by importing knowledge-based genes. Subsequently, the utility of this analytical toolkit is demonstrated by analyzing two sets of real-life microarray datasets from cell-cycle experiments. Overall, we have developed an interactive GUI toolkit that allows for choosing multiple algorithms for analyzing the gene expression signatures.

  1. Spectral signature verification using statistical analysis and text mining

    Science.gov (United States)

    DeCoster, Mallory E.; Firpi, Alexe H.; Jacobs, Samantha K.; Cone, Shelli R.; Tzeng, Nigel H.; Rodriguez, Benjamin M.

    2016-05-01

    In the spectral science community, numerous spectral signatures are stored in databases representative of many sample materials collected from a variety of spectrometers and spectroscopists. Due to the variety and variability of the spectra that comprise many spectral databases, it is necessary to establish a metric for validating the quality of spectral signatures. This has been an area of great discussion and debate in the spectral science community. This paper discusses a method that independently validates two different aspects of a spectral signature to arrive at a final qualitative assessment; the textual meta-data and numerical spectral data. Results associated with the spectral data stored in the Signature Database1 (SigDB) are proposed. The numerical data comprising a sample material's spectrum is validated based on statistical properties derived from an ideal population set. The quality of the test spectrum is ranked based on a spectral angle mapper (SAM) comparison to the mean spectrum derived from the population set. Additionally, the contextual data of a test spectrum is qualitatively analyzed using lexical analysis text mining. This technique analyzes to understand the syntax of the meta-data to provide local learning patterns and trends within the spectral data, indicative of the test spectrum's quality. Text mining applications have successfully been implemented for security2 (text encryption/decryption), biomedical3 , and marketing4 applications. The text mining lexical analysis algorithm is trained on the meta-data patterns of a subset of high and low quality spectra, in order to have a model to apply to the entire SigDB data set. The statistical and textual methods combine to assess the quality of a test spectrum existing in a database without the need of an expert user. This method has been compared to other validation methods accepted by the spectral science community, and has provided promising results when a baseline spectral signature is

  2. Electronic identity

    CERN Document Server

    de Andrade, Norberto Nuno Gomes; Argles, David

    2014-01-01

    With the increasing availability of electronic services, security and a reliable means by which identity is verified is essential.Written by Norberto Andrade the first chapter of this book provides an overview of the main legal and regulatory aspects regarding electronic identity in Europe and assesses the importance of electronic identity for administration (public), business (private) and, above all, citizens. It also highlights the role of eID as a key enabler of the economy.In the second chapter Lisha Chen-Wilson, David Argles, Michele Schiano di Zenise and Gary Wills discuss the user-cent

  3. Nonlinear control of magnetic signatures

    Science.gov (United States)

    Niemoczynski, Bogdan

    Magnetic properties of ferrite structures are known to cause fluctuations in Earth's magnetic field around the object. These fluctuations are known as the object's magnetic signature and are unique based on the object's geometry and material. It is a common practice to neutralize magnetic signatures periodically after certain time intervals, however there is a growing interest to develop real time degaussing systems for various applications. Development of real time degaussing system is a challenging problem because of magnetic hysteresis and difficulties in measurement or estimation of near-field flux data. The goal of this research is to develop a real time feedback control system that can be used to minimize magnetic signatures for ferrite structures. Experimental work on controlling the magnetic signature of a cylindrical steel shell structure with a magnetic disturbance provided evidence that the control process substantially increased the interior magnetic flux. This means near field estimation using interior sensor data is likely to be inaccurate. Follow up numerical work for rectangular and cylindrical cross sections investigated variations in shell wall flux density under a variety of ambient excitation and applied disturbances. Results showed magnetic disturbances could corrupt interior sensor data and magnetic shielding due to the shell walls makes the interior very sensitive to noise. The magnetic flux inside the shell wall showed little variation due to inner disturbances and its high base value makes it less susceptible to noise. This research proceeds to describe a nonlinear controller to use the shell wall data as an input. A nonlinear plant model of magnetics is developed using a constant tau to represent domain rotation lag and a gain function k to describe the magnetic hysteresis curve for the shell wall. The model is justified by producing hysteresis curves for multiple materials, matching experimental data using a particle swarm algorithm, and

  4. Users Adaptation to Information and Communication Technology ...

    African Journals Online (AJOL)

    Users should endeavour to acquire skills in the use of electronic devices for effective utilization of ICT resources in FUTO library. There is the need for the improvement of ICT resources in FUTO Library to meet the needs and satisfaction of users. There is the need for the library to redefine its methods of strategic information ...

  5. ADAGE signature analysis: differential expression analysis with data-defined gene sets.

    Science.gov (United States)

    Tan, Jie; Huyck, Matthew; Hu, Dongbo; Zelaya, René A; Hogan, Deborah A; Greene, Casey S

    2017-11-22

    Gene set enrichment analysis and overrepresentation analyses are commonly used methods to determine the biological processes affected by a differential expression experiment. This approach requires biologically relevant gene sets, which are currently curated manually, limiting their availability and accuracy in many organisms without extensively curated resources. New feature learning approaches can now be paired with existing data collections to directly extract functional gene sets from big data. Here we introduce a method to identify perturbed processes. In contrast with methods that use curated gene sets, this approach uses signatures extracted from public expression data. We first extract expression signatures from public data using ADAGE, a neural network-based feature extraction approach. We next identify signatures that are differentially active under a given treatment. Our results demonstrate that these signatures represent biological processes that are perturbed by the experiment. Because these signatures are directly learned from data without supervision, they can identify uncurated or novel biological processes. We implemented ADAGE signature analysis for the bacterial pathogen Pseudomonas aeruginosa. For the convenience of different user groups, we implemented both an R package (ADAGEpath) and a web server ( http://adage.greenelab.com ) to run these analyses. Both are open-source to allow easy expansion to other organisms or signature generation methods. We applied ADAGE signature analysis to an example dataset in which wild-type and ∆anr mutant cells were grown as biofilms on the Cystic Fibrosis genotype bronchial epithelial cells. We mapped active signatures in the dataset to KEGG pathways and compared with pathways identified using GSEA. The two approaches generally return consistent results; however, ADAGE signature analysis also identified a signature that revealed the molecularly supported link between the MexT regulon and Anr. We designed

  6. A hybrid approach to software repository retrieval: Blending faceted classification and type signatures

    Science.gov (United States)

    Eichmann, David A.

    1992-01-01

    We present a user interface for software reuse repository that relies both on the informal semantics of faceted classification and the formal semantics of type signatures for abstract data types. The result is an interface providing both structural and qualitative feedback to a software reuser.

  7. Spectral signature selection for mapping unvegetated soils

    Science.gov (United States)

    May, G. A.; Petersen, G. W.

    1975-01-01

    Airborne multispectral scanner data covering the wavelength interval from 0.40-2.60 microns were collected at an altitude of 1000 m above the terrain in southeastern Pennsylvania. Uniform training areas were selected within three sites from this flightline. Soil samples were collected from each site and a procedure developed to allow assignment of scan line and element number from the multispectral scanner data to each sampling location. These soil samples were analyzed on a spectrophotometer and laboratory spectral signatures were derived. After correcting for solar radiation and atmospheric attenuation, the laboratory signatures were compared to the spectral signatures derived from these same soils using multispectral scanner data. Both signatures were used in supervised and unsupervised classification routines. Computer-generated maps using the laboratory and multispectral scanner derived signatures resulted in maps that were similar to maps resulting from field surveys. Approximately 90% agreement was obtained between classification maps produced using multispectral scanner derived signatures and laboratory derived signatures.

  8. Overloaded CDMA Systems with Displaced Binary Signatures

    Directory of Open Access Journals (Sweden)

    Vanhaverbeke Frederik

    2004-01-01

    Full Text Available We extend three types of overloaded CDMA systems, by displacing in time the binary signature sequences of these systems: (1 random spreading (PN, (2 multiple-OCDMA (MO, and (3 PN/OCDMA (PN/O. For each of these systems, we determine the time shifts that minimize the overall multiuser interference power. The achievable channel load with coded and uncoded data is evaluated for the conventional (without displacement and improved (with displacement systems, as well as for systems based on quasi-Welch-bound-equality (QWBE sequences, by means of several types of turbo detectors. For each system, the best performing turbo detector is selected in order to compare the performance of these systems. It is found that the improved systems substantially outperform their original counterparts. With uncoded data, (improved PN/O yields the highest acceptable channel load. For coded data, MO allows for the highest acceptable channel load over all considered systems, both for the conventional and the improved systems. In the latter case, channel loads of about 280% are achievable with a low degradation as compared to a single user system.

  9. Stability and signatures of biexcitons in carbon nanotubes

    DEFF Research Database (Denmark)

    Pedersen, Thomas Garm; Pedersen, Kjeld; Cornean, Horia Decebal

    2005-01-01

    The linear optical properties of semiconducting carbon nanotubes are dominated by quasi-one-dimensional excitons formed by single electron-hole pairs. Hence, the nonlinear response at high pump levels most likely leads to the formation of exciton complexes involving several electron-hole pairs....... Such complexes would threfore play an important role in e.g. lasing applications. We demonstrate here that the biexciton complex is surprisingly stable for nanotubes in a wide diameter range. Theoretical predictions for the signature of such states in pump-probe spectroscopy are presented....

  10. 21 October 2008 - LHC Inauguration - Czech Deputy Minister of Education, Youth and Sports, responsible for Science and Universities V. Ruzicka welcomed by CERN Director-General R. Aymar, CERN Chief Scientific Officer J. Engelen and CERN Financial Officer S. Lettow and signing the electronic guest book with CERN user R. Leitner.

    CERN Multimedia

    CERN Photo Service

    2008-01-01

    21 October 2008 - LHC Inauguration - Czech Deputy Minister of Education, Youth and Sports, responsible for Science and Universities V. Ruzicka welcomed by CERN Director-General R. Aymar, CERN Chief Scientific Officer J. Engelen and CERN Financial Officer S. Lettow and signing the electronic guest book with CERN user R. Leitner.

  11. Modeling user navigation

    NARCIS (Netherlands)

    Herder, E.; Brusilovsky, Peter; Corbett, Albert; de Rosis, Fiorella

    2003-01-01

    For providing users with navigation aids that best serve their needs, user models for adaptive hypermedia should include user navigation patterns. This paper describes elements needed and how these elements can be gathered.

  12. Infrared signatures for remote sensing

    Energy Technology Data Exchange (ETDEWEB)

    McDowell, R.S.; Sharpe, S.W.; Kelly, J.F.

    1994-04-01

    PNL`s capabilities for infrared and near-infrared spectroscopy include tunable-diode-laser (TDL) systems covering 300--3,000 cm{sup {minus}1} at <10-MHz bandwidth; a Bruker Fourier-transform infrared (FTIR) spectrometer for the near- to far-infrared at 50-MHz resolution; and a stable line-tunable, 12-w cw CO{sub 2} laser. PNL also has a beam expansion source with a 12-cm slit, which provides a 3-m effective path for gases at {approximately}10 K, giving a Doppler width of typically 10 MHz; and long-path static gas cells (to 100 m). In applying this equipment to signatures work, the authors emphasize the importance of high spectral resolution for detecting and identifying atmospheric interferences; for identifying the optimum analytical frequencies; for deriving, by spectroscopic analysis, the molecular parameters needed for modeling; and for obtaining data on species and/or bands that are not in existing databases. As an example of such spectroscopy, the authors have assigned and analyzed the C-Cl stretching region of CCl{sub 4} at 770--800 cm{sup {minus}1}. This is an important potential signature species whose IR absorption has remained puzzling because of the natural isotopic mix, extensive hot-band structure, and a Fermi resonance involving a nearby combination band. Instrument development projects include the IR sniffer, a small high-sensitivity, high-discrimination (Doppler-limited) device for fence-line or downwind monitoring that is effective even in regions of atmospheric absorption; preliminary work has achieved sensitivities at the low-ppb level. Other work covers trace species detection with TDLs, and FM-modulated CO{sub 2} laser LIDAR. The authors are planning a field experiment to interrogate the Hanford tank farm for signature species from Rattlesnake Mountain, a standoff of ca. 15 km, to be accompanied by simultaneous ground-truthing at the tanks.

  13. Metabolic signatures of bacterial vaginosis.

    Science.gov (United States)

    Srinivasan, Sujatha; Morgan, Martin T; Fiedler, Tina L; Djukovic, Danijel; Hoffman, Noah G; Raftery, Daniel; Marrazzo, Jeanne M; Fredricks, David N

    2015-04-14

    Bacterial vaginosis (BV) is characterized by shifts in the vaginal microbiota from Lactobacillus dominant to a microbiota with diverse anaerobic bacteria. Few studies have linked specific metabolites with bacteria found in the human vagina. Here, we report dramatic differences in metabolite compositions and concentrations associated with BV using a global metabolomics approach. We further validated important metabolites using samples from a second cohort of women and a different platform to measure metabolites. In the primary study, we compared metabolite profiles in cervicovaginal lavage fluid from 40 women with BV and 20 women without BV. Vaginal bacterial representation was determined using broad-range PCR with pyrosequencing and concentrations of bacteria by quantitative PCR. We detected 279 named biochemicals; levels of 62% of metabolites were significantly different in women with BV. Unsupervised clustering of metabolites separated women with and without BV. Women with BV have metabolite profiles marked by lower concentrations of amino acids and dipeptides, concomitant with higher levels of amino acid catabolites and polyamines. Higher levels of the signaling eicosanoid 12-hydroxyeicosatetraenoic acid (12-HETE), a biomarker for inflammation, were noted in BV. Lactobacillus crispatus and Lactobacillus jensenii exhibited similar metabolite correlation patterns, which were distinct from correlation patterns exhibited by BV-associated bacteria. Several metabolites were significantly associated with clinical signs and symptoms (Amsel criteria) used to diagnose BV, and no metabolite was associated with all four clinical criteria. BV has strong metabolic signatures across multiple metabolic pathways, and these signatures are associated with the presence and concentrations of particular bacteria. Bacterial vaginosis (BV) is a common but highly enigmatic condition that is associated with adverse outcomes for women and their neonates. Small molecule metabolites in the

  14. 高級中學之電子書包使用需求研究 The Study of User Needs of an Electronic Schoolbag for the High School

    Directory of Open Access Journals (Sweden)

    Yin-Ru Lai

    2003-09-01

    Full Text Available 本研究從系統理論及需求評估的角度,以台北市大同高中為例,探討電子書包使用端的學校行政和環境、教師、學生之使用需求與潛在問題。本研究兼採參與觀察、問卷調查與深度訪談法進行初探,歸納大同高中實驗結果為:產品本身、使用性課題、教與學實態、教育行政、技術環境,以及合作實驗等六大構面。根據前述成果,本研究另從實驗學校、教師教學、學生學習、研發單位、相關業者、政府層級等層面,提出使用性的參考建言及對後續研究的建議。This study investigates the user needs of an electronic schoolbag through the systems theory and needs assessment, which is to give an example of Ta-Tung Senior High School, in order to explore end user s utility and potential issues among school administration, educational environment, teachers and students to compile primary information of local demonstration. This study investigates by adopting participant observation,questionnaire investigation, and in-depth interview. The results of this study are enumerated as follows which includes Product, Usage , Teach and learn status, Educational administration , Technical environment,and Co-operation experiment .According to these results,the researchers propose suggestions of follow-up research from aspects of Experimental schools,Teachers, Students,Government,Research and development institutions, and Related industries.

  15. Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems

    DEFF Research Database (Denmark)

    Fathi, Hanane; Shin, SeongHan; Kobara, Kazukuni

    2010-01-01

    To avoid the risk of long-term storage of secrets on a portable device, an online credential system supports the roaming user in retrieving securely at various locations his private key and other material to generate anonymous signatures. The protocol proposed here allows a roaming mobile user...... to access anonymously services such as whistle blowing and net-counselling. Our approach: (1) allows a mobile user, remembering a short password, to anonymously and securely retrieve the credentials necessary for his anonymous communication without assuming a pre-established anonymous channel...

  16. Microfluidic electronics.

    Science.gov (United States)

    Cheng, Shi; Wu, Zhigang

    2012-08-21

    Microfluidics, a field that has been well-established for several decades, has seen extensive applications in the areas of biology, chemistry, and medicine. However, it might be very hard to imagine how such soft microfluidic devices would be used in other areas, such as electronics, in which stiff, solid metals, insulators, and semiconductors have previously dominated. Very recently, things have radically changed. Taking advantage of native properties of microfluidics, advances in microfluidics-based electronics have shown great potential in numerous new appealing applications, e.g. bio-inspired devices, body-worn healthcare and medical sensing systems, and ergonomic units, in which conventional rigid, bulky electronics are facing insurmountable obstacles to fulfil the demand on comfortable user experience. Not only would the birth of microfluidic electronics contribute to both the microfluidics and electronics fields, but it may also shape the future of our daily life. Nevertheless, microfluidic electronics are still at a very early stage, and significant efforts in research and development are needed to advance this emerging field. The intention of this article is to review recent research outcomes in the field of microfluidic electronics, and address current technical challenges and issues. The outlook of future development in microfluidic electronic devices and systems, as well as new fabrication techniques, is also discussed. Moreover, the authors would like to inspire both the microfluidics and electronics communities to further exploit this newly-established field.

  17. Securing optical code-division multiple-access networks with a postswitching coding scheme of signature reconfiguration

    Science.gov (United States)

    Huang, Jen-Fa; Meng, Sheng-Hui; Lin, Ying-Chen

    2014-11-01

    The optical code-division multiple-access (OCDMA) technique is considered a good candidate for providing optical layer security. An enhanced OCDMA network security mechanism with a pseudonoise (PN) random digital signals type of maximal-length sequence (M-sequence) code switching to protect against eavesdropping is presented. Signature codes unique to individual OCDMA-network users are reconfigured according to the register state of the controlling electrical shift registers. Examples of signature reconfiguration following state switching of the controlling shift register for both the network user and the eavesdropper are numerically illustrated. Dynamically changing the PN state of the shift register to reconfigure the user signature sequence is shown; this hinders eavesdroppers' efforts to decode correct data sequences. The proposed scheme increases the probability of eavesdroppers committing errors in decoding and thereby substantially enhances the degree of an OCDMA network's confidentiality.

  18. Learning Global-Local Distance Metrics for Signature-Based Biometric Cryptosystems

    Directory of Open Access Journals (Sweden)

    George S. Eskander Ekladious

    2017-11-01

    Full Text Available Biometric traits, such as fingerprints, faces and signatures have been employed in bio-cryptosystems to secure cryptographic keys within digital security schemes. Reliable implementations of these systems employ error correction codes formulated as simple distance thresholds, although they may not effectively model the complex variability of behavioral biometrics like signatures. In this paper, a Global-Local Distance Metric (GLDM framework is proposed to learn cost-effective distance metrics, which reduce within-class variability and augment between-class variability, so that simple error correction thresholds of bio-cryptosystems provide high classification accuracy. First, a large number of samples from a development dataset are used to train a global distance metric that differentiates within-class from between-class samples of the population. Then, once user-specific samples are available for enrollment, the global metric is tuned to a local user-specific one. Proof-of-concept experiments on two reference offline signature databases confirm the viability of the proposed approach. Distance metrics are produced based on concise signature representations consisting of about 20 features and a single prototype. A signature-based bio-cryptosystem is designed using the produced metrics and has shown average classification error rates of about 7% and 17% for the PUCPR and the GPDS-300 databases, respectively. This level of performance is comparable to that obtained with complex state-of-the-art classifiers.

  19. User Innovation Management

    DEFF Research Database (Denmark)

    Kanstrup, Anne Marie; Bertelsen, Pernille

    User Innovation Management (UIM) is a method for fo-opereation with users in innovation projects. The UIM method emphasizes the practice of a participatorty attitude.......User Innovation Management (UIM) is a method for fo-opereation with users in innovation projects. The UIM method emphasizes the practice of a participatorty attitude....

  20. User Behavior Analytics

    Energy Technology Data Exchange (ETDEWEB)

    Turcotte, Melissa [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Moore, Juston Shane [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-02-28

    User Behaviour Analytics is the tracking, collecting and assessing of user data and activities. The goal is to detect misuse of user credentials by developing models for the normal behaviour of user credentials within a computer network and detect outliers with respect to their baseline.

  1. The User Experience

    Science.gov (United States)

    Schmidt, Aaron

    2010-01-01

    User experience (UX) is about arranging the elements of a product or service to optimize how people will interact with it. In this article, the author talks about the importance of user experience and discusses the design of user experiences in libraries. He first looks at what UX is. Then he describes three kinds of user experience design: (1)…

  2. 27 CFR 73.33 - Am I legally bound by a form I sign electronically?

    Science.gov (United States)

    2010-04-01

    ... TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY (CONTINUED) PROCEDURES AND PRACTICES ELECTRONIC SIGNATURES; ELECTRONIC SUBMISSION OF FORMS Electronic Filing of Documents with TTB § 73.33 Am I legally bound... paper document submitted to satisfy the same reporting requirement. Persons using electronic signatures...

  3. Adaptive and distributed cryptography for signature biometrics protection

    Science.gov (United States)

    Campisi, Patrizio; Maiorana, Emanuele; Gonzalez Prats, Miguel; Neri, Alessandro

    2007-02-01

    The most emerging technology for people identification and authentication is biometrics. In contrast with traditional recognition approaches, biometric authentication relies on who a person is or what a person does, being based on strictly personal traits, much more difficult to be forgotten, lost, stolen, copied or forged than traditional data. In this paper, we focus on two vulnerable points of biometric systems: the database where the templates are stored and the communication channel between the stored templates and the matcher. Specifically, we propose a method, based on user adaptive error correction codes, to achieve securitization and cancelability of the stored templates applied to dynamic signature features. More in detail, the employed error correction code is tailored to the intra-class variability of each user's signature features. This leads to an enhancement of the system performance expressed in terms of false acceptance rate. Moreover, in order to avoid corruption or interception of the stored templates in the transmission channels, we propose a scheme based on threshold cryptography: the distribution of the certificate authority functionality among a number of nodes provides distributed, fault-tolerant, and hierarchical key management services. Experimental results show the effectiveness of our approach, when compared to traditional non-secure correlation-based classifiers.

  4. Lazy User Behaviour

    OpenAIRE

    Collan, Mikael

    2007-01-01

    In this position paper we suggest that a user will most often choose the solution (device) that will fulfill her (information) needs with the least effort. We call this “lazy user behavior”. We suggest that the principle components responsible for solution selection are the user need and the user state. User need is the user’s detailed (information) need (urgency, type, depth, etc.) and user state is the situation, in which the user is at the moment of the need (location, time, etc.); the use...

  5. A random access scheme with physical-layer network coding and user identification

    NARCIS (Netherlands)

    Goseling, Jasper

    2014-01-01

    A slotted random access scheme is proposed that is based on physical-layer network coding. The scheme uses signature codes that enable the receiver to detect which users are active in each round and which linear combination of pckets is received. Feedback enables in each round, one of the users to

  6. Intrusion signature creation via clustering anomalies

    Science.gov (United States)

    Hendry, Gilbert R.; Yang, Shanchieh J.

    2008-03-01

    Current practices for combating cyber attacks typically use Intrusion Detection Systems (IDSs) to detect and block multistage attacks. Because of the speed and impacts of new types of cyber attacks, current IDSs are limited in providing accurate detection while reliably adapting to new attacks. In signature-based IDS systems, this limitation is made apparent by the latency from day zero of an attack to the creation of an appropriate signature. This work hypothesizes that this latency can be shortened by creating signatures via anomaly-based algorithms. A hybrid supervised and unsupervised clustering algorithm is proposed for new signature creation. These new signatures created in real-time would take effect immediately, ideally detecting new attacks. This work first investigates a modified density-based clustering algorithm as an IDS, with its strengths and weaknesses identified. A signature creation algorithm leveraging the summarizing abilities of clustering is investigated. Lessons learned from the supervised signature creation are then leveraged for the development of unsupervised real-time signature classification. Automating signature creation and classification via clustering is demonstrated as satisfactory but with limitations.

  7. Institute of Geophysics, Planetary Physics, and Signatures

    Data.gov (United States)

    Federal Laboratory Consortium — The Institute of Geophysics, Planetary Physics, and Signatures at Los Alamos National Laboratory is committed to promoting and supporting high quality, cutting-edge...

  8. On reliable discovery of molecular signatures

    Directory of Open Access Journals (Sweden)

    Björkegren Johan

    2009-01-01

    Full Text Available Abstract Background Molecular signatures are sets of genes, proteins, genetic variants or other variables that can be used as markers for a particular phenotype. Reliable signature discovery methods could yield valuable insight into cell biology and mechanisms of human disease. However, it is currently not clear how to control error rates such as the false discovery rate (FDR in signature discovery. Moreover, signatures for cancer gene expression have been shown to be unstable, that is, difficult to replicate in independent studies, casting doubts on their reliability. Results We demonstrate that with modern prediction methods, signatures that yield accurate predictions may still have a high FDR. Further, we show that even signatures with low FDR may fail to replicate in independent studies due to limited statistical power. Thus, neither stability nor predictive accuracy are relevant when FDR control is the primary goal. We therefore develop a general statistical hypothesis testing framework that for the first time provides FDR control for signature discovery. Our method is demonstrated to be correct in simulation studies. When applied to five cancer data sets, the method was able to discover molecular signatures with 5% FDR in three cases, while two data sets yielded no significant findings. Conclusion Our approach enables reliable discovery of molecular signatures from genome-wide data with current sample sizes. The statistical framework developed herein is potentially applicable to a wide range of prediction problems in bioinformatics.

  9. An Arbitrated Quantum Signature Scheme without Entanglement"*

    International Nuclear Information System (INIS)

    Li Hui-Ran; Luo Ming-Xing; Peng Dai-Yuan; Wang Xiao-Jun

    2017-01-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks . (paper)

  10. An Arbitrated Quantum Signature Scheme without Entanglement*

    Science.gov (United States)

    Li, Hui-Ran; Luo, Ming-Xing; Peng, Dai-Yuan; Wang, Xiao-Jun

    2017-09-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks.

  11. Power Electronics

    DEFF Research Database (Denmark)

    Iov, Florin; Ciobotaru, Mihai; Blaabjerg, Frede

    2008-01-01

    is to change the electrical power production sources from the conventional, fossil (and short term) based energy sources to renewable energy resources. The other is to use high efficient power electronics in power generation, power transmission/distribution and end-user application. This paper discuss the most...... emerging renewable energy sources, wind energy, which by means of power electronics are changing from being a minor energy source to be acting as an important power source in the energy system. Power electronics is the enabling technology and the presentation will cover the development in wind turbine...... technology from kW to MW, discuss which power electronic solutions are most feasible and used today....

  12. A Third-Party E-Payment Protocol Based on Quantum Group Blind Signature

    Science.gov (United States)

    Zhang, Jian-Zhong; Yang, Yuan-Yuan; Xie, Shu-Cui

    2017-09-01

    A third-party E-payment protocol based on quantum group blind signature is proposed in this paper. Our E-payment protocol could protect user's anonymity as the traditional E-payment systems do, and also have unconditional security which the classical E-payment systems can not provide. To achieve that, quantum key distribution, one-time pad and quantum group blind signature are adopted in our scheme. Furthermore, if there were a dispute, the manager Trent can identify who tells a lie.

  13. An E-payment Protocol Based on Quantum Multi-proxy Blind Signature

    Science.gov (United States)

    Shao, Ai-Xia; Zhang, Jian-Zhong; Xie, Shu-Cui

    2017-04-01

    Based on quantum multi-proxy blind signature, a new E-payment protocol is proposed in this paper. Adopting the techniques of quantum key distribution, one-time pad and quantum proxy blind signature, our E-payment protocol could protect user's anonymity as the traditional E-payment systems do, and also have unconditional security which the classical E-payment systems cannot provide. Additionally, the quantum operation can be transmitted successfully with the probability 1, which can make the protocol reliable and practical.

  14. An inter-bank E-payment protocol based on quantum proxy blind signature

    Science.gov (United States)

    Wen, Xiaojun; Chen, Yongzhi; Fang, Junbin

    2013-01-01

    Security and anonymity are essential to E-payment systems. However, with the increasing computing power, existing E-payment systems will gradually become insecure. In this paper, we propose an inter-bank E-payment system which is based on quantum proxy blind signature. Adopting the techniques of quantum key distribution, one-time pad and quantum proxy blind signature, our quantum E-payment system could protect user's anonymity as the traditional E-payment systems do, and also have unconditional security which the classical E-payment systems cannot provide. Furthermore, compared with the existing quantum E-payment systems, the proposed system could support inter-bank transactions.

  15. An in fiber experimental approach to photonic quantum digital signatures that does not require quantum memory

    Science.gov (United States)

    Collins, Robert J.; Donaldon, Ross J.; Dunjko, Vedran; Wallden, Petros; Clarke, Patrick J.; Andersson, Erika; Jeffers, John; Buller, Gerald S.

    2014-10-01

    Classical digital signatures are commonly used in e-mail, electronic financial transactions and other forms of electronic communications to ensure that messages have not been tampered with in transit, and that messages are transferrable. The security of commonly used classical digital signature schemes relies on the computational difficulty of inverting certain mathematical functions. However, at present, there are no such one-way functions which have been proven to be hard to invert. With enough computational resources certain implementations of classical public key cryptosystems can be, and have been, broken with current technology. It is nevertheless possible to construct information-theoretically secure signature schemes, including quantum digital signature schemes. Quantum signature schemes can be made information theoretically secure based on the laws of quantum mechanics, while classical comparable protocols require additional resources such as secret communication and a trusted authority. Early demonstrations of quantum digital signatures required quantum memory, rendering them impractical at present. Our present implementation is based on a protocol that does not require quantum memory. It also uses the new technique of unambiguous quantum state elimination, Here we report experimental results for a test-bed system, recorded with a variety of different operating parameters, along with a discussion of aspects of the system security.

  16. Multimodal three-dimensional dynamic signature

    Directory of Open Access Journals (Sweden)

    Yury E. Kozlov

    2017-11-01

    Full Text Available Reliable authentication in mobile applications is among the most important information security challenges. Today, we can hardly imagine a person who would not own a mobile device that connects to the Internet. Mobile devices are being used to store large amounts of confidential information, ranging from personal photos to electronic banking tools. In 2009, colleagues from Rice University together with their collaborators from Motorola, proposed an authentication through in-air gestures. This and subsequent work contributing to the development of the method are reviewed in our introduction. At the moment, there exists a version of the gesture-based authentication software available for Android mobile devices. This software has not become widespread yet. One of likely reasons for that is the insufficient reliability of the method, which involves similar to its earlier analogs the use of only one device. Here we discuss the authentication based on the multimodal three-dimensional dynamic signature (MTDS performed by two independent mobile devices. The MTDS-based authentication technique is an advanced version of in-air gesture authentication. We describe the operation of a prototype of MTDS-based authentication, including the main implemented algorithms, as well as some preliminary results of testing the software. We expect that our method can be used in any mobile application, provided a number of additional improvements discussed in the conclusion are made.

  17. Robust signatures of solar neutrino oscillation solutions

    CERN Document Server

    Bahcall, J N; Peña-Garay, C; Bahcall, John N.; Peña-Garay, Carlos

    2002-01-01

    With the goal of identifying signatures that select specific neutrino oscillation parameters, we test the robustness of global oscillation solutions that fit all the available solar and reactor experimental data. We use three global analysis strategies previously applied by different authors and also determine the sensitivity of the oscillation solutions to the critical nuclear fusion cross section, S_{17}(0), for the production of 8B. The neutral current to charged current ratio for SNO is predicted to be 3.5 +- 0.6 (1 sigma) for the favored LMA, LOW, and VAC solutions, which is separated from the no-oscillation value of 1.0 by much more than the expected experimental error. The predicted range of the day-night difference in charged current rates is between 0% and 21% (3 sigma) and is to be strongly correlated with the day-night effect for neutrino-electron scattering. A measurement by SNO of either a NC to CC ratio > 3.3 or a day-night difference > 10%, would favor a small region of the currently allowed LM...

  18. Signature spectrale des grains interstellaires.

    Science.gov (United States)

    Léger, A.

    Notre connaissance de la nature des grains interstellaires reposait sur un nombre très restreint de signatures spectrales dans la courbe d'extinction du milieu interstellaire. Une information considérable est contenue dans les 40 bandes interstellaires diffuses dans le visible, mais reste inexploitée. L'interprétation récente des cinq bandes IR en émission, en terme de molécules d'hydrocarbures aromatiques polycycliques, est développée. Elle permet l'utilisation d'une information spectroscopique comparable, à elle seule, à ce sur quoi était basée jusqu'alors notre connaissance de la matière interstellaire condensée. Différentes implications de cette mise en évidence sont proposées.

  19. Accelerator facilities users' guide

    International Nuclear Information System (INIS)

    Walter, H.C.; Adrion, L.; Frosch, R.; Salzmann, M.

    1994-07-01

    In 1981 the ''Green Book'' of SIN was distributed, a User Handbook serving the needs of people already working at SIN as well as informing new users about our installations. An update of the Green Book is necessary because many beams have disappeared, been modified or added, and the installation has been upgraded in intensity and versatility quite considerably. The spectrum of users has shifted away from nuclear and particle physics; applications in medicine, solid state physics and materials science have gained in importance. This Users' Guide is intended to inform our users about the changes, and to interest potential new users in coming to PSI. (author) figs., tabs

  20. Prediction of soil effects on GPR signatures

    NARCIS (Netherlands)

    Rhebergen, J.B.; Lensen, H.A.; Wijk, C.V. van; Hendrickx, J.M.H.; Dam, R. van; Borchers, B.

    2004-01-01

    In previous work we have shown that GPR signatures are affected by soil texture and soil water content. In this contribution we will use a three dimensional electromagnetic model and a hydrological soil model to explore in more detail the relationships between GPR signatures, soil physical

  1. Measuring ship acoustic signatures against mine threat

    NARCIS (Netherlands)

    Jong, C.A.F. de; Quesson, B.A.J.; Ainslie, M.A.; Vermeulen, R.C.N.

    2012-01-01

    The NATO standard ‘AMP-15’ [1] provides procedures for the measurement and reporting of the acoustic signature of ships and for the establishment of acoustic signature goals to counter the naval mine threat. Measurements are carried out at dedicated shallow water acoustic ranges. Measurements

  2. The Pedagogic Signature of the Teaching Profession

    Science.gov (United States)

    Kiel, Ewald; Lerche, Thomas; Kollmannsberger, Markus; Oubaid, Viktor; Weiss, Sabine

    2016-01-01

    Lee S. Shulman deplores that the field of education as a profession does not have a pedagogic signature, which he characterizes as a synthesis of cognitive, practical and moral apprenticeship. In this context, the following study has three goals: 1) In the first theoretical part, the basic problems of constructing a pedagogic signature are…

  3. Infrared ship signature analysis and optimisation

    NARCIS (Netherlands)

    Neele, F.P.

    2005-01-01

    The last decade has seen an increase in the awareness of the infrared signature of naval ships. New ship designs show that infrared signature reduction measures are being incorporated, such as exhaust gas cooling systems, relocation of the exhausts and surface cooling systems. Hull and

  4. Analysis of signature wrapping attacks and countermeasures

    DEFF Research Database (Denmark)

    Gajek, Sebastian; Jensen, Meiko; Liao, Lijun

    2009-01-01

    In recent research it turned out that Boolean verification, of digital signatures in the context of WSSecurity, is likely to fail: If parts of a SOAP message, are signed and the signature verification applied to, the whole document returns true, then nevertheless the, document may have been...

  5. 27 CFR 73.35 - Do I need to keep paper copies of forms I submit to TTB electronically?

    Science.gov (United States)

    2010-04-01

    ... PRACTICES ELECTRONIC SIGNATURES; ELECTRONIC SUBMISSION OF FORMS Electronic Filing of Documents with TTB § 73... unless TTB otherwise authorizes you to maintain electronic copies of these documents through a general...

  6. Xyce parallel electronic simulator.

    Energy Technology Data Exchange (ETDEWEB)

    Keiter, Eric R; Mei, Ting; Russo, Thomas V.; Rankin, Eric Lamont; Schiek, Richard Louis; Thornquist, Heidi K.; Fixel, Deborah A.; Coffey, Todd S; Pawlowski, Roger P; Santarelli, Keith R.

    2010-05-01

    This document is a reference guide to the Xyce Parallel Electronic Simulator, and is a companion document to the Xyce Users Guide. The focus of this document is (to the extent possible) exhaustively list device parameters, solver options, parser options, and other usage details of Xyce. This document is not intended to be a tutorial. Users who are new to circuit simulation are better served by the Xyce Users Guide.

  7. Chips in banknotes for a banknote electronic signature

    Science.gov (United States)

    Perron, Maurice; Grimal, Jean-Michel; Beauchet, Frederic; Dell'Ova, Francis

    2004-06-01

    A lot of information can be found in the media about the possibility of using micro-chips in banknotes. This mostly comes from chip manufacturers whose technology is becoming mature for this application. A lot of patents have been applied therefore but what must be noticed is that all these patents concern the processes to insert chips in banknotes and not a lot is said about the product itself and for what use. The Banque de France is a Central Bank involved in all tasks concerning banknotes from design, production, issue, recirculation and sorting, action against counterfeiting and finally destruction. These activities concern, of course, the banknotes in circulation in France (formerly the French francs notes, presently the Euro notes as Banque de France is part of the Eurosystem) and in other countries in the world. The Banque de France approach in looking to the future of chips in banknotes is at first a product approach. Banknotes are means of payment for which security of authentication is fundamental. They could carry chips to provide more security in the transactions but without altering their nature: the anonyminity and immediacy of the transactions.

  8. Development of SuperHERO readout electronics

    Data.gov (United States)

    National Aeronautics and Space Administration — Next-generation solar hard X-ray (HXR) imagers will make high-sensitivity, high-dynamic-range observations of the signatures of accelerated electrons in solar...

  9. Real time gamma-ray signature identifier

    Science.gov (United States)

    Rowland, Mark [Alamo, CA; Gosnell, Tom B [Moraga, CA; Ham, Cheryl [Livermore, CA; Perkins, Dwight [Livermore, CA; Wong, James [Dublin, CA

    2012-05-15

    A real time gamma-ray signature/source identification method and system using principal components analysis (PCA) for transforming and substantially reducing one or more comprehensive spectral libraries of nuclear materials types and configurations into a corresponding concise representation/signature(s) representing and indexing each individual predetermined spectrum in principal component (PC) space, wherein an unknown gamma-ray signature may be compared against the representative signature to find a match or at least characterize the unknown signature from among all the entries in the library with a single regression or simple projection into the PC space, so as to substantially reduce processing time and computing resources and enable real-time characterization and/or identification.

  10. Redactable signatures for signed CDA Documents.

    Science.gov (United States)

    Wu, Zhen-Yu; Hsueh, Chih-Wen; Tsai, Cheng-Yu; Lai, Feipei; Lee, Hung-Chang; Chung, Yufang

    2012-06-01

    The Clinical Document Architecture, introduced by Health Level Seven, is a XML-based standard intending to specify the encoding, structure, and semantics of clinical documents for exchange. Since the clinical document is in XML form, its authenticity and integrity could be guaranteed by the use of the XML signature published by W3C. While a clinical document wants to conceal some personal or private information, the document needs to be redacted. It makes the signed signature of the original clinical document not be verified. The redactable signature is thus proposed to enable verification for the redacted document. Only a little research does the implementation of the redactable signature, and there still not exists an appropriate scheme for the clinical document. This paper will investigate the existing web-technologies and find a compact and applicable model to implement a suitable redactable signature for the clinical document viewer.

  11. Conjugate ionospheric signatures of tsunami-generated gravity waves

    Science.gov (United States)

    Makela, J. J.; Grawe, M.; Coisson, P.; Lognonne, P. H.

    2015-12-01

    Over the past decade, it has been shown that gravity waves generated by earthquakes and tsunamis can reach the upper atmosphere, where they can have a measureable effect on the ionosphere. Observations made with networks of Global Positioning System (GPS) receivers as well as airglow imaging systems have been used to study the properties of these waves through the signatures they leave in the electron density and airglow layers, respectively. Using the Naval Research Laboratory first-principles model, SAMI3, coupled to a model of the tsunami-generated gravity waves, it has been suggested that in addition to generating perturbations in the ionospheric electron density, the neutral winds associated with the gravity waves should produce perturbations in the electric field. These electric field perturbations would map along the Earth's magnetic field where they would drive disturbances in the ionosphere, generating a signature in the conjugate hemisphere. We present GPS-derived total electron content data from several tsunami events demonstrating that this effect is, indeed, measurable. Being able to observe the effects of tsunami-generated gravity waves in the conjugate hemisphere increases the number of observations that can be used to study this ion-neutral coupling phenomenon.

  12. User Authorization at the Molecular Scale.

    Science.gov (United States)

    Lustgarten, Omer; Motiei, Leila; Margulies, David

    2017-07-05

    Electronic user authorization systems help us maintain our privacy in many aspects of everyday life. However, the increasing difficulty to secure access and/or information digitally has inspired chemists to devise alternative, molecular approaches, in which users are identified by chemical means. The potential advantages of using molecular user authentication systems over conventional electronic devices are their versatility and unusual operating principles, which complicate replicating and, consequently, breaking into molecular security devices. Their molecular scale is another unique property that enables hiding such systems and, consequently, applying steganography as an additional layer of protection. Although the area of molecular-based user authorization is still in its infancy, the development of various molecular keypad locks and, more recently, a password-protected molecular cryptographic machine, indicate the possibility of protecting information at the molecular scale. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  13. Maximizing biomarker discovery by minimizing gene signatures

    Directory of Open Access Journals (Sweden)

    Chang Chang

    2011-12-01

    Full Text Available Abstract Background The use of gene signatures can potentially be of considerable value in the field of clinical diagnosis. However, gene signatures defined with different methods can be quite various even when applied the same disease and the same endpoint. Previous studies have shown that the correct selection of subsets of genes from microarray data is key for the accurate classification of disease phenotypes, and a number of methods have been proposed for the purpose. However, these methods refine the subsets by only considering each single feature, and they do not confirm the association between the genes identified in each gene signature and the phenotype of the disease. We proposed an innovative new method termed Minimize Feature's Size (MFS based on multiple level similarity analyses and association between the genes and disease for breast cancer endpoints by comparing classifier models generated from the second phase of MicroArray Quality Control (MAQC-II, trying to develop effective meta-analysis strategies to transform the MAQC-II signatures into a robust and reliable set of biomarker for clinical applications. Results We analyzed the similarity of the multiple gene signatures in an endpoint and between the two endpoints of breast cancer at probe and gene levels, the results indicate that disease-related genes can be preferably selected as the components of gene signature, and that the gene signatures for the two endpoints could be interchangeable. The minimized signatures were built at probe level by using MFS for each endpoint. By applying the approach, we generated a much smaller set of gene signature with the similar predictive power compared with those gene signatures from MAQC-II. Conclusions Our results indicate that gene signatures of both large and small sizes could perform equally well in clinical applications. Besides, consistency and biological significances can be detected among different gene signatures, reflecting the

  14. Getting grid users together

    CERN Multimedia

    Appleton, Owen

    2007-01-01

    "While Grid conferences are becoming ever more popular, many of them remain primarily IT events, with few if any users attending. Not so the second EGEE User Forum, an event specifically designed to bring together the diverse user community that makes use of the EGEE grid infrastructure." (1 page)

  15. NPAS Users Guide

    International Nuclear Information System (INIS)

    1984-01-01

    This NPAS Users Guide is primarily intended as a source of information about policies, procedures, and facilities appropriate for users in the program of Nuclear Physics at SLAC (NPAS). General policies and practices are described, the preparation of proposals is discussed, and the services for users is outlined. SLAC experimental facilities are described, and contacts are listed

  16. Designing the User Experience for Different User Needs for B2B E-Commerce

    OpenAIRE

    Conde, Mark

    2013-01-01

    In today’s world, more and more companies are doing business with one another electronically; this has lead many of these companies to build online web stores for their customers to make business transactions with. Many of these online stores are out of date and/or lack good user research on how to design a web store to meet the demands of their users while creating a good user experience. This thesis provides several conceptual design ideas on how to create a better  user experience that tak...

  17. User facilities at the Lawrence Berkeley Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    1982-01-01

    Much of the research facilities and equipment at LBL have long been available to qualified outside users. Of these, the facilities used by outside researchers are of two types: (1) those that have a formal, designated status as a national research facility (the Bevalac, the SuperHILAC, and the National Center for Electron Microscopy); and (2) those that lack such formal status and user procedures, but which are used to a significant degree by non-LBL scientists and engineers.

  18. Genomic Signatures of Sexual Conflict.

    Science.gov (United States)

    Kasimatis, Katja R; Nelson, Thomas C; Phillips, Patrick C

    2017-10-30

    Sexual conflict is a specific class of intergenomic conflict that describes the reciprocal sex-specific fitness costs generated by antagonistic reproductive interactions. The potential for sexual conflict is an inherent property of having a shared genome between the sexes and, therefore, is an extreme form of an environment-dependent fitness effect. In this way, many of the predictions from environment-dependent selection can be used to formulate expected patterns of genome evolution under sexual conflict. However, the pleiotropic and transmission constraints inherent to having alleles move across sex-specific backgrounds from generation to generation further modulate the anticipated signatures of selection. We outline methods for detecting candidate sexual conflict loci both across and within populations. Additionally, we consider the ability of genome scans to identify sexually antagonistic loci by modeling allele frequency changes within males and females due to a single generation of selection. In particular, we highlight the need to integrate genotype, phenotype, and functional information to truly distinguish sexual conflict from other forms of sexual differentiation. © The American Genetic Association 2017. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  19. DIGITAL SIGNATURE IN THE WAY OF LAW

    OpenAIRE

    Ruya Samlı

    2013-01-01

    Signature can be defined as a person’s name or special signs that he/she writes when he/she wants to indicate he/she wrote or confirm that writing. A person signs many times in his/her life. A person’s signature that is used for thousands of times for many things from formal documents to exams has importance for that person. Especially, signing in legal operations is an operation that can build important results. If a person’s signature is imitated by another person, he/she can be...

  20. Arbitrated quantum signature scheme using Bell states

    International Nuclear Information System (INIS)

    Li Qin; Chan, W. H.; Long Dongyang

    2009-01-01

    In an arbitrated quantum signature scheme, the signatory signs the message and the receiver verifies the signature's validity with the assistance of the arbitrator. We present an arbitrated quantum signature scheme using two-particle entangled Bell states similar to the previous scheme using three-particle entangled Greenberger-Horne-Zeilinger states [G. H. Zeng and C. H. Keitel, Phys. Rev. A 65, 042312 (2002)]. The proposed scheme can preserve the merits in the original scheme while providing a higher efficiency in transmission and reducing the complexity of implementation.

  1. Reduction of a Ship's Magnetic Field Signatures

    CERN Document Server

    Holmes, John

    2008-01-01

    Decreasing the magnetic field signature of a naval vessel will reduce its susceptibility to detonating naval influence mines and the probability of a submarine being detected by underwater barriers and maritime patrol aircraft. Both passive and active techniques for reducing the magnetic signatures produced by a vessel's ferromagnetism, roll-induced eddy currents, corrosion-related sources, and stray fields are presented. Mathematical models of simple hull shapes are used to predict the levels of signature reduction that might be achieved through the use of alternate construction materials. Al

  2. Signature verification with writing posture analysis

    Science.gov (United States)

    Cheng, Hsu-Yung; Yu, Chih-Chang

    2013-07-01

    A video-based handwritten signature verification framework is proposed in this paper. Using a camera as the sensor has the advantage that the entire writing processes can be captured along with the signatures. The main contribution of this work is that writing postures are analyzed to achieve the verification purpose because the writing postures cannot be easily imitated or forged. The proposed system is able to achieve low false rejection rates while maintaining low false acceptance rates for database containing both unskilled and skilled imitation signatures.

  3. Molecular signatures of thyroid follicular neoplasia

    DEFF Research Database (Denmark)

    Borup, R.; Rossing, M.; Henao, Ricardo

    2010-01-01

    The molecular pathways leading to thyroid follicular neoplasia are incompletely understood, and the diagnosis of follicular tumors is a clinical challenge. To provide leads to the pathogenesis and diagnosis of the tumors, we examined the global transcriptome signatures of follicular thyroid...... a mechanism for cancer progression, which is why we exploited the results in order to generate a molecular classifier that could identify 95% of all carcinomas. Validation employing public domain and cross-platform data demonstrated that the signature was robust and could diagnose follicular nodules...... and robust genetic signature for the diagnosis of FA and FC. Endocrine-Related Cancer (2010) 17 691-708...

  4. User interface design considerations

    DEFF Research Database (Denmark)

    Andersen, Simon Engedal; Jakobsen, Arne; Rasmussen, Bjarne D.

    1999-01-01

    When designing a user interface for a simulation model there are several important issues to consider: Who is the target user group, and which a priori information can be expected. What questions do the users want answers to and what questions are answered using a specific model?When developing...... and output variables. This feature requires special attention when designing the user interface and a special approach for controlling the user selection of input and output variables are developed. To obtain a consistent system description the different input variables are grouped corresponding...... the user interface of EESCoolTools these issues led to a series of simulation tools each with a specific purpose and a carefully selected set of input and output variables. To allow a more wide range of questions to be answered by the same model, the user can change between different sets of input...

  5. Electronic equipment packaging technology

    CERN Document Server

    Ginsberg, Gerald L

    1992-01-01

    The last twenty years have seen major advances in the electronics industry. Perhaps the most significant aspect of these advances has been the significant role that electronic equipment plays in almost all product markets. Even though electronic equipment is used in a broad base of applications, many future applications have yet to be conceived. This versatility of electron­ ics has been brought about primarily by the significant advances that have been made in integrated circuit technology. The electronic product user is rarely aware of the integrated circuits within the equipment. However, the user is often very aware of the size, weight, mod­ ularity, maintainability, aesthetics, and human interface features of the product. In fact, these are aspects of the products that often are instrumental in deter­ mining its success or failure in the marketplace. Optimizing these and other product features is the primary role of Electronic Equipment Packaging Technology. As the electronics industry continues to pr...

  6. Is Signature Size Associated With Organ Donor Designation on Driver's Licenses?

    Science.gov (United States)

    Sehgal, N K R; Sullivan, C; Scallan, C; Figueroa, M; Pencak, J A; Kirkland, J; Scott, K; Thornton, J D

    2016-01-01

    Previous studies suggest that large signature size is associated with narcissistic characteristics. By contrast, organ donation is an indicator of altruism. Because altruism and narcissism may be viewed as opposites, we sought to determine if smaller signature size is associated with willingness to be an organ donor. Using a cross-sectional study design, we reviewed the health records of 571 randomly selected primary care patients at a large urban safety-net medical system to obtain their demographic and medical characteristics. We also examined driver's licenses that were scanned into electronic health records as part of the patient registration process. We measured signature sizes and obtained the organ donor designation from these driver's licenses. Overall, 256 (45%) patients were designated as donors on their driver's licenses. Signature size averaged 113.3 mm(2) but varied greatly across patients (10th percentile 49.1 mm(2), 90th percentile 226.1 mm(2)). On multivariate analysis, donor designation was positively associated with age 18-34 years, non-black race, having private insurance, and not having any comorbid conditions. However, signature size was not associated with organ donor designation. Signature size is not associated with verified organ donor designation. Further work is needed to understand the relationship between personality types and willingness to be an organ donor. Copyright © 2016 Elsevier Inc. All rights reserved.

  7. Terahertz signatures of the exciton formation dynamics in non-resonantly excited semiconductors

    Science.gov (United States)

    Kira, M.; Hoyer, W.; Koch, S. W.

    2004-03-01

    A microscopic theory for the induced terahertz (THz) absorption of semiconductors is applied to study the time-dependent system response after non-resonant optical excitation. The formation of excitonic populations from an interacting electron-hole plasma is analyzed and the characteristic THz signatures are computed. Good qualitative agreement with recent experiments is obtained.

  8. Propagation of Dipolarization Signatures Observed by the Van Allen Probes in the Inner Magnetosphere

    Science.gov (United States)

    Ohtani, S.; Motoba, T.; Gkioulidou, M.; Takahashi, K.; Kletzing, C.

    2017-12-01

    Dipolarization, the change of the local magnetic field from a stretched to a more dipolar configuration, is one of the most fundamental processes of magnetospheric physics. It is especially critical for the dynamics of the inner magnetosphere. The associated electric field accelerates ions and electrons and transports them closer to Earth. Such injected ions intensify the ring current, and electrons constitute the seed population of the radiation belt. Those ions and electrons may also excite various waves that play important roles in the enhancement and loss of the radiation belt electrons. Despite such critical consequences, the general characteristics of dipolarization in the inner magnetosphere still remain to be understood. The Van Allen Probes mission, which consists of two probes that orbit through the equatorial region of the inner magnetosphere, provides an ideal opportunity to examine dipolarization signatures in the core of the ring current. In the present study we investigate the spatial expansion of the dipolarization region by examining the correlation and time delay of dipolarization signatures observed by the two probes. Whereas in general it requires three-point measurements to deduce the propagation of a signal on a certain plane, we statically examined the observed time delays and found that dipolarization signatures tend to propagate radially inward as well as away from midnight. In this paper we address the propagation of dipolarization signatures quantitatively and compare with the propagation velocities reported previously based on observations made farther away from Earth. We also discuss how often and under what conditions the dipolarization region expands.

  9. Power Electronics

    DEFF Research Database (Denmark)

    Iov, Florin; Ciobotaru, Mihai; Blaabjerg, Frede

    2008-01-01

    The global electrical energy consumption is still rising and there is an urgent demand to increase the power capacity. It is expected that the power capacity has to be doubled within 20 years. The production, distribution and use of energy should be as efficient as possible and incentives to save...... energy at the end-user should also be set up. Deregulation of energy has in the past lowered the investment in larger power plants, which means the need for new electrical power sources will be high in the near future. Two major technologies will play important roles to solve the future problems. One...... is to change the electrical power production sources from the conventional, fossil (and short term) based energy sources to renewable energy resources. The other is to use high efficient power electronics in power generation, power transmission/distribution and end-user application. This paper discuss the most...

  10. ΔI = 1 Signature Splitting in Signature Partners of Odd Mass Superdeformed Nuclei

    Directory of Open Access Journals (Sweden)

    Khalaf A. M.,

    2013-07-01

    Full Text Available The spins, transition energies, rotational frequencies, kinematic and dynamic moment of inertia of rotational bands of signature partners pairs of odd–A superdeformed bands in A190 region were calculated by proposing a simple model based on collective rotational model. Simulated search program was written to determine the model parameters. The calculated results agree with experimental data for fourteen signature partner pairs in Hg/Tl/Pb/Bi/nuclei. We investigated the ∆I=1 signature splitting by extracted the difference between the average transitions I+2 ! I and I ! I-2 energies in one band and the transition I+1 ! I-1 energies in its signature partner. Most of the signature partners in this region show large amplitude staggering. The signature splitting has the effect of increasing dynamical moment of inertia J 2 for favored band and decreasing J 2 for the unfavored band.

  11. Blind Quantum Signature with Blind Quantum Computation

    Science.gov (United States)

    Li, Wei; Shi, Ronghua; Guo, Ying

    2017-04-01

    Blind quantum computation allows a client without quantum abilities to interact with a quantum server to perform a unconditional secure computing protocol, while protecting client's privacy. Motivated by confidentiality of blind quantum computation, a blind quantum signature scheme is designed with laconic structure. Different from the traditional signature schemes, the signing and verifying operations are performed through measurement-based quantum computation. Inputs of blind quantum computation are securely controlled with multi-qubit entangled states. The unique signature of the transmitted message is generated by the signer without leaking information in imperfect channels. Whereas, the receiver can verify the validity of the signature using the quantum matching algorithm. The security is guaranteed by entanglement of quantum system for blind quantum computation. It provides a potential practical application for e-commerce in the cloud computing and first-generation quantum computation.

  12. Breakthrough Listen: Searching for Signatures of Technology

    Science.gov (United States)

    Isaacson, H. T.; Siemion, A. P. V.

    2017-11-01

    Breakthrough Listen is searching for signals of extra-terrestrial technologies using radio and optical telescopes. Very nearby stars of all types. Stars across the HR diagram and galaxies are all of interest in the search for techno-signatures.

  13. Magnetic signature surveillance of nuclear fuel

    International Nuclear Information System (INIS)

    Bernatowicz, H.; Schoenig, F.C.

    1981-01-01

    Typical nuclear fuel material contains tramp ferromagnetic particles of random size and distribution. Also, selected amounts of paramagnetic or ferromagnetic material can be added at random or at known positions in the fuel material. The fuel material in its non-magnetic container is scanned along its length by magnetic susceptibility detecting apparatus whereby susceptibility changes along its length are obtained and provide a unique signal waveform of the container of fuel material as a signature thereof. The output signature is stored. At subsequent times in its life the container is again scanned and respective signatures obtained which are compared with the initially obtained signature, any differences indicating alteration or tampering with the fuel material. If the fuel material includes a paramagnetic additive by taking two measurements along the container the effects thereof can be cancelled out. (author)

  14. Magnetic Signature of Brushless Electric Motors

    National Research Council Canada - National Science Library

    Clarke, David

    2006-01-01

    Brushless electric motors are used in a number of underwater vehicles. When these underwater vehicles are used for mine clearance operations the magnetic signature of the brushless motors is important...

  15. Isotopic signatures by bulk analyses

    International Nuclear Information System (INIS)

    Efurd, D.W.; Rokop, D.J.

    1997-01-01

    Los Alamos National Laboratory has developed a series of measurement techniques for identification of nuclear signatures by analyzing bulk samples. Two specific applications for isotopic fingerprinting to identify the origin of anthropogenic radioactivity in bulk samples are presented. The first example is the analyses of environmental samples collected in the US Arctic to determine the impact of dumping of radionuclides in this polar region. Analyses of sediment and biota samples indicate that for the areas sampled the anthropogenic radionuclide content of sediments was predominantly the result of the deposition of global fallout. The anthropogenic radionuclide concentrations in fish, birds and mammals were very low. It can be surmised that marine food chains are presently not significantly affected. The second example is isotopic fingerprinting of water and sediment samples from the Rocky Flats Facility (RFP). The largest source of anthropogenic radioactivity presently affecting surface-waters at RFP is the sediments that are currently residing in the holding ponds. One gram of sediment from a holding pond contains approximately 50 times more plutonium than 1 liter of water from the pond. Essentially 100% of the uranium in Ponds A-1 and A-2 originated as depleted uranium. The largest source of radioactivity in the terminal Ponds A-4, B-5 and C-2 was naturally occurring uranium and its decay product radium. The uranium concentrations in the waters collected from the terminal ponds contained 0.05% or less of the interim standard calculated derived concentration guide for uranium in waters available to the public. All of the radioactivity observed in soil, sediment and water samples collected at RFP was naturally occurring, the result of processes at RFP or the result of global fallout. No extraneous anthropogenic alpha, beta or gamma activities were detected. The plutonium concentrations in Pond C-2 appear to vary seasonally

  16. Signature for the shape of the universe

    International Nuclear Information System (INIS)

    Gomero, G.I.; Reboucas, M.J.; Teixeira, A.F.F.

    2001-03-01

    If the universe has a nontrival shape (topology) the sky may show multiple correlated images of cosmic objects. These correlations can be counched in terms of distance correlations. We propose a statistical quantity which can be used to reveal the topological signature of any Roberston-Walker (RW) spacetime with nontrivial topology. We also show through computer-aided simulations how one can extract the topological signatures of flat elliptic and hyperbolic RW universes with nontrivial topology. (author)

  17. Signature-based store checking buffer

    Science.gov (United States)

    Sridharan, Vilas; Gurumurthi, Sudhanva

    2015-06-02

    A system and method for optimizing redundant output verification, are provided. A hardware-based store fingerprint buffer receives multiple instances of output from multiple instances of computation. The store fingerprint buffer generates a signature from the content included in the multiple instances of output. When a barrier is reached, the store fingerprint buffer uses the signature to verify the content is error-free.

  18. Tightly Secure Signatures From Lossy Identification Schemes

    OpenAIRE

    Abdalla , Michel; Fouque , Pierre-Alain; Lyubashevsky , Vadim; Tibouchi , Mehdi

    2015-01-01

    International audience; In this paper, we present three digital signature schemes with tight security reductions in the random oracle model. Our first signature scheme is a particularly efficient version of the short exponent discrete log-based scheme of Girault et al. (J Cryptol 19(4):463–487, 2006). Our scheme has a tight reduction to the decisional short discrete logarithm problem, while still maintaining the non-tight reduction to the computational version of the problem upon which the or...

  19. On the security of a novel probabilistic signature based on bilinear square Diffie-Hellman problem and its extension.

    Science.gov (United States)

    Zhao, Zhenguo; Shi, Wenbo

    2014-01-01

    Probabilistic signature scheme has been widely used in modern electronic commerce since it could provide integrity, authenticity, and nonrepudiation. Recently, Wu and Lin proposed a novel probabilistic signature (PS) scheme using the bilinear square Diffie-Hellman (BSDH) problem. They also extended it to a universal designated verifier signature (UDVS) scheme. In this paper, we analyze the security of Wu et al.'s PS scheme and UDVS scheme. Through concrete attacks, we demonstrate both of their schemes are not unforgeable. The security analysis shows that their schemes are not suitable for practical applications.

  20. Optical identity authentication scheme based on elliptic curve digital signature algorithm and phase retrieval algorithm.

    Science.gov (United States)

    Fan, Desheng; Meng, Xiangfeng; Wang, Yurong; Yang, Xiulun; Peng, Xiang; He, Wenqi; Dong, Guoyan; Chen, Hongyi

    2013-08-10

    An optical identity authentication scheme based on the elliptic curve digital signature algorithm (ECDSA) and phase retrieval algorithm (PRA) is proposed. In this scheme, a user's certification image and the quick response code of the user identity's keyed-hash message authentication code (HMAC) with added noise, serving as the amplitude and phase restriction, respectively, are digitally encoded into two phase keys using a PRA in the Fresnel domain. During the authentication process, when the two phase keys are presented to the system and illuminated by a plane wave of correct wavelength, an output image is generated in the output plane. By identifying whether there is a match between the amplitude of the output image and all the certification images pre-stored in the database, the system can thus accomplish a first-level verification. After the confirmation of first-level verification, the ECDSA signature is decoded from the phase part of the output image and verified to allege whether the user's identity is legal or not. Moreover, the introduction of HMAC makes it almost impossible to forge the signature and hence the phase keys thanks to the HMAC's irreversible property. Theoretical analysis and numerical simulations both validate the feasibility of our proposed scheme.

  1. International user studies

    DEFF Research Database (Denmark)

    Nielsen, Lene; Madsen, Sabine; Jensen, Iben

    in Sydhavnen, and it is funded by InfinIT. Based on a qualitative interview study with 15 user researchers from 11 different companies, we have investigated how companies collect and present data about users on international markets. Key findings are: Companies do not collect data about end users in all...... the countries/regions they operate in. Instead, they focus on a few strategic markets. International user studies tend to be large-scale studies that involve the effort of many both internal and external/local human resources. The studies typically cover 2-4 countries/regions and many end users in each country...... across nationalities and (2) that it often is more important to focus on and take differences in market conditions into account than national culture per se. Companies are in the process of finding out how best to present the insights about international end users to their employees. However, so far...

  2. User Requirements for Wireless

    DEFF Research Database (Denmark)

    In most IT system development processes, the identification or elicitation of user requirements is recognized as a key building block. In practice, the identification of user needs and wants is a challenge and inadequate or faulty identifications in this step of an IT system development can cause...... huge problems with the final product. The elicitation of user requirements as such changes according to age groups;, to gender,; to cultural settings,; and into time; and experience in the use of the system/software. User requirements, therefore, cannot be used between projects, IT systems......, and different software. That makes the elicitation of user requirements an inherent part of any software development project and a resourceful activity as well. This book provides insights to the process of identifying user requirements and to different types by describing varying case studies in which...

  3. Electron-induced excitation of 93Mo

    Science.gov (United States)

    Chiara, C. J.; Carroll, J. J.; Marsh, J. C.; Matters, D. A.; Lane, G. J.; Hartley, D. J.; Polasik, M.; Rzadkiewicz, J.; Carpenter, M. P.; Greene, J. P.; Janssens, R. V. F.; Seweryniak, D.; Zhu, S.

    2016-09-01

    The inverse of the internal-conversion process, whereby a free electron is captured into an atomic orbital and subsequently excites the nucleus to a higher-lying state via a virtual energy exchange, was predicted to exist 40 years ago but has yet to be demonstrated experimentally. To search for this mode of nuclear excitation by electron capture, we performed an experiment at the ATLAS facility at Argonne National Laboratory. The t1/2 = 6.85-h, 21/2+ state of 93Mo was populated in the 7Li(90Zr, p 3 n) reaction. The excitation mechanism was predicted to induce depopulation of this isomer as the fast-moving 93mMo recoils slowed in the target material, emitting a characteristic sequence of γ rays in the process. Results of the search for these signature γ rays using Digital Gammasphere will be presented. This material is based upon work supported by the US DOE, Office of Science, Office of Nuclear Physics, under Contract No. DE-AC02-06CH11357. This research used resources of ANL's ATLAS facility, which is a DOE Office of Science User Facility.

  4. Functionally specified protein signatures distinctive for each of the different blue copper proteins

    Directory of Open Access Journals (Sweden)

    Anishetty Sharmila

    2004-09-01

    Full Text Available Abstract Background Proteins having similar functions from different sources can be identified by the occurrence in their sequences, a conserved cluster of amino acids referred to as pattern, motif, signature or fingerprint. The wide usage of protein sequence analysis in par with the growth of databases signifies the importance of using patterns or signatures to retrieve out related sequences. Blue copper proteins are found in the electron transport chain of prokaryotes and eukaryotes. The signatures already existing in the databases like the type 1 copper blue, multiple copper oxidase, cyt b/b6, photosystem 1 psaA&B, psaG&K, and reiske iron sulphur protein are not specified signatures for blue copper proteins as the name itself suggests. Most profile and motif databases strive to classify protein sequences into a broad spectrum of protein families. This work describes the signatures designed based on the copper metal binding motifs in blue copper proteins. The common feature in all blue copper proteins is a trigonal planar arrangement of two nitrogen ligands [each from histidine] and one sulphur containing thiolate ligand [from cysteine], with strong interactions between the copper center and these ligands. Results Sequences that share such conserved motifs are crucial to the structure or function of the protein and this could provide a signature of family membership. The blue copper proteins chosen for the study were plantacyanin, plastocyanin, cucumber basic protein, stellacyanin, dicyanin, umecyanin, uclacyanin, cusacyanin, rusticyanin, sulfocyanin, halocyanin, azurin, pseudoazurin, amicyanin and nitrite reductase which were identified in both eukaryotes and prokaryotes. ClustalW analysis of the protein sequences of each of the blue copper proteins was the basis for designing protein signatures or peptides. The protein signatures and peptides identified in this study were designed involving the active site region involving the amino acids

  5. Measuring user engagement

    CERN Document Server

    Lalmas, Mounia; Yom-Tov, Elad

    2014-01-01

    User engagement refers to the quality of the user experience that emphasizes the positive aspects of interacting with an online application and, in particular, the desire to use that application longer and repeatedly. User engagement is a key concept in the design of online applications (whether for desktop, tablet or mobile), motivated by the observation that successful applications are not just used, but are engaged with. Users invest time, attention, and emotion in their use of technology, and seek to satisfy pragmatic and hedonic needs. Measurement is critical for evaluating whether online

  6. An efficient modified Elliptic Curve Digital Signature Algorithm | Kiros ...

    African Journals Online (AJOL)

    Many digital signatures which are based on Elliptic Curves Cryptography (ECC) have been proposed. Among these digital signatures, the Elliptic Curve Digital Signature Algorithm (ECDSA) is the widely standardized one. However, the verification process of ECDSA is slower than the signature generation process. Hence ...

  7. Demonstrator 1: User Interface and User Functions

    DEFF Research Database (Denmark)

    Gram, Christian

    1999-01-01

    Describes the user interface and its functionality in a prototype system used for a virtual seminar session. The functionality is restricted to what is needed for a distributed seminar discussion among not too many people. The system is designed to work with the participants distributed at several...

  8. Early Childhood Longitudinal Study, Kindergarten Class of 2010-11 (ECLS-K:2011). User's Manual for the ECLS-K:2011 Kindergarten-First Grade Data File and Electronic Codebook, Public Version. NCES 2015-078

    Science.gov (United States)

    Tourangeau, Karen; Nord, Christine; Lê, Thanh; Wallner-Allen, Kathleen; Hagedorn, Mary C.; Leggitt, John; Najarian, Michelle

    2015-01-01

    This manual provides guidance and documentation for users of the longitudinal kindergarten-first grade (K-1) data file of the Early Childhood Longitudinal Study, Kindergarten Class of 2010-11 (ECLS-K:2011). It mainly provides information specific to the first-grade rounds of data collection. Data for the ECLS-K:2011 are released in both a…

  9. Does Twitter trigger bursts in signature collections?

    Science.gov (United States)

    Yamaguchi, Rui; Imoto, Seiya; Kami, Masahiro; Watanabe, Kenji; Miyano, Satoru; Yuji, Koichiro

    2013-01-01

    The quantification of social media impacts on societal and political events is a difficult undertaking. The Japanese Society of Oriental Medicine started a signature-collecting campaign to oppose a medical policy of the Government Revitalization Unit to exclude a traditional Japanese medicine, "Kampo," from the public insurance system. The signature count showed a series of aberrant bursts from November 26 to 29, 2009. In the same interval, the number of messages on Twitter including the keywords "Signature" and "Kampo," increased abruptly. Moreover, the number of messages on an Internet forum that discussed the policy and called for signatures showed a train of spikes. In order to estimate the contributions of social media, we developed a statistical model with state-space modeling framework that distinguishes the contributions of multiple social media in time-series of collected public opinions. We applied the model to the time-series of signature counts of the campaign and quantified contributions of two social media, i.e., Twitter and an Internet forum, by the estimation. We found that a considerable portion (78%) of the signatures was affected from either of the social media throughout the campaign and the Twitter effect (26%) was smaller than the Forum effect (52%) in total, although Twitter probably triggered the initial two bursts of signatures. Comparisons of the estimated profiles of the both effects suggested distinctions between the social media in terms of sustainable impact of messages or tweets. Twitter shows messages on various topics on a time-line; newer messages push out older ones. Twitter may diminish the impact of messages that are tweeted intermittently. The quantification of social media impacts is beneficial to better understand people's tendency and may promote developing strategies to engage public opinions effectively. Our proposed method is a promising tool to explore information hidden in social phenomena.

  10. Does Twitter trigger bursts in signature collections?

    Directory of Open Access Journals (Sweden)

    Rui Yamaguchi

    Full Text Available INTRODUCTION: The quantification of social media impacts on societal and political events is a difficult undertaking. The Japanese Society of Oriental Medicine started a signature-collecting campaign to oppose a medical policy of the Government Revitalization Unit to exclude a traditional Japanese medicine, "Kampo," from the public insurance system. The signature count showed a series of aberrant bursts from November 26 to 29, 2009. In the same interval, the number of messages on Twitter including the keywords "Signature" and "Kampo," increased abruptly. Moreover, the number of messages on an Internet forum that discussed the policy and called for signatures showed a train of spikes. METHODS AND FINDINGS: In order to estimate the contributions of social media, we developed a statistical model with state-space modeling framework that distinguishes the contributions of multiple social media in time-series of collected public opinions. We applied the model to the time-series of signature counts of the campaign and quantified contributions of two social media, i.e., Twitter and an Internet forum, by the estimation. We found that a considerable portion (78% of the signatures was affected from either of the social media throughout the campaign and the Twitter effect (26% was smaller than the Forum effect (52% in total, although Twitter probably triggered the initial two bursts of signatures. Comparisons of the estimated profiles of the both effects suggested distinctions between the social media in terms of sustainable impact of messages or tweets. Twitter shows messages on various topics on a time-line; newer messages push out older ones. Twitter may diminish the impact of messages that are tweeted intermittently. CONCLUSIONS: The quantification of social media impacts is beneficial to better understand people's tendency and may promote developing strategies to engage public opinions effectively. Our proposed method is a promising tool to explore

  11. Who are your users?

    DEFF Research Database (Denmark)

    Nielsen, Lene; Salminen, joni; Jung, Soon-Gyo

    2017-01-01

    One of the reasons for using personas is to align user understandings across project teams and sites. As part of a larger persona study, at Al Jazeera English (AJE), we conducted 16 qualitative interviews with media producers, the end users of persona descriptions. We asked the participants about...

  12. Additional user needs

    International Nuclear Information System (INIS)

    Rorschach, H.E.; Hayter, J.B.

    1986-01-01

    This paper summarizes the conclusions of a discussion group on users' needs held at the Workshop on an Advanced Steady-State Neutron Facility. The discussion was devoted to reactor characteristics, special facilities and siting considerations suggested by user needs. (orig.)

  13. Vulnerable road users.

    NARCIS (Netherlands)

    2010-01-01

    A group of road users can be defined as ‘vulnerable’ in a number of ways, such as by the amount of protection in traffic (e.g. pedestrians and cyclists) or by the amount of task capability (e.g. the young and the elderly). Vulnerable road users do not usually have a protective 'shell', and also the

  14. User Requirements for Wireless

    DEFF Research Database (Denmark)

    In most IT system development processes, the identification or elicitation of user requirements is recognized as a key building block. In practice, the identification of user needs and wants is a challenge and inadequate or faulty identifications in this step of an IT system development can cause...... involvement and requirements elicitation Usable security requirements for design of privacy...

  15. User Interface History

    DEFF Research Database (Denmark)

    Jørgensen, Anker Helms; Myers, Brad A

    2008-01-01

    User Interfaces have been around as long as computers have existed, even well before the field of Human-Computer Interaction was established. Over the years, some papers on the history of Human-Computer Interaction and User Interfaces have appeared, primarily focusing on the graphical interface era...

  16. Interactive data manipulation program. FAWTEK user guide

    International Nuclear Information System (INIS)

    Boyer, W.B.; Sauer, S.

    1980-02-01

    This report describes the interactive data acquisition and manipulation program FAWTEK.'The program allows users of the electron beam data acquisition facility to control the R7912 digitizers and to perform a variety of mathematical operations on data arrays. Commands are entered in a high level language via a Tektronix 4010 terminal console. Each command directive and associated parameters is described in detail

  17. User Frustrations as Opportunities

    Directory of Open Access Journals (Sweden)

    Michael Weiss

    2012-04-01

    Full Text Available User frustrations are an excellent source of new product ideas. Starting with this observation, this article describes an approach that entrepreneurs can use to discover business opportunities. Opportunity discovery starts with a problem that the user has, but may not be able to articulate. User-centered design techniques can help elicit those latent needs. The entrepreneur should then try to understand how users are solving their problem today, before proposing a solution that draws on the unique skills and technical capabilities available to the entrepreneur. Finally, an in-depth understanding of the user allows the entrepreneur to hone in on the points of difference and resonance that are the foundation of a strong customer value proposition.

  18. User participation in implementation

    DEFF Research Database (Denmark)

    Fleron, Benedicte; Rasmussen, Rasmus; Simonsen, Jesper

    2012-01-01

    experienced more uncertainty and frustration than management and non-participating staff, especially concerning how to run an implementation process and how to understand and utilize the configuration possibilities of the system. This suggests that user participation in implementation introduces a need......Systems development has been claimed to benefit from user participation, yet user participation in implementation activities may be more common and is a growing focus of participatory-design work. We investigate the effect of the extensive user participation in the implementation of a clinical...... system by empirically analyzing how management, participating staff, and non-participating staff view the implementation process with respect to areas that have previously been linked to user participation such as system quality, emergent interactions, and psychological buy-in. The participating staff...

  19. The PANTHER User Experience

    Energy Technology Data Exchange (ETDEWEB)

    Coram, Jamie L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Morrow, James D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Perkins, David Nikolaus [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-09-01

    This document describes the PANTHER R&D Application, a proof-of-concept user interface application developed under the PANTHER Grand Challenge LDRD. The purpose of the application is to explore interaction models for graph analytics, drive algorithmic improvements from an end-user point of view, and support demonstration of PANTHER technologies to potential customers. The R&D Application implements a graph-centric interaction model that exposes analysts to the algorithms contained within the GeoGraphy graph analytics library. Users define geospatial-temporal semantic graph queries by constructing search templates based on nodes, edges, and the constraints among them. Users then analyze the results of the queries using both geo-spatial and temporal visualizations. Development of this application has made user experience an explicit driver for project and algorithmic level decisions that will affect how analysts one day make use of PANTHER technologies.

  20. Lead User Innovation

    DEFF Research Database (Denmark)

    Brem, Alexander; Larsen, Henry

    2015-01-01

    User innovation and especially the integration of lead users is a key topic in the innovation management literature of recent years. This paper contributes by providing a rare perspective into what easily could be seen as innovation failure, shown from two perspectives. We show how a lack of shared...... imagination hampers participation and kills innovation between interdependent stakeholders at the threshold between invention and innovation in practice. We present a first case in the fun-sport industry where an external lead user and diverse firm representatives in different functions fail to create......, deliver and capture the value of an innovatively new device together. From the perspective of the lead user, we show antecedents and effects of social interaction between organizational actors and the lead user on the development of social capital, especially trust and shared imagination. The second case...

  1. Converting hard copy documents for electronic dissemination

    Energy Technology Data Exchange (ETDEWEB)

    Hoffman, F.

    1994-12-31

    Since the advent of computer systems, the goal of a paperless office, and even a paperless society, has been pursued. While the normal paper flow in an organization is far from totally automated, particularly for items requiring signatures or authorizations, electronic information dissemination is becoming an almost simple task. The reasons for providing on-line documents are many and include faster and easier access for everyone, elimination of printing costs, reduction of wasted shelf and desk space, and the security of having a centrally-located, always up-to-date document. New computer software even provides the user with the ability to annotate documents and to have bookmarks so that the old scribbled-in and dog-eared manual can be replaced without loosing this `customizability`. Moreover, new hypermedia capabilities mean that documents can be read in a non-linear fashion and can include color figures and photographs, audio, and even animation sequences, capabilities which exceed those of paper. The proliferation of network-based information servers, coupled with the growth of the Internet, has enticed academic, governmental, and even commercial organizations to provide increasing numbers of documents and data bases in electronic form via the network, not just to internal staff, but to the public as well. Much of this information, which includes everything from mundane company procedures to spiffy marketing brochures, was previously published only in hard copy. Converting existing documents to electronic form and producing only electronic versions of new documents poses some interesting challenges to the maintainer or author.

  2. Lattice-Based Revocable Certificateless Signature

    Directory of Open Access Journals (Sweden)

    Ying-Hao Hung

    2017-10-01

    Full Text Available Certificateless signatures (CLS are noticeable because they may resolve the key escrow problem in ID-based signatures and break away the management problem regarding certificate in conventional signatures. However, the security of the mostly previous CLS schemes relies on the difficulty of solving discrete logarithm or large integer factorization problems. These two problems would be solved by quantum computers in the future so that the signature schemes based on them will also become insecure. For post-quantum cryptography, lattice-based cryptography is significant due to its efficiency and security. However, no study on addressing the revocation problem in the existing lattice-based CLS schemes is presented. In this paper, we focus on the revocation issue and present the first revocable CLS (RCLS scheme over lattices. Based on the short integer solution (SIS assumption over lattices, the proposed lattice-based RCLS scheme is shown to be existential unforgeability against adaptive chosen message attacks. By performance analysis and comparisons, the proposed lattice-based RCLS scheme is better than the previously proposed lattice-based CLS scheme, in terms of private key size, signature length and the revocation mechanism.

  3. User`s guide to MIDAS

    Energy Technology Data Exchange (ETDEWEB)

    Tisue, S.A.; Williams, N.B.; Huber, C.C. [Argonne National Lab., IL (United States). Decision and Information Sciences Div.; Chun, K.C. [Argonne National Lab., IL (United States). Environmental Assessment Div.

    1995-12-01

    Welcome to the MIDAS User`s Guide. This document describes the goals of the Munitions Items Disposition Action System (MIDAS) program and documents the MIDAS software. The main text first describes the equipment and software you need to run MIDAS and tells how to install and start it. It lists the contents of the database and explains how it is organized. Finally, it tells how to perform various functions, such as locating, entering, viewing, deleting, changing, transferring, and printing both textual and graphical data. Images of the actual computer screens accompany these explanations and guidelines. Appendix A contains a glossary of names for the various abbreviations, codes, and chemicals; Appendix B is a list of modem names; Appendix C provides a database dictionary and rules for entering data; and Appendix D describes procedures for troubleshooting problems associated with connecting to the MIDAS server and using MIDAS.

  4. Fuzzy Intervals for Designing Structural Signature: An Application to Graphic Symbol Recognition

    Science.gov (United States)

    Luqman, Muhammad Muzzamil; Delalandre, Mathieu; Brouard, Thierry; Ramel, Jean-Yves; Lladós, Josep

    The motivation behind our work is to present a new methodology for symbol recognition. The proposed method employs a structural approach for representing visual associations in symbols and a statistical classifier for recognition. We vectorize a graphic symbol, encode its topological and geometrical information by an attributed relational graph and compute a signature from this structural graph. We have addressed the sensitivity of structural representations to noise, by using data adapted fuzzy intervals. The joint probability distribution of signatures is encoded by a Bayesian network, which serves as a mechanism for pruning irrelevant features and choosing a subset of interesting features from structural signatures of underlying symbol set. The Bayesian network is deployed in a supervised learning scenario for recognizing query symbols. The method has been evaluated for robustness against degradations & deformations on pre-segmented 2D linear architectural & electronic symbols from GREC databases, and for its recognition abilities on symbols with context noise i.e. cropped symbols.

  5. 27 CFR 73.34 - When is an electronically submitted form considered timely filed?

    Science.gov (United States)

    2010-04-01

    ... ELECTRONIC SIGNATURES; ELECTRONIC SUBMISSION OF FORMS Electronic Filing of Documents with TTB § 73.34 When is an electronically submitted form considered timely filed? If you submit a form to our electronic document receiving system, your report will be considered filed on the date of the electronic postmark...

  6. An Enhanced Data Integrity Model In Mobile Cloud Environment Using Digital Signature Algorithm And Robust Reversible Watermarking

    Directory of Open Access Journals (Sweden)

    Boukari Souley

    2017-10-01

    Full Text Available the increase use of hand held devices such as smart phones to access multimedia content in the cloud is increasing with rise and growth in information technology. Mobile cloud computing is increasingly used today because it allows users to have access to variety of resources in the cloud such as image video audio and software applications with minimal usage of their inbuilt resources such as storage memory by using the one available in the cloud. The major challenge faced with mobile cloud computing is security. Watermarking and digital signature are some techniques used to provide security and authentication on user data in the cloud. Watermarking is a technique used to embed digital data within a multimedia content such as image video or audio in order to prevent authorized access to those content by intruders whereas digital signature is used to identify and verify user data when accessed. In this work we implemented digital signature and robust reversible image watermarking in order enhance mobile cloud computing security and integrity of data by providing double authentication techniques. The results obtained show the effectiveness of combining the two techniques robust reversible watermarking and digital signature by providing strong authentication to ensures data integrity and extract the original content watermarked without changes.

  7. SPECTROSCOPIC SIGNATURES RELATED TO A SUNQUAKE

    International Nuclear Information System (INIS)

    Matthews, S. A.; Harra, L. K.; Green, L. M.; Zharkov, S.

    2015-01-01

    The presence of flare-related acoustic emission (sunquakes (SQs)) in some flares, and only in specific locations within the flaring environment, represents a severe challenge to our current understanding of flare energy transport processes. In an attempt to contribute to understanding the origins of SQs we present a comparison of new spectral observations from Hinode’s EUV imaging Spectrometer (EIS) and the Interface Region Imaging Spectrograph (IRIS) of the chromosphere, transition region, and corona above an SQ, and compare them to the spectra observed in a part of the flaring region with no acoustic signature. Evidence for the SQ is determined using both time–distance and acoustic holography methods, and we find that unlike many previous SQ detections, the signal is rather dispersed, but that the time–distance and 6 and 7 mHz sources converge at the same spatial location. We also see some evidence for different evolution at different frequencies, with an earlier peak at 7 mHz than at 6 mHz. Using EIS and IRIS spectroscopic measurements we find that in this location, at the time of the 7 mHz peak the spectral emission is significantly more intense, shows larger velocity shifts and substantially broader profiles than in the location with no SQ, and there is a good correlation between blueshifted, hot coronal, hard X-ray (HXR), and redshifted chromospheric emission, consistent with the idea of a strong downward motion driven by rapid heating by nonthermal electrons and the formation of chromospheric shocks. Exploiting the diagnostic potential of the Mg ii triplet lines, we also find evidence for a single large temperature increase deep in the atmosphere, which is consistent with this scenario. The time of the 6 mHz and time–distance peak signal coincides with a secondary peak in the energy release process, but in this case we find no evidence of HXR emission in the quake location, instead finding very broad spectral lines, strongly shifted to the red

  8. The User Reconfigured

    DEFF Research Database (Denmark)

    Bardzell, Jeffrey; Bardzell, Shaowen

    2015-01-01

    Foundational to HCI is the notion of “the user.” Whether a cognitive processor, social actor, consumer, or even a non- user, the user in HCI has always been as much a technical construct as actual people using systems. We explore an emerging formulation of the user—the subjectivity of in- formati......, and activism. We argue that subjectivi- ties of information clarifies the relationships between de- sign choices and embodied experiences, ways that designers design users and not just products, and ways to cultivate and transform, rather than merely support, human agency.......Foundational to HCI is the notion of “the user.” Whether a cognitive processor, social actor, consumer, or even a non- user, the user in HCI has always been as much a technical construct as actual people using systems. We explore an emerging formulation of the user—the subjectivity of in- formation......—by laying out what it means and why research- ers are being drawn to it. We then use it to guide a case study of a relatively marginal use of computing—digitally mediated sexuality—to holistically explore design in rela- tion to embodiment, tactual experience, sociability, power, ideology, selfhood...

  9. Topology and signature changes in braneworlds

    International Nuclear Information System (INIS)

    Gibbons, Gary W; Ishibashi, Akihiro

    2004-01-01

    It has been believed that topology and signature change of the universe can only happen accompanied by singularities, in classical, or instantons, in quantum, gravity. In this paper, we point out however that in the braneworld context, such an event can be understood as a classical, smooth event. We supply some explicit examples of such cases, starting from the Dirac-Born-Infeld action. Topology change of the brane universe can be realized by allowing self-intersecting branes. Signature change in a braneworld is made possible in an everywhere Lorentzian bulk spacetime. In our examples, the boundary of the signature change is a curvature singularity from the brane point of view, but nevertheless that event can be described in a completely smooth manner from the bulk point of view

  10. Biomarker Gene Signature Discovery Integrating Network Knowledge

    Directory of Open Access Journals (Sweden)

    Holger Fröhlich

    2012-02-01

    Full Text Available Discovery of prognostic and diagnostic biomarker gene signatures for diseases, such as cancer, is seen as a major step towards a better personalized medicine. During the last decade various methods, mainly coming from the machine learning or statistical domain, have been proposed for that purpose. However, one important obstacle for making gene signatures a standard tool in clinical diagnosis is the typical low reproducibility of these signatures combined with the difficulty to achieve a clear biological interpretation. For that purpose in the last years there has been a growing interest in approaches that try to integrate information from molecular interaction networks. Here we review the current state of research in this field by giving an overview about so-far proposed approaches.

  11. Selection signatures in worldwide sheep populations.

    Science.gov (United States)

    Fariello, Maria-Ines; Servin, Bertrand; Tosser-Klopp, Gwenola; Rupp, Rachel; Moreno, Carole; San Cristobal, Magali; Boitard, Simon

    2014-01-01

    The diversity of populations in domestic species offers great opportunities to study genome response to selection. The recently published Sheep HapMap dataset is a great example of characterization of the world wide genetic diversity in sheep. In this study, we re-analyzed the Sheep HapMap dataset to identify selection signatures in worldwide sheep populations. Compared to previous analyses, we made use of statistical methods that (i) take account of the hierarchical structure of sheep populations, (ii) make use of linkage disequilibrium information and (iii) focus specifically on either recent or older selection signatures. We show that this allows pinpointing several new selection signatures in the sheep genome and distinguishing those related to modern breeding objectives and to earlier post-domestication constraints. The newly identified regions, together with the ones previously identified, reveal the extensive genome response to selection on morphology, color and adaptation to new environments.

  12. Molecular Signature in HCV-Positive Lymphomas

    Directory of Open Access Journals (Sweden)

    Valli De Re

    2012-01-01

    Full Text Available Hepatitis C virus (HCV is a positive, single-stranded RNA virus, which has been associated to different subtypes of B-cell non-Hodgkin lymphoma (B-NHL. Cumulative evidence suggests an HCV-related antigen driven process in the B-NHL development. The underlying molecular signature associated to HCV-related B-NHL has to date remained obscure. In this review, we discuss the recent developments in this field with a special mention to different sets of genes whose expression is associated with BCR coupled to Blys signaling which in turn was found to be linked to B-cell maturation stages and NF-κb transcription factor. Even if recent progress on HCV-B-NHL signature has been made, the precise relationship between HCV and lymphoma development and phenotype signature remain to be clarified.

  13. Cryptanalysis of the arbitrated quantum signature protocols

    Energy Technology Data Exchange (ETDEWEB)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2011-08-15

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  14. Peripheral blood signatures of lead exposure.

    Directory of Open Access Journals (Sweden)

    Heather G LaBreche

    Full Text Available BACKGROUND: Current evidence indicates that even low-level lead (Pb exposure can have detrimental effects, especially in children. We tested the hypothesis that Pb exposure alters gene expression patterns in peripheral blood cells and that these changes reflect dose-specific alterations in the activity of particular pathways. METHODOLOGY/PRINCIPAL FINDING: Using Affymetrix Mouse Genome 430 2.0 arrays, we examined gene expression changes in the peripheral blood of female Balb/c mice following exposure to per os lead acetate trihydrate or plain drinking water for two weeks and after a two-week recovery period. Data sets were RMA-normalized and dose-specific signatures were generated using established methods of supervised classification and binary regression. Pathway activity was analyzed using the ScoreSignatures module from GenePattern. CONCLUSIONS/SIGNIFICANCE: The low-level Pb signature was 93% sensitive and 100% specific in classifying samples a leave-one-out crossvalidation. The high-level Pb signature demonstrated 100% sensitivity and specificity in the leave-one-out crossvalidation. These two signatures exhibited dose-specificity in their ability to predict Pb exposure and had little overlap in terms of constituent genes. The signatures also seemed to reflect current levels of Pb exposure rather than past exposure. Finally, the two doses showed differential activation of cellular pathways. Low-level Pb exposure increased activity of the interferon-gamma pathway, whereas high-level Pb exposure increased activity of the E2F1 pathway.

  15. Designing for user engagement

    CERN Document Server

    Geisler, Cheryl

    2013-01-01

    Designing for User Engagement on the Web: 10 Basic Principles is concerned with making user experience engaging. The cascade of social web applications we are now familiar with - blogs, consumer reviews, wikis, and social networking - are all engaging experiences. But engagement is an increasingly common goal in business and productivity environments as well. This book provides a foundation for all those seeking to design engaging user experiences rich in communication and interaction. Combining a handbook on basic principles with case studies, it provides readers with a ric

  16. Game user experience evaluation

    CERN Document Server

    Bernhaupt, Regina

    2015-01-01

    Evaluating interactive systems for their user experience (UX) is a standard approach in industry and research today. This book explores the areas of game design and development and Human Computer Interaction (HCI) as ways to understand the various contributing aspects of the overall gaming experience. Fully updated, extended and revised this book is based upon the original publication Evaluating User Experience in Games, and provides updated methods and approaches ranging from user- orientated methods to game specific approaches. New and emerging methods and areas explored include physiologi

  17. Doppler Velocity Signatures of Idealized Elliptical Vortices

    Directory of Open Access Journals (Sweden)

    Wen-Chau Lee

    2006-01-01

    Full Text Available Doppler radar observations have revealed a class of atmospheric vortices (tropical cyclones, tornadoes, dust devils that possess elliptical radar reflectivity signatures. One famous example is Typhoon Herb (1996 that maintained its elliptical reflectivity structure over a 40-hour period. Theoretical work and dual-Doppler analyses of observed tropical cyclones have suggested two physical mechanisms that can explain the formation of two types of elliptical vortices observed in nature, namely, the combination of a circular vortex with either a wavenumber two vortex Rossby wave or a deformation field. The characteristics of these two types of elliptical vortices and their corresponding Doppler velocity signatures have not been previously examined.

  18. Cryptanalysis of the Quantum Group Signature Protocols

    Science.gov (United States)

    Zhang, Ke-Jia; Sun, Ying; Song, Ting-Ting; Zuo, Hui-Juan

    2013-11-01

    Recently, the researches of quantum group signature (QGS) have attracted a lot of attentions and some typical protocols have been designed for e-payment system, e-government, e-business, etc. In this paper, we analyze the security of the quantum group signature with the example of two novel protocols. It can be seen that both of them cannot be implemented securely since the arbitrator cannot solve the disputes fairly. In order to show that, some possible attack strategies, which can be used by the malicious participants, are proposed. Moreover, the further discussions of QGS are presented finally, including some insecurity factors and improved ideas.

  19. State of the Art: Signature Biometrics Verification

    Directory of Open Access Journals (Sweden)

    Nourddine Guersi

    2010-04-01

    Full Text Available This paper presents a comparative analysis of the performance of three estimation algorithms: Expectation Maximization (EM, Greedy EM Algorithm (GEM and Figueiredo-Jain Algorithm (FJ - based on the Gaussian mixture models (GMMs for signature biometrics verification. The simulation results have shown significant performance achievements. The test performance of EER=5.49 % for "EM", EER=5.04 % for "GEM" and EER=5.00 % for "FJ", shows that the behavioral information scheme of signature biometrics is robust and has a discriminating power, which can be explored for identity authentication.

  20. Dictionary of Large Hadron Collider Signatures

    CERN Document Server

    Belyaev, A; de Roeck, A; Godbole, R M; Mellado, B; Nyffeler, A; Petridou, C; Roy, D P

    2009-01-01

    We report on a plan to establish a "Dictionary of LHC Signatures", an initiative that started at the WHEPPX workshop in January 2008. This study aims towards the strategy on distinguishing of 3 classes of dark matter motivated scenarios such as R-parity conserved supersymmetry, Little Higgs models with T-parity conservation and Universal Extra Dimensions with KK-parity for generic cases of their realization in wide range of the model space. Discriminating signatures are tabulated and will need a further detailed analysis.

  1. Security problem on arbitrated quantum signature schemes

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Jeong Woon [Emerging Technology R and D Center, SK Telecom, Kyunggi 463-784 (Korea, Republic of); Chang, Ku-Young; Hong, Dowon [Cryptography Research Team, Electronics and Telecommunications Research Institute, Daejeon 305-700 (Korea, Republic of)

    2011-12-15

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  2. Tau-Sneutrino NLSP and Multilepton Signatures at the LHC

    CERN Document Server

    Figy, Terrance; Santoso, Yudi

    2010-01-01

    In models with gravitino as the lightest supersymmetric particle(LSP), the next to lightest supersymmetric particle (NLSP) can have a long lifetime and appear stable in collider experiments. We study the leptonic signatures of such a scenario with tau-sneutrino as the NLSP, which is realized in the non-universal Higgs masses scenario. We focus on an interesting trilepton signature with two like-sign taus and an electron or a muon of opposite sign. The neutralinos and charginos are quite heavy in the model considered, and the trilepton signal comes mostly from the slepton-sneutrino production. We identify the relevant backgrounds, taking into account tau decays, and devise a set of cuts to optimize this trilepton signal. We simulate signal and backgrounds at the LHC with 14 TeV center-of-mass energy. Although the sleptons in this model are relatively light, O(100 GeV), discovery is more demanding compared to typical neutralino LSP scenarios. The trilepton signal requires large amount of accumulated data, at le...

  3. Zeiss ΣIGMA VP-FE-SEM User Guide

    Science.gov (United States)

    User guide for analyzing carbon based nanomaterials on a Zeiss Sigma microscope. The guide includes helpful steps for sample preparation and loading. Specific topics utilizing the scanning electron microscope are instrumentation startup and imagining. A variety of detectors in...

  4. SEVERO code - user's manual

    International Nuclear Information System (INIS)

    Sacramento, A.M. do.

    1989-01-01

    This user's manual contains all the necessary information concerning the use of SEVERO code. This computer code is related to the statistics of extremes = extreme winds, extreme precipitation and flooding hazard risk analysis. (A.C.A.S.)

  5. VIERS- User Preference Service

    Data.gov (United States)

    Department of Veterans Affairs — The Preferences service provides a means to store, retrieve, and manage user preferences. The service supports definition of enterprise wide preferences, as well as...

  6. Bevalac user's handbook

    International Nuclear Information System (INIS)

    1990-04-01

    This report is a users manual on the Bevalac accelerator facility. This paper discuses: general information; the Bevalac and its operation; major facilities and experimental areas; and experimental equipment

  7. User Interface History

    DEFF Research Database (Denmark)

    Jørgensen, Anker Helms; Myers, Brad A

    2008-01-01

    User Interfaces have been around as long as computers have existed, even well before the field of Human-Computer Interaction was established. Over the years, some papers on the history of Human-Computer Interaction and User Interfaces have appeared, primarily focusing on the graphical interface era...... and early visionaries such as Bush, Engelbart and Kay. With the User Interface being a decisive factor in the proliferation of computers in society and since it has become a cultural phenomenon, it is time to paint a more comprehensive picture of its history. This SIG will investigate the possibilities...... of  launching a concerted effort towards creating a History of User Interfaces. ...

  8. Electronics and electronic systems

    CERN Document Server

    Olsen, George H

    1987-01-01

    Electronics and Electronic Systems explores the significant developments in the field of electronics and electronic devices. This book is organized into three parts encompassing 11 chapters that discuss the fundamental circuit theory and the principles of analog and digital electronics. This book deals first with the passive components of electronic systems, such as resistors, capacitors, and inductors. These topics are followed by a discussion on the analysis of electronic circuits, which involves three ways, namely, the actual circuit, graphical techniques, and rule of thumb. The remaining p

  9. SILMUSCEN and CLIGEN User`s Guide

    Energy Technology Data Exchange (ETDEWEB)

    Carter, T.; Tuomenvirta, H. [Finnish Meteorological Inst., Helsinki (Finland); Posch, M. [Water and Environment Research Inst., Helsinki (Finland)

    1995-12-31

    This User`s Guide has been prepared to provide recommendations for the selection and application of climatic scenarios in the Finnish Research Programme on Climate Change (SILMU). These scenarios are required for conducting impact studies in SILMU. They should reflect the current range of estimates of future climate in the Finnish region. In addition, they should be consistent with other projections of importance in impact studies, such as future atmospheric composition and sea level. Section 2 provides some background information about the types of scenarios required in SILMU and Section 3 offers a general description of the scenarios. In Section 4 there is some advice on applying sensitivity studies to complement the use of scenarios. Section 5 explains the installation of the SILMUSCEN program and Section 6 guides the user through some examples to illustrate how SILMUSCEN can be used. Section 7 offers some recommendations on which scenarios to adopt for different impact assessments. In order to ensure some compatibility between impact studies in SILMU, it is very important that the recommendations in this section are followed as far as possible. Section 8 addresses important omissions from the computer program and suggests procedures to adopt in their absence. Section 9 explores alternative methods of specifying the baseline climate, and shows how scenario adjustments to the baseline can be made. in Section 10, the stochastic weather generator, CLIGEN, is described and its use illustrated by means of examples. Finally, possible refinements of the programs are outlined in Section 11, along with contact names and addresses for obtaining further information. (36 refs.)

  10. VOLTTRON: User Guide

    Energy Technology Data Exchange (ETDEWEB)

    Lutes, Robert G.; Katipamula, Srinivas; Akyol, Bora A.; Tenney, Nathan D.; Haack, Jereme N.; Monson, Kyle E.; Carpenter, Brandon J.

    2014-04-24

    This document is a user guide for the deployment of the Transactional Network platform and agent/application development within the VOLTTRON. The intent of this user guide is to provide a description of the functionality of the Transactional Network Platform. This document describes how to deploy the platform, including installation, use, guidance, and limitations. It also describes how additional features can be added to enhance its current functionality.

  11. Program Trains NASTRAN Users

    Science.gov (United States)

    Grooms, H. R.; Hinz, P. J.; Collier, M. A.; Cox, Kim D.; Merriman, Warren J.; Commerford, Gerry

    1994-01-01

    Rockwell Environment and NASTRAN Trainer (RENT) computer program developed to assist new and current users of NASTRAN finite-element computer code. Provides organized, systematic collection of IBM(R) features consisting of panels, clists, skeletons, and messages, along with FORTRAN and Pascal programs and example NASTRAN data files. Enables each user to learn at his or her own pace. Written in VS/FORTRAN, VS/ Pascal, and IBM(R) job-control language for an IBM(R) computer system.

  12. A group signature scheme based on quantum teleportation

    Energy Technology Data Exchange (ETDEWEB)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu, E-mail: wxjun36@gmail.co [Information Countermeasure Technique Research Institute, Harbin Institute of Technology, Harbin 150001 (China)

    2010-05-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  13. COMPUTER-IMPLEMENTED METHOD OF PERFORMING A SEARCH USING SIGNATURES

    DEFF Research Database (Denmark)

    2017-01-01

    A computer-implemented method of processing a query vector and a data vector), comprising: generating a set of masks and a first set of multiple signatures and a second set of multiple signatures by applying the set of masks to the query vector and the data vector, respectively, and generating...... candidate pairs, of a first signature and a second signature, by identifying matches of a first signature and a second signature. The set of masks comprises a configuration of the elements that is a Hadamard code; a permutation of a Hadamard code; or a code that deviates from a Hadamard code...

  14. Metadata: A user`s view

    Energy Technology Data Exchange (ETDEWEB)

    Bretherton, F.P. [Univ. of Wisconsin, Madison, WI (United States); Singley, P.T. [Oak Ridge National Lab., TN (United States)

    1994-12-31

    An analysis is presented of the uses of metadata from four aspects of database operations: (1) search, query, retrieval, (2) ingest, quality control, processing, (3) application to application transfer; (4) storage, archive. Typical degrees of database functionality ranging from simple file retrieval to interdisciplinary global query with metadatabase-user dialog and involving many distributed autonomous databases, are ranked in approximate order of increasing sophistication of the required knowledge representation. An architecture is outlined for implementing such functionality in many different disciplinary domains utilizing a variety of off the shelf database management subsystems and processor software, each specialized to a different abstract data model.

  15. TOXsIgN: a cross-species repository for toxicogenomic signatures.

    Science.gov (United States)

    Darde, Thomas A; Gaudriault, Pierre; Beranger, Rémi; Lancien, Clément; Caillarec-Joly, Annaëlle; Sallou, Olivier; Bonvallot, Nathalie; Chevrier, Cécile; Mazaud-Guittot, Séverine; Jégou, Bernard; Collin, Olivier; Becker, Emmanuelle; Rolland, Antoine D; Chalmel, Frédéric

    2018-01-27

    At the same time that toxicologists express increasing concern about reproducibility in this field, the development of dedicated databases has already smoothed the path toward improving the storage and exchange of raw toxicogenomic data. Nevertheless, none provides access to analyzed and interpreted data as originally reported in scientific publications. Given the increasing demand for access to this information, we developed TOXsIgN, a repository for TOXicogenomic sIgNatures. The TOXsIgN repository provides a flexible environment that facilitates online submission, storage, and retrieval of toxicogenomic signatures by the scientific community. It currently hosts 754 projects that describe more than 450 distinct chemicals and their 8491 associated signatures. It also provides users with a working environment containing a powerful search engine as well as bioinformatics/biostatistics modules that enable signature comparisons or enrichment analyses. The TOXsIgN repository is freely accessible at http://toxsign.genouest.org. Website implemented in Python, JavaScript, and MongoDB, with all major browsers supported. frederic.chalmel@inserm.fr. Supplementary data are available at Bioinformatics online. © The Author (2018). Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  16. Study of the microdoppler signature of a bicyclist for different directions of approach

    Science.gov (United States)

    Rodriguez-Hervas, Berta; Maile, Michael; Flores, Benjamin C.

    2015-05-01

    The successful implementation of autonomous driving in an urban setting depends on the ability of the environment perception system to correctly classify vulnerable road users such as pedestrians and bicyclists in dense, complex scenarios. Self-driving vehicles include sensor systems such as cameras, lidars, and radars to enable decision making. Among these systems, radars are particularly relevant due to their operational robustness under adverse weather and night light conditions. Classification of pedestrian and car in urban settings using automotive radar has been widely investigated, suggesting that micro-Doppler signatures are useful for target discrimination. Our objective is to analyze and study the micro-Doppler signature of bicyclists approaching a vehicle from different directions in order to establish the basis of a classification criterion to distinguish bicycles from other targets including clutter. The micro-Doppler signature is obtained by grouping individual reflecting points using a clustering algorithm and observing the evolution of all the points belonging to an object in the Doppler domain over time. A comparison is then made with simulated data that uses a kinematic model of bicyclists' movement. The suitability of the micro-Doppler bicyclist signature as a classification feature is determined by comparing it to those belonging to cars and pedestrians approaching the automotive radar system.

  17. Pilot users in agile development processes: motivational factors.

    Science.gov (United States)

    Johannessen, Liv Karen; Gammon, Deede

    2010-01-01

    Despite a wealth of research on user participation, few studies offer insights into how to involve multi-organizational users in agile development methods. This paper is a case study of user involvement in developing a system for electronic laboratory requisitions using agile methodologies in a multi-organizational context. Building on an interpretive approach, we illuminate questions such as: How does collaboration between users and developers evolve and how might it be improved? What key motivational aspects are at play when users volunteer and continue contributing in the face of considerable added burdens? The study highlights how agile methods in themselves appear to facilitate mutually motivating collaboration between user groups and developers. Lessons learned for leveraging the advantages of agile development processes include acknowledging the substantial and ongoing contributions of users and their roles as co-designers of the system.

  18. Signatures of mutational processes in human cancer

    NARCIS (Netherlands)

    Alexandrov, Ludmil B.; Nik-Zainal, Serena; Wedge, David C.; Aparicio, Samuel A. J. R.; Behjati, Sam; Biankin, Andrew V.; Bignell, Graham R.; Bolli, Niccolò; Borg, Ake; Børresen-Dale, Anne-Lise; Boyault, Sandrine; Burkhardt, Birgit; Butler, Adam P.; Caldas, Carlos; Davies, Helen R.; Desmedt, Christine; Eils, Roland; Eyfjörd, Jórunn Erla; Foekens, John A.; Greaves, Mel; Hosoda, Fumie; Hutter, Barbara; Ilicic, Tomislav; Imbeaud, Sandrine; Imielinsk, Marcin; Jäger, Natalie; Jones, David T. W.; Jones, David; Knappskog, Stian; Kool, Marcel; Lakhani, Sunil R.; López-Otín, Carlos; Martin, Sancha; Munshi, Nikhil C.; Nakamura, Hiromi; Northcott, Paul A.; Pajic, Marina; Papaemmanuil, Elli; Paradiso, Angelo; Pearson, John V.; Puente, Xose S.; Raine, Keiran; Ramakrishna, Manasa; Richardson, Andrea L.; Richter, Julia; Rosenstiel, Philip; Schlesner, Matthias; Schumacher, Ton N.; Span, Paul N.; Teague, Jon W.; Totoki, Yasushi; Tutt, Andrew N. J.; Valdés-Mas, Rafael; van Buuren, Marit M.; van 't Veer, Laura; Vincent-Salomon, Anne; Waddell, Nicola; Yates, Lucy R.; Zucman-Rossi, Jessica; Futreal, P. Andrew; McDermott, Ultan; Lichter, Peter; Meyerson, Matthew; Grimmond, Sean M.; Siebert, Reiner; Campo, Elías; Shibata, Tatsuhiro; Pfister, Stefan M.; Campbell, Peter J.; Stratton, Michael R.; Claviez, Alexander; Rosenwald, Andreas; Borkhardt, Arndt; Brors, Benedikt; Radlwimmer, Bernhard; Lawerenz, Chris; Lopez, Cristina; Langenberger, David; Karsch, Dennis; Lenze, Dido; Kube, Dieter; Leich, Ellen; Richter, Gesine; Korbel, Jan; Hoell, Jessica; Eils, Jürgen; Hezaveh, Kebriah; Trümper, Lorenz; Rosolowski, Maciej; Weniger, Marc; Rohde, Marius; Kreuz, Markus; Loeffler, Markus; Schilhabel, Markus; Dreyling, Martin; Hansmann, Martin-Leo; Hummel, Michael; Szczepanowski, Monika; Ammerpohl, Ole; Stadler, Peter F.; Möller, Peter; Küppers, Ralf; Haas, Siegfried; Eberth, Sonja; Schreiber, Stefan; Bernhart, Stephan H.; Hoffmann, Steve; Radomski, Sylwester; Kostezka, Ulrike; Klapper, Wolfram; Sotiriou, Christos; Larsimont, Denis; Vincent, Delphine; Maetens, Marion; Mariani, Odette; Sieuwerts, Anieta M.; Martens, John W. M.; Jonasson, Jon G.; Treilleux, Isabelle; Thomas, Emilie; Mac Grogan, Gaëtan; Mannina, Cécile; Arnould, Laurent; Burillier, Laura; Merlin, Jean-Louis; Lefebvre, Magali; Bibeau, Frédéric; Massemin, Blandine; Penault-Llorca, Frédérique; Lopez, Qian; Mathieu, Marie-Christine; Lonning, Per Eystein; Schlooz-Vries, Margrete; Tol, Jolien; van Laarhoven, Hanneke; Sweep, Fred; Bult, Peter

    2013-01-01

    All cancers are caused by somatic mutations; however, understanding of the biological processes generating these mutations is limited. The catalogue of somatic mutations from a cancer genome bears the signatures of the mutational processes that have been operative. Here we analysed 4,938,362

  19. Characteristics of small boat acoustic signatures

    Science.gov (United States)

    Barlett, Martin L.; Wilson, Gary R.

    2002-11-01

    Small boats are often a dominant noise source in harbors, coastal regions, and lakes. However, detailed information about acoustic characteristics is not generally available. To remedy this deficiency, measurements of underwater acoustic signatures from various small boats have been conducted under controlled conditions. Boats used in the measurements were powered by a variety of gasoline and diesel motors in outboard, inboard-outboard, and inboard drive configurations. Measurements were made using a bottom mounted hydrophone in about 100 feet of water. In many instances, the boats were instrumented with a system that recorded the GPS position and engine RPM permitting accurate determinations of platform operating parameters. Measured small boat signatures contain both narrowband and broadband acoustic components. Narrowband components are generally associated with sources from the engine or drive. Narrowband levels in the observed spectra were found to exhibit significant variations and are believed to originate from fluctuations in the load on the engine and drive. Broadband energy was observed to be a dominant noise source at frequencies above several hundred Hertz and is a characteristic feature in all small boat signatures. Examples of small boat signatures will be presented and representative acoustic characteristics of this type of watercraft will be discussed.

  20. Photospheric, Chromospheric and Helioseismic Signatures of a ...

    Indian Academy of Sciences (India)

    2003-10-26

    Oct 26, 2003 ... since the beginning of routine TSI measurements in 1978 (Woods et al. 2004). We have selected this flare for detailed analysis of its photospheric, chromospheric and helioseismic signatures due to the favourable location of the active region near the. CMP which minimizes the projection effects. 2.

  1. The Pedagogic Signature of Special Needs Education

    Science.gov (United States)

    Weiß, Sabine; Kollmannsberger, Markus; Lerche, Thomas; Oubaid, Viktor; Kiel, Ewald

    2014-01-01

    The goal of the following study is to identify a pedagogic signature, according to LS Shulman, for working with students who have special educational needs. Special educational needs are defined as significant limitations in personal development and learning which require particular educational measures beyond regular education. The development of…

  2. Dictionary of Large Hadron Collider signatures

    Indian Academy of Sciences (India)

    We report on a plan to establish a `Dictionary of LHC Signatures', an initiative that started at the WHEPP-X workshop in Chennai, January 2008. This study aims at the strategy of distinguishing 3 classes of dark matter motivated scenarios such as -parity conserved supersymmetry, little Higgs models with -parity ...

  3. Practical Certificateless Aggregate Signatures From Bilinear Maps

    NARCIS (Netherlands)

    Gong, Zheng; Long, Yu; Hong, Xuan; Chen, Kefei

    2008-01-01

    In some restrictive environments, such as sensor networks, each sensor submits the newest information to the server, every message must be authenticated to immune forgery and replay attacks. But the regular signatures need to be saved and verified individually, which will heavily add the costs of

  4. Detection of proteolytic signatures for Parkinson's disease

    DEFF Research Database (Denmark)

    Jordal, Peter Lüttge; Dyrlund, Thomas F.; Winge, Kristian

    2016-01-01

    Aim: To investigate if idiopathic Parkinson's disease (IPD) is associated with distinct proteolytic signatures relative to non-neurodegenerative controls (NND) and patients with multiple system atrophy (MSA). Materials & methods: A subtiligase-based N-terminomics screening method was exploited...

  5. Ankle and Other Signatures in Uhecr

    Science.gov (United States)

    Berezinsky, Veniamin

    2015-03-01

    The interaction signatures of UHE protons propagating through CMB are discussed. Much attention is given to ankle, which starting from 1963 is usually interpreted as a feature of transition from galactic to extragalactic cosmic rays. We argue here that this interpretation is now excluded. It gives more credit to alternative explanation of the ankle as an intrinsic part of the pair-production dip.

  6. SUSY with ATLAS Leptonic Signatures, Coannihilation Region

    CERN Document Server

    Comune, G

    2004-01-01

    In this work we present an initial study on how leptonic signatures can be used at ATLAS to constrain SUSY particle masses combinations for the first time in the so called "coannihilation region''. The analysis is carried out in the framework of mSUGRA constrained SUSY model using fast detector simulation and reconstruction exploiting an invariant mass endpoint technique.

  7. Characteristics of ecstasy users in Sãio Paulo, Brazil.

    Science.gov (United States)

    De Almeida, Stella Pereira; Silva, Maria Teresa Araujo

    2005-01-01

    The present study was aimed at identifying patterns of Ecstasy (methylenedioxymethamphetamine-MDMA) use in the city of São Paulo. Ecstasy users were recruited through the snowball technique. Using the same technique, a non-user control group was recruited among individuals that had never tried the drug but shared with users a similar life style. Users (N = 52) and non-users (N = 52) were interviewed in order to obtain data on socio-demographic characteristics and use of psychoactive drugs. In addition, levels of anxiety, depression and impulsiveness were assessed through Spielberger's IDATE Trace Inventory, Beck's Depression Inventory and Barrat Impulsiveness Scale. Both users and non-users revealed similar socio-demographic characteristics: most subjects were middle class young heterosexual single men and women who had a college degree. Multiple drug use was more frequent among users than among non-users. Other features that were significantly more accentuated among users than among non-users were the presence of tattoos and piercings, the frequency of attending raves and the preference for electronic music. Beck Inventory results pointed to significantly lower depression scores among users. No differences were observed between groups regarding anxiety and impulsiveness scores. Although the use of Ecstasy in São Paulo is restricted to a young middle or high social class, their vanguard lifestyle tends to influence youngsters of other social extractions, so that the use of the drug may soon become widespread and thus a legitimate public health concern.

  8. Comparison of metagenomic samples using sequence signatures

    Directory of Open Access Journals (Sweden)

    Jiang Bai

    2012-12-01

    Full Text Available Abstract Background Sequence signatures, as defined by the frequencies of k-tuples (or k-mers, k-grams, have been used extensively to compare genomic sequences of individual organisms, to identify cis-regulatory modules, and to study the evolution of regulatory sequences. Recently many next-generation sequencing (NGS read data sets of metagenomic samples from a variety of different environments have been generated. The assembly of these reads can be difficult and analysis methods based on mapping reads to genes or pathways are also restricted by the availability and completeness of existing databases. Sequence-signature-based methods, however, do not need the complete genomes or existing databases and thus, can potentially be very useful for the comparison of metagenomic samples using NGS read data. Still, the applications of sequence signature methods for the comparison of metagenomic samples have not been well studied. Results We studied several dissimilarity measures, including d2, d2* and d2S recently developed from our group, a measure (hereinafter noted as Hao used in CVTree developed from Hao’s group (Qi et al., 2004, measures based on relative di-, tri-, and tetra-nucleotide frequencies as in Willner et al. (2009, as well as standard lp measures between the frequency vectors, for the comparison of metagenomic samples using sequence signatures. We compared their performance using a series of extensive simulations and three real next-generation sequencing (NGS metagenomic datasets: 39 fecal samples from 33 mammalian host species, 56 marine samples across the world, and 13 fecal samples from human individuals. Results showed that the dissimilarity measure d2S can achieve superior performance when comparing metagenomic samples by clustering them into different groups as well as recovering environmental gradients affecting microbial samples. New insights into the environmental factors affecting microbial compositions in metagenomic samples

  9. Experimental signatures of direct-laser-acceleration-assisted laser wakefield acceleration

    Science.gov (United States)

    Shaw, J. L.; Lemos, N.; Marsh, K. A.; Froula, D. H.; Joshi, C.

    2018-04-01

    The direct laser acceleration (DLA) of electrons in a laser wakefield accelerator (LWFA) operating in the forced or quasi-blowout regimes has been investigated through experiment and simulation. When there is a significant overlap between the trapped electrons and the drive laser in a LWFA cavity, the resulting electrons can gain energy from both the LWFA and the DLA mechanisms. Experimental work investigates the properties of the electron beams produced in a LWFA with ionization injection by dispersing those beams in the direction perpendicular to the laser polarization. These electron beams show certain spectral features that are characteristic of DLA. These characteristic features are reproduced using particle-in-cell simulations, where particle tracking was used to elucidate the roles of LWFA and DLA to the energy gain of the electrons in this experimental regime and to demonstrate that such spectral features are definitive signatures of the presence of DLA in LWFA.

  10. Mine or Theirs, Where Do Users Go? A Comparison of E-Journal Usage at the OhioLINK Electronic Journal Center Platform versus the Elsevier ScienceDirect Platform

    Science.gov (United States)

    Swanson, Juleah

    2015-01-01

    This research provides librarians with a model for assessing and predicting which platforms patrons will use to access the same content, specifically comparing usage at the Ohio Library and Information Network (OhioLINK) Electronic Journal Center (EJC) and at Elsevier's ScienceDirect from 2007 to 2013. Findings show that in the earlier years, the…

  11. Comparing Library and User Related Costs of Print and Electronic Journal Collections; Open Citation Linking; Toward a Global Digital Library; Information Retrieval by Semantic Analysis and Visualization of the Concept Space of D-Lib[R] Magazine.

    Science.gov (United States)

    Montgomery, Carol Hansen; King, Donald W.; Hitchcock, Steve; Brody, Tim; Carr, Les; Gutteridge, Christopher; Hall, Wendy; Harnad, Stevan; Bergmark, Donna; Lagoze, Carl; Fox, Edward A.; Moore, Reagan W.; Larsen, Ronald L.; Myaeng, Sung Hyon; Kim, Sung-Hyuk; Zhang, Junliang; Mostafa, Javed; Tripathy, Himansu

    2002-01-01

    Includes four articles that discuss the impact of academic libraries' shift to electronic journals on staff and costs; open citation linking for improved access and the Open Archives Initiative; development of global digital libraries, particularly between the United States and Korea; and retrieving documents from a digital library through a…

  12. 77 FR 58767 - Definitions Relating to Electronic Orders and Prescriptions for Controlled Substances

    Science.gov (United States)

    2012-09-24

    ... special hardware device (e.g., a PDA, cell phone, smart card, USB drive, one-time password device) rather... stand- alone application or as a module in an electronic health record application. Electronic signature...

  13. A Multimodal User Authentication System Using Faces and Gestures

    Directory of Open Access Journals (Sweden)

    Hyunsoek Choi

    2015-01-01

    Full Text Available As a novel approach to perform user authentication, we propose a multimodal biometric system that uses faces and gestures obtained from a single vision sensor. Unlike typical multimodal biometric systems using physical information, the proposed system utilizes gesture video signals combined with facial images. Whereas physical information such as face, fingerprints, and iris is fixed and not changeable, behavioral information such as gestures and signatures can be freely changed by the user, similar to a password. Therefore, it can be a countermeasure when the physical information is exposed. We aim to investigate the potential possibility of using gestures as a signal for biometric system and the robustness of the proposed multimodal user authentication system. Through computational experiments on a public database, we confirm that gesture information can help to improve the authentication performance.

  14. The effects of extrinsic motivation on signature authorship opinions in forensic signature blind trials.

    Science.gov (United States)

    Dewhurst, Tahnee N; Found, Bryan; Ballantyne, Kaye N; Rogers, Doug

    2014-03-01

    Expertise studies in forensic handwriting examination involve comparisons of Forensic Handwriting Examiners' (FHEs) opinions with lay-persons on blind tests. All published studies of this type have reported real and demonstrable skill differences between the specialist and lay groups. However, critics have proposed that any difference shown may be indicative of a lack of motivation on the part of lay participants, rather than a real difference in skill. It has been suggested that qualified FHEs would be inherently more motivated to succeed in blinded validation trials, as their professional reputations could be at risk, should they perform poorly on the task provided. Furthermore, critics suggest that lay-persons would be unlikely to be highly motivated to succeed, as they would have no fear of negative consequences should they perform badly. In an effort to investigate this concern, a blind signature trial was designed and administered to forty lay-persons. Participants were required to compare known (exemplar) signatures of an individual to questioned signatures and asked to express an opinion regarding whether the writer of the known signatures wrote each of the questioned signatures. The questioned signatures comprised a mixture of genuine, disguised and simulated signatures. The forty participants were divided into two separate groupings. Group 'A' were requested to complete the trial as directed and were advised that for each correct answer they would be financially rewarded, for each incorrect answer they would be financially penalized, and for each inconclusive opinion they would receive neither penalty nor reward. Group 'B' was requested to complete the trial as directed, with no mention of financial recompense or penalty. The results of this study do not support the proposition that motivation rather than skill difference is the source of the statistical difference in opinions between individuals' results in blinded signature proficiency trials. Crown

  15. Inland Electronic Navigational Charts (IENC)

    Data.gov (United States)

    Army Corps of Engineers, Department of the Army, Department of Defense — These Inland Electronic Navigational Charts (IENCs) were developed from available data used in maintenance of Navigation channels. Users of these IENCs should be...

  16. Optical/Infrared Signatures for Space-Based Remote Sensing

    National Research Council Canada - National Science Library

    Picard, R. H; Dewan, E. M; Winick, J. R; O'Neil, R. R

    2007-01-01

    This report describes work carried out under the Air Force Research Laboratory's basic research task in optical remote-sensing signatures, entitled Optical / Infrared Signatures for Space-Based Remote Sensing...

  17. The ICDAR 2009 Signature Verification Competition

    NARCIS (Netherlands)

    Blankers, V.L.; Heuvel, C.E. van den; Franke, K.Y.; Vuurpijl, L.G.

    2009-01-01

    Recent results of forgery detection by implementing biometric signature verification methods are promising. At present, forensic signature verification in daily casework is performed through visual examination by trained forensic handwriting experts, without reliance on computerassisted methods.

  18. ScanProsite: detection of PROSITE signature matches and ProRule-associated functional and structural residues in proteins.

    Science.gov (United States)

    de Castro, Edouard; Sigrist, Christian J A; Gattiker, Alexandre; Bulliard, Virginie; Langendijk-Genevaux, Petra S; Gasteiger, Elisabeth; Bairoch, Amos; Hulo, Nicolas

    2006-07-01

    ScanProsite--http://www.expasy.org/tools/scanprosite/--is a new and improved version of the web-based tool for detecting PROSITE signature matches in protein sequences. For a number of PROSITE profiles, the tool now makes use of ProRules--context-dependent annotation templates--to detect functional and structural intra-domain residues. The detection of those features enhances the power of function prediction based on profiles. Both user-defined sequences and sequences from the UniProt Knowledgebase can be matched against custom patterns, or against PROSITE signatures. To improve response times, matches of sequences from UniProtKB against PROSITE signatures are now retrieved from a pre-computed match database. Several output modes are available including simple text views and a rich mode providing an interactive match and feature viewer with a graphical representation of results.

  19. A Signature Comparing Android Mobile Application Utilizing Feature Extracting Algorithms

    Directory of Open Access Journals (Sweden)

    Paul Grafilon

    2017-08-01

    Full Text Available The paper presented one of the application that can be done using smartphones camera. Nowadays forgery is one of the most undetected crimes. With the forensic technology used today it is still difficult for authorities to compare and define what a real signature is and what a forged signature is. A signature is a legal representation of a person. All transactions are based on a signature. Forgers may use a signature to sign illegal contracts and withdraw from bank accounts undetected. A signature can also be forged during election periods for repeated voting. Addressing the issues a signature should always be secure. Signature verification is a reduced problem that still poses a real challenge for researchers. The literature on signature verification is quite extensive and shows two main areas of research off-line and on-line systems. Off-line systems deal with a static image of the signature i.e. the result of the action of signing while on-line systems work on the dynamic process of generating the signature i.e. the action of signing itself. The researchers have found a way to resolve the concerns. A mobile application that integrates the camera to take a picture of a signature analyzes it and compares it to other signatures for verification. It will exist to help citizens to be more cautious and aware with issues regarding the signatures. This might also be relevant to help organizations and institutions such as banks and insurance companies in verifying signatures that may avoid unwanted transactions and identity theft. Furthermore this might help the authorities in the never ending battle against crime especially against forgers and thieves. The project aimed to design and develop a mobile application that integrates the smartphone camera for verifying and comparing signatures for security using the best algorithm possible. As the result of the development the said smartphone camera application is functional and reliable.

  20. Electron pairing without superconductivity

    Science.gov (United States)

    Levy, Jeremy

    Strontium titanate (SrTiO3) is the first and best known superconducting semiconductor. It exhibits an extremely low carrier density threshold for superconductivity, and possesses a phase diagram similar to that of high-temperature superconductors--two factors that suggest an unconventional pairing mechanism. Despite sustained interest for 50 years, direct experimental insight into the nature of electron pairing in SrTiO3 has remained elusive. Here we perform transport experiments with nanowire-based single-electron transistors at the interface between SrTiO3 and a thin layer of lanthanum aluminate, LaAlO3. Electrostatic gating reveals a series of two-electron conductance resonances--paired electron states--that bifurcate above a critical pairing field Bp of about 1-4 tesla, an order of magnitude larger than the superconducting critical magnetic field. For magnetic fields below Bp, these resonances are insensitive to the applied magnetic field; for fields in excess of Bp, the resonances exhibit a linear Zeeman-like energy splitting. Electron pairing is stable at temperatures as high as 900 millikelvin, well above the superconducting transition temperature (about 300 millikelvin). These experiments demonstrate the existence of a robust electronic phase in which electrons pair without forming a superconducting state. Key experimental signatures are captured by a model involving an attractive Hubbard interaction that describes real-space electron pairing as a precursor to superconductivity. Support from AFOSR, ONR, ARO, NSF, DOE and NSSEFF is gratefully acknowledged.

  1. OpenLabNotes – An Electronic Laboratory Notebook Extension for OpenLabFramework

    Directory of Open Access Journals (Sweden)

    List Markus

    2015-09-01

    Full Text Available Electronic laboratory notebooks (ELNs are more accessible and reliable than their paper based alternatives and thus find widespread adoption. While a large number of commercial products is available, small- to mid-sized laboratories can often not afford the costs or are concerned about the longevity of the providers. Turning towards free alternatives, however, raises questions about data protection, which are not sufficiently addressed by available solutions. To serve as legal documents, ELNs must prevent scientific fraud through technical means such as digital signatures. It would also be advantageous if an ELN was integrated with a laboratory information management system to allow for a comprehensive documentation of experimental work including the location of samples that were used in a particular experiment. Here, we present OpenLabNotes, which adds state-of-the-art ELN capabilities to OpenLabFramework, a powerful and flexible laboratory information management system. In contrast to comparable solutions, it allows to protect the intellectual property of its users by offering data protection with digital signatures. OpenLabNotes effectively closes the gap between research documentation and sample management, thus making Open- LabFramework more attractive for laboratories that seek to increase productivity through electronic data management.

  2. GRSAC Users Manual

    International Nuclear Information System (INIS)

    Ball, S.J.; Nypaver, D.J.

    1999-01-01

    An interactive workstation-based simulation code (GRSAC) for studying postulated severe accidents in gas-cooled reactors has been developed to accommodate user-generated input with ''smart front-end'' checking. Code features includes on- and off-line plotting, on-line help and documentation, and an automated sensitivity study option. The code and its predecessors have been validated using comparisons with a variety of experimental data and similar codes. GRSAC model features include a three-dimensional representation of the core thermal hydraulics, and optional ATWS (anticipated transients without scram) capabilities. The user manual includes a detailed description of the code features, and includes four case studies which guide the user through four different examples of the major uses of GRSAC: an accident case; an initial conditions setup and run; a sensitivity study; and the setup of a new reactor model

  3. GRSAC Users Manual

    Energy Technology Data Exchange (ETDEWEB)

    Ball, S.J.; Nypaver, D.J.

    1999-02-01

    An interactive workstation-based simulation code (GRSAC) for studying postulated severe accidents in gas-cooled reactors has been developed to accommodate user-generated input with ''smart front-end'' checking. Code features includes on- and off-line plotting, on-line help and documentation, and an automated sensitivity study option. The code and its predecessors have been validated using comparisons with a variety of experimental data and similar codes. GRSAC model features include a three-dimensional representation of the core thermal hydraulics, and optional ATWS (anticipated transients without scram) capabilities. The user manual includes a detailed description of the code features, and includes four case studies which guide the user through four different examples of the major uses of GRSAC: an accident case; an initial conditions setup and run; a sensitivity study; and the setup of a new reactor model.

  4. TRANS-USERS

    DEFF Research Database (Denmark)

    in Denmark, Sweden and France. The five case studies are: The industrialised home building concept BoKlok, a web based product configurator for kitchens by HTH, the innovative potential of the dual role of employees as both user and employee in Rockwool, the application of quality management systems......This report addresses user-orientated strategies for industrialising the construction industry. In the first part, the objectives of the study are described along with the theoretical framework and the research design of the study. The second part of this report contains five case studies conducted...... to redesign production and business processes to accommodate for users' requirements (Maisons MACCHI), and the client as driver of innovation on the construction and renovation of the low budget hotel brand Formule 1 of ACCOR Hotels. In the third part, the discussion and conclusion addresses three interlinked...

  5. Evaluating User Participation and User Influence in an Enterprise System

    Science.gov (United States)

    Gibbs, Martin D.

    2010-01-01

    Does user influence have an impact on the data quality of an information systems development project? What decision making should users have? How can users effectively be engaged in the process? What is success? User participation is considered to be a critical success factor for Enterprise Resource Planning (ERP) projects, yet there is little…

  6. Date attachable offline electronic cash scheme.

    Science.gov (United States)

    Fan, Chun-I; Sun, Wei-Zhe; Hau, Hoi-Tung

    2014-01-01

    Electronic cash (e-cash) is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling.

  7. Date Attachable Offline Electronic Cash Scheme

    Directory of Open Access Journals (Sweden)

    Chun-I Fan

    2014-01-01

    Full Text Available Electronic cash (e-cash is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling.

  8. HANARO user support

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jeong Soo; Kim, Y. J.; Seong B.S. [and others

    2003-06-01

    The purpose of this project is to support external user for the promotion of HANARO common utilization effectively. To do this, external manpower was recruited and trained. Also, in order to find out and cultivate HANARO user, practice-oriented education was done. The total number of project selected as the promotion of HANARO common utilization was 31 in this year. These composed of four fields such as neutron beam utilization, materials/nuclear materials irradiation test, neutron activation analysis and radioisotope production. In each field, the numbers of project were 17, 7, 4 and 3 respectively. At first, from a selected project of view, supporting ratio by external manpower was reached to the 58%, that is, 18 out of 31 project was supported. In each field, it was 82% for neutron beam utilization and 100% for neutron activation analysis. Also, from the utilization time point of view, supporting ratio of external manpower was reached to 30% for neutron beam utilization and 59% for neutron activation analysis. Otherwise, supporting ratio by manpower in KAERI was reached to 97%, that is, 30 out of 31 project was supported. Also, from the utilization time point of view, total supporting ratio was reached to 15%. In each field, it was 20% for neutron beam utilization, 18% for materials/nuclear materials irradiation test, 20% for neutron activation analysis and 6% for radioisotope production. In order to contribute finding and cultivating of HANARO potential user and increase utilization ratio of HANARO experimental facility, practice-oriented HANARO user education has been done. At first, 32 participants from industries, universities, institutes were educated and practiced on HRPD/SANS instrument in the field of neutron beam utilization. Otherwise, in order to support external user effectively, external manpower were trained. Also, more effective support for external user could be possible through the grasping difficulty and problem on the performance of project

  9. Infrared ship signature prediction, model validation and sky radiance

    NARCIS (Netherlands)

    Neele, F.P.

    2005-01-01

    The increased interest during the last decade in the infrared signature of (new) ships results in a clear need of validated infrared signature prediction codes. This paper presents the results of comparing an in-house developed signature prediction code with measurements made in the 3-5 μm band in

  10. Signature Pedagogies in Support of Teachers' Professional Learning

    Science.gov (United States)

    Parker, Melissa; Patton, Kevin; O'Sullivan, Mary

    2016-01-01

    Signature pedagogies [Shulman, L. 2005. "Signature pedagogies in the professions." "Daedalus" 134 (3): 52--59.] are a focus of teacher educators seeking to improve teaching and teacher education. The purpose of this paper is to present a preliminary common language of signature pedagogies for teacher professional development…

  11. Radar micro-doppler signatures processing and applications

    CERN Document Server

    Chen, Victor C; Miceli, William J

    2014-01-01

    Radar Micro-Doppler Signatures: Processing and applications concentrates on the processing and application of radar micro-Doppler signatures in real world situations, providing readers with a good working knowledge on a variety of applications of radar micro-Doppler signatures.

  12. Can specific transcriptional regulators assemble a universal cancer signature?

    Science.gov (United States)

    Roy, Janine; Isik, Zerrin; Pilarsky, Christian; Schroeder, Michael

    2013-10-01

    Recently, there is a lot of interest in using biomarker signatures derived from gene expression data to predict cancer progression. We assembled signatures of 25 published datasets covering 13 types of cancers. How do these signatures compare with each other? On one hand signatures answering the same biological question should overlap, whereas signatures predicting different cancer types should differ. On the other hand, there could also be a Universal Cancer Signature that is predictive independently of the cancer type. Initially, we generate signatures for all datasets using classical approaches such as t-test and fold change and then, we explore signatures resulting from a network-based method, that applies the random surfer model of Google's PageRank algorithm. We show that the signatures as published by the authors and the signatures generated with classical methods do not overlap - not even for the same cancer type - whereas the network-based signatures strongly overlap. Selecting 10 out of 37 universal cancer genes gives the optimal prediction for all cancers thus taking a first step towards a Universal Cancer Signature. We furthermore analyze and discuss the involved genes in terms of the Hallmarks of cancer and in particular single out SP1, JUN/FOS and NFKB1 and examine their specific role in cancer progression.

  13. CRACUK user's guide

    International Nuclear Information System (INIS)

    Egan, M.J.; Nixon, W.; Brearley, I.R.

    1986-08-01

    The CRACUK computer code is a revised version of the US consequence modelling code CRAC2, adapted to suit UK applications. Modifications to various models within the code have led to certain changes in the input data requirements for CRACUK in comparison with CRAC2. This guide, written in the form of an Appendix to the CRAC2 User Guide, includes descriptions of the input data layout as it has been altered for use in CRACUK. Used in conjunction with the CRAC2 User Guide, this publication should allow easy use of the CRACUK code. (author)

  14. EPRINT ARCHIVE USER SURVEY

    CERN Multimedia

    2001-01-01

    University of Southampton invites the CERN community to participate in a survey Professor Stevan Harnad is conducting on current users and non-users of Eprint Archives. http://www.eprints.org/survey/ The findings will be used to suggest potential enhancements of the services as well as to get a deeper understanding of the very rapid developments in the on-line dissemination and use of scientific and scholarly research. (The survey is anonymous. Revealing your identity is optional and it will be kept confidential.)

  15. User friendly packaging

    DEFF Research Database (Denmark)

    Geert Jensen, Birgitte

    2010-01-01

    User-friendly Packaging” aims to create a platform for developing more user-friendly packaging. One intended outcome of the project is a guideline that industry can use in development efforts. The project also points the way for more extended collaboration between companies and design researchers. How...... can design research help industry in packaging innovation?......Most consumers have experienced occasional problems with opening packaging. Tomato sauce from the tinned mackerel splattered all over the kitchen counter, the unrelenting pickle jar lid, and the package of sliced ham that cannot be opened without a knife or a pair of scissors. The research project...

  16. The OSIRIS user guide

    CERN Document Server

    Telling, M T F

    2003-01-01

    This user guide contains all the information necessary to perform a successful neutron scattering experiment on the OSIRIS spectrometer at ISIS, RAL, UK. Since OSIRIS is a continually evolving and improving instrument some information contained within this manual may become redundant. However, the basic instrument operating procedures should remain essentially unchanged. While updated manuals will be produced when appropriate, the most comprehensive source of information concerning OSIRIS is the Instrument Scientist/Local Contact. It would be appreciated, however, if this user guide were the first point of call should problems arise

  17. User friendly packaging

    DEFF Research Database (Denmark)

    Geert Jensen, Birgitte

    2010-01-01

    Most consumers have experienced occasional problems with opening packaging. Tomato sauce from the tinned mackerel splattered all over the kitchen counter, the unrelenting pickle jar lid, and the package of sliced ham that cannot be opened without a knife or a pair of scissors. The research project...... “User-friendly Packaging” aims to create a platform for developing more user-friendly packaging. One intended outcome of the project is a guideline that industry can use in development efforts. The project also points the way for more extended collaboration between companies and design researchers. How...... can design research help industry in packaging innovation?...

  18. Sharing solutions - The users' group approach

    International Nuclear Information System (INIS)

    Kania, G.; Winter, K.

    1991-01-01

    Regulatory compliance, operating efficiency, and plant-life extension are common goals shared by all nuclear power plants. To achieve these goals, nuclear utilities must be proactive and responsive to the regulatory agencies, work together with each other in the sharing of operating experiences and solution to problems, and develop long-term working relationships with an even smaller number of quality suppliers. Users' and owners' groups are one of the most effective means of accomplishing these objectives. Users' groups facilitate communication between nuclear power plants and provide an interactive vendor interface. Both the utilities and suppliers benefit through shared information and improved customer feedback. This paper describes the evolution and experiences of the Sorrento Electronics (SE) Radiation Monitoring System (RMS) Users' Group. The authors highlight the group's past successes and plans for the future

  19. PREVENTIVE SIGNATURE MODEL FOR SECURE CLOUD DEPLOYMENT THROUGH FUZZY DATA ARRAY COMPUTATION

    Directory of Open Access Journals (Sweden)

    R. Poorvadevi

    2017-01-01

    Full Text Available Cloud computing is a resource pool which offers boundless services by the form of resources to its end users whoever heavily depends on cloud service providers. Cloud is providing the service access across the geographic locations in an efficient way. However it is offering numerous services, client end system is not having adequate methods, security policies and other protocols for using the cloud customer secret level transactions and other privacy related information. So, this proposed model brings the solution for securing the cloud user confidential data, Application deployment and also identifying the genuineness of the user by applying the scheme which is referred as fuzzy data array computation. Fuzzy data array computation provides an effective system is called signature retrieval and evaluation system through which customer’s data can be safeguarded along with their application. This signature system can be implemented on the cloud environment using the cloud sim 3.0 simulator tools. It facilitates the security operation over the data centre and cloud vendor locations in an effective manner.

  20. The users centered design of a new digital fluorometer

    International Nuclear Information System (INIS)

    Farias, Marcos S.; Santos, Isaac J.A.L. dos; Grecco, Claudio H.S.; Pedrosa, Paulo S.; Colthurst, Carlos M.; Szabo, Andre P.

    2009-01-01

    The fluorometer is the equipment used in chemical analysis laboratories, research institutes and nuclear fuel cycle companies. This equipment measures an unknown amount of uranium in ores, rivers, etc. The fluorometer functioning is based on the uranium fluorescence when submitted to the ultraviolet radiation incidence. The fluorescence is measured by an electronic optic system with optics filters, photomultiplier tube, and a current amplifier. The user centered design involves the user in the product development in all phases of the design process. Users are not simply consulted at the beginning of the design process and evaluated the system at the end; they are treated as partners throughout the design process. The user centered design emphasizes the needs and abilities of the users and improves the usability of the equipment. The activity centered design emphasizes the development of the equipment with a deep understanding of the users activities and of the current work practices of the users. The aim of this paper is to present a methodological framework that contributes to the design and evaluation of a new digital fluorometer towards an approach related to the users and their activities. This methodological framework includes users-based testing, interviews, questionnaires, human factors standards and guidelines, the users activity analysis and users satisfaction questionnaire. (author)

  1. 27 CFR 73.31 - May I submit forms electronically to TTB?

    Science.gov (United States)

    2010-04-01

    ... TRADE BUREAU, DEPARTMENT OF THE TREASURY (CONTINUED) PROCEDURES AND PRACTICES ELECTRONIC SIGNATURES; ELECTRONIC SUBMISSION OF FORMS Electronic Filing of Documents with TTB § 73.31 May I submit forms... Register and on our Web site as stated above; (c) You submit the electronic form to an electronic document...

  2. Principal Challenges Facing Electronic Records Management in Federal Agencies Today.

    Science.gov (United States)

    Patterson, Giovanna; Sprehe, J. Timothy

    2002-01-01

    Discusses electronic records management in the federal government. Highlights include managing electronic mail; information technology planning, systems design, and architecture; updating conventional records management; integrating electronic records management with other information technology systems; challenges of end-user training; business…

  3. 78 FR 38240 - Authentication of Electronic Signatures on Electronically Filed Statements of Account

    Science.gov (United States)

    2013-06-26

    ...; and (4) it helps protect digital documents from tampering. In establishing eLi, the Office must revise... Institutions Examination Council (``FFIEC'') provided guidance, indicating that commercial banking/brokerage... Council, Authentication in an Internet Banking Environment 11, http://ithandbook.ffiec.gov/media/28059/frb...

  4. Construction of Graduation Certificate Issuing System Based on Digital Signature Technique

    Directory of Open Access Journals (Sweden)

    Mohammed Issam Younis

    2015-06-01

    Full Text Available With the development of computer architecture and its technologies in recent years, applications like e-commerce, e-government, e-governance and e-finance are widely used, and they act as active research areas. In addition, in order to increase the quality and quantity of the ordinary everyday transactions, it is desired to migrate from the paper-based environment to a digital-based computerized environment. Such migration increases efficiency, saves time, eliminates paperwork, increases safety and reduces the cost in an organization. Digital signatures are playing an essential role in many electronic and automatic based systems and facilitate this migration. The digital signatures are used to provide many services and solutions that would not have been possible by the conventional hand-written signature. In the educational environment, the process of issuing the graduation certificates can no longer be restricted to the traditional methods. Hence, a computerized system for issuing certificates of graduation in an electronic form is needed and desired. This paper proposes a Graduation Certificates Issuing System (GCIS based on digital signature technology. In doing so, this research highlights the state-of-the-art and the art-of-the-practice for some existing digital signature-based systems in the literatures. In addition, eight intertwined elected services are identified, namely: message authentication, entity authentication, integrity, non-repudiation, time stamping, distinguished signing authorities, delegating signing capability and supporting workflow systems. Moreover, this research examines nine existing systems, showing their merits and demerits in terms of these elected services. Furthermore, the research describes the architectural design using the Unified Modeling Language (UML and provides the concrete implementation of the proposed GCIS. The GCIS is implemented using Visual Basic.Net programming language and SQL Server database

  5. Supernova signatures of neutrino mass ordering

    Science.gov (United States)

    Scholberg, Kate

    2018-01-01

    A suite of detectors around the world is poised to measure the flavor-energy-time evolution of the ten-second burst of neutrinos from a core-collapse supernova occurring in the Milky Way or nearby. Next-generation detectors to be built in the next decade will have enhanced flavor sensitivity and statistics. Not only will the observation of this burst allow us to peer inside the dense matter of the extreme event and learn about the collapse processes and the birth of the remnant, but the neutrinos will bring information about neutrino properties themselves. This review surveys some of the physical signatures that the currently-unknown neutrino mass pattern will imprint on the observed neutrino events at Earth, emphasizing the most robust and least model-dependent signatures of mass ordering.

  6. Phenotypic signatures arising from unbalanced bacterial growth.

    Science.gov (United States)

    Tan, Cheemeng; Smith, Robert Phillip; Tsai, Ming-Chi; Schwartz, Russell; You, Lingchong

    2014-08-01

    Fluctuations in the growth rate of a bacterial culture during unbalanced growth are generally considered undesirable in quantitative studies of bacterial physiology. Under well-controlled experimental conditions, however, these fluctuations are not random but instead reflect the interplay between intra-cellular networks underlying bacterial growth and the growth environment. Therefore, these fluctuations could be considered quantitative phenotypes of the bacteria under a specific growth condition. Here, we present a method to identify "phenotypic signatures" by time-frequency analysis of unbalanced growth curves measured with high temporal resolution. The signatures are then applied to differentiate amongst different bacterial strains or the same strain under different growth conditions, and to identify the essential architecture of the gene network underlying the observed growth dynamics. Our method has implications for both basic understanding of bacterial physiology and for the classification of bacterial strains.

  7. Stochastic monotony signature and biomedical applications.

    Science.gov (United States)

    Demongeot, Jacques; Galli Carminati, Giuliana; Carminati, Federico; Rachdi, Mustapha

    2015-12-01

    We introduce a new concept, the stochastic monotony signature of a function, made of the sequence of the signs that indicate if the function is increasing or constant (sign +), or decreasing (sign -). If the function results from the averaging of successive observations with errors, the monotony sign is a random binary variable, whose density is studied under two hypotheses for the distribution of errors: uniform and Gaussian. Then, we describe a simple statistical test allowing the comparison between the monotony signatures of two functions (e.g., one observed and the other as reference) and we apply the test to four biomedical examples, coming from genetics, psychology, gerontology, and morphogenesis. Copyright © 2015 Académie des sciences. Published by Elsevier SAS. All rights reserved.

  8. Chameleon dark energy models with characteristic signatures

    International Nuclear Information System (INIS)

    Gannouji, Radouane; Moraes, Bruno; Polarski, David; Mota, David F.; Winther, Hans A.; Tsujikawa, Shinji

    2010-01-01

    In chameleon dark energy models, local gravity constraints tend to rule out parameters in which observable cosmological signatures can be found. We study viable chameleon potentials consistent with a number of recent observational and experimental bounds. A novel chameleon field potential, motivated by f(R) gravity, is constructed where observable cosmological signatures are present both at the background evolution and in the growth rate of the perturbations. We study the evolution of matter density perturbations on low redshifts for this potential and show that the growth index today γ 0 can have significant dispersion on scales relevant for large scale structures. The values of γ 0 can be even smaller than 0.2 with large variations of γ on very low redshifts for the model parameters constrained by local gravity tests. This gives a possibility to clearly distinguish these chameleon models from the Λ-cold-dark-matter (ΛCDM) model in future high-precision observations.

  9. Perspectives on User Satisfaction Surveys.

    Science.gov (United States)

    Cullen, Rowena

    2001-01-01

    Discusses academic libraries, digital environments, increasing competition, the relationship between service quality and user satisfaction, and user surveys. Describes the SERVQUAL model that measures service quality and user satisfaction in academic libraries; considers gaps between user expectations and managers' perceptions of user…

  10. Users Office - Removal

    CERN Multimedia

    CERN Bulletin

    2010-01-01

    As of 8 December 2010 and until the end of February 2011, the Users Office will move from Bldg. 60. New Location : Bldg. 510-R-033 Opening Hours: Monday, Tuesday, Thursday, Friday : 08.30 – 12.30 Monday to Friday: 14.00 – 16.00 Closed Wednesday mornings.

  11. AELIB user's manual

    International Nuclear Information System (INIS)

    Evans, L.E.; Klawitter, G.L.

    1981-05-01

    This report is an updatable manual for users of AELIB, the AECL Library of FORTRAN-callable routines for the CRNL CDC 6600/CYBER 170 system. It provides general advice on the use of this library and detailed information on the selection and usage of particular library routines

  12. SALOME. User's guide

    International Nuclear Information System (INIS)

    Zastrow, K.D.

    1994-01-01

    A user's guide for a least squares fit analysis program is presented, which has been developed for VUV and visible plasma spectroscopy on the Extrap-T1 experiment. The program can be used for line and multiplet identification, multiplet intensity and line width measurements. Atomic data are used extensively to aid the interpretation of the spectra. 7 figs

  13. Neem: A User's Manual

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 2; Issue 5. Neem: A User's Manual The 'Free Tree' – Its Healing Power and Other Uses. M D Subash Chandran. Book Review Volume 2 Issue 5 May 1997 pp 84-86. Fulltext. Click here to view fulltext PDF. Permanent link:

  14. CDPOP Users Manual

    Science.gov (United States)

    E. L. Landguth; B. K. Hand; J. M. Glassy; S. A. Cushman; M. Jacobi; T. J. Julian

    2011-01-01

    The goal of this user manual is to explain the technical aspects of the current release of the CDPOP program. CDPOP v1.0 is a major extension of the CDPOP program (Landguth and Cushman 2010). CDPOP is an individual-based program that simulates the influences of landscape structure on emergence of spatial patterns in population genetic data as functions of individual-...

  15. 16. ESRF users meeting

    International Nuclear Information System (INIS)

    Coraux, J.; Renevier, H.; Favre-Nicolin, V.; Daudin, B.; Proietti, M.G.; Renaud, G.; Fowler, B.; Mercer, D.L.; Omar, A.H.; Thompson, P.; Markovic, N.M.; Stamenkovic, V.; Lucas, C.A.; Andrejczuk, A.; Kwiatkowska, J.; Dobrzynski, L.; Zukowski, E.; Bellin, Ch.; Loupias, G.; Shukla, A.; Buslaps, Th.; Stankov, S.; Sladecek, M.; Slezak, T.; Korecki, J.; Spiridis, N.; Sepiol, B.; Vogl, G.; Chumakov, A.; Ruffer, R.; Hermann, R.P.; Grandjean, F.; Schweika, W.; Long, G.J.; Leupold, O.; Belrhall, H.; Caserotto, H.; Dauvergne, F.; Geoffroy, L.; Guljarro, M.; Launer, L.; Levault, B.; Walsh, M.; Beckers, M.; Schell, N.; Martins, R.M.S.; Mucklich, A.; Moller, W.; Silva, R.J.C.; Mahesh, K.K.; Braz Fernandes, F.M.; Tejas, Parikh; Neil, Fellows; Durodola, J.; Slawinski, W.; Przenioslo, R.; Sosnowska, I.; Suard, E.

    2006-01-01

    This document gathers the posters that were presented during the poster session of this workshop. These posters highlight the results obtained by ESRF'users in different fields such as surface structure, Compton scattering studies, localized vibrational modes in thermoelectric materials, Ni-Ti thin films, residual stresses in superconducting wires, and changes in crystal and magnetic structure of NdFeO 3

  16. CONSUME: users guide.

    Science.gov (United States)

    R.D. Ottmar; M.F. Burns; J.N. Hall; A.D. Hanson

    1993-01-01

    CONSUME is a user-friendly computer program designed for resource managers with some working knowledge of IBM-PC applications. The software predicts the amount of fuel consumption on logged units based on weather data, the amount and fuel moisture of fuels, and a number of other factors. Using these predictions, the resource manager can accurately determine when and...

  17. Educating the Music User

    Science.gov (United States)

    Adams, Mark C.

    2016-01-01

    To better serve students' evolving needs in music, music educators must connect classroom learning with how students use and interact with music in their daily lives. One way to accomplish this is by approaching classrooms with the music user in mind, which can open new possibilities for meaningful music making and remove students from the…

  18. User's guide for ICE

    International Nuclear Information System (INIS)

    Fraley, S.K.

    1976-07-01

    ICE is a cross-section mixing code which will accept cross sections from an AMPX working library and produce mixed cross sections in the AMPX working library format, ANISN format, and the group-independent ANISN format. User input is in the free-form or fixed-form FIDO structure. The code is operable as a module in the AMPX system

  19. Governing the water user

    NARCIS (Netherlands)

    Rap, Edwin; Wester, Flip

    2017-01-01

    This article traces a policy shift that makes the ‘water user’ the main subject of water governance. From a Foucauldian perspective on governmentality these new subjectivities accompany neo-liberal governmental technologies to devolve autonomy from state institutions to an active user base, whilst

  20. TO STORES USERS

    CERN Multimedia

    SPL Division

    2001-01-01

    Stores users are informed that the Stores (Central, Emergency window, Raw materials, Chemical products and Prévessin Self service stores) will be closed on Friday, 7 December owing to migration of the Stores computers to Windows 2000. Thank you for your understanding.