WorldWideScience

Sample records for electronic signature user

  1. Signature-based User Authentication

    OpenAIRE

    Hámorník, Juraj

    2015-01-01

    This work aims on missing handwritten signature authentication in Windows. Result of this work is standalone software that allow users to log into Windows by writing signature. We focus on security of signature authentification and best overall user experience. We implemented signature authentification service that accept signature and return user access token if signature is genuine. Signature authentification is done by comparing given signature to signature patterns by their similarity. Si...

  2. Electronic health records: what does your signature signify?

    Directory of Open Access Journals (Sweden)

    Victoroff MD Michael S

    2012-08-01

    Full Text Available Abstract Electronic health records serve multiple purposes, including clinical communication, legal documentation, financial transaction capture, research and analytics. Electronic signatures attached to entries in EHRs have different logical and legal meanings for different users. Some of these are vestiges from historic paper formats that require reconsideration. Traditionally accepted functions of signatures, such as identity verification, attestation, consent, authorization and non-repudiation can become ambiguous in the context of computer-assisted workflow processes that incorporate functions like logins, auto-fill and audit trails. This article exposes the incompatibility of expectations among typical users of electronically signed information.

  3. Impact of Electronic Signatures and Time Stamping for the Protection of Electronic Agreements

    Directory of Open Access Journals (Sweden)

    Tadas Limba

    2012-12-01

    Full Text Available The article e495 valuates the impact of e-signatures and time stamping on electronic contracts and electronic documents for performing e-business opportunities and goals, and analyses e-signature application for business cases. Various electronic services, virtual shopping, electronic cash transactions are becoming increasingly popular as they allow users to quickly perform different actions, operations and functions. It is important not only for convenience, but also to ensure consumer data security and reliability. Security reasons are not enough for security transmitted data, since this method does not allow clarification of information about sender identity.Use of electronic signatures, electronic identities, checgs and ensures a very high level of data security in interchange data processes. E-signature allows e-business companies to transfer the company’s operation business processes and their application to the organization and management in the electronic environment, also automate internal and external compans processes, includinggon-going business processes.The object of paper is .-signature and time stamping application in the theoretical and practical way.The goal of this paper while evaluating and estimating the .-signature and time stamping application, i’s regulation and legal implementation worldwidesand in Lithuania—is to provideluseful recommendations for more efficient impact developing -commerce and -business in situations when -signature and time stamping is used for ensuring electronic contracs security.

  4. Impact of Electronic Signatures and Time Stamping for the Protection of Electronic Agreements

    Directory of Open Access Journals (Sweden)

    Tadas Limba

    2013-02-01

    Full Text Available The article e495 valuates the impact of e-signatures and time stamping on electronic contracts and electronic documents for performing e-business opportunities and goals, and analyses e-signature application for business cases. Various electronic services, virtual shopping, electronic cash transactions are becoming increasingly popular as they allow users to quickly perform different actions, operations and functions. It is important not only for convenience, but also to ensure consumer data security and reliability. Security reasons are not enough for security transmitted data, since this method does not allow clarification of information about sender identity. Use of electronic signatures, electronic identities, checgs and ensures a very high level of data security in interchange data processes. E-signature allows e-business companies to transfer the company’s operation business processes and their application to the organization and management in the electronic environment, also automate internal and external compans processes, includinggon-going business processes. The object of paper is .-signature and time stamping application in the theoretical and practical way. The goal of this paper while evaluating and estimating the .-signature and time stamping application, i’s regulation and legal implementation worldwidesand in Lithuania—is to provideluseful recommendations for more efficient impact developing -commerce and -business in situations when -signature and time stamping is used for ensuring electronic contracs security.

  5. Electronic signature for medical documents--integration and evaluation of a public key infrastructure in hospitals.

    Science.gov (United States)

    Brandner, R; van der Haak, M; Hartmann, M; Haux, R; Schmücker, P

    2002-01-01

    Our objectives were to determine the user-oriented and legal requirements for a Public Key Infrastructure (PKI) for electronic signatures for medical documents, and to translate these requirements into a general model for a signature system. A prototype of this model was then implemented and evaluated in clinical routine use. Analyses of documents, processes, interviews, observations, and of the available literature supplied the foundations for the development of the signature system model. Eight participants of the Department of Dermatology of the Heidelberg University Medical Center evaluated the implemented prototype from December 2000 to January 2001, during the course of an intervention study. By means of questionnaires, interviews, observations and database analyses, the usefulness and user acceptance of the electronic signature and its integration into electronic discharge letters were established. Since the major part of medical documents generated in a hospital are signature-relevant, they will require electronic signatures in the future. A PKI must meet the multitude of responsibilities and security needs required in a hospital. Also, the signature functionality must be integrated directly into the workflow surrounding document creation. A developed signature model, fulfilling user-oriented and legal requirements, was implemented using hard and software components that conform to the German Signature Law. It was integrated into the existing hospital information system of the Heidelberg University Medical Center. At the end of the intervention study, the average acceptance scores achieved were mean = 3.90; SD = 0.42 on a scale of 1 (very negative attitude) to 5 (very positive attitude) for the electronic signature procedure. Acceptance of the integration into computer-supported discharge letter writing reached mean = 3.91; SD = 0.47. On average, the discharge letters were completed 7.18 days earlier. The electronic signature is indispensable for the

  6. Electronic Signature Policy

    Science.gov (United States)

    Establishes the United States Environmental Protection Agency's approach to adopting electronic signature technology and best practices to ensure electronic signatures applied to official Agency documents are legally valid and enforceable

  7. THE ELECTRONIC SIGNATURE

    Directory of Open Access Journals (Sweden)

    Voiculescu Madalina Irena

    2009-05-01

    Full Text Available Article refers to significance and the digital signature in electronic commerce. Internet and electronic commerce open up many new opportunities for the consumer, yet, the security (or perceived lack of security of exchanging personal and financial data

  8. The electronic identification, signature and security of information systems

    Directory of Open Access Journals (Sweden)

    Horovèák Pavel

    2002-12-01

    Full Text Available The contribution deals with the actual methods and technologies of information and communication systems security. It introduces the overview of electronic identification elements such as static password, dynamic password and single sign-on. Into this category belong also biometric and dynamic characteristics of verified person. Widespread is authentication based on identification elements ownership, such as various cards and authentication calculators. In the next part is specified a definition and characterization of electronic signature, its basic functions and certificate categories. Practical utilization of electronic signature consists of electronic signature acquirement, signature of outgoing email message, receiving of electronic signature and verification of electronic signature. The use of electronic signature is continuously growing and in connection with legislation development it exercises in all resorts.

  9. Electronic Signature (eSig)

    Data.gov (United States)

    Department of Veterans Affairs — Beginning with the Government Paperwork Elimination Act of 1998 (GPEA), the Federal government has encouraged the use of electronic / digital signatures to enable...

  10. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  11. 21 CFR 11.200 - Electronic signature components and controls.

    Science.gov (United States)

    2010-04-01

    ... signature components and controls. (a) Electronic signatures that are not based upon biometrics shall: (1) Employ at least two distinct identification components such as an identification code and password. (i... signatures based upon biometrics shall be designed to ensure that they cannot be used by anyone other than...

  12. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  13. 31 CFR 370.38 - What is the legal effect of an electronic signature?

    Science.gov (United States)

    2010-07-01

    ... electronic signature? 370.38 Section 370.38 Money and Finance: Treasury Regulations Relating to Money and... Requests Through the Bureau of the Public Debt § 370.38 What is the legal effect of an electronic signature? An electronic signature and any electronic message to which it is affixed or attached may not be...

  14. Electronic signatures and their specificity in national and European regulations

    Directory of Open Access Journals (Sweden)

    R. MATEFI

    2017-07-01

    Full Text Available The paper aims to emphasize the particularities of the electronic signature by reference to the national as well as to the European legislation, trying to point out its utility in the business environment as well as the controversies in this matter. The starting point of this analysis was the Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures, which establishes the legal framework for electronic signatures and the recognition of certification-service providers. Its main aim was to ease its use and help it become legally recognized within all EU countries.

  15. Fiddling With the ECT Act – Electronic Signatures

    Directory of Open Access Journals (Sweden)

    Sieg Eiselen

    2014-12-01

    Full Text Available Amongst the changes the Department of Trade and Industry is considering is an amendment of the definition of "electronic signature". Although the amendment seems to be in line with the provisions of the UNCITRAL Model Laws on eCommerce and the 2005 UN Convention on the Use of Electronic Communications in International Contracts, the amendment sets additional and more onerous requirements for all electronic signatures. The note illustrates how this amendment undermines the key principles of functional equivalence, media neutrality and party autonomy, and how this innocuous looking amendment may have very harmful practical consequences. It is suggested that amendments to section 13 would be more appropriate to achieve the objectives of the legislature.

  16. Design and Implementation of a Mobile Voting System Using a Novel Oblivious and Proxy Signature

    Directory of Open Access Journals (Sweden)

    Shin-Yan Chiou

    2017-01-01

    Full Text Available Electronic voting systems can make the voting process much more convenient. However, in such systems, if a server signs blank votes before users vote, it may cause undue multivoting. Furthermore, if users vote before the signing of the server, voting information will be leaked to the server and may be compromised. Blind signatures could be used to prevent leaking voting information from the server; however, malicious users could produce noncandidate signatures for illegal usage at that time or in the future. To overcome these problems, this paper proposes a novel oblivious signature scheme with a proxy signature function to satisfy security requirements such as information protection, personal privacy, and message verification and to ensure that no one can cheat other users (including the server. We propose an electronic voting system based on the proposed oblivious and proxy signature scheme and implement this scheme in a smartphone application to allow users to vote securely and conveniently. Security analyses and performance comparisons are provided to show the capability and efficiency of the proposed scheme.

  17. ANALYSIS OF DIGITAL SIGNATURE RULE IN THE ELECTRONIC COMMERCE LAW OF INDONESIA

    Directory of Open Access Journals (Sweden)

    Irna Nurhayati

    2015-02-01

    Full Text Available The Indonesian legislature has enacted the Information and Electronic Transaction Bill (the Bill in 2003, in which digital signature as a technology specific electronic (e commerce has been promoted. The promotion of digital signature is still problematic, since there is an uncertainty whether Indonesia can develop well a required viable technology of digital signature. Moreover, there is a gap between the actual use of digital signature and the projections of future utilization of digital signature by interested parties on e-commerce. This paper will discuss the reason of the Indonesian legislature promotes digital signature. It will then analyse the gap between the actual use of digital signature and the projections of future utilization of digital signature by interested parties on e-commerce. This paper will finally argue whether the promotion of digital signature of the Bill is useful for the growth of e-commerce in Indonesia.

  18. 27 CFR 73.11 - What are the required components and controls for acceptable electronic signatures?

    Science.gov (United States)

    2010-04-01

    ... components and controls for acceptable electronic signatures? 73.11 Section 73.11 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY (CONTINUED) PROCEDURES AND PRACTICES ELECTRONIC SIGNATURES; ELECTRONIC SUBMISSION OF FORMS Electronic Signatures § 73.11...

  19. 75 FR 42575 - Electronic Signature and Storage of Form I-9, Employment Eligibility Verification

    Science.gov (United States)

    2010-07-22

    ... Electronic Signature and Storage of Form I-9, Employment Eligibility Verification AGENCY: U.S. Immigration... published an interim final rule to permit electronic signature and storage of the Form I-9. 71 FR 34510... because electronic signature and storage technologies are optional, DHS expects that small entities will...

  20. Fiddling with the ECT act – Electronic signatures | Eiselen ...

    African Journals Online (AJOL)

    Potchefstroom Electronic Law Journal/Potchefstroomse Elektroniese Regsblad ... is considering is an amendment of the definition of "electronic signature". ... of the UNCITRAL Model Laws on eCommerce and the 2005 UN Convention on the ...

  1. Integrating Iris and Signature Traits for Personal Authentication Using User-SpecificWeighting

    Directory of Open Access Journals (Sweden)

    Serestina Viriri

    2012-03-01

    Full Text Available Biometric systems based on uni-modal traits are characterized by noisy sensor data, restricted degrees of freedom, non-universality and are susceptible to spoof attacks. Multi-modal biometric systems seek to alleviate some of these drawbacks by providing multiple evidences of the same identity. In this paper, a user-score-based weighting technique for integrating the iris and signature traits is presented. This user-specific weighting technique has proved to be an efficient and effective fusion scheme which increases the authentication accuracy rate of multi-modal biometric systems. The weights are used to indicate the importance of matching scores output by each biometrics trait. The experimental results show that our biometric system based on the integration of iris and signature traits achieve a false rejection rate (FRR of 0.08% and a false acceptance rate (FAR of 0.01%.

  2. Signatures of quantum radiation reaction in laser-electron-beam collisions

    International Nuclear Information System (INIS)

    Wang, H. Y.; Yan, X. Q.; Zepf, M.

    2015-01-01

    Electron dynamics in the collision of an electron beam with a high-intensity focused ultrashort laser pulse are investigated using three-dimensional QED particle-in-cell (PIC) simulations, and the results are compared with those calculated by classical Landau and Lifshitz PIC simulations. Significant differences are observed from the angular dependence of the electron energy distribution patterns for the two different approaches, because photon emission is no longer well approximated by a continuous process in the quantum radiation-dominated regime. The stochastic nature of photon emission results in strong signatures of quantum radiation-reaction effects under certain conditions. We show that the laser spot size and duration greatly influence these signatures due to the competition of QED effects and the ponderomotive force, which is well described in the classical approximation. The clearest signatures of quantum radiation reaction are found in the limit of large laser spots and few cycle pulse durations

  3. Attribute-Based Digital Signature System

    NARCIS (Netherlands)

    Ibraimi, L.; Asim, Muhammad; Petkovic, M.

    2011-01-01

    An attribute-based digital signature system comprises a signature generation unit (1) for signing a message (m) by generating a signature (s) based on a user secret key (SK) associated with a set of user attributes, wherein the signature generation unit (1) is arranged for combining the user secret

  4. 78 FR 39200 - Authentication of Electronic Signatures on Electronically Filed Statements of Account

    Science.gov (United States)

    2013-07-01

    ... LIBRARY OF CONGRESS Copyright Office 37 CFR Part 201 [Docket No. 2013-5] Authentication of Electronic Signatures on Electronically Filed Statements of Account AGENCY: U.S. Copyright Office, Library of Congress. ACTION: Notice of proposed rulemaking; correction. SUMMARY: The U.S. Copyright Office published a...

  5. Electronic Signatures in Global and National Commerce Act. Public Law.

    Science.gov (United States)

    Congress of the U.S., Washington, DC.

    This document presents the text of Public Law 106-229, the "Electronic Signatures in Global and National Commerce Act." The act states that, with respect to any transaction in or affecting interstate or foreign commerce: a signature, contract, or other record relating to such transaction may not be denied legal effect, validity, or…

  6. ''Electron Conic'' Signatures observed in the nightside auroral zone and over the polar cap

    International Nuclear Information System (INIS)

    Menietti, J.D.; Burch, J.L.

    1985-01-01

    A preliminary search of the Dynamics Explorer 1 high-altitude plasma instrument data base has yielded examples of ''electron conic'' signatures. The three example passes show an association with regions of downward electron acceleration and upward ion beams, but this is not true of all the electron conic events. The electron conic signatures are clearly discernible on energy-flux-versus-time color spectrograms as pairs of discrete vertical bands which are symmetric about a pitch angle of approximately 180 0 . One of the examples is a polar cap pass with electron conic signatures observed at invariant latitudes from 84 0 to 75 0 . The other two cases are nightside auroral zone passes in which the regions of detectable electron conics are spatially more confined, covering only about 1 0 in invariant latitude. The conic signatures have been found at energies that range from 50 eV 0 is larger than expected for a loss cone feature. If the electrons conserve the first adiabatic invariant in a dipole magnetic field, and in some cases a parallel electric field, the mirroring altitude varies between about 500 km and 8000 km, which is above the atmospheric loss region. For this reason, and in analogy with the formation of ion conics, we suggest that the conic signatures are produced by heating of the electrons perpendicular to the magnetic field

  7. E-learning platform for automated testing of electronic circuits using signature analysis method

    Science.gov (United States)

    Gherghina, Cǎtǎlina; Bacivarov, Angelica; Bacivarov, Ioan C.; Petricǎ, Gabriel

    2016-12-01

    Dependability of electronic circuits can be ensured only through testing of circuit modules. This is done by generating test vectors and their application to the circuit. Testability should be viewed as a concerted effort to ensure maximum efficiency throughout the product life cycle, from conception and design stage, through production to repairs during products operating. In this paper, is presented the platform developed by authors for training for testability in electronics, in general and in using signature analysis method, in particular. The platform allows highlighting the two approaches in the field namely analog and digital signature of circuits. As a part of this e-learning platform, it has been developed a database for signatures of different electronic components meant to put into the spotlight different techniques implying fault detection, and from this there were also self-repairing techniques of the systems with this kind of components. An approach for realizing self-testing circuits based on MATLAB environment and using signature analysis method is proposed. This paper analyses the benefits of signature analysis method and simulates signature analyzer performance based on the use of pseudo-random sequences, too.

  8. Review and Analysis of Cryptographic Schemes Implementing Threshold Signature

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-03-01

    Full Text Available This work is devoted to the study of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, ellipt ic curves and bilinear pairings were investigated. Different methods of generation and verification of threshold signatures were explored, e.g. used in a mobile agents, Internet banking and e-currency. The significance of the work is determined by the reduction of the level of counterfeit electronic documents, signed by certain group of users.

  9. Real Traceable Signatures

    Science.gov (United States)

    Chow, Sherman S. M.

    Traceable signature scheme extends a group signature scheme with an enhanced anonymity management mechanism. The group manager can compute a tracing trapdoor which enables anyone to test if a signature is signed by a given misbehaving user, while the only way to do so for group signatures requires revealing the signer of all signatures. Nevertheless, it is not tracing in a strict sense. For all existing schemes, T tracing agents need to recollect all N' signatures ever produced and perform RN' “checks” for R revoked users. This involves a high volume of transfer and computations. Increasing T increases the degree of parallelism for tracing but also the probability of “missing” some signatures in case some of the agents are dishonest.

  10. 17 CFR 230.160 - Registered investment company exemption from Section 101(c)(1) of the Electronic Signatures in...

    Science.gov (United States)

    2010-04-01

    ... exemption from Section 101(c)(1) of the Electronic Signatures in Global and National Commerce Act. 230.160...(c)(1) of the Electronic Signatures in Global and National Commerce Act. A prospectus for an... 101(c)(1) of the Electronic Signatures in Global and National Commerce Act. [65 FR 47284, Aug. 2, 2000] ...

  11. The utilisation experience of the enhanced electronic signature when managing orders

    Directory of Open Access Journals (Sweden)

    Pavel A. Muzychkin

    2017-01-01

    Full Text Available Major universities with a number of branches, located throughout the country, have joined Plekhanov Russian University of Economics and there was a problem of operational coordination of managerial decision-making, coordination of command and control of their implementation. The problem needed to be solved very quickly as many orders have to be issued in a short period. It was necessary to develop and introduce the electronic document flow system to provide coordination of the projects’ orders on the number of students at the university branches on higher education programmes, postgraduate and vocational secondary education, and ensuring legal validity of the electronic documents.Cryptography techniques, encryption standard (National State Standard, Russian Federation legislation, university’s corporate network, electronic document flow system “DELO”, enhanced electronic signature services such as Crypto Pro CSP, CARMA and EDSIGN.Electronic approval technology between the head University and its branches with the use of the enhanced unqualified electronic signature was suggested. Two ways of exchanging documents were developed and implemented in order to make the scheme work:1 Sending documents via the corporate e-mail, using National State Standard encryption.2 Document exchange via “DELO”, electronic document flow system. The first stage has provided the document exchange, using the enciphered information with the enhanced electronic signature. At the same time, the problem of creating secure data channels between the remote university branches was solved. During the second stage, when the branches were introduced into the university’s corporate network through the secure data channels, they also gained access to the “DELO”, electronic document flow system. From the end of December 2014 up to November 2016, around 3000 orders, concerning the students were entered into the system.This method was applied not only at the

  12. User Support of Electron Irradiation Facility

    International Nuclear Information System (INIS)

    Park, S. H.; Cha, H. K.; Lee, B. C.

    2007-06-01

    The KAERI (Korean Atomic Energy Research Institute) high-power electron beam irradiation facility, operating at the energies between 0.3 MeV and 10 MeV,has provided irradiation services to users in industries, universities, and institutes via 'Project of utilization and cooperation of users of a large research facility' since 2004. A great attraction of many researchers, almost 750 persons so far according to surveys, to e-beam irradiation technology as well as the growth of participants on Workshop on Electron Beam Applications from 121 to 176 indicate the increase of demands of irradiation service. Comparing to the cases of advanced nations in this area, such as America, Japan, China, and Russia, Korea is relatively much behind in radiation technology. It is mainly due to the lack of governmental supports and investments. Active support and investment on construction and operation of electron beam user facilities would be principal factors on developments of advanced technologies. In this project, we would like to satisfy users' requests by developing the effective managing and operating system for prompt services, processes, and QA and to ultimately assist users to create additional new results, by maximizing the utilization of all available resources and activating the developments of technologies of electron beam processing

  13. Online Signature Verification on MOBISIG Finger-Drawn Signature Corpus

    Directory of Open Access Journals (Sweden)

    Margit Antal

    2018-01-01

    Full Text Available We present MOBISIG, a pseudosignature dataset containing finger-drawn signatures from 83 users captured with a capacitive touchscreen-based mobile device. The database was captured in three sessions resulting in 45 genuine signatures and 20 skilled forgeries for each user. The database was evaluated by two state-of-the-art methods: a function-based system using local features and a feature-based system using global features. Two types of equal error rate computations are performed: one using a global threshold and the other using user-specific thresholds. The lowest equal error rate was 0.01% against random forgeries and 5.81% against skilled forgeries using user-specific thresholds that were computed a posteriori. However, these equal error rates were significantly raised to 1.68% (random forgeries case and 14.31% (skilled forgeries case using global thresholds. The same evaluation protocol was performed on the DooDB publicly available dataset. Besides verification performance evaluations conducted on the two finger-drawn datasets, we evaluated the quality of the samples and the users of the two datasets using basic quality measures. The results show that finger-drawn signatures can be used by biometric systems with reasonable accuracy.

  14. Atmospheric Signatures and Effects of Space-based Relativistic Electron Beam Injection

    Science.gov (United States)

    Marshall, R. A.; Sanchez, E. R.; Kero, A.; Turunen, E. S.; Marsh, D. R.

    2017-12-01

    Future relativistic electron beam injection experiments have the potential to provide groundbreaking insights into the physics of wave-particle interactions and beam-neutral interactions, relevant to space physics and to fundamental plasma physics. However, these experiments are only useful if their signatures can be detected. In this work, we use a physics-based forward modeling framework to investigate the observable signatures of a relativistic beam interacting with the upper atmosphere. The modeling framework is based around the Electron Precipitation Monte Carlo (EPMC) model, used to simulate electron precipitation in the upper atmosphere. That model is coupled to physics-based models of i) optical emission production; ii) bremsstrahlung photon production and propagation; iii) D-region ion chemistry; and iv) VLF wave propagation in the Earth-ionosphere waveguide. Using these modeling tools, we predict the optical, X-ray, chemical, radar, and VLF signatures of a realistic beam injection, based on recent space-based accelerator designs. In particular, we inject a beam pulse of 10 mA for a duration of 500 μs at an energy of 1 MeV, providing a total pulse energy of 5 J. We further investigate variations in these parameters, in particular the total energy and the electron energy. Our modeling shows that for this 5 J pulse injection at 1 MeV electron energy, the optical signal is easily detectable from the ground in common emission bands, but the X-ray signal is likely too weak to be seen from either balloons or LEO orbiting spacecraft. We further predict the optical signal-to-noise ratio that would be expected in different optical systems. Chemical signatures such as changes to NOx and HOx concentrations are too short-lived to be detectable; however our modeling provides a valuable estimate of the total chemical response. Electron density perturbations should be easily measurable from ground-based high-power radars and via VLF subionospheric remote sensing

  15. 41 CFR 301-71.3 - May we use electronic signatures on travel documents?

    Science.gov (United States)

    2010-07-01

    ... signatures on travel documents? 301-71.3 Section 301-71.3 Public Contracts and Property Management Federal Travel Regulation System TEMPORARY DUTY (TDY) TRAVEL ALLOWANCES AGENCY RESPONSIBILITIES 71-AGENCY TRAVEL ACCOUNTABILITY REQUIREMENTS General § 301-71.3 May we use electronic signatures on travel documents? Yes, if you...

  16. 76 FR 411 - Regulatory Guidance Concerning Electronic Signatures and Documents

    Science.gov (United States)

    2011-01-04

    ... guidance, including memoranda and letters, may no longer be relied upon to the extent they are inconsistent... Concerning Electronic Signatures and Documents AGENCY: Federal Motor Carrier Safety Administration (FMCSA), DOT. ACTION: Notice of regulatory guidance. SUMMARY: FMCSA issues regulatory guidance concerning the...

  17. Quantum multi-signature protocol based on teleportation

    International Nuclear Information System (INIS)

    Wen Xiao-jun; Liu Yun; Sun Yu

    2007-01-01

    In this paper, a protocol which can be used in multi-user quantum signature is proposed. The scheme of signature and verification is based on the correlation of Greenberger-Horne-Zeilinger (GHZ) states and the controlled quantum teleportation. Different from the digital signatures, which are based on computational complexity, the proposed protocol has perfect security in the noiseless quantum channels. Compared to previous quantum signature schemes, this protocol can verify the signature independent of an arbitrator as well as realize multi-user signature together. (orig.)

  18. Electronic Commerce user manual

    Energy Technology Data Exchange (ETDEWEB)

    1992-04-10

    This User Manual supports the Electronic Commerce Standard System. The Electronic Commerce Standard System is being developed for the Department of Defense of the Technology Information Systems Program at the Lawrence Livermore National Laboratory, operated by the University of California for the Department of Energy. The Electronic Commerce Standard System, or EC as it is known, provides the capability for organizations to conduct business electronically instead of through paper transactions. Electronic Commerce and Computer Aided Acquisition and Logistics Support, are two major projects under the DoD`s Corporate Information Management program, whose objective is to make DoD business transactions faster and less costly by using computer networks instead of paper forms and postage. EC runs on computers that use the UNIX operating system and provides a standard set of applications and tools that are bound together by a common command and menu system. These applications and tools may vary according to the requirements of the customer or location and may be customized to meet the specific needs of an organization. Local applications can be integrated into the menu system under the Special Databases & Applications option on the EC main menu. These local applications will be documented in the appendices of this manual. This integration capability provides users with a common environment of standard and customized applications.

  19. Electronic Commerce user manual

    Energy Technology Data Exchange (ETDEWEB)

    1992-04-10

    This User Manual supports the Electronic Commerce Standard System. The Electronic Commerce Standard System is being developed for the Department of Defense of the Technology Information Systems Program at the Lawrence Livermore National Laboratory, operated by the University of California for the Department of Energy. The Electronic Commerce Standard System, or EC as it is known, provides the capability for organizations to conduct business electronically instead of through paper transactions. Electronic Commerce and Computer Aided Acquisition and Logistics Support, are two major projects under the DoD's Corporate Information Management program, whose objective is to make DoD business transactions faster and less costly by using computer networks instead of paper forms and postage. EC runs on computers that use the UNIX operating system and provides a standard set of applications and tools that are bound together by a common command and menu system. These applications and tools may vary according to the requirements of the customer or location and may be customized to meet the specific needs of an organization. Local applications can be integrated into the menu system under the Special Databases Applications option on the EC main menu. These local applications will be documented in the appendices of this manual. This integration capability provides users with a common environment of standard and customized applications.

  20. 21 CFR 11.70 - Signature/record linking.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Signature/record linking. 11.70 Section 11.70 Food... RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.70 Signature/record linking. Electronic signatures and handwritten signatures executed to electronic records shall be linked to their respective...

  1. USign--a security enhanced electronic consent model.

    Science.gov (United States)

    Li, Yanyan; Xie, Mengjun; Bian, Jiang

    2014-01-01

    Electronic consent becomes increasingly popular in the healthcare sector given the many benefits it provides. However, security concerns, e.g., how to verify the identity of a person who is remotely accessing the electronic consent system in a secure and user-friendly manner, also arise along with the popularity of electronic consent. Unfortunately, existing electronic consent systems do not pay sufficient attention to those issues. They mainly rely on conventional password based authentication to verify the identity of an electronic consent user, which is far from being sufficient given that identity theft threat is real and significant in reality. In this paper, we present a security enhanced electronic consent model called USign. USign enhances the identity protection and authentication for electronic consent systems by leveraging handwritten signatures everyone is familiar with and mobile computing technologies that are becoming ubiquitous. We developed a prototype of USign and conducted preliminary evaluation on accuracy and usability of signature verification. Our experimental results show the feasibility of the proposed model.

  2. Awareness and use of electronic databases by public library users ...

    African Journals Online (AJOL)

    The study investigated awareness, access and use of electronic database by public library users in Ibadan Oyo State in Nigeria. The purpose of this study was to determine awareness of public library users' electronic databases, find out what these users used electronic databases to do and to identify problems associated ...

  3. Signature scheme based on bilinear pairs

    Science.gov (United States)

    Tong, Rui Y.; Geng, Yong J.

    2013-03-01

    An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.

  4. Users satisfaction with electronic information resources and services ...

    African Journals Online (AJOL)

    This study investigated users satisfaction on the use of electronic information resources and services in MTN Net libraries in ABU & UNIBEN. Two objectives and one null hypotheses were formulated and tested with respect to the users' satisfaction on electronic information resources and services in MTN Net libraries in ...

  5. Users' Personal Conceptions of Usability and User Experience of Electronic and Software Products

    NARCIS (Netherlands)

    Haaksma, Tim R.; de Jong, Menno D.T.; Karreman, Joyce

    2018-01-01

    Research problem: Despite the abundance of research into usability and user experience (UX), there is still debate about the relationship between both concepts. The user perspective is underrepresented in all discussions. This study examines the personal conceptions that users of electronic and

  6. 21 CFR 11.50 - Signature manifestations.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Signature manifestations. 11.50 Section 11.50 Food... RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.50 Signature manifestations. (a) Signed electronic...: (1) The printed name of the signer; (2) The date and time when the signature was executed; and (3...

  7. Component-Level Electronic-Assembly Repair (CLEAR) Spacecraft Circuit Diagnostics by Analog and Complex Signature Analysis

    Science.gov (United States)

    Oeftering, Richard C.; Wade, Raymond P.; Izadnegahdar, Alain

    2011-01-01

    The Component-Level Electronic-Assembly Repair (CLEAR) project at the NASA Glenn Research Center is aimed at developing technologies that will enable space-flight crews to perform in situ component-level repair of electronics on Moon and Mars outposts, where there is no existing infrastructure for logistics spares. These technologies must provide effective repair capabilities yet meet the payload and operational constraints of space facilities. Effective repair depends on a diagnostic capability that is versatile but easy to use by crew members that have limited training in electronics. CLEAR studied two techniques that involve extensive precharacterization of "known good" circuits to produce graphical signatures that provide an easy-to-use comparison method to quickly identify faulty components. Analog Signature Analysis (ASA) allows relatively rapid diagnostics of complex electronics by technicians with limited experience. Because of frequency limits and the growing dependence on broadband technologies, ASA must be augmented with other capabilities. To meet this challenge while preserving ease of use, CLEAR proposed an alternative called Complex Signature Analysis (CSA). Tests of ASA and CSA were used to compare capabilities and to determine if the techniques provided an overlapping or complementary capability. The results showed that the methods are complementary.

  8. An Efficient Homomorphic Aggregate Signature Scheme Based on Lattice

    Directory of Open Access Journals (Sweden)

    Zhengjun Jing

    2014-01-01

    Full Text Available Homomorphic aggregate signature (HAS is a linearly homomorphic signature (LHS for multiple users, which can be applied for a variety of purposes, such as multi-source network coding and sensor data aggregation. In order to design an efficient postquantum secure HAS scheme, we borrow the idea of the lattice-based LHS scheme over binary field in the single-user case, and develop it into a new lattice-based HAS scheme in this paper. The security of the proposed scheme is proved by showing a reduction to the single-user case and the signature length remains invariant. Compared with the existing lattice-based homomorphic aggregate signature scheme, our new scheme enjoys shorter signature length and high efficiency.

  9. Possibilities of dynamic biometrics for authentication and the circumstances for using dynamic biometric signature

    Directory of Open Access Journals (Sweden)

    Frantisek Hortai

    2018-01-01

    Full Text Available New information technologies alongside their benefits also bring new dangers with themselves. It is difficult to decide which authentication tool to use and implement in the information systems and electronic documents. The final decision has to compromise among the facts that it faces several conflicting requirements: highly secure tool, to be a user-friendly and user simplicity method, ensure protection against errors and failures of users, speed of authentication and provide these features for a reasonable price. Even when the compromised solution is found it has to fulfill the given technology standards. For the listed reasons the paper argues one of the most natural biometric authentication method the dynamic biometric signature and lists its related standards. The paper also includes measurement evaluation which solves the independence between the person’s signature and device on which it was created

  10. [Prevalence and user profile of electronic cigarettes in Spain (2014)].

    Science.gov (United States)

    Lidón-Moyano, Cristina; Martínez-Sánchez, Jose M; Fu, Marcela; Ballbè, Montse; Martín-Sánchez, Juan Carlos; Fernández, Esteve

    To describe the prevalence and user profile of electronic cigarettes among Spanish adults and evaluate the potential dual use of these devices with combustible or conventional tobacco in 2014 in Spain. Cross-sectional study of a representative sample of the Spanish adult (16-75 years old) population (n=1,016). A computer-assisted telephone survey was conducted in 2014. The prevalence and 95% confidence intervals (95% CI) for the use of electronic cigarettes stratified by gender, age, tobacco consumption and social status were calculated. The sample was weighted and a logistic regression model adjusted to obtain the crude odds ratios (OR) adjusted by gender, age and social status. 10.3% (95% CI: 8.6-12.4) of the Spanish adult population stated being ever users of electronic cigarettes (2% current users, 3.2% past users and 5.1% experimental users). Among current electronic cigarette users, 57.2% also smoked combustible or conventional tobacco, 28% had never smoked and 14.8% were former smokers. The prevalence of electronic cigarette use was higher in the younger population (adjusted OR=23.8; 95% CI: 2.5-227.7) and smokers of combustible tobacco (adjusted OR=10.1; 95% CI: 5.8-17.5). The use of electronic cigarettes in Spain is scarce and is most prevalent among young people and tobacco smokers. Nevertheless, one out of four current electronic cigarette users have never smoked. Hence, the regulation of these devices should be reinforced to avoid a possible gateway to nicotine products among never smokers. Copyright © 2016 SESPAS. Publicado por Elsevier España, S.L.U. All rights reserved.

  11. Electron acceleration and radiation signatures in loop coronal transients

    International Nuclear Information System (INIS)

    Vlahos, L.; Gergely, T.E.; Papadopoulos, K.

    1982-01-01

    A model for electron aceleration in loop coronal transients is suggested. We propose that in these transients an erupting loop moves away from the solar surface, with a velocity greater than the local Alfven speed, pushing against the overlying magnetic fields and driving a shock in the front of the moving part of the loop. We suggest that lower hybrid waves are excited at the shock front and propagate radially toward the center of the loop with phase velocity along the magnetic field which exceeds the thermal velocity. The lower hybrid waves stochastically accelerate the tail of the electron distribution inside the loop. We discuss how the accelerated electrons are trapped in the moving loop and give a rough estimate of their radiation signature. We find that plasma radiation can explain the power observed in stationary and moving type IV bursts. We discuss some of the conditions under which moving or stationary type IV bursts are expected to be associated with loop coronal transients

  12. Electron Scale Structures and Magnetic Reconnection Signatures in the Turbulent Magnetosheath

    Science.gov (United States)

    Yordanova, E.; Voros, Z.; Varsani, A.; Graham, D. B.; Norgren, C.; Khotyaintsev, Yu. V.; Vaivads, A.; Eriksson, E.; Nakamura, R.; Lindqvist, P.-A.; hide

    2016-01-01

    Collisionless space plasma turbulence can generate reconnecting thin current sheets as suggested by recent results of numerical magnetohydrodynamic simulations. The Magnetospheric Multiscale (MMS) mission provides the first serious opportunity to verify whether small ion-electron-scale reconnection, generated by turbulence, resembles the reconnection events frequently observed in the magnetotail or at the magnetopause. Here we investigate field and particle observations obtained by the MMS fleet in the turbulent terrestrial magnetosheath behind quasi-parallel bow shock geometry. We observe multiple small-scale current sheets during the event and present a detailed look of one of the detected structures. The emergence of thin current sheets can lead to electron scale structures. Within these structures, we see signatures of ion demagnetization, electron jets, electron heating, and agyrotropy suggesting that MMS spacecraft observe reconnection at these scales.

  13. Electron acceleration and radiation signatures in loop coronal transients

    Science.gov (United States)

    Vlahos, L.; Gergely, T. E.; Papadopoulos, K.

    1982-01-01

    It is proposed that in loop coronal transients an erupting loop moves away from the solar surface, with a velocity exceeding the local Alfven speed, pushing against the overlying magnetic fields and driving a shock in the front of the moving part of the loop. Lower hybrid waves are excited at the shock front and propagate radially toward the center of the loop with phase velocity along the magnetic field that exceeds the thermal velocity. The lower hybrid waves stochastically accelerate the tail of the electron distribution inside the loop. The manner in which the accelerated electrons are trapped in the moving loop are discussed, and their radiation signature is estimated. It is suggested that plasma radiation can explain the power observed in stationary and moving type IV bursts.

  14. Quantifying radionuclide signatures from a γ–γ coincidence system

    International Nuclear Information System (INIS)

    Britton, Richard; Jackson, Mark J.; Davies, Ashley V.

    2015-01-01

    A method for quantifying gamma coincidence signatures has been developed, and tested in conjunction with a high-efficiency multi-detector system to quickly identify trace amounts of radioactive material. The γ–γ system utilises fully digital electronics and list-mode acquisition to time–stamp each event, allowing coincidence matrices to be easily produced alongside typical ‘singles’ spectra. To quantify the coincidence signatures a software package has been developed to calculate efficiency and cascade summing corrected branching ratios. This utilises ENSDF records as an input, and can be fully automated, allowing the user to quickly and easily create/update a coincidence library that contains all possible γ and conversion electron cascades, associated cascade emission probabilities, and true-coincidence summing corrected γ cascade detection probabilities. It is also fully searchable by energy, nuclide, coincidence pair, γ multiplicity, cascade probability and half-life of the cascade. The probabilities calculated were tested using measurements performed on the γ–γ system, and found to provide accurate results for the nuclides investigated. Given the flexibility of the method, (it only relies on evaluated nuclear data, and accurate efficiency characterisations), the software can now be utilised for a variety of systems, quickly and easily calculating coincidence signature probabilities. - Highlights: • Monte-Carlo based software developed to easily create/update a coincidence signal library for environmental radionuclides. • Coincidence library utilised to accurately quantify gamma coincidence signatures. • All coincidence signature probabilities are corrected for cascade summing, conversion electron emission and pair production. • Key CTBTO relevant radionuclides have been tested to verify the calculated correction factors. • Accurately quantifying coincidence signals during routine analysis will allow dramatically improved detection

  15. User-Centered Design, Experience, and Usability of an Electronic Consent User Interface to Facilitate Informed Decision-Making in an HIV Clinic.

    Science.gov (United States)

    Ramos, S Raquel

    2017-11-01

    Health information exchange is the electronic accessibility and transferability of patient medical records across various healthcare settings and providers. In some states, patients have to formally give consent to allow their medical records to be electronically shared. The purpose of this study was to apply a novel user-centered, multistep, multiframework approach to design and test an electronic consent user interface, so patients with HIV can make more informed decisions about electronically sharing their health information. This study consisted of two steps. Step 1 was a cross-sectional, descriptive, qualitative study that used user-centric design interviews to create the user interface. This informed Step 2. Step 2 consisted of a one group posttest to examine perceptions of usefulness, ease of use, preference, and comprehension of a health information exchange electronic consent user interface. More than half of the study population had college experience, but challenges remained with overall comprehension regarding consent. The user interface was not independently successful, suggesting that in addition to an electronic consent user interface, human interaction may also be necessary to address the complexities associated with consenting to electronically share health information. Comprehension is key factor in the ability to make informed decisions.

  16. The Changing Information Needs of Users in Electronic Information Environments.

    Science.gov (United States)

    Kebede, Gashaw

    2002-01-01

    Focuses on the information needs of users that are changing as a results of changes in the availability of information content in electronic form. Highlights the trend and nature of the physical form in which information content is currently being made available for users' access and use in electronic information environments. (Author/LRW)

  17. Basis for the implementation of digital signature in Argentine's health environment

    International Nuclear Information System (INIS)

    Escobar, P P; Formica, M

    2007-01-01

    The growth of telemedical applications and electronic transactions in health environments is paced by the constant technology evolution. This implies a big cultural change in traditional medicine and in hospital information systems' users which arrival is delayed, basically, by the lack of solid laws and a well defined role-based infrastructure. The use of digital signature as a mean of identification, authentication, confidentiality and non-repudiation is the most suitable tool for assuring the electronic transactions and patient's data protection. The implementation of a Public Key Infrastructure (PKI) in health environment allows for authentication, encryption and use of digital signature for assuring confidentiality and control of the movement of sensitive information. This work defines the minimum technological, legal and procedural basis for a successful PKI implementation and establishes the roles for the different actors in the chain of confidence in the public health environment of Argentine

  18. SIGNATURE: A workbench for gene expression signature analysis

    Directory of Open Access Journals (Sweden)

    Chang Jeffrey T

    2011-11-01

    Full Text Available Abstract Background The biological phenotype of a cell, such as a characteristic visual image or behavior, reflects activities derived from the expression of collections of genes. As such, an ability to measure the expression of these genes provides an opportunity to develop more precise and varied sets of phenotypes. However, to use this approach requires computational methods that are difficult to implement and apply, and thus there is a critical need for intelligent software tools that can reduce the technical burden of the analysis. Tools for gene expression analyses are unusually difficult to implement in a user-friendly way because their application requires a combination of biological data curation, statistical computational methods, and database expertise. Results We have developed SIGNATURE, a web-based resource that simplifies gene expression signature analysis by providing software, data, and protocols to perform the analysis successfully. This resource uses Bayesian methods for processing gene expression data coupled with a curated database of gene expression signatures, all carried out within a GenePattern web interface for easy use and access. Conclusions SIGNATURE is available for public use at http://genepattern.genome.duke.edu/signature/.

  19. National Center for Electron Microscopy users' guide

    International Nuclear Information System (INIS)

    1987-01-01

    The National Center for Electron Microscopy (NCEM) in the Materials and Molecular Research Division of the Lawrence Berkeley Laboratory is a high voltage electron microscope facility for ultra-high resolution or dynamic in-situ studies. This guide describes the instruments and their specifications, support instrumentation, and user policies. Advice as to travel and accommodations is provided in the guide. (FI)

  20. Key-Insulated Undetachable Digital Signature Scheme and Solution for Secure Mobile Agents in Electronic Commerce

    Directory of Open Access Journals (Sweden)

    Yang Shi

    2016-01-01

    Full Text Available Considering the security of both the customers’ hosts and the eShops’ servers, we introduce the idea of a key-insulated undetachable digital signature, enabling mobile agents to generate undetachable digital signatures on remote hosts with the key-insulated property of the original signer’s signing key. From the theoretical perspective, we provide the formal definition and security notion of a key-insulated undetachable digital signature. From the practical perspective, we propose a concrete scheme to secure mobile agents in electronic commerce. The scheme is mainly focused on protecting the signing key from leakage and preventing the misuse of the signature algorithm on malicious servers. Agents do not carry the signing key when they generate digital signatures on behalf of the original signer, so the key is protected on remote servers. Furthermore, if a hacker gains the signing key of the original signer, the hacker is still unable to forge a signature for any time period other than the key being accessed. In addition, the encrypted function is combined with the original signer’s requirement to prevent the misuse of signing algorithm. The scheme is constructed on gap Diffie–Hellman groups with provable security, and the performance testing indicates that the scheme is efficient.

  1. Lesson 6: Signature Validation

    Science.gov (United States)

    Checklist items 13 through 17 are grouped under the Signature Validation Process, and represent CROMERR requirements that the system must satisfy as part of ensuring that electronic signatures it receives are valid.

  2. Modelling User Preferences and Mediating Agents in Electronic Commerce

    NARCIS (Netherlands)

    Dastani, M.M.; Jacobs, N.; Jonker, C.M.; Treur, J.

    2005-01-01

    An important ingredient in agent-mediated electronic commerce is the presence of intelligent mediating agents that assist electronic commerce participants (e.g. individual users, other agents, organisations). These mediating agents are in principle autonomous agents that interact with their

  3. Modeling User Preferences and Mediating Agents in Electronic Commerce

    NARCIS (Netherlands)

    Dastani, M.M.; Jacobs, N.; Jonker, C.M.; Treur, J.; Dignum, F.; Sierra, C.

    2001-01-01

    An important ingredient in agent-mediated Electronic Commerce is the presence of intelligent mediating agents that assist Electronic Commerce participants (e.g., individual users, other agents, organisations). These mediating agents are in principle autonomous agents that will interact with their

  4. ELECTRONIC SIGNATURES

    African Journals Online (AJOL)

    10332324

    "[to] promote the understanding and, acceptance of and growth in the number of electronic transactions .... Chapter III of the ECT Act is based on the UNCITRAL Model Law on Electronic. Commerce ... Communications Technology Law 146. 22.

  5. 75 FR 64749 - Request for Comments on the Use of Electronic Signatures for NRC Documents Related to the Medical...

    Science.gov (United States)

    2010-10-20

    ... Pike, Rockville, Maryland. NRC's Agencywide Documents Access and Management System (ADAMS): Publicly... systems exclusively. NRC is seeking comments on acceptable forms of electronic signatures for documents... system that generates the electronic document must have functions that provide a legible document for the...

  6. Electronic Library of Embrapa Cerrados: user study

    Directory of Open Access Journals (Sweden)

    Maria Elisabeth Salviati

    2015-09-01

    Full Text Available Introduction: This paper presents the results of research conducted with Electronic Library users – website, created in 2004 by Embrapa Cerrados, that organizes, stores, and provides full text of the technical scientific production published by the Institution. Objective: To explore the user profile and to make an accurate assessment of the website. Methodology: Data collection of demographic aspects; habits; and search features: navigation, loading time of pages, help, layout and terminology by an online survey. Analysis by SPSS software - Statistical Package for the Social Sciences. Results: The main users are students and agronomists, young people up to 30 years old, coming from the Federal District, belonging to universities and high schools wishing to update knowledge. After, appear the users of public agencies; private companies; Embrapa; agribusiness; federal government; schools; associations and non-governmental organizations; rural extension; cooperatives and syndicates. These users have no difficulties to use the service. Conclusions: The service works well, but some suggestions are useful to improve it. In addition, little demand coming from farms, ranches, rural extension services, cooperatives and syndicates indicates the need to design new products and services oriented to such public.

  7. User Interface of MUDR Electronic Health Record

    Czech Academy of Sciences Publication Activity Database

    Hanzlíček, Petr; Špidlen, Josef; Heroutová, Helena; Nagy, Miroslav

    2005-01-01

    Roč. 74, - (2005), s. 221-227 ISSN 1386-5056 R&D Projects: GA MŠk LN00B107 Institutional research plan: CEZ:AV0Z10300504 Keywords : electronic health record * user interface * data entry * knowledge base Subject RIV: BB - Applied Statistics, Operational Research Impact factor: 1.374, year: 2005

  8. Searchable Signatures: Context and the Struggle for Recognition

    Directory of Open Access Journals (Sweden)

    Gina Schlesselman-Tarango

    2013-09-01

    Full Text Available Social networking sites made possible through Web 2.0 allow for unique user-generated tags called “searchable signatures.”  These tags move beyond the descriptive and act as means for users to assert online individual and group identities.  A study of searchable signatures on the Instagram application demonstrates that these types of tags are valuable not only because they allow for both individuals and groups to engage in what social theorist Axel Honneth calls the struggle for recognition, but also because they provide contextual use data and sociohistorical information so important to the understanding of digital objects.  This article explores how searchable signatures might be used by both patrons and staff in library environments.

  9. Revocable identity-based proxy re-signature against signing key exposure.

    Science.gov (United States)

    Yang, Xiaodong; Chen, Chunlin; Ma, Tingchun; Wang, Jinli; Wang, Caifen

    2018-01-01

    Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key. Due to this transformation function, IDPRS is very useful in constructing privacy-preserving schemes for various information systems. Key revocation functionality is important in practical IDPRS for managing users dynamically; however, the existing IDPRS schemes do not provide revocation mechanisms that allow the removal of misbehaving or compromised users from the system. In this paper, we first introduce a notion called revocable identity-based proxy re-signature (RIDPRS) to achieve the revocation functionality. We provide a formal definition of RIDPRS as well as its security model. Then, we present a concrete RIDPRS scheme that can resist signing key exposure and prove that the proposed scheme is existentially unforgeable against adaptive chosen identity and message attacks in the standard model. To further improve the performance of signature verification in RIDPRS, we introduce a notion called server-aided revocable identity-based proxy re-signature (SA-RIDPRS). Moreover, we extend the proposed RIDPRS scheme to the SA-RIDPRS scheme and prove that this extended scheme is secure against adaptive chosen message and collusion attacks. The analysis results show that our two schemes remain efficient in terms of computational complexity when implementing user revocation procedures. In particular, in the SA-RIDPRS scheme, the verifier needs to perform only a bilinear pairing and four exponentiation operations to verify the validity of the signature. Compared with other IDPRS schemes in the standard model, our SA-RIDPRS scheme greatly reduces the computation overhead of verification.

  10. Quantum messages with signatures forgeable in arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Kim, Taewan; Choi, Jeong Woon; Jho, Nam-Su; Lee, Soojoon

    2015-01-01

    Even though a method to perfectly sign quantum messages has not been known, the arbitrated quantum signature scheme has been considered as one of the good candidates. However, its forgery problem has been an obstacle to the scheme becoming a successful method. In this paper, we consider one situation, which is slightly different from the forgery problem, that we use to check whether at least one quantum message with signature can be forged in a given scheme, although all the messages cannot be forged. If there are only a finite number of forgeable quantum messages in the scheme, then the scheme can be secured against the forgery attack by not sending forgeable quantum messages, and so our situation does not directly imply that we check whether the scheme is secure against the attack. However, if users run a given scheme without any consideration of forgeable quantum messages, then a sender might transmit such forgeable messages to a receiver and in such a case an attacker can forge the messages if the attacker knows them. Thus it is important and necessary to look into forgeable quantum messages. We show here that there always exists such a forgeable quantum message-signature pair for every known scheme with quantum encryption and rotation, and numerically show that there are no forgeable quantum message-signature pairs that exist in an arbitrated quantum signature scheme. (paper)

  11. Automated defect spatial signature analysis for semiconductor manufacturing process

    Science.gov (United States)

    Tobin, Jr., Kenneth W.; Gleason, Shaun S.; Karnowski, Thomas P.; Sari-Sarraf, Hamed

    1999-01-01

    An apparatus and method for performing automated defect spatial signature alysis on a data set representing defect coordinates and wafer processing information includes categorizing data from the data set into a plurality of high level categories, classifying the categorized data contained in each high level category into user-labeled signature events, and correlating the categorized, classified signature events to a present or incipient anomalous process condition.

  12. Incorporating X–ray summing into gamma–gamma signature quantification

    International Nuclear Information System (INIS)

    Britton, R.; Jackson, M.J.; Davies, A.V.

    2016-01-01

    A method for quantifying coincidence signatures has been extended to incorporate the effects of X–ray summing, and tested using a high–efficiency γ–γ system. An X–ray library has been created, allowing all possible γ, X–ray and conversion electron cascades to be generated. The equations for calculating efficiency and cascade summing corrected coincidence signature probabilities have also been extended from a two γ, two detector ‘special case’ to an arbitrarily large system. The coincidence library generated is fully searchable by energy, nuclide, coincidence pair, γ multiplicity, cascade probability and the half–life of the cascade, allowing the user to quickly identify coincidence signatures of interest. The method and software described is inherently flexible, as it only requires evaluated nuclear data, an X–ray library, and accurate efficiency characterisations to quickly and easily calculate coincidence signature probabilities for a variety of systems. Additional uses for the software include the fast identification of γ coincidence signals with required multiplicities and branching ratios, identification of the optimal coincidence signatures to measure for a particular system, and the calculation of cascade summing corrections for single detector systems. - Highlights: • Method for incorporating X-ray summing into coincidence measurements developed. • Calculation routines have been extended to an arbitrarily large detector system, and re-written to take advantage of multiple computing cores. • Data collected in list-mode with all events timestamped for offline coincidence analysis. • Coincidence analysis of environmental samples will dramatically improve the detection sensitivity achievable.

  13. Restrictive partially blind signature for resource-constrained information systems

    NARCIS (Netherlands)

    Qiu, Weidong; Gong, Zheng; Liu, Bozhong; Long, Yu; Chen, Kefei

    2010-01-01

    Restrictive partially blind signature, which is designed for privacy oriented information systems, allows a user to obtain a blind signature from a signer whilst the blind message must obey some certain rules. In order to reduce storage and communication costs, several public-key cryptosystems are

  14. Time Series Based for Online Signature Verification

    Directory of Open Access Journals (Sweden)

    I Ketut Gede Darma Putra

    2013-11-01

    Full Text Available Signature verification system is to match the tested signature with a claimed signature. This paper proposes time series based for feature extraction method and dynamic time warping for match method. The system made by process of testing 900 signatures belong to 50 participants, 3 signatures for reference and 5 signatures from original user, simple imposters and trained imposters for signatures test. The final result system was tested with 50 participants with 3 references. This test obtained that system accuracy without imposters is 90,44897959% at threshold 44 with rejection errors (FNMR is 5,2% and acceptance errors (FMR is 4,35102%, when with imposters system accuracy is 80,1361% at threshold 27 with error rejection (FNMR is 15,6% and acceptance errors (average FMR is 4,263946%, with details as follows: acceptance errors is 0,391837%, acceptance errors simple imposters is 3,2% and acceptance errors trained imposters is 9,2%.

  15. PEDRO (Petroleum Electronic Data Reporting Option) user guide

    Energy Technology Data Exchange (ETDEWEB)

    1990-11-01

    PEDRO is an electronic data communications product that simplifies filing and transmission of petroleum survey data. Your burden is significantly reduced as PEDRO eliminates paperwork, provides immediate onsite correction of data errors, and reduces the need for followup calls and survey resubmission. PEDRO provides an online error-checking process that highlights discrepancies. This permits you to enter and check data before transmitting to EIA. EIA then combines and reformats the data from different users for use by analytical and reporting programs. PEDRO is available at no cost to the user. Formal training is not required since installation, data processing, and transmission are done by interactive, user-friendly menu options. The PEDRO system is divided into three functions: (1) data processing, (2) transmitting data to EIA, and (3) EIA processing. 28 figs.

  16. Quantum signature scheme for known quantum messages

    International Nuclear Information System (INIS)

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  17. Implementation of RSA 2048-bit and AES 256-bit with Digital Signature for Secure Electronic Health Record Application

    Directory of Open Access Journals (Sweden)

    Mohamad Ali Sadikin

    2016-10-01

    Full Text Available This research addresses the implementation of encryption and digital signature technique for electronic health record to prevent cybercrime such as robbery, modification and unauthorised access. In this research, RSA 2048-bit algorithm, AES 256-bit and SHA 256 will be implemented in Java programming language. Secure Electronic Health Record Information (SEHR application design is intended to combine given services, such as confidentiality, integrity, authentication, and nonrepudiation. Cryptography is used to ensure the file records and electronic documents for detailed information on the medical past, present and future forecasts that have been given only to the intended patients. The document will be encrypted using an encryption algorithm based on NIST Standard. In the application, there are two schemes, namely the protection and verification scheme. This research uses black-box testing and whitebox testing to test the software input, output, and code without testing the process and design that occurs in the system.We demonstrated the implementation of cryptography in SEHR. The implementation of encryption and digital signature in this research can prevent archive thievery.

  18. Research on a New Signature Scheme on Blockchain

    Directory of Open Access Journals (Sweden)

    Chao Yuan

    2017-01-01

    Full Text Available With the rise of Bitcoin, blockchain which is the core technology of Bitcoin has received increasing attention. Privacy preserving and performance on blockchain are two research points in academia and business, but there are still some unresolved issues in both respects. An aggregate signature scheme is a digital signature that supports making signatures on many different messages generated by many different users. Using aggregate signature, the size of the signature could be shortened by compressing multiple signatures into a single signature. In this paper, a new signature scheme for transactions on blockchain based on the aggregate signature was proposed. It was worth noting that elliptic curve discrete logarithm problem and bilinear maps played major roles in our signature scheme. And the security properties of our signature scheme were proved. In our signature scheme, the amount will be hidden especially in the transactions which contain multiple inputs and outputs. Additionally, the size of the signature on transaction is constant regardless of the number of inputs and outputs that the transaction contains, which can improve the performance of signature. Finally, we gave an application scenario for our signature scheme which aims to achieve the transactions of big data on blockchain.

  19. Factors Influencing Electronic Government Adoption Perspectives Of Less Frequent Internet Users Of Pakistan

    Directory of Open Access Journals (Sweden)

    Farooq Alam Khan

    2015-01-01

    Full Text Available Abstract Much literature on electronic government services research could be found on adoptability issues from government and service providers point of view. Many studies have looked into adoptability factors from user perspectives and majority captured adoptability perspectives of frequent Internet users the ones who use Internet applications for more than 10 hours a week. On the contrary the perspectives of majority of Pakistani users which use Internet applications for less than 10 hours per week are never inquired. This paper tries to fill this gap by looking into electronic government adoptability perspectives and expectations of such Internet users of Pakistan which are much greater in numbers than others. An amended UTAUT model with all its moderators is used in this study and the results demonstrate that performance level ease of effort and social influence strongly effect behavioral intention of users in using electronic government services in Pakistan. The individuals behavioral intention along with presence of appropriate facilitating conditions triggers use behavior of users. The results show that only gender moderates majority of UTAUT relationships and accordingly a modified UTAUT model is presented. The paper provides certain insights for people making policies and academicians for performing further research while it stresses for service proliferation with special attention towards female population.

  20. Urinary cotinine levels of electronic cigarette (e-cigarette) users.

    Science.gov (United States)

    Göney, Gülşen; Çok, İsmet; Tamer, Uğur; Burgaz, Sema; Şengezer, Tijen

    2016-07-01

    The popularity of electronic cigarettes (e-cigarettes) is rapidly increasing in many countries. These devices are designed to imitate regular cigarettes, delivering nicotine via inhalation without combusting tobacco but currently, there is a lack of scientific evidence on the presence or absence of nicotine exposure. Such research relies on evidence from e-cigarette users urine samples. In this study, we aimed to determine the levels and compare the amount of nicotine to which e-cigarette users, cigarette smokers and passive smokers are exposed. Therefore, urine samples were collected from e-cigarette users, cigarette smokers, passive smokers, and healthy nonsmokers. The urinary cotinine levels of the subjects were determined using gas chromatography-mass spectrometry. The mean (±SD) urinary cotinine levels were determined as 1755 ± 1848 ng/g creatinine for 32 e-cigarette users, 1720 ± 1335 ng/g creatinine for 33 cigarette smokers and 81.42 ± 97.90 ng/g creatinine for 33 passive smokers. A significant difference has been found between cotinine levels of e-cigarette users and passive smokers (p e-cigarette users and cigarette smokers (p > 0.05). This is a seminal study to demonstrate the e-cigarette users are exposed to nicotine as much as cigarette smokers.

  1. Customization of electronic medical record templates to improve end-user satisfaction.

    Science.gov (United States)

    Gardner, Carrie Lee; Pearce, Patricia F

    2013-03-01

    Since 2004, increasing importance has been placed on the adoption of electronic medical records by healthcare providers for documentation of patient care. Recent federal regulations have shifted the focus from adoption alone to meaningful use of an electronic medical record system. As proposed by the Technology Acceptance Model, the behavioral intention to use technology is determined by the person's attitude toward usage. The purpose of this quality improvement project was to devise and implement customized templates into an existent electronic medical record system in a single clinic and measure the satisfaction of the clinic providers with the system before and after implementation. Provider satisfaction with the electronic medical record system was evaluated prior to and following template implementation using the current version 7.0 of the Questionnaire for User Interaction Satisfaction tool. Provider comments and improvement in the Questionnaire for User Interaction Satisfaction levels of rankings following template implementation indicated a positive perspective by the providers in regard to the templates and customization of the system.

  2. Network-based Arbitrated Quantum Signature Scheme with Graph State

    Science.gov (United States)

    Ma, Hongling; Li, Fei; Mao, Ningyi; Wang, Yijun; Guo, Ying

    2017-08-01

    Implementing an arbitrated quantum signature(QAS) through complex networks is an interesting cryptography technology in the literature. In this paper, we propose an arbitrated quantum signature for the multi-user-involved networks, whose topological structures are established by the encoded graph state. The determinative transmission of the shared keys, is enabled by the appropriate stabilizers performed on the graph state. The implementation of this scheme depends on the deterministic distribution of the multi-user-shared graph state on which the encoded message can be processed in signing and verifying phases. There are four parties involved, the signatory Alice, the verifier Bob, the arbitrator Trent and Dealer who assists the legal participants in the signature generation and verification. The security is guaranteed by the entanglement of the encoded graph state which is cooperatively prepared by legal participants in complex quantum networks.

  3. An ID-based Blind Signature Scheme from Bilinear Pairings

    OpenAIRE

    B.Umaprasada Rao; K.A.Ajmath

    2010-01-01

    Blind signatures, introduced by Chaum, allow a user to obtain a signature on a message without revealing any thing about the message to the signer. Blind signatures play on important role in plenty of applications such as e-voting, e-cash system where anonymity is of great concern. Identity based(ID-based) public key cryptography can be a good alternative for certified based public key setting, especially when efficient key management and moderate security are required. In this paper, we prop...

  4. Users' satisfaction with the use of electronic database in university ...

    African Journals Online (AJOL)

    Users' satisfaction with the use of electronic database in university libraries in north ... file of digitized information (bibliographic records, abstracts, full-text documents, ... managed with the aid of database management system (DBMS) software.

  5. Personal Identification and the Assessment of the Psychophysiological State While Writing a Signature

    Directory of Open Access Journals (Sweden)

    Pavel Lozhnikov

    2015-08-01

    Full Text Available This article discusses the problem of user identification and psychophysiological state assessment while writing a signature using a graphics tablet. The solution of the problem includes the creation of templates containing handwriting signature features simultaneously with the hidden registration of physiological parameters of a person being tested. Heart rate variability description in the different time points is used as a physiological parameter. As a result, a signature template is automatically generated for psychophysiological states of an identified person. The problem of user identification and psychophysiological state assessment is solved depending on the registered value of a physiological parameter.

  6. Electronic cigarettes: a survey of users

    Directory of Open Access Journals (Sweden)

    Etter Jean-François

    2010-05-01

    Full Text Available Abstract Background Little is known about users of electronic cigarettes, or their opinions, satisfaction or how and why they use such products. Methods An internet survey of 81 ever-users of ecigarettes in 2009. Participants answered open-ended questions on use of, and opinions about, ecigarettes. Results Respondents (73 current and 8 former users lived in France, Canada, Belgium or Switzerland. Most respondents (77% were men; 63% were former smokers and 37% were current smokers. They had used e-cigarettes for 100 days (median and drew 175 puffs per day (median. Participants used the ecigarette either to quit smoking (53 comments, to reduce their cigarette consumption (14 comments, in order not to disturb other people with smoke (20 comments, or in smoke-free places (21 comments. Positive effects reported with ecigarettes included their usefulness to quit smoking, and the benefits of abstinence from smoking (less coughing, improved breathing, better physical fitness. Respondents also enjoyed the flavour of ecigarettes and the sensation of inhalation. Side effects included dryness of the mouth and throat. Respondents complained about the frequent technical failures of ecigarettes and had some concerns about the possible toxicity of the devices and about their future legal status. Conclusions Ecigarettes were used mainly to quit smoking, and may be helpful for this purpose, but several respondents were concerned about potential toxicity. There are very few published studies on ecigarettes and research is urgently required, particularly on the efficacy and toxicity of these devices.

  7. Electronic health record "super-users" and "under-users" in ambulatory care practices.

    Science.gov (United States)

    Rumball-Smith, Juliet; Shekelle, Paul; Damberg, Cheryl L

    2018-01-01

    This study explored variation in the extent of use of electronic health record (EHR)-based health information technology (IT) functionalities across US ambulatory care practices. Use of health IT functionalities in ambulatory care is important for delivering high-quality care, including that provided in coordination with multiple practitioners. We used data from the 2014 Healthcare Information and Management Systems Society Analytics survey. The responses of 30,123 ambulatory practices with an operational EHR were analyzed to examine the extent of use of EHR-based health IT functionalities for each practice. We created a novel framework for classifying ambulatory care practices employing 7 domains of health IT functionality. Drawing from the survey responses, we created a composite "use" variable indicating the extent of health IT functionality use across these domains. "Super-user" practices were defined as having near-full employment of the 7 domains of health IT functionalities and "under-users" as those with minimal or no use of health IT functionalities. We used multivariable logistic regression to investigate how the odds of super-use and under-use varied by practice size, type, urban or rural location, and geographic region. Seventy-three percent of practices were not using EHR technologies to their full capability, and nearly 40% were classified as under-users. Under-user practices were more likely to be of smaller size, situated in the West, and located outside a metropolitan area. To achieve the broader benefits of the EHR and health IT, health systems and policy makers need to identify and address barriers to full use of health IT functionalities.

  8. Electronic cigarette: users profile, utilization, satisfaction and perceived efficacy.

    Science.gov (United States)

    Etter, Jean-François; Bullen, Chris

    2011-11-01

    To assess the profile, utilization patterns, satisfaction and perceived effects among users of electronic cigarettes ('e-cigarettes'). Internet survey in English and French in 2010. Online questionnaire. Visitors of websites and online discussion forums dedicated to e-cigarettes and to smoking cessation. There were 3587 participants (70% former tobacco smokers, 61% men, mean age 41 years). The median duration of electronic cigarette use was 3 months, users drew 120 puffs/day and used five refills/day. Almost all (97%) used e-cigarettes containing nicotine. Daily users spent $33 per month on these products. Most (96%) said the e-cigarette helped them to quit smoking or reduce their smoking (92%). Reasons for using the e-cigarette included the perception that it was less toxic than tobacco (84%), to deal with craving for tobacco (79%) and withdrawal symptoms (67%), to quit smoking or avoid relapsing (77%), because it was cheaper than smoking (57%) and to deal with situations where smoking was prohibited (39%). Most ex-smokers (79%) feared they might relapse to smoking if they stopped using the e-cigarette. Users of nicotine-containing e-cigarettes reported better relief of withdrawal and a greater effect on smoking cessation than those using non-nicotine e-cigarettes. E-cigarettes were used much as people would use nicotine replacement medications: by former smokers to avoid relapse or as an aid to cut down or quit smoking. Further research should evaluate the safety and efficacy of e-cigarettes for administration of nicotine and other substances, and for quitting and relapse prevention. © 2011 The Authors, Addiction © 2011 Society for the Study of Addiction.

  9. A Quantum Multi-Proxy Weak Blind Signature Scheme Based on Entanglement Swapping

    Science.gov (United States)

    Yan, LiLi; Chang, Yan; Zhang, ShiBin; Han, GuiHua; Sheng, ZhiWei

    2017-02-01

    In this paper, we present a multi-proxy weak blind signature scheme based on quantum entanglement swapping of Bell states. In the scheme, proxy signers can finish the signature instead of original singer with his/her authority. It can be applied to the electronic voting system, electronic paying system, etc. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. It could guarantee not only the unconditionally security but also the anonymity of the message owner. The security analysis shows the scheme satisfies the security features of multi-proxy weak signature, singers cannot disavowal his/her signature while the signature cannot be forged by others, and the message owner can be traced.

  10. Digital signature feasibility study

    Science.gov (United States)

    2008-06-01

    The purpose of this study was to assess the advantages and disadvantages of using digital signatures to assist the Arizona Department of Transportation in conducting business. The Department is evaluating the potential of performing more electronic t...

  11. Time-dependent delayed signatures from energetic photon interrogations

    International Nuclear Information System (INIS)

    Norman, Daren R.; Jones, James L.; Blackburn, Brandon W.; Haskell, Kevin J.; Johnson, James T.; Watson, Scott M.; Hunt, Alan W.; Spaulding, Randy; Harmon, Frank

    2007-01-01

    Pulsed photonuclear interrogation environments generated by 8-24 MeV electron linac are rich with time-dependent, material-specific, radiation signatures. Nitrogen-based explosives and nuclear materials can be detected by exploiting these signatures in different delayed-time regions. Numerical and experimental results presented in this paper show the unique time and energy dependence of these signatures. It is shown that appropriate delayed-time windows are essential to acquire material-specific signatures in pulsed photonuclear assessment environments. These developments demonstrate that pulsed, high-energy, photon-inspection environments can be exploited for time-dependent, material-specific signatures through the proper operation of specialized detectors and detection methods

  12. Develop security architecture for both in-house healthcare information systems and electronic patient record

    Science.gov (United States)

    Zhang, Jianguo; Chen, Xiaomeng; Zhuang, Jun; Jiang, Jianrong; Zhang, Xiaoyan; Wu, Dongqing; Huang, H. K.

    2003-05-01

    In this paper, we presented a new security approach to provide security measures and features in both healthcare information systems (PACS, RIS/HIS), and electronic patient record (EPR). We introduced two security components, certificate authoring (CA) system and patient record digital signature management (DSPR) system, as well as electronic envelope technology, into the current hospital healthcare information infrastructure to provide security measures and functions such as confidential or privacy, authenticity, integrity, reliability, non-repudiation, and authentication for in-house healthcare information systems daily operating, and EPR exchanging among the hospitals or healthcare administration levels, and the DSPR component manages the all the digital signatures of patient medical records signed through using an-symmetry key encryption technologies. The electronic envelopes used for EPR exchanging are created based on the information of signers, digital signatures, and identifications of patient records stored in CAS and DSMS, as well as the destinations and the remote users. The CAS and DSMS were developed and integrated into a RIS-integrated PACS, and the integration of these new security components is seamless and painless. The electronic envelopes designed for EPR were used successfully in multimedia data transmission.

  13. Comparison of Fingerprint and Iris Biometric Authentication for Control of Digital Signatures

    OpenAIRE

    Zuckerman, Alan E.; Moon, Kenneth A.; Eaddy, Kenneth

    2002-01-01

    Biometric authentication systems can be used to control digital signature of medical documents. This pilot study evaluated the use of two different fingerprint technologies and one iris technology to control creation of digital signatures on a central server using public private key pairs stored on the server. Documents and signatures were stored in XML for portability. Key pairs and authentication certificates were generated during biometric enrollment. Usability and user acceptance were gua...

  14. Learning Global-Local Distance Metrics for Signature-Based Biometric Cryptosystems

    Directory of Open Access Journals (Sweden)

    George S. Eskander Ekladious

    2017-11-01

    Full Text Available Biometric traits, such as fingerprints, faces and signatures have been employed in bio-cryptosystems to secure cryptographic keys within digital security schemes. Reliable implementations of these systems employ error correction codes formulated as simple distance thresholds, although they may not effectively model the complex variability of behavioral biometrics like signatures. In this paper, a Global-Local Distance Metric (GLDM framework is proposed to learn cost-effective distance metrics, which reduce within-class variability and augment between-class variability, so that simple error correction thresholds of bio-cryptosystems provide high classification accuracy. First, a large number of samples from a development dataset are used to train a global distance metric that differentiates within-class from between-class samples of the population. Then, once user-specific samples are available for enrollment, the global metric is tuned to a local user-specific one. Proof-of-concept experiments on two reference offline signature databases confirm the viability of the proposed approach. Distance metrics are produced based on concise signature representations consisting of about 20 features and a single prototype. A signature-based bio-cryptosystem is designed using the produced metrics and has shown average classification error rates of about 7% and 17% for the PUCPR and the GPDS-300 databases, respectively. This level of performance is comparable to that obtained with complex state-of-the-art classifiers.

  15. Securing optical code-division multiple-access networks with a postswitching coding scheme of signature reconfiguration

    Science.gov (United States)

    Huang, Jen-Fa; Meng, Sheng-Hui; Lin, Ying-Chen

    2014-11-01

    The optical code-division multiple-access (OCDMA) technique is considered a good candidate for providing optical layer security. An enhanced OCDMA network security mechanism with a pseudonoise (PN) random digital signals type of maximal-length sequence (M-sequence) code switching to protect against eavesdropping is presented. Signature codes unique to individual OCDMA-network users are reconfigured according to the register state of the controlling electrical shift registers. Examples of signature reconfiguration following state switching of the controlling shift register for both the network user and the eavesdropper are numerically illustrated. Dynamically changing the PN state of the shift register to reconfigure the user signature sequence is shown; this hinders eavesdroppers' efforts to decode correct data sequences. The proposed scheme increases the probability of eavesdroppers committing errors in decoding and thereby substantially enhances the degree of an OCDMA network's confidentiality.

  16. 12 CFR 609.910 - Compliance with the Electronic Signatures in Global and National Commerce Act (Public Law 106-229...

    Science.gov (United States)

    2010-01-01

    ... Global and National Commerce Act (Public Law 106-229) (E-SIGN). 609.910 Section 609.910 Banks and Banking... with the Electronic Signatures in Global and National Commerce Act (Public Law 106-229) (E-SIGN). (a) General. E-SIGN makes it easier to conduct E-commerce. With some exceptions, E-SIGN permits the use and...

  17. A Framework for Effective User Interface Design for Web-Based Electronic Commerce Applications

    Directory of Open Access Journals (Sweden)

    Justyna Burns

    2001-01-01

    Full Text Available Efficient delivery of relevant product information is increasingly becoming the central basis of competition between firms. The interface design represents the central component for successful information delivery to consumers. However, interface design for web-based information systems is probably more an art than a science at this point in time. Much research is needed to understand properties of an effective interface for electronic commerce. This paper develops a framework identifying the relationship between user factors, the role of the user interface and overall system success for web-based electronic commerce. The paper argues that web-based systems for electronic commerce have some similar properties to decision support systems (DSS and adapts an established DSS framework to the electronic commerce domain. Based on a limited amount of research studying web browser interface design, the framework identifies areas of research needed and outlines possible relationships between consumer characteristics, interface design attributes and measures of overall system success.

  18. A Methodology for Calculating Radiation Signatures

    Energy Technology Data Exchange (ETDEWEB)

    Klasky, Marc Louis [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Wilcox, Trevor [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Bathke, Charles G. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); James, Michael R. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-05-01

    A rigorous formalism is presented for calculating radiation signatures from both Special Nuclear Material (SNM) as well as radiological sources. The use of MCNP6 in conjunction with CINDER/ORIGEN is described to allow for the determination of both neutron and photon leakages from objects of interest. In addition, a description of the use of MCNP6 to properly model the background neutron and photon sources is also presented. Examinations of the physics issues encountered in the modeling are investigated so as to allow for guidance in the user discerning the relevant physics to incorporate into general radiation signature calculations. Furthermore, examples are provided to assist in delineating the pertinent physics that must be accounted for. Finally, examples of detector modeling utilizing MCNP are provided along with a discussion on the generation of Receiver Operating Curves, which are the suggested means by which to determine detectability radiation signatures emanating from objects.

  19. Adaptive Digital Signature Design and Short-Data-Record Adaptive Filtering

    National Research Council Canada - National Science Library

    Pados, Dimitiris A

    2008-01-01

    This report covers the research performed to create and develop a digital signature design analysis and development methodology that will support robust multi-user communications in rapidly changing environments...

  20. Electronic referrals: what matters to the users.

    Science.gov (United States)

    Warren, Jim; Gu, Yulong; Day, Karen; White, Sue; Pollock, Malcolm

    2012-01-01

    Between September 2010 and May 2011 we evaluated three implementations of electronic referral (eReferral) systems at Hutt Valley, Northland and Canterbury District Health Boards in New Zealand. Qualitative and quantitative data were gathered through project documentation, database records and stakeholder interviews. This paper reports on the user perspectives based on interviews with 78 clinical, management and operational stakeholders in the three regions. Themes that emerge across the regions are compared and synthesised. Interviews focused on pre-planned domains including quality of referral, ease of use and patient safety, but agendas were adapted progressively to elaborate and triangulate on themes emerging from earlier interviews and to clarify indications from analysis of database records. The eReferral users, including general practitioners, specialists and administrative staff, report benefits in the areas of: (1) availability and transparency of referral-related data; (2) work transformation; (3) improved data quality and (4) the convenience of auto-population from the practice management system into the referral forms. eReferral provides enhanced visibility of referral data and status within the limits of the implementation (which only goes to the hospital door in some cases). Users in all projects indicated the desire to further exploit IT to enhance two-way communication between community and hospital. Reduced administrative handling is a clear work transformation benefit with mixed feedback regarding clinical workload impact. Innovations such as GP eReferral triaging teams illustrate the further potential for workflow transformation. Consistent structure in eReferrals, as well as simple legibility, enhances data quality. Efficiency and completeness is provided by auto-population of forms from system data, but opens issues around data accuracy. All three projects highlight the importance of user involvement in design, implementation and refinement. In

  1. Reconfiguring waveguide-gratings-based M-signature codecs to enhance OCDMA network confidentiality

    Science.gov (United States)

    Huang, Jen-Fa; Chen, Kai-Sheng; Lin, Ying-Chen; Li, Chung-Yu

    2014-02-01

    A reconfiguration scheme based on composite signature codes over waveguide-gratings-based optical code-division multiple-access (OCDMA) network coder/decoders (codecs) is proposed in the paper. By using central control node to monitor network traffic condition and reconfigure the composite signature codes made up of maximal-length sequence (M-sequence) component codes and random changing the signature codes assigned for each user to improve the confidentiality performance in an OCDMA system. The proposed scheme is analyzed with some practical eavesdroppers' attacks.

  2. A Provably Secure Aggregate Signature Scheme for Healthcare Wireless Sensor Networks.

    Science.gov (United States)

    Shen, Limin; Ma, Jianfeng; Liu, Ximeng; Miao, Meixia

    2016-11-01

    Wireless sensor networks (WSNs) are being used in a wide range of applications for healthcare monitoring, like heart rate monitors and blood pressure monitors, which can minimize the need for healthcare professionals. In medical system, sensors on or in patients produce medical data which can be easily compromised by a vast of attacks. Although signature schemes can protect data authenticity and data integrity, when the number of users involved in the medical system becomes huge, the bandwidth and storage cost will rise sharply so that existing signature schemes are inapplicability for WSNs. In this paper, we propose an efficient aggregate signature scheme for healthcare WSNs according to an improved security model, which can combine multiple signatures into a single aggregate signature. The length of such an aggregate signature may be as long as that of an individual one, which can greatly decrease the bandwidth and storage cost for networks.

  3. Efficient Fair Exchange from Identity-Based Signature

    Science.gov (United States)

    Yum, Dae Hyun; Lee, Pil Joong

    A fair exchange scheme is a protocol by which two parties Alice and Bob exchange items or services without allowing either party to gain advantages by quitting prematurely or otherwise misbehaving. To this end, modern cryptographic solutions use a semi-trusted arbitrator who involves only in cases where one party attempts to cheat or simply crashes. We call such a fair exchange scheme optimistic. When no registration is required between the signer and the arbitrator, we say that the fair exchange scheme is setup free. To date, the setup-free optimist fair exchange scheme under the standard RSA assumption was only possible from the generic construction of [12], which uses ring signatures. In this paper, we introduce a new setup-free optimistic fair exchange scheme under the standard RSA assumption. Our scheme uses the GQ identity-based signature and is more efficient than [12]. The construction can also be generalized by using various identity-based signature schemes. Our main technique is to allow each user to choose his (or her) own “random” public key in the identitybased signature scheme.

  4. Copyright Issues for the Creators and Users of Information in the Electronic Environment.

    Science.gov (United States)

    Oakley, Robert L.

    1991-01-01

    Discusses issues that deal with the interface of copyright law and online systems. Areas of change needed to maintain the balance between users and creators of electronic information are identified, limits of the Copyright Act are explored, and it is suggested that existing copyright law can be applied to electronic information. (four references)…

  5. Arbitrated quantum signature scheme based on χ-type entangled states

    International Nuclear Information System (INIS)

    Zuo, Huijuan; Huang, Wei; Qin, Sujuan

    2013-01-01

    An arbitrated quantum signature scheme, which is mainly applied in electronic-payment systems, is proposed and investigated. The χ-type entangled states are used for quantum key distribution and quantum signature in this protocol. Compared with previous quantum signature schemes which also utilize χ-type entangled states, the proposed scheme provides higher efficiency. Finally, we also analyze its security under various kinds of attacks. (paper)

  6. A Prototype User Interface for a Mobile Electronic Clinical Note Data Entry System

    OpenAIRE

    Zafar, Atif; Lehto, Mark; Kim, Jongseo

    2005-01-01

    Recent advances in mobile computing technologies have made electronic medical records (EMRs) on handheld devices an attractive possibility. However, data entry paradigms popular on desktop machines do not translate well to mobile devices1,2. Based on a review of the literature on mobile device usability1–4, we built a prototype user interface for mobile EMRs and held focus groups with clinician users whose feedback provided useful insight about design choices, functionality and...

  7. The Design of a Graphical User Interface for an Electronic Classroom.

    Science.gov (United States)

    Cahalan, Kathleen J.; Levin, Jacques

    2000-01-01

    Describes the design of a prototype for the graphical user interface component of an electronic classroom (ECR) application that supports real-time lectures and question-and-answer sessions between an instructor and students. Based on requirements analysis and an analysis of competing products, a Web-based ECR prototype was produced. Findings show…

  8. GESearch: An Interactive GUI Tool for Identifying Gene Expression Signature

    Directory of Open Access Journals (Sweden)

    Ning Ye

    2015-01-01

    Full Text Available The huge amount of gene expression data generated by microarray and next-generation sequencing technologies present challenges to exploit their biological meanings. When searching for the coexpression genes, the data mining process is largely affected by selection of algorithms. Thus, it is highly desirable to provide multiple options of algorithms in the user-friendly analytical toolkit to explore the gene expression signatures. For this purpose, we developed GESearch, an interactive graphical user interface (GUI toolkit, which is written in MATLAB and supports a variety of gene expression data files. This analytical toolkit provides four models, including the mean, the regression, the delegate, and the ensemble models, to identify the coexpression genes, and enables the users to filter data and to select gene expression patterns by browsing the display window or by importing knowledge-based genes. Subsequently, the utility of this analytical toolkit is demonstrated by analyzing two sets of real-life microarray datasets from cell-cycle experiments. Overall, we have developed an interactive GUI toolkit that allows for choosing multiple algorithms for analyzing the gene expression signatures.

  9. Perceptions towards electronic cigarettes for smoking cessation among Stop Smoking Service users.

    Science.gov (United States)

    Sherratt, Frances C; Newson, Lisa; Marcus, Michael W; Field, John K; Robinson, Jude

    2016-05-01

    Electronic cigarettes (e-cigarettes) are promoted as smoking cessation tools, yet they remain unavailable from Stop Smoking Services in England; the debate over their safety and efficacy is ongoing. This study was designed to explore perceptions and reasons for use or non-use of electronic cigarettes as smoking cessation tools, among individuals engaged in Stop Smoking Services. Semi-structured telephone interviews were undertaken with twenty participants engaged in Stop Smoking Services in the north-west of England. Participants comprised of both individuals who had tried e-cigarettes (n = 6) and those who had not (n = 14). Interviews were digitally recorded and transcribed verbatim. The transcripts were subject to thematic analysis, which explored participants' beliefs and experiences of e-cigarettes. A thematic analysis of transcripts suggested that the following three superordinate themes were prominent: (1) self-efficacy and beliefs in e-cigarettes; (2) e-cigarettes as a smoking cessation aid; and (3) cues for e-cigarette use. Participants, particularly never users, were especially concerned regarding e-cigarette efficacy and safety. Overall, participants largely expressed uncertainty regarding e-cigarette safety and efficacy, with some evidence of misunderstanding. Evidence of uncertainty and misunderstanding regarding information on e-cigarettes highlights the importance of providing smokers with concise, up-to-date information regarding e-cigarettes, enabling smokers to make informed treatment decisions. Furthermore, identification of potential predictors of e-cigarette use can be used to inform Stop Smoking Services provision and future research. What is already known on this subject? Research suggests that e-cigarettes may help smokers quit smoking, but further studies are needed. Electronic cigarette use in Stop Smoking Services has increased substantially in recent years, although e-cigarettes are currently not regulated. There is debate within the

  10. Comparison of Fingerprint and Iris Biometric Authentication for Control of Digital Signatures

    Science.gov (United States)

    Zuckerman, Alan E.; Moon, Kenneth A.; Eaddy, Kenneth

    2002-01-01

    Biometric authentication systems can be used to control digital signature of medical documents. This pilot study evaluated the use of two different fingerprint technologies and one iris technology to control creation of digital signatures on a central server using public private key pairs stored on the server. Documents and signatures were stored in XML for portability. Key pairs and authentication certificates were generated during biometric enrollment. Usability and user acceptance were guarded and limitations of biometric systems prevented use of the system with all test subjects. The system detected alternations in the data content and provided future signer re-authentication for non-repudiation.

  11. The Mimas ghost revisited: An analysis of the electron flux and electron microsignatures observed in the vicinity of Mimas at Saturn

    Science.gov (United States)

    Chenette, D. L.; Stone, E. C.

    1983-01-01

    An analysis of the electron absorption signature observed by the Cosmic Ray System (CRS) on Voyage 2 near the orbit of Mimas is presented. We find that these observations cannot be explained as the absorption signature of Mimas. Combing Pioneer 11 and Voyager 2 measurements of the electron flux at Mimas's orbit (L=3.1), we find an electron spectrum where most of the flux above approx 100 keV is concentrated near 1 to 3 MeV. The expected Mimas absorption signature is calculated from this spectrum neglecting radial diffusion. A lower limit on the diffusion coefficient for MeV electrons is obtained. With a diffusion coefficient this large, both the Voyager 2 and the Pioneer 11 small-scale electron absorption signature observations in Mimas's orbit are enigmatic. Thus we refer to the mechanism for producing these signatures as the Mimas ghost. A cloud of material in orbit with Mimas may account for the observed electron signature if the cloud is at least 1% opaque to electrons across a region extending over a few hundred kilometers.

  12. A pilot study on nicotine residues in houses of electronic cigarette users, tobacco smokers, and non-users of nicotine-containing products.

    Science.gov (United States)

    Bush, Derek; Goniewicz, Maciej L

    2015-06-01

    Nicotine deposited on the surfaces has been shown to react with airborne chemicals leading to formation of carcinogens and contributing to thirdhand exposure. While prior studies revealed nicotine residues in tobacco smokers' homes, none have examined the nicotine residue in electronic cigarette (e-cigarette) users' homes. We measured nicotine on the surfaces in households of 8 e-cigarette users, 6 cigarette smokers, and 8 non-users of nicotine-containing products in Western New York, USA. Three surface wipe samples were taken from the floor, wall and window. Nicotine was extracted from the wipes and analyzed using gas chromatography. Half of the e-cigarette users' homes had detectable levels of nicotine on surfaces whereas nicotine was found in all of the tobacco cigarette smokers' homes. Trace amounts of nicotine were also detected in half of the homes of non-users of nicotine-containing products. Nicotine levels in e-cigarette users homes was significantly lower than that found in cigarette smokers homes (average concentration 7.7±17.2 vs. 1303±2676 μg/m2; pe-cigarette users and non-users (p>0.05). Nicotine is a common contaminant found on indoor surfaces. Using e-cigarettes indoors leads to significantly less thirdhand exposure to nicotine compared to smoking tobacco cigarettes. Copyright © 2015 Elsevier B.V. All rights reserved.

  13. Development of a free-electron laser user facility for the extreme ultraviolet

    International Nuclear Information System (INIS)

    Newnam, B.E.

    1987-01-01

    A free-electron laser user facility for scientific experimentation in the extreme ultraviolet is being developed at Los Alamos. A series of laser oscillators and amplifiers, driven by a single, rf linear accelerator, will generate broadly tunable, picosecond-pulse, coherent radiation from 1 nm to 400 nm. The design and output parameters of this facility are described, comparison with synchrotron radiation sources is made, and recent progress in developing the three primary components (electron beam, undulator, and resonator mirrors) is reviewed, and various categories of scientific applications are indicated

  14. An Enhanced Data Integrity Model In Mobile Cloud Environment Using Digital Signature Algorithm And Robust Reversible Watermarking

    Directory of Open Access Journals (Sweden)

    Boukari Souley

    2017-10-01

    Full Text Available the increase use of hand held devices such as smart phones to access multimedia content in the cloud is increasing with rise and growth in information technology. Mobile cloud computing is increasingly used today because it allows users to have access to variety of resources in the cloud such as image video audio and software applications with minimal usage of their inbuilt resources such as storage memory by using the one available in the cloud. The major challenge faced with mobile cloud computing is security. Watermarking and digital signature are some techniques used to provide security and authentication on user data in the cloud. Watermarking is a technique used to embed digital data within a multimedia content such as image video or audio in order to prevent authorized access to those content by intruders whereas digital signature is used to identify and verify user data when accessed. In this work we implemented digital signature and robust reversible image watermarking in order enhance mobile cloud computing security and integrity of data by providing double authentication techniques. The results obtained show the effectiveness of combining the two techniques robust reversible watermarking and digital signature by providing strong authentication to ensures data integrity and extract the original content watermarked without changes.

  15. Web-based DAQ systems: connecting the user and electronics front-ends

    International Nuclear Information System (INIS)

    Lenzi, Thomas

    2016-01-01

    Web technologies are quickly evolving and are gaining in computational power and flexibility, allowing for a paradigm shift in the field of Data Acquisition (DAQ) systems design. Modern web browsers offer the possibility to create intricate user interfaces and are able to process and render complex data. Furthermore, new web standards such as WebSockets allow for fast real-time communication between the server and the user with minimal overhead. Those improvements make it possible to move the control and monitoring operations from the back-end servers directly to the user and to the front-end electronics, thus reducing the complexity of the data acquisition chain. Moreover, web-based DAQ systems offer greater flexibility, accessibility, and maintainability on the user side than traditional applications which often lack portability and ease of use. As proof of concept, we implemented a simplified DAQ system on a mid-range Spartan6 Field Programmable Gate Array (FPGA) development board coupled to a digital front-end readout chip. The system is connected to the Internet and can be accessed from any web browser. It is composed of custom code to control the front-end readout and of a dual soft-core Microblaze processor to communicate with the client.

  16. Web-based DAQ systems: connecting the user and electronics front-ends

    Science.gov (United States)

    Lenzi, Thomas

    2016-12-01

    Web technologies are quickly evolving and are gaining in computational power and flexibility, allowing for a paradigm shift in the field of Data Acquisition (DAQ) systems design. Modern web browsers offer the possibility to create intricate user interfaces and are able to process and render complex data. Furthermore, new web standards such as WebSockets allow for fast real-time communication between the server and the user with minimal overhead. Those improvements make it possible to move the control and monitoring operations from the back-end servers directly to the user and to the front-end electronics, thus reducing the complexity of the data acquisition chain. Moreover, web-based DAQ systems offer greater flexibility, accessibility, and maintainability on the user side than traditional applications which often lack portability and ease of use. As proof of concept, we implemented a simplified DAQ system on a mid-range Spartan6 Field Programmable Gate Array (FPGA) development board coupled to a digital front-end readout chip. The system is connected to the Internet and can be accessed from any web browser. It is composed of custom code to control the front-end readout and of a dual soft-core Microblaze processor to communicate with the client.

  17. Lack of Substantial Post-Cessation Weight Increase in Electronic Cigarettes Users

    Directory of Open Access Journals (Sweden)

    Cristina Russo

    2018-03-01

    Full Text Available Minimization of post-cessation weight gain in quitters is important, but existing approaches (e.g., antismoking medications shows only limited success. We investigated changes in body weight in smokers who quit or reduced substantially their cigarette consumption by switching to electronic cigarettes (ECs use. Body weight and smoking/vaping history were extracted from medical records of smokers and ex-smokers to match three study groups: (1 regular EC users on at least two consecutive follow-up visits; (2 regular smokers (and not using ECs; (3 subjects who reported sustained smoking abstinence after completing a cessation program. Review of their medical records was conducted at two follow-up visits at 6- (F/U 6m and 12-months (F/U 12m. A total of 86 EC users, 93 regular smokers, and 44 quitters were studied. In the EC users study group, cigarettes/day use decreased from 21.1 at baseline to 1.8 at F/U 12m (p < 0.0001. Dual usage was reported by approximately 50% of EC users. Both within factor (time, p < 0.0001 and between factor (study groups, p < 0.0001 produced significant effect on weight (% change from baseline, with a significant 4.8% weight gain from baseline in the quitters study group at F/U 12m. For the EC users, weight gain at F/U 12m was only 1.5% of baseline. There was no evidence of post-cessation weight increase in those who reduced substantially cigarette consumption by switching to ECs (i.e., dual users and only modest post-cessation weight increase was reported in exclusive EC users at F/U 12m. By reducing weight gain and tobacco consumption, EC-based interventions may promote an overall improvement in quality of life.

  18. The Mimas ghost revisited - An analysis of the electron flux and electron microsignatures observed in the vicinity of Mimas at Saturn

    Science.gov (United States)

    Chenette, D. L.; Stone, E. C.

    1983-01-01

    An analysis of the electron-absorption signature observed by the cosmic-ray system on Voyager 2 near the orbit of Mimas is presented. It is found that these observations cannot be explained as the absorption signature of Mimas. By combining Pioneer 11 and Voyager 2 measurements of the electron flux at Mimas's orbit (L = 3.1), an electron spectrum is found in which most of the flux above about 100 keV is concentrated near 1 to 3 MeV. This spectral form is qualitatively consistent with the bandpass filter model of Van Allen et al. (1980). The expected Mimas absorption signature is calculated from this spectrum neglecting radial diffusion. Since no Mimas absorption signature was observed in the inbound Voyager 2 data, a lower limit on the diffusion coefficient for MeV electrons at L = 3.1 of D greater than 10 to the -8th sq Saturn radii/sec is obtained. With a diffusion coefficient this large, both the Voyager 2 and the Pioneer 11 small-scale electron-absorption-signature observations in Mimas's orbit are enigmatic. Thus the mechanism for producing these signatures is referred to as the Mimas ghost. A cloud of material in orbit with Mimas may account for the observed electron signature if the cloud is at least 1-percent opaque to electrons across a region extending over a few hundred kilometers.

  19. A Third-Party E-Payment Protocol Based on Quantum Group Blind Signature

    Science.gov (United States)

    Zhang, Jian-Zhong; Yang, Yuan-Yuan; Xie, Shu-Cui

    2017-09-01

    A third-party E-payment protocol based on quantum group blind signature is proposed in this paper. Our E-payment protocol could protect user's anonymity as the traditional E-payment systems do, and also have unconditional security which the classical E-payment systems can not provide. To achieve that, quantum key distribution, one-time pad and quantum group blind signature are adopted in our scheme. Furthermore, if there were a dispute, the manager Trent can identify who tells a lie.

  20. PREVENTIVE SIGNATURE MODEL FOR SECURE CLOUD DEPLOYMENT THROUGH FUZZY DATA ARRAY COMPUTATION

    Directory of Open Access Journals (Sweden)

    R. Poorvadevi

    2017-01-01

    Full Text Available Cloud computing is a resource pool which offers boundless services by the form of resources to its end users whoever heavily depends on cloud service providers. Cloud is providing the service access across the geographic locations in an efficient way. However it is offering numerous services, client end system is not having adequate methods, security policies and other protocols for using the cloud customer secret level transactions and other privacy related information. So, this proposed model brings the solution for securing the cloud user confidential data, Application deployment and also identifying the genuineness of the user by applying the scheme which is referred as fuzzy data array computation. Fuzzy data array computation provides an effective system is called signature retrieval and evaluation system through which customer’s data can be safeguarded along with their application. This signature system can be implemented on the cloud environment using the cloud sim 3.0 simulator tools. It facilitates the security operation over the data centre and cloud vendor locations in an effective manner.

  1. User Manuals for a Primary Care Electronic Medical Record System: A Mixed Methods Study of User- and Vendor-Generated Documents.

    Science.gov (United States)

    Shachak, Aviv; Dow, Rustam; Barnsley, Jan; Tu, Karen; Domb, Sharon; Jadad, Alejandro R; Lemieux-Charles, Louise

    2013-06-04

    Tutorials and user manuals are important forms of impersonal support for using software applications including electronic medical records (EMRs). Differences between user- and vendor documentation may indicate support needs, which are not sufficiently addressed by the official documentation, and reveal new elements that may inform the design of tutorials and user manuals. What are the differences between user-generated tutorials and manuals for an EMR and the official user manual from the software vendor? Effective design of tutorials and user manuals requires careful packaging of information, balance between declarative and procedural texts, an action and task-oriented approach, support for error recognition and recovery, and effective use of visual elements. No previous research compared these elements between formal and informal documents. We conducted an mixed methods study. Seven tutorials and two manuals for an EMR were collected from three family health teams and compared with the official user manual from the software vendor. Documents were qualitatively analyzed using a framework analysis approach in relation to the principles of technical documentation described above. Subsets of the data were quantitatively analyzed using cross-tabulation to compare the types of error information and visual cues in screen captures between user- and vendor-generated manuals. The user-developed tutorials and manuals differed from the vendor-developed manual in that they contained mostly procedural and not declarative information; were customized to the specific workflow, user roles, and patient characteristics; contained more error information related to work processes than to software usage; and used explicit visual cues on screen captures to help users identify window elements. These findings imply that to support EMR implementation, tutorials and manuals need to be customized and adapted to specific organizational contexts and workflows. The main limitation of the study

  2. User Manuals for a Primary Care Electronic Medical Record System: A Mixed Methods Study of User- and Vendor-Generated Documents

    Science.gov (United States)

    Dow, Rustam; Barnsley, Jan; Tu, Karen; Domb, Sharon; Jadad, Alejandro R.; Lemieux-Charles, Louise

    2015-01-01

    Research problem Tutorials and user manuals are important forms of impersonal support for using software applications including electronic medical records (EMRs). Differences between user- and vendor documentation may indicate support needs, which are not sufficiently addressed by the official documentation, and reveal new elements that may inform the design of tutorials and user manuals. Research question What are the differences between user-generated tutorials and manuals for an EMR and the official user manual from the software vendor? Literature review Effective design of tutorials and user manuals requires careful packaging of information, balance between declarative and procedural texts, an action and task-oriented approach, support for error recognition and recovery, and effective use of visual elements. No previous research compared these elements between formal and informal documents. Methodology We conducted an mixed methods study. Seven tutorials and two manuals for an EMR were collected from three family health teams and compared with the official user manual from the software vendor. Documents were qualitatively analyzed using a framework analysis approach in relation to the principles of technical documentation described above. Subsets of the data were quantitatively analyzed using cross-tabulation to compare the types of error information and visual cues in screen captures between user- and vendor-generated manuals. Results and discussion The user-developed tutorials and manuals differed from the vendor-developed manual in that they contained mostly procedural and not declarative information; were customized to the specific workflow, user roles, and patient characteristics; contained more error information related to work processes than to software usage; and used explicit visual cues on screen captures to help users identify window elements. These findings imply that to support EMR implementation, tutorials and manuals need to be customized and

  3. A case study on better iconographic design in electronic medical records' user interface.

    Science.gov (United States)

    Tasa, Umut Burcu; Ozcan, Oguzhan; Yantac, Asim Evren; Unluer, Ayca

    2008-06-01

    It is a known fact that there is a conflict between what users expect and what user interface designers create in the field of medical informatics along with other fields of interface design. The objective of the study is to suggest, from the 'design art' perspective, a method for improving the usability of an electronic medical record (EMR) interface. The suggestion is based on the hypothesis that the user interface of an EMR should be iconographic. The proposed three-step method consists of a questionnaire survey on how hospital users perceive concepts/terms that are going to be used in the EMR user interface. Then icons associated with the terms are designed by a designer, following a guideline which is prepared according to the results of the first questionnaire. Finally the icons are asked back to the target group for proof. A case study was conducted with 64 medical staff and 30 professional designers for the first questionnaire, and with 30 medical staff for the second. In the second questionnaire 7.53 icons out of 10 were matched correctly with a standard deviation of 0.98. Also, all icons except three were matched correctly in at least 83.3% of the forms. The proposed new method differs from the majority of previous studies which are based on user requirements by leaning on user experiments instead. The study demonstrated that the user interface of EMRs should be designed according to a guideline that results from a survey on users' experiences on metaphoric perception of the terms.

  4. A Multi-User Model for Effectively Communicating Research Through Electronic Media

    Science.gov (United States)

    Hinds, J. J.; Fairley, J. P.

    2003-12-01

    Electronic media have demonstrated potential for data exchange, dissemination of results to other scientists, communication with community interest groups, and education of the general public regarding scientific advances. Few researchers, however, receive training in the skills required to capture the attention of the broad spectrum of Internet users. Because different people assimilate information in different ways, effective communication is best accomplished using an appropriate mix of photographs, graphics, tables, and text. In addition, effective web page design requires a clear, consistent organizational structure, easily-navigated layout, and attention to details such as page printability, downloading time, and minimal page scrolling. One of the strengths of electronic media is that the user can chose an appropriate level of involvement for his or her interest. In designing a web page for the multidisciplinary NSF/EPSCoR "Biocomplexity in Extreme Environments" project, we divided potential users into three categories based on our perception of the level of detail they required: 1) project participants, 2) non-participants with technical backgrounds, and 3) the general public. By understanding the needs and expectations of potential viewers, it was possible to present each group with an appropriate balance of visual and textural elements. For example, project participants are often most interested in raw data, which can be effectively presented in tabular format. Non-participants with technical backgrounds are more interested in analyzed data, while a project overview, presented through photographs and graphics with minimal text, will be most effective for communicating with the general public. The completed web page illustrates one solution for effectively communicating with a diverse audience, and provides examples for meeting many of the challenges of web page design.

  5. A Quantum Proxy Weak Blind Signature Scheme Based on Controlled Quantum Teleportation

    Science.gov (United States)

    Cao, Hai-Jing; Yu, Yao-Feng; Song, Qin; Gao, Lan-Xiang

    2015-04-01

    Proxy blind signature is applied to the electronic paying system, electronic voting system, mobile agent system, security of internet, etc. A quantum proxy weak blind signature scheme is proposed in this paper. It is based on controlled quantum teleportation. Five-qubit entangled state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, so it could guarantee not only the unconditional security of the scheme but also the anonymity of the messages owner.

  6. Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems

    DEFF Research Database (Denmark)

    Fathi, Hanane; Shin, SeongHan; Kobara, Kazukuni

    2010-01-01

    To avoid the risk of long-term storage of secrets on a portable device, an online credential system supports the roaming user in retrieving securely at various locations his private key and other material to generate anonymous signatures. The protocol proposed here allows a roaming mobile user...... to access anonymously services such as whistle blowing and net-counselling. Our approach: (1) allows a mobile user, remembering a short password, to anonymously and securely retrieve the credentials necessary for his anonymous communication without assuming a pre-established anonymous channel...

  7. Simulating signatures of two-dimensional electronic spectra of the Fenna-Matthews-Olson complex: By using a numerical path integral

    International Nuclear Information System (INIS)

    Liang, Xian-Ting

    2014-01-01

    A framework for simulating electronic spectra from photon-echo experiments is constructed by using a numerical path integral technique. This method is non-Markovian and nonperturbative and, more importantly, is not limited by a fixed form of the spectral density functions of the environment. Next, a two-dimensional (2D) third-order electronic spectrum of a dimer system is simulated. The spectrum is in agreement with the experimental and theoretical results previously reported [for example, M. Khalil, N. Demirdöven, and A. Tokmakoff, Phys. Rev. Lett. 90, 047401 (2003)]. Finally, a 2D third-order electronic spectrum of the Fenna-Matthews-Olson (FMO) complex is simulated by using the Debye, Ohmic, and Adolphs and Renger spectral density functions. It is shown that this method can clearly produce the spectral signatures of the FMO complex by using only the Adolphs and Renger spectral density function. Plots of the evolution of the diagonal and cross-peaks show that they are oscillating with the population time

  8. Design of Electronic Medical Record User Interfaces: A Matrix-Based Method for Improving Usability

    Directory of Open Access Journals (Sweden)

    Kushtrim Kuqi

    2013-01-01

    Full Text Available This study examines a new approach of using the Design Structure Matrix (DSM modeling technique to improve the design of Electronic Medical Record (EMR user interfaces. The usability of an EMR medication dosage calculator used for placing orders in an academic hospital setting was investigated. The proposed method captures and analyzes the interactions between user interface elements of the EMR system and groups elements based on information exchange, spatial adjacency, and similarity to improve screen density and time-on-task. Medication dose adjustment task time was recorded for the existing and new designs using a cognitive simulation model that predicts user performance. We estimate that the design improvement could reduce time-on-task by saving an average of 21 hours of hospital physicians’ time over the course of a month. The study suggests that the application of DSM can improve the usability of an EMR user interface.

  9. ADAGE signature analysis: differential expression analysis with data-defined gene sets.

    Science.gov (United States)

    Tan, Jie; Huyck, Matthew; Hu, Dongbo; Zelaya, René A; Hogan, Deborah A; Greene, Casey S

    2017-11-22

    Gene set enrichment analysis and overrepresentation analyses are commonly used methods to determine the biological processes affected by a differential expression experiment. This approach requires biologically relevant gene sets, which are currently curated manually, limiting their availability and accuracy in many organisms without extensively curated resources. New feature learning approaches can now be paired with existing data collections to directly extract functional gene sets from big data. Here we introduce a method to identify perturbed processes. In contrast with methods that use curated gene sets, this approach uses signatures extracted from public expression data. We first extract expression signatures from public data using ADAGE, a neural network-based feature extraction approach. We next identify signatures that are differentially active under a given treatment. Our results demonstrate that these signatures represent biological processes that are perturbed by the experiment. Because these signatures are directly learned from data without supervision, they can identify uncurated or novel biological processes. We implemented ADAGE signature analysis for the bacterial pathogen Pseudomonas aeruginosa. For the convenience of different user groups, we implemented both an R package (ADAGEpath) and a web server ( http://adage.greenelab.com ) to run these analyses. Both are open-source to allow easy expansion to other organisms or signature generation methods. We applied ADAGE signature analysis to an example dataset in which wild-type and ∆anr mutant cells were grown as biofilms on the Cystic Fibrosis genotype bronchial epithelial cells. We mapped active signatures in the dataset to KEGG pathways and compared with pathways identified using GSEA. The two approaches generally return consistent results; however, ADAGE signature analysis also identified a signature that revealed the molecularly supported link between the MexT regulon and Anr. We designed

  10. Search for Excited or Exotic Electron Production Using the Dielectron + Photon Signature at CDF in Run II

    Energy Technology Data Exchange (ETDEWEB)

    Gerberich, Heather Kay [Duke Univ., Durham, NC (United States)

    2004-01-01

    The author presents a search for excited or exotic electrons decaying to an electron and a photon with high transverse momentum. An oppositely charged electron is produced in association with the excited electron, yielding a final state dielectron + photon signature. The discovery of excited electrons would be a first indication of lepton compositeness. They use ~ 202 pb-1 of data collected in p$\\bar{p}$ collisions at √s = 1.96 TeV with the Collider Detector at Fermilab during March 2001 through September 2003. The data are consistent with standard model expectations. Upper limits are set on the experimental cross-section σ($\\bar{p}$p → ee* → eeγ) at the 95% confidence level in a contact-interaction model and a gauge-mediated interaction model. Limits are also presented as exclusion regions in the parameter space of the excited electron mass (Me*) and the compositeness energy scale (Λ). In the contact-interaction model, for which there are no previously published limits, they find Me* < 906 GeV is excluded for Me* = Λ. In the gauge-mediated model, the exclusion region in the Me* versus the phenomenological coupling f/Λ parameter space is extended to M{sub e*} < 430 GeV for f/Λ ~ 10-2 GeV-1. In comparison, other experiments have excluded Me* < 280 GeV for f/Λ ~ 10-2 GeV-1.

  11. 3-D topological signatures and a new discrimination method for single-electron events and 0νββ events in CdZnTe: A Monte Carlo simulation study

    Energy Technology Data Exchange (ETDEWEB)

    Zeng, Ming; Li, Teng-Lin; Cang, Ji-Rong [Key Laboratory of Particle & Radiation Imaging (Tsinghua University), Ministry of Education (China); Department of Engineering Physics, Tsinghua University, Beijing 100084 (China); Zeng, Zhi, E-mail: zengzhi@tsinghua.edu.cn [Key Laboratory of Particle & Radiation Imaging (Tsinghua University), Ministry of Education (China); Department of Engineering Physics, Tsinghua University, Beijing 100084 (China); Fu, Jian-Qiang; Zeng, Wei-He; Cheng, Jian-Ping; Ma, Hao; Liu, Yi-Nong [Key Laboratory of Particle & Radiation Imaging (Tsinghua University), Ministry of Education (China); Department of Engineering Physics, Tsinghua University, Beijing 100084 (China)

    2017-06-21

    In neutrinoless double beta (0νββ) decay experiments, the diversity of topological signatures of different particles provides an important tool to distinguish double beta events from background events and reduce background rates. Aiming at suppressing the single-electron backgrounds which are most challenging, several groups have established Monte Carlo simulation packages to study the topological characteristics of single-electron events and 0νββ events and develop methods to differentiate them. In this paper, applying the knowledge of graph theory, a new topological signature called REF track (Refined Energy-Filtered track) is proposed and proven to be an accurate approximation of the real particle trajectory. Based on the analysis of the energy depositions along the REF track of single-electron events and 0νββ events, the REF energy deposition models for both events are proposed to indicate the significant differences between them. With these differences, this paper presents a new discrimination method, which, in the Monte Carlo simulation, achieved a single-electron rejection factor of 93.8±0.3 (stat.)% as well as a 0νββ efficiency of 85.6±0.4 (stat.)% with optimized parameters in CdZnTe.

  12. Diffusion of Messages from an Electronic Cigarette Brand to Potential Users through Twitter.

    Directory of Open Access Journals (Sweden)

    Kar-Hai Chu

    Full Text Available This study explores the presence and actions of an electronic cigarette (e-cigarette brand, Blu, on Twitter to observe how marketing messages are sent and diffused through the retweet (i.e., message forwarding functionality. Retweet networks enable messages to reach additional Twitter users beyond the sender's local network. We follow messages from their origin through multiple retweets to identify which messages have more reach, and the different users who are exposed.We collected three months of publicly available data from Twitter. A combination of techniques in social network analysis and content analysis were applied to determine the various networks of users who are exposed to e-cigarette messages and how the retweet network can affect which messages spread.The Blu retweet network expanded during the study period. Analysis of user profiles combined with network cluster analysis showed that messages of certain topics were only circulated within a community of e-cigarette supporters, while other topics spread further, reaching more general Twitter users who may not support or use e-cigarettes.Retweet networks can serve as proxy filters for marketing messages, as Twitter users decide which messages they will continue to diffuse among their followers. As certain e-cigarette messages extend beyond their point of origin, the audience being exposed expands beyond the e-cigarette community. Potential implications for health education campaigns include utilizing Twitter and targeting important gatekeepers or hubs that would maximize message diffusion.

  13. Characterizing use patterns and perceptions of relative harm in dual users of electronic and tobacco cigarettes

    OpenAIRE

    Rass, Olga; Pacek, Lauren R.; Johnson, Patrick S.; Johnson, Matthew W.

    2015-01-01

    Awareness and use of electronic cigarettes (e-cigarettes) is increasing. Questions regarding positive (e.g., smoking reduction/cessation) and negative (e.g., delay of cessation) potential public health consequences of e-cigarettes may be informed by studying dual users of e-cigarettes and tobacco cigarettes. A cross-sectional online survey assessed demographics, product use patterns, and beliefs about relative product benefits and harms among dual users (n = 350) in the United States using th...

  14. Acute electronic cigarette use: nicotine delivery and subjective effects in regular users.

    Science.gov (United States)

    Dawkins, Lynne; Corcoran, Olivia

    2014-01-01

    Electronic cigarettes are becoming increasingly popular among smokers worldwide. Commonly reported reasons for use include the following: to quit smoking, to avoid relapse, to reduce urge to smoke, or as a perceived lower-risk alternative to smoking. Few studies, however, have explored whether electronic cigarettes (e-cigarettes) deliver measurable levels of nicotine to the blood. This study aims to explore in experienced users the effect of using an 18-mg/ml nicotine first-generation e-cigarette on blood nicotine, tobacco withdrawal symptoms, and urge to smoke. Fourteen regular e-cigarette users (three females), who are abstinent from smoking and e-cigarette use for 12 h, each completed a 2.5 h testing session. Blood was sampled, and questionnaires were completed (tobacco-related withdrawal symptoms, urge to smoke, positive and negative subjective effects) at four stages: baseline, 10 puffs, 60 min of ad lib use and a 60-min rest period. Complete sets of blood were obtained from seven participants. Plasma nicotine concentration rose significantly from a mean of 0.74 ng/ml at baseline to 6.77 ng/ml 10 min after 10 puffs, reaching a mean maximum of 13.91 ng/ml by the end of the ad lib puffing period. Tobacco-related withdrawal symptoms and urge to smoke were significantly reduced; direct positive effects were strongly endorsed, and there was very low reporting of adverse effects. These findings demonstrate reliable blood nicotine delivery after the acute use of this brand/model of e-cigarette in a sample of regular users. Future studies might usefully quantify nicotine delivery in relation to inhalation technique and the relationship with successful smoking cessation/harm reduction.

  15. TOXsIgN: a cross-species repository for toxicogenomic signatures.

    Science.gov (United States)

    Darde, Thomas A; Gaudriault, Pierre; Beranger, Rémi; Lancien, Clément; Caillarec-Joly, Annaëlle; Sallou, Olivier; Bonvallot, Nathalie; Chevrier, Cécile; Mazaud-Guittot, Séverine; Jégou, Bernard; Collin, Olivier; Becker, Emmanuelle; Rolland, Antoine D; Chalmel, Frédéric

    2018-01-27

    At the same time that toxicologists express increasing concern about reproducibility in this field, the development of dedicated databases has already smoothed the path toward improving the storage and exchange of raw toxicogenomic data. Nevertheless, none provides access to analyzed and interpreted data as originally reported in scientific publications. Given the increasing demand for access to this information, we developed TOXsIgN, a repository for TOXicogenomic sIgNatures. The TOXsIgN repository provides a flexible environment that facilitates online submission, storage, and retrieval of toxicogenomic signatures by the scientific community. It currently hosts 754 projects that describe more than 450 distinct chemicals and their 8491 associated signatures. It also provides users with a working environment containing a powerful search engine as well as bioinformatics/biostatistics modules that enable signature comparisons or enrichment analyses. The TOXsIgN repository is freely accessible at http://toxsign.genouest.org. Website implemented in Python, JavaScript, and MongoDB, with all major browsers supported. frederic.chalmel@inserm.fr. Supplementary data are available at Bioinformatics online. © The Author (2018). Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  16. On Hunting Animals of the Biometric Menagerie for Online Signature.

    Directory of Open Access Journals (Sweden)

    Nesma Houmani

    Full Text Available Individuals behave differently regarding to biometric authentication systems. This fact was formalized in the literature by the concept of Biometric Menagerie, defining and labeling user groups with animal names in order to reflect their characteristics with respect to biometric systems. This concept was illustrated for face, fingerprint, iris, and speech modalities. The present study extends the Biometric Menagerie to online signatures, by proposing a novel methodology that ties specific quality measures for signatures to categories of the Biometric Menagerie. Such measures are combined for retrieving automatically writer categories of the extended version of the Biometric Menagerie. Performance analysis with different types of classifiers shows the pertinence of our approach on the well-known MCYT-100 database.

  17. On Hunting Animals of the Biometric Menagerie for Online Signature.

    Science.gov (United States)

    Houmani, Nesma; Garcia-Salicetti, Sonia

    2016-01-01

    Individuals behave differently regarding to biometric authentication systems. This fact was formalized in the literature by the concept of Biometric Menagerie, defining and labeling user groups with animal names in order to reflect their characteristics with respect to biometric systems. This concept was illustrated for face, fingerprint, iris, and speech modalities. The present study extends the Biometric Menagerie to online signatures, by proposing a novel methodology that ties specific quality measures for signatures to categories of the Biometric Menagerie. Such measures are combined for retrieving automatically writer categories of the extended version of the Biometric Menagerie. Performance analysis with different types of classifiers shows the pertinence of our approach on the well-known MCYT-100 database.

  18. Radiation signatures from a locally energized flaring loop

    Science.gov (United States)

    Emslie, A. G.; Vlahos, L.

    1980-01-01

    The radiation signatures from a locally energized solar flare loop based on the physical properties of the energy release mechanisms were consistent with hard X-ray, microwave, and EUV observations for plausible source parameters. It was found that a suprathermal tail of high energy electrons is produced by the primary energy release, and that the number of energetic charged particles ejected into the interplanetary medium in the model is consistent with observations. The radiation signature model predicts that the intrinsic polarization of the hard X-ray burst should increase over the photon energy range of 20 to 100 keV.

  19. Secure Mobile Agent from Leakage-Resilient Proxy Signatures

    Directory of Open Access Journals (Sweden)

    Fei Tang

    2015-01-01

    Full Text Available A mobile agent can sign a message in a remote server on behalf of a customer without exposing its secret key; it can be used not only to search for special products or services, but also to make a contract with a remote server. Hence a mobile agent system can be used for electronic commerce as an important key technology. In order to realize such a system, Lee et al. showed that a secure mobile agent can be constructed using proxy signatures. Intuitively, a proxy signature permits an entity (delegator to delegate its signing right to another entity (proxy to sign some specified messages on behalf of the delegator. However, the proxy signatures are often used in scenarios where the signing is done in an insecure environment, for example, the remote server of a mobile agent system. In such setting, an adversary could launch side-channel attacks to exploit some leakage information about the proxy key or even other secret states. The proxy signatures which are secure in the traditional security models obviously cannot provide such security. Based on this consideration, in this paper, we design a leakage-resilient proxy signature scheme for the secure mobile agent systems.

  20. Controlling user access to electronic resources without password

    Science.gov (United States)

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  1. 76 FR 9024 - Agency Information Collection Activities; Proposed Collection; Comment Request; Electronic...

    Science.gov (United States)

    2011-02-16

    ...] Agency Information Collection Activities; Proposed Collection; Comment Request; Electronic Records; Electronic Signatures AGENCY: Food and Drug Administration, HHS. ACTION: Notice. SUMMARY: The Food and Drug... relating to FDA's electronic records and electronic signatures. DATES: Submit either electronic or written...

  2. Electronic Voucher Approval - Financial Management

    Data.gov (United States)

    US Agency for International Development — This process provides a workflow and eSignature capability which allows the CFO to router vouchers for review and electronic signature approval to COTRs in AIDW. It...

  3. Signature Balancing

    NARCIS (Netherlands)

    Noordkamp, H.W.; Brink, M. van den

    2006-01-01

    Signatures are an important part of the design of a ship. In an ideal situation, signatures must be as low as possible. However, due to budget constraints it is most unlikely to reach this ideal situation. The arising question is which levels of signatures are optimal given the different scenarios

  4. 27 CFR 73.32 - May I electronically sign forms I submit electronically to TTB?

    Science.gov (United States)

    2010-04-01

    ... AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY (CONTINUED) PROCEDURES AND PRACTICES ELECTRONIC SIGNATURES; ELECTRONIC SUBMISSION OF FORMS Electronic Filing of Documents with TTB § 73.32 May I electronically sign forms I submit electronically to TTB? You may electronically sign the electronic form you...

  5. Comparison of user groups' perspectives of barriers and facilitators to implementing electronic health records: a systematic review

    Directory of Open Access Journals (Sweden)

    Leduc Yvan

    2011-04-01

    Full Text Available Abstract Background Electronic health record (EHR implementation is currently underway in Canada, as in many other countries. These ambitious projects involve many stakeholders with unique perceptions of the implementation process. EHR users have an important role to play as they must integrate the EHR system into their work environments and use it in their everyday activities. Users hold valuable, first-hand knowledge of what can limit or contribute to the success of EHR implementation projects. A comprehensive synthesis of EHR users' perceptions is key to successful future implementation. This systematic literature review was aimed to synthesize current knowledge of the barriers and facilitators influencing shared EHR implementation among its various users. Methods Covering a period from 1999 to 2009, a literature search was conducted on nine electronic databases. Studies were included if they reported on users' perceived barriers and facilitators to shared EHR implementation, in healthcare settings comparable to Canada. Studies in all languages with an empirical study design were included. Quality and relevance of the studies were assessed. Four EHR user groups were targeted: physicians, other health care professionals, managers, and patients/public. Content analysis was performed independently by two authors using a validated extraction grid with pre-established categorization of barriers and facilitators for each group of EHR users. Results Of a total of 5,695 potentially relevant publications identified, 117 full text publications were obtained after screening titles and abstracts. After review of the full articles, 60 publications, corresponding to 52 studies, met the inclusion criteria. The most frequent adoption factors common to all user groups were design and technical concerns, ease of use, interoperability, privacy and security, costs, productivity, familiarity and ability with EHR, motivation to use EHR, patient and health

  6. Understanding Providers' Interaction with Graphical User Interface Pertaining to Clinical Document Usage in an Electronic Health Record System

    Science.gov (United States)

    Rizvi, Rubina Fatima

    2017-01-01

    Despite high Electronic Health Record (EHR) system adoption rates by hospital and office-based practices, many users remain highly dissatisfied with the current state of EHRs. Sub-optimal EHR usability as a result of insufficient incorporation of User-Centered Design (UCD) approach during System Development Life Cycle process (SDLC) is considered…

  7. Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and Discretization

    Directory of Open Access Journals (Sweden)

    Wai Kuan Yip

    2007-01-01

    Full Text Available We introduce a novel method for secure computation of biometric hash on dynamic hand signatures using BioPhasor mixing and discretization. The use of BioPhasor as the mixing process provides a one-way transformation that precludes exact recovery of the biometric vector from compromised hashes and stolen tokens. In addition, our user-specific discretization acts both as an error correction step as well as a real-to-binary space converter. We also propose a new method of extracting compressed representation of dynamic hand signatures using discrete wavelet transform (DWT and discrete fourier transform (DFT. Without the conventional use of dynamic time warping, the proposed method avoids storage of user's hand signature template. This is an important consideration for protecting the privacy of the biometric owner. Our results show that the proposed method could produce stable and distinguishable bit strings with equal error rates (EERs of and for random and skilled forgeries for stolen token (worst case scenario, and for both forgeries in the genuine token (optimal scenario.

  8. Assessing electronic cigarette effects and regulatory impact: Challenges with user self-reported device power.

    Science.gov (United States)

    Rudy, Alyssa K; Leventhal, Adam M; Goldenson, Nicholas I; Eissenberg, Thomas

    2017-10-01

    Electronic cigarettes (ECIGs) aerosolize liquids for user inhalation that usually contain nicotine. ECIG nicotine emission is determined, in part, by user behavior, liquid nicotine concentration, and electrical power. Whether users are able to report accurately nicotine concentration and device electrical power has not been evaluated. This study's purpose was to examine if ECIG users could provide data relevant to understanding ECIG nicotine emission, particularly liquid nicotine concentration (mg/ml) as well as battery voltage (V) and heater resistance (ohms, Ω) - needed to calculate power (watts, W). Adult ECIG users (N=165) were recruited from Los Angeles, CA for research studies examining the effects of ECIG use. We asked all participants who visited the laboratory to report liquid nicotine concentration, V, and Ω. Liquid nicotine concentration was reported by 89.7% (mean=9.5mg/ml, SD=7.3), and responses were consistent with the distribution of liquids available in commonly marketed products. The majority could not report voltage (51.5%) or resistance (63.6%). Of the 40 participants (24.8%) who reported voltage and resistance, there was a substantial power range (2.2-32,670W) the upper limit of which exceeds that of the highest ECIG reported by any user to our knowledge (i.e., 2512W). If 2512W is taken as the upper limit, only 30 (18.2%) reported valid results (mean 237.3W, SD=370.6; range=2.2-1705.3W). Laboratory, survey, and other researchers interested in understanding ECIG effects to inform users and policymakers may need to use methods other than user self-report to obtain information regarding device power. Copyright © 2017 Elsevier B.V. All rights reserved.

  9. Hormonal contraception among electronic cigarette users and cardiovascular risk: a systematic review.

    Science.gov (United States)

    Riley, Halley E M; Berry-Bibee, Erin; England, Lucinda J; Jamieson, Denise J; Marchbanks, Polly A; Curtis, Kathryn M

    2016-03-01

    Women who use combined hormonal contraceptives and cigarettes have an increased risk for cardiovascular (CV) events. We reviewed the literature to determine whether women who use hormonal contraceptives (HC) and electronic cigarettes (e-cigarettes) also have an increased risk. Systematic review. We searched for articles reporting myocardial infarction (MI), stroke, venous thromboembolism, peripheral arterial disease or changes to CV markers in women using e-cigarettes and HC. We also searched for indirect evidence, such as CV outcomes among e-cigarette users in the general population and among HC users exposed to nicotine, propylene glycol or glycerol. No articles reported on outcomes among e-cigarette users using HC. Among the general population, 13 articles reported on heart rate or blood pressure after e-cigarette use. These markers generally remained normal, even when significant changes were observed. In three studies, changes were less pronounced after e-cigarette use than cigarette use. One MI was reported among 1012 people exposed to e-cigarettes in these studies. One article on nicotine and HC exposure found both exposures to be significantly associated with acute changes to heart rate, though mean heart rate remained normal. No articles on propylene glycol or glycerol and HC exposure were identified. We identified no evidence on CV outcomes among e-cigarette users using HC. Limited data reporting mostly acute outcomes suggested that CV events are rare among e-cigarette users in the general population and that e-cigarettes may affect heart rate and blood pressure less than conventional cigarettes. There is a need for research assessing joint HC and e-cigarette exposure on clinical CV outcomes. Copyright © 2016 Elsevier Inc. All rights reserved.

  10. Electronic Health Record-Related Safety Concerns: A Cross-Sectional Survey of Electronic Health Record Users

    Science.gov (United States)

    Pajunen, Tuuli; Saranto, Kaija; Lehtonen, Lasse

    2016-01-01

    Background The rapid expansion in the use of electronic health records (EHR) has increased the number of medical errors originating in health information systems (HIS). The sociotechnical approach helps in understanding risks in the development, implementation, and use of EHR and health information technology (HIT) while accounting for complex interactions of technology within the health care system. Objective This study addresses two important questions: (1) “which of the common EHR error types are associated with perceived high- and extreme-risk severity ratings among EHR users?”, and (2) “which variables are associated with high- and extreme-risk severity ratings?” Methods This study was a quantitative, non-experimental, descriptive study of EHR users. We conducted a cross-sectional web-based questionnaire study at the largest hospital district in Finland. Statistical tests included the reliability of the summative scales tested with Cronbach’s alpha. Logistic regression served to assess the association of the independent variables to each of the eight risk factors examined. Results A total of 2864 eligible respondents provided the final data. Almost half of the respondents reported a high level of risk related to the error type “extended EHR unavailability”. The lowest overall risk level was associated with “selecting incorrectly from a list of items”. In multivariate analyses, profession and clinical unit proved to be the strongest predictors for high perceived risk. Physicians perceived risk levels to be the highest (Prisk levels (PeLearning courses on EHR-use was associated with lower risk for some of the risk factors. Conclusions Based on a large number of Finnish EHR users in hospitals, this study indicates that HIT safety hazards should be taken very seriously, particularly in operating rooms, procedure units, emergency departments, and intensive care units/critical care units. Health care organizations should use proactive and

  11. A simple but highly effective approach to evaluate the prognostic performance of gene expression signatures.

    Directory of Open Access Journals (Sweden)

    Maud H W Starmans

    Full Text Available BACKGROUND: Highly parallel analysis of gene expression has recently been used to identify gene sets or 'signatures' to improve patient diagnosis and risk stratification. Once a signature is generated, traditional statistical testing is used to evaluate its prognostic performance. However, due to the dimensionality of microarrays, this can lead to false interpretation of these signatures. PRINCIPAL FINDINGS: A method was developed to test batches of a user-specified number of randomly chosen signatures in patient microarray datasets. The percentage of random generated signatures yielding prognostic value was assessed using ROC analysis by calculating the area under the curve (AUC in six public available cancer patient microarray datasets. We found that a signature consisting of randomly selected genes has an average 10% chance of reaching significance when assessed in a single dataset, but can range from 1% to ∼40% depending on the dataset in question. Increasing the number of validation datasets markedly reduces this number. CONCLUSIONS: We have shown that the use of an arbitrary cut-off value for evaluation of signature significance is not suitable for this type of research, but should be defined for each dataset separately. Our method can be used to establish and evaluate signature performance of any derived gene signature in a dataset by comparing its performance to thousands of randomly generated signatures. It will be of most interest for cases where few data are available and testing in multiple datasets is limited.

  12. OpenLabNotes--An Electronic Laboratory Notebook Extension for OpenLabFramework.

    Science.gov (United States)

    List, Markus; Franz, Michael; Tan, Qihua; Mollenhauer, Jan; Baumbach, Jan

    2015-10-06

    Electronic laboratory notebooks (ELNs) are more accessible and reliable than their paper based alternatives and thus find widespread adoption. While a large number of commercial products is available, small- to mid-sized laboratories can often not afford the costs or are concerned about the longevity of the providers. Turning towards free alternatives, however, raises questions about data protection, which are not sufficiently addressed by available solutions. To serve as legal documents, ELNs must prevent scientific fraud through technical means such as digital signatures. It would also be advantageous if an ELN was integrated with a laboratory information management system to allow for a comprehensive documentation of experimental work including the location of samples that were used in a particular experiment. Here, we present OpenLabNotes, which adds state-of-the-art ELN capabilities to OpenLabFramework, a powerful and flexible laboratory information management system. In contrast to comparable solutions, it allows to protect the intellectual property of its users by offering data protection with digital signatures. OpenLabNotes effectively closes the gap between research documentation and sample management, thus making Open-LabFramework more attractive for laboratories that seek to increase productivity through electronic data management.

  13. OpenLabNotes - An Electronic Laboratory Notebook Extension for OpenLabFramework.

    Science.gov (United States)

    List, Markus; Franz, Michael; Tan, Qihua; Mollenhauer, Jan; Baumbach, Jan

    2015-09-01

    Electronic laboratory notebooks (ELNs) are more accessible and reliable than their paper based alternatives and thus find widespread adoption. While a large number of commercial products is available, small- to mid-sized laboratories can often not afford the costs or are concerned about the longevity of the providers. Turning towards free alternatives, however, raises questions about data protection, which are not sufficiently addressed by available solutions. To serve as legal documents, ELNs must prevent scientific fraud through technical means such as digital signatures. It would also be advantageous if an ELN was integrated with a laboratory information management system to allow for a comprehensive documentation of experimental work including the location of samples that were used in a particular experiment. Here, we present OpenLabNotes, which adds state-of-the-art ELN capabilities to OpenLabFramework, a powerful and flexible laboratory information management system. In contrast to comparable solutions, it allows to protect the intellectual property of its users by offering data protection with digital signatures. OpenLabNotes effectively closes the gap between research documentation and sample management, thus making Open- LabFramework more attractive for laboratories that seek to increase productivity through electronic data management.

  14. An overview of the user program for the Jefferson Lab free electron laser

    International Nuclear Information System (INIS)

    Dylla, H.F.

    1999-01-01

    Jefferson Lab is commissioning a high-average-power IR FEL during 1998. When driven with its superconducting linac operating in a recirculated mode, the IR Demo FEL is capable of producing kilowatt-level average power in the mid-infrared (2-7 mu m) range. With operational experience and hardware changes involving primarily change-out of the optical cavity mirrors, the FEL is capable of covering a wide range of the infrared (1-16 mu m) at power levels exceeding 100 W. This tuning range combined with a unique pulse structure makes the Jefferson Lab FEL a versatile research and development tool for a wide variety of laser applications. A core group of industrial partners has been involved in planning applications using the FEL since 1991. This initial user group was augmented with university partners in 1993 and with participants from several national laboratories in 1996-1997. With the initiation of construction of the FEL and the associated 600 m 2 user facility laboratory in 1996, a number of topical user groups were formed to plan and implement the first series of user experiments. The industrial partners have formed user groups planning applications in polymer surface processing, metal surface processing, microfabrication, and electronic materials. University partners have submitted proposals on basic science topics which complement and planned applied research topics, in addition to proposing experiments in atomic physics, chemical physics and materials science which take advantage of one or more of the unique characteristics of the FEL. A synopsis of the proposed user experiments for the first phase of operation of the Jefferson Lab FEL will be presented

  15. Use and User Perception of Electronic Information Resources: A Case Study of Siva Institute of Frontier Technology, India

    Directory of Open Access Journals (Sweden)

    Velmurugan Chandran

    2013-12-01

    Full Text Available The present study aims to explore the use and user perception of electronic resources in Siva Institute of Frontier Technology, India. A total number of 123 users were taken into account for the study through a questionnaire-based survey method. A well-structured questionnaire was designed and distributed to the selected 200 students and staff members. 123 copies of the questionnaires were returned dully filled in and the overall response rate was 61.50 percent. The questionnaire contained both open- and close-ended questions. The collected data were classified, analyzed, and tabulated by using simple statistical methods. This study covers the impact of electronic resources on students and faculty in their academic pursuit.

  16. A Qualitative Evaluation of Contact Centre Dietitian Support and Electronic Motivational Messaging for eaTracker My Goals Users.

    Science.gov (United States)

    Lieffers, Jessica R L; Haresign, Helen; Mehling, Christine; Arocha, Jose F; Hanning, Rhona M

    2018-06-01

    To conduct a qualitative evaluation of adjunct supports (brief motivational messaging regarding goals delivered by email/website, contact centre dietitian assistance) offered by EatRight Ontario (ERO) for users of a website-based nutrition/activity goal setting/tracking feature (eaTracker "My Goals"). One-on-one semi-structured interviews were conducted with My Goals users in Ontario (n = 18) and Alberta (n = 5) recruited via the eaTracker website and ERO contact centre dietitians (n = 5). Interview transcripts were analyzed using content analysis. Participants had mixed experiences and perspectives with ERO motivational messaging. Messages targeted towards specific goals (e.g., tips, recipes) were generally well-liked, and generic messages (e.g., eaTracker login reminders) were less useful. No interviewed users had contacted ERO dietitians regarding goals, and dietitians reported encountering few callers asking for assistance while using My Goals. Limited user knowledge was one explanation for this finding. Participants provided suggestions to enhance these supports. Electronic motivational messaging and contact centre dietitian assistance have the potential to support achievement of goals set with website-based features. When considering using electronic messaging, researchers and practitioners should consider message content and delivery tailoring. Marketing that focuses on how contact centre dietitians can assist website users with their goals is needed when services are used in naturalistic settings.

  17. A Comparison of Daily Versus Weekly Electronic Cigarette Users in Treatment for Substance Abuse.

    Science.gov (United States)

    Gubner, Noah R; Pagano, Anna; Tajima, Barbara; Guydish, Joseph

    2018-04-02

    This research examined electronic cigarette (e-cigarette) use by individuals in treatment for substance abuse, a population with a high prevalence of tobacco use and poor smoking cessation outcomes. We surveyed 1127 individuals from 24 substance abuse treatment centers across the United States. Bivariate analyses and logistic regression were used to examine factors associated with daily (N = 87) versus weekly (N = 81) e-cigarette use. Among the full sample, 59.8% reported any lifetime use of e-cigarettes, with 23.6% reporting past 30-day use. Daily e-cigarette users were more likely to have used second-generation, tank-type e-cigarettes, χ2(1,N = 165) = 11.54, p = .001, used more flavors overall, t(168) = 2.15, p = .03, and were more likely to report using their e-cigarette continuously throughout the day, χ2(4,N = 168) = 16.7, p = .002, compared to weekly e-cigarette users. Over half (57.7%) of the daily and weekly e-cigarette users reported having an e-cigarette device that broke. The logistic regression model adjusting for clinic type and days with poor mental health found that daily e-cigarette users were significantly more likely than weekly e-cigarette users to be from methadone clinics (adjusted odds ratio [AOR] = 2.40, p = .04), and former smokers (AOR = 6.37, p users in substance abuse treatment were more likely to be from methadone clinics and former cigarette smokers. However, the majority (73.6%) of daily e-cigarette users were current cigarette smokers. E-cigarette device type reliability (eg, breakage) may be an important factor to consider among drug treatment and other populations with lower socioeconomic status. This study found several differences in the device type, flavors, and use characteristics of daily versus weekly e-cigarette users. While majority of e-cigarette users in substance abuse treatment were current cigarette smokers, daily e-cigarette users were more likely to be former cigarette smokers. Administrators of substance abuse

  18. Some Proxy Signature and Designated verifier Signature Schemes over Braid Groups

    OpenAIRE

    Lal, Sunder; Verma, Vandani

    2009-01-01

    Braids groups provide an alternative to number theoretic public cryptography and can be implemented quite efficiently. The paper proposes five signature schemes: Proxy Signature, Designated Verifier, Bi-Designated Verifier, Designated Verifier Proxy Signature And Bi-Designated Verifier Proxy Signature scheme based on braid groups. We also discuss the security aspects of each of the proposed schemes.

  19. Data Portal for the Library of Integrated Network-based Cellular Signatures (LINCS) program: integrated access to diverse large-scale cellular perturbation response data

    Science.gov (United States)

    Koleti, Amar; Terryn, Raymond; Stathias, Vasileios; Chung, Caty; Cooper, Daniel J; Turner, John P; Vidović, Dušica; Forlin, Michele; Kelley, Tanya T; D’Urso, Alessandro; Allen, Bryce K; Torre, Denis; Jagodnik, Kathleen M; Wang, Lily; Jenkins, Sherry L; Mader, Christopher; Niu, Wen; Fazel, Mehdi; Mahi, Naim; Pilarczyk, Marcin; Clark, Nicholas; Shamsaei, Behrouz; Meller, Jarek; Vasiliauskas, Juozas; Reichard, John; Medvedovic, Mario; Ma’ayan, Avi; Pillai, Ajay

    2018-01-01

    Abstract The Library of Integrated Network-based Cellular Signatures (LINCS) program is a national consortium funded by the NIH to generate a diverse and extensive reference library of cell-based perturbation-response signatures, along with novel data analytics tools to improve our understanding of human diseases at the systems level. In contrast to other large-scale data generation efforts, LINCS Data and Signature Generation Centers (DSGCs) employ a wide range of assay technologies cataloging diverse cellular responses. Integration of, and unified access to LINCS data has therefore been particularly challenging. The Big Data to Knowledge (BD2K) LINCS Data Coordination and Integration Center (DCIC) has developed data standards specifications, data processing pipelines, and a suite of end-user software tools to integrate and annotate LINCS-generated data, to make LINCS signatures searchable and usable for different types of users. Here, we describe the LINCS Data Portal (LDP) (http://lincsportal.ccs.miami.edu/), a unified web interface to access datasets generated by the LINCS DSGCs, and its underlying database, LINCS Data Registry (LDR). LINCS data served on the LDP contains extensive metadata and curated annotations. We highlight the features of the LDP user interface that is designed to enable search, browsing, exploration, download and analysis of LINCS data and related curated content. PMID:29140462

  20. Stateless Malware Packet Detection by Incorporating Naive Bayes with Known Malware Signatures

    Directory of Open Access Journals (Sweden)

    Ismahani Ismail

    2014-01-01

    Full Text Available Malware detection done at the network infrastructure level is still an open research problem ,considering the evolution of malwares and high detection accuracy needed to detect these threats. Content based classification techniques have been proven capable of detecting malware without matching for malware signatures. However, the performance of the classification techniques depends on observed training samples. In this paper, a new detection method that incorporates Snort malware signatures into Naive Bayes model training is proposed. Through experimental work, we prove that the proposed work results in low features search space for effective detection at the packet level. This paper also demonstrates the viability of detecting malware at the stateless level (using packets as well as at the stateful level (using TCP byte stream. The result shows that it is feasible to detect malware at the stateless level with similar accuracy to the stateful level, thus requiring minimal resource for implementation on middleboxes. Stateless detection can give a better protection to end users by detecting malware on middleboxes without having to reconstruct stateful sessions and before malwares reach the end users.

  1. Propagation of Dipolarization Signatures Observed by the Van Allen Probes in the Inner Magnetosphere

    Science.gov (United States)

    Ohtani, S.; Motoba, T.; Gkioulidou, M.; Takahashi, K.; Kletzing, C.

    2017-12-01

    Dipolarization, the change of the local magnetic field from a stretched to a more dipolar configuration, is one of the most fundamental processes of magnetospheric physics. It is especially critical for the dynamics of the inner magnetosphere. The associated electric field accelerates ions and electrons and transports them closer to Earth. Such injected ions intensify the ring current, and electrons constitute the seed population of the radiation belt. Those ions and electrons may also excite various waves that play important roles in the enhancement and loss of the radiation belt electrons. Despite such critical consequences, the general characteristics of dipolarization in the inner magnetosphere still remain to be understood. The Van Allen Probes mission, which consists of two probes that orbit through the equatorial region of the inner magnetosphere, provides an ideal opportunity to examine dipolarization signatures in the core of the ring current. In the present study we investigate the spatial expansion of the dipolarization region by examining the correlation and time delay of dipolarization signatures observed by the two probes. Whereas in general it requires three-point measurements to deduce the propagation of a signal on a certain plane, we statically examined the observed time delays and found that dipolarization signatures tend to propagate radially inward as well as away from midnight. In this paper we address the propagation of dipolarization signatures quantitatively and compare with the propagation velocities reported previously based on observations made farther away from Earth. We also discuss how often and under what conditions the dipolarization region expands.

  2. Controlling user access to electronic resources without password

    Science.gov (United States)

    Smith, Fred Hewitt

    2017-08-22

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.

  3. An in fiber experimental approach to photonic quantum digital signatures that does not require quantum memory

    Science.gov (United States)

    Collins, Robert J.; Donaldon, Ross J.; Dunjko, Vedran; Wallden, Petros; Clarke, Patrick J.; Andersson, Erika; Jeffers, John; Buller, Gerald S.

    2014-10-01

    Classical digital signatures are commonly used in e-mail, electronic financial transactions and other forms of electronic communications to ensure that messages have not been tampered with in transit, and that messages are transferrable. The security of commonly used classical digital signature schemes relies on the computational difficulty of inverting certain mathematical functions. However, at present, there are no such one-way functions which have been proven to be hard to invert. With enough computational resources certain implementations of classical public key cryptosystems can be, and have been, broken with current technology. It is nevertheless possible to construct information-theoretically secure signature schemes, including quantum digital signature schemes. Quantum signature schemes can be made information theoretically secure based on the laws of quantum mechanics, while classical comparable protocols require additional resources such as secret communication and a trusted authority. Early demonstrations of quantum digital signatures required quantum memory, rendering them impractical at present. Our present implementation is based on a protocol that does not require quantum memory. It also uses the new technique of unambiguous quantum state elimination, Here we report experimental results for a test-bed system, recorded with a variety of different operating parameters, along with a discussion of aspects of the system security.

  4. SUIS: An Online Graphical Signature-Based User Identification System

    OpenAIRE

    Alam, Shahid

    2016-01-01

    Humans possess a large amount of, and almost limitless, visual memory, that assists them to remember pictures far better than words. This phenomenon has recently motivated the computer security researchers' in academia and industry to design and develop graphical user identification systems (GUISs). Cognometric GUISs are more memorable than drawmetric GUISs, but takes more time to authenticate. None of the previously proposed GUISs combines the advantages of both cognometric and drawmetric sy...

  5. Efficient Signature Based Malware Detection on Mobile Devices

    Directory of Open Access Journals (Sweden)

    Deepak Venugopal

    2008-01-01

    Full Text Available The threat of malware on mobile devices is gaining attention recently. It is important to provide security solutions to these devices before these threats cause widespread damage. However, mobile devices have severe resource constraints in terms of memory and power. Hence, even though there are well developed techniques for malware detection on the PC domain, it requires considerable effort to adapt these techniques for mobile devices. In this paper, we outline the considerations for malware detection on mobile devices and propose a signature based malware detection method. Specifically, we detail a signature matching algorithm that is well suited for use in mobile device scanning due to its low memory requirements. Additionally, the matching algorithm is shown to have high scanning speed which makes it unobtrusive to users. Our evaluation and comparison study with the well known Clam-AV scanner shows that our solution consumes less than 50% of the memory used by Clam-AV while maintaining a fast scanning rate.

  6. Xyce Parallel Electronic Simulator - User's Guide, Version 1.0

    Energy Technology Data Exchange (ETDEWEB)

    HUTCHINSON, SCOTT A; KEITER, ERIC R.; HOEKSTRA, ROBERT J.; WATERS, LON J.; RUSSO, THOMAS V.; RANKIN, ERIC LAMONT; WIX, STEVEN D.

    2002-11-01

    This manual describes the use of the Xyce Parallel Electronic Simulator code for simulating electrical circuits at a variety of abstraction levels. The Xyce Parallel Electronic Simulator has been written to support,in a rigorous manner, the simulation needs of the Sandia National Laboratories electrical designers. As such, the development has focused on improving the capability over the current state-of-the-art in the following areas: (1) Capability to solve extremely large circuit problems by supporting large-scale parallel computing platforms (up to thousands of processors). Note that this includes support for most popular parallel and serial computers. (2) Improved performance for all numerical kernels (e.g., time integrator, nonlinear and linear solvers) through state-of-the-art algorithms and novel techniques. (3) A client-server or multi-tiered operating model wherein the numerical kernel can operate independently of the graphical user interface (GUI). (4) Object-oriented code design and implementation using modern coding-practices that ensure that the Xyce Parallel Electronic Simulator will be maintainable and extensible far into the future. The code is a parallel code in the most general sense of the phrase--a message passing parallel implementation--which allows it to run efficiently on the widest possible number of computing platforms. These include serial, shared-memory and distributed-memory parallel as well as heterogeneous platforms. Furthermore, careful attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved even as the number of processors grows. Another feature required by designers is the ability to add device models, many specific to the needs of Sandia, to the code. To this end, the device package in the Xyce Parallel Electronic Simulator is designed to support a variety of device model inputs. These input formats include standard analytical models, behavioral models

  7. Stability and signatures of biexcitons in carbon nanotubes

    DEFF Research Database (Denmark)

    Pedersen, Thomas Garm; Pedersen, Kjeld; Cornean, Horia Decebal

    2005-01-01

    The linear optical properties of semiconducting carbon nanotubes are dominated by quasi-one-dimensional excitons formed by single electron-hole pairs. Hence, the nonlinear response at high pump levels most likely leads to the formation of exciton complexes involving several electron-hole pairs....... Such complexes would threfore play an important role in e.g. lasing applications. We demonstrate here that the biexciton complex is surprisingly stable for nanotubes in a wide diameter range. Theoretical predictions for the signature of such states in pump-probe spectroscopy are presented....

  8. User issues at the Stanford picosecond free electron laser center

    International Nuclear Information System (INIS)

    Smith, T.I.

    1995-01-01

    Assembling a productive user facility around a Free Electron Laser (FEL) is a complex task. Reliable operation of the FEL is a necessary, but by no means sufficient, condition to ensure that the center will be able to attract and keep the interest of first rate researchers. Some other issues which are important include: center wavelength stability and ease of tuning, bandwidth control, amplitude and position stability, ability to select arbitrary sequences of micropulses, and real time availability of information of the FEL's important parameters (spectral width, center wavelength, micropulse length and energy, etc.). In addition, at the Stanford Center we have found that providing additional systems (conventional picosecond lasers synchronized to the FEL, an FTIR spectrometer, a confocal microscopy, ...) has been important. (author)

  9. Cryptographic key generation using handwritten signature

    OpenAIRE

    Freire, Manuel R.; Fiérrez, Julián; Ortega-García, Javier

    2006-01-01

    M. Freire-Santos ; J. Fierrez-Aguilar ; J. Ortega-Garcia; "Cryptographic key generation using handwritten signature", Biometric Technology for Human Identification III, Proc. SPIE 6202 (April 17, 2006); doi:10.1117/12.665875. Copyright 2006 Society of Photo‑Optical Instrumentation Engineers. One print or electronic copy may be made for personal use only. Systematic reproduction and distribution, duplication of any material in this paper for a fee or for commercial purposes, or modification of...

  10. L1000FWD: Fireworks visualization of drug-induced transcriptomic signatures.

    Science.gov (United States)

    Wang, Zichen; Lachmann, Alexander; Keenan, Alexandra B; Ma'ayan, Avi

    2018-02-06

    As part of the NIH Library of Integrated Network-based Cellular Signatures (LINCS) program, hundreds of thousands of transcriptomic signatures were generated with the L1000 technology, profiling the response of human cell lines to over 20,000 small molecule compounds. This effort is a promising approach toward revealing the mechanisms-of-action (MOA) for marketed drugs and other less studied potential therapeutic compounds. L1000 fireworks display (L1000FWD) is a web application that provides interactive visualization of over 16,000 drug and small-molecule induced gene expression signatures. L1000FWD enables coloring of signatures by different attributes such as cell type, time point, concentration, as well as drug attributes such as MOA and clinical phase. Signature similarity search is implemented to enable the search for mimicking or opposing signatures given as input of up and down gene sets. Each point on the L1000FWD interactive map is linked to a signature landing page, which provides multifaceted knowledge from various sources about the signature and the drug. Notably such information includes most frequent diagnoses, co-prescribed drugs and age distribution of prescriptions as extracted from the Mount Sinai Health System electronic medical records (EMR). Overall, L1000FWD serves as a platform for identifying functions for novel small molecules using unsupervised clustering, as well as for exploring drug MOA. L1000FWD is freely accessible at: http://amp.pharm.mssm.edu/L1000FWD. avi.maayan@mssm.edu. Supplementary data are available at Bioinformatics online. © The Author (2018). Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  11. Electronic cigarette use: comparing smokers, vapers, and dual users on characteristics and motivational factors

    OpenAIRE

    Claire Schoren; Karin Hummel; Hein de Vries

    2017-01-01

    Introduction This study examined vaping behaviour, precursors of vaping, and motivational differences between smokers, dual users and vapers. The objectives were to assess a) vaping characteristics and reasons for use, b) differences in motivational factors and behavioural precursors associated with e-cigarette use, and c) socio-demographic and motivational factors associated with electronic cigarette use. Methods A cross-sectional survey among 259 vapers, 135 smokers, and 83 dual u...

  12. Enhanced vibration diagnostics using vibration signature analysis

    International Nuclear Information System (INIS)

    Ahmed, S.; Shehzad, K.; Zahoor, Y.; Mahmood, A.; Bibi, A.

    2001-01-01

    Symptoms will appear in equipment, as well as in human beings. when 'suffering from sickness. Symptoms of abnormality in equipment are vibration, noise, deformation, temperature, pressure, electric current, crack, wearing, leakage etc. these are called modes of failure. If the mode of failure is vibration then the vibration signature analysis can be effectively used in order to diagnose the machinery problems. Much valuable information is contained within these vibration 'Spectra' or 'Signatures' but is only of use if the analyst can unlock its 'Secrets'. This paper documents a vibration problem in the motor of a centrifugal pump (Type ETA). It focuses mainly on the roll of modern vibration monitoring system in problem analysis. The problem experienced was the motor unstability and noise due to high vibration. Using enhanced vibration signature data, the problem was analyzed. which suggested that the rotor eccentricity was the cause of excessive noise and vibration in the motor. In conclusion, advanced electronic monitoring and diagnostic systems provide powerful information for machine's condition assessment and problem analysis. Appropriate interpretation and use of this information is important for accurate and effective vibration analysis. (author)

  13. 27 CFR 73.33 - Am I legally bound by a form I sign electronically?

    Science.gov (United States)

    2010-04-01

    ... TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY (CONTINUED) PROCEDURES AND PRACTICES ELECTRONIC SIGNATURES; ELECTRONIC SUBMISSION OF FORMS Electronic Filing of Documents with TTB § 73.33 Am I legally bound... paper document submitted to satisfy the same reporting requirement. Persons using electronic signatures...

  14. Electronic Signature and Electronic Government Applications in Turkey: An Evaluative Essay from the Viewpoint of Electronic Records Management2 Türkiye’de Elektronik İmza ve Elektronik Devlet Uygulamaları: Elektronik Belge Yönetimi Açısından Bir Değerlendirme Denemesi

    Directory of Open Access Journals (Sweden)

    Esin Altın

    2008-09-01

    Full Text Available The most important component that enables electronic government (e-government applications function is that of electronic record (e-record management. In accordance with the e-record management strategies, all information and records produced by the state are opened to public access. By means of electronic record management systems (ERMS, record supervision becomes easy and processing time becomes shorter. E-record applications bring along the absolute necessity of accomplishing total record security, integrity and so on. That’s where electronic signature (e-signature technologies come on scene. E-signature holds an important place in terms of implementing ERMS and, in a more general sense, electronic archive (e-archive applications securely, and in terms of legal validity. Taking this fact as a starting point, this paper is an attempt to create consciousness on the necessity of the e-record management by emphasizing its importance in the process of e-transformation. This study provides introductory information on e-government, e-signature and the relationship between the e-record management and e-government, and erecord managemnt and e-signature applications. Using the survey method, proceedings and governmental publications issued by the USA, England and Turkey between 1999 and 2006 were reviewed. It was concluded that the importance of the e-record management for e-government has not been fully appreciated in Turkey. More qualifi ed humanpower is needed during the e-transformation process to carry out the e-record management applications Elektronik devlet (e-devlet uygulamalarının işlerliğini sağlayan en önemli unsur elektronik belge (e-belge yönetimidir. E-belge yönetim stratejileri doğrultusunda devletin ürettiği her türlü bilgi ve belge kamu erişimine açılır. Bu stratejiler izlenerek oluşturulan e-belge yönetim sistemleri (EBYS sayesinde belgelerin denetimi kolaylaşır ve iş süreçleri hızlanır. EBYS ile e

  15. Photonic quantum digital signatures operating over kilometer ranges in installed optical fiber

    Science.gov (United States)

    Collins, Robert J.; Fujiwara, Mikio; Amiri, Ryan; Honjo, Toshimori; Shimizu, Kaoru; Tamaki, Kiyoshi; Takeoka, Masahiro; Andersson, Erika; Buller, Gerald S.; Sasaki, Masahide

    2016-10-01

    The security of electronic communications is a topic that has gained noteworthy public interest in recent years. As a result, there is an increasing public recognition of the existence and importance of mathematically based approaches to digital security. Many of these implement digital signatures to ensure that a malicious party has not tampered with the message in transit, that a legitimate receiver can validate the identity of the signer and that messages are transferable. The security of most digital signature schemes relies on the assumed computational difficulty of solving certain mathematical problems. However, reports in the media have shown that certain implementations of such signature schemes are vulnerable to algorithmic breakthroughs and emerging quantum processing technologies. Indeed, even without quantum processors, the possibility remains that classical algorithmic breakthroughs will render these schemes insecure. There is ongoing research into information-theoretically secure signature schemes, where the security is guaranteed against an attacker with arbitrary computational resources. One such approach is quantum digital signatures. Quantum signature schemes can be made information-theoretically secure based on the laws of quantum mechanics while comparable classical protocols require additional resources such as anonymous broadcast and/or a trusted authority. Previously, most early demonstrations of quantum digital signatures required dedicated single-purpose hardware and operated over restricted ranges in a laboratory environment. Here, for the first time, we present a demonstration of quantum digital signatures conducted over several kilometers of installed optical fiber. The system reported here operates at a higher signature generation rate than previous fiber systems.

  16. Unconditionally Secure Quantum Signatures

    Directory of Open Access Journals (Sweden)

    Ryan Amiri

    2015-08-01

    Full Text Available Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols—signatures based on the Rivest–Adleman–Shamir (RSA algorithm, the digital signature algorithm (DSA, and the elliptic curve digital signature algorithm (ECDSA—are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally securesecure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  17. Construction of Graduation Certificate Issuing System Based on Digital Signature Technique

    Directory of Open Access Journals (Sweden)

    Mohammed Issam Younis

    2015-06-01

    Full Text Available With the development of computer architecture and its technologies in recent years, applications like e-commerce, e-government, e-governance and e-finance are widely used, and they act as active research areas. In addition, in order to increase the quality and quantity of the ordinary everyday transactions, it is desired to migrate from the paper-based environment to a digital-based computerized environment. Such migration increases efficiency, saves time, eliminates paperwork, increases safety and reduces the cost in an organization. Digital signatures are playing an essential role in many electronic and automatic based systems and facilitate this migration. The digital signatures are used to provide many services and solutions that would not have been possible by the conventional hand-written signature. In the educational environment, the process of issuing the graduation certificates can no longer be restricted to the traditional methods. Hence, a computerized system for issuing certificates of graduation in an electronic form is needed and desired. This paper proposes a Graduation Certificates Issuing System (GCIS based on digital signature technology. In doing so, this research highlights the state-of-the-art and the art-of-the-practice for some existing digital signature-based systems in the literatures. In addition, eight intertwined elected services are identified, namely: message authentication, entity authentication, integrity, non-repudiation, time stamping, distinguished signing authorities, delegating signing capability and supporting workflow systems. Moreover, this research examines nine existing systems, showing their merits and demerits in terms of these elected services. Furthermore, the research describes the architectural design using the Unified Modeling Language (UML and provides the concrete implementation of the proposed GCIS. The GCIS is implemented using Visual Basic.Net programming language and SQL Server database

  18. Barriers and facilitators to implementing electronic prescription: a systematic review of user groups' perceptions.

    Science.gov (United States)

    Gagnon, Marie-Pierre; Nsangou, Édith-Romy; Payne-Gagnon, Julie; Grenier, Sonya; Sicotte, Claude

    2014-01-01

    We conducted a systematic review identifying users groups' perceptions of barriers and facilitators to implementing electronic prescription (e-prescribing) in primary care. We included studies following these criteria: presence of an empirical design, focus on the users' experience of e-prescribing implementation, conducted in primary care, and providing data on barriers and facilitators to e-prescribing implementation. We used the Donabedian logical model of healthcare quality (adapted by Barber et al) to analyze our findings. We found 34 publications (related to 28 individual studies) eligible to be included in this review. These studies identified a total of 594 elements as barriers or facilitators to e-prescribing implementation. Most user groups perceived that e-prescribing was facilitated by design and technical concerns, interoperability, content appropriate for the users, attitude towards e-prescribing, productivity, and available resources. This review highlights the importance of technical and organizational support for the successful implementation of e-prescribing systems. It also shows that the same factor can be seen as a barrier or a facilitator depending on the project's own circumstances. Moreover, a factor can change in nature, from a barrier to a facilitator and vice versa, in the process of e-prescribing implementation. This review summarizes current knowledge on factors related to e-prescribing implementation in primary care that could support decision makers in their design of effective implementation strategies. Finally, future studies should emphasize on the perceptions of other user groups, such as pharmacists, managers, vendors, and patients, who remain neglected in the literature.

  19. Revocable ID-Based Signature with Short Size over Lattices

    Directory of Open Access Journals (Sweden)

    Ying-Hao Hung

    2017-01-01

    Full Text Available In the past, many ID-based signature (IBS schemes based on the integer factorization or discrete logarithm problems were proposed. With the progress on the development of quantum technology, IBS schemes mentioned above would become vulnerable. Recently, several IBS schemes over lattices were proposed to be secure against attacks in the quantum era. As conventional public-key settings, ID-based public-key settings have to offer a revocation mechanism to revoke misbehaving or malicious users. However, in the past, little work focuses on the revocation problem in the IBS schemes over lattices. In this article, we propose a new revocable IBS (RIBS scheme with short size over lattices. Based on the short integer solution (SIS assumption, we prove that the proposed RIBS scheme provides existential unforgeability against adaptive chosen-message attacks. As compared to the existing IBS schemes over lattices, our RIBS scheme has better performance in terms of signature size, signing key size, and the revocation mechanism with public channels.

  20. Xyce parallel electronic simulator : users' guide.

    Energy Technology Data Exchange (ETDEWEB)

    Mei, Ting; Rankin, Eric Lamont; Thornquist, Heidi K.; Santarelli, Keith R.; Fixel, Deborah A.; Coffey, Todd Stirling; Russo, Thomas V.; Schiek, Richard Louis; Warrender, Christina E.; Keiter, Eric Richard; Pawlowski, Roger Patrick

    2011-05-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been designed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas: (1) Capability to solve extremely large circuit problems by supporting large-scale parallel computing platforms (up to thousands of processors). Note that this includes support for most popular parallel and serial computers; (2) Improved performance for all numerical kernels (e.g., time integrator, nonlinear and linear solvers) through state-of-the-art algorithms and novel techniques. (3) Device models which are specifically tailored to meet Sandia's needs, including some radiation-aware devices (for Sandia users only); and (4) Object-oriented code design and implementation using modern coding practices that ensure that the Xyce Parallel Electronic Simulator will be maintainable and extensible far into the future. Xyce is a parallel code in the most general sense of the phrase - a message passing parallel implementation - which allows it to run efficiently on the widest possible number of computing platforms. These include serial, shared-memory and distributed-memory parallel as well as heterogeneous platforms. Careful attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows. The development of Xyce provides a platform for computational research and development aimed specifically at the needs of the Laboratory. With Xyce, Sandia has an 'in-house' capability with which both new electrical (e.g., device model development) and algorithmic (e.g., faster time-integration methods, parallel solver algorithms) research and development can be performed. As a result, Xyce is

  1. User Interface Program for secure electronic tags

    International Nuclear Information System (INIS)

    Cai, Y.; Koehl, E.R.; Carlson, R.D.; Raptis, A.C.

    1995-05-01

    This report summarizes and documents the efforts of Argonne National Laboratory (ANL) in developing a secure tag communication user interface program comprising a tag monitor and a communication tool. This program can perform the same functions as the software that was developed at the Lawrence Livermore National Laboratory (LLNL), but it is enhanced with a user-friendly screen. It represents the first step in updating the TRANSCOM Tracking System (TRANSCOM) by incorporating a tag communication screen menu into the main menu of the TRANSCOM user program. A working version of TRANSCOM, enhanced with ANL secure-tag graphics, will strongly support the Department of Energy Warhead Dismantlement/Special Nuclear Materials Control initiatives. It will allow commercial satellite tracking of the movements and operational activities of treaty-limited items and transportation vehicles throughout Europe and the former USSR, as well as the continental US

  2. Near-real time forecasts of MeV protons based on sub-relativistic electrons: communicating the outputs to the end users

    Science.gov (United States)

    Sarlanis, Christos; Heber, Bernd; Labrenz, Johannes; Kühl, Patrick; Marquardt, Johannes; Dimitroulakos, John; Papaioannou, Athanasios; Posner, Arik

    2017-04-01

    Solar Energetic Particle (SEP) events are one of the most important elements of space weather. Given that the complexity of the underlying physical processes of the acceleration and propagation of SEP events is still a very active research area, the prognosis of SEP event occurrence and their corresponding characteristics remains challenging. In order to provide up to an hour warning time before these particles arrive at Earth, relativistic electron and below 50 MeV proton data from the Electron Proton Helium Instrument (EPHIN) on SOHO were used to implement the 'Relativistic Electron Alert System for Exploration (REleASE)'. The REleASE forecasting scheme was recently rewritten in the open access programming language PYTHON and will be made publicly available. As a next step, along with relativistic electrons (v > 0.9 c) provided by SOHO, near-relativistic (v work, we demonstrate the real-time outputs derived by the end user from the REleASE using both SOHO/EPHIN and ACE/EPAM. We further, show a user friendly illustration of the outputs that make use of a "traffic light" to monitor the different warning stages: quiet, warning, alert offering a simple guidance to the end users. Finally, the capabilities offered by this new system, accessing both the pictorial and textural outputs REleASE are being presented. This work has received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 637324.

  3. Reasons for not using ecstasy: a qualitative study of non-users, ex-light users and ex-moderate users

    Science.gov (United States)

    2012-01-01

    Background Although ecstasy is often consumed in the electronic music scene, not everyone with the opportunity to use it chooses to do so. The objective of this study was to understand the reasons for non-use or the cessation of use, which could provide information for public health interventions. Methods A qualitative reference method was used. Our “snowball” sample group consisted of 53 people who were split into three subgroups: non-users (NU, n = 23), ex-light users (EX-L, n = 12) and ex-moderate users (EX-M, n = 18). Individual, semi-structured interviews were conducted, transcribed and subjected to content analysis with the aid of NVivo8. Results Adverse health effects and personal values were given as reasons for non-use in the three groups. Non-users (NU) and ex-light users (EX-L) provided reasons that included fear of possible effects as well as moral, family and religious objections. Ex-moderate users (EX-M) cited reasons related to health complications and concomitant withdrawal from the electronic music scene. However, most of the ex-moderate users did not rule out the possibility of future use. Conclusions Potential effects and undesirable consequences appear to guide the decisions within the different groups. Prevention might target these motivations. Individuals who have used ecstasy indicate that social and environmental factors are the most important factors. PMID:22583984

  4. Radiation signatures

    International Nuclear Information System (INIS)

    McGlynn, S.P.; Varma, M.N.

    1992-01-01

    A new concept for modelling radiation risk is proposed. This concept is based on the proposal that the spectrum of molecular lesions, which we dub ''the radiation signature'', can be used to identify the quality of the causal radiation. If the proposal concerning radiation signatures can be established then, in principle, both prospective and retrospective risk determination can be assessed on an individual basis. A major goal of biophysical modelling is to relate physical events such as ionization, excitation, etc. to the production of radiation carcinogenesis. A description of the physical events is provided by track structure. The track structure is determined by radiation quality, and it can be considered to be the ''physical signature'' of the radiation. Unfortunately, the uniqueness characteristics of this signature are dissipated in biological systems in ∼10 -9 s. Nonetheless, it is our contention that this physical disturbance of the biological system eventuates later, at ∼10 0 s, in molecular lesion spectra which also characterize the causal radiation. (author)

  5. CoverageAnalyzer (CAn: A Tool for Inspection of Modification Signatures in RNA Sequencing Profiles

    Directory of Open Access Journals (Sweden)

    Ralf Hauenschild

    2016-11-01

    Full Text Available Combination of reverse transcription (RT and deep sequencing has emerged as a powerful instrument for the detection of RNA modifications, a field that has seen a recent surge in activity because of its importance in gene regulation. Recent studies yielded high-resolution RT signatures of modified ribonucleotides relying on both sequence-dependent mismatch patterns and reverse transcription arrests. Common alignment viewers lack specialized functionality, such as filtering, tailored visualization, image export and differential analysis. Consequently, the community will profit from a platform seamlessly connecting detailed visual inspection of RT signatures and automated screening for modification candidates. CoverageAnalyzer (CAn was developed in response to the demand for a powerful inspection tool. It is freely available for all three main operating systems. With SAM file format as standard input, CAn is an intuitive and user-friendly tool that is generally applicable to the large community of biomedical users, starting from simple visualization of RNA sequencing (RNA-Seq data, up to sophisticated modification analysis with significance-based modification candidate calling.

  6. Xyce Parallel Electronic Simulator : users' guide, version 2.0.

    Energy Technology Data Exchange (ETDEWEB)

    Hoekstra, Robert John; Waters, Lon J.; Rankin, Eric Lamont; Fixel, Deborah A.; Russo, Thomas V.; Keiter, Eric Richard; Hutchinson, Scott Alan; Pawlowski, Roger Patrick; Wix, Steven D.

    2004-06-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been designed as a SPICE-compatible, high-performance analog circuit simulator capable of simulating electrical circuits at a variety of abstraction levels. Primarily, Xyce has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability the current state-of-the-art in the following areas: {sm_bullet} Capability to solve extremely large circuit problems by supporting large-scale parallel computing platforms (up to thousands of processors). Note that this includes support for most popular parallel and serial computers. {sm_bullet} Improved performance for all numerical kernels (e.g., time integrator, nonlinear and linear solvers) through state-of-the-art algorithms and novel techniques. {sm_bullet} Device models which are specifically tailored to meet Sandia's needs, including many radiation-aware devices. {sm_bullet} A client-server or multi-tiered operating model wherein the numerical kernel can operate independently of the graphical user interface (GUI). {sm_bullet} Object-oriented code design and implementation using modern coding practices that ensure that the Xyce Parallel Electronic Simulator will be maintainable and extensible far into the future. Xyce is a parallel code in the most general sense of the phrase - a message passing of computing platforms. These include serial, shared-memory and distributed-memory parallel implementation - which allows it to run efficiently on the widest possible number parallel as well as heterogeneous platforms. Careful attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows. One feature required by designers is the ability to add device models, many specific to the needs of Sandia, to the code. To this end, the device package in the Xyce

  7. OpenLabNotes – An Electronic Laboratory Notebook Extension for OpenLabFramework

    Directory of Open Access Journals (Sweden)

    List Markus

    2015-09-01

    Full Text Available Electronic laboratory notebooks (ELNs are more accessible and reliable than their paper based alternatives and thus find widespread adoption. While a large number of commercial products is available, small- to mid-sized laboratories can often not afford the costs or are concerned about the longevity of the providers. Turning towards free alternatives, however, raises questions about data protection, which are not sufficiently addressed by available solutions. To serve as legal documents, ELNs must prevent scientific fraud through technical means such as digital signatures. It would also be advantageous if an ELN was integrated with a laboratory information management system to allow for a comprehensive documentation of experimental work including the location of samples that were used in a particular experiment. Here, we present OpenLabNotes, which adds state-of-the-art ELN capabilities to OpenLabFramework, a powerful and flexible laboratory information management system. In contrast to comparable solutions, it allows to protect the intellectual property of its users by offering data protection with digital signatures. OpenLabNotes effectively closes the gap between research documentation and sample management, thus making Open- LabFramework more attractive for laboratories that seek to increase productivity through electronic data management.

  8. Electron Energization and Mixing Observed by MMS in the Vicinity of an Electron Diffusion Region During Magnetopause Reconnection

    Science.gov (United States)

    Chen, Li-Jen; Hesse, Michael; Wang, Shan; Gershman, Daniel; Ergun, Robert; Pollock, Craig; Torbert, Roy; Bessho, Naoki; Daughton, William; Dorelli, John; hide

    2016-01-01

    Measurements from the Magnetospheric Multiscale (MMS) mission are reported to show distinct features of electron energization and mixing in the diffusion region of the terrestrial magnetopause reconnection. At the ion jet and magnetic field reversals, distribution functions exhibiting signatures of accelerated meandering electrons are observed at an electron out-of-plane flow peak. The meandering signatures manifested as triangular and crescent structures are established features of the electron diffusion region (EDR). Effects of meandering electrons on the electric field normal to the reconnection layer are detected. Parallel acceleration and mixing of the inflowing electrons with exhaust electrons shape the exhaust flow pattern. In the EDR vicinity, the measured distribution functions indicate that locally, the electron energization and mixing physics is captured by two-dimensional reconnection, yet to account for the simultaneous four-point measurements, translational invariant in the third dimension must be violated on the ion-skin-depth scale.

  9. A feature based comparison of pen and swipe based signature characteristics.

    Science.gov (United States)

    Robertson, Joshua; Guest, Richard

    2015-10-01

    Dynamic Signature Verification (DSV) is a biometric modality that identifies anatomical and behavioral characteristics when an individual signs their name. Conventionally signature data has been captured using pen/tablet apparatus. However, the use of other devices such as the touch-screen tablets has expanded in recent years affording the possibility of assessing biometric interaction on this new technology. To explore the potential of employing DSV techniques when a user signs or swipes with their finger, we report a study to correlate pen and finger generated features. Investigating the stability and correlation between a set of characteristic features recorded in participant's signatures and touch-based swipe gestures, a statistical analysis was conducted to assess consistency between capture scenarios. The results indicate that there is a range of static and dynamic features such as the rate of jerk, size, duration and the distance the pen traveled that can lead to interoperability between these two systems for input methods for use within a potential biometric context. It can be concluded that this data indicates that a general principle is that the same underlying constructional mechanisms are evident. Copyright © 2015 Elsevier B.V. All rights reserved.

  10. The LncRNA Connectivity Map: Using LncRNA Signatures to Connect Small Molecules, LncRNAs, and Diseases.

    Science.gov (United States)

    Yang, Haixiu; Shang, Desi; Xu, Yanjun; Zhang, Chunlong; Feng, Li; Sun, Zeguo; Shi, Xinrui; Zhang, Yunpeng; Han, Junwei; Su, Fei; Li, Chunquan; Li, Xia

    2017-07-27

    Well characterized the connections among diseases, long non-coding RNAs (lncRNAs) and drugs are important for elucidating the key roles of lncRNAs in biological mechanisms in various biological states. In this study, we constructed a database called LNCmap (LncRNA Connectivity Map), available at http://www.bio-bigdata.com/LNCmap/ , to establish the correlations among diseases, physiological processes, and the action of small molecule therapeutics by attempting to describe all biological states in terms of lncRNA signatures. By reannotating the microarray data from the Connectivity Map database, the LNCmap obtained 237 lncRNA signatures of 5916 instances corresponding to 1262 small molecular drugs. We provided a user-friendly interface for the convenient browsing, retrieval and download of the database, including detailed information and the associations of drugs and corresponding affected lncRNAs. Additionally, we developed two enrichment analysis methods for users to identify candidate drugs for a particular disease by inputting the corresponding lncRNA expression profiles or an associated lncRNA list and then comparing them to the lncRNA signatures in our database. Overall, LNCmap could significantly improve our understanding of the biological roles of lncRNAs and provide a unique resource to reveal the connections among drugs, lncRNAs and diseases.

  11. Users and user study methodology: the JUBILEE project

    OpenAIRE

    Linda Banwell; Graham Coulson

    2004-01-01

    This paper presents both theoretical aspects and practical examples from the on-going and large-scale JUBILEE (JISC User Behaviour in Information seeking: Longitudinal Evaluation of Electronic information services) project, now in its fifth year. Particular emphasis will be placed on the importance of using robust theory and methods as the basis for reputable user studies, especially those undertaken by practitioners. Theory underlying the development of the JUBILEE project and Toolkit is out...

  12. Electron-electron interaction in p-SiGe/Ge quantum wells

    International Nuclear Information System (INIS)

    Roessner, Benjamin; Kaenel, Hans von; Chrastina, Daniel; Isella, Giovanni; Batlogg, Bertram

    2005-01-01

    The temperature dependent magnetoresistance of high mobility p-SiGe/Ge quantum wells is studied with hole densities ranging from 1.7 to 5.9 x 10 11 cm -2 . At magnetic fields below the onset of quantum oscillations that reflect the high mobility values (up to 75000 cm 2 /Vs), we observe the clear signatures of electron-electron interaction. We compare our experiment with the theory of electron-electron interaction including the Zeeman band splitting. The observed magnetoresistance is well explained as a superposition of band structure induced positive magnetoresistance and the negative magntoresistance due to the electron-electron interaction effect

  13. Blinding for unanticipated signatures

    NARCIS (Netherlands)

    D. Chaum (David)

    1987-01-01

    textabstractPreviously known blind signature systems require an amount of computation at least proportional to the number of signature types, and also that the number of such types be fixed in advance. These requirements are not practical in some applications. Here, a new blind signature technique

  14. Born-Oppenheimer Dynamics, Electronic Friction, and the Inclusion of Electron-Electron Interactions

    Science.gov (United States)

    Dou, Wenjie; Miao, Gaohan; Subotnik, Joseph E.

    2017-07-01

    We present a universal expression for the electronic friction as felt by a set of classical nuclear degrees of freedom (DOFs) coupled to a manifold of quantum electronic DOFs; no assumptions are made regarding the nature of the electronic Hamiltonian and electron-electron repulsions are allowed. Our derivation is based on a quantum-classical Liouville equation for the coupled electronic-nuclear motion, followed by an adiabatic approximation whereby electronic transitions are assumed to equilibrate faster than nuclear movement. The resulting form of friction is completely general, but does reduce to previously published expressions for the quadratic Hamiltonian (i.e., Hamiltonians without electronic correlation). At equilibrium, the second fluctuation-dissipation theorem is satisfied and the frictional matrix is symmetric. To demonstrate the importance of electron-electron correlation, we study electronic friction within the Anderson-Holstein model, where a proper treatment of electron-electron interactions shows signatures of a Kondo resonance and a mean-field treatment is completely inadequate.

  15. Study of the microdoppler signature of a bicyclist for different directions of approach

    Science.gov (United States)

    Rodriguez-Hervas, Berta; Maile, Michael; Flores, Benjamin C.

    2015-05-01

    The successful implementation of autonomous driving in an urban setting depends on the ability of the environment perception system to correctly classify vulnerable road users such as pedestrians and bicyclists in dense, complex scenarios. Self-driving vehicles include sensor systems such as cameras, lidars, and radars to enable decision making. Among these systems, radars are particularly relevant due to their operational robustness under adverse weather and night light conditions. Classification of pedestrian and car in urban settings using automotive radar has been widely investigated, suggesting that micro-Doppler signatures are useful for target discrimination. Our objective is to analyze and study the micro-Doppler signature of bicyclists approaching a vehicle from different directions in order to establish the basis of a classification criterion to distinguish bicycles from other targets including clutter. The micro-Doppler signature is obtained by grouping individual reflecting points using a clustering algorithm and observing the evolution of all the points belonging to an object in the Doppler domain over time. A comparison is then made with simulated data that uses a kinematic model of bicyclists' movement. The suitability of the micro-Doppler bicyclist signature as a classification feature is determined by comparing it to those belonging to cars and pedestrians approaching the automotive radar system.

  16. 78 FR 14233 - Electronic Retirement Processing

    Science.gov (United States)

    2013-03-05

    ... as the private key, is used to verify the signature. Digitized signature means a graphical image of a... recipients of the electronic document. Smart card means a plastic card, typically the size of a credit card, containing an embedded integrated circuit or ``chip'' that can generate, store, or process data. A smart card...

  17. 1 CFR 18.7 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 1 General Provisions 1 2010-01-01 2010-01-01 false Signature. 18.7 Section 18.7 General Provisions... PREPARATION AND TRANSMITTAL OF DOCUMENTS GENERALLY § 18.7 Signature. The original and each duplicate original... stamped beneath the signature. Initialed or impressed signatures will not be accepted. Documents submitted...

  18. Signatures for quark clustering in nuclei

    International Nuclear Information System (INIS)

    Carlson, C.E.; Lassila, K.E.

    1994-01-01

    As a signature for the presence of quark clusters in nuclei, the authors suggest studying backward protons produced by electron scattering off deuterons and suggest a ratio that cancels out much of the detailed properties of deuterons or 6-quark clusters. The test may be viewed as a test that the short range part of the deuteron is still a 2-nucleon system. They make estimates to show how it fails in characteristic and significant ways if the two nucleons at short range coalesce into a kneaded 6-quark cluster

  19. Signatures for quark clustering in nuclei

    Energy Technology Data Exchange (ETDEWEB)

    Carlson, C.E. [College of William and Mary, Williamsburg, VA (United States); Lassila, K.E. [Iowa State Univ., Ames, IA (United States)

    1994-04-01

    As a signature for the presence of quark clusters in nuclei, the authors suggest studying backward protons produced by electron scattering off deuterons and suggest a ratio that cancels out much of the detailed properties of deuterons or 6-quark clusters. The test may be viewed as a test that the short range part of the deuteron is still a 2-nucleon system. They make estimates to show how it fails in characteristic and significant ways if the two nucleons at short range coalesce into a kneaded 6-quark cluster.

  20. Electronic cigarette use among patients with cancer: characteristics of electronic cigarette users and their smoking cessation outcomes.

    Science.gov (United States)

    Borderud, Sarah P; Li, Yuelin; Burkhalter, Jack E; Sheffer, Christine E; Ostroff, Jamie S

    2014-11-15

    Given that continued smoking after a cancer diagnosis increases the risk of adverse health outcomes, patients with cancer are strongly advised to quit. Despite a current lack of evidence regarding their safety and effectiveness as a cessation tool, electronic cigarettes (E-cigarettes) are becoming increasingly popular. To guide oncologists' communication with their patients about E-cigarette use, this article provides what to the authors' knowledge is the first published clinical data regarding E-cigarette use and cessation outcomes among patients with cancer. A total of 1074 participants included smokers (patients with cancer) who recently enrolled in a tobacco treatment program at a comprehensive cancer center. Standard demographic, tobacco use history, and follow-up cessation outcomes were assessed. A 3-fold increase in E-cigarette use was observed from 2012 to 2013 (10.6% vs 38.5%). E-cigarette users were more nicotine dependent than nonusers, had more prior quit attempts, and were more likely to be diagnosed with thoracic and head or neck cancers. Using a complete case analysis, E-cigarette users were as likely to be smoking at the time of follow-up as nonusers (odds ratio, 1.0; 95% confidence interval, 0.5-1.7). Using an intention-to-treat analysis, E-cigarette users were twice as likely to be smoking at the time of follow-up as nonusers (odds ratio, 2.0; 95% confidence interval, 1.2-3.3). The high rate of E-cigarette use observed is consistent with recent articles highlighting increased E-cigarette use in the general population. The current longitudinal findings raise doubts concerning the usefulness of E-cigarettes for facilitating smoking cessation among patients with cancer. Further research is needed to evaluate the safety and efficacy of E-cigarettes as a cessation treatment for patients with cancer. © 2014 American Cancer Society.

  1. Electronic Field Guides and User Communities in the Eco-informatics Revolution

    Directory of Open Access Journals (Sweden)

    R. D. Stevenson

    2003-07-01

    Full Text Available The recognition that taxonomy is central to the conservation of biodiversity has reestablished the critical role of taxonomy in biology. However, many of the tools taxonomists produce for the identification and characterization of species, e.g., dichotomous keys, have been difficult to use and largely ignored by the general public in favor of field guides, which are essentially browsable picture guides. We review the role of field guides in species identification and discuss the application of a host of digital technologies to produce user-friendly tools for identification that are likely to greatly enhance species identification in the field by nonspecialists. We suggest that wider adoption of the citizen science model and the use of electronic field guides will enhance public understanding and participation in biodiversity monitoring.

  2. Theoretical Characterizaiton of Visual Signatures (Muzzle Flash)

    Science.gov (United States)

    Kashinski, D. O.; Scales, A. N.; Vanderley, D. L.; Chase, G. M.; di Nallo, O. E.; Byrd, E. F. C.

    2014-05-01

    We are investigating the accuracy of theoretical models used to predict the visible, ultraviolet and infrared spectra of product materials ejected from the muzzle of currently fielded systems. Recent advances in solid propellants has made the management of muzzle signature (flash) a principle issue in weapons development across the calibers. A priori prediction of the electromagnetic spectra of formulations will allow researchers to tailor blends that yield desired signatures and determine spectrographic detection ranges. We are currently employing quantum chemistry methods at various levels of sophistication to optimize molecular geometries, compute vibrational frequencies, and determine the optical spectra of specific gas-phase molecules and radicals of interest. Electronic excitations are being computed using Time Dependent Density Functional Theory (TD-DFT). A comparison of computational results to experimental values found in the literature is used to assess the affect of basis set and functional choice on calculation accuracy. The current status of this work will be presented at the conference. Work supported by the ARL, and USMA.

  3. Spectral signature verification using statistical analysis and text mining

    Science.gov (United States)

    DeCoster, Mallory E.; Firpi, Alexe H.; Jacobs, Samantha K.; Cone, Shelli R.; Tzeng, Nigel H.; Rodriguez, Benjamin M.

    2016-05-01

    In the spectral science community, numerous spectral signatures are stored in databases representative of many sample materials collected from a variety of spectrometers and spectroscopists. Due to the variety and variability of the spectra that comprise many spectral databases, it is necessary to establish a metric for validating the quality of spectral signatures. This has been an area of great discussion and debate in the spectral science community. This paper discusses a method that independently validates two different aspects of a spectral signature to arrive at a final qualitative assessment; the textual meta-data and numerical spectral data. Results associated with the spectral data stored in the Signature Database1 (SigDB) are proposed. The numerical data comprising a sample material's spectrum is validated based on statistical properties derived from an ideal population set. The quality of the test spectrum is ranked based on a spectral angle mapper (SAM) comparison to the mean spectrum derived from the population set. Additionally, the contextual data of a test spectrum is qualitatively analyzed using lexical analysis text mining. This technique analyzes to understand the syntax of the meta-data to provide local learning patterns and trends within the spectral data, indicative of the test spectrum's quality. Text mining applications have successfully been implemented for security2 (text encryption/decryption), biomedical3 , and marketing4 applications. The text mining lexical analysis algorithm is trained on the meta-data patterns of a subset of high and low quality spectra, in order to have a model to apply to the entire SigDB data set. The statistical and textual methods combine to assess the quality of a test spectrum existing in a database without the need of an expert user. This method has been compared to other validation methods accepted by the spectral science community, and has provided promising results when a baseline spectral signature is

  4. Fair quantum blind signatures

    International Nuclear Information System (INIS)

    Tian-Yin, Wang; Qiao-Yan, Wen

    2010-01-01

    We present a new fair blind signature scheme based on the fundamental properties of quantum mechanics. In addition, we analyse the security of this scheme, and show that it is not possible to forge valid blind signatures. Moreover, comparisons between this scheme and public key blind signature schemes are also discussed. (general)

  5. Five Guidelines for Selecting Hydrological Signatures

    Science.gov (United States)

    McMillan, H. K.; Westerberg, I.; Branger, F.

    2017-12-01

    Hydrological signatures are index values derived from observed or modeled series of hydrological data such as rainfall, flow or soil moisture. They are designed to extract relevant information about hydrological behavior, such as to identify dominant processes, and to determine the strength, speed and spatiotemporal variability of the rainfall-runoff response. Hydrological signatures play an important role in model evaluation. They allow us to test whether particular model structures or parameter sets accurately reproduce the runoff generation processes within the watershed of interest. Most modeling studies use a selection of different signatures to capture different aspects of the catchment response, for example evaluating overall flow distribution as well as high and low flow extremes and flow timing. Such studies often choose their own set of signatures, or may borrow subsets of signatures used in multiple other works. The link between signature values and hydrological processes is not always straightforward, leading to uncertainty and variability in hydrologists' signature choices. In this presentation, we aim to encourage a more rigorous approach to hydrological signature selection, which considers the ability of signatures to represent hydrological behavior and underlying processes for the catchment and application in question. To this end, we propose a set of guidelines for selecting hydrological signatures. We describe five criteria that any hydrological signature should conform to: Identifiability, Robustness, Consistency, Representativeness, and Discriminatory Power. We describe an example of the design process for a signature, assessing possible signature designs against the guidelines above. Due to their ubiquity, we chose a signature related to the Flow Duration Curve, selecting the FDC mid-section slope as a proposed signature to quantify catchment overall behavior and flashiness. We demonstrate how assessment against each guideline could be used to

  6. Radiation effects on electronic equipment: a designers'/users' guide for the nuclear power industry

    International Nuclear Information System (INIS)

    Sharp, R.E.; Garlick, D.R.

    1994-01-01

    The Designers'/Users' Guide to the effects of radiation on electronics is published by the Radiation Testing Service of AEA Technology. The aim of the Guide is to document the available information that we have generated and collected over some ten years whilst operating as a radiation effects and design consultancy to the nuclear power industry. We hope that this will enable workers within the industry better to understand the likely effects of radiation on the system or plant being designed and so minimise the problems that can arise. (Author)

  7. User studies for digital library development

    CERN Document Server

    Dobreva, Milena; Feliciati, Pierluigi

    2012-01-01

    As the information environment becomes increasingly electronic, digital libraries have proliferated, but the focus has often been on innovations in technology and not the user. This title provides a clear overview of the user studies domain and user issues in digital libraries.

  8. Electronic alerts and clinician turnover: the influence of user acceptance.

    Science.gov (United States)

    Hysong, Sylvia J; Spitzmuller, Christiane; Espadas, Donna; Sittig, Dean F; Singh, Hardeep

    2014-11-01

    Use of certain components of electronic health records (EHRs), such as EHR-based alerting systems (EASs), might reduce provider satisfaction, a strong precursor to turnover. We examined the impact of factors likely to influence providers' acceptance of an alerting system, designed to facilitate electronic communication in outpatient settings, on provider satisfaction, intentions to quit, and turnover. We conducted a cross-sectional Web-based survey of EAS-related practices from a nationwide sample of primary care providers (PCPs) practicing at Department of Veterans Affairs (VA) medical facilities. Of 5001 invited VA PCPs, 2590 completed the survey. We relied on Venkatesh's Unified Theory of Acceptance and Use of Technology to create survey measures of 4 factors likely to impact user acceptance of EAS: supportive norms, monitoring/ feedback, training, and providers' perceptions of the value (PPOV) of EASs to provider effectiveness. Facility-level PCP turnover was measured via the VA's Service Support Center Human Resources Cube. Hypotheses were tested using structural equation modeling. After accounting for intercorrelations among predictors, monitoring/feedback regarding EASs significantly predicted intention to quit (b = 0.30, P < .01), and PPOV of EASs predicted both overall provider satisfaction (b = 0.58, P < .01) and facility-level provider turnover levels (b = -0.19, P < .05), all without relying on any intervening mechanisms. Design, implementation, and use of EASs might impact provider satisfaction and retention. Institutions should consider strategies to help providers perceive greater value in these clinical tools.

  9. On the security of a novel probabilistic signature based on bilinear square Diffie-Hellman problem and its extension.

    Science.gov (United States)

    Zhao, Zhenguo; Shi, Wenbo

    2014-01-01

    Probabilistic signature scheme has been widely used in modern electronic commerce since it could provide integrity, authenticity, and nonrepudiation. Recently, Wu and Lin proposed a novel probabilistic signature (PS) scheme using the bilinear square Diffie-Hellman (BSDH) problem. They also extended it to a universal designated verifier signature (UDVS) scheme. In this paper, we analyze the security of Wu et al.'s PS scheme and UDVS scheme. Through concrete attacks, we demonstrate both of their schemes are not unforgeable. The security analysis shows that their schemes are not suitable for practical applications.

  10. Radiation Gene-expression Signatures in Primary Breast Cancer Cells.

    Science.gov (United States)

    Minafra, Luigi; Bravatà, Valentina; Cammarata, Francesco P; Russo, Giorgio; Gilardi, Maria C; Forte, Giusi I

    2018-05-01

    In breast cancer (BC) care, radiation therapy (RT) is an efficient treatment to control localized tumor. Radiobiological research is needed to understand molecular differences that affect radiosensitivity of different tumor subtypes and the response variability. The aim of this study was to analyze gene expression profiling (GEP) in primary BC cells following irradiation with doses of 9 Gy and 23 Gy delivered by intraoperative electron radiation therapy (IOERT) in order to define gene signatures of response to high doses of ionizing radiation. We performed GEP by cDNA microarrays and evaluated cell survival after IOERT treatment in primary BC cell cultures. Real-time quantitative reverse transcription polymerase chain reaction (qRT-PCR) was performed to validate candidate genes. We showed, for the first time, a 4-gene and a 6-gene signature, as new molecular biomarkers, in two primary BC cell cultures after exposure at 9 Gy and 23 Gy respectively, for which we observed a significantly high survival rate. Gene signatures activated by different doses of ionizing radiation may predict response to RT and contribute to defining a personalized biological-driven treatment plan. Copyright© 2018, International Institute of Anticancer Research (Dr. George J. Delinasios), All rights reserved.

  11. Impact and user satisfaction of a clinical information portal embedded in an electronic health record.

    Science.gov (United States)

    Tannery, Nancy H; Epstein, Barbara A; Wessel, Charles B; Yarger, Frances; LaDue, John; Klem, Mary Lou

    2011-01-01

    In 2008, a clinical information tool was developed and embedded in the electronic health record system of an academic medical center. In 2009, the initial information tool, Clinical-e, was superseded by a portal called Clinical Focus, with a single search box enabling a federated search of selected online information resources. To measure the usefulness and impact of Clinical Focus, a survey was used to gather feedback about users' experience with this clinical resource. The survey determined what type of clinicians were using this tool and assessed user satisfaction and perceived impact on patient care decision making. Initial survey results suggest the majority of respondents found Clinical Focus easy to navigate, the content easy to read, and the retrieved information relevant and complete. The majority would recommend Clinical Focus to their colleagues. Results indicate that this tool is a promising area for future development.

  12. Experimental signatures of direct-laser-acceleration-assisted laser wakefield acceleration

    Science.gov (United States)

    Shaw, J. L.; Lemos, N.; Marsh, K. A.; Froula, D. H.; Joshi, C.

    2018-04-01

    The direct laser acceleration (DLA) of electrons in a laser wakefield accelerator (LWFA) operating in the forced or quasi-blowout regimes has been investigated through experiment and simulation. When there is a significant overlap between the trapped electrons and the drive laser in a LWFA cavity, the resulting electrons can gain energy from both the LWFA and the DLA mechanisms. Experimental work investigates the properties of the electron beams produced in a LWFA with ionization injection by dispersing those beams in the direction perpendicular to the laser polarization. These electron beams show certain spectral features that are characteristic of DLA. These characteristic features are reproduced using particle-in-cell simulations, where particle tracking was used to elucidate the roles of LWFA and DLA to the energy gain of the electrons in this experimental regime and to demonstrate that such spectral features are definitive signatures of the presence of DLA in LWFA.

  13. Uncertainty in hydrological signatures

    Science.gov (United States)

    McMillan, Hilary; Westerberg, Ida

    2015-04-01

    Information that summarises the hydrological behaviour or flow regime of a catchment is essential for comparing responses of different catchments to understand catchment organisation and similarity, and for many other modelling and water-management applications. Such information types derived as an index value from observed data are known as hydrological signatures, and can include descriptors of high flows (e.g. mean annual flood), low flows (e.g. mean annual low flow, recession shape), the flow variability, flow duration curve, and runoff ratio. Because the hydrological signatures are calculated from observed data such as rainfall and flow records, they are affected by uncertainty in those data. Subjective choices in the method used to calculate the signatures create a further source of uncertainty. Uncertainties in the signatures may affect our ability to compare different locations, to detect changes, or to compare future water resource management scenarios. The aim of this study was to contribute to the hydrological community's awareness and knowledge of data uncertainty in hydrological signatures, including typical sources, magnitude and methods for its assessment. We proposed a generally applicable method to calculate these uncertainties based on Monte Carlo sampling and demonstrated it for a variety of commonly used signatures. The study was made for two data rich catchments, the 50 km2 Mahurangi catchment in New Zealand and the 135 km2 Brue catchment in the UK. For rainfall data the uncertainty sources included point measurement uncertainty, the number of gauges used in calculation of the catchment spatial average, and uncertainties relating to lack of quality control. For flow data the uncertainty sources included uncertainties in stage/discharge measurement and in the approximation of the true stage-discharge relation by a rating curve. The resulting uncertainties were compared across the different signatures and catchments, to quantify uncertainty

  14. Modeling Multi-Mobile Agents System Based on Coalition Signature Mechanism Using UML

    Institute of Scientific and Technical Information of China (English)

    SUNZhixin; HUANGHaiping; WANGRuchuan

    2004-01-01

    With the development of electronic commerce and agent techniques, multi-mobile agents cooperation can not only improve the efficiency of electronic business trade, but more importantly, it has a comprehensive applicative value in solving the security issues of mobile agent system. This paper firstly describes the mechanism of multi-mobile agents coalition signature aiming at the system security. Subsequently it brings forward a basic architecture of Multi-mobile agents system (MMAS) based on the design pattern of multi-mobile agents. The paper uses the diagrs_rn of UML, such as use case diagram, class diagram and sequence diagram to build the detailed model of the coalition signature and multi-mobile agents cooperation results. Through security analysis, we find that multimobile agents cooperation and interaction can solve some security problems of mobile agents in transfer, and also it can improve the efficiency of business trade. These results indicate that MMAS has a high security performance and can be widely used in E-commerce trade.

  15. Development of a user-friendly system for image processing of electron microscopy by integrating a web browser and PIONE with Eos.

    Science.gov (United States)

    Tsukamoto, Takafumi; Yasunaga, Takuo

    2014-11-01

    Eos (Extensible object-oriented system) is one of the powerful applications for image processing of electron micrographs. In usual cases, Eos works with only character user interfaces (CUI) under the operating systems (OS) such as OS-X or Linux, not user-friendly. Thus, users of Eos need to be expert at image processing of electron micrographs, and have a little knowledge of computer science, as well. However, all the persons who require Eos does not an expert for CUI. Thus we extended Eos to a web system independent of OS with graphical user interfaces (GUI) by integrating web browser.Advantage to use web browser is not only to extend Eos with GUI, but also extend Eos to work under distributed computational environment. Using Ajax (Asynchronous JavaScript and XML) technology, we implemented more comfortable user-interface on web browser. Eos has more than 400 commands related to image processing for electron microscopy, and the usage of each command is different from each other. Since the beginning of development, Eos has managed their user-interface by using the interface definition file of "OptionControlFile" written in CSV (Comma-Separated Value) format, i.e., Each command has "OptionControlFile", which notes information for interface and its usage generation. Developed GUI system called "Zephyr" (Zone for Easy Processing of HYpermedia Resources) also accessed "OptionControlFIle" and produced a web user-interface automatically, because its mechanism is mature and convenient,The basic actions of client side system was implemented properly and can supply auto-generation of web-form, which has functions of execution, image preview, file-uploading to a web server. Thus the system can execute Eos commands with unique options for each commands, and process image analysis. There remain problems of image file format for visualization and workspace for analysis: The image file format information is useful to check whether the input/output file is correct and we also

  16. Electronic cigarette use among cancer patients: Characteristics of e-cigarette users and their smoking cessation outcomes

    Science.gov (United States)

    Borderud, Sarah P.; Li, Yuelin; Burkhalter, Jack; Sheffer, Christine E.; Ostroff, Jamie S.

    2017-01-01

    Background Given that continued smoking after a cancer diagnosis increases the risk for adverse health outcomes, cancer patients are strongly advised to quit. Despite a current lack of evidence regarding their safety and effectiveness as a cessation tool, electronic cigarettes (e-cigarettes) are becoming increasingly popular. In order to guide oncologists’ communication with their patients about e-cigarette use, this paper provides the first published clinical data about e-cigarette use and cessation outcomes among cancer patients. Methods Participants (n=1074) included smokers (cancer patients) who recently enrolled in a tobacco treatment program at a comprehensive cancer center. Standard demographic, tobacco use history and follow-up cessation outcomes were assessed. Results A threefold increase in e-cigarette use was observed from 2012 to 2013 (10.6% vs. 38.5%). E-cigarette users were more nicotine dependent than non-users, had more prior quit attempts, and were more likely to be diagnosed with thoracic and head or neck cancers. Using a complete case analysis, e-cigarette users were as likely to be smoking at follow-up as non-users, (OR: 1.0; 95%CI 0.5–1.7). Using an intention to treat analysis, e-cigarette users were twice as likely to be smoking at follow-up as non-users, (OR: 2.0; 95%CI 1.2–3.3). Conclusions The high rate of e-cigarette use observed is consistent with recent papers highlighting increased e-cigarette use in the general population. Our longitudinal findings raise doubt about the utility of e-cigarettes for facilitating smoking cessation among cancer patients. Further research is needed to evaluate the safety and efficacy of e-cigarettes as a cessation treatment for cancer patients. PMID:25252116

  17. 76 FR 30542 - Adult Signature Services

    Science.gov (United States)

    2011-05-26

    ... POSTAL SERVICE 39 CFR Part 111 Adult Signature Services AGENCY: Postal Service\\TM\\. ACTION: Final..., Domestic Mail Manual (DMM[supreg]) 503.8, to add a new extra service called Adult Signature. This new service has two available options: Adult Signature Required and Adult Signature Restricted Delivery. DATES...

  18. Clinician user involvement in the real world: Designing an electronic tool to improve interprofessional communication and collaboration in a hospital setting.

    Science.gov (United States)

    Tang, Terence; Lim, Morgan E; Mansfield, Elizabeth; McLachlan, Alexander; Quan, Sherman D

    2018-02-01

    User involvement is vital to the success of health information technology implementation. However, involving clinician users effectively and meaningfully in complex healthcare organizations remains challenging. The objective of this paper is to share our real-world experience of applying a variety of user involvement methods in the design and implementation of a clinical communication and collaboration platform aimed at facilitating care of complex hospitalized patients by an interprofessional team of clinicians. We designed and implemented an electronic clinical communication and collaboration platform in a large community teaching hospital. The design team consisted of both technical and healthcare professionals. Agile software development methodology was used to facilitate rapid iterative design and user input. We involved clinician users at all stages of the development lifecycle using a variety of user-centered, user co-design, and participatory design methods. Thirty-six software releases were delivered over 24 months. User involvement has resulted in improvement in user interface design, identification of software defects, creation of new modules that facilitated workflow, and identification of necessary changes to the scope of the project early on. A variety of user involvement methods were complementary and benefited the design and implementation of a complex health IT solution. Combining these methods with agile software development methodology can turn designs into functioning clinical system to support iterative improvement. Copyright © 2017 The Authors. Published by Elsevier B.V. All rights reserved.

  19. Weather and Atmospheric Effects on the Measurement and Use of Electro-Optical Signature Data

    Science.gov (United States)

    2017-02-01

    Signature Data RCC 469-17 February 2017 55 Ontar Corporation markets a software package called PcModWin that has a Windows interface and graphical ... user interface (GUI) allowing the running of MODTRAN on a PC. A software package from AFRL, called PLEXUS, has a Windows interface and GUI. PLEXUS...Table of Figures Figure 1. Electromagnetic Spectrum and a Portion of the Optical Region Limited to 25 µm

  20. Signature of crystal symmetry in positron annihilation data

    International Nuclear Information System (INIS)

    Adam, G.; Adam, S.

    1994-12-01

    While the technique of two-dimensional angular correlation of the electron-positron annihilation radiation (2D-ACAR) yields data in a reference frame related to detectors, data interpretation is made in a reference frame related to the crystal. The paper shows that consistent reformulation of the 2D-ACAR data in the crystal frame can be obtained from the knowledge of the signature of crystal symmetry (SCS) in the data. Derivation of the SCS over variations M-Umklapp areas of the reciprocal lattice from a rigorous definition also results in an improved a posteriori criterion concerning the twinned or untwinned nature of the crystal under investigation. The analysis of a c-projected 2D-ACAR spectrum on Y Ba 2 Cu 3 O 7-δ , accurately establishes the untwinned nature of the used crystals and yields better resolved Fermi surface ridge signatures at 2- and 3- Umklapp processes. (author). 32 refs, 4 figs, 2 tabs

  1. On the Theory and Practice of Personal Digital Signatures

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Mikkelsen, Gert Læssøe

    2009-01-01

    and the PC are not both corrupted at the same time. In other words, our solution cannot be broken by phising or key-logging via the PC. The protocol allows for mobile units with very small computing power by securely outsourcing computation to the PC and also allows usage of any PC that can communicate...... digital signatures on behalf of the user. This protocol is proactively UC-secure assuming at most one player is corrupted in every operational phase. In more practical terms, this means that one can securely sign using terminals (PC’s) that are not necessarily trusted, as long as the mobile unit...

  2. Designing the User Experience for Different User Needs for B2B E-Commerce

    OpenAIRE

    Conde, Mark

    2013-01-01

    In today’s world, more and more companies are doing business with one another electronically; this has lead many of these companies to build online web stores for their customers to make business transactions with. Many of these online stores are out of date and/or lack good user research on how to design a web store to meet the demands of their users while creating a good user experience. This thesis provides several conceptual design ideas on how to create a better  user experience that tak...

  3. Expressiveness considerations of XML signatures

    DEFF Research Database (Denmark)

    Jensen, Meiko; Meyer, Christopher

    2011-01-01

    XML Signatures are used to protect XML-based Web Service communication against a broad range of attacks related to man-in-the-middle scenarios. However, due to the complexity of the Web Services specification landscape, the task of applying XML Signatures in a robust and reliable manner becomes...... more and more challenging. In this paper, we investigate this issue, describing how an attacker can still interfere with Web Services communication even in the presence of XML Signatures. Additionally, we discuss the interrelation of XML Signatures and XML Encryption, focussing on their security...

  4. Digital Signature Schemes with Complementary Functionality and Applications

    OpenAIRE

    S. N. Kyazhin

    2012-01-01

    Digital signature schemes with additional functionality (an undeniable signature, a signature of the designated confirmee, a signature blind, a group signature, a signature of the additional protection) and examples of their application are considered. These schemes are more practical, effective and useful than schemes of ordinary digital signature.

  5. 17 CFR 12.12 - Signature.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Signature. 12.12 Section 12.12... General Information and Preliminary Consideration of Pleadings § 12.12 Signature. (a) By whom. All... document on behalf of another person. (b) Effect. The signature on any document of any person acting either...

  6. High-speed high-security signatures

    NARCIS (Netherlands)

    Bernstein, D.J.; Duif, N.; Lange, T.; Schwabe, P.; Yang, B.Y.

    2011-01-01

    This paper shows that a $390 mass-market quad-core 2.4GHz Intel Westmere (Xeon E5620) CPU can create 108000 signatures per second and verify 71000 signatures per second on an elliptic curve at a 2128 security level. Public keys are 32 bytes, and signatures are 64 bytes. These performance figures

  7. Patterns of electronic cigarette use and user beliefs about their safety and benefits: an internet survey.

    Science.gov (United States)

    Goniewicz, Maciej L; Lingas, Elena O; Hajek, Peter

    2013-03-01

    As the popularity of electronic cigarettes (e-cigarettes) increases, it is becoming important to find out more about the characteristics of e-cigarette users, why and how they use the product and whether e-cigarettes are used exclusively or in combination with conventional cigarettes. The objective of this study was to investigate patterns and effects of e-cigarette use and user beliefs about e-cigarette safety and benefits. E-cigarette users in Poland were recruited online and asked to participate in a web-based survey. The participants provided information on their smoking history, patterns of e-cigarette use, beliefs and attitudes regarding the product and information on concurrent use of conventional cigarettes. The survey was completed by 179 e-cigarette users. Almost all participants used e-cigarettes daily. E-cigarettes were primarily used to quit smoking or to reduce the harm associated with smoking (both 41%), and were successful in helping the surveyed users to achieve these goals with 66% not smoking conventional cigarettes at all and 25% smoking under five cigarettes a day. Most participants (82%) did not think that e-cigarettes were completely safe, but thought that they were less dangerous than conventional cigarettes. Sixty percent believed that e-cigarettes were addictive, but less so than conventional cigarettes. The participants primarily used e-cigarettes as a stop-smoking aid or as an alternative to conventional cigarettes, and the majority reported that they successfully stopped smoking. More data on e-cigarette safety and its efficacy in harm-reduction and smoking cessation are needed. © 2012 Australasian Professional Society on Alcohol and other Drugs.

  8. User requirements and conceptual design of the ITER Electron Cyclotron Control System

    Energy Technology Data Exchange (ETDEWEB)

    Carannante, Giuseppe, E-mail: Giuseppe.Carannante@F4E.europa.eu [Fusion for Energy, Josep Pla 2, Barcelona 08019 (Spain); Cavinato, Mario [Fusion for Energy, Josep Pla 2, Barcelona 08019 (Spain); Gandini, Franco [ITER Organization, Route de Vinon-sur-Verdon, CS 90 046, 13067 St. Paul Lez Durance Cedex (France); Granucci, Gustavo [Istituto di Fisica del Plasma ENEA-CNR-EURATOM, via Cozzi 53, 20125 Milano (Italy); Henderson, Mark; Purohit, Dharmesh [ITER Organization, Route de Vinon-sur-Verdon, CS 90 046, 13067 St. Paul Lez Durance Cedex (France); Saibene, Gabriella; Sartori, Filippo [Fusion for Energy, Josep Pla 2, Barcelona 08019 (Spain); Sozzi, Carlo [Istituto di Fisica del Plasma ENEA-CNR-EURATOM, via Cozzi 53, 20125 Milano (Italy)

    2015-10-15

    The ITER Electron Cyclotron (EC) plant is a complex system, essential for plasma operation. The system is being designed to supply up to 20 MW of power at 170 GHz; it consists of 24 RF sources (or Gyrotrons) connected by switchable transmission lines to four upper and one equatorial launcher. The complexity of the EC plant requires a Plant Controller, which provides the functional and operational interface with CODAC and the Plasma Control System and coordinates the various Subsystem Control Units, i.e. the local controllers of power supplies, Gyrotrons, transmission lines and launchers. A conceptual design of the Electron Cyclotron Control System (ECCS) was developed, starting from the collection of the user requirements, which have then been organized as a set of operational scenarios exploiting the EC system. The design consists in a thorough functional analysis, including also protection functions, and in the development of a conceptual I&C architecture. The main aim of the work was to identify the physics requirements and to translate them into control system requirements, in order to define the interfaces within the components of the ECCS. The definition of these interfaces is urgent because some of the subsystems are already in an advanced design phase. The present paper describes both the methodology used and the resulting design.

  9. Library usage patterns in the electronic information environment. Electronic journals, Use studies, Libraries, Medical libraries

    Directory of Open Access Journals (Sweden)

    B. Franklin

    2004-01-01

    Full Text Available This paper examines the methodology and results from Web-based surveys of more than 15,000 networked electronic services users in the United States between July 1998 and June 2003 at four academic health sciences libraries and two large main campus libraries serving a variety of disciplines. A statistically valid methodology for administering simultaneous Web-based and print-based surveys using the random moments sampling technique is discussed and implemented. Results from the Web-based surveys showed that at the four academic health sciences libraries, there were approximately four remote networked electronic services users for each in-house user. This ratio was even higher for faculty, staff, and research fellows at the academic health sciences libraries, where more than five remote users for each in-house user were recorded. At the two main libraries, there were approximately 1.3 remote users for each in-house user of electronic information. Sponsored research (grant funded research accounted for approximately 32% of the networked electronic services activity at the health sciences libraries and 16% at the main campus libraries. Sponsored researchers at the health sciences libraries appeared to use networked electronic services most intensively from on-campus, but not from in the library. The purpose of use for networked electronic resources by patrons within the library is different from the purpose of use of those resources by patrons using the resources remotely. The implications of these results on how librarians reach decisions about networked electronic resources and services are discussed.

  10. The effects of extrinsic motivation on signature authorship opinions in forensic signature blind trials.

    Science.gov (United States)

    Dewhurst, Tahnee N; Found, Bryan; Ballantyne, Kaye N; Rogers, Doug

    2014-03-01

    Expertise studies in forensic handwriting examination involve comparisons of Forensic Handwriting Examiners' (FHEs) opinions with lay-persons on blind tests. All published studies of this type have reported real and demonstrable skill differences between the specialist and lay groups. However, critics have proposed that any difference shown may be indicative of a lack of motivation on the part of lay participants, rather than a real difference in skill. It has been suggested that qualified FHEs would be inherently more motivated to succeed in blinded validation trials, as their professional reputations could be at risk, should they perform poorly on the task provided. Furthermore, critics suggest that lay-persons would be unlikely to be highly motivated to succeed, as they would have no fear of negative consequences should they perform badly. In an effort to investigate this concern, a blind signature trial was designed and administered to forty lay-persons. Participants were required to compare known (exemplar) signatures of an individual to questioned signatures and asked to express an opinion regarding whether the writer of the known signatures wrote each of the questioned signatures. The questioned signatures comprised a mixture of genuine, disguised and simulated signatures. The forty participants were divided into two separate groupings. Group 'A' were requested to complete the trial as directed and were advised that for each correct answer they would be financially rewarded, for each incorrect answer they would be financially penalized, and for each inconclusive opinion they would receive neither penalty nor reward. Group 'B' was requested to complete the trial as directed, with no mention of financial recompense or penalty. The results of this study do not support the proposition that motivation rather than skill difference is the source of the statistical difference in opinions between individuals' results in blinded signature proficiency trials. Crown

  11. Exotic signatures from supersymmetry

    International Nuclear Information System (INIS)

    Hall, L.J.

    1989-08-01

    Minor changes to the standard supersymmetric model, such as soft flavor violation and R parity violation, cause large changes in the signatures. The origin of these changes and the resulting signatures are discussed. 15 refs., 7 figs., 2 tabs

  12. A framework for evaluating electronic health record vendor user-centered design and usability testing processes.

    Science.gov (United States)

    Ratwani, Raj M; Zachary Hettinger, A; Kosydar, Allison; Fairbanks, Rollin J; Hodgkins, Michael L

    2017-04-01

    Currently, there are few resources for electronic health record (EHR) purchasers and end users to understand the usability processes employed by EHR vendors during product design and development. We developed a framework, based on human factors literature and industry standards, to systematically evaluate the user-centered design processes and usability testing methods used by EHR vendors. We reviewed current usability certification requirements and the human factors literature to develop a 15-point framework for evaluating EHR products. The framework is based on 3 dimensions: user-centered design process, summative testing methodology, and summative testing results. Two vendor usability reports were retrieved from the Office of the National Coordinator's Certified Health IT Product List and were evaluated using the framework. One vendor scored low on the framework (5 pts) while the other vendor scored high on the framework (15 pts). The 2 scored vendor reports demonstrate the framework's ability to discriminate between the variabilities in vendor processes and to determine which vendors are meeting best practices. The framework provides a method to more easily comprehend EHR vendors' usability processes and serves to highlight where EHR vendors may be falling short in terms of best practices. The framework provides a greater level of transparency for both purchasers and end users of EHRs. The framework highlights the need for clearer certification requirements and suggests that the authorized certification bodies that examine vendor usability reports may need to be provided with clearer guidance. © The Author 2016. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  13. Anything but engaged: user involvement in the context of a national electronic health record implementation.

    Science.gov (United States)

    Cresswell, Kathrin; Morrison, Zoe; Crowe, Sarah; Robertson, Ann; Sheikh, Aziz

    2011-01-01

    The absence of meaningful end user engagement has repeatedly been highlighted as a key factor contributing to 'failed' implementations of electronic health records (EHRs), but achieving this is particularly challenging in the context of national scale initiatives. In 2002, the National Health Service (NHS) embarked on a so-called 'top-down' national implementation strategy aimed at introducing commercial, centrally procured, EHRs into hospitals throughout England. We aimed to examine approaches to, and experiences of, user engagement in the context of a large-scale EHR implementation across purposefully selected hospital care providers implementing early versions of nationally procured software. We conducted a qualitative, case-study based, socio-technically informed, longitudinal investigation, purposefully sampling and collecting data from four hospitals. Our data comprised a total of 123 semi-structured interviews with users and managers, 15 interviews with additional stakeholders, 43 hours of non-participant observations of meetings and system use, and relevant organisation-specific documents from each case study site. Analysis was thematic, building on an existing model of user engagement that was originally developed in the context of studying the implementation of relatively simple technologies in commercial settings. NVivo8 software was used to facilitate coding. Despite an enduring commitment to the vision of shared EHRs and an appreciation of their potential benefits, meaningful end user engagement was never achieved. Hospital staff were not consulted in systems choice, leading to frustration; they were then further alienated by the implementation of systems that they perceived as inadequately customised. Various efforts to achieve local engagement were attempted, but these were in effect risk mitigation strategies. We found the role of clinical champions to be important in these engagement efforts, but progress was hampered by the hierarchical structures

  14. A Directed Signature Scheme and its Applications

    OpenAIRE

    Lal, Sunder; Kumar, Manoj

    2004-01-01

    This paper presents a directed signature scheme with the property that the signature can be verified only with the help of signer or signature receiver. We also propose its applications to share verification of signatures and to threshold cryptosystems.

  15. A study of user requests regarding the fully electronic health record system at Seoul National University Bundang Hospital: challenges for future electronic health record systems.

    Science.gov (United States)

    Yoo, Sooyoung; Kim, Seok; Lee, Seungja; Lee, Kee-Hyuck; Baek, Rong-Min; Hwang, Hee

    2013-05-01

    Although the adoption rates for Electronic Health Records (EHRs) are growing, significant opportunities for further advances in EHR system design remain. The goal of this study was to identify issues that should be considered in the design process for the successful development of future systems by analyzing end users' service requests gathered during a recent three-year period after a comprehensive EHR system was implemented at Seoul National University's Bundang Hospital in South Korea. Data on 11,400 service requests from end users of the EHR system made from 2008 through 2010 were used in this study. The requests were categorized as program modification/development, data request, insurance-fee identification/generation, patient-record merging, or other. The authors further subcategorized the requests for program modification/development into the following nine areas of concern: (1) indicators and statistics, (2) patient safety and quality of care, (3) special task-oriented functionalities, (4) ease of use and user interface, (5) system speed, (6) interoperability and integration, (7) privacy and security, (8) customer service, and (9) miscellaneous. The system users were divided into four groups--direct care, care support, administrative/insurance, and general management--to identify each group's needs and concerns. The service requests for program modification/development, data request, insurance-fee identification/generation, patient-record merging, and other issues constituted approximately 49.2%, 33.9%, 11.4%, 4.0%, and 1.5% of the total data set, respectively. The number of data-request service requests grew over the three years studied. Different groups of users were found to have different concerns according to their activities and tasks. Within the program-modification/development category, end users were most frequently concerned with ease of use and user interface (38.1% of the total) and special task-oriented functionalities (29.3% of the total) in

  16. On reliable discovery of molecular signatures

    Directory of Open Access Journals (Sweden)

    Björkegren Johan

    2009-01-01

    Full Text Available Abstract Background Molecular signatures are sets of genes, proteins, genetic variants or other variables that can be used as markers for a particular phenotype. Reliable signature discovery methods could yield valuable insight into cell biology and mechanisms of human disease. However, it is currently not clear how to control error rates such as the false discovery rate (FDR in signature discovery. Moreover, signatures for cancer gene expression have been shown to be unstable, that is, difficult to replicate in independent studies, casting doubts on their reliability. Results We demonstrate that with modern prediction methods, signatures that yield accurate predictions may still have a high FDR. Further, we show that even signatures with low FDR may fail to replicate in independent studies due to limited statistical power. Thus, neither stability nor predictive accuracy are relevant when FDR control is the primary goal. We therefore develop a general statistical hypothesis testing framework that for the first time provides FDR control for signature discovery. Our method is demonstrated to be correct in simulation studies. When applied to five cancer data sets, the method was able to discover molecular signatures with 5% FDR in three cases, while two data sets yielded no significant findings. Conclusion Our approach enables reliable discovery of molecular signatures from genome-wide data with current sample sizes. The statistical framework developed herein is potentially applicable to a wide range of prediction problems in bioinformatics.

  17. Reasons for using flavored liquids among electronic cigarette users: A concept mapping study.

    Science.gov (United States)

    Soule, Eric K; Lopez, Alexa A; Guy, Mignonne C; Cobb, Caroline O

    2016-09-01

    Electronic cigarettes (ECIGs) aerosolize liquids often containing flavorants for inhalation. Few studies have examined the role of flavors in ECIG use. This study's purpose was to examine reasons for flavored ECIG use using a mixed-method approach, concept mapping (CM). Forty-six past 30-day adult ECIG users recruited from vape forums/conferences completed three online CM tasks. Participants brainstormed responses to a prompt: "A specific reason I use flavored e-liquid in my electronic cigarette product is…". The final 107 brainstormed statements were sorted by participants into groups of similar content. Participants rated each statement on a 7-point scale (1-Definitely NOT a reason to 7-Definitely a reason) based on a prompt: "This is a specific reason why I used flavored e-liquid in my electronic cigarette product in the past month." A cluster map was generated from participants' sorting and ratings using CM statistical software. Cluster mean ratings were compared. Analysis revealed five clusters of reasons for flavored ECIG use including Increased Satisfaction/Enjoyment, Better Feel/Taste than Cigarettes, Variety/Customization, Food Craving Suppression, and Social Impacts. Statements in the Increased Satisfaction/Enjoyment and Better Feel/Taste than Cigarettes clusters were rated significantly higher than statements from other clusters (psincrease the rewarding and possible addictive effects of ECIGs. These results support continued examination of the role of flavors and ECIG use behaviors. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  18. Characterization of geostationary particle signatures based on the 'injection boundary' model

    International Nuclear Information System (INIS)

    Mauk, B.H.; Meng, C.

    1983-01-01

    To lend further support to the 'injection boundary' concept, this paper characterizes the details of geostationary particle signatures using a very simple-minded analysis procedure. The signatures are generated using the time of flight effects which evolve from an initial sharply defined, double-spiraled boundary configuration. By using only the most fundamental characteristics of standard convection configurations, the very complex and highly variable dispersion patterns frequently observed by geostationary satellites are successfully reproduced. In particular, seven distinctly different ion-electron paired dispersion patterns on energy versus time spectrograms (1 eV to 100 KeV) are predicted, and all seven of these are observed on a regular basis by both the SCATHA satellite (in the near geostationary orbit) and the ATS-6 satellite. Many of the details of the patterns have not been previously presented. It is concluded that most dynamical dispersion features (including energetic ion and electron echoes) can be mapped to the double-spiral boundary without further ad hoc assumptions. It is shown further that the predicted and observed dispersion patterns have symmetries which are distinct from the symmetries generally associated with the quasistationary particle convection patterns

  19. Real time gamma-ray signature identifier

    Science.gov (United States)

    Rowland, Mark [Alamo, CA; Gosnell, Tom B [Moraga, CA; Ham, Cheryl [Livermore, CA; Perkins, Dwight [Livermore, CA; Wong, James [Dublin, CA

    2012-05-15

    A real time gamma-ray signature/source identification method and system using principal components analysis (PCA) for transforming and substantially reducing one or more comprehensive spectral libraries of nuclear materials types and configurations into a corresponding concise representation/signature(s) representing and indexing each individual predetermined spectrum in principal component (PC) space, wherein an unknown gamma-ray signature may be compared against the representative signature to find a match or at least characterize the unknown signature from among all the entries in the library with a single regression or simple projection into the PC space, so as to substantially reduce processing time and computing resources and enable real-time characterization and/or identification.

  20. Dependence levels in users of electronic cigarettes, nicotine gums and tobacco cigarettes.

    Science.gov (United States)

    Etter, Jean-François; Eissenberg, Thomas

    2015-02-01

    To assess dependence levels in users of e-cigarettes, and compare them with dependence levels in users of nicotine gums and tobacco cigarettes. Self-reports from cross-sectional Internet and mail surveys. Comparisons of: (a) 766 daily users of nicotine-containing e-cigarettes with 30 daily users of nicotine-free e-cigarettes; (b) 911 former smokers who used the e-cigarette daily with 451 former smokers who used the nicotine gum daily (but no e-cigarette); (c) 125 daily e-cigarette users who smoked daily (dual users) with two samples of daily smokers who did not use e-cigarettes (2206 enrolled on the Internet and 292 enrolled by mail from the general population of Geneva). We used the Fagerström test for nicotine dependence, the nicotine dependence syndrome scale, the cigarette dependence scale and versions of these scales adapted for e-cigarettes and nicotine gums. Dependence ratings were slightly higher in users of nicotine-containing e-cigarettes than in users of nicotine-free e-cigarettes. In former smokers, long-term (>3 months) users of e-cigarettes were less dependent on e-cigarettes than long-term users of the nicotine gum were dependent on the gum. There were few differences in dependence ratings between short-term (≤3 months) users of gums or e-cigarettes. Dependence on e-cigarettes was generally lower in dual users than dependence on tobacco cigarettes in the two other samples of daily smokers. Some e-cigarette users were dependent on nicotine-containing e-cigarettes, but these products were less addictive than tobacco cigarettes. E-cigarettes may be as or less addictive than nicotine gums, which themselves are not very addictive. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  1. Search for New Physics through the Reconstruction of Challenging and Long-Lived Signatures with the ATLAS detector $\\sqrt{s}$ = 13 TeV

    CERN Document Server

    Pettersson, Nora Emilia; The ATLAS collaboration

    2017-01-01

    Many theories of beyond the Standard Model (BSM) physics predict unique signatures which are difficult to reconstruct and the background rates are also a challenge. Signatures from displaced vertices anywhere from the inner detector to the muon spectrometer as well as those of new particles with fractional or multiple value of the charge of the electron or high mass stable charged particles are experimentally demanding signatures. The results of searches using data collected by the ATLAS detector of √s = 13 TeV pp collision is presented.

  2. Development of SuperHERO readout electronics

    Data.gov (United States)

    National Aeronautics and Space Administration — Next-generation solar hard X-ray (HXR) imagers will make high-sensitivity, high-dynamic-range observations of the signatures of accelerated electrons in solar...

  3. Levels of saliva cotinine in electronic cigarette users.

    Science.gov (United States)

    Etter, Jean-François

    2014-05-01

    To assess saliva cotinine levels in experienced users of e-cigarettes ('vapers'). An internet survey in 2011 and 2012, with collection of saliva vials by mail. Participants were 71 users of e-cigarettes enrolled mainly on websites and online forums dedicated to e-cigarettes. Use of e-cigarettes, tobacco and nicotine medications. Collection of saliva by mail and analysis of cotinine by liquid chromatography-mass spectrometry. Most participants (89%) were former smokers, most (92%) were using e-cigarettes daily, had been using e-cigarettes for 12 months on average and puffed a median of 150 times per day on their e-cigarettes [mean = 220 puffs/day, 95% confidence interval (CI) = 169-271]. The median concentration of nicotine in refill liquids was 16 mg/ml (mean = 16.4, 95% CI = 14.5-18.3). In the 62 e-cigarette users who, in the past 5 days, had not used any tobacco or nicotine medications, the median cotinine level was 353 ng/ml (mean = 374, 95% CI = 318-429), the correlation between cotinine and nicotine concentration in e-liquids was r = 0.33 (P = 0.013), and the correlation between cotinine and the number of cigarettes smoked per day before quitting smoking was r = 0.48 (P Addiction.

  4. 27 CFR 73.31 - May I submit forms electronically to TTB?

    Science.gov (United States)

    2010-04-01

    ... TRADE BUREAU, DEPARTMENT OF THE TREASURY (CONTINUED) PROCEDURES AND PRACTICES ELECTRONIC SIGNATURES; ELECTRONIC SUBMISSION OF FORMS Electronic Filing of Documents with TTB § 73.31 May I submit forms electronically to TTB? Yes; you may submit an electronic form, instead of a paper form, to satisfy any reporting...

  5. 42 CFR 424.36 - Signature requirements.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Signature requirements. 424.36 Section 424.36... (CONTINUED) MEDICARE PROGRAM CONDITIONS FOR MEDICARE PAYMENT Claims for Payment § 424.36 Signature requirements. (a) General rule. The beneficiary's own signature is required on the claim unless the beneficiary...

  6. Unsupervised signature extraction from forensic logs

    NARCIS (Netherlands)

    Thaler, S.M.; Menkovski, V.; Petkovic, M.; Altun, Y.; Das, K.; Mielikäinen, T.; Malerba, D.; Stefanowski, J.; Read, J.; Žitnik, M.; Ceci, M.

    2017-01-01

    Signature extraction is a key part of forensic log analysis. It involves recognizing patterns in log lines such that log lines that originated from the same line of code are grouped together. A log signature consists of immutable parts and mutable parts. The immutable parts define the signature, and

  7. Retail applications of signature verification

    Science.gov (United States)

    Zimmerman, Thomas G.; Russell, Gregory F.; Heilper, Andre; Smith, Barton A.; Hu, Jianying; Markman, Dmitry; Graham, Jon E.; Drews, Clemens

    2004-08-01

    The dramatic rise in identity theft, the ever pressing need to provide convenience in checkout services to attract and retain loyal customers, and the growing use of multi-function signature captures devices in the retail sector provides favorable conditions for the deployment of dynamic signature verification (DSV) in retail settings. We report on the development of a DSV system to meet the needs of the retail sector. We currently have a database of approximately 10,000 signatures collected from 600 subjects and forgers. Previous work at IBM on DSV has been merged and extended to achieve robust performance on pen position data available from commercial point of sale hardware, achieving equal error rates on skilled forgeries and authentic signatures of 1.5% to 4%.

  8. User interface design of electronic appliances

    CERN Document Server

    Baumann, Konrad

    2002-01-01

    Foreword by Brenda Laurel. Part One: Introduction 1. Background, Bruce Thomas 2. Introduction, Konrad Baumann 3. The Interaction Design Process, Georg Rakers Part Two: User Interface Design 4. Creativity Techniques, Irene Mavrommati 5. Design Principals, Irene Mavrommati and Adrian Martel 6. Design of On-Screen Interfaces, Irene Mavrommati Part Three: Input Devices 7. Controls, Konrad Baumann 8. Keyboards, Konrad Baumann 9. Advanced Interaction Techniques, Christopher Baber and Konrad Baumann 10. Speech Control, Christopher Baber and Jan Noyes 11. Wearable Computers, Christopher Baber Part Fou

  9. Search for an mSUGRA signature in the electron + jets + missing transverse energy final state in $p\\bar{p}$ collisions at √s = 1.8TeV

    Energy Technology Data Exchange (ETDEWEB)

    Zhou, Zhang [Iowa State Univ., Ames, IA (United States)

    2001-01-01

    We describe a search for a Minimal Supergravity (mSUGRA) signature in Run 1 data taken by the D detector at the Fermilab Tevatron from 1995-1996. The total data luminosity is 92.7 pb-1. The data were examined for events with a single electron, four or more jets and large missing transverse energy. The major backgrounds are from W+jets, QCD, t$\\bar{t}$, and WW events. We observed no excess of events in our data. Based on the data and the expected signal rate we obtain new limits on new physics in terms of mSUGRA model parameters.

  10. 7 CFR 718.9 - Signature requirements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Signature requirements. 718.9 Section 718.9... MULTIPLE PROGRAMS General Provisions § 718.9 Signature requirements. (a) When a program authorized by this chapter or Chapter XIV of this title requires the signature of a producer; landowner; landlord; or tenant...

  11. 27 CFR 17.6 - Signature authority.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Signature authority. 17.6... PRODUCTS General Provisions § 17.6 Signature authority. No claim, bond, tax return, or other required... other proper notification of signature authority has been filed with the TTB office where the required...

  12. Converting hard copy documents for electronic dissemination

    Energy Technology Data Exchange (ETDEWEB)

    Hoffman, F.

    1994-12-31

    Since the advent of computer systems, the goal of a paperless office, and even a paperless society, has been pursued. While the normal paper flow in an organization is far from totally automated, particularly for items requiring signatures or authorizations, electronic information dissemination is becoming an almost simple task. The reasons for providing on-line documents are many and include faster and easier access for everyone, elimination of printing costs, reduction of wasted shelf and desk space, and the security of having a centrally-located, always up-to-date document. New computer software even provides the user with the ability to annotate documents and to have bookmarks so that the old scribbled-in and dog-eared manual can be replaced without loosing this `customizability`. Moreover, new hypermedia capabilities mean that documents can be read in a non-linear fashion and can include color figures and photographs, audio, and even animation sequences, capabilities which exceed those of paper. The proliferation of network-based information servers, coupled with the growth of the Internet, has enticed academic, governmental, and even commercial organizations to provide increasing numbers of documents and data bases in electronic form via the network, not just to internal staff, but to the public as well. Much of this information, which includes everything from mundane company procedures to spiffy marketing brochures, was previously published only in hard copy. Converting existing documents to electronic form and producing only electronic versions of new documents poses some interesting challenges to the maintainer or author.

  13. 48 CFR 804.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... signature. 804.101 Section 804.101 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS GENERAL ADMINISTRATIVE MATTERS Contract Execution 804.101 Contracting officer's signature. (a) If a... signature. ...

  14. End-user support for a primary care electronic medical record: a qualitative case study of a vendor’s perspective

    Directory of Open Access Journals (Sweden)

    Aviv Shachak

    2013-05-01

    Full Text Available Background In primary care settings, users often rely on vendors to provide support for health information technology (HIT. Yet, little is known about the vendors’ perspectives on the support they provide, how support personnel perceive their roles, the challenges they face and the ways they deal with them.Objective To provide in-depth insight into an electronic-medical record (EMR vendor’s perspective on end-user support.Methods As part of a larger case study research, we conducted nine semi-structured interviews with help desk staff, trainers and service managers of an EMR vendor, and observed two training sessions of a new client.Results With a growing client base, the vendor faced challenges of support staff shortage and high variance in users’ technical knowledge. Additionally, users sometimes needed assistance with infrastructure, and not just software problems. These challenges sometimes hindered the provision of timely support and required supporters to possess good interpersonal skills and adapt to diverse client population.Conclusion This study highlights the complexity of providing end-user support for HIT. With increased adoption, other vendors are likely to face similar challenges. To deal with these issues, supporters need not only strong technical knowledge of the systems, but also good interpersonal communication skills. Some responsibilities may be delegated to super-users. Users may find it useful to hire local IT staff, at least on an on-call basis, to provide assistance with infrastructure problems, which are not supported by the software vendor. Vendors may consider expanding their service packages to cover these elements.

  15. User-composable Electronic Health Record Improves Efficiency of Clinician Data Viewing for Patient Case Appraisal: A Mixed-Methods Study.

    Science.gov (United States)

    Senathirajah, Yalini; Kaufman, David; Bakken, Suzanne

    2016-01-01

    Challenges in the design of electronic health records (EHRs) include designing usable systems that must meet the complex, rapidly changing, and high-stakes information needs of clinicians. The ability to move and assemble elements together on the same page has significant human-computer interaction (HCI) and efficiency advantages, and can mitigate the problems of negotiating multiple fixed screens and the associated cognitive burdens. We compare MedWISE-a novel EHR that supports user-composable displays-with a conventional EHR in terms of the number of repeat views of data elements for patient case appraisal. The study used mixed-methods for examination of clinical data viewing in four patient cases. The study compared use of an experimental user-composable EHR with use of a conventional EHR, for case appraisal. Eleven clinicians used a user-composable EHR in a case appraisal task in the laboratory setting. This was compared with log file analysis of the same patient cases in the conventional EHR. We investigated the number of repeat views of the same clinical information during a session and across these two contexts, and compared them using Fisher's exact test. There was a significant difference (puser-composable EHR (14.6 percent) and conventional EHR (72.6 percent). Users of conventional EHRs repeatedly viewed the same information elements in the same session, as revealed by log files. Our findings are consistent with the hypothesis that conventional systems require that the user view many screens and remember information between screens, causing the user to forget information and to have to access the information a second time. Other mechanisms (such as reduction in navigation over a population of users due to interface sharing, and information selection) may also contribute to increased efficiency in the experimental system. Systems that allow a composable approach that enables the user to gather together on the same screen any desired information elements

  16. Xyce Parallel Electronic Simulator Users Guide Version 6.2.

    Energy Technology Data Exchange (ETDEWEB)

    Keiter, Eric R.; Mei, Ting; Russo, Thomas V.; Schiek, Richard Louis; Sholander, Peter E.; Thornquist, Heidi K.; Verley, Jason C.; Baur, David Gregory

    2014-09-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been de- signed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas: Capability to solve extremely large circuit problems by supporting large-scale parallel com- puting platforms (up to thousands of processors). This includes support for most popular parallel and serial computers. A differential-algebraic-equation (DAE) formulation, which better isolates the device model package from solver algorithms. This allows one to develop new types of analysis without requiring the implementation of analysis-specific device models. Device models that are specifically tailored to meet Sandia's needs, including some radiation- aware devices (for Sandia users only). Object-oriented code design and implementation using modern coding practices. Xyce is a parallel code in the most general sense of the phrase -- a message passing parallel implementation -- which allows it to run efficiently a wide range of computing platforms. These include serial, shared-memory and distributed-memory parallel platforms. Attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows. Trademarks The information herein is subject to change without notice. Copyright c 2002-2014 Sandia Corporation. All rights reserved. Xyce TM Electronic Simulator and Xyce TM are trademarks of Sandia Corporation. Portions of the Xyce TM code are: Copyright c 2002, The Regents of the University of California. Produced at the Lawrence Livermore National Laboratory. Written by Alan Hindmarsh, Allan Taylor, Radu Serban. UCRL-CODE-2002-59 All rights reserved. Orcad, Orcad Capture, PSpice and Probe are

  17. Xyce Parallel Electronic Simulator Users Guide Version 6.4

    Energy Technology Data Exchange (ETDEWEB)

    Keiter, Eric R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mei, Ting [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Russo, Thomas V. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Schiek, Richard [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sholander, Peter E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Thornquist, Heidi K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Verley, Jason [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Baur, David Gregory [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-12-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been de- signed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas: Capability to solve extremely large circuit problems by supporting large-scale parallel com- puting platforms (up to thousands of processors). This includes support for most popular parallel and serial computers. A differential-algebraic-equation (DAE) formulation, which better isolates the device model package from solver algorithms. This allows one to develop new types of analysis without requiring the implementation of analysis-specific device models. Device models that are specifically tailored to meet Sandia's needs, including some radiation- aware devices (for Sandia users only). Object-oriented code design and implementation using modern coding practices. Xyce is a parallel code in the most general sense of the phrase -- a message passing parallel implementation -- which allows it to run efficiently a wide range of computing platforms. These include serial, shared-memory and distributed-memory parallel platforms. Attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows. Trademarks The information herein is subject to change without notice. Copyright c 2002-2015 Sandia Corporation. All rights reserved. Xyce TM Electronic Simulator and Xyce TM are trademarks of Sandia Corporation. Portions of the Xyce TM code are: Copyright c 2002, The Regents of the University of California. Produced at the Lawrence Livermore National Laboratory. Written by Alan Hindmarsh, Allan Taylor, Radu Serban. UCRL-CODE-2002-59 All rights reserved. Orcad, Orcad Capture, PSpice and Probe are

  18. Perancangan Aplikasi Undeniable Digital Signature Dengan Algoritma Chaum’s Blind Signature

    OpenAIRE

    Simanjuntak, Martin Dennain

    2012-01-01

    Desperaty need a securiry system in the exchange of information via computer media, so that information can not be accessed by unauthorized parties. One of the security system is to use a system of digital signatures as a means of authenticating the authenticity of digital document that are exchanged. By using a digital a digital signature system is undeniable, the security system can be generated digital document exchange, where the system is free from the from of rejection...

  19. Practical quantum digital signature

    Science.gov (United States)

    Yin, Hua-Lei; Fu, Yao; Chen, Zeng-Bing

    2016-03-01

    Guaranteeing nonrepudiation, unforgeability as well as transferability of a signature is one of the most vital safeguards in today's e-commerce era. Based on fundamental laws of quantum physics, quantum digital signature (QDS) aims to provide information-theoretic security for this cryptographic task. However, up to date, the previously proposed QDS protocols are impractical due to various challenging problems and most importantly, the requirement of authenticated (secure) quantum channels between participants. Here, we present the first quantum digital signature protocol that removes the assumption of authenticated quantum channels while remaining secure against the collective attacks. Besides, our QDS protocol can be practically implemented over more than 100 km under current mature technology as used in quantum key distribution.

  20. 25 CFR 213.10 - Lessor's signature.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Lessor's signature. 213.10 Section 213.10 Indians BUREAU... MEMBERS OF FIVE CIVILIZED TRIBES, OKLAHOMA, FOR MINING How to Acquire Leases § 213.10 Lessor's signature... thumbprint which shall be designated as “right” or “left” thumbmark. Such signatures must be witnessed by two...

  1. Initial Semantics for Strengthened Signatures

    Directory of Open Access Journals (Sweden)

    André Hirschowitz

    2012-02-01

    Full Text Available We give a new general definition of arity, yielding the companion notions of signature and associated syntax. This setting is modular in the sense requested by Ghani and Uustalu: merging two extensions of syntax corresponds to building an amalgamated sum. These signatures are too general in the sense that we are not able to prove the existence of an associated syntax in this general context. So we have to select arities and signatures for which there exists the desired initial monad. For this, we follow a track opened by Matthes and Uustalu: we introduce a notion of strengthened arity and prove that the corresponding signatures have initial semantics (i.e. associated syntax. Our strengthened arities admit colimits, which allows the treatment of the λ-calculus with explicit substitution.

  2. Spectral signature selection for mapping unvegetated soils

    Science.gov (United States)

    May, G. A.; Petersen, G. W.

    1975-01-01

    Airborne multispectral scanner data covering the wavelength interval from 0.40-2.60 microns were collected at an altitude of 1000 m above the terrain in southeastern Pennsylvania. Uniform training areas were selected within three sites from this flightline. Soil samples were collected from each site and a procedure developed to allow assignment of scan line and element number from the multispectral scanner data to each sampling location. These soil samples were analyzed on a spectrophotometer and laboratory spectral signatures were derived. After correcting for solar radiation and atmospheric attenuation, the laboratory signatures were compared to the spectral signatures derived from these same soils using multispectral scanner data. Both signatures were used in supervised and unsupervised classification routines. Computer-generated maps using the laboratory and multispectral scanner derived signatures resulted in maps that were similar to maps resulting from field surveys. Approximately 90% agreement was obtained between classification maps produced using multispectral scanner derived signatures and laboratory derived signatures.

  3. Genome signature analysis of thermal virus metagenomes reveals Archaea and thermophilic signatures.

    Science.gov (United States)

    Pride, David T; Schoenfeld, Thomas

    2008-09-17

    Metagenomic analysis provides a rich source of biological information for otherwise intractable viral communities. However, study of viral metagenomes has been hampered by its nearly complete reliance on BLAST algorithms for identification of DNA sequences. We sought to develop algorithms for examination of viral metagenomes to identify the origin of sequences independent of BLAST algorithms. We chose viral metagenomes obtained from two hot springs, Bear Paw and Octopus, in Yellowstone National Park, as they represent simple microbial populations where comparatively large contigs were obtained. Thermal spring metagenomes have high proportions of sequences without significant Genbank homology, which has hampered identification of viruses and their linkage with hosts. To analyze each metagenome, we developed a method to classify DNA fragments using genome signature-based phylogenetic classification (GSPC), where metagenomic fragments are compared to a database of oligonucleotide signatures for all previously sequenced Bacteria, Archaea, and viruses. From both Bear Paw and Octopus hot springs, each assembled contig had more similarity to other metagenome contigs than to any sequenced microbial genome based on GSPC analysis, suggesting a genome signature common to each of these extreme environments. While viral metagenomes from Bear Paw and Octopus share some similarity, the genome signatures from each locale are largely unique. GSPC using a microbial database predicts most of the Octopus metagenome has archaeal signatures, while bacterial signatures predominate in Bear Paw; a finding consistent with those of Genbank BLAST. When using a viral database, the majority of the Octopus metagenome is predicted to belong to archaeal virus Families Globuloviridae and Fuselloviridae, while none of the Bear Paw metagenome is predicted to belong to archaeal viruses. As expected, when microbial and viral databases are combined, each of the Octopus and Bear Paw metagenomic contigs

  4. Electronic health record usability: analysis of the user-centered design processes of eleven electronic health record vendors.

    Science.gov (United States)

    Ratwani, Raj M; Fairbanks, Rollin J; Hettinger, A Zachary; Benda, Natalie C

    2015-11-01

    The usability of electronic health records (EHRs) continues to be a point of dissatisfaction for providers, despite certification requirements from the Office of the National Coordinator that require EHR vendors to employ a user-centered design (UCD) process. To better understand factors that contribute to poor usability, a research team visited 11 different EHR vendors in order to analyze their UCD processes and discover the specific challenges that vendors faced as they sought to integrate UCD with their EHR development. Our analysis demonstrates a diverse range of vendors' UCD practices that fall into 3 categories: well-developed UCD, basic UCD, and misconceptions of UCD. Specific challenges to practicing UCD include conducting contextually rich studies of clinical workflow, recruiting participants for usability studies, and having support from leadership within the vendor organization. The results of the study provide novel insights for how to improve usability practices of EHR vendors. © The Author 2015. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  5. Signatures de l'invisible

    CERN Multimedia

    CERN Press Office. Geneva

    2000-01-01

    "Signatures of the Invisible" is an unique collaboration between contemporary artists and contemporary physicists which has the potential to help redefine the relationship between science and art. "Signatures of the Invisible" is jointly organised by the London Institute - the world's largest college of art and design and CERN*, the world's leading particle physics laboratory. 12 leading visual artists:

  6. Methods of Generating Key Sequences Based on Parameters of Handwritten Passwords and Signatures

    Directory of Open Access Journals (Sweden)

    Pavel Lozhnikov

    2016-10-01

    Full Text Available The modern encryption methods are reliable if strong keys (passwords are used, but the human factor issue cannot be solved by cryptographic methods. The best variant is binding all authenticators (passwords, encryption keys, and others to the identities. When a user is authenticated by biometrical characteristics, the problem of protecting a biometrical template stored on a remote server becomes a concern. The paper proposes several methods of generating keys (passwords by means of the fuzzy extractors method based on signature parameters without storing templates in an open way.

  7. A group signature scheme based on quantum teleportation

    International Nuclear Information System (INIS)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu

    2010-01-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  8. A group signature scheme based on quantum teleportation

    Energy Technology Data Exchange (ETDEWEB)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu, E-mail: wxjun36@gmail.co [Information Countermeasure Technique Research Institute, Harbin Institute of Technology, Harbin 150001 (China)

    2010-05-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  9. Relativistic electron dropout echoes induced by interplanetary shocks

    Science.gov (United States)

    Schiller, Q.; Kanekal, S. G.; Boyd, A. J.; Baker, D. N.; Blake, J. B.; Spence, H. E.

    2017-12-01

    Interplanetary shocks that impact Earth's magnetosphere can produce immediate and dramatic responses in the trapped relativistic electron population. One well-studied response is a prompt injection capable of transporting relativistic electrons deep into the magnetosphere and accelerating them to multi-MeV energies. The converse effect, electron dropout echoes, are observations of a sudden dropout of electron fluxes observed after the interplanetary shock arrival. Like the injection echo signatures, dropout echoes can also show clear energy dispersion signals. They are of particular interest because they have only recently been observed and their causal mechanism is not well understood. In the analysis presented here, we show observations of electron drift echo signatures from the Relativistic Electron-Proton Telescope (REPT) and Magnetic Electron and Ion Sensors (MagEIS) onboard NASA's Van Allen Probes mission, which show simultaneous prompt enhancements and dropouts within minutes of the associated with shock impact. We show that the observations associated with both enhancements and dropouts are explained by the inward motion caused by the electric field impulse induced by the interplanetary shock, and either energization to cause the enhancement, or lack of a seed population to cause the dropout.

  10. Maximizing biomarker discovery by minimizing gene signatures

    Directory of Open Access Journals (Sweden)

    Chang Chang

    2011-12-01

    Full Text Available Abstract Background The use of gene signatures can potentially be of considerable value in the field of clinical diagnosis. However, gene signatures defined with different methods can be quite various even when applied the same disease and the same endpoint. Previous studies have shown that the correct selection of subsets of genes from microarray data is key for the accurate classification of disease phenotypes, and a number of methods have been proposed for the purpose. However, these methods refine the subsets by only considering each single feature, and they do not confirm the association between the genes identified in each gene signature and the phenotype of the disease. We proposed an innovative new method termed Minimize Feature's Size (MFS based on multiple level similarity analyses and association between the genes and disease for breast cancer endpoints by comparing classifier models generated from the second phase of MicroArray Quality Control (MAQC-II, trying to develop effective meta-analysis strategies to transform the MAQC-II signatures into a robust and reliable set of biomarker for clinical applications. Results We analyzed the similarity of the multiple gene signatures in an endpoint and between the two endpoints of breast cancer at probe and gene levels, the results indicate that disease-related genes can be preferably selected as the components of gene signature, and that the gene signatures for the two endpoints could be interchangeable. The minimized signatures were built at probe level by using MFS for each endpoint. By applying the approach, we generated a much smaller set of gene signature with the similar predictive power compared with those gene signatures from MAQC-II. Conclusions Our results indicate that gene signatures of both large and small sizes could perform equally well in clinical applications. Besides, consistency and biological significances can be detected among different gene signatures, reflecting the

  11. Lattice-Based Revocable Certificateless Signature

    Directory of Open Access Journals (Sweden)

    Ying-Hao Hung

    2017-10-01

    Full Text Available Certificateless signatures (CLS are noticeable because they may resolve the key escrow problem in ID-based signatures and break away the management problem regarding certificate in conventional signatures. However, the security of the mostly previous CLS schemes relies on the difficulty of solving discrete logarithm or large integer factorization problems. These two problems would be solved by quantum computers in the future so that the signature schemes based on them will also become insecure. For post-quantum cryptography, lattice-based cryptography is significant due to its efficiency and security. However, no study on addressing the revocation problem in the existing lattice-based CLS schemes is presented. In this paper, we focus on the revocation issue and present the first revocable CLS (RCLS scheme over lattices. Based on the short integer solution (SIS assumption over lattices, the proposed lattice-based RCLS scheme is shown to be existential unforgeability against adaptive chosen message attacks. By performance analysis and comparisons, the proposed lattice-based RCLS scheme is better than the previously proposed lattice-based CLS scheme, in terms of private key size, signature length and the revocation mechanism.

  12. General Conversion for Obtaining Strongly Existentially Unforgeable Signatures

    Science.gov (United States)

    Teranishi, Isamu; Oyama, Takuro; Ogata, Wakaha

    We say that a signature scheme is strongly existentially unforgeable (SEU) if no adversary, given message/signature pairs adaptively, can generate a signature on a new message or a new signature on a previously signed message. We propose a general and efficient conversion in the standard model that transforms a secure signature scheme to SEU signature scheme. In order to construct that conversion, we use a chameleon commitment scheme. Here a chameleon commitment scheme is a variant of commitment scheme such that one can change the committed value after publishing the commitment if one knows the secret key. We define the chosen message security notion for the chameleon commitment scheme, and show that the signature scheme transformed by our proposed conversion satisfies the SEU property if the chameleon commitment scheme is chosen message secure. By modifying the proposed conversion, we also give a general and efficient conversion in the random oracle model, that transforms a secure signature scheme into a SEU signature scheme. This second conversion also uses a chameleon commitment scheme but only requires the key only attack security for it.

  13. Radar micro-doppler signatures processing and applications

    CERN Document Server

    Chen, Victor C; Miceli, William J

    2014-01-01

    Radar Micro-Doppler Signatures: Processing and applications concentrates on the processing and application of radar micro-Doppler signatures in real world situations, providing readers with a good working knowledge on a variety of applications of radar micro-Doppler signatures.

  14. Modelling End-User of Electronic-Government Service: The Role of Information quality, System Quality and Trust

    Science.gov (United States)

    Witarsyah Jacob, Deden; Fudzee, Mohd Farhan Md; Aizi Salamat, Mohamad; Kasim, Shahreen; Mahdin, Hairulnizam; Azhar Ramli, Azizul

    2017-08-01

    Many governments around the world increasingly use internet technologies such as electronic government to provide public services. These services range from providing the most basic informational website to deploying sophisticated tools for managing interactions between government agencies and beyond government. Electronic government (e-government) aims to provide a more accurate, easily accessible, cost-effective and time saving for the community. In this study, we develop a new model of e-government adoption service by extending the Unified Theory of Acceptance and Use of Technology (UTAUT) through the incorporation of some variables such as System Quality, Information Quality and Trust. The model is then tested using a large-scale, multi-site survey research of 237 Indonesian citizens. This model will be validated by using Structural Equation Modeling (SEM). The result indicates that System Quality, Information Quality and Trust variables proven to effect user behavior. This study extends the current understanding on the influence of System Quality, Information Quality and Trust factors to researchers, practitioners, and policy makers.

  15. Physics Signatures at CLIC

    CERN Document Server

    Battaglia, Marco

    2001-01-01

    A set of signatures for physics processes of potential interests for the CLIC programme at = 1 - 5 TeV are discussed. These signatures, that may correspond to the manifestation of different scenarios of new physics as well as to Standard Model precision tests, are proposed as benchmarks for the optimisation of the CLIC accelerator parameters and for a first definition of the required detector response.

  16. Integration of a nationally procured electronic health record system into user work practices

    Directory of Open Access Journals (Sweden)

    Cresswell Kathrin M

    2012-03-01

    Full Text Available Abstract Background Evidence suggests that many small- and medium-scale Electronic Health Record (EHR implementations encounter problems, these often stemming from users' difficulties in accommodating the new technology into their work practices. There is the possibility that these challenges may be exacerbated in the context of the larger-scale, more standardised, implementation strategies now being pursued as part of major national modernisation initiatives. We sought to understand how England's centrally procured and delivered EHR software was integrated within the work practices of users in selected secondary and specialist care settings. Methods We conducted a qualitative longitudinal case study-based investigation drawing on sociotechnical theory in three purposefully selected sites implementing early functionality of a nationally procured EHR system. The complete dataset comprised semi-structured interview data from a total of 66 different participants, 38.5 hours of non-participant observation of use of the software in context, accompanying researcher field notes, and hospital documents (including project initiation and lessons learnt reports. Transcribed data were analysed thematically using a combination of deductive and inductive approaches, and drawing on NVivo8 software to facilitate coding. Results The nationally led "top-down" implementation and the associated focus on interoperability limited the opportunity to customise software to local needs. Lack of system usability led users to employ a range of workarounds unanticipated by management to compensate for the perceived shortcomings of the system. These had a number of knock-on effects relating to the nature of collaborative work, patterns of communication, the timeliness and availability of records (including paper and the ability for hospital management to monitor organisational performance. Conclusions This work has highlighted the importance of addressing potentially adverse

  17. 27 CFR 73.34 - When is an electronically submitted form considered timely filed?

    Science.gov (United States)

    2010-04-01

    ... AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY (CONTINUED) PROCEDURES AND PRACTICES ELECTRONIC SIGNATURES; ELECTRONIC SUBMISSION OF FORMS Electronic Filing of Documents with TTB § 73.34 When is an electronically submitted form considered timely filed? If you submit a form to our electronic...

  18. The perceived effects of electronic cigarettes on health by adult users: A state of the science systematic literature review.

    Science.gov (United States)

    Tomashefski, Amy

    2016-09-01

    There is a lack of research on perceived health effects of electronic cigarettes by adult users. Because more people are choosing electronic cigarettes (e-cigarettes) in addition to, or instead of traditional cigarettes, it is important for the nurse practitioner (NP) to understand why. A comprehensive literature search was conducted using four scholarly databases. The search strategy utilized remained consistent. Qualitative, quantitative, observational studies and meta-analyses were considered for review. Of the 52 articles preliminarily retrieved, 9 met inclusion criteria and were analyzed. The majority of e-cigarette users perceive they are less harmful to health than traditional cigarettes. One reason for use is smoking cessation. Current guidelines recommend against promoting e-cigarette use. More research is needed on the long-term health effects of e-cigarettes as well as regulatory statements to guide future healthcare practice. As prevalence of e-cigarette use increases, it is important for NPs to understand the perceived effects on health by adults who use them and, specifically, how these perceptions motivate use. Armed with this information, the NP can communicate with patients about e-cigarettes, confidently recommend against their use, and begin discussions about reliable smoking cessation tools and resources that will help patients achieve their goals. ©2016 American Association of Nurse Practitioners.

  19. Information processing through a bio-based redox capacitor: signatures for redox-cycling.

    Science.gov (United States)

    Liu, Yi; Kim, Eunkyoung; White, Ian M; Bentley, William E; Payne, Gregory F

    2014-08-01

    Redox-cycling compounds can significantly impact biological systems and can be responsible for activities that range from pathogen virulence and contaminant toxicities, to therapeutic drug mechanisms. Current methods to identify redox-cycling activities rely on the generation of reactive oxygen species (ROS), and employ enzymatic or chemical methods to detect ROS. Here, we couple the speed and sensitivity of electrochemistry with the molecular-electronic properties of a bio-based redox-capacitor to generate signatures of redox-cycling. The redox capacitor film is electrochemically-fabricated at the electrode surface and is composed of a polysaccharide hydrogel with grafted catechol moieties. This capacitor film is redox-active but non-conducting and can engage diffusible compounds in either oxidative or reductive redox-cycling. Using standard electrochemical mediators ferrocene dimethanol (Fc) and Ru(NH3)6Cl3 (Ru(3+)) as model redox-cyclers, we observed signal amplifications and rectifications that serve as signatures of redox-cycling. Three bio-relevant compounds were then probed for these signatures: (i) ascorbate, a redox-active compound that does not redox-cycle; (ii) pyocyanin, a virulence factor well-known for its reductive redox-cycling; and (iii) acetaminophen, an analgesic that oxidatively redox-cycles but also undergoes conjugation reactions. These studies demonstrate that the redox-capacitor can enlist the capabilities of electrochemistry to generate rapid and sensitive signatures of biologically-relevant chemical activities (i.e., redox-cycling). Published by Elsevier B.V.

  20. Genome signature analysis of thermal virus metagenomes reveals Archaea and thermophilic signatures

    Directory of Open Access Journals (Sweden)

    Pride David T

    2008-09-01

    Full Text Available Abstract Background Metagenomic analysis provides a rich source of biological information for otherwise intractable viral communities. However, study of viral metagenomes has been hampered by its nearly complete reliance on BLAST algorithms for identification of DNA sequences. We sought to develop algorithms for examination of viral metagenomes to identify the origin of sequences independent of BLAST algorithms. We chose viral metagenomes obtained from two hot springs, Bear Paw and Octopus, in Yellowstone National Park, as they represent simple microbial populations where comparatively large contigs were obtained. Thermal spring metagenomes have high proportions of sequences without significant Genbank homology, which has hampered identification of viruses and their linkage with hosts. To analyze each metagenome, we developed a method to classify DNA fragments using genome signature-based phylogenetic classification (GSPC, where metagenomic fragments are compared to a database of oligonucleotide signatures for all previously sequenced Bacteria, Archaea, and viruses. Results From both Bear Paw and Octopus hot springs, each assembled contig had more similarity to other metagenome contigs than to any sequenced microbial genome based on GSPC analysis, suggesting a genome signature common to each of these extreme environments. While viral metagenomes from Bear Paw and Octopus share some similarity, the genome signatures from each locale are largely unique. GSPC using a microbial database predicts most of the Octopus metagenome has archaeal signatures, while bacterial signatures predominate in Bear Paw; a finding consistent with those of Genbank BLAST. When using a viral database, the majority of the Octopus metagenome is predicted to belong to archaeal virus Families Globuloviridae and Fuselloviridae, while none of the Bear Paw metagenome is predicted to belong to archaeal viruses. As expected, when microbial and viral databases are combined, each of

  1. 48 CFR 204.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Contracting officer's signature. 204.101 Section 204.101 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS... officer's signature. Follow the procedures at PGI 204.101 for signature of contract documents. [71 FR 9268...

  2. Can specific transcriptional regulators assemble a universal cancer signature?

    Science.gov (United States)

    Roy, Janine; Isik, Zerrin; Pilarsky, Christian; Schroeder, Michael

    2013-10-01

    Recently, there is a lot of interest in using biomarker signatures derived from gene expression data to predict cancer progression. We assembled signatures of 25 published datasets covering 13 types of cancers. How do these signatures compare with each other? On one hand signatures answering the same biological question should overlap, whereas signatures predicting different cancer types should differ. On the other hand, there could also be a Universal Cancer Signature that is predictive independently of the cancer type. Initially, we generate signatures for all datasets using classical approaches such as t-test and fold change and then, we explore signatures resulting from a network-based method, that applies the random surfer model of Google's PageRank algorithm. We show that the signatures as published by the authors and the signatures generated with classical methods do not overlap - not even for the same cancer type - whereas the network-based signatures strongly overlap. Selecting 10 out of 37 universal cancer genes gives the optimal prediction for all cancers thus taking a first step towards a Universal Cancer Signature. We furthermore analyze and discuss the involved genes in terms of the Hallmarks of cancer and in particular single out SP1, JUN/FOS and NFKB1 and examine their specific role in cancer progression.

  3. The differing privacy concerns regarding exchanging electronic medical records of internet users in Taiwan.

    Science.gov (United States)

    Hwang, Hsin-Ginn; Han, Hwai-En; Kuo, Kuang-Ming; Liu, Chung-Feng

    2012-12-01

    This study explores whether Internet users have different privacy concerns regarding the information contained in electronic medical records (EMRs) according to gender, age, occupation, education, and EMR awareness. Based on the Concern for Information Privacy (CFIP) scale developed by Smith and colleagues in 1996, we conducted an online survey using 15 items in four dimensions, namely, collection, unauthorized access, secondary use, and errors, to investigate Internet users' concerns regarding the privacy of EMRs under health information exchanges (HIE). We retrieved 213 valid questionnaires. The results indicate that the respondents had substantial privacy concerns regarding EMRs and their educational level and EMR awareness significantly influenced their privacy concerns regarding unauthorized access and secondary use of EMRs. This study recommends that the Taiwanese government organizes a comprehensive EMR awareness campaign, emphasizing unauthorized access and secondary use of EMRs. Additionally, to cultivate the public's understanding of EMRs, the government should employ various media, especially Internet channels, to promote EMR awareness, thereby enabling the public to accept the concept and use of EMRs. People who are highly educated and have superior EMR awareness should be given a comprehensive explanation of how hospitals protect patients' EMRs from unauthorized access and secondary use to address their concerns. Thus, the public can comprehend, trust, and accept the use of EMRs, reducing their privacy concerns, which should facilitate the future implementation of HIE.

  4. SecurePhone: a mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly

    Science.gov (United States)

    Ricci, R.; Chollet, G.; Crispino, M. V.; Jassim, S.; Koreman, J.; Olivar-Dimas, M.; Garcia-Salicetti, S.; Soria-Rodriguez, P.

    2006-05-01

    This article presents an overview of the SecurePhone project, with an account of the first results obtained. SecurePhone's primary aim is to realise a mobile phone prototype - the 'SecurePhone' - in which biometrical authentication enables users to deal secure, dependable transactions over a mobile network. The SecurePhone is based on a commercial PDA-phone, supplemented with specific software modules and a customised SIM card. It integrates in a single environment a number of advanced features: access to cryptographic keys through strong multimodal biometric authentication; appending and verification of digital signatures; real-time exchange and interactive modification of (esigned) documents and voice recordings. SecurePhone's 'biometric recogniser' is based on original research. A fused combination of three different biometric methods - speaker, face and handwritten signature verification - is exploited, with no need for dedicated hardware components. The adoption of non-intrusive, psychologically neutral biometric techniques is expected to mitigate rejection problems that often inhibit the social use of biometrics, and speed up the spread of e-signature technology. Successful biometric authentication grants access to SecurePhone's built-in esignature services through a user-friendly interface. Special emphasis is accorded to the definition of a trustworthy security chain model covering all aspects of system operation. The SecurePhone is expected to boost m-commerce and open new scenarios for m-business and m-work, by changing the way people interact and by improving trust and confidence in information technologies, often considered intimidating and difficult to use. Exploitation plans will also explore other application domains (physical and logical access control, securised mobile communications).

  5. Electronic cigarettes: human health effects

    OpenAIRE

    Callahan-Lyon, Priscilla

    2014-01-01

    Objective With the rapid increase in use of electronic nicotine delivery systems (ENDS), such as electronic cigarettes (e-cigarettes), users and non-users are exposed to the aerosol and product constituents. This is a review of published data on the human health effects of exposure to e-cigarettes and their components. Methods Literature searches were conducted through September 2013 using multiple electronic databases. Results Forty-four articles are included in this analysis. E-cigarette ae...

  6. 36 CFR 1150.22 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Signature of documents. 1150.22 Section 1150.22 Parks, Forests, and Public Property ARCHITECTURAL AND TRANSPORTATION BARRIERS... Documents for Proceedings on Citations § 1150.22 Signature of documents. The signature of a party...

  7. Sex hormones and gene expression signatures in peripheral blood from postmenopausal women - the NOWAC postgenome study

    Directory of Open Access Journals (Sweden)

    Rylander Charlotta

    2011-03-01

    Full Text Available Abstract Background Postmenopausal hormone therapy (HT influences endogenous hormone concentrations and increases the risk of breast cancer. Gene expression profiling may reveal the mechanisms behind this relationship. Our objective was to explore potential associations between sex hormones and gene expression in whole blood from a population-based, random sample of postmenopausal women Methods Gene expression, as measured by the Applied Biosystems microarray platform, was compared between hormone therapy (HT users and non-users and between high and low hormone plasma concentrations using both gene-wise analysis and gene set analysis. Gene sets found to be associated with HT use were further analysed for enrichment in functional clusters and network predictions. The gene expression matrix included 285 samples and 16185 probes and was adjusted for significant technical variables. Results Gene-wise analysis revealed several genes significantly associated with different types of HT use. The functional cluster analyses provided limited information on these genes. Gene set analysis revealed 22 gene sets that were enriched between high and low estradiol concentration (HT-users excluded. Among these were seven oestrogen related gene sets, including our gene list associated with systemic estradiol use, which thereby represents a novel oestrogen signature. Seven gene sets were related to immune response. Among the 15 gene sets enriched for progesterone, 11 overlapped with estradiol. No significant gene expression patterns were found for testosterone, follicle stimulating hormone (FSH or sex hormone binding globulin (SHBG. Conclusions Distinct gene expression patterns associated with sex hormones are detectable in a random group of postmenopausal women, as demonstrated by the finding of a novel oestrogen signature.

  8. Xyce parallel electronic simulator : users' guide. Version 5.1.

    Energy Technology Data Exchange (ETDEWEB)

    Mei, Ting; Rankin, Eric Lamont; Thornquist, Heidi K.; Santarelli, Keith R.; Fixel, Deborah A.; Coffey, Todd Stirling; Russo, Thomas V.; Schiek, Richard Louis; Keiter, Eric Richard; Pawlowski, Roger Patrick

    2009-11-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been designed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas: (1) Capability to solve extremely large circuit problems by supporting large-scale parallel computing platforms (up to thousands of processors). Note that this includes support for most popular parallel and serial computers. (2) Improved performance for all numerical kernels (e.g., time integrator, nonlinear and linear solvers) through state-of-the-art algorithms and novel techniques. (3) Device models which are specifically tailored to meet Sandia's needs, including some radiation-aware devices (for Sandia users only). (4) Object-oriented code design and implementation using modern coding practices that ensure that the Xyce Parallel Electronic Simulator will be maintainable and extensible far into the future. Xyce is a parallel code in the most general sense of the phrase - a message passing parallel implementation - which allows it to run efficiently on the widest possible number of computing platforms. These include serial, shared-memory and distributed-memory parallel as well as heterogeneous platforms. Careful attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows. The development of Xyce provides a platform for computational research and development aimed specifically at the needs of the Laboratory. With Xyce, Sandia has an 'in-house' capability with which both new electrical (e.g., device model development) and algorithmic (e.g., faster time-integration methods, parallel solver algorithms) research and development can be performed. As a result, Xyce is a

  9. Xyce Parallel Electronic Simulator : users' guide, version 4.1.

    Energy Technology Data Exchange (ETDEWEB)

    Mei, Ting; Rankin, Eric Lamont; Thornquist, Heidi K.; Santarelli, Keith R.; Fixel, Deborah A.; Coffey, Todd Stirling; Russo, Thomas V.; Schiek, Richard Louis; Keiter, Eric Richard; Pawlowski, Roger Patrick

    2009-02-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been designed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas: (1) Capability to solve extremely large circuit problems by supporting large-scale parallel computing platforms (up to thousands of processors). Note that this includes support for most popular parallel and serial computers. (2) Improved performance for all numerical kernels (e.g., time integrator, nonlinear and linear solvers) through state-of-the-art algorithms and novel techniques. (3) Device models which are specifically tailored to meet Sandia's needs, including some radiation-aware devices (for Sandia users only). (4) Object-oriented code design and implementation using modern coding practices that ensure that the Xyce Parallel Electronic Simulator will be maintainable and extensible far into the future. Xyce is a parallel code in the most general sense of the phrase - a message passing parallel implementation - which allows it to run efficiently on the widest possible number of computing platforms. These include serial, shared-memory and distributed-memory parallel as well as heterogeneous platforms. Careful attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows. The development of Xyce provides a platform for computational research and development aimed specifically at the needs of the Laboratory. With Xyce, Sandia has an 'in-house' capability with which both new electrical (e.g., device model development) and algorithmic (e.g., faster time-integration methods, parallel solver algorithms) research and development can be performed. As a result, Xyce is a

  10. 17 CFR 201.65 - Identity and signature.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Identity and signature. 201.65... of 1934 § 201.65 Identity and signature. Applications pursuant to this subpart may omit the identity, mailing address, and signature of the applicant; provided, that such identity, mailing address and...

  11. 15 CFR 908.16 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Signature. 908.16 Section 908.16 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) NATIONAL OCEANIC... SUBMITTING REPORTS ON WEATHER MODIFICATION ACTIVITIES § 908.16 Signature. All reports filed with the National...

  12. 34 CFR 101.32 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Signature of documents. 101.32 Section 101.32 Education Regulations of the Offices of the Department of Education OFFICE FOR CIVIL RIGHTS, DEPARTMENT OF EDUCATION... Documents § 101.32 Signature of documents. The signature of a party, authorized officer, employee or...

  13. 29 CFR 102.116 - Signature of orders.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 2 2010-07-01 2010-07-01 false Signature of orders. 102.116 Section 102.116 Labor Regulations Relating to Labor NATIONAL LABOR RELATIONS BOARD RULES AND REGULATIONS, SERIES 8 Certification and Signature of Documents § 102.116 Signature of orders. The executive secretary or the associate executive...

  14. On signature change in p-adic space-times

    International Nuclear Information System (INIS)

    Dragovic, B.G.

    1991-01-01

    Change of signature by linear coordinate transformations in p-adic space-times is considered. In this paper it is shown that there exists arbitrary change of trivial signature in Q p n for all n ≥ 1 if p ≡ 1 (mod 4). In other cases it is possible to change only even number of the signs of the signature. The authors suggest new concept of signature with respect to distinct quadratic extensions, of Q p . If space-time dimension is restricted to four there is no signature change

  15. Signature Curves Statistics of DNA Supercoils

    OpenAIRE

    Shakiban, Cheri; Lloyd, Peter

    2004-01-01

    In this paper we describe the Euclidean signature curves for two dimensional closed curves in the plane and their generalization to closed space curves. The focus will be on discrete numerical methods for approximating such curves. Further we will apply these numerical methods to plot the signature curves related to three-dimensional simulated DNA supercoils. Our primary focus will be on statistical analysis of the data generated for the signature curves of the supercoils. We will try to esta...

  16. Magnetic signature of surface defects at nanodiamonds

    Energy Technology Data Exchange (ETDEWEB)

    Vollmers, Nora Jenny; Gerstmann, Uwe; Schmidt, Wolf Gero [Theoretische Physik, Universitaet Paderborn (Germany)

    2011-07-01

    The n-type doping of diamond has been a long-standing issue, which recently gained attention in the context of nanodiamonds. Attempts of doping with nitrogen failed to result in the Electron paramagnetic Resonance (EPR) fingerprints expected from bulk material. Instead, the nanodiamond signals show a much larger deviation from the free-electron g-value and are believed to be related to intrinsic, carbon inherited defects. However, the absence of the bulk-like EPR spectra does not mean that nitrogen is not incorporated at all. The N atoms could be built in predominantly at or at least close to the surfaces yielding EPR spectra, very different from those measured in the bulk. In this work, we elucidate the situation by investigating the magnetic signature of paramagnetic defects in the nanodiamonds. We use the gauge-including projector augmented plane wave (GI-PAW) approach to calculate the hyperfine splittings and the elements of the electronic g-tensor. Taking the C(100) surface as a first model system, a possible contribution of nitrogen is discussed by comparing EPR parameters for different N incorporation depths: Incorporated directly at the surface, N gives rise to surface states similar to intrinsic carbon dangling bond-like states. Otherwise N is able to introduce surface conductivity as demonstrated by calculated effective mass tensors.

  17. Xyce Parallel Electronic Simulator Users' Guide Version 6.8

    Energy Technology Data Exchange (ETDEWEB)

    Keiter, Eric R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Aadithya, Karthik Venkatraman [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mei, Ting [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Russo, Thomas V. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Schiek, Richard L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sholander, Peter E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Thornquist, Heidi K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Verley, Jason C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-10-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been de- signed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas: Capability to solve extremely large circuit problems by supporting large-scale parallel com- puting platforms (up to thousands of processors). This includes support for most popular parallel and serial computers. A differential-algebraic-equation (DAE) formulation, which better isolates the device model package from solver algorithms. This allows one to develop new types of analysis without requiring the implementation of analysis-specific device models. Device models that are specifically tailored to meet Sandia's needs, including some radiation- aware devices (for Sandia users only). Object-oriented code design and implementation using modern coding practices. Xyce is a parallel code in the most general sense of the phrase$-$ a message passing parallel implementation $-$ which allows it to run efficiently a wide range of computing platforms. These include serial, shared-memory and distributed-memory parallel platforms. Attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows.

  18. 45 CFR 81.32 - Signature of documents.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Signature of documents. 81.32 Section 81.32 Public... UNDER PART 80 OF THIS TITLE Form, Execution, Service and Filing of Documents § 81.32 Signature of documents. The signature of a party, authorized officer, employee or attorney constitutes a certificate that...

  19. Observing electron motion in molecules

    International Nuclear Information System (INIS)

    Chelkowski, S; Yudin, G L; Bandrauk, A D

    2006-01-01

    We study analytically the possibility for monitoring electron motion in a molecule using two ultrashort laser pulses. The first prepares a coherent superposition of two electronic molecular states whereas the second (attosecond pulse) photoionizes the molecule. We show that interesting information about electron dynamics can be obtained from measurement of the photoelectron spectra as a function of the time delay between two pulses. In particular, asymmetries in photoelectron angular distribution provide a simple signature of the electron motion within the initial time-dependent coherently coupled two molecular states. Both asymmetries and electron spectra show very strong two-centre interference patterns. We illustrate these effects using as an example a dissociating hydrogen molecular ion probed by the attosecond pulses

  20. Modeling the lexical morphology of Western handwritten signatures.

    Directory of Open Access Journals (Sweden)

    Moises Diaz-Cabrera

    Full Text Available A handwritten signature is the final response to a complex cognitive and neuromuscular process which is the result of the learning process. Because of the many factors involved in signing, it is possible to study the signature from many points of view: graphologists, forensic experts, neurologists and computer vision experts have all examined them. Researchers study written signatures for psychiatric, penal, health and automatic verification purposes. As a potentially useful, multi-purpose study, this paper is focused on the lexical morphology of handwritten signatures. This we understand to mean the identification, analysis, and description of the signature structures of a given signer. In this work we analyze different public datasets involving 1533 signers from different Western geographical areas. Some relevant characteristics of signature lexical morphology have been selected, examined in terms of their probability distribution functions and modeled through a General Extreme Value distribution. This study suggests some useful models for multi-disciplinary sciences which depend on handwriting signatures.

  1. Signature of an aggregation-prone conformation of tau

    Science.gov (United States)

    Eschmann, Neil A.; Georgieva, Elka R.; Ganguly, Pritam; Borbat, Peter P.; Rappaport, Maxime D.; Akdogan, Yasar; Freed, Jack H.; Shea, Joan-Emma; Han, Songi

    2017-03-01

    The self-assembly of the microtubule associated tau protein into fibrillar cell inclusions is linked to a number of devastating neurodegenerative disorders collectively known as tauopathies. The mechanism by which tau self-assembles into pathological entities is a matter of much debate, largely due to the lack of direct experimental insights into the earliest stages of aggregation. We present pulsed double electron-electron resonance measurements of two key fibril-forming regions of tau, PHF6 and PHF6*, in transient as aggregation happens. By monitoring the end-to-end distance distribution of these segments as a function of aggregation time, we show that the PHF6(*) regions dramatically extend to distances commensurate with extended β-strand structures within the earliest stages of aggregation, well before fibril formation. Combined with simulations, our experiments show that the extended β-strand conformational state of PHF6(*) is readily populated under aggregating conditions, constituting a defining signature of aggregation-prone tau, and as such, a possible target for therapeutic interventions.

  2. Signature molecular descriptor : advanced applications.

    Energy Technology Data Exchange (ETDEWEB)

    Visco, Donald Patrick, Jr. (Tennessee Technological University, Cookeville, TN)

    2010-04-01

    In this work we report on the development of the Signature Molecular Descriptor (or Signature) for use in the solution of inverse design problems as well as in highthroughput screening applications. The ultimate goal of using Signature is to identify novel and non-intuitive chemical structures with optimal predicted properties for a given application. We demonstrate this in three studies: green solvent design, glucocorticoid receptor ligand design and the design of inhibitors for Factor XIa. In many areas of engineering, compounds are designed and/or modified in incremental ways which rely upon heuristics or institutional knowledge. Often multiple experiments are performed and the optimal compound is identified in this brute-force fashion. Perhaps a traditional chemical scaffold is identified and movement of a substituent group around a ring constitutes the whole of the design process. Also notably, a chemical being evaluated in one area might demonstrate properties very attractive in another area and serendipity was the mechanism for solution. In contrast to such approaches, computer-aided molecular design (CAMD) looks to encompass both experimental and heuristic-based knowledge into a strategy that will design a molecule on a computer to meet a given target. Depending on the algorithm employed, the molecule which is designed might be quite novel (re: no CAS registration number) and/or non-intuitive relative to what is known about the problem at hand. While CAMD is a fairly recent strategy (dating to the early 1980s), it contains a variety of bottlenecks and limitations which have prevented the technique from garnering more attention in the academic, governmental and industrial institutions. A main reason for this is how the molecules are described in the computer. This step can control how models are developed for the properties of interest on a given problem as well as how to go from an output of the algorithm to an actual chemical structure. This report

  3. Ship Signature Management System : Functionality

    NARCIS (Netherlands)

    Arciszewski, H.F.R.; Lier, L. van; Meijer, Y.G.S.; Noordkamp, H.W.; Wassenaar, A.S.

    2010-01-01

    A signature of a platform is the manner in which the platform manifests itself to a certain type of sensor and how observable it is when such a sensor is used to detect the platform. Because many military platforms use sensors in different media, it is the total of its different signatures that

  4. Cell short circuit, preshort signature

    Science.gov (United States)

    Lurie, C.

    1980-01-01

    Short-circuit events observed in ground test simulations of DSCS-3 battery in-orbit operations are analyzed. Voltage signatures appearing in the data preceding the short-circuit event are evaluated. The ground test simulation is briefly described along with performance during reconditioning discharges. Results suggest that a characteristic signature develops prior to a shorting event.

  5. 2nd German-Japanese Workshop on Digital Signatures 1999: ATR (Advanced Telecommunications Research Institute International), Kyoto, 21st/22nd of September, 1999

    OpenAIRE

    Thielmann, H.; Mennicken, J.-B.

    2000-01-01

    This report contains the proceedings of a second German-Japanese Workshop on digital signatures held in Kyoto, September 21./22. 1999. The workshop aimed at legal, technical and economic aspects of digital signatures as a means to promote electronic commerce. Special attention was devoted to Identification and classification of requirements on the technical platform and requirements for international interoperability, Identification of legal requirements and other social environments that nee...

  6. Nonspeech audio in user interfaces for TV

    NARCIS (Netherlands)

    Sluis, van de Richard; Eggen, J.H.; Rypkema, J.A.

    1997-01-01

    This study explores the end-user benefits of using nonspeech audio in television user interfaces. A prototype of an Electronic Programme Guide (EPG) served as a carrier for the research. One of the features of this EPG is the possibility to search for TV programmes in a category-based way. The EPG

  7. COMPUTER-IMPLEMENTED METHOD OF PERFORMING A SEARCH USING SIGNATURES

    DEFF Research Database (Denmark)

    2017-01-01

    A computer-implemented method of processing a query vector and a data vector), comprising: generating a set of masks and a first set of multiple signatures and a second set of multiple signatures by applying the set of masks to the query vector and the data vector, respectively, and generating...... candidate pairs, of a first signature and a second signature, by identifying matches of a first signature and a second signature. The set of masks comprises a configuration of the elements that is a Hadamard code; a permutation of a Hadamard code; or a code that deviates from a Hadamard code...

  8. Signature effects in 2-qp rotational bands

    International Nuclear Information System (INIS)

    Jain, A.K.; Goel, A.

    1992-01-01

    The authors briefly review the progress in understanding the 2-qp rotational bands in odd-odd nuclei. Signature effects and the phenomenon of signature inversion are discussed. The Coriolis coupling appears to have all the ingredients to explain the inversion. Some recent work on signature dependence in 2-qp bands of even-even nuclei is also discussed; interesting features are pointed out

  9. Observing Consistency in Online Communication Patterns for User Re-Identification.

    Science.gov (United States)

    Adeyemi, Ikuesan Richard; Razak, Shukor Abd; Salleh, Mazleena; Venter, Hein S

    2016-01-01

    Comprehension of the statistical and structural mechanisms governing human dynamics in online interaction plays a pivotal role in online user identification, online profile development, and recommender systems. However, building a characteristic model of human dynamics on the Internet involves a complete analysis of the variations in human activity patterns, which is a complex process. This complexity is inherent in human dynamics and has not been extensively studied to reveal the structural composition of human behavior. A typical method of anatomizing such a complex system is viewing all independent interconnectivity that constitutes the complexity. An examination of the various dimensions of human communication pattern in online interactions is presented in this paper. The study employed reliable server-side web data from 31 known users to explore characteristics of human-driven communications. Various machine-learning techniques were explored. The results revealed that each individual exhibited a relatively consistent, unique behavioral signature and that the logistic regression model and model tree can be used to accurately distinguish online users. These results are applicable to one-to-one online user identification processes, insider misuse investigation processes, and online profiling in various areas.

  10. Searching for Dark Matter Signatures in the GLAST LAT Electron Flux

    Science.gov (United States)

    Moiseev, Alexander; Profumo, Stefano

    2008-01-01

    We explored several viable scenarios of how LAT might observe DM, when the spectral feature is predicted to be observed in the HE electron flux It has been demonstrated elsewhere that LAT will be capable to detect HE electrons flux in energy range from 20 GeV to - 1 TeV with 520% energy resolution and good statistics If there is a DM-caused feature in the HE electron flux (in the range 20 GeV - 1 TeV), LAT will be the best current instrument to observe it!

  11. Peripheral blood signatures of lead exposure.

    Directory of Open Access Journals (Sweden)

    Heather G LaBreche

    Full Text Available BACKGROUND: Current evidence indicates that even low-level lead (Pb exposure can have detrimental effects, especially in children. We tested the hypothesis that Pb exposure alters gene expression patterns in peripheral blood cells and that these changes reflect dose-specific alterations in the activity of particular pathways. METHODOLOGY/PRINCIPAL FINDING: Using Affymetrix Mouse Genome 430 2.0 arrays, we examined gene expression changes in the peripheral blood of female Balb/c mice following exposure to per os lead acetate trihydrate or plain drinking water for two weeks and after a two-week recovery period. Data sets were RMA-normalized and dose-specific signatures were generated using established methods of supervised classification and binary regression. Pathway activity was analyzed using the ScoreSignatures module from GenePattern. CONCLUSIONS/SIGNIFICANCE: The low-level Pb signature was 93% sensitive and 100% specific in classifying samples a leave-one-out crossvalidation. The high-level Pb signature demonstrated 100% sensitivity and specificity in the leave-one-out crossvalidation. These two signatures exhibited dose-specificity in their ability to predict Pb exposure and had little overlap in terms of constituent genes. The signatures also seemed to reflect current levels of Pb exposure rather than past exposure. Finally, the two doses showed differential activation of cellular pathways. Low-level Pb exposure increased activity of the interferon-gamma pathway, whereas high-level Pb exposure increased activity of the E2F1 pathway.

  12. Date Attachable Offline Electronic Cash Scheme

    Directory of Open Access Journals (Sweden)

    Chun-I Fan

    2014-01-01

    Full Text Available Electronic cash (e-cash is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling.

  13. Date attachable offline electronic cash scheme.

    Science.gov (United States)

    Fan, Chun-I; Sun, Wei-Zhe; Hau, Hoi-Tung

    2014-01-01

    Electronic cash (e-cash) is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling.

  14. Date Attachable Offline Electronic Cash Scheme

    Science.gov (United States)

    Sun, Wei-Zhe; Hau, Hoi-Tung

    2014-01-01

    Electronic cash (e-cash) is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling. PMID:24982931

  15. Signature of electron-phonon interaction in high temperature superconductors

    Directory of Open Access Journals (Sweden)

    Vinod Ashokan

    2011-09-01

    Full Text Available The theory of thermal conductivity of high temperature superconductors (HTS based on electron and phonon line width (life times formulation is developed with Quantum dynamical approach of Green's function. The frequency line width is observed as an extremely sensitive quantity in the transport phenomena of HTS as a collection of large number of scattering processes. The role of resonance scattering and electron-phonon interaction processes is found to be most prominent near critical temperature. The theory successfully explains the spectacular behaviour of high Tc superconductors in the vicinity of transition temperature. A successful agreement between theory and experiment has been obtained by analyzing the thermal conductivity data for the sample La1.8Sr0.2CuO4 in the temperature range 0 − 200K. The theory is equally and successfully applicable to all other high Tc superconductors.

  16. Magnetic signature surveillance of nuclear fuel

    International Nuclear Information System (INIS)

    Bernatowicz, H.; Schoenig, F.C.

    1981-01-01

    Typical nuclear fuel material contains tramp ferromagnetic particles of random size and distribution. Also, selected amounts of paramagnetic or ferromagnetic material can be added at random or at known positions in the fuel material. The fuel material in its non-magnetic container is scanned along its length by magnetic susceptibility detecting apparatus whereby susceptibility changes along its length are obtained and provide a unique signal waveform of the container of fuel material as a signature thereof. The output signature is stored. At subsequent times in its life the container is again scanned and respective signatures obtained which are compared with the initially obtained signature, any differences indicating alteration or tampering with the fuel material. If the fuel material includes a paramagnetic additive by taking two measurements along the container the effects thereof can be cancelled out. (author)

  17. The informational system model of Ukrainian national transport workflow improvement based on electronic signature introduction management

    Directory of Open Access Journals (Sweden)

    Grigoriy NECHAEY

    2007-01-01

    Full Text Available Proposed model of informational system supposes improvement of newconceptual method on the work with e-signature in transport nformational systems. Problems and aims that may be solved with the help of this system and the most important economical and technical advantages of the proposed system in comparison with traditional methods of e-signing use are marked out.

  18. [Views of health system administrators, professionals, and users concerning the electronic health record and facilitators and obstacles to its implementation].

    Science.gov (United States)

    Costa, Jose Felipe Riani; Portela, Margareth Crisóstomo

    2018-02-05

    The design and deployment of complex technologies like the electronic health record (EHR) involve technical, personal, social, and organizational issues. The Brazilian public and private scenario includes different local and regional initiatives for implementation of the electronic health record. The Brazilian Ministry of Health also has a proposal to develop a national EHR. The current study aimed to provide a comprehensive view of perceptions by health system administrators, professionals, and users concerning their experiences with the electronic health record and their opinions of the possibility of developing a national EHR. This qualitative study involved 28 semi-structured interviews. The results revealed both the diversity of factors that can influence the implementation of an electronic health record and the existence of convergences and aspects that tend to be valued differently according to the different points of view. Key aspects include discussions on the electronic health record's attributes and it impact on healthcare, especially in the case of local electronic health records, concerns over costs and confidentiality and privacy pertaining to electronic health records in general, and the possible implications of centralized versus decentralized data storage in the case of a national EHR. The interviews clearly showed the need to establish more effective communication among the various stakeholders, and that the different perspectives should be considered when drafting and deploying an EHR at the local, regional, and national levels.

  19. An Arbitrated Quantum Signature Scheme without Entanglement*

    International Nuclear Information System (INIS)

    Li Hui-Ran; Luo Ming-Xing; Peng Dai-Yuan; Wang Xiao-Jun

    2017-01-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks . (paper)

  20. Fiddling with the ECT act – Electronic signatures | Eiselen ...

    African Journals Online (AJOL)

    Potchefstroom Electronic Law Journal/Potchefstroomse Elektroniese Regsblad. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 17, No 6 (2014) >. Log in or Register to get access to full text downloads.

  1. Extraction of human gait signatures: an inverse kinematic approach using Groebner basis theory applied to gait cycle analysis

    Science.gov (United States)

    Barki, Anum; Kendricks, Kimberly; Tuttle, Ronald F.; Bunker, David J.; Borel, Christoph C.

    2013-05-01

    This research highlights the results obtained from applying the method of inverse kinematics, using Groebner basis theory, to the human gait cycle to extract and identify lower extremity gait signatures. The increased threat from suicide bombers and the force protection issues of today have motivated a team at Air Force Institute of Technology (AFIT) to research pattern recognition in the human gait cycle. The purpose of this research is to identify gait signatures of human subjects and distinguish between subjects carrying a load to those subjects without a load. These signatures were investigated via a model of the lower extremities based on motion capture observations, in particular, foot placement and the joint angles for subjects affected by carrying extra load on the body. The human gait cycle was captured and analyzed using a developed toolkit consisting of an inverse kinematic motion model of the lower extremity and a graphical user interface. Hip, knee, and ankle angles were analyzed to identify gait angle variance and range of motion. Female subjects exhibited the most knee angle variance and produced a proportional correlation between knee flexion and load carriage.

  2. Quantum liquid signatures in dwarf stars

    Energy Technology Data Exchange (ETDEWEB)

    Gabadadze, Gregory; Pirtskhalava, David, E-mail: gg32@nyu.edu, E-mail: dmp371@nyu.edu [Center for Cosmology and Particle Physics, Department of Physics, New York University, New York, NY 10003 (United States)

    2009-05-15

    We develop further the proposal of arXiv:0806.3692 that a new state of matter - charged condensate of spin-0 nuclei - may exist in helium-core dwarf stars. The charged condensate and its fluctuations are described by an effective field theory Lagrangian. The spectrum of bosonic fluctuations is gapped, while electrons, at temperatures of interest, give rise to gapless excitations near the Fermi surface. These properties determine the evolution of the dwarfs with condensed cores. In particular, we show that such dwarf stars would cool significantly faster than their crystallized counterparts. As a result, the luminosity function for the helium-core dwarfs will have a sharp drop-off after the condensation. It is tempting to interpret the recently discovered abrupt termination of a sequence of 24 helium-core dwarf candidates in NGC 6397 as a signature of the charged condensation.

  3. Signature-based store checking buffer

    Science.gov (United States)

    Sridharan, Vilas; Gurumurthi, Sudhanva

    2015-06-02

    A system and method for optimizing redundant output verification, are provided. A hardware-based store fingerprint buffer receives multiple instances of output from multiple instances of computation. The store fingerprint buffer generates a signature from the content included in the multiple instances of output. When a barrier is reached, the store fingerprint buffer uses the signature to verify the content is error-free.

  4. Neutral signature Walker-VSI metrics

    International Nuclear Information System (INIS)

    Coley, A; McNutt, D; Musoke, N; Brooks, D; Hervik, S

    2014-01-01

    We will construct explicit examples of four-dimensional neutral signature Walker (but not necessarily degenerate Kundt) spaces for which all of the polynomial scalar curvature invariants vanish. We then investigate the properties of some particular subclasses of Ricci flat spaces. We also briefly describe some four-dimensional neutral signature Einstein spaces for which all of the polynomial scalar curvature invariants are constant. (paper)

  5. An interpretation of signature inversion

    International Nuclear Information System (INIS)

    Onishi, Naoki; Tajima, Naoki

    1988-01-01

    An interpretation in terms of the cranking model is presented to explain why signature inversion occurs for positive γ of the axially asymmetric deformation parameter and emerges into specific orbitals. By introducing a continuous variable, the eigenvalue equation can be reduced to a one dimensional Schroedinger equation by means of which one can easily understand the cause of signature inversion. (author)

  6. Acoustic Signature Monitoring and Management of Naval Platforms

    NARCIS (Netherlands)

    Basten, T.G.H.; Jong, C.A.F. de; Graafland, F.; Hof, J. van 't

    2015-01-01

    Acoustic signatures make naval platforms susceptible to detection by threat sensors. The variable operational conditions and lifespan of a platform cause variations in the acoustic signature. To deal with these variations, a real time signature monitoring capability is being developed, with advisory

  7. Electronic equipment packaging technology

    CERN Document Server

    Ginsberg, Gerald L

    1992-01-01

    The last twenty years have seen major advances in the electronics industry. Perhaps the most significant aspect of these advances has been the significant role that electronic equipment plays in almost all product markets. Even though electronic equipment is used in a broad base of applications, many future applications have yet to be conceived. This versatility of electron­ ics has been brought about primarily by the significant advances that have been made in integrated circuit technology. The electronic product user is rarely aware of the integrated circuits within the equipment. However, the user is often very aware of the size, weight, mod­ ularity, maintainability, aesthetics, and human interface features of the product. In fact, these are aspects of the products that often are instrumental in deter­ mining its success or failure in the marketplace. Optimizing these and other product features is the primary role of Electronic Equipment Packaging Technology. As the electronics industry continues to pr...

  8. Tidal signatures of the thermospheric mass density and zonal wind at midlatitude: CHAMP and GRACE observations

    Directory of Open Access Journals (Sweden)

    C. Xiong

    2015-02-01

    Full Text Available By using the accelerometer measurements from CHAMP and GRACE satellites, the tidal signatures of the thermospheric mass density and zonal wind at midlatitudes have been analyzed in this study. The results show that the mass density and zonal wind at southern midlatitudes are dominated by a longitudinal wave-1 pattern. The most prominent tidal components in mass density and zonal wind are the diurnal tides D0 and DW2 and the semidiurnal tides SW1 and SW3. This is consistent with the tidal signatures in the F region electron density at midlatitudes as reported by Xiong and Lühr (2014. These same tidal components are observed both in the thermospheric and ionospheric quantities, supporting a mechanism that the non-migrating tides in the upper atmosphere are excited in situ by ion–neutral interactions at midlatitudes, consistent with the modeling results of Jones Jr. et al. (2013. We regard the thermospheric dynamics as the main driver for the electron density tidal structures. An example is the in-phase variation of D0 between electron density and mass density in both hemispheres. Further research including coupled atmospheric models is probably needed for explaining the similarities and differences between thermospheric and ionospheric tidal signals at midlatitudes.

  9. 48 CFR 4.102 - Contractor's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Contractor's signature. 4.102 Section 4.102 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Contract Execution 4.102 Contractor's signature. (a) Individuals. A contract with an...

  10. DIGITAL SIGNATURE IN THE WAY OF LAW

    Directory of Open Access Journals (Sweden)

    Ruya Samlı

    2013-01-01

    Full Text Available Signature can be defined as a person’s name or special signs that he/she writes when he/she wants to indicate he/she wrote or confirm that writing. A person signs many times in his/her life. A person’s signature that is used for thousands of times for many things from formal documents to exams has importance for that person. Especially, signing in legal operations is an operation that can build important results. If a person’s signature is imitated by another person, he/she can become beholden, donate his/her whole wealth, commits offences or do some judicial operations. Today, because many operations can be done with digital environments and internet, signature operation that provides identity validation must also be carried to digital environment. In this paper digital signature concept that is approved for this reason and its situation in international areas and Turkish laws are investigated.

  11. Signature change events: a challenge for quantum gravity?

    International Nuclear Information System (INIS)

    White, Angela; Weinfurtner, Silke; Visser, Matt

    2010-01-01

    Within the framework of either Euclidean (functional integral) quantum gravity or canonical general relativity the signature of the manifold is a priori unconstrained. Furthermore, recent developments in the emergent spacetime programme have led to a physically feasible implementation of (analogue) signature change events. This suggests that it is time to revisit the sometimes controversial topic of signature change in general relativity. Specifically, we shall focus on the behaviour of a quantum field defined on a manifold containing regions of different signature. We emphasize that regardless of the underlying classical theory, there are severe problems associated with any quantum field theory residing on a signature-changing background. (Such as the production of what is naively an infinite number of particles, with an infinite energy density.) We show how the problem of quantum fields exposed to finite regions of Euclidean-signature (Riemannian) geometry has similarities with the quantum barrier penetration problem. Finally we raise the question as to whether signature change transitions could be fully understood and dynamically generated within (modified) classical general relativity, or whether they require the knowledge of a theory of quantum gravity.

  12. Starry messages: Searching for signatures of interstellar archaeology

    Energy Technology Data Exchange (ETDEWEB)

    Carrigan, Richard A., Jr.; /Fermilab

    2009-12-01

    Searching for signatures of cosmic-scale archaeological artifacts such as Dyson spheres or Kardashev civilizations is an interesting alternative to conventional SETI. Uncovering such an artifact does not require the intentional transmission of a signal on the part of the original civilization. This type of search is called interstellar archaeology or sometimes cosmic archaeology. The detection of intelligence elsewhere in the Universe with interstellar archaeology or SETI would have broad implications for science. For example, the constraints of the anthropic principle would have to be loosened if a different type of intelligence was discovered elsewhere. A variety of interstellar archaeology signatures are discussed including non-natural planetary atmospheric constituents, stellar doping with isotopes of nuclear wastes, Dyson spheres, as well as signatures of stellar and galactic-scale engineering. The concept of a Fermi bubble due to interstellar migration is introduced in the discussion of galactic signatures. These potential interstellar archaeological signatures are classified using the Kardashev scale. A modified Drake equation is used to evaluate the relative challenges of finding various sources. With few exceptions interstellar archaeological signatures are clouded and beyond current technological capabilities. However SETI for so-called cultural transmissions and planetary atmosphere signatures are within reach.

  13. Xyce™ Parallel Electronic Simulator Users' Guide, Version 6.5.

    Energy Technology Data Exchange (ETDEWEB)

    Keiter, Eric R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Electrical Models and Simulation; Aadithya, Karthik V. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Electrical Models and Simulation; Mei, Ting [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Electrical Models and Simulation; Russo, Thomas V. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Electrical Models and Simulation; Schiek, Richard L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Electrical Models and Simulation; Sholander, Peter E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Electrical Models and Simulation; Thornquist, Heidi K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Electrical Models and Simulation; Verley, Jason C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Electrical Models and Simulation

    2016-06-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been designed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas: Capability to solve extremely large circuit problems by supporting large-scale parallel computing platforms (up to thousands of processors). This includes support for most popular parallel and serial computers. A differential-algebraic-equation (DAE) formulation, which better isolates the device model package from solver algorithms. This allows one to develop new types of analysis without requiring the implementation of analysis-specific device models. Device models that are specifically tailored to meet Sandia's needs, including some radiation- aware devices (for Sandia users only). Object-oriented code design and implementation using modern coding practices. Xyce is a parallel code in the most general sense of the phrase -- a message passing parallel implementation -- which allows it to run efficiently a wide range of computing platforms. These include serial, shared-memory and distributed-memory parallel platforms. Attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows. The information herein is subject to change without notice. Copyright © 2002-2016 Sandia Corporation. All rights reserved.

  14. Functional Requirements for an Electronic Work Package System

    Energy Technology Data Exchange (ETDEWEB)

    Oxstrand, Johanna H. [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2016-12-01

    This document provides a set of high level functional requirements for a generic electronic work package (eWP) system. The requirements have been identified by the U.S. nuclear industry as a part of the Nuclear Electronic Work Packages - Enterprise Requirements (NEWPER) initiative. The functional requirements are mainly applied to eWP system supporting Basic and Moderate types of smart documents, i.e., documents that have fields for recording input such as text, dates, numbers, and equipment status, and documents which incorporate additional functionalities such as form field data “type“ validation (e.g. date, text, number, and signature) of data entered and/or self-populate basic document information (usually from existing host application meta data) on the form when the user first opens it. All the requirements are categorized by the roles; Planner, Supervisor, Craft, Work Package Approval Reviewer, Operations, Scheduling/Work Control, and Supporting Functions. The categories Statistics, Records, Information Technology are also included used to group the requirements. All requirements are presented in Section 2 through Section 11. Examples of more detailed requirements are provided for the majority of high level requirements. These examples are meant as an inspiration to be used as each utility goes through the process of identifying their specific requirements. The report’s table of contents provides a summary of the high level requirements.

  15. Enhanced anti-counterfeiting measures for additive manufacturing: coupling lanthanide nanomaterial chemical signatures with blockchain technology

    Energy Technology Data Exchange (ETDEWEB)

    Kennedy, Zachary C.; Stephenson, David E.; Christ, Josef F.; Pope, Timothy R.; Arey, Bruce W.; Barrett, Christopher A.; Warner, Marvin G.

    2017-08-18

    The significant rise of additive manufacturing (AM) in recent years is in part due to the open sourced nature of the printing processes and reduced cost and capital barriers relative to traditional manufacturing. However, this democratization of manufacturing spurs an increased demand for producers and end-users to verify the authenticity and quality of individual parts. To this end, we introduce an anti-counterfeiting method composed of first embedding engineered nanomaterials into features of a 3D-printed part followed by non-destructive interrogation of these features to quantify a chemical signature profile. The part specific chemical signature data is then linked to a securitized, distributed, and time-stamped blockchain ledger entry. To demonstrate the utility of this approach, lanthanide-aspartic acid nanoscale coordination polymers (Ln3+- Asp NCs) / poly(lactic) acid (PLA) composites were formulated and transformed into a filament feedstock for fused deposition modeling (FDM) 3D printing. In the present case, a quick-response (QR) code containing the doped Ln3+-Asp NCs was printed using a dual-extruder FDM printer into pure PLA parts. The QR code provides a searchable reference to an Ethereum-based blockchain entry. The QR code physical features also serve as defined areas to probe the signatures arising from the embedded Ln3+-Asp NCs. Visible fluorescence emission with UV-excitation was quantified in terms of color using a smartphone camera and incorporated into blockchain entries. Ultimately, linking unique chemical signature data to blockchain databases is anticipated to make the costs of counterfeiting AM materials significantly more prohibitive and transactions between those in the supply chain more trustworthy.

  16. Signature Pedagogies in Support of Teachers' Professional Learning

    Science.gov (United States)

    Parker, Melissa; Patton, Kevin; O'Sullivan, Mary

    2016-01-01

    Signature pedagogies [Shulman, L. 2005. "Signature pedagogies in the professions." "Daedalus" 134 (3): 52--59.] are a focus of teacher educators seeking to improve teaching and teacher education. The purpose of this paper is to present a preliminary common language of signature pedagogies for teacher professional development…

  17. Characteristics and Validation Techniques for PCA-Based Gene-Expression Signatures

    Directory of Open Access Journals (Sweden)

    Anders E. Berglund

    2017-01-01

    Full Text Available Background. Many gene-expression signatures exist for describing the biological state of profiled tumors. Principal Component Analysis (PCA can be used to summarize a gene signature into a single score. Our hypothesis is that gene signatures can be validated when applied to new datasets, using inherent properties of PCA. Results. This validation is based on four key concepts. Coherence: elements of a gene signature should be correlated beyond chance. Uniqueness: the general direction of the data being examined can drive most of the observed signal. Robustness: if a gene signature is designed to measure a single biological effect, then this signal should be sufficiently strong and distinct compared to other signals within the signature. Transferability: the derived PCA gene signature score should describe the same biology in the target dataset as it does in the training dataset. Conclusions. The proposed validation procedure ensures that PCA-based gene signatures perform as expected when applied to datasets other than those that the signatures were trained upon. Complex signatures, describing multiple independent biological components, are also easily identified.

  18. Quantum blind dual-signature scheme without arbitrator

    International Nuclear Information System (INIS)

    Li, Wei; Shi, Ronghua; Huang, Dazu; Shi, Jinjing; Guo, Ying

    2016-01-01

    Motivated by the elegant features of a bind signature, we suggest the design of a quantum blind dual-signature scheme with three phases, i.e., initial phase, signing phase and verification phase. Different from conventional schemes, legal messages are signed not only by the blind signatory but also by the sender in the signing phase. It does not rely much on an arbitrator in the verification phase as the previous quantum signature schemes usually do. The security is guaranteed by entanglement in quantum information processing. Security analysis demonstrates that the signature can be neither forged nor disavowed by illegal participants or attacker. It provides a potential application for e-commerce or e-payment systems with the current technology. (paper)

  19. Quantum blind dual-signature scheme without arbitrator

    Science.gov (United States)

    Li, Wei; Shi, Ronghua; Huang, Dazu; Shi, Jinjing; Guo, Ying

    2016-03-01

    Motivated by the elegant features of a bind signature, we suggest the design of a quantum blind dual-signature scheme with three phases, i.e., initial phase, signing phase and verification phase. Different from conventional schemes, legal messages are signed not only by the blind signatory but also by the sender in the signing phase. It does not rely much on an arbitrator in the verification phase as the previous quantum signature schemes usually do. The security is guaranteed by entanglement in quantum information processing. Security analysis demonstrates that the signature can be neither forged nor disavowed by illegal participants or attacker. It provides a potential application for e-commerce or e-payment systems with the current technology.

  20. Development and empirical user-centered evaluation of semantically-based query recommendation for an electronic health record search engine.

    Science.gov (United States)

    Hanauer, David A; Wu, Danny T Y; Yang, Lei; Mei, Qiaozhu; Murkowski-Steffy, Katherine B; Vydiswaran, V G Vinod; Zheng, Kai

    2017-03-01

    The utility of biomedical information retrieval environments can be severely limited when users lack expertise in constructing effective search queries. To address this issue, we developed a computer-based query recommendation algorithm that suggests semantically interchangeable terms based on an initial user-entered query. In this study, we assessed the value of this approach, which has broad applicability in biomedical information retrieval, by demonstrating its application as part of a search engine that facilitates retrieval of information from electronic health records (EHRs). The query recommendation algorithm utilizes MetaMap to identify medical concepts from search queries and indexed EHR documents. Synonym variants from UMLS are used to expand the concepts along with a synonym set curated from historical EHR search logs. The empirical study involved 33 clinicians and staff who evaluated the system through a set of simulated EHR search tasks. User acceptance was assessed using the widely used technology acceptance model. The search engine's performance was rated consistently higher with the query recommendation feature turned on vs. off. The relevance of computer-recommended search terms was also rated high, and in most cases the participants had not thought of these terms on their own. The questions on perceived usefulness and perceived ease of use received overwhelmingly positive responses. A vast majority of the participants wanted the query recommendation feature to be available to assist in their day-to-day EHR search tasks. Challenges persist for users to construct effective search queries when retrieving information from biomedical documents including those from EHRs. This study demonstrates that semantically-based query recommendation is a viable solution to addressing this challenge. Published by Elsevier Inc.

  1. Infrared ship signature analysis and optimisation

    NARCIS (Netherlands)

    Neele, F.P.

    2005-01-01

    The last decade has seen an increase in the awareness of the infrared signature of naval ships. New ship designs show that infrared signature reduction measures are being incorporated, such as exhaust gas cooling systems, relocation of the exhausts and surface cooling systems. Hull and

  2. Xyce Parallel Electronic Simulator Users' Guide Version 6.7.

    Energy Technology Data Exchange (ETDEWEB)

    Keiter, Eric R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Aadithya, Karthik Venkatraman [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mei, Ting [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Russo, Thomas V. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Schiek, Richard [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sholander, Peter E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Thornquist, Heidi K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Verley, Jason [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-05-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been designed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas: Capability to solve extremely large circuit problems by supporting large-scale parallel com- puting platforms (up to thousands of processors). This includes support for most popular parallel and serial computers. A differential-algebraic-equation (DAE) formulation, which better isolates the device model package from solver algorithms. This allows one to develop new types of analysis without requiring the implementation of analysis-specific device models. Device models that are specifically tailored to meet Sandia's needs, including some radiation- aware devices (for Sandia users only). Object-oriented code design and implementation using modern coding practices. Xyce is a parallel code in the most general sense of the phrase -- a message passing parallel implementation -- which allows it to run efficiently a wide range of computing platforms. These include serial, shared-memory and distributed-memory parallel platforms. Attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows. The information herein is subject to change without notice. Copyright c 2002-2017 Sandia Corporation. All rights reserved. Trademarks Xyce TM Electronic Simulator and Xyce TM are trademarks of Sandia Corporation. Orcad, Orcad Capture, PSpice and Probe are registered trademarks of Cadence Design Systems, Inc. Microsoft, Windows and Windows 7 are registered trademarks of Microsoft Corporation. Medici, DaVinci and Taurus are registered trademarks of Synopsys Corporation. Amtec and TecPlot are trademarks of

  3. Fine-Grained Forward-Secure Signature Schemes without Random Oracles

    DEFF Research Database (Denmark)

    Camenisch, Jan; Koprowski, Maciej

    2006-01-01

    We propose the concept of fine-grained forward-secure signature schemes. Such signature schemes not only provide nonrepudiation w.r.t. past time periods the way ordinary forward-secure signature schemes do but, in addition, allow the signer to specify which signatures of the current time period...... remain valid when revoking the public key. This is an important advantage if the signer produces many signatures per time period as otherwise the signer would have to re-issue those signatures (and possibly re-negotiate the respective messages) with a new key.Apart from a formal model for fine......-grained forward-secure signature schemes, we present practical schemes and prove them secure under the strong RSA assumption only, i.e., we do not resort to the random oracle model to prove security. As a side-result, we provide an ordinary forward-secure scheme whose key-update time is significantly smaller than...

  4. A Signature Comparing Android Mobile Application Utilizing Feature Extracting Algorithms

    Directory of Open Access Journals (Sweden)

    Paul Grafilon

    2017-08-01

    Full Text Available The paper presented one of the application that can be done using smartphones camera. Nowadays forgery is one of the most undetected crimes. With the forensic technology used today it is still difficult for authorities to compare and define what a real signature is and what a forged signature is. A signature is a legal representation of a person. All transactions are based on a signature. Forgers may use a signature to sign illegal contracts and withdraw from bank accounts undetected. A signature can also be forged during election periods for repeated voting. Addressing the issues a signature should always be secure. Signature verification is a reduced problem that still poses a real challenge for researchers. The literature on signature verification is quite extensive and shows two main areas of research off-line and on-line systems. Off-line systems deal with a static image of the signature i.e. the result of the action of signing while on-line systems work on the dynamic process of generating the signature i.e. the action of signing itself. The researchers have found a way to resolve the concerns. A mobile application that integrates the camera to take a picture of a signature analyzes it and compares it to other signatures for verification. It will exist to help citizens to be more cautious and aware with issues regarding the signatures. This might also be relevant to help organizations and institutions such as banks and insurance companies in verifying signatures that may avoid unwanted transactions and identity theft. Furthermore this might help the authorities in the never ending battle against crime especially against forgers and thieves. The project aimed to design and develop a mobile application that integrates the smartphone camera for verifying and comparing signatures for security using the best algorithm possible. As the result of the development the said smartphone camera application is functional and reliable.

  5. Program For Local-Area-Network Electronic Mail

    Science.gov (United States)

    Weiner, Michael J.

    1989-01-01

    MailRoom is computer program for local-area network (LAN) electronic mail. Enables users of LAN to exchange electronically notes, letters, reminders, or any sort of communication via their computers. Links all users of LAN into communication circle in which messages created, sent, copied, printed, downloaded, uploaded, and deleted through series of menu-driven screens. Includes feature that enables users to determine whether messages sent have been read by receivers. Written in Microsoft QuickBasic.

  6. Digital management of an electron microscope unit

    International Nuclear Information System (INIS)

    Elea, N.; Dickson, M.; Munroe, P.

    2002-01-01

    Full text: Electron microscope units, especially those such as ours, which operate as a central infrastructural facility are increasingly asked to provide more service, over more instruments with decreasing, or limited, financial resources. We believe that staff time is best used performing electron microscopy, assisting users and maintaining instrumentation rather than in the pursuit of red tape. One solution to this problem has been the creation of a control system which performs all routine acts of data management, such as the archiving and accessing of digital data, providing access to bookings, and most importantly in the era of user pays services, logging time and billing users. The system we have created, developed and expanded allows the users themselves to access our server through any web-browser and make their own bookings or access and manipulate their data. Users themselves must log on to a microscope through swipecard readers before it can be used and log-off after use. Their time is logged precisely and an exquisitely fair user pays systems can be operated by transferring logged usage time to spreadsheets to calculate charges. Furthermore, this system acts as a method of user authentication and can be used to bar incompetent or unauthorised users. The system has recently been upgraded to increase its utility to include sensors that monitor the electron microscope operating environment, such as magnetic field, room temperature, water flow etc, so that if these parameters depart significantly from optimum levels electron microscope unit staff may be alerted. In this presentation the structure of our system will be described and the advantages and disadvantages of such a system will be discussed. Copyright (2002) Australian Society for Electron Microscopy Inc

  7. 21 CFR 1309.32 - Application forms; contents; signature.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Application forms; contents; signature. 1309.32... Application forms; contents; signature. (a) Any person who is required to be registered pursuant to § 1309.21... this paragraph and shall contain the signature of the individual being authorized to sign the...

  8. 38 CFR 18b.21 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Signature of documents. 18b.21 Section 18b.21 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS... Documents § 18b.21 Signature of documents. The signature of a party, authorized officer, employee, or...

  9. Detection of chemical explosives using multiple photon signatures

    International Nuclear Information System (INIS)

    Loschke, K.W.; Dunn, W.L.

    2008-01-01

    Full text: A template-matching procedure to aid in rapid detection of improvised explosive devices (IEDs) is being investigated. Multiple photon-scattered and photon-induced positron annihilation radiation responses are being used as part of a photon-neutron signature-based radiation scanning (SBRS) approach (see companion reference for description of the neutron component), in an attempt to detect chemical explosives at safe standoff distances. Many past and present photon interrogation methods are based on imaging. Imaging techniques seek to determine at high special resolution the internal structure of a target of interest. Our technique simply seeks to determine if an unknown target contains a detectable amount of chemical explosives by comparing multiple responses (signatures) that depend on both density and composition of portions of a target. In the photon component, beams of photons are used to create back-streaming signatures, which are dependent on the density and composition of part of the target being interrogated. These signatures are compared to templates, which are collections of the same signatures if the interrogated volume contained a significant amount of explosives. The signature analysis produces a figure-of-merit and a standard deviation of the figure-of-merit. These two metrics are used to filter safe from dangerous targets. Experiments have been conducted that show that explosive surrogates (fertilizers) can be distinguished from several inert materials using these photon signatures, demonstrating that these signatures can be used effectively to help IEDs

  10. User-centered design for personalization

    NARCIS (Netherlands)

    van Velsen, Lex Stefan

    2011-01-01

    In chapter 1, I introduced the concept of personalization and showed how tailored electronic communication is the product of centuries of evolution. Personalization involves gearing communication towards an individual’s characteristics, preferences and context. User-Centered Design (UCD) was

  11. Enhanced arbitrated quantum signature scheme using Bell states

    International Nuclear Information System (INIS)

    Wang Chao; Liu Jian-Wei; Shang Tao

    2014-01-01

    We investigate the existing arbitrated quantum signature schemes as well as their cryptanalysis, including intercept-resend attack and denial-of-service attack. By exploring the loopholes of these schemes, a malicious signatory may successfully disavow signed messages, or the receiver may actively negate the signature from the signatory without being detected. By modifying the existing schemes, we develop counter-measures to these attacks using Bell states. The newly proposed scheme puts forward the security of arbitrated quantum signature. Furthermore, several valuable topics are also presented for further research of the quantum signature scheme

  12. A Conceptual Model for Increasing Use of Electronic Medical Records by Primary Care Physicians Through End-User Support.

    Science.gov (United States)

    Randhawa, Gurprit K

    2017-01-01

    A conceptual model for exploring the relationship between end-user support (EUS) and electronic medical record (EMR) use by primary care physicians is presented. The model was developed following a review of conceptual and theoretical frameworks related to technology adoption/use and EUS. The model includes (a) one core construct (facilitating conditions), (b) four antecedents and one postcedent of facilitating conditions, and (c) four moderators. EMR use behaviour is the key outcome of the model. The proposed conceptual model should be tested. The model may be used to inform planning and decision-making for EMR implementations to increase EMR use for benefits realization.

  13. Inter-dependence of the electron beam excitations with the free electron laser stability on the super-ACO storage ring

    CERN Document Server

    Couprie, Marie Emmanuelle; Nutarelli, D; Renault, E; Billardon, M

    1999-01-01

    Storage ring free electron lasers have a complex dynamics as compared to the LINAC driven FEL sources since both the laser and the recirculating electron beam behaviours are involved. Electron beam perturbations can strongly affect the FEL operation (start-up, stability) whereas the FEL can stabilize beam instabilities. Experimental analysis together with simulations are reported here. Improvements of the Super-ACO FEL for users is discussed, and consequences are given in terms of electron beam tolerances for a source development for users.

  14. Voltage-induced switching with magnetoresistance signature in magnetic nano-filaments

    International Nuclear Information System (INIS)

    Sokolov, A; Sabirianov, I; Sabirianov, R; Doudin, B

    2009-01-01

    Large hysteretic resistance changes are reported on sub-100 nm diameter metallic nanowires including thin dielectric junctions. Bi-stable 50% switching in a double junction geometry is modeled in terms of an occupation-driven metal-insulator transition in one of the two junctions, using the generalized Poisson expressions of Oka and Nagaosa (2005 Phys. Rev. Lett. 95 266403). It illustrates how a band bending scheme can be generalized for strongly correlated electron systems. The magnetic constituents of the nanowires provide a magnetoresistive signature of the two resistance states, confirming our model and enabling a four states device application.

  15. FIR signature verification system characterizing dynamics of handwriting features

    Science.gov (United States)

    Thumwarin, Pitak; Pernwong, Jitawat; Matsuura, Takenobu

    2013-12-01

    This paper proposes an online signature verification method based on the finite impulse response (FIR) system characterizing time-frequency characteristics of dynamic handwriting features. First, the barycenter determined from both the center point of signature and two adjacent pen-point positions in the signing process, instead of one pen-point position, is used to reduce the fluctuation of handwriting motion. In this paper, among the available dynamic handwriting features, motion pressure and area pressure are employed to investigate handwriting behavior. Thus, the stable dynamic handwriting features can be described by the relation of the time-frequency characteristics of the dynamic handwriting features. In this study, the aforesaid relation can be represented by the FIR system with the wavelet coefficients of the dynamic handwriting features as both input and output of the system. The impulse response of the FIR system is used as the individual feature for a particular signature. In short, the signature can be verified by evaluating the difference between the impulse responses of the FIR systems for a reference signature and the signature to be verified. The signature verification experiments in this paper were conducted using the SUBCORPUS MCYT-100 signature database consisting of 5,000 signatures from 100 signers. The proposed method yielded equal error rate (EER) of 3.21% on skilled forgeries.

  16. Simulation of the vibrational chemistry and the infrared signature induced by a Sprite streamer in the mesosphere

    Science.gov (United States)

    Romand, F.; Payan, S.; Croize, L.

    2017-12-01

    Since their first observation in 1989, effect of TLEs on the atmospheric composition has become an open and important question. The lack of suitable experimental data is a shortcoming that hampers our understanding of the physics and chemistry induced by these effects. HALESIS (High-Altitude Luminous Events Studied by Infrared Spectro-imagery) is a future experiment dedicated to the measurement of the atmospheric perturbation induced by a TLE in the minutes following its occurrence, from a stratospheric balloon flying at an altitude of 25 km to 40 km. This work aims to quantify the local chemical impact of sprites in the stratosphere and mesosphere. In this paper, we will present the development of a tool which simulates (i) the impact of a sprite on the vibrational chemistry, (ii) the resulting infrared signature and (iii) the propagation of this signature through the atmosphere to an observer. First the Non Local Thermodynamic Equilibrium populations of a background atmosphere were computed using SAMM2 code. The initial thermodynamic and chemical description of atmosphere comes from the Whole Atmosphere community Climate Model (WACCM). Then a perturbation was applied to simulate a sprite. Chemistry due to TLEs was computed using Gordillo-Vazquez kinetic model. Rate coefficients that depend on the electron energy distribution function were calculated from collision cross-section data by solving the electron Boltzmann equation (BE). Time evolutions of the species densities and of vibrational populations in the non-thermal plasma consecutive to sprite discharge were simulated using the computer code ZDPlasKin (S. Pancheshn et al.). Finally, the resulting infrared signatures were propagated from the disturbed area through the atmosphere to an instrument placed in a limb line of sight using a line by line radiative transfer model. We will conclude that sprite could produce a significant infrared signature that last a few tens of seconds after the visible flash.

  17. End of paper registration forms for new computer users

    CERN Multimedia

    2007-01-01

    As of 3rd December 2007 it will be possible for new users to sign the Computer Centre User Registration Form electronically. As before, new users will still need to go to their computing group administrator, who will make the electronic request for account creation using CRA and give the new user his or her initial password. The difference is that the requested accounts will be created and usable almost immediately. Users will then have 3 days within which they must go to the web page http://cern.ch/cernaccount and click on ‘New User’. They will be required to follow a short computer security awareness training course, read the CERN Computing Rules and then confirm that they accept the rules. If this is not completed within 3 days all their computer accounts will be blocked and they will have to contact the Helpdesk to unblock their accounts and get a second chance to complete the registration. During the introductory phase the existing paper forms will also be accepted ...

  18. POSSIBILITIES OF DYNAMIC BIOMETRICS FOR AUTHENTICATION AND THE CIRCUMSTANCES FOR USING DYNAMIC BIOMETRIC SIGNATURE

    OpenAIRE

    Hortai, František

    2017-01-01

    New information technologies alongside their benefits also bring new dangers with themselves. It is difficult to decide which authentication tool to use and implement in the information systems and electronic documents. The final decision has to compromise among the facts that it faces several conflicting requirements: highly secure tool, to be a user-friendly and user simplicity method, ensure protection against errors and failures of users, speed of authentication and provide these features...

  19. Quantum signature scheme based on a quantum search algorithm

    International Nuclear Information System (INIS)

    Yoon, Chun Seok; Kang, Min Sung; Lim, Jong In; Yang, Hyung Jin

    2015-01-01

    We present a quantum signature scheme based on a two-qubit quantum search algorithm. For secure transmission of signatures, we use a quantum search algorithm that has not been used in previous quantum signature schemes. A two-step protocol secures the quantum channel, and a trusted center guarantees non-repudiation that is similar to other quantum signature schemes. We discuss the security of our protocol. (paper)

  20. Development and evaluation of nursing user interface screens using multiple methods.

    Science.gov (United States)

    Hyun, Sookyung; Johnson, Stephen B; Stetson, Peter D; Bakken, Suzanne

    2009-12-01

    Building upon the foundation of the Structured Narrative Electronic Health Record (EHR) model, we applied theory-based (combined Technology Acceptance Model and Task-Technology Fit Model) and user-centered methods to explore nurses' perceptions of functional requirements for an electronic nursing documentation system, design user interface screens reflective of the nurses' perspectives, and assess nurses' perceptions of the usability of the prototype user interface screens. The methods resulted in user interface screens that were perceived to be easy to use, potentially useful, and well-matched to nursing documentation tasks associated with Nursing Admission Assessment, Blood Administration, and Nursing Discharge Summary. The methods applied in this research may serve as a guide for others wishing to implement user-centered processes to develop or extend EHR systems. In addition, some of the insights obtained in this study may be informative to the development of safe and efficient user interface screens for nursing document templates in EHRs.

  1. Overloaded CDMA Systems with Displaced Binary Signatures

    Directory of Open Access Journals (Sweden)

    Vanhaverbeke Frederik

    2004-01-01

    Full Text Available We extend three types of overloaded CDMA systems, by displacing in time the binary signature sequences of these systems: (1 random spreading (PN, (2 multiple-OCDMA (MO, and (3 PN/OCDMA (PN/O. For each of these systems, we determine the time shifts that minimize the overall multiuser interference power. The achievable channel load with coded and uncoded data is evaluated for the conventional (without displacement and improved (with displacement systems, as well as for systems based on quasi-Welch-bound-equality (QWBE sequences, by means of several types of turbo detectors. For each system, the best performing turbo detector is selected in order to compare the performance of these systems. It is found that the improved systems substantially outperform their original counterparts. With uncoded data, (improved PN/O yields the highest acceptable channel load. For coded data, MO allows for the highest acceptable channel load over all considered systems, both for the conventional and the improved systems. In the latter case, channel loads of about 280% are achievable with a low degradation as compared to a single user system.

  2. Importance of conduction electron correlation in a Kondo lattice, Ce₂CoSi₃.

    Science.gov (United States)

    Patil, Swapnil; Pandey, Sudhir K; Medicherla, V R R; Singh, R S; Bindu, R; Sampathkumaran, E V; Maiti, Kalobaran

    2010-06-30

    Kondo systems are usually described by the interaction of the correlation induced local moments with the highly itinerant conduction electrons. Here, we study the role of electron correlations among conduction electrons in the electronic structure of a Kondo lattice compound, Ce₂CoSi₃, using high resolution photoemission spectroscopy and ab initio band structure calculations, where Co 3d electrons contribute in the conduction band. High energy resolution employed in the measurements helped to reveal the signatures of Ce 4f states derived Kondo resonance features at the Fermi level and the dominance of Co 3d contributions at higher binding energies in the conduction band. The lineshape of the experimental Co 3d band is found to be significantly different from that obtained from the band structure calculations within the local density approximations, LDA. Consideration of electron-electron Coulomb repulsion, U, among Co 3d electrons within the LDA + U method leads to a better representation of experimental results. The signature of an electron correlation induced satellite feature is also observed in the Co 2p core level spectrum. These results clearly demonstrate the importance of the electron correlation among conduction electrons in deriving the microscopic description of such Kondo systems.

  3. Molecular signatures of thyroid follicular neoplasia

    DEFF Research Database (Denmark)

    Borup, R.; Rossing, M.; Henao, Ricardo

    2010-01-01

    The molecular pathways leading to thyroid follicular neoplasia are incompletely understood, and the diagnosis of follicular tumors is a clinical challenge. To provide leads to the pathogenesis and diagnosis of the tumors, we examined the global transcriptome signatures of follicular thyroid...... a mechanism for cancer progression, which is why we exploited the results in order to generate a molecular classifier that could identify 95% of all carcinomas. Validation employing public domain and cross-platform data demonstrated that the signature was robust and could diagnose follicular nodules...... and robust genetic signature for the diagnosis of FA and FC. Endocrine-Related Cancer (2010) 17 691-708...

  4. Motif signatures of transcribed enhancers

    KAUST Repository

    Kleftogiannis, Dimitrios

    2017-09-14

    In mammalian cells, transcribed enhancers (TrEn) play important roles in the initiation of gene expression and maintenance of gene expression levels in spatiotemporal manner. One of the most challenging questions in biology today is how the genomic characteristics of enhancers relate to enhancer activities. This is particularly critical, as several recent studies have linked enhancer sequence motifs to specific functional roles. To date, only a limited number of enhancer sequence characteristics have been investigated, leaving space for exploring the enhancers genomic code in a more systematic way. To address this problem, we developed a novel computational method, TELS, aimed at identifying predictive cell type/tissue specific motif signatures. We used TELS to compile a comprehensive catalog of motif signatures for all known TrEn identified by the FANTOM5 consortium across 112 human primary cells and tissues. Our results confirm that distinct cell type/tissue specific motif signatures characterize TrEn. These signatures allow discriminating successfully a) TrEn from random controls, proxy of non-enhancer activity, and b) cell type/tissue specific TrEn from enhancers expressed and transcribed in different cell types/tissues. TELS codes and datasets are publicly available at http://www.cbrc.kaust.edu.sa/TELS.

  5. Cue-reactivity in experienced electronic cigarette users: Novel stimulus videos and a pilot fMRI study

    Science.gov (United States)

    Nichols, Travis T.; Foulds, Jonathan; Yingst, Jessica; Veldheer, Susan; Hrabovsky, Shari; Richie, John; Eissenberg, Thomas; Wilson, Stephen J.

    2015-01-01

    Some individuals who try electronic cigarettes (e-cigarettes) continue to use long-term. Previous research has investigated the safety of e-cigarettes and their potential for use in smoking cessation, but comparatively little research has explored chronic or habitual e-cigarette use. In particular, the relationship between e-cigarette cues and craving is unknown. We sought to bridge this gap by developing a novel set of e-cigarette (salient) and electronic toothbrush (neutral) videos for use in cue-reactivity paradigms. Additionally, we demonstrate the utility of this approach in a pilot fMRI study of 7 experienced e-cigarette users. Participants were scanned while viewing the cue videos before and after 10 minute use of their own e-cigarettes (producing an 11.7 ng/ml increase in plasma nicotine concentration). A significant session (pre- and post-use) by video type (salient and neutral) interaction was exhibited in many sensorimotor areas commonly activated in other cue-reactivity paradigms. We did not detect significant cue-related activity in other brain regions notable in the craving literature. Possible reasons for this discrepancy are discussed, including the importance of matching cue stimuli to participants’ experiences. PMID:26478134

  6. Cue-reactivity in experienced electronic cigarette users: Novel stimulus videos and a pilot fMRI study.

    Science.gov (United States)

    Nichols, Travis T; Foulds, Jonathan; Yingst, Jessica M; Veldheer, Susan; Hrabovsky, Shari; Richie, John; Eissenberg, Thomas; Wilson, Stephen J

    2016-05-01

    Some individuals who try electronic cigarettes (e-cigarettes) continue to use long-term. Previous research has investigated the safety of e-cigarettes and their potential for use in smoking cessation, but comparatively little research has explored chronic or habitual e-cigarette use. In particular, the relationship between e-cigarette cues and craving is unknown. We sought to bridge this gap by developing a novel set of e-cigarette (salient) and electronic toothbrush (neutral) videos for use in cue-reactivity paradigms. Additionally, we demonstrate the utility of this approach in a pilot fMRI study of 7 experienced e-cigarette users. Participants were scanned while viewing the cue videos before and after 10min use of their own e-cigarettes (producing an 11.7ng/ml increase in plasma nicotine concentration). A significant session (pre- and post-use) by video type (salient and neutral) interaction was exhibited in many sensorimotor areas commonly activated in other cue-reactivity paradigms. We did not detect significant cue-related activity in other brain regions notable in the craving literature. Possible reasons for this discrepancy are discussed, including the importance of matching cue stimuli to participants' experiences. Copyright © 2015 Elsevier Inc. All rights reserved.

  7. ADVISOR Users Conference Proceedings 2000 - Final Electronic version

    Energy Technology Data Exchange (ETDEWEB)

    NREL

    2000-09-26

    This is a compilation of papers presented at the ADVISOR (ADvanced Vehicle SimulatOR) Users Conference held in Costa Mesa, California, August 24-25, 2000. Major topics of the conference included modeling and simulation; partnering with the auto industry; co-simulation: partnering with the software industry in optimization and thermal modeling and geometric and mechanical modeling; forward-looking simulations coupled with ADVISOR; new concepts from universities; validation, vehicle development and applications.

  8. Wearable wireless User Interface Cursor-Controller (UIC-C).

    Science.gov (United States)

    Marjanovic, Nicholas; Kerr, Kevin; Aranda, Ricardo; Hickey, Richard; Esmailbeigi, Hananeh

    2017-07-01

    Controlling a computer or a smartphone's cursor allows the user to access a world full of information. For millions of people with limited upper extremities motor function, controlling the cursor becomes profoundly difficult. Our team has developed the User Interface Cursor-Controller (UIC-C) to assist the impaired individuals in regaining control over the cursor. The UIC-C is a hands-free device that utilizes the tongue muscle to control the cursor movements. The entire device is housed inside a subject specific retainer. The user maneuvers the cursor by manipulating a joystick imbedded inside the retainer via their tongue. The joystick movement commands are sent to an electronic device via a Bluetooth connection. The device is readily recognizable as a cursor controller by any Bluetooth enabled electronic device. The device testing results have shown that the time it takes the user to control the cursor accurately via the UIC-C is about three times longer than a standard computer mouse controlled via the hand. The device does not require any permanent modifications to the body; therefore, it could be used during the period of acute rehabilitation of the hands. With the development of modern smart homes, and enhancement electronics controlled by the computer, UIC-C could be integrated into a system that enables individuals with permanent impairment, the ability to control the cursor. In conclusion, the UIC-C device is designed with the goal of allowing the user to accurately control a cursor during the periods of either acute or permanent upper extremities impairment.

  9. Converting a paper proforma template to a user friendly electronic database to collect traumatic brain injury data

    Directory of Open Access Journals (Sweden)

    Prasad M. Veera

    2014-12-01

    Full Text Available A structured reporting system which is based on a uniform template will permit uniform data collection and future statistics and will facilitate and validate independent or comparative audit of performance and quality of care. The successful establishment of a multi-center registry depends on the development of a concise data entry form, data entry system and data analysis to continuously maintain the registry. In the first phase we introduced the paper data collection form, in second phase this data form was converted to an electronic interface. In this second phase of the study the paper proforma which was developed in the first phase was converted into an electronic database by using the FileMaker Pro 13 Advanced®. The FileMaker Pro 13 Advanced® is capable to store the data, provides user friendly interface to enter data and can be converted the standalone runtime program to install in any other computer system. The next step is to explore the possibility whether it would be feasible to use this as a multicenter traumatic brain injury registry.

  10. Xyce parallel electronic simulator users guide, version 6.0.

    Energy Technology Data Exchange (ETDEWEB)

    Keiter, Eric R; Mei, Ting; Russo, Thomas V.; Schiek, Richard Louis; Thornquist, Heidi K.; Verley, Jason C.; Fixel, Deborah A.; Coffey, Todd S; Pawlowski, Roger P; Warrender, Christina E.; Baur, David Gregory.

    2013-08-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been designed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas: Capability to solve extremely large circuit problems by supporting large-scale parallel computing platforms (up to thousands of processors). This includes support for most popular parallel and serial computers. A differential-algebraic-equation (DAE) formulation, which better isolates the device model package from solver algorithms. This allows one to develop new types of analysis without requiring the implementation of analysis-specific device models. Device models that are specifically tailored to meet Sandias needs, including some radiationaware devices (for Sandia users only). Object-oriented code design and implementation using modern coding practices. Xyce is a parallel code in the most general sense of the phrase a message passing parallel implementation which allows it to run efficiently a wide range of computing platforms. These include serial, shared-memory and distributed-memory parallel platforms. Attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows.

  11. Xyce parallel electronic simulator users' guide, Version 6.0.1.

    Energy Technology Data Exchange (ETDEWEB)

    Keiter, Eric R; Mei, Ting; Russo, Thomas V.; Schiek, Richard Louis; Thornquist, Heidi K.; Verley, Jason C.; Fixel, Deborah A.; Coffey, Todd S; Pawlowski, Roger P; Warrender, Christina E.; Baur, David Gregory.

    2014-01-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been designed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas: Capability to solve extremely large circuit problems by supporting large-scale parallel computing platforms (up to thousands of processors). This includes support for most popular parallel and serial computers. A differential-algebraic-equation (DAE) formulation, which better isolates the device model package from solver algorithms. This allows one to develop new types of analysis without requiring the implementation of analysis-specific device models. Device models that are specifically tailored to meet Sandias needs, including some radiationaware devices (for Sandia users only). Object-oriented code design and implementation using modern coding practices. Xyce is a parallel code in the most general sense of the phrase a message passing parallel implementation which allows it to run efficiently a wide range of computing platforms. These include serial, shared-memory and distributed-memory parallel platforms. Attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows.

  12. Xyce parallel electronic simulator users guide, version 6.1

    Energy Technology Data Exchange (ETDEWEB)

    Keiter, Eric R; Mei, Ting; Russo, Thomas V.; Schiek, Richard Louis; Sholander, Peter E.; Thornquist, Heidi K.; Verley, Jason C.; Baur, David Gregory

    2014-03-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been designed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas; Capability to solve extremely large circuit problems by supporting large-scale parallel computing platforms (up to thousands of processors). This includes support for most popular parallel and serial computers; A differential-algebraic-equation (DAE) formulation, which better isolates the device model package from solver algorithms. This allows one to develop new types of analysis without requiring the implementation of analysis-specific device models; Device models that are specifically tailored to meet Sandia's needs, including some radiationaware devices (for Sandia users only); and Object-oriented code design and implementation using modern coding practices. Xyce is a parallel code in the most general sense of the phrase-a message passing parallel implementation-which allows it to run efficiently a wide range of computing platforms. These include serial, shared-memory and distributed-memory parallel platforms. Attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows.

  13. Improvement Of Search Process In Electronic Catalogues

    Directory of Open Access Journals (Sweden)

    Titas Savickas

    2014-05-01

    Full Text Available The paper presents investigation on search in electronic catalogues. The chosen problem domain is the search system in the electronic catalogue of Lithuanian Academic Libraries. The catalogue uses ALEPH system with MARC21 bibliographic format. The article presents analysis of problems pertaining to the current search engine and user expectations related to the search system of the electronic catalogue of academic libraries. Subsequent to analysis, the research paper presents the architecture for a semantic search system in the electronic catalogue that uses search process designed to improve search results for users.

  14. 12 CFR 269b.731 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Signature. 269b.731 Section 269b.731 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM CHARGES OF UNFAIR LABOR PRACTICES General Rules § 269b.731 Signature. The original of each document filed shall be...

  15. Reduction of a Ship's Magnetic Field Signatures

    CERN Document Server

    Holmes, John

    2008-01-01

    Decreasing the magnetic field signature of a naval vessel will reduce its susceptibility to detonating naval influence mines and the probability of a submarine being detected by underwater barriers and maritime patrol aircraft. Both passive and active techniques for reducing the magnetic signatures produced by a vessel's ferromagnetism, roll-induced eddy currents, corrosion-related sources, and stray fields are presented. Mathematical models of simple hull shapes are used to predict the levels of signature reduction that might be achieved through the use of alternate construction materials. Al

  16. An Improved Digital Signature Protocol to Multi-User Broadcast Authentication Based on Elliptic Curve Cryptography in Wireless Sensor Networks (WSNs

    Directory of Open Access Journals (Sweden)

    Hamed Bashirpour

    2018-03-01

    Full Text Available In wireless sensor networks (WSNs, users can use broadcast authentication mechanisms to connect to the target network and disseminate their messages within the network. Since data transfer for sensor networks is wireless, as a result, attackers can easily eavesdrop deployed sensor nodes and the data sent between them or modify the content of eavesdropped data and inject false data into the sensor network. Hence, the implementation of the message authentication mechanisms (in order to avoid changes and injecting messages into the network of wireless sensor networks is essential. In this paper, we present an improved protocol based on elliptic curve cryptography (ECC to accelerate authentication of multi-user message broadcasting. In comparison with previous ECC-based schemes, complexity and computational overhead of proposed scheme is significantly decreased. Also, the proposed scheme supports user anonymity, which is an important property in broadcast authentication schemes for WSNs to preserve user privacy and user untracking.

  17. Does Twitter trigger bursts in signature collections?

    Science.gov (United States)

    Yamaguchi, Rui; Imoto, Seiya; Kami, Masahiro; Watanabe, Kenji; Miyano, Satoru; Yuji, Koichiro

    2013-01-01

    The quantification of social media impacts on societal and political events is a difficult undertaking. The Japanese Society of Oriental Medicine started a signature-collecting campaign to oppose a medical policy of the Government Revitalization Unit to exclude a traditional Japanese medicine, "Kampo," from the public insurance system. The signature count showed a series of aberrant bursts from November 26 to 29, 2009. In the same interval, the number of messages on Twitter including the keywords "Signature" and "Kampo," increased abruptly. Moreover, the number of messages on an Internet forum that discussed the policy and called for signatures showed a train of spikes. In order to estimate the contributions of social media, we developed a statistical model with state-space modeling framework that distinguishes the contributions of multiple social media in time-series of collected public opinions. We applied the model to the time-series of signature counts of the campaign and quantified contributions of two social media, i.e., Twitter and an Internet forum, by the estimation. We found that a considerable portion (78%) of the signatures was affected from either of the social media throughout the campaign and the Twitter effect (26%) was smaller than the Forum effect (52%) in total, although Twitter probably triggered the initial two bursts of signatures. Comparisons of the estimated profiles of the both effects suggested distinctions between the social media in terms of sustainable impact of messages or tweets. Twitter shows messages on various topics on a time-line; newer messages push out older ones. Twitter may diminish the impact of messages that are tweeted intermittently. The quantification of social media impacts is beneficial to better understand people's tendency and may promote developing strategies to engage public opinions effectively. Our proposed method is a promising tool to explore information hidden in social phenomena.

  18. Does Twitter trigger bursts in signature collections?

    Directory of Open Access Journals (Sweden)

    Rui Yamaguchi

    Full Text Available INTRODUCTION: The quantification of social media impacts on societal and political events is a difficult undertaking. The Japanese Society of Oriental Medicine started a signature-collecting campaign to oppose a medical policy of the Government Revitalization Unit to exclude a traditional Japanese medicine, "Kampo," from the public insurance system. The signature count showed a series of aberrant bursts from November 26 to 29, 2009. In the same interval, the number of messages on Twitter including the keywords "Signature" and "Kampo," increased abruptly. Moreover, the number of messages on an Internet forum that discussed the policy and called for signatures showed a train of spikes. METHODS AND FINDINGS: In order to estimate the contributions of social media, we developed a statistical model with state-space modeling framework that distinguishes the contributions of multiple social media in time-series of collected public opinions. We applied the model to the time-series of signature counts of the campaign and quantified contributions of two social media, i.e., Twitter and an Internet forum, by the estimation. We found that a considerable portion (78% of the signatures was affected from either of the social media throughout the campaign and the Twitter effect (26% was smaller than the Forum effect (52% in total, although Twitter probably triggered the initial two bursts of signatures. Comparisons of the estimated profiles of the both effects suggested distinctions between the social media in terms of sustainable impact of messages or tweets. Twitter shows messages on various topics on a time-line; newer messages push out older ones. Twitter may diminish the impact of messages that are tweeted intermittently. CONCLUSIONS: The quantification of social media impacts is beneficial to better understand people's tendency and may promote developing strategies to engage public opinions effectively. Our proposed method is a promising tool to explore

  19. Re-examining the security of blind quantum signature protocols

    International Nuclear Information System (INIS)

    Wang Mingming; Chen Xiubo; Niu Xinxin; Yang Yixian

    2012-01-01

    Recently, blind quantum signature (BQS) protocols have been proposed with the help of a third-party verifier. However, our research shows that some of the BQS protocols are unable to complete the blind signature task fairly if the verifier is dishonest. Indeed, these protocols can be viewed as variants of the classical digital signature scheme of symmetric-key cryptography. If nobody is trusted in such protocols, digital signature cannot be implemented since disagreements cannot be solved fairly.

  20. Blind Quantum Signature with Blind Quantum Computation

    Science.gov (United States)

    Li, Wei; Shi, Ronghua; Guo, Ying

    2017-04-01

    Blind quantum computation allows a client without quantum abilities to interact with a quantum server to perform a unconditional secure computing protocol, while protecting client's privacy. Motivated by confidentiality of blind quantum computation, a blind quantum signature scheme is designed with laconic structure. Different from the traditional signature schemes, the signing and verifying operations are performed through measurement-based quantum computation. Inputs of blind quantum computation are securely controlled with multi-qubit entangled states. The unique signature of the transmitted message is generated by the signer without leaking information in imperfect channels. Whereas, the receiver can verify the validity of the signature using the quantum matching algorithm. The security is guaranteed by entanglement of quantum system for blind quantum computation. It provides a potential practical application for e-commerce in the cloud computing and first-generation quantum computation.

  1. Modeling ground vehicle acoustic signatures for analysis and synthesis

    International Nuclear Information System (INIS)

    Haschke, G.; Stanfield, R.

    1995-01-01

    Security and weapon systems use acoustic sensor signals to classify and identify moving ground vehicles. Developing robust signal processing algorithms for this is expensive, particularly in presence of acoustic clutter or countermeasures. This paper proposes a parametric ground vehicle acoustic signature model to aid the system designer in understanding which signature features are important, developing corresponding feature extraction algorithms and generating low-cost, high-fidelity synthetic signatures for testing. The authors have proposed computer-generated acoustic signatures of armored, tracked ground vehicles to deceive acoustic-sensored smart munitions. They have developed quantitative measures of how accurately a synthetic acoustic signature matches those produced by actual vehicles. This paper describes parameters of the model used to generate these synthetic signatures and suggests methods for extracting these parameters from signatures of valid vehicle encounters. The model incorporates wide-bandwidth and narrow- bandwidth components that are modulated in a pseudo-random fashion to mimic the time dynamics of valid vehicle signatures. Narrow- bandwidth feature extraction techniques estimate frequency, amplitude and phase information contained in a single set of narrow frequency- band harmonics. Wide-bandwidth feature extraction techniques estimate parameters of a correlated-noise-floor model. Finally, the authors propose a method of modeling the time dynamics of the harmonic amplitudes as a means adding necessary time-varying features to the narrow-bandwidth signal components. The authors present results of applying this modeling technique to acoustic signatures recorded during encounters with one armored, tracked vehicle. Similar modeling techniques can be applied to security systems

  2. DIGITAL SIGNATURE IN THE WAY OF LAW

    OpenAIRE

    Ruya Samlı

    2013-01-01

    Signature can be defined as a person’s name or special signs that he/she writes when he/she wants to indicate he/she wrote or confirm that writing. A person signs many times in his/her life. A person’s signature that is used for thousands of times for many things from formal documents to exams has importance for that person. Especially, signing in legal operations is an operation that can build important results. If a person’s signature is imitated by another person, he/she can be...

  3. A Digital Signature Scheme Based on MST3 Cryptosystems

    Directory of Open Access Journals (Sweden)

    Haibo Hong

    2014-01-01

    Full Text Available As special types of factorization of finite groups, logarithmic signature and cover have been used as the main components of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2, and MST3. Recently, Svaba et. al proposed a revised MST3 encryption scheme with greater security. Meanwhile, they put forward an idea of constructing signature schemes on the basis of logarithmic signatures and random covers. In this paper, we firstly design a secure digital signature scheme based on logarithmic signatures and random covers. In order to complete the task, we devise a new encryption scheme based on MST3 cryptosystems.

  4. Users and user study methodology: the JUBILEE project

    Directory of Open Access Journals (Sweden)

    Linda Banwell

    2004-01-01

    Full Text Available This paper presents both theoretical aspects and practical examples from the on-going and large-scale JUBILEE (JISC User Behaviour in Information seeking: Longitudinal Evaluation of Electronic information services project, now in its fifth year. Particular emphasis will be placed on the importance of using robust theory and methods as the basis for reputable user studies, especially those undertaken by practitioners. Theory underlying the development of the JUBILEE project and Toolkit is outlined, followed by demonstration of its practical use and impact during the project's on-going program of monitoring and evaluation activities. Themes underlying the paper concern the importance to practitioners of the need to understand and adopt a well founded methodology and sound methods with which to conduct projects, the additional benefits they can derive by so doing, and the pitfalls and dangers of not so doing. JUBILEE is used throughout as the example project to demonstrate the points made.

  5. Signature detection and matching for document image retrieval.

    Science.gov (United States)

    Zhu, Guangyu; Zheng, Yefeng; Doermann, David; Jaeger, Stefan

    2009-11-01

    As one of the most pervasive methods of individual identification and document authentication, signatures present convincing evidence and provide an important form of indexing for effective document image processing and retrieval in a broad range of applications. However, detection and segmentation of free-form objects such as signatures from clustered background is currently an open document analysis problem. In this paper, we focus on two fundamental problems in signature-based document image retrieval. First, we propose a novel multiscale approach to jointly detecting and segmenting signatures from document images. Rather than focusing on local features that typically have large variations, our approach captures the structural saliency using a signature production model and computes the dynamic curvature of 2D contour fragments over multiple scales. This detection framework is general and computationally tractable. Second, we treat the problem of signature retrieval in the unconstrained setting of translation, scale, and rotation invariant nonrigid shape matching. We propose two novel measures of shape dissimilarity based on anisotropic scaling and registration residual error and present a supervised learning framework for combining complementary shape information from different dissimilarity metrics using LDA. We quantitatively study state-of-the-art shape representations, shape matching algorithms, measures of dissimilarity, and the use of multiple instances as query in document image retrieval. We further demonstrate our matching techniques in offline signature verification. Extensive experiments using large real-world collections of English and Arabic machine-printed and handwritten documents demonstrate the excellent performance of our approaches.

  6. Analyzing Lysosome-Related Organelles by Electron Microscopy

    KAUST Repository

    Hurbain, Ilse

    2017-04-29

    Intracellular organelles have a particular morphological signature that can only be appreciated by ultrastructural analysis at the electron microscopy level. Optical imaging and associated methodologies allow to explore organelle localization and their dynamics at the cellular level. Deciphering the biogenesis and functions of lysosomes and lysosome-related organelles (LROs) and their dysfunctions requires their visualization and detailed characterization at high resolution by electron microscopy. Here, we provide detailed protocols for studying LROs by transmission electron microscopy. While conventional electron microscopy and its recent improvements is the method of choice to investigate organelle morphology, immunoelectron microscopy allows to localize organelle components and description of their molecular make up qualitatively and quantitatively.

  7. Server-Aided Verification Signature with Privacy for Mobile Computing

    Directory of Open Access Journals (Sweden)

    Lingling Xu

    2015-01-01

    Full Text Available With the development of wireless technology, much data communication and processing has been conducted in mobile devices with wireless connection. As we know that the mobile devices will always be resource-poor relative to static ones though they will improve in absolute ability, therefore, they cannot process some expensive computational tasks due to the constrained computational resources. According to this problem, server-aided computing has been studied in which the power-constrained mobile devices can outsource some expensive computation to a server with powerful resources in order to reduce their computational load. However, in existing server-aided verification signature schemes, the server can learn some information about the message-signature pair to be verified, which is undesirable especially when the message includes some secret information. In this paper, we mainly study the server-aided verification signatures with privacy in which the message-signature pair to be verified can be protected from the server. Two definitions of privacy for server-aided verification signatures are presented under collusion attacks between the server and the signer. Then based on existing signatures, two concrete server-aided verification signature schemes with privacy are proposed which are both proved secure.

  8. LabVIEW Serial Driver Software for an Electronic Load

    Science.gov (United States)

    Scullin, Vincent; Garcia, Christopher

    2003-01-01

    A LabVIEW-language computer program enables monitoring and control of a Transistor Devices, Inc., Dynaload WCL232 (or equivalent) electronic load via an RS-232 serial communication link between the electronic load and a remote personal computer. (The electronic load can operate at constant voltage, current, power consumption, or resistance.) The program generates a graphical user interface (GUI) at the computer that looks and acts like the front panel of the electronic load. Once the electronic load has been placed in remote-control mode, this program first queries the electronic load for the present values of all its operational and limit settings, and then drops into a cycle in which it reports the instantaneous voltage, current, and power values in displays that resemble those on the electronic load while monitoring the GUI images of pushbuttons for control actions by the user. By means of the pushbutton images and associated prompts, the user can perform such operations as changing limit values, the operating mode, or the set point. The benefit of this software is that it relieves the user of the need to learn one method for operating the electronic load locally and another method for operating it remotely via a personal computer.

  9. Plasma wave observations during electron and ion gun experiments

    International Nuclear Information System (INIS)

    Olsen, R.C.; Lowery, D.R.; Weddle, L.E.

    1988-01-01

    Plasma wave instruments with high temporal and frequency resolution in the 0-6 kHz frequency range have been used to monitor electron gun-employing charge control experiments with the USAF/NASA p78-2 satellite, in order to determine whether plasma wave signatures consistent with the previous inference of electron heating were present. Strong plasma waves were noted near the electron gyrofrequency; these waves can heat ambient low energy electrons, as previously inferred. Attention is given to the two distinct classes of behavior revealed by the ion gun experiments. 16 references

  10. Plasma electron signature of magnetic connection to the earth's bow shock: ISEE 3

    International Nuclear Information System (INIS)

    Feldman, W.C.; Anderson, R.C.; Asbridge, J.R.; Bame, S.J.; Gosling, J.T.; Zwickl, R.D.

    1982-01-01

    Enhanced fluxes of low-energy electrons backstreaming from the earth's bow shock have been identified at ISEE 3. When present, these fluxes modify ambient solar wind electron velocity distributions f(v) in characteristic ways that depends on whether ISEE 3 is near the edge, or within the interior of the earth's electron foreshock. Near the edge, energy peaks in f(v) are observed. Such distributions should be locally unstable to electron plasma oscillations. Well within the interior of the foreshock, enhanced fluxes of electrons with energies up to the maximum detected by the Los Alamos electron analyzer (approx.1 keV) are observed over the full backward hemisphere. These electrons can be modelled with an asymptotic power law distribution having index in the range 4< or approx. =p/sub b/s< or approx. =6. At intermediate energies (approx.20--50 eV), twin angular peaks are observed centered on the magnetic field direction B. Also observed at these times are depressions in f(v) at energies less than approx.20 eV that are centered on B. Such distributions having a perpendicular temperature greater than their parallel temperature may be locally unstable to the generation of whistler waves. Analysis of a particularly clean example of connection to the bow shock is consistent with the possiblility that the observed electron fluxes emerge from the forward foot of the electron heating region within bow shock where the electron density and temperature are larger than that of the uperturbed upstream solar wind by a factor of approx.1.2. This analysis also indicates that the electrostatic potential within the forward foot of the shock is between approx.5 and 50 V more positive than that within plasma far upstream at ISEE 3. However, these interpretations depend on the assumption of nearly scatter-free propagation, which may not hold

  11. The electrochemical signature of functionalized single-walled carbon nanotubes bearing electroactive groups

    International Nuclear Information System (INIS)

    Le Floch, Fabien; Thuaire, Aurelie; Simonato, Jean-Pierre; Bidan, Gerard

    2009-01-01

    We report the modification and characterization of single-walled carbon nanotubes (SWCNTs) in view of molecular sensing applications. We found that ultrasonicated SWCNTs present sticking properties that make them adhere on electrode surfaces. This allows excellent characterization of SWCNTs by cyclic voltammetry (CV) before and after chemical functionalization with diazonium salts bearing electroactive groups. Bare SWCNTs presented distinct invariant shapes in CV, used as control curves, in comparison with functionalized SWCNTs for which specific signatures corresponding to the presence of grafted molecules were identified. According to the electronic substituents in the para position of the diazonium salts, divergent behaviours were observed for the grafting reactions. Diazonium salts having electrowithdrawing groups could be grafted without electrochemical induction whereas those bearing electron donating groups required a cathodic potential to generate the formation of the radical species.

  12. The electrochemical signature of functionalized single-walled carbon nanotubes bearing electroactive groups

    Energy Technology Data Exchange (ETDEWEB)

    Le Floch, Fabien; Thuaire, Aurelie; Simonato, Jean-Pierre [LITEN/DTNM/LCRE, CEA-Grenoble 17 rue des Martyrs, 38054 Grenoble cedex 9 (France); Bidan, Gerard [INAC/DIR, CEA-Grenoble 17 rue des Martyrs, 38054 Grenoble cedex 9 (France)], E-mail: jean-pierre.simonato@cea.fr

    2009-04-08

    We report the modification and characterization of single-walled carbon nanotubes (SWCNTs) in view of molecular sensing applications. We found that ultrasonicated SWCNTs present sticking properties that make them adhere on electrode surfaces. This allows excellent characterization of SWCNTs by cyclic voltammetry (CV) before and after chemical functionalization with diazonium salts bearing electroactive groups. Bare SWCNTs presented distinct invariant shapes in CV, used as control curves, in comparison with functionalized SWCNTs for which specific signatures corresponding to the presence of grafted molecules were identified. According to the electronic substituents in the para position of the diazonium salts, divergent behaviours were observed for the grafting reactions. Diazonium salts having electrowithdrawing groups could be grafted without electrochemical induction whereas those bearing electron donating groups required a cathodic potential to generate the formation of the radical species.

  13. A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents

    Science.gov (United States)

    Kabir, Muhammad N.; Alginahi, Yasser M.

    2014-01-01

    This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. Such issues were largely addressed in the literature for images, audio, and video, with only a few papers addressing the challenge of sensitive plain-text media under known constraints. Specifically, with text as the predominant online communication medium, it becomes crucial that techniques are deployed to protect such information. A number of digital-signature, hashing, and watermarking schemes have been proposed that essentially bind source data or embed invisible data in a cover media to achieve its goal. While many such complex schemes with resource redundancies are sufficient in offline and less-sensitive texts, this paper proposes a hybrid approach based on zero-watermarking and digital-signature-like manipulations for sensitive text documents in order to achieve content originality and integrity verification without physically modifying the cover text in anyway. The proposed algorithm was implemented and shown to be robust against undetected content modifications and is capable of confirming proof of originality whilst detecting and locating deliberate/nondeliberate tampering. Additionally, enhancements in resource utilisation and reduced redundancies were achieved in comparison to traditional encryption-based approaches. Finally, analysis and remarks are made about the current state of the art, and future research issues are discussed under the given constraints. PMID:25254247

  14. A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents

    Directory of Open Access Journals (Sweden)

    Omar Tayan

    2014-01-01

    Full Text Available This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. Such issues were largely addressed in the literature for images, audio, and video, with only a few papers addressing the challenge of sensitive plain-text media under known constraints. Specifically, with text as the predominant online communication medium, it becomes crucial that techniques are deployed to protect such information. A number of digital-signature, hashing, and watermarking schemes have been proposed that essentially bind source data or embed invisible data in a cover media to achieve its goal. While many such complex schemes with resource redundancies are sufficient in offline and less-sensitive texts, this paper proposes a hybrid approach based on zero-watermarking and digital-signature-like manipulations for sensitive text documents in order to achieve content originality and integrity verification without physically modifying the cover text in anyway. The proposed algorithm was implemented and shown to be robust against undetected content modifications and is capable of confirming proof of originality whilst detecting and locating deliberate/nondeliberate tampering. Additionally, enhancements in resource utilisation and reduced redundancies were achieved in comparison to traditional encryption-based approaches. Finally, analysis and remarks are made about the current state of the art, and future research issues are discussed under the given constraints.

  15. 48 CFR 4.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Contracting officer's signature. 4.101 Section 4.101 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Contract Execution 4.101 Contracting officer's signature. Only contracting officers shall...

  16. 37 CFR 2.74 - Form and signature of amendment.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Form and signature of... signature of amendment. (a) Form of Amendment. Amendments should be set forth clearly and completely... record. (b) Signature. A request for amendment of an application must be signed by the applicant, someone...

  17. Signature Schemes Secure against Hard-to-Invert Leakage

    DEFF Research Database (Denmark)

    Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus

    2012-01-01

    of the secret key. As a second contribution, we construct a signature scheme that achieves security for random messages assuming that the adversary is given a polynomial-time hard to invert function. Here, polynomial-hardness is required even when given the entire public-key – so called weak auxiliary input......-theoretically reveal the entire secret key. In this work, we propose the first constructions of digital signature schemes that are secure in the auxiliary input model. Our main contribution is a digital signature scheme that is secure against chosen message attacks when given an exponentially hard-to-invert function...... security. We show that such signature schemes readily give us auxiliary input secure identification schemes...

  18. Getting to Know Library Users' Needs

    DEFF Research Database (Denmark)

    Harbo, Karen; Hansen, Thomas Erlandson V.

    2012-01-01

    'Meeting the User' is a programme committee under the Danish Electronic Research Library. As a development group at a national level we see our role as facilitating an innovative culture within academic libraries, focusing on users' needs and the way libraries meet them. In collaboration...... a description of the above-mentioned methods, valuable experiences from the workshop, a presentation of the concept and concrete tools, discussion of the concept of user logic and library services, and the seven principles for human-centered innovation in relation to libraries, a short list of studies carried...... with a consultancy firm, the commitee organized a travelling workshop in four cities in 2010. The workshop introduced practical ways for library staff to get to know their users' needs for services and was based on anthropological methods. The travelling workshop was part of a larger project called 'A Journey...

  19. Xyce parallel electronic simulator.

    Energy Technology Data Exchange (ETDEWEB)

    Keiter, Eric R; Mei, Ting; Russo, Thomas V.; Rankin, Eric Lamont; Schiek, Richard Louis; Thornquist, Heidi K.; Fixel, Deborah A.; Coffey, Todd S; Pawlowski, Roger P; Santarelli, Keith R.

    2010-05-01

    This document is a reference guide to the Xyce Parallel Electronic Simulator, and is a companion document to the Xyce Users Guide. The focus of this document is (to the extent possible) exhaustively list device parameters, solver options, parser options, and other usage details of Xyce. This document is not intended to be a tutorial. Users who are new to circuit simulation are better served by the Xyce Users Guide.

  20. Electron-Electron and Electron-Phonon interactions effects on the tunnel electronic spectrum of PbS quantum dots

    Science.gov (United States)

    Wang, Hongyue; Lhuillier, Emmanuel; Yu, Qian; Mottaghizadeh, Alireza; Ulysse, Christian; Zimmers, Alexandre; Dubertret, Benoit; Aubin, Herve

    2015-03-01

    We present a tunnel spectroscopy study of the electronic spectrum of single PbS Quantum Dots (QDs) trapped between nanometer-spaced electrodes, measured at low temperature T=5 K. The carrier filling of the QD can be controlled either by the drain voltage in the shell filling regime or by a gate voltage. In the empty QD, the tunnel spectrum presents the expected signature of the 8x degenerated excited levels. In the drain controlled shell filling regime, the levels degeneracies are lifted by the global electrostatic Coulomb energy of the QD; in the gate controlled shell filling regime, the levels degeneracies are lifted by the intra-Coulomb interactions. In the charged quantum dot, electron-phonons interactions lead to the apparition of Franck-Condon side bands on the single excited levels and possibly Franck Condon blockade at low energy. The sharpening of excited levels at higher gate voltage suggests that the magnitude of electron-phonon interactions is decreased upon increasing the electron filling in the quantum dot. This work was supported by the French ANR Grants 10-BLAN-0409-01, 09-BLAN-0388-01, by the Region Ile-de-France in the framework of DIM Nano-K and by China Scholarship Council.

  1. Staggering in signature partners of A∼190 mass region of superdeformed rotational bands

    International Nuclear Information System (INIS)

    Uma, V.S.; Goel, Alpana; Yadav, Archana

    2014-01-01

    This paper discuss about ΔI=1 signature splitting in signature partner pairs of A∼190 mass region. Around twenty signature partner pairs (usually called as two bands, each with a fixed signature) have been reported in this mass region. For these signature pairs, band head moment of inertia (J 0 ) and intrinsic structure of each pair of signature partners have been found as almost identical. Also, these signature partner pairs showed large amplitude signature splitting. As each of the two signature partner forms a regular spin sequence and signature bands are not equivalent in terms of energies. This difference in energies results in signature splitting

  2. 22 CFR 92.28 - Signature of affiant on affidavit.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Signature of affiant on affidavit. 92.28 Section 92.28 Foreign Relations DEPARTMENT OF STATE LEGAL AND RELATED SERVICES NOTARIAL AND RELATED SERVICES Specific Notarial Acts § 92.28 Signature of affiant on affidavit. The signature of the affiant is...

  3. Induced Temporal Signatures for Point-Source Detection

    International Nuclear Information System (INIS)

    Stephens, Daniel L.; Runkle, Robert C.; Carlson, Deborah K.; Peurrung, Anthony J.; Seifert, Allen; Wyatt, Cory R.

    2005-01-01

    Detection of radioactive point-sized sources is inherently divided into two regimes encompassing stationary and moving detectors. The two cases differ in their treatment of background radiation and its influence on detection sensitivity. In the stationary detector case the statistical fluctuation of the background determines the minimum detectable quantity. In the moving detector case the detector may be subjected to widely and irregularly varying background radiation, as a result of geographical and environmental variation. This significant systematic variation, in conjunction with the statistical variation of the background, requires a conservative threshold to be selected to yield the same false-positive rate as the stationary detection case. This results in lost detection sensitivity for real sources. This work focuses on a simple and practical modification of the detector geometry that increase point-source recognition via a distinctive temporal signature. A key part of this effort is the integrated development of both detector geometries that induce a highly distinctive signature for point sources and the development of statistical algorithms able to optimize detection of this signature amidst varying background. The identification of temporal signatures for point sources has been demonstrated and compared with the canonical method showing good results. This work demonstrates that temporal signatures are efficient at increasing point-source discrimination in a moving detector system

  4. 27 CFR 73.35 - Do I need to keep paper copies of forms I submit to TTB electronically?

    Science.gov (United States)

    2010-04-01

    ... Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY (CONTINUED) PROCEDURES AND PRACTICES ELECTRONIC SIGNATURES; ELECTRONIC SUBMISSION OF FORMS Electronic Filing of Documents with TTB § 73... unless TTB otherwise authorizes you to maintain electronic copies of these documents through a general...

  5. Pen-and-Paper User Interfaces

    CERN Document Server

    Steimle, Jurgen

    2012-01-01

    Even at the beginning of the 21st century, we are far from becoming paperless. Pen and paper is still the only truly ubiquitous information processing technology. Pen-and-paper user interfaces bridge the gap between paper and the digital world. Rather than replacing paper with electronic media, they seamlessly integrate both worlds in a hybrid user interface. Classical paper documents become interactive. This opens up a huge field of novel computer applications at our workplaces and in our homes. This book provides readers with a broad and extensive overview of the field, so as to provide a fu

  6. Optical/Infrared Signatures for Space-Based Remote Sensing

    National Research Council Canada - National Science Library

    Picard, R. H; Dewan, E. M; Winick, J. R; O'Neil, R. R

    2007-01-01

    This report describes work carried out under the Air Force Research Laboratory's basic research task in optical remote-sensing signatures, entitled Optical / Infrared Signatures for Space-Based Remote Sensing...

  7. Analysis of signature wrapping attacks and countermeasures

    DEFF Research Database (Denmark)

    Gajek, Sebastian; Jensen, Meiko; Liao, Lijun

    2009-01-01

    In recent research it turned out that Boolean verification, of digital signatures in the context of WSSecurity, is likely to fail: If parts of a SOAP message, are signed and the signature verification applied to, the whole document returns true, then nevertheless the, document may have been...

  8. SPECT3D - A multi-dimensional collisional-radiative code for generating diagnostic signatures based on hydrodynamics and PIC simulation output

    Science.gov (United States)

    MacFarlane, J. J.; Golovkin, I. E.; Wang, P.; Woodruff, P. R.; Pereyra, N. A.

    2007-05-01

    SPECT3D is a multi-dimensional collisional-radiative code used to post-process the output from radiation-hydrodynamics (RH) and particle-in-cell (PIC) codes to generate diagnostic signatures (e.g. images, spectra) that can be compared directly with experimental measurements. This ability to post-process simulation code output plays a pivotal role in assessing the reliability of RH and PIC simulation codes and their physics models. SPECT3D has the capability to operate on plasmas in 1D, 2D, and 3D geometries. It computes a variety of diagnostic signatures that can be compared with experimental measurements, including: time-resolved and time-integrated spectra, space-resolved spectra and streaked spectra; filtered and monochromatic images; and X-ray diode signals. Simulated images and spectra can include the effects of backlighters, as well as the effects of instrumental broadening and time-gating. SPECT3D also includes a drilldown capability that shows where frequency-dependent radiation is emitted and absorbed as it propagates through the plasma towards the detector, thereby providing insights on where the radiation seen by a detector originates within the plasma. SPECT3D has the capability to model a variety of complex atomic and radiative processes that affect the radiation seen by imaging and spectral detectors in high energy density physics (HEDP) experiments. LTE (local thermodynamic equilibrium) or non-LTE atomic level populations can be computed for plasmas. Photoabsorption rates can be computed using either escape probability models or, for selected 1D and 2D geometries, multi-angle radiative transfer models. The effects of non-thermal (i.e. non-Maxwellian) electron distributions can also be included. To study the influence of energetic particles on spectra and images recorded in intense short-pulse laser experiments, the effects of both relativistic electrons and energetic proton beams can be simulated. SPECT3D is a user-friendly software package that runs

  9. Molecular Signature in HCV-Positive Lymphomas

    Directory of Open Access Journals (Sweden)

    Valli De Re

    2012-01-01

    Full Text Available Hepatitis C virus (HCV is a positive, single-stranded RNA virus, which has been associated to different subtypes of B-cell non-Hodgkin lymphoma (B-NHL. Cumulative evidence suggests an HCV-related antigen driven process in the B-NHL development. The underlying molecular signature associated to HCV-related B-NHL has to date remained obscure. In this review, we discuss the recent developments in this field with a special mention to different sets of genes whose expression is associated with BCR coupled to Blys signaling which in turn was found to be linked to B-cell maturation stages and NF-κb transcription factor. Even if recent progress on HCV-B-NHL signature has been made, the precise relationship between HCV and lymphoma development and phenotype signature remain to be clarified.

  10. 32 CFR 842.6 - Signature on the claim form.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Signature on the claim form. 842.6 Section 842.6... ADMINISTRATIVE CLAIMS General Information § 842.6 Signature on the claim form. The claimant or authorized agent... authorized agent signing for a claimant shows, after the signature, the title or capacity and attaches...

  11. The construction of a public key infrastructure for healthcare information networks in Japan.

    Science.gov (United States)

    Sakamoto, N

    2001-01-01

    The digital signature is a key technology in the forthcoming Internet society for electronic healthcare as well as for electronic commerce. Efficient exchanges of authorized information with a digital signature in healthcare information networks require a construction of a public key infrastructure (PKI). In order to introduce a PKI to healthcare information networks in Japan, we proposed a development of a user authentication system based on a PKI for user management, user authentication and privilege management of healthcare information systems. In this paper, we describe the design of the user authentication system and its implementation. The user authentication system provides a certification authority service and a privilege management service while it is comprised of a user authentication client and user authentication serves. It is designed on a basis of an X.509 PKI and is implemented with using OpenSSL and OpenLDAP. It was incorporated into the financial information management system for the national university hospitals and has been successfully working for about one year. The hospitals plan to use it as a user authentication method for their whole healthcare information systems. One implementation of the system is free to the national university hospitals with permission of the Japanese Ministry of Education, Culture, Sports, Science and Technology. Another implementation is open to the other healthcare institutes by support of the Medical Information System Development Center (MEDIS-DC). We are moving forward to a nation-wide construction of a PKI for healthcare information networks based on it.

  12. Analyzing the User Behavior toward Electronic Commerce Stimuli.

    Science.gov (United States)

    Lorenzo-Romero, Carlota; Alarcón-Del-Amo, María-Del-Carmen; Gómez-Borja, Miguel-Ángel

    2016-01-01

    Based on the Stimulus-Organism-Response paradigm this research analyzes the main differences between the effects of two types of web technologies: Verbal web technology (i.e., navigational structure as utilitarian stimulus) versus non-verbal web technology (music and presentation of products as hedonic stimuli). Specific webmosphere stimuli have not been examined yet as separate variables and their impact on internal and behavioral responses seems unknown. Therefore, the objective of this research consists in analyzing the impact of these web technologies -which constitute the web atmosphere or webmosphere of a website- on shopping human behavior (i.e., users' internal states -affective, cognitive, and satisfaction- and behavioral responses - approach responses, and real shopping outcomes-) within the retail online store created by computer, taking into account some mediator variables (i.e., involvement, atmospheric responsiveness, and perceived risk). A 2 ("free" versus "hierarchical" navigational structure) × 2 ("on" versus "off" music) × 2 ("moving" versus "static" images) between-subjects computer experimental design is used to test empirically this research. In addition, an integrated methodology was developed allowing the simulation, tracking and recording of virtual user behavior within an online shopping environment. As main conclusion, this study suggests that the positive responses of online consumers might increase when they are allowed to freely navigate the online stores and their experience is enriched by animate gifts and music background. The effect caused by mediator variables modifies relatively the final shopping human behavior.

  13. Thermal signature measurements for ammonium nitrate/fuel mixtures by laser heating

    International Nuclear Information System (INIS)

    Nazarian, Ashot; Presser, Cary

    2016-01-01

    Highlights: • LDTR is a useful diagnostic for characterizing AN/fuel mixture thermochemical behavior. • Each AN/fuel mixture thermal signature was different. • AN/fuel mixture signature features were defined by the individual constituents. • Baseline signatures changed after an experiment. - Abstract: Measurements were carried out to obtain thermal signatures of several ammonium nitrate/fuel (ANF) mixtures, using a laser-heating technique referred to as the laser-driven thermal reactor (LDTR). The mixtures were ammonium nitrate (AN)/kerosene, AN/ethylene glycol, AN/paraffin wax, AN/petroleum jelly, AN/confectioner's sugar, AN/cellulose (tissue paper), nitromethane/cellulose, nitrobenzene/cellulose, AN/cellulose/nitromethane, AN/cellulose/nitrobenzene. These mixtures were also compared with AN/nitromethane and AN/diesel fuel oil, obtained from an earlier investigation. Thermograms for the mixtures, as well as individual constituents, were compared to better understand how sample thermal signature changes with mixture composition. This is the first step in development of a thermal-signature database, to be used along with other signature databases, to improve identification of energetic substances of unknown composition. The results indicated that each individual thermal signature was associated unambiguously with a particular mixture composition. The signature features of a particular mixture were shaped by the individual constituent signatures. It was also uncovered that the baseline signature was modified after an experiment due to coating of unreacted residue on the substrate surface and a change in the reactor sphere oxide layer. Thus, care was required to pre-oxidize the sphere prior to an experiment. A minimum sample mass (which was dependent on composition) was required to detect the signature characteristics. Increased laser power served to magnify signal strength while preserving the signature features. For the mixtures examined, the thermal

  14. Cubic Bezier Curve Approach for Automated Offline Signature Verification with Intrusion Identification

    Directory of Open Access Journals (Sweden)

    Arun Vijayaragavan

    2014-01-01

    Full Text Available Authentication is a process of identifying person’s rights over a system. Many authentication types are used in various systems, wherein biometrics authentication systems are of a special concern. Signature verification is a basic biometric authentication technique used widely. The signature matching algorithm uses image correlation and graph matching technique which provides false rejection or acceptance. We proposed a model to compare knowledge from signature. Intrusion in the signature repository system results in copy of the signature that leads to false acceptance. Our approach uses a Bezier curve algorithm to identify the curve points and uses the behaviors of the signature for verification. An analyzing mobile agent is used to identify the input signature parameters and compare them with reference signature repository. It identifies duplication of signature over intrusion and rejects it. Experiments are conducted on a database with thousands of signature images from various sources and the results are favorable.

  15. 27 CFR 70.52 - Signature presumed authentic.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false Signature presumed authentic. 70.52 Section 70.52 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE... Collection of Excise and Special (Occupational) Tax Collection-General Provisions § 70.52 Signature presumed...

  16. 13 CFR 134.209 - Requirement of signature.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Requirement of signature. 134.209 Section 134.209 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION RULES OF PROCEDURE GOVERNING... of signature. Every written submission to OHA, other than evidence, must be signed by the party...

  17. Radar Signature Calculation Facility

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: The calculation, analysis, and visualization of the spatially extended radar signatures of complex objects such as ships in a sea multipath environment and...

  18. Uncertainty in hydrological signatures for gauged and ungauged catchments

    Science.gov (United States)

    Westerberg, Ida K.; Wagener, Thorsten; Coxon, Gemma; McMillan, Hilary K.; Castellarin, Attilio; Montanari, Alberto; Freer, Jim

    2016-03-01

    Reliable information about hydrological behavior is needed for water-resource management and scientific investigations. Hydrological signatures quantify catchment behavior as index values, and can be predicted for ungauged catchments using a regionalization procedure. The prediction reliability is affected by data uncertainties for the gauged catchments used in prediction and by uncertainties in the regionalization procedure. We quantified signature uncertainty stemming from discharge data uncertainty for 43 UK catchments and propagated these uncertainties in signature regionalization, while accounting for regionalization uncertainty with a weighted-pooling-group approach. Discharge uncertainty was estimated using Monte Carlo sampling of multiple feasible rating curves. For each sampled rating curve, a discharge time series was calculated and used in deriving the gauged signature uncertainty distribution. We found that the gauged uncertainty varied with signature type, local measurement conditions and catchment behavior, with the highest uncertainties (median relative uncertainty ±30-40% across all catchments) for signatures measuring high- and low-flow magnitude and dynamics. Our regionalization method allowed assessing the role and relative magnitudes of the gauged and regionalized uncertainty sources in shaping the signature uncertainty distributions predicted for catchments treated as ungauged. We found that (1) if the gauged uncertainties were neglected there was a clear risk of overconditioning the regionalization inference, e.g., by attributing catchment differences resulting from gauged uncertainty to differences in catchment behavior, and (2) uncertainty in the regionalization results was lower for signatures measuring flow distribution (e.g., mean flow) than flow dynamics (e.g., autocorrelation), and for average flows (and then high flows) compared to low flows.

  19. Educational Systems Design Implications of Electronic Publishing.

    Science.gov (United States)

    Romiszowski, Alexander J.

    1994-01-01

    Discussion of electronic publishing focuses on the four main purposes of media in general: communication, entertainment, motivation, and education. Highlights include electronic journals and books; hypertext; user control; computer graphics and animation; electronic games; virtual reality; multimedia; electronic performance support;…

  20. Approaches to determining the reliability of a multimodal three-dimensional dynamic signature

    Directory of Open Access Journals (Sweden)

    Yury E. Kozlov

    2018-03-01

    Full Text Available The market of modern mobile applications has increasingly strict requirements for the authentication system reliability. This article examines an authentication method using a multimodal three-dimensional dynamic signature (MTDS, that can be used both as a main and additional method of user authentication in mobile applications. It is based on the use of gesture in the air performed by two independent mobile devices as an identifier. The MTDS method has certain advantages over currently used biometric methods, including fingerprint authentication, face recognition and voice recognition. A multimodal three-dimensional dynamic signature allows quickly changing an authentication gesture, as well as concealing the authentication procedure using gestures that do not attract attention. Despite all its advantages, the MTDS method has certain limitations, the main one is building functionally dynamic complex (FDC skills required for accurate repeating an authentication gesture. To correctly create MTDS need to have a system for assessing the reliability of gestures. Approaches to the solution of this task are grouped in this article according to methods of their implementation. Two of the approaches can be implemented only with the use of a server as a centralized MTDS processing center and one approach can be implemented using smartphone's own computing resources. The final part of the article provides data of testing one of these methods on a template performing the MTDS authentication.

  1. Electronic procedure distribution

    International Nuclear Information System (INIS)

    Slone, B.J. III; Richardson, C.E.

    1993-01-01

    Printed procedures can offer a mix of text and graphic information that improves readability and increases understanding. A typical procedure uses illustrations and graphics to clarify concepts, a variety of type styles and weights to make it easier to find different topics and sections, white space to improve readability, and familiar navigational clues such as page numbers and topic headers. Initially, electronic procedure systems had limited typeface options, often only a single typeface, with no capability for enhancing readability by varying type size bolding, italicizing, or underlining, and no ability to include graphics. Even recently, many text-only electronic procedures were originally created in a modern What-You-See-Is-What-You-Get (WYSI-WYG) document authoring system, only to be converted to pages and pages of plain type for electronic distribution. Given the choice of paper or on-line producers, most users have chosen paper for its readability. But current-generation electronic document systems that use formatted text and embedded graphics offer users vastly improved readability. Further, they are offering ever-better search tools to enable rapid location of material of interest

  2. A User Centered Approach to Developing Emergent Technology Products

    DEFF Research Database (Denmark)

    Restrepo-Giraldo, John Dairo; McAloone, Timothy Charles; Schlegel, Tanja

    2008-01-01

    be used too early in the design process, given that users respond best to issues they know or can relate to. This paper presents a case study where a user-centred approach was used to determine when and how to involve users in the design of a TV-enabled mobile telephone. The aim of the study......Current participatory design methods do not allow designers to gain the insight required to develop products with emerging technologies, that is, products that do not have any precedents in the users’ knowledge base and experience. This poses challenges to the designers, as input from users cannot...... methodological issues related to user involvement in the implementation of emerging technologies in the consumer electronics industry....

  3. Advanced Missile Signature Center

    Data.gov (United States)

    Federal Laboratory Consortium — The Advanced Missile Signature Center (AMSC) is a national facility supporting the Missile Defense Agency (MDA) and other DoD programs and customers with analysis,...

  4. 25 CFR 117.33 - Signature of illiterates.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Signature of illiterates. 117.33 Section 117.33 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR FINANCIAL ACTIVITIES DEPOSIT AND EXPENDITURE OF... Signature of illiterates. An Indian who cannot write shall be required to endorse checks payable to his...

  5. 12 CFR 350.6 - Signature and attestation.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Signature and attestation. 350.6 Section 350.6 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY DISCLOSURE OF FINANCIAL AND OTHER INFORMATION BY FDIC-INSURED STATE NONMEMBER BANKS § 350.6 Signature and...

  6. Quantum dual signature scheme based on coherent states with entanglement swapping

    International Nuclear Information System (INIS)

    Liu Jia-Li; Shi Rong-Hua; Shi Jin-Jing; Lv Ge-Li; Guo Ying

    2016-01-01

    A novel quantum dual signature scheme, which combines two signed messages expected to be sent to two diverse receivers Bob and Charlie, is designed by applying entanglement swapping with coherent states. The signatory Alice signs two different messages with unitary operations (corresponding to the secret keys) and applies entanglement swapping to generate a quantum dual signature. The dual signature is firstly sent to the verifier Bob who extracts and verifies the signature of one message and transmits the rest of the dual signature to the verifier Charlie who verifies the signature of the other message. The transmission of the dual signature is realized with quantum teleportation of coherent states. The analysis shows that the security of secret keys and the security criteria of the signature protocol can be greatly guaranteed. An extensional multi-party quantum dual signature scheme which considers the case with more than three participants is also proposed in this paper and this scheme can remain secure. The proposed schemes are completely suited for the quantum communication network including multiple participants and can be applied to the e-commerce system which requires a secure payment among the customer, business and bank. (paper)

  7. Real-Time Capable Micro-Doppler Signature Decomposition of Walking Human Limbs

    OpenAIRE

    Abdulatif, Sherif; Aziz, Fady; Kleiner, Bernhard; Schneider, Urs

    2017-01-01

    Unique micro-Doppler signature ($\\boldsymbol{\\mu}$-D) of a human body motion can be analyzed as the superposition of different body parts $\\boldsymbol{\\mu}$-D signatures. Extraction of human limbs $\\boldsymbol{\\mu}$-D signatures in real-time can be used to detect, classify and track human motion especially for safety application. In this paper, two methods are combined to simulate $\\boldsymbol{\\mu}$-D signatures of a walking human. Furthermore, a novel limbs $\\mu$-D signature time independent...

  8. Research on Signature Verification Method Based on Discrete Fréchet Distance

    Science.gov (United States)

    Fang, J. L.; Wu, W.

    2018-05-01

    This paper proposes a multi-feature signature template based on discrete Fréchet distance, which breaks through the limitation of traditional signature authentication using a single signature feature. It solves the online handwritten signature authentication signature global feature template extraction calculation workload, signature feature selection unreasonable problem. In this experiment, the false recognition rate (FAR) and false rejection rate (FRR) of the statistical signature are calculated and the average equal error rate (AEER) is calculated. The feasibility of the combined template scheme is verified by comparing the average equal error rate of the combination template and the original template.

  9. De-MA: a web Database for electron Microprobe Analyses to assist EMP lab manager and users

    Science.gov (United States)

    Allaz, J. M.

    2012-12-01

    Lab managers and users of electron microprobe (EMP) facilities require comprehensive, yet flexible documentation structures, as well as an efficient scheduling mechanism. A single on-line database system for managing reservations, and providing information on standards, quantitative and qualitative setups (element mapping, etc.), and X-ray data has been developed for this purpose. This system is particularly useful in multi-user facilities where experience ranges from beginners to the highly experienced. New users and occasional facility users will find these tools extremely useful in developing and maintaining high quality, reproducible, and efficient analyses. This user-friendly database is available through the web, and uses MySQL as a database and PHP/HTML as script language (dynamic website). The database includes several tables for standards information, X-ray lines, X-ray element mapping, PHA, element setups, and agenda. It is configurable for up to five different EMPs in a single lab, each of them having up to five spectrometers and as many diffraction crystals as required. The installation should be done on a web server supporting PHP/MySQL, although installation on a personal computer is possible using third-party freeware to create a local Apache server, and to enable PHP/MySQL. Since it is web-based, any user outside the EMP lab can access this database anytime through any web browser and on any operating system. The access can be secured using a general password protection (e.g. htaccess). The web interface consists of 6 main menus. (1) "Standards" lists standards defined in the database, and displays detailed information on each (e.g. material type, name, reference, comments, and analyses). Images such as EDS spectra or BSE can be associated with a standard. (2) "Analyses" lists typical setups to use for quantitative analyses, allows calculation of mineral composition based on a mineral formula, or calculation of mineral formula based on a fixed

  10. 17 CFR 201.153 - Filing of papers: Signature requirement and effect.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Filing of papers: Signature... COMMISSION RULES OF PRACTICE Rules of Practice General Rules § 201.153 Filing of papers: Signature... telephone number on every filing. (b) Effect of signature. (1) The signature of a counsel or party shall...

  11. A Secure and Efficient Certificateless Short Signature Scheme

    Directory of Open Access Journals (Sweden)

    Lin Cheng

    2013-07-01

    Full Text Available Certificateless public key cryptography combines advantage of traditional public key cryptography and identity-based public key cryptography as it avoids usage of certificates and resolves the key escrow problem. In 2007, Huang et al. classified adversaries against certificateless signatures according to their attack power into normal, strong and super adversaries (ordered by their attack power. In this paper, we propose a new certificateless short signature scheme and prove that it is secure against both of the super type I and the super type II adversaries. Our new scheme not only achieves the strongest security level but also has the shortest signature length (one group element. Compared with the other short certificateless signature schemes which have a similar security level, our new scheme has less operation cost.

  12. A MUSIC-Based Algorithm for Blind User Identification in Multiuser DS-CDMA

    Directory of Open Access Journals (Sweden)

    M. Reza Soleymani

    2005-04-01

    Full Text Available A blind scheme based on multiple-signal classification (MUSIC algorithm for user identification in a synchronous multiuser code-division multiple-access (CDMA system is suggested. The scheme is blind in the sense that it does not require prior knowledge of the spreading codes. Spreading codes and users' power are acquired by the scheme. Eigenvalue decomposition (EVD is performed on the received signal, and then all the valid possible signature sequences are projected onto the subspaces. However, as a result of this process, some false solutions are also produced and the ambiguity seems unresolvable. Our approach is to apply a transformation derived from the results of the subspace decomposition on the received signal and then to inspect their statistics. It is shown that the second-order statistics of the transformed signal provides a reliable means for removing the false solutions.

  13. 12 CFR 18.6 - Signature and attestation.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Signature and attestation. 18.6 Section 18.6 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY DISCLOSURE OF FINANCIAL AND OTHER INFORMATION BY NATIONAL BANKS § 18.6 Signature and attestation. A duly authorized officer of the...

  14. Does Social Work Have a Signature Pedagogy?

    Science.gov (United States)

    Earls Larrison, Tara; Korr, Wynne S.

    2013-01-01

    This article contributes to discourse on signature pedagogy by reconceptualizing how our pedagogies are understood and defined for social work education. We critique the view that field education is social work's signature pedagogy and consider what pedagogies are distinct about the teaching and learning of social work. Using Shulman's…

  15. Magnetospheric signature of some F layer positive storms

    International Nuclear Information System (INIS)

    Miller, N.J.; Mayr, H.G.; Grebowsky, J.M.; Harris, I.; Tulunay, Y.K.

    1981-01-01

    Calculations using a self-consistent model of the global thermosphere-ionosphere system perturbed by high-latitude thermospheric heating show that the resultant electron density disturbances within the mid-latitude F layer can propagate upward along magnetic field lines to the equator. The F layer disturbances described by the model calculations correspond to the evolution of enhancements or reductions in electron density that is called the positive or negative phase of an F layer storm. We deduce that the positive phase of dayside F layer storms is initiated when high-latitude thermospheric heating generates equatorward winds. These winds raise the mid-latitude F layer along the geomagnetic field B through momentum transfer from neutral atoms to F layer ons that pull electrons with them. For Lapprox.3 or less the upward movement of ionospheric plasma results in ionization increases at all altitudes along B from the F2 maximum to the equator. An increase in the average magnitude of the equatorial dawn-dusk magnetospheric electric field retards the dayside development of a positive storm phase by drifting plasma away from mid-latitude field lines along which the electron density is increasing. During an F layer storm in June 1972, instruments on Explorer 45 and Ariel 4 detected dayside electron density enhancements simultaneously at 550 km over mid-latitudes and near the equatorial plane in the magnetosphere. These in situ measurements support the model prediction that disturbances in the magnetospheric plasma near the equator can arise through interactions occuring at lower altitudes along a magnetic field line. Our study demonstrates that some storm time enhancements of dayside magnetospheric plasma near Lapprox.2--3 may be signatures of the positive phase of an F layer storm

  16. Electronic Publishing: Research Issues for Academic Librarians and Users.

    Science.gov (United States)

    Tenopir, Carol

    2003-01-01

    Addresses the need for further research into three important areas of electronic publishing: how the change to digital information sources is affecting the scholarly work of college and university students; when libraries select electronic journals, how products offered to them or the delivery models they choose influence scholarship and the way…

  17. New improvements on the Kansas State University cryogenic electron beam ion source, a user facility for low energy, highly charged ions

    International Nuclear Information System (INIS)

    Stockli, M. P.; Carnes, K.; Cocke, C. L.; DePaola, B. D.; Ehrenreich, T.; Fehrenbach, C.; Fry, D.; Gibson, P. E.; Kelly, S.; Lehnert, U.

    2000-01-01

    The Kansas State University cryogenic electron beam ion source supplies low energy ion beams to users of the Department of Energy user facility for highly charged ions. The ions escape the source with an initial energy between 1.6 and 5 kV per charge and are analyzed in a 90 degree sign dipole magnet located on the high voltage platform. When leaving the platform the ions can be accelerated by up to 160 kV per charge or can be decelerated to about 20% of their initial energy, covering 2.5 orders of magnitude. We are in the process of adding another order of magnitude to the range of available ion energies as a newly installed lens allows for deceleration down to a very few percent of the initial energy. In addition we present the current microbunching and chopping system which has been substantially improved over the past 2 yr. (c) 2000 American Institute of Physics

  18. Xyce Parallel Electronic Simulator Users' Guide Version 6.6.

    Energy Technology Data Exchange (ETDEWEB)

    Keiter, Eric R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Aadithya, Karthik Venkatraman [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mei, Ting [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Russo, Thomas V. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Schiek, Richard [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sholander, Peter E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Thornquist, Heidi K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Verley, Jason [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-11-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been de- signed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas: Capability to solve extremely large circuit problems by supporting large-scale parallel com- puting platforms (up to thousands of processors). This includes support for most popular parallel and serial computers. A differential-algebraic-equation (DAE) formulation, which better isolates the device model package from solver algorithms. This allows one to develop new types of analysis without requiring the implementation of analysis-specific device models. Device models that are specifically tailored to meet Sandia's needs, including some radiation- aware devices (for Sandia users only). Object-oriented code design and implementation using modern coding practices. Xyce is a parallel code in the most general sense of the phrase -- a message passing parallel implementation -- which allows it to run efficiently a wide range of computing platforms. These include serial, shared-memory and distributed-memory parallel platforms. Attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows. The information herein is subject to change without notice. Copyright c 2002-2016 Sandia Corporation. All rights reserved. Acknowledgements The BSIM Group at the University of California, Berkeley developed the BSIM3, BSIM4, BSIM6, BSIM-CMG and BSIM-SOI models. The BSIM3 is Copyright c 1999, Regents of the University of California. The BSIM4 is Copyright c 2006, Regents of the University of California. The BSIM6 is Copyright c 2015, Regents of the University of California. The BSIM-CMG is Copyright c

  19. Improvement of a Quantum Proxy Blind Signature Scheme

    Science.gov (United States)

    Zhang, Jia-Lei; Zhang, Jian-Zhong; Xie, Shu-Cui

    2018-06-01

    Improvement of a quantum proxy blind signature scheme is proposed in this paper. Six-qubit entangled state functions as quantum channel. In our scheme, a trust party Trent is introduced so as to avoid David's dishonest behavior. The receiver David verifies the signature with the help of Trent in our scheme. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, delegation, signature and verification. Security analysis proves that our scheme has the properties of undeniability, unforgeability, anonymity and can resist some common attacks.

  20. On the Privacy Protection of Biometric Traits: Palmprint, Face, and Signature

    Science.gov (United States)

    Panigrahy, Saroj Kumar; Jena, Debasish; Korra, Sathya Babu; Jena, Sanjay Kumar

    Biometrics are expected to add a new level of security to applications, as a person attempting access must prove who he or she really is by presenting a biometric to the system. The recent developments in the biometrics area have lead to smaller, faster and cheaper systems, which in turn has increased the number of possible application areas for biometric identity verification. The biometric data, being derived from human bodies (and especially when used to identify or verify those bodies) is considered personally identifiable information (PII). The collection, use and disclosure of biometric data — image or template, invokes rights on the part of an individual and obligations on the part of an organization. As biometric uses and databases grow, so do concerns that the personal data collected will not be used in reasonable and accountable ways. Privacy concerns arise when biometric data are used for secondary purposes, invoking function creep, data matching, aggregation, surveillance and profiling. Biometric data transmitted across networks and stored in various databases by others can also be stolen, copied, or otherwise misused in ways that can materially affect the individual involved. As Biometric systems are vulnerable to replay, database and brute-force attacks, such potential attacks must be analysed before they are massively deployed in security systems. Along with security, also the privacy of the users is an important factor as the constructions of lines in palmprints contain personal characteristics, from face images a person can be recognised, and fake signatures can be practised by carefully watching the signature images available in the database. We propose a cryptographic approach to encrypt the images of palmprints, faces, and signatures by an advanced Hill cipher technique for hiding the information in the images. It also provides security to these images from being attacked by above mentioned attacks. So, during the feature extraction, the

  1. Power Electronics

    DEFF Research Database (Denmark)

    Iov, Florin; Ciobotaru, Mihai; Blaabjerg, Frede

    2008-01-01

    is to change the electrical power production sources from the conventional, fossil (and short term) based energy sources to renewable energy resources. The other is to use high efficient power electronics in power generation, power transmission/distribution and end-user application. This paper discuss the most...... emerging renewable energy sources, wind energy, which by means of power electronics are changing from being a minor energy source to be acting as an important power source in the energy system. Power electronics is the enabling technology and the presentation will cover the development in wind turbine...... technology from kW to MW, discuss which power electronic solutions are most feasible and used today....

  2. The Pedagogic Signature of the Teaching Profession

    Science.gov (United States)

    Kiel, Ewald; Lerche, Thomas; Kollmannsberger, Markus; Oubaid, Viktor; Weiss, Sabine

    2016-01-01

    Lee S. Shulman deplores that the field of education as a profession does not have a pedagogic signature, which he characterizes as a synthesis of cognitive, practical and moral apprenticeship. In this context, the following study has three goals: 1) In the first theoretical part, the basic problems of constructing a pedagogic signature are…

  3. Analysis of Non-contact Acousto Thermal Signature Data (Postprint)

    Science.gov (United States)

    2016-02-01

    AFRL-RX-WP-JA-2016-0321 ANALYSIS OF NON-CONTACT ACOUSTO-THERMAL SIGNATURE DATA (POSTPRINT) Amanda K. Criner AFRL/RX...October 2014 – 16 September 2015 4. TITLE AND SUBTITLE ANALYSIS OF NON-CONTACT ACOUSTO-THERMAL SIGNATURE DATA (POSTPRINT) 5a. CONTRACT NUMBER...words) The non-contact acousto-thermal signature (NCATS) is a nondestructive evaluation technique with potential to detect fatigue in materials such as

  4. Electrons in the boundary layers near the dayside magnetopause

    International Nuclear Information System (INIS)

    Hall, D.S.; Chaloner, C.P.; Bryant, D.A.; Lepine, D.R.; Tritakis, V.P.

    1990-10-01

    Entry of heated solar-wind plasma into the magnetosphere is examined using electron distributions. In particular, the angular structure of the electron distributions is studied within the transition region separating the magnetosheath from the inner magnetosphere. The measurements suggest that electrons in the outer part of the transition region originate in the magnetosheath, whilst the population closer to the Earth consists of electrons from the magnetosphere combined with an energized magnetosheath component. This energized component contains ''counterstreaming'' electrons, which are confined to directions closely parallel and anti-parallel to the magnetic field direction. The possibilities, that the energization of the counterstreaming electrons is cumulatively gained from either waves, electric fields perpendicular to the magnetic field, or quasi-Fermi acceleration, are discussed. It is not possible to identify the topology of the magnetic fields of the outer part of the region, but there is strong evidence that the inner part is on closed magnetic field lines, which map to the dayside auroral zone. The outer part of the transition region is a plasma depletion/magnetic-field compression layer. The structure of the transition region is similar to that surrounding flux transfer events, which leads to the deduction that the plasma and field signatures of flux transfer events may be the result of displacement of the transition region earthwards. Cases where the displacement is such that the field maximum of the depletion/compression region is encountered, may well explain ''crater'' flux transfer event signatures. (author)

  5. 75 FR 34754 - Privacy Act; Notification of a New Privacy Act System of Records, Title Eight Automated Paperless...

    Science.gov (United States)

    2010-06-18

    ... address, telephone number, race, ethnicity, gender type, income and financial data. Medical and health... personnel and is not open to the general public. A User ID and password are required authentication before... passwords, bypassing authentication requirements, and electronic signatures are not applicable to the...

  6. 77 FR 33215 - Changes to the Central Data Exchange System

    Science.gov (United States)

    2012-06-05

    ... paper document must bear a signature under an existing regulation, CROMERR requires that an electronic... submission of environmental data for air, water, waste, and toxic programs from thousands of regulated... (60) days in advance of implementation. Specific changes include: New user-friendly features that will...

  7. Have combustible cigarettes met their match? The nicotine delivery profiles and harmful constituent exposures of second-generation and third-generation electronic cigarette users.

    Science.gov (United States)

    Wagener, Theodore L; Floyd, Evan L; Stepanov, Irina; Driskill, Leslie M; Frank, Summer G; Meier, Ellen; Leavens, Eleanor L; Tackett, Alayna P; Molina, Neil; Queimado, Lurdes

    2017-03-01

    Electronic cigarettes' (e-cigarettes) viability as a public health strategy to end smoking will likely be determined by their ability to mimic the pharmacokinetic profile of a cigarette while also exposing users to significantly lower levels of harmful/potentially harmful constituents (HPHCs). The present study examined the nicotine delivery profile of third- (G3) versus second-generation (G2) e-cigarette devices and their users' exposure to nicotine and select HPHCs compared with cigarette smokers. 30 participants (10 smokers, 9 G2 and 11 G3 users) completed baseline questionnaires and provided exhaled carbon monoxide (eCO), saliva and urine samples. Following a 12-hour nicotine abstinence, G2 and G3 users completed a 2-hour vaping session (ie, 5 min, 10-puff bout followed by ad libitum puffing for 115 min). Blood samples, subjective effects, device characteristics and e-liquid consumption were assessed. Smokers, G2 and G3 users had similar baseline levels of cotinine, but smokers had 4 and 7 times higher levels of eCO (pe-cigarette liquids with significantly lower nicotine concentrations. During the vaping session, G3 users achieved significantly higher plasma nicotine concentrations than G2 users following the first 10 puffs (17.5 vs 7.3 ng/mL, respectively) and at 25 and 40 min of ad libitum use. G3 users consumed significantly more e-liquid than G2 users. Vaping urges/withdrawal were reduced following 10 puffs, with no significant differences between device groups. Under normal use conditions, both G2 and G3 devices deliver cigarette-like amounts of nicotine, but G3 devices matched the amount and speed of nicotine delivery of a conventional cigarette. Compared with cigarettes, G2 and G3 e-cigarettes resulted in significantly lower levels of exposure to a potent lung carcinogen and cardiovascular toxicant. These findings have significant implications for understanding the addiction potential of these devices and their viability/suitability as aids to

  8. 37 CFR 1.4 - Nature of correspondence and signature requirements.

    Science.gov (United States)

    2010-07-01

    ... signature requirements. 1.4 Section 1.4 Patents, Trademarks, and Copyrights UNITED STATES PATENT AND... General Information and Correspondence § 1.4 Nature of correspondence and signature requirements. (a...) Handwritten signature. Each piece of correspondence, except as provided in paragraphs (d)(2), (d)(3), (e) and...

  9. Searches with long-lived or unusual signatures

    CERN Document Server

    Haug, S; The ATLAS collaboration

    2013-01-01

    We present recent ATLAS and CMS results from searches with long-lived and unusual signatures. They are based on analysis of LHC proton-proton collisions at center of mass energies at 7 and 8 TeV. Long-lived and heavy particles may cause peculiar signatures in the detectors, but are in several Standard Model extensions well motivated.

  10. Selection signatures in worldwide sheep populations.

    Science.gov (United States)

    Fariello, Maria-Ines; Servin, Bertrand; Tosser-Klopp, Gwenola; Rupp, Rachel; Moreno, Carole; San Cristobal, Magali; Boitard, Simon

    2014-01-01

    The diversity of populations in domestic species offers great opportunities to study genome response to selection. The recently published Sheep HapMap dataset is a great example of characterization of the world wide genetic diversity in sheep. In this study, we re-analyzed the Sheep HapMap dataset to identify selection signatures in worldwide sheep populations. Compared to previous analyses, we made use of statistical methods that (i) take account of the hierarchical structure of sheep populations, (ii) make use of linkage disequilibrium information and (iii) focus specifically on either recent or older selection signatures. We show that this allows pinpointing several new selection signatures in the sheep genome and distinguishing those related to modern breeding objectives and to earlier post-domestication constraints. The newly identified regions, together with the ones previously identified, reveal the extensive genome response to selection on morphology, color and adaptation to new environments.

  11. Watching Electrons at Conical Intersections and Funnels

    Science.gov (United States)

    Jonas, David M.; Smith, Eric R.; Peters, William K.; Kitney, Katherine A.

    2009-06-01

    The electronic motion at conical intersections and funnels is probed after polarized excitation of aligned electronic wavepackets. The pulses have bandwidth sufficient to observe vibrations mainly through their effect on the electrons. Vibrational symmetry can be identified by the polarization anisotropy of vibrational quantum beats. The polarized transients show signatures of electronic wavepacket motion (due to the energy gaps) and of electron transfer between orbitals (due to the couplings) driven by the conical intersection. For a conical intersection in a four-fold symmetric symmetry silicon naphthalocyanine molecule, electronic motions on a 100 fs timescale are driven by couplings of 1 meV. In the lower symmetry free-base naphthalocyanine, the conical intersection may be missed or missing (conical funnel), and the motions are nearly as rapid, but electronic equilibration is incomplete for red-edge excitation. These experiments probe non-adiabatic electronic dynamics with near-zero nuclear momentum - the electronic motions are determined by the principal slopes of the conical intersection and the width of the vibrational wavepacket.

  12. Treatment-independent miRNA signature in blood of wilms tumor patients

    Directory of Open Access Journals (Sweden)

    Schmitt Jana

    2012-08-01

    Full Text Available Abstract Background Blood-born miRNA signatures have recently been reported for various tumor diseases. Here, we compared the miRNA signature in Wilms tumor patients prior and after preoperative chemotherapy according to SIOP protocol 2001. Results We did not find a significant difference between miRNA signature of both groups. However both, Wilms tumor patients prior and after chemotherapy showed a miRNA signature different from healthy controls. The signature of Wilms tumor patients prior to chemotherapy showed an accuracy of 97.5% and of patients after chemotherapy an accuracy of 97.0%, each as compared to healthy controls. Conclusion Our results provide evidence for a blood-born Wilms tumor miRNA signature largely independent of four weeks preoperative chemotherapy treatment.

  13. Calculated NWIS signatures for enriched uranium metal

    International Nuclear Information System (INIS)

    Valentine, T.E.; Mihalczo, J.T.; Koehler, P.E.

    1995-01-01

    Nuclear Weapons Identification System (NWIS) signatures have been calculated using a Monte Carlo transport code for measurement configurations of a 252 Cf source, detectors, and a uranium metal casting. NWIS signatures consist of a wide variety of time-and frequency-analysis signatures such as the time distribution of neutrons after californium fission, the time distribution of counts in a detector after a previous count, the number of times n pulses occur in a time interval, and various frequency-analysis signatures, such as auto-power and cross-power spectral densities, coherences, and a ratio of spectral densities. This ratio is independent of detection efficiency. The analysis presented here, using the MCNP-DSP code, evaluates the applicability of this method for measurement of the 235 U content of 19-kg castings of depleted uranium and uranium with enrichments of 20, 40, 60, 80, 90, and 93.2 wt % 235 U. The dependence of the wide variety of NWIS signatures on 235 U content and possible configurations of a measurement system are presented. These preliminary calculations indicate short measurement times. Additional calculations are being performed to optimize the source-detector-moderator-casting configuration for the shortest measurement time. Although the NWIS method was developed for nuclear weapons identification, the development of a small processor now allows it to be also applied in a practical way to subcriticality measurements, nuclear fuel process monitoring and qualitative nondestructive assay of special nuclear material

  14. 46 CFR 2.01-30 - Delegation of OCMI signature authority.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Delegation of OCMI signature authority. 2.01-30 Section... VESSEL INSPECTIONS Inspecting and Certificating of Vessels § 2.01-30 Delegation of OCMI signature authority. The Officer in Charge, Marine Inspection, may redelegate signature authority for documents issued...

  15. Electronic Commerce "in the dark"

    Science.gov (United States)

    Buzzi, Maria Claudia; Buzzi, Marina; Leporini, Barbara; Senette, Caterina

    The widespread diffusion of electronic commerce offers a great opportunity for blind people. We describe the results of an electronic survey carried out with 22 blind and 22 sighted users in order to understand the difficulties and obstacles they experience shopping on-line, and solicit their expectations and suggestions for making the interaction simpler and more satisfying. Results show that blind users shop on-line much less than their sighted counterparts, since they encounter more difficulties not only when making a purchase, but even in the navigation phase preceding the commercial transaction. Complex layouts and unstructured content can prevent an e-transaction from being successfully completed. Furthermore, security, privacy and trustiness, common concerns for all consumers, also impact on the fear of buying via Internet for the visually impaired. Poor usability leads to a potential loss of revenue for on-line companies and a lost opportunity to increase a blind person's independence. Providing simpler, more understandable UIs would benefit all users and fuel the expansion of electronic commerce.

  16. The Characteristics of User-Generated Passwords

    Science.gov (United States)

    1990-03-01

    electronic keys), user interface tokens (pocket devices that can generate one-time passwords) and fixed password devices ( plastic cards that contain...APPENDIX B-7 DIFFREM DIFFICULTY REMfEIBERING by PASSCHAR PASSORD CARACTERISTICS PASSCHAR Pate I of 1 Count 1 Row Pet IALPHAVET NUMERIC ALPHANUM ASCII Cal Pet

  17. Signatures of collective electron dynamics in the angular distributions of electrons ejected during ultrashort laser pulse interactions with C+

    International Nuclear Information System (INIS)

    Lysaght, M A; Hutchinson, S; Van der Hart, H W

    2009-01-01

    We use the time-dependent R-matrix approach to investigate an ultrashort pump-probe scheme to observe collective electron dynamics in C + driven by the repulsion of two equivalent p electrons. By studying the two-dimensional momentum distributions of the ejected electron as a function of the time-delay between an ultrashort pump pulse and an ionizing ultrashort probe pulse it is possible to track the collective dynamics inside the C + ion in the time domain.

  18. 7 CFR 1956.68 - Compromise or adjustment without debtor's signature.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 14 2010-01-01 2009-01-01 true Compromise or adjustment without debtor's signature... Loan Programs and Multi-Family Housing § 1956.68 Compromise or adjustment without debtor's signature... made to obtain the debtor's signature and the date(s) of such effort. (c) The specific reasons why it...

  19. The opportunities and barriers of user profiling in the public sector

    NARCIS (Netherlands)

    Pieterson, Willem Jan; Ebbers, Wolfgang E.; van Dijk, Johannes A.G.M.

    2005-01-01

    Like the private sector, the public sector makes more and more use of user profiling to personalize the electronic services that are being offered to citizens. User profiling offers great opportunities to make communication more effective and efficient, to infer and predict citizens’ behavior and to

  20. Quantum dual signature scheme based on coherent states with entanglement swapping

    Science.gov (United States)

    Liu, Jia-Li; Shi, Rong-Hua; Shi, Jin-Jing; Lv, Ge-Li; Guo, Ying

    2016-08-01

    A novel quantum dual signature scheme, which combines two signed messages expected to be sent to two diverse receivers Bob and Charlie, is designed by applying entanglement swapping with coherent states. The signatory Alice signs two different messages with unitary operations (corresponding to the secret keys) and applies entanglement swapping to generate a quantum dual signature. The dual signature is firstly sent to the verifier Bob who extracts and verifies the signature of one message and transmits the rest of the dual signature to the verifier Charlie who verifies the signature of the other message. The transmission of the dual signature is realized with quantum teleportation of coherent states. The analysis shows that the security of secret keys and the security criteria of the signature protocol can be greatly guaranteed. An extensional multi-party quantum dual signature scheme which considers the case with more than three participants is also proposed in this paper and this scheme can remain secure. The proposed schemes are completely suited for the quantum communication network including multiple participants and can be applied to the e-commerce system which requires a secure payment among the customer, business and bank. Project supported by the National Natural Science Foundation of China (Grant Nos. 61272495, 61379153, and 61401519) and the Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20130162110012).

  1. Sharing solutions - The users' group approach

    International Nuclear Information System (INIS)

    Kania, G.; Winter, K.

    1991-01-01

    Regulatory compliance, operating efficiency, and plant-life extension are common goals shared by all nuclear power plants. To achieve these goals, nuclear utilities must be proactive and responsive to the regulatory agencies, work together with each other in the sharing of operating experiences and solution to problems, and develop long-term working relationships with an even smaller number of quality suppliers. Users' and owners' groups are one of the most effective means of accomplishing these objectives. Users' groups facilitate communication between nuclear power plants and provide an interactive vendor interface. Both the utilities and suppliers benefit through shared information and improved customer feedback. This paper describes the evolution and experiences of the Sorrento Electronics (SE) Radiation Monitoring System (RMS) Users' Group. The authors highlight the group's past successes and plans for the future

  2. Library Networks and Electronic Publishing.

    Science.gov (United States)

    Olvey, Lee D.

    1995-01-01

    Provides a description of present and proposed plans and strategies of OCLC (Online Computer Library Center) and their relationship to electronic publishing. FirstSearch (end-user access to secondary information), GUIDON (electronic journals online) and FastDoc (document delivery) are emphasized. (JKP)

  3. Methyl-CpG island-associated genome signature tags

    Science.gov (United States)

    Dunn, John J

    2014-05-20

    Disclosed is a method for analyzing the organismic complexity of a sample through analysis of the nucleic acid in the sample. In the disclosed method, through a series of steps, including digestion with a type II restriction enzyme, ligation of capture adapters and linkers and digestion with a type IIS restriction enzyme, genome signature tags are produced. The sequences of a statistically significant number of the signature tags are determined and the sequences are used to identify and quantify the organisms in the sample. Various embodiments of the invention described herein include methods for using single point genome signature tags to analyze the related families present in a sample, methods for analyzing sequences associated with hyper- and hypo-methylated CpG islands, methods for visualizing organismic complexity change in a sampling location over time and methods for generating the genome signature tag profile of a sample of fragmented DNA.

  4. Preliminary results of an examination of electronic cigarette user puff topography: the effect of a mouthpiece-based topography measurement device on plasma nicotine and subjective effects.

    Science.gov (United States)

    Spindle, Tory R; Breland, Alison B; Karaoghlanian, Nareg V; Shihadeh, Alan L; Eissenberg, Thomas

    2015-02-01

    Electronic cigarettes (ECIGs) heat a nicotine-containing solution; the resulting aerosol is inhaled by the user. Nicotine delivery may be affected by users' puffing behavior (puff topography), and little is known about the puff topography of ECIG users. Puff topography can be measured using mouthpiece-based computerized systems. However, the extent to which a mouthpiece influences nicotine delivery and subjective effects in ECIG users is unknown. Plasma nicotine concentration, heart rate, and subjective effects were measured in 13 experienced ECIG users who used their preferred ECIG and liquid (≥ 12 mg/ml nicotine) during 2 sessions (with or without a mouthpiece). In both sessions, participants completed an ECIG use session in which they were instructed to take 10 puffs with 30-second inter-puff intervals. Puff topography was recorded in the mouthpiece condition. Almost all measures of the effects of ECIG use were independent of topography measurement. Collapsed across session, mean plasma nicotine concentration increased by 16.8 ng/ml, and mean heart rate increased by 8.5 bpm (ps topography measurement equipment, ECIG-using participants took larger and longer puffs with lower flow rates. In experienced ECIG users, measuring ECIG topography did not influence ECIG-associated nicotine delivery or most measures of withdrawal suppression. Topography measurement systems will need to account for the low flow rates observed for ECIG users. © The Author 2014. Published by Oxford University Press on behalf of the Society for Research on Nicotine and Tobacco. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  5. Cryptanalysis of the arbitrated quantum signature protocols

    International Nuclear Information System (INIS)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-01-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  6. Biomarker Gene Signature Discovery Integrating Network Knowledge

    Directory of Open Access Journals (Sweden)

    Holger Fröhlich

    2012-02-01

    Full Text Available Discovery of prognostic and diagnostic biomarker gene signatures for diseases, such as cancer, is seen as a major step towards a better personalized medicine. During the last decade various methods, mainly coming from the machine learning or statistical domain, have been proposed for that purpose. However, one important obstacle for making gene signatures a standard tool in clinical diagnosis is the typical low reproducibility of these signatures combined with the difficulty to achieve a clear biological interpretation. For that purpose in the last years there has been a growing interest in approaches that try to integrate information from molecular interaction networks. Here we review the current state of research in this field by giving an overview about so-far proposed approaches.

  7. An Efficient Identity-Based Proxy Blind Signature for Semioffline Services

    Directory of Open Access Journals (Sweden)

    Hongfei Zhu

    2018-01-01

    Full Text Available Fog computing extends the cloud computing to the network edge and allows deploying a new type of semioffline services, which can provide real-time transactions between two entities, while the central cloud server is offline and network edge devices are online. For an e-payment system and e-voting with such feature, proxy blind signature is a cornerstone to protect users’ privacy. However, the signature based on number theorem, such as hard mathematical problems on factoring problem, discrete logarithm problem, and bilinear pairings, cannot defeat quantum computers attack. Meanwhile, these schemes need to depend on complex public key infrastructure. Thus, we construct an identity-based proxy blind signature scheme based on number theorem research unit lattice, which can defeat quantum computers attack and does not need to depend on public key infrastructure. The security of the proposed scheme is dependent on Ring-Small Integer Solution problem over number theorem research unit lattice. The proposed scheme meets the properties of blind signature and proxy signature. Then we compare the proposed scheme with other existing proxy blind signature schemes; the result shows that the proposed scheme outperforms ZM scheme except in proxy signer’s signature size and can be more secure than TA scheme and MMHP scheme.

  8. Forged Signature Distinction Using Convolutional Neural Network for Feature Extraction

    Directory of Open Access Journals (Sweden)

    Seungsoo Nam

    2018-01-01

    Full Text Available This paper proposes a dynamic verification scheme for finger-drawn signatures in smartphones. As a dynamic feature, the movement of a smartphone is recorded with accelerometer sensors in the smartphone, in addition to the moving coordinates of the signature. To extract high-level longitudinal and topological features, the proposed scheme uses a convolution neural network (CNN for feature extraction, and not as a conventional classifier. We assume that a CNN trained with forged signatures can extract effective features (called S-vector, which are common in forging activities such as hesitation and delay before drawing the complicated part. The proposed scheme also exploits an autoencoder (AE as a classifier, and the S-vector is used as the input vector to the AE. An AE has high accuracy for the one-class distinction problem such as signature verification, and is also greatly dependent on the accuracy of input data. S-vector is valuable as the input of AE, and, consequently, could lead to improved verification accuracy especially for distinguishing forged signatures. Compared to the previous work, i.e., the MLP-based finger-drawn signature verification scheme, the proposed scheme decreases the equal error rate by 13.7%, specifically, from 18.1% to 4.4%, for discriminating forged signatures.

  9. Signature Pedagogies for E-Learning in Higher Education and Beyond

    Science.gov (United States)

    Eaton, Sarah Elaine; Brown, Barbara; Schroeder, Meadow; Lock, Jennifer; Jacobsen, Michele

    2017-01-01

    Purpose: This report explores the notion of signature pedagogies within the field of e-learning for higher education. Methodology: We build on previous work that examined signature pedagogies in education, linking the concepts of signature pedagogies, the profession of education and e-learning as a means to help educators develop their practice…

  10. Provably Secure and Subliminal-Free Variant of Schnorr Signature

    OpenAIRE

    Zhang , Yinghui; Li , Hui; Li , Xiaoqing; Zhu , Hui

    2013-01-01

    Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES); International audience; Subliminal channels present a severe challenge to information security. Currently, subliminal channels still exist in Schnorr signature. In this paper, we propose a subliminal-free variant of Schnorr signature. In the proposed scheme, an honest-but-curious warden is introduced to help the signer to generate a signature on a given message, but it is disallowed to sign messages independently. ...

  11. Method and electronic database search engine for exposing the content of an electronic database

    NARCIS (Netherlands)

    Stappers, P.J.

    2000-01-01

    The invention relates to an electronic database search engine comprising an electronic memory device suitable for storing and releasing elements from the database, a display unit, a user interface for selecting and displaying at least one element from the database on the display unit, and control

  12. Electronic identity

    CERN Document Server

    de Andrade, Norberto Nuno Gomes; Argles, David

    2014-01-01

    With the increasing availability of electronic services, security and a reliable means by which identity is verified is essential.Written by Norberto Andrade the first chapter of this book provides an overview of the main legal and regulatory aspects regarding electronic identity in Europe and assesses the importance of electronic identity for administration (public), business (private) and, above all, citizens. It also highlights the role of eID as a key enabler of the economy.In the second chapter Lisha Chen-Wilson, David Argles, Michele Schiano di Zenise and Gary Wills discuss the user-cent

  13. THEMIS Observations of the Magnetopause Electron Diffusion Region: Large Amplitude Waves and Heated Electrons

    Science.gov (United States)

    Tang, Xiangwei; Cattell, Cynthia; Dombeck, John; Dai, Lei; Wilson, Lynn B. III; Breneman, Aaron; Hupack, Adam

    2013-01-01

    We present the first observations of large amplitude waves in a well-defined electron diffusion region based on the criteria described by Scudder et al at the subsolar magnetopause using data from one Time History of Events and Macroscale Interactions during Substorms (THEMIS) satellite. These waves identified as whistler mode waves, electrostatic solitary waves, lower hybrid waves, and electrostatic electron cyclotron waves, are observed in the same 12 s waveform capture and in association with signatures of active magnetic reconnection. The large amplitude waves in the electron diffusion region are coincident with abrupt increases in electron parallel temperature suggesting strong wave heating. The whistler mode waves, which are at the electron scale and which enable us to probe electron dynamics in the diffusion region were analyzed in detail. The energetic electrons (approx. 30 keV) within the electron diffusion region have anisotropic distributions with T(sub e(right angle))/T(sub e(parallel)) > 1 that may provide the free energy for the whistler mode waves. The energetic anisotropic electrons may be produced during the reconnection process. The whistler mode waves propagate away from the center of the "X-line" along magnetic field lines, suggesting that the electron diffusion region is a possible source region of the whistler mode waves.

  14. Tumor Microenvironment Gene Signature as a Prognostic Classifier and Therapeutic Target

    Science.gov (United States)

    2016-06-01

    AWARD NUMBER: W81XWH-14-1-0107 TITLE: Tumor Microenvironment Gene Signature as a Prognostic Classifier and Therapeutic Target PRINCIPAL...AND SUBTITLE Tumor Microenvironment Gene Signature as a 5a. CONTRACT NUMBER W81XWH-14-1-0107 Prognostic Classifier and Therapeutic Target 5b...gene signature that correlates with poor survival in ovarian cancer patients. We are refining this gene signature to develop biomarkers for the

  15. Azimuthal asymmetry of recoil electrons in neutrino-electron elastic scattering as signature of neutrino nature

    Energy Technology Data Exchange (ETDEWEB)

    Sobkow, W.; Blaut, A. [University of Wroclaw, Institute of Theoretical Physics, Wroclaw (Poland)

    2016-05-15

    In this paper, we analyze the theoretically possible scenario beyond the standard model in order to show how the presence of the exotic scalar, tensor, V + A weak interactions in addition to the standard vector-axial (V - A) ones may help to distinguish the Dirac from Majorana neutrinos in the elastic scattering of an (anti)neutrino beam off the unpolarized electrons in the relativistic limit. We assume that the incoming (anti)neutrino beam comes from the polarized muon decay at rest and is the left-right chiral superposition with assigned direction of the transversal spin polarization with respect to the production plane. Our analysis is carried out for the flavour (current) neutrino eigenstates. It means that the transverse neutrino polarization estimates are the same both for the Dirac and Majorana cases. We display that the azimuthal asymmetry in the angular distribution of recoil electrons is generated by the interference terms between the standard and exotic couplings, which are proportional to the transversal (anti)neutrino spin polarization and independent of the neutrino mass. This asymmetry for the Majorana neutrinos is larger than for the Dirac ones. We also indicate the possibility of utilizing the azimuthal asymmetry measurements to search for the new CP-violating phases. Our study is based on the assumption that the possible detector (running for 1 year) has the shape of a flat circular ring, while the intense neutrino source is located in the centre of the ring and polarized perpendicularly to the ring. In addition, the large low-threshold, real-time detector is able to measure with a high resolution both the polar angle and the azimuthal angle of outgoing electron momentum. Our analysis is model-independent and consistent with the current upper limits on the non-standard couplings. (orig.)

  16. A user friendly Lidar system based on LabVIEW

    Energy Technology Data Exchange (ETDEWEB)

    Andersson, Mats; Weibring, P.

    1996-09-01

    Mobile differential absorption lidar (DIAL) systems have been used for the last two decades. The lidar group in Lund has performed many DIAL measurements with a mobile lidar system which was first described in 1987. This report describes how that system was updated with the graphical programming language LabVIEW in order to get a user friendly system. The software controls the lidar system and analyses measurement data. The measurement results are shown as maps of species concentration. New electronics to support the new lidar program have also been installed. The report describes how all supporting electronics and the program work. A user manual for the new program is also given. 19 refs, 79 figs, 23 charts

  17. Some computer graphical user interfaces in radiation therapy.

    Science.gov (United States)

    Chow, James C L

    2016-03-28

    In this review, five graphical user interfaces (GUIs) used in radiation therapy practices and researches are introduced. They are: (1) the treatment time calculator, superficial X-ray treatment time calculator (SUPCALC) used in the superficial X-ray radiation therapy; (2) the monitor unit calculator, electron monitor unit calculator (EMUC) used in the electron radiation therapy; (3) the multileaf collimator machine file creator, sliding window intensity modulated radiotherapy (SWIMRT) used in generating fluence map for research and quality assurance in intensity modulated radiation therapy; (4) the treatment planning system, DOSCTP used in the calculation of 3D dose distribution using Monte Carlo simulation; and (5) the monitor unit calculator, photon beam monitor unit calculator (PMUC) used in photon beam radiation therapy. One common issue of these GUIs is that all user-friendly interfaces are linked to complex formulas and algorithms based on various theories, which do not have to be understood and noted by the user. In that case, user only needs to input the required information with help from graphical elements in order to produce desired results. SUPCALC is a superficial radiation treatment time calculator using the GUI technique to provide a convenient way for radiation therapist to calculate the treatment time, and keep a record for the skin cancer patient. EMUC is an electron monitor unit calculator for electron radiation therapy. Instead of doing hand calculation according to pre-determined dosimetric tables, clinical user needs only to input the required drawing of electron field in computer graphical file format, prescription dose, and beam parameters to EMUC to calculate the required monitor unit for the electron beam treatment. EMUC is based on a semi-experimental theory of sector-integration algorithm. SWIMRT is a multileaf collimator machine file creator to generate a fluence map produced by a medical linear accelerator. This machine file controls

  18. The effects of lymph node status on predicting outcome in ER+ /HER2- tamoxifen treated breast cancer patients using gene signatures

    International Nuclear Information System (INIS)

    Cockburn, Jessica G.; Hallett, Robin M.; Gillgrass, Amy E.; Dias, Kay N.; Whelan, T.; Levine, M. N.; Hassell, John A.; Bane, Anita

    2016-01-01

    Lymph node (LN) status is the most important prognostic variable used to guide ER positive (+) breast cancer treatment. While a positive nodal status is traditionally associated with a poor prognosis, a subset of these patients respond well to treatment and achieve long-term survival. Several gene signatures have been established as a means of predicting outcome of breast cancer patients, but the development and indication for use of these assays varies. Here we compare the capacity of two approved gene signatures and a third novel signature to predict outcome in distinct LN negative (-) and LN+ populations. We also examine biological differences between tumours associated with LN- and LN+ disease. Gene expression data from publically available data sets was used to compare the ability of Oncotype DX and Prosigna to predict Distant Metastasis Free Survival (DMFS) using an in silico platform. A novel gene signature (Ellen) was developed by including patients with both LN- and LN+ disease and using Prediction Analysis of Microarrays (PAM) software. Gene Set Enrichment Analysis (GSEA) was used to determine biological pathways associated with patient outcome in both LN- and LN+ tumors. The Oncotype DX gene signature, which only used LN- patients during development, significantly predicted outcome in LN- patients, but not LN+ patients. The Prosigna gene signature, which included both LN- and LN+ patients during development, predicted outcome in both LN- and LN+ patient groups. Ellen was also able to predict outcome in both LN- and LN+ patient groups. GSEA suggested that epigenetic modification may be related to poor outcome in LN- disease, whereas immune response may be related to good outcome in LN+ disease. We demonstrate the importance of incorporating lymph node status during the development of prognostic gene signatures. Ellen may be a useful tool to predict outcome of patients regardless of lymph node status, or for those with unknown lymph node status. Finally we

  19. MMS FEEPS Energetic Electron Microinjection Observations During 2015 Through October 2017

    Science.gov (United States)

    Fennell, J. F.; Turner, D. L.; Lemon, C.; Kavosi, S.; Spence, H. E.; Jaynes, A. N.; Blake, J. B.; Clemmons, J. H.; Baker, D. N.; Mauk, B.; Burch, J. L.; Cohen, I. J.

    2017-12-01

    During MMS traversals of the midnight to dusk local time regions energetic electron data showed many clusters of electron injections we call microinjections because of their short duration signatures. These microinjections of 50-400 keV electrons have energy dispersion signatures indicating that they gradient and curvature drifted from earlier local times. Multiple clusters of microinjection occurred during these traversals. We show detailed results from some microinjections taken with burst mode data. These high temporal resolution data showed that the electrons in the microinjections were trapped and had bidirectional field-aligned angular distributions. Drift calculations constrained by the observed electron dispersion times indicate the electrons had drifted from near the magnetopause hours earlier in local time. They were not observed in the midnight through pre-noon regions in 2015-2016. The 2015-2016 observations were limited to altitudes of 9 to 12 Re because the MMS apogee was 12 Re then. In March 2017, the MMS apogee was raised to 25 Re and we will show how these later microinjection observations compare to the earlier ones. These injection clusters are a new phenomenon in this region of the magnetosphere and with the higher orbit we will observe how close to the magnetopause they exist and possibly traverse the source regions. We will provide statistics on the occurrence of the injections and discuss possible sources and implications.

  20. Methods and apparatus for multi-parameter acoustic signature inspection

    Energy Technology Data Exchange (ETDEWEB)

    Diaz, Aaron A [Richland, WA; Samuel, Todd J [Pasco, WA; Valencia, Juan D [Kennewick, WA; Gervais, Kevin L [Richland, WA; Tucker, Brian J [Pasco, WA; Kirihara, Leslie J [Richland, WA; Skorpik, James R [Kennewick, WA; Reid, Larry D [Benton City, WA; Munley, John T [Benton City, WA; Pappas, Richard A [Richland, WA; Wright, Bob W [West Richland, WA; Panetta, Paul D [Richland, WA; Thompson, Jason S [Richland, WA

    2007-07-24

    A multiparameter acoustic signature inspection device and method are described for non-invasive inspection of containers. Dual acoustic signatures discriminate between various fluids and materials for identification of the same.

  1. The practice of electronic petitions to regional political agenda-setting

    Directory of Open Access Journals (Sweden)

    O. M. Kuzhman

    2016-05-01

    Proved that electronic petitions as a special form of collective appeals, in fact, represent electronic (national, regional, local – depending on the level of government initiatives which the conditions of collecting the required number of signatures in his support are urgently considered relevant authority. For it must necessarily be made or decision given in a public way motivated refusal. It was determined that the regional feeder electronic petitions is very effective because it allows you to identify the pressing issues of interest to residents of a region, and respond to them. Thus, through electronic petition very quickly established regional political agenda.

  2. Electronic cigarettes: human health effects.

    Science.gov (United States)

    Callahan-Lyon, Priscilla

    2014-05-01

    With the rapid increase in use of electronic nicotine delivery systems (ENDS), such as electronic cigarettes (e-cigarettes), users and non-users are exposed to the aerosol and product constituents. This is a review of published data on the human health effects of exposure to e-cigarettes and their components. Literature searches were conducted through September 2013 using multiple electronic databases. Forty-four articles are included in this analysis. E-cigarette aerosols may contain propylene glycol, glycerol, flavourings, other chemicals and, usually, nicotine. Aerosolised propylene glycol and glycerol produce mouth and throat irritation and dry cough. No data on the effects of flavouring inhalation were identified. Data on short-term health effects are limited and there are no adequate data on long-term effects. Aerosol exposure may be associated with respiratory function impairment, and serum cotinine levels are similar to those in traditional cigarette smokers. The high nicotine concentrations of some products increase exposure risks for non-users, particularly children. The dangers of secondhand and thirdhand aerosol exposure have not been thoroughly evaluated. Scientific evidence regarding the human health effects of e-cigarettes is limited. While e-cigarette aerosol may contain fewer toxicants than cigarette smoke, studies evaluating whether e-cigarettes are less harmful than cigarettes are inconclusive. Some evidence suggests that e-cigarette use may facilitate smoking cessation, but definitive data are lacking. No e-cigarette has been approved by FDA as a cessation aid. Environmental concerns and issues regarding non-user exposure exist. The health impact of e-cigarettes, for users and the public, cannot be determined with currently available data.

  3. Characterizing use patterns and perceptions of relative harm in dual users of electronic and tobacco cigarettes

    Science.gov (United States)

    Rass, Olga; Pacek, Lauren R.; Johnson, Patrick S.; Johnson, Matthew W.

    2015-01-01

    Awareness and use of electronic cigarettes (e-cigarettes) is increasing. Questions regarding positive (e.g., smoking reduction/cessation) and negative (e.g., delay of cessation) potential public health consequences of e-cigarettes may be informed by studying dual users of e-cigarettes and tobacco cigarettes. A cross-sectional online survey assessed demographics, product use patterns, and beliefs about relative product benefits and harms among dual users (n = 350) in the United States using the website Amazon Mechanical Turk (MTurk). Compared to tobacco cigarettes, e-cigarettes were used less often and were associated with lower dependence. Participants reported a 30% reduction in self-reported tobacco cigarette smoking since beginning to use e-cigarettes. Reported primary reasons for e-cigarette use were harm reduction and smoking cessation. E-cigarette use was reported as more likely in settings with smoking restrictions and when others’ health could be adversely affected. Conversely, participants reported having used tobacco cigarettes more often than e-cigarettes in hedonic situations (e.g., after eating, drinking coffee or alcohol, or having sex), outdoors, or when stressed. Participants were twice as likely to report wanting to quit tobacco cigarettes compared to e-cigarettes in the next year and intended to quit tobacco cigarettes sooner. Tobacco cigarettes were described as more harmful and addictive, but also more enjoyable than e-cigarettes. Participants provided evidence consistent with both positive and negative public health consequences of e-cigarettes, highlighting the need for experimental research, including laboratory studies and clinical trials. Policies should consider potential public health benefits of e-cigarettes, in addition to potential harms. PMID:26389638

  4. Electronic Cigarette using in Surabaya’s Personal Vaporizer Community

    Directory of Open Access Journals (Sweden)

    Apsari Damayanti

    2017-02-01

    Full Text Available Electronic cigarette is devices capable of delivering nicotine in an aerosolized form. The number of electronic cigarette users is increasing. Data showed an Indonesia electronic cigarette user in 2010 to 2011 is 0,5%. This research was observasional decriptive study and used cross sectional design. This research was conducted to 31 Surabaya’s Personal Vaporizer members. The dependent variable in this study was electronic cigarette using, while independent variable were the knowledge, accessibility and family factor. Data were analyzed by prevalens ratio. The result showed that using of electronic cigarette mostly suffered by respondent age 26 to 35 years old was equal to 54,8%, male (96,8% and educational level was senior high school to university (100%, occupation was employee (71%, had a smoking history (93,6%, and using electronic cigarette for smoking cessation (80,6%. The analyzed with prevalens ratio showed that right knowlegde about electronic cigarette was a protective factor to being using electronic cigarette (PR=0,89, accessibility ≤ Rp 100.000 was a risk to being using electronic cigarette, and family was a protective factor to being using electronic cigarette (PR=0,95. From all variable which were studied, only accessibility that a risk factor with electronic cigarette using. Therefore, education about electronic cigarette haved to do and controlling toward electronic cigarette user needed to do.   Keywords : electronic cigarette, accessibility, community, knowledge, behavior

  5. Thermal Signature Measurements for Ammonium Nitrate/Fuel Mixtures by Laser Heating.

    Science.gov (United States)

    Nazarian, Ashot; Presser, Cary

    2016-01-10

    Measurements were carried out to obtain thermal signatures of several ammonium nitrate/fuel (ANF) mixtures, using a laser-heating technique referred to as the laser-driven thermal reactor (LDTR). The mixtures were ammonium nitrate (AN)/kerosene, AN/ethylene glycol, AN/paraffin wax, AN/petroleum jelly, AN/confectioner's sugar, AN/cellulose (tissue paper), nitromethane/cellulose, nitrobenzene/cellulose, AN/cellulose/nitromethane, AN/cellulose/nitrobenzene. These mixtures were also compared with AN/nitromethane and AN/diesel fuel oil, obtained from an earlier investigation. Thermograms for the mixtures, as well as individual constituents, were compared to better understand how the sample thermal signature changes with mixture composition. This is the first step in development of a thermal-signature database, to be used along with other signature databases, to improve identification of energetic substances of unknown composition. The results indicated that each individual thermal signature was associated unambiguously with a particular mixture composition. The signature features of a particular mixture were shaped by the individual constituent signatures. It was also uncovered that the baseline signature was modified after an experiment due to coating of unreacted residue on the substrate surface and a change in the reactor sphere oxide layer. Thus, care was required to pre-oxidize the sphere prior to an experiment. A minimum sample mass (which was dependent on composition) was required to detect the signature characteristics. Increased laser power served to magnify signal strength while preserving the signature features. For the mixtures examined, the thermal response of each ANF mixture was found to be different, which was based on the mixture composition and the thermal behavior of each mixture constituent.

  6. 26 CFR 301.6064-1 - Signature presumed authentic.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Signature presumed authentic. 301.6064-1 Section 301.6064-1 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE TREASURY (CONTINUED....6064-1 Signature presumed authentic. An individual's name signed to a return, statement, or other...

  7. Molecular signatures for the Crenarchaeota and the Thaumarchaeota.

    Science.gov (United States)

    Gupta, Radhey S; Shami, Ali

    2011-02-01

    Crenarchaeotes found in mesophilic marine environments were recently placed into a new phylum of Archaea called the Thaumarchaeota. However, very few molecular characteristics of this new phylum are currently known which can be used to distinguish them from the Crenarchaeota. In addition, their relationships to deep-branching archaeal lineages are unclear. We report here detailed analyses of protein sequences from Crenarchaeota and Thaumarchaeota that have identified many conserved signature indels (CSIs) and signature proteins (SPs) (i.e., proteins for which all significant blast hits are from these groups) that are specific for these archaeal groups. Of the identified signatures 6 CSIs and 13 SPs are specific for the Crenarchaeota phylum; 6 CSIs and >250 SPs are uniquely found in various Thaumarchaeota (viz. Cenarchaeum symbiosum, Nitrosopumilus maritimus and a number of uncultured marine crenarchaeotes) and 3 CSIs and ~10 SPs are found in both Thaumarchaeota and Crenarchaeota species. Some of the molecular signatures are also present in Korarchaeum cryptofilum, which forms the independent phylum Korarchaeota. Although some of these molecular signatures suggest a distant shared ancestry between Thaumarchaeota and Crenarchaeota, our identification of large numbers of Thaumarchaeota-specific proteins and their deep branching between the Crenarchaeota and Euryarchaeota phyla in phylogenetic trees shows that they are distinct from both Crenarchaeota and Euryarchaeota in both genetic and phylogenetic terms. These observations support the placement of marine mesophilic archaea into the separate phylum Thaumarchaeota. Additionally, many CSIs and SPs have been found that are specific for different orders within Crenarchaeota (viz. Sulfolobales-3 CSIs and 169 SPs, Thermoproteales-5 CSIs and 25 SPs, Desulfurococcales-4 SPs, and Sulfolobales and Desulfurococcales-2 CSIs and 18 SPs). The signatures described here provide novel means for distinguishing the Crenarchaeota and

  8. Early signatures of regime shifts in gene expression dynamics

    Science.gov (United States)

    Pal, Mainak; Pal, Amit Kumar; Ghosh, Sayantari; Bose, Indrani

    2013-06-01

    Recently, a large number of studies have been carried out on the early signatures of sudden regime shifts in systems as diverse as ecosystems, financial markets, population biology and complex diseases. The signatures of regime shifts in gene expression dynamics are less systematically investigated. In this paper, we consider sudden regime shifts in the gene expression dynamics described by a fold-bifurcation model involving bistability and hysteresis. We consider two alternative models, models 1 and 2, of competence development in the bacterial population B. subtilis and determine some early signatures of the regime shifts between competence and noncompetence. We use both deterministic and stochastic formalisms for the purpose of our study. The early signatures studied include the critical slowing down as a transition point is approached, rising variance and the lag-1 autocorrelation function, skewness and a ratio of two mean first passage times. Some of the signatures could provide the experimental basis for distinguishing between bistability and excitability as the correct mechanism for the development of competence.

  9. Spatially Resolved Isotopic Source Signatures of Wetland Methane Emissions

    Science.gov (United States)

    Ganesan, A. L.; Stell, A. C.; Gedney, N.; Comyn-Platt, E.; Hayman, G.; Rigby, M.; Poulter, B.; Hornibrook, E. R. C.

    2018-04-01

    We present the first spatially resolved wetland δ13C(CH4) source signature map based on data characterizing wetland ecosystems and demonstrate good agreement with wetland signatures derived from atmospheric observations. The source signature map resolves a latitudinal difference of 10‰ between northern high-latitude (mean -67.8‰) and tropical (mean -56.7‰) wetlands and shows significant regional variations on top of the latitudinal gradient. We assess the errors in inverse modeling studies aiming to separate CH4 sources and sinks by comparing atmospheric δ13C(CH4) derived using our spatially resolved map against the common assumption of globally uniform wetland δ13C(CH4) signature. We find a larger interhemispheric gradient, a larger high-latitude seasonal cycle, and smaller trend over the period 2000-2012. The implication is that erroneous CH4 fluxes would be derived to compensate for the biases imposed by not utilizing spatially resolved signatures for the largest source of CH4 emissions. These biases are significant when compared to the size of observed signals.

  10. Early signatures of regime shifts in gene expression dynamics

    International Nuclear Information System (INIS)

    Pal, Mainak; Pal, Amit Kumar; Ghosh, Sayantari; Bose, Indrani

    2013-01-01

    Recently, a large number of studies have been carried out on the early signatures of sudden regime shifts in systems as diverse as ecosystems, financial markets, population biology and complex diseases. The signatures of regime shifts in gene expression dynamics are less systematically investigated. In this paper, we consider sudden regime shifts in the gene expression dynamics described by a fold-bifurcation model involving bistability and hysteresis. We consider two alternative models, models 1 and 2, of competence development in the bacterial population B. subtilis and determine some early signatures of the regime shifts between competence and noncompetence. We use both deterministic and stochastic formalisms for the purpose of our study. The early signatures studied include the critical slowing down as a transition point is approached, rising variance and the lag-1 autocorrelation function, skewness and a ratio of two mean first passage times. Some of the signatures could provide the experimental basis for distinguishing between bistability and excitability as the correct mechanism for the development of competence. (paper)

  11. Electronic Journal Publishing: Observations from Inside.

    Science.gov (United States)

    Hunter, Karen

    1998-01-01

    Focuses on electronic scholarly-journal publishing. Discusses characteristics of current academic electronic publishing; effects of the World Wide Web; user needs and positions of academic libraries; costs; and decisions of research librarians that drive the industry. (AEF)

  12. Signature scheme for the microscopic description of nuclear collective excitations

    International Nuclear Information System (INIS)

    Ogawa, K.

    1980-04-01

    The symmetries between the proton and neutron systems in a nucleus are described in terms of the signatures. Three kinds of signatures (i.e. the pn-, p anti n- and p anti p- (or n anti n-) signatures) are introduced and they are related to the appearance of various collective motions such as rotations or vibrations. It is shown that the pn-signature scheme provides a band-like structure of deformed nuclei, while the features associated with the quadrupole vibration are obtained in the p anti n- and p anti p-signature scheme. From the detail investigation of the p anti n-symmetric wave functions, it is concluded that the reguralities provided by the present shell model are more analogous to those of the γ-unstable surface vibration model (Wilets-Jean model) than to those of harmonic phonon model. (author)

  13. Hyperspectral signature analysis of skin parameters

    Science.gov (United States)

    Vyas, Saurabh; Banerjee, Amit; Garza, Luis; Kang, Sewon; Burlina, Philippe

    2013-02-01

    The temporal analysis of changes in biological skin parameters, including melanosome concentration, collagen concentration and blood oxygenation, may serve as a valuable tool in diagnosing the progression of malignant skin cancers and in understanding the pathophysiology of cancerous tumors. Quantitative knowledge of these parameters can also be useful in applications such as wound assessment, and point-of-care diagnostics, amongst others. We propose an approach to estimate in vivo skin parameters using a forward computational model based on Kubelka-Munk theory and the Fresnel Equations. We use this model to map the skin parameters to their corresponding hyperspectral signature. We then use machine learning based regression to develop an inverse map from hyperspectral signatures to skin parameters. In particular, we employ support vector machine based regression to estimate the in vivo skin parameters given their corresponding hyperspectral signature. We build on our work from SPIE 2012, and validate our methodology on an in vivo dataset. This dataset consists of 241 signatures collected from in vivo hyperspectral imaging of patients of both genders and Caucasian, Asian and African American ethnicities. In addition, we also extend our methodology past the visible region and through the short-wave infrared region of the electromagnetic spectrum. We find promising results when comparing the estimated skin parameters to the ground truth, demonstrating good agreement with well-established physiological precepts. This methodology can have potential use in non-invasive skin anomaly detection and for developing minimally invasive pre-screening tools.

  14. Absence of a spin-signature from a single Ho adatom as probed by spin-sensitive tunneling.

    Science.gov (United States)

    Steinbrecher, M; Sonntag, A; dos Santos Dias, M; Bouhassoune, M; Lounis, S; Wiebe, J; Wiesendanger, R; Khajetoorians, A A

    2016-02-03

    Whether rare-earth materials can be used as single-atom magnetic memory is an ongoing debate in recent literature. Here we show, by inelastic and spin-resolved scanning tunnelling-based methods, that we observe a strong magnetic signal and excitation from Fe atoms adsorbed on Pt(111), but see no signatures of magnetic excitation or spin-based telegraph noise for Ho atoms. Moreover, we observe that the indirect exchange field produced by a single Ho atom is negligible, as sensed by nearby Fe atoms. We demonstrate, using ab initio methods, that this stems from a comparatively weak coupling of the Ho 4f electrons with both tunnelling electrons and substrate-derived itinerant electrons, making both magnetic coupling and detection very difficult when compared to 3d elements. We discuss these results in the context of ongoing disputes and clarify important controversies.

  15. Invariance Signatures: Characterizing contours by their departures from invariance

    OpenAIRE

    Squire, David; Caelli, Terry M.

    1997-01-01

    In this paper, a new invariant feature of two-dimensional contours is reported: the Invariance Signature. The Invariance Signature is a measure of the degree to which a contour is invariant under a variety of transformations, derived from the theory of Lie transformation groups. It is shown that the Invariance Signature is itself invariant under shift, rotation and scaling of the contour. Since it is derived from local properties of the contour, it is well-suited to a neural network implement...

  16. Influence of triaxiality on the signature inversion in odd-odd nuclei

    International Nuclear Information System (INIS)

    Zheng, R.R.; Luo, X.D.; Timar, J.; Sohler, S.; Nyako, B.M.; Zolnai, L.; Paul, E.S.

    2004-01-01

    Complete text of publication follows. Signature inversion in the A ∼ 100 region has been reported earlier only in the case of the odd-odd 98 Rh nucleus. Our studies on the 100-103 Rh isotopes and a close inspection of the known πg 9/2 νh 11/ 2 bands of the Rh (Z = 45) and Ag (Z = 47) isotopes revealed that the signature splitting effects, earlier considered as quenchings of signature splitting, are not only quenchings but signature inversions. Indeed, the energetically favored signature at low spins in these πg 9/2 νh 11/2 bands is the α = 1 branch (odd spins) instead of the expected α = 0 branch (even spins). The systematic occurrence of signature inversion in this mass region is discussed in Refs. together with attempts to understand its behavior qualitatively. Among many attempts for interpreting the mechanism of signature inversion in odd-odd nuclei, a model using an axially symmetric rotor plus two quasi-particles has already been successfully applied to describe the observed signature inversions in the A ∼ 80 and A ∼ 160 mass regions. According to this model the signature inversion is caused by the competition between the Coriolis and the proton-neutron residual interactions in low K space. Such calculations have been also successfully applied to the π g9/2 νh 11/2 bands in the odd-odd 98 Rh and 102 Rh nuclei. Recent observations of chiral band structures in the nearby Rh nuclei suggest a possibility of triaxiality in these nuclei, too. In the present work we examined the possible influence of triaxiality on the signature inversion using a triaxial rotor plus two-quasiparticle model and compared the results with the experimental data of 98 Rh and 102 Rh. The calculations provided a better agreement with the experiment than the axially symmetric calculations. Compared to the axially symmetric case, the triaxiality applied in the Hamiltonian enlarges the amplitudes of high-spin signature zigzags at small triaxial deformation and might push the

  17. Comparison of transcriptomic signature of post-Chernobyl and postradiotherapy thyroid tumors.

    Science.gov (United States)

    Ory, Catherine; Ugolin, Nicolas; Hofman, Paul; Schlumberger, Martin; Likhtarev, Illya A; Chevillard, Sylvie

    2013-11-01

    We previously identified two highly discriminating and predictive radiation-induced transcriptomic signatures by comparing series of sporadic and postradiotherapy thyroid tumors (322-gene signature), and by reanalyzing a previously published data set of sporadic and post-Chernobyl thyroid tumors (106-gene signature). The aim of the present work was (i) to compare the two signatures in terms of gene expression deregulations and molecular features/pathways, and (ii) to test the capacity of the postradiotherapy signature in classifying the post-Chernobyl series of tumors and reciprocally of the post-Chernobyl signature in classifying the postradiotherapy-induced tumors. We now explored if postradiotherapy and post-Chernobyl papillary thyroid carcinomas (PTC) display common molecular features by comparing molecular pathways deregulated in the two tumor series, and tested the potential of gene subsets of the postradiotherapy signature to classify the post-Chernobyl series (14 sporadic and 12 post-Chernobyl PTC), and reciprocally of gene subsets of the post-Chernobyl signature to classify the postradiotherapy series (15 sporadic and 12 postradiotherapy PTC), by using conventional principal component analysis. We found that the five genes common to the two signatures classified the learning/training tumors (used to search these signatures) of both the postradiotherapy (seven PTC) and the post-Chernobyl (six PTC) thyroid tumor series as compared with the sporadic tumors (seven sporadic PTC in each series). Importantly, these five genes were also effective for classifying independent series of postradiotherapy (five PTC) and post-Chernobyl (six PTC) tumors compared to independent series of sporadic tumors (eight PTC and six PTC respectively; testing tumors). Moreover, part of each postradiotherapy (32 genes) and post-Chernobyl signature (16 genes) cross-classified the respective series of thyroid tumors. Finally, several molecular pathways deregulated in post

  18. EARS: Electronic Access to Reference Service.

    Science.gov (United States)

    Weise, F O; Borgendale, M

    1986-10-01

    Electronic Access to Reference Service (EARS) is a front end to the Health Sciences Library's electronic mail system, with links to the online public catalog. EARS, which became operational in September 1984, is accessed by users at remote sites with either a terminal or microcomputer. It is menu-driven, allowing users to request: a computerized literature search, reference information, a photocopy of a journal article, or a book. This paper traces the history of EARS and discusses its use, its impact on library staff and services, and factors that influence the diffusion of new technology.

  19. Spinors, superalgebras and the signature of space-time

    CERN Document Server

    Ferrara, S.

    2001-01-01

    Superconformal algebras embedding space-time in any dimension and signature are considered. Different real forms of the $R$-symmetries arise both for usual space-time signature (one time) and for Euclidean or exotic signatures (more than one times). Application of these superalgebras are found in the context of supergravities with 32 supersymmetries, in any dimension $D \\leq 11$. These theories are related to $D = 11, M, M^*$ and $M^\\prime$ theories or $D = 10$, IIB, IIB$^*$ theories when compactified on Lorentzian tori. All dimensionally reduced theories fall in three distinct phases specified by the number of (128 bosonic) positive and negative norm states: $(n^+,n^-) = (128,0), (64,64), (72,56)$.

  20. Observation of a 27-day solar signature in noctilucent cloud altitude

    Science.gov (United States)

    Köhnke, Merlin C.; von Savigny, Christian; Robert, Charles E.

    2018-05-01

    Previous studies have identified solar 27-day signatures in several parameters in the Mesosphere/Lower thermosphere region, including temperature and Noctilucent cloud (NLC) occurrence frequency. In this study we report on a solar 27-day signature in NLC altitude with peak-to-peak variations of about 400 m. We use SCIAMACHY limb-scatter observations from 2002 to 2012 to detect NLCs. The superposed epoch analysis method is applied to extract solar 27-day signatures. A 27-day signature in NLC altitude can be identified in both hemispheres in the SCIAMACHY dataset, but the signature is more pronounced in the northern hemisphere. The solar signature in NLC altitude is found to be in phase with solar activity and temperature for latitudes ≳ 70 ° N. We provide a qualitative explanation for the positive correlation between solar activity and NLC altitude based on published model simulations.