WorldWideScience

Sample records for electronic signature user

  1. Signature-based User Authentication

    OpenAIRE

    Hámorník, Juraj

    2015-01-01

    This work aims on missing handwritten signature authentication in Windows. Result of this work is standalone software that allow users to log into Windows by writing signature. We focus on security of signature authentification and best overall user experience. We implemented signature authentification service that accept signature and return user access token if signature is genuine. Signature authentification is done by comparing given signature to signature patterns by their similarity. Si...

  2. ELECTRONIC SIGNATURES

    African Journals Online (AJOL)

    10332324

    "[to] promote the understanding and, acceptance of and growth in the number of electronic transactions .... Chapter III of the ECT Act is based on the UNCITRAL Model Law on Electronic. Commerce ... Communications Technology Law 146. 22.

  3. Electronic Signature Policy

    Science.gov (United States)

    Establishes the United States Environmental Protection Agency's approach to adopting electronic signature technology and best practices to ensure electronic signatures applied to official Agency documents are legally valid and enforceable

  4. THE ELECTRONIC SIGNATURE

    Directory of Open Access Journals (Sweden)

    Voiculescu Madalina Irena

    2009-05-01

    Full Text Available Article refers to significance and the digital signature in electronic commerce. Internet and electronic commerce open up many new opportunities for the consumer, yet, the security (or perceived lack of security of exchanging personal and financial data

  5. Electronic Signature (eSig)

    Data.gov (United States)

    Department of Veterans Affairs — Beginning with the Government Paperwork Elimination Act of 1998 (GPEA), the Federal government has encouraged the use of electronic / digital signatures to enable...

  6. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  7. Electronic health records: what does your signature signify?

    Directory of Open Access Journals (Sweden)

    Victoroff MD Michael S

    2012-08-01

    Full Text Available Abstract Electronic health records serve multiple purposes, including clinical communication, legal documentation, financial transaction capture, research and analytics. Electronic signatures attached to entries in EHRs have different logical and legal meanings for different users. Some of these are vestiges from historic paper formats that require reconsideration. Traditionally accepted functions of signatures, such as identity verification, attestation, consent, authorization and non-repudiation can become ambiguous in the context of computer-assisted workflow processes that incorporate functions like logins, auto-fill and audit trails. This article exposes the incompatibility of expectations among typical users of electronically signed information.

  8. Electronic Commerce user manual

    Energy Technology Data Exchange (ETDEWEB)

    1992-04-10

    This User Manual supports the Electronic Commerce Standard System. The Electronic Commerce Standard System is being developed for the Department of Defense of the Technology Information Systems Program at the Lawrence Livermore National Laboratory, operated by the University of California for the Department of Energy. The Electronic Commerce Standard System, or EC as it is known, provides the capability for organizations to conduct business electronically instead of through paper transactions. Electronic Commerce and Computer Aided Acquisition and Logistics Support, are two major projects under the DoD`s Corporate Information Management program, whose objective is to make DoD business transactions faster and less costly by using computer networks instead of paper forms and postage. EC runs on computers that use the UNIX operating system and provides a standard set of applications and tools that are bound together by a common command and menu system. These applications and tools may vary according to the requirements of the customer or location and may be customized to meet the specific needs of an organization. Local applications can be integrated into the menu system under the Special Databases & Applications option on the EC main menu. These local applications will be documented in the appendices of this manual. This integration capability provides users with a common environment of standard and customized applications.

  9. Electronic Commerce user manual

    Energy Technology Data Exchange (ETDEWEB)

    1992-04-10

    This User Manual supports the Electronic Commerce Standard System. The Electronic Commerce Standard System is being developed for the Department of Defense of the Technology Information Systems Program at the Lawrence Livermore National Laboratory, operated by the University of California for the Department of Energy. The Electronic Commerce Standard System, or EC as it is known, provides the capability for organizations to conduct business electronically instead of through paper transactions. Electronic Commerce and Computer Aided Acquisition and Logistics Support, are two major projects under the DoD's Corporate Information Management program, whose objective is to make DoD business transactions faster and less costly by using computer networks instead of paper forms and postage. EC runs on computers that use the UNIX operating system and provides a standard set of applications and tools that are bound together by a common command and menu system. These applications and tools may vary according to the requirements of the customer or location and may be customized to meet the specific needs of an organization. Local applications can be integrated into the menu system under the Special Databases Applications option on the EC main menu. These local applications will be documented in the appendices of this manual. This integration capability provides users with a common environment of standard and customized applications.

  10. Impact of Electronic Signatures and Time Stamping for the Protection of Electronic Agreements

    Directory of Open Access Journals (Sweden)

    Tadas Limba

    2012-12-01

    Full Text Available The article e495 valuates the impact of e-signatures and time stamping on electronic contracts and electronic documents for performing e-business opportunities and goals, and analyses e-signature application for business cases. Various electronic services, virtual shopping, electronic cash transactions are becoming increasingly popular as they allow users to quickly perform different actions, operations and functions. It is important not only for convenience, but also to ensure consumer data security and reliability. Security reasons are not enough for security transmitted data, since this method does not allow clarification of information about sender identity.Use of electronic signatures, electronic identities, checgs and ensures a very high level of data security in interchange data processes. E-signature allows e-business companies to transfer the company’s operation business processes and their application to the organization and management in the electronic environment, also automate internal and external compans processes, includinggon-going business processes.The object of paper is .-signature and time stamping application in the theoretical and practical way.The goal of this paper while evaluating and estimating the .-signature and time stamping application, i’s regulation and legal implementation worldwidesand in Lithuania—is to provideluseful recommendations for more efficient impact developing -commerce and -business in situations when -signature and time stamping is used for ensuring electronic contracs security.

  11. Impact of Electronic Signatures and Time Stamping for the Protection of Electronic Agreements

    Directory of Open Access Journals (Sweden)

    Tadas Limba

    2013-02-01

    Full Text Available The article e495 valuates the impact of e-signatures and time stamping on electronic contracts and electronic documents for performing e-business opportunities and goals, and analyses e-signature application for business cases. Various electronic services, virtual shopping, electronic cash transactions are becoming increasingly popular as they allow users to quickly perform different actions, operations and functions. It is important not only for convenience, but also to ensure consumer data security and reliability. Security reasons are not enough for security transmitted data, since this method does not allow clarification of information about sender identity. Use of electronic signatures, electronic identities, checgs and ensures a very high level of data security in interchange data processes. E-signature allows e-business companies to transfer the company’s operation business processes and their application to the organization and management in the electronic environment, also automate internal and external compans processes, includinggon-going business processes. The object of paper is .-signature and time stamping application in the theoretical and practical way. The goal of this paper while evaluating and estimating the .-signature and time stamping application, i’s regulation and legal implementation worldwidesand in Lithuania—is to provideluseful recommendations for more efficient impact developing -commerce and -business in situations when -signature and time stamping is used for ensuring electronic contracs security.

  12. The electronic identification, signature and security of information systems

    Directory of Open Access Journals (Sweden)

    Horovèák Pavel

    2002-12-01

    Full Text Available The contribution deals with the actual methods and technologies of information and communication systems security. It introduces the overview of electronic identification elements such as static password, dynamic password and single sign-on. Into this category belong also biometric and dynamic characteristics of verified person. Widespread is authentication based on identification elements ownership, such as various cards and authentication calculators. In the next part is specified a definition and characterization of electronic signature, its basic functions and certificate categories. Practical utilization of electronic signature consists of electronic signature acquirement, signature of outgoing email message, receiving of electronic signature and verification of electronic signature. The use of electronic signature is continuously growing and in connection with legislation development it exercises in all resorts.

  13. Electronic signature for medical documents--integration and evaluation of a public key infrastructure in hospitals.

    Science.gov (United States)

    Brandner, R; van der Haak, M; Hartmann, M; Haux, R; Schmücker, P

    2002-01-01

    Our objectives were to determine the user-oriented and legal requirements for a Public Key Infrastructure (PKI) for electronic signatures for medical documents, and to translate these requirements into a general model for a signature system. A prototype of this model was then implemented and evaluated in clinical routine use. Analyses of documents, processes, interviews, observations, and of the available literature supplied the foundations for the development of the signature system model. Eight participants of the Department of Dermatology of the Heidelberg University Medical Center evaluated the implemented prototype from December 2000 to January 2001, during the course of an intervention study. By means of questionnaires, interviews, observations and database analyses, the usefulness and user acceptance of the electronic signature and its integration into electronic discharge letters were established. Since the major part of medical documents generated in a hospital are signature-relevant, they will require electronic signatures in the future. A PKI must meet the multitude of responsibilities and security needs required in a hospital. Also, the signature functionality must be integrated directly into the workflow surrounding document creation. A developed signature model, fulfilling user-oriented and legal requirements, was implemented using hard and software components that conform to the German Signature Law. It was integrated into the existing hospital information system of the Heidelberg University Medical Center. At the end of the intervention study, the average acceptance scores achieved were mean = 3.90; SD = 0.42 on a scale of 1 (very negative attitude) to 5 (very positive attitude) for the electronic signature procedure. Acceptance of the integration into computer-supported discharge letter writing reached mean = 3.91; SD = 0.47. On average, the discharge letters were completed 7.18 days earlier. The electronic signature is indispensable for the

  14. 21 CFR 11.200 - Electronic signature components and controls.

    Science.gov (United States)

    2010-04-01

    ... signature components and controls. (a) Electronic signatures that are not based upon biometrics shall: (1) Employ at least two distinct identification components such as an identification code and password. (i... signatures based upon biometrics shall be designed to ensure that they cannot be used by anyone other than...

  15. Fiddling with the ECT act – Electronic signatures | Eiselen ...

    African Journals Online (AJOL)

    Potchefstroom Electronic Law Journal/Potchefstroomse Elektroniese Regsblad ... is considering is an amendment of the definition of "electronic signature". ... of the UNCITRAL Model Laws on eCommerce and the 2005 UN Convention on the ...

  16. Electronic signatures and their specificity in national and European regulations

    Directory of Open Access Journals (Sweden)

    R. MATEFI

    2017-07-01

    Full Text Available The paper aims to emphasize the particularities of the electronic signature by reference to the national as well as to the European legislation, trying to point out its utility in the business environment as well as the controversies in this matter. The starting point of this analysis was the Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures, which establishes the legal framework for electronic signatures and the recognition of certification-service providers. Its main aim was to ease its use and help it become legally recognized within all EU countries.

  17. Electronic Signatures in Global and National Commerce Act. Public Law.

    Science.gov (United States)

    Congress of the U.S., Washington, DC.

    This document presents the text of Public Law 106-229, the "Electronic Signatures in Global and National Commerce Act." The act states that, with respect to any transaction in or affecting interstate or foreign commerce: a signature, contract, or other record relating to such transaction may not be denied legal effect, validity, or…

  18. 76 FR 411 - Regulatory Guidance Concerning Electronic Signatures and Documents

    Science.gov (United States)

    2011-01-04

    ... guidance, including memoranda and letters, may no longer be relied upon to the extent they are inconsistent... Concerning Electronic Signatures and Documents AGENCY: Federal Motor Carrier Safety Administration (FMCSA), DOT. ACTION: Notice of regulatory guidance. SUMMARY: FMCSA issues regulatory guidance concerning the...

  19. 27 CFR 73.11 - What are the required components and controls for acceptable electronic signatures?

    Science.gov (United States)

    2010-04-01

    ... components and controls for acceptable electronic signatures? 73.11 Section 73.11 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY (CONTINUED) PROCEDURES AND PRACTICES ELECTRONIC SIGNATURES; ELECTRONIC SUBMISSION OF FORMS Electronic Signatures § 73.11...

  20. 31 CFR 370.38 - What is the legal effect of an electronic signature?

    Science.gov (United States)

    2010-07-01

    ... electronic signature? 370.38 Section 370.38 Money and Finance: Treasury Regulations Relating to Money and... Requests Through the Bureau of the Public Debt § 370.38 What is the legal effect of an electronic signature? An electronic signature and any electronic message to which it is affixed or attached may not be...

  1. Fiddling With the ECT Act – Electronic Signatures

    Directory of Open Access Journals (Sweden)

    Sieg Eiselen

    2014-12-01

    Full Text Available Amongst the changes the Department of Trade and Industry is considering is an amendment of the definition of "electronic signature". Although the amendment seems to be in line with the provisions of the UNCITRAL Model Laws on eCommerce and the 2005 UN Convention on the Use of Electronic Communications in International Contracts, the amendment sets additional and more onerous requirements for all electronic signatures. The note illustrates how this amendment undermines the key principles of functional equivalence, media neutrality and party autonomy, and how this innocuous looking amendment may have very harmful practical consequences. It is suggested that amendments to section 13 would be more appropriate to achieve the objectives of the legislature.

  2. 75 FR 42575 - Electronic Signature and Storage of Form I-9, Employment Eligibility Verification

    Science.gov (United States)

    2010-07-22

    ... Electronic Signature and Storage of Form I-9, Employment Eligibility Verification AGENCY: U.S. Immigration... published an interim final rule to permit electronic signature and storage of the Form I-9. 71 FR 34510... because electronic signature and storage technologies are optional, DHS expects that small entities will...

  3. National Center for Electron Microscopy users' guide

    International Nuclear Information System (INIS)

    1987-01-01

    The National Center for Electron Microscopy (NCEM) in the Materials and Molecular Research Division of the Lawrence Berkeley Laboratory is a high voltage electron microscope facility for ultra-high resolution or dynamic in-situ studies. This guide describes the instruments and their specifications, support instrumentation, and user policies. Advice as to travel and accommodations is provided in the guide. (FI)

  4. SUIS: An Online Graphical Signature-Based User Identification System

    OpenAIRE

    Alam, Shahid

    2016-01-01

    Humans possess a large amount of, and almost limitless, visual memory, that assists them to remember pictures far better than words. This phenomenon has recently motivated the computer security researchers' in academia and industry to design and develop graphical user identification systems (GUISs). Cognometric GUISs are more memorable than drawmetric GUISs, but takes more time to authenticate. None of the previously proposed GUISs combines the advantages of both cognometric and drawmetric sy...

  5. 78 FR 39200 - Authentication of Electronic Signatures on Electronically Filed Statements of Account

    Science.gov (United States)

    2013-07-01

    ... LIBRARY OF CONGRESS Copyright Office 37 CFR Part 201 [Docket No. 2013-5] Authentication of Electronic Signatures on Electronically Filed Statements of Account AGENCY: U.S. Copyright Office, Library of Congress. ACTION: Notice of proposed rulemaking; correction. SUMMARY: The U.S. Copyright Office published a...

  6. User Support of Electron Irradiation Facility

    International Nuclear Information System (INIS)

    Park, S. H.; Cha, H. K.; Lee, B. C.

    2007-06-01

    The KAERI (Korean Atomic Energy Research Institute) high-power electron beam irradiation facility, operating at the energies between 0.3 MeV and 10 MeV,has provided irradiation services to users in industries, universities, and institutes via 'Project of utilization and cooperation of users of a large research facility' since 2004. A great attraction of many researchers, almost 750 persons so far according to surveys, to e-beam irradiation technology as well as the growth of participants on Workshop on Electron Beam Applications from 121 to 176 indicate the increase of demands of irradiation service. Comparing to the cases of advanced nations in this area, such as America, Japan, China, and Russia, Korea is relatively much behind in radiation technology. It is mainly due to the lack of governmental supports and investments. Active support and investment on construction and operation of electron beam user facilities would be principal factors on developments of advanced technologies. In this project, we would like to satisfy users' requests by developing the effective managing and operating system for prompt services, processes, and QA and to ultimately assist users to create additional new results, by maximizing the utilization of all available resources and activating the developments of technologies of electron beam processing

  7. ANALYSIS OF DIGITAL SIGNATURE RULE IN THE ELECTRONIC COMMERCE LAW OF INDONESIA

    Directory of Open Access Journals (Sweden)

    Irna Nurhayati

    2015-02-01

    Full Text Available The Indonesian legislature has enacted the Information and Electronic Transaction Bill (the Bill in 2003, in which digital signature as a technology specific electronic (e commerce has been promoted. The promotion of digital signature is still problematic, since there is an uncertainty whether Indonesia can develop well a required viable technology of digital signature. Moreover, there is a gap between the actual use of digital signature and the projections of future utilization of digital signature by interested parties on e-commerce. This paper will discuss the reason of the Indonesian legislature promotes digital signature. It will then analyse the gap between the actual use of digital signature and the projections of future utilization of digital signature by interested parties on e-commerce. This paper will finally argue whether the promotion of digital signature of the Bill is useful for the growth of e-commerce in Indonesia.

  8. Electron acceleration and radiation signatures in loop coronal transients

    Science.gov (United States)

    Vlahos, L.; Gergely, T. E.; Papadopoulos, K.

    1982-01-01

    It is proposed that in loop coronal transients an erupting loop moves away from the solar surface, with a velocity exceeding the local Alfven speed, pushing against the overlying magnetic fields and driving a shock in the front of the moving part of the loop. Lower hybrid waves are excited at the shock front and propagate radially toward the center of the loop with phase velocity along the magnetic field that exceeds the thermal velocity. The lower hybrid waves stochastically accelerate the tail of the electron distribution inside the loop. The manner in which the accelerated electrons are trapped in the moving loop are discussed, and their radiation signature is estimated. It is suggested that plasma radiation can explain the power observed in stationary and moving type IV bursts.

  9. User Interface of MUDR Electronic Health Record

    Czech Academy of Sciences Publication Activity Database

    Hanzlíček, Petr; Špidlen, Josef; Heroutová, Helena; Nagy, Miroslav

    2005-01-01

    Roč. 74, - (2005), s. 221-227 ISSN 1386-5056 R&D Projects: GA MŠk LN00B107 Institutional research plan: CEZ:AV0Z10300504 Keywords : electronic health record * user interface * data entry * knowledge base Subject RIV: BB - Applied Statistics, Operational Research Impact factor: 1.374, year: 2005

  10. Electron acceleration and radiation signatures in loop coronal transients

    International Nuclear Information System (INIS)

    Vlahos, L.; Gergely, T.E.; Papadopoulos, K.

    1982-01-01

    A model for electron aceleration in loop coronal transients is suggested. We propose that in these transients an erupting loop moves away from the solar surface, with a velocity greater than the local Alfven speed, pushing against the overlying magnetic fields and driving a shock in the front of the moving part of the loop. We suggest that lower hybrid waves are excited at the shock front and propagate radially toward the center of the loop with phase velocity along the magnetic field which exceeds the thermal velocity. The lower hybrid waves stochastically accelerate the tail of the electron distribution inside the loop. We discuss how the accelerated electrons are trapped in the moving loop and give a rough estimate of their radiation signature. We find that plasma radiation can explain the power observed in stationary and moving type IV bursts. We discuss some of the conditions under which moving or stationary type IV bursts are expected to be associated with loop coronal transients

  11. Integrating Iris and Signature Traits for Personal Authentication Using User-SpecificWeighting

    Directory of Open Access Journals (Sweden)

    Serestina Viriri

    2012-03-01

    Full Text Available Biometric systems based on uni-modal traits are characterized by noisy sensor data, restricted degrees of freedom, non-universality and are susceptible to spoof attacks. Multi-modal biometric systems seek to alleviate some of these drawbacks by providing multiple evidences of the same identity. In this paper, a user-score-based weighting technique for integrating the iris and signature traits is presented. This user-specific weighting technique has proved to be an efficient and effective fusion scheme which increases the authentication accuracy rate of multi-modal biometric systems. The weights are used to indicate the importance of matching scores output by each biometrics trait. The experimental results show that our biometric system based on the integration of iris and signature traits achieve a false rejection rate (FRR of 0.08% and a false acceptance rate (FAR of 0.01%.

  12. Electronic Library of Embrapa Cerrados: user study

    Directory of Open Access Journals (Sweden)

    Maria Elisabeth Salviati

    2015-09-01

    Full Text Available Introduction: This paper presents the results of research conducted with Electronic Library users – website, created in 2004 by Embrapa Cerrados, that organizes, stores, and provides full text of the technical scientific production published by the Institution. Objective: To explore the user profile and to make an accurate assessment of the website. Methodology: Data collection of demographic aspects; habits; and search features: navigation, loading time of pages, help, layout and terminology by an online survey. Analysis by SPSS software - Statistical Package for the Social Sciences. Results: The main users are students and agronomists, young people up to 30 years old, coming from the Federal District, belonging to universities and high schools wishing to update knowledge. After, appear the users of public agencies; private companies; Embrapa; agribusiness; federal government; schools; associations and non-governmental organizations; rural extension; cooperatives and syndicates. These users have no difficulties to use the service. Conclusions: The service works well, but some suggestions are useful to improve it. In addition, little demand coming from farms, ranches, rural extension services, cooperatives and syndicates indicates the need to design new products and services oriented to such public.

  13. Awareness and use of electronic databases by public library users ...

    African Journals Online (AJOL)

    The study investigated awareness, access and use of electronic database by public library users in Ibadan Oyo State in Nigeria. The purpose of this study was to determine awareness of public library users' electronic databases, find out what these users used electronic databases to do and to identify problems associated ...

  14. Electronic cigarettes: a survey of users

    Directory of Open Access Journals (Sweden)

    Etter Jean-François

    2010-05-01

    Full Text Available Abstract Background Little is known about users of electronic cigarettes, or their opinions, satisfaction or how and why they use such products. Methods An internet survey of 81 ever-users of ecigarettes in 2009. Participants answered open-ended questions on use of, and opinions about, ecigarettes. Results Respondents (73 current and 8 former users lived in France, Canada, Belgium or Switzerland. Most respondents (77% were men; 63% were former smokers and 37% were current smokers. They had used e-cigarettes for 100 days (median and drew 175 puffs per day (median. Participants used the ecigarette either to quit smoking (53 comments, to reduce their cigarette consumption (14 comments, in order not to disturb other people with smoke (20 comments, or in smoke-free places (21 comments. Positive effects reported with ecigarettes included their usefulness to quit smoking, and the benefits of abstinence from smoking (less coughing, improved breathing, better physical fitness. Respondents also enjoyed the flavour of ecigarettes and the sensation of inhalation. Side effects included dryness of the mouth and throat. Respondents complained about the frequent technical failures of ecigarettes and had some concerns about the possible toxicity of the devices and about their future legal status. Conclusions Ecigarettes were used mainly to quit smoking, and may be helpful for this purpose, but several respondents were concerned about potential toxicity. There are very few published studies on ecigarettes and research is urgently required, particularly on the efficacy and toxicity of these devices.

  15. Electronic referrals: what matters to the users.

    Science.gov (United States)

    Warren, Jim; Gu, Yulong; Day, Karen; White, Sue; Pollock, Malcolm

    2012-01-01

    Between September 2010 and May 2011 we evaluated three implementations of electronic referral (eReferral) systems at Hutt Valley, Northland and Canterbury District Health Boards in New Zealand. Qualitative and quantitative data were gathered through project documentation, database records and stakeholder interviews. This paper reports on the user perspectives based on interviews with 78 clinical, management and operational stakeholders in the three regions. Themes that emerge across the regions are compared and synthesised. Interviews focused on pre-planned domains including quality of referral, ease of use and patient safety, but agendas were adapted progressively to elaborate and triangulate on themes emerging from earlier interviews and to clarify indications from analysis of database records. The eReferral users, including general practitioners, specialists and administrative staff, report benefits in the areas of: (1) availability and transparency of referral-related data; (2) work transformation; (3) improved data quality and (4) the convenience of auto-population from the practice management system into the referral forms. eReferral provides enhanced visibility of referral data and status within the limits of the implementation (which only goes to the hospital door in some cases). Users in all projects indicated the desire to further exploit IT to enhance two-way communication between community and hospital. Reduced administrative handling is a clear work transformation benefit with mixed feedback regarding clinical workload impact. Innovations such as GP eReferral triaging teams illustrate the further potential for workflow transformation. Consistent structure in eReferrals, as well as simple legibility, enhances data quality. Efficiency and completeness is provided by auto-population of forms from system data, but opens issues around data accuracy. All three projects highlight the importance of user involvement in design, implementation and refinement. In

  16. 17 CFR 230.160 - Registered investment company exemption from Section 101(c)(1) of the Electronic Signatures in...

    Science.gov (United States)

    2010-04-01

    ... exemption from Section 101(c)(1) of the Electronic Signatures in Global and National Commerce Act. 230.160...(c)(1) of the Electronic Signatures in Global and National Commerce Act. A prospectus for an... 101(c)(1) of the Electronic Signatures in Global and National Commerce Act. [65 FR 47284, Aug. 2, 2000] ...

  17. 41 CFR 301-71.3 - May we use electronic signatures on travel documents?

    Science.gov (United States)

    2010-07-01

    ... signatures on travel documents? 301-71.3 Section 301-71.3 Public Contracts and Property Management Federal Travel Regulation System TEMPORARY DUTY (TDY) TRAVEL ALLOWANCES AGENCY RESPONSIBILITIES 71-AGENCY TRAVEL ACCOUNTABILITY REQUIREMENTS General § 301-71.3 May we use electronic signatures on travel documents? Yes, if you...

  18. ''Electron Conic'' Signatures observed in the nightside auroral zone and over the polar cap

    International Nuclear Information System (INIS)

    Menietti, J.D.; Burch, J.L.

    1985-01-01

    A preliminary search of the Dynamics Explorer 1 high-altitude plasma instrument data base has yielded examples of ''electron conic'' signatures. The three example passes show an association with regions of downward electron acceleration and upward ion beams, but this is not true of all the electron conic events. The electron conic signatures are clearly discernible on energy-flux-versus-time color spectrograms as pairs of discrete vertical bands which are symmetric about a pitch angle of approximately 180 0 . One of the examples is a polar cap pass with electron conic signatures observed at invariant latitudes from 84 0 to 75 0 . The other two cases are nightside auroral zone passes in which the regions of detectable electron conics are spatially more confined, covering only about 1 0 in invariant latitude. The conic signatures have been found at energies that range from 50 eV 0 is larger than expected for a loss cone feature. If the electrons conserve the first adiabatic invariant in a dipole magnetic field, and in some cases a parallel electric field, the mirroring altitude varies between about 500 km and 8000 km, which is above the atmospheric loss region. For this reason, and in analogy with the formation of ion conics, we suggest that the conic signatures are produced by heating of the electrons perpendicular to the magnetic field

  19. Users satisfaction with electronic information resources and services ...

    African Journals Online (AJOL)

    This study investigated users satisfaction on the use of electronic information resources and services in MTN Net libraries in ABU & UNIBEN. Two objectives and one null hypotheses were formulated and tested with respect to the users' satisfaction on electronic information resources and services in MTN Net libraries in ...

  20. The Changing Information Needs of Users in Electronic Information Environments.

    Science.gov (United States)

    Kebede, Gashaw

    2002-01-01

    Focuses on the information needs of users that are changing as a results of changes in the availability of information content in electronic form. Highlights the trend and nature of the physical form in which information content is currently being made available for users' access and use in electronic information environments. (Author/LRW)

  1. Users' Personal Conceptions of Usability and User Experience of Electronic and Software Products

    NARCIS (Netherlands)

    Haaksma, Tim R.; de Jong, Menno D.T.; Karreman, Joyce

    2018-01-01

    Research problem: Despite the abundance of research into usability and user experience (UX), there is still debate about the relationship between both concepts. The user perspective is underrepresented in all discussions. This study examines the personal conceptions that users of electronic and

  2. E-learning platform for automated testing of electronic circuits using signature analysis method

    Science.gov (United States)

    Gherghina, Cǎtǎlina; Bacivarov, Angelica; Bacivarov, Ioan C.; Petricǎ, Gabriel

    2016-12-01

    Dependability of electronic circuits can be ensured only through testing of circuit modules. This is done by generating test vectors and their application to the circuit. Testability should be viewed as a concerted effort to ensure maximum efficiency throughout the product life cycle, from conception and design stage, through production to repairs during products operating. In this paper, is presented the platform developed by authors for training for testability in electronics, in general and in using signature analysis method, in particular. The platform allows highlighting the two approaches in the field namely analog and digital signature of circuits. As a part of this e-learning platform, it has been developed a database for signatures of different electronic components meant to put into the spotlight different techniques implying fault detection, and from this there were also self-repairing techniques of the systems with this kind of components. An approach for realizing self-testing circuits based on MATLAB environment and using signature analysis method is proposed. This paper analyses the benefits of signature analysis method and simulates signature analyzer performance based on the use of pseudo-random sequences, too.

  3. Signatures of quantum radiation reaction in laser-electron-beam collisions

    International Nuclear Information System (INIS)

    Wang, H. Y.; Yan, X. Q.; Zepf, M.

    2015-01-01

    Electron dynamics in the collision of an electron beam with a high-intensity focused ultrashort laser pulse are investigated using three-dimensional QED particle-in-cell (PIC) simulations, and the results are compared with those calculated by classical Landau and Lifshitz PIC simulations. Significant differences are observed from the angular dependence of the electron energy distribution patterns for the two different approaches, because photon emission is no longer well approximated by a continuous process in the quantum radiation-dominated regime. The stochastic nature of photon emission results in strong signatures of quantum radiation-reaction effects under certain conditions. We show that the laser spot size and duration greatly influence these signatures due to the competition of QED effects and the ponderomotive force, which is well described in the classical approximation. The clearest signatures of quantum radiation reaction are found in the limit of large laser spots and few cycle pulse durations

  4. User Interface Program for secure electronic tags

    International Nuclear Information System (INIS)

    Cai, Y.; Koehl, E.R.; Carlson, R.D.; Raptis, A.C.

    1995-05-01

    This report summarizes and documents the efforts of Argonne National Laboratory (ANL) in developing a secure tag communication user interface program comprising a tag monitor and a communication tool. This program can perform the same functions as the software that was developed at the Lawrence Livermore National Laboratory (LLNL), but it is enhanced with a user-friendly screen. It represents the first step in updating the TRANSCOM Tracking System (TRANSCOM) by incorporating a tag communication screen menu into the main menu of the TRANSCOM user program. A working version of TRANSCOM, enhanced with ANL secure-tag graphics, will strongly support the Department of Energy Warhead Dismantlement/Special Nuclear Materials Control initiatives. It will allow commercial satellite tracking of the movements and operational activities of treaty-limited items and transportation vehicles throughout Europe and the former USSR, as well as the continental US

  5. Users' satisfaction with the use of electronic database in university ...

    African Journals Online (AJOL)

    Users' satisfaction with the use of electronic database in university libraries in north ... file of digitized information (bibliographic records, abstracts, full-text documents, ... managed with the aid of database management system (DBMS) software.

  6. Fiddling with the ECT act – Electronic signatures | Eiselen ...

    African Journals Online (AJOL)

    Potchefstroom Electronic Law Journal/Potchefstroomse Elektroniese Regsblad. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 17, No 6 (2014) >. Log in or Register to get access to full text downloads.

  7. Key-Insulated Undetachable Digital Signature Scheme and Solution for Secure Mobile Agents in Electronic Commerce

    Directory of Open Access Journals (Sweden)

    Yang Shi

    2016-01-01

    Full Text Available Considering the security of both the customers’ hosts and the eShops’ servers, we introduce the idea of a key-insulated undetachable digital signature, enabling mobile agents to generate undetachable digital signatures on remote hosts with the key-insulated property of the original signer’s signing key. From the theoretical perspective, we provide the formal definition and security notion of a key-insulated undetachable digital signature. From the practical perspective, we propose a concrete scheme to secure mobile agents in electronic commerce. The scheme is mainly focused on protecting the signing key from leakage and preventing the misuse of the signature algorithm on malicious servers. Agents do not carry the signing key when they generate digital signatures on behalf of the original signer, so the key is protected on remote servers. Furthermore, if a hacker gains the signing key of the original signer, the hacker is still unable to forge a signature for any time period other than the key being accessed. In addition, the encrypted function is combined with the original signer’s requirement to prevent the misuse of signing algorithm. The scheme is constructed on gap Diffie–Hellman groups with provable security, and the performance testing indicates that the scheme is efficient.

  8. Signature of electron-phonon interaction in high temperature superconductors

    Directory of Open Access Journals (Sweden)

    Vinod Ashokan

    2011-09-01

    Full Text Available The theory of thermal conductivity of high temperature superconductors (HTS based on electron and phonon line width (life times formulation is developed with Quantum dynamical approach of Green's function. The frequency line width is observed as an extremely sensitive quantity in the transport phenomena of HTS as a collection of large number of scattering processes. The role of resonance scattering and electron-phonon interaction processes is found to be most prominent near critical temperature. The theory successfully explains the spectacular behaviour of high Tc superconductors in the vicinity of transition temperature. A successful agreement between theory and experiment has been obtained by analyzing the thermal conductivity data for the sample La1.8Sr0.2CuO4 in the temperature range 0 − 200K. The theory is equally and successfully applicable to all other high Tc superconductors.

  9. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  10. User interface design of electronic appliances

    CERN Document Server

    Baumann, Konrad

    2002-01-01

    Foreword by Brenda Laurel. Part One: Introduction 1. Background, Bruce Thomas 2. Introduction, Konrad Baumann 3. The Interaction Design Process, Georg Rakers Part Two: User Interface Design 4. Creativity Techniques, Irene Mavrommati 5. Design Principals, Irene Mavrommati and Adrian Martel 6. Design of On-Screen Interfaces, Irene Mavrommati Part Three: Input Devices 7. Controls, Konrad Baumann 8. Keyboards, Konrad Baumann 9. Advanced Interaction Techniques, Christopher Baber and Konrad Baumann 10. Speech Control, Christopher Baber and Jan Noyes 11. Wearable Computers, Christopher Baber Part Fou

  11. Modelling User Preferences and Mediating Agents in Electronic Commerce

    NARCIS (Netherlands)

    Dastani, M.M.; Jacobs, N.; Jonker, C.M.; Treur, J.

    2005-01-01

    An important ingredient in agent-mediated electronic commerce is the presence of intelligent mediating agents that assist electronic commerce participants (e.g. individual users, other agents, organisations). These mediating agents are in principle autonomous agents that interact with their

  12. Modeling User Preferences and Mediating Agents in Electronic Commerce

    NARCIS (Netherlands)

    Dastani, M.M.; Jacobs, N.; Jonker, C.M.; Treur, J.; Dignum, F.; Sierra, C.

    2001-01-01

    An important ingredient in agent-mediated Electronic Commerce is the presence of intelligent mediating agents that assist Electronic Commerce participants (e.g., individual users, other agents, organisations). These mediating agents are in principle autonomous agents that will interact with their

  13. [Prevalence and user profile of electronic cigarettes in Spain (2014)].

    Science.gov (United States)

    Lidón-Moyano, Cristina; Martínez-Sánchez, Jose M; Fu, Marcela; Ballbè, Montse; Martín-Sánchez, Juan Carlos; Fernández, Esteve

    To describe the prevalence and user profile of electronic cigarettes among Spanish adults and evaluate the potential dual use of these devices with combustible or conventional tobacco in 2014 in Spain. Cross-sectional study of a representative sample of the Spanish adult (16-75 years old) population (n=1,016). A computer-assisted telephone survey was conducted in 2014. The prevalence and 95% confidence intervals (95% CI) for the use of electronic cigarettes stratified by gender, age, tobacco consumption and social status were calculated. The sample was weighted and a logistic regression model adjusted to obtain the crude odds ratios (OR) adjusted by gender, age and social status. 10.3% (95% CI: 8.6-12.4) of the Spanish adult population stated being ever users of electronic cigarettes (2% current users, 3.2% past users and 5.1% experimental users). Among current electronic cigarette users, 57.2% also smoked combustible or conventional tobacco, 28% had never smoked and 14.8% were former smokers. The prevalence of electronic cigarette use was higher in the younger population (adjusted OR=23.8; 95% CI: 2.5-227.7) and smokers of combustible tobacco (adjusted OR=10.1; 95% CI: 5.8-17.5). The use of electronic cigarettes in Spain is scarce and is most prevalent among young people and tobacco smokers. Nevertheless, one out of four current electronic cigarette users have never smoked. Hence, the regulation of these devices should be reinforced to avoid a possible gateway to nicotine products among never smokers. Copyright © 2016 SESPAS. Publicado por Elsevier España, S.L.U. All rights reserved.

  14. The utilisation experience of the enhanced electronic signature when managing orders

    Directory of Open Access Journals (Sweden)

    Pavel A. Muzychkin

    2017-01-01

    Full Text Available Major universities with a number of branches, located throughout the country, have joined Plekhanov Russian University of Economics and there was a problem of operational coordination of managerial decision-making, coordination of command and control of their implementation. The problem needed to be solved very quickly as many orders have to be issued in a short period. It was necessary to develop and introduce the electronic document flow system to provide coordination of the projects’ orders on the number of students at the university branches on higher education programmes, postgraduate and vocational secondary education, and ensuring legal validity of the electronic documents.Cryptography techniques, encryption standard (National State Standard, Russian Federation legislation, university’s corporate network, electronic document flow system “DELO”, enhanced electronic signature services such as Crypto Pro CSP, CARMA and EDSIGN.Electronic approval technology between the head University and its branches with the use of the enhanced unqualified electronic signature was suggested. Two ways of exchanging documents were developed and implemented in order to make the scheme work:1 Sending documents via the corporate e-mail, using National State Standard encryption.2 Document exchange via “DELO”, electronic document flow system. The first stage has provided the document exchange, using the enciphered information with the enhanced electronic signature. At the same time, the problem of creating secure data channels between the remote university branches was solved. During the second stage, when the branches were introduced into the university’s corporate network through the secure data channels, they also gained access to the “DELO”, electronic document flow system. From the end of December 2014 up to November 2016, around 3000 orders, concerning the students were entered into the system.This method was applied not only at the

  15. Urinary cotinine levels of electronic cigarette (e-cigarette) users.

    Science.gov (United States)

    Göney, Gülşen; Çok, İsmet; Tamer, Uğur; Burgaz, Sema; Şengezer, Tijen

    2016-07-01

    The popularity of electronic cigarettes (e-cigarettes) is rapidly increasing in many countries. These devices are designed to imitate regular cigarettes, delivering nicotine via inhalation without combusting tobacco but currently, there is a lack of scientific evidence on the presence or absence of nicotine exposure. Such research relies on evidence from e-cigarette users urine samples. In this study, we aimed to determine the levels and compare the amount of nicotine to which e-cigarette users, cigarette smokers and passive smokers are exposed. Therefore, urine samples were collected from e-cigarette users, cigarette smokers, passive smokers, and healthy nonsmokers. The urinary cotinine levels of the subjects were determined using gas chromatography-mass spectrometry. The mean (±SD) urinary cotinine levels were determined as 1755 ± 1848 ng/g creatinine for 32 e-cigarette users, 1720 ± 1335 ng/g creatinine for 33 cigarette smokers and 81.42 ± 97.90 ng/g creatinine for 33 passive smokers. A significant difference has been found between cotinine levels of e-cigarette users and passive smokers (p e-cigarette users and cigarette smokers (p > 0.05). This is a seminal study to demonstrate the e-cigarette users are exposed to nicotine as much as cigarette smokers.

  16. Electron Scale Structures and Magnetic Reconnection Signatures in the Turbulent Magnetosheath

    Science.gov (United States)

    Yordanova, E.; Voros, Z.; Varsani, A.; Graham, D. B.; Norgren, C.; Khotyaintsev, Yu. V.; Vaivads, A.; Eriksson, E.; Nakamura, R.; Lindqvist, P.-A.; hide

    2016-01-01

    Collisionless space plasma turbulence can generate reconnecting thin current sheets as suggested by recent results of numerical magnetohydrodynamic simulations. The Magnetospheric Multiscale (MMS) mission provides the first serious opportunity to verify whether small ion-electron-scale reconnection, generated by turbulence, resembles the reconnection events frequently observed in the magnetotail or at the magnetopause. Here we investigate field and particle observations obtained by the MMS fleet in the turbulent terrestrial magnetosheath behind quasi-parallel bow shock geometry. We observe multiple small-scale current sheets during the event and present a detailed look of one of the detected structures. The emergence of thin current sheets can lead to electron scale structures. Within these structures, we see signatures of ion demagnetization, electron jets, electron heating, and agyrotropy suggesting that MMS spacecraft observe reconnection at these scales.

  17. Atmospheric Signatures and Effects of Space-based Relativistic Electron Beam Injection

    Science.gov (United States)

    Marshall, R. A.; Sanchez, E. R.; Kero, A.; Turunen, E. S.; Marsh, D. R.

    2017-12-01

    Future relativistic electron beam injection experiments have the potential to provide groundbreaking insights into the physics of wave-particle interactions and beam-neutral interactions, relevant to space physics and to fundamental plasma physics. However, these experiments are only useful if their signatures can be detected. In this work, we use a physics-based forward modeling framework to investigate the observable signatures of a relativistic beam interacting with the upper atmosphere. The modeling framework is based around the Electron Precipitation Monte Carlo (EPMC) model, used to simulate electron precipitation in the upper atmosphere. That model is coupled to physics-based models of i) optical emission production; ii) bremsstrahlung photon production and propagation; iii) D-region ion chemistry; and iv) VLF wave propagation in the Earth-ionosphere waveguide. Using these modeling tools, we predict the optical, X-ray, chemical, radar, and VLF signatures of a realistic beam injection, based on recent space-based accelerator designs. In particular, we inject a beam pulse of 10 mA for a duration of 500 μs at an energy of 1 MeV, providing a total pulse energy of 5 J. We further investigate variations in these parameters, in particular the total energy and the electron energy. Our modeling shows that for this 5 J pulse injection at 1 MeV electron energy, the optical signal is easily detectable from the ground in common emission bands, but the X-ray signal is likely too weak to be seen from either balloons or LEO orbiting spacecraft. We further predict the optical signal-to-noise ratio that would be expected in different optical systems. Chemical signatures such as changes to NOx and HOx concentrations are too short-lived to be detectable; however our modeling provides a valuable estimate of the total chemical response. Electron density perturbations should be easily measurable from ground-based high-power radars and via VLF subionospheric remote sensing

  18. PEDRO (Petroleum Electronic Data Reporting Option) user guide

    Energy Technology Data Exchange (ETDEWEB)

    1990-11-01

    PEDRO is an electronic data communications product that simplifies filing and transmission of petroleum survey data. Your burden is significantly reduced as PEDRO eliminates paperwork, provides immediate onsite correction of data errors, and reduces the need for followup calls and survey resubmission. PEDRO provides an online error-checking process that highlights discrepancies. This permits you to enter and check data before transmitting to EIA. EIA then combines and reformats the data from different users for use by analytical and reporting programs. PEDRO is available at no cost to the user. Formal training is not required since installation, data processing, and transmission are done by interactive, user-friendly menu options. The PEDRO system is divided into three functions: (1) data processing, (2) transmitting data to EIA, and (3) EIA processing. 28 figs.

  19. 75 FR 64749 - Request for Comments on the Use of Electronic Signatures for NRC Documents Related to the Medical...

    Science.gov (United States)

    2010-10-20

    ... Pike, Rockville, Maryland. NRC's Agencywide Documents Access and Management System (ADAMS): Publicly... systems exclusively. NRC is seeking comments on acceptable forms of electronic signatures for documents... system that generates the electronic document must have functions that provide a legible document for the...

  20. Electronic cigarette: users profile, utilization, satisfaction and perceived efficacy.

    Science.gov (United States)

    Etter, Jean-François; Bullen, Chris

    2011-11-01

    To assess the profile, utilization patterns, satisfaction and perceived effects among users of electronic cigarettes ('e-cigarettes'). Internet survey in English and French in 2010. Online questionnaire. Visitors of websites and online discussion forums dedicated to e-cigarettes and to smoking cessation. There were 3587 participants (70% former tobacco smokers, 61% men, mean age 41 years). The median duration of electronic cigarette use was 3 months, users drew 120 puffs/day and used five refills/day. Almost all (97%) used e-cigarettes containing nicotine. Daily users spent $33 per month on these products. Most (96%) said the e-cigarette helped them to quit smoking or reduce their smoking (92%). Reasons for using the e-cigarette included the perception that it was less toxic than tobacco (84%), to deal with craving for tobacco (79%) and withdrawal symptoms (67%), to quit smoking or avoid relapsing (77%), because it was cheaper than smoking (57%) and to deal with situations where smoking was prohibited (39%). Most ex-smokers (79%) feared they might relapse to smoking if they stopped using the e-cigarette. Users of nicotine-containing e-cigarettes reported better relief of withdrawal and a greater effect on smoking cessation than those using non-nicotine e-cigarettes. E-cigarettes were used much as people would use nicotine replacement medications: by former smokers to avoid relapse or as an aid to cut down or quit smoking. Further research should evaluate the safety and efficacy of e-cigarettes for administration of nicotine and other substances, and for quitting and relapse prevention. © 2011 The Authors, Addiction © 2011 Society for the Study of Addiction.

  1. Azimuthal asymmetry of recoil electrons in neutrino-electron elastic scattering as signature of neutrino nature

    Energy Technology Data Exchange (ETDEWEB)

    Sobkow, W.; Blaut, A. [University of Wroclaw, Institute of Theoretical Physics, Wroclaw (Poland)

    2016-05-15

    In this paper, we analyze the theoretically possible scenario beyond the standard model in order to show how the presence of the exotic scalar, tensor, V + A weak interactions in addition to the standard vector-axial (V - A) ones may help to distinguish the Dirac from Majorana neutrinos in the elastic scattering of an (anti)neutrino beam off the unpolarized electrons in the relativistic limit. We assume that the incoming (anti)neutrino beam comes from the polarized muon decay at rest and is the left-right chiral superposition with assigned direction of the transversal spin polarization with respect to the production plane. Our analysis is carried out for the flavour (current) neutrino eigenstates. It means that the transverse neutrino polarization estimates are the same both for the Dirac and Majorana cases. We display that the azimuthal asymmetry in the angular distribution of recoil electrons is generated by the interference terms between the standard and exotic couplings, which are proportional to the transversal (anti)neutrino spin polarization and independent of the neutrino mass. This asymmetry for the Majorana neutrinos is larger than for the Dirac ones. We also indicate the possibility of utilizing the azimuthal asymmetry measurements to search for the new CP-violating phases. Our study is based on the assumption that the possible detector (running for 1 year) has the shape of a flat circular ring, while the intense neutrino source is located in the centre of the ring and polarized perpendicularly to the ring. In addition, the large low-threshold, real-time detector is able to measure with a high resolution both the polar angle and the azimuthal angle of outgoing electron momentum. Our analysis is model-independent and consistent with the current upper limits on the non-standard couplings. (orig.)

  2. Electronic health record "super-users" and "under-users" in ambulatory care practices.

    Science.gov (United States)

    Rumball-Smith, Juliet; Shekelle, Paul; Damberg, Cheryl L

    2018-01-01

    This study explored variation in the extent of use of electronic health record (EHR)-based health information technology (IT) functionalities across US ambulatory care practices. Use of health IT functionalities in ambulatory care is important for delivering high-quality care, including that provided in coordination with multiple practitioners. We used data from the 2014 Healthcare Information and Management Systems Society Analytics survey. The responses of 30,123 ambulatory practices with an operational EHR were analyzed to examine the extent of use of EHR-based health IT functionalities for each practice. We created a novel framework for classifying ambulatory care practices employing 7 domains of health IT functionality. Drawing from the survey responses, we created a composite "use" variable indicating the extent of health IT functionality use across these domains. "Super-user" practices were defined as having near-full employment of the 7 domains of health IT functionalities and "under-users" as those with minimal or no use of health IT functionalities. We used multivariable logistic regression to investigate how the odds of super-use and under-use varied by practice size, type, urban or rural location, and geographic region. Seventy-three percent of practices were not using EHR technologies to their full capability, and nearly 40% were classified as under-users. Under-user practices were more likely to be of smaller size, situated in the West, and located outside a metropolitan area. To achieve the broader benefits of the EHR and health IT, health systems and policy makers need to identify and address barriers to full use of health IT functionalities.

  3. User issues at the Stanford picosecond free electron laser center

    International Nuclear Information System (INIS)

    Smith, T.I.

    1995-01-01

    Assembling a productive user facility around a Free Electron Laser (FEL) is a complex task. Reliable operation of the FEL is a necessary, but by no means sufficient, condition to ensure that the center will be able to attract and keep the interest of first rate researchers. Some other issues which are important include: center wavelength stability and ease of tuning, bandwidth control, amplitude and position stability, ability to select arbitrary sequences of micropulses, and real time availability of information of the FEL's important parameters (spectral width, center wavelength, micropulse length and energy, etc.). In addition, at the Stanford Center we have found that providing additional systems (conventional picosecond lasers synchronized to the FEL, an FTIR spectrometer, a confocal microscopy, ...) has been important. (author)

  4. Electronic alerts and clinician turnover: the influence of user acceptance.

    Science.gov (United States)

    Hysong, Sylvia J; Spitzmuller, Christiane; Espadas, Donna; Sittig, Dean F; Singh, Hardeep

    2014-11-01

    Use of certain components of electronic health records (EHRs), such as EHR-based alerting systems (EASs), might reduce provider satisfaction, a strong precursor to turnover. We examined the impact of factors likely to influence providers' acceptance of an alerting system, designed to facilitate electronic communication in outpatient settings, on provider satisfaction, intentions to quit, and turnover. We conducted a cross-sectional Web-based survey of EAS-related practices from a nationwide sample of primary care providers (PCPs) practicing at Department of Veterans Affairs (VA) medical facilities. Of 5001 invited VA PCPs, 2590 completed the survey. We relied on Venkatesh's Unified Theory of Acceptance and Use of Technology to create survey measures of 4 factors likely to impact user acceptance of EAS: supportive norms, monitoring/ feedback, training, and providers' perceptions of the value (PPOV) of EASs to provider effectiveness. Facility-level PCP turnover was measured via the VA's Service Support Center Human Resources Cube. Hypotheses were tested using structural equation modeling. After accounting for intercorrelations among predictors, monitoring/feedback regarding EASs significantly predicted intention to quit (b = 0.30, P < .01), and PPOV of EASs predicted both overall provider satisfaction (b = 0.58, P < .01) and facility-level provider turnover levels (b = -0.19, P < .05), all without relying on any intervening mechanisms. Design, implementation, and use of EASs might impact provider satisfaction and retention. Institutions should consider strategies to help providers perceive greater value in these clinical tools.

  5. Controlling user access to electronic resources without password

    Science.gov (United States)

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  6. Xyce parallel electronic simulator : users' guide.

    Energy Technology Data Exchange (ETDEWEB)

    Mei, Ting; Rankin, Eric Lamont; Thornquist, Heidi K.; Santarelli, Keith R.; Fixel, Deborah A.; Coffey, Todd Stirling; Russo, Thomas V.; Schiek, Richard Louis; Warrender, Christina E.; Keiter, Eric Richard; Pawlowski, Roger Patrick

    2011-05-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been designed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas: (1) Capability to solve extremely large circuit problems by supporting large-scale parallel computing platforms (up to thousands of processors). Note that this includes support for most popular parallel and serial computers; (2) Improved performance for all numerical kernels (e.g., time integrator, nonlinear and linear solvers) through state-of-the-art algorithms and novel techniques. (3) Device models which are specifically tailored to meet Sandia's needs, including some radiation-aware devices (for Sandia users only); and (4) Object-oriented code design and implementation using modern coding practices that ensure that the Xyce Parallel Electronic Simulator will be maintainable and extensible far into the future. Xyce is a parallel code in the most general sense of the phrase - a message passing parallel implementation - which allows it to run efficiently on the widest possible number of computing platforms. These include serial, shared-memory and distributed-memory parallel as well as heterogeneous platforms. Careful attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows. The development of Xyce provides a platform for computational research and development aimed specifically at the needs of the Laboratory. With Xyce, Sandia has an 'in-house' capability with which both new electrical (e.g., device model development) and algorithmic (e.g., faster time-integration methods, parallel solver algorithms) research and development can be performed. As a result, Xyce is

  7. Component-Level Electronic-Assembly Repair (CLEAR) Spacecraft Circuit Diagnostics by Analog and Complex Signature Analysis

    Science.gov (United States)

    Oeftering, Richard C.; Wade, Raymond P.; Izadnegahdar, Alain

    2011-01-01

    The Component-Level Electronic-Assembly Repair (CLEAR) project at the NASA Glenn Research Center is aimed at developing technologies that will enable space-flight crews to perform in situ component-level repair of electronics on Moon and Mars outposts, where there is no existing infrastructure for logistics spares. These technologies must provide effective repair capabilities yet meet the payload and operational constraints of space facilities. Effective repair depends on a diagnostic capability that is versatile but easy to use by crew members that have limited training in electronics. CLEAR studied two techniques that involve extensive precharacterization of "known good" circuits to produce graphical signatures that provide an easy-to-use comparison method to quickly identify faulty components. Analog Signature Analysis (ASA) allows relatively rapid diagnostics of complex electronics by technicians with limited experience. Because of frequency limits and the growing dependence on broadband technologies, ASA must be augmented with other capabilities. To meet this challenge while preserving ease of use, CLEAR proposed an alternative called Complex Signature Analysis (CSA). Tests of ASA and CSA were used to compare capabilities and to determine if the techniques provided an overlapping or complementary capability. The results showed that the methods are complementary.

  8. Controlling user access to electronic resources without password

    Science.gov (United States)

    Smith, Fred Hewitt

    2017-08-22

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.

  9. Lesson 6: Signature Validation

    Science.gov (United States)

    Checklist items 13 through 17 are grouped under the Signature Validation Process, and represent CROMERR requirements that the system must satisfy as part of ensuring that electronic signatures it receives are valid.

  10. Xyce Parallel Electronic Simulator Users Guide Version 6.2.

    Energy Technology Data Exchange (ETDEWEB)

    Keiter, Eric R.; Mei, Ting; Russo, Thomas V.; Schiek, Richard Louis; Sholander, Peter E.; Thornquist, Heidi K.; Verley, Jason C.; Baur, David Gregory

    2014-09-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been de- signed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas: Capability to solve extremely large circuit problems by supporting large-scale parallel com- puting platforms (up to thousands of processors). This includes support for most popular parallel and serial computers. A differential-algebraic-equation (DAE) formulation, which better isolates the device model package from solver algorithms. This allows one to develop new types of analysis without requiring the implementation of analysis-specific device models. Device models that are specifically tailored to meet Sandia's needs, including some radiation- aware devices (for Sandia users only). Object-oriented code design and implementation using modern coding practices. Xyce is a parallel code in the most general sense of the phrase -- a message passing parallel implementation -- which allows it to run efficiently a wide range of computing platforms. These include serial, shared-memory and distributed-memory parallel platforms. Attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows. Trademarks The information herein is subject to change without notice. Copyright c 2002-2014 Sandia Corporation. All rights reserved. Xyce TM Electronic Simulator and Xyce TM are trademarks of Sandia Corporation. Portions of the Xyce TM code are: Copyright c 2002, The Regents of the University of California. Produced at the Lawrence Livermore National Laboratory. Written by Alan Hindmarsh, Allan Taylor, Radu Serban. UCRL-CODE-2002-59 All rights reserved. Orcad, Orcad Capture, PSpice and Probe are

  11. Xyce Parallel Electronic Simulator Users Guide Version 6.4

    Energy Technology Data Exchange (ETDEWEB)

    Keiter, Eric R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mei, Ting [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Russo, Thomas V. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Schiek, Richard [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sholander, Peter E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Thornquist, Heidi K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Verley, Jason [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Baur, David Gregory [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-12-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been de- signed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas: Capability to solve extremely large circuit problems by supporting large-scale parallel com- puting platforms (up to thousands of processors). This includes support for most popular parallel and serial computers. A differential-algebraic-equation (DAE) formulation, which better isolates the device model package from solver algorithms. This allows one to develop new types of analysis without requiring the implementation of analysis-specific device models. Device models that are specifically tailored to meet Sandia's needs, including some radiation- aware devices (for Sandia users only). Object-oriented code design and implementation using modern coding practices. Xyce is a parallel code in the most general sense of the phrase -- a message passing parallel implementation -- which allows it to run efficiently a wide range of computing platforms. These include serial, shared-memory and distributed-memory parallel platforms. Attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows. Trademarks The information herein is subject to change without notice. Copyright c 2002-2015 Sandia Corporation. All rights reserved. Xyce TM Electronic Simulator and Xyce TM are trademarks of Sandia Corporation. Portions of the Xyce TM code are: Copyright c 2002, The Regents of the University of California. Produced at the Lawrence Livermore National Laboratory. Written by Alan Hindmarsh, Allan Taylor, Radu Serban. UCRL-CODE-2002-59 All rights reserved. Orcad, Orcad Capture, PSpice and Probe are

  12. Attribute-Based Digital Signature System

    NARCIS (Netherlands)

    Ibraimi, L.; Asim, Muhammad; Petkovic, M.

    2011-01-01

    An attribute-based digital signature system comprises a signature generation unit (1) for signing a message (m) by generating a signature (s) based on a user secret key (SK) associated with a set of user attributes, wherein the signature generation unit (1) is arranged for combining the user secret

  13. The informational system model of Ukrainian national transport workflow improvement based on electronic signature introduction management

    Directory of Open Access Journals (Sweden)

    Grigoriy NECHAEY

    2007-01-01

    Full Text Available Proposed model of informational system supposes improvement of newconceptual method on the work with e-signature in transport nformational systems. Problems and aims that may be solved with the help of this system and the most important economical and technical advantages of the proposed system in comparison with traditional methods of e-signing use are marked out.

  14. Real Traceable Signatures

    Science.gov (United States)

    Chow, Sherman S. M.

    Traceable signature scheme extends a group signature scheme with an enhanced anonymity management mechanism. The group manager can compute a tracing trapdoor which enables anyone to test if a signature is signed by a given misbehaving user, while the only way to do so for group signatures requires revealing the signer of all signatures. Nevertheless, it is not tracing in a strict sense. For all existing schemes, T tracing agents need to recollect all N' signatures ever produced and perform RN' “checks” for R revoked users. This involves a high volume of transfer and computations. Increasing T increases the degree of parallelism for tracing but also the probability of “missing” some signatures in case some of the agents are dishonest.

  15. Implementation of RSA 2048-bit and AES 256-bit with Digital Signature for Secure Electronic Health Record Application

    Directory of Open Access Journals (Sweden)

    Mohamad Ali Sadikin

    2016-10-01

    Full Text Available This research addresses the implementation of encryption and digital signature technique for electronic health record to prevent cybercrime such as robbery, modification and unauthorised access. In this research, RSA 2048-bit algorithm, AES 256-bit and SHA 256 will be implemented in Java programming language. Secure Electronic Health Record Information (SEHR application design is intended to combine given services, such as confidentiality, integrity, authentication, and nonrepudiation. Cryptography is used to ensure the file records and electronic documents for detailed information on the medical past, present and future forecasts that have been given only to the intended patients. The document will be encrypted using an encryption algorithm based on NIST Standard. In the application, there are two schemes, namely the protection and verification scheme. This research uses black-box testing and whitebox testing to test the software input, output, and code without testing the process and design that occurs in the system.We demonstrated the implementation of cryptography in SEHR. The implementation of encryption and digital signature in this research can prevent archive thievery.

  16. Electronic Publishing: Research Issues for Academic Librarians and Users.

    Science.gov (United States)

    Tenopir, Carol

    2003-01-01

    Addresses the need for further research into three important areas of electronic publishing: how the change to digital information sources is affecting the scholarly work of college and university students; when libraries select electronic journals, how products offered to them or the delivery models they choose influence scholarship and the way…

  17. ADVISOR Users Conference Proceedings 2000 - Final Electronic version

    Energy Technology Data Exchange (ETDEWEB)

    NREL

    2000-09-26

    This is a compilation of papers presented at the ADVISOR (ADvanced Vehicle SimulatOR) Users Conference held in Costa Mesa, California, August 24-25, 2000. Major topics of the conference included modeling and simulation; partnering with the auto industry; co-simulation: partnering with the software industry in optimization and thermal modeling and geometric and mechanical modeling; forward-looking simulations coupled with ADVISOR; new concepts from universities; validation, vehicle development and applications.

  18. Levels of saliva cotinine in electronic cigarette users.

    Science.gov (United States)

    Etter, Jean-François

    2014-05-01

    To assess saliva cotinine levels in experienced users of e-cigarettes ('vapers'). An internet survey in 2011 and 2012, with collection of saliva vials by mail. Participants were 71 users of e-cigarettes enrolled mainly on websites and online forums dedicated to e-cigarettes. Use of e-cigarettes, tobacco and nicotine medications. Collection of saliva by mail and analysis of cotinine by liquid chromatography-mass spectrometry. Most participants (89%) were former smokers, most (92%) were using e-cigarettes daily, had been using e-cigarettes for 12 months on average and puffed a median of 150 times per day on their e-cigarettes [mean = 220 puffs/day, 95% confidence interval (CI) = 169-271]. The median concentration of nicotine in refill liquids was 16 mg/ml (mean = 16.4, 95% CI = 14.5-18.3). In the 62 e-cigarette users who, in the past 5 days, had not used any tobacco or nicotine medications, the median cotinine level was 353 ng/ml (mean = 374, 95% CI = 318-429), the correlation between cotinine and nicotine concentration in e-liquids was r = 0.33 (P = 0.013), and the correlation between cotinine and the number of cigarettes smoked per day before quitting smoking was r = 0.48 (P Addiction.

  19. Analyzing the User Behavior toward Electronic Commerce Stimuli.

    Science.gov (United States)

    Lorenzo-Romero, Carlota; Alarcón-Del-Amo, María-Del-Carmen; Gómez-Borja, Miguel-Ángel

    2016-01-01

    Based on the Stimulus-Organism-Response paradigm this research analyzes the main differences between the effects of two types of web technologies: Verbal web technology (i.e., navigational structure as utilitarian stimulus) versus non-verbal web technology (music and presentation of products as hedonic stimuli). Specific webmosphere stimuli have not been examined yet as separate variables and their impact on internal and behavioral responses seems unknown. Therefore, the objective of this research consists in analyzing the impact of these web technologies -which constitute the web atmosphere or webmosphere of a website- on shopping human behavior (i.e., users' internal states -affective, cognitive, and satisfaction- and behavioral responses - approach responses, and real shopping outcomes-) within the retail online store created by computer, taking into account some mediator variables (i.e., involvement, atmospheric responsiveness, and perceived risk). A 2 ("free" versus "hierarchical" navigational structure) × 2 ("on" versus "off" music) × 2 ("moving" versus "static" images) between-subjects computer experimental design is used to test empirically this research. In addition, an integrated methodology was developed allowing the simulation, tracking and recording of virtual user behavior within an online shopping environment. As main conclusion, this study suggests that the positive responses of online consumers might increase when they are allowed to freely navigate the online stores and their experience is enriched by animate gifts and music background. The effect caused by mediator variables modifies relatively the final shopping human behavior.

  20. Impact of CALS on Electronic Publishing Systems and Users.

    Science.gov (United States)

    Beazley, William G.

    1990-01-01

    The U.S. Department of Defense has begun using its buying power to enforce standards on the vendors and contractors of automatic data processing hardware and software. An example of this, the Computer-Aided Acquisition and Logistic Support (CALS) program, is described, and how it will affect electronic publishing systems is discussed. (five…

  1. Copyright Issues for the Creators and Users of Information in the Electronic Environment.

    Science.gov (United States)

    Oakley, Robert L.

    1991-01-01

    Discusses issues that deal with the interface of copyright law and online systems. Areas of change needed to maintain the balance between users and creators of electronic information are identified, limits of the Copyright Act are explored, and it is suggested that existing copyright law can be applied to electronic information. (four references)…

  2. Signatures of collective electron dynamics in the angular distributions of electrons ejected during ultrashort laser pulse interactions with C+

    International Nuclear Information System (INIS)

    Lysaght, M A; Hutchinson, S; Van der Hart, H W

    2009-01-01

    We use the time-dependent R-matrix approach to investigate an ultrashort pump-probe scheme to observe collective electron dynamics in C + driven by the repulsion of two equivalent p electrons. By studying the two-dimensional momentum distributions of the ejected electron as a function of the time-delay between an ultrashort pump pulse and an ionizing ultrashort probe pulse it is possible to track the collective dynamics inside the C + ion in the time domain.

  3. Analyzing the user behavior towards Electronic Commerce stimuli

    Directory of Open Access Journals (Sweden)

    Carlota Lorenzo-Romero

    2016-11-01

    Full Text Available Based on the Stimulus-Organism-Response paradigm this research analyzes the main differences between the effects of two types of web technologies: Verbal web technology (i.e. navigational structure as utilitarian stimulus versus nonverbal web technology (music and presentation of products as hedonic stimuli. Specific webmosphere stimuli have not been examined yet as separate variables and their impact on internal and behavioral responses seems unknown. Therefore, the objective of this research consists in analyzing the impact of these web technologies –which constitute the web atmosphere or webmosphere of a website– on shopping human bebaviour (i.e. users’ internal states -affective, cognitive, and satisfaction- and behavioral responses - approach responses, and real shopping outcomes- within the retail online store created by computer, taking into account some mediator variables (i.e. involvement, atmospheric responsiveness, and perceived risk. A 2(free versus hierarchical navigational structure x2(on versus off music x2(moving versus static images between-subjects computer experimental design is used to test empirically this research. In addition, an integrated methodology was developed allowing the simulation, tracking and recording of virtual user behavior within an online shopping environment. As main conclusion, this study suggests that the positive responses of online consumers might increase when they are allowed to freely navigate the online stores and their experience is enriched by animate gifts and music background. The effect caused by mediator variables modifies relatively the final shopping human behavior.

  4. Plasma electron signature of magnetic connection to the earth's bow shock: ISEE 3

    International Nuclear Information System (INIS)

    Feldman, W.C.; Anderson, R.C.; Asbridge, J.R.; Bame, S.J.; Gosling, J.T.; Zwickl, R.D.

    1982-01-01

    Enhanced fluxes of low-energy electrons backstreaming from the earth's bow shock have been identified at ISEE 3. When present, these fluxes modify ambient solar wind electron velocity distributions f(v) in characteristic ways that depends on whether ISEE 3 is near the edge, or within the interior of the earth's electron foreshock. Near the edge, energy peaks in f(v) are observed. Such distributions should be locally unstable to electron plasma oscillations. Well within the interior of the foreshock, enhanced fluxes of electrons with energies up to the maximum detected by the Los Alamos electron analyzer (approx.1 keV) are observed over the full backward hemisphere. These electrons can be modelled with an asymptotic power law distribution having index in the range 4< or approx. =p/sub b/s< or approx. =6. At intermediate energies (approx.20--50 eV), twin angular peaks are observed centered on the magnetic field direction B. Also observed at these times are depressions in f(v) at energies less than approx.20 eV that are centered on B. Such distributions having a perpendicular temperature greater than their parallel temperature may be locally unstable to the generation of whistler waves. Analysis of a particularly clean example of connection to the bow shock is consistent with the possiblility that the observed electron fluxes emerge from the forward foot of the electron heating region within bow shock where the electron density and temperature are larger than that of the uperturbed upstream solar wind by a factor of approx.1.2. This analysis also indicates that the electrostatic potential within the forward foot of the shock is between approx.5 and 50 V more positive than that within plasma far upstream at ISEE 3. However, these interpretations depend on the assumption of nearly scatter-free propagation, which may not hold

  5. Analyzing the User Behavior toward Electronic Commerce Stimuli

    Science.gov (United States)

    Lorenzo-Romero, Carlota; Alarcón-del-Amo, María-del-Carmen; Gómez-Borja, Miguel-Ángel

    2016-01-01

    Based on the Stimulus-Organism-Response paradigm this research analyzes the main differences between the effects of two types of web technologies: Verbal web technology (i.e., navigational structure as utilitarian stimulus) versus non-verbal web technology (music and presentation of products as hedonic stimuli). Specific webmosphere stimuli have not been examined yet as separate variables and their impact on internal and behavioral responses seems unknown. Therefore, the objective of this research consists in analyzing the impact of these web technologies –which constitute the web atmosphere or webmosphere of a website– on shopping human behavior (i.e., users’ internal states -affective, cognitive, and satisfaction- and behavioral responses – approach responses, and real shopping outcomes-) within the retail online store created by computer, taking into account some mediator variables (i.e., involvement, atmospheric responsiveness, and perceived risk). A 2 (“free” versus “hierarchical” navigational structure) × 2 (“on” versus “off” music) × 2 (“moving” versus “static” images) between-subjects computer experimental design is used to test empirically this research. In addition, an integrated methodology was developed allowing the simulation, tracking and recording of virtual user behavior within an online shopping environment. As main conclusion, this study suggests that the positive responses of online consumers might increase when they are allowed to freely navigate the online stores and their experience is enriched by animate gifts and music background. The effect caused by mediator variables modifies relatively the final shopping human behavior. PMID:27965549

  6. Search for Excited or Exotic Electron Production Using the Dielectron + Photon Signature at CDF in Run II

    Energy Technology Data Exchange (ETDEWEB)

    Gerberich, Heather Kay [Duke Univ., Durham, NC (United States)

    2004-01-01

    The author presents a search for excited or exotic electrons decaying to an electron and a photon with high transverse momentum. An oppositely charged electron is produced in association with the excited electron, yielding a final state dielectron + photon signature. The discovery of excited electrons would be a first indication of lepton compositeness. They use ~ 202 pb-1 of data collected in p$\\bar{p}$ collisions at √s = 1.96 TeV with the Collider Detector at Fermilab during March 2001 through September 2003. The data are consistent with standard model expectations. Upper limits are set on the experimental cross-section σ($\\bar{p}$p → ee* → eeγ) at the 95% confidence level in a contact-interaction model and a gauge-mediated interaction model. Limits are also presented as exclusion regions in the parameter space of the excited electron mass (Me*) and the compositeness energy scale (Λ). In the contact-interaction model, for which there are no previously published limits, they find Me* < 906 GeV is excluded for Me* = Λ. In the gauge-mediated model, the exclusion region in the Me* versus the phenomenological coupling f/Λ parameter space is extended to M{sub e*} < 430 GeV for f/Λ ~ 10-2 GeV-1. In comparison, other experiments have excluded Me* < 280 GeV for f/Λ ~ 10-2 GeV-1.

  7. Searching for Dark Matter Signatures in the GLAST LAT Electron Flux

    Science.gov (United States)

    Moiseev, Alexander; Profumo, Stefano

    2008-01-01

    We explored several viable scenarios of how LAT might observe DM, when the spectral feature is predicted to be observed in the HE electron flux It has been demonstrated elsewhere that LAT will be capable to detect HE electrons flux in energy range from 20 GeV to - 1 TeV with 520% energy resolution and good statistics If there is a DM-caused feature in the HE electron flux (in the range 20 GeV - 1 TeV), LAT will be the best current instrument to observe it!

  8. Characterizing use patterns and perceptions of relative harm in dual users of electronic and tobacco cigarettes

    OpenAIRE

    Rass, Olga; Pacek, Lauren R.; Johnson, Patrick S.; Johnson, Matthew W.

    2015-01-01

    Awareness and use of electronic cigarettes (e-cigarettes) is increasing. Questions regarding positive (e.g., smoking reduction/cessation) and negative (e.g., delay of cessation) potential public health consequences of e-cigarettes may be informed by studying dual users of e-cigarettes and tobacco cigarettes. A cross-sectional online survey assessed demographics, product use patterns, and beliefs about relative product benefits and harms among dual users (n = 350) in the United States using th...

  9. A Prototype User Interface for a Mobile Electronic Clinical Note Data Entry System

    OpenAIRE

    Zafar, Atif; Lehto, Mark; Kim, Jongseo

    2005-01-01

    Recent advances in mobile computing technologies have made electronic medical records (EMRs) on handheld devices an attractive possibility. However, data entry paradigms popular on desktop machines do not translate well to mobile devices1,2. Based on a review of the literature on mobile device usability1–4, we built a prototype user interface for mobile EMRs and held focus groups with clinician users whose feedback provided useful insight about design choices, functionality and...

  10. The Electronic Structure Signature of the Spin Cross-Over Transition of [Co(dpzca)2

    Science.gov (United States)

    Zhang, Xin; Mu, Sai; Liu, Yang; Luo, Jian; Zhang, Jian; N'Diaye, Alpha T.; Enders, Axel; Dowben, Peter A.

    2018-05-01

    The unoccupied electronic structure of the spin crossover molecule cobalt (II) N-(2-pyrazylcarbonyl)-2-pyrazinecarboxamide, [Co(dpzca)2] was investigated, using X-ray absorption spectroscopy (XAS) and compared with magnetometry (SQUID) measurements. The temperature dependence of the XAS and molecular magnetic susceptibility χmT are in general agreement for [Co(dpzca)2], and consistent with density functional theory (DFT). This agreement of magnetic susceptibility and X-ray absorption spectroscopy provides strong evidence that the changes in magnetic moment can be ascribed to changes in electronic structure. Calculations show the choice of Coulomb correlation energy U has a profound effect on the electronic structure of the low spin state, but has little influence on the electronic structure of the high spin state. In the temperature dependence of the XAS, there is also evidence of an X-ray induced excited state trapping for [Co(dpzca)2] at 15 K.

  11. Factors Influencing Electronic Government Adoption Perspectives Of Less Frequent Internet Users Of Pakistan

    Directory of Open Access Journals (Sweden)

    Farooq Alam Khan

    2015-01-01

    Full Text Available Abstract Much literature on electronic government services research could be found on adoptability issues from government and service providers point of view. Many studies have looked into adoptability factors from user perspectives and majority captured adoptability perspectives of frequent Internet users the ones who use Internet applications for more than 10 hours a week. On the contrary the perspectives of majority of Pakistani users which use Internet applications for less than 10 hours per week are never inquired. This paper tries to fill this gap by looking into electronic government adoptability perspectives and expectations of such Internet users of Pakistan which are much greater in numbers than others. An amended UTAUT model with all its moderators is used in this study and the results demonstrate that performance level ease of effort and social influence strongly effect behavioral intention of users in using electronic government services in Pakistan. The individuals behavioral intention along with presence of appropriate facilitating conditions triggers use behavior of users. The results show that only gender moderates majority of UTAUT relationships and accordingly a modified UTAUT model is presented. The paper provides certain insights for people making policies and academicians for performing further research while it stresses for service proliferation with special attention towards female population.

  12. User-Centered Design, Experience, and Usability of an Electronic Consent User Interface to Facilitate Informed Decision-Making in an HIV Clinic.

    Science.gov (United States)

    Ramos, S Raquel

    2017-11-01

    Health information exchange is the electronic accessibility and transferability of patient medical records across various healthcare settings and providers. In some states, patients have to formally give consent to allow their medical records to be electronically shared. The purpose of this study was to apply a novel user-centered, multistep, multiframework approach to design and test an electronic consent user interface, so patients with HIV can make more informed decisions about electronically sharing their health information. This study consisted of two steps. Step 1 was a cross-sectional, descriptive, qualitative study that used user-centric design interviews to create the user interface. This informed Step 2. Step 2 consisted of a one group posttest to examine perceptions of usefulness, ease of use, preference, and comprehension of a health information exchange electronic consent user interface. More than half of the study population had college experience, but challenges remained with overall comprehension regarding consent. The user interface was not independently successful, suggesting that in addition to an electronic consent user interface, human interaction may also be necessary to address the complexities associated with consenting to electronically share health information. Comprehension is key factor in the ability to make informed decisions.

  13. Calibrating MMS Electron Drift Instrument (EDI) Ambient Electron Flux Measurements and Characterizing 3D Electric Field Signatures of Magnetic Reconnection

    Science.gov (United States)

    Shuster, J. R.; Torbert, R. B.; Vaith, H.; Argall, M. R.; Li, G.; Chen, L. J.; Ergun, R. E.; Lindqvist, P. A.; Marklund, G. T.; Khotyaintsev, Y. V.; Russell, C. T.; Magnes, W.; Le Contel, O.; Pollock, C. J.; Giles, B. L.

    2015-12-01

    The electron drift instruments (EDIs) onboard each MMS spacecraft are designed with large geometric factors (~0.01cm2 str) to facilitate detection of weak (~100 nA) electron beams fired and received by the two gun-detector units (GDUs) when EDI is in its "electric field mode" to determine the local electric and magnetic fields. A consequence of the large geometric factor is that "ambient mode" electron flux measurements (500 eV electrons having 0°, 90°, or 180° pitch angle) can vary depending on the orientation of the EDI instrument with respect to the magnetic field, a nonphysical effect that requires a correction. Here, we present determinations of the θ- and ø-dependent correction factors for the eight EDI GDUs, where θ (ø) is the polar (azimuthal) angle between the GDU symmetry axis and the local magnetic field direction, and compare the corrected fluxes with those measured by the fast plasma instrument (FPI). Using these corrected, high time resolution (~1,000 samples per second) ambient electron fluxes, combined with the unprecedentedly high resolution 3D electric field measurements taken by the spin-plane and axial double probes (SDP and ADP), we are equipped to accurately detect electron-scale current layers and electric field waves associated with the non-Maxwellian (anisotropic and agyrotropic) particle distribution functions predicted to exist in the reconnection diffusion region. We compare initial observations of the diffusion region with distributions and wave analysis from PIC simulations of asymmetric reconnection applicable for modeling reconnection at the Earth's magnetopause, where MMS will begin Science Phase 1 as of September 1, 2015.

  14. Identification of pristine and defective graphene nanoribbons by phonon signatures in the electron transport characteristics

    DEFF Research Database (Denmark)

    Christensen, Rasmus Bjerregaard; Frederiksen, Thomas; Brandbyge, Mads

    2015-01-01

    Inspired by recent experiments where electron transport was measured across graphene nanoribbons (GNRs) suspended between a metal surface and the tip of a scanning tunneling microscope [Koch, Nat. Nanotechnol.7, 713 (2012)], we present detailed first-principles simulations of inelastic electron...... tunneling spectroscopy (IETS) of long pristine and defective armchair and zigzag nanoribbons under a range of charge carrier conditions. For the armchair ribbons we find two robust IETS signals around 169 and 196 mV corresponding to the D and G modes of Raman spectroscopy as well as additional fingerprints...

  15. Puffing Topography and Nicotine Intake of Electronic Cigarette Users

    Science.gov (United States)

    Behar, Rachel Z.; Hua, My; Talbot, Prue

    2015-01-01

    Background Prior electronic cigarette (EC) topography data are based on two video analyses with limited parameters. Alternate methods for measuring topography are needed to understand EC use and nicotine intake. Objectives This study evaluated EC topography with a CReSS Pocket device and quantified nicotine intake. Methods Validation tests on pressure drop, flow rate, and volume confirmed reliable performance of the CReSS Pocket device. Twenty participants used Blu Cigs and V2 Cigs for 10 minute intervals with a 10–15 minute break between brands. Brand order was reversed and repeated within 7 days Data were analyzed to determine puff duration, puff count, volume, flow rate, peak flow, and inter-puff interval. Nicotine intake was estimated from cartomizer fluid consumption and topography data. Results Nine patterns of EC use were identified. The average puff count and inter-puff interval were 32 puffs and 17.9 seconds. All participants, except one, took more than 20 puffs/10 minutes. The averages for puff duration (2.65 seconds/puff), volume/puff (51ml/puff), total puff volume (1,579 ml), EC fluid consumption (79.6 mg), flow rate (20 ml/s), and peak flow rate (27 ml/s) were determined for 10-minute sessions. All parameters except total puff count were significantly different for Blu versus V2 EC. Total volume for Blu versus V2 was four-times higher than for conventional cigarettes. Average nicotine intake for Blu and V2 across both sessions was 1.2 ± 0.5 mg and 1.4 ± 0.7 mg, respectively, which is similar to conventional smokers. Conclusions EC puffing topography was variable among participants in the study, but often similar within an individual between brands or days. Puff duration, inter-puff interval, and puff volume varied from conventional cigarette standards. Data on total puff volume and nicotine intake are consistent with compensatory usage of EC. These data can contribute to the development of a standard protocol for laboratory testing of EC products

  16. Puffing topography and nicotine intake of electronic cigarette users.

    Directory of Open Access Journals (Sweden)

    Rachel Z Behar

    Full Text Available Prior electronic cigarette (EC topography data are based on two video analyses with limited parameters. Alternate methods for measuring topography are needed to understand EC use and nicotine intake.This study evaluated EC topography with a CReSS Pocket device and quantified nicotine intake.Validation tests on pressure drop, flow rate, and volume confirmed reliable performance of the CReSS Pocket device. Twenty participants used Blu Cigs and V2 Cigs for 10 minute intervals with a 10-15 minute break between brands. Brand order was reversed and repeated within 7 days Data were analyzed to determine puff duration, puff count, volume, flow rate, peak flow, and inter-puff interval. Nicotine intake was estimated from cartomizer fluid consumption and topography data.Nine patterns of EC use were identified. The average puff count and inter-puff interval were 32 puffs and 17.9 seconds. All participants, except one, took more than 20 puffs/10 minutes. The averages for puff duration (2.65 seconds/puff, volume/puff (51 ml/puff, total puff volume (1,579 ml, EC fluid consumption (79.6 mg, flow rate (20 ml/s, and peak flow rate (27 ml/s were determined for 10-minute sessions. All parameters except total puff count were significantly different for Blu versus V2 EC. Total volume for Blu versus V2 was four-times higher than for conventional cigarettes. Average nicotine intake for Blu and V2 across both sessions was 1.2 ± 0.5 mg and 1.4 ± 0.7 mg, respectively, which is similar to conventional smokers.EC puffing topography was variable among participants in the study, but often similar within an individual between brands or days. Puff duration, inter-puff interval, and puff volume varied from conventional cigarette standards. Data on total puff volume and nicotine intake are consistent with compensatory usage of EC. These data can contribute to the development of a standard protocol for laboratory testing of EC products.

  17. 21 CFR 11.50 - Signature manifestations.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Signature manifestations. 11.50 Section 11.50 Food... RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.50 Signature manifestations. (a) Signed electronic...: (1) The printed name of the signer; (2) The date and time when the signature was executed; and (3...

  18. A Framework for Effective User Interface Design for Web-Based Electronic Commerce Applications

    Directory of Open Access Journals (Sweden)

    Justyna Burns

    2001-01-01

    Full Text Available Efficient delivery of relevant product information is increasingly becoming the central basis of competition between firms. The interface design represents the central component for successful information delivery to consumers. However, interface design for web-based information systems is probably more an art than a science at this point in time. Much research is needed to understand properties of an effective interface for electronic commerce. This paper develops a framework identifying the relationship between user factors, the role of the user interface and overall system success for web-based electronic commerce. The paper argues that web-based systems for electronic commerce have some similar properties to decision support systems (DSS and adapts an established DSS framework to the electronic commerce domain. Based on a limited amount of research studying web browser interface design, the framework identifies areas of research needed and outlines possible relationships between consumer characteristics, interface design attributes and measures of overall system success.

  19. Review and Analysis of Cryptographic Schemes Implementing Threshold Signature

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-03-01

    Full Text Available This work is devoted to the study of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, ellipt ic curves and bilinear pairings were investigated. Different methods of generation and verification of threshold signatures were explored, e.g. used in a mobile agents, Internet banking and e-currency. The significance of the work is determined by the reduction of the level of counterfeit electronic documents, signed by certain group of users.

  20. 12 CFR 609.910 - Compliance with the Electronic Signatures in Global and National Commerce Act (Public Law 106-229...

    Science.gov (United States)

    2010-01-01

    ... Global and National Commerce Act (Public Law 106-229) (E-SIGN). 609.910 Section 609.910 Banks and Banking... with the Electronic Signatures in Global and National Commerce Act (Public Law 106-229) (E-SIGN). (a) General. E-SIGN makes it easier to conduct E-commerce. With some exceptions, E-SIGN permits the use and...

  1. The Design of a Graphical User Interface for an Electronic Classroom.

    Science.gov (United States)

    Cahalan, Kathleen J.; Levin, Jacques

    2000-01-01

    Describes the design of a prototype for the graphical user interface component of an electronic classroom (ECR) application that supports real-time lectures and question-and-answer sessions between an instructor and students. Based on requirements analysis and an analysis of competing products, a Web-based ECR prototype was produced. Findings show…

  2. Design of Electronic Medical Record User Interfaces: A Matrix-Based Method for Improving Usability

    Directory of Open Access Journals (Sweden)

    Kushtrim Kuqi

    2013-01-01

    Full Text Available This study examines a new approach of using the Design Structure Matrix (DSM modeling technique to improve the design of Electronic Medical Record (EMR user interfaces. The usability of an EMR medication dosage calculator used for placing orders in an academic hospital setting was investigated. The proposed method captures and analyzes the interactions between user interface elements of the EMR system and groups elements based on information exchange, spatial adjacency, and similarity to improve screen density and time-on-task. Medication dose adjustment task time was recorded for the existing and new designs using a cognitive simulation model that predicts user performance. We estimate that the design improvement could reduce time-on-task by saving an average of 21 hours of hospital physicians’ time over the course of a month. The study suggests that the application of DSM can improve the usability of an EMR user interface.

  3. 21 CFR 11.70 - Signature/record linking.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Signature/record linking. 11.70 Section 11.70 Food... RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.70 Signature/record linking. Electronic signatures and handwritten signatures executed to electronic records shall be linked to their respective...

  4. Electronic and vibrational signatures of the Au102(p-MBA)44 cluster.

    Science.gov (United States)

    Hulkko, Eero; Lopez-Acevedo, Olga; Koivisto, Jaakko; Levi-Kalisman, Yael; Kornberg, Roger D; Pettersson, Mika; Häkkinen, Hannu

    2011-03-23

    Optical absorption of a gold nanocluster of 102 Au atoms protected by 44 para-mercaptobenzoic acid (p-MBA) ligands is measured in the range of 0.05-6.2 eV (mid-IR to UV) by a combination of several techniques for purified samples in solid and solution phases. The results are compared to calculations for a model cluster Au(102)(SMe)(44) based on the time-dependent density functional theory in the linear-response regime and using the known structure of Au(102)(p-MBA)(44). The measured and calculated molar absorption coefficients in the NIR-vis region are comparable, within a factor of 2, in the absolute scale. Several characteristic features are observed in the absorption in the range of 1.5-3.5 eV. The onset of the electronic transitions in the mid-IR region is experimentally observed at 0.45 ± 0.05 eV which compares well with the lowest calculated transition at 0.55 eV. Vibrations in the ligand layer give rise to fingerprint IR features below the onset of low-energy metal-to-metal electronic transitions. Partial exchange of the p-MBA ligand to glutathione does not affect the onset of the electronic transitions, which indicates that the metal core of the cluster is not affected by the ligand exchange. The full spectroscopic characterization of the Au(102)(p-MBA)(44) reported here for the first time gives benchmarks for further studies of manipulation and functionalization of this nanocluster to various applications.

  5. Signatures of hot electrons and fluorescence in Mo Kα emission on Z

    Energy Technology Data Exchange (ETDEWEB)

    Hansen, S. B.; Ampleford, D. J.; Cuneo, M. E.; Jones, B.; Jennings, C. A.; Coverdale, C. A.; Rochau, G. A.; Dunham, G. [Sandia National Laboratories, Albuquerque, New Mexico 87185 (United States); Ouart, N.; Dasgupta, A.; Giuliani, J. L. [Naval Research Laboratory, Washington, DC 20375 (United States); Apruzese, J. P. [Consultant to NRL through Engility Corp., Chantilly, Virginia 20151 (United States)

    2014-03-15

    Recent experiments on the Z accelerator have produced high-energy (17 keV) inner-shell K-alpha emission from molybdenum wire array z-pinches. Extensive absolute power and spectroscopic diagnostics along with collisional-radiative modeling enable detailed investigation into the roles of thermal, hot electron, and fluorescence processes in the production of high-energy x-rays. We show that changing the dimensions of the arrays can impact the proportion of thermal and non-thermal K-shell x-rays.

  6. A case study on better iconographic design in electronic medical records' user interface.

    Science.gov (United States)

    Tasa, Umut Burcu; Ozcan, Oguzhan; Yantac, Asim Evren; Unluer, Ayca

    2008-06-01

    It is a known fact that there is a conflict between what users expect and what user interface designers create in the field of medical informatics along with other fields of interface design. The objective of the study is to suggest, from the 'design art' perspective, a method for improving the usability of an electronic medical record (EMR) interface. The suggestion is based on the hypothesis that the user interface of an EMR should be iconographic. The proposed three-step method consists of a questionnaire survey on how hospital users perceive concepts/terms that are going to be used in the EMR user interface. Then icons associated with the terms are designed by a designer, following a guideline which is prepared according to the results of the first questionnaire. Finally the icons are asked back to the target group for proof. A case study was conducted with 64 medical staff and 30 professional designers for the first questionnaire, and with 30 medical staff for the second. In the second questionnaire 7.53 icons out of 10 were matched correctly with a standard deviation of 0.98. Also, all icons except three were matched correctly in at least 83.3% of the forms. The proposed new method differs from the majority of previous studies which are based on user requirements by leaning on user experiments instead. The study demonstrated that the user interface of EMRs should be designed according to a guideline that results from a survey on users' experiences on metaphoric perception of the terms.

  7. Diffusion of Messages from an Electronic Cigarette Brand to Potential Users through Twitter.

    Directory of Open Access Journals (Sweden)

    Kar-Hai Chu

    Full Text Available This study explores the presence and actions of an electronic cigarette (e-cigarette brand, Blu, on Twitter to observe how marketing messages are sent and diffused through the retweet (i.e., message forwarding functionality. Retweet networks enable messages to reach additional Twitter users beyond the sender's local network. We follow messages from their origin through multiple retweets to identify which messages have more reach, and the different users who are exposed.We collected three months of publicly available data from Twitter. A combination of techniques in social network analysis and content analysis were applied to determine the various networks of users who are exposed to e-cigarette messages and how the retweet network can affect which messages spread.The Blu retweet network expanded during the study period. Analysis of user profiles combined with network cluster analysis showed that messages of certain topics were only circulated within a community of e-cigarette supporters, while other topics spread further, reaching more general Twitter users who may not support or use e-cigarettes.Retweet networks can serve as proxy filters for marketing messages, as Twitter users decide which messages they will continue to diffuse among their followers. As certain e-cigarette messages extend beyond their point of origin, the audience being exposed expands beyond the e-cigarette community. Potential implications for health education campaigns include utilizing Twitter and targeting important gatekeepers or hubs that would maximize message diffusion.

  8. Assessing electronic cigarette effects and regulatory impact: Challenges with user self-reported device power.

    Science.gov (United States)

    Rudy, Alyssa K; Leventhal, Adam M; Goldenson, Nicholas I; Eissenberg, Thomas

    2017-10-01

    Electronic cigarettes (ECIGs) aerosolize liquids for user inhalation that usually contain nicotine. ECIG nicotine emission is determined, in part, by user behavior, liquid nicotine concentration, and electrical power. Whether users are able to report accurately nicotine concentration and device electrical power has not been evaluated. This study's purpose was to examine if ECIG users could provide data relevant to understanding ECIG nicotine emission, particularly liquid nicotine concentration (mg/ml) as well as battery voltage (V) and heater resistance (ohms, Ω) - needed to calculate power (watts, W). Adult ECIG users (N=165) were recruited from Los Angeles, CA for research studies examining the effects of ECIG use. We asked all participants who visited the laboratory to report liquid nicotine concentration, V, and Ω. Liquid nicotine concentration was reported by 89.7% (mean=9.5mg/ml, SD=7.3), and responses were consistent with the distribution of liquids available in commonly marketed products. The majority could not report voltage (51.5%) or resistance (63.6%). Of the 40 participants (24.8%) who reported voltage and resistance, there was a substantial power range (2.2-32,670W) the upper limit of which exceeds that of the highest ECIG reported by any user to our knowledge (i.e., 2512W). If 2512W is taken as the upper limit, only 30 (18.2%) reported valid results (mean 237.3W, SD=370.6; range=2.2-1705.3W). Laboratory, survey, and other researchers interested in understanding ECIG effects to inform users and policymakers may need to use methods other than user self-report to obtain information regarding device power. Copyright © 2017 Elsevier B.V. All rights reserved.

  9. Digital signature feasibility study

    Science.gov (United States)

    2008-06-01

    The purpose of this study was to assess the advantages and disadvantages of using digital signatures to assist the Arizona Department of Transportation in conducting business. The Department is evaluating the potential of performing more electronic t...

  10. Development of a free-electron laser user facility for the extreme ultraviolet

    International Nuclear Information System (INIS)

    Newnam, B.E.

    1987-01-01

    A free-electron laser user facility for scientific experimentation in the extreme ultraviolet is being developed at Los Alamos. A series of laser oscillators and amplifiers, driven by a single, rf linear accelerator, will generate broadly tunable, picosecond-pulse, coherent radiation from 1 nm to 400 nm. The design and output parameters of this facility are described, comparison with synchrotron radiation sources is made, and recent progress in developing the three primary components (electron beam, undulator, and resonator mirrors) is reviewed, and various categories of scientific applications are indicated

  11. Electronic cigarette use: comparing smokers, vapers, and dual users on characteristics and motivational factors

    OpenAIRE

    Claire Schoren; Karin Hummel; Hein de Vries

    2017-01-01

    Introduction This study examined vaping behaviour, precursors of vaping, and motivational differences between smokers, dual users and vapers. The objectives were to assess a) vaping characteristics and reasons for use, b) differences in motivational factors and behavioural precursors associated with e-cigarette use, and c) socio-demographic and motivational factors associated with electronic cigarette use. Methods A cross-sectional survey among 259 vapers, 135 smokers, and 83 dual u...

  12. Lack of Substantial Post-Cessation Weight Increase in Electronic Cigarettes Users

    Directory of Open Access Journals (Sweden)

    Cristina Russo

    2018-03-01

    Full Text Available Minimization of post-cessation weight gain in quitters is important, but existing approaches (e.g., antismoking medications shows only limited success. We investigated changes in body weight in smokers who quit or reduced substantially their cigarette consumption by switching to electronic cigarettes (ECs use. Body weight and smoking/vaping history were extracted from medical records of smokers and ex-smokers to match three study groups: (1 regular EC users on at least two consecutive follow-up visits; (2 regular smokers (and not using ECs; (3 subjects who reported sustained smoking abstinence after completing a cessation program. Review of their medical records was conducted at two follow-up visits at 6- (F/U 6m and 12-months (F/U 12m. A total of 86 EC users, 93 regular smokers, and 44 quitters were studied. In the EC users study group, cigarettes/day use decreased from 21.1 at baseline to 1.8 at F/U 12m (p < 0.0001. Dual usage was reported by approximately 50% of EC users. Both within factor (time, p < 0.0001 and between factor (study groups, p < 0.0001 produced significant effect on weight (% change from baseline, with a significant 4.8% weight gain from baseline in the quitters study group at F/U 12m. For the EC users, weight gain at F/U 12m was only 1.5% of baseline. There was no evidence of post-cessation weight increase in those who reduced substantially cigarette consumption by switching to ECs (i.e., dual users and only modest post-cessation weight increase was reported in exclusive EC users at F/U 12m. By reducing weight gain and tobacco consumption, EC-based interventions may promote an overall improvement in quality of life.

  13. A Comparison of Daily Versus Weekly Electronic Cigarette Users in Treatment for Substance Abuse.

    Science.gov (United States)

    Gubner, Noah R; Pagano, Anna; Tajima, Barbara; Guydish, Joseph

    2018-04-02

    This research examined electronic cigarette (e-cigarette) use by individuals in treatment for substance abuse, a population with a high prevalence of tobacco use and poor smoking cessation outcomes. We surveyed 1127 individuals from 24 substance abuse treatment centers across the United States. Bivariate analyses and logistic regression were used to examine factors associated with daily (N = 87) versus weekly (N = 81) e-cigarette use. Among the full sample, 59.8% reported any lifetime use of e-cigarettes, with 23.6% reporting past 30-day use. Daily e-cigarette users were more likely to have used second-generation, tank-type e-cigarettes, χ2(1,N = 165) = 11.54, p = .001, used more flavors overall, t(168) = 2.15, p = .03, and were more likely to report using their e-cigarette continuously throughout the day, χ2(4,N = 168) = 16.7, p = .002, compared to weekly e-cigarette users. Over half (57.7%) of the daily and weekly e-cigarette users reported having an e-cigarette device that broke. The logistic regression model adjusting for clinic type and days with poor mental health found that daily e-cigarette users were significantly more likely than weekly e-cigarette users to be from methadone clinics (adjusted odds ratio [AOR] = 2.40, p = .04), and former smokers (AOR = 6.37, p users in substance abuse treatment were more likely to be from methadone clinics and former cigarette smokers. However, the majority (73.6%) of daily e-cigarette users were current cigarette smokers. E-cigarette device type reliability (eg, breakage) may be an important factor to consider among drug treatment and other populations with lower socioeconomic status. This study found several differences in the device type, flavors, and use characteristics of daily versus weekly e-cigarette users. While majority of e-cigarette users in substance abuse treatment were current cigarette smokers, daily e-cigarette users were more likely to be former cigarette smokers. Administrators of substance abuse

  14. Reasons for Using Electronic Cigarettes and Intentions to Quit Among Electronic Cigarette Users in Malaysia.

    Science.gov (United States)

    Wong, Li Ping; Mohamad Shakir, Sharina Mahavera; Alias, Haridah; Aghamohammadi, Nasrin; Hoe, Victor Cw

    2016-12-01

    The rapidly increasing uptake of e-cigarettes in Malaysia as of late demands a study to identify factors leading to its increased popularity and user intentions to quit smoking e-cigarettes. A convenience sample of e-cigarette smokers visiting e-cigarette retail shops in Selangor and Kuala Lumpur was recruited. The majority of e-cigarette smokers were youth in colleges or universities (39 %), and young professionals and managers (36 %). The main reasons for using e-cigarettes were to help the user quit tobacco cigarettes (88 %), the perception that e-cigarettes are not as intrusive as tobacco cigarettes (85 %) and can be used in public areas (70 %), the perception that e-cigarettes are healthier than tobacco cigarettes (85 %), and its relatively lower cost compared to tobacco cigarettes (65 %). A total of 65.3 % of respondents expressed intentions to quit e-cigarettes. In a multivariate analysis, the respondents who earned monthly income of RM1000 or less were significantly more likely to intend to quit smoking e-cigarettes [OR 1.551; 95 % CI 1.022-2.355; p = 0.015] compared to the respondents who earned a monthly income of more than RM2000. The respondents who disagreed with the statement 'Smoking e-cigs is relatively cheaper compared to tobacco cigarettes' were significantly more likely to intend to quit smoking e-cigarettes [OR 1.548; 95 % CI 1.045-2.293; p = 0.027] compared to respondents who did not agree. e-cigarette preventive interventions should target areas related to the identified main reasons for using e-cigarettes, namely as an aid for quitting tobacco cigarettes, the perception that e-cigarettes are not as intrusive as tobacco cigarettes and can be used in public areas, the idea that e-cigarettes are healthier than tobacco cigarettes, and its relatively lower cost compared to tobacco cigarettes.

  15. Customization of electronic medical record templates to improve end-user satisfaction.

    Science.gov (United States)

    Gardner, Carrie Lee; Pearce, Patricia F

    2013-03-01

    Since 2004, increasing importance has been placed on the adoption of electronic medical records by healthcare providers for documentation of patient care. Recent federal regulations have shifted the focus from adoption alone to meaningful use of an electronic medical record system. As proposed by the Technology Acceptance Model, the behavioral intention to use technology is determined by the person's attitude toward usage. The purpose of this quality improvement project was to devise and implement customized templates into an existent electronic medical record system in a single clinic and measure the satisfaction of the clinic providers with the system before and after implementation. Provider satisfaction with the electronic medical record system was evaluated prior to and following template implementation using the current version 7.0 of the Questionnaire for User Interaction Satisfaction tool. Provider comments and improvement in the Questionnaire for User Interaction Satisfaction levels of rankings following template implementation indicated a positive perspective by the providers in regard to the templates and customization of the system.

  16. An overview of the user program for the Jefferson Lab free electron laser

    International Nuclear Information System (INIS)

    Dylla, H.F.

    1999-01-01

    Jefferson Lab is commissioning a high-average-power IR FEL during 1998. When driven with its superconducting linac operating in a recirculated mode, the IR Demo FEL is capable of producing kilowatt-level average power in the mid-infrared (2-7 mu m) range. With operational experience and hardware changes involving primarily change-out of the optical cavity mirrors, the FEL is capable of covering a wide range of the infrared (1-16 mu m) at power levels exceeding 100 W. This tuning range combined with a unique pulse structure makes the Jefferson Lab FEL a versatile research and development tool for a wide variety of laser applications. A core group of industrial partners has been involved in planning applications using the FEL since 1991. This initial user group was augmented with university partners in 1993 and with participants from several national laboratories in 1996-1997. With the initiation of construction of the FEL and the associated 600 m 2 user facility laboratory in 1996, a number of topical user groups were formed to plan and implement the first series of user experiments. The industrial partners have formed user groups planning applications in polymer surface processing, metal surface processing, microfabrication, and electronic materials. University partners have submitted proposals on basic science topics which complement and planned applied research topics, in addition to proposing experiments in atomic physics, chemical physics and materials science which take advantage of one or more of the unique characteristics of the FEL. A synopsis of the proposed user experiments for the first phase of operation of the Jefferson Lab FEL will be presented

  17. Web-based DAQ systems: connecting the user and electronics front-ends

    Science.gov (United States)

    Lenzi, Thomas

    2016-12-01

    Web technologies are quickly evolving and are gaining in computational power and flexibility, allowing for a paradigm shift in the field of Data Acquisition (DAQ) systems design. Modern web browsers offer the possibility to create intricate user interfaces and are able to process and render complex data. Furthermore, new web standards such as WebSockets allow for fast real-time communication between the server and the user with minimal overhead. Those improvements make it possible to move the control and monitoring operations from the back-end servers directly to the user and to the front-end electronics, thus reducing the complexity of the data acquisition chain. Moreover, web-based DAQ systems offer greater flexibility, accessibility, and maintainability on the user side than traditional applications which often lack portability and ease of use. As proof of concept, we implemented a simplified DAQ system on a mid-range Spartan6 Field Programmable Gate Array (FPGA) development board coupled to a digital front-end readout chip. The system is connected to the Internet and can be accessed from any web browser. It is composed of custom code to control the front-end readout and of a dual soft-core Microblaze processor to communicate with the client.

  18. Web-based DAQ systems: connecting the user and electronics front-ends

    International Nuclear Information System (INIS)

    Lenzi, Thomas

    2016-01-01

    Web technologies are quickly evolving and are gaining in computational power and flexibility, allowing for a paradigm shift in the field of Data Acquisition (DAQ) systems design. Modern web browsers offer the possibility to create intricate user interfaces and are able to process and render complex data. Furthermore, new web standards such as WebSockets allow for fast real-time communication between the server and the user with minimal overhead. Those improvements make it possible to move the control and monitoring operations from the back-end servers directly to the user and to the front-end electronics, thus reducing the complexity of the data acquisition chain. Moreover, web-based DAQ systems offer greater flexibility, accessibility, and maintainability on the user side than traditional applications which often lack portability and ease of use. As proof of concept, we implemented a simplified DAQ system on a mid-range Spartan6 Field Programmable Gate Array (FPGA) development board coupled to a digital front-end readout chip. The system is connected to the Internet and can be accessed from any web browser. It is composed of custom code to control the front-end readout and of a dual soft-core Microblaze processor to communicate with the client.

  19. Signature Balancing

    NARCIS (Netherlands)

    Noordkamp, H.W.; Brink, M. van den

    2006-01-01

    Signatures are an important part of the design of a ship. In an ideal situation, signatures must be as low as possible. However, due to budget constraints it is most unlikely to reach this ideal situation. The arising question is which levels of signatures are optimal given the different scenarios

  20. Impact and user satisfaction of a clinical information portal embedded in an electronic health record.

    Science.gov (United States)

    Tannery, Nancy H; Epstein, Barbara A; Wessel, Charles B; Yarger, Frances; LaDue, John; Klem, Mary Lou

    2011-01-01

    In 2008, a clinical information tool was developed and embedded in the electronic health record system of an academic medical center. In 2009, the initial information tool, Clinical-e, was superseded by a portal called Clinical Focus, with a single search box enabling a federated search of selected online information resources. To measure the usefulness and impact of Clinical Focus, a survey was used to gather feedback about users' experience with this clinical resource. The survey determined what type of clinicians were using this tool and assessed user satisfaction and perceived impact on patient care decision making. Initial survey results suggest the majority of respondents found Clinical Focus easy to navigate, the content easy to read, and the retrieved information relevant and complete. The majority would recommend Clinical Focus to their colleagues. Results indicate that this tool is a promising area for future development.

  1. A pilot study on nicotine residues in houses of electronic cigarette users, tobacco smokers, and non-users of nicotine-containing products.

    Science.gov (United States)

    Bush, Derek; Goniewicz, Maciej L

    2015-06-01

    Nicotine deposited on the surfaces has been shown to react with airborne chemicals leading to formation of carcinogens and contributing to thirdhand exposure. While prior studies revealed nicotine residues in tobacco smokers' homes, none have examined the nicotine residue in electronic cigarette (e-cigarette) users' homes. We measured nicotine on the surfaces in households of 8 e-cigarette users, 6 cigarette smokers, and 8 non-users of nicotine-containing products in Western New York, USA. Three surface wipe samples were taken from the floor, wall and window. Nicotine was extracted from the wipes and analyzed using gas chromatography. Half of the e-cigarette users' homes had detectable levels of nicotine on surfaces whereas nicotine was found in all of the tobacco cigarette smokers' homes. Trace amounts of nicotine were also detected in half of the homes of non-users of nicotine-containing products. Nicotine levels in e-cigarette users homes was significantly lower than that found in cigarette smokers homes (average concentration 7.7±17.2 vs. 1303±2676 μg/m2; pe-cigarette users and non-users (p>0.05). Nicotine is a common contaminant found on indoor surfaces. Using e-cigarettes indoors leads to significantly less thirdhand exposure to nicotine compared to smoking tobacco cigarettes. Copyright © 2015 Elsevier B.V. All rights reserved.

  2. User Manuals for a Primary Care Electronic Medical Record System: A Mixed Methods Study of User- and Vendor-Generated Documents.

    Science.gov (United States)

    Shachak, Aviv; Dow, Rustam; Barnsley, Jan; Tu, Karen; Domb, Sharon; Jadad, Alejandro R; Lemieux-Charles, Louise

    2013-06-04

    Tutorials and user manuals are important forms of impersonal support for using software applications including electronic medical records (EMRs). Differences between user- and vendor documentation may indicate support needs, which are not sufficiently addressed by the official documentation, and reveal new elements that may inform the design of tutorials and user manuals. What are the differences between user-generated tutorials and manuals for an EMR and the official user manual from the software vendor? Effective design of tutorials and user manuals requires careful packaging of information, balance between declarative and procedural texts, an action and task-oriented approach, support for error recognition and recovery, and effective use of visual elements. No previous research compared these elements between formal and informal documents. We conducted an mixed methods study. Seven tutorials and two manuals for an EMR were collected from three family health teams and compared with the official user manual from the software vendor. Documents were qualitatively analyzed using a framework analysis approach in relation to the principles of technical documentation described above. Subsets of the data were quantitatively analyzed using cross-tabulation to compare the types of error information and visual cues in screen captures between user- and vendor-generated manuals. The user-developed tutorials and manuals differed from the vendor-developed manual in that they contained mostly procedural and not declarative information; were customized to the specific workflow, user roles, and patient characteristics; contained more error information related to work processes than to software usage; and used explicit visual cues on screen captures to help users identify window elements. These findings imply that to support EMR implementation, tutorials and manuals need to be customized and adapted to specific organizational contexts and workflows. The main limitation of the study

  3. User Manuals for a Primary Care Electronic Medical Record System: A Mixed Methods Study of User- and Vendor-Generated Documents

    Science.gov (United States)

    Dow, Rustam; Barnsley, Jan; Tu, Karen; Domb, Sharon; Jadad, Alejandro R.; Lemieux-Charles, Louise

    2015-01-01

    Research problem Tutorials and user manuals are important forms of impersonal support for using software applications including electronic medical records (EMRs). Differences between user- and vendor documentation may indicate support needs, which are not sufficiently addressed by the official documentation, and reveal new elements that may inform the design of tutorials and user manuals. Research question What are the differences between user-generated tutorials and manuals for an EMR and the official user manual from the software vendor? Literature review Effective design of tutorials and user manuals requires careful packaging of information, balance between declarative and procedural texts, an action and task-oriented approach, support for error recognition and recovery, and effective use of visual elements. No previous research compared these elements between formal and informal documents. Methodology We conducted an mixed methods study. Seven tutorials and two manuals for an EMR were collected from three family health teams and compared with the official user manual from the software vendor. Documents were qualitatively analyzed using a framework analysis approach in relation to the principles of technical documentation described above. Subsets of the data were quantitatively analyzed using cross-tabulation to compare the types of error information and visual cues in screen captures between user- and vendor-generated manuals. Results and discussion The user-developed tutorials and manuals differed from the vendor-developed manual in that they contained mostly procedural and not declarative information; were customized to the specific workflow, user roles, and patient characteristics; contained more error information related to work processes than to software usage; and used explicit visual cues on screen captures to help users identify window elements. These findings imply that to support EMR implementation, tutorials and manuals need to be customized and

  4. Understanding Providers' Interaction with Graphical User Interface Pertaining to Clinical Document Usage in an Electronic Health Record System

    Science.gov (United States)

    Rizvi, Rubina Fatima

    2017-01-01

    Despite high Electronic Health Record (EHR) system adoption rates by hospital and office-based practices, many users remain highly dissatisfied with the current state of EHRs. Sub-optimal EHR usability as a result of insufficient incorporation of User-Centered Design (UCD) approach during System Development Life Cycle process (SDLC) is considered…

  5. Perceptions towards electronic cigarettes for smoking cessation among Stop Smoking Service users.

    Science.gov (United States)

    Sherratt, Frances C; Newson, Lisa; Marcus, Michael W; Field, John K; Robinson, Jude

    2016-05-01

    Electronic cigarettes (e-cigarettes) are promoted as smoking cessation tools, yet they remain unavailable from Stop Smoking Services in England; the debate over their safety and efficacy is ongoing. This study was designed to explore perceptions and reasons for use or non-use of electronic cigarettes as smoking cessation tools, among individuals engaged in Stop Smoking Services. Semi-structured telephone interviews were undertaken with twenty participants engaged in Stop Smoking Services in the north-west of England. Participants comprised of both individuals who had tried e-cigarettes (n = 6) and those who had not (n = 14). Interviews were digitally recorded and transcribed verbatim. The transcripts were subject to thematic analysis, which explored participants' beliefs and experiences of e-cigarettes. A thematic analysis of transcripts suggested that the following three superordinate themes were prominent: (1) self-efficacy and beliefs in e-cigarettes; (2) e-cigarettes as a smoking cessation aid; and (3) cues for e-cigarette use. Participants, particularly never users, were especially concerned regarding e-cigarette efficacy and safety. Overall, participants largely expressed uncertainty regarding e-cigarette safety and efficacy, with some evidence of misunderstanding. Evidence of uncertainty and misunderstanding regarding information on e-cigarettes highlights the importance of providing smokers with concise, up-to-date information regarding e-cigarettes, enabling smokers to make informed treatment decisions. Furthermore, identification of potential predictors of e-cigarette use can be used to inform Stop Smoking Services provision and future research. What is already known on this subject? Research suggests that e-cigarettes may help smokers quit smoking, but further studies are needed. Electronic cigarette use in Stop Smoking Services has increased substantially in recent years, although e-cigarettes are currently not regulated. There is debate within the

  6. Hormonal contraception among electronic cigarette users and cardiovascular risk: a systematic review.

    Science.gov (United States)

    Riley, Halley E M; Berry-Bibee, Erin; England, Lucinda J; Jamieson, Denise J; Marchbanks, Polly A; Curtis, Kathryn M

    2016-03-01

    Women who use combined hormonal contraceptives and cigarettes have an increased risk for cardiovascular (CV) events. We reviewed the literature to determine whether women who use hormonal contraceptives (HC) and electronic cigarettes (e-cigarettes) also have an increased risk. Systematic review. We searched for articles reporting myocardial infarction (MI), stroke, venous thromboembolism, peripheral arterial disease or changes to CV markers in women using e-cigarettes and HC. We also searched for indirect evidence, such as CV outcomes among e-cigarette users in the general population and among HC users exposed to nicotine, propylene glycol or glycerol. No articles reported on outcomes among e-cigarette users using HC. Among the general population, 13 articles reported on heart rate or blood pressure after e-cigarette use. These markers generally remained normal, even when significant changes were observed. In three studies, changes were less pronounced after e-cigarette use than cigarette use. One MI was reported among 1012 people exposed to e-cigarettes in these studies. One article on nicotine and HC exposure found both exposures to be significantly associated with acute changes to heart rate, though mean heart rate remained normal. No articles on propylene glycol or glycerol and HC exposure were identified. We identified no evidence on CV outcomes among e-cigarette users using HC. Limited data reporting mostly acute outcomes suggested that CV events are rare among e-cigarette users in the general population and that e-cigarettes may affect heart rate and blood pressure less than conventional cigarettes. There is a need for research assessing joint HC and e-cigarette exposure on clinical CV outcomes. Copyright © 2016 Elsevier Inc. All rights reserved.

  7. Barriers and facilitators to implementing electronic prescription: a systematic review of user groups' perceptions.

    Science.gov (United States)

    Gagnon, Marie-Pierre; Nsangou, Édith-Romy; Payne-Gagnon, Julie; Grenier, Sonya; Sicotte, Claude

    2014-01-01

    We conducted a systematic review identifying users groups' perceptions of barriers and facilitators to implementing electronic prescription (e-prescribing) in primary care. We included studies following these criteria: presence of an empirical design, focus on the users' experience of e-prescribing implementation, conducted in primary care, and providing data on barriers and facilitators to e-prescribing implementation. We used the Donabedian logical model of healthcare quality (adapted by Barber et al) to analyze our findings. We found 34 publications (related to 28 individual studies) eligible to be included in this review. These studies identified a total of 594 elements as barriers or facilitators to e-prescribing implementation. Most user groups perceived that e-prescribing was facilitated by design and technical concerns, interoperability, content appropriate for the users, attitude towards e-prescribing, productivity, and available resources. This review highlights the importance of technical and organizational support for the successful implementation of e-prescribing systems. It also shows that the same factor can be seen as a barrier or a facilitator depending on the project's own circumstances. Moreover, a factor can change in nature, from a barrier to a facilitator and vice versa, in the process of e-prescribing implementation. This review summarizes current knowledge on factors related to e-prescribing implementation in primary care that could support decision makers in their design of effective implementation strategies. Finally, future studies should emphasize on the perceptions of other user groups, such as pharmacists, managers, vendors, and patients, who remain neglected in the literature.

  8. Patterns of electronic cigarette use and user beliefs about their safety and benefits: an internet survey.

    Science.gov (United States)

    Goniewicz, Maciej L; Lingas, Elena O; Hajek, Peter

    2013-03-01

    As the popularity of electronic cigarettes (e-cigarettes) increases, it is becoming important to find out more about the characteristics of e-cigarette users, why and how they use the product and whether e-cigarettes are used exclusively or in combination with conventional cigarettes. The objective of this study was to investigate patterns and effects of e-cigarette use and user beliefs about e-cigarette safety and benefits. E-cigarette users in Poland were recruited online and asked to participate in a web-based survey. The participants provided information on their smoking history, patterns of e-cigarette use, beliefs and attitudes regarding the product and information on concurrent use of conventional cigarettes. The survey was completed by 179 e-cigarette users. Almost all participants used e-cigarettes daily. E-cigarettes were primarily used to quit smoking or to reduce the harm associated with smoking (both 41%), and were successful in helping the surveyed users to achieve these goals with 66% not smoking conventional cigarettes at all and 25% smoking under five cigarettes a day. Most participants (82%) did not think that e-cigarettes were completely safe, but thought that they were less dangerous than conventional cigarettes. Sixty percent believed that e-cigarettes were addictive, but less so than conventional cigarettes. The participants primarily used e-cigarettes as a stop-smoking aid or as an alternative to conventional cigarettes, and the majority reported that they successfully stopped smoking. More data on e-cigarette safety and its efficacy in harm-reduction and smoking cessation are needed. © 2012 Australasian Professional Society on Alcohol and other Drugs.

  9. Radiation effects on electronic equipment: a designers'/users' guide for the nuclear power industry

    International Nuclear Information System (INIS)

    Sharp, R.E.; Garlick, D.R.

    1994-01-01

    The Designers'/Users' Guide to the effects of radiation on electronics is published by the Radiation Testing Service of AEA Technology. The aim of the Guide is to document the available information that we have generated and collected over some ten years whilst operating as a radiation effects and design consultancy to the nuclear power industry. We hope that this will enable workers within the industry better to understand the likely effects of radiation on the system or plant being designed and so minimise the problems that can arise. (Author)

  10. Anything but engaged: user involvement in the context of a national electronic health record implementation.

    Science.gov (United States)

    Cresswell, Kathrin; Morrison, Zoe; Crowe, Sarah; Robertson, Ann; Sheikh, Aziz

    2011-01-01

    The absence of meaningful end user engagement has repeatedly been highlighted as a key factor contributing to 'failed' implementations of electronic health records (EHRs), but achieving this is particularly challenging in the context of national scale initiatives. In 2002, the National Health Service (NHS) embarked on a so-called 'top-down' national implementation strategy aimed at introducing commercial, centrally procured, EHRs into hospitals throughout England. We aimed to examine approaches to, and experiences of, user engagement in the context of a large-scale EHR implementation across purposefully selected hospital care providers implementing early versions of nationally procured software. We conducted a qualitative, case-study based, socio-technically informed, longitudinal investigation, purposefully sampling and collecting data from four hospitals. Our data comprised a total of 123 semi-structured interviews with users and managers, 15 interviews with additional stakeholders, 43 hours of non-participant observations of meetings and system use, and relevant organisation-specific documents from each case study site. Analysis was thematic, building on an existing model of user engagement that was originally developed in the context of studying the implementation of relatively simple technologies in commercial settings. NVivo8 software was used to facilitate coding. Despite an enduring commitment to the vision of shared EHRs and an appreciation of their potential benefits, meaningful end user engagement was never achieved. Hospital staff were not consulted in systems choice, leading to frustration; they were then further alienated by the implementation of systems that they perceived as inadequately customised. Various efforts to achieve local engagement were attempted, but these were in effect risk mitigation strategies. We found the role of clinical champions to be important in these engagement efforts, but progress was hampered by the hierarchical structures

  11. Electronic cigarette use among patients with cancer: characteristics of electronic cigarette users and their smoking cessation outcomes.

    Science.gov (United States)

    Borderud, Sarah P; Li, Yuelin; Burkhalter, Jack E; Sheffer, Christine E; Ostroff, Jamie S

    2014-11-15

    Given that continued smoking after a cancer diagnosis increases the risk of adverse health outcomes, patients with cancer are strongly advised to quit. Despite a current lack of evidence regarding their safety and effectiveness as a cessation tool, electronic cigarettes (E-cigarettes) are becoming increasingly popular. To guide oncologists' communication with their patients about E-cigarette use, this article provides what to the authors' knowledge is the first published clinical data regarding E-cigarette use and cessation outcomes among patients with cancer. A total of 1074 participants included smokers (patients with cancer) who recently enrolled in a tobacco treatment program at a comprehensive cancer center. Standard demographic, tobacco use history, and follow-up cessation outcomes were assessed. A 3-fold increase in E-cigarette use was observed from 2012 to 2013 (10.6% vs 38.5%). E-cigarette users were more nicotine dependent than nonusers, had more prior quit attempts, and were more likely to be diagnosed with thoracic and head or neck cancers. Using a complete case analysis, E-cigarette users were as likely to be smoking at the time of follow-up as nonusers (odds ratio, 1.0; 95% confidence interval, 0.5-1.7). Using an intention-to-treat analysis, E-cigarette users were twice as likely to be smoking at the time of follow-up as nonusers (odds ratio, 2.0; 95% confidence interval, 1.2-3.3). The high rate of E-cigarette use observed is consistent with recent articles highlighting increased E-cigarette use in the general population. The current longitudinal findings raise doubts concerning the usefulness of E-cigarettes for facilitating smoking cessation among patients with cancer. Further research is needed to evaluate the safety and efficacy of E-cigarettes as a cessation treatment for patients with cancer. © 2014 American Cancer Society.

  12. Electronic Health Record-Related Safety Concerns: A Cross-Sectional Survey of Electronic Health Record Users

    Science.gov (United States)

    Pajunen, Tuuli; Saranto, Kaija; Lehtonen, Lasse

    2016-01-01

    Background The rapid expansion in the use of electronic health records (EHR) has increased the number of medical errors originating in health information systems (HIS). The sociotechnical approach helps in understanding risks in the development, implementation, and use of EHR and health information technology (HIT) while accounting for complex interactions of technology within the health care system. Objective This study addresses two important questions: (1) “which of the common EHR error types are associated with perceived high- and extreme-risk severity ratings among EHR users?”, and (2) “which variables are associated with high- and extreme-risk severity ratings?” Methods This study was a quantitative, non-experimental, descriptive study of EHR users. We conducted a cross-sectional web-based questionnaire study at the largest hospital district in Finland. Statistical tests included the reliability of the summative scales tested with Cronbach’s alpha. Logistic regression served to assess the association of the independent variables to each of the eight risk factors examined. Results A total of 2864 eligible respondents provided the final data. Almost half of the respondents reported a high level of risk related to the error type “extended EHR unavailability”. The lowest overall risk level was associated with “selecting incorrectly from a list of items”. In multivariate analyses, profession and clinical unit proved to be the strongest predictors for high perceived risk. Physicians perceived risk levels to be the highest (Prisk levels (PeLearning courses on EHR-use was associated with lower risk for some of the risk factors. Conclusions Based on a large number of Finnish EHR users in hospitals, this study indicates that HIT safety hazards should be taken very seriously, particularly in operating rooms, procedure units, emergency departments, and intensive care units/critical care units. Health care organizations should use proactive and

  13. Acute electronic cigarette use: nicotine delivery and subjective effects in regular users.

    Science.gov (United States)

    Dawkins, Lynne; Corcoran, Olivia

    2014-01-01

    Electronic cigarettes are becoming increasingly popular among smokers worldwide. Commonly reported reasons for use include the following: to quit smoking, to avoid relapse, to reduce urge to smoke, or as a perceived lower-risk alternative to smoking. Few studies, however, have explored whether electronic cigarettes (e-cigarettes) deliver measurable levels of nicotine to the blood. This study aims to explore in experienced users the effect of using an 18-mg/ml nicotine first-generation e-cigarette on blood nicotine, tobacco withdrawal symptoms, and urge to smoke. Fourteen regular e-cigarette users (three females), who are abstinent from smoking and e-cigarette use for 12 h, each completed a 2.5 h testing session. Blood was sampled, and questionnaires were completed (tobacco-related withdrawal symptoms, urge to smoke, positive and negative subjective effects) at four stages: baseline, 10 puffs, 60 min of ad lib use and a 60-min rest period. Complete sets of blood were obtained from seven participants. Plasma nicotine concentration rose significantly from a mean of 0.74 ng/ml at baseline to 6.77 ng/ml 10 min after 10 puffs, reaching a mean maximum of 13.91 ng/ml by the end of the ad lib puffing period. Tobacco-related withdrawal symptoms and urge to smoke were significantly reduced; direct positive effects were strongly endorsed, and there was very low reporting of adverse effects. These findings demonstrate reliable blood nicotine delivery after the acute use of this brand/model of e-cigarette in a sample of regular users. Future studies might usefully quantify nicotine delivery in relation to inhalation technique and the relationship with successful smoking cessation/harm reduction.

  14. A Multi-User Model for Effectively Communicating Research Through Electronic Media

    Science.gov (United States)

    Hinds, J. J.; Fairley, J. P.

    2003-12-01

    Electronic media have demonstrated potential for data exchange, dissemination of results to other scientists, communication with community interest groups, and education of the general public regarding scientific advances. Few researchers, however, receive training in the skills required to capture the attention of the broad spectrum of Internet users. Because different people assimilate information in different ways, effective communication is best accomplished using an appropriate mix of photographs, graphics, tables, and text. In addition, effective web page design requires a clear, consistent organizational structure, easily-navigated layout, and attention to details such as page printability, downloading time, and minimal page scrolling. One of the strengths of electronic media is that the user can chose an appropriate level of involvement for his or her interest. In designing a web page for the multidisciplinary NSF/EPSCoR "Biocomplexity in Extreme Environments" project, we divided potential users into three categories based on our perception of the level of detail they required: 1) project participants, 2) non-participants with technical backgrounds, and 3) the general public. By understanding the needs and expectations of potential viewers, it was possible to present each group with an appropriate balance of visual and textural elements. For example, project participants are often most interested in raw data, which can be effectively presented in tabular format. Non-participants with technical backgrounds are more interested in analyzed data, while a project overview, presented through photographs and graphics with minimal text, will be most effective for communicating with the general public. The completed web page illustrates one solution for effectively communicating with a diverse audience, and provides examples for meeting many of the challenges of web page design.

  15. A framework for evaluating electronic health record vendor user-centered design and usability testing processes.

    Science.gov (United States)

    Ratwani, Raj M; Zachary Hettinger, A; Kosydar, Allison; Fairbanks, Rollin J; Hodgkins, Michael L

    2017-04-01

    Currently, there are few resources for electronic health record (EHR) purchasers and end users to understand the usability processes employed by EHR vendors during product design and development. We developed a framework, based on human factors literature and industry standards, to systematically evaluate the user-centered design processes and usability testing methods used by EHR vendors. We reviewed current usability certification requirements and the human factors literature to develop a 15-point framework for evaluating EHR products. The framework is based on 3 dimensions: user-centered design process, summative testing methodology, and summative testing results. Two vendor usability reports were retrieved from the Office of the National Coordinator's Certified Health IT Product List and were evaluated using the framework. One vendor scored low on the framework (5 pts) while the other vendor scored high on the framework (15 pts). The 2 scored vendor reports demonstrate the framework's ability to discriminate between the variabilities in vendor processes and to determine which vendors are meeting best practices. The framework provides a method to more easily comprehend EHR vendors' usability processes and serves to highlight where EHR vendors may be falling short in terms of best practices. The framework provides a greater level of transparency for both purchasers and end users of EHRs. The framework highlights the need for clearer certification requirements and suggests that the authorized certification bodies that examine vendor usability reports may need to be provided with clearer guidance. © The Author 2016. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  16. Design and Implementation of a Mobile Voting System Using a Novel Oblivious and Proxy Signature

    Directory of Open Access Journals (Sweden)

    Shin-Yan Chiou

    2017-01-01

    Full Text Available Electronic voting systems can make the voting process much more convenient. However, in such systems, if a server signs blank votes before users vote, it may cause undue multivoting. Furthermore, if users vote before the signing of the server, voting information will be leaked to the server and may be compromised. Blind signatures could be used to prevent leaking voting information from the server; however, malicious users could produce noncandidate signatures for illegal usage at that time or in the future. To overcome these problems, this paper proposes a novel oblivious signature scheme with a proxy signature function to satisfy security requirements such as information protection, personal privacy, and message verification and to ensure that no one can cheat other users (including the server. We propose an electronic voting system based on the proposed oblivious and proxy signature scheme and implement this scheme in a smartphone application to allow users to vote securely and conveniently. Security analyses and performance comparisons are provided to show the capability and efficiency of the proposed scheme.

  17. Reasons for using flavored liquids among electronic cigarette users: A concept mapping study.

    Science.gov (United States)

    Soule, Eric K; Lopez, Alexa A; Guy, Mignonne C; Cobb, Caroline O

    2016-09-01

    Electronic cigarettes (ECIGs) aerosolize liquids often containing flavorants for inhalation. Few studies have examined the role of flavors in ECIG use. This study's purpose was to examine reasons for flavored ECIG use using a mixed-method approach, concept mapping (CM). Forty-six past 30-day adult ECIG users recruited from vape forums/conferences completed three online CM tasks. Participants brainstormed responses to a prompt: "A specific reason I use flavored e-liquid in my electronic cigarette product is…". The final 107 brainstormed statements were sorted by participants into groups of similar content. Participants rated each statement on a 7-point scale (1-Definitely NOT a reason to 7-Definitely a reason) based on a prompt: "This is a specific reason why I used flavored e-liquid in my electronic cigarette product in the past month." A cluster map was generated from participants' sorting and ratings using CM statistical software. Cluster mean ratings were compared. Analysis revealed five clusters of reasons for flavored ECIG use including Increased Satisfaction/Enjoyment, Better Feel/Taste than Cigarettes, Variety/Customization, Food Craving Suppression, and Social Impacts. Statements in the Increased Satisfaction/Enjoyment and Better Feel/Taste than Cigarettes clusters were rated significantly higher than statements from other clusters (psincrease the rewarding and possible addictive effects of ECIGs. These results support continued examination of the role of flavors and ECIG use behaviors. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  18. Electronic Field Guides and User Communities in the Eco-informatics Revolution

    Directory of Open Access Journals (Sweden)

    R. D. Stevenson

    2003-07-01

    Full Text Available The recognition that taxonomy is central to the conservation of biodiversity has reestablished the critical role of taxonomy in biology. However, many of the tools taxonomists produce for the identification and characterization of species, e.g., dichotomous keys, have been difficult to use and largely ignored by the general public in favor of field guides, which are essentially browsable picture guides. We review the role of field guides in species identification and discuss the application of a host of digital technologies to produce user-friendly tools for identification that are likely to greatly enhance species identification in the field by nonspecialists. We suggest that wider adoption of the citizen science model and the use of electronic field guides will enhance public understanding and participation in biodiversity monitoring.

  19. The differing privacy concerns regarding exchanging electronic medical records of internet users in Taiwan.

    Science.gov (United States)

    Hwang, Hsin-Ginn; Han, Hwai-En; Kuo, Kuang-Ming; Liu, Chung-Feng

    2012-12-01

    This study explores whether Internet users have different privacy concerns regarding the information contained in electronic medical records (EMRs) according to gender, age, occupation, education, and EMR awareness. Based on the Concern for Information Privacy (CFIP) scale developed by Smith and colleagues in 1996, we conducted an online survey using 15 items in four dimensions, namely, collection, unauthorized access, secondary use, and errors, to investigate Internet users' concerns regarding the privacy of EMRs under health information exchanges (HIE). We retrieved 213 valid questionnaires. The results indicate that the respondents had substantial privacy concerns regarding EMRs and their educational level and EMR awareness significantly influenced their privacy concerns regarding unauthorized access and secondary use of EMRs. This study recommends that the Taiwanese government organizes a comprehensive EMR awareness campaign, emphasizing unauthorized access and secondary use of EMRs. Additionally, to cultivate the public's understanding of EMRs, the government should employ various media, especially Internet channels, to promote EMR awareness, thereby enabling the public to accept the concept and use of EMRs. People who are highly educated and have superior EMR awareness should be given a comprehensive explanation of how hospitals protect patients' EMRs from unauthorized access and secondary use to address their concerns. Thus, the public can comprehend, trust, and accept the use of EMRs, reducing their privacy concerns, which should facilitate the future implementation of HIE.

  20. Xyce Parallel Electronic Simulator - User's Guide, Version 1.0

    Energy Technology Data Exchange (ETDEWEB)

    HUTCHINSON, SCOTT A; KEITER, ERIC R.; HOEKSTRA, ROBERT J.; WATERS, LON J.; RUSSO, THOMAS V.; RANKIN, ERIC LAMONT; WIX, STEVEN D.

    2002-11-01

    This manual describes the use of the Xyce Parallel Electronic Simulator code for simulating electrical circuits at a variety of abstraction levels. The Xyce Parallel Electronic Simulator has been written to support,in a rigorous manner, the simulation needs of the Sandia National Laboratories electrical designers. As such, the development has focused on improving the capability over the current state-of-the-art in the following areas: (1) Capability to solve extremely large circuit problems by supporting large-scale parallel computing platforms (up to thousands of processors). Note that this includes support for most popular parallel and serial computers. (2) Improved performance for all numerical kernels (e.g., time integrator, nonlinear and linear solvers) through state-of-the-art algorithms and novel techniques. (3) A client-server or multi-tiered operating model wherein the numerical kernel can operate independently of the graphical user interface (GUI). (4) Object-oriented code design and implementation using modern coding-practices that ensure that the Xyce Parallel Electronic Simulator will be maintainable and extensible far into the future. The code is a parallel code in the most general sense of the phrase--a message passing parallel implementation--which allows it to run efficiently on the widest possible number of computing platforms. These include serial, shared-memory and distributed-memory parallel as well as heterogeneous platforms. Furthermore, careful attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved even as the number of processors grows. Another feature required by designers is the ability to add device models, many specific to the needs of Sandia, to the code. To this end, the device package in the Xyce Parallel Electronic Simulator is designed to support a variety of device model inputs. These input formats include standard analytical models, behavioral models

  1. Electronic health record usability: analysis of the user-centered design processes of eleven electronic health record vendors.

    Science.gov (United States)

    Ratwani, Raj M; Fairbanks, Rollin J; Hettinger, A Zachary; Benda, Natalie C

    2015-11-01

    The usability of electronic health records (EHRs) continues to be a point of dissatisfaction for providers, despite certification requirements from the Office of the National Coordinator that require EHR vendors to employ a user-centered design (UCD) process. To better understand factors that contribute to poor usability, a research team visited 11 different EHR vendors in order to analyze their UCD processes and discover the specific challenges that vendors faced as they sought to integrate UCD with their EHR development. Our analysis demonstrates a diverse range of vendors' UCD practices that fall into 3 categories: well-developed UCD, basic UCD, and misconceptions of UCD. Specific challenges to practicing UCD include conducting contextually rich studies of clinical workflow, recruiting participants for usability studies, and having support from leadership within the vendor organization. The results of the study provide novel insights for how to improve usability practices of EHR vendors. © The Author 2015. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  2. User requirements and conceptual design of the ITER Electron Cyclotron Control System

    Energy Technology Data Exchange (ETDEWEB)

    Carannante, Giuseppe, E-mail: Giuseppe.Carannante@F4E.europa.eu [Fusion for Energy, Josep Pla 2, Barcelona 08019 (Spain); Cavinato, Mario [Fusion for Energy, Josep Pla 2, Barcelona 08019 (Spain); Gandini, Franco [ITER Organization, Route de Vinon-sur-Verdon, CS 90 046, 13067 St. Paul Lez Durance Cedex (France); Granucci, Gustavo [Istituto di Fisica del Plasma ENEA-CNR-EURATOM, via Cozzi 53, 20125 Milano (Italy); Henderson, Mark; Purohit, Dharmesh [ITER Organization, Route de Vinon-sur-Verdon, CS 90 046, 13067 St. Paul Lez Durance Cedex (France); Saibene, Gabriella; Sartori, Filippo [Fusion for Energy, Josep Pla 2, Barcelona 08019 (Spain); Sozzi, Carlo [Istituto di Fisica del Plasma ENEA-CNR-EURATOM, via Cozzi 53, 20125 Milano (Italy)

    2015-10-15

    The ITER Electron Cyclotron (EC) plant is a complex system, essential for plasma operation. The system is being designed to supply up to 20 MW of power at 170 GHz; it consists of 24 RF sources (or Gyrotrons) connected by switchable transmission lines to four upper and one equatorial launcher. The complexity of the EC plant requires a Plant Controller, which provides the functional and operational interface with CODAC and the Plasma Control System and coordinates the various Subsystem Control Units, i.e. the local controllers of power supplies, Gyrotrons, transmission lines and launchers. A conceptual design of the Electron Cyclotron Control System (ECCS) was developed, starting from the collection of the user requirements, which have then been organized as a set of operational scenarios exploiting the EC system. The design consists in a thorough functional analysis, including also protection functions, and in the development of a conceptual I&C architecture. The main aim of the work was to identify the physics requirements and to translate them into control system requirements, in order to define the interfaces within the components of the ECCS. The definition of these interfaces is urgent because some of the subsystems are already in an advanced design phase. The present paper describes both the methodology used and the resulting design.

  3. Xyce Parallel Electronic Simulator : users' guide, version 2.0.

    Energy Technology Data Exchange (ETDEWEB)

    Hoekstra, Robert John; Waters, Lon J.; Rankin, Eric Lamont; Fixel, Deborah A.; Russo, Thomas V.; Keiter, Eric Richard; Hutchinson, Scott Alan; Pawlowski, Roger Patrick; Wix, Steven D.

    2004-06-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been designed as a SPICE-compatible, high-performance analog circuit simulator capable of simulating electrical circuits at a variety of abstraction levels. Primarily, Xyce has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability the current state-of-the-art in the following areas: {sm_bullet} Capability to solve extremely large circuit problems by supporting large-scale parallel computing platforms (up to thousands of processors). Note that this includes support for most popular parallel and serial computers. {sm_bullet} Improved performance for all numerical kernels (e.g., time integrator, nonlinear and linear solvers) through state-of-the-art algorithms and novel techniques. {sm_bullet} Device models which are specifically tailored to meet Sandia's needs, including many radiation-aware devices. {sm_bullet} A client-server or multi-tiered operating model wherein the numerical kernel can operate independently of the graphical user interface (GUI). {sm_bullet} Object-oriented code design and implementation using modern coding practices that ensure that the Xyce Parallel Electronic Simulator will be maintainable and extensible far into the future. Xyce is a parallel code in the most general sense of the phrase - a message passing of computing platforms. These include serial, shared-memory and distributed-memory parallel implementation - which allows it to run efficiently on the widest possible number parallel as well as heterogeneous platforms. Careful attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows. One feature required by designers is the ability to add device models, many specific to the needs of Sandia, to the code. To this end, the device package in the Xyce

  4. A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents

    Directory of Open Access Journals (Sweden)

    Omar Tayan

    2014-01-01

    Full Text Available This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. Such issues were largely addressed in the literature for images, audio, and video, with only a few papers addressing the challenge of sensitive plain-text media under known constraints. Specifically, with text as the predominant online communication medium, it becomes crucial that techniques are deployed to protect such information. A number of digital-signature, hashing, and watermarking schemes have been proposed that essentially bind source data or embed invisible data in a cover media to achieve its goal. While many such complex schemes with resource redundancies are sufficient in offline and less-sensitive texts, this paper proposes a hybrid approach based on zero-watermarking and digital-signature-like manipulations for sensitive text documents in order to achieve content originality and integrity verification without physically modifying the cover text in anyway. The proposed algorithm was implemented and shown to be robust against undetected content modifications and is capable of confirming proof of originality whilst detecting and locating deliberate/nondeliberate tampering. Additionally, enhancements in resource utilisation and reduced redundancies were achieved in comparison to traditional encryption-based approaches. Finally, analysis and remarks are made about the current state of the art, and future research issues are discussed under the given constraints.

  5. A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents

    Science.gov (United States)

    Kabir, Muhammad N.; Alginahi, Yasser M.

    2014-01-01

    This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. Such issues were largely addressed in the literature for images, audio, and video, with only a few papers addressing the challenge of sensitive plain-text media under known constraints. Specifically, with text as the predominant online communication medium, it becomes crucial that techniques are deployed to protect such information. A number of digital-signature, hashing, and watermarking schemes have been proposed that essentially bind source data or embed invisible data in a cover media to achieve its goal. While many such complex schemes with resource redundancies are sufficient in offline and less-sensitive texts, this paper proposes a hybrid approach based on zero-watermarking and digital-signature-like manipulations for sensitive text documents in order to achieve content originality and integrity verification without physically modifying the cover text in anyway. The proposed algorithm was implemented and shown to be robust against undetected content modifications and is capable of confirming proof of originality whilst detecting and locating deliberate/nondeliberate tampering. Additionally, enhancements in resource utilisation and reduced redundancies were achieved in comparison to traditional encryption-based approaches. Finally, analysis and remarks are made about the current state of the art, and future research issues are discussed under the given constraints. PMID:25254247

  6. Characterizing use patterns and perceptions of relative harm in dual users of electronic and tobacco cigarettes.

    Science.gov (United States)

    Rass, Olga; Pacek, Lauren R; Johnson, Patrick S; Johnson, Matthew W

    2015-12-01

    Awareness and use of electronic cigarettes (e-cigarettes) is increasing. Questions regarding positive (e.g., smoking reduction/cessation) and negative (e.g., delay of cessation) potential public health consequences of e-cigarettes may be informed by studying dual users of e-cigarettes and tobacco cigarettes. A cross-sectional online survey assessed demographics, product use patterns, and beliefs about relative product benefits and harms among dual users (n = 350) in the United States using the website Amazon Mechanical Turk. Compared to tobacco cigarettes, e-cigarettes were used less often and were associated with lower dependence. Participants reported a 30% reduction in self-reported tobacco cigarette smoking since beginning to use e-cigarettes. Reported primary reasons for e-cigarette use were harm reduction and smoking cessation. E-cigarette use was reported as more likely in settings with smoking restrictions and when others' health could be adversely affected. Conversely, participants reported having used tobacco cigarettes more often than e-cigarettes in hedonic situations (e.g., after eating, drinking coffee or alcohol, or having sex), outdoors, or when stressed. Participants were twice as likely to report wanting to quit tobacco cigarettes compared to e-cigarettes in the next year and intended to quit tobacco cigarettes sooner. Tobacco cigarettes were described as more harmful and addictive, but also as more enjoyable than e-cigarettes. Participants provided evidence consistent with both positive and negative public health consequences of e-cigarettes, highlighting the need for experimental research, including laboratory studies and clinical trials. Policies should consider potential public health benefits of e-cigarettes, in addition to potential harms. (PsycINFO Database Record (c) 2015 APA, all rights reserved).

  7. Characterizing use patterns and perceptions of relative harm in dual users of electronic and tobacco cigarettes

    Science.gov (United States)

    Rass, Olga; Pacek, Lauren R.; Johnson, Patrick S.; Johnson, Matthew W.

    2015-01-01

    Awareness and use of electronic cigarettes (e-cigarettes) is increasing. Questions regarding positive (e.g., smoking reduction/cessation) and negative (e.g., delay of cessation) potential public health consequences of e-cigarettes may be informed by studying dual users of e-cigarettes and tobacco cigarettes. A cross-sectional online survey assessed demographics, product use patterns, and beliefs about relative product benefits and harms among dual users (n = 350) in the United States using the website Amazon Mechanical Turk (MTurk). Compared to tobacco cigarettes, e-cigarettes were used less often and were associated with lower dependence. Participants reported a 30% reduction in self-reported tobacco cigarette smoking since beginning to use e-cigarettes. Reported primary reasons for e-cigarette use were harm reduction and smoking cessation. E-cigarette use was reported as more likely in settings with smoking restrictions and when others’ health could be adversely affected. Conversely, participants reported having used tobacco cigarettes more often than e-cigarettes in hedonic situations (e.g., after eating, drinking coffee or alcohol, or having sex), outdoors, or when stressed. Participants were twice as likely to report wanting to quit tobacco cigarettes compared to e-cigarettes in the next year and intended to quit tobacco cigarettes sooner. Tobacco cigarettes were described as more harmful and addictive, but also more enjoyable than e-cigarettes. Participants provided evidence consistent with both positive and negative public health consequences of e-cigarettes, highlighting the need for experimental research, including laboratory studies and clinical trials. Policies should consider potential public health benefits of e-cigarettes, in addition to potential harms. PMID:26389638

  8. Integration of a nationally procured electronic health record system into user work practices

    Directory of Open Access Journals (Sweden)

    Cresswell Kathrin M

    2012-03-01

    Full Text Available Abstract Background Evidence suggests that many small- and medium-scale Electronic Health Record (EHR implementations encounter problems, these often stemming from users' difficulties in accommodating the new technology into their work practices. There is the possibility that these challenges may be exacerbated in the context of the larger-scale, more standardised, implementation strategies now being pursued as part of major national modernisation initiatives. We sought to understand how England's centrally procured and delivered EHR software was integrated within the work practices of users in selected secondary and specialist care settings. Methods We conducted a qualitative longitudinal case study-based investigation drawing on sociotechnical theory in three purposefully selected sites implementing early functionality of a nationally procured EHR system. The complete dataset comprised semi-structured interview data from a total of 66 different participants, 38.5 hours of non-participant observation of use of the software in context, accompanying researcher field notes, and hospital documents (including project initiation and lessons learnt reports. Transcribed data were analysed thematically using a combination of deductive and inductive approaches, and drawing on NVivo8 software to facilitate coding. Results The nationally led "top-down" implementation and the associated focus on interoperability limited the opportunity to customise software to local needs. Lack of system usability led users to employ a range of workarounds unanticipated by management to compensate for the perceived shortcomings of the system. These had a number of knock-on effects relating to the nature of collaborative work, patterns of communication, the timeliness and availability of records (including paper and the ability for hospital management to monitor organisational performance. Conclusions This work has highlighted the importance of addressing potentially adverse

  9. An Improved Digital Signature Protocol to Multi-User Broadcast Authentication Based on Elliptic Curve Cryptography in Wireless Sensor Networks (WSNs

    Directory of Open Access Journals (Sweden)

    Hamed Bashirpour

    2018-03-01

    Full Text Available In wireless sensor networks (WSNs, users can use broadcast authentication mechanisms to connect to the target network and disseminate their messages within the network. Since data transfer for sensor networks is wireless, as a result, attackers can easily eavesdrop deployed sensor nodes and the data sent between them or modify the content of eavesdropped data and inject false data into the sensor network. Hence, the implementation of the message authentication mechanisms (in order to avoid changes and injecting messages into the network of wireless sensor networks is essential. In this paper, we present an improved protocol based on elliptic curve cryptography (ECC to accelerate authentication of multi-user message broadcasting. In comparison with previous ECC-based schemes, complexity and computational overhead of proposed scheme is significantly decreased. Also, the proposed scheme supports user anonymity, which is an important property in broadcast authentication schemes for WSNs to preserve user privacy and user untracking.

  10. Xyce parallel electronic simulator : users' guide. Version 5.1.

    Energy Technology Data Exchange (ETDEWEB)

    Mei, Ting; Rankin, Eric Lamont; Thornquist, Heidi K.; Santarelli, Keith R.; Fixel, Deborah A.; Coffey, Todd Stirling; Russo, Thomas V.; Schiek, Richard Louis; Keiter, Eric Richard; Pawlowski, Roger Patrick

    2009-11-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been designed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas: (1) Capability to solve extremely large circuit problems by supporting large-scale parallel computing platforms (up to thousands of processors). Note that this includes support for most popular parallel and serial computers. (2) Improved performance for all numerical kernels (e.g., time integrator, nonlinear and linear solvers) through state-of-the-art algorithms and novel techniques. (3) Device models which are specifically tailored to meet Sandia's needs, including some radiation-aware devices (for Sandia users only). (4) Object-oriented code design and implementation using modern coding practices that ensure that the Xyce Parallel Electronic Simulator will be maintainable and extensible far into the future. Xyce is a parallel code in the most general sense of the phrase - a message passing parallel implementation - which allows it to run efficiently on the widest possible number of computing platforms. These include serial, shared-memory and distributed-memory parallel as well as heterogeneous platforms. Careful attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows. The development of Xyce provides a platform for computational research and development aimed specifically at the needs of the Laboratory. With Xyce, Sandia has an 'in-house' capability with which both new electrical (e.g., device model development) and algorithmic (e.g., faster time-integration methods, parallel solver algorithms) research and development can be performed. As a result, Xyce is a

  11. Xyce Parallel Electronic Simulator : users' guide, version 4.1.

    Energy Technology Data Exchange (ETDEWEB)

    Mei, Ting; Rankin, Eric Lamont; Thornquist, Heidi K.; Santarelli, Keith R.; Fixel, Deborah A.; Coffey, Todd Stirling; Russo, Thomas V.; Schiek, Richard Louis; Keiter, Eric Richard; Pawlowski, Roger Patrick

    2009-02-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been designed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas: (1) Capability to solve extremely large circuit problems by supporting large-scale parallel computing platforms (up to thousands of processors). Note that this includes support for most popular parallel and serial computers. (2) Improved performance for all numerical kernels (e.g., time integrator, nonlinear and linear solvers) through state-of-the-art algorithms and novel techniques. (3) Device models which are specifically tailored to meet Sandia's needs, including some radiation-aware devices (for Sandia users only). (4) Object-oriented code design and implementation using modern coding practices that ensure that the Xyce Parallel Electronic Simulator will be maintainable and extensible far into the future. Xyce is a parallel code in the most general sense of the phrase - a message passing parallel implementation - which allows it to run efficiently on the widest possible number of computing platforms. These include serial, shared-memory and distributed-memory parallel as well as heterogeneous platforms. Careful attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows. The development of Xyce provides a platform for computational research and development aimed specifically at the needs of the Laboratory. With Xyce, Sandia has an 'in-house' capability with which both new electrical (e.g., device model development) and algorithmic (e.g., faster time-integration methods, parallel solver algorithms) research and development can be performed. As a result, Xyce is a

  12. Signature scheme based on bilinear pairs

    Science.gov (United States)

    Tong, Rui Y.; Geng, Yong J.

    2013-03-01

    An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.

  13. Xyce parallel electronic simulator users guide, version 6.0.

    Energy Technology Data Exchange (ETDEWEB)

    Keiter, Eric R; Mei, Ting; Russo, Thomas V.; Schiek, Richard Louis; Thornquist, Heidi K.; Verley, Jason C.; Fixel, Deborah A.; Coffey, Todd S; Pawlowski, Roger P; Warrender, Christina E.; Baur, David Gregory.

    2013-08-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been designed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas: Capability to solve extremely large circuit problems by supporting large-scale parallel computing platforms (up to thousands of processors). This includes support for most popular parallel and serial computers. A differential-algebraic-equation (DAE) formulation, which better isolates the device model package from solver algorithms. This allows one to develop new types of analysis without requiring the implementation of analysis-specific device models. Device models that are specifically tailored to meet Sandias needs, including some radiationaware devices (for Sandia users only). Object-oriented code design and implementation using modern coding practices. Xyce is a parallel code in the most general sense of the phrase a message passing parallel implementation which allows it to run efficiently a wide range of computing platforms. These include serial, shared-memory and distributed-memory parallel platforms. Attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows.

  14. Xyce parallel electronic simulator users' guide, Version 6.0.1.

    Energy Technology Data Exchange (ETDEWEB)

    Keiter, Eric R; Mei, Ting; Russo, Thomas V.; Schiek, Richard Louis; Thornquist, Heidi K.; Verley, Jason C.; Fixel, Deborah A.; Coffey, Todd S; Pawlowski, Roger P; Warrender, Christina E.; Baur, David Gregory.

    2014-01-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been designed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas: Capability to solve extremely large circuit problems by supporting large-scale parallel computing platforms (up to thousands of processors). This includes support for most popular parallel and serial computers. A differential-algebraic-equation (DAE) formulation, which better isolates the device model package from solver algorithms. This allows one to develop new types of analysis without requiring the implementation of analysis-specific device models. Device models that are specifically tailored to meet Sandias needs, including some radiationaware devices (for Sandia users only). Object-oriented code design and implementation using modern coding practices. Xyce is a parallel code in the most general sense of the phrase a message passing parallel implementation which allows it to run efficiently a wide range of computing platforms. These include serial, shared-memory and distributed-memory parallel platforms. Attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows.

  15. Xyce parallel electronic simulator users guide, version 6.1

    Energy Technology Data Exchange (ETDEWEB)

    Keiter, Eric R; Mei, Ting; Russo, Thomas V.; Schiek, Richard Louis; Sholander, Peter E.; Thornquist, Heidi K.; Verley, Jason C.; Baur, David Gregory

    2014-03-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been designed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas; Capability to solve extremely large circuit problems by supporting large-scale parallel computing platforms (up to thousands of processors). This includes support for most popular parallel and serial computers; A differential-algebraic-equation (DAE) formulation, which better isolates the device model package from solver algorithms. This allows one to develop new types of analysis without requiring the implementation of analysis-specific device models; Device models that are specifically tailored to meet Sandia's needs, including some radiationaware devices (for Sandia users only); and Object-oriented code design and implementation using modern coding practices. Xyce is a parallel code in the most general sense of the phrase-a message passing parallel implementation-which allows it to run efficiently a wide range of computing platforms. These include serial, shared-memory and distributed-memory parallel platforms. Attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows.

  16. Xyce™ Parallel Electronic Simulator Users' Guide, Version 6.5.

    Energy Technology Data Exchange (ETDEWEB)

    Keiter, Eric R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Electrical Models and Simulation; Aadithya, Karthik V. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Electrical Models and Simulation; Mei, Ting [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Electrical Models and Simulation; Russo, Thomas V. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Electrical Models and Simulation; Schiek, Richard L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Electrical Models and Simulation; Sholander, Peter E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Electrical Models and Simulation; Thornquist, Heidi K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Electrical Models and Simulation; Verley, Jason C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Electrical Models and Simulation

    2016-06-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been designed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas: Capability to solve extremely large circuit problems by supporting large-scale parallel computing platforms (up to thousands of processors). This includes support for most popular parallel and serial computers. A differential-algebraic-equation (DAE) formulation, which better isolates the device model package from solver algorithms. This allows one to develop new types of analysis without requiring the implementation of analysis-specific device models. Device models that are specifically tailored to meet Sandia's needs, including some radiation- aware devices (for Sandia users only). Object-oriented code design and implementation using modern coding practices. Xyce is a parallel code in the most general sense of the phrase -- a message passing parallel implementation -- which allows it to run efficiently a wide range of computing platforms. These include serial, shared-memory and distributed-memory parallel platforms. Attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows. The information herein is subject to change without notice. Copyright © 2002-2016 Sandia Corporation. All rights reserved.

  17. Xyce Parallel Electronic Simulator Users' Guide Version 6.8

    Energy Technology Data Exchange (ETDEWEB)

    Keiter, Eric R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Aadithya, Karthik Venkatraman [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mei, Ting [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Russo, Thomas V. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Schiek, Richard L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sholander, Peter E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Thornquist, Heidi K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Verley, Jason C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-10-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been de- signed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas: Capability to solve extremely large circuit problems by supporting large-scale parallel com- puting platforms (up to thousands of processors). This includes support for most popular parallel and serial computers. A differential-algebraic-equation (DAE) formulation, which better isolates the device model package from solver algorithms. This allows one to develop new types of analysis without requiring the implementation of analysis-specific device models. Device models that are specifically tailored to meet Sandia's needs, including some radiation- aware devices (for Sandia users only). Object-oriented code design and implementation using modern coding practices. Xyce is a parallel code in the most general sense of the phrase$-$ a message passing parallel implementation $-$ which allows it to run efficiently a wide range of computing platforms. These include serial, shared-memory and distributed-memory parallel platforms. Attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows.

  18. Development of a Multispectral Signatures Database (MSD) for the Camouflage, Concealment, and Deception Design and Evaluation Environment (C2D2E2). Report 2. User's Manual

    National Research Council Canada - National Science Library

    Velazquez, Gerardo

    1997-01-01

    .... A single-user menu interface is provided for the management of the database. Some of the operational requirements that were defined for this user interface include: organizing and cataloging a large number of images; associating appropriate attribute, ground truth, and physical data with each image; associating images of the same scene in different spectral bands; and the ability to retrieve/display images and their respective data.

  19. Simulating signatures of two-dimensional electronic spectra of the Fenna-Matthews-Olson complex: By using a numerical path integral

    International Nuclear Information System (INIS)

    Liang, Xian-Ting

    2014-01-01

    A framework for simulating electronic spectra from photon-echo experiments is constructed by using a numerical path integral technique. This method is non-Markovian and nonperturbative and, more importantly, is not limited by a fixed form of the spectral density functions of the environment. Next, a two-dimensional (2D) third-order electronic spectrum of a dimer system is simulated. The spectrum is in agreement with the experimental and theoretical results previously reported [for example, M. Khalil, N. Demirdöven, and A. Tokmakoff, Phys. Rev. Lett. 90, 047401 (2003)]. Finally, a 2D third-order electronic spectrum of the Fenna-Matthews-Olson (FMO) complex is simulated by using the Debye, Ohmic, and Adolphs and Renger spectral density functions. It is shown that this method can clearly produce the spectral signatures of the FMO complex by using only the Adolphs and Renger spectral density function. Plots of the evolution of the diagonal and cross-peaks show that they are oscillating with the population time

  20. Comparison of user groups' perspectives of barriers and facilitators to implementing electronic health records: a systematic review

    Directory of Open Access Journals (Sweden)

    Leduc Yvan

    2011-04-01

    Full Text Available Abstract Background Electronic health record (EHR implementation is currently underway in Canada, as in many other countries. These ambitious projects involve many stakeholders with unique perceptions of the implementation process. EHR users have an important role to play as they must integrate the EHR system into their work environments and use it in their everyday activities. Users hold valuable, first-hand knowledge of what can limit or contribute to the success of EHR implementation projects. A comprehensive synthesis of EHR users' perceptions is key to successful future implementation. This systematic literature review was aimed to synthesize current knowledge of the barriers and facilitators influencing shared EHR implementation among its various users. Methods Covering a period from 1999 to 2009, a literature search was conducted on nine electronic databases. Studies were included if they reported on users' perceived barriers and facilitators to shared EHR implementation, in healthcare settings comparable to Canada. Studies in all languages with an empirical study design were included. Quality and relevance of the studies were assessed. Four EHR user groups were targeted: physicians, other health care professionals, managers, and patients/public. Content analysis was performed independently by two authors using a validated extraction grid with pre-established categorization of barriers and facilitators for each group of EHR users. Results Of a total of 5,695 potentially relevant publications identified, 117 full text publications were obtained after screening titles and abstracts. After review of the full articles, 60 publications, corresponding to 52 studies, met the inclusion criteria. The most frequent adoption factors common to all user groups were design and technical concerns, ease of use, interoperability, privacy and security, costs, productivity, familiarity and ability with EHR, motivation to use EHR, patient and health

  1. Dependence levels in users of electronic cigarettes, nicotine gums and tobacco cigarettes.

    Science.gov (United States)

    Etter, Jean-François; Eissenberg, Thomas

    2015-02-01

    To assess dependence levels in users of e-cigarettes, and compare them with dependence levels in users of nicotine gums and tobacco cigarettes. Self-reports from cross-sectional Internet and mail surveys. Comparisons of: (a) 766 daily users of nicotine-containing e-cigarettes with 30 daily users of nicotine-free e-cigarettes; (b) 911 former smokers who used the e-cigarette daily with 451 former smokers who used the nicotine gum daily (but no e-cigarette); (c) 125 daily e-cigarette users who smoked daily (dual users) with two samples of daily smokers who did not use e-cigarettes (2206 enrolled on the Internet and 292 enrolled by mail from the general population of Geneva). We used the Fagerström test for nicotine dependence, the nicotine dependence syndrome scale, the cigarette dependence scale and versions of these scales adapted for e-cigarettes and nicotine gums. Dependence ratings were slightly higher in users of nicotine-containing e-cigarettes than in users of nicotine-free e-cigarettes. In former smokers, long-term (>3 months) users of e-cigarettes were less dependent on e-cigarettes than long-term users of the nicotine gum were dependent on the gum. There were few differences in dependence ratings between short-term (≤3 months) users of gums or e-cigarettes. Dependence on e-cigarettes was generally lower in dual users than dependence on tobacco cigarettes in the two other samples of daily smokers. Some e-cigarette users were dependent on nicotine-containing e-cigarettes, but these products were less addictive than tobacco cigarettes. E-cigarettes may be as or less addictive than nicotine gums, which themselves are not very addictive. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  2. A Qualitative Evaluation of Contact Centre Dietitian Support and Electronic Motivational Messaging for eaTracker My Goals Users.

    Science.gov (United States)

    Lieffers, Jessica R L; Haresign, Helen; Mehling, Christine; Arocha, Jose F; Hanning, Rhona M

    2018-06-01

    To conduct a qualitative evaluation of adjunct supports (brief motivational messaging regarding goals delivered by email/website, contact centre dietitian assistance) offered by EatRight Ontario (ERO) for users of a website-based nutrition/activity goal setting/tracking feature (eaTracker "My Goals"). One-on-one semi-structured interviews were conducted with My Goals users in Ontario (n = 18) and Alberta (n = 5) recruited via the eaTracker website and ERO contact centre dietitians (n = 5). Interview transcripts were analyzed using content analysis. Participants had mixed experiences and perspectives with ERO motivational messaging. Messages targeted towards specific goals (e.g., tips, recipes) were generally well-liked, and generic messages (e.g., eaTracker login reminders) were less useful. No interviewed users had contacted ERO dietitians regarding goals, and dietitians reported encountering few callers asking for assistance while using My Goals. Limited user knowledge was one explanation for this finding. Participants provided suggestions to enhance these supports. Electronic motivational messaging and contact centre dietitian assistance have the potential to support achievement of goals set with website-based features. When considering using electronic messaging, researchers and practitioners should consider message content and delivery tailoring. Marketing that focuses on how contact centre dietitians can assist website users with their goals is needed when services are used in naturalistic settings.

  3. Radiation signatures

    International Nuclear Information System (INIS)

    McGlynn, S.P.; Varma, M.N.

    1992-01-01

    A new concept for modelling radiation risk is proposed. This concept is based on the proposal that the spectrum of molecular lesions, which we dub ''the radiation signature'', can be used to identify the quality of the causal radiation. If the proposal concerning radiation signatures can be established then, in principle, both prospective and retrospective risk determination can be assessed on an individual basis. A major goal of biophysical modelling is to relate physical events such as ionization, excitation, etc. to the production of radiation carcinogenesis. A description of the physical events is provided by track structure. The track structure is determined by radiation quality, and it can be considered to be the ''physical signature'' of the radiation. Unfortunately, the uniqueness characteristics of this signature are dissipated in biological systems in ∼10 -9 s. Nonetheless, it is our contention that this physical disturbance of the biological system eventuates later, at ∼10 0 s, in molecular lesion spectra which also characterize the causal radiation. (author)

  4. Xyce Parallel Electronic Simulator Users' Guide Version 6.7.

    Energy Technology Data Exchange (ETDEWEB)

    Keiter, Eric R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Aadithya, Karthik Venkatraman [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mei, Ting [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Russo, Thomas V. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Schiek, Richard [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sholander, Peter E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Thornquist, Heidi K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Verley, Jason [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-05-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been designed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas: Capability to solve extremely large circuit problems by supporting large-scale parallel com- puting platforms (up to thousands of processors). This includes support for most popular parallel and serial computers. A differential-algebraic-equation (DAE) formulation, which better isolates the device model package from solver algorithms. This allows one to develop new types of analysis without requiring the implementation of analysis-specific device models. Device models that are specifically tailored to meet Sandia's needs, including some radiation- aware devices (for Sandia users only). Object-oriented code design and implementation using modern coding practices. Xyce is a parallel code in the most general sense of the phrase -- a message passing parallel implementation -- which allows it to run efficiently a wide range of computing platforms. These include serial, shared-memory and distributed-memory parallel platforms. Attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows. The information herein is subject to change without notice. Copyright c 2002-2017 Sandia Corporation. All rights reserved. Trademarks Xyce TM Electronic Simulator and Xyce TM are trademarks of Sandia Corporation. Orcad, Orcad Capture, PSpice and Probe are registered trademarks of Cadence Design Systems, Inc. Microsoft, Windows and Windows 7 are registered trademarks of Microsoft Corporation. Medici, DaVinci and Taurus are registered trademarks of Synopsys Corporation. Amtec and TecPlot are trademarks of

  5. Electronic surveillance systems in infection prevention: organizational support, program characteristics, and user satisfaction.

    Science.gov (United States)

    Grota, Patti G; Stone, Patricia W; Jordan, Sarah; Pogorzelska, Monika; Larson, Elaine

    2010-09-01

    The use of electronic surveillance systems (ESSs) is gradually increasing in infection prevention and control programs. Little is known about the characteristics of hospitals that have a ESS, user satisfaction with ESSs, and organizational support for implementation of ESSs. A total of 350 acute care hospitals in California were invited to participate in a Web-based survey; 207 hospitals (59%) agreed to participate. The survey included a description of infection prevention and control department staff, where and how they spent their time, a measure of organizational support for infection prevention and control, and reported experience with ESSs. Only 23% (44/192) of responding infection prevention and control departments had an ESS. No statistically significant difference was seen in how and where infection preventionists (IPs) who used an ESS and those who did not spend their time. The 2 significant predictors of whether an ESS was present were score on the Organizational Support Scale (odds ratio [OR], 1.10; 95% confidence interval [CI], 1.02-1.18) and hospital bed size (OR, 1.004; 95% CI, 1.00-1.007). Organizational support also was positively correlated with IP satisfaction with the ESS, as measured on the Computer Usability Scale (P = .02). Despite evidence that such systems may improve efficiency of data collection and potentially improve patient outcomes, ESSs remain relatively uncommon in infection prevention and control programs. Based on our findings, organizational support appears to be a major predictor of the presence, use, and satisfaction with ESSs in infection prevention and control programs.

  6. Electronic surveillance systems in infection prevention: Organizational support, program characteristics, and user satisfaction

    Science.gov (United States)

    Grota, Patti G.; Stone, Patricia W.; Jordan, Sarah; Pogorzelska, Monika; Larson, Elaine

    2012-01-01

    Background The use of electronic surveillance systems (ESSs) is gradually increasing in infection prevention and control programs. Little is known about the characteristics of hospitals that have a ESS, user satisfaction with ESSs, and organizational support for implementation of ESSs. Methods A total of 350 acute care hospitals in California were invited to participate in a Web-based survey; 207 hospitals (59%) agreed to participate. The survey included a description of infection prevention and control department staff, where and how they spent their time, a measure of organizational support for infection prevention and control, and reported experience with ESSs. Results Only 23% (44/192) of responding infection prevention and control departments had an ESS. No statistically significant difference was seen in how and where infection preventionists (IPs) who used an ESS and those who did not spend their time. The 2 significant predictors of whether an ESS was present were score on the Organizational Support Scale (odds ratio [OR], 1.10; 95% confidence interval [CI], 1.02-1.18) and hospital bed size (OR, 1.004; 95% CI, 1.00-1.007). Organizational support also was positively correlated with IP satisfaction with the ESS, as measured on the Computer Usability Scale (P = .02). Conclusion Despite evidence that such systems may improve efficiency of data collection and potentially improve patient outcomes, ESSs remain relatively uncommon in infection prevention and control programs. Based on our findings, organizational support appears to be a major predictor of the presence, use, and satisfaction with ESSs in infection prevention and control programs. PMID:20176411

  7. Quantum multi-signature protocol based on teleportation

    International Nuclear Information System (INIS)

    Wen Xiao-jun; Liu Yun; Sun Yu

    2007-01-01

    In this paper, a protocol which can be used in multi-user quantum signature is proposed. The scheme of signature and verification is based on the correlation of Greenberger-Horne-Zeilinger (GHZ) states and the controlled quantum teleportation. Different from the digital signatures, which are based on computational complexity, the proposed protocol has perfect security in the noiseless quantum channels. Compared to previous quantum signature schemes, this protocol can verify the signature independent of an arbitrator as well as realize multi-user signature together. (orig.)

  8. Xyce Parallel Electronic Simulator Users' Guide Version 6.6.

    Energy Technology Data Exchange (ETDEWEB)

    Keiter, Eric R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Aadithya, Karthik Venkatraman [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mei, Ting [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Russo, Thomas V. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Schiek, Richard [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sholander, Peter E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Thornquist, Heidi K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Verley, Jason [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-11-01

    This manual describes the use of the Xyce Parallel Electronic Simulator. Xyce has been de- signed as a SPICE-compatible, high-performance analog circuit simulator, and has been written to support the simulation needs of the Sandia National Laboratories electrical designers. This development has focused on improving capability over the current state-of-the-art in the following areas: Capability to solve extremely large circuit problems by supporting large-scale parallel com- puting platforms (up to thousands of processors). This includes support for most popular parallel and serial computers. A differential-algebraic-equation (DAE) formulation, which better isolates the device model package from solver algorithms. This allows one to develop new types of analysis without requiring the implementation of analysis-specific device models. Device models that are specifically tailored to meet Sandia's needs, including some radiation- aware devices (for Sandia users only). Object-oriented code design and implementation using modern coding practices. Xyce is a parallel code in the most general sense of the phrase -- a message passing parallel implementation -- which allows it to run efficiently a wide range of computing platforms. These include serial, shared-memory and distributed-memory parallel platforms. Attention has been paid to the specific nature of circuit-simulation problems to ensure that optimal parallel efficiency is achieved as the number of processors grows. The information herein is subject to change without notice. Copyright c 2002-2016 Sandia Corporation. All rights reserved. Acknowledgements The BSIM Group at the University of California, Berkeley developed the BSIM3, BSIM4, BSIM6, BSIM-CMG and BSIM-SOI models. The BSIM3 is Copyright c 1999, Regents of the University of California. The BSIM4 is Copyright c 2006, Regents of the University of California. The BSIM6 is Copyright c 2015, Regents of the University of California. The BSIM-CMG is Copyright c

  9. Use and User Perception of Electronic Information Resources: A Case Study of Siva Institute of Frontier Technology, India

    Directory of Open Access Journals (Sweden)

    Velmurugan Chandran

    2013-12-01

    Full Text Available The present study aims to explore the use and user perception of electronic resources in Siva Institute of Frontier Technology, India. A total number of 123 users were taken into account for the study through a questionnaire-based survey method. A well-structured questionnaire was designed and distributed to the selected 200 students and staff members. 123 copies of the questionnaires were returned dully filled in and the overall response rate was 61.50 percent. The questionnaire contained both open- and close-ended questions. The collected data were classified, analyzed, and tabulated by using simple statistical methods. This study covers the impact of electronic resources on students and faculty in their academic pursuit.

  10. Analysis of the crystallographic signature of electron beam welds in Cu: implications for variations in etching characteristics

    Energy Technology Data Exchange (ETDEWEB)

    Trimby, Patrick (Oxford Instruments Nordiska AB, Lidingoe (Sweden))

    2009-06-15

    The proposed design for the long term disposal of radioactive waste in Sweden involves the use of corrosion-resistant copper containers. The manufacture of these containers involves the welding of forged lids onto fabricated copper tubes; however, it has been reported (SKB report TR-02-07) that the grain sizes obtained in the lids and bottoms is much coarser than in the side walls (the tubes). The electro beam welding (EBW) of the lids onto the tubes also produces significant grain coarsening, as well as the growth of intermetallic phases at grain boundaries (SKB report TR-06-01). One of the fundamental questions regarding the suitability of these containers concerns the distribution and nature of corrosion at the lid-wall interface. Previous studies have focused on the possibility of grain boundary corrosion, and have concluded that the boundary corrosion is limited and is not likely to adversely affect the properties of the containers. However, differences in the corrosion/etching characteristics between the lid, the wall and the weld areas are observed. The cylinder wall shows reduced boundary etching compared to the weld area and the cylinder lid. This preliminary study investigates whether these differences can be explained by the crystallographic characteristics of the copper in these regions. A single sample, taken from an electron beam welded canister lid, was analysed using electron backscattered diffraction: a summary of the results from this study and some preliminary conclusions are presented in this report

  11. A study of user requests regarding the fully electronic health record system at Seoul National University Bundang Hospital: challenges for future electronic health record systems.

    Science.gov (United States)

    Yoo, Sooyoung; Kim, Seok; Lee, Seungja; Lee, Kee-Hyuck; Baek, Rong-Min; Hwang, Hee

    2013-05-01

    Although the adoption rates for Electronic Health Records (EHRs) are growing, significant opportunities for further advances in EHR system design remain. The goal of this study was to identify issues that should be considered in the design process for the successful development of future systems by analyzing end users' service requests gathered during a recent three-year period after a comprehensive EHR system was implemented at Seoul National University's Bundang Hospital in South Korea. Data on 11,400 service requests from end users of the EHR system made from 2008 through 2010 were used in this study. The requests were categorized as program modification/development, data request, insurance-fee identification/generation, patient-record merging, or other. The authors further subcategorized the requests for program modification/development into the following nine areas of concern: (1) indicators and statistics, (2) patient safety and quality of care, (3) special task-oriented functionalities, (4) ease of use and user interface, (5) system speed, (6) interoperability and integration, (7) privacy and security, (8) customer service, and (9) miscellaneous. The system users were divided into four groups--direct care, care support, administrative/insurance, and general management--to identify each group's needs and concerns. The service requests for program modification/development, data request, insurance-fee identification/generation, patient-record merging, and other issues constituted approximately 49.2%, 33.9%, 11.4%, 4.0%, and 1.5% of the total data set, respectively. The number of data-request service requests grew over the three years studied. Different groups of users were found to have different concerns according to their activities and tasks. Within the program-modification/development category, end users were most frequently concerned with ease of use and user interface (38.1% of the total) and special task-oriented functionalities (29.3% of the total) in

  12. Readability Formulas and User Perceptions of Electronic Health Records Difficulty: A Corpus Study.

    Science.gov (United States)

    Zheng, Jiaping; Yu, Hong

    2017-03-02

    Electronic health records (EHRs) are a rich resource for developing applications to engage patients and foster patient activation, thus holding a strong potential to enhance patient-centered care. Studies have shown that providing patients with access to their own EHR notes may improve the understanding of their own clinical conditions and treatments, leading to improved health care outcomes. However, the highly technical language in EHR notes impedes patients' comprehension. Numerous studies have evaluated the difficulty of health-related text using readability formulas such as Flesch-Kincaid Grade Level (FKGL), Simple Measure of Gobbledygook (SMOG), and Gunning-Fog Index (GFI). They conclude that the materials are often written at a grade level higher than common recommendations. The objective of our study was to explore the relationship between the aforementioned readability formulas and the laypeople's perceived difficulty on 2 genres of text: general health information and EHR notes. We also validated the formulas' appropriateness and generalizability on predicting difficulty levels of highly complex technical documents. We collected 140 Wikipedia articles on diabetes and 242 EHR notes with diabetes International Classification of Diseases, Ninth Revision code. We recruited 15 Amazon Mechanical Turk (AMT) users to rate difficulty levels of the documents. Correlations between laypeople's perceived difficulty levels and readability formula scores were measured, and their difference was tested. We also compared word usage and the impact of medical concepts of the 2 genres of text. The distributions of both readability formulas' scores (Preadability predictions and laypeople's perceptions were weak. Furthermore, despite being graded at similar levels, documents of different genres were still perceived with different difficulty (Preadability formulas' predictions did not align with perceived difficulty in either text genre. The widely used readability formulas were

  13. Time Series Based for Online Signature Verification

    Directory of Open Access Journals (Sweden)

    I Ketut Gede Darma Putra

    2013-11-01

    Full Text Available Signature verification system is to match the tested signature with a claimed signature. This paper proposes time series based for feature extraction method and dynamic time warping for match method. The system made by process of testing 900 signatures belong to 50 participants, 3 signatures for reference and 5 signatures from original user, simple imposters and trained imposters for signatures test. The final result system was tested with 50 participants with 3 references. This test obtained that system accuracy without imposters is 90,44897959% at threshold 44 with rejection errors (FNMR is 5,2% and acceptance errors (FMR is 4,35102%, when with imposters system accuracy is 80,1361% at threshold 27 with error rejection (FNMR is 15,6% and acceptance errors (average FMR is 4,263946%, with details as follows: acceptance errors is 0,391837%, acceptance errors simple imposters is 3,2% and acceptance errors trained imposters is 9,2%.

  14. Anything but engaged: user involvement in the context of a national electronic health record implementation

    Directory of Open Access Journals (Sweden)

    Kathrin Cresswell

    2011-07-01

    Conclusions This work has allowed us to further develop an existing model of user engagement from the commercial sector and adapt it to inform user engagement in the context of large-scale eHealth implementations. By identifying key points of possible engagement, disengagement and re-engagement, this model will we hope both help those planning similar large-scale EHR implementation efforts and act as a much needed catalyst to further research in this neglected field of enquiry.

  15. [Views of health system administrators, professionals, and users concerning the electronic health record and facilitators and obstacles to its implementation].

    Science.gov (United States)

    Costa, Jose Felipe Riani; Portela, Margareth Crisóstomo

    2018-02-05

    The design and deployment of complex technologies like the electronic health record (EHR) involve technical, personal, social, and organizational issues. The Brazilian public and private scenario includes different local and regional initiatives for implementation of the electronic health record. The Brazilian Ministry of Health also has a proposal to develop a national EHR. The current study aimed to provide a comprehensive view of perceptions by health system administrators, professionals, and users concerning their experiences with the electronic health record and their opinions of the possibility of developing a national EHR. This qualitative study involved 28 semi-structured interviews. The results revealed both the diversity of factors that can influence the implementation of an electronic health record and the existence of convergences and aspects that tend to be valued differently according to the different points of view. Key aspects include discussions on the electronic health record's attributes and it impact on healthcare, especially in the case of local electronic health records, concerns over costs and confidentiality and privacy pertaining to electronic health records in general, and the possible implications of centralized versus decentralized data storage in the case of a national EHR. The interviews clearly showed the need to establish more effective communication among the various stakeholders, and that the different perspectives should be considered when drafting and deploying an EHR at the local, regional, and national levels.

  16. Quantum discord and classical correlation signatures of mobility edges in one-dimensional aperiodic single-electron systems

    International Nuclear Information System (INIS)

    Gong, Longyan; Zhu, Hao; Zhao, Shengmei; Cheng, Weiwen; Sheng, Yubo

    2012-01-01

    We investigate numerically the quantum discord and the classical correlation in a one-dimensional slowly varying potential model and a one-dimensional Soukoulis–Economou ones, respectively. There are well-defined mobility edges in the slowly varying potential model, while there are discrepancies on mobility edges in the Soukoulis–Economou ones. In the slowly varying potential model, we find that extended and localized states can be distinguished by both the quantum discord and the classical correlation. There are sharp transitions in the quantum discord and the classical correlation at mobility edges. Based on these, we study “mobility edges” in the Soukoulis–Economou model using the quantum discord and the classical correlation, which gives another perspectives for these “mobility edges”. All these provide us good quantities, i.e., the quantum discord and the classical correlation, to reflect mobility edges in these one-dimensional aperiodic single-electron systems. Moreover, our studies propose a consistent interpretation of the discrepancies between previous numerical results about the Soukoulis–Economou model. -- Highlights: ► Quantum discord and classical correlation can signal mobility edges in two models. ► An interpretation for mobility edges in the Soukoulis–Economou model is proposed. ► Quantum discord and classical correlation can reflect well localization properties.

  17. Electronic cigarette use among cancer patients: Characteristics of e-cigarette users and their smoking cessation outcomes

    Science.gov (United States)

    Borderud, Sarah P.; Li, Yuelin; Burkhalter, Jack; Sheffer, Christine E.; Ostroff, Jamie S.

    2017-01-01

    Background Given that continued smoking after a cancer diagnosis increases the risk for adverse health outcomes, cancer patients are strongly advised to quit. Despite a current lack of evidence regarding their safety and effectiveness as a cessation tool, electronic cigarettes (e-cigarettes) are becoming increasingly popular. In order to guide oncologists’ communication with their patients about e-cigarette use, this paper provides the first published clinical data about e-cigarette use and cessation outcomes among cancer patients. Methods Participants (n=1074) included smokers (cancer patients) who recently enrolled in a tobacco treatment program at a comprehensive cancer center. Standard demographic, tobacco use history and follow-up cessation outcomes were assessed. Results A threefold increase in e-cigarette use was observed from 2012 to 2013 (10.6% vs. 38.5%). E-cigarette users were more nicotine dependent than non-users, had more prior quit attempts, and were more likely to be diagnosed with thoracic and head or neck cancers. Using a complete case analysis, e-cigarette users were as likely to be smoking at follow-up as non-users, (OR: 1.0; 95%CI 0.5–1.7). Using an intention to treat analysis, e-cigarette users were twice as likely to be smoking at follow-up as non-users, (OR: 2.0; 95%CI 1.2–3.3). Conclusions The high rate of e-cigarette use observed is consistent with recent papers highlighting increased e-cigarette use in the general population. Our longitudinal findings raise doubt about the utility of e-cigarettes for facilitating smoking cessation among cancer patients. Further research is needed to evaluate the safety and efficacy of e-cigarettes as a cessation treatment for cancer patients. PMID:25252116

  18. Online Signature Verification on MOBISIG Finger-Drawn Signature Corpus

    Directory of Open Access Journals (Sweden)

    Margit Antal

    2018-01-01

    Full Text Available We present MOBISIG, a pseudosignature dataset containing finger-drawn signatures from 83 users captured with a capacitive touchscreen-based mobile device. The database was captured in three sessions resulting in 45 genuine signatures and 20 skilled forgeries for each user. The database was evaluated by two state-of-the-art methods: a function-based system using local features and a feature-based system using global features. Two types of equal error rate computations are performed: one using a global threshold and the other using user-specific thresholds. The lowest equal error rate was 0.01% against random forgeries and 5.81% against skilled forgeries using user-specific thresholds that were computed a posteriori. However, these equal error rates were significantly raised to 1.68% (random forgeries case and 14.31% (skilled forgeries case using global thresholds. The same evaluation protocol was performed on the DooDB publicly available dataset. Besides verification performance evaluations conducted on the two finger-drawn datasets, we evaluated the quality of the samples and the users of the two datasets using basic quality measures. The results show that finger-drawn signatures can be used by biometric systems with reasonable accuracy.

  19. A communicational framework for evaluating interaction with IT by analyzing user-reception of electronic texts

    DEFF Research Database (Denmark)

    Wentzer, Helle

    2006-01-01

    Interpreting IT as a medium for continuous communication across time and place of the communicators offers a way of analyzing the effect of IT in concrete practices. The users’ readings determine the actual communication with IT. A poetics of how meaning is translated from one person to another...... through semiotic texts is presented, termed the poetics of the e-text. The poetics of the e-text offers a meta-communicational framework for identifying user constraints in the possibilities of interacting with the system. Identifying communicational problems with ICT-mediated interactions again offer...... grounds for redesigning and re-author the e-text. The poetics of the e-text are subsequently applied as a method of analyzing user-reception and evaluating the interaction with ICT. Examples are given from user-receptions of collaborating with ICT in home care, Denmark....

  20. Characteristics of users and usage of different types of electronic cigarettes: findings from an online survey.

    Science.gov (United States)

    Etter, Jean-François

    2016-04-01

    Studying users of e-cigarettes is important to help determine whether these devices aid smoking cessation. Obtaining data in representative samples is difficult, but online surveys of users may begin to build a picture. Therefore, this study aimed, through a large online survey, to describe usage and characteristics of users of e-cigarettes. Cross-sectional internet survey between 2012 and 2014. A total of 2807 current e-cigarette users enrolled via e-cigarette and smoking cessation websites, who lived in France (n = 988), the United States (n = 579), Switzerland (n = 310), the United Kingdom (n = 143) and other countries (n = 787). Type of e-cigarette used: pre-filled cartridges (n = 71), unmodified refillable tanks (n = 758), modified refillable tanks (n = 392), patterns of use, perceived effects. Pre-filled models were perceived to be less effective than unmodified refillable tanks for smoking cessation by former smokers ('definitely helped': 74% vs. 94%, P Addiction.

  1. Using Web Server Logs to Track Users through the Electronic Forest

    Science.gov (United States)

    Coombs, Karen A.

    2005-01-01

    This article analyzes server logs, providing helpful information in making decisions about Web-based services. The author indicates, as a result of analyzing server logs, several interesting things about the users' behavior were learned. The resulting findings are discussed in this article. Certain pages of the author's Web site, for instance, are…

  2. Possibilities of dynamic biometrics for authentication and the circumstances for using dynamic biometric signature

    Directory of Open Access Journals (Sweden)

    Frantisek Hortai

    2018-01-01

    Full Text Available New information technologies alongside their benefits also bring new dangers with themselves. It is difficult to decide which authentication tool to use and implement in the information systems and electronic documents. The final decision has to compromise among the facts that it faces several conflicting requirements: highly secure tool, to be a user-friendly and user simplicity method, ensure protection against errors and failures of users, speed of authentication and provide these features for a reasonable price. Even when the compromised solution is found it has to fulfill the given technology standards. For the listed reasons the paper argues one of the most natural biometric authentication method the dynamic biometric signature and lists its related standards. The paper also includes measurement evaluation which solves the independence between the person’s signature and device on which it was created

  3. A Conceptual Model for Increasing Use of Electronic Medical Records by Primary Care Physicians Through End-User Support.

    Science.gov (United States)

    Randhawa, Gurprit K

    2017-01-01

    A conceptual model for exploring the relationship between end-user support (EUS) and electronic medical record (EMR) use by primary care physicians is presented. The model was developed following a review of conceptual and theoretical frameworks related to technology adoption/use and EUS. The model includes (a) one core construct (facilitating conditions), (b) four antecedents and one postcedent of facilitating conditions, and (c) four moderators. EMR use behaviour is the key outcome of the model. The proposed conceptual model should be tested. The model may be used to inform planning and decision-making for EMR implementations to increase EMR use for benefits realization.

  4. An exploration of online behaviors and social media use among hookah and electronic-cigarette users

    Directory of Open Access Journals (Sweden)

    Alissa R. Link

    2015-12-01

    Conclusions: Hookah and ENDS users actively use the Internet and social media to obtain and share information about nicotine/tobacco products. Study participants who use hookah were more likely to share photos and discuss hookah related activities via social media than those who use ENDS. Social networks also represent valuable and untapped potential resources for communicating with this group about risks and harm reduction related to emerging nicotine/tobacco products.

  5. New Extraterrestrial Signature of the Insoluble Organic Matter of the Orgueil, Murchison and Tagish Lake Meteorites as Revealed by Electron Paramagnetic Resonance

    Science.gov (United States)

    Binet, L.; Gourier, D.; Derenne, S.; Robert, F.; Ciofini, I.

    2003-03-01

    EPR of the insoluble organic matter (IOM) of three chondrites revealed heterogeneously spread radicals including diradicaloids. These features not observed in terrestrial kerogens appear as an extraterrestrial signature of the chondritic IOM.

  6. Community-Based Study Recruitment of American Indian Cigarette Smokers and Electronic Cigarette Users.

    Science.gov (United States)

    Carroll, Dana Mowls; Brame, Lacy S; Stephens, Lancer D; Wagener, Theodore L; Campbell, Janis E; Beebe, Laura A

    2018-02-01

    Data on the effectiveness of strategies for the recruitment of American Indians (AIs) into research is needed. This study describes and compares methods for identifying and recruiting AI tobacco users into a pilot study. Community-based strategies were used to recruit smokers (n = 35), e-cigarette users (n = 28), and dual users (n = 32) of AI descent. Recruitment was considered proactive if study staff contacted the individual at a pow wow, health fair, or vape shop and participation on-site or reactive if the individual contacted the study staff and participation occurred later. Screened, eligible, participated and costs and time spent were compared with Chi square tests. To understand AI descent, the relationship between number of AI grandparents and AI blood quantum was examined. Number of participants screened via the proactive strategy was similar to the reactive strategy (n = 84 vs. n = 82; p-value = 0.8766). A significantly greater proportion of individuals screened via the proactive than the reactive strategy were eligible (77 vs. 50%; p-value = 0.0002) and participated (75 vs. 39%; p-value = < 0.0001). Per participant cost and time estimated for the proactive strategy was $89 and 87 min compared to $79 and 56 min for the reactive strategy. Proportion at least half AI blood quantum was 32, 33, and 70% among those with 2, 3, and 4 AI grandparents, respectively (p = 0.0017). Proactive strategies resulted in two-thirds of the sample, but required more resources than reactive strategies. Overall, we found both strategies were feasible and resulted in the ability to reach sample goals. Lastly, number of AI biological grandparents may be a good, non-invasive indicator of AI blood quantum.

  7. The perceived effects of electronic cigarettes on health by adult users: A state of the science systematic literature review.

    Science.gov (United States)

    Tomashefski, Amy

    2016-09-01

    There is a lack of research on perceived health effects of electronic cigarettes by adult users. Because more people are choosing electronic cigarettes (e-cigarettes) in addition to, or instead of traditional cigarettes, it is important for the nurse practitioner (NP) to understand why. A comprehensive literature search was conducted using four scholarly databases. The search strategy utilized remained consistent. Qualitative, quantitative, observational studies and meta-analyses were considered for review. Of the 52 articles preliminarily retrieved, 9 met inclusion criteria and were analyzed. The majority of e-cigarette users perceive they are less harmful to health than traditional cigarettes. One reason for use is smoking cessation. Current guidelines recommend against promoting e-cigarette use. More research is needed on the long-term health effects of e-cigarettes as well as regulatory statements to guide future healthcare practice. As prevalence of e-cigarette use increases, it is important for NPs to understand the perceived effects on health by adults who use them and, specifically, how these perceptions motivate use. Armed with this information, the NP can communicate with patients about e-cigarettes, confidently recommend against their use, and begin discussions about reliable smoking cessation tools and resources that will help patients achieve their goals. ©2016 American Association of Nurse Practitioners.

  8. Second Line of Defense: Electronic Maintenance Reports, Local Maintenance Provider User Guide, Rev. 3

    Energy Technology Data Exchange (ETDEWEB)

    Leigh, Richard J.

    2012-09-01

    The Electronic Maintenance Report forms allow Local Maintenance Providers (LMP) and other program staff to enter maintenance information into a simple and secure system. This document describes the features and information required to complete the Maintenance Report forms. It is expected that all Corrective Maintenance Reports from LMPs will be submitted electronically into the SLD Portal. As an exception (e.g., when access to the SLD Portal is unavailable), Maintenance Reports can be submitted via a secure Adobe PDF form available through the Sustainability Manager assigned to each country.

  9. Development and empirical user-centered evaluation of semantically-based query recommendation for an electronic health record search engine.

    Science.gov (United States)

    Hanauer, David A; Wu, Danny T Y; Yang, Lei; Mei, Qiaozhu; Murkowski-Steffy, Katherine B; Vydiswaran, V G Vinod; Zheng, Kai

    2017-03-01

    The utility of biomedical information retrieval environments can be severely limited when users lack expertise in constructing effective search queries. To address this issue, we developed a computer-based query recommendation algorithm that suggests semantically interchangeable terms based on an initial user-entered query. In this study, we assessed the value of this approach, which has broad applicability in biomedical information retrieval, by demonstrating its application as part of a search engine that facilitates retrieval of information from electronic health records (EHRs). The query recommendation algorithm utilizes MetaMap to identify medical concepts from search queries and indexed EHR documents. Synonym variants from UMLS are used to expand the concepts along with a synonym set curated from historical EHR search logs. The empirical study involved 33 clinicians and staff who evaluated the system through a set of simulated EHR search tasks. User acceptance was assessed using the widely used technology acceptance model. The search engine's performance was rated consistently higher with the query recommendation feature turned on vs. off. The relevance of computer-recommended search terms was also rated high, and in most cases the participants had not thought of these terms on their own. The questions on perceived usefulness and perceived ease of use received overwhelmingly positive responses. A vast majority of the participants wanted the query recommendation feature to be available to assist in their day-to-day EHR search tasks. Challenges persist for users to construct effective search queries when retrieving information from biomedical documents including those from EHRs. This study demonstrates that semantically-based query recommendation is a viable solution to addressing this challenge. Published by Elsevier Inc.

  10. Throat hit in users of the electronic cigarette: An exploratory study.

    Science.gov (United States)

    Etter, Jean-François

    2016-02-01

    A cross-sectional survey on the Internet in 2012-2014 was used to study the "throat hit," the specific sensation in the throat felt by users of e-cigarettes. Participants were 1672 current users of e-cigarettes, visitors of Websites dedicated to e-cigarettes and to smoking cessation. It was assessed whether the strength of the throat hit was associated with the characteristics of e-cigarettes and e-liquids, modifications of the devices, patterns of use, reasons for use, satisfaction with e-cigarettes, dependence on e-cigarettes, smoking behavior, and perceived effects on smoking. The strongest throat hit was obtained by using better-quality models and liquids with high nicotine content. Those who reported a "very strong" throat hit used liquids with 17.3 mg/mL nicotine, versus 7.1 mg/mL for those reporting a "very weak" hit (p e-cigarette models that provide high levels of nicotine, a strong throat hit, high satisfaction, and more effects on smoking, but may also be addictive, and models than contain less nicotine and are less addictive, but produce a weaker throat hit, are less satisfactory, and are possibly less efficient at helping people quit smoking. This trade-off must be kept in mind when regulating e-cigarettes. (c) 2016 APA, all rights reserved).

  11. Second Line of Defense Help Desk: Electronic Maintenance Reports - Local Maintenance Provider User Guide Rev. 1

    Energy Technology Data Exchange (ETDEWEB)

    Leigh, Richard J.

    2011-12-14

    The Electronic Maintenance Report forms present a uniform dataset for analysis of Sustainability metrics. These forms collect readily minable data while allowing the attachment of site-specific checklists or other supporting files for review by the Sustainability Manager and Program Management.

  12. Quantum messages with signatures forgeable in arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Kim, Taewan; Choi, Jeong Woon; Jho, Nam-Su; Lee, Soojoon

    2015-01-01

    Even though a method to perfectly sign quantum messages has not been known, the arbitrated quantum signature scheme has been considered as one of the good candidates. However, its forgery problem has been an obstacle to the scheme becoming a successful method. In this paper, we consider one situation, which is slightly different from the forgery problem, that we use to check whether at least one quantum message with signature can be forged in a given scheme, although all the messages cannot be forged. If there are only a finite number of forgeable quantum messages in the scheme, then the scheme can be secured against the forgery attack by not sending forgeable quantum messages, and so our situation does not directly imply that we check whether the scheme is secure against the attack. However, if users run a given scheme without any consideration of forgeable quantum messages, then a sender might transmit such forgeable messages to a receiver and in such a case an attacker can forge the messages if the attacker knows them. Thus it is important and necessary to look into forgeable quantum messages. We show here that there always exists such a forgeable quantum message-signature pair for every known scheme with quantum encryption and rotation, and numerically show that there are no forgeable quantum message-signature pairs that exist in an arbitrated quantum signature scheme. (paper)

  13. SIGNATURE: A workbench for gene expression signature analysis

    Directory of Open Access Journals (Sweden)

    Chang Jeffrey T

    2011-11-01

    Full Text Available Abstract Background The biological phenotype of a cell, such as a characteristic visual image or behavior, reflects activities derived from the expression of collections of genes. As such, an ability to measure the expression of these genes provides an opportunity to develop more precise and varied sets of phenotypes. However, to use this approach requires computational methods that are difficult to implement and apply, and thus there is a critical need for intelligent software tools that can reduce the technical burden of the analysis. Tools for gene expression analyses are unusually difficult to implement in a user-friendly way because their application requires a combination of biological data curation, statistical computational methods, and database expertise. Results We have developed SIGNATURE, a web-based resource that simplifies gene expression signature analysis by providing software, data, and protocols to perform the analysis successfully. This resource uses Bayesian methods for processing gene expression data coupled with a curated database of gene expression signatures, all carried out within a GenePattern web interface for easy use and access. Conclusions SIGNATURE is available for public use at http://genepattern.genome.duke.edu/signature/.

  14. Research on a New Signature Scheme on Blockchain

    Directory of Open Access Journals (Sweden)

    Chao Yuan

    2017-01-01

    Full Text Available With the rise of Bitcoin, blockchain which is the core technology of Bitcoin has received increasing attention. Privacy preserving and performance on blockchain are two research points in academia and business, but there are still some unresolved issues in both respects. An aggregate signature scheme is a digital signature that supports making signatures on many different messages generated by many different users. Using aggregate signature, the size of the signature could be shortened by compressing multiple signatures into a single signature. In this paper, a new signature scheme for transactions on blockchain based on the aggregate signature was proposed. It was worth noting that elliptic curve discrete logarithm problem and bilinear maps played major roles in our signature scheme. And the security properties of our signature scheme were proved. In our signature scheme, the amount will be hidden especially in the transactions which contain multiple inputs and outputs. Additionally, the size of the signature on transaction is constant regardless of the number of inputs and outputs that the transaction contains, which can improve the performance of signature. Finally, we gave an application scenario for our signature scheme which aims to achieve the transactions of big data on blockchain.

  15. Clinician user involvement in the real world: Designing an electronic tool to improve interprofessional communication and collaboration in a hospital setting.

    Science.gov (United States)

    Tang, Terence; Lim, Morgan E; Mansfield, Elizabeth; McLachlan, Alexander; Quan, Sherman D

    2018-02-01

    User involvement is vital to the success of health information technology implementation. However, involving clinician users effectively and meaningfully in complex healthcare organizations remains challenging. The objective of this paper is to share our real-world experience of applying a variety of user involvement methods in the design and implementation of a clinical communication and collaboration platform aimed at facilitating care of complex hospitalized patients by an interprofessional team of clinicians. We designed and implemented an electronic clinical communication and collaboration platform in a large community teaching hospital. The design team consisted of both technical and healthcare professionals. Agile software development methodology was used to facilitate rapid iterative design and user input. We involved clinician users at all stages of the development lifecycle using a variety of user-centered, user co-design, and participatory design methods. Thirty-six software releases were delivered over 24 months. User involvement has resulted in improvement in user interface design, identification of software defects, creation of new modules that facilitated workflow, and identification of necessary changes to the scope of the project early on. A variety of user involvement methods were complementary and benefited the design and implementation of a complex health IT solution. Combining these methods with agile software development methodology can turn designs into functioning clinical system to support iterative improvement. Copyright © 2017 The Authors. Published by Elsevier B.V. All rights reserved.

  16. Particle doses in the pulmonary lobes of electronic and conventional cigarette users

    International Nuclear Information System (INIS)

    Manigrasso, Maurizio; Buonanno, Giorgio; Stabile, Luca; Morawska, Lidia; Avino, Pasquale

    2015-01-01

    The main aim of the present study was to estimate size segregated doses from e-cigarette aerosols as a function of the airway generation number in lung lobes. After a 2-second puff, 7.7 × 10 10 particles (D Tot ) with a surface area of 3.6 × 10 3  mm 2 (S Tot ), and 3.3 × 10 10 particles with a surface area of 4.2 × 10 3  mm 2 were deposited in the respiratory system for the electronic and conventional cigarettes, respectively. Alveolar and tracheobronchial deposited doses were compared to the ones received by non-smoking individuals in Western countries, showing a similar order of magnitude. Total regional doses (D R ), in head and lobar tracheobronchial and alveolar regions, ranged from 2.7 × 10 9 to 1.3 × 10 10 particles and 1.1 × 10 9 to 5.3 × 10 10 particles, for the electronic and conventional cigarettes, respectively. D R in the right-upper lung lobe was about twice that found in left-upper lobe and 20% greater in right-lower lobe than the left-lower lobe. - Highlights: • Lobar doses were compared for mainstreams of electronic and conventional cigarettes. • Aerosol doses from e-cigarettes were more than double that from conventional ones. • Doses from a 2-s puff exceed the daily doses of a no smoking Australian subject. • Highest deposition densities occurred at the lobar bronchi. • Aerosol deposition was greater in the right than in the left lung lobes. - Lobar bronchi and right lung lobes represent sites where effects of the aerosol from e-cigarette smoke may be more likely to occur

  17. 3-D topological signatures and a new discrimination method for single-electron events and 0νββ events in CdZnTe: A Monte Carlo simulation study

    Energy Technology Data Exchange (ETDEWEB)

    Zeng, Ming; Li, Teng-Lin; Cang, Ji-Rong [Key Laboratory of Particle & Radiation Imaging (Tsinghua University), Ministry of Education (China); Department of Engineering Physics, Tsinghua University, Beijing 100084 (China); Zeng, Zhi, E-mail: zengzhi@tsinghua.edu.cn [Key Laboratory of Particle & Radiation Imaging (Tsinghua University), Ministry of Education (China); Department of Engineering Physics, Tsinghua University, Beijing 100084 (China); Fu, Jian-Qiang; Zeng, Wei-He; Cheng, Jian-Ping; Ma, Hao; Liu, Yi-Nong [Key Laboratory of Particle & Radiation Imaging (Tsinghua University), Ministry of Education (China); Department of Engineering Physics, Tsinghua University, Beijing 100084 (China)

    2017-06-21

    In neutrinoless double beta (0νββ) decay experiments, the diversity of topological signatures of different particles provides an important tool to distinguish double beta events from background events and reduce background rates. Aiming at suppressing the single-electron backgrounds which are most challenging, several groups have established Monte Carlo simulation packages to study the topological characteristics of single-electron events and 0νββ events and develop methods to differentiate them. In this paper, applying the knowledge of graph theory, a new topological signature called REF track (Refined Energy-Filtered track) is proposed and proven to be an accurate approximation of the real particle trajectory. Based on the analysis of the energy depositions along the REF track of single-electron events and 0νββ events, the REF energy deposition models for both events are proposed to indicate the significant differences between them. With these differences, this paper presents a new discrimination method, which, in the Monte Carlo simulation, achieved a single-electron rejection factor of 93.8±0.3 (stat.)% as well as a 0νββ efficiency of 85.6±0.4 (stat.)% with optimized parameters in CdZnTe.

  18. A Modified Decomposed Theory of Planned Behaviour Model to Analyze User Intention towards Distance-Based Electronic Toll Collection Services

    Directory of Open Access Journals (Sweden)

    Chi-Chung Tao

    2017-02-01

    Full Text Available This study proposes a modified decomposed theory of planned behaviour model (DTPB that integrates satisfaction and trust into the original DTPB model to explore what kind of factors affect the user intention towards distance-based electronic toll collection (ETC services. The proposed model is empirically tested by using data collected from a questionnaire survey with a computer assisted telephone interview system. Empirical analysis is carried out in three stages that combine confirmatory factor analysis, structural equation modelling (SEM, and Bayesian network: (1 examination of reliability and validity of the measurement model; (2 analysis of structural model; (3 prediction of the probability of user intention change based on rigorous framework of SEM. The results confirm that the satisfaction and trust have positive effects on the behaviour intention, also validating that five constructs have indirect effects on the behaviour intention through attitude and perceived behaviour control. Compatibility is the most important influence factor, followed by perceived usefulness, facilitating conditions, self-efficacy, and perceived ease of use. The findings of this study identify potential improvements for ETC operator, such as contributing to the society to enhance the company image and trust of enterprise with charity activities, and simultaneously upgrading the information platform of website, software, and Apps.

  19. De-MA: a web Database for electron Microprobe Analyses to assist EMP lab manager and users

    Science.gov (United States)

    Allaz, J. M.

    2012-12-01

    Lab managers and users of electron microprobe (EMP) facilities require comprehensive, yet flexible documentation structures, as well as an efficient scheduling mechanism. A single on-line database system for managing reservations, and providing information on standards, quantitative and qualitative setups (element mapping, etc.), and X-ray data has been developed for this purpose. This system is particularly useful in multi-user facilities where experience ranges from beginners to the highly experienced. New users and occasional facility users will find these tools extremely useful in developing and maintaining high quality, reproducible, and efficient analyses. This user-friendly database is available through the web, and uses MySQL as a database and PHP/HTML as script language (dynamic website). The database includes several tables for standards information, X-ray lines, X-ray element mapping, PHA, element setups, and agenda. It is configurable for up to five different EMPs in a single lab, each of them having up to five spectrometers and as many diffraction crystals as required. The installation should be done on a web server supporting PHP/MySQL, although installation on a personal computer is possible using third-party freeware to create a local Apache server, and to enable PHP/MySQL. Since it is web-based, any user outside the EMP lab can access this database anytime through any web browser and on any operating system. The access can be secured using a general password protection (e.g. htaccess). The web interface consists of 6 main menus. (1) "Standards" lists standards defined in the database, and displays detailed information on each (e.g. material type, name, reference, comments, and analyses). Images such as EDS spectra or BSE can be associated with a standard. (2) "Analyses" lists typical setups to use for quantitative analyses, allows calculation of mineral composition based on a mineral formula, or calculation of mineral formula based on a fixed

  20. Advancing cognitive engineering methods to support user interface design for electronic health records.

    Science.gov (United States)

    Thyvalikakath, Thankam P; Dziabiak, Michael P; Johnson, Raymond; Torres-Urquidy, Miguel Humberto; Acharya, Amit; Yabes, Jonathan; Schleyer, Titus K

    2014-04-01

    Despite many decades of research on the effective development of clinical systems in medicine, the adoption of health information technology to improve patient care continues to be slow, especially in ambulatory settings. This applies to dentistry as well, a primary care discipline with approximately 137,000 practitioners in the United States. A critical reason for slow adoption is the poor usability of clinical systems, which makes it difficult for providers to navigate through the information and obtain an integrated view of patient data. In this study, we documented the cognitive processes and information management strategies used by dentists during a typical patient examination. The results will inform the design of a novel electronic dental record interface. We conducted a cognitive task analysis (CTA) study to observe ten general dentists (five general dentists and five general dental faculty members, each with more than two years of clinical experience) examining three simulated patient cases using a think-aloud protocol. Dentists first reviewed the patient's demographics, chief complaint, medical history and dental history to determine the general status of the patient. Subsequently, they proceeded to examine the patient's intraoral status using radiographs, intraoral images, hard tissue and periodontal tissue information. The results also identified dentists' patterns of navigation through patient's information and additional information needs during a typical clinician-patient encounter. This study reinforced the significance of applying cognitive engineering methods to inform the design of a clinical system. Second, applying CTA to a scenario closely simulating an actual patient encounter helped with capturing participants' knowledge states and decision-making when diagnosing and treating a patient. The resultant knowledge of dentists' patterns of information retrieval and review will significantly contribute to designing flexible and task

  1. Cue-reactivity in experienced electronic cigarette users: Novel stimulus videos and a pilot fMRI study.

    Science.gov (United States)

    Nichols, Travis T; Foulds, Jonathan; Yingst, Jessica M; Veldheer, Susan; Hrabovsky, Shari; Richie, John; Eissenberg, Thomas; Wilson, Stephen J

    2016-05-01

    Some individuals who try electronic cigarettes (e-cigarettes) continue to use long-term. Previous research has investigated the safety of e-cigarettes and their potential for use in smoking cessation, but comparatively little research has explored chronic or habitual e-cigarette use. In particular, the relationship between e-cigarette cues and craving is unknown. We sought to bridge this gap by developing a novel set of e-cigarette (salient) and electronic toothbrush (neutral) videos for use in cue-reactivity paradigms. Additionally, we demonstrate the utility of this approach in a pilot fMRI study of 7 experienced e-cigarette users. Participants were scanned while viewing the cue videos before and after 10min use of their own e-cigarettes (producing an 11.7ng/ml increase in plasma nicotine concentration). A significant session (pre- and post-use) by video type (salient and neutral) interaction was exhibited in many sensorimotor areas commonly activated in other cue-reactivity paradigms. We did not detect significant cue-related activity in other brain regions notable in the craving literature. Possible reasons for this discrepancy are discussed, including the importance of matching cue stimuli to participants' experiences. Copyright © 2015 Elsevier Inc. All rights reserved.

  2. Cue-reactivity in experienced electronic cigarette users: Novel stimulus videos and a pilot fMRI study

    Science.gov (United States)

    Nichols, Travis T.; Foulds, Jonathan; Yingst, Jessica; Veldheer, Susan; Hrabovsky, Shari; Richie, John; Eissenberg, Thomas; Wilson, Stephen J.

    2015-01-01

    Some individuals who try electronic cigarettes (e-cigarettes) continue to use long-term. Previous research has investigated the safety of e-cigarettes and their potential for use in smoking cessation, but comparatively little research has explored chronic or habitual e-cigarette use. In particular, the relationship between e-cigarette cues and craving is unknown. We sought to bridge this gap by developing a novel set of e-cigarette (salient) and electronic toothbrush (neutral) videos for use in cue-reactivity paradigms. Additionally, we demonstrate the utility of this approach in a pilot fMRI study of 7 experienced e-cigarette users. Participants were scanned while viewing the cue videos before and after 10 minute use of their own e-cigarettes (producing an 11.7 ng/ml increase in plasma nicotine concentration). A significant session (pre- and post-use) by video type (salient and neutral) interaction was exhibited in many sensorimotor areas commonly activated in other cue-reactivity paradigms. We did not detect significant cue-related activity in other brain regions notable in the craving literature. Possible reasons for this discrepancy are discussed, including the importance of matching cue stimuli to participants’ experiences. PMID:26478134

  3. Converting a paper proforma template to a user friendly electronic database to collect traumatic brain injury data

    Directory of Open Access Journals (Sweden)

    Prasad M. Veera

    2014-12-01

    Full Text Available A structured reporting system which is based on a uniform template will permit uniform data collection and future statistics and will facilitate and validate independent or comparative audit of performance and quality of care. The successful establishment of a multi-center registry depends on the development of a concise data entry form, data entry system and data analysis to continuously maintain the registry. In the first phase we introduced the paper data collection form, in second phase this data form was converted to an electronic interface. In this second phase of the study the paper proforma which was developed in the first phase was converted into an electronic database by using the FileMaker Pro 13 Advanced®. The FileMaker Pro 13 Advanced® is capable to store the data, provides user friendly interface to enter data and can be converted the standalone runtime program to install in any other computer system. The next step is to explore the possibility whether it would be feasible to use this as a multicenter traumatic brain injury registry.

  4. Modelling End-User of Electronic-Government Service: The Role of Information quality, System Quality and Trust

    Science.gov (United States)

    Witarsyah Jacob, Deden; Fudzee, Mohd Farhan Md; Aizi Salamat, Mohamad; Kasim, Shahreen; Mahdin, Hairulnizam; Azhar Ramli, Azizul

    2017-08-01

    Many governments around the world increasingly use internet technologies such as electronic government to provide public services. These services range from providing the most basic informational website to deploying sophisticated tools for managing interactions between government agencies and beyond government. Electronic government (e-government) aims to provide a more accurate, easily accessible, cost-effective and time saving for the community. In this study, we develop a new model of e-government adoption service by extending the Unified Theory of Acceptance and Use of Technology (UTAUT) through the incorporation of some variables such as System Quality, Information Quality and Trust. The model is then tested using a large-scale, multi-site survey research of 237 Indonesian citizens. This model will be validated by using Structural Equation Modeling (SEM). The result indicates that System Quality, Information Quality and Trust variables proven to effect user behavior. This study extends the current understanding on the influence of System Quality, Information Quality and Trust factors to researchers, practitioners, and policy makers.

  5. Xyce Parallel Electronic Simulator - Users' Guide Version 2.1.

    Energy Technology Data Exchange (ETDEWEB)

    Hutchinson, Scott A; Hoekstra, Robert J.; Russo, Thomas V.; Rankin, Eric; Pawlowski, Roger P.; Fixel, Deborah A; Schiek, Richard; Bogdan, Carolyn W.; Shirley, David N.; Campbell, Phillip M.; Keiter, Eric R.

    2005-06-01

    This manual describes the use of theXyceParallel Electronic Simulator.Xycehasbeen designed as a SPICE-compatible, high-performance analog circuit simulator, andhas been written to support the simulation needs of the Sandia National Laboratorieselectrical designers. This development has focused on improving capability over thecurrent state-of-the-art in the following areas:%04Capability to solve extremely large circuit problems by supporting large-scale par-allel computing platforms (up to thousands of processors). Note that this includessupport for most popular parallel and serial computers.%04Improved performance for all numerical kernels (e.g., time integrator, nonlinearand linear solvers) through state-of-the-art algorithms and novel techniques.%04Device models which are specifically tailored to meet Sandia's needs, includingmany radiation-aware devices.3 XyceTMUsers' Guide%04Object-oriented code design and implementation using modern coding practicesthat ensure that theXyceParallel Electronic Simulator will be maintainable andextensible far into the future.Xyceis a parallel code in the most general sense of the phrase - a message passingparallel implementation - which allows it to run efficiently on the widest possible numberof computing platforms. These include serial, shared-memory and distributed-memoryparallel as well as heterogeneous platforms. Careful attention has been paid to thespecific nature of circuit-simulation problems to ensure that optimal parallel efficiencyis achieved as the number of processors grows.The development ofXyceprovides a platform for computational research and de-velopment aimed specifically at the needs of the Laboratory. WithXyce, Sandia hasan %22in-house%22 capability with which both new electrical (e.g., device model develop-ment) and algorithmic (e.g., faster time-integration methods, parallel solver algorithms)research and development can be performed. As a result,Xyceis a unique electricalsimulation capability

  6. Search for an mSUGRA signature in the electron + jets + missing transverse energy final state in $p\\bar{p}$ collisions at √s = 1.8TeV

    Energy Technology Data Exchange (ETDEWEB)

    Zhou, Zhang [Iowa State Univ., Ames, IA (United States)

    2001-01-01

    We describe a search for a Minimal Supergravity (mSUGRA) signature in Run 1 data taken by the D detector at the Fermilab Tevatron from 1995-1996. The total data luminosity is 92.7 pb-1. The data were examined for events with a single electron, four or more jets and large missing transverse energy. The major backgrounds are from W+jets, QCD, t$\\bar{t}$, and WW events. We observed no excess of events in our data. Based on the data and the expected signal rate we obtain new limits on new physics in terms of mSUGRA model parameters.

  7. The Converging Inflow Spectrum Is an Intrinsic Signature for a Black Hole: Monte Carlo Simulations of Comptonization on Free-falling Electrons

    Science.gov (United States)

    Laurent, Philippe; Titarchuk, Lev

    1999-01-01

    An accreting black hole is, by definition, characterized by the drain. Namely, matter falls into a black hole much the same way as water disappears down a drain: matter goes in and nothing comes out. As this can only happen in a black hole, it provides a way to see ``a black hole,'' a unique observational signature of black holes. The accretion proceeds almost in a free-fall manner close to the black hole horizon, where the strong gravitational field dominates the pressure forces. In this paper we calculate (by using Monte Carlo simulations) the specific features of X-ray spectra formed as a result of upscattering of the soft (disk) photons in the converging inflow (CI) within about 3 Schwarzschild radii of the black hole. The full relativistic treatment has been implemented to reproduce these spectra. We show that spectra in the soft state of black hole systems (BHS) can be described as the sum of a thermal (disk) component and the convolution of some fraction of this component with the CI upscattering spread (Green's) function. The latter boosted photon component is seen as an extended power law at energies much higher than the characteristic energy of the soft photons. We demonstrate the stability of the power spectral index (α=1.8+/-0.1) over a wide range of the plasma temperature, 0-10 keV, and mass accretion rates (higher than 2 in Eddington units). We also demonstrate that the sharp high-energy cutoff occurs at energies of 200-400 keV, which are related to the average energy of electrons mec2 impinging on the event horizon. The spectrum is practically identical to the standard thermal Comptonization spectrum (Hua & Titarchuk) when the CI plasma temperature is getting of order of 50 keV (the typical ones for the hard state of BHS). In this case one can see the effect of the bulk motion only at high energies, where there is an excess in the CI spectrum with respect to the pure thermal one. Furthermore, we demonstrate that the change of spectral shapes from

  8. Quantum signature scheme for known quantum messages

    International Nuclear Information System (INIS)

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  9. The SPRITE and POS-SPRITE user report: An extensible calculation of particle, positron and electron implantation in solids

    International Nuclear Information System (INIS)

    Ritley, K.A.; Ghosh, V.J.; Lynn, K.G.; McKewown, M.; Welch, D.O.

    1997-01-01

    SPRITE (Simulation of Particle Reemission, Implantation and Transmission--Extensible) is a Fortran computer program designed to model the transport of a stream of energetic particles as they scatter through a solid or multilayer. SPRITE is intended to be a user-friendly and easily-extensible engine for performing basic transport calculations, and SPRITE incorporates such physics as is required to simulate the transport process, but specifically omits the details of the scattering mechanisms. PSPRITE is a Fortran computer program, built around the SPRITE transport engine and incorporating physical information necessary for modeling the implantation and thermalization of a stream of positrons or electrons with a solid. This document is intended to be the primary source of information and the only operations manual for SPRITE and the POS-SPRITE family of programs. This information includes the mode of operation of SPRITE, the format of the required and optional file types, as well as information about the output and results of the calculation. Information about installing and running these programs on a variety of computer systems will not be addressed in this report. Such information is rapidly expanding as these programs are adapted to run on different platforms, and thus the user can expect such information to be contained with the source code distribution set. Detailed information about the calculations of the structure of the POS-SPRITE programs are provided in this report, but detailed benchmark comparisons between the output of these calculations and experimental data are an active topic of research, and they refer the reader to the published literature for this information

  10. Exotic signatures from supersymmetry

    International Nuclear Information System (INIS)

    Hall, L.J.

    1989-08-01

    Minor changes to the standard supersymmetric model, such as soft flavor violation and R parity violation, cause large changes in the signatures. The origin of these changes and the resulting signatures are discussed. 15 refs., 7 figs., 2 tabs

  11. Blinding for unanticipated signatures

    NARCIS (Netherlands)

    D. Chaum (David)

    1987-01-01

    textabstractPreviously known blind signature systems require an amount of computation at least proportional to the number of signature types, and also that the number of such types be fixed in advance. These requirements are not practical in some applications. Here, a new blind signature technique

  12. Fair quantum blind signatures

    International Nuclear Information System (INIS)

    Tian-Yin, Wang; Qiao-Yan, Wen

    2010-01-01

    We present a new fair blind signature scheme based on the fundamental properties of quantum mechanics. In addition, we analyse the security of this scheme, and show that it is not possible to forge valid blind signatures. Moreover, comparisons between this scheme and public key blind signature schemes are also discussed. (general)

  13. Basis for the implementation of digital signature in Argentine's health environment

    International Nuclear Information System (INIS)

    Escobar, P P; Formica, M

    2007-01-01

    The growth of telemedical applications and electronic transactions in health environments is paced by the constant technology evolution. This implies a big cultural change in traditional medicine and in hospital information systems' users which arrival is delayed, basically, by the lack of solid laws and a well defined role-based infrastructure. The use of digital signature as a mean of identification, authentication, confidentiality and non-repudiation is the most suitable tool for assuring the electronic transactions and patient's data protection. The implementation of a Public Key Infrastructure (PKI) in health environment allows for authentication, encryption and use of digital signature for assuring confidentiality and control of the movement of sensitive information. This work defines the minimum technological, legal and procedural basis for a successful PKI implementation and establishes the roles for the different actors in the chain of confidence in the public health environment of Argentine

  14. An Efficient Homomorphic Aggregate Signature Scheme Based on Lattice

    Directory of Open Access Journals (Sweden)

    Zhengjun Jing

    2014-01-01

    Full Text Available Homomorphic aggregate signature (HAS is a linearly homomorphic signature (LHS for multiple users, which can be applied for a variety of purposes, such as multi-source network coding and sensor data aggregation. In order to design an efficient postquantum secure HAS scheme, we borrow the idea of the lattice-based LHS scheme over binary field in the single-user case, and develop it into a new lattice-based HAS scheme in this paper. The security of the proposed scheme is proved by showing a reduction to the single-user case and the signature length remains invariant. Compared with the existing lattice-based homomorphic aggregate signature scheme, our new scheme enjoys shorter signature length and high efficiency.

  15. Comprehensive evaluation of electronic medical record system use and user satisfaction at five low-resource setting hospitals in ethiopia.

    Science.gov (United States)

    Tilahun, Binyam; Fritz, Fleur

    2015-05-25

    Electronic medical record (EMR) systems are increasingly being implemented in hospitals of developing countries to improve patient care and clinical service. However, only limited evaluation studies are available concerning the level of adoption and determinant factors of success in those settings. The objective of this study was to assess the usage pattern, user satisfaction level, and determinants of health professional's satisfaction towards a comprehensive EMR system implemented in Ethiopia where parallel documentation using the EMR and the paper-based medical records is in practice. A quantitative, cross-sectional study design was used to assess the usage pattern, user satisfaction level, and determinant factors of an EMR system implemented in Ethiopia based on the DeLone and McLean model of information system success. Descriptive statistical methods were applied to analyze the data and a binary logistic regression model was used to identify determinant factors. Health professionals (N=422) from five hospitals were approached and 406 responded to the survey (96.2% response rate). Out of the respondents, 76.1% (309/406) started to use the system immediately after implementation and user training, but only 31.7% (98/309) of the professionals reported using the EMR during the study (after 3 years of implementation). Of the 12 core EMR functions, 3 were never used by most respondents, and they were also unaware of 4 of the core EMR functions. It was found that 61.4% (190/309) of the health professionals reported over all dissatisfaction with the EMR (median=4, interquartile range (IQR)=1) on a 5-level Likert scale. Physicians were more dissatisfied (median=5, IQR=1) when compared to nurses (median=4, IQR=1) and the health management information system (HMIS) staff (median=2, IQR=1). Of all the participants, 64.4% (199/309) believed that the EMR had no positive impact on the quality of care. The participants indicated an agreement with the system and information

  16. Automated defect spatial signature analysis for semiconductor manufacturing process

    Science.gov (United States)

    Tobin, Jr., Kenneth W.; Gleason, Shaun S.; Karnowski, Thomas P.; Sari-Sarraf, Hamed

    1999-01-01

    An apparatus and method for performing automated defect spatial signature alysis on a data set representing defect coordinates and wafer processing information includes categorizing data from the data set into a plurality of high level categories, classifying the categorized data contained in each high level category into user-labeled signature events, and correlating the categorized, classified signature events to a present or incipient anomalous process condition.

  17. A search algorithm for identifying likely users and non-users of marijuana from the free text of the electronic medical record.

    Directory of Open Access Journals (Sweden)

    Salomeh Keyhani

    Full Text Available The harmful effects of marijuana on health and in particular cardiovascular health are understudied. To develop such knowledge, an efficient method of developing an informative cohort of marijuana users and non-users is needed.We identified patients with a diagnosis of coronary artery disease using ICD-9 codes who were seen in the San Francisco VA in 2015. We imported these patients' medical record notes into an informatics platform that facilitated text searches. We categorized patients into those with evidence of marijuana use in the past 12 months and patients with no such evidence, using the following text strings: "marijuana", "mjx", and "cannabis". We randomly selected 51 users and 51 non-users based on this preliminary classification, and sent a recruitment letter to 97 of these patients who had contact information available. Patients were interviewed on marijuana use and domains related to cardiovascular health. Data on marijuana use collected from the medical record was compared to data collected as part of the interview.The interview completion rate was 71%. Among the 35 patients identified by text strings as having used marijuana in the previous year, 15 had used marijuana in the past 30 days (positive predictive value = 42.9%. The probability of use in the past month increased from 8.8% to 42.9% in people who have these keywords in their medical record compared to those who did not have these terms in their medical record.Methods that combine text search strategies for participant recruitment with health interviews provide an efficient approach to developing prospective cohorts that can be used to study the health effects of marijuana.

  18. Restrictive partially blind signature for resource-constrained information systems

    NARCIS (Netherlands)

    Qiu, Weidong; Gong, Zheng; Liu, Bozhong; Long, Yu; Chen, Kefei

    2010-01-01

    Restrictive partially blind signature, which is designed for privacy oriented information systems, allows a user to obtain a blind signature from a signer whilst the blind message must obey some certain rules. In order to reduce storage and communication costs, several public-key cryptosystems are

  19. Hair testing to assess both known and unknown use of drugs amongst ecstasy users in the electronic dance music scene.

    Science.gov (United States)

    Palamar, Joseph J; Salomone, Alberto; Gerace, Enrico; Di Corcia, Daniele; Vincenti, Marco; Cleland, Charles M

    2017-10-01

    Data on both known and unknown drug use in the electronic dance music (EDM) scene is important to inform prevention and harm reduction. While surveys are the most common method of querying drug use, additional biological data can help validate use and detect unknown/unintentional use of drugs such as new psychoactive substances (NPS). We sought to determine the extent of both known and unknown use of various substances in this high-risk scene. We hair-tested 90 self-reported past-year ecstasy/MDMA/Molly users attending EDM parties in New York City during the summer of 2016 using UHPLC-MS/MS. Results were compared to self-reported past-year use. Three quarters (74.4%) tested positive for MDMA, a third (33.3%) tested positive for an NPS, and 27.8% tested positive specifically for one or more synthetic cathinones (e.g., butylone, ethylone, pentylone, methylone, alpha-PVP). Half (51.1%) of participants tested positive for a drug not self-reported, with most testing positive for synthetic cathinones (72.0%), methamphetamine (69.0%), other NPS stimulants (e.g., 4-FA, 5/6-APB; 66.7%), or new dissociatives (e.g., methoxetamine, diphenidine; 60.0%). Attending parties every other week or more often, reporting higher-frequency ecstasy pill use, having tested one's ecstasy, and having found out one's ecstasy was adulterated, were risk factors for testing positive for synthetic cathinones and NPS in general. Hair testing appears to be a valuable addition to drug epidemiology studies. Many EDM party attendees-even those who test their ecstasy-are unknowingly using NPS and/or other drugs. Prevention information and harm reduction may help reduce unknown/unintentional use. Copyright © 2017 Elsevier B.V. All rights reserved.

  20. Tolerability of central nervous system symptoms among HIV-1 infected efavirenz users: analysis of patient electronic medical record data.

    Science.gov (United States)

    Rosenblatt, Lisa; Broder, Michael S; Bentley, Tanya G K; Chang, Eunice; Reddy, Sheila R; Papoyan, Elya; Myers, Joel

    2017-08-01

    Efavirenz (EFV) is a non-nucleoside reverse transcriptase inhibitor indicated for treatment of HIV-1 infection. Despite concern over EFV tolerability in clinical trials and practice, particularly related to central nervous system (CNS) adverse events, some observational studies have shown high rates of EFV continuation at one year and low rates of CNS-related EFV substitution. The objective of this study was to further examine the real-world rate of CNS-related EFV discontinuation in antiretroviral therapy naïve HIV-1 patients. This retrospective cohort study used a nationally representative electronic medical records database to identify HIV-1 patients ≥12 years old, treated with a 1st-line EFV-based regimen (single or combination antiretroviral tablet) from 1 January 2009 to 30 June 2013. Patients without prior record of EFV use during 6-month baseline (i.e., antiretroviral therapy naïve) were followed 12 months post-medication initiation. CNS-related EFV discontinuation was defined as evidence of a switch to a replacement antiretroviral coupled with record of a CNS symptom within 30 days prior, absent lab evidence of virologic failure. We identified 1742 1st-line EFV patients. Mean age was 48 years, 22.7% were female, and 8.1% had a prior report of CNS symptoms. The first year, overall discontinuation rate among new users of EFV was 16.2%. Ten percent of patients (n = 174) reported a CNS symptom and 1.1% (n = 19) discontinued EFV due to CNS symptoms: insomnia (n = 12), headache (n = 5), impaired concentration (n = 1), and somnolence (n = 1). The frequency of CNS symptoms was similar for patients who discontinued EFV compared to those who did not (10.3 vs. 9.9%; P = .86). Our study found that EFV discontinuation due to CNS symptoms was low, consistent with prior reports.

  1. Near-real time forecasts of MeV protons based on sub-relativistic electrons: communicating the outputs to the end users

    Science.gov (United States)

    Sarlanis, Christos; Heber, Bernd; Labrenz, Johannes; Kühl, Patrick; Marquardt, Johannes; Dimitroulakos, John; Papaioannou, Athanasios; Posner, Arik

    2017-04-01

    Solar Energetic Particle (SEP) events are one of the most important elements of space weather. Given that the complexity of the underlying physical processes of the acceleration and propagation of SEP events is still a very active research area, the prognosis of SEP event occurrence and their corresponding characteristics remains challenging. In order to provide up to an hour warning time before these particles arrive at Earth, relativistic electron and below 50 MeV proton data from the Electron Proton Helium Instrument (EPHIN) on SOHO were used to implement the 'Relativistic Electron Alert System for Exploration (REleASE)'. The REleASE forecasting scheme was recently rewritten in the open access programming language PYTHON and will be made publicly available. As a next step, along with relativistic electrons (v > 0.9 c) provided by SOHO, near-relativistic (v work, we demonstrate the real-time outputs derived by the end user from the REleASE using both SOHO/EPHIN and ACE/EPAM. We further, show a user friendly illustration of the outputs that make use of a "traffic light" to monitor the different warning stages: quiet, warning, alert offering a simple guidance to the end users. Finally, the capabilities offered by this new system, accessing both the pictorial and textural outputs REleASE are being presented. This work has received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 637324.

  2. Unconditionally Secure Quantum Signatures

    Directory of Open Access Journals (Sweden)

    Ryan Amiri

    2015-08-01

    Full Text Available Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols—signatures based on the Rivest–Adleman–Shamir (RSA algorithm, the digital signature algorithm (DSA, and the elliptic curve digital signature algorithm (ECDSA—are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally securesecure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  3. Radar Signature Calculation Facility

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: The calculation, analysis, and visualization of the spatially extended radar signatures of complex objects such as ships in a sea multipath environment and...

  4. Quantifying radionuclide signatures from a γ–γ coincidence system

    International Nuclear Information System (INIS)

    Britton, Richard; Jackson, Mark J.; Davies, Ashley V.

    2015-01-01

    A method for quantifying gamma coincidence signatures has been developed, and tested in conjunction with a high-efficiency multi-detector system to quickly identify trace amounts of radioactive material. The γ–γ system utilises fully digital electronics and list-mode acquisition to time–stamp each event, allowing coincidence matrices to be easily produced alongside typical ‘singles’ spectra. To quantify the coincidence signatures a software package has been developed to calculate efficiency and cascade summing corrected branching ratios. This utilises ENSDF records as an input, and can be fully automated, allowing the user to quickly and easily create/update a coincidence library that contains all possible γ and conversion electron cascades, associated cascade emission probabilities, and true-coincidence summing corrected γ cascade detection probabilities. It is also fully searchable by energy, nuclide, coincidence pair, γ multiplicity, cascade probability and half-life of the cascade. The probabilities calculated were tested using measurements performed on the γ–γ system, and found to provide accurate results for the nuclides investigated. Given the flexibility of the method, (it only relies on evaluated nuclear data, and accurate efficiency characterisations), the software can now be utilised for a variety of systems, quickly and easily calculating coincidence signature probabilities. - Highlights: • Monte-Carlo based software developed to easily create/update a coincidence signal library for environmental radionuclides. • Coincidence library utilised to accurately quantify gamma coincidence signatures. • All coincidence signature probabilities are corrected for cascade summing, conversion electron emission and pair production. • Key CTBTO relevant radionuclides have been tested to verify the calculated correction factors. • Accurately quantifying coincidence signals during routine analysis will allow dramatically improved detection

  5. Urinary Metabolite Levels of Flame Retardants in Electronic Cigarette Users: A Study Using the Data from NHANES 2013–2014

    Directory of Open Access Journals (Sweden)

    Binnian Wei

    2018-01-01

    Full Text Available Evaluating the safety of e-cigarettes and making informed judgement about developing potential standards require sufficient scientific evidence. Since e-cigarettes are highly engineered products containing plastic, glass and metal parts, and e-liquids are largely different matrices, many toxic compounds which are not typical hazards for the users of combustible tobacco products (e.g., cigarettes, could exist in e-liquids, and consequently, posing potential health risk to e-cigarette users. We combined the measurements of urinary metabolites of organophosphate flame retardants (OPFRs with questionnaire data collected in the National Health and Nutrition Examination Surveys (NHANES from 2013 to 2014, and we compared adjusted geometric means (GM for each biomarker in e-cigarette users with levels in non-users and users of various tobacco products using multiple regression analyses to adjust for potential confounders. We found diphenyl phosphate (DPhP, bis(1,3-dichloro-2-propyl phosphate (BDCPP, bis(2-chloroethyl phosphate (BCEP, and dibutyl phosphate (DBUP were detected in all e-cigarette users. The adjusted GM of BCEP, the metabolite of tris(2-chloroethyl phosphate (TCEP, was 81% higher than nonusers (p = 0.0124 and significantly higher than those for both cigarette and cigar users (p < 0.05. The findings in this pilot study suggest that certain OPFRs may present in e-cigarettes as contaminants, and consequently, resulting in higher exposure levels in e-cigarette users compared to nonusers. As we only identified 14 e-cigarette users in the survey, the findings in this study need to be confirmed in future study at a larger scale. A better examination of the types and levels of FRs and their potential contamination sources in e-cigarettes is also needed.

  6. Urinary Metabolite Levels of Flame Retardants in Electronic Cigarette Users: A Study Using the Data from NHANES 2013-2014.

    Science.gov (United States)

    Wei, Binnian; Goniewicz, Maciej L; O'Connor, Richard J; Travers, Mark J; Hyland, Andrew J

    2018-01-25

    Evaluating the safety of e-cigarettes and making informed judgement about developing potential standards require sufficient scientific evidence. Since e-cigarettes are highly engineered products containing plastic, glass and metal parts, and e-liquids are largely different matrices, many toxic compounds which are not typical hazards for the users of combustible tobacco products (e.g., cigarettes), could exist in e-liquids, and consequently, posing potential health risk to e-cigarette users. We combined the measurements of urinary metabolites of organophosphate flame retardants (OPFRs) with questionnaire data collected in the National Health and Nutrition Examination Surveys (NHANES) from 2013 to 2014, and we compared adjusted geometric means (GM) for each biomarker in e-cigarette users with levels in non-users and users of various tobacco products using multiple regression analyses to adjust for potential confounders. We found diphenyl phosphate (DPhP), bis(1,3-dichloro-2-propyl) phosphate (BDCPP), bis(2-chloroethyl) phosphate (BCEP), and dibutyl phosphate (DBUP) were detected in all e-cigarette users. The adjusted GM of BCEP, the metabolite of tris(2-chloroethyl) phosphate (TCEP), was 81% higher than nonusers ( p = 0.0124) and significantly higher than those for both cigarette and cigar users ( p users compared to nonusers. As we only identified 14 e-cigarette users in the survey, the findings in this study need to be confirmed in future study at a larger scale. A better examination of the types and levels of FRs and their potential contamination sources in e-cigarettes is also needed.

  7. Preliminary results of an examination of electronic cigarette user puff topography: the effect of a mouthpiece-based topography measurement device on plasma nicotine and subjective effects.

    Science.gov (United States)

    Spindle, Tory R; Breland, Alison B; Karaoghlanian, Nareg V; Shihadeh, Alan L; Eissenberg, Thomas

    2015-02-01

    Electronic cigarettes (ECIGs) heat a nicotine-containing solution; the resulting aerosol is inhaled by the user. Nicotine delivery may be affected by users' puffing behavior (puff topography), and little is known about the puff topography of ECIG users. Puff topography can be measured using mouthpiece-based computerized systems. However, the extent to which a mouthpiece influences nicotine delivery and subjective effects in ECIG users is unknown. Plasma nicotine concentration, heart rate, and subjective effects were measured in 13 experienced ECIG users who used their preferred ECIG and liquid (≥ 12 mg/ml nicotine) during 2 sessions (with or without a mouthpiece). In both sessions, participants completed an ECIG use session in which they were instructed to take 10 puffs with 30-second inter-puff intervals. Puff topography was recorded in the mouthpiece condition. Almost all measures of the effects of ECIG use were independent of topography measurement. Collapsed across session, mean plasma nicotine concentration increased by 16.8 ng/ml, and mean heart rate increased by 8.5 bpm (ps topography measurement equipment, ECIG-using participants took larger and longer puffs with lower flow rates. In experienced ECIG users, measuring ECIG topography did not influence ECIG-associated nicotine delivery or most measures of withdrawal suppression. Topography measurement systems will need to account for the low flow rates observed for ECIG users. © The Author 2014. Published by Oxford University Press on behalf of the Society for Research on Nicotine and Tobacco. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  8. Have combustible cigarettes met their match? The nicotine delivery profiles and harmful constituent exposures of second-generation and third-generation electronic cigarette users.

    Science.gov (United States)

    Wagener, Theodore L; Floyd, Evan L; Stepanov, Irina; Driskill, Leslie M; Frank, Summer G; Meier, Ellen; Leavens, Eleanor L; Tackett, Alayna P; Molina, Neil; Queimado, Lurdes

    2017-03-01

    Electronic cigarettes' (e-cigarettes) viability as a public health strategy to end smoking will likely be determined by their ability to mimic the pharmacokinetic profile of a cigarette while also exposing users to significantly lower levels of harmful/potentially harmful constituents (HPHCs). The present study examined the nicotine delivery profile of third- (G3) versus second-generation (G2) e-cigarette devices and their users' exposure to nicotine and select HPHCs compared with cigarette smokers. 30 participants (10 smokers, 9 G2 and 11 G3 users) completed baseline questionnaires and provided exhaled carbon monoxide (eCO), saliva and urine samples. Following a 12-hour nicotine abstinence, G2 and G3 users completed a 2-hour vaping session (ie, 5 min, 10-puff bout followed by ad libitum puffing for 115 min). Blood samples, subjective effects, device characteristics and e-liquid consumption were assessed. Smokers, G2 and G3 users had similar baseline levels of cotinine, but smokers had 4 and 7 times higher levels of eCO (pe-cigarette liquids with significantly lower nicotine concentrations. During the vaping session, G3 users achieved significantly higher plasma nicotine concentrations than G2 users following the first 10 puffs (17.5 vs 7.3 ng/mL, respectively) and at 25 and 40 min of ad libitum use. G3 users consumed significantly more e-liquid than G2 users. Vaping urges/withdrawal were reduced following 10 puffs, with no significant differences between device groups. Under normal use conditions, both G2 and G3 devices deliver cigarette-like amounts of nicotine, but G3 devices matched the amount and speed of nicotine delivery of a conventional cigarette. Compared with cigarettes, G2 and G3 e-cigarettes resulted in significantly lower levels of exposure to a potent lung carcinogen and cardiovascular toxicant. These findings have significant implications for understanding the addiction potential of these devices and their viability/suitability as aids to

  9. User-composable Electronic Health Record Improves Efficiency of Clinician Data Viewing for Patient Case Appraisal: A Mixed-Methods Study.

    Science.gov (United States)

    Senathirajah, Yalini; Kaufman, David; Bakken, Suzanne

    2016-01-01

    Challenges in the design of electronic health records (EHRs) include designing usable systems that must meet the complex, rapidly changing, and high-stakes information needs of clinicians. The ability to move and assemble elements together on the same page has significant human-computer interaction (HCI) and efficiency advantages, and can mitigate the problems of negotiating multiple fixed screens and the associated cognitive burdens. We compare MedWISE-a novel EHR that supports user-composable displays-with a conventional EHR in terms of the number of repeat views of data elements for patient case appraisal. The study used mixed-methods for examination of clinical data viewing in four patient cases. The study compared use of an experimental user-composable EHR with use of a conventional EHR, for case appraisal. Eleven clinicians used a user-composable EHR in a case appraisal task in the laboratory setting. This was compared with log file analysis of the same patient cases in the conventional EHR. We investigated the number of repeat views of the same clinical information during a session and across these two contexts, and compared them using Fisher's exact test. There was a significant difference (puser-composable EHR (14.6 percent) and conventional EHR (72.6 percent). Users of conventional EHRs repeatedly viewed the same information elements in the same session, as revealed by log files. Our findings are consistent with the hypothesis that conventional systems require that the user view many screens and remember information between screens, causing the user to forget information and to have to access the information a second time. Other mechanisms (such as reduction in navigation over a population of users due to interface sharing, and information selection) may also contribute to increased efficiency in the experimental system. Systems that allow a composable approach that enables the user to gather together on the same screen any desired information elements

  10. User experience analysis of e-TB Manager, a nationwide electronic tuberculosis recording and reporting system in Ukraine

    Directory of Open Access Journals (Sweden)

    Niranjan Konduri

    2017-05-01

    Full Text Available Ukraine has successfully implemented e-TB Manager nationwide as its mandatory national tuberculosis registry after first introducing it in 2009. Our objective was to perform an end-of-programme evaluation after formal handover of the registry administration to Ukraine's Centre for Disease Control in 2015. We conducted a nationwide, cross-sectional, anonymous, 18-point user experience survey, and stratified the registry's transaction statistics to demonstrate usability. Contrary to initial implementation experience, older users (aged >50 years, often with limited or no computer proficiency prior to using the registry, had significantly better user experience scores for at least six of the 12 measures compared to younger users (aged 18–29 years. Using the registry for >3 years was associated with significantly higher scores for having capacity, adequacy of training received and satisfaction with the registry. Of the 5.9 million transactions over a 4-year period, nine out of 24 oblasts (regions and Kiev city accounted for 62.5% of all transactions, and corresponded to 59% of Ukraine's tuberculosis burden. There were 437 unique active users in 486 rayons (districts of Ukraine, demonstrating extensive reach. Our key findings complement the World Health Organization and European Respiratory Society's agenda for action on digital health to help implement the End TB Strategy.

  11. End-user support for a primary care electronic medical record: a qualitative case study of a vendor’s perspective

    Directory of Open Access Journals (Sweden)

    Aviv Shachak

    2013-05-01

    Full Text Available Background In primary care settings, users often rely on vendors to provide support for health information technology (HIT. Yet, little is known about the vendors’ perspectives on the support they provide, how support personnel perceive their roles, the challenges they face and the ways they deal with them.Objective To provide in-depth insight into an electronic-medical record (EMR vendor’s perspective on end-user support.Methods As part of a larger case study research, we conducted nine semi-structured interviews with help desk staff, trainers and service managers of an EMR vendor, and observed two training sessions of a new client.Results With a growing client base, the vendor faced challenges of support staff shortage and high variance in users’ technical knowledge. Additionally, users sometimes needed assistance with infrastructure, and not just software problems. These challenges sometimes hindered the provision of timely support and required supporters to possess good interpersonal skills and adapt to diverse client population.Conclusion This study highlights the complexity of providing end-user support for HIT. With increased adoption, other vendors are likely to face similar challenges. To deal with these issues, supporters need not only strong technical knowledge of the systems, but also good interpersonal communication skills. Some responsibilities may be delegated to super-users. Users may find it useful to hire local IT staff, at least on an on-call basis, to provide assistance with infrastructure problems, which are not supported by the software vendor. Vendors may consider expanding their service packages to cover these elements.

  12. Security of medical data transfer and storage in Internet. Cryptography, antiviral security and electronic signature problems, which must be solved in nearest future in practical context.

    Science.gov (United States)

    Kasztelowicz, Piotr; Czubenko, Marek; Zieba, Iwona

    2003-01-01

    The informatical revolution in computer age, which gives significant benefit in transfer of medical information requests to pay still more attention for aspect of network security. All known advantages of network technologies--first of all simplicity of copying, multiplication and sending information to many individuals can be also dangerous, if illegal, not permitted persons get access to medical data bases. Internet is assumed to be as especially "anarchic" medium, therefore in order to use it in professional work any security principles should be bewared. In our presentation we will try to find the optimal security solution in organisational and technological aspects for any medical network. In our opinion the harmonious co-operation between users, medical authorities and network administrators is core of the success.

  13. Electronic Signature and Electronic Government Applications in Turkey: An Evaluative Essay from the Viewpoint of Electronic Records Management2 Türkiye’de Elektronik İmza ve Elektronik Devlet Uygulamaları: Elektronik Belge Yönetimi Açısından Bir Değerlendirme Denemesi

    Directory of Open Access Journals (Sweden)

    Esin Altın

    2008-09-01

    Full Text Available The most important component that enables electronic government (e-government applications function is that of electronic record (e-record management. In accordance with the e-record management strategies, all information and records produced by the state are opened to public access. By means of electronic record management systems (ERMS, record supervision becomes easy and processing time becomes shorter. E-record applications bring along the absolute necessity of accomplishing total record security, integrity and so on. That’s where electronic signature (e-signature technologies come on scene. E-signature holds an important place in terms of implementing ERMS and, in a more general sense, electronic archive (e-archive applications securely, and in terms of legal validity. Taking this fact as a starting point, this paper is an attempt to create consciousness on the necessity of the e-record management by emphasizing its importance in the process of e-transformation. This study provides introductory information on e-government, e-signature and the relationship between the e-record management and e-government, and erecord managemnt and e-signature applications. Using the survey method, proceedings and governmental publications issued by the USA, England and Turkey between 1999 and 2006 were reviewed. It was concluded that the importance of the e-record management for e-government has not been fully appreciated in Turkey. More qualifi ed humanpower is needed during the e-transformation process to carry out the e-record management applications Elektronik devlet (e-devlet uygulamalarının işlerliğini sağlayan en önemli unsur elektronik belge (e-belge yönetimidir. E-belge yönetim stratejileri doğrultusunda devletin ürettiği her türlü bilgi ve belge kamu erişimine açılır. Bu stratejiler izlenerek oluşturulan e-belge yönetim sistemleri (EBYS sayesinde belgelerin denetimi kolaylaşır ve iş süreçleri hızlanır. EBYS ile e

  14. A Methodology for Calculating Radiation Signatures

    Energy Technology Data Exchange (ETDEWEB)

    Klasky, Marc Louis [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Wilcox, Trevor [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Bathke, Charles G. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); James, Michael R. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-05-01

    A rigorous formalism is presented for calculating radiation signatures from both Special Nuclear Material (SNM) as well as radiological sources. The use of MCNP6 in conjunction with CINDER/ORIGEN is described to allow for the determination of both neutron and photon leakages from objects of interest. In addition, a description of the use of MCNP6 to properly model the background neutron and photon sources is also presented. Examinations of the physics issues encountered in the modeling are investigated so as to allow for guidance in the user discerning the relevant physics to incorporate into general radiation signature calculations. Furthermore, examples are provided to assist in delineating the pertinent physics that must be accounted for. Finally, examples of detector modeling utilizing MCNP are provided along with a discussion on the generation of Receiver Operating Curves, which are the suggested means by which to determine detectability radiation signatures emanating from objects.

  15. User's manual for EXALPHA (a code for calculating electronic properties of molecules). [Muscatel code, multiply scattered electron approximation

    Energy Technology Data Exchange (ETDEWEB)

    Jones, H.D.

    1976-06-01

    The EXALPHA procedures provide a simplified method for running the MUSCATEL computer code, which in turn is used for calculating electronic properties of simple molecules and atomic clusters, based on the multiply scattered electron approximation for the wave equations. The use of the EXALPHA procedures to set up a run of MUSCATEL is described.

  16. Feasibility and Design of an Electronic Surgical Safety Checklist in a Teaching Hospital: A User-Based Approach.

    Science.gov (United States)

    Kiefel, Karin; Donsa, Klaus; Tiefenbacher, Peter; Mischak, Robert; Brunner, Gernot; Sendlhofer, Gerald; Pieber, Thomas

    2018-01-01

    The Surgical Safety Checklist (SSC) is routinely used in operating rooms (OR) but its acceptance is low. One promising way to improve acceptance of the SSC and thus quality of patient care is digitalization. To investigate how a digitalization of the SSC could be implemented in a teaching hospital. Based on the identified user requirements we designed a first user interface (UI). We performed a literature review, identified user perceptions and requirements during 12 interviews including a standardized questionnaire in surgical departments at the University Hospital Graz (Austria). Subsequently a first prototype of a UI was designed. Seven different approaches for digital SSC were identified in literature. Our interviews showed that 90% of the participants had a positive attitude towards a digitalization of SSC. The most favoured version of a digitalized SSC was a tablet-based client-server system with integration in the EHR and projection on an OR monitor. Digitalization of the SSC is requested by medical and nursing personnel. Based on the identified user requirements we designed a process oriented UI of a digital SSC.

  17. New improvements on the Kansas State University cryogenic electron beam ion source, a user facility for low energy, highly charged ions

    International Nuclear Information System (INIS)

    Stockli, M. P.; Carnes, K.; Cocke, C. L.; DePaola, B. D.; Ehrenreich, T.; Fehrenbach, C.; Fry, D.; Gibson, P. E.; Kelly, S.; Lehnert, U.

    2000-01-01

    The Kansas State University cryogenic electron beam ion source supplies low energy ion beams to users of the Department of Energy user facility for highly charged ions. The ions escape the source with an initial energy between 1.6 and 5 kV per charge and are analyzed in a 90 degree sign dipole magnet located on the high voltage platform. When leaving the platform the ions can be accelerated by up to 160 kV per charge or can be decelerated to about 20% of their initial energy, covering 2.5 orders of magnitude. We are in the process of adding another order of magnitude to the range of available ion energies as a newly installed lens allows for deceleration down to a very few percent of the initial energy. In addition we present the current microbunching and chopping system which has been substantially improved over the past 2 yr. (c) 2000 American Institute of Physics

  18. Microwave-Induced Magneto-Oscillations and Signatures of Zero-Resistance States in Phonon-Drag Voltage in Two-Dimensional Electron Systems.

    Science.gov (United States)

    Levin, A D; Momtaz, Z S; Gusev, G M; Raichev, O E; Bakarov, A K

    2015-11-13

    We observe the phonon-drag voltage oscillations correlating with the resistance oscillations under microwave irradiation in a two-dimensional electron gas in perpendicular magnetic field. This phenomenon is explained by the influence of dissipative resistivity modified by microwaves on the phonon-drag voltage perpendicular to the phonon flux. When the lowest-order resistance minima evolve into zero-resistance states, the phonon-drag voltage demonstrates sharp features suggesting that current domains associated with these states can exist in the absence of external dc driving.

  19. Signatures of tunneling and multiphoton ionization in the electron-momentum distributions of atoms by intense few-cycle laser pulses

    International Nuclear Information System (INIS)

    Wickenhauser, M.; Tong, X. M.; Arbo, D. G.; Burgdoerfer, J.; Lin, C. D.

    2006-01-01

    Electron-momentum distributions for above-threshold ionization of argon in a few-cycle, linearly polarized laser pulse are investigated. Spectral features characteristic of multiphoton as well as tunneling ionization coexist over a range of the Keldysh parameter γ in the transition regime γ∼1. Surprisingly, the simple strong-field approximation (SFA) is capable of reproducing the key features of the two-dimensional momentum distributions found in the full solution of the time-dependent Schroedinger equation, despite the fact that SFA is known to severely underestimate the total ionization probability

  20. Science and Communication: An Author/Editor/User's Perspective on the Transition from Paper to Electronic Publishing.

    Science.gov (United States)

    Resh, Vincent H.

    1998-01-01

    Discusses the influence of electronic publishing on communication of scientific research. Topics include subscription costs; lagtime between submission and publication; peer review; attitudes of librarians and publishers; value-added features of electronic journals; copyright and licensing issues; and author collaboration. (Author/LRW)

  1. Advanced Missile Signature Center

    Data.gov (United States)

    Federal Laboratory Consortium — The Advanced Missile Signature Center (AMSC) is a national facility supporting the Missile Defense Agency (MDA) and other DoD programs and customers with analysis,...

  2. Physics Signatures at CLIC

    CERN Document Server

    Battaglia, Marco

    2001-01-01

    A set of signatures for physics processes of potential interests for the CLIC programme at = 1 - 5 TeV are discussed. These signatures, that may correspond to the manifestation of different scenarios of new physics as well as to Standard Model precision tests, are proposed as benchmarks for the optimisation of the CLIC accelerator parameters and for a first definition of the required detector response.

  3. 76 FR 9024 - Agency Information Collection Activities; Proposed Collection; Comment Request; Electronic...

    Science.gov (United States)

    2011-02-16

    ...] Agency Information Collection Activities; Proposed Collection; Comment Request; Electronic Records; Electronic Signatures AGENCY: Food and Drug Administration, HHS. ACTION: Notice. SUMMARY: The Food and Drug... relating to FDA's electronic records and electronic signatures. DATES: Submit either electronic or written...

  4. Signature of ferro–paraelectric transition in biferroic LuCrO{sub 3} from electron paramagnetic resonance and non-resonant microwave absorption

    Energy Technology Data Exchange (ETDEWEB)

    Alvarez, G., E-mail: memodin@yahoo.com [Escuela Superior de Física y Matemáticas del Instituto Politécnico Nacional, U.P.A.L.M, Edificio 9, Av. Instituto Politécnico Nacional S/N, San Pedro Zacatenco, México DF 07738 (Mexico); Montiel, H. [Centro de Ciencias Aplicadas y Desarrollo Tecnológico de la Universidad Nacional Autónoma de México, Cd. Universitaria, A.P. 70-186, México DF 04510 (Mexico); Durán, A. [Centro de Nanociencias y Nanotecnología de la Universidad Nacional Autónoma de México, Km. 107, Carretera Tijuana-Ensenada, Apartado Postal 14, C.P. 22800 Ensenada, B.C. México (Mexico); Conde-Gallardo, A. [Departamento de Física, CINVESTAV-IPN, A.P. 14-740, México DF 07360 (Mexico); Zamorano, R. [Escuela Superior de Física y Matemáticas del Instituto Politécnico Nacional, U.P.A.L.M, Edificio 9, Av. Instituto Politécnico Nacional S/N, San Pedro Zacatenco, México DF 07738 (Mexico)

    2014-12-15

    An electron paramagnetic resonance (EPR) study in the polycrystalline biferroic LuCrO{sub 3} is carried out at X-band (8.8–9.8 GHz) in the 295–510 K temperature range. For all the temperatures, the EPR spectra show a single broad line attributable to Cr{sup 3+} (S = 3/2) ions. The onset of a ferro–paraelectric transition has been determined from the temperature dependence of the parameters deduced from EPR spectra: the peak-to-peak linewidth (ΔH{sub pp}), the g-factor and the integral intensity (I{sub EPR}). Magnetically modulated microwave absorption spectroscopy (MAMMAS) and low-field microwave absorption (LFMA) are used to give further information on this material, where these techniques give also evidence of the ferro–paraelectric transition; indicating a behavior in agreement with a diffuse phase transition. - Highlights: • LuCrO{sub 3} powders are obtained via auto-ignition synthesis. • EPR is employed to study the onset of the ferro–paraelectric transition. • MAMMAS and LFMA techniques are used to give further information on this material.

  5. Signature of ferro–paraelectric transition in biferroic LuCrO3 from electron paramagnetic resonance and non-resonant microwave absorption

    International Nuclear Information System (INIS)

    Alvarez, G.; Montiel, H.; Durán, A.; Conde-Gallardo, A.; Zamorano, R.

    2014-01-01

    An electron paramagnetic resonance (EPR) study in the polycrystalline biferroic LuCrO 3 is carried out at X-band (8.8–9.8 GHz) in the 295–510 K temperature range. For all the temperatures, the EPR spectra show a single broad line attributable to Cr 3+ (S = 3/2) ions. The onset of a ferro–paraelectric transition has been determined from the temperature dependence of the parameters deduced from EPR spectra: the peak-to-peak linewidth (ΔH pp ), the g-factor and the integral intensity (I EPR ). Magnetically modulated microwave absorption spectroscopy (MAMMAS) and low-field microwave absorption (LFMA) are used to give further information on this material, where these techniques give also evidence of the ferro–paraelectric transition; indicating a behavior in agreement with a diffuse phase transition. - Highlights: • LuCrO 3 powders are obtained via auto-ignition synthesis. • EPR is employed to study the onset of the ferro–paraelectric transition. • MAMMAS and LFMA techniques are used to give further information on this material

  6. Development of a user-friendly system for image processing of electron microscopy by integrating a web browser and PIONE with Eos.

    Science.gov (United States)

    Tsukamoto, Takafumi; Yasunaga, Takuo

    2014-11-01

    Eos (Extensible object-oriented system) is one of the powerful applications for image processing of electron micrographs. In usual cases, Eos works with only character user interfaces (CUI) under the operating systems (OS) such as OS-X or Linux, not user-friendly. Thus, users of Eos need to be expert at image processing of electron micrographs, and have a little knowledge of computer science, as well. However, all the persons who require Eos does not an expert for CUI. Thus we extended Eos to a web system independent of OS with graphical user interfaces (GUI) by integrating web browser.Advantage to use web browser is not only to extend Eos with GUI, but also extend Eos to work under distributed computational environment. Using Ajax (Asynchronous JavaScript and XML) technology, we implemented more comfortable user-interface on web browser. Eos has more than 400 commands related to image processing for electron microscopy, and the usage of each command is different from each other. Since the beginning of development, Eos has managed their user-interface by using the interface definition file of "OptionControlFile" written in CSV (Comma-Separated Value) format, i.e., Each command has "OptionControlFile", which notes information for interface and its usage generation. Developed GUI system called "Zephyr" (Zone for Easy Processing of HYpermedia Resources) also accessed "OptionControlFIle" and produced a web user-interface automatically, because its mechanism is mature and convenient,The basic actions of client side system was implemented properly and can supply auto-generation of web-form, which has functions of execution, image preview, file-uploading to a web server. Thus the system can execute Eos commands with unique options for each commands, and process image analysis. There remain problems of image file format for visualization and workspace for analysis: The image file format information is useful to check whether the input/output file is correct and we also

  7. Electronic Voucher Approval - Financial Management

    Data.gov (United States)

    US Agency for International Development — This process provides a workflow and eSignature capability which allows the CFO to router vouchers for review and electronic signature approval to COTRs in AIDW. It...

  8. Intentions to smoke cigarettes among never-smoking US middle and high school electronic cigarette users: National Youth Tobacco Survey, 2011-2013.

    Science.gov (United States)

    Bunnell, Rebecca E; Agaku, Israel T; Arrazola, René A; Apelberg, Benjamin J; Caraballo, Ralph S; Corey, Catherine G; Coleman, Blair N; Dube, Shanta R; King, Brian A

    2015-02-01

    Electronic cigarette (e-cigarette) use is increasing rapidly, and the impact on youth is unknown. We assessed associations between e-cigarette use and smoking intentions among US youth who had never smoked conventional cigarettes. We analyzed data from the nationally representative 2011, 2012, and 2013 National Youth Tobacco Surveys of students in grades 6-12. Youth reporting they would definitely not smoke in the next year or if offered a cigarette by a friend were defined as not having an intention to smoke; all others were classified as having positive intention to smoke conventional cigarettes. Demographics, pro-tobacco advertisement exposure, ever use of e-cigarettes, and ever use of other combustibles (cigars, hookah, bidis, kreteks, and pipes) and noncombustibles (chewing tobacco, snuff, dip, snus, and dissolvables) were included in multivariate analyses that assessed associations with smoking intentions among never-cigarette-smoking youth. Between 2011 and 2013, the number of never-smoking youth who used e-cigarettes increased 3-fold, from 79,000 to more than 263,000. Intention to smoke conventional cigarettes was 43.9% among ever e-cigarette users and 21.5% among never users. Ever e-cigarette users had higher adjusted odds for having smoking intentions than never users (adjusted odds ratio = 1.70, 95% confidence interval = 1.24-2.32). Those who ever used other combustibles, ever used noncombustibles, or reported pro-tobacco advertisement exposure also had increased odds for smoking intentions. In 2013, more than a quarter million never-smoking youth used e-cigarettes. E-cigarette use is associated with increased intentions to smoke cigarettes, and enhanced prevention efforts for youth are important for all forms of tobacco, including e-cigarettes. Published by Oxford University Press on behalf of the Society for Research on Nicotine and Tobacco 2014. This work is written by (a) US Government employee(s) and is in the public domain in the US.

  9. Intentions to Smoke Cigarettes Among Never-Smoking US Middle and High School Electronic Cigarette Users: National Youth Tobacco Survey, 2011–2013

    Science.gov (United States)

    Agaku, Israel T.; Arrazola, René A.; Apelberg, Benjamin J.; Caraballo, Ralph S.; Corey, Catherine G.; Coleman, Blair N.; Dube, Shanta R.; King, Brian A.

    2015-01-01

    Introduction: Electronic cigarette (e-cigarette) use is increasing rapidly, and the impact on youth is unknown. We assessed associations between e-cigarette use and smoking intentions among US youth who had never smoked conventional cigarettes. Methods: We analyzed data from the nationally representative 2011, 2012, and 2013 National Youth Tobacco Surveys of students in grades 6–12. Youth reporting they would definitely not smoke in the next year or if offered a cigarette by a friend were defined as not having an intention to smoke; all others were classified as having positive intention to smoke conventional cigarettes. Demographics, pro-tobacco advertisement exposure, ever use of e-cigarettes, and ever use of other combustibles (cigars, hookah, bidis, kreteks, and pipes) and noncombustibles (chewing tobacco, snuff, dip, snus, and dissolvables) were included in multivariate analyses that assessed associations with smoking intentions among never-cigarette-smoking youth. Results: Between 2011 and 2013, the number of never-smoking youth who used e-cigarettes increased 3-fold, from 79,000 to more than 263,000. Intention to smoke conventional cigarettes was 43.9% among ever e-cigarette users and 21.5% among never users. Ever e-cigarette users had higher adjusted odds for having smoking intentions than never users (adjusted odds ratio = 1.70, 95% confidence interval = 1.24–2.32). Those who ever used other combustibles, ever used noncombustibles, or reported pro-tobacco advertisement exposure also had increased odds for smoking intentions. Conclusion: In 2013, more than a quarter million never-smoking youth used e-cigarettes. E-cigarette use is associated with increased intentions to smoke cigarettes, and enhanced prevention efforts for youth are important for all forms of tobacco, including e-cigarettes. PMID:25143298

  10. An ID-based Blind Signature Scheme from Bilinear Pairings

    OpenAIRE

    B.Umaprasada Rao; K.A.Ajmath

    2010-01-01

    Blind signatures, introduced by Chaum, allow a user to obtain a signature on a message without revealing any thing about the message to the signer. Blind signatures play on important role in plenty of applications such as e-voting, e-cash system where anonymity is of great concern. Identity based(ID-based) public key cryptography can be a good alternative for certified based public key setting, especially when efficient key management and moderate security are required. In this paper, we prop...

  11. Can the developer be the user? A possible explanation for the increasing number of customer complaints in consumer electronics

    NARCIS (Netherlands)

    Luyk - de Visser, I.M.; Lu, Y.; Brombacher, A.C.

    2008-01-01

    Different business trends within consumer electronics industry have resulted in an increasing number of customer complaints in the after-market. Research into this increasing number by Den Ouden indicates that 85% of the complaints can be traced back to decisions made in the product creation process

  12. Anticipating Soft Problems with Consumer Electronic Products : How do soft problems interact with user characteristics and product properties?

    NARCIS (Netherlands)

    Kim, C.

    2012-01-01

    Over the last decade consumer electronic product industries have been confronted with an increase in consumer complaints. Interestingly about half of the reasons for product return are based on so called ‘soft problems’, consumer complaints that cannot be traced back to technical problems. Probably

  13. Big Comsats for big jobs at low user cost. [considering wrist telephony, electronic mail transmission and educational television applications

    Science.gov (United States)

    Bekey, I.

    1979-01-01

    Three examples are used to illustrate what is possible with large space systems: (1) personal communications using wrist telephones, (2) electronic transmission of mail, and (3) wide dissemination of educational TV. Design concepts and costs are explored and compared to alternative ground-based concepts.

  14. Uncertainty in hydrological signatures

    Science.gov (United States)

    McMillan, Hilary; Westerberg, Ida

    2015-04-01

    Information that summarises the hydrological behaviour or flow regime of a catchment is essential for comparing responses of different catchments to understand catchment organisation and similarity, and for many other modelling and water-management applications. Such information types derived as an index value from observed data are known as hydrological signatures, and can include descriptors of high flows (e.g. mean annual flood), low flows (e.g. mean annual low flow, recession shape), the flow variability, flow duration curve, and runoff ratio. Because the hydrological signatures are calculated from observed data such as rainfall and flow records, they are affected by uncertainty in those data. Subjective choices in the method used to calculate the signatures create a further source of uncertainty. Uncertainties in the signatures may affect our ability to compare different locations, to detect changes, or to compare future water resource management scenarios. The aim of this study was to contribute to the hydrological community's awareness and knowledge of data uncertainty in hydrological signatures, including typical sources, magnitude and methods for its assessment. We proposed a generally applicable method to calculate these uncertainties based on Monte Carlo sampling and demonstrated it for a variety of commonly used signatures. The study was made for two data rich catchments, the 50 km2 Mahurangi catchment in New Zealand and the 135 km2 Brue catchment in the UK. For rainfall data the uncertainty sources included point measurement uncertainty, the number of gauges used in calculation of the catchment spatial average, and uncertainties relating to lack of quality control. For flow data the uncertainty sources included uncertainties in stage/discharge measurement and in the approximation of the true stage-discharge relation by a rating curve. The resulting uncertainties were compared across the different signatures and catchments, to quantify uncertainty

  15. Practical quantum digital signature

    Science.gov (United States)

    Yin, Hua-Lei; Fu, Yao; Chen, Zeng-Bing

    2016-03-01

    Guaranteeing nonrepudiation, unforgeability as well as transferability of a signature is one of the most vital safeguards in today's e-commerce era. Based on fundamental laws of quantum physics, quantum digital signature (QDS) aims to provide information-theoretic security for this cryptographic task. However, up to date, the previously proposed QDS protocols are impractical due to various challenging problems and most importantly, the requirement of authenticated (secure) quantum channels between participants. Here, we present the first quantum digital signature protocol that removes the assumption of authenticated quantum channels while remaining secure against the collective attacks. Besides, our QDS protocol can be practically implemented over more than 100 km under current mature technology as used in quantum key distribution.

  16. Incorporating X–ray summing into gamma–gamma signature quantification

    International Nuclear Information System (INIS)

    Britton, R.; Jackson, M.J.; Davies, A.V.

    2016-01-01

    A method for quantifying coincidence signatures has been extended to incorporate the effects of X–ray summing, and tested using a high–efficiency γ–γ system. An X–ray library has been created, allowing all possible γ, X–ray and conversion electron cascades to be generated. The equations for calculating efficiency and cascade summing corrected coincidence signature probabilities have also been extended from a two γ, two detector ‘special case’ to an arbitrarily large system. The coincidence library generated is fully searchable by energy, nuclide, coincidence pair, γ multiplicity, cascade probability and the half–life of the cascade, allowing the user to quickly identify coincidence signatures of interest. The method and software described is inherently flexible, as it only requires evaluated nuclear data, an X–ray library, and accurate efficiency characterisations to quickly and easily calculate coincidence signature probabilities for a variety of systems. Additional uses for the software include the fast identification of γ coincidence signals with required multiplicities and branching ratios, identification of the optimal coincidence signatures to measure for a particular system, and the calculation of cascade summing corrections for single detector systems. - Highlights: • Method for incorporating X-ray summing into coincidence measurements developed. • Calculation routines have been extended to an arbitrarily large detector system, and re-written to take advantage of multiple computing cores. • Data collected in list-mode with all events timestamped for offline coincidence analysis. • Coincidence analysis of environmental samples will dramatically improve the detection sensitivity achievable.

  17. Integrated Tiger Series of electron/photon Monte Carlo transport codes: a user's guide for use on IBM mainframes

    International Nuclear Information System (INIS)

    Kirk, B.L.

    1985-12-01

    The ITS (Integrated Tiger Series) Monte Carlo code package developed at Sandia National Laboratories and distributed as CCC-467/ITS by the Radiation Shielding Information Center (RSIC) at Oak Ridge National Laboratory (ORNL) consists of eight codes - the standard codes, TIGER, CYLTRAN, ACCEPT; the P-codes, TIGERP, CYLTRANP, ACCEPTP; and the M-codes ACCEPTM, CYLTRANM. The codes have been adapted to run on the IBM 3081, VAX 11/780, CDC-7600, and Cray 1 with the use of the update emulator UPEML. This manual should serve as a guide to a user running the codes on IBM computers having 370 architecture. The cases listed were tested on the IBM 3033, under the MVS operating system using the VS Fortran Level 1.3.1 compiler

  18. Signatures of the Invisible

    CERN Multimedia

    Strom, D

    2003-01-01

    On the Net it is possible to take a look at art from afar via Virtual Museums. One such exhibition was recently in the New York Museum of Modern Art's branch, PS1. Entitled 'Signatures of the Invisible' it was a collaborative effort between artists and physicists (1/2 page).

  19. Assessing electronic cigarette emissions: linking physico-chemical properties to product brand, e-liquid flavoring additives, operational voltage and user puffing patterns.

    Science.gov (United States)

    Zhao, Jiayuan; Nelson, Jordan; Dada, Oluwabunmi; Pyrgiotakis, Georgios; Kavouras, Ilias G; Demokritou, Philip

    2018-02-01

    Users of electronic cigarettes (e-cigs) are exposed to particles and other gaseous pollutants. However, major knowledge gaps on the physico-chemical properties of such exposures and contradictory data in published literature prohibit health risk assessment. Here, the effects of product brand, type, e-liquid flavoring additives, operational voltage, and user puffing patterns on emissions were systematically assessed using a recently developed, versatile, e-cig exposure generation platform and state-of-the-art analytical methods. Parameters of interest in this systematic evaluation included two brands (A and B), three flavors (tobacco, menthol, and fruit), three types of e-cigs (disposable, pre-filled, and refillable tanks), two puffing protocols (4 and 2 s/puff), and four operational voltages (2.2-5.7 V). Particles were generated at a high number concentration (10 6 -10 7 particles/cm 3 ). The particle size distribution was bi-modal (∼200 nm and 1 µm). Furthermore, organic species (humectants propylene glycol and glycerin, nicotine) that were present in e-liquid and trace metals (potassium and sodium) that were present on e-cig heating coil were also released into the emission. In addition, combustion-related byproducts, such as benzene and toluene, were also detected in the range of 100-38,000 ppbv/puff. Parametric analyzes performed in this study show the importance of e-cig brand, type, flavor additives, user puffing pattern (duration and frequency), and voltage on physico-chemical properties of emissions. This observed influence is indicative of the complexity associated with the toxicological screening of emissions from e-cigs and needs to be taken into consideration.

  20. Life-threatening Vesicular Bronchial Injury Requiring Veno-venous Extracorporeal Membrane Oxygenation Rescue in an Electronic Nicotine Delivery System User

    Directory of Open Access Journals (Sweden)

    Thomas Carter

    2017-07-01

    Full Text Available The use of electronic nicotine delivery systems (ENDS is increasing across the United States as tobacco bans increase and more people use these devices in an attempt to quit smoking. They are unregulated by the Food and Drug Administration, and there is significant concern that ENDS could produce several toxic byproducts. In this case a 35-year-old female presented to the emergency department with sudden-onset dyspnea. She denied current tobacco smoking, but she was a user of ENDS. When bronchoscopy was performed, an extensive pattern of suspected chemical injury was noted in her airways. She required transfer to a tertiary center where she required extracorporeal membranous oxygenation. Despite public opinion that ENDS are generally safe, or at least safer than tobacco smoking, contrary evidence is mounting. We postulate that her injuries were likely suffered secondary to use of an ENDS.

  1. The Experimental Tobacco Marketplace II: Substitutability and sex effects in dual electronic cigarette and conventional cigarette users

    Science.gov (United States)

    Quisenberry, Amanda J.; Koffarnus, Mikhail N.; Epstein, Leonard H.; Bickel, Warren K.

    2017-01-01

    Aim The aim of the current study was to evaluate tobacco product purchasing in the Experimental Tobacco Marketplace (ETM) among male and female smokers who also use e-cigarettes. We hypothesized a high substitution profile for e-cigarettes and that males would purchase more Snus than females. Methods The ETM is an online market used in clinical abuse liability research to mimic real-world purchasing patterns. Tobacco products, including each participant’s usual choice of conventional and e-cigarettes, were presented along with a price and description of nicotine content. Participants were endowed with an account balance based on the number of cigarettes and e-cigarettes consumed per week. Each participant was exposed to four ETM sessions in random order during which the price of conventional cigarettes was manipulated. Results Cigarette consumption decreased as price increased. A mixed factor three-way ANOVA revealed a significant main effect of price (i.e., more alternative products were purchased at higher cigarette prices), product (i.e., more e-cigarettes were purchased than gum, lozenges, and Snus), and sex (i.e., males purchased more than females). A significant three-way interaction indicated that males purchased more e-cigarettes, Snus, and dip than females at higher cigarette prices. Conclusion This study suggests that the user profile of cigarette smokers is associated with behavioral economic measures of alternative product substitution and indicates that the evaluation of nicotine replacement products should be considered for both males and females separately. PMID:28732318

  2. The Experimental Tobacco Marketplace II: Substitutability and sex effects in dual electronic cigarette and conventional cigarette users.

    Science.gov (United States)

    Quisenberry, Amanda J; Koffarnus, Mikhail N; Epstein, Leonard H; Bickel, Warren K

    2017-09-01

    The aim of the current study was to evaluate tobacco product purchasing in the Experimental: Tobacco Marketplace (ETM) among male and female smokers who also use e-cigarettes. We hypothesized a high substitution profile for e-cigarettes and that males would purchase more Snus than females. The ETM is an online market used in clinical abuse liability research to mimic real-world purchasing patterns. Tobacco products, including each participant's usual choice of conventional and e-cigarettes, were presented along with a price and description of nicotine content. Participants were endowed with an account balance based on the number of cigarettes and e-cigarettes consumed per week. Each participant was exposed to four ETM sessions in random order during which the price of conventional cigarettes was manipulated. Cigarette consumption decreased as price increased. A mixed factor three-way ANOVA revealed a significant main effect of price (i.e., more alternative products were purchased at higher cigarette prices), product (i.e., more e-cigarettes were purchased than gum, lozenges, and Snus), and sex (i.e., males purchased more than females). A significant three-way interaction indicated that males purchased more e-cigarettes, Snus, and dip than females at higher cigarette prices. This study suggests that the user profile of cigarette smokers is associated with behavioral economic measures of alternative product substitution and indicates that the evaluation of nicotine replacement products should be considered for both males and females separately. Copyright © 2017 Elsevier B.V. All rights reserved.

  3. Time-dependent delayed signatures from energetic photon interrogations

    International Nuclear Information System (INIS)

    Norman, Daren R.; Jones, James L.; Blackburn, Brandon W.; Haskell, Kevin J.; Johnson, James T.; Watson, Scott M.; Hunt, Alan W.; Spaulding, Randy; Harmon, Frank

    2007-01-01

    Pulsed photonuclear interrogation environments generated by 8-24 MeV electron linac are rich with time-dependent, material-specific, radiation signatures. Nitrogen-based explosives and nuclear materials can be detected by exploiting these signatures in different delayed-time regions. Numerical and experimental results presented in this paper show the unique time and energy dependence of these signatures. It is shown that appropriate delayed-time windows are essential to acquire material-specific signatures in pulsed photonuclear assessment environments. These developments demonstrate that pulsed, high-energy, photon-inspection environments can be exploited for time-dependent, material-specific signatures through the proper operation of specialized detectors and detection methods

  4. Comparison of Fingerprint and Iris Biometric Authentication for Control of Digital Signatures

    OpenAIRE

    Zuckerman, Alan E.; Moon, Kenneth A.; Eaddy, Kenneth

    2002-01-01

    Biometric authentication systems can be used to control digital signature of medical documents. This pilot study evaluated the use of two different fingerprint technologies and one iris technology to control creation of digital signatures on a central server using public private key pairs stored on the server. Documents and signatures were stored in XML for portability. Key pairs and authentication certificates were generated during biometric enrollment. Usability and user acceptance were gua...

  5. Cryptographic key generation using handwritten signature

    OpenAIRE

    Freire, Manuel R.; Fiérrez, Julián; Ortega-García, Javier

    2006-01-01

    M. Freire-Santos ; J. Fierrez-Aguilar ; J. Ortega-Garcia; "Cryptographic key generation using handwritten signature", Biometric Technology for Human Identification III, Proc. SPIE 6202 (April 17, 2006); doi:10.1117/12.665875. Copyright 2006 Society of Photo‑Optical Instrumentation Engineers. One print or electronic copy may be made for personal use only. Systematic reproduction and distribution, duplication of any material in this paper for a fee or for commercial purposes, or modification of...

  6. A Directed Signature Scheme and its Applications

    OpenAIRE

    Lal, Sunder; Kumar, Manoj

    2004-01-01

    This paper presents a directed signature scheme with the property that the signature can be verified only with the help of signer or signature receiver. We also propose its applications to share verification of signatures and to threshold cryptosystems.

  7. Optimizing the user interface of a data entry module for an electronic patient record for cardiac rehabilitation: A mixed method usability approach.

    Science.gov (United States)

    van Engen-Verheul, Mariëtte M; Peute, Linda W P; de Keizer, Nicolette F; Peek, Niels; Jaspers, Monique W M

    2016-03-01

    Cumbersome electronic patient record (EPR) interfaces may complicate data-entry in clinical practice. Completeness of data entered in the EPR determines, among other things, the value of computerized clinical decision support (CCDS). Quantitative usability evaluations can provide insight into mismatches between the system design model of data entry and users' data entry behavior, but not into the underlying causes for these mismatches. Mixed method usability evaluation studies may provide these insights, and thus support generating redesign recommendations for improving an EPR system's data entry interface. To improve the usability of the data entry interface of an EPR system with CCDS in the field of cardiac rehabilitation (CR), and additionally, to assess the value of a mixed method usability approach in this context. Seven CR professionals performed a think-aloud usability evaluation both before (beta-version) and after the redesign of the system. Observed usability problems from both evaluations were analyzed and categorized using Zhang et al.'s heuristic principles of good interface design. We combined the think-aloud usability evaluation of the system's beta-version with the measurement of a new usability construct: users' deviations in action sequence from the system's predefined data entry order sequence. Recommendations for redesign were implemented. We assessed whether the redesign improved CR professionals' (1) task efficacy (with respect to the completeness of data they collected), and (2) task efficiency (with respect to the average number of mouse clicks they needed to complete data entry subtasks). With the system's beta version, 40% of health care professionals' navigation actions through the system deviated from the predefined next system action. The causes for these deviations as revealed by the think-aloud method mostly concerned mismatches between the system design model for data entry action sequences and users expectations of these action

  8. Effects of user training with electronically-modulated sound transmission hearing protectors and the open ear on horizontal localization ability.

    Science.gov (United States)

    Casali, John G; Robinette, Martin B

    2015-02-01

    To determine if training with electronically-modulated hearing protection (EMHP) and the open ear results in auditory learning on a horizontal localization task. Baseline localization testing was conducted in three listening conditions (open-ear, in-the-ear (ITE) EMHP, and over-the-ear (OTE) EMHP). Participants then wore either an ITE or OTE EMHP for 12, almost daily, one-hour training sessions. After training was complete, participants again underwent localization testing in all three listening conditions. A computer with a custom software and hardware interface presented localization sounds and collected participant responses. Twelve participants were recruited from the student population at Virginia Tech. Audiometric requirements were 35 dBHL at 500, 1000, and 2000 Hz bilaterally, and 55 dBHL at 4000 Hz in at least one ear. Pre-training localization performance with an ITE or OTE EMHP was worse than open-ear performance. After training with any given listening condition, including open-ear, performance in that listening condition improved, in part from a practice effect. However, post-training localization performance showed near equal performance between the open-ear and training EMHP. Auditory learning occurred for the training EMHP, but not for the non-training EMHP; that is, there was no significant training crossover effect between the ITE and the OTE devices. It is evident from this study that auditory learning (improved horizontal localization performance) occurred with the EMHP for which training was performed. However, performance improvements found with the training EMHP were not realized in the non-training EMHP. Furthermore, localization performance in the open-ear condition also benefitted from training on the task.

  9. Searchable Signatures: Context and the Struggle for Recognition

    Directory of Open Access Journals (Sweden)

    Gina Schlesselman-Tarango

    2013-09-01

    Full Text Available Social networking sites made possible through Web 2.0 allow for unique user-generated tags called “searchable signatures.”  These tags move beyond the descriptive and act as means for users to assert online individual and group identities.  A study of searchable signatures on the Instagram application demonstrates that these types of tags are valuable not only because they allow for both individuals and groups to engage in what social theorist Axel Honneth calls the struggle for recognition, but also because they provide contextual use data and sociohistorical information so important to the understanding of digital objects.  This article explores how searchable signatures might be used by both patrons and staff in library environments.

  10. Network-based Arbitrated Quantum Signature Scheme with Graph State

    Science.gov (United States)

    Ma, Hongling; Li, Fei; Mao, Ningyi; Wang, Yijun; Guo, Ying

    2017-08-01

    Implementing an arbitrated quantum signature(QAS) through complex networks is an interesting cryptography technology in the literature. In this paper, we propose an arbitrated quantum signature for the multi-user-involved networks, whose topological structures are established by the encoded graph state. The determinative transmission of the shared keys, is enabled by the appropriate stabilizers performed on the graph state. The implementation of this scheme depends on the deterministic distribution of the multi-user-shared graph state on which the encoded message can be processed in signing and verifying phases. There are four parties involved, the signatory Alice, the verifier Bob, the arbitrator Trent and Dealer who assists the legal participants in the signature generation and verification. The security is guaranteed by the entanglement of the encoded graph state which is cooperatively prepared by legal participants in complex quantum networks.

  11. Adaptive Digital Signature Design and Short-Data-Record Adaptive Filtering

    National Research Council Canada - National Science Library

    Pados, Dimitiris A

    2008-01-01

    This report covers the research performed to create and develop a digital signature design analysis and development methodology that will support robust multi-user communications in rapidly changing environments...

  12. USign--a security enhanced electronic consent model.

    Science.gov (United States)

    Li, Yanyan; Xie, Mengjun; Bian, Jiang

    2014-01-01

    Electronic consent becomes increasingly popular in the healthcare sector given the many benefits it provides. However, security concerns, e.g., how to verify the identity of a person who is remotely accessing the electronic consent system in a secure and user-friendly manner, also arise along with the popularity of electronic consent. Unfortunately, existing electronic consent systems do not pay sufficient attention to those issues. They mainly rely on conventional password based authentication to verify the identity of an electronic consent user, which is far from being sufficient given that identity theft threat is real and significant in reality. In this paper, we present a security enhanced electronic consent model called USign. USign enhances the identity protection and authentication for electronic consent systems by leveraging handwritten signatures everyone is familiar with and mobile computing technologies that are becoming ubiquitous. We developed a prototype of USign and conducted preliminary evaluation on accuracy and usability of signature verification. Our experimental results show the feasibility of the proposed model.

  13. Electronics

    Science.gov (United States)

    2001-01-01

    International Acer Incorporated, Hsin Chu, Taiwan Aerospace Industrial Development Corporation, Taichung, Taiwan American Institute of Taiwan, Taipei, Taiwan...Singapore and Malaysia .5 - 4 - The largest market for semiconductor products is the high technology consumer electronics industry that consumes up...Singapore, and Malaysia . A new semiconductor facility costs around $3 billion to build and takes about two years to become operational

  14. Signatures of topological superconductivity

    Energy Technology Data Exchange (ETDEWEB)

    Peng, Yang

    2017-07-19

    The prediction and experimental discovery of topological insulators brought the importance of topology in condensed matter physics into the limelight. Topology hence acts as a new dimension along which more and more new states of matter start to emerge. One of these topological states of matter, namely topological superconductors, comes into the focus because of their gapless excitations. These gapless excitations, especially in one dimensional topological superconductors, are Majorana zero modes localized at the ends of the superconductor and exhibit exotic nonabelian statistics, which can be potentially applied to fault-tolerant quantum computation. Given their highly interesting physical properties and potential applications to quantum computation, both theorists and experimentalists spend great efforts to realize topological supercondoctors and to detect Majoranas. In two projects within this thesis, we investigate the properties of Majorana zero modes in realistic materials which are absent in simple theoretical models. We find that the superconducting proximity effect, an essential ingredient in all existing platforms for topological superconductors, plays a significant role in determining the localization property of the Majoranas. Strong proximity coupling between the normal system and the superconducting substrate can lead to strongly localized Majoranas, which can explain the observation in a recent experiment. Motivated by experiments in Molenkamp's group, we also look at realistic quantum spin Hall Josephson junctions, in which charge puddles acting as magnetic impurities are coupled to the helical edge states. We find that with this setup, the junction generically realizes an exotic 8π periodic Josephson effect, which is absent in a pristine Josephson junction. In another two projects, we propose more pronounced signatures of Majoranas that are accessible with current experimental techniques. The first one is a transport measurement, which uses

  15. Modem Signature Analysis.

    Science.gov (United States)

    1982-10-01

    AD-A127 993 MODEM SIGNATURE ANALISIS (U) PAR TECHNOLOGY CORP NEW / HARTFORD NY V EDWARDS ET AL. OCT 82 RADC-TR-82-269 F30602-80-C-0264 NCLASSIFIED F/G...as an indication of the class clustering and separation between different classes in the modem data base. It is apparent from the projection that the...that as the clusters disperse, the likelihood of a sample crossing the boundary into an adjacent region and causing a symbol decision error increases. As

  16. Expressiveness considerations of XML signatures

    DEFF Research Database (Denmark)

    Jensen, Meiko; Meyer, Christopher

    2011-01-01

    XML Signatures are used to protect XML-based Web Service communication against a broad range of attacks related to man-in-the-middle scenarios. However, due to the complexity of the Web Services specification landscape, the task of applying XML Signatures in a robust and reliable manner becomes...... more and more challenging. In this paper, we investigate this issue, describing how an attacker can still interfere with Web Services communication even in the presence of XML Signatures. Additionally, we discuss the interrelation of XML Signatures and XML Encryption, focussing on their security...

  17. Personal Identification and the Assessment of the Psychophysiological State While Writing a Signature

    Directory of Open Access Journals (Sweden)

    Pavel Lozhnikov

    2015-08-01

    Full Text Available This article discusses the problem of user identification and psychophysiological state assessment while writing a signature using a graphics tablet. The solution of the problem includes the creation of templates containing handwriting signature features simultaneously with the hidden registration of physiological parameters of a person being tested. Heart rate variability description in the different time points is used as a physiological parameter. As a result, a signature template is automatically generated for psychophysiological states of an identified person. The problem of user identification and psychophysiological state assessment is solved depending on the registered value of a physiological parameter.

  18. Signatures of Mechanosensitive Gating.

    Science.gov (United States)

    Morris, Richard G

    2017-01-10

    The question of how mechanically gated membrane channels open and close is notoriously difficult to address, especially if the protein structure is not available. This perspective highlights the relevance of micropipette-aspirated single-particle tracking-used to obtain a channel's diffusion coefficient, D, as a function of applied membrane tension, σ-as an indirect assay for determining functional behavior in mechanosensitive channels. While ensuring that the protein remains integral to the membrane, such methods can be used to identify not only the gating mechanism of a protein, but also associated physical moduli, such as torsional and dilational rigidity, which correspond to the protein's effective shape change. As an example, three distinct D-versus-σ "signatures" are calculated, corresponding to gating by dilation, gating by tilt, and gating by a combination of both dilation and tilt. Both advantages and disadvantages of the approach are discussed. Copyright © 2017 Biophysical Society. Published by Elsevier Inc. All rights reserved.

  19. Signatures of particles; Signatures de particules

    Energy Technology Data Exchange (ETDEWEB)

    Depasse, P

    2004-11-15

    This document reports the work made by the author in the field of the improvement of gamma detection. The first part is dedicated to experiments and testing performed at the nuclear physics institute in Lyon. It deals with photo-sensors, avalanche photo-diodes and drift chambers. The second part presents the implementation of active lead rings (ALR) to the L3 detector. Although ALR cover only a hundredth of the total solid angle, they are useful for detecting events in which one or several particles bring away a large part of the momentum in a strongly forward direction (between 4 and 9 degrees). The third part is dedicated to the design of the electromagnetic calorimeter barrel that will equip the CMS (compact muon solenoid) that is due to operate on the large hadron collider (LHC). The work made for the selection of scintillating materials (cerium fluoride, lead tungstate), of photo-sensors and for the design of front electronic equipment is particularly detailed. The last part is dedicated to how the knowledge cumulated about photon detection could be beneficial for medical imaging, particularly for the detection of 511 keV photon released in positron collisions. (A.C.)

  20. Signatures de l'invisible

    CERN Multimedia

    CERN Press Office. Geneva

    2000-01-01

    "Signatures of the Invisible" is an unique collaboration between contemporary artists and contemporary physicists which has the potential to help redefine the relationship between science and art. "Signatures of the Invisible" is jointly organised by the London Institute - the world's largest college of art and design and CERN*, the world's leading particle physics laboratory. 12 leading visual artists:

  1. An interpretation of signature inversion

    International Nuclear Information System (INIS)

    Onishi, Naoki; Tajima, Naoki

    1988-01-01

    An interpretation in terms of the cranking model is presented to explain why signature inversion occurs for positive γ of the axially asymmetric deformation parameter and emerges into specific orbitals. By introducing a continuous variable, the eigenvalue equation can be reduced to a one dimensional Schroedinger equation by means of which one can easily understand the cause of signature inversion. (author)

  2. Cell short circuit, preshort signature

    Science.gov (United States)

    Lurie, C.

    1980-01-01

    Short-circuit events observed in ground test simulations of DSCS-3 battery in-orbit operations are analyzed. Voltage signatures appearing in the data preceding the short-circuit event are evaluated. The ground test simulation is briefly described along with performance during reconditioning discharges. Results suggest that a characteristic signature develops prior to a shorting event.

  3. Ship Signature Management System : Functionality

    NARCIS (Netherlands)

    Arciszewski, H.F.R.; Lier, L. van; Meijer, Y.G.S.; Noordkamp, H.W.; Wassenaar, A.S.

    2010-01-01

    A signature of a platform is the manner in which the platform manifests itself to a certain type of sensor and how observable it is when such a sensor is used to detect the platform. Because many military platforms use sensors in different media, it is the total of its different signatures that

  4. A Provably Secure Aggregate Signature Scheme for Healthcare Wireless Sensor Networks.

    Science.gov (United States)

    Shen, Limin; Ma, Jianfeng; Liu, Ximeng; Miao, Meixia

    2016-11-01

    Wireless sensor networks (WSNs) are being used in a wide range of applications for healthcare monitoring, like heart rate monitors and blood pressure monitors, which can minimize the need for healthcare professionals. In medical system, sensors on or in patients produce medical data which can be easily compromised by a vast of attacks. Although signature schemes can protect data authenticity and data integrity, when the number of users involved in the medical system becomes huge, the bandwidth and storage cost will rise sharply so that existing signature schemes are inapplicability for WSNs. In this paper, we propose an efficient aggregate signature scheme for healthcare WSNs according to an improved security model, which can combine multiple signatures into a single aggregate signature. The length of such an aggregate signature may be as long as that of an individual one, which can greatly decrease the bandwidth and storage cost for networks.

  5. A Quantum Multi-Proxy Weak Blind Signature Scheme Based on Entanglement Swapping

    Science.gov (United States)

    Yan, LiLi; Chang, Yan; Zhang, ShiBin; Han, GuiHua; Sheng, ZhiWei

    2017-02-01

    In this paper, we present a multi-proxy weak blind signature scheme based on quantum entanglement swapping of Bell states. In the scheme, proxy signers can finish the signature instead of original singer with his/her authority. It can be applied to the electronic voting system, electronic paying system, etc. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. It could guarantee not only the unconditionally security but also the anonymity of the message owner. The security analysis shows the scheme satisfies the security features of multi-proxy weak signature, singers cannot disavowal his/her signature while the signature cannot be forged by others, and the message owner can be traced.

  6. Effects of exposure to anti-vaping public service announcements among current smokers and dual users of cigarettes and electronic nicotine delivery systems.

    Science.gov (United States)

    Tan, Andy S L; Rees, Vaughan W; Rodgers, Justin; Agudile, Emeka; Sokol, Natasha A; Yie, Kyeungyeun; Sanders-Jackson, Ashley

    2018-05-16

    Anti-vaping public service announcements (PSAs) are intended to discourage vaping or use of electronic nicotine delivery systems (ENDS). However, vaping portrayals in PSAs may have unintended effects if they increase smoking or vaping urges. This study examined benefits and unintended effects of anti-vaping PSAs with vapor portrayals on smoking and vaping-related outcomes. Young adult smokers (N = 171) and dual users (N = 122) aged 21-30 years were randomly assigned to view: 1) anti-vaping PSAs with vapor; 2) anti-vaping PSAs without vapor; 3) physical activity PSAs; or 4) anti-smoking PSAs with smoking cues. Outcomes were changes in vaping and smoking urges before and after viewing PSAs, post-test vaping and smoking intentions in the next hour, and post-test intention to purchase ENDS and traditional cigarettes. Smokers only: Exposure to anti-vaping PSAs with vapor (vs. physical activity) was associated with lower intention to vape and to purchase ENDS (ps vaping PSAs with vapor (vs. PSAs without vapor and vs. anti-smoking PSAs with smoking cues) was associated with lower intention to vape in the next hour (ps vaping PSAs without vapor (vs. physical activity) was associated with lower change in vaping urge (p vaping PSAs without vapor (vs. anti-smoking PSAs) was associated with lower intention to purchase ENDS (p vaping PSAs with vapor was not associated with unintended effects and may have benefits on reducing smoking and vaping-related outcomes. Copyright © 2018. Published by Elsevier B.V.

  7. A simple but highly effective approach to evaluate the prognostic performance of gene expression signatures.

    Directory of Open Access Journals (Sweden)

    Maud H W Starmans

    Full Text Available BACKGROUND: Highly parallel analysis of gene expression has recently been used to identify gene sets or 'signatures' to improve patient diagnosis and risk stratification. Once a signature is generated, traditional statistical testing is used to evaluate its prognostic performance. However, due to the dimensionality of microarrays, this can lead to false interpretation of these signatures. PRINCIPAL FINDINGS: A method was developed to test batches of a user-specified number of randomly chosen signatures in patient microarray datasets. The percentage of random generated signatures yielding prognostic value was assessed using ROC analysis by calculating the area under the curve (AUC in six public available cancer patient microarray datasets. We found that a signature consisting of randomly selected genes has an average 10% chance of reaching significance when assessed in a single dataset, but can range from 1% to ∼40% depending on the dataset in question. Increasing the number of validation datasets markedly reduces this number. CONCLUSIONS: We have shown that the use of an arbitrary cut-off value for evaluation of signature significance is not suitable for this type of research, but should be defined for each dataset separately. Our method can be used to establish and evaluate signature performance of any derived gene signature in a dataset by comparing its performance to thousands of randomly generated signatures. It will be of most interest for cases where few data are available and testing in multiple datasets is limited.

  8. Arbitrated quantum signature scheme based on χ-type entangled states

    International Nuclear Information System (INIS)

    Zuo, Huijuan; Huang, Wei; Qin, Sujuan

    2013-01-01

    An arbitrated quantum signature scheme, which is mainly applied in electronic-payment systems, is proposed and investigated. The χ-type entangled states are used for quantum key distribution and quantum signature in this protocol. Compared with previous quantum signature schemes which also utilize χ-type entangled states, the proposed scheme provides higher efficiency. Finally, we also analyze its security under various kinds of attacks. (paper)

  9. Enhanced vibration diagnostics using vibration signature analysis

    International Nuclear Information System (INIS)

    Ahmed, S.; Shehzad, K.; Zahoor, Y.; Mahmood, A.; Bibi, A.

    2001-01-01

    Symptoms will appear in equipment, as well as in human beings. when 'suffering from sickness. Symptoms of abnormality in equipment are vibration, noise, deformation, temperature, pressure, electric current, crack, wearing, leakage etc. these are called modes of failure. If the mode of failure is vibration then the vibration signature analysis can be effectively used in order to diagnose the machinery problems. Much valuable information is contained within these vibration 'Spectra' or 'Signatures' but is only of use if the analyst can unlock its 'Secrets'. This paper documents a vibration problem in the motor of a centrifugal pump (Type ETA). It focuses mainly on the roll of modern vibration monitoring system in problem analysis. The problem experienced was the motor unstability and noise due to high vibration. Using enhanced vibration signature data, the problem was analyzed. which suggested that the rotor eccentricity was the cause of excessive noise and vibration in the motor. In conclusion, advanced electronic monitoring and diagnostic systems provide powerful information for machine's condition assessment and problem analysis. Appropriate interpretation and use of this information is important for accurate and effective vibration analysis. (author)

  10. Signatures for quark clustering in nuclei

    Energy Technology Data Exchange (ETDEWEB)

    Carlson, C.E. [College of William and Mary, Williamsburg, VA (United States); Lassila, K.E. [Iowa State Univ., Ames, IA (United States)

    1994-04-01

    As a signature for the presence of quark clusters in nuclei, the authors suggest studying backward protons produced by electron scattering off deuterons and suggest a ratio that cancels out much of the detailed properties of deuterons or 6-quark clusters. The test may be viewed as a test that the short range part of the deuteron is still a 2-nucleon system. They make estimates to show how it fails in characteristic and significant ways if the two nucleons at short range coalesce into a kneaded 6-quark cluster.

  11. Signatures for quark clustering in nuclei

    International Nuclear Information System (INIS)

    Carlson, C.E.; Lassila, K.E.

    1994-01-01

    As a signature for the presence of quark clusters in nuclei, the authors suggest studying backward protons produced by electron scattering off deuterons and suggest a ratio that cancels out much of the detailed properties of deuterons or 6-quark clusters. The test may be viewed as a test that the short range part of the deuteron is still a 2-nucleon system. They make estimates to show how it fails in characteristic and significant ways if the two nucleons at short range coalesce into a kneaded 6-quark cluster

  12. Initial Semantics for Strengthened Signatures

    Directory of Open Access Journals (Sweden)

    André Hirschowitz

    2012-02-01

    Full Text Available We give a new general definition of arity, yielding the companion notions of signature and associated syntax. This setting is modular in the sense requested by Ghani and Uustalu: merging two extensions of syntax corresponds to building an amalgamated sum. These signatures are too general in the sense that we are not able to prove the existence of an associated syntax in this general context. So we have to select arities and signatures for which there exists the desired initial monad. For this, we follow a track opened by Matthes and Uustalu: we introduce a notion of strengthened arity and prove that the corresponding signatures have initial semantics (i.e. associated syntax. Our strengthened arities admit colimits, which allows the treatment of the λ-calculus with explicit substitution.

  13. Retail applications of signature verification

    Science.gov (United States)

    Zimmerman, Thomas G.; Russell, Gregory F.; Heilper, Andre; Smith, Barton A.; Hu, Jianying; Markman, Dmitry; Graham, Jon E.; Drews, Clemens

    2004-08-01

    The dramatic rise in identity theft, the ever pressing need to provide convenience in checkout services to attract and retain loyal customers, and the growing use of multi-function signature captures devices in the retail sector provides favorable conditions for the deployment of dynamic signature verification (DSV) in retail settings. We report on the development of a DSV system to meet the needs of the retail sector. We currently have a database of approximately 10,000 signatures collected from 600 subjects and forgers. Previous work at IBM on DSV has been merged and extended to achieve robust performance on pen position data available from commercial point of sale hardware, achieving equal error rates on skilled forgeries and authentic signatures of 1.5% to 4%.

  14. Magnetic Signature Analysis & Validation System

    National Research Council Canada - National Science Library

    Vliet, Scott

    2001-01-01

    The Magnetic Signature Analysis and Validation (MAGSAV) System is a mobile platform that is used to measure, record, and analyze the perturbations to the earth's ambient magnetic field caused by object such as armored vehicles...

  15. 76 FR 30542 - Adult Signature Services

    Science.gov (United States)

    2011-05-26

    ... POSTAL SERVICE 39 CFR Part 111 Adult Signature Services AGENCY: Postal Service\\TM\\. ACTION: Final..., Domestic Mail Manual (DMM[supreg]) 503.8, to add a new extra service called Adult Signature. This new service has two available options: Adult Signature Required and Adult Signature Restricted Delivery. DATES...

  16. 1 CFR 18.7 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 1 General Provisions 1 2010-01-01 2010-01-01 false Signature. 18.7 Section 18.7 General Provisions... PREPARATION AND TRANSMITTAL OF DOCUMENTS GENERALLY § 18.7 Signature. The original and each duplicate original... stamped beneath the signature. Initialed or impressed signatures will not be accepted. Documents submitted...

  17. Radiation signatures from a locally energized flaring loop

    Science.gov (United States)

    Emslie, A. G.; Vlahos, L.

    1980-01-01

    The radiation signatures from a locally energized solar flare loop based on the physical properties of the energy release mechanisms were consistent with hard X-ray, microwave, and EUV observations for plausible source parameters. It was found that a suprathermal tail of high energy electrons is produced by the primary energy release, and that the number of energetic charged particles ejected into the interplanetary medium in the model is consistent with observations. The radiation signature model predicts that the intrinsic polarization of the hard X-ray burst should increase over the photon energy range of 20 to 100 keV.

  18. Fiscal 1999 achievement report on the venture business assisting type regional consortium - Minor business creation base type. Research and development of electronic signature collation system for signature on paper; 1999 nendo chiiki consortium kenkyu kaihatsu jigyo seika hokokusho. Shimen ni egaku denshi shomei shogoyo system no kenkyu kaihatsu

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-03-01

    The effort aims to develop and commercialize hardware and software for identifying the individual who during business transaction affixes his signature to a settlement form with a ballpoint pen or the like. Basic technologies of a tactile sensor are utilized in the construction of a ballpoint pen structured like a tactile sensor with an oscillator attached to the ink holding shaft for the pen to sense the touch of the paper. Fluctuation in the tool force exerted on the paper surface of specified hardness when writing or drawing letters or patterns are converted into frequency data. The small but highly sensitive 2-dimensional angle detecting system, developed Professor Satoshi Kiyono of Tohoku University, is incorporated into this ballpoint pen for achieving higher precision with the angle detection limits and the resolution taken into consideration. Since a strong correlation is to exist between the force exerted in the direction of roll of the ball and the angle of delicate inclination of the ink holding shaft end, tool force application and changes in the force may be continuously traced. When they are combined with a tool force detecting mechanism, a digital pen mechanism results which is capable of simultaneously reading parameters of the X, Y, and Z axes. (NEDO)

  19. Signature molecular descriptor : advanced applications.

    Energy Technology Data Exchange (ETDEWEB)

    Visco, Donald Patrick, Jr. (Tennessee Technological University, Cookeville, TN)

    2010-04-01

    In this work we report on the development of the Signature Molecular Descriptor (or Signature) for use in the solution of inverse design problems as well as in highthroughput screening applications. The ultimate goal of using Signature is to identify novel and non-intuitive chemical structures with optimal predicted properties for a given application. We demonstrate this in three studies: green solvent design, glucocorticoid receptor ligand design and the design of inhibitors for Factor XIa. In many areas of engineering, compounds are designed and/or modified in incremental ways which rely upon heuristics or institutional knowledge. Often multiple experiments are performed and the optimal compound is identified in this brute-force fashion. Perhaps a traditional chemical scaffold is identified and movement of a substituent group around a ring constitutes the whole of the design process. Also notably, a chemical being evaluated in one area might demonstrate properties very attractive in another area and serendipity was the mechanism for solution. In contrast to such approaches, computer-aided molecular design (CAMD) looks to encompass both experimental and heuristic-based knowledge into a strategy that will design a molecule on a computer to meet a given target. Depending on the algorithm employed, the molecule which is designed might be quite novel (re: no CAS registration number) and/or non-intuitive relative to what is known about the problem at hand. While CAMD is a fairly recent strategy (dating to the early 1980s), it contains a variety of bottlenecks and limitations which have prevented the technique from garnering more attention in the academic, governmental and industrial institutions. A main reason for this is how the molecules are described in the computer. This step can control how models are developed for the properties of interest on a given problem as well as how to go from an output of the algorithm to an actual chemical structure. This report

  20. Understanding users

    DEFF Research Database (Denmark)

    Johannsen, Carl Gustav Viggo

    2014-01-01

    Segmentation of users can help libraries in the process of understanding user similarities and differences. Segmentation can also form the basis for selecting segments of target users and for developing tailored services for specific target segments. Several approaches and techniques have been...... tested in library contexts and the aim of this article is to identify the main approaches and to discuss their perspectives, including their strenghts and weaknesses in, especially, public library contexts. The purpose is also to prsent and discuss the results of a recent - 2014 - Danish library user...... segmentation project using computer-generated clusters. Compared to traditional marketing texts, this article also tries to identify user segments or images or metaphors by the library profession itself....

  1. An Assessment of Hazards Caused by Electromagnetic Interaction on Humans Present near Short-Wave Physiotherapeutic Devices of Various Types Including Hazards for Users of Electronic Active Implantable Medical Devices (AIMD

    Directory of Open Access Journals (Sweden)

    Jolanta Karpowicz

    2013-01-01

    Full Text Available Leakage of electromagnetic fields (EMF from short-wave radiofrequency physiotherapeutic diathermies (SWDs may cause health and safety hazards affecting unintentionally exposed workers (W or general public (GP members (assisting patient exposed during treatment or presenting there for other reasons. Increasing use of electronic active implantable medical devices (AIMDs, by patients, attendants, and workers, needs attention because dysfunctions of these devices may be caused by electromagnetic interactions. EMF emitted by 12 SWDs (with capacitive or inductive applicators were assessed following international guidelines on protection against EMF exposure (International Commission on Nonionizing Radiation Protection for GP and W, new European directive 2013/35/EU for W, European Recommendation for GP, and European Standard EN 50527-1 for AIMD users. Direct EMF hazards for humans near inductive applicators were identified at a distance not exceeding 45 cm for W or 62 cm for GP, but for AIMD users up to 90 cm (twice longer than that for W and 50% longer than that for GP because EMF is pulsed modulated. Near capacitive applicators emitting continuous wave, the corresponding distances were: 120 cm for W or 150 cm for both—GP or AIMD users. This assessment does not cover patients who undergo SWD treatment (but it is usually recommended for AIMD users to be careful with EMF treatment.

  2. A Quantum Proxy Weak Blind Signature Scheme Based on Controlled Quantum Teleportation

    Science.gov (United States)

    Cao, Hai-Jing; Yu, Yao-Feng; Song, Qin; Gao, Lan-Xiang

    2015-04-01

    Proxy blind signature is applied to the electronic paying system, electronic voting system, mobile agent system, security of internet, etc. A quantum proxy weak blind signature scheme is proposed in this paper. It is based on controlled quantum teleportation. Five-qubit entangled state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, so it could guarantee not only the unconditional security of the scheme but also the anonymity of the messages owner.

  3. Comparison of Fingerprint and Iris Biometric Authentication for Control of Digital Signatures

    Science.gov (United States)

    Zuckerman, Alan E.; Moon, Kenneth A.; Eaddy, Kenneth

    2002-01-01

    Biometric authentication systems can be used to control digital signature of medical documents. This pilot study evaluated the use of two different fingerprint technologies and one iris technology to control creation of digital signatures on a central server using public private key pairs stored on the server. Documents and signatures were stored in XML for portability. Key pairs and authentication certificates were generated during biometric enrollment. Usability and user acceptance were guarded and limitations of biometric systems prevented use of the system with all test subjects. The system detected alternations in the data content and provided future signer re-authentication for non-repudiation.

  4. Reconfiguring waveguide-gratings-based M-signature codecs to enhance OCDMA network confidentiality

    Science.gov (United States)

    Huang, Jen-Fa; Chen, Kai-Sheng; Lin, Ying-Chen; Li, Chung-Yu

    2014-02-01

    A reconfiguration scheme based on composite signature codes over waveguide-gratings-based optical code-division multiple-access (OCDMA) network coder/decoders (codecs) is proposed in the paper. By using central control node to monitor network traffic condition and reconfigure the composite signature codes made up of maximal-length sequence (M-sequence) component codes and random changing the signature codes assigned for each user to improve the confidentiality performance in an OCDMA system. The proposed scheme is analyzed with some practical eavesdroppers' attacks.

  5. Explaining plateaued diffusion by combining the user-IT-success factors (USIT) and adopter categories: the case of electronic prescription systems for general practitioners

    NARCIS (Netherlands)

    Schuring, R.W.; Spil, Antonius A.M.

    2002-01-01

    Although the diffusion of new IT in healthcare does not seem to have levelled off, successes are reported frequently. Many of these successful cases show enthusiastic use of an innovation by a limited group of physicians or other users. This paper explains plateaued diffusion by differentiating the

  6. A Black Hole Spectral Signature

    Science.gov (United States)

    Titarchuk, Lev; Laurent, Philippe

    2000-03-01

    An accreting black hole is, by definition, characterized by the drain. Namely, the matter falls into a black hole much the same way as water disappears down a drain matter goes in and nothing comes out. As this can only happen in a black hole, it provides a way to see ``a black hole'', an unique observational signature. The accretion proceeds almost in a free-fall manner close to the black hole horizon, where the strong gravitational field dominates the pressure forces. In this paper we present analytical calculations and Monte-Carlo simulations of the specific features of X-ray spectra formed as a result of upscattering of the soft (disk) photons in the converging inflow (CI) into the black hole. The full relativistic treatment has been implemented to reproduce these spectra. We show that spectra in the soft state of black hole systems (BHS) can be described as the sum of a thermal (disk) component and the convolution of some fraction of this component with the CI upscattering spread (Greens) function. The latter boosted photon component is seen as an extended power-law at energies much higher than the characteristic energy of the soft photons. We demonstrate the stability of the power spectral index over a wide range of the plasma temperature 0 - 10 keV and mass accretion rates (higher than 2 in Eddington units). We also demonstrate that the sharp high energy cutoff occurs at energies of 200-400 keV which are related to the average energy of electrons mec2 impinging upon the event horizon. The spectrum is practically identical to the standard thermal Comptonization spectrum when the CI plasma temperature is getting of order of 50 keV (the typical ones for the hard state of BHS). In this case one can see the effect of the bulk motion only at high energies where there is an excess in the CI spectrum with respect to the pure thermal one. Furthermore we demonstrate that the change of spectral shapes from the soft X-ray state to the hard X-ray state is clearly to be

  7. Secure Mobile Agent from Leakage-Resilient Proxy Signatures

    Directory of Open Access Journals (Sweden)

    Fei Tang

    2015-01-01

    Full Text Available A mobile agent can sign a message in a remote server on behalf of a customer without exposing its secret key; it can be used not only to search for special products or services, but also to make a contract with a remote server. Hence a mobile agent system can be used for electronic commerce as an important key technology. In order to realize such a system, Lee et al. showed that a secure mobile agent can be constructed using proxy signatures. Intuitively, a proxy signature permits an entity (delegator to delegate its signing right to another entity (proxy to sign some specified messages on behalf of the delegator. However, the proxy signatures are often used in scenarios where the signing is done in an insecure environment, for example, the remote server of a mobile agent system. In such setting, an adversary could launch side-channel attacks to exploit some leakage information about the proxy key or even other secret states. The proxy signatures which are secure in the traditional security models obviously cannot provide such security. Based on this consideration, in this paper, we design a leakage-resilient proxy signature scheme for the secure mobile agent systems.

  8. Five Guidelines for Selecting Hydrological Signatures

    Science.gov (United States)

    McMillan, H. K.; Westerberg, I.; Branger, F.

    2017-12-01

    Hydrological signatures are index values derived from observed or modeled series of hydrological data such as rainfall, flow or soil moisture. They are designed to extract relevant information about hydrological behavior, such as to identify dominant processes, and to determine the strength, speed and spatiotemporal variability of the rainfall-runoff response. Hydrological signatures play an important role in model evaluation. They allow us to test whether particular model structures or parameter sets accurately reproduce the runoff generation processes within the watershed of interest. Most modeling studies use a selection of different signatures to capture different aspects of the catchment response, for example evaluating overall flow distribution as well as high and low flow extremes and flow timing. Such studies often choose their own set of signatures, or may borrow subsets of signatures used in multiple other works. The link between signature values and hydrological processes is not always straightforward, leading to uncertainty and variability in hydrologists' signature choices. In this presentation, we aim to encourage a more rigorous approach to hydrological signature selection, which considers the ability of signatures to represent hydrological behavior and underlying processes for the catchment and application in question. To this end, we propose a set of guidelines for selecting hydrological signatures. We describe five criteria that any hydrological signature should conform to: Identifiability, Robustness, Consistency, Representativeness, and Discriminatory Power. We describe an example of the design process for a signature, assessing possible signature designs against the guidelines above. Due to their ubiquity, we chose a signature related to the Flow Duration Curve, selecting the FDC mid-section slope as a proposed signature to quantify catchment overall behavior and flashiness. We demonstrate how assessment against each guideline could be used to

  9. Theoretical Characterizaiton of Visual Signatures (Muzzle Flash)

    Science.gov (United States)

    Kashinski, D. O.; Scales, A. N.; Vanderley, D. L.; Chase, G. M.; di Nallo, O. E.; Byrd, E. F. C.

    2014-05-01

    We are investigating the accuracy of theoretical models used to predict the visible, ultraviolet and infrared spectra of product materials ejected from the muzzle of currently fielded systems. Recent advances in solid propellants has made the management of muzzle signature (flash) a principle issue in weapons development across the calibers. A priori prediction of the electromagnetic spectra of formulations will allow researchers to tailor blends that yield desired signatures and determine spectrographic detection ranges. We are currently employing quantum chemistry methods at various levels of sophistication to optimize molecular geometries, compute vibrational frequencies, and determine the optical spectra of specific gas-phase molecules and radicals of interest. Electronic excitations are being computed using Time Dependent Density Functional Theory (TD-DFT). A comparison of computational results to experimental values found in the literature is used to assess the affect of basis set and functional choice on calculation accuracy. The current status of this work will be presented at the conference. Work supported by the ARL, and USMA.

  10. 27 CFR 73.32 - May I electronically sign forms I submit electronically to TTB?

    Science.gov (United States)

    2010-04-01

    ... AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY (CONTINUED) PROCEDURES AND PRACTICES ELECTRONIC SIGNATURES; ELECTRONIC SUBMISSION OF FORMS Electronic Filing of Documents with TTB § 73.32 May I electronically sign forms I submit electronically to TTB? You may electronically sign the electronic form you...

  11. Digital Signature Schemes with Complementary Functionality and Applications

    OpenAIRE

    S. N. Kyazhin

    2012-01-01

    Digital signature schemes with additional functionality (an undeniable signature, a signature of the designated confirmee, a signature blind, a group signature, a signature of the additional protection) and examples of their application are considered. These schemes are more practical, effective and useful than schemes of ordinary digital signature.

  12. Signatures of particles

    International Nuclear Information System (INIS)

    Depasse, P.

    2004-11-01

    This document reports the work made by the author in the field of the improvement of gamma detection. The first part is dedicated to experiments and testing performed at the nuclear physics institute in Lyon. It deals with photo-sensors, avalanche photo-diodes and drift chambers. The second part presents the implementation of active lead rings (ALR) to the L3 detector. Although ALR cover only a hundredth of the total solid angle, they are useful for detecting events in which one or several particles bring away a large part of the momentum in a strongly forward direction (between 4 and 9 degrees). The third part is dedicated to the design of the electromagnetic calorimeter barrel that will equip the CMS (compact muon solenoid) that is due to operate on the large hadron collider (LHC). The work made for the selection of scintillating materials (cerium fluoride, lead tungstate), of photo-sensors and for the design of front electronic equipment is particularly detailed. The last part is dedicated to how the knowledge cumulated about photon detection could be beneficial for medical imaging, particularly for the detection of 511 keV photon released in positron collisions. (A.C.)

  13. Efficient Fair Exchange from Identity-Based Signature

    Science.gov (United States)

    Yum, Dae Hyun; Lee, Pil Joong

    A fair exchange scheme is a protocol by which two parties Alice and Bob exchange items or services without allowing either party to gain advantages by quitting prematurely or otherwise misbehaving. To this end, modern cryptographic solutions use a semi-trusted arbitrator who involves only in cases where one party attempts to cheat or simply crashes. We call such a fair exchange scheme optimistic. When no registration is required between the signer and the arbitrator, we say that the fair exchange scheme is setup free. To date, the setup-free optimist fair exchange scheme under the standard RSA assumption was only possible from the generic construction of [12], which uses ring signatures. In this paper, we introduce a new setup-free optimistic fair exchange scheme under the standard RSA assumption. Our scheme uses the GQ identity-based signature and is more efficient than [12]. The construction can also be generalized by using various identity-based signature schemes. Our main technique is to allow each user to choose his (or her) own “random” public key in the identitybased signature scheme.

  14. Photonic quantum digital signatures operating over kilometer ranges in installed optical fiber

    Science.gov (United States)

    Collins, Robert J.; Fujiwara, Mikio; Amiri, Ryan; Honjo, Toshimori; Shimizu, Kaoru; Tamaki, Kiyoshi; Takeoka, Masahiro; Andersson, Erika; Buller, Gerald S.; Sasaki, Masahide

    2016-10-01

    The security of electronic communications is a topic that has gained noteworthy public interest in recent years. As a result, there is an increasing public recognition of the existence and importance of mathematically based approaches to digital security. Many of these implement digital signatures to ensure that a malicious party has not tampered with the message in transit, that a legitimate receiver can validate the identity of the signer and that messages are transferable. The security of most digital signature schemes relies on the assumed computational difficulty of solving certain mathematical problems. However, reports in the media have shown that certain implementations of such signature schemes are vulnerable to algorithmic breakthroughs and emerging quantum processing technologies. Indeed, even without quantum processors, the possibility remains that classical algorithmic breakthroughs will render these schemes insecure. There is ongoing research into information-theoretically secure signature schemes, where the security is guaranteed against an attacker with arbitrary computational resources. One such approach is quantum digital signatures. Quantum signature schemes can be made information-theoretically secure based on the laws of quantum mechanics while comparable classical protocols require additional resources such as anonymous broadcast and/or a trusted authority. Previously, most early demonstrations of quantum digital signatures required dedicated single-purpose hardware and operated over restricted ranges in a laboratory environment. Here, for the first time, we present a demonstration of quantum digital signatures conducted over several kilometers of installed optical fiber. The system reported here operates at a higher signature generation rate than previous fiber systems.

  15. Signature Pedagogy in Theatre Arts

    Science.gov (United States)

    Kornetsky, Lisa

    2017-01-01

    Critique in undergraduate theatre programs is at the heart of training actors at all levels. It is accepted as the signature pedagogy and is practiced in multiple ways. This essay defines critique and presents the case for why it is used as the single most important way that performers come to understand the language, values, and discourse of the…

  16. Motif signatures of transcribed enhancers

    KAUST Repository

    Kleftogiannis, Dimitrios

    2017-09-14

    In mammalian cells, transcribed enhancers (TrEn) play important roles in the initiation of gene expression and maintenance of gene expression levels in spatiotemporal manner. One of the most challenging questions in biology today is how the genomic characteristics of enhancers relate to enhancer activities. This is particularly critical, as several recent studies have linked enhancer sequence motifs to specific functional roles. To date, only a limited number of enhancer sequence characteristics have been investigated, leaving space for exploring the enhancers genomic code in a more systematic way. To address this problem, we developed a novel computational method, TELS, aimed at identifying predictive cell type/tissue specific motif signatures. We used TELS to compile a comprehensive catalog of motif signatures for all known TrEn identified by the FANTOM5 consortium across 112 human primary cells and tissues. Our results confirm that distinct cell type/tissue specific motif signatures characterize TrEn. These signatures allow discriminating successfully a) TrEn from random controls, proxy of non-enhancer activity, and b) cell type/tissue specific TrEn from enhancers expressed and transcribed in different cell types/tissues. TELS codes and datasets are publicly available at http://www.cbrc.kaust.edu.sa/TELS.

  17. Quark-Gluon Plasma Signatures

    CERN Document Server

    Vogt, Ramona

    1998-01-01

    Aspects of quark-gluon plasma signatures that can be measured by CMS are discussed. First the initial conditions of the system from minijet production are introduced, including shadowing effects. Color screening of the Upsilon family is then presented, followed by energy loss effects on charm and bottom hadrons, high Pt jets and global observables.

  18. Galaxy interactions : The HI signature

    NARCIS (Netherlands)

    Sancisi, R; Barnes, JE; Sanders, DB

    1999-01-01

    HI observations are an excellent tool for investigating tidal interactions. Ongoing major and minor interactions which can lead to traumatic mergers or to accretion and the triggering of star formation, show distinct HI signatures. Interactions and mergers in the recent past can also be recognized

  19. Revocable identity-based proxy re-signature against signing key exposure.

    Science.gov (United States)

    Yang, Xiaodong; Chen, Chunlin; Ma, Tingchun; Wang, Jinli; Wang, Caifen

    2018-01-01

    Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key. Due to this transformation function, IDPRS is very useful in constructing privacy-preserving schemes for various information systems. Key revocation functionality is important in practical IDPRS for managing users dynamically; however, the existing IDPRS schemes do not provide revocation mechanisms that allow the removal of misbehaving or compromised users from the system. In this paper, we first introduce a notion called revocable identity-based proxy re-signature (RIDPRS) to achieve the revocation functionality. We provide a formal definition of RIDPRS as well as its security model. Then, we present a concrete RIDPRS scheme that can resist signing key exposure and prove that the proposed scheme is existentially unforgeable against adaptive chosen identity and message attacks in the standard model. To further improve the performance of signature verification in RIDPRS, we introduce a notion called server-aided revocable identity-based proxy re-signature (SA-RIDPRS). Moreover, we extend the proposed RIDPRS scheme to the SA-RIDPRS scheme and prove that this extended scheme is secure against adaptive chosen message and collusion attacks. The analysis results show that our two schemes remain efficient in terms of computational complexity when implementing user revocation procedures. In particular, in the SA-RIDPRS scheme, the verifier needs to perform only a bilinear pairing and four exponentiation operations to verify the validity of the signature. Compared with other IDPRS schemes in the standard model, our SA-RIDPRS scheme greatly reduces the computation overhead of verification.

  20. Quantum liquid signatures in dwarf stars

    Energy Technology Data Exchange (ETDEWEB)

    Gabadadze, Gregory; Pirtskhalava, David, E-mail: gg32@nyu.edu, E-mail: dmp371@nyu.edu [Center for Cosmology and Particle Physics, Department of Physics, New York University, New York, NY 10003 (United States)

    2009-05-15

    We develop further the proposal of arXiv:0806.3692 that a new state of matter - charged condensate of spin-0 nuclei - may exist in helium-core dwarf stars. The charged condensate and its fluctuations are described by an effective field theory Lagrangian. The spectrum of bosonic fluctuations is gapped, while electrons, at temperatures of interest, give rise to gapless excitations near the Fermi surface. These properties determine the evolution of the dwarfs with condensed cores. In particular, we show that such dwarf stars would cool significantly faster than their crystallized counterparts. As a result, the luminosity function for the helium-core dwarfs will have a sharp drop-off after the condensation. It is tempting to interpret the recently discovered abrupt termination of a sequence of 24 helium-core dwarf candidates in NGC 6397 as a signature of the charged condensation.

  1. Magnetic signature of surface defects at nanodiamonds

    Energy Technology Data Exchange (ETDEWEB)

    Vollmers, Nora Jenny; Gerstmann, Uwe; Schmidt, Wolf Gero [Theoretische Physik, Universitaet Paderborn (Germany)

    2011-07-01

    The n-type doping of diamond has been a long-standing issue, which recently gained attention in the context of nanodiamonds. Attempts of doping with nitrogen failed to result in the Electron paramagnetic Resonance (EPR) fingerprints expected from bulk material. Instead, the nanodiamond signals show a much larger deviation from the free-electron g-value and are believed to be related to intrinsic, carbon inherited defects. However, the absence of the bulk-like EPR spectra does not mean that nitrogen is not incorporated at all. The N atoms could be built in predominantly at or at least close to the surfaces yielding EPR spectra, very different from those measured in the bulk. In this work, we elucidate the situation by investigating the magnetic signature of paramagnetic defects in the nanodiamonds. We use the gauge-including projector augmented plane wave (GI-PAW) approach to calculate the hyperfine splittings and the elements of the electronic g-tensor. Taking the C(100) surface as a first model system, a possible contribution of nitrogen is discussed by comparing EPR parameters for different N incorporation depths: Incorporated directly at the surface, N gives rise to surface states similar to intrinsic carbon dangling bond-like states. Otherwise N is able to introduce surface conductivity as demonstrated by calculated effective mass tensors.

  2. On Hunting Animals of the Biometric Menagerie for Online Signature.

    Directory of Open Access Journals (Sweden)

    Nesma Houmani

    Full Text Available Individuals behave differently regarding to biometric authentication systems. This fact was formalized in the literature by the concept of Biometric Menagerie, defining and labeling user groups with animal names in order to reflect their characteristics with respect to biometric systems. This concept was illustrated for face, fingerprint, iris, and speech modalities. The present study extends the Biometric Menagerie to online signatures, by proposing a novel methodology that ties specific quality measures for signatures to categories of the Biometric Menagerie. Such measures are combined for retrieving automatically writer categories of the extended version of the Biometric Menagerie. Performance analysis with different types of classifiers shows the pertinence of our approach on the well-known MCYT-100 database.

  3. On Hunting Animals of the Biometric Menagerie for Online Signature.

    Science.gov (United States)

    Houmani, Nesma; Garcia-Salicetti, Sonia

    2016-01-01

    Individuals behave differently regarding to biometric authentication systems. This fact was formalized in the literature by the concept of Biometric Menagerie, defining and labeling user groups with animal names in order to reflect their characteristics with respect to biometric systems. This concept was illustrated for face, fingerprint, iris, and speech modalities. The present study extends the Biometric Menagerie to online signatures, by proposing a novel methodology that ties specific quality measures for signatures to categories of the Biometric Menagerie. Such measures are combined for retrieving automatically writer categories of the extended version of the Biometric Menagerie. Performance analysis with different types of classifiers shows the pertinence of our approach on the well-known MCYT-100 database.

  4. Unsupervised signature extraction from forensic logs

    NARCIS (Netherlands)

    Thaler, S.M.; Menkovski, V.; Petkovic, M.; Altun, Y.; Das, K.; Mielikäinen, T.; Malerba, D.; Stefanowski, J.; Read, J.; Žitnik, M.; Ceci, M.

    2017-01-01

    Signature extraction is a key part of forensic log analysis. It involves recognizing patterns in log lines such that log lines that originated from the same line of code are grouped together. A log signature consists of immutable parts and mutable parts. The immutable parts define the signature, and

  5. 7 CFR 718.9 - Signature requirements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Signature requirements. 718.9 Section 718.9... MULTIPLE PROGRAMS General Provisions § 718.9 Signature requirements. (a) When a program authorized by this chapter or Chapter XIV of this title requires the signature of a producer; landowner; landlord; or tenant...

  6. 42 CFR 424.36 - Signature requirements.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Signature requirements. 424.36 Section 424.36... (CONTINUED) MEDICARE PROGRAM CONDITIONS FOR MEDICARE PAYMENT Claims for Payment § 424.36 Signature requirements. (a) General rule. The beneficiary's own signature is required on the claim unless the beneficiary...

  7. 17 CFR 12.12 - Signature.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Signature. 12.12 Section 12.12... General Information and Preliminary Consideration of Pleadings § 12.12 Signature. (a) By whom. All... document on behalf of another person. (b) Effect. The signature on any document of any person acting either...

  8. 25 CFR 213.10 - Lessor's signature.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Lessor's signature. 213.10 Section 213.10 Indians BUREAU... MEMBERS OF FIVE CIVILIZED TRIBES, OKLAHOMA, FOR MINING How to Acquire Leases § 213.10 Lessor's signature... thumbprint which shall be designated as “right” or “left” thumbmark. Such signatures must be witnessed by two...

  9. Signature effects in 2-qp rotational bands

    International Nuclear Information System (INIS)

    Jain, A.K.; Goel, A.

    1992-01-01

    The authors briefly review the progress in understanding the 2-qp rotational bands in odd-odd nuclei. Signature effects and the phenomenon of signature inversion are discussed. The Coriolis coupling appears to have all the ingredients to explain the inversion. Some recent work on signature dependence in 2-qp bands of even-even nuclei is also discussed; interesting features are pointed out

  10. 27 CFR 17.6 - Signature authority.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Signature authority. 17.6... PRODUCTS General Provisions § 17.6 Signature authority. No claim, bond, tax return, or other required... other proper notification of signature authority has been filed with the TTB office where the required...

  11. High-speed high-security signatures

    NARCIS (Netherlands)

    Bernstein, D.J.; Duif, N.; Lange, T.; Schwabe, P.; Yang, B.Y.

    2011-01-01

    This paper shows that a $390 mass-market quad-core 2.4GHz Intel Westmere (Xeon E5620) CPU can create 108000 signatures per second and verify 71000 signatures per second on an elliptic curve at a 2128 security level. Public keys are 32 bytes, and signatures are 64 bytes. These performance figures

  12. Some Proxy Signature and Designated verifier Signature Schemes over Braid Groups

    OpenAIRE

    Lal, Sunder; Verma, Vandani

    2009-01-01

    Braids groups provide an alternative to number theoretic public cryptography and can be implemented quite efficiently. The paper proposes five signature schemes: Proxy Signature, Designated Verifier, Bi-Designated Verifier, Designated Verifier Proxy Signature And Bi-Designated Verifier Proxy Signature scheme based on braid groups. We also discuss the security aspects of each of the proposed schemes.

  13. User studies for digital library development

    CERN Document Server

    Dobreva, Milena; Feliciati, Pierluigi

    2012-01-01

    As the information environment becomes increasingly electronic, digital libraries have proliferated, but the focus has often been on innovations in technology and not the user. This title provides a clear overview of the user studies domain and user issues in digital libraries.

  14. Spectral signature verification using statistical analysis and text mining

    Science.gov (United States)

    DeCoster, Mallory E.; Firpi, Alexe H.; Jacobs, Samantha K.; Cone, Shelli R.; Tzeng, Nigel H.; Rodriguez, Benjamin M.

    2016-05-01

    In the spectral science community, numerous spectral signatures are stored in databases representative of many sample materials collected from a variety of spectrometers and spectroscopists. Due to the variety and variability of the spectra that comprise many spectral databases, it is necessary to establish a metric for validating the quality of spectral signatures. This has been an area of great discussion and debate in the spectral science community. This paper discusses a method that independently validates two different aspects of a spectral signature to arrive at a final qualitative assessment; the textual meta-data and numerical spectral data. Results associated with the spectral data stored in the Signature Database1 (SigDB) are proposed. The numerical data comprising a sample material's spectrum is validated based on statistical properties derived from an ideal population set. The quality of the test spectrum is ranked based on a spectral angle mapper (SAM) comparison to the mean spectrum derived from the population set. Additionally, the contextual data of a test spectrum is qualitatively analyzed using lexical analysis text mining. This technique analyzes to understand the syntax of the meta-data to provide local learning patterns and trends within the spectral data, indicative of the test spectrum's quality. Text mining applications have successfully been implemented for security2 (text encryption/decryption), biomedical3 , and marketing4 applications. The text mining lexical analysis algorithm is trained on the meta-data patterns of a subset of high and low quality spectra, in order to have a model to apply to the entire SigDB data set. The statistical and textual methods combine to assess the quality of a test spectrum existing in a database without the need of an expert user. This method has been compared to other validation methods accepted by the spectral science community, and has provided promising results when a baseline spectral signature is

  15. GESearch: An Interactive GUI Tool for Identifying Gene Expression Signature

    Directory of Open Access Journals (Sweden)

    Ning Ye

    2015-01-01

    Full Text Available The huge amount of gene expression data generated by microarray and next-generation sequencing technologies present challenges to exploit their biological meanings. When searching for the coexpression genes, the data mining process is largely affected by selection of algorithms. Thus, it is highly desirable to provide multiple options of algorithms in the user-friendly analytical toolkit to explore the gene expression signatures. For this purpose, we developed GESearch, an interactive graphical user interface (GUI toolkit, which is written in MATLAB and supports a variety of gene expression data files. This analytical toolkit provides four models, including the mean, the regression, the delegate, and the ensemble models, to identify the coexpression genes, and enables the users to filter data and to select gene expression patterns by browsing the display window or by importing knowledge-based genes. Subsequently, the utility of this analytical toolkit is demonstrated by analyzing two sets of real-life microarray datasets from cell-cycle experiments. Overall, we have developed an interactive GUI toolkit that allows for choosing multiple algorithms for analyzing the gene expression signatures.

  16. Nonlinear control of magnetic signatures

    Science.gov (United States)

    Niemoczynski, Bogdan

    Magnetic properties of ferrite structures are known to cause fluctuations in Earth's magnetic field around the object. These fluctuations are known as the object's magnetic signature and are unique based on the object's geometry and material. It is a common practice to neutralize magnetic signatures periodically after certain time intervals, however there is a growing interest to develop real time degaussing systems for various applications. Development of real time degaussing system is a challenging problem because of magnetic hysteresis and difficulties in measurement or estimation of near-field flux data. The goal of this research is to develop a real time feedback control system that can be used to minimize magnetic signatures for ferrite structures. Experimental work on controlling the magnetic signature of a cylindrical steel shell structure with a magnetic disturbance provided evidence that the control process substantially increased the interior magnetic flux. This means near field estimation using interior sensor data is likely to be inaccurate. Follow up numerical work for rectangular and cylindrical cross sections investigated variations in shell wall flux density under a variety of ambient excitation and applied disturbances. Results showed magnetic disturbances could corrupt interior sensor data and magnetic shielding due to the shell walls makes the interior very sensitive to noise. The magnetic flux inside the shell wall showed little variation due to inner disturbances and its high base value makes it less susceptible to noise. This research proceeds to describe a nonlinear controller to use the shell wall data as an input. A nonlinear plant model of magnetics is developed using a constant tau to represent domain rotation lag and a gain function k to describe the magnetic hysteresis curve for the shell wall. The model is justified by producing hysteresis curves for multiple materials, matching experimental data using a particle swarm algorithm, and

  17. Develop security architecture for both in-house healthcare information systems and electronic patient record

    Science.gov (United States)

    Zhang, Jianguo; Chen, Xiaomeng; Zhuang, Jun; Jiang, Jianrong; Zhang, Xiaoyan; Wu, Dongqing; Huang, H. K.

    2003-05-01

    In this paper, we presented a new security approach to provide security measures and features in both healthcare information systems (PACS, RIS/HIS), and electronic patient record (EPR). We introduced two security components, certificate authoring (CA) system and patient record digital signature management (DSPR) system, as well as electronic envelope technology, into the current hospital healthcare information infrastructure to provide security measures and functions such as confidential or privacy, authenticity, integrity, reliability, non-repudiation, and authentication for in-house healthcare information systems daily operating, and EPR exchanging among the hospitals or healthcare administration levels, and the DSPR component manages the all the digital signatures of patient medical records signed through using an-symmetry key encryption technologies. The electronic envelopes used for EPR exchanging are created based on the information of signers, digital signatures, and identifications of patient records stored in CAS and DSMS, as well as the destinations and the remote users. The CAS and DSMS were developed and integrated into a RIS-integrated PACS, and the integration of these new security components is seamless and painless. The electronic envelopes designed for EPR were used successfully in multimedia data transmission.

  18. User 2020

    DEFF Research Database (Denmark)

    Porras, Jari; Heikkinen, Kari; Kinnula, Marianne

    2014-01-01

    an effect on their future needs. Human needs have been studied much longer than user generations per se. Psychologist Maslow presented a characterization of human needs as early as 1943. This basic characterization was later studied with an evolving environment in mind. Although the basic needs have...

  19. Nonlinear analysis of dynamic signature

    Science.gov (United States)

    Rashidi, S.; Fallah, A.; Towhidkhah, F.

    2013-12-01

    Signature is a long trained motor skill resulting in well combination of segments like strokes and loops. It is a physical manifestation of complex motor processes. The problem, generally stated, is that how relative simplicity in behavior emerges from considerable complexity of perception-action system that produces behavior within an infinitely variable biomechanical and environmental context. To solve this problem, we present evidences which indicate that motor control dynamic in signing process is a chaotic process. This chaotic dynamic may explain a richer array of time series behavior in motor skill of signature. Nonlinear analysis is a powerful approach and suitable tool which seeks for characterizing dynamical systems through concepts such as fractal dimension and Lyapunov exponent. As a result, they can be analyzed in both horizontal and vertical for time series of position and velocity. We observed from the results that noninteger values for the correlation dimension indicates low dimensional deterministic dynamics. This result could be confirmed by using surrogate data tests. We have also used time series to calculate the largest Lyapunov exponent and obtain a positive value. These results constitute significant evidence that signature data are outcome of chaos in a nonlinear dynamical system of motor control.

  20. ADAGE signature analysis: differential expression analysis with data-defined gene sets.

    Science.gov (United States)

    Tan, Jie; Huyck, Matthew; Hu, Dongbo; Zelaya, René A; Hogan, Deborah A; Greene, Casey S

    2017-11-22

    Gene set enrichment analysis and overrepresentation analyses are commonly used methods to determine the biological processes affected by a differential expression experiment. This approach requires biologically relevant gene sets, which are currently curated manually, limiting their availability and accuracy in many organisms without extensively curated resources. New feature learning approaches can now be paired with existing data collections to directly extract functional gene sets from big data. Here we introduce a method to identify perturbed processes. In contrast with methods that use curated gene sets, this approach uses signatures extracted from public expression data. We first extract expression signatures from public data using ADAGE, a neural network-based feature extraction approach. We next identify signatures that are differentially active under a given treatment. Our results demonstrate that these signatures represent biological processes that are perturbed by the experiment. Because these signatures are directly learned from data without supervision, they can identify uncurated or novel biological processes. We implemented ADAGE signature analysis for the bacterial pathogen Pseudomonas aeruginosa. For the convenience of different user groups, we implemented both an R package (ADAGEpath) and a web server ( http://adage.greenelab.com ) to run these analyses. Both are open-source to allow easy expansion to other organisms or signature generation methods. We applied ADAGE signature analysis to an example dataset in which wild-type and ∆anr mutant cells were grown as biofilms on the Cystic Fibrosis genotype bronchial epithelial cells. We mapped active signatures in the dataset to KEGG pathways and compared with pathways identified using GSEA. The two approaches generally return consistent results; however, ADAGE signature analysis also identified a signature that revealed the molecularly supported link between the MexT regulon and Anr. We designed

  1. Spectral signature selection for mapping unvegetated soils

    Science.gov (United States)

    May, G. A.; Petersen, G. W.

    1975-01-01

    Airborne multispectral scanner data covering the wavelength interval from 0.40-2.60 microns were collected at an altitude of 1000 m above the terrain in southeastern Pennsylvania. Uniform training areas were selected within three sites from this flightline. Soil samples were collected from each site and a procedure developed to allow assignment of scan line and element number from the multispectral scanner data to each sampling location. These soil samples were analyzed on a spectrophotometer and laboratory spectral signatures were derived. After correcting for solar radiation and atmospheric attenuation, the laboratory signatures were compared to the spectral signatures derived from these same soils using multispectral scanner data. Both signatures were used in supervised and unsupervised classification routines. Computer-generated maps using the laboratory and multispectral scanner derived signatures resulted in maps that were similar to maps resulting from field surveys. Approximately 90% agreement was obtained between classification maps produced using multispectral scanner derived signatures and laboratory derived signatures.

  2. Assessing nicotine dependence in adolescent E-cigarette users: The 4-item Patient-Reported Outcomes Measurement Information System (PROMIS) Nicotine Dependence Item Bank for electronic cigarettes.

    Science.gov (United States)

    Morean, Meghan E; Krishnan-Sarin, Suchitra; S O'Malley, Stephanie

    2018-04-26

    Adolescent e-cigarette use (i.e., "vaping") likely confers risk for developing nicotine dependence. However, there have been no studies assessing e-cigarette nicotine dependence in youth. We evaluated the psychometric properties of the 4-item Patient-Reported Outcomes Measurement Information System Nicotine Dependence Item Bank for E-cigarettes (PROMIS-E) for assessing youth e-cigarette nicotine dependence and examined risk factors for experiencing stronger dependence symptoms. In 2017, 520 adolescent past-month e-cigarette users completed the PROMIS-E during a school-based survey (50.5% female, 84.8% White, 16.22[1.19] years old). Adolescents also reported on sex, grade, race, age at e-cigarette use onset, vaping frequency, nicotine e-liquid use, and past-month cigarette smoking. Analyses included conducting confirmatory factor analysis and examining the internal consistency of the PROMIS-E. Bivariate correlations and independent-samples t-tests were used to examine unadjusted relationships between e-cigarette nicotine dependence and the proposed risk factors. Regression models were run in which all potential risk factors were entered as simultaneous predictors of PROMIS-E scores. The single-factor structure of the PROMIS-E was confirmed and evidenced good internal consistency. Across models, larger PROMIS-E scores were associated with being in a higher grade, initiating e-cigarette use at an earlier age, vaping more frequently, using nicotine e-liquid (and higher nicotine concentrations), and smoking cigarettes. Adolescent e-cigarette users reported experiencing nicotine dependence, which was assessed using the psychometrically sound PROMIS-E. Experiencing stronger nicotine dependence symptoms was associated with characteristics that previously have been shown to confer risk for frequent vaping and tobacco cigarette dependence. Copyright © 2018 Elsevier B.V. All rights reserved.

  3. On the Theory and Practice of Personal Digital Signatures

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Mikkelsen, Gert Læssøe

    2009-01-01

    and the PC are not both corrupted at the same time. In other words, our solution cannot be broken by phising or key-logging via the PC. The protocol allows for mobile units with very small computing power by securely outsourcing computation to the PC and also allows usage of any PC that can communicate...... digital signatures on behalf of the user. This protocol is proactively UC-secure assuming at most one player is corrupted in every operational phase. In more practical terms, this means that one can securely sign using terminals (PC’s) that are not necessarily trusted, as long as the mobile unit...

  4. Being an Informed Consumer of Health Information and Assessment of Electronic Health Literacy in a National Sample of Internet Users: Validity and Reliability of the e-HLS Instrument.

    Science.gov (United States)

    Seçkin, Gül; Yeatts, Dale; Hughes, Susan; Hudson, Cassie; Bell, Valarie

    2016-07-11

    The Internet, with its capacity to provide information that transcends time and space barriers, continues to transform how people find and apply information to their own lives. With the current explosion in electronic sources of health information, including thousands of websites and hundreds of mobile phone health apps, electronic health literacy is gaining an increasing prominence in health and medical research. An important dimension of electronic health literacy is the ability to appraise the quality of information that will facilitate everyday health care decisions. Health information seekers explore their care options by gathering information from health websites, blogs, Web-based forums, social networking websites, and advertisements, despite the fact that information quality on the Internet varies greatly. Nonetheless, research has lagged behind in establishing multidimensional instruments, in part due to the evolving construct of health literacy itself. The purpose of this study was to examine psychometric properties of a new electronic health literacy (ehealth literacy) measure in a national sample of Internet users with specific attention to older users. Our paper is motivated by the fact that ehealth literacy is an underinvestigated area of inquiry. Our sample was drawn from a panel of more than 55,000 participants maintained by Knowledge Networks, the largest national probability-based research panel for Web-based surveys. We examined the factor structure of a 19-item electronic Health Literacy Scale (e-HLS) through exploratory factor analysis (EFA) and confirmatory factor analysis, internal consistency reliability, and construct validity on sample of adults (n=710) and a subsample of older adults (n=194). The AMOS graphics program 21.0 was used to construct a measurement model, linking latent factors obtained from EFA with 19 indicators to determine whether this factor structure achieved a good fit with our entire sample and the subsample (age ≥ 60

  5. Overloaded CDMA Systems with Displaced Binary Signatures

    Directory of Open Access Journals (Sweden)

    Vanhaverbeke Frederik

    2004-01-01

    Full Text Available We extend three types of overloaded CDMA systems, by displacing in time the binary signature sequences of these systems: (1 random spreading (PN, (2 multiple-OCDMA (MO, and (3 PN/OCDMA (PN/O. For each of these systems, we determine the time shifts that minimize the overall multiuser interference power. The achievable channel load with coded and uncoded data is evaluated for the conventional (without displacement and improved (with displacement systems, as well as for systems based on quasi-Welch-bound-equality (QWBE sequences, by means of several types of turbo detectors. For each system, the best performing turbo detector is selected in order to compare the performance of these systems. It is found that the improved systems substantially outperform their original counterparts. With uncoded data, (improved PN/O yields the highest acceptable channel load. For coded data, MO allows for the highest acceptable channel load over all considered systems, both for the conventional and the improved systems. In the latter case, channel loads of about 280% are achievable with a low degradation as compared to a single user system.

  6. Users and user study methodology: the JUBILEE project

    OpenAIRE

    Linda Banwell; Graham Coulson

    2004-01-01

    This paper presents both theoretical aspects and practical examples from the on-going and large-scale JUBILEE (JISC User Behaviour in Information seeking: Longitudinal Evaluation of Electronic information services) project, now in its fifth year. Particular emphasis will be placed on the importance of using robust theory and methods as the basis for reputable user studies, especially those undertaken by practitioners. Theory underlying the development of the JUBILEE project and Toolkit is out...

  7. Acoustic signature of thunder from seismic records

    Science.gov (United States)

    Kappus, Mary E.; Vernon, Frank L.

    1991-06-01

    Thunder, the sound wave through the air associated with lightning, transfers sufficient energy to the ground to trigger seismometers set to record regional earthquakes. The acoustic signature recorded on seismometers, in the form of ground velocity as a function of time, contains the same type features as pressure variations recorded with microphones in air. At a seismic station in Kislovodsk, USSR, a nearly direct lightning strike caused electronic failure of borehole instruments while leaving a brief impulsive acoustic signature on the surface instruments. The peak frequency of 25-55 Hz is consistent with previously published values for cloud-to-ground lightning strikes, but spectra from this station are contaminated by very strong wind noise in this band. A thunderstorm near a similar station in Karasu triggered more than a dozen records of individual lightning strikes during a 2-hour period. The spectra for these events are fairly broadband, with peaks at low frequencies, varying from 6 to 13 Hz. The spectra were all computed by multitaper analysis, which deals appropriately with the nonstationary thunder signal. These independent measurements of low-frequency peaks corroborate the occasional occurrences in traditional microphone records, but a theory concerning the physical mechanism to account for them is still in question. Examined separately, the individual claps in each record have similar frequency distributions, discounting a need for multiple mechanisms to explain different phases of the thunder sequence. Particle motion, determined from polarization analysis of the three-component records, is predominantly vertical downward, with smaller horizontal components indicative of the direction to the lightning bolt. In three of the records the azimuth to the lightning bolt changes with time, confirming a significant horizontal component to the lightning channel itself.

  8. Stability and signatures of biexcitons in carbon nanotubes

    DEFF Research Database (Denmark)

    Pedersen, Thomas Garm; Pedersen, Kjeld; Cornean, Horia Decebal

    2005-01-01

    The linear optical properties of semiconducting carbon nanotubes are dominated by quasi-one-dimensional excitons formed by single electron-hole pairs. Hence, the nonlinear response at high pump levels most likely leads to the formation of exciton complexes involving several electron-hole pairs....... Such complexes would threfore play an important role in e.g. lasing applications. We demonstrate here that the biexciton complex is surprisingly stable for nanotubes in a wide diameter range. Theoretical predictions for the signature of such states in pump-probe spectroscopy are presented....

  9. Randomized Controlled Trial of Electronic Care Plan Alerts and Resource Utilization by High Frequency Emergency Department Users with Opioid Use Disorder

    Directory of Open Access Journals (Sweden)

    Niels Rathlev, MD

    2016-01-01

    Full Text Available Introduction: There is a paucity of literature supporting the use of electronic alerts for patients with high frequency emergency department (ED use. We sought to measure changes in opioid prescribing and administration practices, total charges and other resource utilization using electronic alerts to notify providers of an opioid-use care plan for high frequency ED patients. Methods: This was a randomized, non-blinded, two-group parallel design study of patients who had 1 opioid use disorder and 2 high frequency ED use. Three affiliated hospitals with identical electronic health records participated. Patients were randomized into “Care Plan” versus “Usual Care groups”. Between the years before and after randomization, we compared as primary outcomes the following: 1 opioids (morphine mg equivalents prescribed to patients upon discharge and administered to ED and inpatients; 2 total medical charges, and the numbers of; 3 ED visits, 4 ED visits with advanced radiologic imaging (computed tomography [CT] or magnetic resonance imaging [MRI] studies, and 5 inpatient admissions. Results: A total of 40 patients were enrolled. For ED and inpatients in the “Usual Care” group, the proportion of morphine mg equivalents received in the post-period compared with the pre-period was 15.7%, while in the “Care Plan” group the proportion received in the post-period compared with the pre-period was 4.5% (ratio=0.29, 95% CI [0.07-1.12]; p=0.07. For discharged patients in the “Usual Care” group, the proportion of morphine mg equivalents prescribed in the post-period compared with the pre-period was 25.7% while in the “Care Plan” group, the proportion prescribed in the post-period compared to the pre-period was 2.9%. The “Care Plan” group showed an 89% greater proportional change over the periods compared with the “Usual Care” group (ratio=0.11, 95% CI [0.01-0.092]; p=0.04. Care plans did not change the total charges, or, the numbers

  10. The electronics in fluorescent bulbs and light emitting diodes (LED), rather than ultraviolet radiation, cause increased malignant melanoma incidence in indoor office workers and tanning bed users.

    Science.gov (United States)

    Milham, Samuel; Stetzer, Dave

    2018-07-01

    The epidemiology of cutaneous malignant melanoma (CMM) has a number of facets that do not fit with sunlight and ultraviolet light as the primary etiologic agents. Indoor workers have higher incidence and mortality rates of CMM than outdoor workers; CMM occurs in body locations never exposed to sunlight; CMM incidence is increasing in spite of use of UV blocking agents and small changes in solar radiation. Installation of two new fluorescent lights in the milking parlor holding area of a Minnesota dairy farm in 2015 caused an immediate drop in milk production. This lead to measurement of body amperage in humans exposed to modern non-incandescent lighting. People exposed to old and new fluorescent lights, light emitting diodes (LED) and compact fluorescent lights (CFL) had body amperage levels above those considered carcinogenic. We hypothesize that modern electric lighting is a significant health hazard, a carcinogen, and is causing increasing CMM incidence in indoor office workers and tanning bed users. These lights generate dirty electricity (high frequency voltage transients), radio frequency (RF) radiation, and increase body amperage, all of which have been shown to be carcinogenic. This could explain the failure of ultraviolet blockers to stem the malignant melanoma pandemic. Tanning beds and non-incandescent lighting could be made safe by incorporating a grounded Faraday cage which allows passage of ultraviolet and visible light frequencies and blocks other frequencies. Modern electric lighting should be fabricated to be electrically clean. Copyright © 2018 Elsevier Ltd. All rights reserved.

  11. Infrared signatures for remote sensing

    International Nuclear Information System (INIS)

    McDowell, R.S.; Sharpe, S.W.; Kelly, J.F.

    1994-04-01

    PNL's capabilities for infrared and near-infrared spectroscopy include tunable-diode-laser (TDL) systems covering 300--3,000 cm -1 at 2 laser. PNL also has a beam expansion source with a 12-cm slit, which provides a 3-m effective path for gases at ∼10 K, giving a Doppler width of typically 10 MHz; and long-path static gas cells (to 100 m). In applying this equipment to signatures work, the authors emphasize the importance of high spectral resolution for detecting and identifying atmospheric interferences; for identifying the optimum analytical frequencies; for deriving, by spectroscopic analysis, the molecular parameters needed for modeling; and for obtaining data on species and/or bands that are not in existing databases. As an example of such spectroscopy, the authors have assigned and analyzed the C-Cl stretching region of CCl 4 at 770--800 cm -1 . This is an important potential signature species whose IR absorption has remained puzzling because of the natural isotopic mix, extensive hot-band structure, and a Fermi resonance involving a nearby combination band. Instrument development projects include the IR sniffer, a small high-sensitivity, high-discrimination (Doppler-limited) device for fence-line or downwind monitoring that is effective even in regions of atmospheric absorption; preliminary work has achieved sensitivities at the low-ppb level. Other work covers trace species detection with TDLs, and FM-modulated CO 2 laser LIDAR. The authors are planning a field experiment to interrogate the Hanford tank farm for signature species from Rattlesnake Mountain, a standoff of ca. 15 km, to be accompanied by simultaneous ground-truthing at the tanks

  12. Signature Curves Statistics of DNA Supercoils

    OpenAIRE

    Shakiban, Cheri; Lloyd, Peter

    2004-01-01

    In this paper we describe the Euclidean signature curves for two dimensional closed curves in the plane and their generalization to closed space curves. The focus will be on discrete numerical methods for approximating such curves. Further we will apply these numerical methods to plot the signature curves related to three-dimensional simulated DNA supercoils. Our primary focus will be on statistical analysis of the data generated for the signature curves of the supercoils. We will try to esta...

  13. Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems

    DEFF Research Database (Denmark)

    Fathi, Hanane; Shin, SeongHan; Kobara, Kazukuni

    2010-01-01

    To avoid the risk of long-term storage of secrets on a portable device, an online credential system supports the roaming user in retrieving securely at various locations his private key and other material to generate anonymous signatures. The protocol proposed here allows a roaming mobile user...... to access anonymously services such as whistle blowing and net-counselling. Our approach: (1) allows a mobile user, remembering a short password, to anonymously and securely retrieve the credentials necessary for his anonymous communication without assuming a pre-established anonymous channel...

  14. Institute of Geophysics, Planetary Physics, and Signatures

    Data.gov (United States)

    Federal Laboratory Consortium — The Institute of Geophysics, Planetary Physics, and Signatures at Los Alamos National Laboratory is committed to promoting and supporting high quality, cutting-edge...

  15. On reliable discovery of molecular signatures

    Directory of Open Access Journals (Sweden)

    Björkegren Johan

    2009-01-01

    Full Text Available Abstract Background Molecular signatures are sets of genes, proteins, genetic variants or other variables that can be used as markers for a particular phenotype. Reliable signature discovery methods could yield valuable insight into cell biology and mechanisms of human disease. However, it is currently not clear how to control error rates such as the false discovery rate (FDR in signature discovery. Moreover, signatures for cancer gene expression have been shown to be unstable, that is, difficult to replicate in independent studies, casting doubts on their reliability. Results We demonstrate that with modern prediction methods, signatures that yield accurate predictions may still have a high FDR. Further, we show that even signatures with low FDR may fail to replicate in independent studies due to limited statistical power. Thus, neither stability nor predictive accuracy are relevant when FDR control is the primary goal. We therefore develop a general statistical hypothesis testing framework that for the first time provides FDR control for signature discovery. Our method is demonstrated to be correct in simulation studies. When applied to five cancer data sets, the method was able to discover molecular signatures with 5% FDR in three cases, while two data sets yielded no significant findings. Conclusion Our approach enables reliable discovery of molecular signatures from genome-wide data with current sample sizes. The statistical framework developed herein is potentially applicable to a wide range of prediction problems in bioinformatics.

  16. Modeling the Thermal Signature of Natural Backgrounds

    National Research Council Canada - National Science Library

    Gamborg, Marius

    2002-01-01

    Two measuring stations have been established the purpose being to collect comprehensive databases of thermal signatures of background elements in addition to the prevailing meteorological conditions...

  17. An Arbitrated Quantum Signature Scheme without Entanglement*

    International Nuclear Information System (INIS)

    Li Hui-Ran; Luo Ming-Xing; Peng Dai-Yuan; Wang Xiao-Jun

    2017-01-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks . (paper)

  18. Learning Global-Local Distance Metrics for Signature-Based Biometric Cryptosystems

    Directory of Open Access Journals (Sweden)

    George S. Eskander Ekladious

    2017-11-01

    Full Text Available Biometric traits, such as fingerprints, faces and signatures have been employed in bio-cryptosystems to secure cryptographic keys within digital security schemes. Reliable implementations of these systems employ error correction codes formulated as simple distance thresholds, although they may not effectively model the complex variability of behavioral biometrics like signatures. In this paper, a Global-Local Distance Metric (GLDM framework is proposed to learn cost-effective distance metrics, which reduce within-class variability and augment between-class variability, so that simple error correction thresholds of bio-cryptosystems provide high classification accuracy. First, a large number of samples from a development dataset are used to train a global distance metric that differentiates within-class from between-class samples of the population. Then, once user-specific samples are available for enrollment, the global metric is tuned to a local user-specific one. Proof-of-concept experiments on two reference offline signature databases confirm the viability of the proposed approach. Distance metrics are produced based on concise signature representations consisting of about 20 features and a single prototype. A signature-based bio-cryptosystem is designed using the produced metrics and has shown average classification error rates of about 7% and 17% for the PUCPR and the GPDS-300 databases, respectively. This level of performance is comparable to that obtained with complex state-of-the-art classifiers.

  19. Signature of crystal symmetry in positron annihilation data

    International Nuclear Information System (INIS)

    Adam, G.; Adam, S.

    1994-12-01

    While the technique of two-dimensional angular correlation of the electron-positron annihilation radiation (2D-ACAR) yields data in a reference frame related to detectors, data interpretation is made in a reference frame related to the crystal. The paper shows that consistent reformulation of the 2D-ACAR data in the crystal frame can be obtained from the knowledge of the signature of crystal symmetry (SCS) in the data. Derivation of the SCS over variations M-Umklapp areas of the reciprocal lattice from a rigorous definition also results in an improved a posteriori criterion concerning the twinned or untwinned nature of the crystal under investigation. The analysis of a c-projected 2D-ACAR spectrum on Y Ba 2 Cu 3 O 7-δ , accurately establishes the untwinned nature of the used crystals and yields better resolved Fermi surface ridge signatures at 2- and 3- Umklapp processes. (author). 32 refs, 4 figs, 2 tabs

  20. Securing optical code-division multiple-access networks with a postswitching coding scheme of signature reconfiguration

    Science.gov (United States)

    Huang, Jen-Fa; Meng, Sheng-Hui; Lin, Ying-Chen

    2014-11-01

    The optical code-division multiple-access (OCDMA) technique is considered a good candidate for providing optical layer security. An enhanced OCDMA network security mechanism with a pseudonoise (PN) random digital signals type of maximal-length sequence (M-sequence) code switching to protect against eavesdropping is presented. Signature codes unique to individual OCDMA-network users are reconfigured according to the register state of the controlling electrical shift registers. Examples of signature reconfiguration following state switching of the controlling shift register for both the network user and the eavesdropper are numerically illustrated. Dynamically changing the PN state of the shift register to reconfigure the user signature sequence is shown; this hinders eavesdroppers' efforts to decode correct data sequences. The proposed scheme increases the probability of eavesdroppers committing errors in decoding and thereby substantially enhances the degree of an OCDMA network's confidentiality.

  1. Electronic identity

    CERN Document Server

    de Andrade, Norberto Nuno Gomes; Argles, David

    2014-01-01

    With the increasing availability of electronic services, security and a reliable means by which identity is verified is essential.Written by Norberto Andrade the first chapter of this book provides an overview of the main legal and regulatory aspects regarding electronic identity in Europe and assesses the importance of electronic identity for administration (public), business (private) and, above all, citizens. It also highlights the role of eID as a key enabler of the economy.In the second chapter Lisha Chen-Wilson, David Argles, Michele Schiano di Zenise and Gary Wills discuss the user-cent

  2. Eliciting end-user expectations to guide the implementation process of a new electronic health record: A case study using concept mapping.

    Science.gov (United States)

    Joukes, Erik; Cornet, Ronald; de Bruijne, Martine C; de Keizer, Nicolette F

    2016-03-01

    To evaluate the usability of concept mapping to elicit the expectations of healthcare professionals regarding the implementation of a new electronic health record (EHR). These expectations need to be taken into account during the implementation process to maximize the chance of success of the EHR. Two university hospitals in Amsterdam, The Netherlands, in the preparation phase of jointly implementing a new EHR. During this study the hospitals had different methods of documenting patient information (legacy EHR vs. paper-based records). Concept mapping was used to determine and classify the expectations of healthcare professionals regarding the implementation of a new EHR. A multidisciplinary group of 46 healthcare professionals from both university hospitals participated in this study. Expectations were elicited in focus groups, their relevance and feasibility were assessed through a web-questionnaire. Nonmetric multidimensional scaling and clustering methods were used to identify clusters of expectations. We found nine clusters of expectations, each covering an important topic to enable the healthcare professionals to work properly with the new EHR once implemented: usability, data use and reuse, facility conditions, data registration, support, training, internal communication, patients, and collaboration. Average importance and feasibility of each of the clusters was high. Concept mapping is an effective method to find topics that, according to healthcare professionals, are important to consider during the implementation of a new EHR. The method helps to combine the input of a large group of stakeholders at limited efforts. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  3. The borderless online user

    DEFF Research Database (Denmark)

    Riis, Thomas; Schovsbo, Jens Hemmingsen

    2017-01-01

    Traditionally copyright has been exploited in separate geographical markets. This practice restricts the ability of users to access online services, music, movies and sports events on their electronic devices wherever they are in Europe and regardless of borders, viz. so called ‘portability...... of amending the current legal regime. This contribution argues, however, that existing EU rules and principles, in particular the rules of competition law, may deal with the challenges of the existing restrictions on the cross-border access to online services to such an extent that those challenges...

  4. An in fiber experimental approach to photonic quantum digital signatures that does not require quantum memory

    Science.gov (United States)

    Collins, Robert J.; Donaldon, Ross J.; Dunjko, Vedran; Wallden, Petros; Clarke, Patrick J.; Andersson, Erika; Jeffers, John; Buller, Gerald S.

    2014-10-01

    Classical digital signatures are commonly used in e-mail, electronic financial transactions and other forms of electronic communications to ensure that messages have not been tampered with in transit, and that messages are transferrable. The security of commonly used classical digital signature schemes relies on the computational difficulty of inverting certain mathematical functions. However, at present, there are no such one-way functions which have been proven to be hard to invert. With enough computational resources certain implementations of classical public key cryptosystems can be, and have been, broken with current technology. It is nevertheless possible to construct information-theoretically secure signature schemes, including quantum digital signature schemes. Quantum signature schemes can be made information theoretically secure based on the laws of quantum mechanics, while classical comparable protocols require additional resources such as secret communication and a trusted authority. Early demonstrations of quantum digital signatures required quantum memory, rendering them impractical at present. Our present implementation is based on a protocol that does not require quantum memory. It also uses the new technique of unambiguous quantum state elimination, Here we report experimental results for a test-bed system, recorded with a variety of different operating parameters, along with a discussion of aspects of the system security.

  5. A Third-Party E-Payment Protocol Based on Quantum Group Blind Signature

    Science.gov (United States)

    Zhang, Jian-Zhong; Yang, Yuan-Yuan; Xie, Shu-Cui

    2017-09-01

    A third-party E-payment protocol based on quantum group blind signature is proposed in this paper. Our E-payment protocol could protect user's anonymity as the traditional E-payment systems do, and also have unconditional security which the classical E-payment systems can not provide. To achieve that, quantum key distribution, one-time pad and quantum group blind signature are adopted in our scheme. Furthermore, if there were a dispute, the manager Trent can identify who tells a lie.

  6. Multimodal three-dimensional dynamic signature

    Directory of Open Access Journals (Sweden)

    Yury E. Kozlov

    2017-11-01

    Full Text Available Reliable authentication in mobile applications is among the most important information security challenges. Today, we can hardly imagine a person who would not own a mobile device that connects to the Internet. Mobile devices are being used to store large amounts of confidential information, ranging from personal photos to electronic banking tools. In 2009, colleagues from Rice University together with their collaborators from Motorola, proposed an authentication through in-air gestures. This and subsequent work contributing to the development of the method are reviewed in our introduction. At the moment, there exists a version of the gesture-based authentication software available for Android mobile devices. This software has not become widespread yet. One of likely reasons for that is the insufficient reliability of the method, which involves similar to its earlier analogs the use of only one device. Here we discuss the authentication based on the multimodal three-dimensional dynamic signature (MTDS performed by two independent mobile devices. The MTDS-based authentication technique is an advanced version of in-air gesture authentication. We describe the operation of a prototype of MTDS-based authentication, including the main implemented algorithms, as well as some preliminary results of testing the software. We expect that our method can be used in any mobile application, provided a number of additional improvements discussed in the conclusion are made.

  7. Robust signatures of solar neutrino oscillation solutions

    CERN Document Server

    Bahcall, J N; Peña-Garay, C; Bahcall, John N.; Peña-Garay, Carlos

    2002-01-01

    With the goal of identifying signatures that select specific neutrino oscillation parameters, we test the robustness of global oscillation solutions that fit all the available solar and reactor experimental data. We use three global analysis strategies previously applied by different authors and also determine the sensitivity of the oscillation solutions to the critical nuclear fusion cross section, S_{17}(0), for the production of 8B. The neutral current to charged current ratio for SNO is predicted to be 3.5 +- 0.6 (1 sigma) for the favored LMA, LOW, and VAC solutions, which is separated from the no-oscillation value of 1.0 by much more than the expected experimental error. The predicted range of the day-night difference in charged current rates is between 0% and 21% (3 sigma) and is to be strongly correlated with the day-night effect for neutrino-electron scattering. A measurement by SNO of either a NC to CC ratio > 3.3 or a day-night difference > 10%, would favor a small region of the currently allowed LM...

  8. 15 CFR 908.16 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Signature. 908.16 Section 908.16 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) NATIONAL OCEANIC... SUBMITTING REPORTS ON WEATHER MODIFICATION ACTIVITIES § 908.16 Signature. All reports filed with the National...

  9. 12 CFR 269b.731 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Signature. 269b.731 Section 269b.731 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM CHARGES OF UNFAIR LABOR PRACTICES General Rules § 269b.731 Signature. The original of each document filed shall be...

  10. The Pedagogic Signature of the Teaching Profession

    Science.gov (United States)

    Kiel, Ewald; Lerche, Thomas; Kollmannsberger, Markus; Oubaid, Viktor; Weiss, Sabine

    2016-01-01

    Lee S. Shulman deplores that the field of education as a profession does not have a pedagogic signature, which he characterizes as a synthesis of cognitive, practical and moral apprenticeship. In this context, the following study has three goals: 1) In the first theoretical part, the basic problems of constructing a pedagogic signature are…

  11. Infrared ship signature analysis and optimisation

    NARCIS (Netherlands)

    Neele, F.P.

    2005-01-01

    The last decade has seen an increase in the awareness of the infrared signature of naval ships. New ship designs show that infrared signature reduction measures are being incorporated, such as exhaust gas cooling systems, relocation of the exhausts and surface cooling systems. Hull and

  12. Does Social Work Have a Signature Pedagogy?

    Science.gov (United States)

    Earls Larrison, Tara; Korr, Wynne S.

    2013-01-01

    This article contributes to discourse on signature pedagogy by reconceptualizing how our pedagogies are understood and defined for social work education. We critique the view that field education is social work's signature pedagogy and consider what pedagogies are distinct about the teaching and learning of social work. Using Shulman's…

  13. Analysis of signature wrapping attacks and countermeasures

    DEFF Research Database (Denmark)

    Gajek, Sebastian; Jensen, Meiko; Liao, Lijun

    2009-01-01

    In recent research it turned out that Boolean verification, of digital signatures in the context of WSSecurity, is likely to fail: If parts of a SOAP message, are signed and the signature verification applied to, the whole document returns true, then nevertheless the, document may have been...

  14. 48 CFR 4.102 - Contractor's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Contractor's signature. 4.102 Section 4.102 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Contract Execution 4.102 Contractor's signature. (a) Individuals. A contract with an...

  15. 27 CFR 73.33 - Am I legally bound by a form I sign electronically?

    Science.gov (United States)

    2010-04-01

    ... TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY (CONTINUED) PROCEDURES AND PRACTICES ELECTRONIC SIGNATURES; ELECTRONIC SUBMISSION OF FORMS Electronic Filing of Documents with TTB § 73.33 Am I legally bound... paper document submitted to satisfy the same reporting requirement. Persons using electronic signatures...

  16. 78 FR 14233 - Electronic Retirement Processing

    Science.gov (United States)

    2013-03-05

    ... as the private key, is used to verify the signature. Digitized signature means a graphical image of a... recipients of the electronic document. Smart card means a plastic card, typically the size of a credit card, containing an embedded integrated circuit or ``chip'' that can generate, store, or process data. A smart card...

  17. Real time gamma-ray signature identifier

    Science.gov (United States)

    Rowland, Mark [Alamo, CA; Gosnell, Tom B [Moraga, CA; Ham, Cheryl [Livermore, CA; Perkins, Dwight [Livermore, CA; Wong, James [Dublin, CA

    2012-05-15

    A real time gamma-ray signature/source identification method and system using principal components analysis (PCA) for transforming and substantially reducing one or more comprehensive spectral libraries of nuclear materials types and configurations into a corresponding concise representation/signature(s) representing and indexing each individual predetermined spectrum in principal component (PC) space, wherein an unknown gamma-ray signature may be compared against the representative signature to find a match or at least characterize the unknown signature from among all the entries in the library with a single regression or simple projection into the PC space, so as to substantially reduce processing time and computing resources and enable real-time characterization and/or identification.

  18. DIGITAL SIGNATURE IN THE WAY OF LAW

    Directory of Open Access Journals (Sweden)

    Ruya Samlı

    2013-01-01

    Full Text Available Signature can be defined as a person’s name or special signs that he/she writes when he/she wants to indicate he/she wrote or confirm that writing. A person signs many times in his/her life. A person’s signature that is used for thousands of times for many things from formal documents to exams has importance for that person. Especially, signing in legal operations is an operation that can build important results. If a person’s signature is imitated by another person, he/she can become beholden, donate his/her whole wealth, commits offences or do some judicial operations. Today, because many operations can be done with digital environments and internet, signature operation that provides identity validation must also be carried to digital environment. In this paper digital signature concept that is approved for this reason and its situation in international areas and Turkish laws are investigated.

  19. Justine user`s manual

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.R.

    1995-10-01

    Justine is the graphical user interface to the Los Alamos Radiation Modeling Interactive Environment (LARAMIE). It provides LARAMIE customers with a powerful, robust, easy-to-use, WYSIWYG interface that facilitates geometry construction and problem specification. It is assumed that the reader is familiar with LARAMIE, and the transport codes available, i.e., MCNPTM and DANTSYSTM. No attempt is made in this manual to describe these codes in detail. Information about LARAMIE, DANTSYS, and MCNP are available elsewhere. It i also assumed that the reader is familiar with the Unix operating system and with Motif widgets and their look and feel. However, a brief description of Motif and how one interacts with it can be found in Appendix A.

  20. 48 CFR 804.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... signature. 804.101 Section 804.101 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS GENERAL ADMINISTRATIVE MATTERS Contract Execution 804.101 Contracting officer's signature. (a) If a... signature. ...

  1. Radiation Gene-expression Signatures in Primary Breast Cancer Cells.

    Science.gov (United States)

    Minafra, Luigi; Bravatà, Valentina; Cammarata, Francesco P; Russo, Giorgio; Gilardi, Maria C; Forte, Giusi I

    2018-05-01

    In breast cancer (BC) care, radiation therapy (RT) is an efficient treatment to control localized tumor. Radiobiological research is needed to understand molecular differences that affect radiosensitivity of different tumor subtypes and the response variability. The aim of this study was to analyze gene expression profiling (GEP) in primary BC cells following irradiation with doses of 9 Gy and 23 Gy delivered by intraoperative electron radiation therapy (IOERT) in order to define gene signatures of response to high doses of ionizing radiation. We performed GEP by cDNA microarrays and evaluated cell survival after IOERT treatment in primary BC cell cultures. Real-time quantitative reverse transcription polymerase chain reaction (qRT-PCR) was performed to validate candidate genes. We showed, for the first time, a 4-gene and a 6-gene signature, as new molecular biomarkers, in two primary BC cell cultures after exposure at 9 Gy and 23 Gy respectively, for which we observed a significantly high survival rate. Gene signatures activated by different doses of ionizing radiation may predict response to RT and contribute to defining a personalized biological-driven treatment plan. Copyright© 2018, International Institute of Anticancer Research (Dr. George J. Delinasios), All rights reserved.

  2. Maximizing biomarker discovery by minimizing gene signatures

    Directory of Open Access Journals (Sweden)

    Chang Chang

    2011-12-01

    Full Text Available Abstract Background The use of gene signatures can potentially be of considerable value in the field of clinical diagnosis. However, gene signatures defined with different methods can be quite various even when applied the same disease and the same endpoint. Previous studies have shown that the correct selection of subsets of genes from microarray data is key for the accurate classification of disease phenotypes, and a number of methods have been proposed for the purpose. However, these methods refine the subsets by only considering each single feature, and they do not confirm the association between the genes identified in each gene signature and the phenotype of the disease. We proposed an innovative new method termed Minimize Feature's Size (MFS based on multiple level similarity analyses and association between the genes and disease for breast cancer endpoints by comparing classifier models generated from the second phase of MicroArray Quality Control (MAQC-II, trying to develop effective meta-analysis strategies to transform the MAQC-II signatures into a robust and reliable set of biomarker for clinical applications. Results We analyzed the similarity of the multiple gene signatures in an endpoint and between the two endpoints of breast cancer at probe and gene levels, the results indicate that disease-related genes can be preferably selected as the components of gene signature, and that the gene signatures for the two endpoints could be interchangeable. The minimized signatures were built at probe level by using MFS for each endpoint. By applying the approach, we generated a much smaller set of gene signature with the similar predictive power compared with those gene signatures from MAQC-II. Conclusions Our results indicate that gene signatures of both large and small sizes could perform equally well in clinical applications. Besides, consistency and biological significances can be detected among different gene signatures, reflecting the

  3. Microfluidic electronics.

    Science.gov (United States)

    Cheng, Shi; Wu, Zhigang

    2012-08-21

    Microfluidics, a field that has been well-established for several decades, has seen extensive applications in the areas of biology, chemistry, and medicine. However, it might be very hard to imagine how such soft microfluidic devices would be used in other areas, such as electronics, in which stiff, solid metals, insulators, and semiconductors have previously dominated. Very recently, things have radically changed. Taking advantage of native properties of microfluidics, advances in microfluidics-based electronics have shown great potential in numerous new appealing applications, e.g. bio-inspired devices, body-worn healthcare and medical sensing systems, and ergonomic units, in which conventional rigid, bulky electronics are facing insurmountable obstacles to fulfil the demand on comfortable user experience. Not only would the birth of microfluidic electronics contribute to both the microfluidics and electronics fields, but it may also shape the future of our daily life. Nevertheless, microfluidic electronics are still at a very early stage, and significant efforts in research and development are needed to advance this emerging field. The intention of this article is to review recent research outcomes in the field of microfluidic electronics, and address current technical challenges and issues. The outlook of future development in microfluidic electronic devices and systems, as well as new fabrication techniques, is also discussed. Moreover, the authors would like to inspire both the microfluidics and electronics communities to further exploit this newly-established field.

  4. Chips in banknotes for a banknote electronic signature

    Science.gov (United States)

    Perron, Maurice; Grimal, Jean-Michel; Beauchet, Frederic; Dell'Ova, Francis

    2004-06-01

    A lot of information can be found in the media about the possibility of using micro-chips in banknotes. This mostly comes from chip manufacturers whose technology is becoming mature for this application. A lot of patents have been applied therefore but what must be noticed is that all these patents concern the processes to insert chips in banknotes and not a lot is said about the product itself and for what use. The Banque de France is a Central Bank involved in all tasks concerning banknotes from design, production, issue, recirculation and sorting, action against counterfeiting and finally destruction. These activities concern, of course, the banknotes in circulation in France (formerly the French francs notes, presently the Euro notes as Banque de France is part of the Eurosystem) and in other countries in the world. The Banque de France approach in looking to the future of chips in banknotes is at first a product approach. Banknotes are means of payment for which security of authentication is fundamental. They could carry chips to provide more security in the transactions but without altering their nature: the anonyminity and immediacy of the transactions.

  5. 21 October 2008 - LHC Inauguration - Czech Deputy Minister of Education, Youth and Sports, responsible for Science and Universities V. Ruzicka welcomed by CERN Director-General R. Aymar, CERN Chief Scientific Officer J. Engelen and CERN Financial Officer S. Lettow and signing the electronic guest book with CERN user R. Leitner.

    CERN Document Server

    CERN Photo Service

    2008-01-01

    21 October 2008 - LHC Inauguration - Czech Deputy Minister of Education, Youth and Sports, responsible for Science and Universities V. Ruzicka welcomed by CERN Director-General R. Aymar, CERN Chief Scientific Officer J. Engelen and CERN Financial Officer S. Lettow and signing the electronic guest book with CERN user R. Leitner.

  6. Nonspeech audio in user interfaces for TV

    NARCIS (Netherlands)

    Sluis, van de Richard; Eggen, J.H.; Rypkema, J.A.

    1997-01-01

    This study explores the end-user benefits of using nonspeech audio in television user interfaces. A prototype of an Electronic Programme Guide (EPG) served as a carrier for the research. One of the features of this EPG is the possibility to search for TV programmes in a category-based way. The EPG

  7. Genomic Signatures of Sexual Conflict.

    Science.gov (United States)

    Kasimatis, Katja R; Nelson, Thomas C; Phillips, Patrick C

    2017-10-30

    Sexual conflict is a specific class of intergenomic conflict that describes the reciprocal sex-specific fitness costs generated by antagonistic reproductive interactions. The potential for sexual conflict is an inherent property of having a shared genome between the sexes and, therefore, is an extreme form of an environment-dependent fitness effect. In this way, many of the predictions from environment-dependent selection can be used to formulate expected patterns of genome evolution under sexual conflict. However, the pleiotropic and transmission constraints inherent to having alleles move across sex-specific backgrounds from generation to generation further modulate the anticipated signatures of selection. We outline methods for detecting candidate sexual conflict loci both across and within populations. Additionally, we consider the ability of genome scans to identify sexually antagonistic loci by modeling allele frequency changes within males and females due to a single generation of selection. In particular, we highlight the need to integrate genotype, phenotype, and functional information to truly distinguish sexual conflict from other forms of sexual differentiation. © The American Genetic Association 2017. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  8. Transcriptomic signatures in cartilage ageing

    Science.gov (United States)

    2013-01-01

    Introduction Age is an important factor in the development of osteoarthritis. Microarray studies provide insight into cartilage aging but do not reveal the full transcriptomic phenotype of chondrocytes such as small noncoding RNAs, pseudogenes, and microRNAs. RNA-Seq is a powerful technique for the interrogation of large numbers of transcripts including nonprotein coding RNAs. The aim of the study was to characterise molecular mechanisms associated with age-related changes in gene signatures. Methods RNA for gene expression analysis using RNA-Seq and real-time PCR analysis was isolated from macroscopically normal cartilage of the metacarpophalangeal joints of eight horses; four young donors (4 years old) and four old donors (>15 years old). RNA sequence libraries were prepared following ribosomal RNA depletion and sequencing was undertaken using the Illumina HiSeq 2000 platform. Differentially expressed genes were defined using Benjamini-Hochberg false discovery rate correction with a generalised linear model likelihood ratio test (P ageing cartilage. Conclusion There was an age-related dysregulation of matrix, anabolic and catabolic cartilage factors. This study has increased our knowledge of transcriptional networks in cartilage ageing by providing a global view of the transcriptome. PMID:23971731

  9. Reduction of a Ship's Magnetic Field Signatures

    CERN Document Server

    Holmes, John

    2008-01-01

    Decreasing the magnetic field signature of a naval vessel will reduce its susceptibility to detonating naval influence mines and the probability of a submarine being detected by underwater barriers and maritime patrol aircraft. Both passive and active techniques for reducing the magnetic signatures produced by a vessel's ferromagnetism, roll-induced eddy currents, corrosion-related sources, and stray fields are presented. Mathematical models of simple hull shapes are used to predict the levels of signature reduction that might be achieved through the use of alternate construction materials. Al

  10. Molecular signatures of thyroid follicular neoplasia

    DEFF Research Database (Denmark)

    Borup, R.; Rossing, M.; Henao, Ricardo

    2010-01-01

    The molecular pathways leading to thyroid follicular neoplasia are incompletely understood, and the diagnosis of follicular tumors is a clinical challenge. To provide leads to the pathogenesis and diagnosis of the tumors, we examined the global transcriptome signatures of follicular thyroid...... a mechanism for cancer progression, which is why we exploited the results in order to generate a molecular classifier that could identify 95% of all carcinomas. Validation employing public domain and cross-platform data demonstrated that the signature was robust and could diagnose follicular nodules...... and robust genetic signature for the diagnosis of FA and FC. Endocrine-Related Cancer (2010) 17 691-708...

  11. DIGITAL SIGNATURE IN THE WAY OF LAW

    OpenAIRE

    Ruya Samlı

    2013-01-01

    Signature can be defined as a person’s name or special signs that he/she writes when he/she wants to indicate he/she wrote or confirm that writing. A person signs many times in his/her life. A person’s signature that is used for thousands of times for many things from formal documents to exams has importance for that person. Especially, signing in legal operations is an operation that can build important results. If a person’s signature is imitated by another person, he/she can be...

  12. Development of SuperHERO readout electronics

    Data.gov (United States)

    National Aeronautics and Space Administration — Next-generation solar hard X-ray (HXR) imagers will make high-sensitivity, high-dynamic-range observations of the signatures of accelerated electrons in solar...

  13. Power Electronics

    DEFF Research Database (Denmark)

    Iov, Florin; Ciobotaru, Mihai; Blaabjerg, Frede

    2008-01-01

    is to change the electrical power production sources from the conventional, fossil (and short term) based energy sources to renewable energy resources. The other is to use high efficient power electronics in power generation, power transmission/distribution and end-user application. This paper discuss the most...... emerging renewable energy sources, wind energy, which by means of power electronics are changing from being a minor energy source to be acting as an important power source in the energy system. Power electronics is the enabling technology and the presentation will cover the development in wind turbine...... technology from kW to MW, discuss which power electronic solutions are most feasible and used today....

  14. User Requirements for Wireless

    DEFF Research Database (Denmark)

    in the elicitation process. Cases and user requirement elements discussed in the book include: User requirements elicitation processes for children, construction workers, and farmers User requirements for personalized services of a broadcast company Variations in user involvement Practical elements of user...

  15. Electronic medical records system user acceptance

    CSIR Research Space (South Africa)

    Erasmus, L

    2015-06-01

    Full Text Available on literature and confirmed in this case study, if adoption of EMR systems is the ultimate goal, the implementation thereof should be properly managed with strong leadership and political backing at the highest level. Adoption is also supported by keeping...

  16. Magnetic Signature of Brushless Electric Motors

    National Research Council Canada - National Science Library

    Clarke, David

    2006-01-01

    Brushless electric motors are used in a number of underwater vehicles. When these underwater vehicles are used for mine clearance operations the magnetic signature of the brushless motors is important...

  17. Magnetic signature surveillance of nuclear fuel

    International Nuclear Information System (INIS)

    Bernatowicz, H.; Schoenig, F.C.

    1981-01-01

    Typical nuclear fuel material contains tramp ferromagnetic particles of random size and distribution. Also, selected amounts of paramagnetic or ferromagnetic material can be added at random or at known positions in the fuel material. The fuel material in its non-magnetic container is scanned along its length by magnetic susceptibility detecting apparatus whereby susceptibility changes along its length are obtained and provide a unique signal waveform of the container of fuel material as a signature thereof. The output signature is stored. At subsequent times in its life the container is again scanned and respective signatures obtained which are compared with the initially obtained signature, any differences indicating alteration or tampering with the fuel material. If the fuel material includes a paramagnetic additive by taking two measurements along the container the effects thereof can be cancelled out. (author)

  18. Blind Quantum Signature with Blind Quantum Computation

    Science.gov (United States)

    Li, Wei; Shi, Ronghua; Guo, Ying

    2017-04-01

    Blind quantum computation allows a client without quantum abilities to interact with a quantum server to perform a unconditional secure computing protocol, while protecting client's privacy. Motivated by confidentiality of blind quantum computation, a blind quantum signature scheme is designed with laconic structure. Different from the traditional signature schemes, the signing and verifying operations are performed through measurement-based quantum computation. Inputs of blind quantum computation are securely controlled with multi-qubit entangled states. The unique signature of the transmitted message is generated by the signer without leaking information in imperfect channels. Whereas, the receiver can verify the validity of the signature using the quantum matching algorithm. The security is guaranteed by entanglement of quantum system for blind quantum computation. It provides a potential practical application for e-commerce in the cloud computing and first-generation quantum computation.

  19. Propagation of Dipolarization Signatures Observed by the Van Allen Probes in the Inner Magnetosphere

    Science.gov (United States)

    Ohtani, S.; Motoba, T.; Gkioulidou, M.; Takahashi, K.; Kletzing, C.

    2017-12-01

    Dipolarization, the change of the local magnetic field from a stretched to a more dipolar configuration, is one of the most fundamental processes of magnetospheric physics. It is especially critical for the dynamics of the inner magnetosphere. The associated electric field accelerates ions and electrons and transports them closer to Earth. Such injected ions intensify the ring current, and electrons constitute the seed population of the radiation belt. Those ions and electrons may also excite various waves that play important roles in the enhancement and loss of the radiation belt electrons. Despite such critical consequences, the general characteristics of dipolarization in the inner magnetosphere still remain to be understood. The Van Allen Probes mission, which consists of two probes that orbit through the equatorial region of the inner magnetosphere, provides an ideal opportunity to examine dipolarization signatures in the core of the ring current. In the present study we investigate the spatial expansion of the dipolarization region by examining the correlation and time delay of dipolarization signatures observed by the two probes. Whereas in general it requires three-point measurements to deduce the propagation of a signal on a certain plane, we statically examined the observed time delays and found that dipolarization signatures tend to propagate radially inward as well as away from midnight. In this paper we address the propagation of dipolarization signatures quantitatively and compare with the propagation velocities reported previously based on observations made farther away from Earth. We also discuss how often and under what conditions the dipolarization region expands.

  20. Signature for the shape of the universe

    International Nuclear Information System (INIS)

    Gomero, G.I.; Reboucas, M.J.; Teixeira, A.F.F.

    2001-03-01

    If the universe has a nontrival shape (topology) the sky may show multiple correlated images of cosmic objects. These correlations can be counched in terms of distance correlations. We propose a statistical quantity which can be used to reveal the topological signature of any Roberston-Walker (RW) spacetime with nontrivial topology. We also show through computer-aided simulations how one can extract the topological signatures of flat elliptic and hyperbolic RW universes with nontrivial topology. (author)

  1. Signature-based store checking buffer

    Science.gov (United States)

    Sridharan, Vilas; Gurumurthi, Sudhanva

    2015-06-02

    A system and method for optimizing redundant output verification, are provided. A hardware-based store fingerprint buffer receives multiple instances of output from multiple instances of computation. The store fingerprint buffer generates a signature from the content included in the multiple instances of output. When a barrier is reached, the store fingerprint buffer uses the signature to verify the content is error-free.

  2. Neutral signature Walker-VSI metrics

    International Nuclear Information System (INIS)

    Coley, A; McNutt, D; Musoke, N; Brooks, D; Hervik, S

    2014-01-01

    We will construct explicit examples of four-dimensional neutral signature Walker (but not necessarily degenerate Kundt) spaces for which all of the polynomial scalar curvature invariants vanish. We then investigate the properties of some particular subclasses of Ricci flat spaces. We also briefly describe some four-dimensional neutral signature Einstein spaces for which all of the polynomial scalar curvature invariants are constant. (paper)

  3. Tightly Secure Signatures From Lossy Identification Schemes

    OpenAIRE

    Abdalla , Michel; Fouque , Pierre-Alain; Lyubashevsky , Vadim; Tibouchi , Mehdi

    2015-01-01

    International audience; In this paper, we present three digital signature schemes with tight security reductions in the random oracle model. Our first signature scheme is a particularly efficient version of the short exponent discrete log-based scheme of Girault et al. (J Cryptol 19(4):463–487, 2006). Our scheme has a tight reduction to the decisional short discrete logarithm problem, while still maintaining the non-tight reduction to the computational version of the problem upon which the or...

  4. L1000FWD: Fireworks visualization of drug-induced transcriptomic signatures.

    Science.gov (United States)

    Wang, Zichen; Lachmann, Alexander; Keenan, Alexandra B; Ma'ayan, Avi

    2018-02-06

    As part of the NIH Library of Integrated Network-based Cellular Signatures (LINCS) program, hundreds of thousands of transcriptomic signatures were generated with the L1000 technology, profiling the response of human cell lines to over 20,000 small molecule compounds. This effort is a promising approach toward revealing the mechanisms-of-action (MOA) for marketed drugs and other less studied potential therapeutic compounds. L1000 fireworks display (L1000FWD) is a web application that provides interactive visualization of over 16,000 drug and small-molecule induced gene expression signatures. L1000FWD enables coloring of signatures by different attributes such as cell type, time point, concentration, as well as drug attributes such as MOA and clinical phase. Signature similarity search is implemented to enable the search for mimicking or opposing signatures given as input of up and down gene sets. Each point on the L1000FWD interactive map is linked to a signature landing page, which provides multifaceted knowledge from various sources about the signature and the drug. Notably such information includes most frequent diagnoses, co-prescribed drugs and age distribution of prescriptions as extracted from the Mount Sinai Health System electronic medical records (EMR). Overall, L1000FWD serves as a platform for identifying functions for novel small molecules using unsupervised clustering, as well as for exploring drug MOA. L1000FWD is freely accessible at: http://amp.pharm.mssm.edu/L1000FWD. avi.maayan@mssm.edu. Supplementary data are available at Bioinformatics online. © The Author (2018). Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  5. Efficient Signature Based Malware Detection on Mobile Devices

    Directory of Open Access Journals (Sweden)

    Deepak Venugopal

    2008-01-01

    Full Text Available The threat of malware on mobile devices is gaining attention recently. It is important to provide security solutions to these devices before these threats cause widespread damage. However, mobile devices have severe resource constraints in terms of memory and power. Hence, even though there are well developed techniques for malware detection on the PC domain, it requires considerable effort to adapt these techniques for mobile devices. In this paper, we outline the considerations for malware detection on mobile devices and propose a signature based malware detection method. Specifically, we detail a signature matching algorithm that is well suited for use in mobile device scanning due to its low memory requirements. Additionally, the matching algorithm is shown to have high scanning speed which makes it unobtrusive to users. Our evaluation and comparison study with the well known Clam-AV scanner shows that our solution consumes less than 50% of the memory used by Clam-AV while maintaining a fast scanning rate.

  6. Revocable ID-Based Signature with Short Size over Lattices

    Directory of Open Access Journals (Sweden)

    Ying-Hao Hung

    2017-01-01

    Full Text Available In the past, many ID-based signature (IBS schemes based on the integer factorization or discrete logarithm problems were proposed. With the progress on the development of quantum technology, IBS schemes mentioned above would become vulnerable. Recently, several IBS schemes over lattices were proposed to be secure against attacks in the quantum era. As conventional public-key settings, ID-based public-key settings have to offer a revocation mechanism to revoke misbehaving or malicious users. However, in the past, little work focuses on the revocation problem in the IBS schemes over lattices. In this article, we propose a new revocable IBS (RIBS scheme with short size over lattices. Based on the short integer solution (SIS assumption, we prove that the proposed RIBS scheme provides existential unforgeability against adaptive chosen-message attacks. As compared to the existing IBS schemes over lattices, our RIBS scheme has better performance in terms of signature size, signing key size, and the revocation mechanism with public channels.

  7. The Influence of a Mouthpiece-Based Topography Measurement Device on Electronic Cigarette User's Plasma Nicotine Concentration, Heart Rate, and Subjective Effects Under Directed and Ad Libitum Use Conditions.

    Science.gov (United States)

    Spindle, Tory R; Hiler, Marzena M; Breland, Alison B; Karaoghlanian, Nareg V; Shihadeh, Alan L; Eissenberg, Thomas

    2017-04-01

    Electronic cigarettes e-cigarettes aerosolize a liquid solution often containing nicotine. e-cigarette nicotine delivery may be influenced by user puffing behaviors ("puff topography"). E-cigarette puff topography can be recorded using mouthpiece-based computerized systems. The present study sought to examine the extent to which these systems influence e-cigarette nicotine delivery and other e-cigarette associated acute effects under ad libitum use conditions. Plasma nicotine concentration, heart rate, and subjective effects were assessed in 29 experienced e-cigarette users using their preferred e-cigarette battery and liquid (≥12mg/mL nicotine) in two sessions differing only by the presence of a mouthpiece-based device. In both sessions, participants completed a directed e-cigarette use bout (10 puffs, 30-s interpuff interval) and a 90-min ad libitum bout. Puff topography was recorded in the session with the topography mouthpiece. Plasma nicotine, heart rate, and subjective effects, aside from "Did the e-cigarette Taste Good?" were independent of topography measurement (higher mean taste ratings were observed in the no topography condition). Mean (SEM) plasma nicotine concentration following the ad libitum bout was 34.3ng/mL (4.9) in the no topography condition and 35.7ng/mL (4.3) in the topography condition. Longer puff durations, longer interpuff intervals, and larger puff volumes were observed in the ad libitum relative to the directed bout. E-cigarette use significantly increased plasma nicotine concentration and heart rate while suppressing abstinence symptoms. These effects did not differ when a topography mouthpiece was present. Future studies using ad libitum e-cigarette use bouts would facilitate understanding of e-cigarette toxicant yield. No prior study has examined whether mouthpiece-based topography recording devices influence e-cigarette associated nicotine delivery, heart rate, or subjective effects under ad libitum conditions or assessed ad

  8. Weather and Atmospheric Effects on the Measurement and Use of Electro-Optical Signature Data

    Science.gov (United States)

    2017-02-01

    Signature Data RCC 469-17 February 2017 55 Ontar Corporation markets a software package called PcModWin that has a Windows interface and graphical ... user interface (GUI) allowing the running of MODTRAN on a PC. A software package from AFRL, called PLEXUS, has a Windows interface and GUI. PLEXUS...Table of Figures Figure 1. Electromagnetic Spectrum and a Portion of the Optical Region Limited to 25 µm

  9. On the security of a novel probabilistic signature based on bilinear square Diffie-Hellman problem and its extension.

    Science.gov (United States)

    Zhao, Zhenguo; Shi, Wenbo

    2014-01-01

    Probabilistic signature scheme has been widely used in modern electronic commerce since it could provide integrity, authenticity, and nonrepudiation. Recently, Wu and Lin proposed a novel probabilistic signature (PS) scheme using the bilinear square Diffie-Hellman (BSDH) problem. They also extended it to a universal designated verifier signature (UDVS) scheme. In this paper, we analyze the security of Wu et al.'s PS scheme and UDVS scheme. Through concrete attacks, we demonstrate both of their schemes are not unforgeable. The security analysis shows that their schemes are not suitable for practical applications.

  10. Xyce parallel electronic simulator.

    Energy Technology Data Exchange (ETDEWEB)

    Keiter, Eric R; Mei, Ting; Russo, Thomas V.; Rankin, Eric Lamont; Schiek, Richard Louis; Thornquist, Heidi K.; Fixel, Deborah A.; Coffey, Todd S; Pawlowski, Roger P; Santarelli, Keith R.

    2010-05-01

    This document is a reference guide to the Xyce Parallel Electronic Simulator, and is a companion document to the Xyce Users Guide. The focus of this document is (to the extent possible) exhaustively list device parameters, solver options, parser options, and other usage details of Xyce. This document is not intended to be a tutorial. Users who are new to circuit simulation are better served by the Xyce Users Guide.

  11. Does Twitter trigger bursts in signature collections?

    Directory of Open Access Journals (Sweden)

    Rui Yamaguchi

    Full Text Available INTRODUCTION: The quantification of social media impacts on societal and political events is a difficult undertaking. The Japanese Society of Oriental Medicine started a signature-collecting campaign to oppose a medical policy of the Government Revitalization Unit to exclude a traditional Japanese medicine, "Kampo," from the public insurance system. The signature count showed a series of aberrant bursts from November 26 to 29, 2009. In the same interval, the number of messages on Twitter including the keywords "Signature" and "Kampo," increased abruptly. Moreover, the number of messages on an Internet forum that discussed the policy and called for signatures showed a train of spikes. METHODS AND FINDINGS: In order to estimate the contributions of social media, we developed a statistical model with state-space modeling framework that distinguishes the contributions of multiple social media in time-series of collected public opinions. We applied the model to the time-series of signature counts of the campaign and quantified contributions of two social media, i.e., Twitter and an Internet forum, by the estimation. We found that a considerable portion (78% of the signatures was affected from either of the social media throughout the campaign and the Twitter effect (26% was smaller than the Forum effect (52% in total, although Twitter probably triggered the initial two bursts of signatures. Comparisons of the estimated profiles of the both effects suggested distinctions between the social media in terms of sustainable impact of messages or tweets. Twitter shows messages on various topics on a time-line; newer messages push out older ones. Twitter may diminish the impact of messages that are tweeted intermittently. CONCLUSIONS: The quantification of social media impacts is beneficial to better understand people's tendency and may promote developing strategies to engage public opinions effectively. Our proposed method is a promising tool to explore

  12. Does Twitter trigger bursts in signature collections?

    Science.gov (United States)

    Yamaguchi, Rui; Imoto, Seiya; Kami, Masahiro; Watanabe, Kenji; Miyano, Satoru; Yuji, Koichiro

    2013-01-01

    The quantification of social media impacts on societal and political events is a difficult undertaking. The Japanese Society of Oriental Medicine started a signature-collecting campaign to oppose a medical policy of the Government Revitalization Unit to exclude a traditional Japanese medicine, "Kampo," from the public insurance system. The signature count showed a series of aberrant bursts from November 26 to 29, 2009. In the same interval, the number of messages on Twitter including the keywords "Signature" and "Kampo," increased abruptly. Moreover, the number of messages on an Internet forum that discussed the policy and called for signatures showed a train of spikes. In order to estimate the contributions of social media, we developed a statistical model with state-space modeling framework that distinguishes the contributions of multiple social media in time-series of collected public opinions. We applied the model to the time-series of signature counts of the campaign and quantified contributions of two social media, i.e., Twitter and an Internet forum, by the estimation. We found that a considerable portion (78%) of the signatures was affected from either of the social media throughout the campaign and the Twitter effect (26%) was smaller than the Forum effect (52%) in total, although Twitter probably triggered the initial two bursts of signatures. Comparisons of the estimated profiles of the both effects suggested distinctions between the social media in terms of sustainable impact of messages or tweets. Twitter shows messages on various topics on a time-line; newer messages push out older ones. Twitter may diminish the impact of messages that are tweeted intermittently. The quantification of social media impacts is beneficial to better understand people's tendency and may promote developing strategies to engage public opinions effectively. Our proposed method is a promising tool to explore information hidden in social phenomena.

  13. User Innovation Management

    DEFF Research Database (Denmark)

    Kanstrup, Anne Marie; Bertelsen, Pernille

    User Innovation Management (UIM) is a method for fo-opereation with users in innovation projects. The UIM method emphasizes the practice of a participatorty attitude.......User Innovation Management (UIM) is a method for fo-opereation with users in innovation projects. The UIM method emphasizes the practice of a participatorty attitude....

  14. User Behavior Analytics

    Energy Technology Data Exchange (ETDEWEB)

    Turcotte, Melissa [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Moore, Juston Shane [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-02-28

    User Behaviour Analytics is the tracking, collecting and assessing of user data and activities. The goal is to detect misuse of user credentials by developing models for the normal behaviour of user credentials within a computer network and detect outliers with respect to their baseline.

  15. Lattice-Based Revocable Certificateless Signature

    Directory of Open Access Journals (Sweden)

    Ying-Hao Hung

    2017-10-01

    Full Text Available Certificateless signatures (CLS are noticeable because they may resolve the key escrow problem in ID-based signatures and break away the management problem regarding certificate in conventional signatures. However, the security of the mostly previous CLS schemes relies on the difficulty of solving discrete logarithm or large integer factorization problems. These two problems would be solved by quantum computers in the future so that the signature schemes based on them will also become insecure. For post-quantum cryptography, lattice-based cryptography is significant due to its efficiency and security. However, no study on addressing the revocation problem in the existing lattice-based CLS schemes is presented. In this paper, we focus on the revocation issue and present the first revocable CLS (RCLS scheme over lattices. Based on the short integer solution (SIS assumption over lattices, the proposed lattice-based RCLS scheme is shown to be existential unforgeability against adaptive chosen message attacks. By performance analysis and comparisons, the proposed lattice-based RCLS scheme is better than the previously proposed lattice-based CLS scheme, in terms of private key size, signature length and the revocation mechanism.

  16. Calculated NWIS signatures for enriched uranium metal

    International Nuclear Information System (INIS)

    Valentine, T.E.; Mihalczo, J.T.; Koehler, P.E.

    1995-01-01

    Nuclear Weapons Identification System (NWIS) signatures have been calculated using a Monte Carlo transport code for measurement configurations of a 252 Cf source, detectors, and a uranium metal casting. NWIS signatures consist of a wide variety of time-and frequency-analysis signatures such as the time distribution of neutrons after californium fission, the time distribution of counts in a detector after a previous count, the number of times n pulses occur in a time interval, and various frequency-analysis signatures, such as auto-power and cross-power spectral densities, coherences, and a ratio of spectral densities. This ratio is independent of detection efficiency. The analysis presented here, using the MCNP-DSP code, evaluates the applicability of this method for measurement of the 235 U content of 19-kg castings of depleted uranium and uranium with enrichments of 20, 40, 60, 80, 90, and 93.2 wt % 235 U. The dependence of the wide variety of NWIS signatures on 235 U content and possible configurations of a measurement system are presented. These preliminary calculations indicate short measurement times. Additional calculations are being performed to optimize the source-detector-moderator-casting configuration for the shortest measurement time. Although the NWIS method was developed for nuclear weapons identification, the development of a small processor now allows it to be also applied in a practical way to subcriticality measurements, nuclear fuel process monitoring and qualitative nondestructive assay of special nuclear material

  17. Lazy User Behaviour

    OpenAIRE

    Collan, Mikael

    2007-01-01

    In this position paper we suggest that a user will most often choose the solution (device) that will fulfill her (information) needs with the least effort. We call this “lazy user behavior”. We suggest that the principle components responsible for solution selection are the user need and the user state. User need is the user’s detailed (information) need (urgency, type, depth, etc.) and user state is the situation, in which the user is at the moment of the need (location, time, etc.); the use...

  18. Electronic equipment packaging technology

    CERN Document Server

    Ginsberg, Gerald L

    1992-01-01

    The last twenty years have seen major advances in the electronics industry. Perhaps the most significant aspect of these advances has been the significant role that electronic equipment plays in almost all product markets. Even though electronic equipment is used in a broad base of applications, many future applications have yet to be conceived. This versatility of electron­ ics has been brought about primarily by the significant advances that have been made in integrated circuit technology. The electronic product user is rarely aware of the integrated circuits within the equipment. However, the user is often very aware of the size, weight, mod­ ularity, maintainability, aesthetics, and human interface features of the product. In fact, these are aspects of the products that often are instrumental in deter­ mining its success or failure in the marketplace. Optimizing these and other product features is the primary role of Electronic Equipment Packaging Technology. As the electronics industry continues to pr...

  19. Trace element ink spiking for signature authentication

    International Nuclear Information System (INIS)

    Hatzistavros, V.S.; Kallithrakas-Kontos, N.G.

    2008-01-01

    Signature authentication is a critical question in forensic document examination. Last years the evolution of personal computers made signature copying a quite easy task, so the development of new ways for signature authentication is crucial. In the present work a commercial ink was spiked with many trace elements in various concentrations. Inorganic and organometallic ink soluble compounds were used as spiking agents, whilst ink retained its initial properties. The spiked inks were used for paper writing and the documents were analyzed by a non destructive method, the energy dispersive X-ray fluorescence. The thin target model was proved right for quantitative analysis and a very good linear relationship of the intensity (X-ray signal) against concentration was estimated for all used elements. Intensity ratios between different elements in the same ink gave very stable results, independent on the writing alterations. The impact of time both to written document and prepared inks was also investigated. (author)

  20. Cryptanalysis of the arbitrated quantum signature protocols

    International Nuclear Information System (INIS)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-01-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  1. Molecular Signature in HCV-Positive Lymphomas

    Directory of Open Access Journals (Sweden)

    Valli De Re

    2012-01-01

    Full Text Available Hepatitis C virus (HCV is a positive, single-stranded RNA virus, which has been associated to different subtypes of B-cell non-Hodgkin lymphoma (B-NHL. Cumulative evidence suggests an HCV-related antigen driven process in the B-NHL development. The underlying molecular signature associated to HCV-related B-NHL has to date remained obscure. In this review, we discuss the recent developments in this field with a special mention to different sets of genes whose expression is associated with BCR coupled to Blys signaling which in turn was found to be linked to B-cell maturation stages and NF-κb transcription factor. Even if recent progress on HCV-B-NHL signature has been made, the precise relationship between HCV and lymphoma development and phenotype signature remain to be clarified.

  2. Selection signatures in worldwide sheep populations.

    Science.gov (United States)

    Fariello, Maria-Ines; Servin, Bertrand; Tosser-Klopp, Gwenola; Rupp, Rachel; Moreno, Carole; San Cristobal, Magali; Boitard, Simon

    2014-01-01

    The diversity of populations in domestic species offers great opportunities to study genome response to selection. The recently published Sheep HapMap dataset is a great example of characterization of the world wide genetic diversity in sheep. In this study, we re-analyzed the Sheep HapMap dataset to identify selection signatures in worldwide sheep populations. Compared to previous analyses, we made use of statistical methods that (i) take account of the hierarchical structure of sheep populations, (ii) make use of linkage disequilibrium information and (iii) focus specifically on either recent or older selection signatures. We show that this allows pinpointing several new selection signatures in the sheep genome and distinguishing those related to modern breeding objectives and to earlier post-domestication constraints. The newly identified regions, together with the ones previously identified, reveal the extensive genome response to selection on morphology, color and adaptation to new environments.

  3. Biomarker Gene Signature Discovery Integrating Network Knowledge

    Directory of Open Access Journals (Sweden)

    Holger Fröhlich

    2012-02-01

    Full Text Available Discovery of prognostic and diagnostic biomarker gene signatures for diseases, such as cancer, is seen as a major step towards a better personalized medicine. During the last decade various methods, mainly coming from the machine learning or statistical domain, have been proposed for that purpose. However, one important obstacle for making gene signatures a standard tool in clinical diagnosis is the typical low reproducibility of these signatures combined with the difficulty to achieve a clear biological interpretation. For that purpose in the last years there has been a growing interest in approaches that try to integrate information from molecular interaction networks. Here we review the current state of research in this field by giving an overview about so-far proposed approaches.

  4. Estimating physiological skin parameters from hyperspectral signatures

    Science.gov (United States)

    Vyas, Saurabh; Banerjee, Amit; Burlina, Philippe

    2013-05-01

    We describe an approach for estimating human skin parameters, such as melanosome concentration, collagen concentration, oxygen saturation, and blood volume, using hyperspectral radiometric measurements (signatures) obtained from in vivo skin. We use a computational model based on Kubelka-Munk theory and the Fresnel equations. This model forward maps the skin parameters to a corresponding multiband reflectance spectra. Machine-learning-based regression is used to generate the inverse map, and hence estimate skin parameters from hyperspectral signatures. We test our methods using synthetic and in vivo skin signatures obtained in the visible through the short wave infrared domains from 24 patients of both genders and Caucasian, Asian, and African American ethnicities. Performance validation shows promising results: good agreement with the ground truth and well-established physiological precepts. These methods have potential use in the characterization of skin abnormalities and in minimally-invasive prescreening of malignant skin cancers.

  5. SPECTROSCOPIC SIGNATURES RELATED TO A SUNQUAKE

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, S. A.; Harra, L. K.; Green, L. M. [UCL Mullard Space Science Laboratory, Holmbury St. Mary, Dorking, Surrey RH5 6NT (United Kingdom); Zharkov, S., E-mail: sarah.matthews@ucl.ac.uk [Department of Mathematics and Physics, University of Hull, Hull (United Kingdom)

    2015-10-10

    The presence of flare-related acoustic emission (sunquakes (SQs)) in some flares, and only in specific locations within the flaring environment, represents a severe challenge to our current understanding of flare energy transport processes. In an attempt to contribute to understanding the origins of SQs we present a comparison of new spectral observations from Hinode’s EUV imaging Spectrometer (EIS) and the Interface Region Imaging Spectrograph (IRIS) of the chromosphere, transition region, and corona above an SQ, and compare them to the spectra observed in a part of the flaring region with no acoustic signature. Evidence for the SQ is determined using both time–distance and acoustic holography methods, and we find that unlike many previous SQ detections, the signal is rather dispersed, but that the time–distance and 6 and 7 mHz sources converge at the same spatial location. We also see some evidence for different evolution at different frequencies, with an earlier peak at 7 mHz than at 6 mHz. Using EIS and IRIS spectroscopic measurements we find that in this location, at the time of the 7 mHz peak the spectral emission is significantly more intense, shows larger velocity shifts and substantially broader profiles than in the location with no SQ, and there is a good correlation between blueshifted, hot coronal, hard X-ray (HXR), and redshifted chromospheric emission, consistent with the idea of a strong downward motion driven by rapid heating by nonthermal electrons and the formation of chromospheric shocks. Exploiting the diagnostic potential of the Mg ii triplet lines, we also find evidence for a single large temperature increase deep in the atmosphere, which is consistent with this scenario. The time of the 6 mHz and time–distance peak signal coincides with a secondary peak in the energy release process, but in this case we find no evidence of HXR emission in the quake location, instead finding very broad spectral lines, strongly shifted to the red

  6. Peripheral blood signatures of lead exposure.

    Directory of Open Access Journals (Sweden)

    Heather G LaBreche

    Full Text Available BACKGROUND: Current evidence indicates that even low-level lead (Pb exposure can have detrimental effects, especially in children. We tested the hypothesis that Pb exposure alters gene expression patterns in peripheral blood cells and that these changes reflect dose-specific alterations in the activity of particular pathways. METHODOLOGY/PRINCIPAL FINDING: Using Affymetrix Mouse Genome 430 2.0 arrays, we examined gene expression changes in the peripheral blood of female Balb/c mice following exposure to per os lead acetate trihydrate or plain drinking water for two weeks and after a two-week recovery period. Data sets were RMA-normalized and dose-specific signatures were generated using established methods of supervised classification and binary regression. Pathway activity was analyzed using the ScoreSignatures module from GenePattern. CONCLUSIONS/SIGNIFICANCE: The low-level Pb signature was 93% sensitive and 100% specific in classifying samples a leave-one-out crossvalidation. The high-level Pb signature demonstrated 100% sensitivity and specificity in the leave-one-out crossvalidation. These two signatures exhibited dose-specificity in their ability to predict Pb exposure and had little overlap in terms of constituent genes. The signatures also seemed to reflect current levels of Pb exposure rather than past exposure. Finally, the two doses showed differential activation of cellular pathways. Low-level Pb exposure increased activity of the interferon-gamma pathway, whereas high-level Pb exposure increased activity of the E2F1 pathway.

  7. Doppler Velocity Signatures of Idealized Elliptical Vortices

    Directory of Open Access Journals (Sweden)

    Wen-Chau Lee

    2006-01-01

    Full Text Available Doppler radar observations have revealed a class of atmospheric vortices (tropical cyclones, tornadoes, dust devils that possess elliptical radar reflectivity signatures. One famous example is Typhoon Herb (1996 that maintained its elliptical reflectivity structure over a 40-hour period. Theoretical work and dual-Doppler analyses of observed tropical cyclones have suggested two physical mechanisms that can explain the formation of two types of elliptical vortices observed in nature, namely, the combination of a circular vortex with either a wavenumber two vortex Rossby wave or a deformation field. The characteristics of these two types of elliptical vortices and their corresponding Doppler velocity signatures have not been previously examined.

  8. KEA-71 Smart Current Signature Sensor (SCSS)

    Science.gov (United States)

    Perotti, Jose M.

    2010-01-01

    This slide presentation reviews the development and uses of the Smart Current Signature Sensor (SCSS), also known as the Valve Health Monitor (VHM) system. SCSS provides a way to not only monitor real-time the valve's operation in a non invasive manner, but also to monitor its health (Fault Detection and Isolation) and identify potential faults and/or degradation in the near future (Prediction/Prognosis). This technology approach is not only applicable for solenoid valves, and it could be extrapolated to other electrical components with repeatable electrical current signatures such as motors.

  9. Security problem on arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Choi, Jeong Woon; Chang, Ku-Young; Hong, Dowon

    2011-01-01

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  10. Plasma Signatures of Radial Field Power Dropouts

    International Nuclear Information System (INIS)

    Lucek, E.A.; Horbury, T.S.; Balogh, A.; McComas, D.J.

    1998-01-01

    A class of small scale structures, with a near-radial magnetic field and a drop in magnetic field fluctuation power, have recently been identified in the polar solar wind. An earlier study of 24 events, each lasting for 6 hours or more, identified no clear plasma signature. In an extension of that work, radial intervals lasting for 4 hours or more (89 in total), have been used to search for a statistically significant plasma signature. It was found that, despite considerable variations between intervals, there was a small but significant drop, on average, in plasma temperature, density and β during these events

  11. Transient thermal camouflage and heat signature control

    Science.gov (United States)

    Yang, Tian-Zhi; Su, Yishu; Xu, Weikai; Yang, Xiao-Dong

    2016-09-01

    Thermal metamaterials have been proposed to manipulate heat flux as a new way to cloak or camouflage objects in the infrared world. To date, however, thermal metamaterials only operate in the steady-state and exhibit detectable, transient heat signatures. In this letter, the theoretical basis for a thermal camouflaging technique with controlled transient diffusion is presented. This technique renders an object invisible in real time. More importantly, the thermal camouflaging device instantaneously generates a pre-designed heat signature and behaves as a perfect thermal illusion device. A metamaterial coating with homogeneous and isotropic thermal conductivity, density, and volumetric heat capacity was fabricated and very good camouflaging performance was achieved.

  12. Security problem on arbitrated quantum signature schemes

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Jeong Woon [Emerging Technology R and D Center, SK Telecom, Kyunggi 463-784 (Korea, Republic of); Chang, Ku-Young; Hong, Dowon [Cryptography Research Team, Electronics and Telecommunications Research Institute, Daejeon 305-700 (Korea, Republic of)

    2011-12-15

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  13. An Enhanced Data Integrity Model In Mobile Cloud Environment Using Digital Signature Algorithm And Robust Reversible Watermarking

    Directory of Open Access Journals (Sweden)

    Boukari Souley

    2017-10-01

    Full Text Available the increase use of hand held devices such as smart phones to access multimedia content in the cloud is increasing with rise and growth in information technology. Mobile cloud computing is increasingly used today because it allows users to have access to variety of resources in the cloud such as image video audio and software applications with minimal usage of their inbuilt resources such as storage memory by using the one available in the cloud. The major challenge faced with mobile cloud computing is security. Watermarking and digital signature are some techniques used to provide security and authentication on user data in the cloud. Watermarking is a technique used to embed digital data within a multimedia content such as image video or audio in order to prevent authorized access to those content by intruders whereas digital signature is used to identify and verify user data when accessed. In this work we implemented digital signature and robust reversible image watermarking in order enhance mobile cloud computing security and integrity of data by providing double authentication techniques. The results obtained show the effectiveness of combining the two techniques robust reversible watermarking and digital signature by providing strong authentication to ensures data integrity and extract the original content watermarked without changes.

  14. Graphical user interfaces and visually disabled users

    NARCIS (Netherlands)

    Poll, L.H.D.; Waterham, R.P.

    1995-01-01

    From February 1992 until the end of 1993, the authors ((IPO) Institute for Perception Research) participated in a European ((TIDE) Technology Initiative for Disabled and Elderly) project which addressed the problem arising for visually disabled computer-users from the growing use of Graphical User

  15. COMPUTER-IMPLEMENTED METHOD OF PERFORMING A SEARCH USING SIGNATURES

    DEFF Research Database (Denmark)

    2017-01-01

    A computer-implemented method of processing a query vector and a data vector), comprising: generating a set of masks and a first set of multiple signatures and a second set of multiple signatures by applying the set of masks to the query vector and the data vector, respectively, and generating...... candidate pairs, of a first signature and a second signature, by identifying matches of a first signature and a second signature. The set of masks comprises a configuration of the elements that is a Hadamard code; a permutation of a Hadamard code; or a code that deviates from a Hadamard code...

  16. A group signature scheme based on quantum teleportation

    International Nuclear Information System (INIS)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu

    2010-01-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  17. A group signature scheme based on quantum teleportation

    Energy Technology Data Exchange (ETDEWEB)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu, E-mail: wxjun36@gmail.co [Information Countermeasure Technique Research Institute, Harbin Institute of Technology, Harbin 150001 (China)

    2010-05-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  18. POSSIBILITIES OF DYNAMIC BIOMETRICS FOR AUTHENTICATION AND THE CIRCUMSTANCES FOR USING DYNAMIC BIOMETRIC SIGNATURE

    OpenAIRE

    Hortai, František

    2017-01-01

    New information technologies alongside their benefits also bring new dangers with themselves. It is difficult to decide which authentication tool to use and implement in the information systems and electronic documents. The final decision has to compromise among the facts that it faces several conflicting requirements: highly secure tool, to be a user-friendly and user simplicity method, ensure protection against errors and failures of users, speed of authentication and provide these features...

  19. Accelerator facilities users' guide

    International Nuclear Information System (INIS)

    Walter, H.C.; Adrion, L.; Frosch, R.; Salzmann, M.

    1994-07-01

    In 1981 the ''Green Book'' of SIN was distributed, a User Handbook serving the needs of people already working at SIN as well as informing new users about our installations. An update of the Green Book is necessary because many beams have disappeared, been modified or added, and the installation has been upgraded in intensity and versatility quite considerably. The spectrum of users has shifted away from nuclear and particle physics; applications in medicine, solid state physics and materials science have gained in importance. This Users' Guide is intended to inform our users about the changes, and to interest potential new users in coming to PSI. (author) figs., tabs

  20. Study of the microdoppler signature of a bicyclist for different directions of approach

    Science.gov (United States)

    Rodriguez-Hervas, Berta; Maile, Michael; Flores, Benjamin C.

    2015-05-01

    The successful implementation of autonomous driving in an urban setting depends on the ability of the environment perception system to correctly classify vulnerable road users such as pedestrians and bicyclists in dense, complex scenarios. Self-driving vehicles include sensor systems such as cameras, lidars, and radars to enable decision making. Among these systems, radars are particularly relevant due to their operational robustness under adverse weather and night light conditions. Classification of pedestrian and car in urban settings using automotive radar has been widely investigated, suggesting that micro-Doppler signatures are useful for target discrimination. Our objective is to analyze and study the micro-Doppler signature of bicyclists approaching a vehicle from different directions in order to establish the basis of a classification criterion to distinguish bicycles from other targets including clutter. The micro-Doppler signature is obtained by grouping individual reflecting points using a clustering algorithm and observing the evolution of all the points belonging to an object in the Doppler domain over time. A comparison is then made with simulated data that uses a kinematic model of bicyclists' movement. The suitability of the micro-Doppler bicyclist signature as a classification feature is determined by comparing it to those belonging to cars and pedestrians approaching the automotive radar system.

  1. TOXsIgN: a cross-species repository for toxicogenomic signatures.

    Science.gov (United States)

    Darde, Thomas A; Gaudriault, Pierre; Beranger, Rémi; Lancien, Clément; Caillarec-Joly, Annaëlle; Sallou, Olivier; Bonvallot, Nathalie; Chevrier, Cécile; Mazaud-Guittot, Séverine; Jégou, Bernard; Collin, Olivier; Becker, Emmanuelle; Rolland, Antoine D; Chalmel, Frédéric

    2018-01-27

    At the same time that toxicologists express increasing concern about reproducibility in this field, the development of dedicated databases has already smoothed the path toward improving the storage and exchange of raw toxicogenomic data. Nevertheless, none provides access to analyzed and interpreted data as originally reported in scientific publications. Given the increasing demand for access to this information, we developed TOXsIgN, a repository for TOXicogenomic sIgNatures. The TOXsIgN repository provides a flexible environment that facilitates online submission, storage, and retrieval of toxicogenomic signatures by the scientific community. It currently hosts 754 projects that describe more than 450 distinct chemicals and their 8491 associated signatures. It also provides users with a working environment containing a powerful search engine as well as bioinformatics/biostatistics modules that enable signature comparisons or enrichment analyses. The TOXsIgN repository is freely accessible at http://toxsign.genouest.org. Website implemented in Python, JavaScript, and MongoDB, with all major browsers supported. frederic.chalmel@inserm.fr. Supplementary data are available at Bioinformatics online. © The Author (2018). Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  2. Designing the User Experience for Different User Needs for B2B E-Commerce

    OpenAIRE

    Conde, Mark

    2013-01-01

    In today’s world, more and more companies are doing business with one another electronically; this has lead many of these companies to build online web stores for their customers to make business transactions with. Many of these online stores are out of date and/or lack good user research on how to design a web store to meet the demands of their users while creating a good user experience. This thesis provides several conceptual design ideas on how to create a better  user experience that tak...

  3. Lorentz violations and Euclidean signature metrics

    International Nuclear Information System (INIS)

    Barbero G, J. Fernando; Villasenor, Eduardo J.S.

    2003-01-01

    We show that the families of effective actions considered by Jacobson et al. to study Lorentz invariance violations contain a class of models that represent pure general relativity with a Euclidean signature. We also point out that some members of this family of actions preserve Lorentz invariance in a generalized sense

  4. Mechanical System Simulations for Seismic Signature Modeling

    National Research Council Canada - National Science Library

    Lacombe, J

    2001-01-01

    .... Results for an M1A1 and T72 are discussed. By analyzing the simulated seismic signature data in conjunction with the spectral features associated with the vibrations of specific vehicle sprung and un-sprung components we are able to make...

  5. Exploring Signature Pedagogies in Undergraduate Leadership Education

    Science.gov (United States)

    Jenkins, Daniel M.

    2012-01-01

    This research explores the instructional strategies most frequently used by leadership educators who teach academic credit-bearing undergraduate leadership studies courses through a national survey and identifies signature pedagogies within the leadership discipline. Findings from this study suggest that class discussion--whether in the form of…

  6. The Pedagogic Signature of Special Needs Education

    Science.gov (United States)

    Weiß, Sabine; Kollmannsberger, Markus; Lerche, Thomas; Oubaid, Viktor; Kiel, Ewald

    2014-01-01

    The goal of the following study is to identify a pedagogic signature, according to LS Shulman, for working with students who have special educational needs. Special educational needs are defined as significant limitations in personal development and learning which require particular educational measures beyond regular education. The development of…

  7. Arbitrated quantum signature scheme with message recovery

    International Nuclear Information System (INIS)

    Lee, Hwayean; Hong, Changho; Kim, Hyunsang; Lim, Jongin; Yang, Hyung Jin

    2004-01-01

    Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed. One scheme uses a public board and the other does not. However both schemes provide confidentiality of the message and a higher efficiency in transmission

  8. Hyperspectral signature analysis of skin parameters

    Science.gov (United States)

    Vyas, Saurabh; Banerjee, Amit; Garza, Luis; Kang, Sewon; Burlina, Philippe

    2013-02-01

    The temporal analysis of changes in biological skin parameters, including melanosome concentration, collagen concentration and blood oxygenation, may serve as a valuable tool in diagnosing the progression of malignant skin cancers and in understanding the pathophysiology of cancerous tumors. Quantitative knowledge of these parameters can also be useful in applications such as wound assessment, and point-of-care diagnostics, amongst others. We propose an approach to estimate in vivo skin parameters using a forward computational model based on Kubelka-Munk theory and the Fresnel Equations. We use this model to map the skin parameters to their corresponding hyperspectral signature. We then use machine learning based regression to develop an inverse map from hyperspectral signatures to skin parameters. In particular, we employ support vector machine based regression to estimate the in vivo skin parameters given their corresponding hyperspectral signature. We build on our work from SPIE 2012, and validate our methodology on an in vivo dataset. This dataset consists of 241 signatures collected from in vivo hyperspectral imaging of patients of both genders and Caucasian, Asian and African American ethnicities. In addition, we also extend our methodology past the visible region and through the short-wave infrared region of the electromagnetic spectrum. We find promising results when comparing the estimated skin parameters to the ground truth, demonstrating good agreement with well-established physiological precepts. This methodology can have potential use in non-invasive skin anomaly detection and for developing minimally invasive pre-screening tools.

  9. Dictionary of Large Hadron Collider signatures

    Indian Academy of Sciences (India)

    We report on a plan to establish a `Dictionary of LHC Signatures', an initiative that started at the WHEPP-X workshop in Chennai, January 2008. This study aims at the strategy of distinguishing 3 classes of dark matter motivated scenarios such as -parity conserved supersymmetry, little Higgs models with -parity ...

  10. Signatures of mutational processes in human cancer

    NARCIS (Netherlands)

    Alexandrov, L.B.; Nik-Zainal, S.; Wedge, D.C.; Aparicio, S.A.; Behjati, S.; Biankin, A.V.; Bignell, G.R.; Bolli, N.; Borg, A.; Borresen-Dale, A.L.; Boyault, S.; Burkhardt, B.; Butler, A.P.; Caldas, C.; Davies, H.R.; Desmedt, C.; Eils, R.; Eyfjord, J.E.; Foekens, J.A.; Greaves, M.; Hosoda, F.; Hutter, B.; Ilicic, T.; Imbeaud, S.; Imielinsk, M.; Jager, N.; Jones, D.T.; Knappskog, S.; Kool, M.; Lakhani, S.R.; Lopez-Otin, C.; Martin, S.; Munshi, N.C.; Nakamura, H.; Northcott, P.A.; Pajic, M.; Papaemmanuil, E.; Paradiso, A.; Pearson, J.V.; Puente, X.S.; Raine, K.; Ramakrishna, M.; Richardson, A.L.; Richter, J.; Rosenstiel, P.; Schlesner, M.; Schumacher, T.N.; Span, P.N.; Teague, J.W.; Totoki, Y.; Tutt, A.N.; Valdes-Mas, R.; Buuren, M.M. van; Veer, L. van 't; Vincent-Salomon, A.; Waddell, N.; Yates, L.R.; Zucman-Rossi, J.; Futreal, P.A.; McDermott, U.; Lichter, P.; Meyerson, M.; Grimmond, S.M.; Siebert, R.; Campo, E.; Shibata, T.; Pfister, S.M.; Campbell, P.J.; Stratton, M.R.; Schlooz-Vries, M.S.; Tol, J.J. van; Laarhoven, H.W. van; Sweep, F.C.; Bult, P.; et al.,

    2013-01-01

    All cancers are caused by somatic mutations; however, understanding of the biological processes generating these mutations is limited. The catalogue of somatic mutations from a cancer genome bears the signatures of the mutational processes that have been operative. Here we analysed 4,938,362

  11. Ankle and Other Signatures in Uhecr

    Science.gov (United States)

    Berezinsky, Veniamin

    2015-03-01

    The interaction signatures of UHE protons propagating through CMB are discussed. Much attention is given to ankle, which starting from 1963 is usually interpreted as a feature of transition from galactic to extragalactic cosmic rays. We argue here that this interpretation is now excluded. It gives more credit to alternative explanation of the ankle as an intrinsic part of the pair-production dip.

  12. Detection of proteolytic signatures for Parkinson's disease

    DEFF Research Database (Denmark)

    Jordal, Peter Lüttge; Dyrlund, Thomas F.; Winge, Kristian

    2016-01-01

    Aim: To investigate if idiopathic Parkinson's disease (IPD) is associated with distinct proteolytic signatures relative to non-neurodegenerative controls (NND) and patients with multiple system atrophy (MSA). Materials & methods: A subtiligase-based N-terminomics screening method was exploited...

  13. Electronic cigarettes: human health effects

    OpenAIRE

    Callahan-Lyon, Priscilla

    2014-01-01

    Objective With the rapid increase in use of electronic nicotine delivery systems (ENDS), such as electronic cigarettes (e-cigarettes), users and non-users are exposed to the aerosol and product constituents. This is a review of published data on the human health effects of exposure to e-cigarettes and their components. Methods Literature searches were conducted through September 2013 using multiple electronic databases. Results Forty-four articles are included in this analysis. E-cigarette ae...

  14. User interface user's guide for HYPGEN

    Science.gov (United States)

    Chiu, Ing-Tsau

    1992-01-01

    The user interface (UI) of HYPGEN is developed using Panel Library to shorten the learning curve for new users and provide easier ways to run HYPGEN for casual users as well as for advanced users. Menus, buttons, sliders, and type-in fields are used extensively in UI to allow users to point and click with a mouse to choose various available options or to change values of parameters. On-line help is provided to give users information on using UI without consulting the manual. Default values are set for most parameters and boundary conditions are determined by UI to further reduce the effort needed to run HYPGEN; however, users are free to make any changes and save it in a file for later use. A hook to PLOT3D is built in to allow graphics manipulation. The viewpoint and min/max box for PLOT3D windows are computed by UI and saved in a PLOT3D journal file. For large grids which take a long time to generate on workstations, the grid generator (HYPGEN) can be run on faster computers such as Crays, while UI stays at the workstation.

  15. Universal Nonequilibrium Signatures of Majorana Zero Modes in Quench Dynamics

    Directory of Open Access Journals (Sweden)

    R. Vasseur

    2014-10-01

    Full Text Available The quantum evolution that occurs after a metallic lead is suddenly connected to an electron system contains information about the excitation spectrum of the combined system. We exploit this type of “quantum quench” to probe the presence of Majorana fermions at the ends of a topological superconducting wire. We obtain an algebraically decaying overlap (Loschmidt echo L(t=|⟨ψ(0|ψ(t⟩|^{2}∼t^{-α} for large times after the quench, with a universal critical exponent α=1/4 that is found to be remarkably robust against details of the setup, such as interactions in the normal lead, the existence of additional lead channels, or the presence of bound levels between the lead and the superconductor. As in recent quantum-dot experiments, this exponent could be measured by optical absorption, offering a new signature of Majorana zero modes that is distinct from interferometry and tunneling spectroscopy.

  16. IDRC Connect User Guide

    International Development Research Centre (IDRC) Digital Library (Canada)

    Kristina Kamichaitis

    IDRC Extranet home page, which is an umbrella for a number of applications available to IDRC external users. ... IDRC Connect is not formatted for mobile users. ..... Thesis. • Training Material. • Website. • Working Paper. • Workshop Report.

  17. Implicit User Interest Profile

    CERN Document Server

    Chan, K

    2002-01-01

    User interest profile presents items that the users are interested in. Typically those items can be listed or grouped. Listing is good but it does not possess interests at different abstraction levels - the higher-level interests are more general, while the lower-level ones are more specific. Furthermore, more general interests, in some sense, correspond to longer-term interests, while more specific interests correspond to shorter-term interests. This hierarchical user interest profile has obvious advantages: specifying user's specific interests and general interests and representing their relationships. Current user interest profile structures mostly do not use implicit method, nor use an appropriate clustering algorithm especially for conceptually hierarchical structures. This research studies building a hierarchical user interest profile (HUIP) and the hierarchical divisive algorithm (HDC). Several users visit hundreds of web pages and each page is recorded in each users profile. These web pages are used t...

  18. Converting hard copy documents for electronic dissemination

    Energy Technology Data Exchange (ETDEWEB)

    Hoffman, F.

    1994-12-31

    Since the advent of computer systems, the goal of a paperless office, and even a paperless society, has been pursued. While the normal paper flow in an organization is far from totally automated, particularly for items requiring signatures or authorizations, electronic information dissemination is becoming an almost simple task. The reasons for providing on-line documents are many and include faster and easier access for everyone, elimination of printing costs, reduction of wasted shelf and desk space, and the security of having a centrally-located, always up-to-date document. New computer software even provides the user with the ability to annotate documents and to have bookmarks so that the old scribbled-in and dog-eared manual can be replaced without loosing this `customizability`. Moreover, new hypermedia capabilities mean that documents can be read in a non-linear fashion and can include color figures and photographs, audio, and even animation sequences, capabilities which exceed those of paper. The proliferation of network-based information servers, coupled with the growth of the Internet, has enticed academic, governmental, and even commercial organizations to provide increasing numbers of documents and data bases in electronic form via the network, not just to internal staff, but to the public as well. Much of this information, which includes everything from mundane company procedures to spiffy marketing brochures, was previously published only in hard copy. Converting existing documents to electronic form and producing only electronic versions of new documents poses some interesting challenges to the maintainer or author.

  19. Users and user study methodology: the JUBILEE project

    Directory of Open Access Journals (Sweden)

    Linda Banwell

    2004-01-01

    Full Text Available This paper presents both theoretical aspects and practical examples from the on-going and large-scale JUBILEE (JISC User Behaviour in Information seeking: Longitudinal Evaluation of Electronic information services project, now in its fifth year. Particular emphasis will be placed on the importance of using robust theory and methods as the basis for reputable user studies, especially those undertaken by practitioners. Theory underlying the development of the JUBILEE project and Toolkit is outlined, followed by demonstration of its practical use and impact during the project's on-going program of monitoring and evaluation activities. Themes underlying the paper concern the importance to practitioners of the need to understand and adopt a well founded methodology and sound methods with which to conduct projects, the additional benefits they can derive by so doing, and the pitfalls and dangers of not so doing. JUBILEE is used throughout as the example project to demonstrate the points made.

  20. Perancangan Aplikasi Undeniable Digital Signature Dengan Algoritma Chaum’s Blind Signature

    OpenAIRE

    Simanjuntak, Martin Dennain

    2012-01-01

    Desperaty need a securiry system in the exchange of information via computer media, so that information can not be accessed by unauthorized parties. One of the security system is to use a system of digital signatures as a means of authenticating the authenticity of digital document that are exchanged. By using a digital a digital signature system is undeniable, the security system can be generated digital document exchange, where the system is free from the from of rejection...

  1. The effects of extrinsic motivation on signature authorship opinions in forensic signature blind trials.

    Science.gov (United States)

    Dewhurst, Tahnee N; Found, Bryan; Ballantyne, Kaye N; Rogers, Doug

    2014-03-01

    Expertise studies in forensic handwriting examination involve comparisons of Forensic Handwriting Examiners' (FHEs) opinions with lay-persons on blind tests. All published studies of this type have reported real and demonstrable skill differences between the specialist and lay groups. However, critics have proposed that any difference shown may be indicative of a lack of motivation on the part of lay participants, rather than a real difference in skill. It has been suggested that qualified FHEs would be inherently more motivated to succeed in blinded validation trials, as their professional reputations could be at risk, should they perform poorly on the task provided. Furthermore, critics suggest that lay-persons would be unlikely to be highly motivated to succeed, as they would have no fear of negative consequences should they perform badly. In an effort to investigate this concern, a blind signature trial was designed and administered to forty lay-persons. Participants were required to compare known (exemplar) signatures of an individual to questioned signatures and asked to express an opinion regarding whether the writer of the known signatures wrote each of the questioned signatures. The questioned signatures comprised a mixture of genuine, disguised and simulated signatures. The forty participants were divided into two separate groupings. Group 'A' were requested to complete the trial as directed and were advised that for each correct answer they would be financially rewarded, for each incorrect answer they would be financially penalized, and for each inconclusive opinion they would receive neither penalty nor reward. Group 'B' was requested to complete the trial as directed, with no mention of financial recompense or penalty. The results of this study do not support the proposition that motivation rather than skill difference is the source of the statistical difference in opinions between individuals' results in blinded signature proficiency trials. Crown

  2. Optical/Infrared Signatures for Space-Based Remote Sensing

    National Research Council Canada - National Science Library

    Picard, R. H; Dewan, E. M; Winick, J. R; O'Neil, R. R

    2007-01-01

    This report describes work carried out under the Air Force Research Laboratory's basic research task in optical remote-sensing signatures, entitled Optical / Infrared Signatures for Space-Based Remote Sensing...

  3. Methods and apparatus for multi-parameter acoustic signature inspection

    Energy Technology Data Exchange (ETDEWEB)

    Diaz, Aaron A [Richland, WA; Samuel, Todd J [Pasco, WA; Valencia, Juan D [Kennewick, WA; Gervais, Kevin L [Richland, WA; Tucker, Brian J [Pasco, WA; Kirihara, Leslie J [Richland, WA; Skorpik, James R [Kennewick, WA; Reid, Larry D [Benton City, WA; Munley, John T [Benton City, WA; Pappas, Richard A [Richland, WA; Wright, Bob W [West Richland, WA; Panetta, Paul D [Richland, WA; Thompson, Jason S [Richland, WA

    2007-07-24

    A multiparameter acoustic signature inspection device and method are described for non-invasive inspection of containers. Dual acoustic signatures discriminate between various fluids and materials for identification of the same.

  4. Passive Infrared Signature Augmentation of Full-Scale Plastic Targets

    National Research Council Canada - National Science Library

    Gebus, Lisa M; Sanders, Jeffrey S

    2002-01-01

    ... (IR), and radar signatures of threat systems. To address this need, a program was initiated by TMO to augment an existing full-scale, vacuum-formed plastic target with sufficient signature fidelity to adequately stress U.S...

  5. NPAS Users Guide

    International Nuclear Information System (INIS)

    1984-01-01

    This NPAS Users Guide is primarily intended as a source of information about policies, procedures, and facilities appropriate for users in the program of Nuclear Physics at SLAC (NPAS). General policies and practices are described, the preparation of proposals is discussed, and the services for users is outlined. SLAC experimental facilities are described, and contacts are listed

  6. Experimental signatures of direct-laser-acceleration-assisted laser wakefield acceleration

    Science.gov (United States)

    Shaw, J. L.; Lemos, N.; Marsh, K. A.; Froula, D. H.; Joshi, C.

    2018-04-01

    The direct laser acceleration (DLA) of electrons in a laser wakefield accelerator (LWFA) operating in the forced or quasi-blowout regimes has been investigated through experiment and simulation. When there is a significant overlap between the trapped electrons and the drive laser in a LWFA cavity, the resulting electrons can gain energy from both the LWFA and the DLA mechanisms. Experimental work investigates the properties of the electron beams produced in a LWFA with ionization injection by dispersing those beams in the direction perpendicular to the laser polarization. These electron beams show certain spectral features that are characteristic of DLA. These characteristic features are reproduced using particle-in-cell simulations, where particle tracking was used to elucidate the roles of LWFA and DLA to the energy gain of the electrons in this experimental regime and to demonstrate that such spectral features are definitive signatures of the presence of DLA in LWFA.

  7. Re-examining the security of blind quantum signature protocols

    International Nuclear Information System (INIS)

    Wang Mingming; Chen Xiubo; Niu Xinxin; Yang Yixian

    2012-01-01

    Recently, blind quantum signature (BQS) protocols have been proposed with the help of a third-party verifier. However, our research shows that some of the BQS protocols are unable to complete the blind signature task fairly if the verifier is dishonest. Indeed, these protocols can be viewed as variants of the classical digital signature scheme of symmetric-key cryptography. If nobody is trusted in such protocols, digital signature cannot be implemented since disagreements cannot be solved fairly.

  8. Quantum signature scheme based on a quantum search algorithm

    International Nuclear Information System (INIS)

    Yoon, Chun Seok; Kang, Min Sung; Lim, Jong In; Yang, Hyung Jin

    2015-01-01

    We present a quantum signature scheme based on a two-qubit quantum search algorithm. For secure transmission of signatures, we use a quantum search algorithm that has not been used in previous quantum signature schemes. A two-step protocol secures the quantum channel, and a trusted center guarantees non-repudiation that is similar to other quantum signature schemes. We discuss the security of our protocol. (paper)

  9. A Signature Comparing Android Mobile Application Utilizing Feature Extracting Algorithms

    Directory of Open Access Journals (Sweden)

    Paul Grafilon

    2017-08-01

    Full Text Available The paper presented one of the application that can be done using smartphones camera. Nowadays forgery is one of the most undetected crimes. With the forensic technology used today it is still difficult for authorities to compare and define what a real signature is and what a forged signature is. A signature is a legal representation of a person. All transactions are based on a signature. Forgers may use a signature to sign illegal contracts and withdraw from bank accounts undetected. A signature can also be forged during election periods for repeated voting. Addressing the issues a signature should always be secure. Signature verification is a reduced problem that still poses a real challenge for researchers. The literature on signature verification is quite extensive and shows two main areas of research off-line and on-line systems. Off-line systems deal with a static image of the signature i.e. the result of the action of signing while on-line systems work on the dynamic process of generating the signature i.e. the action of signing itself. The researchers have found a way to resolve the concerns. A mobile application that integrates the camera to take a picture of a signature analyzes it and compares it to other signatures for verification. It will exist to help citizens to be more cautious and aware with issues regarding the signatures. This might also be relevant to help organizations and institutions such as banks and insurance companies in verifying signatures that may avoid unwanted transactions and identity theft. Furthermore this might help the authorities in the never ending battle against crime especially against forgers and thieves. The project aimed to design and develop a mobile application that integrates the smartphone camera for verifying and comparing signatures for security using the best algorithm possible. As the result of the development the said smartphone camera application is functional and reliable.

  10. DOSFAC2 user`s guide

    Energy Technology Data Exchange (ETDEWEB)

    Young, M.L.; Chanin, D.

    1997-12-01

    This document describes the DOSFAC2 code, which is used for generating dose-to-source conversion factors for the MACCS2 code. DOSFAC2 is a revised and updated version of the DOSFAC code that was distributed with version 1.5.11 of the MACCS code. included are (1) an overview and background of DOSFAC2, (2) a summary of two new functional capabilities, and (3) a user`s guide. 20 refs., 5 tabs.

  11. AMBER User's Manual

    International Nuclear Information System (INIS)

    Vay, J.L.; Fawley, W.

    2000-01-01

    AMBER is a Particle-In-Cell (PIC) code which models the evolution of a representative slice of a relativistic electron beam in a linear accelerator. The beam is modeled as a steady flow and therefore no electromagnetic waves: all the fields (external and self-fields) are electrostatic and magnetostatic fields (for a complete description, see chapter 5). The possible elements describing the accelerator lattice are solenoids, accelerating gaps, pipes and apertures. Several kinds of beam distribution can be loaded: KV, gaussian, semi-gaussian, etc. Alternatively, the user can reconstruct (or load) a distribution from the output of another codefile, for example, an interface generating the beam distribution from output produced from EGUN or LSP codes is available as an option. This documentation first describes in detail the input files needed to run AMBER and the procedure to start the executable. The possible data files and graphical output are explained in the two following chapters. The last chapter describes the physics model and numerical techniques used. An example of input files and the result obtained with these inputs are also given in the Appendix

  12. Can specific transcriptional regulators assemble a universal cancer signature?

    Science.gov (United States)

    Roy, Janine; Isik, Zerrin; Pilarsky, Christian; Schroeder, Michael

    2013-10-01

    Recently, there is a lot of interest in using biomarker signatures derived from gene expression data to predict cancer progression. We assembled signatures of 25 published datasets covering 13 types of cancers. How do these signatures compare with each other? On one hand signatures answering the same biological question should overlap, whereas signatures predicting different cancer types should differ. On the other hand, there could also be a Universal Cancer Signature that is predictive independently of the cancer type. Initially, we generate signatures for all datasets using classical approaches such as t-test and fold change and then, we explore signatures resulting from a network-based method, that applies the random surfer model of Google's PageRank algorithm. We show that the signatures as published by the authors and the signatures generated with classical methods do not overlap - not even for the same cancer type - whereas the network-based signatures strongly overlap. Selecting 10 out of 37 universal cancer genes gives the optimal prediction for all cancers thus taking a first step towards a Universal Cancer Signature. We furthermore analyze and discuss the involved genes in terms of the Hallmarks of cancer and in particular single out SP1, JUN/FOS and NFKB1 and examine their specific role in cancer progression.

  13. Radar micro-doppler signatures processing and applications

    CERN Document Server

    Chen, Victor C; Miceli, William J

    2014-01-01

    Radar Micro-Doppler Signatures: Processing and applications concentrates on the processing and application of radar micro-Doppler signatures in real world situations, providing readers with a good working knowledge on a variety of applications of radar micro-Doppler signatures.

  14. Acoustic Signature Monitoring and Management of Naval Platforms

    NARCIS (Netherlands)

    Basten, T.G.H.; Jong, C.A.F. de; Graafland, F.; Hof, J. van 't

    2015-01-01

    Acoustic signatures make naval platforms susceptible to detection by threat sensors. The variable operational conditions and lifespan of a platform cause variations in the acoustic signature. To deal with these variations, a real time signature monitoring capability is being developed, with advisory

  15. 22 CFR 92.28 - Signature of affiant on affidavit.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Signature of affiant on affidavit. 92.28 Section 92.28 Foreign Relations DEPARTMENT OF STATE LEGAL AND RELATED SERVICES NOTARIAL AND RELATED SERVICES Specific Notarial Acts § 92.28 Signature of affiant on affidavit. The signature of the affiant is...

  16. 45 CFR 81.32 - Signature of documents.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Signature of documents. 81.32 Section 81.32 Public... UNDER PART 80 OF THIS TITLE Form, Execution, Service and Filing of Documents § 81.32 Signature of documents. The signature of a party, authorized officer, employee or attorney constitutes a certificate that...

  17. 21 CFR 1309.32 - Application forms; contents; signature.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Application forms; contents; signature. 1309.32... Application forms; contents; signature. (a) Any person who is required to be registered pursuant to § 1309.21... this paragraph and shall contain the signature of the individual being authorized to sign the...

  18. 17 CFR 201.65 - Identity and signature.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Identity and signature. 201.65... of 1934 § 201.65 Identity and signature. Applications pursuant to this subpart may omit the identity, mailing address, and signature of the applicant; provided, that such identity, mailing address and...

  19. Signature Pedagogies in Support of Teachers' Professional Learning

    Science.gov (United States)

    Parker, Melissa; Patton, Kevin; O'Sullivan, Mary

    2016-01-01

    Signature pedagogies [Shulman, L. 2005. "Signature pedagogies in the professions." "Daedalus" 134 (3): 52--59.] are a focus of teacher educators seeking to improve teaching and teacher education. The purpose of this paper is to present a preliminary common language of signature pedagogies for teacher professional development…

  20. 34 CFR 101.32 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Signature of documents. 101.32 Section 101.32 Education Regulations of the Offices of the Department of Education OFFICE FOR CIVIL RIGHTS, DEPARTMENT OF EDUCATION... Documents § 101.32 Signature of documents. The signature of a party, authorized officer, employee or...

  1. 36 CFR 1150.22 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Signature of documents. 1150.22 Section 1150.22 Parks, Forests, and Public Property ARCHITECTURAL AND TRANSPORTATION BARRIERS... Documents for Proceedings on Citations § 1150.22 Signature of documents. The signature of a party...

  2. 29 CFR 102.116 - Signature of orders.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 2 2010-07-01 2010-07-01 false Signature of orders. 102.116 Section 102.116 Labor Regulations Relating to Labor NATIONAL LABOR RELATIONS BOARD RULES AND REGULATIONS, SERIES 8 Certification and Signature of Documents § 102.116 Signature of orders. The executive secretary or the associate executive...

  3. 48 CFR 204.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Contracting officer's signature. 204.101 Section 204.101 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS... officer's signature. Follow the procedures at PGI 204.101 for signature of contract documents. [71 FR 9268...

  4. 32 CFR 842.6 - Signature on the claim form.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Signature on the claim form. 842.6 Section 842.6... ADMINISTRATIVE CLAIMS General Information § 842.6 Signature on the claim form. The claimant or authorized agent... authorized agent signing for a claimant shows, after the signature, the title or capacity and attaches...

  5. 38 CFR 18b.21 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Signature of documents. 18b.21 Section 18b.21 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS... Documents § 18b.21 Signature of documents. The signature of a party, authorized officer, employee, or...

  6. 37 CFR 2.74 - Form and signature of amendment.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Form and signature of... signature of amendment. (a) Form of Amendment. Amendments should be set forth clearly and completely... record. (b) Signature. A request for amendment of an application must be signed by the applicant, someone...

  7. Magnetospheric signature of some F layer positive storms

    International Nuclear Information System (INIS)

    Miller, N.J.; Mayr, H.G.; Grebowsky, J.M.; Harris, I.; Tulunay, Y.K.

    1981-01-01

    Calculations using a self-consistent model of the global thermosphere-ionosphere system perturbed by high-latitude thermospheric heating show that the resultant electron density disturbances within the mid-latitude F layer can propagate upward along magnetic field lines to the equator. The F layer disturbances described by the model calculations correspond to the evolution of enhancements or reductions in electron density that is called the positive or negative phase of an F layer storm. We deduce that the positive phase of dayside F layer storms is initiated when high-latitude thermospheric heating generates equatorward winds. These winds raise the mid-latitude F layer along the geomagnetic field B through momentum transfer from neutral atoms to F layer ons that pull electrons with them. For Lapprox.3 or less the upward movement of ionospheric plasma results in ionization increases at all altitudes along B from the F2 maximum to the equator. An increase in the average magnitude of the equatorial dawn-dusk magnetospheric electric field retards the dayside development of a positive storm phase by drifting plasma away from mid-latitude field lines along which the electron density is increasing. During an F layer storm in June 1972, instruments on Explorer 45 and Ariel 4 detected dayside electron density enhancements simultaneously at 550 km over mid-latitudes and near the equatorial plane in the magnetosphere. These in situ measurements support the model prediction that disturbances in the magnetospheric plasma near the equator can arise through interactions occuring at lower altitudes along a magnetic field line. Our study demonstrates that some storm time enhancements of dayside magnetospheric plasma near Lapprox.2--3 may be signatures of the positive phase of an F layer storm

  8. User interface design considerations

    DEFF Research Database (Denmark)

    Andersen, Simon Engedal; Jakobsen, Arne; Rasmussen, Bjarne D.

    1999-01-01

    and output variables. This feature requires special attention when designing the user interface and a special approach for controlling the user selection of input and output variables are developed. To obtain a consistent system description the different input variables are grouped corresponding......When designing a user interface for a simulation model there are several important issues to consider: Who is the target user group, and which a priori information can be expected. What questions do the users want answers to and what questions are answered using a specific model?When developing...... the user interface of EESCoolTools these issues led to a series of simulation tools each with a specific purpose and a carefully selected set of input and output variables. To allow a more wide range of questions to be answered by the same model, the user can change between different sets of input...

  9. Dilatonic imprints on exact gravitational wave signatures

    Science.gov (United States)

    McCarthy, Fiona; KubizÅák, David; Mann, Robert B.

    2018-05-01

    By employing the moduli space approximation, we analytically calculate the gravitational wave signatures emitted upon the merger of two extremally charged dilatonic black holes. We probe several values of the dilatonic coupling constant a , and find significant departures from the Einstein-Maxwell (a =0 ) counterpart studied in [Phys. Rev. D 96, 061501 (2017), 10.1103/PhysRevD.96.061501]. For (low-energy) string theory black holes (a =1 ) there are no coalescence orbits and only a memory effect is observed, whereas for an intermediate value of the coupling (a =1 /√{3 } ) the late-time merger signature becomes exponentially suppressed, compared to the polynomial decay in the a =0 case without a dilaton. Such an imprint shows a clear difference between the case with and without a scalar field (as, for example, predicted by string theory) in black hole mergers.

  10. Chameleon dark energy models with characteristic signatures

    International Nuclear Information System (INIS)

    Gannouji, Radouane; Moraes, Bruno; Polarski, David; Mota, David F.; Winther, Hans A.; Tsujikawa, Shinji

    2010-01-01

    In chameleon dark energy models, local gravity constraints tend to rule out parameters in which observable cosmological signatures can be found. We study viable chameleon potentials consistent with a number of recent observational and experimental bounds. A novel chameleon field potential, motivated by f(R) gravity, is constructed where observable cosmological signatures are present both at the background evolution and in the growth rate of the perturbations. We study the evolution of matter density perturbations on low redshifts for this potential and show that the growth index today γ 0 can have significant dispersion on scales relevant for large scale structures. The values of γ 0 can be even smaller than 0.2 with large variations of γ on very low redshifts for the model parameters constrained by local gravity tests. This gives a possibility to clearly distinguish these chameleon models from the Λ-cold-dark-matter (ΛCDM) model in future high-precision observations.

  11. Entanglement as a signature of quantum chaos.

    Science.gov (United States)

    Wang, Xiaoguang; Ghose, Shohini; Sanders, Barry C; Hu, Bambi

    2004-01-01

    We explore the dynamics of entanglement in classically chaotic systems by considering a multiqubit system that behaves collectively as a spin system obeying the dynamics of the quantum kicked top. In the classical limit, the kicked top exhibits both regular and chaotic dynamics depending on the strength of the chaoticity parameter kappa in the Hamiltonian. We show that the entanglement of the multiqubit system, considered for both the bipartite and the pairwise entanglement, yields a signature of quantum chaos. Whereas bipartite entanglement is enhanced in the chaotic region, pairwise entanglement is suppressed. Furthermore, we define a time-averaged entangling power and show that this entangling power changes markedly as kappa moves the system from being predominantly regular to being predominantly chaotic, thus sharply identifying the edge of chaos. When this entangling power is averaged over all states, it yields a signature of global chaos. The qualitative behavior of this global entangling power is similar to that of the classical Lyapunov exponent.

  12. Quark-gluon plasma: experimental signatures

    International Nuclear Information System (INIS)

    Drapier, O.

    1995-01-01

    The existence of a deconfining phase transition of nuclear matter is a clear prediction of lattice quantum chromodynamics calculations. The signatures of this quark-gluon plasma (QGP) have been searched for, since the first high energy ion beams became available at BNL and CERN in 1986, and gold and lead beams are now accelerated at 11 and 160 GeV per nucleon by the AGS and SPS. An overview of the main signatures expected in case of QGP formation is presented here. Although some recent results have been found in agreement with the predictions of the QGP scenario, no clear evidence for its formation has been observed at present. Nevertheless, new high statistics results are expected from CERN lead beams. In addition, future experiments are being prepared at RHIC and LHCC, providing an increase by two orders of magnitude of the c.m.s. energy within a few years. (author). 66 refs., 28 figs

  13. Supernova signatures of neutrino mass ordering

    Science.gov (United States)

    Scholberg, Kate

    2018-01-01

    A suite of detectors around the world is poised to measure the flavor-energy-time evolution of the ten-second burst of neutrinos from a core-collapse supernova occurring in the Milky Way or nearby. Next-generation detectors to be built in the next decade will have enhanced flavor sensitivity and statistics. Not only will the observation of this burst allow us to peer inside the dense matter of the extreme event and learn about the collapse processes and the birth of the remnant, but the neutrinos will bring information about neutrino properties themselves. This review surveys some of the physical signatures that the currently-unknown neutrino mass pattern will imprint on the observed neutrino events at Earth, emphasizing the most robust and least model-dependent signatures of mass ordering.

  14. PREVENTIVE SIGNATURE MODEL FOR SECURE CLOUD DEPLOYMENT THROUGH FUZZY DATA ARRAY COMPUTATION

    Directory of Open Access Journals (Sweden)

    R. Poorvadevi

    2017-01-01

    Full Text Available Cloud computing is a resource pool which offers boundless services by the form of resources to its end users whoever heavily depends on cloud service providers. Cloud is providing the service access across the geographic locations in an efficient way. However it is offering numerous services, client end system is not having adequate methods, security policies and other protocols for using the cloud customer secret level transactions and other privacy related information. So, this proposed model brings the solution for securing the cloud user confidential data, Application deployment and also identifying the genuineness of the user by applying the scheme which is referred as fuzzy data array computation. Fuzzy data array computation provides an effective system is called signature retrieval and evaluation system through which customer’s data can be safeguarded along with their application. This signature system can be implemented on the cloud environment using the cloud sim 3.0 simulator tools. It facilitates the security operation over the data centre and cloud vendor locations in an effective manner.

  15. Limits and signatures of relativistic spaceflight

    Science.gov (United States)

    Yurtsever, Ulvi; Wilkinson, Steven

    2018-01-01

    While special relativity imposes an absolute speed limit at the speed of light, our Universe is not empty Minkowski spacetime. The constituents that fill the interstellar/intergalactic vacuum, including the cosmic microwave background photons, impose a lower speed limit on any object travelling at relativistic velocities. Scattering of cosmic microwave photons from an ultra-relativistic object may create radiation with a characteristic signature allowing the detection of such objects at large distances.

  16. Signatures of quark-gluon plasma production

    International Nuclear Information System (INIS)

    Gyulassy, M.

    1985-01-01

    A critical analysis of a variety of proposed signatures for quark-gluon formation in ultrarelativistic nuclear collisions is given. The authors emphasize that longitudinal growth rather than the nuclear radius controls the time scales for expansion. The author pointed out the qualitative difference of the evolution of the plasma produced in the stopping regime E approx. 10 GeV/nucleon and the scaling regime E > 1 TeV/nucleon. This difference reflects itself in the the rmal profile function

  17. Selection signatures in worldwide sheep populations.

    OpenAIRE

    Fariello, Maria-Ines; Servin, Bertrand; Tosser-Klopp, Gwenola; Rupp, Rachel; Moreno, Carole; San Cristobal, Magali; Boitard, Simon; Drögemüller, Cord; The International Sheep Genomics Consortium, ISGC

    2014-01-01

    The diversity of populations in domestic species offers great opportunities to study genome response to selection. The recently published Sheep HapMap dataset is a great example of characterization of the world wide genetic diversity in sheep. In this study, we re-analyzed the Sheep HapMap dataset to identify selection signatures in worldwide sheep populations. Compared to previous analyses, we made use of statistical methods that (i) take account of the hierarchical structure of sheep popula...

  18. Selection Signatures in Worldwide Sheep Populations

    OpenAIRE

    Fariello, Maria-Ines; Servin, Bertrand; Tosser-Klopp, Gwenola; Rupp, Rachel; Moreno, Carole; Cristobal, Magali San; Boitard, Simon

    2014-01-01

    The diversity of populations in domestic species offers great opportunities to study genome response to selection. The recently published Sheep HapMap dataset is a great example of characterization of the world wide genetic diversity in sheep. In this study, we re-analyzed the Sheep HapMap dataset to identify selection signatures in worldwide sheep populations. Compared to previous analyses, we made use of statistical methods that (i) take account of the hierarchical structure of sheep popula...

  19. ALPs effective field theory and collider signatures

    DEFF Research Database (Denmark)

    Brivio, I.; Gavela, M. B.; Merlo, L.

    2017-01-01

    We study the leading effective interactions between the Standard Model fields and a generic singlet CP-odd (pseudo-) Goldstone boson. Two possible frameworks for electroweak symmetry breaking are considered: linear and non-linear. For the latter case, the basis of leading effective operators is d...... final states are most promising signals expected in both frameworks. In addition, non-standard Higgs decays and mono-Higgs signatures are especially prominent and expected to be dominant in non-linear realisations....

  20. Construction of Graduation Certificate Issuing System Based on Digital Signature Technique

    Directory of Open Access Journals (Sweden)

    Mohammed Issam Younis

    2015-06-01

    Full Text Available With the development of computer architecture and its technologies in recent years, applications like e-commerce, e-government, e-governance and e-finance are widely used, and they act as active research areas. In addition, in order to increase the quality and quantity of the ordinary everyday transactions, it is desired to migrate from the paper-based environment to a digital-based computerized environment. Such migration increases efficiency, saves time, eliminates paperwork, increases safety and reduces the cost in an organization. Digital signatures are playing an essential role in many electronic and automatic based systems and facilitate this migration. The digital signatures are used to provide many services and solutions that would not have been possible by the conventional hand-written signature. In the educational environment, the process of issuing the graduation certificates can no longer be restricted to the traditional methods. Hence, a computerized system for issuing certificates of graduation in an electronic form is needed and desired. This paper proposes a Graduation Certificates Issuing System (GCIS based on digital signature technology. In doing so, this research highlights the state-of-the-art and the art-of-the-practice for some existing digital signature-based systems in the literatures. In addition, eight intertwined elected services are identified, namely: message authentication, entity authentication, integrity, non-repudiation, time stamping, distinguished signing authorities, delegating signing capability and supporting workflow systems. Moreover, this research examines nine existing systems, showing their merits and demerits in terms of these elected services. Furthermore, the research describes the architectural design using the Unified Modeling Language (UML and provides the concrete implementation of the proposed GCIS. The GCIS is implemented using Visual Basic.Net programming language and SQL Server database