WorldWideScience

Sample records for energy signature approach

  1. Extending the similarity-based XML multicast approach with digital signatures

    DEFF Research Database (Denmark)

    Azzini, Antonia; Marrara, Stefania; Jensen, Meiko

    2009-01-01

    This paper investigates the interplay between similarity-based SOAP message aggregation and digital signature application. An overview on the approaches resulting from the different orders for the tasks of signature application, verification, similarity aggregation and splitting is provided....... Depending on the intersection between similarity-aggregated and signed SOAP message parts, the paper discusses three different cases of signature application, and sketches their applicability and performance implications....

  2. A semi-classical approach to signature splitting and signature inversion in odd–odd nuclei

    International Nuclear Information System (INIS)

    Kumar, Vinod; Kumar, Suresh; Kumar, Sushil; Hasan, Zafrul; Koranga, B.S.; Kumar, Deepak; Negi, D.; Angus, Lee

    2011-01-01

    The signature inversion observed in rotational bands belonging to high-j configurations of odd–odd deformed nuclei has been analyzed within the framework of an axially symmetric rotor plus two-particle model. The Coriolis and n–p interaction are considered the main cause of energy staggering. However, γ-triaxial deformation and the numbers of valence protons, N p , and neutrons, N n also contribute to the energy staggering between odd- and even-spin states. (author)

  3. Cubic Bezier Curve Approach for Automated Offline Signature Verification with Intrusion Identification

    Directory of Open Access Journals (Sweden)

    Arun Vijayaragavan

    2014-01-01

    Full Text Available Authentication is a process of identifying person’s rights over a system. Many authentication types are used in various systems, wherein biometrics authentication systems are of a special concern. Signature verification is a basic biometric authentication technique used widely. The signature matching algorithm uses image correlation and graph matching technique which provides false rejection or acceptance. We proposed a model to compare knowledge from signature. Intrusion in the signature repository system results in copy of the signature that leads to false acceptance. Our approach uses a Bezier curve algorithm to identify the curve points and uses the behaviors of the signature for verification. An analyzing mobile agent is used to identify the input signature parameters and compare them with reference signature repository. It identifies duplication of signature over intrusion and rejects it. Experiments are conducted on a database with thousands of signature images from various sources and the results are favorable.

  4. Electromagnetic signatures of far-field gravitational radiation in the 1 + 3 approach

    International Nuclear Information System (INIS)

    Chua, Alvin J K; Cañizares, Priscilla; Gair, Jonathan R

    2015-01-01

    Gravitational waves (GWs) from astrophysical sources can interact with background electromagnetic fields, giving rise to distinctive and potentially detectable electromagnetic signatures. In this paper, we study such interactions for far-field gravitational radiation using the 1 + 3 approach to relativity. Linearized equations for the electromagnetic field on perturbed Minkowski space are derived and solved analytically. The inverse Gertsenshteĭn conversion of GWs in a static electromagnetic field is rederived, and the resultant electromagnetic radiation is shown to be significant for highly magnetized pulsars in compact binary systems. We also obtain a variety of nonlinear interference effects for interacting gravitational and electromagnetic waves, although wave–wave resonances previously described in the literature are absent when the electric–magnetic self-interaction is taken into account. The fluctuation and amplification of electromagnetic energy flux as the GW strength increases towards the gravitational–electromagnetic frequency ratio is a possible signature of gravitational radiation from extended astrophysical sources. (paper)

  5. Observable Signatures of Energy Release in Braided Coronal Loops

    Energy Technology Data Exchange (ETDEWEB)

    Pontin, D. I. [University of Dundee, Nethergate, Dundee, DD1 4HN (United Kingdom); Janvier, M. [Institut d’Astrophysique Spatiale, CNRS, Univ. Paris-Sud, Université Paris-Saclay, Bât. 121, F-91405, Orsay Cedex (France); Tiwari, S. K.; Winebarger, A. R.; Cirtain, J. W. [NASA Marshall Space Flight Center, ZP 13, Huntsville, AL 35812 (United States); Galsgaard, K. [Niels Bohr Institute, Geological Museum Østervoldgade 5-7, DK-1350, Copenhagen K (Denmark)

    2017-03-10

    We examine the turbulent relaxation of solar coronal loops containing non-trivial field line braiding. Such field line tangling in the corona has long been postulated in the context of coronal heating models. We focus on the observational signatures of energy release in such braided magnetic structures using MHD simulations and forward modeling tools. The aim is to answer the following question: if energy release occurs in a coronal loop containing braided magnetic flux, should we expect a clearly observable signature in emissions? We demonstrate that the presence of braided magnetic field lines does not guarantee a braided appearance to the observed intensities. Observed intensities may—but need not necessarily—reveal the underlying braided nature of the magnetic field, depending on the degree and pattern of the field line tangling within the loop. However, in all cases considered, the evolution of the braided loop is accompanied by localized heating regions as the loop relaxes. Factors that may influence the observational signatures are discussed. Recent high-resolution observations from Hi-C have claimed the first direct evidence of braided magnetic fields in the corona. Here we show that both the Hi-C data and some of our simulations give the appearance of braiding at a range of scales.

  6. Chameleon dark energy models with characteristic signatures

    International Nuclear Information System (INIS)

    Gannouji, Radouane; Moraes, Bruno; Polarski, David; Mota, David F.; Winther, Hans A.; Tsujikawa, Shinji

    2010-01-01

    In chameleon dark energy models, local gravity constraints tend to rule out parameters in which observable cosmological signatures can be found. We study viable chameleon potentials consistent with a number of recent observational and experimental bounds. A novel chameleon field potential, motivated by f(R) gravity, is constructed where observable cosmological signatures are present both at the background evolution and in the growth rate of the perturbations. We study the evolution of matter density perturbations on low redshifts for this potential and show that the growth index today γ 0 can have significant dispersion on scales relevant for large scale structures. The values of γ 0 can be even smaller than 0.2 with large variations of γ on very low redshifts for the model parameters constrained by local gravity tests. This gives a possibility to clearly distinguish these chameleon models from the Λ-cold-dark-matter (ΛCDM) model in future high-precision observations.

  7. Statistical models describing the energy signature of buildings

    DEFF Research Database (Denmark)

    Bacher, Peder; Madsen, Henrik; Thavlov, Anders

    2010-01-01

    Approximately one third of the primary energy production in Denmark is used for heating in buildings. Therefore efforts to accurately describe and improve energy performance of the building mass are very important. For this purpose statistical models describing the energy signature of a building, i...... or varying energy prices. The paper will give an overview of statistical methods and applied models based on experiments carried out in FlexHouse, which is an experimental building in SYSLAB, Risø DTU. The models are of different complexity and can provide estimates of physical quantities such as UA......-values, time constants of the building, and other parameters related to the heat dynamics. A method for selecting the most appropriate model for a given building is outlined and finally a perspective of the applications is given. Aknowledgements to the Danish Energy Saving Trust and the Interreg IV ``Vind i...

  8. High energy cosmic ray signature of quark nuggets

    Science.gov (United States)

    Audouze, J.; Schaeffer, R.; Silk, J.

    1985-01-01

    It has been recently proposed that dark matter in the Universe might consist of nuggets of quarks which populate the nuclear desert between nucleons and neutron star matter. It is further suggested that the Centauro events which could be the signature of particles with atomic mass A approx. 100 and energy E approx. 10 to 15th power eV might also be related to debris produced in the encounter of two neutron stars. A further consequence of the former proposal is examined, and it is shown that the production of relativistic quark nuggets is accompanied by a substantial flux of potentially observable high energy neutrinos.

  9. A New Approach for High Pressure Pixel Polar Distribution on Off-line Signature Verification

    Directory of Open Access Journals (Sweden)

    Jesús F. Vargas

    2010-06-01

    Full Text Available Features representing information of High Pressure Points froma static image of a handwritten signature are analyzed for an offline verification system. From grayscale images, a new approach for High Pressure threshold estimation is proposed. Two images, one containingthe High Pressure Points extracted and other with a binary version ofthe original signature, are transformed to polar coordinates where a pixel density ratio between them is calculated. Polar space had been divided into angular and radial segments, which permit a local analysis of the high pressure distribution. Finally two vectors containing the density distribution ratio are calculated for nearest and farthest points from geometric center of the original signature image. Experiments were carried out using a database containing signature from 160 individual. The robustness of the analyzed system for simple forgeries is tested out with Support Vector Machines models. For the sake of completeness, a comparison of the results obtained by the proposed approach with similar works published is presented.

  10. Study of the microdoppler signature of a bicyclist for different directions of approach

    Science.gov (United States)

    Rodriguez-Hervas, Berta; Maile, Michael; Flores, Benjamin C.

    2015-05-01

    The successful implementation of autonomous driving in an urban setting depends on the ability of the environment perception system to correctly classify vulnerable road users such as pedestrians and bicyclists in dense, complex scenarios. Self-driving vehicles include sensor systems such as cameras, lidars, and radars to enable decision making. Among these systems, radars are particularly relevant due to their operational robustness under adverse weather and night light conditions. Classification of pedestrian and car in urban settings using automotive radar has been widely investigated, suggesting that micro-Doppler signatures are useful for target discrimination. Our objective is to analyze and study the micro-Doppler signature of bicyclists approaching a vehicle from different directions in order to establish the basis of a classification criterion to distinguish bicycles from other targets including clutter. The micro-Doppler signature is obtained by grouping individual reflecting points using a clustering algorithm and observing the evolution of all the points belonging to an object in the Doppler domain over time. A comparison is then made with simulated data that uses a kinematic model of bicyclists' movement. The suitability of the micro-Doppler bicyclist signature as a classification feature is determined by comparing it to those belonging to cars and pedestrians approaching the automotive radar system.

  11. Electronic Signature Policy

    Science.gov (United States)

    Establishes the United States Environmental Protection Agency's approach to adopting electronic signature technology and best practices to ensure electronic signatures applied to official Agency documents are legally valid and enforceable

  12. Image-Based Airborne Sensors: A Combined Approach for Spectral Signatures Classification through Deterministic Simulated Annealing

    Science.gov (United States)

    Guijarro, María; Pajares, Gonzalo; Herrera, P. Javier

    2009-01-01

    The increasing technology of high-resolution image airborne sensors, including those on board Unmanned Aerial Vehicles, demands automatic solutions for processing, either on-line or off-line, the huge amountds of image data sensed during the flights. The classification of natural spectral signatures in images is one potential application. The actual tendency in classification is oriented towards the combination of simple classifiers. In this paper we propose a combined strategy based on the Deterministic Simulated Annealing (DSA) framework. The simple classifiers used are the well tested supervised parametric Bayesian estimator and the Fuzzy Clustering. The DSA is an optimization approach, which minimizes an energy function. The main contribution of DSA is its ability to avoid local minima during the optimization process thanks to the annealing scheme. It outperforms simple classifiers used for the combination and some combined strategies, including a scheme based on the fuzzy cognitive maps and an optimization approach based on the Hopfield neural network paradigm. PMID:22399989

  13. An energy signature scheme for steam trap assessment and flow rate estimation using pipe-induced acoustic measurements

    Science.gov (United States)

    Olama, Mohammed M.; Allgood, Glenn O.; Kuruganti, Teja P.; Lake, Joe E.

    2012-06-01

    The US Congress has passed legislation dictating that all government agencies establish a plan and process for improving energy efficiencies at their sites. In response to this legislation, Oak Ridge National Laboratory (ORNL) has recently conducted a pilot study to explore the deployment of a wireless sensor system for a real-time measurement-based energy efficiency optimization framework within the steam distribution system within the ORNL campus. We make assessments on the real-time status of the distribution system by observing the state measurements of acoustic sensors mounted on the steam pipes/traps/valves. In this paper, we describe a spectral-based energy signature scheme that interprets acoustic vibration sensor data to estimate steam flow rates and assess steam traps health status. Experimental results show that the energy signature scheme has the potential to identify different steam trap health status and it has sufficient sensitivity to estimate steam flow rate. Moreover, results indicate a nearly quadratic relationship over the test region between the overall energy signature factor and flow rate in the pipe. The analysis based on estimated steam flow and steam trap status helps generate alerts that enable operators and maintenance personnel to take remedial action. The goal is to achieve significant energy-saving in steam lines by monitoring and acting on leaking steam pipes/traps/valves.

  14. A new approach to wind energy: Opportunities and challenges

    Science.gov (United States)

    Dabiri, John O.; Greer, Julia R.; Koseff, Jeffrey R.; Moin, Parviz; Peng, Jifeng

    2015-03-01

    Despite common characterizations of modern wind energy technology as mature, there remains a persistent disconnect between the vast global wind energy resource—which is 20 times greater than total global power consumption—and the limited penetration of existing wind energy technologies as a means for electricity generation worldwide. We describe an approach to wind energy harvesting that has the potential to resolve this disconnect by geographically distributing wind power generators in a manner that more closely mirrors the physical resource itself. To this end, technology development is focused on large arrays of small wind turbines that can harvest wind energy at low altitudes by using new concepts of biology-inspired engineering. This approach dramatically extends the reach of wind energy, as smaller wind turbines can be installed in many places that larger systems cannot, especially in built environments. Moreover, they have lower visual, acoustic, and radar signatures, and they may pose significantly less risk to birds and bats. These features can be leveraged to attain cultural acceptance and rapid adoption of this new technology, thereby enabling significantly faster achievement of state and national renewable energy targets than with existing technology alone. Favorable economics stem from an orders-of-magnitude reduction in the number of components in a new generation of simple, mass-manufacturable (even 3D-printable), vertical-axis wind turbines. However, this vision can only be achieved by overcoming significant scientific challenges that have limited progress over the past three decades. The following essay summarizes our approach as well as the opportunities and challenges associated with it, with the aim of motivating a concerted effort in basic and applied research in this area.

  15. SIGNATURE: A workbench for gene expression signature analysis

    Directory of Open Access Journals (Sweden)

    Chang Jeffrey T

    2011-11-01

    Full Text Available Abstract Background The biological phenotype of a cell, such as a characteristic visual image or behavior, reflects activities derived from the expression of collections of genes. As such, an ability to measure the expression of these genes provides an opportunity to develop more precise and varied sets of phenotypes. However, to use this approach requires computational methods that are difficult to implement and apply, and thus there is a critical need for intelligent software tools that can reduce the technical burden of the analysis. Tools for gene expression analyses are unusually difficult to implement in a user-friendly way because their application requires a combination of biological data curation, statistical computational methods, and database expertise. Results We have developed SIGNATURE, a web-based resource that simplifies gene expression signature analysis by providing software, data, and protocols to perform the analysis successfully. This resource uses Bayesian methods for processing gene expression data coupled with a curated database of gene expression signatures, all carried out within a GenePattern web interface for easy use and access. Conclusions SIGNATURE is available for public use at http://genepattern.genome.duke.edu/signature/.

  16. Approaches to determining the reliability of a multimodal three-dimensional dynamic signature

    Directory of Open Access Journals (Sweden)

    Yury E. Kozlov

    2018-03-01

    Full Text Available The market of modern mobile applications has increasingly strict requirements for the authentication system reliability. This article examines an authentication method using a multimodal three-dimensional dynamic signature (MTDS, that can be used both as a main and additional method of user authentication in mobile applications. It is based on the use of gesture in the air performed by two independent mobile devices as an identifier. The MTDS method has certain advantages over currently used biometric methods, including fingerprint authentication, face recognition and voice recognition. A multimodal three-dimensional dynamic signature allows quickly changing an authentication gesture, as well as concealing the authentication procedure using gestures that do not attract attention. Despite all its advantages, the MTDS method has certain limitations, the main one is building functionally dynamic complex (FDC skills required for accurate repeating an authentication gesture. To correctly create MTDS need to have a system for assessing the reliability of gestures. Approaches to the solution of this task are grouped in this article according to methods of their implementation. Two of the approaches can be implemented only with the use of a server as a centralized MTDS processing center and one approach can be implemented using smartphone's own computing resources. The final part of the article provides data of testing one of these methods on a template performing the MTDS authentication.

  17. Time-dependent delayed signatures from energetic photon interrogations

    International Nuclear Information System (INIS)

    Norman, Daren R.; Jones, James L.; Blackburn, Brandon W.; Haskell, Kevin J.; Johnson, James T.; Watson, Scott M.; Hunt, Alan W.; Spaulding, Randy; Harmon, Frank

    2007-01-01

    Pulsed photonuclear interrogation environments generated by 8-24 MeV electron linac are rich with time-dependent, material-specific, radiation signatures. Nitrogen-based explosives and nuclear materials can be detected by exploiting these signatures in different delayed-time regions. Numerical and experimental results presented in this paper show the unique time and energy dependence of these signatures. It is shown that appropriate delayed-time windows are essential to acquire material-specific signatures in pulsed photonuclear assessment environments. These developments demonstrate that pulsed, high-energy, photon-inspection environments can be exploited for time-dependent, material-specific signatures through the proper operation of specialized detectors and detection methods

  18. A Semi-Supervised Approach for Refining Transcriptional Signatures of Drug Response and Repositioning Predictions.

    Directory of Open Access Journals (Sweden)

    Francesco Iorio

    Full Text Available We present a novel strategy to identify drug-repositioning opportunities. The starting point of our method is the generation of a signature summarising the consensual transcriptional response of multiple human cell lines to a compound of interest (namely the seed compound. This signature can be derived from data in existing databases, such as the connectivity-map, and it is used at first instance to query a network interlinking all the connectivity-map compounds, based on the similarity of their transcriptional responses. This provides a drug neighbourhood, composed of compounds predicted to share some effects with the seed one. The original signature is then refined by systematically reducing its overlap with the transcriptional responses induced by drugs in this neighbourhood that are known to share a secondary effect with the seed compound. Finally, the drug network is queried again with the resulting refined signatures and the whole process is carried on for a number of iterations. Drugs in the final refined neighbourhood are then predicted to exert the principal mode of action of the seed compound. We illustrate our approach using paclitaxel (a microtubule stabilising agent as seed compound. Our method predicts that glipizide and splitomicin perturb microtubule function in human cells: a result that could not be obtained through standard signature matching methods. In agreement, we find that glipizide and splitomicin reduce interphase microtubule growth rates and transiently increase the percentage of mitotic cells-consistent with our prediction. Finally, we validated the refined signatures of paclitaxel response by mining a large drug screening dataset, showing that human cancer cell lines whose basal transcriptional profile is anti-correlated to them are significantly more sensitive to paclitaxel and docetaxel.

  19. Automatic mechanical fault assessment of small wind energy systems in microgrids using electric signature analysis

    DEFF Research Database (Denmark)

    Skrimpas, Georgios Alexandros; Marhadi, Kun Saptohartyadi; Jensen, Bogi Bech

    2013-01-01

    of islanded operation. In this paper, the fault assessment is achieved efficiently and consistently via electric signature analysis (ESA). In ESA the fault related frequency components are manifested as sidebands of the existing current and voltage time harmonics. The energy content between the fundamental, 5...

  20. The Energy Deposition Pattern as the Unconventional Strangelet Signature and its Relevance to the Castor Calorimeter

    International Nuclear Information System (INIS)

    Angelis, A.L.S.; Bartke, J.; Gladysz-Dziadus, E.; Wlodarczyk, Z.

    1998-07-01

    It has been shown, by GEANT simulations, that the energy deposition pattern in deep calorimeters could be the spectacular and unconventional signature of different kinds of stable and unstable strangelets. The CASTOR calorimeter is shown to be the appropriate tool for detection of strongly penetrating objects, such as strangelets possibly produced in the baryon-rich region in central Pb-Pb collisions at LHC energies. (author)

  1. ChromaSig: a probabilistic approach to finding common chromatin signatures in the human genome.

    Directory of Open Access Journals (Sweden)

    Gary Hon

    2008-10-01

    Full Text Available Computational methods to identify functional genomic elements using genetic information have been very successful in determining gene structure and in identifying a handful of cis-regulatory elements. But the vast majority of regulatory elements have yet to be discovered, and it has become increasingly apparent that their discovery will not come from using genetic information alone. Recently, high-throughput technologies have enabled the creation of information-rich epigenetic maps, most notably for histone modifications. However, tools that search for functional elements using this epigenetic information have been lacking. Here, we describe an unsupervised learning method called ChromaSig to find, in an unbiased fashion, commonly occurring chromatin signatures in both tiling microarray and sequencing data. Applying this algorithm to nine chromatin marks across a 1% sampling of the human genome in HeLa cells, we recover eight clusters of distinct chromatin signatures, five of which correspond to known patterns associated with transcriptional promoters and enhancers. Interestingly, we observe that the distinct chromatin signatures found at enhancers mark distinct functional classes of enhancers in terms of transcription factor and coactivator binding. In addition, we identify three clusters of novel chromatin signatures that contain evolutionarily conserved sequences and potential cis-regulatory elements. Applying ChromaSig to a panel of 21 chromatin marks mapped genomewide by ChIP-Seq reveals 16 classes of genomic elements marked by distinct chromatin signatures. Interestingly, four classes containing enrichment for repressive histone modifications appear to be locally heterochromatic sites and are enriched in quickly evolving regions of the genome. The utility of this approach in uncovering novel, functionally significant genomic elements will aid future efforts of genome annotation via chromatin modifications.

  2. Signatures of quantum radiation reaction in laser-electron-beam collisions

    International Nuclear Information System (INIS)

    Wang, H. Y.; Yan, X. Q.; Zepf, M.

    2015-01-01

    Electron dynamics in the collision of an electron beam with a high-intensity focused ultrashort laser pulse are investigated using three-dimensional QED particle-in-cell (PIC) simulations, and the results are compared with those calculated by classical Landau and Lifshitz PIC simulations. Significant differences are observed from the angular dependence of the electron energy distribution patterns for the two different approaches, because photon emission is no longer well approximated by a continuous process in the quantum radiation-dominated regime. The stochastic nature of photon emission results in strong signatures of quantum radiation-reaction effects under certain conditions. We show that the laser spot size and duration greatly influence these signatures due to the competition of QED effects and the ponderomotive force, which is well described in the classical approximation. The clearest signatures of quantum radiation reaction are found in the limit of large laser spots and few cycle pulse durations

  3. Staggering in signature partners of A∼190 mass region of superdeformed rotational bands

    International Nuclear Information System (INIS)

    Uma, V.S.; Goel, Alpana; Yadav, Archana

    2014-01-01

    This paper discuss about ΔI=1 signature splitting in signature partner pairs of A∼190 mass region. Around twenty signature partner pairs (usually called as two bands, each with a fixed signature) have been reported in this mass region. For these signature pairs, band head moment of inertia (J 0 ) and intrinsic structure of each pair of signature partners have been found as almost identical. Also, these signature partner pairs showed large amplitude signature splitting. As each of the two signature partner forms a regular spin sequence and signature bands are not equivalent in terms of energies. This difference in energies results in signature splitting

  4. ADAGE signature analysis: differential expression analysis with data-defined gene sets.

    Science.gov (United States)

    Tan, Jie; Huyck, Matthew; Hu, Dongbo; Zelaya, René A; Hogan, Deborah A; Greene, Casey S

    2017-11-22

    Gene set enrichment analysis and overrepresentation analyses are commonly used methods to determine the biological processes affected by a differential expression experiment. This approach requires biologically relevant gene sets, which are currently curated manually, limiting their availability and accuracy in many organisms without extensively curated resources. New feature learning approaches can now be paired with existing data collections to directly extract functional gene sets from big data. Here we introduce a method to identify perturbed processes. In contrast with methods that use curated gene sets, this approach uses signatures extracted from public expression data. We first extract expression signatures from public data using ADAGE, a neural network-based feature extraction approach. We next identify signatures that are differentially active under a given treatment. Our results demonstrate that these signatures represent biological processes that are perturbed by the experiment. Because these signatures are directly learned from data without supervision, they can identify uncurated or novel biological processes. We implemented ADAGE signature analysis for the bacterial pathogen Pseudomonas aeruginosa. For the convenience of different user groups, we implemented both an R package (ADAGEpath) and a web server ( http://adage.greenelab.com ) to run these analyses. Both are open-source to allow easy expansion to other organisms or signature generation methods. We applied ADAGE signature analysis to an example dataset in which wild-type and ∆anr mutant cells were grown as biofilms on the Cystic Fibrosis genotype bronchial epithelial cells. We mapped active signatures in the dataset to KEGG pathways and compared with pathways identified using GSEA. The two approaches generally return consistent results; however, ADAGE signature analysis also identified a signature that revealed the molecularly supported link between the MexT regulon and Anr. We designed

  5. Signature detection and matching for document image retrieval.

    Science.gov (United States)

    Zhu, Guangyu; Zheng, Yefeng; Doermann, David; Jaeger, Stefan

    2009-11-01

    As one of the most pervasive methods of individual identification and document authentication, signatures present convincing evidence and provide an important form of indexing for effective document image processing and retrieval in a broad range of applications. However, detection and segmentation of free-form objects such as signatures from clustered background is currently an open document analysis problem. In this paper, we focus on two fundamental problems in signature-based document image retrieval. First, we propose a novel multiscale approach to jointly detecting and segmenting signatures from document images. Rather than focusing on local features that typically have large variations, our approach captures the structural saliency using a signature production model and computes the dynamic curvature of 2D contour fragments over multiple scales. This detection framework is general and computationally tractable. Second, we treat the problem of signature retrieval in the unconstrained setting of translation, scale, and rotation invariant nonrigid shape matching. We propose two novel measures of shape dissimilarity based on anisotropic scaling and registration residual error and present a supervised learning framework for combining complementary shape information from different dissimilarity metrics using LDA. We quantitatively study state-of-the-art shape representations, shape matching algorithms, measures of dissimilarity, and the use of multiple instances as query in document image retrieval. We further demonstrate our matching techniques in offline signature verification. Extensive experiments using large real-world collections of English and Arabic machine-printed and handwritten documents demonstrate the excellent performance of our approaches.

  6. High energy nucleus-nucleus collisions at CERN: Signatures, physical observables and experimental results

    International Nuclear Information System (INIS)

    Harris, J.W.

    1988-02-01

    Experimental results on high energy nucleus-nucleus collisions have become available with the recent experiments at CERN utilizing 200 GeV/n oxygen and sulfur beams. Physics motivations for these experiments are presented: a description of predicted signatures for possible formation of a quark-gluon plasma and physical observables that are expected to provide important information for understanding the dynamics of these collisions. A presentation will be made of some of the first experimental results to emerge from this new field. 28 refs., 9 figs

  7. LAVA: An Open-Source Approach To Designing LAMP (Loop-Mediated Isothermal Amplification DNA Signatures

    Directory of Open Access Journals (Sweden)

    Gardner Shea N

    2011-06-01

    Full Text Available Abstract Background We developed an extendable open-source Loop-mediated isothermal AMPlification (LAMP signature design program called LAVA (LAMP Assay Versatile Analysis. LAVA was created in response to limitations of existing LAMP signature programs. Results LAVA identifies combinations of six primer regions for basic LAMP signatures, or combinations of eight primer regions for LAMP signatures with loop primers, which can be used as LAMP signatures. The identified primers are conserved among target organism sequences. Primer combinations are optimized based on lengths, melting temperatures, and spacing among primer sites. We compare LAMP signature candidates for Staphylococcus aureus created both by LAVA and by PrimerExplorer. We also include signatures from a sample run targeting all strains of Mycobacterium tuberculosis. Conclusions We have designed and demonstrated new software for identifying signature candidates appropriate for LAMP assays. The software is available for download at http://lava-dna.googlecode.com/.

  8. Radiation signatures from a locally energized flaring loop

    Science.gov (United States)

    Emslie, A. G.; Vlahos, L.

    1980-01-01

    The radiation signatures from a locally energized solar flare loop based on the physical properties of the energy release mechanisms were consistent with hard X-ray, microwave, and EUV observations for plausible source parameters. It was found that a suprathermal tail of high energy electrons is produced by the primary energy release, and that the number of energetic charged particles ejected into the interplanetary medium in the model is consistent with observations. The radiation signature model predicts that the intrinsic polarization of the hard X-ray burst should increase over the photon energy range of 20 to 100 keV.

  9. Second dip as a signature of ultrahigh energy proton interactions with cosmic microwave background radiation.

    Science.gov (United States)

    Berezinsky, V; Gazizov, A; Kachelrieb, M

    2006-12-08

    We discuss as a new signature for the interaction of extragalactic ultrahigh energy protons with cosmic microwave background radiation a spectral feature located at E= 6.3 x 10(19) eV in the form of a narrow and shallow dip. It is produced by the interference of e+e(-)-pair and pion production. We show that this dip and, in particular, its position are almost model-independent. Its observation by future ultrahigh energy cosmic ray detectors may give the conclusive confirmation that an observed steepening of the spectrum is caused by the Greisen-Zatsepin-Kuzmin effect.

  10. Cross-correlation of the cosmic microwave background with the 2MASS galaxy survey: Signatures of dark energy, hot gas, and point sources

    International Nuclear Information System (INIS)

    Afshordi, Niayesh; Loh, Yeong-Shang; Strauss, Michael A.

    2004-01-01

    We cross-correlate the cosmic microwave background temperature anisotropies observed by the Wilkinson Microwave Anisotropy Probe (WMAP) with the projected distribution of extended sources in the Two Micron All Sky Survey (2MASS). By modeling the theoretical expectation for this signal, we extract the signatures of dark energy [integrated Sachs-Wolfe effect (ISW)], hot gas [thermal Sunyaev-Zeldovich (SZ) effect], and microwave point sources in the cross-correlation. Our strongest signal is the thermal SZ, at the 3.1-3.7σ level, which is consistent with the theoretical prediction based on observations of x-ray clusters. We also see the ISW signal at the 2.5σ level, which is consistent with the expected value for the concordance ΛCDM cosmology, and is an independent signature of the presence of dark energy in the Universe. Finally, we see the signature of microwave point sources at the 2.7σ level

  11. Signature for g bosons from medium energy proton scattering experiments

    International Nuclear Information System (INIS)

    Kuyucak, S.

    1993-01-01

    We apply the recently developed algebraic (1/N expansion) scattering formalism to medium energy proton scattering from 154 Sm and 176 Yb. The nuclear structure effects in this formalism are described by the interacting boson model generalized to arbitrary interactions and types of bosons i.e. s,d,g, etc. We find that, in the sd boson model, a consistent description of cross sections is possible only for the 0 + and 2 + states. The failure of the model with regard to the 4 + states indicates that the effective hexadecapole operator used in the sd model is inadequate. In contrast, the data for scattering to the 0 + , 2 + and 4 + states could be consistently described in the sdg boson model. The spectroscopic data for the low-lying levels usually can not distinguish between the sd and sdg models due to renormalization of parameters, and one has to look at high spin or energy data for evidence of g bosons. The inelastic proton scattering experiments, on the other hand, directly probe the wave functions, and hence could provide a signature for g bosons even in the ground band states

  12. Five Guidelines for Selecting Hydrological Signatures

    Science.gov (United States)

    McMillan, H. K.; Westerberg, I.; Branger, F.

    2017-12-01

    Hydrological signatures are index values derived from observed or modeled series of hydrological data such as rainfall, flow or soil moisture. They are designed to extract relevant information about hydrological behavior, such as to identify dominant processes, and to determine the strength, speed and spatiotemporal variability of the rainfall-runoff response. Hydrological signatures play an important role in model evaluation. They allow us to test whether particular model structures or parameter sets accurately reproduce the runoff generation processes within the watershed of interest. Most modeling studies use a selection of different signatures to capture different aspects of the catchment response, for example evaluating overall flow distribution as well as high and low flow extremes and flow timing. Such studies often choose their own set of signatures, or may borrow subsets of signatures used in multiple other works. The link between signature values and hydrological processes is not always straightforward, leading to uncertainty and variability in hydrologists' signature choices. In this presentation, we aim to encourage a more rigorous approach to hydrological signature selection, which considers the ability of signatures to represent hydrological behavior and underlying processes for the catchment and application in question. To this end, we propose a set of guidelines for selecting hydrological signatures. We describe five criteria that any hydrological signature should conform to: Identifiability, Robustness, Consistency, Representativeness, and Discriminatory Power. We describe an example of the design process for a signature, assessing possible signature designs against the guidelines above. Due to their ubiquity, we chose a signature related to the Flow Duration Curve, selecting the FDC mid-section slope as a proposed signature to quantify catchment overall behavior and flashiness. We demonstrate how assessment against each guideline could be used to

  13. An Approach for Assessing the Signature Quality of Various Chemical Assays when Predicting the Culture Media Used to Grow Microorganisms

    Energy Technology Data Exchange (ETDEWEB)

    Holmes, Aimee E.; Sego, Landon H.; Webb-Robertson, Bobbie-Jo M.; Kreuzer, Helen W.; Anderson, Richard M.; Unwin, Stephen D.; Weimar, Mark R.; Tardiff, Mark F.; Corley, Courtney D.

    2013-02-01

    We demonstrate an approach for assessing the quality of a signature system designed to predict the culture medium used to grow a microorganism. The system was comprised of four chemical assays designed to identify various ingredients that could be used to produce the culture medium. The analytical measurements resulting from any combination of these four assays can be used in a Bayesian network to predict the probabilities that the microorganism was grown using one of eleven culture media. We evaluated combinations of the signature system by removing one or more of the assays from the Bayes network. We measured and compared the quality of the various Bayes nets in terms of fidelity, cost, risk, and utility, a method we refer to as Signature Quality Metrics

  14. Biomarker Gene Signature Discovery Integrating Network Knowledge

    Directory of Open Access Journals (Sweden)

    Holger Fröhlich

    2012-02-01

    Full Text Available Discovery of prognostic and diagnostic biomarker gene signatures for diseases, such as cancer, is seen as a major step towards a better personalized medicine. During the last decade various methods, mainly coming from the machine learning or statistical domain, have been proposed for that purpose. However, one important obstacle for making gene signatures a standard tool in clinical diagnosis is the typical low reproducibility of these signatures combined with the difficulty to achieve a clear biological interpretation. For that purpose in the last years there has been a growing interest in approaches that try to integrate information from molecular interaction networks. Here we review the current state of research in this field by giving an overview about so-far proposed approaches.

  15. Searches with long-lived or unusual signatures

    CERN Document Server

    Haug, S; The ATLAS collaboration

    2013-01-01

    We present recent ATLAS and CMS results from searches with long-lived and unusual signatures. They are based on analysis of LHC proton-proton collisions at center of mass energies at 7 and 8 TeV. Long-lived and heavy particles may cause peculiar signatures in the detectors, but are in several Standard Model extensions well motivated.

  16. Well-Known Distinctive Signatures of Quantum Phase Transition in Shape Coexistence Configuration of Nuclei

    Science.gov (United States)

    Majarshin, A. Jalili; Sabri, H.

    2018-06-01

    It is interesting that a change of nuclear shape may be described in terms of a phase transition. This paper studies the quantum phase transition of the U(5) to SO(6) in the interacting boson model (IBM) on the finite number N of bosons. This paper explores the well-known distinctive signatures of transition from spherical vibrational to γ-soft shape phase in the IBM with the variation of a control parameter. Quantum phase transitions occur as a result of properties of ground and excited states levels. We apply an affine \\widehat {SU(1,1)} approach to numerically solve non-linear Bethe Ansatz equation and point out what observables are particularly sensitive to the transition. The main aim of this work is to describe the most prominent observables of QPT by using IBM in shape coexistence configuration. We calculate energies of excited states and signatures of QPT as energy surface, energy ratio, energy differences, quadrupole electric transition rates and expectation values of boson number operators and show their behavior in QPT. These observables are calculated and examined for 98 - 102Mo isotopes.

  17. On reliable discovery of molecular signatures

    Directory of Open Access Journals (Sweden)

    Björkegren Johan

    2009-01-01

    Full Text Available Abstract Background Molecular signatures are sets of genes, proteins, genetic variants or other variables that can be used as markers for a particular phenotype. Reliable signature discovery methods could yield valuable insight into cell biology and mechanisms of human disease. However, it is currently not clear how to control error rates such as the false discovery rate (FDR in signature discovery. Moreover, signatures for cancer gene expression have been shown to be unstable, that is, difficult to replicate in independent studies, casting doubts on their reliability. Results We demonstrate that with modern prediction methods, signatures that yield accurate predictions may still have a high FDR. Further, we show that even signatures with low FDR may fail to replicate in independent studies due to limited statistical power. Thus, neither stability nor predictive accuracy are relevant when FDR control is the primary goal. We therefore develop a general statistical hypothesis testing framework that for the first time provides FDR control for signature discovery. Our method is demonstrated to be correct in simulation studies. When applied to five cancer data sets, the method was able to discover molecular signatures with 5% FDR in three cases, while two data sets yielded no significant findings. Conclusion Our approach enables reliable discovery of molecular signatures from genome-wide data with current sample sizes. The statistical framework developed herein is potentially applicable to a wide range of prediction problems in bioinformatics.

  18. Development of Neutron Energy Spectral Signatures for Passive Monitoring of Spent Nuclear Fuels in Dry Cask Storage

    Science.gov (United States)

    Harkness, Ira; Zhu, Ting; Liang, Yinong; Rauch, Eric; Enqvist, Andreas; Jordan, Kelly A.

    2018-01-01

    Demand for spent nuclear fuel dry casks as an interim storage solution has increased globally and the IAEA has expressed a need for robust safeguards and verification technologies for ensuring the continuity of knowledge and the integrity of radioactive materials inside spent fuel casks. Existing research has been focusing on "fingerprinting" casks based on count rate statistics to represent radiation emission signatures. The current research aims to expand to include neutron energy spectral information as part of the fuel characteristics. First, spent fuel composition data are taken from the Next Generation Safeguards Initiative Spent Fuel Libraries, representative for Westinghouse 17ˣ17 PWR assemblies. The ORIGEN-S code then calculates the spontaneous fission and (α,n) emissions for individual fuel rods, followed by detailed MCNP simulations of neutrons transported through the fuel assemblies. A comprehensive database of neutron energy spectral profiles is to be constructed, with different enrichment, burn-up, and cooling time conditions. The end goal is to utilize the computational spent fuel library, predictive algorithm, and a pressurized 4He scintillator to verify the spent fuel assemblies inside a cask. This work identifies neutron spectral signatures that correlate with the cooling time of spent fuel. Both the total and relative contributions from spontaneous fission and (α,n) change noticeably with respect to cooling time, due to the relatively short half-life (18 years) of the major neutron source 244Cm. Identification of this and other neutron spectral signatures allows the characterization of spent nuclear fuels in dry cask storage.

  19. The curse of namespaces in the domain of XML signature

    DEFF Research Database (Denmark)

    Jensen, Meiko; Liao, Lijun; Schwenk, Jörg

    2009-01-01

    The XML signature wrapping attack is one of the most discussed security issues of the Web Services security community during the last years. Until now, the issue has not been solved, and all countermeasure approaches proposed so far were shown to be insufficient. In this paper, we present yet...... another way to perform signature wrapping attacks by using the XML namespace injection technique. We show that the interplay of XML Signature, XPath, and the XML namespace concept has severe flaws that can be exploited for an attack, and that XML namespaces in general pose real troubles to digital...... signatures in the XML domain. Additionally, we present and discuss some new approaches in countering the proposed attack vector....

  20. The signature-based radiation-scanning approach to standoff detection of improvised explosive devices

    International Nuclear Information System (INIS)

    Brewer, R.L.; Dunn, W.L.; Heider, S.; Matthew, C.; Yang, X.

    2012-01-01

    The signature-based radiation-scanning technique for detection of improvised explosive devices is described. The technique seeks to detect nitrogen-rich chemical explosives present in a target. The technology compares a set of “signatures” obtained from a test target to a collection of “templates”, sets of signatures for a target that contain an explosive in a specific configuration. Interrogation of nitrogen-rich fertilizer samples, which serve as surrogates for explosives, is shown experimentally to be able to discriminate samples of 3.8 L and larger. - Highlights: ► Signature-based radiation-scanning techniques applied to detection of explosives. ► Nitrogen-rich fertilizer samples served as surrogate explosive samples. ► Signatures of a target compared to collections of templates of surrogate explosives. ► Figure-of-merit determined for neutron and neutron-induced gamma-ray signatures. ► Discrimination of surrogate explosive from inert samples of 3.8 L and larger.

  1. A simple but highly effective approach to evaluate the prognostic performance of gene expression signatures.

    Directory of Open Access Journals (Sweden)

    Maud H W Starmans

    Full Text Available BACKGROUND: Highly parallel analysis of gene expression has recently been used to identify gene sets or 'signatures' to improve patient diagnosis and risk stratification. Once a signature is generated, traditional statistical testing is used to evaluate its prognostic performance. However, due to the dimensionality of microarrays, this can lead to false interpretation of these signatures. PRINCIPAL FINDINGS: A method was developed to test batches of a user-specified number of randomly chosen signatures in patient microarray datasets. The percentage of random generated signatures yielding prognostic value was assessed using ROC analysis by calculating the area under the curve (AUC in six public available cancer patient microarray datasets. We found that a signature consisting of randomly selected genes has an average 10% chance of reaching significance when assessed in a single dataset, but can range from 1% to ∼40% depending on the dataset in question. Increasing the number of validation datasets markedly reduces this number. CONCLUSIONS: We have shown that the use of an arbitrary cut-off value for evaluation of signature significance is not suitable for this type of research, but should be defined for each dataset separately. Our method can be used to establish and evaluate signature performance of any derived gene signature in a dataset by comparing its performance to thousands of randomly generated signatures. It will be of most interest for cases where few data are available and testing in multiple datasets is limited.

  2. Global energy modeling - A biophysical approach

    Energy Technology Data Exchange (ETDEWEB)

    Dale, Michael

    2010-09-15

    This paper contrasts the standard economic approach to energy modelling with energy models using a biophysical approach. Neither of these approaches includes changing energy-returns-on-investment (EROI) due to declining resource quality or the capital intensive nature of renewable energy sources. Both of these factors will become increasingly important in the future. An extension to the biophysical approach is outlined which encompasses a dynamic EROI function that explicitly incorporates technological learning. The model is used to explore several scenarios of long-term future energy supply especially concerning the global transition to renewable energy sources in the quest for a sustainable energy system.

  3. FATTY ACID SIGNATURES DIFFERENTIATE MARINE MACROPHYTES AT ORDINAL AND FAMILY RANKS(1).

    Science.gov (United States)

    Galloway, Aaron W E; Britton-Simmons, Kevin H; Duggins, David O; Gabrielson, Paul W; Brett, Michael T

    2012-08-01

    Primary productivity by plants and algae is the fundamental source of energy in virtually all food webs. Furthermore, photosynthetic organisms are the sole source for ω-3 and ω-6 essential fatty acids (EFA) to upper trophic levels. Because animals cannot synthesize EFA, these molecules may be useful as trophic markers for tracking sources of primary production through food webs if different primary producer groups have different EFA signatures. We tested the hypothesis that different marine macrophyte groups have distinct fatty acid (FA) signatures by conducting a phylogenetic survey of 40 marine macrophytes (seaweeds and seagrasses) representing 36 families, 21 orders, and four phyla in the San Juan Archipelago, WA, USA. We used multivariate statistics to show that FA composition differed significantly (P macrophytes confirmed that this pattern was robust on a global scale (P macrophyte taxa shows a clear relationship between macrophyte phylogeny and FA content and strongly suggests that FA signature analyses can offer a viable approach to clarifying fundamental questions about the contribution of different basal resources to food webs. Moreover, these results imply that taxa with commercially valuable EFA signatures will likely share such characteristics with other closely related taxa that have not yet been evaluated for FA content. © 2012 Phycological Society of America.

  4. Un système de vérification de signature manuscrite en ligne basé ...

    African Journals Online (AJOL)

    Administrateur

    systems. The problem of cursive handwritten signatures verification can be approached on two main approaches one probabilistic. (analytical) and another structural. So, two methodologies ... do the classification is presented in [11].The online signature ..... Automatic on-line signature verification based on multiple models ...

  5. Can specific transcriptional regulators assemble a universal cancer signature?

    Science.gov (United States)

    Roy, Janine; Isik, Zerrin; Pilarsky, Christian; Schroeder, Michael

    2013-10-01

    Recently, there is a lot of interest in using biomarker signatures derived from gene expression data to predict cancer progression. We assembled signatures of 25 published datasets covering 13 types of cancers. How do these signatures compare with each other? On one hand signatures answering the same biological question should overlap, whereas signatures predicting different cancer types should differ. On the other hand, there could also be a Universal Cancer Signature that is predictive independently of the cancer type. Initially, we generate signatures for all datasets using classical approaches such as t-test and fold change and then, we explore signatures resulting from a network-based method, that applies the random surfer model of Google's PageRank algorithm. We show that the signatures as published by the authors and the signatures generated with classical methods do not overlap - not even for the same cancer type - whereas the network-based signatures strongly overlap. Selecting 10 out of 37 universal cancer genes gives the optimal prediction for all cancers thus taking a first step towards a Universal Cancer Signature. We furthermore analyze and discuss the involved genes in terms of the Hallmarks of cancer and in particular single out SP1, JUN/FOS and NFKB1 and examine their specific role in cancer progression.

  6. New particles and their experimental signatures

    International Nuclear Information System (INIS)

    Ellis, J.; Gelmini, G.; Kowalski, H.

    1984-08-01

    This report summarizes work done by our theoretical working group on exotic particles before, during and since the Lausanne meeting. We discuss the motivations, rates and experimental signatures for new physics and new particles in the 1 TeV mass range. Section 2 reviews some of the motivations for expecting new physics in this range. Of particular interest is the physics of gauge symmetry breaking. In section 3 we discuss the rates and experimental signatures of new particles predicted by theoretical models of gauge symmetry breaking, notably the Higgs boson supersymmetry and technicolour. Among the signatures we discuss are multiple Wsup(+-) and/or Z 0 events (for the Higgs), missing transverse energy (for supersymmetry) and multiple anti tt events (for the Higgs and technicolour). We provide many examples of final state differential distributions in rapidity and Psub(T), particularly for Higgses and for supersymmetry. We also analyse some physics backgrounds to the new particle production processes which interest us. Examples include W + W - , Z 0 Z 0 , W(anti tt) and (anti tt) production as backgrounds to Higgs production. However, we do not consider in detail non-physics backgrounds such as the jet fluctuation background to missing energy signals for supersymmetry production. Section 4 summarizes our preliminary conclusions on the observability at a high energy hadron collider of the new particles studied in this report. (orig./HSI)

  7. Signature change events: a challenge for quantum gravity?

    International Nuclear Information System (INIS)

    White, Angela; Weinfurtner, Silke; Visser, Matt

    2010-01-01

    Within the framework of either Euclidean (functional integral) quantum gravity or canonical general relativity the signature of the manifold is a priori unconstrained. Furthermore, recent developments in the emergent spacetime programme have led to a physically feasible implementation of (analogue) signature change events. This suggests that it is time to revisit the sometimes controversial topic of signature change in general relativity. Specifically, we shall focus on the behaviour of a quantum field defined on a manifold containing regions of different signature. We emphasize that regardless of the underlying classical theory, there are severe problems associated with any quantum field theory residing on a signature-changing background. (Such as the production of what is naively an infinite number of particles, with an infinite energy density.) We show how the problem of quantum fields exposed to finite regions of Euclidean-signature (Riemannian) geometry has similarities with the quantum barrier penetration problem. Finally we raise the question as to whether signature change transitions could be fully understood and dynamically generated within (modified) classical general relativity, or whether they require the knowledge of a theory of quantum gravity.

  8. Quark-Gluon Plasma Signatures

    CERN Document Server

    Vogt, Ramona

    1998-01-01

    Aspects of quark-gluon plasma signatures that can be measured by CMS are discussed. First the initial conditions of the system from minijet production are introduced, including shadowing effects. Color screening of the Upsilon family is then presented, followed by energy loss effects on charm and bottom hadrons, high Pt jets and global observables.

  9. Computational Tools and Approaches for Design and Control of Coating and Composite Color, Appearance, and Electromagnetic Signature

    Directory of Open Access Journals (Sweden)

    Erik D. Sapper

    2013-04-01

    Full Text Available The transport behavior of electromagnetic radiation through a polymeric coating or composite is the basis for the material color, appearance, and overall electromagnetic signature. As multifunctional materials become more advanced and next generation in-service applications become more demanding, a need for predictive design of electromagnetic signature is desired. This paper presents various components developed and used in a computational suite for the study and design of electromagnetic radiation transport properties in polymeric coatings and composites. Focus is given to the treatment of the forward or direct scattering problem on surfaces and in bulk matrices of polymeric materials. The suite consists of surface and bulk light scattering simulation modules that may be coupled together to produce a multiscale model for predicting the electromagnetic signature of various material systems. Geometric optics ray tracing is used to predict surface scattering behavior of realistically rough surfaces, while a coupled ray tracing-finite element approach is used to predict bulk scattering behavior of material matrices consisting of microscale and nanoscale fillers, pigments, fibers, air voids, and other inclusions. Extension of the suite to color change and appearance metamerism is addressed, as well as the differences between discrete versus statistical material modeling.

  10. A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents

    Science.gov (United States)

    Kabir, Muhammad N.; Alginahi, Yasser M.

    2014-01-01

    This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. Such issues were largely addressed in the literature for images, audio, and video, with only a few papers addressing the challenge of sensitive plain-text media under known constraints. Specifically, with text as the predominant online communication medium, it becomes crucial that techniques are deployed to protect such information. A number of digital-signature, hashing, and watermarking schemes have been proposed that essentially bind source data or embed invisible data in a cover media to achieve its goal. While many such complex schemes with resource redundancies are sufficient in offline and less-sensitive texts, this paper proposes a hybrid approach based on zero-watermarking and digital-signature-like manipulations for sensitive text documents in order to achieve content originality and integrity verification without physically modifying the cover text in anyway. The proposed algorithm was implemented and shown to be robust against undetected content modifications and is capable of confirming proof of originality whilst detecting and locating deliberate/nondeliberate tampering. Additionally, enhancements in resource utilisation and reduced redundancies were achieved in comparison to traditional encryption-based approaches. Finally, analysis and remarks are made about the current state of the art, and future research issues are discussed under the given constraints. PMID:25254247

  11. A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents

    Directory of Open Access Journals (Sweden)

    Omar Tayan

    2014-01-01

    Full Text Available This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. Such issues were largely addressed in the literature for images, audio, and video, with only a few papers addressing the challenge of sensitive plain-text media under known constraints. Specifically, with text as the predominant online communication medium, it becomes crucial that techniques are deployed to protect such information. A number of digital-signature, hashing, and watermarking schemes have been proposed that essentially bind source data or embed invisible data in a cover media to achieve its goal. While many such complex schemes with resource redundancies are sufficient in offline and less-sensitive texts, this paper proposes a hybrid approach based on zero-watermarking and digital-signature-like manipulations for sensitive text documents in order to achieve content originality and integrity verification without physically modifying the cover text in anyway. The proposed algorithm was implemented and shown to be robust against undetected content modifications and is capable of confirming proof of originality whilst detecting and locating deliberate/nondeliberate tampering. Additionally, enhancements in resource utilisation and reduced redundancies were achieved in comparison to traditional encryption-based approaches. Finally, analysis and remarks are made about the current state of the art, and future research issues are discussed under the given constraints.

  12. Quark-gluon plasma: experimental signatures

    International Nuclear Information System (INIS)

    Drapier, O.

    1995-01-01

    The existence of a deconfining phase transition of nuclear matter is a clear prediction of lattice quantum chromodynamics calculations. The signatures of this quark-gluon plasma (QGP) have been searched for, since the first high energy ion beams became available at BNL and CERN in 1986, and gold and lead beams are now accelerated at 11 and 160 GeV per nucleon by the AGS and SPS. An overview of the main signatures expected in case of QGP formation is presented here. Although some recent results have been found in agreement with the predictions of the QGP scenario, no clear evidence for its formation has been observed at present. Nevertheless, new high statistics results are expected from CERN lead beams. In addition, future experiments are being prepared at RHIC and LHCC, providing an increase by two orders of magnitude of the c.m.s. energy within a few years. (author). 66 refs., 28 figs

  13. Genome signature analysis of thermal virus metagenomes reveals Archaea and thermophilic signatures.

    Science.gov (United States)

    Pride, David T; Schoenfeld, Thomas

    2008-09-17

    Metagenomic analysis provides a rich source of biological information for otherwise intractable viral communities. However, study of viral metagenomes has been hampered by its nearly complete reliance on BLAST algorithms for identification of DNA sequences. We sought to develop algorithms for examination of viral metagenomes to identify the origin of sequences independent of BLAST algorithms. We chose viral metagenomes obtained from two hot springs, Bear Paw and Octopus, in Yellowstone National Park, as they represent simple microbial populations where comparatively large contigs were obtained. Thermal spring metagenomes have high proportions of sequences without significant Genbank homology, which has hampered identification of viruses and their linkage with hosts. To analyze each metagenome, we developed a method to classify DNA fragments using genome signature-based phylogenetic classification (GSPC), where metagenomic fragments are compared to a database of oligonucleotide signatures for all previously sequenced Bacteria, Archaea, and viruses. From both Bear Paw and Octopus hot springs, each assembled contig had more similarity to other metagenome contigs than to any sequenced microbial genome based on GSPC analysis, suggesting a genome signature common to each of these extreme environments. While viral metagenomes from Bear Paw and Octopus share some similarity, the genome signatures from each locale are largely unique. GSPC using a microbial database predicts most of the Octopus metagenome has archaeal signatures, while bacterial signatures predominate in Bear Paw; a finding consistent with those of Genbank BLAST. When using a viral database, the majority of the Octopus metagenome is predicted to belong to archaeal virus Families Globuloviridae and Fuselloviridae, while none of the Bear Paw metagenome is predicted to belong to archaeal viruses. As expected, when microbial and viral databases are combined, each of the Octopus and Bear Paw metagenomic contigs

  14. Signature-based User Authentication

    OpenAIRE

    Hámorník, Juraj

    2015-01-01

    This work aims on missing handwritten signature authentication in Windows. Result of this work is standalone software that allow users to log into Windows by writing signature. We focus on security of signature authentification and best overall user experience. We implemented signature authentification service that accept signature and return user access token if signature is genuine. Signature authentification is done by comparing given signature to signature patterns by their similarity. Si...

  15. Auditing energy use -a systematic approach for enhancing energy efficiency

    International Nuclear Information System (INIS)

    Ardhapnrkar, P.M.; Mahalle, A.M.

    2005-01-01

    Energy management is a critical activity in the developing as well as developed countries owing to constraints in the availability of primary energy resources and the increasing demand for energy from the industrial and non-industrial users. Energy consumption is a vital parameter that determines the economic growth of any country. An energy management system (EMS) can save money by allowing greater control over energy consuming equipment. The foundation for the energy program is the energy audit, which is the systematic study of factory or building to determine where and how well energy is being used. It is the nucleus of any successful energy saving program -it is tool, not a solution. Conventional energy conservation methods are mostly sporadic and lack a coordinated plan of action. Consequently only apparent systems are treated without the analysis of system interaction. Energy audit on the other hand, involves total system approach and aims at optimizing energy use efficiently for the entire plant. In the present paper a new approach to pursue energy conservation techniques is being discussed. The focus is mainly on the methodology of energy audit, energy use analysis, relating energy with the production, and reducing energy losses, etc. It is observe that with this systematic approach, if adopted, which consists of three essential segments namely capacity utilization fine-tuning of the equipment and technology up-gradation can result in phenomenal savings in the energy, building competitive edge for the industry. This approach along with commitment can provide the right impetus to reap the benefits of energy conservation on a sustained basis. (author)

  16. Maximizing biomarker discovery by minimizing gene signatures

    Directory of Open Access Journals (Sweden)

    Chang Chang

    2011-12-01

    Full Text Available Abstract Background The use of gene signatures can potentially be of considerable value in the field of clinical diagnosis. However, gene signatures defined with different methods can be quite various even when applied the same disease and the same endpoint. Previous studies have shown that the correct selection of subsets of genes from microarray data is key for the accurate classification of disease phenotypes, and a number of methods have been proposed for the purpose. However, these methods refine the subsets by only considering each single feature, and they do not confirm the association between the genes identified in each gene signature and the phenotype of the disease. We proposed an innovative new method termed Minimize Feature's Size (MFS based on multiple level similarity analyses and association between the genes and disease for breast cancer endpoints by comparing classifier models generated from the second phase of MicroArray Quality Control (MAQC-II, trying to develop effective meta-analysis strategies to transform the MAQC-II signatures into a robust and reliable set of biomarker for clinical applications. Results We analyzed the similarity of the multiple gene signatures in an endpoint and between the two endpoints of breast cancer at probe and gene levels, the results indicate that disease-related genes can be preferably selected as the components of gene signature, and that the gene signatures for the two endpoints could be interchangeable. The minimized signatures were built at probe level by using MFS for each endpoint. By applying the approach, we generated a much smaller set of gene signature with the similar predictive power compared with those gene signatures from MAQC-II. Conclusions Our results indicate that gene signatures of both large and small sizes could perform equally well in clinical applications. Besides, consistency and biological significances can be detected among different gene signatures, reflecting the

  17. Real Traceable Signatures

    Science.gov (United States)

    Chow, Sherman S. M.

    Traceable signature scheme extends a group signature scheme with an enhanced anonymity management mechanism. The group manager can compute a tracing trapdoor which enables anyone to test if a signature is signed by a given misbehaving user, while the only way to do so for group signatures requires revealing the signer of all signatures. Nevertheless, it is not tracing in a strict sense. For all existing schemes, T tracing agents need to recollect all N' signatures ever produced and perform RN' “checks” for R revoked users. This involves a high volume of transfer and computations. Increasing T increases the degree of parallelism for tracing but also the probability of “missing” some signatures in case some of the agents are dishonest.

  18. Nonintrusive Load Monitoring Based on Advanced Deep Learning and Novel Signature

    Directory of Open Access Journals (Sweden)

    Jihyun Kim

    2017-01-01

    Full Text Available Monitoring electricity consumption in the home is an important way to help reduce energy usage. Nonintrusive Load Monitoring (NILM is existing technique which helps us monitor electricity consumption effectively and costly. NILM is a promising approach to obtain estimates of the electrical power consumption of individual appliances from aggregate measurements of voltage and/or current in the distribution system. Among the previous studies, Hidden Markov Model (HMM based models have been studied very much. However, increasing appliances, multistate of appliances, and similar power consumption of appliances are three big issues in NILM recently. In this paper, we address these problems through providing our contributions as follows. First, we proposed state-of-the-art energy disaggregation based on Long Short-Term Memory Recurrent Neural Network (LSTM-RNN model and additional advanced deep learning. Second, we proposed a novel signature to improve classification performance of the proposed model in multistate appliance case. We applied the proposed model on two datasets such as UK-DALE and REDD. Via our experimental results, we have confirmed that our model outperforms the advanced model. Thus, we show that our combination between advanced deep learning and novel signature can be a robust solution to overcome NILM’s issues and improve the performance of load identification.

  19. Potential energy landscape signatures of slow dynamics in glass forming liquids

    DEFF Research Database (Denmark)

    Sastry, S.; Debenedetti, P. G.; Stillinger, F. H.

    1999-01-01

    We study the properties of local potential energy minima (‘inherent structures’) sampled by liquids at low temperatures as an approach to elucidating the mechanisms of the observed dynamical slowing down observed as the glass transition temperature is approached. This onset of slow dynamics...

  20. Signature Balancing

    NARCIS (Netherlands)

    Noordkamp, H.W.; Brink, M. van den

    2006-01-01

    Signatures are an important part of the design of a ship. In an ideal situation, signatures must be as low as possible. However, due to budget constraints it is most unlikely to reach this ideal situation. The arising question is which levels of signatures are optimal given the different scenarios

  1. Detection of chemical explosives using multiple photon signatures

    International Nuclear Information System (INIS)

    Loschke, K.W.; Dunn, W.L.

    2008-01-01

    Full text: A template-matching procedure to aid in rapid detection of improvised explosive devices (IEDs) is being investigated. Multiple photon-scattered and photon-induced positron annihilation radiation responses are being used as part of a photon-neutron signature-based radiation scanning (SBRS) approach (see companion reference for description of the neutron component), in an attempt to detect chemical explosives at safe standoff distances. Many past and present photon interrogation methods are based on imaging. Imaging techniques seek to determine at high special resolution the internal structure of a target of interest. Our technique simply seeks to determine if an unknown target contains a detectable amount of chemical explosives by comparing multiple responses (signatures) that depend on both density and composition of portions of a target. In the photon component, beams of photons are used to create back-streaming signatures, which are dependent on the density and composition of part of the target being interrogated. These signatures are compared to templates, which are collections of the same signatures if the interrogated volume contained a significant amount of explosives. The signature analysis produces a figure-of-merit and a standard deviation of the figure-of-merit. These two metrics are used to filter safe from dangerous targets. Experiments have been conducted that show that explosive surrogates (fertilizers) can be distinguished from several inert materials using these photon signatures, demonstrating that these signatures can be used effectively to help IEDs

  2. Genome signature analysis of thermal virus metagenomes reveals Archaea and thermophilic signatures

    Directory of Open Access Journals (Sweden)

    Pride David T

    2008-09-01

    Full Text Available Abstract Background Metagenomic analysis provides a rich source of biological information for otherwise intractable viral communities. However, study of viral metagenomes has been hampered by its nearly complete reliance on BLAST algorithms for identification of DNA sequences. We sought to develop algorithms for examination of viral metagenomes to identify the origin of sequences independent of BLAST algorithms. We chose viral metagenomes obtained from two hot springs, Bear Paw and Octopus, in Yellowstone National Park, as they represent simple microbial populations where comparatively large contigs were obtained. Thermal spring metagenomes have high proportions of sequences without significant Genbank homology, which has hampered identification of viruses and their linkage with hosts. To analyze each metagenome, we developed a method to classify DNA fragments using genome signature-based phylogenetic classification (GSPC, where metagenomic fragments are compared to a database of oligonucleotide signatures for all previously sequenced Bacteria, Archaea, and viruses. Results From both Bear Paw and Octopus hot springs, each assembled contig had more similarity to other metagenome contigs than to any sequenced microbial genome based on GSPC analysis, suggesting a genome signature common to each of these extreme environments. While viral metagenomes from Bear Paw and Octopus share some similarity, the genome signatures from each locale are largely unique. GSPC using a microbial database predicts most of the Octopus metagenome has archaeal signatures, while bacterial signatures predominate in Bear Paw; a finding consistent with those of Genbank BLAST. When using a viral database, the majority of the Octopus metagenome is predicted to belong to archaeal virus Families Globuloviridae and Fuselloviridae, while none of the Bear Paw metagenome is predicted to belong to archaeal viruses. As expected, when microbial and viral databases are combined, each of

  3. Science of Signatures Workshop on Secondary Ion Mass Spectrometry (SIMS) Applications July 24, 2012

    Energy Technology Data Exchange (ETDEWEB)

    Hickmott, Donald D [Los Alamos National Laboratory; Riciputi, Lee D [Los Alamos National Laboratory

    2012-07-23

    The science of signatures focus areas are: (1) Radiological and Nuclear; (2) Chemical and Materials (including explosives); (3) Biological - Signatures of Disease and Health; (4) Energy; (5) Climate; and (6) Space.

  4. Photonic quantum digital signatures operating over kilometer ranges in installed optical fiber

    Science.gov (United States)

    Collins, Robert J.; Fujiwara, Mikio; Amiri, Ryan; Honjo, Toshimori; Shimizu, Kaoru; Tamaki, Kiyoshi; Takeoka, Masahiro; Andersson, Erika; Buller, Gerald S.; Sasaki, Masahide

    2016-10-01

    The security of electronic communications is a topic that has gained noteworthy public interest in recent years. As a result, there is an increasing public recognition of the existence and importance of mathematically based approaches to digital security. Many of these implement digital signatures to ensure that a malicious party has not tampered with the message in transit, that a legitimate receiver can validate the identity of the signer and that messages are transferable. The security of most digital signature schemes relies on the assumed computational difficulty of solving certain mathematical problems. However, reports in the media have shown that certain implementations of such signature schemes are vulnerable to algorithmic breakthroughs and emerging quantum processing technologies. Indeed, even without quantum processors, the possibility remains that classical algorithmic breakthroughs will render these schemes insecure. There is ongoing research into information-theoretically secure signature schemes, where the security is guaranteed against an attacker with arbitrary computational resources. One such approach is quantum digital signatures. Quantum signature schemes can be made information-theoretically secure based on the laws of quantum mechanics while comparable classical protocols require additional resources such as anonymous broadcast and/or a trusted authority. Previously, most early demonstrations of quantum digital signatures required dedicated single-purpose hardware and operated over restricted ranges in a laboratory environment. Here, for the first time, we present a demonstration of quantum digital signatures conducted over several kilometers of installed optical fiber. The system reported here operates at a higher signature generation rate than previous fiber systems.

  5. Air-gun signature modelling considering the influence of mechanical structure factors

    International Nuclear Information System (INIS)

    Li, Guofa; Liu, Zhao; Wang, Jianhua; Cao, Mingqiang

    2014-01-01

    In marine seismic prospecting, as the air-gun array is usually composed of different types of air-guns, the signature modelling of different air-guns is particularly important to the array design. Different types of air-guns have different mechanical structures, which directly or indirectly affect the signatures. In order to simulate the influence of the mechanical structure, five parameters—the throttling constant, throttling power law exponent, mass release efficiency, fluid viscosity and heat transfer coefficient—are used in signature modelling. Through minimizing the energy relative error between the simulated and the measured signatures by the simulated annealing method, the five optimal parameters can be estimated. The method is tested in a field experiment, and the consistency between the simulated and the measured signatures is improved with the optimal parameters. (paper)

  6. KEA-71 Smart Current Signature Sensor (SCSS)

    Science.gov (United States)

    Perotti, Jose M.

    2010-01-01

    This slide presentation reviews the development and uses of the Smart Current Signature Sensor (SCSS), also known as the Valve Health Monitor (VHM) system. SCSS provides a way to not only monitor real-time the valve's operation in a non invasive manner, but also to monitor its health (Fault Detection and Isolation) and identify potential faults and/or degradation in the near future (Prediction/Prognosis). This technology approach is not only applicable for solenoid valves, and it could be extrapolated to other electrical components with repeatable electrical current signatures such as motors.

  7. Some Proxy Signature and Designated verifier Signature Schemes over Braid Groups

    OpenAIRE

    Lal, Sunder; Verma, Vandani

    2009-01-01

    Braids groups provide an alternative to number theoretic public cryptography and can be implemented quite efficiently. The paper proposes five signature schemes: Proxy Signature, Designated Verifier, Bi-Designated Verifier, Designated Verifier Proxy Signature And Bi-Designated Verifier Proxy Signature scheme based on braid groups. We also discuss the security aspects of each of the proposed schemes.

  8. A metagenomic approach to characterization of the vaginal microbiome signature in pregnancy.

    Science.gov (United States)

    Aagaard, Kjersti; Riehle, Kevin; Ma, Jun; Segata, Nicola; Mistretta, Toni-Ann; Coarfa, Cristian; Raza, Sabeen; Rosenbaum, Sean; Van den Veyver, Ignatia; Milosavljevic, Aleksandar; Gevers, Dirk; Huttenhower, Curtis; Petrosino, Joseph; Versalovic, James

    2012-01-01

    While current major national research efforts (i.e., the NIH Human Microbiome Project) will enable comprehensive metagenomic characterization of the adult human microbiota, how and when these diverse microbial communities take up residence in the host and during reproductive life are unexplored at a population level. Because microbial abundance and diversity might differ in pregnancy, we sought to generate comparative metagenomic signatures across gestational age strata. DNA was isolated from the vagina (introitus, posterior fornix, midvagina) and the V5V3 region of bacterial 16S rRNA genes were sequenced (454FLX Titanium platform). Sixty-eight samples from 24 healthy gravidae (18 to 40 confirmed weeks) were compared with 301 non-pregnant controls (60 subjects). Generated sequence data were quality filtered, taxonomically binned, normalized, and organized by phylogeny and into operational taxonomic units (OTU); principal coordinates analysis (PCoA) of the resultant beta diversity measures were used for visualization and analysis in association with sample clinical metadata. Altogether, 1.4 gigabytes of data containing >2.5 million reads (averaging 6,837 sequences/sample of 493 nt in length) were generated for computational analyses. Although gravidae were not excluded by virtue of a posterior fornix pH >4.5 at the time of screening, unique vaginal microbiome signature encompassing several specific OTUs and higher-level clades was nevertheless observed and confirmed using a combination of phylogenetic, non-phylogenetic, supervised, and unsupervised approaches. Both overall diversity and richness were reduced in pregnancy, with dominance of Lactobacillus species (L. iners crispatus, jensenii and johnsonii, and the orders Lactobacillales (and Lactobacillaceae family), Clostridiales, Bacteroidales, and Actinomycetales. This intergroup comparison using rigorous standardized sampling protocols and analytical methodologies provides robust initial evidence that the vaginal

  9. A metagenomic approach to characterization of the vaginal microbiome signature in pregnancy.

    Directory of Open Access Journals (Sweden)

    Kjersti Aagaard

    Full Text Available While current major national research efforts (i.e., the NIH Human Microbiome Project will enable comprehensive metagenomic characterization of the adult human microbiota, how and when these diverse microbial communities take up residence in the host and during reproductive life are unexplored at a population level. Because microbial abundance and diversity might differ in pregnancy, we sought to generate comparative metagenomic signatures across gestational age strata. DNA was isolated from the vagina (introitus, posterior fornix, midvagina and the V5V3 region of bacterial 16S rRNA genes were sequenced (454FLX Titanium platform. Sixty-eight samples from 24 healthy gravidae (18 to 40 confirmed weeks were compared with 301 non-pregnant controls (60 subjects. Generated sequence data were quality filtered, taxonomically binned, normalized, and organized by phylogeny and into operational taxonomic units (OTU; principal coordinates analysis (PCoA of the resultant beta diversity measures were used for visualization and analysis in association with sample clinical metadata. Altogether, 1.4 gigabytes of data containing >2.5 million reads (averaging 6,837 sequences/sample of 493 nt in length were generated for computational analyses. Although gravidae were not excluded by virtue of a posterior fornix pH >4.5 at the time of screening, unique vaginal microbiome signature encompassing several specific OTUs and higher-level clades was nevertheless observed and confirmed using a combination of phylogenetic, non-phylogenetic, supervised, and unsupervised approaches. Both overall diversity and richness were reduced in pregnancy, with dominance of Lactobacillus species (L. iners crispatus, jensenii and johnsonii, and the orders Lactobacillales (and Lactobacillaceae family, Clostridiales, Bacteroidales, and Actinomycetales. This intergroup comparison using rigorous standardized sampling protocols and analytical methodologies provides robust initial evidence that

  10. Localism and energy: Negotiating approaches to embedding resilience in energy systems

    International Nuclear Information System (INIS)

    O'Brien, Geoff; Hope, Alex

    2010-01-01

    Tensions are evident in energy policy objectives between centralised top-down interconnected energy systems and localised distributed approaches. Examination of these tensions indicates that a localised approach can address a systemic problem of interconnected systems; namely vulnerability. The challenge for energy policy is to realise the interrelated goals of energy security, climate and environmental targets and social and economic issues such as fuel poverty, whilst mitigating vulnerability. The effectiveness of conventional approaches is debatable. A transition to a low carbon pathway should focus on resilience, counter to vulnerability. This article draws from on-going work which evaluates the energy aspects of a Private Finance Initiative (PFI) project to refurbish and re-build a local authority's entire stock of sheltered accommodation to high environmental standards. Initial findings suggest that whereas more conventional procurement processes tend to increase systemic vulnerability, a user focussed process driven through PFI competitive dialogue is beginning to motivate some developers to adopt innovative approaches to energy system development.

  11. Radiation signatures from a locally energized flaring loop

    International Nuclear Information System (INIS)

    Emslie, A.G.; Vlahos, L.; and Institute for Plasma Research, Stanford University)

    1980-01-01

    We calculate the radiation signatures from a locally energized solar flare loop, at a variety of wavelengths. Our calculations depend strongly on the physical properties of the energy release mechanism which we qualitatively discuss

  12. An in fiber experimental approach to photonic quantum digital signatures that does not require quantum memory

    Science.gov (United States)

    Collins, Robert J.; Donaldon, Ross J.; Dunjko, Vedran; Wallden, Petros; Clarke, Patrick J.; Andersson, Erika; Jeffers, John; Buller, Gerald S.

    2014-10-01

    Classical digital signatures are commonly used in e-mail, electronic financial transactions and other forms of electronic communications to ensure that messages have not been tampered with in transit, and that messages are transferrable. The security of commonly used classical digital signature schemes relies on the computational difficulty of inverting certain mathematical functions. However, at present, there are no such one-way functions which have been proven to be hard to invert. With enough computational resources certain implementations of classical public key cryptosystems can be, and have been, broken with current technology. It is nevertheless possible to construct information-theoretically secure signature schemes, including quantum digital signature schemes. Quantum signature schemes can be made information theoretically secure based on the laws of quantum mechanics, while classical comparable protocols require additional resources such as secret communication and a trusted authority. Early demonstrations of quantum digital signatures required quantum memory, rendering them impractical at present. Our present implementation is based on a protocol that does not require quantum memory. It also uses the new technique of unambiguous quantum state elimination, Here we report experimental results for a test-bed system, recorded with a variety of different operating parameters, along with a discussion of aspects of the system security.

  13. Un système de vérification de signature manuscrite en ligne basé ...

    African Journals Online (AJOL)

    Administrateur

    online handwritten signature verification system. We model the handwritten signature by an analytical approach based on the Empirical Mode Decomposition (EMD). The organized system is provided with a training module and a base of signatures. The implemented evaluation protocol points out the interest of the adopted ...

  14. E-learning platform for automated testing of electronic circuits using signature analysis method

    Science.gov (United States)

    Gherghina, Cǎtǎlina; Bacivarov, Angelica; Bacivarov, Ioan C.; Petricǎ, Gabriel

    2016-12-01

    Dependability of electronic circuits can be ensured only through testing of circuit modules. This is done by generating test vectors and their application to the circuit. Testability should be viewed as a concerted effort to ensure maximum efficiency throughout the product life cycle, from conception and design stage, through production to repairs during products operating. In this paper, is presented the platform developed by authors for training for testability in electronics, in general and in using signature analysis method, in particular. The platform allows highlighting the two approaches in the field namely analog and digital signature of circuits. As a part of this e-learning platform, it has been developed a database for signatures of different electronic components meant to put into the spotlight different techniques implying fault detection, and from this there were also self-repairing techniques of the systems with this kind of components. An approach for realizing self-testing circuits based on MATLAB environment and using signature analysis method is proposed. This paper analyses the benefits of signature analysis method and simulates signature analyzer performance based on the use of pseudo-random sequences, too.

  15. Early signatures of regime shifts in gene expression dynamics

    Science.gov (United States)

    Pal, Mainak; Pal, Amit Kumar; Ghosh, Sayantari; Bose, Indrani

    2013-06-01

    Recently, a large number of studies have been carried out on the early signatures of sudden regime shifts in systems as diverse as ecosystems, financial markets, population biology and complex diseases. The signatures of regime shifts in gene expression dynamics are less systematically investigated. In this paper, we consider sudden regime shifts in the gene expression dynamics described by a fold-bifurcation model involving bistability and hysteresis. We consider two alternative models, models 1 and 2, of competence development in the bacterial population B. subtilis and determine some early signatures of the regime shifts between competence and noncompetence. We use both deterministic and stochastic formalisms for the purpose of our study. The early signatures studied include the critical slowing down as a transition point is approached, rising variance and the lag-1 autocorrelation function, skewness and a ratio of two mean first passage times. Some of the signatures could provide the experimental basis for distinguishing between bistability and excitability as the correct mechanism for the development of competence.

  16. Early signatures of regime shifts in gene expression dynamics

    International Nuclear Information System (INIS)

    Pal, Mainak; Pal, Amit Kumar; Ghosh, Sayantari; Bose, Indrani

    2013-01-01

    Recently, a large number of studies have been carried out on the early signatures of sudden regime shifts in systems as diverse as ecosystems, financial markets, population biology and complex diseases. The signatures of regime shifts in gene expression dynamics are less systematically investigated. In this paper, we consider sudden regime shifts in the gene expression dynamics described by a fold-bifurcation model involving bistability and hysteresis. We consider two alternative models, models 1 and 2, of competence development in the bacterial population B. subtilis and determine some early signatures of the regime shifts between competence and noncompetence. We use both deterministic and stochastic formalisms for the purpose of our study. The early signatures studied include the critical slowing down as a transition point is approached, rising variance and the lag-1 autocorrelation function, skewness and a ratio of two mean first passage times. Some of the signatures could provide the experimental basis for distinguishing between bistability and excitability as the correct mechanism for the development of competence. (paper)

  17. Signatures of Extended Storage of Used Nuclear Fuel Comprehensive Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Rauch, Eric Benton [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-09-21

    This report serves as a comprehensive overview of the Extended Storage of Used Nuclear Fuel work performed for the Material Protection, Accounting and Control Technologies campaign under the Department of Energy Office of Nuclear Energy. This paper describes a signature based on the source and fissile material distribution found within a population of used fuel assemblies combined with the neutron absorbers found within cask design that is unique to a specific cask with its specific arrangement of fuel. The paper describes all the steps used in producing and analyzing this signature from the beginning to the project end.

  18. Trace element ink spiking for signature authentication

    International Nuclear Information System (INIS)

    Hatzistavros, V.S.; Kallithrakas-Kontos, N.G.

    2008-01-01

    Signature authentication is a critical question in forensic document examination. Last years the evolution of personal computers made signature copying a quite easy task, so the development of new ways for signature authentication is crucial. In the present work a commercial ink was spiked with many trace elements in various concentrations. Inorganic and organometallic ink soluble compounds were used as spiking agents, whilst ink retained its initial properties. The spiked inks were used for paper writing and the documents were analyzed by a non destructive method, the energy dispersive X-ray fluorescence. The thin target model was proved right for quantitative analysis and a very good linear relationship of the intensity (X-ray signal) against concentration was estimated for all used elements. Intensity ratios between different elements in the same ink gave very stable results, independent on the writing alterations. The impact of time both to written document and prepared inks was also investigated. (author)

  19. Did Shakespeare write double falsehood? Identifying individuals by creating psychological signatures with text analysis.

    Science.gov (United States)

    Boyd, Ryan L; Pennebaker, James W

    2015-05-01

    More than 100 years after Shakespeare's death, Lewis Theobald published Double Falsehood, a play supposedly sourced from a lost play by Shakespeare and John Fletcher. Since its release, scholars have attempted to determine its true authorship. Using new approaches to language and psychological analysis, we examined Double Falsehood and the works of Theobald, Shakespeare, and Fletcher. Specifically, we created a psychological signature from each author's language and statistically compared the features of each signature with those of Double Falsehood's signature. Multiple analytic approaches converged in suggesting that Double Falsehood's psychological style and content architecture predominantly resemble those of Shakespeare, showing some similarity with Fletcher's signature and only traces of Theobald's. Closer inspection revealed that Shakespeare's influence is most apparent early in the play, whereas Fletcher's is most apparent in later acts. Double Falsehood has a psychological signature consistent with that expected to be present in the long-lost play The History of Cardenio, cowritten by Shakespeare and Fletcher. © The Author(s) 2015.

  20. Leak Signature Space: An Original Representation for Robust Leak Location in Water Distribution Networks

    Directory of Open Access Journals (Sweden)

    Myrna V. Casillas

    2015-03-01

    Full Text Available In this paper, an original model-based scheme for leak location using pressure sensors in water distribution networks is introduced. The proposed approach is based on a new representation called the Leak Signature Space (LSS that associates a specific signature to each leak location being minimally affected by leak magnitude. The LSS considers a linear model approximation of the relation between pressure residuals and leaks that is projected onto a selected hyperplane. This new approach allows to infer the location of a given leak by comparing the position of its signature with other leak signatures. Moreover, two ways of improving the method’s robustness are proposed. First, by associating a domain of influence to each signature and second, through a time horizon analysis. The efficiency of the method is highlighted by means of a real network using several scenarios involving different number of sensors and considering the presence of noise in the measurements.

  1. Estimating physiological skin parameters from hyperspectral signatures

    Science.gov (United States)

    Vyas, Saurabh; Banerjee, Amit; Burlina, Philippe

    2013-05-01

    We describe an approach for estimating human skin parameters, such as melanosome concentration, collagen concentration, oxygen saturation, and blood volume, using hyperspectral radiometric measurements (signatures) obtained from in vivo skin. We use a computational model based on Kubelka-Munk theory and the Fresnel equations. This model forward maps the skin parameters to a corresponding multiband reflectance spectra. Machine-learning-based regression is used to generate the inverse map, and hence estimate skin parameters from hyperspectral signatures. We test our methods using synthetic and in vivo skin signatures obtained in the visible through the short wave infrared domains from 24 patients of both genders and Caucasian, Asian, and African American ethnicities. Performance validation shows promising results: good agreement with the ground truth and well-established physiological precepts. These methods have potential use in the characterization of skin abnormalities and in minimally-invasive prescreening of malignant skin cancers.

  2. Regional level approach for increasing energy efficiency

    International Nuclear Information System (INIS)

    Viholainen, Juha; Luoranen, Mika; Väisänen, Sanni; Niskanen, Antti; Horttanainen, Mika; Soukka, Risto

    2016-01-01

    Highlights: • Comprehensive snapshot of regional energy system for decision makers. • Connecting regional sustainability targets and energy planning. • Involving local players in energy planning. - Abstract: Actions for increasing the renewable share in the energy supply and improving both production and end-use energy efficiency are often built into the regional level sustainability targets. Because of this, many local stakeholders such as local governments, energy producers and distributors, industry, and public and private sector operators require information on the current state and development aspects of the regional energy efficiency. The drawback is that an overall view on the focal energy system operators, their energy interests, and future energy service needs in the region is often not available for the stakeholders. To support the local energy planning and management of the regional energy services, an approach for increasing the regional energy efficiency is being introduced. The presented approach can be seen as a solid framework for gathering the required data for energy efficiency analysis and also evaluating the energy system development, planned improvement actions, and the required energy services at the region. This study defines the theoretical structure of the energy efficiency approach and the required steps for revealing such energy system improvement actions that support the regional energy plan. To demonstrate the use of the approach, a case study of a Finnish small-town of Lohja is presented. In the case example, possible actions linked to the regional energy targets were evaluated with energy efficiency analysis. The results of the case example are system specific, but the conducted study can be seen as a justified example of generating easily attainable and transparent information on the impacts of different improvement actions on the regional energy system.

  3. Streaming-based verification of XML signatures in SOAP messages

    DEFF Research Database (Denmark)

    Somorovsky, Juraj; Jensen, Meiko; Schwenk, Jörg

    2010-01-01

    approach for XML processing, the Web Services servers easily become a target of Denial-of-Service attacks. We present a solution for these problems: an external streaming-based WS-Security Gateway. Our implementation is capable of processing XML Signatures in SOAP messages using a streaming-based approach...

  4. Signature molecular descriptor : advanced applications.

    Energy Technology Data Exchange (ETDEWEB)

    Visco, Donald Patrick, Jr. (Tennessee Technological University, Cookeville, TN)

    2010-04-01

    In this work we report on the development of the Signature Molecular Descriptor (or Signature) for use in the solution of inverse design problems as well as in highthroughput screening applications. The ultimate goal of using Signature is to identify novel and non-intuitive chemical structures with optimal predicted properties for a given application. We demonstrate this in three studies: green solvent design, glucocorticoid receptor ligand design and the design of inhibitors for Factor XIa. In many areas of engineering, compounds are designed and/or modified in incremental ways which rely upon heuristics or institutional knowledge. Often multiple experiments are performed and the optimal compound is identified in this brute-force fashion. Perhaps a traditional chemical scaffold is identified and movement of a substituent group around a ring constitutes the whole of the design process. Also notably, a chemical being evaluated in one area might demonstrate properties very attractive in another area and serendipity was the mechanism for solution. In contrast to such approaches, computer-aided molecular design (CAMD) looks to encompass both experimental and heuristic-based knowledge into a strategy that will design a molecule on a computer to meet a given target. Depending on the algorithm employed, the molecule which is designed might be quite novel (re: no CAS registration number) and/or non-intuitive relative to what is known about the problem at hand. While CAMD is a fairly recent strategy (dating to the early 1980s), it contains a variety of bottlenecks and limitations which have prevented the technique from garnering more attention in the academic, governmental and industrial institutions. A main reason for this is how the molecules are described in the computer. This step can control how models are developed for the properties of interest on a given problem as well as how to go from an output of the algorithm to an actual chemical structure. This report

  5. Dynamic integration of residential building design and green energies : the Bireth approach : building integrated renewable energy total harvest approach

    Energy Technology Data Exchange (ETDEWEB)

    Cheung, K.P. [Hong Kong Univ., Hong Kong (China). Dept. of Architecture; Luk, C.L.P. [Chu Hai College of Higher Education, Hong Kong (China). Dept. of Architecture; Wong, S.T. [Hong Kong Univ., Hong Kong (China). Div. of Arts and Humanities, SPACE; Chung, S.L.; Fung, K.S.; Leung, M.F. [Hong Kong Inst. of Vocational Education, Hong Kong (China)

    2006-07-01

    Renewable energy sources that are commonly used in buildings include solar energy, wind energy and rainwater collection. High quality environmentally responsive residential buildings are designed to provide good insulation in winter and solar shading in summer. However, this study demonstrated that the green energy design in residential buildings is not usually well integrated. For example, windows with clear double or triple glazed glass, allow good penetration of sunlight during the day in winter, but are not further dynamically insulated for when the sun goes down to avoid heat loss from the building. Additionally, good solar static shading devices often block much needed daylight on cloudy winter days. These examples emphasize the lack of an integrated approach to gain the best advantage of green energies and to minimize energy costs in residential buildings. This study addressed issues facing the integrated approach with particular reference to the design of a small residential building in rural Beijing. The design included a new approach for interpreting a traditional Beijing court yard house in the modern Beijing rural context, while integrating multi-responding innovative green energy applications derived from first principles. This paper also presented a proposal for a village house in Hong Kong to harvest as much renewable energies as possible, primarily wind energy and solar energy, that come into contact with the building. The purpose was to work towards a renewable energy approach for buildings, namely the Bireth approach, which will benefit practically all houses by making them zero energy houses. The paper described the feasibility of integrating renewable energies in buildings to fulfill performance requirements such improving ventilation, providing warm interiors, drying clothes, or storing solar and wind energies into power batteries. The challenges facing the development of a proposed micro solar hot air turbine were also presented. 15 refs., 6

  6. Uncertainty in hydrological signatures for gauged and ungauged catchments

    Science.gov (United States)

    Westerberg, Ida K.; Wagener, Thorsten; Coxon, Gemma; McMillan, Hilary K.; Castellarin, Attilio; Montanari, Alberto; Freer, Jim

    2016-03-01

    Reliable information about hydrological behavior is needed for water-resource management and scientific investigations. Hydrological signatures quantify catchment behavior as index values, and can be predicted for ungauged catchments using a regionalization procedure. The prediction reliability is affected by data uncertainties for the gauged catchments used in prediction and by uncertainties in the regionalization procedure. We quantified signature uncertainty stemming from discharge data uncertainty for 43 UK catchments and propagated these uncertainties in signature regionalization, while accounting for regionalization uncertainty with a weighted-pooling-group approach. Discharge uncertainty was estimated using Monte Carlo sampling of multiple feasible rating curves. For each sampled rating curve, a discharge time series was calculated and used in deriving the gauged signature uncertainty distribution. We found that the gauged uncertainty varied with signature type, local measurement conditions and catchment behavior, with the highest uncertainties (median relative uncertainty ±30-40% across all catchments) for signatures measuring high- and low-flow magnitude and dynamics. Our regionalization method allowed assessing the role and relative magnitudes of the gauged and regionalized uncertainty sources in shaping the signature uncertainty distributions predicted for catchments treated as ungauged. We found that (1) if the gauged uncertainties were neglected there was a clear risk of overconditioning the regionalization inference, e.g., by attributing catchment differences resulting from gauged uncertainty to differences in catchment behavior, and (2) uncertainty in the regionalization results was lower for signatures measuring flow distribution (e.g., mean flow) than flow dynamics (e.g., autocorrelation), and for average flows (and then high flows) compared to low flows.

  7. Unconditionally Secure Quantum Signatures

    Directory of Open Access Journals (Sweden)

    Ryan Amiri

    2015-08-01

    Full Text Available Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols—signatures based on the Rivest–Adleman–Shamir (RSA algorithm, the digital signature algorithm (DSA, and the elliptic curve digital signature algorithm (ECDSA—are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally securesecure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  8. Supernova signatures of neutrino mass ordering

    Science.gov (United States)

    Scholberg, Kate

    2018-01-01

    A suite of detectors around the world is poised to measure the flavor-energy-time evolution of the ten-second burst of neutrinos from a core-collapse supernova occurring in the Milky Way or nearby. Next-generation detectors to be built in the next decade will have enhanced flavor sensitivity and statistics. Not only will the observation of this burst allow us to peer inside the dense matter of the extreme event and learn about the collapse processes and the birth of the remnant, but the neutrinos will bring information about neutrino properties themselves. This review surveys some of the physical signatures that the currently-unknown neutrino mass pattern will imprint on the observed neutrino events at Earth, emphasizing the most robust and least model-dependent signatures of mass ordering.

  9. Nonlinear analysis of dynamic signature

    Science.gov (United States)

    Rashidi, S.; Fallah, A.; Towhidkhah, F.

    2013-12-01

    Signature is a long trained motor skill resulting in well combination of segments like strokes and loops. It is a physical manifestation of complex motor processes. The problem, generally stated, is that how relative simplicity in behavior emerges from considerable complexity of perception-action system that produces behavior within an infinitely variable biomechanical and environmental context. To solve this problem, we present evidences which indicate that motor control dynamic in signing process is a chaotic process. This chaotic dynamic may explain a richer array of time series behavior in motor skill of signature. Nonlinear analysis is a powerful approach and suitable tool which seeks for characterizing dynamical systems through concepts such as fractal dimension and Lyapunov exponent. As a result, they can be analyzed in both horizontal and vertical for time series of position and velocity. We observed from the results that noninteger values for the correlation dimension indicates low dimensional deterministic dynamics. This result could be confirmed by using surrogate data tests. We have also used time series to calculate the largest Lyapunov exponent and obtain a positive value. These results constitute significant evidence that signature data are outcome of chaos in a nonlinear dynamical system of motor control.

  10. Searches for dark matter and new physics with unconventional signatures

    Science.gov (United States)

    Wulz, C.-E.; CMS Collaboration

    2017-07-01

    Selected results on searches for dark matter and unconventional signatures with the CMS detector are presented. Dark matter searches in channels with one or two jets, single photons, vector bosons, or top and bottom quarks combined with missing momentum in the final states are described. Unusual signatures such as displaced objects, disappearing or kinked tracks, delayed or stopped particles have also been explored. The analyses were performed with proton-proton data recorded at LHC centre-of-mass energies up to 13TeV.

  11. On the effectiveness of XML schema validation for countering XML signature wrapping attacks

    DEFF Research Database (Denmark)

    Jensen, Meiko; Meyer, Christopher; Somorovsky, Juraj

    2011-01-01

    In the context of security of Web Services, the XML Signature Wrapping attack technique has lately received increasing attention. Following a broad range of real-world exploits, general interest in applicable countermeasures rises. However, few approaches for countering these attacks have been...... investigated closely enough to make any claims about their effectiveness. In this paper, we analyze the effectiveness of the specific countermeasure of XML Schema validation in terms of fending Signature Wrapping attacks. We investigate the problems of XML Schema validation for Web Services messages......, and discuss the approach of Schema Hardening, a technique for strengthening XML Schema declarations. We conclude that XML Schema validation with a hardened XML Schema is capable of fending XML Signature Wrapping attacks, but bears some pitfalls and disadvantages as well....

  12. Radiation signatures

    International Nuclear Information System (INIS)

    McGlynn, S.P.; Varma, M.N.

    1992-01-01

    A new concept for modelling radiation risk is proposed. This concept is based on the proposal that the spectrum of molecular lesions, which we dub ''the radiation signature'', can be used to identify the quality of the causal radiation. If the proposal concerning radiation signatures can be established then, in principle, both prospective and retrospective risk determination can be assessed on an individual basis. A major goal of biophysical modelling is to relate physical events such as ionization, excitation, etc. to the production of radiation carcinogenesis. A description of the physical events is provided by track structure. The track structure is determined by radiation quality, and it can be considered to be the ''physical signature'' of the radiation. Unfortunately, the uniqueness characteristics of this signature are dissipated in biological systems in ∼10 -9 s. Nonetheless, it is our contention that this physical disturbance of the biological system eventuates later, at ∼10 0 s, in molecular lesion spectra which also characterize the causal radiation. (author)

  13. New Physics Opportunities in the Boosted Di-Higgs-Boson Plus Missing Transverse Energy Signature.

    Science.gov (United States)

    Kang, Zhaofeng; Ko, P; Li, Jinmian

    2016-04-01

    The Higgs field in the standard model may couple to new physics sectors related to dark matter and/or massive neutrinos. In this Letter we propose a novel signature, the boosted di-Higgs-boson plus E_{T} (which is either a dark matter or neutrino), to probe those new physics sectors. In a large class of models, in particular, the supersymmetric standard models and low scale seesaw mechanisms, this signature can play a key role. The signature has a clear background, and at the sqrt[s]=14  TeV high luminosity LHC, we can probe it with a production rate as low as ∼0.1  fb. We apply it to benchmark models, supersymmetry in the bino-Higgsino limit, the canonical seesaw model, and the little Higgs model, finding that the masses of the Higgsino, right-handed neutrino, and heavy vector boson can be probed up to ∼500, 650, and 900 GeV, respectively.

  14. Signatures of unstable semiclassical trajectories in tunneling

    International Nuclear Information System (INIS)

    Levkov, D G; Panin, A G; Sibiryakov, S M

    2009-01-01

    It was found recently that processes of multidimensional tunneling are generally described at high energies by unstable semiclassical trajectories. We study two observational signatures related to the instability of trajectories. First, we find an additional power-law dependence of the tunneling probability on the semiclassical parameter as compared to the standard case of potential tunneling. The second signature is a substantial widening of the probability distribution over final-state quantum numbers. These effects are studied using a modified semiclassical technique which incorporates stabilization of the tunneling trajectories. The technique is derived from first principles. We obtain expressions for the inclusive and exclusive tunneling probabilities in the case of unstable semiclassical trajectories. We also investigate the 'phase transition' between the cases of stable and unstable trajectories across certain 'critical' values of energy. Finally, we derive the relation between the semiclassical probabilities of tunneling from the low-lying and highly excited initial states. This puts on firm ground a conjecture made previously in the semiclassical description of collision-induced tunneling in field theory

  15. The effects of different representations on static structure analysis of computer malware signatures.

    Science.gov (United States)

    Narayanan, Ajit; Chen, Yi; Pang, Shaoning; Tao, Ban

    2013-01-01

    The continuous growth of malware presents a problem for internet computing due to increasingly sophisticated techniques for disguising malicious code through mutation and the time required to identify signatures for use by antiviral software systems (AVS). Malware modelling has focused primarily on semantics due to the intended actions and behaviours of viral and worm code. The aim of this paper is to evaluate a static structure approach to malware modelling using the growing malware signature databases now available. We show that, if malware signatures are represented as artificial protein sequences, it is possible to apply standard sequence alignment techniques in bioinformatics to improve accuracy of distinguishing between worm and virus signatures. Moreover, aligned signature sequences can be mined through traditional data mining techniques to extract metasignatures that help to distinguish between viral and worm signatures. All bioinformatics and data mining analysis were performed on publicly available tools and Weka.

  16. Purchasing-power-parity (PPP) approach to energy-efficiency measurement: implications for energy and environmental policy

    International Nuclear Information System (INIS)

    Birol, Fatih; Okogu, B.E.

    1997-01-01

    The weaknesses of the traditional measure of national output are well known and, in recent years, efforts to find more appropriate alternatives have intensified. One such methodology is the PPP approach which may capture the real value of the GDP. In general, this approach raises the incomes of developing countries by a substantial amount, and this has serious implications for energy indicators on which policies are usually based. A further problem is that non-commercial energy is usually left out of energy-intensity calculations. We analyze the issue of energy-efficiency and carry out calculations based on three approaches: the traditional approach, the PPP-based income approach and an approach which includes non-commercial energy. The results confirm the limitations of using the PPP approach, as its results in a spuriously high energy-efficiency level suggesting high technological sophistication for developing countries. The inclusion of non-commercial energy gives more complete picture. The main conclusion is that applying the PPP method in energy-intensity calculations may be misleading. (Author)

  17. Hyperspectral signature analysis of skin parameters

    Science.gov (United States)

    Vyas, Saurabh; Banerjee, Amit; Garza, Luis; Kang, Sewon; Burlina, Philippe

    2013-02-01

    The temporal analysis of changes in biological skin parameters, including melanosome concentration, collagen concentration and blood oxygenation, may serve as a valuable tool in diagnosing the progression of malignant skin cancers and in understanding the pathophysiology of cancerous tumors. Quantitative knowledge of these parameters can also be useful in applications such as wound assessment, and point-of-care diagnostics, amongst others. We propose an approach to estimate in vivo skin parameters using a forward computational model based on Kubelka-Munk theory and the Fresnel Equations. We use this model to map the skin parameters to their corresponding hyperspectral signature. We then use machine learning based regression to develop an inverse map from hyperspectral signatures to skin parameters. In particular, we employ support vector machine based regression to estimate the in vivo skin parameters given their corresponding hyperspectral signature. We build on our work from SPIE 2012, and validate our methodology on an in vivo dataset. This dataset consists of 241 signatures collected from in vivo hyperspectral imaging of patients of both genders and Caucasian, Asian and African American ethnicities. In addition, we also extend our methodology past the visible region and through the short-wave infrared region of the electromagnetic spectrum. We find promising results when comparing the estimated skin parameters to the ground truth, demonstrating good agreement with well-established physiological precepts. This methodology can have potential use in non-invasive skin anomaly detection and for developing minimally invasive pre-screening tools.

  18. Quantum signature in heavy-ion pion production

    International Nuclear Information System (INIS)

    Buvel, R.L.

    1985-01-01

    A revised model for pion production in heavy-ion peripheral collisions is presented. The pion-production mechanism investigated here is a two step process involving the formation and subsequent decay of an isobar resonance in the projectile nucleus. The independent-particle shell model with harmonic oscillator states is used to approximate the internal structure of the nucleus. The inclusion of the internal structure of the projectile nucleus led to the discovery of a quantum signature in the pion-production differential cross section. The quantum signature involves a matching condition where the pion-production differential cross section goes to zero for a particular value of the pion kinetic energy. The theory is compared to a recent experiment, but the results of this comparison are inconclusive

  19. Search for signatures of phase transition and critical point in heavy ion collisions

    International Nuclear Information System (INIS)

    Tokarev, M.V.; Kechechyan, A.; Alakhverdyants, A.; Zborovsky, I.

    2011-01-01

    The general concepts in the critical phenomena related with the notions of 'scaling' and 'universality' are considered. Behavior of various systems near a phase transition is displayed. Search for clear signatures of the phase transition of the nuclear matter and location of the critical point in heavy ion collisions (HIC) is discussed. The experimental data on inclusive spectra measured in HIC at RHIC and SPS over a wide range of energies s NN 1/2 = 9-200 GeV are analyzed in the framework of z-scaling. A microscopic scenario of the constituent interactions is presented. Dependence of the energy loss on the momentum of the produced hadron, energy and centrality of the collision is studied. Self-similarity of the constituent interactions described in terms of momentum fractions is used to characterize the nuclear medium by 'specific heat' and colliding nuclei by fractal dimensions. Preferable kinematical regions to search for signatures of the phase transition of the nuclear matter produced in HIC are discussed. Discontinuity of the 'specific heat' is assumed to be a signature of the phase transition and the critical point

  20. An energy management approach of hybrid vehicles using traffic preview information for energy saving

    International Nuclear Information System (INIS)

    Zheng, Chunhua; Xu, Guoqing; Xu, Kun; Pan, Zhongming; Liang, Quan

    2015-01-01

    Highlights: • Energy management approach of hybrid vehicles using traffic preview information. • Vehicle velocity profile and fuel consumption are optimized at the same time. • It is proved that a further energy saving is achieved by the proposed approach. • The proposed approach is useful especially for autonomous hybrid vehicles. - Abstract: The traffic preview information is very helpful for hybrid vehicles when distributing the power requirement of the vehicle to power sources and when determining the next driving route of the vehicle. In this research, an energy management approach for hybrid vehicles is proposed, which optimizes the vehicle velocity profile while minimizing the fuel consumption with the help of the traffic preview information, so that a further energy saving for hybrid vehicles can be achieved. The Pontryagin’s Minimum Principle (PMP) is adopted on the proposed approach. A fuel cell hybrid vehicle (FCHV) is selected as an example, and the proposed energy management approach is applied to the FCHV in a computer simulation environment for the offline and online cases respectively. Simulation results show that the fuel economy of the FCHV is improved by the proposed energy management approach compared to a benchmark case where the driving cycle is fixed and only the hybrid power split (allocation) ratio is optimized. The proposed energy management approach is useful especially for the autonomous hybrid vehicles.

  1. Separation of zeros for source signature identification under reverberant path conditions.

    Science.gov (United States)

    Hasegawa, Tomomi; Tohyama, Mikio

    2011-10-01

    This paper presents an approach to distinguishing the zeros representing a sound source from those representing the transfer function on the basis of Lyon's residue-sign model. In machinery noise diagnostics, the source signature must be separated from observation records under reverberant path conditions. In numerical examples and an experimental piano-string vibration analysis, the modal responses could be synthesized by using clustered line-spectrum modeling. The modeling error represented the source signature subject to the source characteristics being given by a finite impulse response. The modeling error can be interpreted as a remainder function necessary for the zeros representing the source signature. © 2011 Acoustical Society of America

  2. A New Adaptive Structural Signature for Symbol Recognition by Using a Galois Lattice as a Classifier.

    Science.gov (United States)

    Coustaty, M; Bertet, K; Visani, M; Ogier, J

    2011-08-01

    In this paper, we propose a new approach for symbol recognition using structural signatures and a Galois lattice as a classifier. The structural signatures are based on topological graphs computed from segments which are extracted from the symbol images by using an adapted Hough transform. These structural signatures-that can be seen as dynamic paths which carry high-level information-are robust toward various transformations. They are classified by using a Galois lattice as a classifier. The performance of the proposed approach is evaluated based on the GREC'03 symbol database, and the experimental results we obtain are encouraging.

  3. Personalized Energy Reduction Cyber-Physical System (PERCS): A gamified end-user platform for energy efficiency and demand response.

    Energy Technology Data Exchange (ETDEWEB)

    Sintov, Nicole; Orosz, Michael; Schultz, P. Wesley

    2015-01-01

    The mission of the Personalized Energy Reduction Cyber-physical System (PERCS) is to create new possibilities for improving building operating efficiency, enhancing grid reliability, avoiding costly power interruptions, and mitigating greenhouse gas emissions. PERCS proposes to achieve these outcomes by engaging building occupants as partners in a user-centered smart service platform. Using a non-intrusive load monitoring approach, PERCS uses a single sensing point in each home to capture smart electric meter data in real time. The household energy signal is disaggregated into individual load signatures of common appliances (e.g., air conditioners), yielding near real-time appliance-level energy information. Users interact with PERCS via a mobile phone platform that provides household- and appliance-level energy feedback, tailored recommendations, and a competitive game tied to energy use and behavioral changes. PERCS challenges traditional energy management approaches by directly engaging occupant as key elements in a technological system.

  4. Blinding for unanticipated signatures

    NARCIS (Netherlands)

    D. Chaum (David)

    1987-01-01

    textabstractPreviously known blind signature systems require an amount of computation at least proportional to the number of signature types, and also that the number of such types be fixed in advance. These requirements are not practical in some applications. Here, a new blind signature technique

  5. A seesaw-type approach for enhancing nonlinear energy harvesting

    Science.gov (United States)

    Deng, Huaxia; Wang, Zhemin; Du, Yu; Zhang, Jin; Ma, Mengchao; Zhong, Xiang

    2018-05-01

    Harvesting sustainable mechanical energy is the ultimate objective of nonlinear energy harvesters. However, overcoming potential barriers, especially without the use of extra excitations, poses a great challenge for the development of nonlinear generators. In contrast to the existing methods, which typically modify the barrier height or utilize additional excitations, this letter proposes a seesaw-type approach to facilitate escape from potential wells by transfer of internal energy, even under low-intensity excitation. This approach is adopted in the design of a seesaw-type nonlinear piezoelectric energy harvester and the energy transfer process is analyzed by deriving expressions for the energy to reveal the working mechanism. Comparison experiments demonstrate that this approach improves energy harvesting in terms of an increase in the working frequency bandwidth by a factor of 60.14 and an increase in the maximum output voltage by a factor of 5.1. Moreover, the output power is increased by a factor of 51.3, which indicates that this approach significantly improves energy collection efficiency. This seesaw-type approach provides a welcome boost to the development of renewable energy collection methods by improving the efficiency of harvesting of low-intensity ambient mechanical energy.

  6. Aging in biometrics: an experimental analysis on on-line signature.

    Directory of Open Access Journals (Sweden)

    Javier Galbally

    Full Text Available The first consistent and reproducible evaluation of the effect of aging on dynamic signature is reported. Experiments are carried out on a database generated from two previous datasets which were acquired, under very similar conditions, in 6 sessions distributed in a 15-month time span. Three different systems, representing the current most popular approaches in signature recognition, are used in the experiments, proving the degradation suffered by this trait with the passing of time. Several template update strategies are also studied as possible measures to reduce the impact of aging on the system's performance. Different results regarding the way in which signatures tend to change with time, and their most and least stable features, are also given.

  7. The Signatures of the Invisible exhibition in Geneva

    CERN Multimedia

    Patrice Loïez

    2002-01-01

    The artist Paola Pivi with her work at the Signatures of the Invisible exhibition in Geneva during February 2002. This piece with needles suspended on nylon thread 'detects' people as they approach. The exhibition was for art inspired by research carried out at CERN.

  8. 1 CFR 18.7 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 1 General Provisions 1 2010-01-01 2010-01-01 false Signature. 18.7 Section 18.7 General Provisions... PREPARATION AND TRANSMITTAL OF DOCUMENTS GENERALLY § 18.7 Signature. The original and each duplicate original... stamped beneath the signature. Initialed or impressed signatures will not be accepted. Documents submitted...

  9. Attribute-Based Digital Signature System

    NARCIS (Netherlands)

    Ibraimi, L.; Asim, Muhammad; Petkovic, M.

    2011-01-01

    An attribute-based digital signature system comprises a signature generation unit (1) for signing a message (m) by generating a signature (s) based on a user secret key (SK) associated with a set of user attributes, wherein the signature generation unit (1) is arranged for combining the user secret

  10. Hyperheat: a thermal signature model for super- and hypersonic missiles

    Science.gov (United States)

    van Binsbergen, S. A.; van Zelderen, B.; Veraar, R. G.; Bouquet, F.; Halswijk, W. H. C.; Schleijpen, H. M. A.

    2017-10-01

    In performance prediction of IR sensor systems for missile detection, apart from the sensor specifications, target signatures are essential variables. Very often, for velocities up to Mach 2-2.5, a simple model based on the aerodynamic heating of a perfect gas was used to calculate the temperatures of missile targets. This typically results in an overestimate of the target temperature with correspondingly large infrared signatures and detection ranges. Especially for even higher velocities, this approach is no longer accurate. Alternatives like CFD calculations typically require more complex sets of inputs and significantly more computing power. The MATLAB code Hyperheat was developed to calculate the time-resolved skin temperature of axisymmetric high speed missiles during flight, taking into account the behaviour of non-perfect gas and proper heat transfer to the missile surface. Allowing for variations in parameters like missile shape, altitude, atmospheric profile, angle of attack, flight duration and super- and hypersonic velocities up to Mach 30 enables more accurate calculations of the actual target temperature. The model calculates a map of the skin temperature of the missile, which is updated over the flight time of the missile. The sets of skin temperature maps are calculated within minutes, even for >100 km trajectories, and can be easily converted in thermal infrared signatures for further processing. This paper discusses the approach taken in Hyperheat. Then, the thermal signature of a set of typical missile threats is calculated using both the simple aerodynamic heating model and the Hyperheat code. The respective infrared signatures are compared, as well as the difference in the corresponding calculated detection ranges.

  11. Computational approaches to energy materials

    CERN Document Server

    Catlow, Richard; Walsh, Aron

    2013-01-01

    The development of materials for clean and efficient energy generation and storage is one of the most rapidly developing, multi-disciplinary areas of contemporary science, driven primarily by concerns over global warming, diminishing fossil-fuel reserves, the need for energy security, and increasing consumer demand for portable electronics. Computational methods are now an integral and indispensable part of the materials characterisation and development process.   Computational Approaches to Energy Materials presents a detailed survey of current computational techniques for the

  12. Study on the high-spin states and signature inversion of odd-odd nucleus 170Ta

    International Nuclear Information System (INIS)

    Deng Fuguo; Zhou Hongyu; Sun Huibin; Lu Jingbin; Zhao Guangyi; Yin Lichang; Liu Yunzuo

    2002-01-01

    The high-spin states of odd-odd nucleus 170 Ta were populated via the 155 Gd( 19 F, 4n) 170 Ta reaction with beam energy of 97 MeV provided by the HI-13 tandem accelerator of China Institute of Atomic Energy. Three rotational bands have been pushed to higher spin states and the signature inversion point of the semidecoupled band based on the πh 9/2 1/2 - [541] direct x νi 13/2 configuration has been observed to be 19.5 ℎ. The systematic features of the signature inversion in semidecoupled bands in odd-odd rare earth nuclei were summarized. The systematic differences of signature inversion, especially the difference in the energy splitting between the yrast hands and the semidecoupled hands in odd-odd rare earth nuclei are pointed out and discussed for the first time. It seems that p-n interaction between the odd proton and odd neutron in the odd-odd nuclei plays an important role

  13. L1000FWD: Fireworks visualization of drug-induced transcriptomic signatures.

    Science.gov (United States)

    Wang, Zichen; Lachmann, Alexander; Keenan, Alexandra B; Ma'ayan, Avi

    2018-02-06

    As part of the NIH Library of Integrated Network-based Cellular Signatures (LINCS) program, hundreds of thousands of transcriptomic signatures were generated with the L1000 technology, profiling the response of human cell lines to over 20,000 small molecule compounds. This effort is a promising approach toward revealing the mechanisms-of-action (MOA) for marketed drugs and other less studied potential therapeutic compounds. L1000 fireworks display (L1000FWD) is a web application that provides interactive visualization of over 16,000 drug and small-molecule induced gene expression signatures. L1000FWD enables coloring of signatures by different attributes such as cell type, time point, concentration, as well as drug attributes such as MOA and clinical phase. Signature similarity search is implemented to enable the search for mimicking or opposing signatures given as input of up and down gene sets. Each point on the L1000FWD interactive map is linked to a signature landing page, which provides multifaceted knowledge from various sources about the signature and the drug. Notably such information includes most frequent diagnoses, co-prescribed drugs and age distribution of prescriptions as extracted from the Mount Sinai Health System electronic medical records (EMR). Overall, L1000FWD serves as a platform for identifying functions for novel small molecules using unsupervised clustering, as well as for exploring drug MOA. L1000FWD is freely accessible at: http://amp.pharm.mssm.edu/L1000FWD. avi.maayan@mssm.edu. Supplementary data are available at Bioinformatics online. © The Author (2018). Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  14. Fair quantum blind signatures

    International Nuclear Information System (INIS)

    Tian-Yin, Wang; Qiao-Yan, Wen

    2010-01-01

    We present a new fair blind signature scheme based on the fundamental properties of quantum mechanics. In addition, we analyse the security of this scheme, and show that it is not possible to forge valid blind signatures. Moreover, comparisons between this scheme and public key blind signature schemes are also discussed. (general)

  15. A signature for isoscalar-spin transitions in (d vector, d' vector) scattering at intermediate energy

    International Nuclear Information System (INIS)

    Morlet, M.; Bimbot, L.; Guillot, J.; Johnson, B.N.; Jourdan, F.; Langevin-Joliot, H.; Marty, N.; Rosier, L.; Wiele, J. van de; Willis, A.; Beatty, D.; Edwards, G.; Fergerson, R.W.; Glashausser, C.; Green, A.; Djalali, C.; Johnson, B.N.; Tomasi-Gustafsson, E.; Youn, M.Y.

    1991-05-01

    Three different signatures for isoscalar spin transitions in nuclei have been tested in the 12 C(d,d') 12 C reaction at 400 MeV. These signatures have values close to zero for the natural parity states, and range from 0.22 to 0.50 for the ΔS=1 ΔT=0, 12.7 MeV state. Preliminary results on 40 Ca(d,d') at 400 MeV are also presented. (author) 26 refs., 4 figs., 1 tab

  16. Interactions between renewable energy policy and renewable energy industrial policy: A critical analysis of China's policy approach to renewable energies

    International Nuclear Information System (INIS)

    Zhang, Sufang; Andrews-Speed, Philip; Zhao, Xiaoli; He, Yongxiu

    2013-01-01

    This paper analyzes China's policy approach to renewable energies and assesses how effectively China has met the ideal of appropriate interactions between renewable energy policy and renewable energy industrial policy. First we briefly discuss the interactions between these two policies. Then we outline China's key renewable energy and renewable industrial policies and find that China's government has well recognized the need for this policy interaction. After that, we study the achievements and problems in China's wind and solar PV sector during 2005–2012 and argue that China's policy approach to renewable energies has placed priority first on developing a renewable energy manufacturing industry and only second on renewable energy itself, and it has not effectively met the ideal of appropriate interactions between renewable energy policy and renewable energy industrial policy. Lastly, we make an in-depth analysis of the three ideas underlying this policy approach, that is, the green development idea, the low-carbon leadership idea and indigenous innovation idea. We conclude that Chinas' policy approach to renewable energies needs to enhance the interactions between renewable energy policy and renewable energy industrial policy. The paper contributes to a deeper understanding of China's policy strategy toward renewable energies. -- Highlights: •Interactions between renewable energy policy and renewable energy industrial policy are discussed. •China's key renewable energy and renewable energy industrial policies are outlined. •Two empirical cases illustrate China's policy approach to renewable energies. •We argue that China needs to enhance the interactions between the two policies. •Three ideas underlie China's policy approach to renewable energies

  17. The Search for Hydrologic Signatures: The Effect of Data Transformations on Bayesian Model Calibration

    Science.gov (United States)

    Sadegh, M.; Vrugt, J. A.

    2011-12-01

    In the past few years, several contributions have begun to appear in the hydrologic literature that introduced and analyzed the benefits of using a signature based approach to watershed analysis. This signature-based approach abandons the standard single criteria model-data fitting paradigm in favor of a diagnostic approach that better extracts the available information from the available data. Despite the prospects of this new viewpoint, rather ad-hoc criteria have hitherto been proposed to improve watershed modeling. Here, we aim to provide a proper mathematical foundation to signature based analysis. We analyze the information content of different data transformation by analyzing their convergence speed with Markov Chain Monte Carlo (MCMC) simulation using the Generalized Likelihood function of Schousp and Vrugt (2010). We compare the information content of the original discharge data against a simple square root and Box-Cox transformation of the streamflow data. We benchmark these results against wavelet and flow duration curve transformations that temporally disaggregate the discharge data. Our results conclusive demonstrate that wavelet transformations and flow duration curves significantly reduce the information content of the streamflow data and consequently unnecessarily increase the uncertainty of the HYMOD model parameters. Hydrologic signatures thus need to be found in the original data, without temporal disaggregation.

  18. China's energy consumption: A perspective from Divisia aggregation approach

    International Nuclear Information System (INIS)

    Liao, Hua; Wei, Yi-Ming

    2010-01-01

    China's total energy consumption, according to the official data, decreased impressively during 1997-1998 and increased sharply during 2003-2007, which in turn resulted in energy intensity fluctuation. Many literatures explained this ''unusual phenomenon'' from the perspectives of technical change, economic structure shifting and statistical data quality. They measured aggregate energy in thermal units by using linear summation approaches. In this paper, from the perspectives of heterogeneity and imperfect substitutability among diverse energy types, we further examine China's aggregate energy consumption by using Divisia (Sato-Vartia) approach. The results show that China's aggregate energy consumption and intensity fluctuated slightly less than values calculated by using conventional linear approaches, and the ''unusual phenomenon'' is partly explained. It also implies that China's energy intensity changes in 2006-2007 are slightly more optimistic than those officially reported, and the official communique of provincial energy intensity reduction achievements are partly bias. Some provincial achievement are underestimated or overestimated on some provinces. Our empirical results are also helpful to further research, such as energy-economic modeling, energy price elasticity, and elasticity of substitution among capital-labor-energy-material (KLEM). The difficulties or defects when using Divisia approach are also discussed in this paper. (author)

  19. US residential energy demand and energy efficiency: A stochastic demand frontier approach

    International Nuclear Information System (INIS)

    Filippini, Massimo; Hunt, Lester C.

    2012-01-01

    This paper estimates a US frontier residential aggregate energy demand function using panel data for 48 ‘states’ over the period 1995 to 2007 using stochastic frontier analysis (SFA). Utilizing an econometric energy demand model, the (in)efficiency of each state is modeled and it is argued that this represents a measure of the inefficient use of residential energy in each state (i.e. ‘waste energy’). This underlying efficiency for the US is therefore observed for each state as well as the relative efficiency across the states. Moreover, the analysis suggests that energy intensity is not necessarily a good indicator of energy efficiency, whereas by controlling for a range of economic and other factors, the measure of energy efficiency obtained via this approach is. This is a novel approach to model residential energy demand and efficiency and it is arguably particularly relevant given current US energy policy discussions related to energy efficiency.

  20. Quantum messages with signatures forgeable in arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Kim, Taewan; Choi, Jeong Woon; Jho, Nam-Su; Lee, Soojoon

    2015-01-01

    Even though a method to perfectly sign quantum messages has not been known, the arbitrated quantum signature scheme has been considered as one of the good candidates. However, its forgery problem has been an obstacle to the scheme becoming a successful method. In this paper, we consider one situation, which is slightly different from the forgery problem, that we use to check whether at least one quantum message with signature can be forged in a given scheme, although all the messages cannot be forged. If there are only a finite number of forgeable quantum messages in the scheme, then the scheme can be secured against the forgery attack by not sending forgeable quantum messages, and so our situation does not directly imply that we check whether the scheme is secure against the attack. However, if users run a given scheme without any consideration of forgeable quantum messages, then a sender might transmit such forgeable messages to a receiver and in such a case an attacker can forge the messages if the attacker knows them. Thus it is important and necessary to look into forgeable quantum messages. We show here that there always exists such a forgeable quantum message-signature pair for every known scheme with quantum encryption and rotation, and numerically show that there are no forgeable quantum message-signature pairs that exist in an arbitrated quantum signature scheme. (paper)

  1. Searches for Electroweak Signatures of Supersymmetry at ATLAS and CMS

    CERN Document Server

    Khoo, Teng Jian; The ATLAS collaboration

    2018-01-01

    Searches for strongly-produced superparticles at the Large Hadron Collider have excluded gluinos and squarks of all generations up to the TeV scale. While limited by statistics, electroweak signatures remain less thoroughly explored, and in particular the Higgsino sector has proven challenging. Conventional searches for leptons associated with missing transverse momentum do not fully cover the phase space, requiring new approaches to extend experimental sensitivity. Dedicated reconstruction techniques address the challenge posed by mass-degenerate spectra. By looking beyond the assumption of leptonic signatures, searches for gauge-mediated supersymmetry have broken new ground.

  2. ''Electron Conic'' Signatures observed in the nightside auroral zone and over the polar cap

    International Nuclear Information System (INIS)

    Menietti, J.D.; Burch, J.L.

    1985-01-01

    A preliminary search of the Dynamics Explorer 1 high-altitude plasma instrument data base has yielded examples of ''electron conic'' signatures. The three example passes show an association with regions of downward electron acceleration and upward ion beams, but this is not true of all the electron conic events. The electron conic signatures are clearly discernible on energy-flux-versus-time color spectrograms as pairs of discrete vertical bands which are symmetric about a pitch angle of approximately 180 0 . One of the examples is a polar cap pass with electron conic signatures observed at invariant latitudes from 84 0 to 75 0 . The other two cases are nightside auroral zone passes in which the regions of detectable electron conics are spatially more confined, covering only about 1 0 in invariant latitude. The conic signatures have been found at energies that range from 50 eV 0 is larger than expected for a loss cone feature. If the electrons conserve the first adiabatic invariant in a dipole magnetic field, and in some cases a parallel electric field, the mirroring altitude varies between about 500 km and 8000 km, which is above the atmospheric loss region. For this reason, and in analogy with the formation of ion conics, we suggest that the conic signatures are produced by heating of the electrons perpendicular to the magnetic field

  3. Possible signatures of the hadronisation scale in parton jets

    International Nuclear Information System (INIS)

    Ochs, W.

    1987-01-01

    Models for hardon production in hard collisions differ widely in the energy scale characteristic of the transition from the primary partonic to the secondary hadronic phase of jet evolution. We investigate possible experimental signatures for the existence of both phases. In particular, we consider multiplicity and energy moments, long range charge correlations and angular correlations as a function of total energy or near the exclusive two body limit in e + e - annihilation and deep inelastic scattering processes. The possibility of a dual correspondence between hadronic and partonic states is discussed. (orig.)

  4. Comparing performance of standard and iterative linear unmixing methods for hyperspectral signatures

    Science.gov (United States)

    Gault, Travis R.; Jansen, Melissa E.; DeCoster, Mallory E.; Jansing, E. David; Rodriguez, Benjamin M.

    2016-05-01

    Linear unmixing is a method of decomposing a mixed signature to determine the component materials that are present in sensor's field of view, along with the abundances at which they occur. Linear unmixing assumes that energy from the materials in the field of view is mixed in a linear fashion across the spectrum of interest. Traditional unmixing methods can take advantage of adjacent pixels in the decomposition algorithm, but is not the case for point sensors. This paper explores several iterative and non-iterative methods for linear unmixing, and examines their effectiveness at identifying the individual signatures that make up simulated single pixel mixed signatures, along with their corresponding abundances. The major hurdle addressed in the proposed method is that no neighboring pixel information is available for the spectral signature of interest. Testing is performed using two collections of spectral signatures from the Johns Hopkins University Applied Physics Laboratory's Signatures Database software (SigDB): a hand-selected small dataset of 25 distinct signatures from a larger dataset of approximately 1600 pure visible/near-infrared/short-wave-infrared (VIS/NIR/SWIR) spectra. Simulated spectra are created with three and four material mixtures randomly drawn from a dataset originating from SigDB, where the abundance of one material is swept in 10% increments from 10% to 90%with the abundances of the other materials equally divided amongst the remainder. For the smaller dataset of 25 signatures, all combinations of three or four materials are used to create simulated spectra, from which the accuracy of materials returned, as well as the correctness of the abundances, is compared to the inputs. The experiment is expanded to include the signatures from the larger dataset of almost 1600 signatures evaluated using a Monte Carlo scheme with 5000 draws of three or four materials to create the simulated mixed signatures. The spectral similarity of the inputs to the

  5. Atmospheric Signatures and Effects of Space-based Relativistic Electron Beam Injection

    Science.gov (United States)

    Marshall, R. A.; Sanchez, E. R.; Kero, A.; Turunen, E. S.; Marsh, D. R.

    2017-12-01

    Future relativistic electron beam injection experiments have the potential to provide groundbreaking insights into the physics of wave-particle interactions and beam-neutral interactions, relevant to space physics and to fundamental plasma physics. However, these experiments are only useful if their signatures can be detected. In this work, we use a physics-based forward modeling framework to investigate the observable signatures of a relativistic beam interacting with the upper atmosphere. The modeling framework is based around the Electron Precipitation Monte Carlo (EPMC) model, used to simulate electron precipitation in the upper atmosphere. That model is coupled to physics-based models of i) optical emission production; ii) bremsstrahlung photon production and propagation; iii) D-region ion chemistry; and iv) VLF wave propagation in the Earth-ionosphere waveguide. Using these modeling tools, we predict the optical, X-ray, chemical, radar, and VLF signatures of a realistic beam injection, based on recent space-based accelerator designs. In particular, we inject a beam pulse of 10 mA for a duration of 500 μs at an energy of 1 MeV, providing a total pulse energy of 5 J. We further investigate variations in these parameters, in particular the total energy and the electron energy. Our modeling shows that for this 5 J pulse injection at 1 MeV electron energy, the optical signal is easily detectable from the ground in common emission bands, but the X-ray signal is likely too weak to be seen from either balloons or LEO orbiting spacecraft. We further predict the optical signal-to-noise ratio that would be expected in different optical systems. Chemical signatures such as changes to NOx and HOx concentrations are too short-lived to be detectable; however our modeling provides a valuable estimate of the total chemical response. Electron density perturbations should be easily measurable from ground-based high-power radars and via VLF subionospheric remote sensing

  6. Dilatonic imprints on exact gravitational wave signatures

    Science.gov (United States)

    McCarthy, Fiona; KubizÅák, David; Mann, Robert B.

    2018-05-01

    By employing the moduli space approximation, we analytically calculate the gravitational wave signatures emitted upon the merger of two extremally charged dilatonic black holes. We probe several values of the dilatonic coupling constant a , and find significant departures from the Einstein-Maxwell (a =0 ) counterpart studied in [Phys. Rev. D 96, 061501 (2017), 10.1103/PhysRevD.96.061501]. For (low-energy) string theory black holes (a =1 ) there are no coalescence orbits and only a memory effect is observed, whereas for an intermediate value of the coupling (a =1 /√{3 } ) the late-time merger signature becomes exponentially suppressed, compared to the polynomial decay in the a =0 case without a dilaton. Such an imprint shows a clear difference between the case with and without a scalar field (as, for example, predicted by string theory) in black hole mergers.

  7. A feature selection approach for identification of signature genes from SAGE data

    Directory of Open Access Journals (Sweden)

    Silva Paulo JS

    2007-05-01

    Full Text Available Abstract Background One goal of gene expression profiling is to identify signature genes that robustly distinguish different types or grades of tumors. Several tumor classifiers based on expression profiling have been proposed using microarray technique. Due to important differences in the probabilistic models of microarray and SAGE technologies, it is important to develop suitable techniques to select specific genes from SAGE measurements. Results A new framework to select specific genes that distinguish different biological states based on the analysis of SAGE data is proposed. The new framework applies the bolstered error for the identification of strong genes that separate the biological states in a feature space defined by the gene expression of a training set. Credibility intervals defined from a probabilistic model of SAGE measurements are used to identify the genes that distinguish the different states with more reliability among all gene groups selected by the strong genes method. A score taking into account the credibility and the bolstered error values in order to rank the groups of considered genes is proposed. Results obtained using SAGE data from gliomas are presented, thus corroborating the introduced methodology. Conclusion The model representing counting data, such as SAGE, provides additional statistical information that allows a more robust analysis. The additional statistical information provided by the probabilistic model is incorporated in the methodology described in the paper. The introduced method is suitable to identify signature genes that lead to a good separation of the biological states using SAGE and may be adapted for other counting methods such as Massive Parallel Signature Sequencing (MPSS or the recent Sequencing-By-Synthesis (SBS technique. Some of such genes identified by the proposed method may be useful to generate classifiers.

  8. Distinct thermodynamic signatures of oligomer generation in the aggregation of the amyloid-β peptide

    Science.gov (United States)

    Cohen, Samuel I. A.; Cukalevski, Risto; Michaels, Thomas C. T.; Šarić, Andela; Törnquist, Mattias; Vendruscolo, Michele; Dobson, Christopher M.; Buell, Alexander K.; Knowles, Tuomas P. J.; Linse, Sara

    2018-05-01

    Mapping free-energy landscapes has proved to be a powerful tool for studying reaction mechanisms. Many complex biomolecular assembly processes, however, have remained challenging to access using this approach, including the aggregation of peptides and proteins into amyloid fibrils implicated in a range of disorders. Here, we generalize the strategy used to probe free-energy landscapes in protein folding to determine the activation energies and entropies that characterize each of the molecular steps in the aggregation of the amyloid-β peptide (Aβ42), which is associated with Alzheimer's disease. Our results reveal that interactions between monomeric Aβ42 and amyloid fibrils during fibril-dependent secondary nucleation fundamentally reverse the thermodynamic signature of this process relative to primary nucleation, even though both processes generate aggregates from soluble peptides. By mapping the energetic and entropic contributions along the reaction trajectories, we show that the catalytic efficiency of Aβ42 fibril surfaces results from the enthalpic stabilization of adsorbing peptides in conformations amenable to nucleation, resulting in a dramatic lowering of the activation energy for nucleation.

  9. Uncertainty in hydrological signatures

    Science.gov (United States)

    McMillan, Hilary; Westerberg, Ida

    2015-04-01

    Information that summarises the hydrological behaviour or flow regime of a catchment is essential for comparing responses of different catchments to understand catchment organisation and similarity, and for many other modelling and water-management applications. Such information types derived as an index value from observed data are known as hydrological signatures, and can include descriptors of high flows (e.g. mean annual flood), low flows (e.g. mean annual low flow, recession shape), the flow variability, flow duration curve, and runoff ratio. Because the hydrological signatures are calculated from observed data such as rainfall and flow records, they are affected by uncertainty in those data. Subjective choices in the method used to calculate the signatures create a further source of uncertainty. Uncertainties in the signatures may affect our ability to compare different locations, to detect changes, or to compare future water resource management scenarios. The aim of this study was to contribute to the hydrological community's awareness and knowledge of data uncertainty in hydrological signatures, including typical sources, magnitude and methods for its assessment. We proposed a generally applicable method to calculate these uncertainties based on Monte Carlo sampling and demonstrated it for a variety of commonly used signatures. The study was made for two data rich catchments, the 50 km2 Mahurangi catchment in New Zealand and the 135 km2 Brue catchment in the UK. For rainfall data the uncertainty sources included point measurement uncertainty, the number of gauges used in calculation of the catchment spatial average, and uncertainties relating to lack of quality control. For flow data the uncertainty sources included uncertainties in stage/discharge measurement and in the approximation of the true stage-discharge relation by a rating curve. The resulting uncertainties were compared across the different signatures and catchments, to quantify uncertainty

  10. Signature effect in the SU(3) limit of SU(6) particle-quadrupole phonon coupling model (PTQM)

    International Nuclear Information System (INIS)

    Paar, V.; Brant, S.

    1981-09-01

    Systematic deviations from the J(J + 1) energy rule in the SU(3) limit of PTQM are studied and interpreted in terms of signature from the rotational model. The signature effect, which is in the rotational mode introduced via the Coriolis force, is generated here by the correlation of PTQM. (author)

  11. Gamma signatures of the C-BORD Tagged Neutron Inspection System

    Directory of Open Access Journals (Sweden)

    Sardet A.

    2018-01-01

    Full Text Available In the frame of C-BORD project (H2020 program of the EU, a Rapidly relocatable Tagged Neutron Inspection System (RRTNIS is being developed to non-intrusively detect explosives, chemical threats, and other illicit goods in cargo containers. Material identification is performed through gamma spectroscopy, using twenty NaI detectors and four LaBr3 detectors, to determine the different elements composing the inspected item from their specific gamma signatures induced by fast neutrons. This is performed using an unfolding algorithm to decompose the energy spectrum of a suspect item, selected by X-ray radiography and on which the RRTNIS inspection is focused, on a database of pure element gamma signatures. This paper reports on simulated signatures for the NaI and LaBr3 detectors, constructed using the MCNP6 code. First experimental spectra of a few elements of interest are also presented.

  12. Towards a 3d Spatial Urban Energy Modelling Approach

    Science.gov (United States)

    Bahu, J.-M.; Koch, A.; Kremers, E.; Murshed, S. M.

    2013-09-01

    Today's needs to reduce the environmental impact of energy use impose dramatic changes for energy infrastructure and existing demand patterns (e.g. buildings) corresponding to their specific context. In addition, future energy systems are expected to integrate a considerable share of fluctuating power sources and equally a high share of distributed generation of electricity. Energy system models capable of describing such future systems and allowing the simulation of the impact of these developments thus require a spatial representation in order to reflect the local context and the boundary conditions. This paper describes two recent research approaches developed at EIFER in the fields of (a) geo-localised simulation of heat energy demand in cities based on 3D morphological data and (b) spatially explicit Agent-Based Models (ABM) for the simulation of smart grids. 3D city models were used to assess solar potential and heat energy demand of residential buildings which enable cities to target the building refurbishment potentials. Distributed energy systems require innovative modelling techniques where individual components are represented and can interact. With this approach, several smart grid demonstrators were simulated, where heterogeneous models are spatially represented. Coupling 3D geodata with energy system ABMs holds different advantages for both approaches. On one hand, energy system models can be enhanced with high resolution data from 3D city models and their semantic relations. Furthermore, they allow for spatial analysis and visualisation of the results, with emphasis on spatially and structurally correlations among the different layers (e.g. infrastructure, buildings, administrative zones) to provide an integrated approach. On the other hand, 3D models can benefit from more detailed system description of energy infrastructure, representing dynamic phenomena and high resolution models for energy use at component level. The proposed modelling strategies

  13. Imprecise system reliability and component importance based on survival signature

    International Nuclear Information System (INIS)

    Feng, Geng; Patelli, Edoardo; Beer, Michael; Coolen, Frank P.A.

    2016-01-01

    The concept of the survival signature has recently attracted increasing attention for performing reliability analysis on systems with multiple types of components. It opens a new pathway for a structured approach with high computational efficiency based on a complete probabilistic description of the system. In practical applications, however, some of the parameters of the system might not be defined completely due to limited data, which implies the need to take imprecisions of component specifications into account. This paper presents a methodology to include explicitly the imprecision, which leads to upper and lower bounds of the survival function of the system. In addition, the approach introduces novel and efficient component importance measures. By implementing relative importance index of each component without or with imprecision, the most critical component in the system can be identified depending on the service time of the system. Simulation method based on survival signature is introduced to deal with imprecision within components, which is precise and efficient. Numerical example is presented to show the applicability of the approach for systems. - Highlights: • Survival signature is a novel way for system reliability and component importance • High computational efficiency based on a complete description of system. • Include explicitly the imprecision, which leads to bounds of the survival function. • A novel relative importance index is proposed as importance measure. • Allows to identify critical components depending on the service time of the system.

  14. Trans-Planckian physics and signature change events in Bose gas hydrodynamics

    International Nuclear Information System (INIS)

    Weinfurtner, Silke; White, Angela; Visser, Matt

    2007-01-01

    We present an example of emergent spacetime as the hydrodynamic limit of a more fundamental microscopic theory. The low-energy, long-wavelength limit in our model is dominated by collective variables that generate an effective Lorentzian metric. This system naturally exhibits a microscopic mechanism allowing us to perform controlled signature change between Lorentzian and Riemannian geometries. We calculate the number of quasiparticles produced from a finite-duration Euclidean-signature event, where we take the position that to a good approximation the dynamics is dominated by the evolution of the linearized perturbations, as suggested by Calzetta and Hu [Phys. Rev. A 68, 043625 (2003)]. We adapt the ideas presented by Dray et al. [Gen. Relativ. Gravit. 23, 967 (1991)], such that the field and its canonical momentum are continuous at the signature-change event. We investigate the interplay between the underlying microscopic structure and the emergent gravitational field, focussing on its impact on quasiparticle production in the ultraviolet regime. In general, this can be thought of as the combination of trans-Planckian physics and signature-change physics. Further we investigate the possibility of using the proposed signature-change event as an amplifier for analogue 'cosmological particle production' in condensed matter experiments

  15. DrugSig: A resource for computational drug repositioning utilizing gene expression signatures.

    Directory of Open Access Journals (Sweden)

    Hongyu Wu

    Full Text Available Computational drug repositioning has been proved as an effective approach to develop new drug uses. However, currently existing strategies strongly rely on drug response gene signatures which scattered in separated or individual experimental data, and resulted in low efficient outputs. So, a fully drug response gene signatures database will be very helpful to these methods. We collected drug response microarray data and annotated related drug and targets information from public databases and scientific literature. By selecting top 500 up-regulated and down-regulated genes as drug signatures, we manually established the DrugSig database. Currently DrugSig contains more than 1300 drugs, 7000 microarray and 800 targets. Moreover, we developed the signature based and target based functions to aid drug repositioning. The constructed database can serve as a resource to quicken computational drug repositioning. Database URL: http://biotechlab.fudan.edu.cn/database/drugsig/.

  16. 76 FR 30542 - Adult Signature Services

    Science.gov (United States)

    2011-05-26

    ... POSTAL SERVICE 39 CFR Part 111 Adult Signature Services AGENCY: Postal Service\\TM\\. ACTION: Final..., Domestic Mail Manual (DMM[supreg]) 503.8, to add a new extra service called Adult Signature. This new service has two available options: Adult Signature Required and Adult Signature Restricted Delivery. DATES...

  17. Numerical Predictions of Sonic Boom Signatures for a Straight Line Segmented Leading Edge Model

    Science.gov (United States)

    Elmiligui, Alaa A.; Wilcox, Floyd J.; Cliff, Susan; Thomas, Scott

    2012-01-01

    A sonic boom wind tunnel test was conducted on a straight-line segmented leading edge (SLSLE) model in the NASA Langley 4- by 4- Foot Unitary Plan Wind Tunnel (UPWT). The purpose of the test was to determine whether accurate sonic boom measurements could be obtained while continuously moving the SLSLE model past a conical pressure probe. Sonic boom signatures were also obtained using the conventional move-pause data acquisition method for comparison. The continuous data acquisition approach allows for accurate signatures approximately 15 times faster than a move-pause technique. These successful results provide an incentive for future testing with greatly increased efficiency using the continuous model translation technique with the single probe to measure sonic boom signatures. Two widely used NASA codes, USM3D (Navier-Stokes) and CART3D-AERO (Euler, adjoint-based adaptive mesh), were used to compute off-body sonic boom pressure signatures of the SLSLE model at several different altitudes below the model at Mach 2.0. The computed pressure signatures compared well with wind tunnel data. The effect of the different altitude for signature extraction was evaluated by extrapolating the near field signatures to the ground and comparing pressure signatures and sonic boom loudness levels.

  18. 25 September 2012 - Signature of an Agreement between the Islamic Republic of Pakistan, represented by the Pakistan Atomic Energy Commission Chairman A. Parvez and CERN, represented by its Director-General R. Heuer.

    CERN Multimedia

    Maximilien Brice

    2012-01-01

    25 September 2012 - Signature of an Agreement between the Islamic Republic of Pakistan, represented by the Pakistan Atomic Energy Commission Chairman A. Parvez and CERN, represented by its Director-General R. Heuer.

  19. Working group report: Dictionary of Large Hadron Collider signatures

    Indian Academy of Sciences (India)

    4Centre for High Energy Physics, Indian Institute of Science, Bangalore 560 012, ... of 14 TeV will shed light on the origin of electroweak symmetry breaking and are expected to provide collider signatures of dark matter (DM), thus directly ... SUSY superpartners have a different spin compared to their partners, while LHT.

  20. Producing explicit UPSILON flavor in e/sup +/e/sup -/ annihilation at DORIS energies. [neutral currents, cross section, signature, 15 to 20 MeV

    Energy Technology Data Exchange (ETDEWEB)

    Genz, H [Karlsruhe Univ. (TH) (Germany, F.R.). Inst. fuer Theoretische Kernphysik; Gorn, M [Karlsruhe Univ. (TH) (Germany, F.R.)

    1978-07-31

    If the neutral currents changing the flavor implicit in the UPSILON(9.5) are not suppressed, vector mesons with explicit UPSILON flavor should be produced in e/sup +/e/sup -/ annihilation at up to two e/sup +/e/sup -/ energies between ..sqrt..s approximately 5 - 6.5 GeV with a cross section sigma (peak, averaged over 7 MeV beam resolution) approximately 0.25% of sigma(e/sup +/e/sup -/..--> mu../sup +/..mu../sup -/). The signature would be monochromatic ..gamma.. lines with Esub(..gamma..)approximately 50-150 MeV, probably together with K production. Explicit flavor of a (anti QQ)sub(V) at 30 GeV would be produced at ..sqrt..s approximately 15-16 and ..sqrt..s approximately 20 GeV with sigmasup(averaged)sub(peak) approximately 3% and 5% of sigmasub(..mu../sup +/..mu../sup -/) with GAMMAsub(beam) = 27 and 48 MeV, respectively. The signature would be the same as above.

  1. Dominant thermogravimetric signatures of lignin in cashew shell as compared to cashew shell cake.

    Science.gov (United States)

    Gangil, Sandip

    2014-03-01

    Dominant thermogravimetric signatures related to lignin were observed in cashew shell as compared to these signatures in cashew shell cake. The phenomenon of weakening of lignin from cashew shell to cashew shell cake was explained on the basis of changes in the activation energies. The pertinent temperature regimes responsible for the release of different constituents of both the bio-materials were identified and compared. The activation energies of cashew shell and cashew shell cake were compared using Kissinger-Akahira-Sunose method. Thermogravimetric profiling of cashew shell and cashew shell cake indicated that these were different kinds of bio-materials. Copyright © 2013 Elsevier Ltd. All rights reserved.

  2. Incorporating X–ray summing into gamma–gamma signature quantification

    International Nuclear Information System (INIS)

    Britton, R.; Jackson, M.J.; Davies, A.V.

    2016-01-01

    A method for quantifying coincidence signatures has been extended to incorporate the effects of X–ray summing, and tested using a high–efficiency γ–γ system. An X–ray library has been created, allowing all possible γ, X–ray and conversion electron cascades to be generated. The equations for calculating efficiency and cascade summing corrected coincidence signature probabilities have also been extended from a two γ, two detector ‘special case’ to an arbitrarily large system. The coincidence library generated is fully searchable by energy, nuclide, coincidence pair, γ multiplicity, cascade probability and the half–life of the cascade, allowing the user to quickly identify coincidence signatures of interest. The method and software described is inherently flexible, as it only requires evaluated nuclear data, an X–ray library, and accurate efficiency characterisations to quickly and easily calculate coincidence signature probabilities for a variety of systems. Additional uses for the software include the fast identification of γ coincidence signals with required multiplicities and branching ratios, identification of the optimal coincidence signatures to measure for a particular system, and the calculation of cascade summing corrections for single detector systems. - Highlights: • Method for incorporating X-ray summing into coincidence measurements developed. • Calculation routines have been extended to an arbitrarily large detector system, and re-written to take advantage of multiple computing cores. • Data collected in list-mode with all events timestamped for offline coincidence analysis. • Coincidence analysis of environmental samples will dramatically improve the detection sensitivity achievable.

  3. Searches for supersymmetry in R-parity violating and long-lived signatures with the ATLAS detector

    CERN Document Server

    Magerl, Veronika; The ATLAS collaboration

    2018-01-01

    R-parity violation introduces many viable signatures to the search for supersymmetry at the LHC. The decay of supersymmetric particles can produce leptons or jets, while removing the missing transverse momentum signal common to traditional supersymmetry searches. Several supersymmetric models also predict massive long-lived supersymmetric particles. Such particles may be detected through abnormal specific energy loss, appearing or disappearing tracks, displaced vertices, long time-of-flight or late calorimetric energy deposits. The talk presents recent results from searches of supersymmetry in these unusual signatures of R-parity violation and long-lived particles with the ATLAS detector.

  4. Molecular signatures from omics data: from chaos to consensus.

    Science.gov (United States)

    Sung, Jaeyun; Wang, Yuliang; Chandrasekaran, Sriram; Witten, Daniela M; Price, Nathan D

    2012-08-01

    In the past 15 years, new "omics" technologies have made it possible to obtain high-resolution molecular snapshots of organisms, tissues, and even individual cells at various disease states and experimental conditions. It is hoped that these developments will usher in a new era of personalized medicine in which an individual's molecular measurements are used to diagnose disease, guide therapy, and perform other tasks more accurately and effectively than is possible using standard approaches. There now exists a vast literature of reported "molecular signatures". However, despite some notable exceptions, many of these signatures have suffered from limited reproducibility in independent datasets, insufficient sensitivity or specificity to meet clinical needs, or other challenges. In this paper, we discuss the process of molecular signature discovery on the basis of omics data. In particular, we highlight potential pitfalls in the discovery process, as well as strategies that can be used to increase the odds of successful discovery. Despite the difficulties that have plagued the field of molecular signature discovery, we remain optimistic about the potential to harness the vast amounts of available omics data in order to substantially impact clinical practice. Copyright © 2012 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  5. Lesson 6: Signature Validation

    Science.gov (United States)

    Checklist items 13 through 17 are grouped under the Signature Validation Process, and represent CROMERR requirements that the system must satisfy as part of ensuring that electronic signatures it receives are valid.

  6. 21 CFR 11.50 - Signature manifestations.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Signature manifestations. 11.50 Section 11.50 Food... RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.50 Signature manifestations. (a) Signed electronic...: (1) The printed name of the signer; (2) The date and time when the signature was executed; and (3...

  7. Learning Global-Local Distance Metrics for Signature-Based Biometric Cryptosystems

    Directory of Open Access Journals (Sweden)

    George S. Eskander Ekladious

    2017-11-01

    Full Text Available Biometric traits, such as fingerprints, faces and signatures have been employed in bio-cryptosystems to secure cryptographic keys within digital security schemes. Reliable implementations of these systems employ error correction codes formulated as simple distance thresholds, although they may not effectively model the complex variability of behavioral biometrics like signatures. In this paper, a Global-Local Distance Metric (GLDM framework is proposed to learn cost-effective distance metrics, which reduce within-class variability and augment between-class variability, so that simple error correction thresholds of bio-cryptosystems provide high classification accuracy. First, a large number of samples from a development dataset are used to train a global distance metric that differentiates within-class from between-class samples of the population. Then, once user-specific samples are available for enrollment, the global metric is tuned to a local user-specific one. Proof-of-concept experiments on two reference offline signature databases confirm the viability of the proposed approach. Distance metrics are produced based on concise signature representations consisting of about 20 features and a single prototype. A signature-based bio-cryptosystem is designed using the produced metrics and has shown average classification error rates of about 7% and 17% for the PUCPR and the GPDS-300 databases, respectively. This level of performance is comparable to that obtained with complex state-of-the-art classifiers.

  8. A novel data mining method to identify assay-specific signatures in functional genomic studies

    Directory of Open Access Journals (Sweden)

    Guidarelli Jack W

    2006-08-01

    classification of human tissue samples and a study of E. coli cultures with different medium formulations. Conclusion We have developed a PCA-based method that effectively identifies assay-specific signatures in ranked groups of genes from the full data set in a more efficient and simplistic procedure than current approaches. Although this work demonstrates the ability of the PM to identify assay-specific signatures in DNA microarray experiments, this approach could be useful in areas such as proteomics and metabolomics.

  9. 21 CFR 11.70 - Signature/record linking.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Signature/record linking. 11.70 Section 11.70 Food... RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.70 Signature/record linking. Electronic signatures and handwritten signatures executed to electronic records shall be linked to their respective...

  10. Expressiveness considerations of XML signatures

    DEFF Research Database (Denmark)

    Jensen, Meiko; Meyer, Christopher

    2011-01-01

    XML Signatures are used to protect XML-based Web Service communication against a broad range of attacks related to man-in-the-middle scenarios. However, due to the complexity of the Web Services specification landscape, the task of applying XML Signatures in a robust and reliable manner becomes...... more and more challenging. In this paper, we investigate this issue, describing how an attacker can still interfere with Web Services communication even in the presence of XML Signatures. Additionally, we discuss the interrelation of XML Signatures and XML Encryption, focussing on their security...

  11. Measuring economy-wide energy efficiency performance: A parametric frontier approach

    International Nuclear Information System (INIS)

    Zhou, P.; Ang, B.W.; Zhou, D.Q.

    2012-01-01

    This paper proposes a parametric frontier approach to estimating economy-wide energy efficiency performance from a production efficiency point of view. It uses the Shephard energy distance function to define an energy efficiency index and adopts the stochastic frontier analysis technique to estimate the index. A case study of measuring the economy-wide energy efficiency performance of a sample of OECD countries using the proposed approach is presented. It is found that the proposed parametric frontier approach has higher discriminating power in energy efficiency performance measurement compared to its nonparametric frontier counterparts.

  12. Thermal and Hydrologic Signatures of Soil Controls on Evaporation: A Combined Energy and Water Balance Approach with Implications for Remote Sensing of Evaporation

    Science.gov (United States)

    Salvucci, Guido D.

    2000-01-01

    The overall goal of this research is to examine the feasibility of applying a newly developed diagnostic model of soil water evaporation to large land areas using remotely sensed input parameters. The model estimates the rate of soil evaporation during periods when it is limited by the net transport resulting from competing effects of capillary rise and drainage. The critical soil hydraulic properties are implicitly estimated via the intensity and duration of the first stage (energy limited) evaporation, removing a major obstacle in the remote estimation of evaporation over large areas. This duration, or 'time to drying' (t(sub d)) is revealed through three signatures detectable in time series of remote sensing variables. The first is a break in soil albedo that occurs as a small vapor transmission zone develops near the surface. The second is a break in either surface to air temperature differences or in the diurnal surface temperature range, both of which indicate increased sensible heat flux (and/or storage) required to balance the decrease in latent heat flux. The third is a break in the temporal pattern of near surface soil moisture. Soil moisture tends to decrease rapidly during stage I drying (as water is removed from storage), and then become more or less constant during soil limited, or 'stage II' drying (as water is merely transmitted from deeper soil storage). The research tasks address: (1) improvements in model structure, including extensions to transpiration and aggregation over spatially variable soil and topographic landscape attributes; and (2) applications of the model using remotely sensed input parameters.

  13. Signatures of selection in the Iberian honey bee: a genome wide approach using single nucleotide polymorphisms (SNPs)

    OpenAIRE

    Chavez-Galarza, Julio; Johnston, J. Spencer; Azevedo, João; Muñoz, Irene; De la Rúa, Pilar; Patton, John C.; Pinto, M. Alice

    2011-01-01

    Dissecting genome-wide (expansions, contractions, admixture) from genome-specific effects (selection) is a goal of central importance in evolutionary biology because it leads to more robust inferences of demographic history and to identification of adaptive divergence. The publication of the honey bee genome and the development of high-density SNPs genotyping, provide us with powerful tools, allowing us to identify signatures of selection in the honey bee genome. These signatur...

  14. Digital Signature Schemes with Complementary Functionality and Applications

    OpenAIRE

    S. N. Kyazhin

    2012-01-01

    Digital signature schemes with additional functionality (an undeniable signature, a signature of the designated confirmee, a signature blind, a group signature, a signature of the additional protection) and examples of their application are considered. These schemes are more practical, effective and useful than schemes of ordinary digital signature.

  15. 17 CFR 12.12 - Signature.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Signature. 12.12 Section 12.12... General Information and Preliminary Consideration of Pleadings § 12.12 Signature. (a) By whom. All... document on behalf of another person. (b) Effect. The signature on any document of any person acting either...

  16. High-speed high-security signatures

    NARCIS (Netherlands)

    Bernstein, D.J.; Duif, N.; Lange, T.; Schwabe, P.; Yang, B.Y.

    2011-01-01

    This paper shows that a $390 mass-market quad-core 2.4GHz Intel Westmere (Xeon E5620) CPU can create 108000 signatures per second and verify 71000 signatures per second on an elliptic curve at a 2128 security level. Public keys are 32 bytes, and signatures are 64 bytes. These performance figures

  17. The dependence of cusp ion signatures on the reconnection rate

    Directory of Open Access Journals (Sweden)

    S. K. Morley

    2003-04-01

    Full Text Available The interpretation of structure in cusp ion dispersions is important for helping to understand the temporal and spatial structure of magnetopause reconnection. "Stepped" and "sawtooth" signatures have been shown to be caused by temporal variations in the reconnection rate under the same physical conditions for different satellite trajectories. The present paper shows that even for a single satellite path, a change in the amplitude of any reconnection pulses can alter the observed signature and even turn sawtooth into stepped forms and vice versa. On 20 August 1998, the Defense Meteorological Satellite Program (DMSP craft F-14 crossed the cusp just to the south of Longyearbyen, returning on the following orbit. The two passes by the DMSP F-14 satellites have very similar trajectories and the open-closed field line boundary (OCB crossings, as estimated from the SSJ/4 precipitating particle data and Polar UVI images, imply a similarly-shaped polar cap, yet the cusp ion dispersion signatures differ substantially. The cusp crossing at 08:54 UT displays a stepped ion dispersion previously considered to be typical of a meridional pass, whereas the crossing at 10:38 UT is a sawtooth form ion dispersion, previously considered typical of a satellite travelling longitudinally with respect to the OCB. It is shown that this change in dispersed ion signature is likely to be due to a change in the amplitude of the pulses in the reconnection rate, causing the stepped signature. Modelling of the low-energy ion cutoff under different conditions has reproduced the forms of signature observed.Key words. Ionosphere (particle precipitation Magnetospheric physics (energetic particles, precipitating, magnetopause, cusp and boundary layers

  18. Petroleum Pumps’ Current and Vibration Signatures Analysis Using Wavelet Coherence Technique

    Directory of Open Access Journals (Sweden)

    Rmdan Shnibha

    2013-01-01

    Full Text Available Vibration analysis is widely used for rotating machinery diagnostics; however measuring vibration of operational oil well pumps is not possible. The pump’s driver’s current signatures may provide condition-related information without the need for an access to the pump itself. This paper investigates the degree of relationship between the pump’s driver’s current signatures and its induced vibration. This relationship between the driver’s current signatures (DCS and its vibration signatures (DVS is studied by calculating magnitude-squared coherence and phase coherence parameters at a certain frequency band using continuous wavelet transform (CWT. The CWT coherence-based technique allows better analysis of temporal evolution of the frequency content of dynamic signals and areas in the time-frequency plane where the two signals exhibit common power or consistent phase behaviour indicating a relationship between the signals. This novel approach is validated by experimental data acquired from 3 kW petroleum pump’s driver. Both vibration and current signatures were acquired under different speed and load conditions. The outcomes of this research suggest the use of DCS analysis as reliable and inexpensive condition monitoring tool, which could be implemented for oil pumps, real-time monitoring associated with condition-based maintenance (CBM program.

  19. Arabic CWR Based on Correlation of Normalized Signatures of Words Images

    Directory of Open Access Journals (Sweden)

    Hala S. Zaghloul

    2007-12-01

    Full Text Available The traditional methods for Arabic OCR (AOCR based on segmentation of each word into a set of characters. The Arabic language is of cursive nature, and the character's shape depends on its position in the word. There are about 100 shape of the characters have to be classified, and some of them may be overlapped. Our approach use a normalized signature of the time signal of the pulse coupled neural network PCNN, supported with some shape primitives to represent the number of the word complementary and their positions within the image of the word. A lookup dictionary of words with its signatures was constructed, and structured in groups using a decision tree. The tested signature was routed through the tree to the nearest group, and then the signature and its related word with higher correlation within the selected group will be the classified. This method overcome many difficulties arise in cursive word recognition CWR for printed script with different font type and size; also it shows higher accuracy for the classification process, 96%.

  20. A Microbial Signature Approach to Identify Fecal Pollution in the Waters Off an Urbanized Coast of Lake Michigan

    Science.gov (United States)

    Newton, Ryan J.; Bootsma, Melinda J.; Morrison, Hilary G.; Sogin, Mitchell L.

    2014-01-01

    Urban coasts receive watershed drainage from ecosystems that include highly developed lands with sewer and stormwater infrastructure. In these complex ecosystems, coastal waters are often contaminated with fecal pollution, where multiple delivery mechanisms that often contain multiple fecal sources make it difficult to mitigate the pollution. Here, we exploit bacterial community sequencing of the V6 and V6V4 hypervariable regions of the bacterial 16S rRNA gene to identify bacterial distributions that signal the presence of sewer, fecal, and human fecal pollution. The sequences classified to three sewer infrastructure-associated bacterial genera, Acinetobacter, Arcobacter, and Trichococcus, and five fecal-associated bacterial families, Bacteroidaceae, Porphyromonadaceae, Clostridiaceae, Lachnospiraceae, and Ruminococcaceae, served as signatures of sewer and fecal contamination, respectively. The human fecal signature was determined with the Bayesian source estimation program SourceTracker, which we applied to a set of 40 sewage influent samples collected in Milwaukee, WI, USA to identify operational taxonomic units (≥97 % identity) that were most likely of human fecal origin. During periods of dry weather, the magnitudes of all three signatures were relatively low in Milwaukee's urban rivers and harbor and nearly zero in Lake Michigan. However, the relative contribution of the sewer and fecal signature frequently increased to >2 % of the measured surface water communities following sewer overflows. Also during combined sewer overflows, the ratio of the human fecal pollution signature to the fecal pollution signature in surface waters was generally close to that of sewage, but this ratio decreased dramatically during dry weather and rain events, suggesting that nonhuman fecal pollution was the dominant source during these weather-driven scenarios. The qPCR detection of two human fecal indicators, human Bacteroides and Lachno2, confirmed the urban fecal footprint in

  1. Australia: Approaching an energy crossroads

    International Nuclear Information System (INIS)

    Falk, Jim; Settle, Domenica

    2011-01-01

    This paper considers energy policy in Australia in the context of its considerable energy resources, climate change and a recent change in government. It examines the possible paths that future energy use and policy in Australia could take, including published projections based largely on a 'business as usual' approach and projections based on a dramatic shift towards more efficient use of energy and renewable energy technologies. It also considers the various factors affecting future policy direction, including energy security, the advocacy in Australia for establishing nuclear electricity generation and other parts of the nuclear fuel-cycle, responses to climate change, and carbon sequestration. It concludes that while the Australian Government is currently reluctant to move away from a dependence on coal, and unlikely to adopt nuclear energy generation, a low-emissions future without waiting for the deployment of carbon capture and storage and without resorting to nuclear power is within reach. However, in the face of strong pressure from interest groups associated with energy intensive industry, making the necessary innovations will require further growth of community concern about climate change, and the development of greater understanding of the feasibility of employing low carbon-emissions options.

  2. Interim Report on Multiple Sequence Alignments and TaqMan Signature Mapping to Phylogenetic Trees

    Energy Technology Data Exchange (ETDEWEB)

    Gardner, S; Jaing, C

    2012-03-27

    The goal of this project is to develop forensic genotyping assays for select agent viruses, addressing a significant capability gap for the viral bioforensics and law enforcement community. We used a multipronged approach combining bioinformatics analysis, PCR-enriched samples, microarrays and TaqMan assays to develop high resolution and cost effective genotyping methods for strain level forensic discrimination of viruses. We have leveraged substantial experience and efficiency gained through year 1 on software development, SNP discovery, TaqMan signature design and phylogenetic signature mapping to scale up the development of forensics signatures in year 2. In this report, we have summarized the Taqman signature development for South American hemorrhagic fever viruses, tick-borne encephalitis viruses and henipaviruses, Old World Arenaviruses, filoviruses, Crimean-Congo hemorrhagic fever virus, Rift Valley fever virus and Japanese encephalitis virus.

  3. The effects of extrinsic motivation on signature authorship opinions in forensic signature blind trials.

    Science.gov (United States)

    Dewhurst, Tahnee N; Found, Bryan; Ballantyne, Kaye N; Rogers, Doug

    2014-03-01

    Expertise studies in forensic handwriting examination involve comparisons of Forensic Handwriting Examiners' (FHEs) opinions with lay-persons on blind tests. All published studies of this type have reported real and demonstrable skill differences between the specialist and lay groups. However, critics have proposed that any difference shown may be indicative of a lack of motivation on the part of lay participants, rather than a real difference in skill. It has been suggested that qualified FHEs would be inherently more motivated to succeed in blinded validation trials, as their professional reputations could be at risk, should they perform poorly on the task provided. Furthermore, critics suggest that lay-persons would be unlikely to be highly motivated to succeed, as they would have no fear of negative consequences should they perform badly. In an effort to investigate this concern, a blind signature trial was designed and administered to forty lay-persons. Participants were required to compare known (exemplar) signatures of an individual to questioned signatures and asked to express an opinion regarding whether the writer of the known signatures wrote each of the questioned signatures. The questioned signatures comprised a mixture of genuine, disguised and simulated signatures. The forty participants were divided into two separate groupings. Group 'A' were requested to complete the trial as directed and were advised that for each correct answer they would be financially rewarded, for each incorrect answer they would be financially penalized, and for each inconclusive opinion they would receive neither penalty nor reward. Group 'B' was requested to complete the trial as directed, with no mention of financial recompense or penalty. The results of this study do not support the proposition that motivation rather than skill difference is the source of the statistical difference in opinions between individuals' results in blinded signature proficiency trials. Crown

  4. Signatures of High-Scale Supersymmetry at the LHC

    CERN Multimedia

    CERN. Geneva; Spiropulu, Maria; Treille, D

    2004-01-01

    I will discuss the experimental signatures at the LHC of a novel paradigm-shift away from naturalness, suggested by the cosmological constant problem and the multitude of vacua in string theory. In the new paradigm supersymmetry can be broken near the unification scale, and the only light superparticles are the gauginos and higgsinos, which account for the successful unification of gauge couplings. This framework removes all the phenomenological difficulties of standard SUSY. The mass of the Higgs is in the range 120-160 GeV. Measuring the couplings of the Higgs to the gauginos and higgsinos precicely tests for high-scale SUSY. The gluino is strikingly long lived, and a measurement of its lifetime can determine the SUSY breaking scale. Signatures at the LHC detectors include out-of-time energy depositions, displaced vertices, and intermittent tracks.

  5. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  6. Exotic signatures from supersymmetry

    International Nuclear Information System (INIS)

    Hall, L.J.

    1989-08-01

    Minor changes to the standard supersymmetric model, such as soft flavor violation and R parity violation, cause large changes in the signatures. The origin of these changes and the resulting signatures are discussed. 15 refs., 7 figs., 2 tabs

  7. Signature inversion in doubly odd 124La

    International Nuclear Information System (INIS)

    Chantler, H.J.; Paul, E.S.; Boston, A.J.; Choy, P.T.W.; Nolan, P.J.; Carpenter, M.P.; Davids, C.N.; Seweryniak, D.; Charity, R.; Devlin, M.; Sarantites, D.G.; Chiara, C.J.; Fossan, D.B.; Koike, T.; LaFosse, D.R.; Starosta, K.; Fletcher, A.M.; Smith, J.F.; Jenkins, D.G.; Kelsall, N.S.

    2002-01-01

    High-spin states have been studied in neutron-deficient 57 124 La 67 , populated through the 64 Zn( 64 Zn,3pn) reaction at 260 MeV. The Gammasphere γ-ray spectrometer has been used in conjunction with the Microball charged-particle detector, the Neutron Shell, and the Argonne Fragment Mass Analyzer, in order to select evaporation residues of interest. The known band structures have been extended and new bands found. Most of the bands are linked together, allowing more consistent spin and parity assignments. Comparison of band properties to cranking calculations has allowed configuration assignments to be made and includes the first identification of the g 9/2 proton-hole in an odd-odd lanthanum isotope. Two bands have been assigned a πh 11/2 xνh 11/2 structure; the yrast one exhibits a signature inversion in its level energies below I=18.5(ℎ/2π), while the excited one exhibits a signature inversion above I=18.5(ℎ/2π)

  8. Research on a New Signature Scheme on Blockchain

    Directory of Open Access Journals (Sweden)

    Chao Yuan

    2017-01-01

    Full Text Available With the rise of Bitcoin, blockchain which is the core technology of Bitcoin has received increasing attention. Privacy preserving and performance on blockchain are two research points in academia and business, but there are still some unresolved issues in both respects. An aggregate signature scheme is a digital signature that supports making signatures on many different messages generated by many different users. Using aggregate signature, the size of the signature could be shortened by compressing multiple signatures into a single signature. In this paper, a new signature scheme for transactions on blockchain based on the aggregate signature was proposed. It was worth noting that elliptic curve discrete logarithm problem and bilinear maps played major roles in our signature scheme. And the security properties of our signature scheme were proved. In our signature scheme, the amount will be hidden especially in the transactions which contain multiple inputs and outputs. Additionally, the size of the signature on transaction is constant regardless of the number of inputs and outputs that the transaction contains, which can improve the performance of signature. Finally, we gave an application scenario for our signature scheme which aims to achieve the transactions of big data on blockchain.

  9. Quantum multi-signature protocol based on teleportation

    International Nuclear Information System (INIS)

    Wen Xiao-jun; Liu Yun; Sun Yu

    2007-01-01

    In this paper, a protocol which can be used in multi-user quantum signature is proposed. The scheme of signature and verification is based on the correlation of Greenberger-Horne-Zeilinger (GHZ) states and the controlled quantum teleportation. Different from the digital signatures, which are based on computational complexity, the proposed protocol has perfect security in the noiseless quantum channels. Compared to previous quantum signature schemes, this protocol can verify the signature independent of an arbitrator as well as realize multi-user signature together. (orig.)

  10. Multiple triaxial bands and abnormal signature inversion in 7433As

    International Nuclear Information System (INIS)

    Hu, Shi-Peng; Ma, Hai-Liang; Cao, Xue-Peng; Wu, Xiao-Guang; Zhang, Huan-Qiao; Hua, Hui; Sun, Jun-Jie; Sun, Hui-Bin; He, Chuang-Ye; Zheng, Yun; Li, Guang-Sheng; Li, Cong-Bo; Yao, Shun-He; Yu, Bei-Bei; Wang, Jin-Long; Li, Hong-We; Wu, Yi-Heng; Liu, Jia-Jian; Luo, Peng-Wei; Xu, Chuan

    2014-01-01

    Excited states of the odd–odd nucleus 74 As have been investigated via heavy ion fusion evaporation reaction 70 Zn( 7 Li,3n) 74 As at beam energy of 30 MeV. The properties of the positive- and the negative- parity bands can be interpreted in terms of the Cranked Nilsson–Strutinsky (CNS) model calculations which show that the observed bands are built on the triaxial deformed shape. The inversion of the favored and unfavored signature branches observed in the positive-parity bands presents at high spins rather than normal signature inversion occurs at low spins. This phenomenon may be explained as the origin of unpaired band crossing in a highly rotating triaxial nucleus.

  11. Motivated creativity: A conservation of energy approach

    NARCIS (Netherlands)

    Roskes, M.

    2013-01-01

    This dissertation developed a novel conservation of energy principle to explain how approach and avoidance motivation influence performance. On the one hand, we showed that avoidance motivated people can excel when they are sufficiently stimulated to invest their energy and cognitive resources. This

  12. A Directed Signature Scheme and its Applications

    OpenAIRE

    Lal, Sunder; Kumar, Manoj

    2004-01-01

    This paper presents a directed signature scheme with the property that the signature can be verified only with the help of signer or signature receiver. We also propose its applications to share verification of signatures and to threshold cryptosystems.

  13. Educational and technological approaches to renewable energy

    Energy Technology Data Exchange (ETDEWEB)

    Leal Filho, Walter; Gottwald, Julia (eds.)

    2012-07-01

    This book documents and disseminates a number of educational and technological approaches to renewable energy, with a special emphasis on European and Latin American experiences, but also presenting experiences from other parts of the world. It was prepared as part of the project JELARE (Joint European-Latin American Universities Renewable Energy Project), undertaken as part of the ALFA III Programme of the European Commission involving countries in Latin America (e.g. Bolivia, Brazil, Chile, Guatemala) as well as in Europe (Germany and Latvia). Thanks to its approach and structure, this book will prove useful to all those dedicated to the development of the renewable energy sector, especially those concerned with the problems posed by lack of expertise and lack of training in this field.

  14. Acoustic signature recognition technique for Human-Object Interactions (HOI) in persistent surveillance systems

    Science.gov (United States)

    Alkilani, Amjad; Shirkhodaie, Amir

    2013-05-01

    Handling, manipulation, and placement of objects, hereon called Human-Object Interaction (HOI), in the environment generate sounds. Such sounds are readily identifiable by the human hearing. However, in the presence of background environment noises, recognition of minute HOI sounds is challenging, though vital for improvement of multi-modality sensor data fusion in Persistent Surveillance Systems (PSS). Identification of HOI sound signatures can be used as precursors to detection of pertinent threats that otherwise other sensor modalities may miss to detect. In this paper, we present a robust method for detection and classification of HOI events via clustering of extracted features from training of HOI acoustic sound waves. In this approach, salient sound events are preliminary identified and segmented from background via a sound energy tracking method. Upon this segmentation, frequency spectral pattern of each sound event is modeled and its features are extracted to form a feature vector for training. To reduce dimensionality of training feature space, a Principal Component Analysis (PCA) technique is employed to expedite fast classification of test feature vectors, a kd-tree and Random Forest classifiers are trained for rapid classification of training sound waves. Each classifiers employs different similarity distance matching technique for classification. Performance evaluations of classifiers are compared for classification of a batch of training HOI acoustic signatures. Furthermore, to facilitate semantic annotation of acoustic sound events, a scheme based on Transducer Mockup Language (TML) is proposed. The results demonstrate the proposed approach is both reliable and effective, and can be extended to future PSS applications.

  15. Arsenic complexes optical signatures in As-doped HgCdTe

    Energy Technology Data Exchange (ETDEWEB)

    Gemain, F.; Robin, I. C.; Brochen, S.; Ballet, P.; Gravrand, O.; Feuillet, G. [CEA-LETI Minatec Campus, 17 rue des Martyrs, 38000 Grenoble (France)

    2013-04-08

    In this paper, the optical signatures of arsenic complexes in As-doped HgCdTe samples grown by molecular beam epitaxy are clearly identified using comparison between photoluminescence spectra, Extended X-Ray Absorption Fine Structure, and Hall measurements. The ionization energies of the different complexes are measured both by photoluminescence and Hall measurements.

  16. Arsenic complexes optical signatures in As-doped HgCdTe

    International Nuclear Information System (INIS)

    Gemain, F.; Robin, I. C.; Brochen, S.; Ballet, P.; Gravrand, O.; Feuillet, G.

    2013-01-01

    In this paper, the optical signatures of arsenic complexes in As-doped HgCdTe samples grown by molecular beam epitaxy are clearly identified using comparison between photoluminescence spectra, Extended X-Ray Absorption Fine Structure, and Hall measurements. The ionization energies of the different complexes are measured both by photoluminescence and Hall measurements.

  17. PROJECT APPROACH TO ENERGY MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Інга Борисівна СЕМКО

    2016-02-01

    Full Text Available Project management is widely used around the world as a tool to improve business performance. Correct implementation of the program of implementation of energy efficiency is accompanied by the adoption of an appropriate legislative framework, support programs, the approval of market-based instruments. Currently, it is paying enough attention to the effective application of market-based instruments, although most of the activities in the field of energy efficiency from the economic side are quite profitable. The authors suggested the use of the methodology of project management to the management of energy-saving measures, new approaches to the place and role of project management in the hierarchy of guidance. As a result, this innovation can improve the competitiveness of enterprises. The conclusions that the energy-saving project management allows you to get the best results for their implementation by reducing the time, resources, risk reduction.

  18. The Los Alamos Science Pillars The Science of Signatures

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Joshua E. [Los Alamos National Laboratory; Peterson, Eugene J. [Los Alamos National Laboratory

    2012-09-13

    imagination of many LANL staff and managers and resulted in a strategy which focuses on our strengths while recognizing that the science of signatures is dynamic. This report highlights the interdependence between SoS, advances in materials science, and advances in information technology. The intent is that SoS shape and inform Los Alamos investments in nuclear forensics, nuclear diagnostics, climate, space, energy, and biosurveillence; the areas of leadership that you will read about in this strategy document. The Science of Signatures is still a relatively new strategic direction for the Laboratory. The primary purpose of this document is tell Laboratory staff how SoS is being managed and give them a chance to get involved. A second important purpose is to inform the Department of Energy and our customers of our capability growth in this important scientific area. Questions concerning the SoS strategy and input to it are welcomed and may be directed to any member of the SoS Leadership Council or to the Chemistry, Life, and Earth Science Directorate Office.

  19. CRISPR Spacer Arrays for Detection of Viral Signatures from Acidic Hot Springs

    Science.gov (United States)

    Snyder, J. C.; Bateson, M. M.; Suciu, D.; Young, M. J.

    2010-04-01

    Viruses are the most abundant life-like entities on the planet Earth. Using CRISPR spacer sequences, we have developed a microarray-based approach to detecting viral signatures in the acidic hot springs of Yellowstone.

  20. Real time gamma-ray signature identifier

    Science.gov (United States)

    Rowland, Mark [Alamo, CA; Gosnell, Tom B [Moraga, CA; Ham, Cheryl [Livermore, CA; Perkins, Dwight [Livermore, CA; Wong, James [Dublin, CA

    2012-05-15

    A real time gamma-ray signature/source identification method and system using principal components analysis (PCA) for transforming and substantially reducing one or more comprehensive spectral libraries of nuclear materials types and configurations into a corresponding concise representation/signature(s) representing and indexing each individual predetermined spectrum in principal component (PC) space, wherein an unknown gamma-ray signature may be compared against the representative signature to find a match or at least characterize the unknown signature from among all the entries in the library with a single regression or simple projection into the PC space, so as to substantially reduce processing time and computing resources and enable real-time characterization and/or identification.

  1. Proposed New Method of Interpretation of Infrared Ship Signature Requirements

    NARCIS (Netherlands)

    Neele, F.P.; Wilson, M.T.; Youern, K.

    2005-01-01

    new method of deriving and defining requirements for the infrared signature of new ships is presented. The current approach is to specify the maximum allowed temperature or radiance contrast of the ship with respect to its background. At present, in most NATO countries, it is the contractor’s

  2. Towards the observation of Territorial Energy Systems - a geographical design approach for energy territorialisation

    International Nuclear Information System (INIS)

    Flety, Yann

    2014-01-01

    Having an effect on a system calls for a thorough knowledge of it. The main goal of this research is to provide a general framework for the interpretation of geographic information, as well as a methodological framework to understand the interrelations between territory and energy in the context of a territorial observatory. A literature review of energy planning on the one hand and spatial planning on the other reveals similar developments in the two fields, in particular in terms of decentralisation and environmental concerns. The change of geographical scale chosen for the analysis brings new possibilities for public intervention. In this context, therefore, local authorities have a key role to play in implementing energy policy goals in their planning practices. They need analysis and prospective studies, as well as basic knowledge to carry out territorial energy planning. Indeed, the socio-spatial functions (living, travelling, working, etc.) are themselves at the root of spatial layout, urban forms and settlement structures. Those functions cannot be disassociated from questions of land use and energy. So, to understand energy which is vital, ubiquitous, and responsible for the organisation of territory, a systemic approach is proposed: the Territorial Energy System. It illustrates the importance of the interactions between a territory and its energy system, and more precisely, the interdependence between energy processes and territorial ones. We propose a design approach in the context of an observatory, and more precisely conceptual models, to analyse the territory-energy interrelations, especially with a focus on semantic dimensions. This approach combines three elements: a meta-model, a light and pre-consensus domain ontology, and individual conceptual data models for each indicator. An original indicator is then used for a first ontology population: the territorial energy label. Characterising the interrelations between territory and energy is non

  3. On Hunting Animals of the Biometric Menagerie for Online Signature.

    Directory of Open Access Journals (Sweden)

    Nesma Houmani

    Full Text Available Individuals behave differently regarding to biometric authentication systems. This fact was formalized in the literature by the concept of Biometric Menagerie, defining and labeling user groups with animal names in order to reflect their characteristics with respect to biometric systems. This concept was illustrated for face, fingerprint, iris, and speech modalities. The present study extends the Biometric Menagerie to online signatures, by proposing a novel methodology that ties specific quality measures for signatures to categories of the Biometric Menagerie. Such measures are combined for retrieving automatically writer categories of the extended version of the Biometric Menagerie. Performance analysis with different types of classifiers shows the pertinence of our approach on the well-known MCYT-100 database.

  4. On Hunting Animals of the Biometric Menagerie for Online Signature.

    Science.gov (United States)

    Houmani, Nesma; Garcia-Salicetti, Sonia

    2016-01-01

    Individuals behave differently regarding to biometric authentication systems. This fact was formalized in the literature by the concept of Biometric Menagerie, defining and labeling user groups with animal names in order to reflect their characteristics with respect to biometric systems. This concept was illustrated for face, fingerprint, iris, and speech modalities. The present study extends the Biometric Menagerie to online signatures, by proposing a novel methodology that ties specific quality measures for signatures to categories of the Biometric Menagerie. Such measures are combined for retrieving automatically writer categories of the extended version of the Biometric Menagerie. Performance analysis with different types of classifiers shows the pertinence of our approach on the well-known MCYT-100 database.

  5. 42 CFR 424.36 - Signature requirements.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Signature requirements. 424.36 Section 424.36... (CONTINUED) MEDICARE PROGRAM CONDITIONS FOR MEDICARE PAYMENT Claims for Payment § 424.36 Signature requirements. (a) General rule. The beneficiary's own signature is required on the claim unless the beneficiary...

  6. Unsupervised signature extraction from forensic logs

    NARCIS (Netherlands)

    Thaler, S.M.; Menkovski, V.; Petkovic, M.; Altun, Y.; Das, K.; Mielikäinen, T.; Malerba, D.; Stefanowski, J.; Read, J.; Žitnik, M.; Ceci, M.

    2017-01-01

    Signature extraction is a key part of forensic log analysis. It involves recognizing patterns in log lines such that log lines that originated from the same line of code are grouped together. A log signature consists of immutable parts and mutable parts. The immutable parts define the signature, and

  7. Design of Genomic Signatures of Pathogen Identification & Characterization

    Energy Technology Data Exchange (ETDEWEB)

    Slezak, T; Gardner, S; Allen, J; Vitalis, E; Jaing, C

    2010-02-09

    of species and strains is not always possible. In contrast, protein recognition signatures composed of antibodies or synthetic high-affinity ligands offer extremely fast results but require a large quantity of the target to be present. False positives/negatives are also a problem with some protein-based techniques (home pregnancy kits use this basic approach).

  8. Retail applications of signature verification

    Science.gov (United States)

    Zimmerman, Thomas G.; Russell, Gregory F.; Heilper, Andre; Smith, Barton A.; Hu, Jianying; Markman, Dmitry; Graham, Jon E.; Drews, Clemens

    2004-08-01

    The dramatic rise in identity theft, the ever pressing need to provide convenience in checkout services to attract and retain loyal customers, and the growing use of multi-function signature captures devices in the retail sector provides favorable conditions for the deployment of dynamic signature verification (DSV) in retail settings. We report on the development of a DSV system to meet the needs of the retail sector. We currently have a database of approximately 10,000 signatures collected from 600 subjects and forgers. Previous work at IBM on DSV has been merged and extended to achieve robust performance on pen position data available from commercial point of sale hardware, achieving equal error rates on skilled forgeries and authentic signatures of 1.5% to 4%.

  9. Application of site and haplotype-frequency based approaches for detecting selection signatures in cattle

    Directory of Open Access Journals (Sweden)

    Moore Stephen

    2011-06-01

    Full Text Available Abstract Background 'Selection signatures' delimit regions of the genome that are, or have been, functionally important and have therefore been under either natural or artificial selection. In this study, two different and complementary methods--integrated Haplotype Homozygosity Score (|iHS| and population differentiation index (FST--were applied to identify traces of decades of intensive artificial selection for traits of economic importance in modern cattle. Results We scanned the genome of a diverse set of dairy and beef breeds from Germany, Canada and Australia genotyped with a 50 K SNP panel. Across breeds, a total of 109 extreme |iHS| values exceeded the empirical threshold level of 5% with 19, 27, 9, 10 and 17 outliers in Holstein, Brown Swiss, Australian Angus, Hereford and Simmental, respectively. Annotating the regions harboring clustered |iHS| signals revealed a panel of interesting candidate genes like SPATA17, MGAT1, PGRMC2 and ACTC1, COL23A1, MATN2, respectively, in the context of reproduction and muscle formation. In a further step, a new Bayesian FST-based approach was applied with a set of geographically separated populations including Holstein, Brown Swiss, Simmental, North American Angus and Piedmontese for detecting differentiated loci. In total, 127 regions exceeding the 2.5 per cent threshold of the empirical posterior distribution were identified as extremely differentiated. In a substantial number (56 out of 127 cases the extreme FST values were found to be positioned in poor gene content regions which deviated significantly (p ST values were found in regions of some relevant genes such as SMCP and FGF1. Conclusions Overall, 236 regions putatively subject to recent positive selection in the cattle genome were detected. Both |iHS| and FST suggested selection in the vicinity of the Sialic acid binding Ig-like lectin 5 gene on BTA18. This region was recently reported to be a major QTL with strong effects on productive life

  10. Quantum signature scheme for known quantum messages

    International Nuclear Information System (INIS)

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  11. 7 CFR 718.9 - Signature requirements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Signature requirements. 718.9 Section 718.9... MULTIPLE PROGRAMS General Provisions § 718.9 Signature requirements. (a) When a program authorized by this chapter or Chapter XIV of this title requires the signature of a producer; landowner; landlord; or tenant...

  12. 27 CFR 17.6 - Signature authority.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Signature authority. 17.6... PRODUCTS General Provisions § 17.6 Signature authority. No claim, bond, tax return, or other required... other proper notification of signature authority has been filed with the TTB office where the required...

  13. Online Signature Verification on MOBISIG Finger-Drawn Signature Corpus

    Directory of Open Access Journals (Sweden)

    Margit Antal

    2018-01-01

    Full Text Available We present MOBISIG, a pseudosignature dataset containing finger-drawn signatures from 83 users captured with a capacitive touchscreen-based mobile device. The database was captured in three sessions resulting in 45 genuine signatures and 20 skilled forgeries for each user. The database was evaluated by two state-of-the-art methods: a function-based system using local features and a feature-based system using global features. Two types of equal error rate computations are performed: one using a global threshold and the other using user-specific thresholds. The lowest equal error rate was 0.01% against random forgeries and 5.81% against skilled forgeries using user-specific thresholds that were computed a posteriori. However, these equal error rates were significantly raised to 1.68% (random forgeries case and 14.31% (skilled forgeries case using global thresholds. The same evaluation protocol was performed on the DooDB publicly available dataset. Besides verification performance evaluations conducted on the two finger-drawn datasets, we evaluated the quality of the samples and the users of the two datasets using basic quality measures. The results show that finger-drawn signatures can be used by biometric systems with reasonable accuracy.

  14. 48 CFR 804.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... signature. 804.101 Section 804.101 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS GENERAL ADMINISTRATIVE MATTERS Contract Execution 804.101 Contracting officer's signature. (a) If a... signature. ...

  15. A Robust Iris Identification System Based on Wavelet Packet Decomposition and Local Comparisons of the Extracted Signatures

    Directory of Open Access Journals (Sweden)

    Rossant Florence

    2010-01-01

    Full Text Available Abstract This paper presents a complete iris identification system including three main stages: iris segmentation, signature extraction, and signature comparison. An accurate and robust pupil and iris segmentation process, taking into account eyelid occlusions, is first detailed and evaluated. Then, an original wavelet-packet-based signature extraction method and a novel identification approach, based on the fusion of local distance measures, are proposed. Performance measurements validating the proposed iris signature and demonstrating the benefit of our local-based signature comparison are provided. Moreover, an exhaustive evaluation of robustness, with regards to the acquisition conditions, attests the high performances and the reliability of our system. Tests have been conducted on two different databases, the well-known CASIA database (V3 and our ISEP database. Finally, a comparison of the performances of our system with the published ones is given and discussed.

  16. Aequorin-based measurements of intracellular Ca2+-signatures in plant cells

    Directory of Open Access Journals (Sweden)

    Mithöfer Axel

    2002-01-01

    Full Text Available Due to the involvement of calcium as a main second messenger in the plant signaling pathway, increasing interest has been focused on the calcium signatures supposed to be involved in the patterning of the specific response associated to a given stimulus. In order to follow these signatures we described here the practical approach to use the non-invasive method based on the aequorin technology. Besides reviewing the advantages and disadvantages of this method we report on results showing the usefulness of aequorin to study the calcium response to biotic (elicitors and abiotic stimuli (osmotic shocks in various compartments of plant cells such as cytosol and nucleus.

  17. A biology-driven approach identifies the hypoxia gene signature as a predictor of the outcome of neuroblastoma patients

    Directory of Open Access Journals (Sweden)

    Fardin Paolo

    2010-07-01

    Full Text Available Abstract Background Hypoxia is a condition of low oxygen tension occurring in the tumor microenvironment and it is related to poor prognosis in human cancer. To examine the relationship between hypoxia and neuroblastoma, we generated and tested an in vitro derived hypoxia gene signature for its ability to predict patients' outcome. Results We obtained the gene expression profile of 11 hypoxic neuroblastoma cell lines and we derived a robust 62 probesets signature (NB-hypo taking advantage of the strong discriminating power of the l1-l2 feature selection technique combined with the analysis of differential gene expression. We profiled gene expression of the tumors of 88 neuroblastoma patients and divided them according to the NB-hypo expression values by K-means clustering. The NB-hypo successfully stratifies the neuroblastoma patients into good and poor prognosis groups. Multivariate Cox analysis revealed that the NB-hypo is a significant independent predictor after controlling for commonly used risk factors including the amplification of MYCN oncogene. NB-hypo increases the resolution of the MYCN stratification by dividing patients with MYCN not amplified tumors in good and poor outcome suggesting that hypoxia is associated with the aggressiveness of neuroblastoma tumor independently from MYCN amplification. Conclusions Our results demonstrate that the NB-hypo is a novel and independent prognostic factor for neuroblastoma and support the view that hypoxia is negatively correlated with tumors' outcome. We show the power of the biology-driven approach in defining hypoxia as a critical molecular program in neuroblastoma and the potential for improvement in the current criteria for risk stratification.

  18. Algorithms for Hyperspectral Endmember Extraction and Signature Classification with Morphological Dendritic Networks

    Science.gov (United States)

    Schmalz, M.; Ritter, G.

    Accurate multispectral or hyperspectral signature classification is key to the nonimaging detection and recognition of space objects. Additionally, signature classification accuracy depends on accurate spectral endmember determination [1]. Previous approaches to endmember computation and signature classification were based on linear operators or neural networks (NNs) expressed in terms of the algebra (R, +, x) [1,2]. Unfortunately, class separation in these methods tends to be suboptimal, and the number of signatures that can be accurately classified often depends linearly on the number of NN inputs. This can lead to poor endmember distinction, as well as potentially significant classification errors in the presence of noise or densely interleaved signatures. In contrast to traditional CNNs, autoassociative morphological memories (AMM) are a construct similar to Hopfield autoassociatived memories defined on the (R, +, ?,?) lattice algebra [3]. Unlimited storage and perfect recall of noiseless real valued patterns has been proven for AMMs [4]. However, AMMs suffer from sensitivity to specific noise models, that can be characterized as erosive and dilative noise. On the other hand, the prior definition of a set of endmembers corresponds to material spectra lying on vertices of the minimum convex region covering the image data. These vertices can be characterized as morphologically independent patterns. It has further been shown that AMMs can be based on dendritic computation [3,6]. These techniques yield improved accuracy and class segmentation/separation ability in the presence of highly interleaved signature data. In this paper, we present a procedure for endmember determination based on AMM noise sensitivity, which employs morphological dendritic computation. We show that detected endmembers can be exploited by AMM based classification techniques, to achieve accurate signature classification in the presence of noise, closely spaced or interleaved signatures, and

  19. Perancangan Aplikasi Undeniable Digital Signature Dengan Algoritma Chaum’s Blind Signature

    OpenAIRE

    Simanjuntak, Martin Dennain

    2012-01-01

    Desperaty need a securiry system in the exchange of information via computer media, so that information can not be accessed by unauthorized parties. One of the security system is to use a system of digital signatures as a means of authenticating the authenticity of digital document that are exchanged. By using a digital a digital signature system is undeniable, the security system can be generated digital document exchange, where the system is free from the from of rejection...

  20. Practical quantum digital signature

    Science.gov (United States)

    Yin, Hua-Lei; Fu, Yao; Chen, Zeng-Bing

    2016-03-01

    Guaranteeing nonrepudiation, unforgeability as well as transferability of a signature is one of the most vital safeguards in today's e-commerce era. Based on fundamental laws of quantum physics, quantum digital signature (QDS) aims to provide information-theoretic security for this cryptographic task. However, up to date, the previously proposed QDS protocols are impractical due to various challenging problems and most importantly, the requirement of authenticated (secure) quantum channels between participants. Here, we present the first quantum digital signature protocol that removes the assumption of authenticated quantum channels while remaining secure against the collective attacks. Besides, our QDS protocol can be practically implemented over more than 100 km under current mature technology as used in quantum key distribution.

  1. Quantifying radionuclide signatures from a γ–γ coincidence system

    International Nuclear Information System (INIS)

    Britton, Richard; Jackson, Mark J.; Davies, Ashley V.

    2015-01-01

    A method for quantifying gamma coincidence signatures has been developed, and tested in conjunction with a high-efficiency multi-detector system to quickly identify trace amounts of radioactive material. The γ–γ system utilises fully digital electronics and list-mode acquisition to time–stamp each event, allowing coincidence matrices to be easily produced alongside typical ‘singles’ spectra. To quantify the coincidence signatures a software package has been developed to calculate efficiency and cascade summing corrected branching ratios. This utilises ENSDF records as an input, and can be fully automated, allowing the user to quickly and easily create/update a coincidence library that contains all possible γ and conversion electron cascades, associated cascade emission probabilities, and true-coincidence summing corrected γ cascade detection probabilities. It is also fully searchable by energy, nuclide, coincidence pair, γ multiplicity, cascade probability and half-life of the cascade. The probabilities calculated were tested using measurements performed on the γ–γ system, and found to provide accurate results for the nuclides investigated. Given the flexibility of the method, (it only relies on evaluated nuclear data, and accurate efficiency characterisations), the software can now be utilised for a variety of systems, quickly and easily calculating coincidence signature probabilities. - Highlights: • Monte-Carlo based software developed to easily create/update a coincidence signal library for environmental radionuclides. • Coincidence library utilised to accurately quantify gamma coincidence signatures. • All coincidence signature probabilities are corrected for cascade summing, conversion electron emission and pair production. • Key CTBTO relevant radionuclides have been tested to verify the calculated correction factors. • Accurately quantifying coincidence signals during routine analysis will allow dramatically improved detection

  2. 25 CFR 213.10 - Lessor's signature.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Lessor's signature. 213.10 Section 213.10 Indians BUREAU... MEMBERS OF FIVE CIVILIZED TRIBES, OKLAHOMA, FOR MINING How to Acquire Leases § 213.10 Lessor's signature... thumbprint which shall be designated as “right” or “left” thumbmark. Such signatures must be witnessed by two...

  3. Initial Semantics for Strengthened Signatures

    Directory of Open Access Journals (Sweden)

    André Hirschowitz

    2012-02-01

    Full Text Available We give a new general definition of arity, yielding the companion notions of signature and associated syntax. This setting is modular in the sense requested by Ghani and Uustalu: merging two extensions of syntax corresponds to building an amalgamated sum. These signatures are too general in the sense that we are not able to prove the existence of an associated syntax in this general context. So we have to select arities and signatures for which there exists the desired initial monad. For this, we follow a track opened by Matthes and Uustalu: we introduce a notion of strengthened arity and prove that the corresponding signatures have initial semantics (i.e. associated syntax. Our strengthened arities admit colimits, which allows the treatment of the λ-calculus with explicit substitution.

  4. Spectral signature selection for mapping unvegetated soils

    Science.gov (United States)

    May, G. A.; Petersen, G. W.

    1975-01-01

    Airborne multispectral scanner data covering the wavelength interval from 0.40-2.60 microns were collected at an altitude of 1000 m above the terrain in southeastern Pennsylvania. Uniform training areas were selected within three sites from this flightline. Soil samples were collected from each site and a procedure developed to allow assignment of scan line and element number from the multispectral scanner data to each sampling location. These soil samples were analyzed on a spectrophotometer and laboratory spectral signatures were derived. After correcting for solar radiation and atmospheric attenuation, the laboratory signatures were compared to the spectral signatures derived from these same soils using multispectral scanner data. Both signatures were used in supervised and unsupervised classification routines. Computer-generated maps using the laboratory and multispectral scanner derived signatures resulted in maps that were similar to maps resulting from field surveys. Approximately 90% agreement was obtained between classification maps produced using multispectral scanner derived signatures and laboratory derived signatures.

  5. Time Series Based for Online Signature Verification

    Directory of Open Access Journals (Sweden)

    I Ketut Gede Darma Putra

    2013-11-01

    Full Text Available Signature verification system is to match the tested signature with a claimed signature. This paper proposes time series based for feature extraction method and dynamic time warping for match method. The system made by process of testing 900 signatures belong to 50 participants, 3 signatures for reference and 5 signatures from original user, simple imposters and trained imposters for signatures test. The final result system was tested with 50 participants with 3 references. This test obtained that system accuracy without imposters is 90,44897959% at threshold 44 with rejection errors (FNMR is 5,2% and acceptance errors (FMR is 4,35102%, when with imposters system accuracy is 80,1361% at threshold 27 with error rejection (FNMR is 15,6% and acceptance errors (average FMR is 4,263946%, with details as follows: acceptance errors is 0,391837%, acceptance errors simple imposters is 3,2% and acceptance errors trained imposters is 9,2%.

  6. Signatures de l'invisible

    CERN Multimedia

    CERN Press Office. Geneva

    2000-01-01

    "Signatures of the Invisible" is an unique collaboration between contemporary artists and contemporary physicists which has the potential to help redefine the relationship between science and art. "Signatures of the Invisible" is jointly organised by the London Institute - the world's largest college of art and design and CERN*, the world's leading particle physics laboratory. 12 leading visual artists:

  7. A group signature scheme based on quantum teleportation

    International Nuclear Information System (INIS)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu

    2010-01-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  8. A group signature scheme based on quantum teleportation

    Energy Technology Data Exchange (ETDEWEB)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu, E-mail: wxjun36@gmail.co [Information Countermeasure Technique Research Institute, Harbin Institute of Technology, Harbin 150001 (China)

    2010-05-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  9. A Novel Energy-Efficient Approach for Human Activity Recognition.

    Science.gov (United States)

    Zheng, Lingxiang; Wu, Dihong; Ruan, Xiaoyang; Weng, Shaolin; Peng, Ao; Tang, Biyu; Lu, Hai; Shi, Haibin; Zheng, Huiru

    2017-09-08

    In this paper, we propose a novel energy-efficient approach for mobile activity recognition system (ARS) to detect human activities. The proposed energy-efficient ARS, using low sampling rates, can achieve high recognition accuracy and low energy consumption. A novel classifier that integrates hierarchical support vector machine and context-based classification (HSVMCC) is presented to achieve a high accuracy of activity recognition when the sampling rate is less than the activity frequency, i.e., the Nyquist sampling theorem is not satisfied. We tested the proposed energy-efficient approach with the data collected from 20 volunteers (14 males and six females) and the average recognition accuracy of around 96.0% was achieved. Results show that using a low sampling rate of 1Hz can save 17.3% and 59.6% of energy compared with the sampling rates of 5 Hz and 50 Hz. The proposed low sampling rate approach can greatly reduce the power consumption while maintaining high activity recognition accuracy. The composition of power consumption in online ARS is also investigated in this paper.

  10. Measuring energy performance with sectoral heterogeneity: A non-parametric frontier approach

    International Nuclear Information System (INIS)

    Wang, H.; Ang, B.W.; Wang, Q.W.; Zhou, P.

    2017-01-01

    Evaluating economy-wide energy performance is an integral part of assessing the effectiveness of a country's energy efficiency policy. Non-parametric frontier approach has been widely used by researchers for such a purpose. This paper proposes an extended non-parametric frontier approach to studying economy-wide energy efficiency and productivity performances by accounting for sectoral heterogeneity. Relevant techniques in index number theory are incorporated to quantify the driving forces behind changes in the economy-wide energy productivity index. The proposed approach facilitates flexible modelling of different sectors' production processes, and helps to examine sectors' impact on the aggregate energy performance. A case study of China's economy-wide energy efficiency and productivity performances in its 11th five-year plan period (2006–2010) is presented. It is found that sectoral heterogeneities in terms of energy performance are significant in China. Meanwhile, China's economy-wide energy productivity increased slightly during the study period, mainly driven by the technical efficiency improvement. A number of other findings have also been reported. - Highlights: • We model economy-wide energy performance by considering sectoral heterogeneity. • The proposed approach can identify sectors' impact on the aggregate energy performance. • Obvious sectoral heterogeneities are identified in evaluating China's energy performance.

  11. Spectral signatures for swash on reflective, intermediate and dissipative beaches

    DEFF Research Database (Denmark)

    Hughes, Michael G; Aagaard, Troels; Baldock, Tom E

    2014-01-01

    (reflective, intermediate and dissipative), with beach gradients ranging from approximately 1:6 to 1:60 exposed to offshore significant wave heights of 0.5–3.0 m. The ratio of swash energy in the short-wave (f > 0.05 Hz) to long-wave (f ... the three beach types. Swash energy at short-wave frequencies is dominant on reflective and intermediate beaches and swash at long-wave frequencies is dominant on dissipative beaches; consistent with previously reported spectral signatures for the surf zone on these beach types. The available swash spectra...

  12. Lattice-Based Revocable Certificateless Signature

    Directory of Open Access Journals (Sweden)

    Ying-Hao Hung

    2017-10-01

    Full Text Available Certificateless signatures (CLS are noticeable because they may resolve the key escrow problem in ID-based signatures and break away the management problem regarding certificate in conventional signatures. However, the security of the mostly previous CLS schemes relies on the difficulty of solving discrete logarithm or large integer factorization problems. These two problems would be solved by quantum computers in the future so that the signature schemes based on them will also become insecure. For post-quantum cryptography, lattice-based cryptography is significant due to its efficiency and security. However, no study on addressing the revocation problem in the existing lattice-based CLS schemes is presented. In this paper, we focus on the revocation issue and present the first revocable CLS (RCLS scheme over lattices. Based on the short integer solution (SIS assumption over lattices, the proposed lattice-based RCLS scheme is shown to be existential unforgeability against adaptive chosen message attacks. By performance analysis and comparisons, the proposed lattice-based RCLS scheme is better than the previously proposed lattice-based CLS scheme, in terms of private key size, signature length and the revocation mechanism.

  13. Signatures of energy flux in particle production: a black hole birth cry and death gasp

    Energy Technology Data Exchange (ETDEWEB)

    Good, Michael R.R. [Department of Physics, Nazarbayev University,53 Kabanbay Batyr Ave., Astana, Republic of (Kazakhstan); Ong, Yen Chin [Nordic Institute for Theoretical Physics, KTH Royal Institute of Technology Stockholm University,Roslagstullsbacken 23, SE-106 91 Stockholm (Sweden)

    2015-07-27

    It is recently argued that if the Hawking radiation process is unitary, then a black hole’s mass cannot be monotonically decreasing. We examine the time dependent particle count and negative energy flux in the non-trivial conformal vacuum via the moving mirror approach. A new, exactly unitary solution is presented which emits a characteristic above-thermal positive energy burst, a thermal plateau, and negative energy flux. It is found that the characteristic positive energy flare and thermal plateau is observed in the particle outflow. However, the results of time dependent particle production show no overt indication of negative energy flux. Therefore, a black hole’s birth cry is detectable by asymptotic observers via particle count, whereas its death gasp is not.

  14. Observation of energy-time dispersed ion structures in the magnetosheath by CLUSTER: possible signatures of transient acceleration processes at shock

    Directory of Open Access Journals (Sweden)

    P. Louarn

    Full Text Available We analyse energy-time dispersed ion signatures that have been observed by CLUSTER in the dayside magnetosheath. These events are characterized by sudden increases in the ion flux at energies larger than 10 keV. The high energy ions (30 keV are first detected, with the transition to the low energy ions (5 keV lasting about 100 s. These injections are often associated with transient plasma structures of a few minutes in duration, characterized by a hotter, less dense plasma and a diverted flow velocity, thus presenting similarities with "hot flow anomalies". They also involve modifications of the magnetic field direction, suggesting that the shock interacts with a solar wind discontinuity at the time of the event. The injections can originate from the magnetosphere or the shock region. Studying in detail a particular event, we discuss this last hypothesis. We show that the observed energy/time dispersion can be explained by combining a time-of-flight effect with a drift of the source of energetic particles along the shock. We propose that the acceleration results from a Fermi process linked to the interaction of the discontinuity with a quasi-perpendicular shock. This model explains the observed pitch-angle selection of the accelerated particles. The Fermi process acting on the beam of ions reflected from the shock appears to be sufficiently efficient to accelerate over short time scales (less than 30 s particles at energies above 30 keV.

    Key words. Magnetospheric physics (solar-wind-magnetosphere interaction; magnetosheath – Space plasma physics (shock waves

  15. Identification of Novel Serodiagnostic Signatures of Typhoid Fever Using a Salmonella Proteome Array

    Directory of Open Access Journals (Sweden)

    Thomas C. Darton

    2017-09-01

    Full Text Available Current diagnostic tests for typhoid fever, the disease caused by Salmonella Typhi, are poor. We aimed to identify serodiagnostic signatures of typhoid fever by assessing microarray signals to 4,445 S. Typhi antigens in sera from 41 participants challenged with oral S. Typhi. We found broad, heterogeneous antibody responses with increasing IgM/IgA signals at diagnosis. In down-selected 250-antigen arrays we validated responses in a second challenge cohort (n = 30, and selected diagnostic signatures using machine learning and multivariable modeling. In four models containing responses to antigens including flagellin, OmpA, HlyE, sipC, and LPS, multi-antigen signatures discriminated typhoid (n = 100 from other febrile bacteremia (n = 52 in Nepal. These models contained combinatorial IgM, IgA, and IgG responses to 5 antigens (ROC AUC, 0.67 and 0.71 or 3 antigens (0.87, although IgA responses to LPS also performed well (0.88. Using a novel systematic approach we have identified and validated optimal serological diagnostic signatures of typhoid fever.

  16. A multivariate-utility approach for selection of energy sources

    International Nuclear Information System (INIS)

    Ahmed, S; Husseiny, A.A.

    1978-01-01

    A deterministic approach is devised to compare the safety features of various energy sources. The approach is based on multiattribute utility theory. The method is used in evaluating the safety aspects of alternative energy sources used for the production of electrical energy. Four alternative energy sources are chosen which could be considered for the production of electricity to meet the national energy demand. These are nuclear, coal, solar, and geothermal energy. For simplicity, a total electrical system is considered in each case. A computer code is developed to evaluate the overall utility function for each alternative from the utility patterns corresponding to 23 energy attributes, mostly related to safety. The model can accommodate other attributes assuming that these are independent. The technique is kept flexible so that virtually any decision problem with various attributes can be attacked and optimal decisions can be reached. The selected data resulted in preference of geothermal and nuclear energy over other sources, and the method is found viable in making decisions on energy uses based on quantified and subjective attributes. (author)

  17. General Conversion for Obtaining Strongly Existentially Unforgeable Signatures

    Science.gov (United States)

    Teranishi, Isamu; Oyama, Takuro; Ogata, Wakaha

    We say that a signature scheme is strongly existentially unforgeable (SEU) if no adversary, given message/signature pairs adaptively, can generate a signature on a new message or a new signature on a previously signed message. We propose a general and efficient conversion in the standard model that transforms a secure signature scheme to SEU signature scheme. In order to construct that conversion, we use a chameleon commitment scheme. Here a chameleon commitment scheme is a variant of commitment scheme such that one can change the committed value after publishing the commitment if one knows the secret key. We define the chosen message security notion for the chameleon commitment scheme, and show that the signature scheme transformed by our proposed conversion satisfies the SEU property if the chameleon commitment scheme is chosen message secure. By modifying the proposed conversion, we also give a general and efficient conversion in the random oracle model, that transforms a secure signature scheme into a SEU signature scheme. This second conversion also uses a chameleon commitment scheme but only requires the key only attack security for it.

  18. A network-based gene expression signature informs prognosis and treatment for colorectal cancer patients.

    Directory of Open Access Journals (Sweden)

    Mingguang Shi

    Full Text Available Several studies have reported gene expression signatures that predict recurrence risk in stage II and III colorectal cancer (CRC patients with minimal gene membership overlap and undefined biological relevance. The goal of this study was to investigate biological themes underlying these signatures, to infer genes of potential mechanistic importance to the CRC recurrence phenotype and to test whether accurate prognostic models can be developed using mechanistically important genes.We investigated eight published CRC gene expression signatures and found no functional convergence in Gene Ontology enrichment analysis. Using a random walk-based approach, we integrated these signatures and publicly available somatic mutation data on a protein-protein interaction network and inferred 487 genes that were plausible candidate molecular underpinnings for the CRC recurrence phenotype. We named the list of 487 genes a NEM signature because it integrated information from Network, Expression, and Mutation. The signature showed significant enrichment in four biological processes closely related to cancer pathophysiology and provided good coverage of known oncogenes, tumor suppressors, and CRC-related signaling pathways. A NEM signature-based Survival Support Vector Machine prognostic model was trained using a microarray gene expression dataset and tested on an independent dataset. The model-based scores showed a 75.7% concordance with the real survival data and separated patients into two groups with significantly different relapse-free survival (p = 0.002. Similar results were obtained with reversed training and testing datasets (p = 0.007. Furthermore, adjuvant chemotherapy was significantly associated with prolonged survival of the high-risk patients (p = 0.006, but not beneficial to the low-risk patients (p = 0.491.The NEM signature not only reflects CRC biology but also informs patient prognosis and treatment response. Thus, the network

  19. Holistic Approach to Data Center Energy Efficiency

    Energy Technology Data Exchange (ETDEWEB)

    Hammond, Steven W [National Renewable Energy Laboratory (NREL), Golden, CO (United States)

    2017-09-18

    This presentation discusses NREL's Energy System Integrations Facility and NREL's holistic design approach to sustainable data centers that led to the world's most energy-efficient data center. It describes Peregrine, a warm water liquid cooled supercomputer, waste heat reuse in the data center, demonstrated PUE and ERE, and lessons learned during four years of operation.

  20. Experimental investigation on the hydrodynamics of a gas–liquid–solid fluidized bed using vibration signature and pressure fluctuation analyses

    International Nuclear Information System (INIS)

    Sheikhi, Amir; Sotudeh-Gharebagh, Rahmat; Mostoufi, Navid; Zarghami, Reza

    2013-01-01

    Highlights: • Bed shell vibration fluctuation is introduced as a novel non-invasive monitoring method in three-phase fluidized beds. • Analyses of vibration signatures and pressure fluctuations were performed to characterize gas–liquid–solid fluidized beds. • These enabled further investigation on the dual effect of solid particles on the local and global bed hydrodynamics. -- Abstract: Simultaneous analyses of vibration signatures and pressure fluctuations were performed to investigate the hydrodynamics of a conventional three-phase gas–liquid–solid fluidized bed over a wide range of operating conditions. Non-intrusive vibration signature and pressure fluctuation signals were acquired by means of accelerometers and a piezoresistive pressure transducer, respectively. Comprehensive study on the standard deviation of pressure fluctuations was conducted simultaneously with two new statistical analyses on the pressure fluctuations, namely signal energy and average cycle frequency, which presented a new method of determining minimum liquid-fluidization velocity. This enabled further investigation on the dual effect of solid particles on the local hydrodynamics in the three-phase beds. The vibration analysis of the bed was introduced as a novel and non-invasive tool, which proved to be a robust representative of the global governing regimes suggesting a new approach on the dual effect of solid particles on the bed global hydrodynamics. These methods can pave the way towards the non-invasive hydrodynamic characterization of industrial three-phase reactors

  1. Signatures of Extended Storage of Used Nuclear Fuel in Casks

    Energy Technology Data Exchange (ETDEWEB)

    Rauch, Eric Benton [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-09-28

    As the amount of used nuclear fuel continues to grow, more and more used nuclear fuel will be transferred to storage casks. A consolidated storage facility is currently in the planning stages for storing these casks, where at least 10,000 MTHM of fuel will be stored. This site will have potentially thousands of casks once it is operational. A facility this large presents new safeguards and nuclear material accounting concerns. A new signature based on the distribution of neutron sources and multiplication within casks was part of the Department of Energy Office of Nuclear Energy’s Material Protection, Account and Control Technologies (MPACT) campaign. Under this project we looked at fingerprinting each cask's neutron signature. Each cask has a unique set of fuel, with a unique spread of initial enrichment, burnup, cooling time, and power history. The unique set of fuel creates a unique signature of neutron intensity based on the arrangement of the assemblies. The unique arrangement of neutron sources and multiplication produces a reliable and unique identification of the cask that has been shown to be relatively constant over long time periods. The work presented here could be used to restore from a loss of continuity of knowledge at the storage site. This presentation will show the steps used to simulate and form this signature from the start of the effort through its conclusion in September 2016.

  2. Energy-efficient approach to minimizing the energy consumption in an extended job-shop scheduling problem

    Science.gov (United States)

    Tang, Dunbing; Dai, Min

    2015-09-01

    The traditional production planning and scheduling problems consider performance indicators like time, cost and quality as optimization objectives in manufacturing processes. However, environmentally-friendly factors like energy consumption of production have not been completely taken into consideration. Against this background, this paper addresses an approach to modify a given schedule generated by a production planning and scheduling system in a job shop floor, where machine tools can work at different cutting speeds. It can adjust the cutting speeds of the operations while keeping the original assignment and processing sequence of operations of each job fixed in order to obtain energy savings. First, the proposed approach, based on a mixed integer programming mathematical model, changes the total idle time of the given schedule to minimize energy consumption in the job shop floor while accepting the optimal solution of the scheduling objective, makespan. Then, a genetic-simulated annealing algorithm is used to explore the optimal solution due to the fact that the problem is strongly NP-hard. Finally, the effectiveness of the approach is performed smalland large-size instances, respectively. The experimental results show that the approach can save 5%-10% of the average energy consumption while accepting the optimal solution of the makespan in small-size instances. In addition, the average maximum energy saving ratio can reach to 13%. And it can save approximately 1%-4% of the average energy consumption and approximately 2.4% of the average maximum energy while accepting the near-optimal solution of the makespan in large-size instances. The proposed research provides an interesting point to explore an energy-aware schedule optimization for a traditional production planning and scheduling problem.

  3. Radar micro-doppler signatures processing and applications

    CERN Document Server

    Chen, Victor C; Miceli, William J

    2014-01-01

    Radar Micro-Doppler Signatures: Processing and applications concentrates on the processing and application of radar micro-Doppler signatures in real world situations, providing readers with a good working knowledge on a variety of applications of radar micro-Doppler signatures.

  4. Coupling Thermal and Chemical Signatures of Crustal Magma Bodies: Energy-Constrained Eruption, Recharge, Assimilation, and Fractional Crystallization (E'RAχFC)

    Science.gov (United States)

    Bohrson, W. A.; Spera, F. J.

    2004-12-01

    Energy-Constrained Eruption, Recharge, Assimilation and Fractional Crystallization (E'RAχFC) tracks the evolution of an open-system magmatic system by coupling conservation equations governing energy, mass and species (isotopes and trace elements). By linking the compositional characteristics of a composite magmatic system (host magma, recharge magma, wallrock, eruptive reservoir) to its mass and energy fluxes, predictions can be made about the chemical evolution of systems characterized by distinct compositional and thermal characteristics. An interesting application of E'RAχFC involves documenting the influence distinct thermal regimes have on the chemical evolution of magmatic systems. Heat transfer between a magma-country rock system at epizonal depths can be viewed as a conjugate heat transfer problem in which the average country rock-magma boundary temperature, Tb, is governed by the relative vigor of hydrothermal convection in the country rock vs. magma convection. For cases where hydrothermal circulation is vigorous and magmatic heat is efficiently transported away from the boundary, contact aureole temperatures (~Tb) are low. In cases where magmatic heat can not be efficiently transported away from the boundary and hydrothermal cells are absent or poorly developed, Tb is relatively high. Simultaneous solution of the differential equations governing momentum and energy conservation and continuity for the coupled hydrothermal-magmatic conjugate heat transfer system enables calculation of the characteristic timescale for EC-RAFC evolution and development of hydrothermal deposits as a function of material and medium properties, sizes of systems and relative efficiency of hydrothermal vs. magmatic heat transfer. Characteristic timescales lie in the range 102-106 yr depending on system size, magma properties and permeability among other parameters. In E'RAχFC, Tb is approximated by the user-defined equilibration temperature, Teq, which is the temperature at

  5. 10 CFR 2.304 - Formal requirements for documents; signatures; acceptance for filing.

    Science.gov (United States)

    2010-01-01

    ... through the E-Filing system written testimony or hearing exhibits in advance of a hearing, the written... for filing. 2.304 Section 2.304 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR DOMESTIC...; signatures; acceptance for filing. (a) Docket numbers and titles. Each document filed in an adjudication to...

  6. Cortical Signatures of Dyslexia and Remediation: An Intrinsic Functional Connectivity Approach

    Science.gov (United States)

    Koyama, Maki S.; Di Martino, Adriana; Kelly, Clare; Jutagir, Devika R.; Sunshine, Jessica; Schwartz, Susan J.; Castellanos, Francisco X.; Milham, Michael P.

    2013-01-01

    This observational, cross-sectional study investigates cortical signatures of developmental dyslexia, particularly from the perspective of behavioral remediation. We employed resting-state fMRI, and compared intrinsic functional connectivity (iFC) patterns of known reading regions (seeds) among three dyslexia groups characterized by (a) no remediation (current reading and spelling deficits), (b) partial remediation (only reading deficit remediated), and (c) full remediation (both reading and spelling deficits remediated), and a group of age- and IQ-matched typically developing children (TDC) (total N = 44, age range = 7–15 years). We observed significant group differences in iFC of two seeds located in the left posterior reading network – left intraparietal sulcus (L.IPS) and left fusiform gyrus (L.FFG). Specifically, iFC between L.IPS and left middle frontal gyrus was significantly weaker in all dyslexia groups, irrespective of remediation status/literacy competence, suggesting that persistent dysfunction in the fronto-parietal attention network characterizes dyslexia. Additionally, relative to both TDC and the no remediation group, the remediation groups exhibited stronger iFC between L.FFG and right middle occipital gyrus (R.MOG). The full remediation group also exhibited stronger negative iFC between the same L.FFG seed and right medial prefrontal cortex (R.MPFC), a core region of the default network These results suggest that behavioral remediation may be associated with compensatory changes anchored in L.FFG, which reflect atypically stronger coupling between posterior visual regions (L.FFG-R.MOG) and greater functional segregation between task-positive and task-negative regions (L.FFG-R.MPFC). These findings were bolstered by significant relationships between the strength of the identified functional connections and literacy scores. We conclude that examining iFC can reveal cortical signatures of dyslexia with particular promise for monitoring

  7. Source Apportionment and Risk Assessment of Emerging Contaminants: An Approach of Pharmaco-Signature in Water Systems

    Science.gov (United States)

    Jiang, Jheng Jie; Lee, Chon Lin; Fang, Meng Der; Boyd, Kenneth G.; Gibb, Stuart W.

    2015-01-01

    This paper presents a methodology based on multivariate data analysis for characterizing potential source contributions of emerging contaminants (ECs) detected in 26 river water samples across multi-scape regions during dry and wet seasons. Based on this methodology, we unveil an approach toward potential source contributions of ECs, a concept we refer to as the “Pharmaco-signature.” Exploratory analysis of data points has been carried out by unsupervised pattern recognition (hierarchical cluster analysis, HCA) and receptor model (principal component analysis-multiple linear regression, PCA-MLR) in an attempt to demonstrate significant source contributions of ECs in different land-use zone. Robust cluster solutions grouped the database according to different EC profiles. PCA-MLR identified that 58.9% of the mean summed ECs were contributed by domestic impact, 9.7% by antibiotics application, and 31.4% by drug abuse. Diclofenac, ibuprofen, codeine, ampicillin, tetracycline, and erythromycin-H2O have significant pollution risk quotients (RQ>1), indicating potentially high risk to aquatic organisms in Taiwan. PMID:25874375

  8. Physics Signatures at CLIC

    CERN Document Server

    Battaglia, Marco

    2001-01-01

    A set of signatures for physics processes of potential interests for the CLIC programme at = 1 - 5 TeV are discussed. These signatures, that may correspond to the manifestation of different scenarios of new physics as well as to Standard Model precision tests, are proposed as benchmarks for the optimisation of the CLIC accelerator parameters and for a first definition of the required detector response.

  9. A stochastic approach to the reconstruction of prehistoric human diet in the Pacific region from bone isotope signatures

    International Nuclear Information System (INIS)

    Leach, B.F.; Quinn, C.J.; Lyon, G.L.

    1996-01-01

    A theoretical constraint on dietary reconstructions using isotope analyses of human bones is that for a given number of isotopes, N, one cannot calculate the proportions of more than N+1 food types. This strict algebraic limitation can be relaxed by adopting a stochastic approach, recommended by Mingawa (1992). This strategy is investigated for prehistoric diet in the South Pacific region, focusing on seven of the main food types available to these people: C3 plants, C4 plants, land herbivores, marine shellfish, coral reef fish, non-reef fish, and marine mammals. Sixty-three underlying assumptions were identified and examined in detail. These consist of the mean values for each food type of protein, energy δ 1 3C, δ 1 5N, 3 4S; the offset values for each isotope from the food to human bone collagen; fractionation effects from flesh to collagen in animals; and acceptable daily intake ranges for protein and energy in human diet. Because of the complexity of the environmental regimes in the Pacific it was also found necessary to tabulate these assumptions into tow groups: one set of assumptions relevant to prehistoric people whose environment is dominated by maritime conditions, such as atolls, and a second set where the land is the dominant influence. . A computer simulation algorithm is developed which is based on Mingawa's method. This was tested using a 'Reverse Experiment' procedure. By taking a diet of known percentage weight composition the isotope composition of human bone was forward calculated from this diet. The algorithm was then employed on this isotope signature to see if the original food composition could be calculated in reverse. The differences between real and calculated food weight percentages for the seven foods were 4.8, 0.1, 4.5, 1.8, 1.5, 1.8 and 1.4% respectively. These were all within aceptable statistical limits. Using the full set of assumptions it was then tested on isotope results for δ 1 3C, δ 1 5N and 3 4S for a prehistoric Pacific

  10. Signatures of discrete breathers in coherent state quantum dynamics

    International Nuclear Information System (INIS)

    Igumenshchev, Kirill; Ovchinnikov, Misha; Prezhdo, Oleg; Maniadis, Panagiotis

    2013-01-01

    In classical mechanics, discrete breathers (DBs) – a spatial time-periodic localization of energy – are predicted in a large variety of nonlinear systems. Motivated by a conceptual bridging of the DB phenomena in classical and quantum mechanical representations, we study their signatures in the dynamics of a quantum equivalent of a classical mechanical point in phase space – a coherent state. In contrast to the classical point that exhibits either delocalized or localized motion, the coherent state shows signatures of both localized and delocalized behavior. The transition from normal to local modes have different characteristics in quantum and classical perspectives. Here, we get an insight into the connection between classical and quantum perspectives by analyzing the decomposition of the coherent state into system's eigenstates, and analyzing the spacial distribution of the wave-function density within these eigenstates. We find that the delocalized and localized eigenvalue components of the coherent state are separated by a mixed region, where both kinds of behavior can be observed. Further analysis leads to the following observations. Considered as a function of coupling, energy eigenstates go through avoided crossings between tunneling and non-tunneling modes. The dominance of tunneling modes in the high nonlinearity region is compromised by the appearance of new types of modes – high order tunneling modes – that are similar to the tunneling modes but have attributes of non-tunneling modes. Certain types of excitations preferentially excite higher order tunneling modes, allowing one to study their properties. Since auto-correlation functions decrease quickly in highly nonlinear systems, short-time dynamics are sufficient for modeling quantum DBs. This work provides a foundation for implementing modern semi-classical methods to model quantum DBs, bridging classical and quantum mechanical signatures of DBs, and understanding spectroscopic experiments

  11. Towards effective and robust list-based packet filter for signature-based network intrusion detection: an engineering approach

    DEFF Research Database (Denmark)

    Meng, Weizhi; Li, Wenjuan; Kwok, Lam For

    2017-01-01

    Network intrusion detection systems (NIDSs) which aim to identify various attacks, have become an essential part of current security infrastructure. In particular, signature-based NIDSs are being widely implemented in industry due to their low rate of false alarms. However, the signature matching...... this problem, packet filtration is a promising solution to reduce unwanted traffic. Motivated by this, in this work, a list-based packet filter was designed and an engineering method of combining both blacklist and whitelist techniques was introduced. To further secure such filters against IP spoofing attacks...... in traffic filtration as well as workload reduction, and is robust against IP spoofing attacks....

  12. Predicting energy performance of a net-zero energy building: A statistical approach

    International Nuclear Information System (INIS)

    Kneifel, Joshua; Webb, David

    2016-01-01

    Highlights: • A regression model is applied to actual energy data from a net-zero energy building. • The model is validated through a rigorous statistical analysis. • Comparisons are made between model predictions and those of a physics-based model. • The model is a viable baseline for evaluating future models from the energy data. - Abstract: Performance-based building requirements have become more prevalent because it gives freedom in building design while still maintaining or exceeding the energy performance required by prescriptive-based requirements. In order to determine if building designs reach target energy efficiency improvements, it is necessary to estimate the energy performance of a building using predictive models and different weather conditions. Physics-based whole building energy simulation modeling is the most common approach. However, these physics-based models include underlying assumptions and require significant amounts of information in order to specify the input parameter values. An alternative approach to test the performance of a building is to develop a statistically derived predictive regression model using post-occupancy data that can accurately predict energy consumption and production based on a few common weather-based factors, thus requiring less information than simulation models. A regression model based on measured data should be able to predict energy performance of a building for a given day as long as the weather conditions are similar to those during the data collection time frame. This article uses data from the National Institute of Standards and Technology (NIST) Net-Zero Energy Residential Test Facility (NZERTF) to develop and validate a regression model to predict the energy performance of the NZERTF using two weather variables aggregated to the daily level, applies the model to estimate the energy performance of hypothetical NZERTFs located in different cities in the Mixed-Humid Climate Zone, and compares these

  13. Sustainability index approach as a selection criteria for energy storage system of an intermittent renewable energy source

    International Nuclear Information System (INIS)

    Raza, Syed Shabbar; Janajreh, Isam; Ghenai, Chaouki

    2014-01-01

    Highlights: • Three renewable energy storage options considered: lead acid and lithium polymer batteries and fuel cell. • Hydrogen fuel cell system is the most feasible energy storage option for the long term energy storage. • Sustainability index approach is a novel method used to quantify the qualitative properties of the system. - Abstract: The sustainability index is an adaptive, multicriteria and novel technique that is used to compare different energy storage systems for their sustainability. This innovative concept utilizes both qualitative and quantitative results to measure sustainability through an index based approach. This report aims to compare three different energy storage options for an intermittent renewable energy source. The three energy storage options are lead acid batteries, lithium polymer batteries and fuel cell systems, that are selected due to their availability and the geographical constrain of using other energy storage options. The renewable energy source used is solar photovoltaic (PV). Several technical, economic and environmental factors have been discussed elaborately which would help us to evaluate the merits of the energy storage system for long term storage. Finally, a novel sustainability index has been proposed which quantifies the qualitative and quantitative aspects of the factors discussed, and thus helps us choose the ideal energy storage system for our scenario. A weighted sum approach is used to quantify each factor according to their importance. After a detailed analysis of the three energy storage systems through the sustainability index approach, the most feasible energy storage option was found to be fuel cell systems which can provide a long term energy storage option and also environmental friendly

  14. Innovative Phase Change Approach for Significant Energy Savings

    Science.gov (United States)

    2016-09-01

    related to the production, use, transmission , storage, control, or conservation of energy that will – (A) reduce the need for additional energy supplies...Conditions set for operation were: a. The computer with the broadband wireless card is to be used for data collection, transmission and...FINAL REPORT Innovative Phase Change Approach for Significant Energy Savings ESTCP Project EW-201138 SEPTEMBER 2016 Dr. Aly H Shaaban Applied

  15. ION ACCELERATION AT THE QUASI-PARALLEL BOW SHOCK: DECODING THE SIGNATURE OF INJECTION

    Energy Technology Data Exchange (ETDEWEB)

    Sundberg, Torbjörn; Haynes, Christopher T.; Burgess, D. [School of Physics and Astronomy, Queen Mary University of London, London, E1 4NS (United Kingdom); Mazelle, Christian X. [IRAP, Université Paul Sabatier Toulouse III-CNRS, 31028 Toulouse Cedex 4 (France)

    2016-03-20

    Collisionless shocks are efficient particle accelerators. At Earth, ions with energies exceeding 100 keV are seen upstream of the bow shock when the magnetic geometry is quasi-parallel, and large-scale supernova remnant shocks can accelerate ions into cosmic-ray energies. This energization is attributed to diffusive shock acceleration; however, for this process to become active, the ions must first be sufficiently energized. How and where this initial acceleration takes place has been one of the key unresolved issues in shock acceleration theory. Using Cluster spacecraft observations, we study the signatures of ion reflection events in the turbulent transition layer upstream of the terrestrial bow shock, and with the support of a hybrid simulation of the shock, we show that these reflection signatures are characteristic of the first step in the ion injection process. These reflection events develop in particular in the region where the trailing edge of large-amplitude upstream waves intercept the local shock ramp and the upstream magnetic field changes from quasi-perpendicular to quasi-parallel. The dispersed ion velocity signature observed can be attributed to a rapid succession of ion reflections at this wave boundary. After the ions’ initial interaction with the shock, they flow upstream along the quasi-parallel magnetic field. Each subsequent wavefront in the upstream region will sweep the ions back toward the shock, where they gain energy with each transition between the upstream and the shock wave frames. Within three to five gyroperiods, some ions have gained enough parallel velocity to escape upstream, thus completing the injection process.

  16. Analysis of an indirect neutron signature for enhanced UF_6 cylinder verification

    International Nuclear Information System (INIS)

    Kulisek, J.A.; McDonald, B.S.; Smith, L.E.; Zalavadia, M.A.; Webster, J.B.

    2017-01-01

    The International Atomic Energy Agency (IAEA) currently uses handheld gamma-ray spectrometers combined with ultrasonic wall-thickness gauges to verify the declared enrichment of uranium hexafluoride (UF_6) cylinders. The current method provides relatively low accuracy for the assay of "2"3"5U enrichment, especially for natural and depleted UF_6. Furthermore, the current method provides no capability to assay the absolute mass of "2"3"5U in the cylinder due to the localized instrument geometry and limited penetration of the 186-keV gamma-ray signature from "2"3"5U. Also, the current verification process is a time-consuming component of on-site inspections at uranium enrichment plants. Toward the goal of a more-capable cylinder assay method, the Pacific Northwest National Laboratory has developed the hybrid enrichment verification array (HEVA). HEVA measures both the traditional 186-keV direct signature and a non-traditional, high-energy neutron-induced signature (HEVA_N_T). HEVA_N_T enables full-volume assay of UF_6 cylinders by exploiting the relatively larger mean free paths of the neutrons emitted from the UF_6. In this work, Monte Carlo modeling is used as the basis for characterizing HEVA_N_T in terms of the individual contributions to HEVA_N_T from nuclides and hardware components. Monte Carlo modeling is also used to quantify the intrinsic efficiency of HEVA for neutron detection in a cylinder-assay geometry. Modeling predictions are validated against neutron-induced gamma-ray spectra from laboratory measurements and a relatively large population of Type 30B cylinders spanning a range of enrichments. Implications of the analysis and findings on the viability of HEVA for cylinder verification are discussed, such as the resistance of the HEVA_N_T signature to manipulation by the nearby placement of neutron-conversion materials.

  17. 48 CFR 204.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Contracting officer's signature. 204.101 Section 204.101 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS... officer's signature. Follow the procedures at PGI 204.101 for signature of contract documents. [71 FR 9268...

  18. The normative feedback approach for energy conservation behavior in the military community

    International Nuclear Information System (INIS)

    Shen, Meng; Young, Robert; Cui, Qingbin

    2016-01-01

    In the field of energy conservation programs, the behavior-based method, especially the normative feedback approach, has emerged as a cost-effective solution for energy savings. However it remains doubtful whether normative feedback would generate significant energy savings in absence of financial accountability and whether the normative feedback is influenced by the proximity of the comparison groups. Here we test various normative feedback approaches at the Joint Base Andrews in Maryland, with an objective of understanding this approach. We show that the normative feedback approach can lead to 3.4% energy savings, even when residents are not billed for their electricity usage. Through an analysis of covariance, this paper evaluates the effects of different proximities of comparison and concludes that a street-level comparison level can generate the highest energy savings of 5.4%. Furthermore, this paper also explores and defines the relationship between electricity savings and physical variables including home size, unit type, neighborhood, and the variation of cooling degree days. The study contributes to the understanding of how to realizing the full potential of normative feedback approach in energy savings. - Highlights: • Normative feedback leads to 3.4% energy savings even without financial incentives. • The study identifies the mere-exposure effect of normative feedback approach. • The street-level comparison doubles the energy savings compared to other levels. • Optimal normative feedback for energy saving should be compared at street-level. • Medium-sized homes in experiment show the greatest potential for energy savings.

  19. Changing energy-related behavior: An Intervention Mapping approach

    International Nuclear Information System (INIS)

    Kok, Gerjo; Lo, Siu Hing; Peters, Gjalt-Jorn Y.; Ruiter, Robert A.C.

    2011-01-01

    This paper's objective is to apply Intervention Mapping, a planning process for the systematic development of theory- and evidence-based health promotion interventions, to the development of interventions to promote energy conservation behavior. Intervention Mapping (IM) consists of six steps: needs assessment, program objectives, methods and applications, program development, planning for program implementation, and planning for program evaluation. Examples from the energy conservation field are provided to illustrate the activities associated with these steps. It is concluded that applying IM in the energy conservation field may help the development of effective behavior change interventions, and thus develop a domain specific knowledge-base for effective intervention design. - Highlights: → Intervention Mapping (IM) is a planning process for developing evidence-based interventions.→ IM takes a problem-driven rather than theory-driven approach. → IM can be applied to the promotion of energy-conservation in a multilevel approach. → IM helps identifying determinants of behaviors and environmental conditions. → IM helps selecting appropriate theory-based methods and practical applications.

  20. Changing energy-related behavior: An Intervention Mapping approach

    Energy Technology Data Exchange (ETDEWEB)

    Kok, Gerjo, E-mail: g.kok@maastrichtuniversity.nl [Department of Work and Social Psychology, Maastricht University, P.O. Box 616, 6200 MD Maastricht (Netherlands); Lo, Siu Hing, E-mail: siu-hing.lo@maastrichtuniversity.nl [Department of Work and Social Psychology, Maastricht University, P.O. Box 616, 6200 MD Maastricht (Netherlands); Peters, Gjalt-Jorn Y., E-mail: gj.peters@maastrichtuniversity.nl [Department of Work and Social Psychology, Maastricht University, P.O. Box 616, 6200 MD Maastricht (Netherlands); Ruiter, Robert A.C., E-mail: r.ruiter@maastrichtuniversity.nl [Department of Work and Social Psychology, Maastricht University, P.O. Box 616, 6200 MD Maastricht (Netherlands)

    2011-09-15

    This paper's objective is to apply Intervention Mapping, a planning process for the systematic development of theory- and evidence-based health promotion interventions, to the development of interventions to promote energy conservation behavior. Intervention Mapping (IM) consists of six steps: needs assessment, program objectives, methods and applications, program development, planning for program implementation, and planning for program evaluation. Examples from the energy conservation field are provided to illustrate the activities associated with these steps. It is concluded that applying IM in the energy conservation field may help the development of effective behavior change interventions, and thus develop a domain specific knowledge-base for effective intervention design. - Highlights: > Intervention Mapping (IM) is a planning process for developing evidence-based interventions.> IM takes a problem-driven rather than theory-driven approach. > IM can be applied to the promotion of energy-conservation in a multilevel approach. > IM helps identifying determinants of behaviors and environmental conditions. > IM helps selecting appropriate theory-based methods and practical applications.

  1. Graphic Symbol Recognition using Graph Based Signature and Bayesian Network Classifier

    OpenAIRE

    Luqman, Muhammad Muzzamil; Brouard, Thierry; Ramel, Jean-Yves

    2010-01-01

    We present a new approach for recognition of complex graphic symbols in technical documents. Graphic symbol recognition is a well known challenge in the field of document image analysis and is at heart of most graphic recognition systems. Our method uses structural approach for symbol representation and statistical classifier for symbol recognition. In our system we represent symbols by their graph based signatures: a graphic symbol is vectorized and is converted to an attributed relational g...

  2. A prognostic gene signature for metastasis-free survival of triple negative breast cancer patients.

    Science.gov (United States)

    Lee, Unjin; Frankenberger, Casey; Yun, Jieun; Bevilacqua, Elena; Caldas, Carlos; Chin, Suet-Feung; Rueda, Oscar M; Reinitz, John; Rosner, Marsha Rich

    2013-01-01

    Although triple negative breast cancers (TNBC) are the most aggressive subtype of breast cancer, they currently lack targeted therapies. Because this classification still includes a heterogeneous collection of tumors, new tools to classify TNBCs are urgently required in order to improve our prognostic capability for high risk patients and predict response to therapy. We previously defined a gene expression signature, RKIP Pathway Metastasis Signature (RPMS), based upon a metastasis-suppressive signaling pathway initiated by Raf Kinase Inhibitory Protein (RKIP). We have now generated a new BACH1 Pathway Metastasis gene signature (BPMS) that utilizes targets of the metastasis regulator BACH1. Specifically, we substituted experimentally validated target genes to generate a new BACH1 metagene, developed an approach to optimize patient tumor stratification, and reduced the number of signature genes to 30. The BPMS significantly and selectively stratified metastasis-free survival in basal-like and, in particular, TNBC patients. In addition, the BPMS further stratified patients identified as having a good or poor prognosis by other signatures including the Mammaprint® and Oncotype® clinical tests. The BPMS is thus complementary to existing signatures and is a prognostic tool for high risk ER-HER2- patients. We also demonstrate the potential clinical applicability of the BPMS as a single sample predictor. Together, these results reveal the potential of this pathway-based BPMS gene signature to identify high risk TNBC patients that can respond effectively to targeted therapy, and highlight BPMS genes as novel drug targets for therapeutic development.

  3. A prognostic gene signature for metastasis-free survival of triple negative breast cancer patients.

    Directory of Open Access Journals (Sweden)

    Unjin Lee

    Full Text Available Although triple negative breast cancers (TNBC are the most aggressive subtype of breast cancer, they currently lack targeted therapies. Because this classification still includes a heterogeneous collection of tumors, new tools to classify TNBCs are urgently required in order to improve our prognostic capability for high risk patients and predict response to therapy. We previously defined a gene expression signature, RKIP Pathway Metastasis Signature (RPMS, based upon a metastasis-suppressive signaling pathway initiated by Raf Kinase Inhibitory Protein (RKIP. We have now generated a new BACH1 Pathway Metastasis gene signature (BPMS that utilizes targets of the metastasis regulator BACH1. Specifically, we substituted experimentally validated target genes to generate a new BACH1 metagene, developed an approach to optimize patient tumor stratification, and reduced the number of signature genes to 30. The BPMS significantly and selectively stratified metastasis-free survival in basal-like and, in particular, TNBC patients. In addition, the BPMS further stratified patients identified as having a good or poor prognosis by other signatures including the Mammaprint® and Oncotype® clinical tests. The BPMS is thus complementary to existing signatures and is a prognostic tool for high risk ER-HER2- patients. We also demonstrate the potential clinical applicability of the BPMS as a single sample predictor. Together, these results reveal the potential of this pathway-based BPMS gene signature to identify high risk TNBC patients that can respond effectively to targeted therapy, and highlight BPMS genes as novel drug targets for therapeutic development.

  4. 36 CFR 1150.22 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Signature of documents. 1150.22 Section 1150.22 Parks, Forests, and Public Property ARCHITECTURAL AND TRANSPORTATION BARRIERS... Documents for Proceedings on Citations § 1150.22 Signature of documents. The signature of a party...

  5. An integrated DEA PCA numerical taxonomy approach for energy efficiency assessment and consumption optimization in energy intensive manufacturing sectors

    International Nuclear Information System (INIS)

    Azadeh, A.; Amalnick, M.S.; Ghaderi, S.F.; Asadzadeh, S.M.

    2007-01-01

    This paper introduces an integrated approach based on data envelopment analysis (DEA), principal component analysis (PCA) and numerical taxonomy (NT) for total energy efficiency assessment and optimization in energy intensive manufacturing sectors. Total energy efficiency assessment and optimization of the proposed approach considers structural indicators in addition conventional consumption and manufacturing sector output indicators. The validity of the DEA model is verified and validated by PCA and NT through Spearman correlation experiment. Moreover, the proposed approach uses the measure-specific super-efficiency DEA model for sensitivity analysis to determine the critical energy carriers. Four energy intensive manufacturing sectors are discussed in this paper: iron and steel, pulp and paper, petroleum refining and cement manufacturing sectors. To show superiority and applicability, the proposed approach has been applied to refinery sub-sectors of some OECD (Organization for Economic Cooperation and Development) countries. This study has several unique features which are: (1) a total approach which considers structural indicators in addition to conventional energy efficiency indicators; (2) a verification and validation mechanism for DEA by PCA and NT and (3) utilization of DEA for total energy efficiency assessment and consumption optimization of energy intensive manufacturing sectors

  6. Prognostic breast cancer signature identified from 3D culture model accurately predicts clinical outcome across independent datasets

    Energy Technology Data Exchange (ETDEWEB)

    Martin, Katherine J.; Patrick, Denis R.; Bissell, Mina J.; Fournier, Marcia V.

    2008-10-20

    One of the major tenets in breast cancer research is that early detection is vital for patient survival by increasing treatment options. To that end, we have previously used a novel unsupervised approach to identify a set of genes whose expression predicts prognosis of breast cancer patients. The predictive genes were selected in a well-defined three dimensional (3D) cell culture model of non-malignant human mammary epithelial cell morphogenesis as down-regulated during breast epithelial cell acinar formation and cell cycle arrest. Here we examine the ability of this gene signature (3D-signature) to predict prognosis in three independent breast cancer microarray datasets having 295, 286, and 118 samples, respectively. Our results show that the 3D-signature accurately predicts prognosis in three unrelated patient datasets. At 10 years, the probability of positive outcome was 52, 51, and 47 percent in the group with a poor-prognosis signature and 91, 75, and 71 percent in the group with a good-prognosis signature for the three datasets, respectively (Kaplan-Meier survival analysis, p<0.05). Hazard ratios for poor outcome were 5.5 (95% CI 3.0 to 12.2, p<0.0001), 2.4 (95% CI 1.6 to 3.6, p<0.0001) and 1.9 (95% CI 1.1 to 3.2, p = 0.016) and remained significant for the two larger datasets when corrected for estrogen receptor (ER) status. Hence the 3D-signature accurately predicts breast cancer outcome in both ER-positive and ER-negative tumors, though individual genes differed in their prognostic ability in the two subtypes. Genes that were prognostic in ER+ patients are AURKA, CEP55, RRM2, EPHA2, FGFBP1, and VRK1, while genes prognostic in ER patients include ACTB, FOXM1 and SERPINE2 (Kaplan-Meier p<0.05). Multivariable Cox regression analysis in the largest dataset showed that the 3D-signature was a strong independent factor in predicting breast cancer outcome. The 3D-signature accurately predicts breast cancer outcome across multiple datasets and holds prognostic

  7. 17 CFR 201.65 - Identity and signature.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Identity and signature. 201.65... of 1934 § 201.65 Identity and signature. Applications pursuant to this subpart may omit the identity, mailing address, and signature of the applicant; provided, that such identity, mailing address and...

  8. 15 CFR 908.16 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Signature. 908.16 Section 908.16 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) NATIONAL OCEANIC... SUBMITTING REPORTS ON WEATHER MODIFICATION ACTIVITIES § 908.16 Signature. All reports filed with the National...

  9. 34 CFR 101.32 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Signature of documents. 101.32 Section 101.32 Education Regulations of the Offices of the Department of Education OFFICE FOR CIVIL RIGHTS, DEPARTMENT OF EDUCATION... Documents § 101.32 Signature of documents. The signature of a party, authorized officer, employee or...

  10. 29 CFR 102.116 - Signature of orders.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 2 2010-07-01 2010-07-01 false Signature of orders. 102.116 Section 102.116 Labor Regulations Relating to Labor NATIONAL LABOR RELATIONS BOARD RULES AND REGULATIONS, SERIES 8 Certification and Signature of Documents § 102.116 Signature of orders. The executive secretary or the associate executive...

  11. Joint Application of Concentrations and Isotopic Signatures to Investigate the Global Atmospheric Carbon Monoxide Budget: Inverse Modeling Approach

    Science.gov (United States)

    Park, K.; Mak, J. E.; Emmons, L. K.

    2008-12-01

    Carbon monoxide is not only an important component for determining the atmospheric oxidizing capacity but also a key trace gas in the atmospheric chemistry of the Earth's background environment. The global CO cycle and its change are closely related to both the change of CO mixing ratio and the change of source strength. Previously, to estimate the global CO budget, most top-down estimation techniques have been applied the concentrations of CO solely. Since CO from certain sources has a unique isotopic signature, its isotopes provide additional information to constrain its sources. Thus, coupling the concentration and isotope fraction information enables to tightly constrain CO flux by its sources and allows better estimations on the global CO budget. MOZART4 (Model for Ozone And Related chemical Tracers), a 3-D global chemical transport model developed at NCAR, MPI for meteorology and NOAA/GFDL and is used to simulate the global CO concentration and its isotopic signature. Also, a tracer version of MOZART4 which tagged for C16O and C18O from each region and each source was developed to see their contributions to the atmosphere efficiently. Based on the nine-year-simulation results we analyze the influences of each source of CO to the isotopic signature and the concentration. Especially, the evaluations are focused on the oxygen isotope of CO (δ18O), which has not been extensively studied yet. To validate the model performance, CO concentrations and isotopic signatures measured from MPI, NIWA and our lab are compared to the modeled results. The MOZART4 reproduced observational data fairly well; especially in mid to high latitude northern hemisphere. Bayesian inversion techniques have been used to estimate the global CO budget with combining observed and modeled CO concentration. However, previous studies show significant differences in their estimations on CO source strengths. Because, in addition to the CO mixing ratio, isotopic signatures are independent tracers

  12. Wave function of the Universe, preferred reference frame effects and metric signature transition

    International Nuclear Information System (INIS)

    Ghaffarnejad, Hossein

    2015-01-01

    Gravitational model of non-minimally coupled Brans Dicke (BD) scalar field 0 with dynamical unit time-like four vector field is used to study flat Robertson Walker (RW) cosmology in the presence of variable cosmological parameter V (ϕ) = Λϕ. Aim of the paper is to seek cosmological models which exhibit metric signature transition. The problem is studied in both classical and quantum cosmological approach with large values of BD parameter ω >> 1. Scale factor of RW metric is obtained as which describes nonsingular inflationary universe in Lorentzian signature sector. Euclidean signature sector of our solution describes a re-collapsing universe and is obtained from analytic continuation of the Lorentzian sector by exchanging . Dynamical vector field together with the BD scalar field are treated as fluid with time dependent barotropic index. They have regular (dark) matter dominance in the Euclidean (Lorentzian) sector. We solved Wheeler De Witt (WD) quantum wave equation of the cosmological system. Assuming a discrete non-zero ADM mass we obtained solutions of the WD equation as simple harmonic quantum Oscillator eigen functionals described by Hermite polynomials. Absolute values of these eigen functionals have nonzero values on the hypersurface in which metric field has signature degeneracy. Our eigen functionals describe nonzero probability of the space time with Lorentzian (Euclidean) signature for . Maximal probability corresponds to the ground state j = 0. (paper)

  13. On signature change in p-adic space-times

    International Nuclear Information System (INIS)

    Dragovic, B.G.

    1991-01-01

    Change of signature by linear coordinate transformations in p-adic space-times is considered. In this paper it is shown that there exists arbitrary change of trivial signature in Q p n for all n ≥ 1 if p ≡ 1 (mod 4). In other cases it is possible to change only even number of the signs of the signature. The authors suggest new concept of signature with respect to distinct quadratic extensions, of Q p . If space-time dimension is restricted to four there is no signature change

  14. Signature Curves Statistics of DNA Supercoils

    OpenAIRE

    Shakiban, Cheri; Lloyd, Peter

    2004-01-01

    In this paper we describe the Euclidean signature curves for two dimensional closed curves in the plane and their generalization to closed space curves. The focus will be on discrete numerical methods for approximating such curves. Further we will apply these numerical methods to plot the signature curves related to three-dimensional simulated DNA supercoils. Our primary focus will be on statistical analysis of the data generated for the signature curves of the supercoils. We will try to esta...

  15. 45 CFR 81.32 - Signature of documents.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Signature of documents. 81.32 Section 81.32 Public... UNDER PART 80 OF THIS TITLE Form, Execution, Service and Filing of Documents § 81.32 Signature of documents. The signature of a party, authorized officer, employee or attorney constitutes a certificate that...

  16. Modeling the lexical morphology of Western handwritten signatures.

    Directory of Open Access Journals (Sweden)

    Moises Diaz-Cabrera

    Full Text Available A handwritten signature is the final response to a complex cognitive and neuromuscular process which is the result of the learning process. Because of the many factors involved in signing, it is possible to study the signature from many points of view: graphologists, forensic experts, neurologists and computer vision experts have all examined them. Researchers study written signatures for psychiatric, penal, health and automatic verification purposes. As a potentially useful, multi-purpose study, this paper is focused on the lexical morphology of handwritten signatures. This we understand to mean the identification, analysis, and description of the signature structures of a given signer. In this work we analyze different public datasets involving 1533 signers from different Western geographical areas. Some relevant characteristics of signature lexical morphology have been selected, examined in terms of their probability distribution functions and modeled through a General Extreme Value distribution. This study suggests some useful models for multi-disciplinary sciences which depend on handwriting signatures.

  17. Free-market approach to energy proposed in new study

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This paper reports that a free-market approach to energy use, intensified R and D and an emphasis on conservation and clean fuels such as natural gas can result in significant reductions in emissions of greenhouse gases, without any major new federal policy initiatives, according to a new study, An Alternative Energy Future, sponsored by Alliance to Save Energy, AGA and Solar Energy Industries Assn

  18. Adaptive Aft Signature Shaping of a Low-Boom Supersonic Aircraft Using Off-Body Pressures

    Science.gov (United States)

    Ordaz, Irian; Li, Wu

    2012-01-01

    The design and optimization of a low-boom supersonic aircraft using the state-of-the- art o -body aerodynamics and sonic boom analysis has long been a challenging problem. The focus of this paper is to demonstrate an e ective geometry parameterization scheme and a numerical optimization approach for the aft shaping of a low-boom supersonic aircraft using o -body pressure calculations. A gradient-based numerical optimization algorithm that models the objective and constraints as response surface equations is used to drive the aft ground signature toward a ramp shape. The design objective is the minimization of the variation between the ground signature and the target signature subject to several geometric and signature constraints. The target signature is computed by using a least-squares regression of the aft portion of the ground signature. The parameterization and the deformation of the geometry is performed with a NASA in- house shaping tool. The optimization algorithm uses the shaping tool to drive the geometric deformation of a horizontal tail with a parameterization scheme that consists of seven camber design variables and an additional design variable that describes the spanwise location of the midspan section. The demonstration cases show that numerical optimization using the state-of-the-art o -body aerodynamic calculations is not only feasible and repeatable but also allows the exploration of complex design spaces for which a knowledge-based design method becomes less effective.

  19. Ship Signature Management System : Functionality

    NARCIS (Netherlands)

    Arciszewski, H.F.R.; Lier, L. van; Meijer, Y.G.S.; Noordkamp, H.W.; Wassenaar, A.S.

    2010-01-01

    A signature of a platform is the manner in which the platform manifests itself to a certain type of sensor and how observable it is when such a sensor is used to detect the platform. Because many military platforms use sensors in different media, it is the total of its different signatures that

  20. Measuring energy rebound effect in the Chinese economy: An economic accounting approach

    International Nuclear Information System (INIS)

    Lin, Boqiang; Du, Kerui

    2015-01-01

    Estimating the magnitude of China's economy-wide rebound effect has attracted much attention in recent years. Most existing studies measure the rebound effect through the additional energy consumption from technological progress. However, in general technological progress is not equivalent to energy efficiency improvement. Consequently, their estimation may be misleading. To overcome the limitation, this paper develops an alternative approach for estimating energy rebound effect. Based on the proposed approach, China's economy-wide energy rebound effect is revisited. The empirical result shows that during the period 1981–2011 the rebound effects in China are between 30% and 40%, with an average value of 34.3%. - Highlights: • This paper develops an alternative approach for estimating energy rebound effect. • The proposed approach is based on the multilevel–hierarchical (M–H) IDA model. • The energy rebound effects in China are estimated between 30% and 40%

  1. Enabling "new" practices of renewable energy sharing : A cross-cultural approach

    NARCIS (Netherlands)

    Singh, A.; Van Dijk, H.W.; Romero Herrera, N.A.; Keyson, D.V.

    2015-01-01

    Local generation, distribution and consumption of renewable energy within neighborhood is an emerging application context for the concept of `sharing'. This position paper introduces a cross-cultural approach to enable `new' social practices of renewable energy sharing in neighborhoods. The approach

  2. Cell short circuit, preshort signature

    Science.gov (United States)

    Lurie, C.

    1980-01-01

    Short-circuit events observed in ground test simulations of DSCS-3 battery in-orbit operations are analyzed. Voltage signatures appearing in the data preceding the short-circuit event are evaluated. The ground test simulation is briefly described along with performance during reconditioning discharges. Results suggest that a characteristic signature develops prior to a shorting event.

  3. Predictive gene signatures: molecular markers distinguishing colon adenomatous polyp and carcinoma.

    Directory of Open Access Journals (Sweden)

    Janice E Drew

    Full Text Available Cancers exhibit abnormal molecular signatures associated with disease initiation and progression. Molecular signatures could improve cancer screening, detection, drug development and selection of appropriate drug therapies for individual patients. Typically only very small amounts of tissue are available from patients for analysis and biopsy samples exhibit broad heterogeneity that cannot be captured using a single marker. This report details application of an in-house custom designed GenomeLab System multiplex gene expression assay, the hCellMarkerPlex, to assess predictive gene signatures of normal, adenomatous polyp and carcinoma colon tissue using archived tissue bank material. The hCellMarkerPlex incorporates twenty-one gene markers: epithelial (EZR, KRT18, NOX1, SLC9A2, proliferation (PCNA, CCND1, MS4A12, differentiation (B4GANLT2, CDX1, CDX2, apoptotic (CASP3, NOX1, NTN1, fibroblast (FSP1, COL1A1, structural (ACTG2, CNN1, DES, gene transcription (HDAC1, stem cell (LGR5, endothelial (VWF and mucin production (MUC2. Gene signatures distinguished normal, adenomatous polyp and carcinoma. Individual gene targets significantly contributing to molecular tissue types, classifier genes, were further characterised using real-time PCR, in-situ hybridisation and immunohistochemistry revealing aberrant epithelial expression of MS4A12, LGR5 CDX2, NOX1 and SLC9A2 prior to development of carcinoma. Identified gene signatures identify aberrant epithelial expression of genes prior to cancer development using in-house custom designed gene expression multiplex assays. This approach may be used to assist in objective classification of disease initiation, staging, progression and therapeutic responses using biopsy material.

  4. A multi-signature approach to low-scale sterile neutrino phenomenology

    CERN Document Server

    Ross-Lonergan, Mark

    2017-01-01

    Since the discovery of non-zero neutrino masses, through the observation of neutrino flavour oscillations, we had a plethora of successful experiments which have made increasingly precise measurements of the mixing angles and mass-differences that drive the phenomena. In this thesis we highlight the fact that there is still significant room for new physics, however, when one removes the assumption of unitarity of the 3x3 neutrino mixing matrix, an assumption inherent in the 3ν paradigm. We refit all global data to show just how much non-unitarity is currently allowed. The canonical way that such a non-unitarity is introduced to the 3x3 neutrino mixing matrix is by the addition of additional neutral fermions, singlets under the Standard Model gauge group. These “Sterile Neutrinos” have a wide range of the- oretical and phenomenological implications. Alongside the sensitivity non-unitarity measurements have to sterile neutrinos, in this thesis we will study in detail two additional signatures of low-scale ...

  5. The metabolomic approach identifies a biological signature of low-dose chronic exposure to Cesium 137

    International Nuclear Information System (INIS)

    Grison, S.; Grandcolas, L.; Martin, J.C.

    2012-01-01

    Reports have described apparent biological effects of 137 Cs (the most persistent dispersed radionuclide) irradiation in people living in Chernobyl-contaminated territory. The sensitive analytical technology described here should now help assess the relation of this contamination to the observed effects. A rat model chronically exposed to 137 Cs through drinking water was developed to identify biomarkers of radiation-induced metabolic disorders, and the biological impact was evaluated by a metabolomic approach that allowed us to detect several hundred metabolites in biofluids and assess their association with disease states. After collection of plasma and urine from contaminated and non-contaminated rats at the end of the 9-months contamination period, analysis with a liquid chromatography coupled to mass spectrometry (LC-MS) system detected 742 features in urine and 1309 in plasma. Biostatistical discriminant analysis extracted a subset of 26 metabolite signals (2 urinary, 4 plasma non-polar, and 19 plasma polar metabolites) that in combination were able to predict from 68 up to 94% of the contaminated rats, depending on the prediction method used, with a misclassification rate as low as 5.3%. The difference in this metabolic score between the contaminated and non-contaminated rats was highly significant (P=0.019 after ANOVA cross-validation). In conclusion, our proof-of-principle study demonstrated for the first time the usefulness of a metabolomic approach for addressing biological effects of chronic low-dose contamination. We can conclude that a metabolomic signature discriminated 137 Cs-contaminated from control animals in our model. Further validation is nevertheless required together with full annotation of the metabolic indicators. (author)

  6. Precision diagnostics: moving towards protein biomarker signatures of clinical utility in cancer.

    Science.gov (United States)

    Borrebaeck, Carl A K

    2017-03-01

    Interest in precision diagnostics has been fuelled by the concept that early detection of cancer would benefit patients; that is, if detected early, more tumours should be resectable and treatment more efficacious. Serum contains massive amounts of potentially diagnostic information, and affinity proteomics has risen as an accurate approach to decipher this, to generate actionable information that should result in more precise and evidence-based options to manage cancer. To achieve this, we need to move from single to multiplex biomarkers, a so-called signature, that can provide significantly increased diagnostic accuracy. This Opinion article focuses on the progress being made in identifying protein biomarker signatures of clinical utility, using blood-based proteomics.

  7. The electronic identification, signature and security of information systems

    Directory of Open Access Journals (Sweden)

    Horovèák Pavel

    2002-12-01

    Full Text Available The contribution deals with the actual methods and technologies of information and communication systems security. It introduces the overview of electronic identification elements such as static password, dynamic password and single sign-on. Into this category belong also biometric and dynamic characteristics of verified person. Widespread is authentication based on identification elements ownership, such as various cards and authentication calculators. In the next part is specified a definition and characterization of electronic signature, its basic functions and certificate categories. Practical utilization of electronic signature consists of electronic signature acquirement, signature of outgoing email message, receiving of electronic signature and verification of electronic signature. The use of electronic signature is continuously growing and in connection with legislation development it exercises in all resorts.

  8. Searches for supersymmetry in resonance production, R-parity violating signatures and events with long-lived particles with the ATLAS detector

    CERN Document Server

    Kozakai, Chihiro; The ATLAS collaboration

    2017-01-01

    R-parity violation introduces many viable signatures to the search for supersymmetry at the LHC. Strongly interacting resonances and lightest supersymmetric particles may decay into many leptons or jets with or without missing transverse momentum. Several supersymmetric models also predict massive long-lived supersymmetric particles. Such particles may be detected through abnormal specific energy loss, appearing or disappearing tracks, displaced vertices, long time-of-flight or late calorimetric energy deposits. The talk presents recent results from searches of supersymmetry in resonance production, R-parity violating signatures and events with long-lived particles with the ATLAS detector.

  9. Searches for supersymmetry in resonance production, R-parity violating signatures and events with long-lived particles with the ATLAS detector

    CERN Document Server

    Sandoval Usme, Carlos; The ATLAS collaboration

    2018-01-01

    R-parity violation introduces many viable signatures to the search for supersymmetry at the LHC. Strongly interacting resonances and lightest supersymmetric particles may decay into many leptons or jets with or without missing transverse momentum. Several supersymmetric models also predict massive long-lived supersymmetric particles. Such particles may be detected through abnormal specific energy loss, appearing or disappearing tracks, displaced vertices, long time-of-flight or late calorimetric energy deposits. The talk presents recent results from searches of supersymmetry in resonance production, R-parity violating signatures and events with long-lived particles with the ATLAS detector.

  10. Analysis of an indirect neutron signature for enhanced UF{sub 6} cylinder verification

    Energy Technology Data Exchange (ETDEWEB)

    Kulisek, J.A., E-mail: Jonathan.Kulisek@pnnl.gov; McDonald, B.S.; Smith, L.E.; Zalavadia, M.A.; Webster, J.B.

    2017-02-21

    The International Atomic Energy Agency (IAEA) currently uses handheld gamma-ray spectrometers combined with ultrasonic wall-thickness gauges to verify the declared enrichment of uranium hexafluoride (UF{sub 6}) cylinders. The current method provides relatively low accuracy for the assay of {sup 235}U enrichment, especially for natural and depleted UF{sub 6}. Furthermore, the current method provides no capability to assay the absolute mass of {sup 235}U in the cylinder due to the localized instrument geometry and limited penetration of the 186-keV gamma-ray signature from {sup 235}U. Also, the current verification process is a time-consuming component of on-site inspections at uranium enrichment plants. Toward the goal of a more-capable cylinder assay method, the Pacific Northwest National Laboratory has developed the hybrid enrichment verification array (HEVA). HEVA measures both the traditional 186-keV direct signature and a non-traditional, high-energy neutron-induced signature (HEVA{sub NT}). HEVA{sub NT} enables full-volume assay of UF{sub 6} cylinders by exploiting the relatively larger mean free paths of the neutrons emitted from the UF{sub 6}. In this work, Monte Carlo modeling is used as the basis for characterizing HEVA{sub NT} in terms of the individual contributions to HEVA{sub NT} from nuclides and hardware components. Monte Carlo modeling is also used to quantify the intrinsic efficiency of HEVA for neutron detection in a cylinder-assay geometry. Modeling predictions are validated against neutron-induced gamma-ray spectra from laboratory measurements and a relatively large population of Type 30B cylinders spanning a range of enrichments. Implications of the analysis and findings on the viability of HEVA for cylinder verification are discussed, such as the resistance of the HEVA{sub NT} signature to manipulation by the nearby placement of neutron-conversion materials.

  11. COMPUTER-IMPLEMENTED METHOD OF PERFORMING A SEARCH USING SIGNATURES

    DEFF Research Database (Denmark)

    2017-01-01

    A computer-implemented method of processing a query vector and a data vector), comprising: generating a set of masks and a first set of multiple signatures and a second set of multiple signatures by applying the set of masks to the query vector and the data vector, respectively, and generating...... candidate pairs, of a first signature and a second signature, by identifying matches of a first signature and a second signature. The set of masks comprises a configuration of the elements that is a Hadamard code; a permutation of a Hadamard code; or a code that deviates from a Hadamard code...

  12. Signature effects in 2-qp rotational bands

    International Nuclear Information System (INIS)

    Jain, A.K.; Goel, A.

    1992-01-01

    The authors briefly review the progress in understanding the 2-qp rotational bands in odd-odd nuclei. Signature effects and the phenomenon of signature inversion are discussed. The Coriolis coupling appears to have all the ingredients to explain the inversion. Some recent work on signature dependence in 2-qp bands of even-even nuclei is also discussed; interesting features are pointed out

  13. Energy efficiency and the law: A multidisciplinary approach

    Directory of Open Access Journals (Sweden)

    Willemien du Plessis

    2015-01-01

    Full Text Available South Africa is an energy-intensive country. The inefficient use of, mostly, coal-generated energy is the cause of South Africa's per capita contribution to greenhouse gas emissions, pollution and environmental degradation and negative health impacts. The inefficient use of the country's energy also amounts to the injudicious use of natural resources. Improvements in energy efficiency are an important strategy to stabilise the country's energy crisis. Government responded to this challenge by introducing measures such as policies and legislation to change energy consumption patterns by, amongst others, incentivising the transition to improved energy efficiencies. A central tenet underpinning this review is that the law and energy nexus requires a multidisciplinary approach as well as a multi-pronged adoption of diverse policy instruments to effectively transform the country's energy use patterns. Numerous, innovative instruments are introduced by relevant legislation to encourage the transformation of energy generation and consumption patterns of South Africans. One such innovative instrument is the ISO 50001 energy management standard. It is a voluntary instrument, to plan for, measure and verify energy-efficiency improvements. These improvements may also trigger tax concessions. In this paper, the nature and extent of the various policy instruments and legislation that relate to energy efficiency are explored, while the interactions between the law and the voluntary ISO 50001 standard and between the law and the other academic disciplines are highlighted. The introduction of energy-efficiency measures into law requires a multidisciplinary approach, as lawyers may be challenged to address the scientific and technical elements that characterise these legal measures and instruments. Inputs by several other disciplines such as engineering, mathematics or statistics, accounting, environmental management and auditing may be needed. Law is often

  14. Peripheral blood signatures of lead exposure.

    Directory of Open Access Journals (Sweden)

    Heather G LaBreche

    Full Text Available BACKGROUND: Current evidence indicates that even low-level lead (Pb exposure can have detrimental effects, especially in children. We tested the hypothesis that Pb exposure alters gene expression patterns in peripheral blood cells and that these changes reflect dose-specific alterations in the activity of particular pathways. METHODOLOGY/PRINCIPAL FINDING: Using Affymetrix Mouse Genome 430 2.0 arrays, we examined gene expression changes in the peripheral blood of female Balb/c mice following exposure to per os lead acetate trihydrate or plain drinking water for two weeks and after a two-week recovery period. Data sets were RMA-normalized and dose-specific signatures were generated using established methods of supervised classification and binary regression. Pathway activity was analyzed using the ScoreSignatures module from GenePattern. CONCLUSIONS/SIGNIFICANCE: The low-level Pb signature was 93% sensitive and 100% specific in classifying samples a leave-one-out crossvalidation. The high-level Pb signature demonstrated 100% sensitivity and specificity in the leave-one-out crossvalidation. These two signatures exhibited dose-specificity in their ability to predict Pb exposure and had little overlap in terms of constituent genes. The signatures also seemed to reflect current levels of Pb exposure rather than past exposure. Finally, the two doses showed differential activation of cellular pathways. Low-level Pb exposure increased activity of the interferon-gamma pathway, whereas high-level Pb exposure increased activity of the E2F1 pathway.

  15. Political-administrative approaches towards energy-environment issues

    International Nuclear Information System (INIS)

    Degli Espinosa, P.

    1992-01-01

    A discussion is made of how Italian regional administrations could best approach the implementation of environmental strategies mirroring those proposed by the United Nations, especially those calling for a rapid reduction in carbon dioxide emissions to abate the risk of greenhouse gas induced climate change. Citing the current difficulties being had by the Italian national government in securing adequate funding to allow the fulfillment of already legislated and urgently needed energy conservation/environmental protection proposals, this paper calls for greater involvement and high level of social awareness on the part of regional governments. It is noted that, within the Italian context, the best approach towards the cost effective implementation of energy conservation/environmental protection strategies is to have a combined effort, involving municipally run power and gas utilities and transport departments acting together with concerned citizens, under the direct management of regional administrations

  16. Extraction of human gait signatures: an inverse kinematic approach using Groebner basis theory applied to gait cycle analysis

    Science.gov (United States)

    Barki, Anum; Kendricks, Kimberly; Tuttle, Ronald F.; Bunker, David J.; Borel, Christoph C.

    2013-05-01

    This research highlights the results obtained from applying the method of inverse kinematics, using Groebner basis theory, to the human gait cycle to extract and identify lower extremity gait signatures. The increased threat from suicide bombers and the force protection issues of today have motivated a team at Air Force Institute of Technology (AFIT) to research pattern recognition in the human gait cycle. The purpose of this research is to identify gait signatures of human subjects and distinguish between subjects carrying a load to those subjects without a load. These signatures were investigated via a model of the lower extremities based on motion capture observations, in particular, foot placement and the joint angles for subjects affected by carrying extra load on the body. The human gait cycle was captured and analyzed using a developed toolkit consisting of an inverse kinematic motion model of the lower extremity and a graphical user interface. Hip, knee, and ankle angles were analyzed to identify gait angle variance and range of motion. Female subjects exhibited the most knee angle variance and produced a proportional correlation between knee flexion and load carriage.

  17. Magnetic signature surveillance of nuclear fuel

    International Nuclear Information System (INIS)

    Bernatowicz, H.; Schoenig, F.C.

    1981-01-01

    Typical nuclear fuel material contains tramp ferromagnetic particles of random size and distribution. Also, selected amounts of paramagnetic or ferromagnetic material can be added at random or at known positions in the fuel material. The fuel material in its non-magnetic container is scanned along its length by magnetic susceptibility detecting apparatus whereby susceptibility changes along its length are obtained and provide a unique signal waveform of the container of fuel material as a signature thereof. The output signature is stored. At subsequent times in its life the container is again scanned and respective signatures obtained which are compared with the initially obtained signature, any differences indicating alteration or tampering with the fuel material. If the fuel material includes a paramagnetic additive by taking two measurements along the container the effects thereof can be cancelled out. (author)

  18. A two-stage stochastic programming approach for operating multi-energy systems

    DEFF Research Database (Denmark)

    Zeng, Qing; Fang, Jiakun; Chen, Zhe

    2017-01-01

    This paper provides a two-stage stochastic programming approach for joint operating multi-energy systems under uncertainty. Simulation is carried out in a test system to demonstrate the feasibility and efficiency of the proposed approach. The test energy system includes a gas subsystem with a gas...

  19. Rank-Based miRNA Signatures for Early Cancer Detection

    Directory of Open Access Journals (Sweden)

    Mario Lauria

    2014-01-01

    Full Text Available We describe a new signature definition and analysis method to be used as biomarker for early cancer detection. Our new approach is based on the construction of a reference map of transcriptional signatures of both healthy and cancer affected individuals using circulating miRNA from a large number of subjects. Once such a map is available, the diagnosis for a new patient can be performed by observing the relative position on the map of his/her transcriptional signature. To demonstrate its efficacy for this specific application we report the results of the application of our method to published datasets of circulating miRNA, and we quantify its performance compared to current state-of-the-art methods. A number of additional features make this method an ideal candidate for large-scale use, for example, as a mass screening tool for early cancer detection or for at-home diagnostics. Specifically, our method is minimally invasive (because it works well with circulating miRNA, it is robust with respect to lab-to-lab protocol variability and batch effects (it requires that only the relative ranking of expression value of miRNA in a profile be accurate not their absolute values, and it is scalable to a large number of subjects. Finally we discuss the need for HPC capability in a widespread application of our or similar methods.

  20. A Cellular Approach to Net-Zero Energy Cities

    Directory of Open Access Journals (Sweden)

    Miguel Amado

    2017-11-01

    Full Text Available Recent growth in the use of photovoltaic technology and a rapid reduction in its cost confirms the potential of solar power on a large scale. In this context, planning for the deployment of smart grids is among the most important challenges to support the increased penetration of solar energy in urban areas and to ensure the resilience of the electricity system. As part this effort, the present paper describes a cellular approach to a Net-Zero energy concept, based on the balance between the potential solar energy supply and the existing consumption patterns at the urban unit scale. To do that, the Geographical Urban Units Delimitation model (GUUD has been developed and tested on a case study. By applying the GUUD model, which combines Geographic Information Systems (GIS, parametric modelling, and solar dynamic analysis, the whole area of the city was divided into urban cells, categorized as solar producers and energy consumers. The discussion around three theoretical scenarios permits us to explore how smart grids can be approached and promoted from an urban planning perspective. The paper provides insights into how urban planning can be a driver to optimize and manage energy balance across the city if the deployment of smart grids is correctly integrated in its operative process.

  1. An Arbitrated Quantum Signature Scheme without Entanglement*

    International Nuclear Information System (INIS)

    Li Hui-Ran; Luo Ming-Xing; Peng Dai-Yuan; Wang Xiao-Jun

    2017-01-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks . (paper)

  2. A genomic copy number signature predicts radiation exposure in post-Chernobyl breast cancer.

    Science.gov (United States)

    Wilke, Christina M; Braselmann, Herbert; Hess, Julia; Klymenko, Sergiy V; Chumak, Vadim V; Zakhartseva, Liubov M; Bakhanova, Elena V; Walch, Axel K; Selmansberger, Martin; Samaga, Daniel; Weber, Peter; Schneider, Ludmila; Fend, Falko; Bösmüller, Hans C; Zitzelsberger, Horst; Unger, Kristian

    2018-04-16

    Breast cancer is the second leading cause of cancer death among women worldwide and besides life style, age and genetic risk factors, exposure to ionizing radiation is known to increase the risk for breast cancer. Further, DNA copy number alterations (CNAs), which can result from radiation-induced double-strand breaks, are frequently occurring in breast cancer cells. We set out to identify a signature of CNAs discriminating breast cancers from radiation-exposed and non-exposed female patients. We analyzed resected breast cancer tissues from 68 exposed female Chernobyl clean-up workers and evacuees and 68 matched non-exposed control patients for CNAs by array comparative genomic hybridization analysis (aCGH). Using a stepwise forward-backward selection approach a non-complex CNA signature, that is, less than ten features, was identified in the training data set, which could be subsequently validated in the validation data set (p value < 0.05). The signature consisted of nine copy number regions located on chromosomal bands 7q11.22-11.23, 7q21.3, 16q24.3, 17q21.31, 20p11.23-11.21, 1p21.1, 2q35, 2q35, 6p22.2. The signature was independent of any clinical characteristics of the patients. In all, we identified a CNA signature that has the potential to allow identification of radiation-associated breast cancer at the individual level. © 2018 UICC.

  3. Signature-based store checking buffer

    Science.gov (United States)

    Sridharan, Vilas; Gurumurthi, Sudhanva

    2015-06-02

    A system and method for optimizing redundant output verification, are provided. A hardware-based store fingerprint buffer receives multiple instances of output from multiple instances of computation. The store fingerprint buffer generates a signature from the content included in the multiple instances of output. When a barrier is reached, the store fingerprint buffer uses the signature to verify the content is error-free.

  4. Neutral signature Walker-VSI metrics

    International Nuclear Information System (INIS)

    Coley, A; McNutt, D; Musoke, N; Brooks, D; Hervik, S

    2014-01-01

    We will construct explicit examples of four-dimensional neutral signature Walker (but not necessarily degenerate Kundt) spaces for which all of the polynomial scalar curvature invariants vanish. We then investigate the properties of some particular subclasses of Ricci flat spaces. We also briefly describe some four-dimensional neutral signature Einstein spaces for which all of the polynomial scalar curvature invariants are constant. (paper)

  5. An interpretation of signature inversion

    International Nuclear Information System (INIS)

    Onishi, Naoki; Tajima, Naoki

    1988-01-01

    An interpretation in terms of the cranking model is presented to explain why signature inversion occurs for positive γ of the axially asymmetric deformation parameter and emerges into specific orbitals. By introducing a continuous variable, the eigenvalue equation can be reduced to a one dimensional Schroedinger equation by means of which one can easily understand the cause of signature inversion. (author)

  6. Acoustic Signature Monitoring and Management of Naval Platforms

    NARCIS (Netherlands)

    Basten, T.G.H.; Jong, C.A.F. de; Graafland, F.; Hof, J. van 't

    2015-01-01

    Acoustic signatures make naval platforms susceptible to detection by threat sensors. The variable operational conditions and lifespan of a platform cause variations in the acoustic signature. To deal with these variations, a real time signature monitoring capability is being developed, with advisory

  7. Local energy developments based on spatial and systemic approaches

    NARCIS (Netherlands)

    Manickam, Anu

    Local energy developments from a spatial and systemic approach are highlighted using examples from a Dutch case study. Developments in energy systems included interconnectedness of contextual factors and systems responses. The need to explore both the contextual factors and systemic aspects are

  8. Ultra-high energy physics and standard basic principles

    Directory of Open Access Journals (Sweden)

    Gonzalez-Mestres Luis

    2014-04-01

    relevance of UHECR phenomenology and weaken the status of the Planck scale hypothesis. Another crucial observation is that, already before incorporating standard matter and relativity, the SST geometry naturally yields a H t = 1 law where t is the age of the Universe and H the ratio between relative speeds and distances at cosmic scale. As standard cosmology is not required to get such a fundamental result, the need for a conventional Planck scale is far from obvious and the study of UHECR can potentially yield evidence for an alternative approach including new physics and new ultimate constituents of matter. UHECR may in particular allow to explore the possible indications of the existence of a transition scale at very high energy where the standard laws would start becoming less and less dominant and new physics would replace the conventional fundamental principles. We discuss prospects of searches for potential signatures of such a phenomenon.

  9. Prognostic meta-signature of breast cancer developed by two-stage mixture modeling of microarray data

    Directory of Open Access Journals (Sweden)

    Ghosh Debashis

    2004-12-01

    Full Text Available Abstract Background An increasing number of studies have profiled tumor specimens using distinct microarray platforms and analysis techniques. With the accumulating amount of microarray data, one of the most intriguing yet challenging tasks is to develop robust statistical models to integrate the findings. Results By applying a two-stage Bayesian mixture modeling strategy, we were able to assimilate and analyze four independent microarray studies to derive an inter-study validated "meta-signature" associated with breast cancer prognosis. Combining multiple studies (n = 305 samples on a common probability scale, we developed a 90-gene meta-signature, which strongly associated with survival in breast cancer patients. Given the set of independent studies using different microarray platforms which included spotted cDNAs, Affymetrix GeneChip, and inkjet oligonucleotides, the individually identified classifiers yielded gene sets predictive of survival in each study cohort. The study-specific gene signatures, however, had minimal overlap with each other, and performed poorly in pairwise cross-validation. The meta-signature, on the other hand, accommodated such heterogeneity and achieved comparable or better prognostic performance when compared with the individual signatures. Further by comparing to a global standardization method, the mixture model based data transformation demonstrated superior properties for data integration and provided solid basis for building classifiers at the second stage. Functional annotation revealed that genes involved in cell cycle and signal transduction activities were over-represented in the meta-signature. Conclusion The mixture modeling approach unifies disparate gene expression data on a common probability scale allowing for robust, inter-study validated prognostic signatures to be obtained. With the emerging utility of microarrays for cancer prognosis, it will be important to establish paradigms to meta

  10. Investigation of radiant millimeter wave/terahertz radiation from low-infrared signature targets

    Science.gov (United States)

    Aytaç, B.; Alkuş, Ü.; Sivaslıgil, M.; Şahin, A. B.; Altan, H.

    2017-10-01

    Millimeter (mm) and sub-mm wave radiation is increasingly becoming a region of interest as better methods are developed to detect in this wavelength range. The development of sensitive focal plane array (FPA) architectures as well as single pixel scanners has opened up a new field of passive detection and imaging. Spectral signatures of objects, a long standing area of interest in the Short Wave Infrared (SWIR), Mid-Wave (MWIR) and Long Wave-IR (LWIR) bands can now be assessed in the mm-wave/terahertz (THz) region. The advantage is that this form of radiation is not as adversely affected by poor atmospheric conditions compared to other bands. In this study, a preliminary experiment in a laboratory environment is performed to assess the radiance from targets with low infrared signatures in the millimeter wave/terahertz (THz) band (<1 THz). The goal of this approach is to be able to model the experimental results to better understand the mm-wave/THz signature of targets with low observability in the IR bands.

  11. Detecting signatures of a sponge-associated lifestyle in bacterial genomes.

    Science.gov (United States)

    Díez-Vives, Cristina; Esteves, Ana I S; Costa, Rodrigo; Nielsen, Shaun; Thomas, Torsten

    2018-04-30

    Sponges interact with diverse and rich communities of bacteria that are phylogenetically often distinct from their free-living counterparts. Recent genomics and metagenomic studies have indicated that bacterial sponge symbionts also have distinct functional features from free-living bacteria, however it is unclear, if such genome-derived functional signatures are common and present in different symbiont taxa. We therefore compared here a large set of genomes from cultured (Pseudovibrio, Ruegeria, Aquimarina) and yet-uncultivated (Synechococcus) bacteria found either in sponge-associated or free-living sources. Our analysis revealed only very few genera-specific functions that could be correlated with a sponge-associated lifestyle. Using different sets of sponge-associated and free-living bacteria for each genus, we could however show that the functions identified as "sponge-associated" are dependent on the reference comparison being made. Using simulation approaches we show how this influences the robustness of identifying functional signatures and how evolutionary divergence and genomic adaptation can be distinguished. Our results highlight the future need for robust comparative analyses to define genomic signatures of symbiotic lifestyles, whether it is for symbionts of sponges or other host organisms. This article is protected by copyright. All rights reserved. © 2018 Society for Applied Microbiology and John Wiley & Sons Ltd.

  12. Pareto Optimization Identifies Diverse Set of Phosphorylation Signatures Predicting Response to Treatment with Dasatinib.

    Science.gov (United States)

    Klammer, Martin; Dybowski, J Nikolaj; Hoffmann, Daniel; Schaab, Christoph

    2015-01-01

    Multivariate biomarkers that can predict the effectiveness of targeted therapy in individual patients are highly desired. Previous biomarker discovery studies have largely focused on the identification of single biomarker signatures, aimed at maximizing prediction accuracy. Here, we present a different approach that identifies multiple biomarkers by simultaneously optimizing their predictive power, number of features, and proximity to the drug target in a protein-protein interaction network. To this end, we incorporated NSGA-II, a fast and elitist multi-objective optimization algorithm that is based on the principle of Pareto optimality, into the biomarker discovery workflow. The method was applied to quantitative phosphoproteome data of 19 non-small cell lung cancer (NSCLC) cell lines from a previous biomarker study. The algorithm successfully identified a total of 77 candidate biomarker signatures predicting response to treatment with dasatinib. Through filtering and similarity clustering, this set was trimmed to four final biomarker signatures, which then were validated on an independent set of breast cancer cell lines. All four candidates reached the same good prediction accuracy (83%) as the originally published biomarker. Although the newly discovered signatures were diverse in their composition and in their size, the central protein of the originally published signature - integrin β4 (ITGB4) - was also present in all four Pareto signatures, confirming its pivotal role in predicting dasatinib response in NSCLC cell lines. In summary, the method presented here allows for a robust and simultaneous identification of multiple multivariate biomarkers that are optimized for prediction performance, size, and relevance.

  13. WELMM approach to energy strategies and options. [Water, energy, land, materials, and manpower

    Energy Technology Data Exchange (ETDEWEB)

    Grenon, M; Lapillonne, B

    1976-12-01

    The development of energy resources requires more and more natural or human resources--on the one hand because of the difficulty of ''harvesting'' primary energy resources, and on the other because of the complexity of the sequence of processes necessary to convert these primary resources into useful resources for an economy (final energy). In this context the WELMM approach has been designed to evaluate the resource requirements for the development of energy resources. WELMM focuses mainly on five limited resources: water, energy, land, materials, and manpower. The WELMM evaluation is implemented at the level of the major facilities concerned in the harvesting and conversion of primary energy resources into final resources. All the WELMM data are stored in three different data bases (Resource Data Base, Component Data Base, and Facility Data Base). They are meant to be used to enlarge and complete the traditional economic comparison of energy processes, energy strategies, or energy options.

  14. 48 CFR 4.102 - Contractor's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Contractor's signature. 4.102 Section 4.102 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Contract Execution 4.102 Contractor's signature. (a) Individuals. A contract with an...

  15. DIGITAL SIGNATURE IN THE WAY OF LAW

    Directory of Open Access Journals (Sweden)

    Ruya Samlı

    2013-01-01

    Full Text Available Signature can be defined as a person’s name or special signs that he/she writes when he/she wants to indicate he/she wrote or confirm that writing. A person signs many times in his/her life. A person’s signature that is used for thousands of times for many things from formal documents to exams has importance for that person. Especially, signing in legal operations is an operation that can build important results. If a person’s signature is imitated by another person, he/she can become beholden, donate his/her whole wealth, commits offences or do some judicial operations. Today, because many operations can be done with digital environments and internet, signature operation that provides identity validation must also be carried to digital environment. In this paper digital signature concept that is approved for this reason and its situation in international areas and Turkish laws are investigated.

  16. Starry messages: Searching for signatures of interstellar archaeology

    Energy Technology Data Exchange (ETDEWEB)

    Carrigan, Richard A., Jr.; /Fermilab

    2009-12-01

    Searching for signatures of cosmic-scale archaeological artifacts such as Dyson spheres or Kardashev civilizations is an interesting alternative to conventional SETI. Uncovering such an artifact does not require the intentional transmission of a signal on the part of the original civilization. This type of search is called interstellar archaeology or sometimes cosmic archaeology. The detection of intelligence elsewhere in the Universe with interstellar archaeology or SETI would have broad implications for science. For example, the constraints of the anthropic principle would have to be loosened if a different type of intelligence was discovered elsewhere. A variety of interstellar archaeology signatures are discussed including non-natural planetary atmospheric constituents, stellar doping with isotopes of nuclear wastes, Dyson spheres, as well as signatures of stellar and galactic-scale engineering. The concept of a Fermi bubble due to interstellar migration is introduced in the discussion of galactic signatures. These potential interstellar archaeological signatures are classified using the Kardashev scale. A modified Drake equation is used to evaluate the relative challenges of finding various sources. With few exceptions interstellar archaeological signatures are clouded and beyond current technological capabilities. However SETI for so-called cultural transmissions and planetary atmosphere signatures are within reach.

  17. Consumer energy conservation policy. An analytical approach

    Energy Technology Data Exchange (ETDEWEB)

    McDougall, G.H.G.; Ritchie, J.R.B.

    1984-06-01

    To capture the potential energy savings available in the consumer sector an analytical approach to conservation policy is proposed. A policy framework is described and the key constructs including a payoff matrix analysis and a consumer impact analysis are discussed. Implications derived from the considerable amount of prior consumer research are provided to illustrate the effect on the design and implementation of future programmes. The result of this analytical approach to conservation policy - economic stability and economic security - are goals well worth pursuing.

  18. Yang–Mills equations on conformally connected torsion-free 4-manifolds with different signatures

    Directory of Open Access Journals (Sweden)

    Vyacheslav A. Luk'yanov

    2017-12-01

    Full Text Available In this paper we study spaces of conformal torsion-free connection of dimension 4 whose connection matrix satisfies the Yang–Mills equations. Here we generalize and strengthen the results obtained by us in previous articles, where the angular metric of these spaces had Minkowski signature. The generalization is that here we investigate the spaces of all possible metric signatures, and the enhancement is due to the fact that additional attention is paid to calculating the curvature matrix and establishing the properties of its components. It is shown that the Yang–Mills equations on 4-manifolds of conformal torsion-free connection for an arbitrary signature of the angular metric are reduced to Einstein's equations, Maxwell's equations and the equality of the Bach tensor of the angular metric and the energy-momentum tensor of the skew-symmetric charge tensor. It is proved that if the Weyl tensor is zero, the Yang–Mills equations have only self-dual or anti-self-dual solutions, i.e the curvature matrix of a conformal connection consists of self-dual or anti-self-dual external 2-forms. With the Minkowski signature (antiself-dual external 2-forms can only be zero. The components of the curvature matrix are calculated in the case when the angular metric of an arbitrary signature is Einstein, and the connection satisfies the Yang–Mills equations. In the Euclidean and pseudo-Euclidean 4-spaces we give some particular self-dual and anti-self-dual solutions of the Maxwell equations, to which all the Yang–Mills equations are reduced in this case.

  19. Signature Pedagogies in Support of Teachers' Professional Learning

    Science.gov (United States)

    Parker, Melissa; Patton, Kevin; O'Sullivan, Mary

    2016-01-01

    Signature pedagogies [Shulman, L. 2005. "Signature pedagogies in the professions." "Daedalus" 134 (3): 52--59.] are a focus of teacher educators seeking to improve teaching and teacher education. The purpose of this paper is to present a preliminary common language of signature pedagogies for teacher professional development…

  20. Recurrent implantation failure is a pathology with a specific transcriptomic signature

    DEFF Research Database (Denmark)

    Macklon, Nick

    2017-01-01

    Recurrent implantation failure (RIF) is a source of distress and frustration to both patients and their clinicians. In the absence of clinically useful tests, the therapeutic approach has been largely empirical, with limited efficacy. In recent years, new insights into the role of the endometrium...... be identified. Evidence is presented of a specific transcriptomic signature that is highly predictive of RIF....

  1. Characteristics and Validation Techniques for PCA-Based Gene-Expression Signatures

    Directory of Open Access Journals (Sweden)

    Anders E. Berglund

    2017-01-01

    Full Text Available Background. Many gene-expression signatures exist for describing the biological state of profiled tumors. Principal Component Analysis (PCA can be used to summarize a gene signature into a single score. Our hypothesis is that gene signatures can be validated when applied to new datasets, using inherent properties of PCA. Results. This validation is based on four key concepts. Coherence: elements of a gene signature should be correlated beyond chance. Uniqueness: the general direction of the data being examined can drive most of the observed signal. Robustness: if a gene signature is designed to measure a single biological effect, then this signal should be sufficiently strong and distinct compared to other signals within the signature. Transferability: the derived PCA gene signature score should describe the same biology in the target dataset as it does in the training dataset. Conclusions. The proposed validation procedure ensures that PCA-based gene signatures perform as expected when applied to datasets other than those that the signatures were trained upon. Complex signatures, describing multiple independent biological components, are also easily identified.

  2. Quantum blind dual-signature scheme without arbitrator

    International Nuclear Information System (INIS)

    Li, Wei; Shi, Ronghua; Huang, Dazu; Shi, Jinjing; Guo, Ying

    2016-01-01

    Motivated by the elegant features of a bind signature, we suggest the design of a quantum blind dual-signature scheme with three phases, i.e., initial phase, signing phase and verification phase. Different from conventional schemes, legal messages are signed not only by the blind signatory but also by the sender in the signing phase. It does not rely much on an arbitrator in the verification phase as the previous quantum signature schemes usually do. The security is guaranteed by entanglement in quantum information processing. Security analysis demonstrates that the signature can be neither forged nor disavowed by illegal participants or attacker. It provides a potential application for e-commerce or e-payment systems with the current technology. (paper)

  3. Quantum blind dual-signature scheme without arbitrator

    Science.gov (United States)

    Li, Wei; Shi, Ronghua; Huang, Dazu; Shi, Jinjing; Guo, Ying

    2016-03-01

    Motivated by the elegant features of a bind signature, we suggest the design of a quantum blind dual-signature scheme with three phases, i.e., initial phase, signing phase and verification phase. Different from conventional schemes, legal messages are signed not only by the blind signatory but also by the sender in the signing phase. It does not rely much on an arbitrator in the verification phase as the previous quantum signature schemes usually do. The security is guaranteed by entanglement in quantum information processing. Security analysis demonstrates that the signature can be neither forged nor disavowed by illegal participants or attacker. It provides a potential application for e-commerce or e-payment systems with the current technology.

  4. Infrared ship signature analysis and optimisation

    NARCIS (Netherlands)

    Neele, F.P.

    2005-01-01

    The last decade has seen an increase in the awareness of the infrared signature of naval ships. New ship designs show that infrared signature reduction measures are being incorporated, such as exhaust gas cooling systems, relocation of the exhausts and surface cooling systems. Hull and

  5. Fine-Grained Forward-Secure Signature Schemes without Random Oracles

    DEFF Research Database (Denmark)

    Camenisch, Jan; Koprowski, Maciej

    2006-01-01

    We propose the concept of fine-grained forward-secure signature schemes. Such signature schemes not only provide nonrepudiation w.r.t. past time periods the way ordinary forward-secure signature schemes do but, in addition, allow the signer to specify which signatures of the current time period...... remain valid when revoking the public key. This is an important advantage if the signer produces many signatures per time period as otherwise the signer would have to re-issue those signatures (and possibly re-negotiate the respective messages) with a new key.Apart from a formal model for fine......-grained forward-secure signature schemes, we present practical schemes and prove them secure under the strong RSA assumption only, i.e., we do not resort to the random oracle model to prove security. As a side-result, we provide an ordinary forward-secure scheme whose key-update time is significantly smaller than...

  6. Baseline measures for net-proton distributions in high energy heavy-ion collisions

    International Nuclear Information System (INIS)

    Netrakanti, P.K.; Mishra, D.K.; Mohanty, A.K.; Mohanty, B.

    2014-01-01

    The STAR experiment at the Relativistic Heavy-Ion Collider facility has reported results for the cumulants and their ratios from the net-proton distributions upto the fourth order cumulants at various collision energies. These measurements were carried to look for the signatures of the possible critical point (CP) in the phase diagram for a system undertaking strong interactions. The results show an intriguing dependence of the cumulant ratios C 3 /C 2 and C 4 /C 2 as a function of beam energy. The beam energy dependence appears to be non-monotonic in nature. However the experiment also reports that the energy dependence is observed to be consistent with expectation from an approach based on the independent production of proton and anti-protons in the collisions. In this paper we emphasize the need to have a proper baseline for appropriate interpretation of the cumulant measurements and argue that the comparison to independent production approach needs to be done with extreme caution

  7. A Signature Comparing Android Mobile Application Utilizing Feature Extracting Algorithms

    Directory of Open Access Journals (Sweden)

    Paul Grafilon

    2017-08-01

    Full Text Available The paper presented one of the application that can be done using smartphones camera. Nowadays forgery is one of the most undetected crimes. With the forensic technology used today it is still difficult for authorities to compare and define what a real signature is and what a forged signature is. A signature is a legal representation of a person. All transactions are based on a signature. Forgers may use a signature to sign illegal contracts and withdraw from bank accounts undetected. A signature can also be forged during election periods for repeated voting. Addressing the issues a signature should always be secure. Signature verification is a reduced problem that still poses a real challenge for researchers. The literature on signature verification is quite extensive and shows two main areas of research off-line and on-line systems. Off-line systems deal with a static image of the signature i.e. the result of the action of signing while on-line systems work on the dynamic process of generating the signature i.e. the action of signing itself. The researchers have found a way to resolve the concerns. A mobile application that integrates the camera to take a picture of a signature analyzes it and compares it to other signatures for verification. It will exist to help citizens to be more cautious and aware with issues regarding the signatures. This might also be relevant to help organizations and institutions such as banks and insurance companies in verifying signatures that may avoid unwanted transactions and identity theft. Furthermore this might help the authorities in the never ending battle against crime especially against forgers and thieves. The project aimed to design and develop a mobile application that integrates the smartphone camera for verifying and comparing signatures for security using the best algorithm possible. As the result of the development the said smartphone camera application is functional and reliable.

  8. Ultrahigh energy cosmic rays and new particle physics

    CERN Document Server

    Kachelriess, M.

    2001-02-28

    The current status of the ultrahigh energy cosmic ray (UHE CR) enigma and several proposed solutions involving particle physics beyond the standard model are discussed. Emphasis is given to top--down models, and as a main example, supermassive dark matter as galactic source for UHE CR and the status of its experimental signatures (galactic anisotropy, chemical composition and clustering) is reviewed. Then different approaches to calculate fragmentation spectra of supermassive particles are discussed. Finally, it is argued that UHE neutrinos cannot be - neither directly or indirectly - responsible for the observed vertical air showers.

  9. A support approach for the conceptual design of energy-efficient cooker hoods

    International Nuclear Information System (INIS)

    Cicconi, Paolo; Landi, Daniele; Germani, Michele; Russo, Anna Costanza

    2017-01-01

    Highlights: •An eco-innovation approach to support the design of household appliances. •The research is focused on the energy labelling for kitchen hoods. •A software platform provides tools to configure and optimize new solutions. •A tool can calculate the energy efficiency indexes of a product configuration. -- Abstract: In Europe, kitchen hoods currently come with an energy label showing their energy efficiency class and other information regarding the energy consumption and noise level, as established by the European Energy Labelling Directive. Because of recent regulations, designs of cooker hoods must consider new issues, such as the evaluation of the energy efficiency, analysis of the energy consumption, and product lifecycle impact. Therefore, the development of eco-driven products requires Ecodesign tools to support eco-innovation and related sustainability improvements. The scope of the proposed research is to define a method and an agile and affordable platform tool that can support designers in the early estimation of product energy performance, including the calculation of energy efficiency indexes. The approach also considers the use of genetic algorithm methods to optimize the product configuration in terms of energy efficiency. The research context concerns large and small productions of kitchen hoods. The paper describes the methodological approach within the developed tool. The results show a good correlation between real efficiency values and calculated ones. A validation activity has been described, and a test case shows how to apply the proposed approach for the design of a new efficient product with an A-class Energy Efficiency Index.

  10. A review on energy harvesting approaches for renewable energies from ambient vibrations and acoustic waves using piezoelectricity

    Science.gov (United States)

    Ahmed, Riaz; Mir, Fariha; Banerjee, Sourav

    2017-08-01

    The principal objective of this article is to categorically review and compare the state of the art vibration based energy harvesting approaches. To evaluate the contemporary methodologies with respect to their physics, average power output and operational frequencies, systematically divided and easy readable tables are presented followed by the description of the energy harvesting methods. Energy harvesting is the process of obtaining electrical energy from the surrounding vibratory mechanical systems through an energy conversion method using smart structures, like, piezoelectric, electrostatic materials. Recent advancements in low power electronic gadgets, micro electro mechanical systems, and wireless sensors have significantly increased local power demand. In order to circumvent the energy demand; to allow limitless power supply, and to avoid chemical waste from conventional batteries, low power local energy harvesters are proposed for harvesting energy from different ambient energy sources. Piezoelectric materials have received tremendous interest in energy harvesting technology due to its unique ability to capitalize the ambient vibrations to generate electric potential. Their crystalline configuration allows the material to convert mechanical strain energy into electrical potential, and vice versa. This article discusses the various approaches in vibration based energy scavenging where piezoelectric materials are employed as the energy conversion medium.

  11. 21 CFR 1309.32 - Application forms; contents; signature.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Application forms; contents; signature. 1309.32... Application forms; contents; signature. (a) Any person who is required to be registered pursuant to § 1309.21... this paragraph and shall contain the signature of the individual being authorized to sign the...

  12. 38 CFR 18b.21 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Signature of documents. 18b.21 Section 18b.21 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS... Documents § 18b.21 Signature of documents. The signature of a party, authorized officer, employee, or...

  13. Identifying prognostic features by bottom-up approach and correlating to drug repositioning.

    Directory of Open Access Journals (Sweden)

    Wei Li

    Full Text Available Traditionally top-down method was used to identify prognostic features in cancer research. That is to say, differentially expressed genes usually in cancer versus normal were identified to see if they possess survival prediction power. The problem is that prognostic features identified from one set of patient samples can rarely be transferred to other datasets. We apply bottom-up approach in this study: survival correlated or clinical stage correlated genes were selected first and prioritized by their network topology additionally, then a small set of features can be used as a prognostic signature.Gene expression profiles of a cohort of 221 hepatocellular carcinoma (HCC patients were used as a training set, 'bottom-up' approach was applied to discover gene-expression signatures associated with survival in both tumor and adjacent non-tumor tissues, and compared with 'top-down' approach. The results were validated in a second cohort of 82 patients which was used as a testing set.Two sets of gene signatures separately identified in tumor and adjacent non-tumor tissues by bottom-up approach were developed in the training cohort. These two signatures were associated with overall survival times of HCC patients and the robustness of each was validated in the testing set, and each predictive performance was better than gene expression signatures reported previously. Moreover, genes in these two prognosis signature gave some indications for drug-repositioning on HCC. Some approved drugs targeting these markers have the alternative indications on hepatocellular carcinoma.Using the bottom-up approach, we have developed two prognostic gene signatures with a limited number of genes that associated with overall survival times of patients with HCC. Furthermore, prognostic markers in these two signatures have the potential to be therapeutic targets.

  14. Consumer energy - conservation policy: an analytical approach

    Energy Technology Data Exchange (ETDEWEB)

    McDougall, G.H.G.; Ritchie, J.R.B.

    1984-06-01

    To capture the potential energy savings available in the consumer sector an analytical approach to conservation policy is proposed. A policy framework is described, and the key constructs including a payoff matrix analysis and a consumer impact analysis are discussed. Implications derived from the considerable amount of prior consumer research are provided to illustrate the effect on the design and implementation of future programs. The result of this analytical approach to conservation policy (economic stability and economic security) are goals well worth pursuing. 13 references, 2 tables.

  15. Designing renewable energy systems a life cycle assessment approach

    CERN Document Server

    Gerber, Leda

    2014-01-01

    The book discusses a multi-objective optimization approach in LCA that allows the flexible construction of comprehensive Pareto fronts to help understand the weightings and relative importance of its elements. The methodology is applied to the pertinent topics of thermochemical wood conversion, deep geothermal energy, and regional energy planning.

  16. Enhanced arbitrated quantum signature scheme using Bell states

    International Nuclear Information System (INIS)

    Wang Chao; Liu Jian-Wei; Shang Tao

    2014-01-01

    We investigate the existing arbitrated quantum signature schemes as well as their cryptanalysis, including intercept-resend attack and denial-of-service attack. By exploring the loopholes of these schemes, a malicious signatory may successfully disavow signed messages, or the receiver may actively negate the signature from the signatory without being detected. By modifying the existing schemes, we develop counter-measures to these attacks using Bell states. The newly proposed scheme puts forward the security of arbitrated quantum signature. Furthermore, several valuable topics are also presented for further research of the quantum signature scheme

  17. Energy Performance of Buildings - The European Approach to Sustainability

    DEFF Research Database (Denmark)

    Heiselberg, Per

    2006-01-01

    This paper presents the European approach to improve sustainability in the building sector, which has a very high potential for considerable reduction of energy consumption in the coming years. By approving the Energy Performance in Buildings Directive the European Union has taken a strong...... leadership role in promoting energy efficiency in buildings in Europe, that will be the most powerful instrument developed to date for the building sector in Europe....

  18. On the Use of an Algebraic Signature Analyzer for Mixed-Signal Systems Testing

    Directory of Open Access Journals (Sweden)

    Vadim Geurkov

    2014-01-01

    Full Text Available We propose an approach to design of an algebraic signature analyzer that can be used for mixed-signal systems testing. The analyzer does not contain carry propagating circuitry, which improves its performance as well as fault tolerance. The common design technique of a signature analyzer for mixed-signal systems is based on the rules of an arithmetic finite field. The application of this technique to the systems with an arbitrary radix is a challenging task and the devices designed possess high hardware complexity. The proposed technique is simple and applicable to systems of any size and radix. The hardware complexity is low. The technique can also be used in arithmetic/algebraic coding and cryptography.

  19. Measuring energy efficiency under heterogeneous technologies using a latent class stochastic frontier approach: An application to Chinese energy economy

    International Nuclear Information System (INIS)

    Lin, Boqiang; Du, Kerui

    2014-01-01

    The importance of technology heterogeneity in estimating economy-wide energy efficiency has been emphasized by recent literature. Some studies use the metafrontier analysis approach to estimate energy efficiency. However, for such studies, some reliable priori information is needed to divide the sample observations properly, which causes a difficulty in unbiased estimation of energy efficiency. Moreover, separately estimating group-specific frontiers might lose some common information across different groups. In order to overcome these weaknesses, this paper introduces a latent class stochastic frontier approach to measure energy efficiency under heterogeneous technologies. An application of the proposed model to Chinese energy economy is presented. Results show that the overall energy efficiency of China's provinces is not high, with an average score of 0.632 during the period from 1997 to 2010. - Highlights: • We introduce a latent class stochastic frontier approach to measure energy efficiency. • Ignoring technological heterogeneity would cause biased estimates of energy efficiency. • An application of the proposed model to Chinese energy economy is presented. • There is still a long way for China to develop an energy efficient regime

  20. FIR signature verification system characterizing dynamics of handwriting features

    Science.gov (United States)

    Thumwarin, Pitak; Pernwong, Jitawat; Matsuura, Takenobu

    2013-12-01

    This paper proposes an online signature verification method based on the finite impulse response (FIR) system characterizing time-frequency characteristics of dynamic handwriting features. First, the barycenter determined from both the center point of signature and two adjacent pen-point positions in the signing process, instead of one pen-point position, is used to reduce the fluctuation of handwriting motion. In this paper, among the available dynamic handwriting features, motion pressure and area pressure are employed to investigate handwriting behavior. Thus, the stable dynamic handwriting features can be described by the relation of the time-frequency characteristics of the dynamic handwriting features. In this study, the aforesaid relation can be represented by the FIR system with the wavelet coefficients of the dynamic handwriting features as both input and output of the system. The impulse response of the FIR system is used as the individual feature for a particular signature. In short, the signature can be verified by evaluating the difference between the impulse responses of the FIR systems for a reference signature and the signature to be verified. The signature verification experiments in this paper were conducted using the SUBCORPUS MCYT-100 signature database consisting of 5,000 signatures from 100 signers. The proposed method yielded equal error rate (EER) of 3.21% on skilled forgeries.

  1. An approach for holistic energy retrofitting based on assessment of economic viability and durability of energy saving measures

    DEFF Research Database (Denmark)

    Morelli, Martin

    2014-01-01

    saving measures and forget to consider, whether it is more prudent to demolished the building and erect a new building. An evaluation approach is presented to assess whether to retrofit an existing building or to demolish and replace it. The primary concept of the method is to develop a retrofitting...... as constraint to determine the amount of building retrofitting for implementation. The approach includes also durability assessments of the energy saving measures. An example is carried out to illustrate the application of the approach. The example highlights the importance of including risk assessment...... and durability evaluation of the energy saving measures when performing holistic energy retrofitting of buildings....

  2. Quantum signature scheme based on a quantum search algorithm

    International Nuclear Information System (INIS)

    Yoon, Chun Seok; Kang, Min Sung; Lim, Jong In; Yang, Hyung Jin

    2015-01-01

    We present a quantum signature scheme based on a two-qubit quantum search algorithm. For secure transmission of signatures, we use a quantum search algorithm that has not been used in previous quantum signature schemes. A two-step protocol secures the quantum channel, and a trusted center guarantees non-repudiation that is similar to other quantum signature schemes. We discuss the security of our protocol. (paper)

  3. An energy systems engineering approach to the optimal design of energy systems in commercial buildings

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Pei; Pistikopoulos, Efstratios N. [Centre for Process Systems Engineering (CPSE), Department of Chemical Engineering, Imperial College London, London SW7 2AZ (United Kingdom); Li, Zheng [Department of Thermal Engineering, Tsinghua University, Beijing 100084 (China)

    2010-08-15

    Energy consumption in commercial buildings accounts for a significant proportion of worldwide energy consumption. Any increase in the energy efficiency of the energy systems for commercial buildings would lead to significant energy savings and emissions reductions. In this work, we introduce an energy systems engineering framework towards the optimal design of such energy systems with improved energy efficiency and environmental performance. The framework features a superstructure representation of the various energy technology alternatives, a mixed-integer optimization formulation of the energy systems design problem, and a multi-objective design optimization solution strategy, where economic and environmental criteria are simultaneously considered and properly traded off. A case study of a supermarket energy systems design is presented to illustrate the key steps and potential of the proposed energy systems engineering approach. (author)

  4. An energy systems engineering approach to the optimal design of energy systems in commercial buildings

    International Nuclear Information System (INIS)

    Liu Pei; Pistikopoulos, Efstratios N.; Li Zheng

    2010-01-01

    Energy consumption in commercial buildings accounts for a significant proportion of worldwide energy consumption. Any increase in the energy efficiency of the energy systems for commercial buildings would lead to significant energy savings and emissions reductions. In this work, we introduce an energy systems engineering framework towards the optimal design of such energy systems with improved energy efficiency and environmental performance. The framework features a superstructure representation of the various energy technology alternatives, a mixed-integer optimization formulation of the energy systems design problem, and a multi-objective design optimization solution strategy, where economic and environmental criteria are simultaneously considered and properly traded off. A case study of a supermarket energy systems design is presented to illustrate the key steps and potential of the proposed energy systems engineering approach.

  5. An energy systems engineering approach to the optimal design of energy systems in commercial buildings

    Energy Technology Data Exchange (ETDEWEB)

    Liu Pei [Centre for Process Systems Engineering (CPSE), Department of Chemical Engineering, Imperial College London, London SW7 2AZ (United Kingdom); Pistikopoulos, Efstratios N., E-mail: e.pistikopoulos@imperial.ac.u [Centre for Process Systems Engineering (CPSE), Department of Chemical Engineering, Imperial College London, London SW7 2AZ (United Kingdom); Li Zheng [Department of Thermal Engineering, Tsinghua University, Beijing 100084 (China)

    2010-08-15

    Energy consumption in commercial buildings accounts for a significant proportion of worldwide energy consumption. Any increase in the energy efficiency of the energy systems for commercial buildings would lead to significant energy savings and emissions reductions. In this work, we introduce an energy systems engineering framework towards the optimal design of such energy systems with improved energy efficiency and environmental performance. The framework features a superstructure representation of the various energy technology alternatives, a mixed-integer optimization formulation of the energy systems design problem, and a multi-objective design optimization solution strategy, where economic and environmental criteria are simultaneously considered and properly traded off. A case study of a supermarket energy systems design is presented to illustrate the key steps and potential of the proposed energy systems engineering approach.

  6. Approaches to state regulation of the energy sector

    International Nuclear Information System (INIS)

    Shervashidze, N.; Stojchev, D.

    1995-01-01

    Theory and practice of economical regulation by repaying coefficient and by partial co-ordinated expenses are discussed. The example of England, Ireland, Wales and US are pointed out as showing the features of both approaches being quite interesting for Bulgarian energy sector, facing the introduction of modern economical regulation. The specific character of Bulgarian energy sector is described and some conclusions are drawn concerning appropriate regulating methods. 6 refs. (orig.)

  7. Modeling climate change impact in hospitality sector, using building resources consumption signature

    Science.gov (United States)

    Pinto, Armando; Bernardino, Mariana; Silva Santos, António; Pimpão Silva, Álvaro; Espírito Santo, Fátima

    2016-04-01

    Hotels are one of building types that consumes more energy and water per person and are vulnerable to climate change because in the occurrence of extreme events (heat waves, water stress) same failures could compromise the hotel services (comfort) and increase energy cost or compromise the landscape and amenities due to water use restrictions. Climate impact assessments and the development of adaptation strategies require the knowledge about critical climatic variables and also the behaviour of building. To study the risk and vulnerability of buildings and hotels to climate change regarding resources consumption (energy and water), previous studies used building energy modelling simulation (BEMS) tools to study the variation in energy and water consumption. In general, the climate change impact in building is evaluated studying the energy and water demand of the building for future climate scenarios. But, hotels are complex buildings, quite different from each other and assumption done in simplified BEMS aren't calibrated and usually neglect some important hotel features leading to projected estimates that do not usually match hotel sector understanding and practice. Taking account all uncertainties, the use of building signature (statistical method) could be helpful to assess, in a more clear way, the impact of Climate Change in the hospitality sector and using a broad sample. Statistical analysis of the global energy consumption obtained from bills shows that the energy consumption may be predicted within 90% confidence interval only with the outdoor temperature. In this article a simplified methodology is presented and applied to identify the climate change impact in hospitality sector using the building energy and water signature. This methodology is applied to sixteen hotels (nine in Lisbon and seven in Algarve) with four and five stars rating. The results show that is expect an increase in water and electricity consumption (manly due to the increase in

  8. Exploiting variability for energy optimization of parallel programs

    Energy Technology Data Exchange (ETDEWEB)

    Lavrijsen, Wim [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Iancu, Costin [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); de Jong, Wibe [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Chen, Xin [Georgia Inst. of Technology, Atlanta, GA (United States); Schwan, Karsten [Georgia Inst. of Technology, Atlanta, GA (United States)

    2016-04-18

    Here in this paper we present optimizations that use DVFS mechanisms to reduce the total energy usage in scientific applications. Our main insight is that noise is intrinsic to large scale parallel executions and it appears whenever shared resources are contended. The presence of noise allows us to identify and manipulate any program regions amenable to DVFS. When compared to previous energy optimizations that make per core decisions using predictions of the running time, our scheme uses a qualitative approach to recognize the signature of executions amenable to DVFS. By recognizing the "shape of variability" we can optimize codes with highly dynamic behavior, which pose challenges to all existing DVFS techniques. We validate our approach using offline and online analyses for one-sided and two-sided communication paradigms. We have applied our methods to NWChem, and we show best case improvements in energy use of 12% at no loss in performance when using online optimizations running on 720 Haswell cores with one-sided communication. With NWChem on MPI two-sided and offline analysis, capturing the initialization, we find energy savings of up to 20%, with less than 1% performance cost.

  9. Molecular signatures of thyroid follicular neoplasia

    DEFF Research Database (Denmark)

    Borup, R.; Rossing, M.; Henao, Ricardo

    2010-01-01

    The molecular pathways leading to thyroid follicular neoplasia are incompletely understood, and the diagnosis of follicular tumors is a clinical challenge. To provide leads to the pathogenesis and diagnosis of the tumors, we examined the global transcriptome signatures of follicular thyroid...... a mechanism for cancer progression, which is why we exploited the results in order to generate a molecular classifier that could identify 95% of all carcinomas. Validation employing public domain and cross-platform data demonstrated that the signature was robust and could diagnose follicular nodules...... and robust genetic signature for the diagnosis of FA and FC. Endocrine-Related Cancer (2010) 17 691-708...

  10. Motif signatures of transcribed enhancers

    KAUST Repository

    Kleftogiannis, Dimitrios

    2017-09-14

    In mammalian cells, transcribed enhancers (TrEn) play important roles in the initiation of gene expression and maintenance of gene expression levels in spatiotemporal manner. One of the most challenging questions in biology today is how the genomic characteristics of enhancers relate to enhancer activities. This is particularly critical, as several recent studies have linked enhancer sequence motifs to specific functional roles. To date, only a limited number of enhancer sequence characteristics have been investigated, leaving space for exploring the enhancers genomic code in a more systematic way. To address this problem, we developed a novel computational method, TELS, aimed at identifying predictive cell type/tissue specific motif signatures. We used TELS to compile a comprehensive catalog of motif signatures for all known TrEn identified by the FANTOM5 consortium across 112 human primary cells and tissues. Our results confirm that distinct cell type/tissue specific motif signatures characterize TrEn. These signatures allow discriminating successfully a) TrEn from random controls, proxy of non-enhancer activity, and b) cell type/tissue specific TrEn from enhancers expressed and transcribed in different cell types/tissues. TELS codes and datasets are publicly available at http://www.cbrc.kaust.edu.sa/TELS.

  11. Identification of host response signatures of infection.

    Energy Technology Data Exchange (ETDEWEB)

    Branda, Steven S.; Sinha, Anupama; Bent, Zachary

    2013-02-01

    Biological weapons of mass destruction and emerging infectious diseases represent a serious and growing threat to our national security. Effective response to a bioattack or disease outbreak critically depends upon efficient and reliable distinguishing between infected vs healthy individuals, to enable rational use of scarce, invasive, and/or costly countermeasures (diagnostics, therapies, quarantine). Screening based on direct detection of the causative pathogen can be problematic, because culture- and probe-based assays are confounded by unanticipated pathogens (e.g., deeply diverged, engineered), and readily-accessible specimens (e.g., blood) often contain little or no pathogen, particularly at pre-symptomatic stages of disease. Thus, in addition to the pathogen itself, one would like to detect infection-specific host response signatures in the specimen, preferably ones comprised of nucleic acids (NA), which can be recovered and amplified from tiny specimens (e.g., fingerstick draws). Proof-of-concept studies have not been definitive, however, largely due to use of sub-optimal sample preparation and detection technologies. For purposes of pathogen detection, Sandia has developed novel molecular biology methods that enable selective isolation of NA unique to, or shared between, complex samples, followed by identification and quantitation via Second Generation Sequencing (SGS). The central hypothesis of the current study is that variations on this approach will support efficient identification and verification of NA-based host response signatures of infectious disease. To test this hypothesis, we re-engineered Sandia's sophisticated sample preparation pipelines, and developed new SGS data analysis tools and strategies, in order to pioneer use of SGS for identification of host NA correlating with infection. Proof-of-concept studies were carried out using specimens drawn from pathogen-infected non-human primates (NHP). This work provides a strong foundation for

  12. New approach to energy loss measurements

    CERN Document Server

    Trzaska, W H; Alanko, T; Mutterer, M; Raeisaenen, J; Tjurin, G; Wojdyr, M

    2002-01-01

    A new approach to energy loss measurements is proposed. In the same experiment electronic stopping force (power) in gold, nickel, carbon, polycarbonate and Havar for sup 4 sup 0 Ar, sup 2 sup 8 Si, sup 1 sup 6 O, sup 4 He and sup 1 H ions in the energy range 0.12-11 MeV/u has been measured. In this paper we give the full results for gold, nickel, and carbon and for sup 4 sup 0 Ar, sup 1 sup 6 O, sup 4 He and sup 1 H ions. Good agreement of the measured stopping force values for light ions with literature data is interpreted as the positive test of the experimental technique. The same technique used with heavy ions yields agreement with the published data only for energies above 1 MeV/u. At lower energies we observe progressively increasing discrepancy. This discrepancy is removed completely as soon as we neglect pulse height defect compensation. This observation makes us believe that the majority of the published results as well as semi-empirical calculations based on them (like the popular SRIM) may be in er...

  13. International energy market dynamics: a modelling approach. Tome 1

    International Nuclear Information System (INIS)

    Nachet, S.

    1996-01-01

    This work is an attempt to model international energy market and reproduce the behaviour of both energy demand and supply. Energy demand was represented using sector versus source approach. For developing countries, existing link between economic and energy sectors were analysed. Energy supply is exogenous for energy sources other than oil and natural gas. For hydrocarbons, exploration-production process was modelled and produced figures as production yield, exploration effort index, etc. The model built is econometric and is solved using a software that was constructed for this purpose. We explore the energy market future using three scenarios and obtain projections by 2010 for energy demand per source and oil natural gas supply per region. Economic variables are used to produce different indicators as energy intensity, energy per capita, etc. (author). 378 refs., 26 figs., 35 tabs., 11 appends

  14. International energy market dynamics: a modelling approach. Tome 2

    International Nuclear Information System (INIS)

    Nachet, S.

    1996-01-01

    This work is an attempt to model international energy market and reproduce the behaviour of both energy demand and supply. Energy demand was represented using sector versus source approach. For developing countries, existing link between economic and energy sectors were analysed. Energy supply is exogenous for energy sources other than oil and natural gas. For hydrocarbons, exploration-production process was modelled and produced figures as production yield, exploration effort index, ect. The model build is econometric and is solved using a software that was constructed for this purpose. We explore the energy market future using three scenarios and obtain projections by 2010 for energy demand per source and oil and natural gas supply per region. Economic variables are used to produce different indicators as energy intensity, energy per capita, etc. (author). 378 refs., 26 figs., 35 tabs., 11 appends

  15. Quantum Geometry: Relativistic energy approach to cooperative electron-nucleary-transition spectrum

    Directory of Open Access Journals (Sweden)

    Ольга Юрьевна Хецелиус

    2014-11-01

    Full Text Available An advanced relativistic energy approach is presented and applied to calculating parameters of electron-nuclear 7-transition spectra of nucleus in the atom. The intensities of the spectral satellites are defined in the relativistic version of the energy approach (S-matrix formalism, and gauge-invariant quantum-electrodynamical perturbation theory with the Dirac-Kohn-Sham density-functional zeroth approximation.

  16. Corticosteroid receptors adopt distinct cyclical transcriptional signatures.

    Science.gov (United States)

    Le Billan, Florian; Amazit, Larbi; Bleakley, Kevin; Xue, Qiong-Yao; Pussard, Eric; Lhadj, Christophe; Kolkhof, Peter; Viengchareun, Say; Fagart, Jérôme; Lombès, Marc

    2018-05-07

    Mineralocorticoid receptors (MRs) and glucocorticoid receptors (GRs) are two closely related hormone-activated transcription factors that regulate major pathophysiologic functions. High homology between these receptors accounts for the crossbinding of their corresponding ligands, MR being activated by both aldosterone and cortisol and GR essentially activated by cortisol. Their coexpression and ability to bind similar DNA motifs highlight the need to investigate their respective contributions to overall corticosteroid signaling. Here, we decipher the transcriptional regulatory mechanisms that underlie selective effects of MRs and GRs on shared genomic targets in a human renal cellular model. Kinetic, serial, and sequential chromatin immunoprecipitation approaches were performed on the period circadian protein 1 ( PER1) target gene, providing evidence that both receptors dynamically and cyclically interact at the same target promoter in a specific and distinct transcriptional signature. During this process, both receptors regulate PER1 gene by binding as homo- or heterodimers to the same promoter region. Our results suggest a novel level of MR-GR target gene regulation, which should be considered for a better and integrated understanding of corticosteroid-related pathophysiology.-Le Billan, F., Amazit, L., Bleakley, K., Xue, Q.-Y., Pussard, E., Lhadj, C., Kolkhof, P., Viengchareun, S., Fagart, J., Lombès, M. Corticosteroid receptors adopt distinct cyclical transcriptional signatures.

  17. An object-oriented approach to energy-economic modeling

    Energy Technology Data Exchange (ETDEWEB)

    Wise, M.A.; Fox, J.A.; Sands, R.D.

    1993-12-01

    In this paper, the authors discuss the experiences in creating an object-oriented economic model of the U.S. energy and agriculture markets. After a discussion of some central concepts, they provide an overview of the model, focusing on the methodology of designing an object-oriented class hierarchy specification based on standard microeconomic production functions. The evolution of the model from the class definition stage to programming it in C++, a standard object-oriented programming language, will be detailed. The authors then discuss the main differences between writing the object-oriented program versus a procedure-oriented program of the same model. Finally, they conclude with a discussion of the advantages and limitations of the object-oriented approach based on the experience in building energy-economic models with procedure-oriented approaches and languages.

  18. A High Throughput Ambient Mass Spectrometric Approach to Species Identification and Classification from Chemical Fingerprint Signatures

    Science.gov (United States)

    Musah, Rabi A.; Espinoza, Edgard O.; Cody, Robert B.; Lesiak, Ashton D.; Christensen, Earl D.; Moore, Hannah E.; Maleknia, Simin; Drijfhout, Falko P.

    2015-01-01

    A high throughput method for species identification and classification through chemometric processing of direct analysis in real time (DART) mass spectrometry-derived fingerprint signatures has been developed. The method entails introduction of samples to the open air space between the DART ion source and the mass spectrometer inlet, with the entire observed mass spectral fingerprint subjected to unsupervised hierarchical clustering processing. A range of both polar and non-polar chemotypes are instantaneously detected. The result is identification and species level classification based on the entire DART-MS spectrum. Here, we illustrate how the method can be used to: (1) distinguish between endangered woods regulated by the Convention for the International Trade of Endangered Flora and Fauna (CITES) treaty; (2) assess the origin and by extension the properties of biodiesel feedstocks; (3) determine insect species from analysis of puparial casings; (4) distinguish between psychoactive plants products; and (5) differentiate between Eucalyptus species. An advantage of the hierarchical clustering approach to processing of the DART-MS derived fingerprint is that it shows both similarities and differences between species based on their chemotypes. Furthermore, full knowledge of the identities of the constituents contained within the small molecule profile of analyzed samples is not required. PMID:26156000

  19. The potential energy landscape in the Lennard-Jones binary mixture model

    International Nuclear Information System (INIS)

    Sampoli, M; Benassi, P; Eramo, R; Angelani, L; Ruocco, G

    2003-01-01

    The potential energy landscape in the Kob-Andersen Lennard-Jones binary mixture model has been studied carefully from the liquid down to the supercooled regime, from T = 2 down to 0.46. One thousand independent configurations along the time evolution locus have been examined at each temperature investigated. From the starting configuration, we searched for the nearest saddle (or quasi-saddle) and minimum of the potential energy. The vibrational densities of states for the starting and the two derived configurations have been evaluated. Besides the number of negative eigenvalues of the saddles other quantities show some signature of the approach of the dynamical arrest temperature

  20. Approach of the estimation for the highest energy of the gamma rays

    International Nuclear Information System (INIS)

    Dumitrescu, Gheorghe

    2004-01-01

    In the last decade there was under debate the issue concerning the composition of the ultra high energy cosmic rays and some authors suggested that the light composition seems to be a relating issue. There was another debate concerning the limit of the energy of gamma rays. The bottom-up approaches suggest a limit at 10 15 eV. Some top-down approaches rise this limit at about 10 20 eV or above. The present paper provides an approach to estimate the limit of the energy of gamma rays using the recent paper of Claus W. Turtur. (author)

  1. Integrative Analysis of Disease Signatures Shows Inflammation Disrupts Juvenile Experience-Dependent Cortical Plasticity

    Science.gov (United States)

    Smith, Milo R.; Burman, Poromendro

    2016-01-01

    Throughout childhood and adolescence, periods of heightened neuroplasticity are critical for the development of healthy brain function and behavior. Given the high prevalence of neurodevelopmental disorders, such as autism, identifying disruptors of developmental plasticity represents an essential step for developing strategies for prevention and intervention. Applying a novel computational approach that systematically assessed connections between 436 transcriptional signatures of disease and multiple signatures of neuroplasticity, we identified inflammation as a common pathological process central to a diverse set of diseases predicted to dysregulate plasticity signatures. We tested the hypothesis that inflammation disrupts developmental cortical plasticity in vivo using the mouse ocular dominance model of experience-dependent plasticity in primary visual cortex. We found that the administration of systemic lipopolysaccharide suppressed plasticity during juvenile critical period with accompanying transcriptional changes in a particular set of molecular regulators within primary visual cortex. These findings suggest that inflammation may have unrecognized adverse consequences on the postnatal developmental trajectory and indicate that treating inflammation may reduce the burden of neurodevelopmental disorders. PMID:28101530

  2. Stable isotope signatures reflect dietary diversity in European forest moths.

    Science.gov (United States)

    Adams, Marc-Oliver; Seifert, Carlo Lutz; Lehner, Lisamarie; Truxa, Christine; Wanek, Wolfgang; Fiedler, Konrad

    2016-01-01

    Information on larval diet of many holometabolous insects remains incomplete. Carbon (C) and nitrogen (N) stable isotope analysis in adult wing tissue can provide an efficient tool to infer such trophic relationships. The present study examines whether moth feeding guild affiliations taken from literature are reflected in isotopic signatures. Non-metric multidimensional scaling and permutational analysis of variance indicate that centroids of dietary groups differ significantly. In particular, species whose larvae feed on mosses or aquatic plants deviated from those that consumed vascular land plants. Moth δ(15)N signatures spanned a broader range, and were less dependent on species identity than δ(13)C values. Comparison between moth samples and ostensible food sources revealed heterogeneity in the lichenivorous guild, indicating only Lithosia quadra as an obligate lichen feeder. Among root-feeding Agrotis segetum, some specimens appear to have developed on crop plants in forest-adjacent farm land. Reed-feeding stem-borers may partially rely on intermediary trophic levels such as fungal or bacterial growth. Diagnostic partitioning of moth dietary guilds based on isotopic signatures alone could not be achieved, but hypotheses on trophic relationships based on often vague literature records could be assessed with high resolution. Hence, the approach is well suited for basic categorization of moths where diet is unknown or notoriously difficult to observe (i.e. Microlepidoptera, lichen-feeders).

  3. 12 CFR 269b.731 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Signature. 269b.731 Section 269b.731 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM CHARGES OF UNFAIR LABOR PRACTICES General Rules § 269b.731 Signature. The original of each document filed shall be...

  4. Using fractal analysis of thermal signatures for thyroid disease evaluation

    Science.gov (United States)

    Gavriloaia, Gheorghe; Sofron, Emil; Gavriloaia, Mariuca-Roxana; Ghemigean, Adina-Mariana

    2010-11-01

    The skin is the largest organ of the body and it protects against heat, light, injury and infection. Skin temperature is an important parameter for diagnosing diseases. Thermal analysis is non-invasive, painless, and relatively inexpensive, showing a great potential research. Since the thyroid regulates metabolic rate it is intimately connected to body temperature, more than, any modification of its function generates a specific thermal image on the neck skin. The shapes of thermal signatures are often irregular in size and shape. Euclidean geometry is not able to evaluate their shape for different thyroid diseases, and fractal geometry is used in this paper. Different thyroid diseases generate different shapes, and their complexity are evaluated by specific mathematical approaches, fractal analysis, in order to the evaluate selfsimilarity and lacunarity. Two kinds of thyroid diseases, hyperthyroidism and papillary cancer are analyzed in this paper. The results are encouraging and show the ability to continue research for thermal signature to be used in early diagnosis of thyroid diseases.

  5. Reduction of a Ship's Magnetic Field Signatures

    CERN Document Server

    Holmes, John

    2008-01-01

    Decreasing the magnetic field signature of a naval vessel will reduce its susceptibility to detonating naval influence mines and the probability of a submarine being detected by underwater barriers and maritime patrol aircraft. Both passive and active techniques for reducing the magnetic signatures produced by a vessel's ferromagnetism, roll-induced eddy currents, corrosion-related sources, and stray fields are presented. Mathematical models of simple hull shapes are used to predict the levels of signature reduction that might be achieved through the use of alternate construction materials. Al

  6. Signatures of Mechanosensitive Gating.

    Science.gov (United States)

    Morris, Richard G

    2017-01-10

    The question of how mechanically gated membrane channels open and close is notoriously difficult to address, especially if the protein structure is not available. This perspective highlights the relevance of micropipette-aspirated single-particle tracking-used to obtain a channel's diffusion coefficient, D, as a function of applied membrane tension, σ-as an indirect assay for determining functional behavior in mechanosensitive channels. While ensuring that the protein remains integral to the membrane, such methods can be used to identify not only the gating mechanism of a protein, but also associated physical moduli, such as torsional and dilational rigidity, which correspond to the protein's effective shape change. As an example, three distinct D-versus-σ "signatures" are calculated, corresponding to gating by dilation, gating by tilt, and gating by a combination of both dilation and tilt. Both advantages and disadvantages of the approach are discussed. Copyright © 2017 Biophysical Society. Published by Elsevier Inc. All rights reserved.

  7. Energy-aware memory management for embedded multimedia systems a computer-aided design approach

    CERN Document Server

    Balasa, Florin

    2011-01-01

    Energy-Aware Memory Management for Embedded Multimedia Systems: A Computer-Aided Design Approach presents recent computer-aided design (CAD) ideas that address memory management tasks, particularly the optimization of energy consumption in the memory subsystem. It explains how to efficiently implement CAD solutions, including theoretical methods and novel algorithms. The book covers various energy-aware design techniques, including data-dependence analysis techniques, memory size estimation methods, extensions of mapping approaches, and memory banking approaches. It shows how these techniques

  8. Free Energy Calculations using a Swarm-Enhanced Sampling Molecular Dynamics Approach.

    Science.gov (United States)

    Burusco, Kepa K; Bruce, Neil J; Alibay, Irfan; Bryce, Richard A

    2015-10-26

    Free energy simulations are an established computational tool in modelling chemical change in the condensed phase. However, sampling of kinetically distinct substates remains a challenge to these approaches. As a route to addressing this, we link the methods of thermodynamic integration (TI) and swarm-enhanced sampling molecular dynamics (sesMD), where simulation replicas interact cooperatively to aid transitions over energy barriers. We illustrate the approach by using alchemical alkane transformations in solution, comparing them with the multiple independent trajectory TI (IT-TI) method. Free energy changes for transitions computed by using IT-TI grew increasingly inaccurate as the intramolecular barrier was heightened. By contrast, swarm-enhanced sampling TI (sesTI) calculations showed clear improvements in sampling efficiency, leading to more accurate computed free energy differences, even in the case of the highest barrier height. The sesTI approach, therefore, has potential in addressing chemical change in systems where conformations exist in slow exchange. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  9. Proteomics goes forensic: Detection and mapping of blood signatures in fingermarks.

    Science.gov (United States)

    Deininger, Lisa; Patel, Ekta; Clench, Malcolm R; Sears, Vaughn; Sammon, Chris; Francese, Simona

    2016-06-01

    A bottom up in situ proteomic method has been developed enabling the mapping of multiple blood signatures on the intact ridges of blood fingermarks by Matrix Assisted Laser Desorption Mass Spectrometry Imaging (MALDI-MSI). This method, at a proof of concept stage, builds upon recently published work demonstrating the opportunity to profile and identify multiple blood signatures in bloodstains via a bottom up proteomic approach. The present protocol addresses the limitation of the previously developed profiling method with respect to destructivity; destructivity should be avoided for evidence such as blood fingermarks, where the ridge detail must be preserved in order to provide the associative link between the biometric information and the events of bloodshed. Using a blood mark reference model, trypsin concentration and spraying conditions have been optimised within the technical constraints of the depositor eventually employed; the application of MALDI-MSI and Ion Mobility MS have enabled the detection, confirmation and visualisation of blood signatures directly onto the ridge pattern. These results are to be considered a first insight into a method eventually informing investigations (and judicial debates) of violent crimes in which the reliable and non-destructive detection and mapping of blood in fingermarks is paramount to reconstruct the events of bloodshed. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  10. Global modeling of flux transfer events: generation mechanism and spacecraft signatures

    Science.gov (United States)

    Raeder, J.

    2003-04-01

    Magnetic reconnection is a fundamental mode of energy and momentum transfer from the solar wind to the magnetosphere. It is known to occur in different forms depending on solar wind and magnetospheric conditions. In particular, steady reconnection can be distinguished from pulse-like reconnection events which are also known as Flux Transfer Events (FTEs). The formation mechanism of FTEs and their contolling factors remain controversial. We use global MHD simulations of Earth's magnetosphere to show that for southward IMF conditions: a) steady reconnection preferentially occurs without FTEs when the stagnation flow line nearly coincides with the X-line location, which requires small dipole tilt and nearly due southward IMF, b) FTEs occur when the flow/field symmetry is broken, which requires either a large dipole tilt and/or a substantial east-west component of the IMF, c) the predicted spacecraft signature and the repetition frequency of FTEs in the simulations agrees very well with typical observations, lending credibility to the the model, d) the fundamental process that leads to FTE formation is multiple X-line formation caused by the flow and field patterns in the magnetosheath and requires no intrinsic plasma property variations like variable resistivity, e) if the dipole tilt breaks the symmetry FTEs occur only in the winter hemisphere whereas the reconnection signatures in the summer hemisphere are steady with no bipolar FTE-like signatures, f) if the IMF east-west field component breaks the symmetry FTEs occur in both hemispheres, and g) FTE formation depends on sufficient resolution and low diffusion in the model -- coarse resolution and/or high diffusivity lead to flow-through reconnection signatures that appear unphysical given the frequent observation of FTEs.

  11. Does Twitter trigger bursts in signature collections?

    Science.gov (United States)

    Yamaguchi, Rui; Imoto, Seiya; Kami, Masahiro; Watanabe, Kenji; Miyano, Satoru; Yuji, Koichiro

    2013-01-01

    The quantification of social media impacts on societal and political events is a difficult undertaking. The Japanese Society of Oriental Medicine started a signature-collecting campaign to oppose a medical policy of the Government Revitalization Unit to exclude a traditional Japanese medicine, "Kampo," from the public insurance system. The signature count showed a series of aberrant bursts from November 26 to 29, 2009. In the same interval, the number of messages on Twitter including the keywords "Signature" and "Kampo," increased abruptly. Moreover, the number of messages on an Internet forum that discussed the policy and called for signatures showed a train of spikes. In order to estimate the contributions of social media, we developed a statistical model with state-space modeling framework that distinguishes the contributions of multiple social media in time-series of collected public opinions. We applied the model to the time-series of signature counts of the campaign and quantified contributions of two social media, i.e., Twitter and an Internet forum, by the estimation. We found that a considerable portion (78%) of the signatures was affected from either of the social media throughout the campaign and the Twitter effect (26%) was smaller than the Forum effect (52%) in total, although Twitter probably triggered the initial two bursts of signatures. Comparisons of the estimated profiles of the both effects suggested distinctions between the social media in terms of sustainable impact of messages or tweets. Twitter shows messages on various topics on a time-line; newer messages push out older ones. Twitter may diminish the impact of messages that are tweeted intermittently. The quantification of social media impacts is beneficial to better understand people's tendency and may promote developing strategies to engage public opinions effectively. Our proposed method is a promising tool to explore information hidden in social phenomena.

  12. Does Twitter trigger bursts in signature collections?

    Directory of Open Access Journals (Sweden)

    Rui Yamaguchi

    Full Text Available INTRODUCTION: The quantification of social media impacts on societal and political events is a difficult undertaking. The Japanese Society of Oriental Medicine started a signature-collecting campaign to oppose a medical policy of the Government Revitalization Unit to exclude a traditional Japanese medicine, "Kampo," from the public insurance system. The signature count showed a series of aberrant bursts from November 26 to 29, 2009. In the same interval, the number of messages on Twitter including the keywords "Signature" and "Kampo," increased abruptly. Moreover, the number of messages on an Internet forum that discussed the policy and called for signatures showed a train of spikes. METHODS AND FINDINGS: In order to estimate the contributions of social media, we developed a statistical model with state-space modeling framework that distinguishes the contributions of multiple social media in time-series of collected public opinions. We applied the model to the time-series of signature counts of the campaign and quantified contributions of two social media, i.e., Twitter and an Internet forum, by the estimation. We found that a considerable portion (78% of the signatures was affected from either of the social media throughout the campaign and the Twitter effect (26% was smaller than the Forum effect (52% in total, although Twitter probably triggered the initial two bursts of signatures. Comparisons of the estimated profiles of the both effects suggested distinctions between the social media in terms of sustainable impact of messages or tweets. Twitter shows messages on various topics on a time-line; newer messages push out older ones. Twitter may diminish the impact of messages that are tweeted intermittently. CONCLUSIONS: The quantification of social media impacts is beneficial to better understand people's tendency and may promote developing strategies to engage public opinions effectively. Our proposed method is a promising tool to explore

  13. Re-examining the security of blind quantum signature protocols

    International Nuclear Information System (INIS)

    Wang Mingming; Chen Xiubo; Niu Xinxin; Yang Yixian

    2012-01-01

    Recently, blind quantum signature (BQS) protocols have been proposed with the help of a third-party verifier. However, our research shows that some of the BQS protocols are unable to complete the blind signature task fairly if the verifier is dishonest. Indeed, these protocols can be viewed as variants of the classical digital signature scheme of symmetric-key cryptography. If nobody is trusted in such protocols, digital signature cannot be implemented since disagreements cannot be solved fairly.

  14. Blind Quantum Signature with Blind Quantum Computation

    Science.gov (United States)

    Li, Wei; Shi, Ronghua; Guo, Ying

    2017-04-01

    Blind quantum computation allows a client without quantum abilities to interact with a quantum server to perform a unconditional secure computing protocol, while protecting client's privacy. Motivated by confidentiality of blind quantum computation, a blind quantum signature scheme is designed with laconic structure. Different from the traditional signature schemes, the signing and verifying operations are performed through measurement-based quantum computation. Inputs of blind quantum computation are securely controlled with multi-qubit entangled states. The unique signature of the transmitted message is generated by the signer without leaking information in imperfect channels. Whereas, the receiver can verify the validity of the signature using the quantum matching algorithm. The security is guaranteed by entanglement of quantum system for blind quantum computation. It provides a potential practical application for e-commerce in the cloud computing and first-generation quantum computation.

  15. DNA methylation–based immune response signature improves patient diagnosis in multiple cancers

    Science.gov (United States)

    Jeschke, Jana; Bizet, Martin; Calonne, Emilie; Dedeurwaerder, Sarah; Garaud, Soizic; Koch, Alexander; Larsimont, Denis; Salgado, Roberto; Van den Eynden, Gert; Willard Gallo, Karen; Defrance, Matthieu; Sotiriou, Christos

    2017-01-01

    BACKGROUND. The tumor immune response is increasingly associated with better clinical outcomes in breast and other cancers. However, the evaluation of tumor-infiltrating lymphocytes (TILs) relies on histopathological measurements with limited accuracy and reproducibility. Here, we profiled DNA methylation markers to identify a methylation of TIL (MeTIL) signature that recapitulates TIL evaluations and their prognostic value for long-term outcomes in breast cancer (BC). METHODS. MeTIL signature scores were correlated with clinical endpoints reflecting overall or disease-free survival and a pathologic complete response to preoperative anthracycline therapy in 3 BC cohorts from the Jules Bordet Institute in Brussels and in other cancer types from The Cancer Genome Atlas. RESULTS. The MeTIL signature measured TIL distributions in a sensitive manner and predicted survival and response to chemotherapy in BC better than did histopathological assessment of TILs or gene expression–based immune markers, respectively. The MeTIL signature also improved the prediction of survival in other malignancies, including melanoma and lung cancer. Furthermore, the MeTIL signature predicted differences in survival for malignancies in which TILs were not known to have a prognostic value. Finally, we showed that MeTIL markers can be determined by bisulfite pyrosequencing of small amounts of DNA from formalin-fixed, paraffin-embedded tumor tissue, supporting clinical applications for this methodology. CONCLUSIONS. This study highlights the power of DNA methylation to evaluate tumor immune responses and the potential of this approach to improve the diagnosis and treatment of breast and other cancers. FUNDING. This work was funded by the Fonds National de la Recherche Scientifique (FNRS) and Télévie, the INNOVIRIS Brussels Region BRUBREAST Project, the IUAP P7/03 program, the Belgian “Foundation against Cancer,” the Breast Cancer Research Foundation (BCRF), and the Fonds Gaston Ithier

  16. Polarization Signatures of Kink Instabilities in the Blazar Emission Region from Relativistic Magnetohydrodynamic Simulations

    International Nuclear Information System (INIS)

    Zhang, Haocheng; Taylor, Greg; Li, Hui; Guo, Fan

    2017-01-01

    Kink instabilities are likely to occur in the current-carrying magnetized plasma jets. Recent observations of the blazar radiation and polarization signatures suggest that the blazar emission region may be considerably magnetized. While the kink instability has been studied with first-principle magnetohydrodynamic (MHD) simulations, the corresponding time-dependent radiation and polarization signatures have not been investigated. In this paper, we perform comprehensive polarization-dependent radiation modeling of the kink instability in the blazar emission region based on relativistic MHD (RMHD) simulations. We find that the kink instability may give rise to strong flares with polarization angle (PA) swings or weak flares with polarization fluctuations, depending on the initial magnetic topology and magnetization. These findings are consistent with observations. Compared with the shock model, the kink model generates polarization signatures that are in better agreement with the general polarization observations. Therefore, we suggest that kink instabilities may widely exist in the jet environment and provide an efficient way to convert the magnetic energy and produce multiwavelength flares and polarization variations.

  17. Polarization Signatures of Kink Instabilities in the Blazar Emission Region from Relativistic Magnetohydrodynamic Simulations

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Haocheng; Taylor, Greg [Department of Physics and Astronomy, University of New Mexico, Albuquerque, NM 87131 (United States); Li, Hui; Guo, Fan [Theoretical Division, Los Alamos National Laboratory, Los Alamos, NM 87545 (United States)

    2017-02-01

    Kink instabilities are likely to occur in the current-carrying magnetized plasma jets. Recent observations of the blazar radiation and polarization signatures suggest that the blazar emission region may be considerably magnetized. While the kink instability has been studied with first-principle magnetohydrodynamic (MHD) simulations, the corresponding time-dependent radiation and polarization signatures have not been investigated. In this paper, we perform comprehensive polarization-dependent radiation modeling of the kink instability in the blazar emission region based on relativistic MHD (RMHD) simulations. We find that the kink instability may give rise to strong flares with polarization angle (PA) swings or weak flares with polarization fluctuations, depending on the initial magnetic topology and magnetization. These findings are consistent with observations. Compared with the shock model, the kink model generates polarization signatures that are in better agreement with the general polarization observations. Therefore, we suggest that kink instabilities may widely exist in the jet environment and provide an efficient way to convert the magnetic energy and produce multiwavelength flares and polarization variations.

  18. Modeling ground vehicle acoustic signatures for analysis and synthesis

    International Nuclear Information System (INIS)

    Haschke, G.; Stanfield, R.

    1995-01-01

    Security and weapon systems use acoustic sensor signals to classify and identify moving ground vehicles. Developing robust signal processing algorithms for this is expensive, particularly in presence of acoustic clutter or countermeasures. This paper proposes a parametric ground vehicle acoustic signature model to aid the system designer in understanding which signature features are important, developing corresponding feature extraction algorithms and generating low-cost, high-fidelity synthetic signatures for testing. The authors have proposed computer-generated acoustic signatures of armored, tracked ground vehicles to deceive acoustic-sensored smart munitions. They have developed quantitative measures of how accurately a synthetic acoustic signature matches those produced by actual vehicles. This paper describes parameters of the model used to generate these synthetic signatures and suggests methods for extracting these parameters from signatures of valid vehicle encounters. The model incorporates wide-bandwidth and narrow- bandwidth components that are modulated in a pseudo-random fashion to mimic the time dynamics of valid vehicle signatures. Narrow- bandwidth feature extraction techniques estimate frequency, amplitude and phase information contained in a single set of narrow frequency- band harmonics. Wide-bandwidth feature extraction techniques estimate parameters of a correlated-noise-floor model. Finally, the authors propose a method of modeling the time dynamics of the harmonic amplitudes as a means adding necessary time-varying features to the narrow-bandwidth signal components. The authors present results of applying this modeling technique to acoustic signatures recorded during encounters with one armored, tracked vehicle. Similar modeling techniques can be applied to security systems

  19. DIGITAL SIGNATURE IN THE WAY OF LAW

    OpenAIRE

    Ruya Samlı

    2013-01-01

    Signature can be defined as a person’s name or special signs that he/she writes when he/she wants to indicate he/she wrote or confirm that writing. A person signs many times in his/her life. A person’s signature that is used for thousands of times for many things from formal documents to exams has importance for that person. Especially, signing in legal operations is an operation that can build important results. If a person’s signature is imitated by another person, he/she can be...

  20. High pressure membrane foulants of seawater, brackish water and river water: Origin assessed by sugar and bacteriohopanepolyol signatures

    KAUST Repository

    Mondamert, Leslie

    2011-01-01

    The present work aimed to study the origin of foulant material recovered on membranes used in water treatment. Firstly, sugar signatures were assessed from the monosaccharide composition. As results were not conclusive, a statistical approach using discriminant analysis was applied to the sugar data set in order to predict the origin of the foulant material. Three groups of various origins (algal, microbial, continental dissolved organic matter) were used as sugar references for the prediction. The results of the computation showed that the origin of reverse osmosis (RO) seawater foulant material is influenced by both the location of the water sources and the season. RO brackish water and nanofiltration river water foulant materials had a terrestrial origin. Secondly, bacteriohopanepolyol signatures indicated that RO seawater foulant material had a marine signature, RO brackish water foulant material had both a marine and a terrestrial origin and the nanofiltration river water foulant material contained only a terrestrial signature. © 2011 Taylor & Francis.

  1. Low scale supersymmetry at the LHC with jet and missing energy signature

    International Nuclear Information System (INIS)

    Demidov, S.V.; Sobolev, I.V.

    2017-03-01

    If supersymmetry is broken at TeV scale, particles from sector responsible for supersymmetry breaking - goldstino and sgoldstinos - can reveal themselves already at the LHC experiments. We discuss bounds on supersymmetry breaking scale from the LHC searches for events with a jet plus missing momentum signature focusing on the case of TeV scale sgoldstinos. We show that contribution of light sgoldstinos to the cross section of of gravitino pair production with a jet can be sizable and the bounds on the gravitino mass can be stronger by up to a factor of 2 as compared to those obtained in the heavy sgoldstino limit. We compare these bounds on parameters of the model to those obtained with the results of ATLAS and CMS searches for dijet resonances.

  2. An Efficient Homomorphic Aggregate Signature Scheme Based on Lattice

    Directory of Open Access Journals (Sweden)

    Zhengjun Jing

    2014-01-01

    Full Text Available Homomorphic aggregate signature (HAS is a linearly homomorphic signature (LHS for multiple users, which can be applied for a variety of purposes, such as multi-source network coding and sensor data aggregation. In order to design an efficient postquantum secure HAS scheme, we borrow the idea of the lattice-based LHS scheme over binary field in the single-user case, and develop it into a new lattice-based HAS scheme in this paper. The security of the proposed scheme is proved by showing a reduction to the single-user case and the signature length remains invariant. Compared with the existing lattice-based homomorphic aggregate signature scheme, our new scheme enjoys shorter signature length and high efficiency.

  3. A Digital Signature Scheme Based on MST3 Cryptosystems

    Directory of Open Access Journals (Sweden)

    Haibo Hong

    2014-01-01

    Full Text Available As special types of factorization of finite groups, logarithmic signature and cover have been used as the main components of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2, and MST3. Recently, Svaba et. al proposed a revised MST3 encryption scheme with greater security. Meanwhile, they put forward an idea of constructing signature schemes on the basis of logarithmic signatures and random covers. In this paper, we firstly design a secure digital signature scheme based on logarithmic signatures and random covers. In order to complete the task, we devise a new encryption scheme based on MST3 cryptosystems.

  4. Toward a comprehensive and systematic methylome signature in colorectal cancers

    OpenAIRE

    Ashktorab, Hassan; Rahi, Hamed; Wansley, Daniel; Varma, Sudhir; Shokrani, Babak; Lee, Edward; Daremipouran, Mohammad; Laiyemo, Adeyinka; Goel, Ajay; Carethers, John M; Brim, Hassan

    2013-01-01

    CpG Island Methylator Phenotype (CIMP) is one of the underlying mechanisms in colorectal cancer (CRC). This study aimed to define a methylome signature in CRC through a methylation microarray analysis and a compilation of promising CIMP markers from the literature. Illumina HumanMethylation27 (IHM27) array data was generated and analyzed based on statistical differences in methylation data (1st approach) or based on overall differences in methylation percentages using lower 95% CI (2nd approa...

  5. An analytical approach for predicting the energy capture and conversion by impulsively-excited bistable vibration energy harvesters

    Science.gov (United States)

    Harne, R. L.; Zhang, Chunlin; Li, Bing; Wang, K. W.

    2016-07-01

    Impulsive energies are abundant throughout the natural and built environments, for instance as stimulated by wind gusts, foot-steps, or vehicle-road interactions. In the interest of maximizing the sustainability of society's technological developments, one idea is to capture these high-amplitude and abrupt energies and convert them into usable electrical power such as for sensors which otherwise rely on less sustainable power supplies. In this spirit, the considerable sensitivity to impulse-type events previously uncovered for bistable oscillators has motivated recent experimental and numerical studies on the power generation performance of bistable vibration energy harvesters. To lead to an effective and efficient predictive tool and design guide, this research develops a new analytical approach to estimate the electroelastic response and power generation of a bistable energy harvester when excited by an impulse. Comparison with values determined by direct simulation of the governing equations shows that the analytically predicted net converted energies are very accurate for a wide range of impulse strengths. Extensive experimental investigations are undertaken to validate the analytical approach and it is seen that the predicted estimates of the impulsive energy conversion are in excellent agreement with the measurements, and the detailed structural dynamics are correctly reproduced. As a result, the analytical approach represents a significant leap forward in the understanding of how to effectively leverage bistable structures as energy harvesting devices and introduces new means to elucidate the transient and far-from-equilibrium dynamics of nonlinear systems more generally.

  6. Server-Aided Verification Signature with Privacy for Mobile Computing

    Directory of Open Access Journals (Sweden)

    Lingling Xu

    2015-01-01

    Full Text Available With the development of wireless technology, much data communication and processing has been conducted in mobile devices with wireless connection. As we know that the mobile devices will always be resource-poor relative to static ones though they will improve in absolute ability, therefore, they cannot process some expensive computational tasks due to the constrained computational resources. According to this problem, server-aided computing has been studied in which the power-constrained mobile devices can outsource some expensive computation to a server with powerful resources in order to reduce their computational load. However, in existing server-aided verification signature schemes, the server can learn some information about the message-signature pair to be verified, which is undesirable especially when the message includes some secret information. In this paper, we mainly study the server-aided verification signatures with privacy in which the message-signature pair to be verified can be protected from the server. Two definitions of privacy for server-aided verification signatures are presented under collusion attacks between the server and the signer. Then based on existing signatures, two concrete server-aided verification signature schemes with privacy are proposed which are both proved secure.

  7. SSC physics signatures and trigger requirements

    International Nuclear Information System (INIS)

    1985-01-01

    Strategies are considered for triggering on new physics processes on the environment of the SSC, where interaction rates will be very high and most new physics processes quite rare. The quantities available for use in the trigger at various levels are related to the signatures of possible new physics. Two examples were investigated in some detail using the ISAJET Monte Carlo program: Higgs decays to W pairs and a missing energy trigger applied to gluino pair production. In both of the examples studied in detail, it was found that workable strategies for reducing the trigger rate were obtainable which also produced acceptable efficiency for the processes of interest. In future work, it will be necessary to carry out such a program for the full spectrum of suggested new physics

  8. Di-Higgs signatures from R-parity violating supersymmetry as the origin of neutrino mass

    Energy Technology Data Exchange (ETDEWEB)

    Biswas, Sanjoy; Chun, Eung Jin [School of Physics, Korea Institute for Advanced Study,Heogiro 85, Dongdaemun-gu, Seoul, 130-722 (Korea, Republic of); Sharma, Pankaj [ARC Center of Excellence for Particle Physics at the Terascale, Department of Physics,University of Adelaide, Adelaide, 5005 South (Australia)

    2016-12-14

    Motivated by the naturalness and neutrino mass generation, we study a bilinear R-parity violating supersymmetric scenario with a light Higgsino-like lightest supersymmetric particle (LSP). We observe that the LSP can have substantial decay branching ratio to νh in a large part of the parameter space, and thus study the pair production of electroweakinos followed by the decays χ̃{sub 1}{sup ±}→χ̃{sub 1}{sup 0}W{sup ±(∗)} and χ̃{sub 1}{sup 0}→νh. This leads to an interesting signature of Higgs boson pair production associated with significantly large missing transverse energy which is grossly distinct from the di-Higgs production in the Standard Model. We investigate the perspective of probing such signatures by performing a detector level simulation using a toy calorimeter of both the signal and corresponding backgrounds for the high-luminosity high energy phase of the Large Hadron Collider (LHC). We also advocate some observables based on kinematical features to provide an excellent handle to suppress the backgrounds.

  9. Direct evaluation of free energy for large system through structure integration approach.

    Science.gov (United States)

    Takeuchi, Kazuhito; Tanaka, Ryohei; Yuge, Koretaka

    2015-09-30

    We propose a new approach, 'structure integration', enabling direct evaluation of configurational free energy for large systems. The present approach is based on the statistical information of lattice. Through first-principles-based simulation, we find that the present method evaluates configurational free energy accurately in disorder states above critical temperature.

  10. Chemical Signatures of and Precursors to Fractures Using Fluid Inclusion Stratigraphy

    Energy Technology Data Exchange (ETDEWEB)

    Lorie M. Dilley

    2011-03-30

    chemical signature of fluid inclusions between open and closed fractures as well as differences in the chemical signature of open fractures between geothermal systems. Our hypothesis is that open fracture systems can be identified by their FIS chemical signature; that there are differences based on the mineral assemblages and geology of the system; and that there are chemical precursors in the wall rock above open, large fractures. Specific goals for this project are: (1) To build on the preliminary results which indicate that there are differences in the FIS signatures between open and closed fractures by identifying which chemical species indicate open fractures in both active geothermal systems and in hot, dry rock; (2) To evaluate the FIS signatures based on the geology of the fields; (3) To evaluate the FIS signatures based on the mineral assemblages in the fracture; and (4) To determine if there are specific chemical signatures in the wall rock above open, large fractures. This method promises to lower the cost of geothermal energy production in several ways. Knowledge of productive fractures in the boreholes will allow engineers to optimize well production. This information can aid in well testing decisions, well completion strategies, and in resource calculations. It will assist in determining the areas for future fracture enhancement. This will develop into one of the techniques in the 'tool bag' for creating and managing Enhanced Geothermal Systems.

  11. Utilization of genomic signatures to identify phenotype-specific drugs.

    Directory of Open Access Journals (Sweden)

    Seiichi Mori

    2009-08-01

    Full Text Available Genetic and genomic studies highlight the substantial complexity and heterogeneity of human cancers and emphasize the general lack of therapeutics that can match this complexity. With the goal of expanding opportunities for drug discovery, we describe an approach that makes use of a phenotype-based screen combined with the use of multiple cancer cell lines. In particular, we have used the NCI-60 cancer cell line panel that includes drug sensitivity measures for over 40,000 compounds assayed on 59 independent cells lines. Targets are cancer-relevant phenotypes represented as gene expression signatures that are used to identify cells within the NCI-60 panel reflecting the signature phenotype and then connect to compounds that are selectively active against those cells. As a proof-of-concept, we show that this strategy effectively identifies compounds with selectivity to the RAS or PI3K pathways. We have then extended this strategy to identify compounds that have activity towards cells exhibiting the basal phenotype of breast cancer, a clinically-important breast cancer characterized as ER-, PR-, and Her2- that lacks viable therapeutic options. One of these compounds, Simvastatin, has previously been shown to inhibit breast cancer cell growth in vitro and importantly, has been associated with a reduction in ER-, PR- breast cancer in a clinical study. We suggest that this approach provides a novel strategy towards identification of therapeutic agents based on clinically relevant phenotypes that can augment the conventional strategies of target-based screens.

  12. 48 CFR 4.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Contracting officer's signature. 4.101 Section 4.101 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Contract Execution 4.101 Contracting officer's signature. Only contracting officers shall...

  13. 37 CFR 2.74 - Form and signature of amendment.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Form and signature of... signature of amendment. (a) Form of Amendment. Amendments should be set forth clearly and completely... record. (b) Signature. A request for amendment of an application must be signed by the applicant, someone...

  14. 21 CFR 11.200 - Electronic signature components and controls.

    Science.gov (United States)

    2010-04-01

    ... signature components and controls. (a) Electronic signatures that are not based upon biometrics shall: (1) Employ at least two distinct identification components such as an identification code and password. (i... signatures based upon biometrics shall be designed to ensure that they cannot be used by anyone other than...

  15. Signature Schemes Secure against Hard-to-Invert Leakage

    DEFF Research Database (Denmark)

    Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus

    2012-01-01

    of the secret key. As a second contribution, we construct a signature scheme that achieves security for random messages assuming that the adversary is given a polynomial-time hard to invert function. Here, polynomial-hardness is required even when given the entire public-key – so called weak auxiliary input......-theoretically reveal the entire secret key. In this work, we propose the first constructions of digital signature schemes that are secure in the auxiliary input model. Our main contribution is a digital signature scheme that is secure against chosen message attacks when given an exponentially hard-to-invert function...... security. We show that such signature schemes readily give us auxiliary input secure identification schemes...

  16. Modeling energy fluxes in heterogeneous landscapes employing a mosaic approach

    Science.gov (United States)

    Klein, Christian; Thieme, Christoph; Priesack, Eckart

    2015-04-01

    Recent studies show that uncertainties in regional and global climate and weather simulations are partly due to inadequate descriptions of the energy flux exchanges between the land surface and the atmosphere. One major shortcoming is the limitation of the grid-cell resolution, which is recommended to be about at least 3x3 km² in most models due to limitations in the model physics. To represent each individual grid cell most models select one dominant soil type and one dominant land use type. This resolution, however, is often too coarse in regions where the spatial diversity of soil and land use types are high, e.g. in Central Europe. An elegant method to avoid the shortcoming of grid cell resolution is the so called mosaic approach. This approach is part of the recently developed ecosystem model framework Expert-N 5.0. The aim of this study was to analyze the impact of the characteristics of two managed fields, planted with winter wheat and potato, on the near surface soil moistures and on the near surface energy flux exchanges of the soil-plant-atmosphere interface. The simulated energy fluxes were compared with eddy flux tower measurements between the respective fields at the research farm Scheyern, North-West of Munich, Germany. To perform these simulations, we coupled the ecosystem model Expert-N 5.0 to an analytical footprint model. The coupled model system has the ability to calculate the mixing ratio of the surface energy fluxes at a given point within one grid cell (in this case at the flux tower between the two fields). This approach accounts for the differences of the two soil types, of land use managements, and of canopy properties due to footprint size dynamics. Our preliminary simulation results show that a mosaic approach can improve modeling and analyzing energy fluxes when the land surface is heterogeneous. In this case our applied method is a promising approach to extend weather and climate models on the regional and on the global scale.

  17. A Circulating microRNA Signature Predicts Age-Based Development of Lymphoma.

    Directory of Open Access Journals (Sweden)

    Afshin Beheshti

    Full Text Available Extensive epidemiological data have demonstrated an exponential rise in the incidence of non-Hodgkin lymphoma (NHL that is associated with increasing age. The molecular etiology of this remains largely unknown, which impacts the effectiveness of treatment for patients. We proposed that age-dependent circulating microRNA (miRNA signatures in the host influence diffuse large B cell lymphoma (DLBCL development. Our objective was to examine tumor development in an age-based DLBCL system using an inventive systems biology approach. We harnessed a novel murine model of spontaneous DLBCL initiation (Smurf2-deficient at two age groups: 3 and 15 months old. All Smurf2-deficient mice develop visible DLBCL tumor starting at 15 months of age. Total miRNA was isolated from serum, bone marrow and spleen and were collected for all age groups for Smurf2-deficient mice and age-matched wild-type C57BL/6 mice. Using systems biology techniques, we identified a list of 10 circulating miRNAs being regulated in both the spleen and bone marrow that were present in DLBCL forming mice starting at 3 months of age that were not present in the control mice. Furthermore, this miRNA signature was found to occur circulating in the blood and it strongly impacted JUN and MYC oncogenic signaling. In addition, quantification of the miRNA signature was performed via Droplet Digital PCR technology. It was discovered that a key miRNA signature circulates throughout a host prior to the formation of a tumor starting at 3 months old, which becomes further modulated by age and yielded calculation of a 'carcinogenic risk score'. This novel age-based circulating miRNA signature may potentially be leveraged as a DLBCL risk profile at a young age to predict future lymphoma development or disease progression as well as for potential innovative miRNA-based targeted therapeutic strategies in lymphoma.

  18. THE ELECTRONIC SIGNATURE

    Directory of Open Access Journals (Sweden)

    Voiculescu Madalina Irena

    2009-05-01

    Full Text Available Article refers to significance and the digital signature in electronic commerce. Internet and electronic commerce open up many new opportunities for the consumer, yet, the security (or perceived lack of security of exchanging personal and financial data

  19. Interpreting stream sediment fingerprints against primary and secondary source signatures in agricultural catchments

    Science.gov (United States)

    Blake, Will H.; Haley, Steve; Smith, Hugh G.; Taylor, Alex; Goddard, Rupert; Lewin, Sean; Fraser, David

    2013-04-01

    Many sediment fingerprinting studies adopt a black box approach to source apportionment whereby the properties of downstream sediment are compared quantitatively to the geochemical fingerprints of potential catchment sources without consideration of potential signature development or modification during transit. Working within a source-pathway-receptor framework, this study aimed to undertake sediment source apportionment within 6 subcatchments of an agricultural river basin with specific attention to the potential role of contaminants (vehicle emissions and mine waste) in development of stream sediment signatures. Fallout radionuclide (FRN) and geochemical fingerprinting methods were adopted independently to establish source signatures for primary sediment sources of surface and subsurface soil materials under various land uses plus reworked mine and 'secondary' soil material deposited, in transit, along road networks. FRN data demonstrated expected variability between surface soil (137Cs = 14 ± 3 Bq kg-1; 210Pbxs = 40 ± 7 Bq kg-1) and channel bank materials (137Cs = 3 ± 1 Bq kg-1; 210Pbxs = 24 ± 5 Bq kg-1) but road transported soil material was considerably elevated in 210Pbxs (up to 673 ± 51 Bq kg-1) due to sediment interaction with pluvial surface water within the road network. Geochemical discrimination between surface and subsurface soil materials was dominated by alkaline earth and alkali metals e.g. Ba, Rb, Ca, K, Mg which are sensitive to weathering processes in soil. Magnetic susceptibility and heavy metals were important discriminators of road transported material which demonstrated transformation of the signatures of material transported via the road network. Numerical unmixing of stream sediment indicated that alongside channel bank erosion, road transported material was an important component in some systems in accord with FRN evidence. While mining spoil also ranked as a significant source in an affected catchment, perhaps related to legacy

  20. A knowledge-based approach to the design of integrated renewable energy systems

    Energy Technology Data Exchange (ETDEWEB)

    Ramakumar, R.; Abouzahr, I. (Oklahoma State Univ., Stillwater, OK (United States). Engineering Energy Lab.); Ashenayi, K. (Dept. of Electrical Engineering, Univ. of Tulsa, Tulsa, OK (United States))

    1992-12-01

    Integrated Renewable Energy Systems (IRES) utilize two or more renewable energy resources and end-use technologies to supply a variety of energy needs, often in a stand-alone mode. A knowledge-based design approach that minimizes the total capital cost at a pre-selected reliability level is presented. The reliability level is quantified by the loss of power supply probability (LPSP). The procedure includes some resource-need matching based on economics, the quality of energy needed, and the characteristics of the resource. A detailed example is presented in this paper and discussed to illustrate the usefullness of the design approach.

  1. 22 CFR 92.28 - Signature of affiant on affidavit.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Signature of affiant on affidavit. 92.28 Section 92.28 Foreign Relations DEPARTMENT OF STATE LEGAL AND RELATED SERVICES NOTARIAL AND RELATED SERVICES Specific Notarial Acts § 92.28 Signature of affiant on affidavit. The signature of the affiant is...

  2. The Transcriptional Signature of Active Tuberculosis Reflects Symptom Status in Extra-Pulmonary and Pulmonary Tuberculosis.

    Directory of Open Access Journals (Sweden)

    Simon Blankley

    Full Text Available Mycobacterium tuberculosis infection is a leading cause of infectious death worldwide. Gene-expression microarray studies profiling the blood transcriptional response of tuberculosis (TB patients have been undertaken in order to better understand the host immune response as well as to identify potential biomarkers of disease. To date most of these studies have focused on pulmonary TB patients with gene-expression profiles of extra-pulmonary TB patients yet to be compared to those of patients with pulmonary TB or sarcoidosis.A novel cohort of patients with extra-pulmonary TB and sarcoidosis was recruited and the transcriptional response of these patients compared to those with pulmonary TB using a variety of transcriptomic approaches including testing a previously defined 380 gene meta-signature of active TB.The 380 meta-signature broadly differentiated active TB from healthy controls in this new dataset consisting of pulmonary and extra-pulmonary TB. The top 15 genes from this meta-signature had a lower sensitivity for differentiating extra-pulmonary TB from healthy controls as compared to pulmonary TB. We found the blood transcriptional responses in pulmonary and extra-pulmonary TB to be heterogeneous and to reflect the extent of symptoms of disease.The transcriptional signature in extra-pulmonary TB demonstrated heterogeneity of gene expression reflective of symptom status, while the signature of pulmonary TB was distinct, based on a higher proportion of symptomatic individuals. These findings are of importance for the rational design and implementation of mRNA based TB diagnostics.

  3. Mitigating flood exposure: Reducing disaster risk and trauma signature.

    Science.gov (United States)

    Shultz, James M; McLean, Andrew; Herberman Mash, Holly B; Rosen, Alexa; Kelly, Fiona; Solo-Gabriele, Helena M; Youngs, Georgia A; Jensen, Jessica; Bernal, Oscar; Neria, Yuval

    2013-01-01

    Introduction. In 2011, following heavy winter snowfall, two cities bordering two rivers in North Dakota, USA faced major flood threats. Flooding was foreseeable and predictable although the extent of risk was uncertain. One community, Fargo, situated in a shallow river basin, successfully mitigated and prevented flooding. For the other community, Minot, located in a deep river valley, prevention was not possible and downtown businesses and one-quarter of the homes were inundated, in the city's worst flood on record. We aimed at contrasting the respective hazards, vulnerabilities, stressors, psychological risk factors, psychosocial consequences, and disaster risk reduction strategies under conditions where flood prevention was, and was not, possible. Methods . We applied the "trauma signature analysis" (TSIG) approach to compare the hazard profiles, identify salient disaster stressors, document the key components of disaster risk reduction response, and examine indicators of community resilience. Results . Two demographically-comparable communities, Fargo and Minot, faced challenging river flood threats and exhibited effective coordination across community sectors. We examined the implementation of disaster risk reduction strategies in situations where coordinated citizen action was able to prevent disaster impact (hazard avoidance) compared to the more common scenario when unpreventable disaster strikes, causing destruction, harm, and distress. Across a range of indicators, it is clear that successful mitigation diminishes both physical and psychological impact, thereby reducing the trauma signature of the event. Conclusion . In contrast to experience of historic flooding in Minot, the city of Fargo succeeded in reducing the trauma signature by way of reducing risk through mitigation.

  4. Induced Temporal Signatures for Point-Source Detection

    International Nuclear Information System (INIS)

    Stephens, Daniel L.; Runkle, Robert C.; Carlson, Deborah K.; Peurrung, Anthony J.; Seifert, Allen; Wyatt, Cory R.

    2005-01-01

    Detection of radioactive point-sized sources is inherently divided into two regimes encompassing stationary and moving detectors. The two cases differ in their treatment of background radiation and its influence on detection sensitivity. In the stationary detector case the statistical fluctuation of the background determines the minimum detectable quantity. In the moving detector case the detector may be subjected to widely and irregularly varying background radiation, as a result of geographical and environmental variation. This significant systematic variation, in conjunction with the statistical variation of the background, requires a conservative threshold to be selected to yield the same false-positive rate as the stationary detection case. This results in lost detection sensitivity for real sources. This work focuses on a simple and practical modification of the detector geometry that increase point-source recognition via a distinctive temporal signature. A key part of this effort is the integrated development of both detector geometries that induce a highly distinctive signature for point sources and the development of statistical algorithms able to optimize detection of this signature amidst varying background. The identification of temporal signatures for point sources has been demonstrated and compared with the canonical method showing good results. This work demonstrates that temporal signatures are efficient at increasing point-source discrimination in a moving detector system

  5. An Institutional Approach to Understanding Energy Transitions

    Science.gov (United States)

    Koster, Auriane Magdalena

    Energy is a central concern of sustainability because how we produce and consume energy affects society, economy, and the environment. Sustainability scientists are interested in energy transitions away from fossil fuels because they are nonrenewable, increasingly expensive, have adverse health effects, and may be the main driver of climate change. They see an opportunity for developing countries to avoid the negative consequences fossil-fuel-based energy systems, and also to increase resilience, by leap-frogging-over the centralized energy grid systems that dominate the developed world. Energy transitions pose both challenges and opportunities. Obstacles to transitions include 1) an existing, centralized, complex energy-grid system, whose function is invisible to most users, 2) coordination and collective-action problems that are path dependent, and 3) difficulty in scaling up RE technologies. Because energy transitions rely on technological and social innovations, I am interested in how institutional factors can be leveraged to surmount these obstacles. The overarching question that underlies my research is: What constellation of institutional, biophysical, and social factors are essential for an energy transition? My objective is to derive a set of "design principles," that I term institutional drivers, for energy transitions analogous to Ostrom's institutional design principles. My dissertation research will analyze energy transitions using two approaches: applying the Institutional Analysis and Development Framework and a comparative case study analysis comprised of both primary and secondary sources. This dissertation includes: 1) an analysis of the world's energy portfolio; 2) a case study analysis of five countries; 3) a description of the institutional factors likely to promote a transition to renewable-energy use; and 4) an in-depth case study of Thailand's progress in replacing nonrenewable energy sources with renewable energy sources. My research will

  6. Signature proteins for the major clades of Cyanobacteria

    Directory of Open Access Journals (Sweden)

    Mathews Divya W

    2010-01-01

    Full Text Available Abstract Background The phylogeny and taxonomy of cyanobacteria is currently poorly understood due to paucity of reliable markers for identification and circumscription of its major clades. Results A combination of phylogenomic and protein signature based approaches was used to characterize the major clades of cyanobacteria. Phylogenetic trees were constructed for 44 cyanobacteria based on 44 conserved proteins. In parallel, Blastp searches were carried out on each ORF in the genomes of Synechococcus WH8102, Synechocystis PCC6803, Nostoc PCC7120, Synechococcus JA-3-3Ab, Prochlorococcus MIT9215 and Prochlor. marinus subsp. marinus CCMP1375 to identify proteins that are specific for various main clades of cyanobacteria. These studies have identified 39 proteins that are specific for all (or most cyanobacteria and large numbers of proteins for other cyanobacterial clades. The identified signature proteins include: (i 14 proteins for a deep branching clade (Clade A of Gloebacter violaceus and two diazotrophic Synechococcus strains (JA-3-3Ab and JA2-3-B'a; (ii 5 proteins that are present in all other cyanobacteria except those from Clade A; (iii 60 proteins that are specific for a clade (Clade C consisting of various marine unicellular cyanobacteria (viz. Synechococcus and Prochlorococcus; (iv 14 and 19 signature proteins that are specific for the Clade C Synechococcus and Prochlorococcus strains, respectively; (v 67 proteins that are specific for the Low B/A ecotype Prochlorococcus strains, containing lower ratio of chl b/a2 and adapted to growth at high light intensities; (vi 65 and 8 proteins that are specific for the Nostocales and Chroococcales orders, respectively; and (vii 22 and 9 proteins that are uniquely shared by various Nostocales and Oscillatoriales orders, or by these two orders and the Chroococcales, respectively. We also describe 3 conserved indels in flavoprotein, heme oxygenase and protochlorophyllide oxidoreductase proteins that

  7. Optical/Infrared Signatures for Space-Based Remote Sensing

    National Research Council Canada - National Science Library

    Picard, R. H; Dewan, E. M; Winick, J. R; O'Neil, R. R

    2007-01-01

    This report describes work carried out under the Air Force Research Laboratory's basic research task in optical remote-sensing signatures, entitled Optical / Infrared Signatures for Space-Based Remote Sensing...

  8. Signature scheme based on bilinear pairs

    Science.gov (United States)

    Tong, Rui Y.; Geng, Yong J.

    2013-03-01

    An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.

  9. Different Reliability Assessment Approaches for Wave Energy Converters

    DEFF Research Database (Denmark)

    Ambühl, Simon; Kramer, Morten Mejlhede; Sørensen, John Dalsgaard

    2015-01-01

    Reliability assessments are of importance for wave energy converters (WECs) due to the fact that accessibility might be limited in case of failure and maintenance. These failure rates can be adapted by reliability considerations. There are two different approaches to how reliability can...

  10. City and mobility: towards an integrated approach to resolve energy problems

    Directory of Open Access Journals (Sweden)

    Carmela Gargiulo

    2012-07-01

    Full Text Available The issue of integration between city, mobility and energy plays a central role in the current EU policies, aimed at achieving energy saving targets, independence from fossil fuels and enhance of the urban systems resilience, but the strategies of the single states are, however, still far from its implementation. This paper proposes a reading of the current policies and of the recent initiatives aimed at improving the energy efficiency of settlements, implemented at both Community and national level, aimed at laying the groundwork for the definition of an integrated approach between city and mobility to resolve energy problem. Therefore, the paper is divided into six parts. The first part describes the transition from the concept of sustainability to the concept of resilience and illustrates the central role played by this one in the current urban and territorial research; the second part briefly analyzes the main and more recent European directives related to city, mobility and energy, while the third part describes how the energy problem is afforded in the current programming and planning tools. The fourth and fifth parts, are intended to describe the innovative practices promoted in some European and Italian cities concerning energy efficiency aimed at the integration between urban and transport systems. The last part of the paper, finally, deals with the definition of a new systemic approach for achieving objectives of energy sustainability. This approach aims at integrating strategies and actions for strategies of mobility governance, based on the certain assumption that the core for the most part of energy problems is mainly represented in medium and large cities. 

  11. Serum microRNA signatures as "liquid biopsies" for interrogating hepatotoxic mechanisms and liver pathogenesis in human.

    Science.gov (United States)

    Krauskopf, Julian; de Kok, Theo M; Schomaker, Shelli J; Gosink, Mark; Burt, Deborah A; Chandler, Patricia; Warner, Roscoe L; Johnson, Kent J; Caiment, Florian; Kleinjans, Jos C; Aubrecht, Jiri

    2017-01-01

    MicroRNAs (miRNAs) released into the peripheral circulation upon cellular injury have shown a promise as a new class of tissue-specific biomarkers. We were first to demonstrate that next-generation sequencing analysis of serum from human subjects with acetaminophen-induced liver injury revealed a specific signature of circulating miRNAs. We consequently hypothesized that different types of hepatic liver impairments might feature distinct signatures of circulating miRNAs and that this approach might be useful as minimally invasive diagnostic "liquid biopsies" enabling the interrogation of underlying molecular mechanisms of injury in distant tissues. Therefore we examined serum circulating miRNAs in a total of 72 serum samples from a group of 53 subjects that included patients with accidental acetaminophen overdose, hepatitis B infection, liver cirrhosis and type 2 diabetes as well as gender- and age-matched healthy subjects with no evidence of liver disease. The miRNA signatures were identified using next-generation sequencing that provided analysis for the whole miRNome, including miRNA isoforms. Compared to the healthy subjects, a total of 179 miRNAs showed altered serum levels across the diseased subjects. Although many subjects have elevated alanine aminotransferase suggesting liver impairments, we identified distinct miRNA signatures for different impairments with minimum overlap. Furthermore, the bioinformatics analysis of miRNA signatures revealed relevant molecular pathways associated with the mechanisms of toxicity and or pathogenesis of disease. Interestingly, the high proportion of miRNA isoforms present in the respective signatures indicated a new level of complexity in cellular response to stress or disease. Our study demonstrates for the first time that signatures of circulating miRNAs show specificity for liver injury phenotypes and, once validated, might become useful for diagnosis of organ pathologies as "liquid biopsies".

  12. Serum microRNA signatures as "liquid biopsies" for interrogating hepatotoxic mechanisms and liver pathogenesis in human.

    Directory of Open Access Journals (Sweden)

    Julian Krauskopf

    Full Text Available MicroRNAs (miRNAs released into the peripheral circulation upon cellular injury have shown a promise as a new class of tissue-specific biomarkers. We were first to demonstrate that next-generation sequencing analysis of serum from human subjects with acetaminophen-induced liver injury revealed a specific signature of circulating miRNAs. We consequently hypothesized that different types of hepatic liver impairments might feature distinct signatures of circulating miRNAs and that this approach might be useful as minimally invasive diagnostic "liquid biopsies" enabling the interrogation of underlying molecular mechanisms of injury in distant tissues. Therefore we examined serum circulating miRNAs in a total of 72 serum samples from a group of 53 subjects that included patients with accidental acetaminophen overdose, hepatitis B infection, liver cirrhosis and type 2 diabetes as well as gender- and age-matched healthy subjects with no evidence of liver disease. The miRNA signatures were identified using next-generation sequencing that provided analysis for the whole miRNome, including miRNA isoforms. Compared to the healthy subjects, a total of 179 miRNAs showed altered serum levels across the diseased subjects. Although many subjects have elevated alanine aminotransferase suggesting liver impairments, we identified distinct miRNA signatures for different impairments with minimum overlap. Furthermore, the bioinformatics analysis of miRNA signatures revealed relevant molecular pathways associated with the mechanisms of toxicity and or pathogenesis of disease. Interestingly, the high proportion of miRNA isoforms present in the respective signatures indicated a new level of complexity in cellular response to stress or disease. Our study demonstrates for the first time that signatures of circulating miRNAs show specificity for liver injury phenotypes and, once validated, might become useful for diagnosis of organ pathologies as "liquid biopsies".

  13. Evaluation of an energy-based fatigue approach considering mean stress effects

    Energy Technology Data Exchange (ETDEWEB)

    Kabir, S. M. Humayun [Chittagong University of Engineering and Technology, Chittagong (Bangladesh); Yeo, Tae In [University of Ulsan, Ulsan (Korea, Republic of)

    2014-04-15

    In this paper, an attempt is made to extend the total strain energy approach for predicting the fatigue life subjected to mean stress under uniaxial state. The effects of means stress on the fatigue failure of a ferritic stainless steel and high pressure tube steel are studied under strain-controlled low cycle fatigue condition. Based on the fatigue results from different strain ratios, modified total strain energy density approach is proposed to account for the mean stress effects. The proposed damage parameter provides convenient means of evaluating fatigue life with mean stress effects considering the fact that the definitions used for measuring strain energies are the same as in the fully-reversed cycling (R = -1). A good agreement is observed between experimental life and predicted life using proposed approach. Two other mean stress models (Smith-Watson-Topper model and Morrow model) are also used to evaluate the low cycle fatigue data. Based on a simple statistical estimator, the proposed approach is compared with these models and is found realistic.

  14. Evaluation of an energy-based fatigue approach considering mean stress effects

    International Nuclear Information System (INIS)

    Kabir, S. M. Humayun; Yeo, Tae In

    2014-01-01

    In this paper, an attempt is made to extend the total strain energy approach for predicting the fatigue life subjected to mean stress under uniaxial state. The effects of means stress on the fatigue failure of a ferritic stainless steel and high pressure tube steel are studied under strain-controlled low cycle fatigue condition. Based on the fatigue results from different strain ratios, modified total strain energy density approach is proposed to account for the mean stress effects. The proposed damage parameter provides convenient means of evaluating fatigue life with mean stress effects considering the fact that the definitions used for measuring strain energies are the same as in the fully-reversed cycling (R = -1). A good agreement is observed between experimental life and predicted life using proposed approach. Two other mean stress models (Smith-Watson-Topper model and Morrow model) are also used to evaluate the low cycle fatigue data. Based on a simple statistical estimator, the proposed approach is compared with these models and is found realistic.

  15. Search for an mSUGRA signature in the electron + jets + missing transverse energy final state in $p\\bar{p}$ collisions at √s = 1.8TeV

    Energy Technology Data Exchange (ETDEWEB)

    Zhou, Zhang [Iowa State Univ., Ames, IA (United States)

    2001-01-01

    We describe a search for a Minimal Supergravity (mSUGRA) signature in Run 1 data taken by the D detector at the Fermilab Tevatron from 1995-1996. The total data luminosity is 92.7 pb-1. The data were examined for events with a single electron, four or more jets and large missing transverse energy. The major backgrounds are from W+jets, QCD, t$\\bar{t}$, and WW events. We observed no excess of events in our data. Based on the data and the expected signal rate we obtain new limits on new physics in terms of mSUGRA model parameters.

  16. Analysis of signature wrapping attacks and countermeasures

    DEFF Research Database (Denmark)

    Gajek, Sebastian; Jensen, Meiko; Liao, Lijun

    2009-01-01

    In recent research it turned out that Boolean verification, of digital signatures in the context of WSSecurity, is likely to fail: If parts of a SOAP message, are signed and the signature verification applied to, the whole document returns true, then nevertheless the, document may have been...

  17. Differential thermodynamic signature of carbon nanomaterials using amphiphilic micellar probe

    Science.gov (United States)

    Bhattacharyya, Tamoghna; Dasgupta, Anjan Kr

    2018-04-01

    The thermodynamic signature of single-wall carbon nanotubes (SWCNTs), multi-walled carbon nanotubes (MWCNTs) and reduced graphene oxide (rG-O) using amphiphilic micellar probe has been explored. The study reveals an intricate correlation between nano-surface topology and calorimetric profile of SWCNTs, MWCNTs and rG-O. The critical micelle concentration (CMC) is found to be sensitive to the topological diversity of nanomaterials. The study explores a thermodynamic approach to characterize the nano-surface topology of SWCNTs, MWCNTs and graphene surface.

  18. Molecular Signature in HCV-Positive Lymphomas

    Directory of Open Access Journals (Sweden)

    Valli De Re

    2012-01-01

    Full Text Available Hepatitis C virus (HCV is a positive, single-stranded RNA virus, which has been associated to different subtypes of B-cell non-Hodgkin lymphoma (B-NHL. Cumulative evidence suggests an HCV-related antigen driven process in the B-NHL development. The underlying molecular signature associated to HCV-related B-NHL has to date remained obscure. In this review, we discuss the recent developments in this field with a special mention to different sets of genes whose expression is associated with BCR coupled to Blys signaling which in turn was found to be linked to B-cell maturation stages and NF-κb transcription factor. Even if recent progress on HCV-B-NHL signature has been made, the precise relationship between HCV and lymphoma development and phenotype signature remain to be clarified.

  19. 32 CFR 842.6 - Signature on the claim form.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Signature on the claim form. 842.6 Section 842.6... ADMINISTRATIVE CLAIMS General Information § 842.6 Signature on the claim form. The claimant or authorized agent... authorized agent signing for a claimant shows, after the signature, the title or capacity and attaches...

  20. Low-energy hadronic interactions beyond the current algebra approach

    International Nuclear Information System (INIS)

    Ivanov, A.N.; Troitskaya, N.I.; Nagy, M.

    1993-06-01

    The new low-energy AP 3 -interaction, which is produced by convergent box-constituent-quark-loop diagrams, is obtained within chiral perturbation theory at the quark level (CHPT) q with linear realization of chiral U(3) x U(3) symmetry. Its contributions to processes of low-energy interactions of low-lying mesons are investigated. The new interaction goes beyond the framework of the low-energy current algebra approach and of the effective chiral Lagrangians with linear realization of chiral symmetry, constructed at the hadronic level. (author). 17 refs, 3 figs

  1. Energy Management in Prosumer Communities: A Coordinated Approach

    Directory of Open Access Journals (Sweden)

    Rodrigo Verschae

    2016-07-01

    Full Text Available The introduction of uncontrollable renewable energy is having a positive impact on our health, the climate, and the economy, but it is also pushing the limits of the power system. The main reason for this is that, in any power system, the generation and consumption must match each other at all times. Thus, if we want to further introduce uncontrollable generation, we need a large ability to manage the demand. However, the ability to control the power consumption of existing demand management approaches is limited, and most of these approaches cannot contribute to the introduction of reneweables, because they do not consider distributed uncontrolled consumption and generation in the control. Furthermore, these methods do not allow users to exchange or jointly manage their power generation and consumption. In this context, we propose an augmented energy management model for prosumers (i.e., producer and consumer. This model considers controlled and uncontrolled generation and consumption, as well as the prosumer’s ability (i to plan the intended power consumption; and (ii to manage real-time deviations from the intended consumption. We apply this model to the energy management of prosumer communities, by allowing the prosumers to coordinate their power consumption plan, to manage the deviations from the intended consumption, and to help each other by compensating deviations. The proposed approach seeks to enhance the power system, and to enable a prosumer society that takes account social and environmental issues, as well as each prosumer’s quality of life.

  2. Zeta-function approach to Casimir energy with singular potentials

    International Nuclear Information System (INIS)

    Khusnutdinov, Nail R.

    2006-01-01

    In the framework of zeta-function approach the Casimir energy for three simple model system: single delta potential, step function potential and three delta potentials are analyzed. It is shown that the energy contains contributions which are peculiar to the potentials. It is suggested to renormalize the energy using the condition that the energy of infinitely separated potentials is zero which corresponds to subtraction all terms of asymptotic expansion of zeta-function. The energy obtained in this way obeys all physically reasonable conditions. It is finite in the Dirichlet limit, and it may be attractive or repulsive depending on the strength of potential. The effective action is calculated, and it is shown that the surface contribution appears. The renormalization of the effective action is discussed

  3. An integrated renewable energy park approach for algal biofuel production in United States

    International Nuclear Information System (INIS)

    Subhadra, Bobban; Edwards, Mark

    2010-01-01

    Algal biomass provides viable third generation feedstock for liquid transportation fuel that does not compete with food crops for cropland. However, fossil energy inputs and intensive water usage diminishes the positive aspects of algal energy production. An integrated renewable energy park (IREP) approach is proposed for aligning renewable energy industries in resource-specific regions in United States for synergistic electricity and liquid biofuel production from algal biomass with net zero carbon emissions. The benefits, challenges and policy needs of this approach are discussed.

  4. Thermal signature measurements for ammonium nitrate/fuel mixtures by laser heating

    International Nuclear Information System (INIS)

    Nazarian, Ashot; Presser, Cary

    2016-01-01

    Highlights: • LDTR is a useful diagnostic for characterizing AN/fuel mixture thermochemical behavior. • Each AN/fuel mixture thermal signature was different. • AN/fuel mixture signature features were defined by the individual constituents. • Baseline signatures changed after an experiment. - Abstract: Measurements were carried out to obtain thermal signatures of several ammonium nitrate/fuel (ANF) mixtures, using a laser-heating technique referred to as the laser-driven thermal reactor (LDTR). The mixtures were ammonium nitrate (AN)/kerosene, AN/ethylene glycol, AN/paraffin wax, AN/petroleum jelly, AN/confectioner's sugar, AN/cellulose (tissue paper), nitromethane/cellulose, nitrobenzene/cellulose, AN/cellulose/nitromethane, AN/cellulose/nitrobenzene. These mixtures were also compared with AN/nitromethane and AN/diesel fuel oil, obtained from an earlier investigation. Thermograms for the mixtures, as well as individual constituents, were compared to better understand how sample thermal signature changes with mixture composition. This is the first step in development of a thermal-signature database, to be used along with other signature databases, to improve identification of energetic substances of unknown composition. The results indicated that each individual thermal signature was associated unambiguously with a particular mixture composition. The signature features of a particular mixture were shaped by the individual constituent signatures. It was also uncovered that the baseline signature was modified after an experiment due to coating of unreacted residue on the substrate surface and a change in the reactor sphere oxide layer. Thus, care was required to pre-oxidize the sphere prior to an experiment. A minimum sample mass (which was dependent on composition) was required to detect the signature characteristics. Increased laser power served to magnify signal strength while preserving the signature features. For the mixtures examined, the thermal

  5. ALPs effective field theory and collider signatures

    Energy Technology Data Exchange (ETDEWEB)

    Brivio, I. [Universidad Autonoma de Madrid, Departamento de Fisica Teorica y Instituto de Fisica Teorica, IFT-UAM/CSIC, Madrid (Spain); University of Copenhagen, Niels Bohr International Academy, Copenhagen (Denmark); Gavela, M.B.; Merlo, L.; Rey, R. del [Universidad Autonoma de Madrid, Departamento de Fisica Teorica y Instituto de Fisica Teorica, IFT-UAM/CSIC, Madrid (Spain); Mimasu, K. [University of Sussex, Department of Physics and Astronomy, Brighton (United Kingdom); Universite Catholique de Louvain, Centre for Cosmology, Particle Physics and Phenomenology (CP3), Louvain-la-Neuve (Belgium); No, J.M. [University of Sussex, Department of Physics and Astronomy, Brighton (United Kingdom); King' s College London, Department of Physics, London (United Kingdom); Sanz, V. [University of Sussex, Department of Physics and Astronomy, Brighton (United Kingdom)

    2017-08-15

    We study the leading effective interactions between the Standard Model fields and a generic singlet CP-odd (pseudo-) Goldstone boson. Two possible frameworks for electroweak symmetry breaking are considered: linear and non-linear. For the latter case, the basis of leading effective operators is determined and compared with that for the linear expansion. Associated phenomenological signals at colliders are explored for both scenarios, deriving new bounds and analyzing future prospects, including LHC and High Luminosity LHC sensitivities. Mono-Z, mono-W, W-photon plus missing energy and on-shell top final states are most promising signals expected in both frameworks. In addition, non-standard Higgs decays and mono-Higgs signatures are especially prominent and expected to be dominant in non-linear realisations. (orig.)

  6. 27 CFR 70.52 - Signature presumed authentic.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false Signature presumed authentic. 70.52 Section 70.52 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE... Collection of Excise and Special (Occupational) Tax Collection-General Provisions § 70.52 Signature presumed...

  7. 13 CFR 134.209 - Requirement of signature.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Requirement of signature. 134.209 Section 134.209 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION RULES OF PROCEDURE GOVERNING... of signature. Every written submission to OHA, other than evidence, must be signed by the party...

  8. Electronic Signature (eSig)

    Data.gov (United States)

    Department of Veterans Affairs — Beginning with the Government Paperwork Elimination Act of 1998 (GPEA), the Federal government has encouraged the use of electronic / digital signatures to enable...

  9. Radar Signature Calculation Facility

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: The calculation, analysis, and visualization of the spatially extended radar signatures of complex objects such as ships in a sea multipath environment and...

  10. Hadroproduction of heavy flavors at collider energies

    International Nuclear Information System (INIS)

    Scott, D.M.

    1979-11-01

    The possibility of detecting the top quark in hadron interactions at collider energies is investigated. The production of bound and naked t-quarks for m/sub t/ = 15 - 100 GeV, and the experimental signatures from their leptonic and semileptonic decay modes are studied. The background to any leptonic signature is expected to be severe, suggesting the requirement of simultaneous detection of hadrons

  11. Advanced Missile Signature Center

    Data.gov (United States)

    Federal Laboratory Consortium — The Advanced Missile Signature Center (AMSC) is a national facility supporting the Missile Defense Agency (MDA) and other DoD programs and customers with analysis,...

  12. An Asset-Based Approach to Tribal Community Energy Planning

    Energy Technology Data Exchange (ETDEWEB)

    Gutierrez, Rachael A. [Pratt Inst., Brooklyn, NY (United States). City and Regional Planning; Martino, Anthony [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Materials, Devices, and Energy Technologies; Begay, Sandra K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Materials, Devices, and Energy Technologies

    2016-08-01

    Community energy planning is a vital component of successful energy resource development and project implementation. Planning can help tribes develop a shared vision and strategies to accomplish their energy goals. This paper explores the benefits of an asset-based approach to tribal community energy planning. While a framework for community energy planning and federal funding already exists, some areas of difficulty in the planning cycle have been identified. This paper focuses on developing a planning framework that offsets those challenges. The asset-based framework described here takes inventory of a tribe’s capital assets, such as: land capital, human capital, financial capital, and political capital. Such an analysis evaluates how being rich in a specific type of capital can offer a tribe unique advantages in implementing their energy vision. Finally, a tribal case study demonstrates the practical application of an asset-based framework.

  13. 25 CFR 117.33 - Signature of illiterates.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Signature of illiterates. 117.33 Section 117.33 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR FINANCIAL ACTIVITIES DEPOSIT AND EXPENDITURE OF... Signature of illiterates. An Indian who cannot write shall be required to endorse checks payable to his...

  14. 12 CFR 350.6 - Signature and attestation.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Signature and attestation. 350.6 Section 350.6 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY DISCLOSURE OF FINANCIAL AND OTHER INFORMATION BY FDIC-INSURED STATE NONMEMBER BANKS § 350.6 Signature and...

  15. Quantum dual signature scheme based on coherent states with entanglement swapping

    International Nuclear Information System (INIS)

    Liu Jia-Li; Shi Rong-Hua; Shi Jin-Jing; Lv Ge-Li; Guo Ying

    2016-01-01

    A novel quantum dual signature scheme, which combines two signed messages expected to be sent to two diverse receivers Bob and Charlie, is designed by applying entanglement swapping with coherent states. The signatory Alice signs two different messages with unitary operations (corresponding to the secret keys) and applies entanglement swapping to generate a quantum dual signature. The dual signature is firstly sent to the verifier Bob who extracts and verifies the signature of one message and transmits the rest of the dual signature to the verifier Charlie who verifies the signature of the other message. The transmission of the dual signature is realized with quantum teleportation of coherent states. The analysis shows that the security of secret keys and the security criteria of the signature protocol can be greatly guaranteed. An extensional multi-party quantum dual signature scheme which considers the case with more than three participants is also proposed in this paper and this scheme can remain secure. The proposed schemes are completely suited for the quantum communication network including multiple participants and can be applied to the e-commerce system which requires a secure payment among the customer, business and bank. (paper)

  16. Real-Time Capable Micro-Doppler Signature Decomposition of Walking Human Limbs

    OpenAIRE

    Abdulatif, Sherif; Aziz, Fady; Kleiner, Bernhard; Schneider, Urs

    2017-01-01

    Unique micro-Doppler signature ($\\boldsymbol{\\mu}$-D) of a human body motion can be analyzed as the superposition of different body parts $\\boldsymbol{\\mu}$-D signatures. Extraction of human limbs $\\boldsymbol{\\mu}$-D signatures in real-time can be used to detect, classify and track human motion especially for safety application. In this paper, two methods are combined to simulate $\\boldsymbol{\\mu}$-D signatures of a walking human. Furthermore, a novel limbs $\\mu$-D signature time independent...

  17. Integrating Food-Water-Energy Research through a Socio-Ecosystem Approach

    Directory of Open Access Journals (Sweden)

    Manuel Maass

    2017-08-01

    Full Text Available The nexus approach helps in recognizing the link between water, energy, and food production systems, emphasizing the need to manage them in a more integrated way. The socio-ecosystem (SES approach, however, goes beyond that, by incorporating the regulation and supporting services in the management equation. Changes in ecosystem integrity affect the delivery of ecosystem services to society, which affects local people's well-being, creating a feedback mechanism regarding management strategies. The SES approach makes explicit the “human-bio-physical” nature of our interaction with ecosystems, highlighting the need for a more integrated and interconnected social-ecological research perspective. In addition, the SES approach makes more explicit the multi-scale character of the ecological processes that structure and maintain social-ecological systems. Water dynamics have an important role in shaping ecosystem's structure and functioning, as well as determining the systems capacity for delivering provisioning services. The tropical dry-deciduous forest (TDF, is particularly useful in studying water-food-energy trade-off interactions. Recently, a category 5 hurricane landed in the study area (Mexico's Pacific coast, triggering various social and ecological problems. This event is challenging the current forest management strategies in the region. The extreme hydrometeorological event created an excellent opportunity to test and promote the SES approach for more integrated food-water-energy research. By using the SES approach within our long-term socio-ecological research project, it was easier to identify opportunities for tackling trade-offs between maintaining the transformation of the system and a more sustainable alternative: promoting the maintenance of the ecosystem's integrity and its capacity to deliver provisioning and regulating services.

  18. An integrated renewable energy park approach for algal biofuel production in United States

    Energy Technology Data Exchange (ETDEWEB)

    Subhadra, Bobban [Department of Internal Medicine, School of Medicine, University of New Mexico, Albuquerque, NM 87131 (United States); Edwards, Mark [Marketing and Sustainability, W.P. Carey School of Business, Arizona State University, Tempe, AZ 85282 (United States)

    2010-09-15

    Algal biomass provides viable third generation feedstock for liquid transportation fuel that does not compete with food crops for cropland. However, fossil energy inputs and intensive water usage diminishes the positive aspects of algal energy production. An integrated renewable energy park (IREP) approach is proposed for aligning renewable energy industries in resource-specific regions in United States for synergistic electricity and liquid biofuel production from algal biomass with net zero carbon emissions. The benefits, challenges and policy needs of this approach are discussed. (author)

  19. Thermodynamic signatures of fragment binding: Validation of direct versus displacement ITC titrations.

    Science.gov (United States)

    Rühmann, Eggert; Betz, Michael; Fricke, Marie; Heine, Andreas; Schäfer, Martina; Klebe, Gerhard

    2015-04-01

    Detailed characterization of the thermodynamic signature of weak binding fragments to proteins is essential to support the decision making process which fragments to take further for the hit-to-lead optimization. Isothermal titration calorimetry (ITC) is the method of choice to record thermodynamic data, however, weak binding ligands such as fragments require the development of meaningful and reliable measuring protocols as usually sigmoidal titration curves are hardly possible to record due to limited solubility. Fragments can be titrated either directly under low c-value conditions (no sigmoidal curve) or indirectly by use of a strong binding ligand displacing the pre-incubated weak fragment from the protein. The determination of Gibbs free energy is reliable and rather independent of the applied titration protocol. Even though the displacement method achieves higher accuracy, the obtained enthalpy-entropy profile depends on the properties of the used displacement ligand. The relative enthalpy differences across different displacement experiments reveal a constant signature and can serve as a thermodynamic fingerprint for fragments. Low c-value titrations are only reliable if the final concentration of the fragment in the sample cell exceeds 2-10 fold its K(D) value. Limited solubility often prevents this strategy. The present study suggests an applicable protocol to characterize the thermodynamic signature of protein-fragment binding. It shows however, that such measurements are limited by protein and fragment solubility. Deviating profiles obtained by use of different displacement ligands indicate that changes in the solvation pattern and protein dynamics most likely take influence on the resulting overall binding signature. Copyright © 2014 Elsevier B.V. All rights reserved.

  20. Research on Signature Verification Method Based on Discrete Fréchet Distance

    Science.gov (United States)

    Fang, J. L.; Wu, W.

    2018-05-01

    This paper proposes a multi-feature signature template based on discrete Fréchet distance, which breaks through the limitation of traditional signature authentication using a single signature feature. It solves the online handwritten signature authentication signature global feature template extraction calculation workload, signature feature selection unreasonable problem. In this experiment, the false recognition rate (FAR) and false rejection rate (FRR) of the statistical signature are calculated and the average equal error rate (AEER) is calculated. The feasibility of the combined template scheme is verified by comparing the average equal error rate of the combination template and the original template.

  1. 17 CFR 201.153 - Filing of papers: Signature requirement and effect.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Filing of papers: Signature... COMMISSION RULES OF PRACTICE Rules of Practice General Rules § 201.153 Filing of papers: Signature... telephone number on every filing. (b) Effect of signature. (1) The signature of a counsel or party shall...

  2. A Secure and Efficient Certificateless Short Signature Scheme

    Directory of Open Access Journals (Sweden)

    Lin Cheng

    2013-07-01

    Full Text Available Certificateless public key cryptography combines advantage of traditional public key cryptography and identity-based public key cryptography as it avoids usage of certificates and resolves the key escrow problem. In 2007, Huang et al. classified adversaries against certificateless signatures according to their attack power into normal, strong and super adversaries (ordered by their attack power. In this paper, we propose a new certificateless short signature scheme and prove that it is secure against both of the super type I and the super type II adversaries. Our new scheme not only achieves the strongest security level but also has the shortest signature length (one group element. Compared with the other short certificateless signature schemes which have a similar security level, our new scheme has less operation cost.

  3. The chromatin accessibility signature of human immune aging stems from CD8+ T cells.

    Science.gov (United States)

    Ucar, Duygu; Márquez, Eladio J; Chung, Cheng-Han; Marches, Radu; Rossi, Robert J; Uyar, Asli; Wu, Te-Chia; George, Joshy; Stitzel, Michael L; Palucka, A Karolina; Kuchel, George A; Banchereau, Jacques

    2017-10-02

    Aging is linked to deficiencies in immune responses and increased systemic inflammation. To unravel the regulatory programs behind these changes, we applied systems immunology approaches and profiled chromatin accessibility and the transcriptome in PBMCs and purified monocytes, B cells, and T cells. Analysis of samples from 77 young and elderly donors revealed a novel and robust aging signature in PBMCs, with simultaneous systematic chromatin closing at promoters and enhancers associated with T cell signaling and a potentially stochastic chromatin opening mostly found at quiescent and repressed sites. Combined analyses of chromatin accessibility and the transcriptome uncovered immune molecules activated/inactivated with aging and identified the silencing of the IL7R gene and the IL-7 signaling pathway genes as potential biomarkers. This signature is borne by memory CD8 + T cells, which exhibited an aging-related loss in binding of NF-κB and STAT factors. Thus, our study provides a unique and comprehensive approach to identifying candidate biomarkers and provides mechanistic insights into aging-associated immunodeficiency. © 2017 Ucar et al.

  4. The free energy principle, negative energy modes, and stability

    International Nuclear Information System (INIS)

    Morrison, P.J.; Kotschenreuther, M.

    1990-01-01

    This paper is concerned with instability of equilibria of Hamiltonian, fluid and plasma dynamical systems. Usually the dynamical equilibrium of interest is not the state of thermodynamic equilibrium, and does not correspond to a free energy minimum. The relaxation of this type of equilibrium is conventionally considered to be initiated by linear instability. However, there are many cases where linear instability is not present, but the equilibrium is nonlinearly unstable to arbitrarily small perturbations. This paper is about general free energy expressions for determining the presence of linear or nonlinear instabilities. These expressions are simple and practical, and can be obtained for all equilibria of all ideal fluid and plasma models. By free energy, we mean the energy change upon perturbations of the equilibrium that respect dynamical phase space constraints. This quantity is measured by a self-adjoint quadratic form, called δ 2 F. The free energy can result in instability when δ 2 F is indefinite; i.e. there exist accessible perturbations that lower the free energy of the system. A primary purpose of this paper is to tie together three manifestations of what we will refer to as negative energy modes. The first is the conventional plasma physics notion of negative energy mode that is based on the definition of the energy in a homogeneous dielectric medium. A negative energy mode is a normal mode of the medium (plasma) that possesses negative dielectric energy. The second manifestation occurs in finite degree-of-freedom Hamiltonian normal form theory. The quadratic part of a Hamiltonian in the vicinity of an equilibrium point, which possesses only distinct oscillatory eigenvalues, has an invariant signature. Thus in cases where the quadratic form is indefinite, it is natural to refer to the modes corresponding to the negative signature as negative energy modes

  5. A multi-objective approach for developing national energy efficiency plans

    International Nuclear Information System (INIS)

    Haydt, Gustavo; Leal, Vítor; Dias, Luís

    2014-01-01

    This paper proposes a new approach to deal with the problem of building national energy efficiency (EE) plans, considering multiple objectives instead of only energy savings. The objectives considered are minimizing the influence of energy use on climate change, minimizing the financial risk from the investment, maximizing the security of energy supply, minimizing investment costs, minimizing the impacts of building new power plants and transmission infrastructures, and maximizing the local air quality. These were identified through literature review and interaction with real decision makers. A database of measures is established, from which millions of potential EE plans can be built by combining measures and their respective degree of implementation. Finally, a hybrid multi-objective and multi-criteria decision analysis (MCDA) model is proposed to search and select the EE plans that best match the decision makers’ preferences. An illustration of the working mode and the type of results obtained from this novel hybrid model is provided through an application to Portugal. For each of five decision perspectives a wide range of potential best plans were identified. These wide ranges show the relevance of introducing multi-objective analysis in a comprehensive search space as a tool to inform decisions about national EE plans. - Highlights: • A multiple objective approach to aid the choice of national energy efficiency plans. • A hybrid multi-objective MCDA model is proposed to search among the possible plans. • The model identified relevant plans according to five different idealized DMs. • The approach is tested with Portugal

  6. ANALYSIS OF DIGITAL SIGNATURE RULE IN THE ELECTRONIC COMMERCE LAW OF INDONESIA

    Directory of Open Access Journals (Sweden)

    Irna Nurhayati

    2015-02-01

    Full Text Available The Indonesian legislature has enacted the Information and Electronic Transaction Bill (the Bill in 2003, in which digital signature as a technology specific electronic (e commerce has been promoted. The promotion of digital signature is still problematic, since there is an uncertainty whether Indonesia can develop well a required viable technology of digital signature. Moreover, there is a gap between the actual use of digital signature and the projections of future utilization of digital signature by interested parties on e-commerce. This paper will discuss the reason of the Indonesian legislature promotes digital signature. It will then analyse the gap between the actual use of digital signature and the projections of future utilization of digital signature by interested parties on e-commerce. This paper will finally argue whether the promotion of digital signature of the Bill is useful for the growth of e-commerce in Indonesia.

  7. 12 CFR 18.6 - Signature and attestation.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Signature and attestation. 18.6 Section 18.6 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY DISCLOSURE OF FINANCIAL AND OTHER INFORMATION BY NATIONAL BANKS § 18.6 Signature and attestation. A duly authorized officer of the...

  8. Does Social Work Have a Signature Pedagogy?

    Science.gov (United States)

    Earls Larrison, Tara; Korr, Wynne S.

    2013-01-01

    This article contributes to discourse on signature pedagogy by reconceptualizing how our pedagogies are understood and defined for social work education. We critique the view that field education is social work's signature pedagogy and consider what pedagogies are distinct about the teaching and learning of social work. Using Shulman's…

  9. Molecular Aging of Human Liver: An Epigenetic/Transcriptomic Signature.

    Science.gov (United States)

    Bacalini, Maria Giulia; Franceschi, Claudio; Gentilini, Davide; Ravaioli, Francesco; Zhou, Xiaoyuan; Remondini, Daniel; Pirazzini, Chiara; Giuliani, Cristina; Marasco, Elena; Gensous, Noémie; Di Blasio, Anna Maria; Ellis, Ewa; Gramignoli, Roberto; Castellani, Gastone; Capri, Miriam; Strom, Stephen; Nardini, Christine; Cescon, Matteo; Grazi, Gian Luca; Garagnani, Paolo

    2018-03-15

    The feasibility of liver transplantation from old healthy donors suggests that this organ is able to preserve its functionality during aging. To explore the biological basis of this phenomenon, we characterized the epigenetic profile of liver biopsies collected from 45 healthy liver donors ranging from 13 to 90 years old using the Infinium HumanMethylation450 BeadChip. The analysis indicates that a large remodeling in DNA methylation patterns occurs, with 8823 age-associated differentially methylated CpG probes. Notably, these age-associated changes tended to level off after the age of 60, as confirmed by Horvath's clock. Using stringent selection criteria we further identified a DNA methylation signature of aging liver including 75 genomic regions. We demonstrated that this signature is specific for liver compared to other tissues and that it is able to detect biological age-acceleration effects associated with obesity. Finally we combined DNA methylation measurements with available expression data. Although the intersection between the two omic characterizations was low, both approaches suggested a previously unappreciated role of epithelial-mesenchymal transition and Wnt signaling pathways in the aging of human liver.

  10. Microbiota-based Signature of Gingivitis Treatments: A Randomized Study.

    Science.gov (United States)

    Huang, Shi; Li, Zhen; He, Tao; Bo, Cunpei; Chang, Jinlan; Li, Lin; He, Yanyan; Liu, Jiquan; Charbonneau, Duane; Li, Rui; Xu, Jian

    2016-04-20

    Plaque-induced gingivitis can be alleviated by various treatment regimens. To probe the impacts of various anti-gingivitis treatments on plaque microflora, here a double blinded, randomized controlled trial of 91 adults with moderate gingivitis was designed with two anti-gingivitis regimens: the brush-alone treatment and the brush-plus-rinse treatment. In the later group, more reduction in both Plaque Index (TMQHI) and Gingival Index (mean MGI) at Day 3, Day 11 and Day 27 was evident, and more dramatic changes were found between baseline and other time points for both supragingival plaque microbiota structure and salivary metabonomic profiles. A comparison of plaque microbiota changes was also performed between these two treatments and a third dataset where 50 subjects received regimen of dental scaling. Only Actinobaculum, TM7 and Leptotrichia were consistently reduced by all the three treatments, whereas the different microbial signatures of the three treatments during gingivitis relieve indicate distinct mechanisms of action. Our study suggests that microbiota based signatures can serve as a valuable approach for understanding and potentially comparing the modes of action for clinical treatments and oral-care products in the future.

  11. Thin accretion disk signatures in dynamical Chern-Simons-modified gravity

    International Nuclear Information System (INIS)

    Harko, Tiberiu; Kovacs, Zoltan; Lobo, Francisco S N

    2010-01-01

    A promising extension of general relativity is Chern-Simons (CS)-modified gravity, in which the Einstein-Hilbert action is modified by adding a parity-violating CS term, which couples to gravity via a scalar field. In this work, we consider the interesting, yet relatively unexplored, dynamical formulation of CS-modified gravity, where the CS coupling field is treated as a dynamical field, endowed with its own stress-energy tensor and evolution equation. We consider the possibility of observationally testing dynamical CS-modified gravity by using the accretion disk properties around slowly rotating black holes. The energy flux, temperature distribution, the emission spectrum as well as the energy conversion efficiency are obtained, and compared to the standard general relativistic Kerr solution. It is shown that the Kerr black hole provides a more efficient engine for the transformation of the energy of the accreting mass into radiation than their slowly rotating counterparts in CS-modified gravity. Specific signatures appear in the electromagnetic spectrum, thus leading to the possibility of directly testing CS-modified gravity by using astrophysical observations of the emission spectra from accretion disks.

  12. Comparative assessment of predictions in ungauged basins – Part 3: Runoff signatures in Austria

    Directory of Open Access Journals (Sweden)

    A. Viglione

    2013-06-01

    Full Text Available This is the third of a three-part paper series through which we assess the performance of runoff predictions in ungauged basins in a comparative way. Whereas the two previous papers by Parajka et al. (2013 and Salinas et al. (2013 assess the regionalisation performance of hydrographs and hydrological extremes on the basis of a comprehensive literature review of thousands of case studies around the world, in this paper we jointly assess prediction performance of a range of runoff signatures for a consistent and rich dataset. Daily runoff time series are predicted for 213 catchments in Austria by a regionalised rainfall–runoff model and by Top-kriging, a geostatistical estimation method that accounts for the river network hierarchy. From the runoff time-series, six runoff signatures are extracted: annual runoff, seasonal runoff, flow duration curves, low flows, high flows and runoff hydrographs. The predictive performance is assessed in terms of the bias, error spread and proportion of unexplained spatial variance of statistical measures of these signatures in cross-validation (blind testing mode. Results of the comparative assessment show that, in Austria, the predictive performance increases with catchment area for both methods and for most signatures, it tends to increase with elevation for the regionalised rainfall–runoff model, while the dependence on climate characteristics is weaker. Annual and seasonal runoff can be predicted more accurately than all other signatures. The spatial variability of high flows in ungauged basins is the most difficult to estimate followed by the low flows. It also turns out that in this data-rich study in Austria, the geostatistical approach (Top-kriging generally outperforms the regionalised rainfall–runoff model.

  13. Improvement of a Quantum Proxy Blind Signature Scheme

    Science.gov (United States)

    Zhang, Jia-Lei; Zhang, Jian-Zhong; Xie, Shu-Cui

    2018-06-01

    Improvement of a quantum proxy blind signature scheme is proposed in this paper. Six-qubit entangled state functions as quantum channel. In our scheme, a trust party Trent is introduced so as to avoid David's dishonest behavior. The receiver David verifies the signature with the help of Trent in our scheme. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, delegation, signature and verification. Security analysis proves that our scheme has the properties of undeniability, unforgeability, anonymity and can resist some common attacks.

  14. Part 3: Solid phase extraction of Russian VX and its chemical attribution signatures in food matrices and their detection by GC-MS and LC-MS.

    Science.gov (United States)

    Williams, Audrey M; Vu, Alexander K; Mayer, Brian P; Hok, Saphon; Valdez, Carlos A; Alcaraz, Armando

    2018-08-15

    Chemical attribution signatures indicative of O-isobutyl S-(2-diethylaminoethyl) methylphosphonothioate (Russian VX) synthetic routes were investigated in spiked food samples. Attribution signatures were identified using a multifaceted approach: Russian VX was synthesized using six synthetic routes and the chemical attribution signatures identified by GC-MS and LC-MS. Three synthetic routes were then down selected and spiked into complex matrices: bottled water, baby food, milk, liquid eggs, and hot dogs. Sampling and extraction methodologies were developed for these materials and used to isolate the attribution signatures and Russian VX from each matrix. Recoveries greater than 60% were achieved for most signatures in all matrices; some signatures provided recoveries greater than 100%, indicating some degradation during sample preparation. A chemometric model was then developed and validated with the concatenated data from GC-MS and LC-MS analyses of the signatures; the classification results of the model were > 75% for all samples. This work is part three of a three-part series in this issue of the United States-Sweden collaborative efforts towards the understanding of the chemical attribution signatures of Russian VX in crude materials and in food matrices. Copyright © 2018 Elsevier B.V. All rights reserved.

  15. A High Throughput Ambient Mass Spectrometric Approach to Species Identification and Classification from Chemical Fingerprint Signatures

    OpenAIRE

    Musah, Rabi A.; Espinoza, Edgard O.; Cody, Robert B.; Lesiak, Ashton D.; Christensen, Earl D.; Moore, Hannah E.; Maleknia, Simin; Drijfhout, Falko P.

    2015-01-01

    A high throughput method for species identification and classification through chemometric processing of direct analysis in real time (DART) mass spectrometry-derived fingerprint signatures has been developed. The method entails introduction of samples to the open air space between the DART ion source and the mass spectrometer inlet, with the entire observed mass spectral fingerprint subjected to unsupervised hierarchical clustering processing. A range of both polar and non-polar chemotypes a...

  16. High pressure membrane foulants of seawater, brackish water and river water: Origin assessed by sugar and bacteriohopanepolyol signatures

    KAUST Repository

    Mondamert, Leslie; Labanowski, Jé rô me; N'Goye, F.; Talbot, Helen M.; Croue, Jean-Philippe

    2011-01-01

    The present work aimed to study the origin of foulant material recovered on membranes used in water treatment. Firstly, sugar signatures were assessed from the monosaccharide composition. As results were not conclusive, a statistical approach using

  17. Signature Optical Cues: Emerging Technologies for Monitoring Plant Health

    Directory of Open Access Journals (Sweden)

    Anand K. Asundi

    2008-05-01

    Full Text Available Optical technologies can be developed as practical tools for monitoring plant health by providing unique spectral signatures that can be related to specific plant stresses. Signatures from thermal and fluorescence imaging have been used successfully to track pathogen invasion before visual symptoms are observed. Another approach for noninvasive plant health monitoring involves elucidating the manner with which light interacts with the plant leaf and being able to identify changes in spectral characteristics in response to specific stresses. To achieve this, an important step is to understand the biochemical and anatomical features governing leaf reflectance, transmission and absorption. Many studies have opened up possibilities that subtle changes in leaf reflectance spectra can be analyzed in a plethora of ways for discriminating nutrient and water stress, but with limited success. There has also been interest in developing transgenic phytosensors to elucidate plant status in relation to environmental conditions. This approach involves unambiguous signal creation whereby genetic modification to generate reporter plants has resulted in distinct optical signals emitted in response to specific stressors. Most of these studies are limited to laboratory or controlled greenhouse environments at leaf level. The practical translation of spectral cues for application under field conditions at canopy and regional levels by remote aerial sensing remains a challenge. The movement towards technology development is well exemplified by the Controlled Ecological Life Support System under development by NASA which brings together technologies for monitoring plant status concomitantly with instrumentation for environmental monitoring and feedback control.

  18. The Pedagogic Signature of the Teaching Profession

    Science.gov (United States)

    Kiel, Ewald; Lerche, Thomas; Kollmannsberger, Markus; Oubaid, Viktor; Weiss, Sabine

    2016-01-01

    Lee S. Shulman deplores that the field of education as a profession does not have a pedagogic signature, which he characterizes as a synthesis of cognitive, practical and moral apprenticeship. In this context, the following study has three goals: 1) In the first theoretical part, the basic problems of constructing a pedagogic signature are…

  19. Query by image example: The CANDID approach

    Energy Technology Data Exchange (ETDEWEB)

    Kelly, P.M.; Cannon, M. [Los Alamos National Lab., NM (United States). Computer Research and Applications Group; Hush, D.R. [Univ. of New Mexico, Albuquerque, NM (United States). Dept. of Electrical and Computer Engineering

    1995-02-01

    CANDID (Comparison Algorithm for Navigating Digital Image Databases) was developed to enable content-based retrieval of digital imagery from large databases using a query-by-example methodology. A user provides an example image to the system, and images in the database that are similar to that example are retrieved. The development of CANDID was inspired by the N-gram approach to document fingerprinting, where a ``global signature`` is computed for every document in a database and these signatures are compared to one another to determine the similarity between any two documents. CANDID computes a global signature for every image in a database, where the signature is derived from various image features such as localized texture, shape, or color information. A distance between probability density functions of feature vectors is then used to compare signatures. In this paper, the authors present CANDID and highlight two results from their current research: subtracting a ``background`` signature from every signature in a database in an attempt to improve system performance when using inner-product similarity measures, and visualizing the contribution of individual pixels in the matching process. These ideas are applicable to any histogram-based comparison technique.

  20. Targeted Metabolomics Reveals Early Dominant Optic Atrophy Signature in Optic Nerves of Opa1delTTAG/+ Mice.

    Science.gov (United States)

    Chao de la Barca, Juan Manuel; Simard, Gilles; Sarzi, Emmanuelle; Chaumette, Tanguy; Rousseau, Guillaume; Chupin, Stéphanie; Gadras, Cédric; Tessier, Lydie; Ferré, Marc; Chevrollier, Arnaud; Desquiret-Dumas, Valérie; Gueguen, Naïg; Leruez, Stéphanie; Verny, Christophe; Miléa, Dan; Bonneau, Dominique; Amati-Bonneau, Patrizia; Procaccio, Vincent; Hamel, Christian; Lenaers, Guy; Reynier, Pascal; Prunier-Mirebeau, Delphine

    2017-02-01

    Dominant optic atrophy (MIM No. 165500) is a blinding condition related to mutations in OPA1, a gene encoding a large GTPase involved in mitochondrial inner membrane dynamics. Although several mouse models mimicking the disease have been developed, the pathophysiological mechanisms responsible for retinal ganglion cell degeneration remain poorly understood. Using a targeted metabolomic approach, we measured the concentrations of 188 metabolites in nine tissues, that is, brain, three types of skeletal muscle, heart, liver, retina, optic nerve, and plasma in symptomatic 11-month-old Opa1delTTAG/+ mice. Significant metabolic signatures were found only in the optic nerve and plasma of female mice. The optic nerve signature was characterized by altered concentrations of phospholipids, amino acids, acylcarnitines, and carnosine, whereas the plasma signature showed decreased concentrations of amino acids and sarcosine associated with increased concentrations of several phospholipids. In contrast, the investigation of 3-month-old presymptomatic Opa1delTTAG/+ mice showed no specific plasma signature but revealed a significant optic nerve signature in both sexes, although with a sex effect. The Opa1delTTAG/+ versus wild-type optic nerve signature was characterized by the decreased concentrations of 10 sphingomyelins and 10 lysophosphatidylcholines, suggestive of myelin sheath alteration, and by alteration in the concentrations of metabolites involved in neuroprotection, such as dimethylarginine, carnitine, spermine, spermidine, carnosine, and glutamate, suggesting a concomitant axonal metabolic dysfunction. Our comprehensive metabolomic investigations revealed in symptomatic as well as in presymptomatic Opa1delTTAG/+ mice, a specific sensitiveness of the optic nerve to Opa1 insufficiency, opening new routes for protective therapeutic strategies.

  1. Efficient Fair Exchange from Identity-Based Signature

    Science.gov (United States)

    Yum, Dae Hyun; Lee, Pil Joong

    A fair exchange scheme is a protocol by which two parties Alice and Bob exchange items or services without allowing either party to gain advantages by quitting prematurely or otherwise misbehaving. To this end, modern cryptographic solutions use a semi-trusted arbitrator who involves only in cases where one party attempts to cheat or simply crashes. We call such a fair exchange scheme optimistic. When no registration is required between the signer and the arbitrator, we say that the fair exchange scheme is setup free. To date, the setup-free optimist fair exchange scheme under the standard RSA assumption was only possible from the generic construction of [12], which uses ring signatures. In this paper, we introduce a new setup-free optimistic fair exchange scheme under the standard RSA assumption. Our scheme uses the GQ identity-based signature and is more efficient than [12]. The construction can also be generalized by using various identity-based signature schemes. Our main technique is to allow each user to choose his (or her) own “random” public key in the identitybased signature scheme.

  2. Signatures of exotic fermions and other new ''low-energy'' phenomena in superstring E6

    International Nuclear Information System (INIS)

    Rosner, J.L.

    1986-03-01

    Superstring theories have drawn renewed attention to the exceptional group E 6 as a grand unified theory. We discuss the extra U(1) symmetries (beyond that in the standard SU(3) x SU(2) x U(1) model) that arise when E 6 is broken in such theories. These extra U(1)'s must lead to at least one extra neutral gauge boson, called Z', for which we give mass limits and branching ratios. Neutral current effects of this Z' and its direct production are discussed briefly. Finally, some signatures are noted of exotic fermions to which Z' can decay

  3. Analysis of Non-contact Acousto Thermal Signature Data (Postprint)

    Science.gov (United States)

    2016-02-01

    AFRL-RX-WP-JA-2016-0321 ANALYSIS OF NON-CONTACT ACOUSTO-THERMAL SIGNATURE DATA (POSTPRINT) Amanda K. Criner AFRL/RX...October 2014 – 16 September 2015 4. TITLE AND SUBTITLE ANALYSIS OF NON-CONTACT ACOUSTO-THERMAL SIGNATURE DATA (POSTPRINT) 5a. CONTRACT NUMBER...words) The non-contact acousto-thermal signature (NCATS) is a nondestructive evaluation technique with potential to detect fatigue in materials such as

  4. Automated defect spatial signature analysis for semiconductor manufacturing process

    Science.gov (United States)

    Tobin, Jr., Kenneth W.; Gleason, Shaun S.; Karnowski, Thomas P.; Sari-Sarraf, Hamed

    1999-01-01

    An apparatus and method for performing automated defect spatial signature alysis on a data set representing defect coordinates and wafer processing information includes categorizing data from the data set into a plurality of high level categories, classifying the categorized data contained in each high level category into user-labeled signature events, and correlating the categorized, classified signature events to a present or incipient anomalous process condition.

  5. Physical description of nuclear materials identification system (NMIS) signatures

    International Nuclear Information System (INIS)

    Mihalczo, J.T.; Mullens, J.A.; Mattingly, J.K.; Valentine, T.E.

    2000-01-01

    This paper describes all time and frequency analysis parameters measured with a new correlation processor (capability up to 1 GHz sampling rates and up to five input data channels) for three input channels: (1) the 252 Cf source ionization chamber; (2) a detection channel; and (3) a second detection channel. An intuitive and physical description of the various measured quantities is given as well as a brief mathematical description and a brief description of how the data are acquired. If the full five-channel capability is used, the number of measured quantities increases in number but not in type. The parameters provided by this new processor can be divided into two general classes: time analysis signatures and their related frequency analysis signatures. The time analysis signatures include the number of time m pulses occurs in a time interval, that is triggered randomly, upon a detection event, or upon a source fission event triggered. From the number of pulses in a time interval, the moments, factorial moments, and Feynmann variance can be obtained. Recent implementations of third- and fourth-order time and frequency analysis signatures in this processor are also briefly described. Thus, this processor used with a timed source of input neutrons contains all of the information from a pulsed neutron measurement, one and two detector Rossi-α measurements, multiplicity measurements, and third- and fourth-order correlation functions. This processor, although originally designed for active measurements with a 252 Cf interrogating source, has been successfully used passively (without 252 Cf source) for systems with inherent neutron sources such as fissile systems of plutonium. Data from active measurements with an 18.75 kg highly enriched uranium (93.2 wt%, 235 U) metal casting for storage are presented to illustrate some of the various time and frequency analysis parameters. This processor, which is a five-channel time correlation analyzer with time channel widths

  6. 37 CFR 1.4 - Nature of correspondence and signature requirements.

    Science.gov (United States)

    2010-07-01

    ... signature requirements. 1.4 Section 1.4 Patents, Trademarks, and Copyrights UNITED STATES PATENT AND... General Information and Correspondence § 1.4 Nature of correspondence and signature requirements. (a...) Handwritten signature. Each piece of correspondence, except as provided in paragraphs (d)(2), (d)(3), (e) and...

  7. Simplified Models for Dark Matter and Missing Energy Searches at the LHC

    Energy Technology Data Exchange (ETDEWEB)

    Abdallah, Jalal [Academia Sinica, Taipei (Taiwan). Inst. of Physics; Ashkenazi, Adi [Tel Aviv Univ. (Israel). Dept. of Physics; Boveia, Antonio [Univ. of Chicago, IL (United States). Enrico Fermi Inst.; Busoni, Giorgio [International School for Advanced Studies (SISSA), Trieste (Italy); National Inst. for Nuclear Physics (INFN), Trieste (Italy); De Simone, Andrea [International School for Advanced Studies (SISSA), Trieste (Italy); National Inst. for Nuclear Physics (INFN), Trieste (Italy); Doglioni, Caterina [Univ. of Geneva (Switzerland). Physics Dept.; Efrati, Aielet [Weizmann Inst. of Science, Rehovot (Israel). Dept. of Particle Physics and Astrophysics; Etzion, Erez [Tel Aviv Univ. (Israel). Dept. of Physics; Gramling, Johanna [Univ. of Geneva (Switzerland). Physics Dept.; Jacques, Thomas [Univ. of Geneva (Switzerland). Physics Dept.; Lin, Tongyan [Univ. of Chicago, IL (United States). Kavli Inst. for Cosmological Physics. Enrico Fermi Inst.; Morgante, Enrico [Univ. of Geneva (Switzerland). Physics Dept.; Papucci, Michele [Univ. of California, Berkeley, CA (United States). Berkeley Center for Theoretical Physics; Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Theoretical Physics Group; Penning, Bjoern [Univ. of Chicago, IL (United States). Enrico Fermi Inst.; Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States); Riotto, Antonio Walter [Univ. of Geneva (Switzerland). Physics Dept.; Rizzo, Thomas [SLAC National Accelerator Lab., Menlo Park, CA (United States); Salek, David [National Inst. for Subatomic Physics (NIKHEF), Amsterdam (Netherlands); Gravitation and AstroParticle Physics in Amsterdam (GRAPPA), Amsterdam (Netherlands); Schramm, Steven [Univ. of Toronto, ON (Canada). Dept. of Physics; Slone, Oren [Tel Aviv Univ. (Israel). Dept. of Physics; Soreq, Yotam [Weizmann Inst. of Science, Rehovot (Israel). Dept. of Particle Physics and Astrophysics; Vichi, Alessandro [Univ. of California, Berkeley, CA (United States). Berkeley Center for Theoretical Physics; Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Theoretical Physics Group; Volansky, Tomer [Tel Aviv Univ. (Israel). Dept. of Physics; Yavin, Itay [Perimeter Inst. for Theoretical Physics, Waterloo, ON (Canada); McMaster Univ., Hamilton, ON (Canada). Dept. of Physics; Zhou, Ning [Univ. of California, Irvine, CA (United States). Dept. of Physics and Astronomy; Zurek, Kathryn [Univ. of California, Berkeley, CA (United States). Berkeley Center for Theoretical Physics; Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Theoretical Physics Group

    2014-10-01

    The study of collision events with missing energy as searches for the dark matter (DM) component of the Universe are an essential part of the extensive program looking for new physics at the LHC. Given the unknown nature of DM, the interpretation of such searches should be made broad and inclusive. This report reviews the usage of simplified models in the interpretation of missing energy searches. We begin with a brief discussion of the utility and limitation of the effective field theory approach to this problem. The bulk of the report is then devoted to several different simplified models and their signatures, including s-channel and t-channel processes. A common feature of simplified models for DM is the presence of additional particles that mediate the interactions between the Standard Model and the particle that makes up DM. We consider these in detail and emphasize the importance of their inclusion as final states in any coherent interpretation. We also review some of the experimental progress in the field, new signatures, and other aspects of the searches themselves. We conclude with comments and recommendations regarding the use of simplified models in Run-II of the LHC.

  8. Simplified Models for Dark Matter and Missing Energy Searches at the LHC

    International Nuclear Information System (INIS)

    Abdallah, Jalal; De Simone, Andrea; Doglioni, Caterina; Riotto, Antonio Walter; Salek, David; Schramm, Steven; Slone, Oren; Soreq, Yotam; Vichi, Alessandro; Lawrence Berkeley National Lab.; Volansky, Tomer; Yavin, Itay; McMaster Univ., Hamilton, ON; Zhou, Ning; Zurek, Kathryn; Lawrence Berkeley National Lab.

    2014-01-01

    The study of collision events with missing energy as searches for the dark matter (DM) component of the Universe are an essential part of the extensive program looking for new physics at the LHC. Given the unknown nature of DM, the interpretation of such searches should be made broad and inclusive. This report reviews the usage of simplified models in the interpretation of missing energy searches. We begin with a brief discussion of the utility and limitation of the effective field theory approach to this problem. The bulk of the report is then devoted to several different simplified models and their signatures, including s-channel and t-channel processes. A common feature of simplified models for DM is the presence of additional particles that mediate the interactions between the Standard Model and the particle that makes up DM. We consider these in detail and emphasize the importance of their inclusion as final states in any coherent interpretation. We also review some of the experimental progress in the field, new signatures, and other aspects of the searches themselves. We conclude with comments and recommendations regarding the use of simplified models in Run-II of the LHC.

  9. High energy astrophysics. An introduction

    Energy Technology Data Exchange (ETDEWEB)

    Courvoisier, Thierry J.L. [Geneva Univ., Versoix (Switzerland). ISDC, Data Centre for Astrophysics

    2013-07-01

    Based on observational examples this book reveals and explains high-energy astrophysical processes. Presents the theory of astrophysical processes in a didactic approach by deriving equations step by step. With several attractive astronomical pictures. High-energy astrophysics has unveiled a Universe very different from that only known from optical observations. It has revealed many types of objects in which typical variability timescales are as short as years, months, days, and hours (in quasars, X-ray binaries, and other objects), and even down to milli-seconds in gamma ray bursts. The sources of energy that are encountered are only very seldom nuclear fusion, and most of the time gravitation, a paradox when one thinks that gravitation is, by many orders of magnitude, the weakest of the fundamental interactions. The understanding of these objects' physical conditions and the processes revealed by high-energy astrophysics in the last decades is nowadays part of astrophysicists' culture, even of those active in other domains of astronomy. This book evolved from lectures given to master and PhD students at the University of Geneva since the early 1990s. It aims at providing astronomers and physicists intending to be active in high-energy astrophysics a broad basis on which they should be able to build the more specific knowledge they will need. While in the first part of the book the physical processes are described and derived in detail, the second part studies astrophysical objects in which high-energy astrophysics plays a crucial role. This two-pronged approach will help students recognise physical processes by their observational signatures in contexts that may differ widely from those presented here.

  10. A Methodology for Calculating Radiation Signatures

    Energy Technology Data Exchange (ETDEWEB)

    Klasky, Marc Louis [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Wilcox, Trevor [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Bathke, Charles G. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); James, Michael R. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-05-01

    A rigorous formalism is presented for calculating radiation signatures from both Special Nuclear Material (SNM) as well as radiological sources. The use of MCNP6 in conjunction with CINDER/ORIGEN is described to allow for the determination of both neutron and photon leakages from objects of interest. In addition, a description of the use of MCNP6 to properly model the background neutron and photon sources is also presented. Examinations of the physics issues encountered in the modeling are investigated so as to allow for guidance in the user discerning the relevant physics to incorporate into general radiation signature calculations. Furthermore, examples are provided to assist in delineating the pertinent physics that must be accounted for. Finally, examples of detector modeling utilizing MCNP are provided along with a discussion on the generation of Receiver Operating Curves, which are the suggested means by which to determine detectability radiation signatures emanating from objects.

  11. Selection signatures in worldwide sheep populations.

    Science.gov (United States)

    Fariello, Maria-Ines; Servin, Bertrand; Tosser-Klopp, Gwenola; Rupp, Rachel; Moreno, Carole; San Cristobal, Magali; Boitard, Simon

    2014-01-01

    The diversity of populations in domestic species offers great opportunities to study genome response to selection. The recently published Sheep HapMap dataset is a great example of characterization of the world wide genetic diversity in sheep. In this study, we re-analyzed the Sheep HapMap dataset to identify selection signatures in worldwide sheep populations. Compared to previous analyses, we made use of statistical methods that (i) take account of the hierarchical structure of sheep populations, (ii) make use of linkage disequilibrium information and (iii) focus specifically on either recent or older selection signatures. We show that this allows pinpointing several new selection signatures in the sheep genome and distinguishing those related to modern breeding objectives and to earlier post-domestication constraints. The newly identified regions, together with the ones previously identified, reveal the extensive genome response to selection on morphology, color and adaptation to new environments.

  12. Systems approach in energy management

    International Nuclear Information System (INIS)

    Dutta-Choudhury, K.

    1993-01-01

    Several years ago when the author was working in the chemicals division of a paper company in Instrumentation and Controls, one experience had a lasting impact on his work approach which is systems approach. The maintenance manager told the author that a very important piece of boiler instrument of the power plant had broken down and delivery of the replacement needed to be expedited. The instrument was ordered over the phone in another city. The purchase order was personally delivered at the supplier's office and arrangements were made so the instrument was put on the next flight. A week later the maintenance manager indicated that the particular instrument still had not arrived in the plant and he could not run the power plant. Thus the company incurred substantial losses. Further inquiries showed that the instrument did indeed arrive at the plant stores on time. But, in the absence of any instructions thereon, the instrument was not delivered to the power plant. The sense of urgency was lost in the existing delivery process. In other words, the process or system failed. The whole process from requisitioning to delivery of ordered items was analyzed and corrective procedures were incorporated to prevent future repetitions. This brings up the subject of systems approach in engineering management in general and energy management in particular. This involves defining an objective and designing a system for an effective way of getting there

  13. Proteomic and lipidomic signatures of lipid metabolism in NASH-associated hepatocellular carcinoma.

    Science.gov (United States)

    Muir, Kyle; Hazim, Antonious; He, Ying; Peyressatre, Marion; Kim, Do-Young; Song, Xiaoling; Beretta, Laura

    2013-08-01

    Nonalcoholic steatohepatitis (NASH) is a common preneoplastic condition of hepatocellular carcinoma (HCC). Mice with hepatocytic deletion of Pten develop NASH and HCC later in life. This model is highly valuable for studies aimed at identifying the molecular mechanism by which metabolic disorders contribute to tumor development. We applied proteomic and lipidomic profiling approaches to Pten-null NASH liver and tumors. Circulating fatty acid composition was also characterized in these mice. The relevance to human NASH and HCC was further validated. This integrative proteomic and lipidomic study from mouse to human and from liver to blood identified the following disease signatures: (i) an HCC signature: upregulated hepatic scd1/scd2, fads2, and acsl5:acsl1 ratio, elevated vaccenic and erucic acids, and reduced margaric and linoleic acids in both liver and plasma; (ii) a NASH signature that correlates with tumor burden: upregulated hepatic elovl6, elevated oleic, adrenic, and osbond acids, and reduced cervonic acid in liver and plasma; and (iii) a NASH signature: reduced hepatic and circulating lignoceric and eicosapentaenoic acids. Altogether, these results show the role of lipid-modifying enzymes converting saturated fatty acids (SFA) to monounsaturated fatty acids (MUFA) in HCC and the importance of an increased ratio of long chain n6-polyunsaturated fatty acids over n3-polyunsaturated fatty acids in NASH and HCC risk. They also highlight the relevance of the Pten-null model for studies related to NASH and HCC and show that circulating lipid metabolome provides a direct read of lipid changes in the liver. Most importantly, novel candidate targets for HCC diagnosis, therapy, risk assessment, and prevention were identified. ©2013 AACR.

  14. Treatment-independent miRNA signature in blood of wilms tumor patients

    Directory of Open Access Journals (Sweden)

    Schmitt Jana

    2012-08-01

    Full Text Available Abstract Background Blood-born miRNA signatures have recently been reported for various tumor diseases. Here, we compared the miRNA signature in Wilms tumor patients prior and after preoperative chemotherapy according to SIOP protocol 2001. Results We did not find a significant difference between miRNA signature of both groups. However both, Wilms tumor patients prior and after chemotherapy showed a miRNA signature different from healthy controls. The signature of Wilms tumor patients prior to chemotherapy showed an accuracy of 97.5% and of patients after chemotherapy an accuracy of 97.0%, each as compared to healthy controls. Conclusion Our results provide evidence for a blood-born Wilms tumor miRNA signature largely independent of four weeks preoperative chemotherapy treatment.

  15. Calculated NWIS signatures for enriched uranium metal

    International Nuclear Information System (INIS)

    Valentine, T.E.; Mihalczo, J.T.; Koehler, P.E.

    1995-01-01

    Nuclear Weapons Identification System (NWIS) signatures have been calculated using a Monte Carlo transport code for measurement configurations of a 252 Cf source, detectors, and a uranium metal casting. NWIS signatures consist of a wide variety of time-and frequency-analysis signatures such as the time distribution of neutrons after californium fission, the time distribution of counts in a detector after a previous count, the number of times n pulses occur in a time interval, and various frequency-analysis signatures, such as auto-power and cross-power spectral densities, coherences, and a ratio of spectral densities. This ratio is independent of detection efficiency. The analysis presented here, using the MCNP-DSP code, evaluates the applicability of this method for measurement of the 235 U content of 19-kg castings of depleted uranium and uranium with enrichments of 20, 40, 60, 80, 90, and 93.2 wt % 235 U. The dependence of the wide variety of NWIS signatures on 235 U content and possible configurations of a measurement system are presented. These preliminary calculations indicate short measurement times. Additional calculations are being performed to optimize the source-detector-moderator-casting configuration for the shortest measurement time. Although the NWIS method was developed for nuclear weapons identification, the development of a small processor now allows it to be also applied in a practical way to subcriticality measurements, nuclear fuel process monitoring and qualitative nondestructive assay of special nuclear material

  16. 46 CFR 2.01-30 - Delegation of OCMI signature authority.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Delegation of OCMI signature authority. 2.01-30 Section... VESSEL INSPECTIONS Inspecting and Certificating of Vessels § 2.01-30 Delegation of OCMI signature authority. The Officer in Charge, Marine Inspection, may redelegate signature authority for documents issued...

  17. Game theory approach in decisional process of energy management for industrial sector

    International Nuclear Information System (INIS)

    Aplak, H. Soner; Sogut, M. Ziya

    2013-01-01

    Highlights: • Decision-making process of the industry and the environment are evaluated in a game theoretic approach. • Industry and environment are considered as two players to find optimal strategies in governing energy policy. • Industry plays its renewable energy usage strategy. • Environment prefers to execute its protection reflex strategy for survivability and sustainability. • The industry’s insistence on the use of fossil fuels will forward strategy for the environment of uncertainty. - Abstract: Intensive energy consuming industrial sectors are the most important actors on global climate change which natural habitat and the environment faced. In this study, by the scope of energy management, decision-making process of the industry and the environment are evaluated in a game theoretic approach. Industry and environment are considered as two players which have conflicting objectives and try to find optimal strategies in governing energy policy. According to concept of study, while industry tries to maintain the sustainability of production with the strategies of fossil fuel, renewable energies, energy recovery and nuclear energy usage, environment exhibits reactive approach to ensure its sustainability. In the flow of study, players’ strategies are analyzed by using Multi-Criteria Decision Making (MCDM) methods and by calculating performance efficiency values of strategies, game payoff matrix is obtained. Finally, optimal strategies are found for both industry and environment in orienting their energy policy and results are evaluated. According to results of the payoff matrix, the equilibrium point is the cell (2, 1) with the values of 0.5324 and 0.5619. This implies that the environment develops protective reflexes for sustainable nature in case of using renewable energy in industry

  18. Alternative approach for Article 5. Energie Efficiency Directive; Alternatieve aanpak artikel 5. Energy Efficiency Directive

    Energy Technology Data Exchange (ETDEWEB)

    Menkveld, M.; Jablonska, B. [ECN Beleidsstudies, Petten (Netherlands)

    2013-05-15

    Article 5 of the Energy Efficiency Directive (EED) is an annual obligation to renovate 3% of the building stock of central government. After renovation the buildings will meet the minimum energy performance requirements laid down in Article 4 of the EPBD. The Directive gives room to an alternative approach to achieve the same savings. The Ministry of Interior Affairs has asked ECN to assist with this alternative approach. ECN calculated what saving are achieved with the 3% renovation obligation under the directive. Then ECN looked for the possibilities for an alternative approach to achieve the same savings [Dutch] In artikel 5 van de Energie Efficiency Directive (EED) staat een verplichting om jaarlijks 3% van de gebouwvoorraad van de centrale overheid te renoveren. Die 3% van de gebouwvoorraad moet na renovatie voldoen aan de minimum eisen inzake energieprestatie die door het betreffende lidstaat zijn vastgelegd op grond van artikel 4 in de EPBD. De verplichting betreft gebouwen die in bezit en in gebruik zijn van de rijksoverheid met een gebruiksoppervlakte groter dan 500 m{sup 2}, vanaf juli 2015 groter dan 250 m{sup 2}. De gebouwen die eigendom zijn van de Rijksgebouwendienst betreft kantoren van rijksdiensten, gerechtsgebouwen, gebouwen van douane en politie en gevangenissen. Van de gebouwen van Defensie hoeven alleen kantoren en legeringsgebouwen aan de verplichting te voldoen.

  19. Vibration signature analysis of compressors in the gaseous diffusion process for uranium enrichment

    International Nuclear Information System (INIS)

    Harbarger, W.B.

    1975-01-01

    Continuous operation of several thousand axial-flow and centrifugal compressors is vital to the gaseous diffusion process for uranium enrichment. Vibration signature analysis using a minicomputer-based Fast Fourier Transform Analyzer is being applied to the evaluation and surveillance of compressor performance at the Portsmouth Gaseous Diffusion Plant. Three areas of application include: (1) new blade design and prototype compressor evaluation; (2) corrective and preventive maintenance of machinery components; and (3) evaluation of machinery health. The present system is being used to monitor signals from accelerometers mounted on the load-bearing housings of 16 on-line compressors. These signals are transmitted by hard-wire to the analyzer for daily monitoring. A program for expansion of this system to monitor more than a thousand compressors and automation of the signature comparison process is planned for all three gaseous diffusion plants operated for the United States Energy Research and Development Administration. (auth)

  20. Policy Pathways: Joint Public-Private Approaches for Energy Efficiency Finance

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-09-06

    This Policy Pathway outlines, through the experiences and lessons learned from country examples, the critical elements to put in place a public-private partnership to finance energy efficiency. It focuses on three mechanisms - dedicated credit lines, risk guarantees, and energy performance service contracts and presents the planning, implementing, monitoring, and evaluating phases of implemention. Accelerating and scaling up private investment in energy efficiency is crucial to exploit the potential of energy efficiency. However many barriers remain to private investment such as access to capital, uncertainty of future energy prices, transaction costs, perceived higher risk, and lack of knowledge. As part of the IEA 25 Energy Efficiency Policy Recommendations, the IEA recommends that governments support private investment in energy efficiency. A joint public-private approach can use public finance and regulatory policy to support the scaling up of private investment in energy efficiency.

  1. Ensemble of gene signatures identifies novel biomarkers in colorectal cancer activated through PPARγ and TNFα signaling.

    Directory of Open Access Journals (Sweden)

    Stefano Maria Pagnotta

    Full Text Available We describe a novel bioinformatic and translational pathology approach, gene Signature Finder Algorithm (gSFA to identify biomarkers associated with Colorectal Cancer (CRC survival. Here a robust set of CRC markers is selected by an ensemble method. By using a dataset of 232 gene expression profiles, gSFA discovers 16 highly significant small gene signatures. Analysis of dichotomies generated by the signatures results in a set of 133 samples stably classified in good prognosis group and 56 samples in poor prognosis group, whereas 43 remain unreliably classified. AKAP12, DCBLD2, NT5E and SPON1 are particularly represented in the signatures and selected for validation in vivo on two independent patients cohorts comprising 140 tumor tissues and 60 matched normal tissues. Their expression and regulatory programs are investigated in vitro. We show that the coupled expression of NT5E and DCBLD2 robustly stratifies our patients in two groups (one of which with 100% survival at five years. We show that NT5E is a target of the TNF-α signaling in vitro; the tumor suppressor PPARγ acts as a novel NT5E antagonist that positively and concomitantly regulates DCBLD2 in a cancer cell context-dependent manner.

  2. Signatures of top flavour-changing dark matter

    International Nuclear Information System (INIS)

    Hondt, Jorgen d'; Mariotti, Alberto; Moortgat, Seth; Tziveloglou, Pantelis

    2015-12-01

    We develop the phenomenology of scenarios in which a dark matter candidate interacts with a top quark through flavour-changing couplings, employing a simplified dark matter model with an s-channel vector-like mediator. We study in detail the top-charm flavour-changing interaction, by investigating the single top plus large missing energy signature at the LHC as well as constraints from the relic density and direct and indirect dark matter detection experiments. We present strategies to distinguish between the top-charm and top-up flavour-changing models by taking advantage of the lepton charge asymmetry as well as by using charm-tagging techniques on an extra jet. We also show the complementarity between the LHC and canonical dark matter experiments in exploring the viable parameter space of the models.

  3. Signatures of top flavour-changing dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Hondt, Jorgen d' ; Mariotti, Alberto; Moortgat, Seth; Tziveloglou, Pantelis [Vrieje Univ. Brussel (Belgium). Theoretische Natuurkunde and IIHE/ELEM; Mawatari, Kentarou [Vrieje Univ. Brussel (Belgium). Theoretische Natuurkunde and IIHE/ELEM; Grenoble-Alpes Univ., CNRS/IN2P3 (France). Lab. de Physique Subatomique et de Cosmologie; Onsem, Gerrit van [Vrieje Univ. Brussel (Belgium). Theoretische Natuurkunde and IIHE/ELEM; Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2015-12-15

    We develop the phenomenology of scenarios in which a dark matter candidate interacts with a top quark through flavour-changing couplings, employing a simplified dark matter model with an s-channel vector-like mediator. We study in detail the top-charm flavour-changing interaction, by investigating the single top plus large missing energy signature at the LHC as well as constraints from the relic density and direct and indirect dark matter detection experiments. We present strategies to distinguish between the top-charm and top-up flavour-changing models by taking advantage of the lepton charge asymmetry as well as by using charm-tagging techniques on an extra jet. We also show the complementarity between the LHC and canonical dark matter experiments in exploring the viable parameter space of the models.

  4. AN ENERGY FUNCTION APPROACH FOR FINDING ROOTS OF CHARACTERISTIC EQUATION

    OpenAIRE

    Deepak Mishra; Prem K. Kalra

    2011-01-01

    In this paper, an energy function approach for finding roots of a characteristic equation has been proposed. Finding the roots of a characteristics equation is considered as an optimization problem. We demonstrated that this problem can be solved with the application of feedback type neural network. The proposed approach is fast and robust against variation of parameter.

  5. 7 CFR 1956.68 - Compromise or adjustment without debtor's signature.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 14 2010-01-01 2009-01-01 true Compromise or adjustment without debtor's signature... Loan Programs and Multi-Family Housing § 1956.68 Compromise or adjustment without debtor's signature... made to obtain the debtor's signature and the date(s) of such effort. (c) The specific reasons why it...

  6. Photon signature analysis using template matching

    Energy Technology Data Exchange (ETDEWEB)

    Bradley, D.A., E-mail: d.a.bradley@surrey.ac.uk [Department of Physics, University of Surrey, Guildford GU2 7XH (United Kingdom); Hashim, S., E-mail: suhairul@utm.my [Department of Physics, Universiti Teknologi Malaysia, 81310 Skudai, Johor (Malaysia); Saripan, M.I. [Faculty of Engineering, Universiti Putra Malaysia, 43400 Serdang, Selangor (Malaysia); Wells, K. [Centre for Vision, Speech and Signal Processing, University of Surrey, Guildford GU2 7XH (United Kingdom); Dunn, W.L. [Department of Mechanical and Nuclear Engineering, Kansas State University, 3002 Rathbone Hall, Manhattan, KS 66506 (United States)

    2011-10-01

    We describe an approach to detect improvised explosive devices (IEDs) by using a template matching procedure. This approach relies on the signature due to backstreaming {gamma} photons from various targets. In this work we have simulated cylindrical targets of aluminum, iron, copper, water and ammonium nitrate (nitrogen-rich fertilizer). We simulate 3.5 MeV source photons distributed on a plane inside a shielded area using Monte Carlo N-Particle (MCNP{sup TM}) code version 5 (V5). The 3.5 MeV source gamma rays yield 511 keV peaks due to pair production and scattered gamma rays. In this work, we simulate capture of those photons that backstream, after impinging on the target element, toward a NaI detector. The captured backstreamed photons are expected to produce a unique spectrum that will become part of a simple signal processing recognition system based on the template matching method. Different elements were simulated using different sets of random numbers in the Monte Carlo simulation. To date, the sum of absolute differences (SAD) method has been used to match the template. In the examples investigated, template matching was found to detect all elements correctly.

  7. Quantum dual signature scheme based on coherent states with entanglement swapping

    Science.gov (United States)

    Liu, Jia-Li; Shi, Rong-Hua; Shi, Jin-Jing; Lv, Ge-Li; Guo, Ying

    2016-08-01

    A novel quantum dual signature scheme, which combines two signed messages expected to be sent to two diverse receivers Bob and Charlie, is designed by applying entanglement swapping with coherent states. The signatory Alice signs two different messages with unitary operations (corresponding to the secret keys) and applies entanglement swapping to generate a quantum dual signature. The dual signature is firstly sent to the verifier Bob who extracts and verifies the signature of one message and transmits the rest of the dual signature to the verifier Charlie who verifies the signature of the other message. The transmission of the dual signature is realized with quantum teleportation of coherent states. The analysis shows that the security of secret keys and the security criteria of the signature protocol can be greatly guaranteed. An extensional multi-party quantum dual signature scheme which considers the case with more than three participants is also proposed in this paper and this scheme can remain secure. The proposed schemes are completely suited for the quantum communication network including multiple participants and can be applied to the e-commerce system which requires a secure payment among the customer, business and bank. Project supported by the National Natural Science Foundation of China (Grant Nos. 61272495, 61379153, and 61401519) and the Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20130162110012).

  8. Local thermal energy as a structural indicator in glasses

    Science.gov (United States)

    Zylberg, Jacques; Lerner, Edan; Bar-Sinai, Yohai; Bouchbinder, Eran

    2017-07-01

    Identifying heterogeneous structures in glasses—such as localized soft spots—and understanding structure-dynamics relations in these systems remain major scientific challenges. Here, we derive an exact expression for the local thermal energy of interacting particles (the mean local potential energy change caused by thermal fluctuations) in glassy systems by a systematic low-temperature expansion. We show that the local thermal energy can attain anomalously large values, inversely related to the degree of softness of localized structures in a glass, determined by a coupling between internal stresses—an intrinsic signature of glassy frustration—anharmonicity and low-frequency vibrational modes. These anomalously large values follow a fat-tailed distribution, with a universal exponent related to the recently observed universal ω4ω4 density of states of quasilocalized low-frequency vibrational modes. When the spatial thermal energy field—a “softness field”—is considered, this power law tail manifests itself by highly localized spots, which are significantly softer than their surroundings. These soft spots are shown to be susceptible to plastic rearrangements under external driving forces, having predictive powers that surpass those of the normal modes-based approach. These results offer a general, system/model-independent, physical/observable-based approach to identify structural properties of quiescent glasses and relate them to glassy dynamics.

  9. Methyl-CpG island-associated genome signature tags

    Science.gov (United States)

    Dunn, John J

    2014-05-20

    Disclosed is a method for analyzing the organismic complexity of a sample through analysis of the nucleic acid in the sample. In the disclosed method, through a series of steps, including digestion with a type II restriction enzyme, ligation of capture adapters and linkers and digestion with a type IIS restriction enzyme, genome signature tags are produced. The sequences of a statistically significant number of the signature tags are determined and the sequences are used to identify and quantify the organisms in the sample. Various embodiments of the invention described herein include methods for using single point genome signature tags to analyze the related families present in a sample, methods for analyzing sequences associated with hyper- and hypo-methylated CpG islands, methods for visualizing organismic complexity change in a sampling location over time and methods for generating the genome signature tag profile of a sample of fragmented DNA.

  10. A new approach of chaos and complex network method to study fluctuation and phase transition in nuclear collision at high energy

    Energy Technology Data Exchange (ETDEWEB)

    Bhaduri, Susmita; Bhaduri, Anirban; Ghosh, Dipak [Deepa Ghosh Research Foundation, Kolkata (India)

    2017-06-15

    In the endeavour to study fluctuation and a signature of phase transition in ultrarelativistic nuclear collision during the process of particle production, an approach based on chaos and complex network is proposed. In this work we have attempted an exhaustive study of pion fluctuation in η space, φ space, their cross-correlation and finally two-dimensional fluctuation in terms of scaling of void probability distribution. The analysis is done on the η values and their corresponding φ values extracted from the {sup 32}S-Ag/Br interaction at an incident energy of 200 GeV per nucleon. The methods used are Multifractal Detrended Cross-Correlation Analysis (MF-DXA) and a chaos-based rigorous complex network method -Visibility Graph. The analysis reveals that the highest degree of cross-correlation between pseudorapidity and azimuthal angles exists in the most central region of the interaction. The analysis further shows that two-dimensional void distribution corresponding to the η-φ space reveals a strong scaling behaviour. Both cross-correlation coefficients of MF-DXA and PSVG (Power of the Scale-freeness in Visibility Graph, which is implicitly connected with the Hurst exponent) can be effectively used for the quantitative assessment of pion fluctuation in a very precise manner and have the capability to assess the tendency of approaching criticality for phase transitions. (orig.)

  11. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  12. Evolutionary signatures in complex ejecta and their driven shocks

    Directory of Open Access Journals (Sweden)

    C. J. Farrugia

    2004-11-01

    Full Text Available We examine interplanetary signatures of ejecta-ejecta interactions. To this end, two time intervals of inner-heliospheric (≤1AU observations separated by 2 solar cycles are chosen where ejecta/magnetic clouds are in the process of interacting to form complex ejecta. At the Sun, both intervals are characterized by many coronal mass ejections (CMEs and flares. In each case, a complement of observations from various instruments on two spacecraft are examined in order to bring out the in-situ signatures of ejecta-ejecta interactions and their relation to solar observations. In the first interval (April 1979, data are shown from Helios-2 and ISEE-3, separated by ~0.33AU in radial distance and 28° in heliographic longitude. In the second interval (March-April 2001, data from the SOHO and Wind probes are combined, relating effects at the Sun and their manifestations at 1AU on one of Wind's distant prograde orbits. At ~0.67AU, Helios-2 observes two individual ejecta which have merged by the time they are observed at 1AU by ISEE-3. In March 2001, two distinct Halo CMEs (H-CMEs are observed on SOHO on 28-29 March approaching each other with a relative speed of 500kms-1 within 30 solar radii. In order to isolate signatures of ejecta-ejecta interactions, the two event intervals are compared with expectations for pristine (isolated ejecta near the last solar minimum, extensive observations on which were given by Berdichevsky et al. (2002. The observations from these two event sequences are then intercompared. In both event sequences, coalescence/merging was accompanied by the following signatures: heating of the plasma, acceleration of the leading ejecta and deceleration of the trailing ejecta, compressed field and plasma in the leading ejecta, disappearance of shocks and the strengthening of shocks driven by the accelerated ejecta. A search for reconnection signatures at the interface between the two ejecta in the March 2001 event was inconclusive

  13. Cryptanalysis of the arbitrated quantum signature protocols

    International Nuclear Information System (INIS)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-01-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  14. Solar wind ion trends and signatures: STEREO PLASTIC observations approaching solar minimum

    Directory of Open Access Journals (Sweden)

    A. B. Galvin

    2009-10-01

    Full Text Available STEREO has now completed the first two years of its mission, moving from close proximity to Earth in 2006/2007 to more than 50 degrees longitudinal separation from Earth in 2009. During this time, several large-scale structures have been observed in situ. Given the prevailing solar minimum conditions, these structures have been predominantly coronal hole-associated solar wind, slow solar wind, their interfaces, and the occasional transient event. In this paper, we extend earlier solar wind composition studies into the current solar minimum using high-resolution (1-h sampling times for the charge state analysis. We examine 2-year trends for iron charge states and solar wind proton speeds, and present a case study of Carrington Rotation 2064 (December 2007 which includes minor ion (He, Fe, O kinetic and Fe composition parameters in comparison with proton and magnetic field signatures at large-scale structures observed during this interval.

  15. An Efficient Identity-Based Proxy Blind Signature for Semioffline Services

    Directory of Open Access Journals (Sweden)

    Hongfei Zhu

    2018-01-01

    Full Text Available Fog computing extends the cloud computing to the network edge and allows deploying a new type of semioffline services, which can provide real-time transactions between two entities, while the central cloud server is offline and network edge devices are online. For an e-payment system and e-voting with such feature, proxy blind signature is a cornerstone to protect users’ privacy. However, the signature based on number theorem, such as hard mathematical problems on factoring problem, discrete logarithm problem, and bilinear pairings, cannot defeat quantum computers attack. Meanwhile, these schemes need to depend on complex public key infrastructure. Thus, we construct an identity-based proxy blind signature scheme based on number theorem research unit lattice, which can defeat quantum computers attack and does not need to depend on public key infrastructure. The security of the proposed scheme is dependent on Ring-Small Integer Solution problem over number theorem research unit lattice. The proposed scheme meets the properties of blind signature and proxy signature. Then we compare the proposed scheme with other existing proxy blind signature schemes; the result shows that the proposed scheme outperforms ZM scheme except in proxy signer’s signature size and can be more secure than TA scheme and MMHP scheme.

  16. Forged Signature Distinction Using Convolutional Neural Network for Feature Extraction

    Directory of Open Access Journals (Sweden)

    Seungsoo Nam

    2018-01-01

    Full Text Available This paper proposes a dynamic verification scheme for finger-drawn signatures in smartphones. As a dynamic feature, the movement of a smartphone is recorded with accelerometer sensors in the smartphone, in addition to the moving coordinates of the signature. To extract high-level longitudinal and topological features, the proposed scheme uses a convolution neural network (CNN for feature extraction, and not as a conventional classifier. We assume that a CNN trained with forged signatures can extract effective features (called S-vector, which are common in forging activities such as hesitation and delay before drawing the complicated part. The proposed scheme also exploits an autoencoder (AE as a classifier, and the S-vector is used as the input vector to the AE. An AE has high accuracy for the one-class distinction problem such as signature verification, and is also greatly dependent on the accuracy of input data. S-vector is valuable as the input of AE, and, consequently, could lead to improved verification accuracy especially for distinguishing forged signatures. Compared to the previous work, i.e., the MLP-based finger-drawn signature verification scheme, the proposed scheme decreases the equal error rate by 13.7%, specifically, from 18.1% to 4.4%, for discriminating forged signatures.

  17. Signature Pedagogies for E-Learning in Higher Education and Beyond

    Science.gov (United States)

    Eaton, Sarah Elaine; Brown, Barbara; Schroeder, Meadow; Lock, Jennifer; Jacobsen, Michele

    2017-01-01

    Purpose: This report explores the notion of signature pedagogies within the field of e-learning for higher education. Methodology: We build on previous work that examined signature pedagogies in education, linking the concepts of signature pedagogies, the profession of education and e-learning as a means to help educators develop their practice…

  18. Provably Secure and Subliminal-Free Variant of Schnorr Signature

    OpenAIRE

    Zhang , Yinghui; Li , Hui; Li , Xiaoqing; Zhu , Hui

    2013-01-01

    Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES); International audience; Subliminal channels present a severe challenge to information security. Currently, subliminal channels still exist in Schnorr signature. In this paper, we propose a subliminal-free variant of Schnorr signature. In the proposed scheme, an honest-but-curious warden is introduced to help the signer to generate a signature on a given message, but it is disallowed to sign messages independently. ...

  19. Thermodynamic and structural signatures of water-driven methane-methane attraction in coarse-grained mW water.

    Science.gov (United States)

    Song, Bin; Molinero, Valeria

    2013-08-07

    Hydrophobic interactions are responsible for water-driven processes such as protein folding and self-assembly of biomolecules. Microscopic theories and molecular simulations have been used to study association of a pair of methanes in water, the paradigmatic example of hydrophobic attraction, and determined that entropy is the driving force for the association of the methane pair, while the enthalpy disfavors it. An open question is to which extent coarse-grained water models can still produce correct thermodynamic and structural signatures of hydrophobic interaction. In this work, we investigate the hydrophobic interaction between a methane pair in water at temperatures from 260 to 340 K through molecular dynamics simulations with the coarse-grained monatomic water model mW. We find that the coarse-grained model correctly represents the free energy of association of the methane pair, the temperature dependence of free energy, and the positive change in entropy and enthalpy upon association. We investigate the relationship between thermodynamic signatures and structural order of water through the analysis of the spatial distribution of the density, energy, and tetrahedral order parameter Qt of water. The simulations reveal an enhancement of tetrahedral order in the region between the first and second hydration shells of the methane molecules. The increase in tetrahedral order, however, is far from what would be expected for a clathrate-like or ice-like shell around the solutes. This work shows that the mW water model reproduces the key signatures of hydrophobic interaction without long ranged electrostatics or the need to be re-parameterized for different thermodynamic states. These characteristics, and its hundred-fold increase in efficiency with respect to atomistic models, make mW a promising water model for studying water-driven hydrophobic processes in more complex systems.

  20. Hyperspectral signatures and WorldView-3 imagery of Indian River Lagoon and Banana River Estuarine water and bottom types

    Science.gov (United States)

    Bostater, Charles R.; Oney, Taylor S.; Rotkiske, Tyler; Aziz, Samin; Morrisette, Charles; Callahan, Kelby; Mcallister, Devin

    2017-10-01

    Hyperspectral signatures and imagery collected during the spring and summer of 2017 and 2016 are presented. Ground sampling distances (GSD) and pixel sizes were sampled from just over a meter to less than 4.0 mm. A pushbroom hyperspectral imager was used to calculate bidirectional reflectance factor (BRF) signatures. Hyperspectral signatures of different water types and bottom habitats such as submerged seagrasses, drift algae and algal bloom waters were scanned using a high spectral and digital resolution solid state spectrograph. WorldView-3 satellite imagery with minimal water wave sun glint effects was used to demonstrate the ability to detect bottom features using a derivative reflectance spectroscopy approach with the 1.3 m GSD multispectral satellite channels centered at the solar induced fluorescence band. The hyperspectral remote sensing data collected from the Banana River and Indian River Lagoon watersheds represents previously unknown signatures to be used in satellite and airborne remote sensing of water in turbid waters along the US Atlantic Ocean coastal region and the Florida littoral zone.

  1. The Importance of Hydrological Signature and Its Recurring Dynamics

    Science.gov (United States)

    Wendi, D.; Marwan, N.; Merz, B.

    2017-12-01

    Temporal changes in hydrology are known to be challenging to detect and attribute due to multiple drivers that include complex processes that are non-stationary and highly variable. These drivers, such as human-induced climate change, natural climate variability, implementation of flood defense, river training, and land use change, could impact variably on space-time scales and influence or mask each other. Besides, data depicting these drivers are often not available. One conventional approach of analyzing the change is based on discrete points of magnitude (e.g. the frequency of recurring extreme discharge) and often linearly quantified and hence do not reveal the potential change in the hydrological process. Moreover, discharge series are often subject to measurement errors, such as rating curve error especially in the case of flood peaks where observation are derived through extrapolation. In this study, the system dynamics inferred from the hydrological signature (i.e. the shape of hydrograph) is being emphasized. One example is to see if certain flood dynamics (instead of flood peak) in the recent years, had also occurred in the past (or rather extraordinary), and if so what is its recurring rate and if there had been a shift in its occurrence in time or seasonality (e.g. earlier snow melt dominant flood). The utilization of hydrological signature here is extended beyond those of classical hydrology such as base flow index, recession and rising limb slope, and time to peak. It is in fact all these characteristics combined i.e. from the start until the end of the hydrograph. Recurrence plot is used as a method to quantify and visualize the recurring hydrological signature through its phase space trajectories, and usually in the order of dimension above 2. Such phase space trajectories are constructed by embedding the time series into a series of variables (i.e. number of dimension) corresponding to the time delay. Since the method is rather novel in

  2. Renewable energy systems a smart energy systems approach to the choice and modeling of 100% renewable solutions

    CERN Document Server

    Lund, Henrik

    2014-01-01

    In this new edition of Renewable Energy Systems, globally recognized renewable energy researcher and professor, Henrik Lund, sets forth a straightforward, comprehensive methodology for comparing different energy systems' abilities to integrate fluctuating and intermittent renewable energy sources. The book does this by presenting an energy system analysis methodology and offering a freely available accompanying software tool, EnergyPLAN, which automates and simplifies the calculations supporting such a detailed comparative analysis. The book provides the results of more than fifteen comprehensive energy system analysis studies, examines the large-scale integration of renewable energy into the present system, and presents concrete design examples derived from a dozen renewable energy systems around the globe. Renewable Energy Systems, Second Edition also undertakes the socio-political realities governing the implementation of renewable energy systems by introducing a theoretical framework approach aimed at ...

  3. Secure Mobile Agent from Leakage-Resilient Proxy Signatures

    Directory of Open Access Journals (Sweden)

    Fei Tang

    2015-01-01

    Full Text Available A mobile agent can sign a message in a remote server on behalf of a customer without exposing its secret key; it can be used not only to search for special products or services, but also to make a contract with a remote server. Hence a mobile agent system can be used for electronic commerce as an important key technology. In order to realize such a system, Lee et al. showed that a secure mobile agent can be constructed using proxy signatures. Intuitively, a proxy signature permits an entity (delegator to delegate its signing right to another entity (proxy to sign some specified messages on behalf of the delegator. However, the proxy signatures are often used in scenarios where the signing is done in an insecure environment, for example, the remote server of a mobile agent system. In such setting, an adversary could launch side-channel attacks to exploit some leakage information about the proxy key or even other secret states. The proxy signatures which are secure in the traditional security models obviously cannot provide such security. Based on this consideration, in this paper, we design a leakage-resilient proxy signature scheme for the secure mobile agent systems.

  4. An estrogen-responsive plasma protein expression signature in Atlantic cod (Gadus morhua) revealed by SELDI-TOF MS

    DEFF Research Database (Denmark)

    Nielsen, Mari Mæland; Meyer, Sonnich; Larsen, Bodil Katrine

    2011-01-01

    Compound-specific protein expression signatures( PESs) can be revealed by proteomic techniques. The SELDI-TOF MS approach is advantageous due to its simplicity and high-throughput capacity,however, there are concerns regarding the reproducibility of this method. The aim of this study was to define...

  5. Polarized X-Ray Emission from Magnetized Neutron Stars: Signature of Strong-Field Vacuum Polarization

    Science.gov (United States)

    Lai, Dong; Ho, Wynn C.

    2003-08-01

    In the atmospheric plasma of a strongly magnetized neutron star, vacuum polarization can induce a Mikheyev-Smirnov-Wolfenstein type resonance across which an x-ray photon may (depending on its energy) convert from one mode into the other, with significant changes in opacities and polarizations. We show that this vacuum resonance effect gives rise to a unique energy-dependent polarization signature in the surface emission from neutron stars. The detection of polarized x rays from neutron stars can provide a direct probe of strong-field quantum electrodynamics and constrain the neutron star magnetic field and geometry.

  6. Polarized x-ray emission from magnetized neutron stars: signature of strong-field vacuum polarization.

    Science.gov (United States)

    Lai, Dong; Ho, Wynn C G

    2003-08-15

    In the atmospheric plasma of a strongly magnetized neutron star, vacuum polarization can induce a Mikheyev-Smirnov-Wolfenstein type resonance across which an x-ray photon may (depending on its energy) convert from one mode into the other, with significant changes in opacities and polarizations. We show that this vacuum resonance effect gives rise to a unique energy-dependent polarization signature in the surface emission from neutron stars. The detection of polarized x rays from neutron stars can provide a direct probe of strong-field quantum electrodynamics and constrain the neutron star magnetic field and geometry.

  7. Digital signature feasibility study

    Science.gov (United States)

    2008-06-01

    The purpose of this study was to assess the advantages and disadvantages of using digital signatures to assist the Arizona Department of Transportation in conducting business. The Department is evaluating the potential of performing more electronic t...

  8. Tumor Microenvironment Gene Signature as a Prognostic Classifier and Therapeutic Target

    Science.gov (United States)

    2016-06-01

    AWARD NUMBER: W81XWH-14-1-0107 TITLE: Tumor Microenvironment Gene Signature as a Prognostic Classifier and Therapeutic Target PRINCIPAL...AND SUBTITLE Tumor Microenvironment Gene Signature as a 5a. CONTRACT NUMBER W81XWH-14-1-0107 Prognostic Classifier and Therapeutic Target 5b...gene signature that correlates with poor survival in ovarian cancer patients. We are refining this gene signature to develop biomarkers for the

  9. Methods and apparatus for multi-parameter acoustic signature inspection

    Energy Technology Data Exchange (ETDEWEB)

    Diaz, Aaron A [Richland, WA; Samuel, Todd J [Pasco, WA; Valencia, Juan D [Kennewick, WA; Gervais, Kevin L [Richland, WA; Tucker, Brian J [Pasco, WA; Kirihara, Leslie J [Richland, WA; Skorpik, James R [Kennewick, WA; Reid, Larry D [Benton City, WA; Munley, John T [Benton City, WA; Pappas, Richard A [Richland, WA; Wright, Bob W [West Richland, WA; Panetta, Paul D [Richland, WA; Thompson, Jason S [Richland, WA

    2007-07-24

    A multiparameter acoustic signature inspection device and method are described for non-invasive inspection of containers. Dual acoustic signatures discriminate between various fluids and materials for identification of the same.

  10. A socio-technical approach to improving retail energy efficiency behaviours.

    Science.gov (United States)

    Christina, Sian; Waterson, Patrick; Dainty, Andrew; Daniels, Kevin

    2015-03-01

    In recent years, the UK retail sector has made a significant contribution to societal responses on carbon reduction. We provide a novel and timely examination of environmental sustainability from a systems perspective, exploring how energy-related technologies and strategies are incorporated into organisational life. We use a longitudinal case study approach, looking at behavioural energy efficiency from within one of the UK's leading retailers. Our data covers a two-year period, with qualitative data from a total of 131 participants gathered using phased interviews and focus groups. We introduce an adapted socio-technical framework approach in order to describe an existing organisational behavioural strategy to support retail energy efficiency. Our findings point to crucial socio-technical and goal-setting factors which both impede and/or enable energy efficient behaviours, these include: tensions linked to store level perception of energy management goals; an emphasis on the importance of technology for underpinning change processes; and, the need for feedback and incentives to support the completion of energy-related tasks. We also describe the evolution of a practical operational intervention designed to address issues raised in our findings. Our study provides fresh insights into how sustainable workplace behaviours can be achieved and sustained over time. Secondly, we discuss in detail a set of issues arising from goal conflict in the workplace; these include the development of a practical energy management strategy to facilitate secondary organisational goals through job redesign. Copyright © 2014 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  11. Thermal Signature Measurements for Ammonium Nitrate/Fuel Mixtures by Laser Heating.

    Science.gov (United States)

    Nazarian, Ashot; Presser, Cary

    2016-01-10

    Measurements were carried out to obtain thermal signatures of several ammonium nitrate/fuel (ANF) mixtures, using a laser-heating technique referred to as the laser-driven thermal reactor (LDTR). The mixtures were ammonium nitrate (AN)/kerosene, AN/ethylene glycol, AN/paraffin wax, AN/petroleum jelly, AN/confectioner's sugar, AN/cellulose (tissue paper), nitromethane/cellulose, nitrobenzene/cellulose, AN/cellulose/nitromethane, AN/cellulose/nitrobenzene. These mixtures were also compared with AN/nitromethane and AN/diesel fuel oil, obtained from an earlier investigation. Thermograms for the mixtures, as well as individual constituents, were compared to better understand how the sample thermal signature changes with mixture composition. This is the first step in development of a thermal-signature database, to be used along with other signature databases, to improve identification of energetic substances of unknown composition. The results indicated that each individual thermal signature was associated unambiguously with a particular mixture composition. The signature features of a particular mixture were shaped by the individual constituent signatures. It was also uncovered that the baseline signature was modified after an experiment due to coating of unreacted residue on the substrate surface and a change in the reactor sphere oxide layer. Thus, care was required to pre-oxidize the sphere prior to an experiment. A minimum sample mass (which was dependent on composition) was required to detect the signature characteristics. Increased laser power served to magnify signal strength while preserving the signature features. For the mixtures examined, the thermal response of each ANF mixture was found to be different, which was based on the mixture composition and the thermal behavior of each mixture constituent.

  12. 26 CFR 301.6064-1 - Signature presumed authentic.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Signature presumed authentic. 301.6064-1 Section 301.6064-1 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE TREASURY (CONTINUED....6064-1 Signature presumed authentic. An individual's name signed to a return, statement, or other...

  13. Computational Approach in Determination of 233U and 233Th Fermi Energy

    International Nuclear Information System (INIS)

    Kurniadi, R.; Perkasa, Y. S.; Waris, A.

    2010-01-01

    There are several methods to get Fermi energy such as hermit polynomial expansion and Wigner-Kirkwood expansion, these are analytical method. In this paper will be discussed numerical approach of calculating Fermi energy of 233 Th and 233 U nuclei. Our work demonstrates the simple technique of determining Fermi energy.

  14. A nonlinear complementarity approach for the national energy modeling system

    International Nuclear Information System (INIS)

    Gabriel, S.A.; Kydes, A.S.

    1995-01-01

    The National Energy Modeling System (NEMS) is a large-scale mathematical model that computes equilibrium fuel prices and quantities in the U.S. energy sector. At present, to generate these equilibrium values, NEMS sequentially solves a collection of linear programs and nonlinear equations. The NEMS solution procedure then incorporates the solutions of these linear programs and nonlinear equations in a nonlinear Gauss-Seidel approach. The authors describe how the current version of NEMS can be formulated as a particular nonlinear complementarity problem (NCP), thereby possibly avoiding current convergence problems. In addition, they show that the NCP format is equally valid for a more general form of NEMS. They also describe several promising approaches for solving the NCP form of NEMS based on recent Newton type methods for general NCPs. These approaches share the feature of needing to solve their direction-finding subproblems only approximately. Hence, they can effectively exploit the sparsity inherent in the NEMS NCP

  15. Energy Neutral Districts in 2050. The Dutch Approach

    Energy Technology Data Exchange (ETDEWEB)

    Jablonska, B.; Roossien, B.; Ruijg, G.J.; Visser, H.; Bakker, E.J. [Energy research Centre of the Netherlands ECN, Petten (Netherlands); Willems, E. [Cauberg-Huygen Raadgevende Ingenieurs, Amsterdam (Netherlands)

    2013-09-15

    According to the EPBD, from the end of 2020 on all new buildings should be built as nearly zero energy buildings. Instead of focusing on buildings only, a district approach to energy supply and consumption can be advantageous as regards the energy performance and economics. The potential of renewable energy technologies can be utilized to a larger extent while fewer energy generators are needed. An example is a so called energy-hub, in which exchange, conversion and seasonal storage of energy can lead to energy neutral districts before 2050. The Dutch study Transition in Energy and Process for a Sustainable District Development (Transep-DGO), financed largely by the AgentschapNL, has shown that this is possible. For energy neutral district development in 2050, six innovative energy concepts have been elaborated and the extent of energy neutrality in 2020, 2035 and 2050 calculated. Three concepts are based on an idea of an energy hub - bio hub, geo hub and a solar hub. Other concepts are all-electric, conventional and hydrogen concepts. Calculations show that implementation of each of the concepts can lead to energy neutral districts in 2050 or even earlier. When personal transport is included, energy neutrality in 2050 is not feasible. Based on the six general concepts, the most optimal energy concepts tailored for four Dutch cities have been elaborated as pilots, in close cooperation with municipality representatives. Solar hub has been dynamically simulated in order to show the added value of the exchange, conversion and storage of energy flows on a district scale. Energy Pattern Generator (EPG) has been applied for simulation of a virtual district with 1,000 dwellings of various categories. A solar hub with collective heat storage can reduce the demanded storage capacity by 26%, and the total required solar collector surface by 30% at maximum compared to individual seasonal heat storage capacity in dwellings that are not connected in an energy hub. Energy hub

  16. Learning Approach on the Ground State Energy Calculation of Helium Atom

    International Nuclear Information System (INIS)

    Shah, Syed Naseem Hussain

    2010-01-01

    This research investigated the role of learning approach on the ground state energy calculation of Helium atom in improving the concepts of science teachers at university level. As the exact solution of several particles is not possible here we used approximation methods. Using this method one can understand easily the calculation of ground state energy of any given function. Variation Method is one of the most useful approximation methods in estimating the energy eigen values of the ground state and the first few excited states of a system, which we only have a qualitative idea about the wave function.The objective of this approach is to introduce and involve university teacher in new research, to improve their class room practices and to enable teachers to foster critical thinking in students.

  17. Molecular signatures for the Crenarchaeota and the Thaumarchaeota.

    Science.gov (United States)

    Gupta, Radhey S; Shami, Ali

    2011-02-01

    Crenarchaeotes found in mesophilic marine environments were recently placed into a new phylum of Archaea called the Thaumarchaeota. However, very few molecular characteristics of this new phylum are currently known which can be used to distinguish them from the Crenarchaeota. In addition, their relationships to deep-branching archaeal lineages are unclear. We report here detailed analyses of protein sequences from Crenarchaeota and Thaumarchaeota that have identified many conserved signature indels (CSIs) and signature proteins (SPs) (i.e., proteins for which all significant blast hits are from these groups) that are specific for these archaeal groups. Of the identified signatures 6 CSIs and 13 SPs are specific for the Crenarchaeota phylum; 6 CSIs and >250 SPs are uniquely found in various Thaumarchaeota (viz. Cenarchaeum symbiosum, Nitrosopumilus maritimus and a number of uncultured marine crenarchaeotes) and 3 CSIs and ~10 SPs are found in both Thaumarchaeota and Crenarchaeota species. Some of the molecular signatures are also present in Korarchaeum cryptofilum, which forms the independent phylum Korarchaeota. Although some of these molecular signatures suggest a distant shared ancestry between Thaumarchaeota and Crenarchaeota, our identification of large numbers of Thaumarchaeota-specific proteins and their deep branching between the Crenarchaeota and Euryarchaeota phyla in phylogenetic trees shows that they are distinct from both Crenarchaeota and Euryarchaeota in both genetic and phylogenetic terms. These observations support the placement of marine mesophilic archaea into the separate phylum Thaumarchaeota. Additionally, many CSIs and SPs have been found that are specific for different orders within Crenarchaeota (viz. Sulfolobales-3 CSIs and 169 SPs, Thermoproteales-5 CSIs and 25 SPs, Desulfurococcales-4 SPs, and Sulfolobales and Desulfurococcales-2 CSIs and 18 SPs). The signatures described here provide novel means for distinguishing the Crenarchaeota and

  18. Spatially Resolved Isotopic Source Signatures of Wetland Methane Emissions

    Science.gov (United States)

    Ganesan, A. L.; Stell, A. C.; Gedney, N.; Comyn-Platt, E.; Hayman, G.; Rigby, M.; Poulter, B.; Hornibrook, E. R. C.

    2018-04-01

    We present the first spatially resolved wetland δ13C(CH4) source signature map based on data characterizing wetland ecosystems and demonstrate good agreement with wetland signatures derived from atmospheric observations. The source signature map resolves a latitudinal difference of 10‰ between northern high-latitude (mean -67.8‰) and tropical (mean -56.7‰) wetlands and shows significant regional variations on top of the latitudinal gradient. We assess the errors in inverse modeling studies aiming to separate CH4 sources and sinks by comparing atmospheric δ13C(CH4) derived using our spatially resolved map against the common assumption of globally uniform wetland δ13C(CH4) signature. We find a larger interhemispheric gradient, a larger high-latitude seasonal cycle, and smaller trend over the period 2000-2012. The implication is that erroneous CH4 fluxes would be derived to compensate for the biases imposed by not utilizing spatially resolved signatures for the largest source of CH4 emissions. These biases are significant when compared to the size of observed signals.

  19. Signature scheme for the microscopic description of nuclear collective excitations

    International Nuclear Information System (INIS)

    Ogawa, K.

    1980-04-01

    The symmetries between the proton and neutron systems in a nucleus are described in terms of the signatures. Three kinds of signatures (i.e. the pn-, p anti n- and p anti p- (or n anti n-) signatures) are introduced and they are related to the appearance of various collective motions such as rotations or vibrations. It is shown that the pn-signature scheme provides a band-like structure of deformed nuclei, while the features associated with the quadrupole vibration are obtained in the p anti n- and p anti p-signature scheme. From the detail investigation of the p anti n-symmetric wave functions, it is concluded that the reguralities provided by the present shell model are more analogous to those of the γ-unstable surface vibration model (Wilets-Jean model) than to those of harmonic phonon model. (author)

  20. Energy Approach-Based Simulation of Structural Materials High-Cycle Fatigue

    Science.gov (United States)

    Balayev, A. F.; Korolev, A. V.; Kochetkov, A. V.; Sklyarova, A. I.; Zakharov, O. V.

    2016-02-01

    The paper describes the mechanism of micro-cracks development in solid structural materials based on the theory of brittle fracture. A probability function of material cracks energy distribution is obtained using a probabilistic approach. The paper states energy conditions for cracks growth at material high-cycle loading. A formula allowing to calculate the amount of energy absorbed during the cracks growth is given. The paper proposes a high- cycle fatigue evaluation criterion allowing to determine the maximum permissible number of solid body loading cycles, at which micro-cracks start growing rapidly up to destruction.