WorldWideScience

Sample records for model privacy form

  1. 16 CFR 313.2 - Model privacy form and examples.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form..., although use of the model privacy form is not required. (b) Examples. The examples in this part are not...

  2. 12 CFR 716.2 - Model privacy form and examples.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form..., although use of the model privacy form is not required. (b) Examples. The examples in this part are not...

  3. 12 CFR 573.2 - Model privacy form and examples.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Model privacy form and examples. 573.2 Section... FINANCIAL INFORMATION § 573.2 Model privacy form and examples. (a) Model privacy form. Use of the model... privacy form is not required. (b) Examples. The examples in this part are not exclusive. Compliance with...

  4. 12 CFR 332.2 - Model privacy form and examples.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model... this part, although use of the model privacy form is not required. (b) Examples. The examples in this...

  5. 17 CFR 160.2 - Model privacy form and examples.

    Science.gov (United States)

    2010-04-01

    ... examples. 160.2 Section 160.2 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION § 160.2 Model privacy form and examples. (a) Model privacy form..., although use of the model privacy form is not required. (b) Examples. The examples in this part are not...

  6. 12 CFR 216.2 - Model privacy form and examples.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a... of this part, although use of the model privacy form is not required. (b) Examples. The examples in...

  7. 12 CFR 40.2 - Model privacy form and examples.

    Science.gov (United States)

    2010-01-01

    ... 40.2 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER... privacy form in Appendix A of this part, consistent with the instructions in Appendix A, constitutes compliance with the notice content requirements of §§ 40.6 and 40.7 of this part, although use of the model...

  8. 17 CFR Appendix A to Part 160 - Model Privacy Form

    Science.gov (United States)

    2010-04-01

    ... information to market to me.” A financial institution that chooses to offer an opt-out for joint marketing... institutions to jointly market to me.” (h) Barcodes. A financial institution may elect to include a barcode and... of a financial institution, including a group of financial institutions that use a common privacy...

  9. A Model-Based Privacy Compliance Checker

    OpenAIRE

    Siani Pearson; Damien Allison

    2009-01-01

    Increasingly, e-business organisations are coming under pressure to be compliant to a range of privacy legislation, policies and best practice. There is a clear need for high-level management and administrators to be able to assess in a dynamic, customisable way the degree to which their enterprise complies with these. We outline a solution to this problem in the form of a model-driven automated privacy process analysis and configuration checking system. This system models privacy compliance ...

  10. MODEL REGULATION FOR DATA PRIVACY IN THE APPLICATION OF BIOMETRIC SMART CARD

    Directory of Open Access Journals (Sweden)

    Sinta Dewi

    2017-03-01

    This article will explore data privacy model regulation which is intended to regulate and protect  data privacy. This  regulatory model  combining several approaches in managing data privacy, especially in using biometric smardcard. Firstly, through laws that enforces the principles and international standards. Secondly, through the market approach (market-based solution which is derived through industry associations to help protect consumer data privacy by applying privacy policy in the form of a statement that the industry will protect consumers' privacy by implementing fair information principles. Third, through technological approach such as PET's (privacy enchasing technology,  i.e the techniques for anonymous and pseudo-anonymous payment, communication, and web access. Fourthly, through corporate privacy rules.

  11. Privacy context model for dynamic privacy adaptation in ubiquitous computing

    NARCIS (Netherlands)

    Schaub, Florian; Koenings, Bastian; Dietzel, Stefan; Weber, M.; Kargl, Frank

    Ubiquitous computing is characterized by the merger of physical and virtual worlds as physical artifacts gain digital sensing, processing, and communication capabilities. Maintaining an appropriate level of privacy in the face of such complex and often highly dynamic systems is challenging. We argue

  12. From Data Privacy to Location Privacy

    Science.gov (United States)

    Wang, Ting; Liu, Ling

    Over the past decade, the research on data privacy has achieved considerable advancement in the following two aspects: First, a variety of privacy threat models and privacy principles have been proposed, aiming at providing sufficient protection against different types of inference attacks; Second, a plethora of algorithms and methods have been developed to implement the proposed privacy principles, while attempting to optimize the utility of the resulting data. The first part of the chapter presents an overview of data privacy research by taking a close examination at the achievements from the above two aspects, with the objective of pinpointing individual research efforts on the grand map of data privacy protection. As a special form of data privacy, location privacy possesses its unique characteristics. In the second part of the chapter, we examine the research challenges and opportunities of location privacy protection, in a perspective analogous to data privacy. Our discussion attempts to answer the following three questions: (1) Is it sufficient to apply the data privacy models and algorithms developed to date for protecting location privacy? (2) What is the current state of the research on location privacy? (3) What are the open issues and technical challenges that demand further investigation? Through answering these questions, we intend to provide a comprehensive review of the state of the art in location privacy research.

  13. A Privacy Model for RFID Tag Ownership Transfer

    Directory of Open Access Journals (Sweden)

    Xingchun Yang

    2017-01-01

    Full Text Available The ownership of RFID tag is often transferred from one owner to another in its life cycle. To address the privacy problem caused by tag ownership transfer, we propose a tag privacy model which captures the adversary’s abilities to get secret information inside readers, to corrupt tags, to authenticate tags, and to observe tag ownership transfer processes. This model gives formal definitions for tag forward privacy and backward privacy and can be used to measure the privacy property of tag ownership transfer scheme. We also present a tag ownership transfer scheme, which is privacy-preserving under the proposed model and satisfies the other common security requirements, in addition to achieving better performance.

  14. Context trees for privacy-preserving modeling of genetic data

    NARCIS (Netherlands)

    Kusters, C.J.; Ignatenko, T.

    2016-01-01

    In this work, we use context trees for privacypreserving modeling of genetic sequences. The resulting estimated models are applied for functional comparison of genetic sequences in a privacy preserving way. Here we define privacy as uncertainty about the genetic source sequence given its model and

  15. Modelling information dissemination under privacy concerns in social media

    Science.gov (United States)

    Zhu, Hui; Huang, Cheng; Lu, Rongxing; Li, Hui

    2016-05-01

    Social media has recently become an important platform for users to share news, express views, and post messages. However, due to user privacy preservation in social media, many privacy setting tools are employed, which inevitably change the patterns and dynamics of information dissemination. In this study, a general stochastic model using dynamic evolution equations was introduced to illustrate how privacy concerns impact the process of information dissemination. Extensive simulations and analyzes involving the privacy settings of general users, privileged users, and pure observers were conducted on real-world networks, and the results demonstrated that user privacy settings affect information differently. Finally, we also studied the process of information diffusion analytically and numerically with different privacy settings using two classic networks.

  16. The Impact of Privacy Concerns and Perceived Vulnerability to Risks on Users Privacy Protection Behaviors on SNS: A Structural Equation Model

    OpenAIRE

    Noora Sami Al-Saqer; Mohamed E. Seliaman

    2016-01-01

    This research paper investigates Saudi users’ awareness levels about privacy policies in Social Networking Sites (SNSs), their privacy concerns and their privacy protection measures. For this purpose, a research model that consists of five main constructs namely information privacy concern, awareness level of privacy policies of social networking sites, perceived vulnerability to privacy risks, perceived response efficacy, and privacy protecting behavior was developed. An online survey questi...

  17. Review of the model of technological pragmatism considering privacy and security

    Directory of Open Access Journals (Sweden)

    Kovačević-Lepojević Marina M.

    2013-01-01

    Full Text Available The model of technological pragmatism assumes awareness that technological development involves both benefits and dangers. Most modern security technologies represent citizens' mass surveillance tools, which can lead to compromising a significant amount of personal data due to the lack of institutional monitoring and control. On the other hand, people are interested in improving crime control and reducing the fear of potential victimization which this framework provides as a rational justification for the apparent loss of privacy, personal rights and freedoms. Citizens' perception on the categories of security and privacy, and their balancing, can provide the necessary guidelines to regulate the application of security technologies in the actual context. The aim of this paper is to analyze the attitudes of students at the University of Belgrade (N = 269 toward the application of security technology and identification of the key dimensions. On the basis of the relevant research the authors have formed assumptions about the following dimensions: security, privacy, trust in institutions and concern about the misuse of security technology. The Prise Questionnaire on Security Technology and Privacy was used for data collection. Factor analysis abstracted eight factors which together account for 58% of variance, with the highest loading of the four factors that are identified as security, privacy, trust and concern. The authors propose a model of technological pragmatism considering security and privacy. The data also showed that students are willing to change their privacy for the purpose of improving security and vice versa.

  18. Towards a Formal Model of Privacy-Sensitive Dynamic Coalitions

    Directory of Open Access Journals (Sweden)

    Sebastian Bab

    2012-04-01

    Full Text Available The concept of dynamic coalitions (also virtual organizations describes the temporary interconnection of autonomous agents, who share information or resources in order to achieve a common goal. Through modern technologies these coalitions may form across company, organization and system borders. Therefor questions of access control and security are of vital significance for the architectures supporting these coalitions. In this paper, we present our first steps to reach a formal framework for modeling and verifying the design of privacy-sensitive dynamic coalition infrastructures and their processes. In order to do so we extend existing dynamic coalition modeling approaches with an access-control-concept, which manages access to information through policies. Furthermore we regard the processes underlying these coalitions and present first works in formalizing these processes. As a result of the present paper we illustrate the usefulness of the Abstract State Machine (ASM method for this task. We demonstrate a formal treatment of privacy-sensitive dynamic coalitions by two example ASMs which model certain access control situations. A logical consideration of these ASMs can lead to a better understanding and a verification of the ASMs according to the aspired specification.

  19. A Framework For Enhancing Privacy In Location Based Services Using K-Anonymity Model

    Directory of Open Access Journals (Sweden)

    Jane Mugi

    2015-08-01

    Full Text Available Abstract This paper presents a framework for enhancing privacy in Location Based Services using K-anonymity model. Users of location based services have to reveal their location information in order to use these services however this has threatened the user privacy. K-anonymity approach has been studied extensively in various forms. However it is only effective when the user location is fixed. When a user moves and continuously sends their location information the location service provider can approximate user trajectory which poses a threat to the trajectory privacy of the user. This framework will ensure that user privacy is enhanced for both snapshot and continuous queries. The efficiency and effectiveness of the proposed framework was evaluated the results indicate that the proposed framework has high success rate and good run time performance.

  20. Effective online privacy mechanisms with persuasive communication

    OpenAIRE

    Coopamootoo, P L

    2016-01-01

    This thesis contributes to research by taking a social psychological perspective to managing privacy online. The thesis proposes to support the effort to form a mental model that is required to evaluate a context with regards to privacy attitudes or to ease the effort by biasing activation of privacy attitudes. Privacy being a behavioural concept, the human-computer interaction design plays a major role in supporting and contributing to end users’ ability to manage their privacy online. Howev...

  1. Forensic DNA phenotyping: Developing a model privacy impact assessment.

    Science.gov (United States)

    Scudder, Nathan; McNevin, Dennis; Kelty, Sally F; Walsh, Simon J; Robertson, James

    2018-05-01

    Forensic scientists around the world are adopting new technology platforms capable of efficiently analysing a larger proportion of the human genome. Undertaking this analysis could provide significant operational benefits, particularly in giving investigators more information about the donor of genetic material, a particularly useful investigative lead. Such information could include predicting externally visible characteristics such as eye and hair colour, as well as biogeographical ancestry. This article looks at the adoption of this new technology from a privacy perspective, using this to inform and critique the application of a Privacy Impact Assessment to this emerging technology. Noting the benefits and limitations, the article develops a number of themes that would influence a model Privacy Impact Assessment as a contextual framework for forensic laboratories and law enforcement agencies considering implementing forensic DNA phenotyping for operational use. Copyright © 2018 Elsevier B.V. All rights reserved.

  2. Model-driven Privacy Assessment in the Smart Grid

    Energy Technology Data Exchange (ETDEWEB)

    Knirsch, Fabian [Salzburg Univ. (Austria); Engel, Dominik [Salzburg Univ. (Austria); Neureiter, Christian [Salzburg Univ. (Austria); Frincu, Marc [Univ. of Southern California, Los Angeles, CA (United States); Prasanna, Viktor [Univ. of Southern California, Los Angeles, CA (United States)

    2015-02-09

    In a smart grid, data and information are transported, transmitted, stored, and processed with various stakeholders having to cooperate effectively. Furthermore, personal data is the key to many smart grid applications and therefore privacy impacts have to be taken into account. For an effective smart grid, well integrated solutions are crucial and for achieving a high degree of customer acceptance, privacy should already be considered at design time of the system. To assist system engineers in early design phase, frameworks for the automated privacy evaluation of use cases are important. For evaluation, use cases for services and software architectures need to be formally captured in a standardized and commonly understood manner. In order to ensure this common understanding for all kinds of stakeholders, reference models have recently been developed. In this paper we present a model-driven approach for the automated assessment of such services and software architectures in the smart grid that builds on the standardized reference models. The focus of qualitative and quantitative evaluation is on privacy. For evaluation, the framework draws on use cases from the University of Southern California microgrid.

  3. A privacy protection model to support personal privacy in relational databases.

    OpenAIRE

    2008-01-01

    The individual of today incessantly insists on more protection of his/her personal privacy than a few years ago. During the last few years, rapid technological advances, especially in the field of information technology, directed most attention and energy to the privacy protection of the Internet user. Research was done and is still being done covering a vast area to protect the privacy of transactions performed on the Internet. However, it was established that almost no research has been don...

  4. TRANSFoRm: a flexible zone model of a data privacy framework for Primary Care research.

    NARCIS (Netherlands)

    Kuchinke, W.; Veen, E.B. van; Delaney, B.C.; Verheij, R.; Taweel, A.; Ohmann, C.

    2011-01-01

    As part of the TRANSFoRm project a flexible zone model for data privacy in Primary Care research was developed. The model applies different privacy generating methods to different aspects of the research data flow and allows in this way for only minimal hindrance of research activities. This is

  5. A model-driven privacy compliance decision support for medical data sharing in Europe.

    Science.gov (United States)

    Boussi Rahmouni, H; Solomonides, T; Casassa Mont, M; Shiu, S; Rahmouni, M

    2011-01-01

    Clinical practitioners and medical researchers often have to share health data with other colleagues across Europe. Privacy compliance in this context is very important but challenging. Automated privacy guidelines are a practical way of increasing users' awareness of privacy obligations and help eliminating unintentional breaches of privacy. In this paper we present an ontology-plus-rules based approach to privacy decision support for the sharing of patient data across European platforms. We use ontologies to model the required domain and context information about data sharing and privacy requirements. In addition, we use a set of Semantic Web Rule Language rules to reason about legal privacy requirements that are applicable to a specific context of data disclosure. We make the complete set invocable through the use of a semantic web application acting as an interactive privacy guideline system can then invoke the full model in order to provide decision support. When asked, the system will generate privacy reports applicable to a specific case of data disclosure described by the user. Also reports showing guidelines per Member State may be obtained. The advantage of this approach lies in the expressiveness and extensibility of the modelling and inference languages adopted and the ability they confer to reason with complex requirements interpreted from high level regulations. However, the system cannot at this stage fully simulate the role of an ethics committee or review board.

  6. Privacy-Preserving Evaluation of Generalization Error and Its Application to Model and Attribute Selection

    Science.gov (United States)

    Sakuma, Jun; Wright, Rebecca N.

    Privacy-preserving classification is the task of learning or training a classifier on the union of privately distributed datasets without sharing the datasets. The emphasis of existing studies in privacy-preserving classification has primarily been put on the design of privacy-preserving versions of particular data mining algorithms, However, in classification problems, preprocessing and postprocessing— such as model selection or attribute selection—play a prominent role in achieving higher classification accuracy. In this paper, we show generalization error of classifiers in privacy-preserving classification can be securely evaluated without sharing prediction results. Our main technical contribution is a new generalized Hamming distance protocol that is universally applicable to preprocessing and postprocessing of various privacy-preserving classification problems, such as model selection in support vector machine and attribute selection in naive Bayes classification.

  7. A Knowledge Model Sharing Based Approach to Privacy-Preserving Data Mining

    OpenAIRE

    Hongwei Tian; Weining Zhang; Shouhuai Xu; Patrick Sharkey

    2012-01-01

    Privacy-preserving data mining (PPDM) is an important problem and is currently studied in three approaches: the cryptographic approach, the data publishing, and the model publishing. However, each of these approaches has some problems. The cryptographic approach does not protect privacy of learned knowledge models and may have performance and scalability issues. The data publishing, although is popular, may suffer from too much utility loss for certain types of data mining applications. The m...

  8. The Models of Applying Online Privacy Literacy Strategies: A Case Study of Instagram Girl Users

    Directory of Open Access Journals (Sweden)

    Abdollah Bicharanlou

    2017-09-01

    Full Text Available Social networks affect remarkably in the lives of virtual space users. These networks like most human relations involve compromising between self-disclosure and privacy protection. A process which is realized through improving privacy and empowering the user at the personal level. This study aimed to assess strategies based on online privacy literacy. In particular, strategies that Instagram young girls users should employ to achieve the optimum level of privacy. For this purpose, firstly the paradox of privacy, benefits and risks of self-disclosure are explained, then according to online privacy literacy, some social and technological strategies are introduced by which users can solve the “paradox of privacy.” In the result section, after describing the main benefits and risks of self-disclosure by girl users, the current models of using these social and technological strategies to solve the mentioned paradox are discussed. The research method is ethnography based on non-collaborative observation of Instagram pages and semi-structured interviews with 20 girl users of social networks.

  9. A Privacy Preservation Model for Health-Related Social Networking Sites

    Science.gov (United States)

    2015-01-01

    The increasing use of social networking sites (SNS) in health care has resulted in a growing number of individuals posting personal health information online. These sites may disclose users' health information to many different individuals and organizations and mine it for a variety of commercial and research purposes, yet the revelation of personal health information to unauthorized individuals or entities brings a concomitant concern of greater risk for loss of privacy among users. Many users join multiple social networks for different purposes and enter personal and other specific information covering social, professional, and health domains into other websites. Integration of multiple online and real social networks makes the users vulnerable to unintentional and intentional security threats and misuse. This paper analyzes the privacy and security characteristics of leading health-related SNS. It presents a threat model and identifies the most important threats to users and SNS providers. Building on threat analysis and modeling, this paper presents a privacy preservation model that incorporates individual self-protection and privacy-by-design approaches and uses the model to develop principles and countermeasures to protect user privacy. This study paves the way for analysis and design of privacy-preserving mechanisms on health-related SNS. PMID:26155953

  10. A Privacy Preservation Model for Health-Related Social Networking Sites.

    Science.gov (United States)

    Li, Jingquan

    2015-07-08

    The increasing use of social networking sites (SNS) in health care has resulted in a growing number of individuals posting personal health information online. These sites may disclose users' health information to many different individuals and organizations and mine it for a variety of commercial and research purposes, yet the revelation of personal health information to unauthorized individuals or entities brings a concomitant concern of greater risk for loss of privacy among users. Many users join multiple social networks for different purposes and enter personal and other specific information covering social, professional, and health domains into other websites. Integration of multiple online and real social networks makes the users vulnerable to unintentional and intentional security threats and misuse. This paper analyzes the privacy and security characteristics of leading health-related SNS. It presents a threat model and identifies the most important threats to users and SNS providers. Building on threat analysis and modeling, this paper presents a privacy preservation model that incorporates individual self-protection and privacy-by-design approaches and uses the model to develop principles and countermeasures to protect user privacy. This study paves the way for analysis and design of privacy-preserving mechanisms on health-related SNS.

  11. A standardised graphic method for describing data privacy frameworks in primary care research using a flexible zone model.

    Science.gov (United States)

    Kuchinke, Wolfgang; Ohmann, Christian; Verheij, Robert A; van Veen, Evert-Ben; Arvanitis, Theodoros N; Taweel, Adel; Delaney, Brendan C

    2014-12-01

    To develop a model describing core concepts and principles of data flow, data privacy and confidentiality, in a simple and flexible way, using concise process descriptions and a diagrammatic notation applied to research workflow processes. The model should help to generate robust data privacy frameworks for research done with patient data. Based on an exploration of EU legal requirements for data protection and privacy, data access policies, and existing privacy frameworks of research projects, basic concepts and common processes were extracted, described and incorporated into a model with a formal graphical representation and a standardised notation. The Unified Modelling Language (UML) notation was enriched by workflow and own symbols to enable the representation of extended data flow requirements, data privacy and data security requirements, privacy enhancing techniques (PET) and to allow privacy threat analysis for research scenarios. Our model is built upon the concept of three privacy zones (Care Zone, Non-care Zone and Research Zone) containing databases, data transformation operators, such as data linkers and privacy filters. Using these model components, a risk gradient for moving data from a zone of high risk for patient identification to a zone of low risk can be described. The model was applied to the analysis of data flows in several general clinical research use cases and two research scenarios from the TRANSFoRm project (e.g., finding patients for clinical research and linkage of databases). The model was validated by representing research done with the NIVEL Primary Care Database in the Netherlands. The model allows analysis of data privacy and confidentiality issues for research with patient data in a structured way and provides a framework to specify a privacy compliant data flow, to communicate privacy requirements and to identify weak points for an adequate implementation of data privacy. Copyright © 2014 Elsevier Ireland Ltd. All rights

  12. Determining the privacy policy deficiencies of health ICT applications through semi-formal modelling.

    Science.gov (United States)

    Croll, Peter R

    2011-02-01

    To ensure that patient confidentiality is securely maintained, health ICT applications that contain sensitive personal information demand comprehensive privacy policies. Determining the adequacy of these policies to meet legal conformity together with clinical users and patient expectation is demanding in practice. Organisations and agencies looking to analyse their Privacy and Security policies can benefit from guidance provided by outside entities such as the Privacy Office of their State or Government together with law firms and ICT specialists. The advice given is not uniform and often open to different interpretations. Of greater concern is the possibility of overlooking any important aspects that later result in a data breach. Based on three case studies, this paper considers whether a more formal approach to privacy analysis could be taken that would help identify the full coverage of a Privacy Impact Analysis and determine the deficiencies with an organisation's current policies and approach. A diagrammatic model showing the relationships between Confidentiality, Privacy, Trust, Security and Safety is introduced. First the validity of this model is determined by mapping it against the real-world case studies taken from three healthcare services that depend on ICT. Then, by using software engineering methods, a formal mapping of the relationships is undertaken to identify a full set of policies needed to satisfy the model. How effective this approach may prove as a generic method for deriving a comprehensive set of policies in health ICT applications is finally discussed. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.

  13. 12 CFR Appendix A to Part 573 - Model Privacy Form

    Science.gov (United States)

    2010-01-01

    ... use my personal information to market to me.” (4) Nonaffiliate opt-out. If the financial institution... market to me.” (h) Barcodes. A financial institution may elect to include a barcode and/or “tagline” (an... parties, state: “[name of financial institution] does not share with nonaffiliates so they can market to...

  14. 12 CFR Appendix A to Part 716 - Model Privacy Form

    Science.gov (United States)

    2010-01-01

    ... use my personal information to market to me.” (4) Nonaffiliate opt-out. If the financial institution... market to me.” (h) Barcodes. A financial institution may elect to include a barcode and/or “tagline” (an... parties, state: “[name of financial institution] does not share with nonaffiliates so they can market to...

  15. 12 CFR Appendix A to Part 40 - Model Privacy Form

    Science.gov (United States)

    2010-01-01

    ... use my personal information to market to me.” (4) Nonaffiliate opt-out. If the financial institution... market to me.” (h) Barcodes. A financial institution may elect to include a barcode and/or “tagline” (an... parties, state: “[name of financial institution] does not share with nonaffiliates so they can market to...

  16. 16 CFR Appendix A to Part 313 - Model Privacy Form

    Science.gov (United States)

    2010-01-01

    ... market to me.” (4) Nonaffiliate opt-out. If the financial institution shares personal information... market to me.” or “□ Do not use my personal information to market to me.” A financial institution that... personal information with other financial institutions to jointly market to me.” (h) Barcodes. A financial...

  17. 12 CFR Appendix A to Part 216 - Model Privacy Form

    Science.gov (United States)

    2010-01-01

    ... market to me.” (4) Nonaffiliate opt-out. If the financial institution shares personal information... market to me.” or “□ Do not use my personal information to market to me.” A financial institution that... personal information with other financial institutions to jointly market to me.” (h) Barcodes. A financial...

  18. 12 CFR Appendix A to Part 332 - Model Privacy Form

    Science.gov (United States)

    2010-01-01

    ... market to me.” (4) Nonaffiliate opt-out. If the financial institution shares personal information... market to me.” or “□ Do not use my personal information to market to me.” A financial institution that... personal information with other financial institutions to jointly market to me.” (h) Barcodes. A financial...

  19. A Game Theoretic Approach for Modeling Privacy Settings of an Online Social Network

    Directory of Open Access Journals (Sweden)

    Jundong Chen

    2014-05-01

    Full Text Available Users of online social networks often adjust their privacy settings to control how much information on their profiles is accessible to other users of the networks. While a variety of factors have been shown to affect the privacy strategies of these users, very little work has been done in analyzing how these factors influence each other and collectively contribute towards the users’ privacy strategies. In this paper, we analyze the influence of attribute importance, benefit, risk and network topology on the users’ attribute disclosure behavior by introducing a weighted evolutionary game model. Results show that: irrespective of risk, users aremore likely to reveal theirmost important attributes than their least important attributes; when the users’ range of influence is increased, the risk factor plays a smaller role in attribute disclosure; the network topology exhibits a considerable effect on the privacy in an environment with risk.

  20. Big data privacy protection model based on multi-level trusted system

    Science.gov (United States)

    Zhang, Nan; Liu, Zehua; Han, Hongfeng

    2018-05-01

    This paper introduces and inherit the multi-level trusted system model that solves the Trojan virus by encrypting the privacy of user data, and achieve the principle: "not to read the high priority hierarchy, not to write the hierarchy with low priority". Thus ensuring that the low-priority data privacy leak does not affect the disclosure of high-priority data privacy. This paper inherits the multi-level trustworthy system model of Trojan horse and divides seven different risk levels. The priority level 1˜7 represent the low to high value of user data privacy, and realize seven kinds of encryption with different execution efficiency Algorithm, the higher the priority, the greater the value of user data privacy, at the expense of efficiency under the premise of choosing a more encrypted encryption algorithm to ensure data security. For enterprises, the price point is determined by the unit equipment users to decide the length of time. The higher the risk sub-group algorithm, the longer the encryption time. The model assumes that users prefer the lower priority encryption algorithm to ensure efficiency. This paper proposes a privacy cost model for each of the seven risk subgroups. Among them, the higher the privacy cost, the higher the priority of the risk sub-group, the higher the price the user needs to pay to ensure the privacy of the data. Furthermore, by introducing the existing pricing model of economics and the human traffic model proposed by this paper and fluctuating with the market demand, this paper improves the price of unit products when the market demand is low. On the other hand, when the market demand increases, the profit of the enterprise will be guaranteed under the guidance of the government by reducing the price per unit of product. Then, this paper introduces the dynamic factors of consumers' mood and age to optimize. At the same time, seven algorithms are selected from symmetric and asymmetric encryption algorithms to define the enterprise

  1. Risk-Based Models for Managing Data Privacy in Healthcare

    Science.gov (United States)

    AL Faresi, Ahmed

    2011-01-01

    Current research in health care lacks a systematic investigation to identify and classify various sources of threats to information privacy when sharing health data. Identifying and classifying such threats would enable the development of effective information security risk monitoring and management policies. In this research I put the first step…

  2. Star-forming Filament Models

    International Nuclear Information System (INIS)

    Myers, Philip C.

    2017-01-01

    New models of star-forming filamentary clouds are presented in order to quantify their properties and to predict their evolution. These 2D axisymmetric models describe filaments that have no core, one low-mass core, and one cluster-forming core. They are based on Plummer-like cylinders and spheroids that are bounded by a constant-density surface of finite extent. In contrast to 1D Plummer-like models, they have specific values of length and mass, they approximate observed column density maps, and their distributions of column density ( N -pdfs) are pole-free. Each model can estimate the star-forming potential of a core-filament system by identifying the zone of gas dense enough to form low-mass stars and by counting the number of enclosed thermal Jeans masses. This analysis suggests that the Musca central filament may be near the start of its star-forming life, with enough dense gas to make its first ∼3 protostars, while the Coronet filament is near the midpoint of its star formation, with enough dense gas to add ∼8 protostars to its ∼20 known stars. In contrast, L43 appears to be near the end of its star-forming life, since it lacks enough dense gas to add any new protostars to the two young stellar objectsalready known.

  3. Star-forming Filament Models

    Energy Technology Data Exchange (ETDEWEB)

    Myers, Philip C., E-mail: pmyers@cfa.harvard.edu [Harvard-Smithsonian Center for Astrophysics, 60 Garden Street, Cambridge, MA 02138 (United States)

    2017-03-20

    New models of star-forming filamentary clouds are presented in order to quantify their properties and to predict their evolution. These 2D axisymmetric models describe filaments that have no core, one low-mass core, and one cluster-forming core. They are based on Plummer-like cylinders and spheroids that are bounded by a constant-density surface of finite extent. In contrast to 1D Plummer-like models, they have specific values of length and mass, they approximate observed column density maps, and their distributions of column density ( N -pdfs) are pole-free. Each model can estimate the star-forming potential of a core-filament system by identifying the zone of gas dense enough to form low-mass stars and by counting the number of enclosed thermal Jeans masses. This analysis suggests that the Musca central filament may be near the start of its star-forming life, with enough dense gas to make its first ∼3 protostars, while the Coronet filament is near the midpoint of its star formation, with enough dense gas to add ∼8 protostars to its ∼20 known stars. In contrast, L43 appears to be near the end of its star-forming life, since it lacks enough dense gas to add any new protostars to the two young stellar objectsalready known.

  4. A Randomized Response Model For Privacy Preserving Smart Metering

    Science.gov (United States)

    Cui, Lijuan; Que, Jialan; Choi, Dae-Hyun; Jiang, Xiaoqian; Cheng, Samuel; Xie, Le

    2012-01-01

    The adoption of smart meters may bring new privacy concerns to the general public. Given the fact that metering data of individual homes/factories is accumulated every 15 minutes, it is possible to infer the pattern of electricity consumption of individual users. In order to protect the privacy of users in a completely de-centralized setting (i.e., individuals do not communicate with one another), we propose a novel protocol, which allows individual meters to report the true electricity consumption reading with a pre-determinted probability. Load serving entities (LSE) can reconstruct the total electricity consumption of a region or a district through inference algorithm, but their ability of identifying individual users’ energy consumption pattern is significantly reduced. Using simulated data, we verify the feasibility of the proposed method and demonstrate performance advantages over existing approaches. PMID:23243488

  5. Models for Textile Composites Forming

    NARCIS (Netherlands)

    Akkerman, Remko; ten Thije, R.H.W.

    2009-01-01

    Drape of dry fabrics or prepregs was recognised as an important feature in composites forming operations from the start. In the 1950s the first mathematical models were developed based on purely kinematic arguments. The assumption of zero fibre strains and trellis deformations led to the socalled

  6. Development and Analyses of Privacy Management Models in Online Social Networks Based on Communication Privacy Management Theory

    Science.gov (United States)

    Lee, Ki Jung

    2013-01-01

    Online social networks (OSNs), while serving as an emerging means of communication, promote various issues of privacy. Users of OSNs encounter diverse occasions that lead to invasion of their privacy, e.g., published conversation, public revelation of their personally identifiable information, and open boundary of distinct social groups within…

  7. Role-task conditional-purpose policy model for privacy preserving data publishing

    Directory of Open Access Journals (Sweden)

    Rana Elgendy

    2017-12-01

    Full Text Available Privacy becomes a major concern for both consumers and enterprises; therefore many research efforts have been devoted to the development of privacy preserving technology. The challenge in data privacy is to share the data while assuring the protection of personal information. Data privacy includes assuring protection for both insider ad outsider threats even if the data is published. Access control can help to protect the data from outsider threats. Access control is defined as the process of mediating every request to resources and data maintained by a system and determining whether the request should be granted or denied. This can be enforced by a mechanism implementing regulations established by a security policy. In this paper, we present privacy preserving data publishing model based on integration of CPBAC, MD-TRBAC, PBFW, protection against database administrator technique inspired from oracle vault technique and benefits of anonymization technique to protect data when being published using k-anonymity. The proposed model meets the requirements of workflow and non-workflow system in enterprise environment. It is based on the characteristics of the conditional purposes, conditional roles, tasks, and policies. It guarantees the protection against insider threats such as database administrator. Finally it assures needed protection in case of publishing the data. Keywords: Database security, Access control, Data publishing, Anonymization

  8. A Model for Calculated Privacy and Trust in pHealth Ecosystems.

    Science.gov (United States)

    Ruotsalainen, Pekka; Blobel, Bernd

    2018-01-01

    A pHealth ecosystem is a community of service users and providers. It is also a dynamic socio-technical system. One of its main goals is to help users to maintain their personal health status. Another goal is to give economic benefit to stakeholders which use personal health information existing in the ecosystem. In pHealth ecosystems, a huge amount of health related data is collected and used by service providers such as data extracted from the regulated health record and information related to personal characteristics, genetics, lifestyle and environment. In pHealth ecosystems, there are different kinds of service providers such as regulated health care service providers, unregulated health service providers, ICT service providers, researchers and industrial organizations. This fact together with the multidimensional personal health data used raises serious privacy concerns. Privacy is a necessary enabler for successful pHealth, but it is also an elastic concept without any universally agreed definition. Regardless of what kind of privacy model is used in dynamic socio-technical systems, it is difficult for a service user to know the privacy level of services in real life situations. As privacy and trust are interrelated concepts, the authors have developed a hybrid solution where knowledge got from regulatory privacy requirements and publicly available privacy related documents is used for calculation of service providers' specific initial privacy value. This value is then used as an estimate for the initial trust score. In this solution, total trust score is a combination of recommended trust, proposed trust and initial trust. Initial privacy level is a weighted arithmetic mean of knowledge and user selected weights. The total trust score for any service provider in the ecosystem can be calculated deploying either a beta trust model or the Fuzzy trust calculation method. The prosed solution is easy to use and to understand, and it can be also automated. It is

  9. Model-based Assessment for Balancing Privacy Requirements and Operational Capabilities

    Energy Technology Data Exchange (ETDEWEB)

    Knirsch, Fabian [Salzburg Univ. (Austria); Engel, Dominik [Salzburg Univ. (Austria); Frincu, Marc [Univ. of Southern California, Los Angeles, CA (United States); Prasanna, Viktor [Univ. of Southern California, Los Angeles, CA (United States)

    2015-02-17

    The smart grid changes the way energy is produced and distributed. In addition both, energy and information is exchanged bidirectionally among participating parties. Therefore heterogeneous systems have to cooperate effectively in order to achieve a common high-level use case, such as smart metering for billing or demand response for load curtailment. Furthermore, a substantial amount of personal data is often needed for achieving that goal. Capturing and processing personal data in the smart grid increases customer concerns about privacy and in addition, certain statutory and operational requirements regarding privacy aware data processing and storage have to be met. An increase of privacy constraints, however, often limits the operational capabilities of the system. In this paper, we present an approach that automates the process of finding an optimal balance between privacy requirements and operational requirements in a smart grid use case and application scenario. This is achieved by formally describing use cases in an abstract model and by finding an algorithm that determines the optimum balance by forward mapping privacy and operational impacts. For this optimal balancing algorithm both, a numeric approximation and – if feasible – an analytic assessment are presented and investigated. The system is evaluated by applying the tool to a real-world use case from the University of Southern California (USC) microgrid.

  10. Privacy versus autonomy: a tradeoff model for smart home monitoring technologies.

    Science.gov (United States)

    Townsend, Daphne; Knoefel, Frank; Goubran, Rafik

    2011-01-01

    Smart homes are proposed as a new location for the delivery of healthcare services. They provide healthcare monitoring and communication services, by using integrated sensor network technologies. We validate a hypothesis regarding older adults' adoption of home monitoring technologies by conducting a literature review of articles studying older adults' attitudes and perceptions of sensor technologies. Using current literature to support the hypothesis, this paper applies the tradeoff model to decisions about sensor acceptance. Older adults are willing to trade privacy (by accepting a monitoring technology), for autonomy. As the information captured by the sensor becomes more intrusive and the infringement on privacy increases, sensors are accepted if the loss in privacy is traded for autonomy. Even video cameras, the most intrusive sensor type were accepted in exchange for the height of autonomy which is to remain in the home.

  11. Building trusted national identity management systems: Presenting the privacy concern-trust (PCT) model

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    This paper discusses the effect of trust and information privacy concerns on citizens’ attitude towards national identity management systems. We introduce the privacyconcerns- trust model, which shows the role of trust in mediating and moderating citizens’ attitude towards identity management...... systems. We adopted a qualitative research approach in our analysis of data that was gathered through a series of interviews and a stakeholder workshop in Ghana. Our findings indicate that, beyond the threshold level of trust, societal information privacy concern is low; hence, trust is high, thereby...

  12. Query Monitoring and Analysis for Database Privacy - A Security Automata Model Approach.

    Science.gov (United States)

    Kumar, Anand; Ligatti, Jay; Tu, Yi-Cheng

    2015-11-01

    Privacy and usage restriction issues are important when valuable data are exchanged or acquired by different organizations. Standard access control mechanisms either restrict or completely grant access to valuable data. On the other hand, data obfuscation limits the overall usability and may result in loss of total value. There are no standard policy enforcement mechanisms for data acquired through mutual and copyright agreements. In practice, many different types of policies can be enforced in protecting data privacy. Hence there is the need for an unified framework that encapsulates multiple suites of policies to protect the data. We present our vision of an architecture named security automata model (SAM) to enforce privacy-preserving policies and usage restrictions. SAM analyzes the input queries and their outputs to enforce various policies, liberating data owners from the burden of monitoring data access. SAM allows administrators to specify various policies and enforces them to monitor queries and control the data access. Our goal is to address the problems of data usage control and protection through privacy policies that can be defined, enforced, and integrated with the existing access control mechanisms using SAM. In this paper, we lay out the theoretical foundation of SAM, which is based on an automata named Mandatory Result Automata. We also discuss the major challenges of implementing SAM in a real-world database environment as well as ideas to meet such challenges.

  13. Privacy protection on the internet: The European model

    Directory of Open Access Journals (Sweden)

    Baltezarević Vesna

    2017-01-01

    Full Text Available The Internet has a huge impact on all areas of social activity. Everyday life, social interaction and economics are directed to new information and communication technologies. A positive aspect of the new technology is reflected in the fact that it has created a virtual space that has led to the elimination of the various barriers, which has enabled interaction and information exchange across the world. Inclusion in the virtual social network provides connectivity for communicators who are looking for space that allows them freedom of expression and connect them with new ' friends'. Because of the feeling of complete freedom and the absence of censorship on the network communicators leave many personal details and photos, without thinking about the possible abuses of privacy. Recording of the different incidents on the network has resulted in the need to take precaution measures, in order to protect the users and the rule of law, given that freedom on the network is only possible with the existence of an adequate system of safety and security. In this paper we deal with the problem of the protection of personal data of users of virtual social networks against malicious activity and abuse, with special reference to the activities of the European Union in an effort to regulate this area. The European Commission has concentrated on finding the best solutions to protect the user's virtual space for more than two decades, starting from 1995 until a directive on security of networks and information systems, which was adopted in the first half of 2016.

  14. Privacy driven internet ecosystem

    OpenAIRE

    Trinh, Tuan Anh; Gyarmati, Laszlo

    2012-01-01

    The dominant business model of today's Internet is built upon advertisements; users can access Internet services while the providers show ads to them. Although significant efforts have been made to model and analyze the economic aspects of this ecosystem, the heart of the current status quo, namely privacy, has not received the attention of the research community yet. Accordingly, we propose an economic model of the privacy driven Internet ecosystem where privacy is handled as an asset that c...

  15. Privacy Policy

    Science.gov (United States)

    ... Home → NLM Privacy Policy URL of this page: https://medlineplus.gov/privacy.html NLM Privacy Policy To ... out of cookies in the most popular browsers, http://www.usa.gov/optout_instructions.shtml. Please note ...

  16. Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking

    OpenAIRE

    Panaousis, Emmanouil; Laszka, Aron; Pohl, Johannes; Noack, Andreas; Alpcan, Tansu

    2016-01-01

    Nowadays, mobile users have a vast number of applications and services at their disposal. Each of these might impose some privacy threats on users' "Personally Identifiable Information" (PII). Location privacy is a crucial part of PII, and as such, privacy-aware users wish to maximize it. This privacy can be, for instance, threatened by a company, which collects users' traces and shares them with third parties. To maximize their location privacy, users can decide to get offline so that the co...

  17. Using medical history embedded in biometrics medical card for user identity authentication: privacy preserving authentication model by features matching.

    Science.gov (United States)

    Fong, Simon; Zhuang, Yan

    2012-01-01

    Many forms of biometrics have been proposed and studied for biometrics authentication. Recently researchers are looking into longitudinal pattern matching that based on more than just a singular biometrics; data from user's activities are used to characterise the identity of a user. In this paper we advocate a novel type of authentication by using a user's medical history which can be electronically stored in a biometric security card. This is a sequel paper from our previous work about defining abstract format of medical data to be queried and tested upon authentication. The challenge to overcome is preserving the user's privacy by choosing only the useful features from the medical data for use in authentication. The features should contain less sensitive elements and they are implicitly related to the target illness. Therefore exchanging questions and answers about a few carefully chosen features in an open channel would not easily or directly expose the illness, but yet it can verify by inference whether the user has a record of it stored in his smart card. The design of a privacy preserving model by backward inference is introduced in this paper. Some live medical data are used in experiments for validation and demonstration.

  18. Using Medical History Embedded in Biometrics Medical Card for User Identity Authentication: Privacy Preserving Authentication Model by Features Matching

    Directory of Open Access Journals (Sweden)

    Simon Fong

    2012-01-01

    Full Text Available Many forms of biometrics have been proposed and studied for biometrics authentication. Recently researchers are looking into longitudinal pattern matching that based on more than just a singular biometrics; data from user’s activities are used to characterise the identity of a user. In this paper we advocate a novel type of authentication by using a user’s medical history which can be electronically stored in a biometric security card. This is a sequel paper from our previous work about defining abstract format of medical data to be queried and tested upon authentication. The challenge to overcome is preserving the user’s privacy by choosing only the useful features from the medical data for use in authentication. The features should contain less sensitive elements and they are implicitly related to the target illness. Therefore exchanging questions and answers about a few carefully chosen features in an open channel would not easily or directly expose the illness, but yet it can verify by inference whether the user has a record of it stored in his smart card. The design of a privacy preserving model by backward inference is introduced in this paper. Some live medical data are used in experiments for validation and demonstration.

  19. Data Availability and Model Form

    NARCIS (Netherlands)

    Tavasszy, L.A.; Jong, G. de

    2013-01-01

    Data are essential for any empirical modelling effort. In freight transport, obtaining good data for modelling can be a challenge because of the difficulty to observe freight processes directly, the often proprietary nature of logistics data, and a relatively poor data acquisition infrastructure. In

  20. Practical Privacy Assessment

    DEFF Research Database (Denmark)

    Peen, Søren; Jansen, Thejs Willem; Jensen, Christian D.

    2008-01-01

    This chapter proposes a privacy assessment model called the Operational Privacy Assessment Model that includes organizational, operational and technical factors for the protection of personal data stored in an IT system. The factors can be evaluated in a simple scale so that not only the resulting...... graphical depiction can be easily created for an IT system, but graphical comparisons across multiple IT systems are also possible. Examples of factors presented in a Kiviat graph are also presented. This assessment tool may be used to standardize privacy assessment criteria, making it less painful...... for the management to assess privacy risks on their systems....

  1. Multiple operating models for data linkage: A privacy positive

    Directory of Open Access Journals (Sweden)

    Katrina Irvine

    2017-04-01

    Our data linkage centre will implement new operating models with cascading levels of data handling on behalf of custodians. Sharing or publication of empirical evidence on timeframes, efficiency and quality can provide useful inputs in the design of new operating models and assist with the development of stakeholder and public confidence.

  2. Data privacy for the smart grid

    CERN Document Server

    Herold, Rebecca

    2015-01-01

    The Smart Grid and PrivacyWhat Is the Smart Grid? Changes from Traditional Energy Delivery Smart Grid Possibilities Business Model Transformations Emerging Privacy Risks The Need for Privacy PoliciesPrivacy Laws, Regulations, and Standards Privacy-Enhancing Technologies New Privacy Challenges IOT Big Data What Is the Smart Grid?Market and Regulatory OverviewTraditional Electricity Business SectorThe Electricity Open Market Classifications of Utilities Rate-Making ProcessesElectricity Consumer

  3. A Survey of Privacy on Data Integration

    OpenAIRE

    Do Son, Thanh

    2015-01-01

    This survey is an integrated view of other surveys on privacy preserving for data integration. First, we review the database context and challenges and research questions. Second, we formulate the privacy problems for schema matching and data matching. Next, we introduce the elements of privacy models. Then, we summarize the existing privacy techniques and the analysis (proofs) of privacy guarantees. Finally, we describe the privacy frameworks and their applications.

  4. Multiscale friction modeling for sheet metal forming

    NARCIS (Netherlands)

    Hol, J.; Cid Alfaro, M.V.; de Rooij, Matthias B.; Meinders, Vincent T.; Felder, Eric; Montmitonnet, Pierre

    2010-01-01

    The most often used friction model for sheet metal forming simulations is the relative simple Coulomb friction model. This paper presents a more advanced friction model for large scale forming simulations based on the surface change on the micro-scale. The surface texture of a material changes when

  5. The Models of Applying Online Privacy Literacy Strategies: A Case Study of Instagram Girl Users

    OpenAIRE

    Abdollah Bicharanlou; Seyedeh farzaneh Siasi rad

    2017-01-01

    Social networks affect remarkably in the lives of virtual space users. These networks like most human relations involve compromising between self-disclosure and privacy protection. A process which is realized through improving privacy and empowering the user at the personal level. This study aimed to assess strategies based on online privacy literacy. In particular, strategies that Instagram young girls users should employ to achieve the optimum level of privacy. For this purpose, firstly the...

  6. Multiphysics modelling of the spray forming process

    International Nuclear Information System (INIS)

    Mi, J.; Grant, P.S.; Fritsching, U.; Belkessam, O.; Garmendia, I.; Landaberea, A.

    2008-01-01

    An integrated, multiphysics numerical model has been developed through the joint efforts of the University of Oxford (UK), University of Bremen (Germany) and Inasmet (Spain) to simulate the spray forming process. The integrated model consisted of four sub-models: (1) an atomization model simulating the fragmentation of a continuous liquid metal stream into droplet spray during gas atomization; (2) a droplet spray model simulating the droplet spray mass and enthalpy evolution in the gas flow field prior to deposition; (3) a droplet deposition model simulating droplet deposition, splashing and re-deposition behavior and the resulting preform shape and heat flow; and (4) a porosity model simulating the porosity distribution inside a spray formed ring preform. The model has been validated against experiments of the spray forming of large diameter IN718 Ni superalloy rings. The modelled preform shape, surface temperature and final porosity distribution showed good agreement with experimental measurements

  7. A standardised graphic method for describing data privacy frameworks in primary care research using a flexible zone model.

    NARCIS (Netherlands)

    Kuchinke, W.; Ohmann, C.; Verheij, R.A.; Veen, E.B. van; Arvanitis, T.N.; Taweel, A.; Delaney, B.C.

    2014-01-01

    Purpose: To develop a model describing core concepts and principles of data flow, data privacy and confidentiality, in a simple and flexible way, using concise process descriptions and a diagrammatic notation applied to research workflow processes. The model should help to generate robust data

  8. Privacy policies

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, S.; Hartog, den J.I.; Petkovic, M.; Jonker, W.

    2007-01-01

    Privacy is a prime concern in today’s information society. To protect the privacy of individuals, enterprises must follow certain privacy practices while collecting or processing personal data. In this chapter we look at the setting where an enterprise collects private data on its website, processes

  9. Privacy Policies

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro; den Hartog, Jeremy; Petkovic, M.; Jonker, W.; Jonker, Willem

    2007-01-01

    Privacy is a prime concern in today's information society. To protect the privacy of individuals, enterprises must follow certain privacy practices, while collecting or processing personal data. In this chapter we look at the setting where an enterprise collects private data on its website,

  10. Privacy in Social Networks

    CERN Document Server

    Zheleva, Elena

    2012-01-01

    This synthesis lecture provides a survey of work on privacy in online social networks (OSNs). This work encompasses concerns of users as well as service providers and third parties. Our goal is to approach such concerns from a computer-science perspective, and building upon existing work on privacy, security, statistical modeling and databases to provide an overview of the technical and algorithmic issues related to privacy in OSNs. We start our survey by introducing a simple OSN data model and describe common statistical-inference techniques that can be used to infer potentially sensitive inf

  11. Advanced friction modeling for sheet metal forming

    NARCIS (Netherlands)

    Hol, J.; Cid Alfaro, M.V.; de Rooij, Matthias B.; Meinders, Vincent T.

    2012-01-01

    The Coulomb friction model is frequently used for sheet metal forming simulations. This model incorporates a constant coefficient of friction and does not take the influence of important parameters such as contact pressure or deformation of the sheet material into account. This article presents a

  12. Advanced friction modeling in sheet metal forming

    NARCIS (Netherlands)

    Hol, J.; Cid Alfaro, M.V.; Meinders, Vincent T.; Huetink, Han

    2011-01-01

    The Coulomb friction model is frequently used for sheet metal forming simulations. This model incorporates a constant coefficient of friction and does not take the influence of important parameters such as contact pressure or deformation of the sheet material into account. This article presents a

  13. Hencky's model for elastomer forming process

    Science.gov (United States)

    Oleinikov, A. A.; Oleinikov, A. I.

    2016-08-01

    In the numerical simulation of elastomer forming process, Henckys isotropic hyperelastic material model can guarantee relatively accurate prediction of strain range in terms of large deformations. It is shown, that this material model prolongate Hooke's law from the area of infinitesimal strains to the area of moderate ones. New representation of the fourth-order elasticity tensor for Hencky's hyperelastic isotropic material is obtained, it possesses both minor symmetries, and the major symmetry. Constitutive relations of considered model is implemented into MSC.Marc code. By calculating and fitting curves, the polyurethane elastomer material constants are selected. Simulation of equipment for elastomer sheet forming are considered.

  14. A linear programming model for preserving privacy when disclosing patient spatial information for secondary purposes.

    Science.gov (United States)

    Jung, Ho-Won; El Emam, Khaled

    2014-05-29

    A linear programming (LP) model was proposed to create de-identified data sets that maximally include spatial detail (e.g., geocodes such as ZIP or postal codes, census blocks, and locations on maps) while complying with the HIPAA Privacy Rule's Expert Determination method, i.e., ensuring that the risk of re-identification is very small. The LP model determines the transition probability from an original location of a patient to a new randomized location. However, it has a limitation for the cases of areas with a small population (e.g., median of 10 people in a ZIP code). We extend the previous LP model to accommodate the cases of a smaller population in some locations, while creating de-identified patient spatial data sets which ensure the risk of re-identification is very small. Our LP model was applied to a data set of 11,740 postal codes in the City of Ottawa, Canada. On this data set we demonstrated the limitations of the previous LP model, in that it produces improbable results, and showed how our extensions to deal with small areas allows the de-identification of the whole data set. The LP model described in this study can be used to de-identify geospatial information for areas with small populations with minimal distortion to postal codes. Our LP model can be extended to include other information, such as age and gender.

  15. Opening More Data : A New Privacy Risk Scoring Model for Open Data

    NARCIS (Netherlands)

    Ali-Eldin, A.M.T.; Zuiderwijk-van Eijk, AMG; Janssen, M.F.W.H.A.

    2017-01-01

    While the opening of data has become a common practice for both governments and companies, many datasets
    are still not published since they might violate privacy regulations. The risk on privacy violations is a factor
    that often blocks the publication of data and results in a reserved

  16. Privacy and security perceptions of european citizens: A test of the trade-off model

    NARCIS (Netherlands)

    Friedewald, M.; Lieshout, M. van; Rung, S.; Ooms, M.; Ypma, J.

    2015-01-01

    This paper considers the relationship between privacy and security and, in particular, the traditional “trade-off” paradigm that argues that citizens might be willing to sacrifice some privacy for more security. Academics have long argued against the trade-off paradigm, but these arguments have

  17. 'Privacy lost - and found?' : the information value chain as a model to meet citizens' concerns

    NARCIS (Netherlands)

    van de Pas, John; van Bussel, Geert-Jan

    2015-01-01

    In this paper we explore the extent to which privacy enhancing technologies (PETs) could be effective in providing privacy to citizens. Rapid development of ubiquitous computing and ‘the internet of things’ are leading to Big Data and the application of Predictive Analytics, effectively merging the

  18. Genetic privacy.

    Science.gov (United States)

    Sankar, Pamela

    2003-01-01

    During the past 10 years, the number of genetic tests performed more than tripled, and public concern about genetic privacy emerged. The majority of states and the U.S. government have passed regulations protecting genetic information. However, research has shown that concerns about genetic privacy are disproportionate to known instances of information misuse. Beliefs in genetic determinacy explain some of the heightened concern about genetic privacy. Discussion of the debate over genetic testing within families illustrates the most recent response to genetic privacy concerns.

  19. Constitutive Modeling for Sheet Metal Forming

    International Nuclear Information System (INIS)

    Barlat, Frederic

    2005-01-01

    This paper reviews aspects of the plastic behaviour common in sheet metals. Macroscopic and microscopic phenomena occurring during plastic deformation are described succinctly. Constitutive models of plasticity suitable for applications to forming, are discussed in a very broad manner. Approaches to plastic anisotropy are described in a somewhat more detailed manner

  20. Advancing Material Models for Automotive Forming Simulations

    International Nuclear Information System (INIS)

    Vegter, H.; An, Y.; Horn, C.H.L.J. ten; Atzema, E.H.; Roelofsen, M.E.

    2005-01-01

    Simulations in automotive industry need more advanced material models to achieve highly reliable forming and springback predictions. Conventional material models implemented in the FEM-simulation models are not capable to describe the plastic material behaviour during monotonic strain paths with sufficient accuracy. Recently, ESI and Corus co-operate on the implementation of an advanced material model in the FEM-code PAMSTAMP 2G. This applies to the strain hardening model, the influence of strain rate, and the description of the yield locus in these models. A subsequent challenge is the description of the material after a change of strain path.The use of advanced high strength steels in the automotive industry requires a description of plastic material behaviour of multiphase steels. The simplest variant is dual phase steel consisting of a ferritic and a martensitic phase. Multiphase materials also contain a bainitic phase in addition to the ferritic and martensitic phase. More physical descriptions of strain hardening than simple fitted Ludwik/Nadai curves are necessary.Methods to predict plastic behaviour of single-phase materials use a simple dislocation interaction model based on the formed cells structures only. At Corus, a new method is proposed to predict plastic behaviour of multiphase materials have to take hard phases into account, which deform less easily. The resulting deformation gradients create geometrically necessary dislocations. Additional micro-structural information such as morphology and size of hard phase particles or grains is necessary to derive the strain hardening models for this type of materials.Measurements available from the Numisheet benchmarks allow these models to be validated. At Corus, additional measured values are available from cross-die tests. This laboratory test can attain critical deformations by large variations in blank size and processing conditions. The tests are a powerful tool in optimising forming simulations prior

  1. A Heuristic Model for Supporting Users’ Decision-Making in Privacy Disclosure for Recommendation

    Directory of Open Access Journals (Sweden)

    Hongchen Wu

    2018-01-01

    Full Text Available Privacy issues have become a major concern in the web of resource sharing, and users often have difficulty managing their information disclosure in the context of high-quality experiences from social media and Internet of Things. Recent studies have shown that users’ disclosure decisions may be influenced by heuristics from the crowds, leading to inconsistency in the disclosure volumes and reduction of the prediction accuracy. Therefore, an analysis of why this influence occurs and how to optimize the user experience is highly important. We propose a novel heuristic model that defines the data structures of items and participants in social media, utilizes a modified decision-tree classifier that can predict participants’ disclosures, and puts forward a correlation analysis for detecting disclosure inconsistences. The heuristic model is applied to real-time dataset to evaluate the behavioral effects. Decision-tree classifier and correlation analysis indeed prove that some participants’ behaviors in information disclosures became decreasingly correlated during item requesting. Participants can be “persuaded” to change their disclosure behaviors, and the users’ answers to the mildly sensitive items tend to be more variable and less predictable. Using this approach, recommender systems in social media can thus know the users better and provide service with higher prediction accuracy.

  2. Consolidation modelling for thermoplastic composites forming simulation

    Science.gov (United States)

    Xiong, H.; Rusanov, A.; Hamila, N.; Boisse, P.

    2016-10-01

    Pre-impregnated thermoplastic composites are widely used in the aerospace industry for their excellent mechanical properties, Thermoforming thermoplastic prepregs is a fast manufacturing process, the automotive industry has shown increasing interest in this manufacturing processes, in which the reconsolidation is an essential stage. The model of intimate contact is investigated as the consolidation model, compression experiments have been launched to identify the material parameters, several numerical tests show the influents of the temperature and pressure applied during processing. Finally, a new solid-shell prismatic element has been presented for the simulation of consolidation step in the thermoplastic composites forming process.

  3. Privacy Act

    Science.gov (United States)

    Learn about the Privacy Act of 1974, the Electronic Government Act of 2002, the Federal Information Security Management Act, and other information about the Environmental Protection Agency maintains its records.

  4. Attribute-Based Signcryption: Signer Privacy, Strong Unforgeability and IND-CCA Security in Adaptive-Predicates Model (Extended Version

    Directory of Open Access Journals (Sweden)

    Tapas Pandit

    2016-08-01

    Full Text Available Attribute-Based Signcryption (ABSC is a natural extension of Attribute-Based Encryption (ABE and Attribute-Based Signature (ABS, where one can have the message confidentiality and authenticity together. Since the signer privacy is captured in security of ABS, it is quite natural to expect that the signer privacy will also be preserved in ABSC. In this paper, first we propose an ABSC scheme which is weak existential unforgeable and IND-CCA secure in adaptive-predicates models and, achieves signer privacy. Then, by applying strongly unforgeable one-time signature (OTS, the above scheme is lifted to an ABSC scheme to attain strong existential unforgeability in adaptive-predicates model. Both the ABSC schemes are constructed on common setup, i.e the public parameters and key are same for both the encryption and signature modules. Our first construction is in the flavor of CtE&S paradigm, except one extra component that will be computed using both signature components and ciphertext components. The second proposed construction follows a new paradigm (extension of CtE&S , we call it “Commit then Encrypt and Sign then Sign” (CtE&S . The last signature is generated using a strong OTS scheme. Since, the non-repudiation is achieved by CtE&S paradigm, our systems also achieve the same.

  5. 48 CFR 52.224-2 - Privacy Act.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 2 2010-10-01 2010-10-01 false Privacy Act. 52.224-2... AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 52.224-2 Privacy... agency function: Privacy Act (APR 1984) (a) The Contractor agrees to— (1) Comply with the Privacy Act of...

  6. Concentrated Differential Privacy

    OpenAIRE

    Dwork, Cynthia; Rothblum, Guy N.

    2016-01-01

    We introduce Concentrated Differential Privacy, a relaxation of Differential Privacy enjoying better accuracy than both pure differential privacy and its popular "(epsilon,delta)" relaxation without compromising on cumulative privacy loss over multiple computations.

  7. Context-Aware Generative Adversarial Privacy

    Directory of Open Access Journals (Sweden)

    Chong Huang

    2017-12-01

    Full Text Available Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often lead to a significant reduction in utility. On the other hand, context-aware privacy solutions, such as information theoretic privacy, achieve an improved privacy-utility tradeoff, but assume that the data holder has access to dataset statistics. We circumvent these limitations by introducing a novel context-aware privacy framework called generative adversarial privacy (GAP. GAP leverages recent advancements in generative adversarial networks (GANs to allow the data holder to learn privatization schemes from the dataset itself. Under GAP, learning the privacy mechanism is formulated as a constrained minimax game between two players: a privatizer that sanitizes the dataset in a way that limits the risk of inference attacks on the individuals’ private variables, and an adversary that tries to infer the private variables from the sanitized dataset. To evaluate GAP’s performance, we investigate two simple (yet canonical statistical dataset models: (a the binary data model; and (b the binary Gaussian mixture model. For both models, we derive game-theoretically optimal minimax privacy mechanisms, and show that the privacy mechanisms learned from data (in a generative adversarial fashion match the theoretically optimal ones. This demonstrates that our framework can be easily applied in practice, even in the absence of dataset statistics.

  8. Context-Aware Generative Adversarial Privacy

    Science.gov (United States)

    Huang, Chong; Kairouz, Peter; Chen, Xiao; Sankar, Lalitha; Rajagopal, Ram

    2017-12-01

    Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often lead to a significant reduction in utility. On the other hand, context-aware privacy solutions, such as information theoretic privacy, achieve an improved privacy-utility tradeoff, but assume that the data holder has access to dataset statistics. We circumvent these limitations by introducing a novel context-aware privacy framework called generative adversarial privacy (GAP). GAP leverages recent advancements in generative adversarial networks (GANs) to allow the data holder to learn privatization schemes from the dataset itself. Under GAP, learning the privacy mechanism is formulated as a constrained minimax game between two players: a privatizer that sanitizes the dataset in a way that limits the risk of inference attacks on the individuals' private variables, and an adversary that tries to infer the private variables from the sanitized dataset. To evaluate GAP's performance, we investigate two simple (yet canonical) statistical dataset models: (a) the binary data model, and (b) the binary Gaussian mixture model. For both models, we derive game-theoretically optimal minimax privacy mechanisms, and show that the privacy mechanisms learned from data (in a generative adversarial fashion) match the theoretically optimal ones. This demonstrates that our framework can be easily applied in practice, even in the absence of dataset statistics.

  9. A Privacy Preservation Model for Health-Related Social Networking Sites

    OpenAIRE

    Li, Jingquan

    2015-01-01

    The increasing use of social networking sites (SNS) in health care has resulted in a growing number of individuals posting personal health information online. These sites may disclose users' health information to many different individuals and organizations and mine it for a variety of commercial and research purposes, yet the revelation of personal health information to unauthorized individuals or entities brings a concomitant concern of greater risk for loss of privacy among users. Many use...

  10. Public Auditing with Privacy Protection in a Multi-User Model of Cloud-Assisted Body Sensor Networks

    Science.gov (United States)

    Li, Song; Cui, Jie; Zhong, Hong; Liu, Lu

    2017-01-01

    Wireless Body Sensor Networks (WBSNs) are gaining importance in the era of the Internet of Things (IoT). The modern medical system is a particular area where the WBSN techniques are being increasingly adopted for various fundamental operations. Despite such increasing deployments of WBSNs, issues such as the infancy in the size, capabilities and limited data processing capacities of the sensor devices restrain their adoption in resource-demanding applications. Though providing computing and storage supplements from cloud servers can potentially enrich the capabilities of the WBSNs devices, data security is one of the prevailing issues that affects the reliability of cloud-assisted services. Sensitive applications such as modern medical systems demand assurance of the privacy of the users’ medical records stored in distant cloud servers. Since it is economically impossible to set up private cloud servers for every client, auditing data security managed in the remote servers has necessarily become an integral requirement of WBSNs’ applications relying on public cloud servers. To this end, this paper proposes a novel certificateless public auditing scheme with integrated privacy protection. The multi-user model in our scheme supports groups of users to store and share data, thus exhibiting the potential for WBSNs’ deployments within community environments. Furthermore, our scheme enriches user experiences by offering public verifiability, forward security mechanisms and revocation of illegal group members. Experimental evaluations demonstrate the security effectiveness of our proposed scheme under the Random Oracle Model (ROM) by outperforming existing cloud-assisted WBSN models. PMID:28475110

  11. Public Auditing with Privacy Protection in a Multi-User Model of Cloud-Assisted Body Sensor Networks.

    Science.gov (United States)

    Li, Song; Cui, Jie; Zhong, Hong; Liu, Lu

    2017-05-05

    Wireless Body Sensor Networks (WBSNs) are gaining importance in the era of the Internet of Things (IoT). The modern medical system is a particular area where the WBSN techniques are being increasingly adopted for various fundamental operations. Despite such increasing deployments of WBSNs, issues such as the infancy in the size, capabilities and limited data processing capacities of the sensor devices restrain their adoption in resource-demanding applications. Though providing computing and storage supplements from cloud servers can potentially enrich the capabilities of the WBSNs devices, data security is one of the prevailing issues that affects the reliability of cloud-assisted services. Sensitive applications such as modern medical systems demand assurance of the privacy of the users' medical records stored in distant cloud servers. Since it is economically impossible to set up private cloud servers for every client, auditing data security managed in the remote servers has necessarily become an integral requirement of WBSNs' applications relying on public cloud servers. To this end, this paper proposes a novel certificateless public auditing scheme with integrated privacy protection. The multi-user model in our scheme supports groups of users to store and share data, thus exhibiting the potential for WBSNs' deployments within community environments. Furthermore, our scheme enriches user experiences by offering public verifiability, forward security mechanisms and revocation of illegal group members. Experimental evaluations demonstrate the security effectiveness of our proposed scheme under the Random Oracle Model (ROM) by outperforming existing cloud-assisted WBSN models.

  12. Electrically assisted forming modeling and control

    CERN Document Server

    Salandro, Wesley A; Bunget, Cristina; Mears, Laine; Roth, John T

    2015-01-01

    Maximizing reader insights into the latest research findings and applications of Electrically-Assisted Forming (EAF) – whereby metals are formed under an electric current field – this book explains how such a process produces immediate improved formability of metals beyond the extent of thermal softening, and allows metals to be formed to greater elongation with lower mechanical energy as well as allowing for lightweight brittle metals such as magnesium and titanium to be formed without external heating or annealing, enabling the more effective use of these lightweight metals in design. Including case studies that illustrate and support the theoretical content and real-world applications of the techniques discussed, this book also serves to enrich readers understanding of the underlying theories that influence electro-plastic behaviour. The authors have extensive experience in studying Electrically-Assisted Forming and have written extensively on the topic with publications including experimental works, t...

  13. Data privacy foundations, new developments and the big data challenge

    CERN Document Server

    Torra, Vicenç

    2017-01-01

    This book offers a broad, cohesive overview of the field of data privacy. It discusses, from a technological perspective, the problems and solutions of the three main communities working on data privacy: statistical disclosure control (those with a statistical background), privacy-preserving data mining (those working with data bases and data mining), and privacy-enhancing technologies (those involved in communications and security) communities. Presenting different approaches, the book describes alternative privacy models and disclosure risk measures as well as data protection procedures for respondent, holder and user privacy. It also discusses specific data privacy problems and solutions for readers who need to deal with big data.

  14. Privacy transparency patterns

    NARCIS (Netherlands)

    Siljee B.I.J.

    2015-01-01

    This paper describes two privacy patterns for creating privacy transparency: the Personal Data Table pattern and the Privacy Policy Icons pattern, as well as a full overview of privacy transparency patterns. It is a first step in creating a full set of privacy design patterns, which will aid

  15. Trajectory data privacy protection based on differential privacy mechanism

    Science.gov (United States)

    Gu, Ke; Yang, Lihao; Liu, Yongzhi; Liao, Niandong

    2018-05-01

    In this paper, we propose a trajectory data privacy protection scheme based on differential privacy mechanism. In the proposed scheme, the algorithm first selects the protected points from the user’s trajectory data; secondly, the algorithm forms the polygon according to the protected points and the adjacent and high frequent accessed points that are selected from the accessing point database, then the algorithm calculates the polygon centroids; finally, the noises are added to the polygon centroids by the differential privacy method, and the polygon centroids replace the protected points, and then the algorithm constructs and issues the new trajectory data. The experiments show that the running time of the proposed algorithms is fast, the privacy protection of the scheme is effective and the data usability of the scheme is higher.

  16. 31 CFR 50.17 - Use of model forms.

    Science.gov (United States)

    2010-07-01

    ... PROGRAM Disclosures as Conditions for Federal Payment § 50.17 Use of model forms. (a) Policies in force on... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Use of model forms. 50.17 Section 50... requirement if it uses NAIC Model Disclosure Form No. 2. (2) An insurer that is required to make the...

  17. Model of separated form factors for unilamellar vesicles

    International Nuclear Information System (INIS)

    Kiselev, M.A.; Aksenov, V.L.; Lesieur, P.; Lombardo, D.; Kiselev, A.M.

    2001-01-01

    A new model of separated form factors is proposed for the evaluation of small-angle neutron scattering curves from large unilamellar vesicles. The validity of the model was checked via comparison with the model of a hollow sphere. The model of separated form factors and the hollow sphere model give a reasonable agreement in the evaluation of vesicle parameters

  18. Semantic Security: Privacy Definitions Revisited

    OpenAIRE

    Jinfei Liu; Li Xiong; Jun Luo

    2013-01-01

    In this paper we illustrate a privacy framework named Indistinguishabley Privacy. Indistinguishable privacy could be deemed as the formalization of the existing privacy definitions in privacy preserving data publishing as well as secure multi-party computation. We introduce three representative privacy notions in the literature, Bayes-optimal privacy for privacy preserving data publishing, differential privacy for statistical data release, and privacy w.r.t. semi-honest behavior in the secure...

  19. Big data privacy: The datafication of personal information

    DEFF Research Database (Denmark)

    Mai, Jens-Erik

    2016-01-01

    . This broadened approach will take our thinking beyond current preoccupation with whether or not individuals’ consent was secured for data collection to privacy issues arising from the development of new information on individuals' likely behavior through analysis of already collected data—this new information......In the age of big data we need to think differently about privacy. We need to shift our thinking from definitions of privacy (characteristics of privacy) to models of privacy (how privacy works). Moreover, in addition to the existing models of privacy—the surveillance model and capture model......—we need to also consider a new model: the datafication model presented in this article, wherein new personal information is deduced by employing predictive analytics on already-gathered data. These three models of privacy supplement each other; they are not competing understandings of privacy...

  20. The effect of the model posture on the forming quality in the CNC incremental forming

    International Nuclear Information System (INIS)

    Zhu, H; Zhang, W; Bai, J L; Yu, C; Xing, Y F

    2015-01-01

    Sheet rupture caused by a sheet metal thickness non-uniformity persists in CNC (Computer Numerical Control) incremental forming. Because the forming half cone angle is determined by the orientation of the model to be formed, so is the sheet metal's uniformity. The finite element analysis models for the two kinds of the postures of the model were established, and the digital simulation was conducted by using the ANSYS/LA-DYNA software. The effect of the model's posture on the sheet thickness distribution and the sheet thickness thinning rate were studied by comparing the simulation results of two kinds of the finite elements analyzes. (paper)

  1. Privacy and the Connected Society

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Khajuria, Samant; Skouby, Knud Erik

    The Vision of the 5G enabled connected society is highly based on the evolution and implementation of Internet of Things. This involves, amongst others, a significant raise in devices, sensors and communication in pervasive interconnections as well as cooperation amongst devices and entities across...... the society. Enabling the vision of the connected society, researchers point in the direction of security and privacy as areas to challenge the vision. By use of the Internet of Things reference model as well as the vision of the connected society, this paper identifies privacy of the individual with respect...... to three selected areas: Shopping, connected cars and online gaming. The paper concludes that privacy is a complexity within the connected society vision and that thee is a need for more privacy use cases to shed light on the challenge....

  2. Privacy og selvbeskrivelse

    DEFF Research Database (Denmark)

    Rosengaard, Hans Ulrik

    2015-01-01

    En beskrivelse af feltet for forskning i Privacy med særligt henblik på privacys betydning for muligheden for at styre sin egen selvbeskrivelse......En beskrivelse af feltet for forskning i Privacy med særligt henblik på privacys betydning for muligheden for at styre sin egen selvbeskrivelse...

  3. Privacy vs security

    CERN Document Server

    Stalla-Bourdillon, Sophie; Ryan, Mark D

    2014-01-01

    Securing privacy in the current environment is one of the great challenges of today's democracies. Privacy vs. Security explores the issues of privacy and security and their complicated interplay, from a legal and a technical point of view. Sophie Stalla-Bourdillon provides a thorough account of the legal underpinnings of the European approach to privacy and examines their implementation through privacy, data protection and data retention laws. Joshua Philips and Mark D. Ryan focus on the technological aspects of privacy, in particular, on today's attacks on privacy by the simple use of today'

  4. Topology Model of the Flow around a Submarine Hull Form

    Science.gov (United States)

    2015-12-01

    UNCLASSIFIED Topology Model of the Flow around a Submarine Hull Form S.-K. Lee Maritime Division Defence Science and Technology Group DST-Group–TR...3177 ABSTRACT A topology model constructed from surface-streamer visualisation describes the flow around a generic conventional submarine hull form at...pure yaw angles of 0 ◦, 10 ◦ and 18 ◦. The model is used to develop equations for sway-force and yaw-moment coefficients which relate to the hull - form

  5. Privacy Implications of Surveillance Systems

    DEFF Research Database (Denmark)

    Thommesen, Jacob; Andersen, Henning Boje

    2009-01-01

    This paper presents a model for assessing the privacy „cost‟ of a surveillance system. Surveillance systems collect and provide personal information or observations of people by means of surveillance technologies such as databases, video or location tracking. Such systems can be designed for vari......This paper presents a model for assessing the privacy „cost‟ of a surveillance system. Surveillance systems collect and provide personal information or observations of people by means of surveillance technologies such as databases, video or location tracking. Such systems can be designed...... for various purposes, even as a service for those being observed, but in any case they will to some degree invade their privacy. The model provided here can indicate how invasive any particular system may be – and be used to compare the invasiveness of different systems. Applying a functional approach......, the model is established by first considering the social function of privacy in everyday life, which in turn lets us determine which different domains will be considered as private, and finally identify the different types of privacy invasion. This underlying model (function – domain – invasion) then serves...

  6. Do Privacy Concerns Matter for Millennials?

    DEFF Research Database (Denmark)

    Fodor, Mark; Brem, Alexander

    2015-01-01

    data have raised the question, if location data are considered as sensitive data by users. Thus, we use two privacy concern models, namely Concern for Information Privacy (CFIP) and Internet Users’ Information Privacy Concerns (IUIPC) to find out. Our sample comprises of 235 individuals between 18...... and 34 years (Generation C) from Germany. The results of this study indicate that the second-order factor IUIPC showed better fit for the underlying data than CFIP did. Overall privacy concerns have been found to have an impact on behavioral intentions of users for LBS adoption. Furthermore, other risk...

  7. Electrochemical modeling of hydrogen storage in hydride-forming electrodes

    NARCIS (Netherlands)

    Ledovskikh, A.; Danilov, D.; Vermeulen, P.; Notten, P.H.L.

    2009-01-01

    An electrochemical kinetic model (EKM) is developed, describing the electrochemical hydrogen storage in hydride-forming materials under equilibrium conditions. This model is based on first principles of electrochemical reaction kinetics and statistical thermodynamics and describes the complex,

  8. Chou-Yang model and PHI form factor

    Energy Technology Data Exchange (ETDEWEB)

    Fazal-e-Aleem; Saleem, M.; Rafique, M.

    1988-03-01

    By using the deduced differential cross-section data for PHIp elastic scattering at 175 GeV/c in the Chou-Yang model, the PHI form factor has been computed and parametrized. Then in conjunction with the proton form factor this form factor is used in the pristine Chou-Yang model to obtain differential cross-section data at Fermilab energies. The theoretical results agree with the experimental measurements, endorsing the conjecture that the hadronic form factor of neutral particle is proportional to its magnetic form factor.

  9. BangA: An Efficient and Flexible Generalization-Based Algorithm for Privacy Preserving Data Publication

    Directory of Open Access Journals (Sweden)

    Adeel Anjum

    2017-01-01

    Full Text Available Privacy-Preserving Data Publishing (PPDP has become a critical issue for companies and organizations that would release their data. k-Anonymization was proposed as a first generalization model to guarantee against identity disclosure of individual records in a data set. Point access methods (PAMs are not well studied for the problem of data anonymization. In this article, we propose yet another approximation algorithm for anonymization, coined BangA, that combines useful features from Point Access Methods (PAMs and clustering. Hence, it achieves fast computation and scalability as a PAM, and very high quality thanks to its density-based clustering step. Extensive experiments show the efficiency and effectiveness of our approach. Furthermore, we provide guidelines for extending BangA to achieve a relaxed form of differential privacy which provides stronger privacy guarantees as compared to traditional privacy definitions.

  10. Formability models for warm sheet metal forming analysis

    Science.gov (United States)

    Jiang, Sen

    Several closed form models for the prediction of strain space sheet metal formability as a function of temperature and strain rate are proposed. The proposed models require only failure strain information from the uniaxial tension test at an elevated temperature setting and failure strain information from the traditionally defined strain space forming limit diagram at room temperature, thereby featuring the advantage of offering a full forming limit description without having to carry out expensive experimental studies for multiple modes of deformation under the elevated temperature. The Power law, Voce, and Johnson-Cook hardening models are considered along with the yield criterions of Hill's 48 and Logan-Hosford yield criteria. Acceptable correlations between the theory and experiment are reported for all the models under a plane strain condition. Among all the proposed models, the model featuring Johnson-Cook hardening model and Logan-Hosford yield behavior (LHJC model) was shown to best correlate with experiment. The sensitivity of the model with respect to various forming parameters is discussed. This work is significant to those aiming to incorporate closed-form formability models directly into numerical simulation programs for the purpose of design and analysis of products manufactured through the warm sheet metal forming process. An improvement based upon Swift's diffuse necking theory, is suggested in order to enhance the reliability of the model for biaxial stretch conditions. Theory relating to this improvement is provided in Appendix B.

  11. Exploratory Topology Modelling of Form-Active Hybrid Structures

    DEFF Research Database (Denmark)

    Holden Deleuran, Anders; Pauly, Mark; Tamke, Martin

    2016-01-01

    The development of novel form-active hybrid structures (FAHS) is impeded by a lack of modelling tools that allow for exploratory topology modelling of shaped assemblies. We present a flexible and real-time computational design modelling pipeline developed for the exploratory modelling of FAHS...... that enables designers and engineers to iteratively construct and manipulate form-active hybrid assembly topology on the fly. The pipeline implements Kangaroo2's projection-based methods for modelling hybrid structures consisting of slender beams and cable networks. A selection of design modelling sketches...

  12. Fuzzy Privacy Decision for Context-Aware Access Personal Information

    Institute of Scientific and Technical Information of China (English)

    ZHANG Qingsheng; QI Yong; ZHAO Jizhong; HOU Di; NIU Yujie

    2007-01-01

    A context-aware privacy protection framework was designed for context-aware services and privacy control methods about access personal information in pervasive environment. In the process of user's privacy decision, it can produce fuzzy privacy decision as the change of personal information sensitivity and personal information receiver trust. The uncertain privacy decision model was proposed about personal information disclosure based on the change of personal information receiver trust and personal information sensitivity. A fuzzy privacy decision information system was designed according to this model. Personal privacy control policies can be extracted from this information system by using rough set theory. It also solves the problem about learning privacy control policies of personal information disclosure.

  13. Privacy-invading technologies : safeguarding privacy, liberty & security in the 21st century

    NARCIS (Netherlands)

    Klitou, Demetrius

    2012-01-01

    With a focus on the growing development and deployment of the latest technologies that threaten privacy, the PhD dissertation argues that the US and UK legal frameworks, in their present form, are inadequate to defend privacy and other civil liberties against the intrusive capabilities of body

  14. An Examination of Individual’s Perceived Security and Privacy of the Internet in Malaysia and the Influence of This on Their Intention to Use E-Commerce: Using An Extension of the Technology Acceptance Model

    OpenAIRE

    Muniruddeen Lallmahamood

    2007-01-01

    This study explores the impact of perceived security and privacy on the intention to use Internet banking. An extended version of the technology acceptance model (TAM) is used to examine the above perception. A survey was distributed, the 187 responses mainly from the urban cities in Malaysia, hav e generally agreed that security and privacy are still the main concerns while using Internet banking. The research model explains over half of the variance of the intenti...

  15. A4 see-saw models and form dominance

    International Nuclear Information System (INIS)

    Chen, M-C; King, Stephen F.

    2009-01-01

    We introduce the idea of Form Dominance in the (type I) see-saw mechanism, according to which a particular right-handed neutrino mass eigenstate is associated with a particular physical neutrino mass eigenstate, leading to a form diagonalizable effective neutrino mass matrix. Form Dominance, which allows an arbitrary neutrino mass spectrum, may be regarded as a generalization of Constrained Sequential Dominance which only allows strongly hierarchical neutrino masses. We consider alternative implementations of the see-saw mechanism in minimal A 4 see-saw models and show that such models satisfy Form Dominance, leading to neutrino mass sum rules which predict closely spaced neutrino masses with a normal or inverted neutrino mass ordering. To avoid the partial cancellations inherent in such models we propose Natural Form Dominance, in which a different flavon is associated with each physical neutrino mass eigenstate.

  16. Is Electronic Privacy Achievable?

    National Research Council Canada - National Science Library

    Irvine, Cynthia E; Levin, Timothy E

    2000-01-01

    ... individuals. The purpose of this panel was to focus on how new technologies are affecting privacy. Technologies that might adversely affect privacy were identified by Rein Turn at previous symposia...

  17. Reference models for forming organisational or collaborative pedagogical best practices

    NARCIS (Netherlands)

    Lee, Chien-Sing; Koper, Rob; Kommers, Piet; Hedberg, John

    2008-01-01

    Lee, Chien-Sing, Koper, R., Kommers, P., & Hedberg, John (Eds.) (2008). Reference models for forming organisational or collaborative pedagogical best practices [special issue]. International Journal of Continuing Engineering Education and Life-Long Learning, 18(1).

  18. Privacy and Innovation

    OpenAIRE

    Avi Goldfarb; Catherine Tucker

    2011-01-01

    Information and communication technology now enables firms to collect detailed and potentially intrusive data about their customers both easily and cheaply. This means that privacy concerns are no longer limited to government surveillance and public figures' private lives. The empirical literature on privacy regulation shows that privacy regulation may affect the extent and direction of data-based innovation. We also show that the impact of privacy regulation can be extremely heterogeneous. T...

  19. Neuroethics and Brain Privacy

    DEFF Research Database (Denmark)

    Ryberg, Jesper

    2017-01-01

    An introduction is presented in which editor discusses various articles within the issue on topics including ethical challenges with importance of privacy for well-being, impact of brain-reading on mind privacy and neurotechnology.......An introduction is presented in which editor discusses various articles within the issue on topics including ethical challenges with importance of privacy for well-being, impact of brain-reading on mind privacy and neurotechnology....

  20. Privacy and internet services

    OpenAIRE

    Samec, Marek

    2010-01-01

    This thesis is focused on internet services user privacy. Goal of this thesis is to determine level of user awareness of how is their privacy approached while using internet services. Then suggest procedure to improve this awareness, or that will lead to better control of individual privacy. In theoretical part I analyze general and legislative approach to privacy, followed by analysis of behaviour of internet service users and providers. Part of this analysis deals with usage of web cookies ...

  1. Internet and Privacy

    OpenAIRE

    Al-Fadhli, Meshal Shehab

    2007-01-01

    The concept of privacy is hard to understand and is not easy to define, because this concept is linked with several dimensions. Internet Privacy is associated with the use of the Internet and most likely appointed under communications privacy, involving the user of the Internet’s personal information and activities, and the disclosure of them online. This essay is going to present the meaning of privacy and the implications of it for Internet users. Also, this essay will demonstrate some of t...

  2. Privacy and Library Records

    Science.gov (United States)

    Bowers, Stacey L.

    2006-01-01

    This paper summarizes the history of privacy as it relates to library records. It commences with a discussion of how the concept of privacy first originated through case law and follows the concept of privacy as it has affected library records through current day and the "USA PATRIOT Act."

  3. Privacy Verification Using Ontologies

    NARCIS (Netherlands)

    Kost, Martin; Freytag, Johann-Christoph; Kargl, Frank; Kung, Antonio

    2011-01-01

    As information systems extensively exchange information between participants, privacy concerns may arise from its potential misuse. A Privacy by Design (PbD) approach considers privacy requirements of different stakeholders during the design and the implementation of a system. Currently, a

  4. Overview of friction modelling in metal forming processes

    DEFF Research Database (Denmark)

    Nielsen, Chris Valentin; Bay, Niels Oluf

    2017-01-01

    In metal forming processes, friction between tool and workpiece is an important parameter influencing the material flow, surface quality and tool life. Theoretical models of friction in metal forming are based on analysis of the real contact area in tool-workpiece interfaces. Several research...... groups have studied and modelled the asperity flattening of workpiece material against tool surface in dry contact or in contact interfaces with only thin layers of lubrication with the aim to improve understanding of friction in metal forming. This paper aims at giving a review of the most important...... future work in order to advance further in modelling of real contact area in relation to implementation of frictional conditions existing finite element codes for simulation of metal forming processes. © 2017 The Authors. Published by Elsevier Ltd....

  5. Smartdata privacy meets evolutionary robotics

    CERN Document Server

    Harvey, Inman; Tomko, George

    2013-01-01

    Privacy by Design and the Promise of SmartData.- SmartData: the Need, the Goal and the Challenge.- Perspectives on Artificial Intelligence.- Context dependent information processing entails scale-free dynamics.- Philosophy and SmartData.- Relevance Realization and the Neurodynamics and Neural Connectivity of General Intelligence.- What Matters: Real Bodies and Virtual Worlds.- The development of autonomous virtual agents.- Patterns of Attractors in the "Brain"".- A Privacy-Enabled Mobile Computing Model Using Intelligent Cloud-Based Services.- Unconstraint the Population: the Benefits of Horiz

  6. Modeling of AlMg Sheet Forming at Elevated Temperatures

    NARCIS (Netherlands)

    van den Boogaard, Antonius H.; Bolt, P.; Werkhoven, R.

    2001-01-01

    The process limits of aluminum sheet forming processes can be improved by control-ling local flow behavior by means of elevated temperatures and temperature gradients. In order to accurately model the deep drawing or stretching of aluminum sheet at elevated temperatures, a model is required that

  7. Development of a Prototype Model-Form Uncertainty Knowledge Base

    Science.gov (United States)

    Green, Lawrence L.

    2016-01-01

    Uncertainties are generally classified as either aleatory or epistemic. Aleatory uncertainties are those attributed to random variation, either naturally or through manufacturing processes. Epistemic uncertainties are generally attributed to a lack of knowledge. One type of epistemic uncertainty is called model-form uncertainty. The term model-form means that among the choices to be made during a design process within an analysis, there are different forms of the analysis process, which each give different results for the same configuration at the same flight conditions. Examples of model-form uncertainties include the grid density, grid type, and solver type used within a computational fluid dynamics code, or the choice of the number and type of model elements within a structures analysis. The objectives of this work are to identify and quantify a representative set of model-form uncertainties and to make this information available to designers through an interactive knowledge base (KB). The KB can then be used during probabilistic design sessions, so as to enable the possible reduction of uncertainties in the design process through resource investment. An extensive literature search has been conducted to identify and quantify typical model-form uncertainties present within aerospace design. An initial attempt has been made to assemble the results of this literature search into a searchable KB, usable in real time during probabilistic design sessions. A concept of operations and the basic structure of a model-form uncertainty KB are described. Key operations within the KB are illustrated. Current limitations in the KB, and possible workarounds are explained.

  8. Rethinking the Privacy Calculus: On the Role of Dispositional Factors and Affect

    OpenAIRE

    Kehr, Flavius; Wentzel, Daniel; Mayer, Peter

    2013-01-01

    Existing research on information privacy has mostly relied on the privacy calculus model which views privacy-related decision making as a rational process where individuals weigh the anticipated risks of disclosing personal data against the potential benefits. However, scholars have recently challenged two basic propositions of the privacy calculus model. First, some authors have distinguished between general and situational factors in the context of privacy calculus and have argued that ...

  9. Efficient Dynamic Searchable Encryption with Forward Privacy

    Directory of Open Access Journals (Sweden)

    Etemad Mohammad

    2018-01-01

    Full Text Available Searchable symmetric encryption (SSE enables a client to perform searches over its outsourced encrypted files while preserving privacy of the files and queries. Dynamic schemes, where files can be added or removed, leak more information than static schemes. For dynamic schemes, forward privacy requires that a newly added file cannot be linked to previous searches. We present a new dynamic SSE scheme that achieves forward privacy by replacing the keys revealed to the server on each search. Our scheme is efficient and parallelizable and outperforms the best previous schemes providing forward privacy, and achieves competitive performance with dynamic schemes without forward privacy. We provide a full security proof in the random oracle model. In our experiments on the Wikipedia archive of about four million pages, the server takes one second to perform a search with 100,000 results.

  10. Social Media Users’ Legal Consciousness About Privacy

    Directory of Open Access Journals (Sweden)

    Katharine Sarikakis

    2017-02-01

    Full Text Available This article explores the ways in which the concept of privacy is understood in the context of social media and with regard to users’ awareness of privacy policies and laws in the ‘Post-Snowden’ era. In the light of presumably increased public exposure to privacy debates, generated partly due to the European “Right to be Forgotten” ruling and the Snowden revelations on mass surveillance, this article explores users’ meaning-making of privacy as a matter of legal dimension in terms of its violations and threats online and users’ ways of negotiating their Internet use, in particular social networking sites. Drawing on the concept of legal consciousness, this article explores through focus group interviews the ways in which social media users negotiate privacy violations and what role their understanding of privacy laws (or lack thereof might play in their strategies of negotiation. The findings are threefold: first, privacy is understood almost universally as a matter of controlling one’s own data, including information disclosure even to friends, and is strongly connected to issues about personal autonomy; second, a form of resignation with respect to control over personal data appears to coexist with a recognized need to protect one’s private data, while respondents describe conscious attempts to circumvent systems of monitoring or violation of privacy, and third, despite widespread coverage of privacy legal issues in the press, respondents’ concerns about and engagement in “self-protecting” tactics derive largely from being personally affected by violations of law and privacy.

  11. New developments in tribomechanical modeling of automotive sheet steel forming

    Science.gov (United States)

    Khandeparkar, Tushar; Chezan, Toni; van Beeck, Jeroen

    2018-05-01

    Forming of automotive sheet metal body panels is a complex process influenced by both the material properties and contact conditions in the forming tooling. Material properties are described by the material constitutive behavior and the material flow into the forming die can be described by the tribological system. This paper investigates the prediction accuracy of the forming process using the Tata Steel state of the art description of the material constitutive behavior in combination with different friction models. A cross-die experiment is used to investigate the accuracy of local deformation modes typically seen in automotive sheet metal forming operations. Results of advanced friction models as well as the classical Coulomb friction description are compared to the experimentally measured strain distribution and material draw-in. Two hot-dip galvanized coated steel forming grades were used for the investigations. The results show that the accuracy of the simulation is not guaranteed by the advanced friction models for the entire investigated blank holder force range, both globally and locally. A measurable difference between the calculated and measured local strains is seen for both studied models even in the case where the global indicator, i.e. the draw-in, is well predicted.

  12. δ-dependency for privacy-preserving XML data publishing.

    Science.gov (United States)

    Landberg, Anders H; Nguyen, Kinh; Pardede, Eric; Rahayu, J Wenny

    2014-08-01

    An ever increasing amount of medical data such as electronic health records, is being collected, stored, shared and managed in large online health information systems and electronic medical record systems (EMR) (Williams et al., 2001; Virtanen, 2009; Huang and Liou, 2007) [1-3]. From such rich collections, data is often published in the form of census and statistical data sets for the purpose of knowledge sharing and enabling medical research. This brings with it an increasing need for protecting individual people privacy, and it becomes an issue of great importance especially when information about patients is exposed to the public. While the concept of data privacy has been comprehensively studied for relational data, models and algorithms addressing the distinct differences and complex structure of XML data are yet to be explored. Currently, the common compromise method is to convert private XML data into relational data for publication. This ad hoc approach results in significant loss of useful semantic information previously carried in the private XML data. Health data often has very complex structure, which is best expressed in XML. In fact, XML is the standard format for exchanging (e.g. HL7 version 3(1)) and publishing health information. Lack of means to deal directly with data in XML format is inevitably a serious drawback. In this paper we propose a novel privacy protection model for XML, and an algorithm for implementing this model. We provide general rules, both for transforming a private XML schema into a published XML schema, and for mapping private XML data to the new privacy-protected published XML data. In addition, we propose a new privacy property, δ-dependency, which can be applied to both relational and XML data, and that takes into consideration the hierarchical nature of sensitive data (as opposed to "quasi-identifiers"). Lastly, we provide an implementation of our model, algorithm and privacy property, and perform an experimental analysis

  13. Privacy encounters in Teledialogue

    DEFF Research Database (Denmark)

    Andersen, Lars Bo; Bøge, Ask Risom; Danholt, Peter

    2017-01-01

    Privacy is a major concern when new technologies are introduced between public authorities and private citizens. What is meant by privacy, however, is often unclear and contested. Accordingly, this article utilises grounded theory to study privacy empirically in the research and design project...... Teledialogue aimed at introducing new ways for public case managers and placed children to communicate through IT. The resulting argument is that privacy can be understood as an encounter, that is, as something that arises between implicated actors and entails some degree of friction and negotiation....... An argument which is further qualified through the philosophy of Gilles Deleuze. The article opens with a review of privacy literature before continuing to present privacy as an encounter with five different foci: what technologies bring into the encounter; who is related to privacy by implication; what...

  14. Functional form diagnostics for Cox's proportional hazards model.

    Science.gov (United States)

    León, Larry F; Tsai, Chih-Ling

    2004-03-01

    We propose a new type of residual and an easily computed functional form test for the Cox proportional hazards model. The proposed test is a modification of the omnibus test for testing the overall fit of a parametric regression model, developed by Stute, González Manteiga, and Presedo Quindimil (1998, Journal of the American Statistical Association93, 141-149), and is based on what we call censoring consistent residuals. In addition, we develop residual plots that can be used to identify the correct functional forms of covariates. We compare our test with the functional form test of Lin, Wei, and Ying (1993, Biometrika80, 557-572) in a simulation study. The practical application of the proposed residuals and functional form test is illustrated using both a simulated data set and a real data set.

  15. Viscous and thermal modelling of thermoplastic composites forming process

    Science.gov (United States)

    Guzman, Eduardo; Liang, Biao; Hamila, Nahiene; Boisse, Philippe

    2016-10-01

    Thermoforming thermoplastic prepregs is a fast manufacturing process. It is suitable for automotive composite parts manufacturing. The simulation of thermoplastic prepreg forming is achieved by alternate thermal and mechanical analyses. The thermal properties are obtained from a mesoscopic analysis and a homogenization procedure. The forming simulation is based on a viscous-hyperelastic approach. The thermal simulations define the coefficients of the mechanical model that depend on the temperature. The forming simulations modify the boundary conditions and the internal geometry of the thermal analyses. The comparison of the simulation with an experimental thermoforming of a part representative of automotive applications shows the efficiency of the approach.

  16. Model of the extensive form game with the financial rewards

    OpenAIRE

    Erbsová, Markéta

    2009-01-01

    The aim of this Bachelor thesis is the analysis and presentation of the original extensive form game with the financial rewards, which is called Výměna (Exchange). In the theoretical part we will describe the basic concepts of Game Theory, especially the game in an explicit form. In the practical part we will deal with the game Výměna (Exchange) in itself. Determine the rules of the game, the graphic form of the game and formulate a mathematical model of the game. Individual parts of the game...

  17. Simulation of root forms using cellular automata model

    International Nuclear Information System (INIS)

    Winarno, Nanang; Prima, Eka Cahya; Afifah, Ratih Mega Ayu

    2016-01-01

    This research aims to produce a simulation program for root forms using cellular automata model. Stephen Wolfram in his book entitled “A New Kind of Science” discusses the formation rules based on the statistical analysis. In accordance with Stephen Wolfram’s investigation, the research will develop a basic idea of computer program using Delphi 7 programming language. To best of our knowledge, there is no previous research developing a simulation describing root forms using the cellular automata model compared to the natural root form with the presence of stone addition as the disturbance. The result shows that (1) the simulation used four rules comparing results of the program towards the natural photographs and each rule had shown different root forms; (2) the stone disturbances prevent the root growth and the multiplication of root forms had been successfully modeled. Therefore, this research had added some stones, which have size of 120 cells placed randomly in the soil. Like in nature, stones cannot be penetrated by plant roots. The result showed that it is very likely to further develop the program of simulating root forms by 50 variations

  18. Simulation of root forms using cellular automata model

    Energy Technology Data Exchange (ETDEWEB)

    Winarno, Nanang, E-mail: nanang-winarno@upi.edu; Prima, Eka Cahya [International Program on Science Education, Universitas Pendidikan Indonesia, Jl. Dr. Setiabudi no 229, Bandung40154 (Indonesia); Afifah, Ratih Mega Ayu [Department of Physics Education, Post Graduate School, Universitas Pendidikan Indonesia, Jl. Dr. Setiabudi no 229, Bandung40154 (Indonesia)

    2016-02-08

    This research aims to produce a simulation program for root forms using cellular automata model. Stephen Wolfram in his book entitled “A New Kind of Science” discusses the formation rules based on the statistical analysis. In accordance with Stephen Wolfram’s investigation, the research will develop a basic idea of computer program using Delphi 7 programming language. To best of our knowledge, there is no previous research developing a simulation describing root forms using the cellular automata model compared to the natural root form with the presence of stone addition as the disturbance. The result shows that (1) the simulation used four rules comparing results of the program towards the natural photographs and each rule had shown different root forms; (2) the stone disturbances prevent the root growth and the multiplication of root forms had been successfully modeled. Therefore, this research had added some stones, which have size of 120 cells placed randomly in the soil. Like in nature, stones cannot be penetrated by plant roots. The result showed that it is very likely to further develop the program of simulating root forms by 50 variations.

  19. Choose Privacy Week: Educate Your Students (and Yourself) about Privacy

    Science.gov (United States)

    Adams, Helen R.

    2016-01-01

    The purpose of "Choose Privacy Week" is to encourage a national conversation to raise awareness of the growing threats to personal privacy online and in day-to-day life. The 2016 Choose Privacy Week theme is "respecting individuals' privacy," with an emphasis on minors' privacy. A plethora of issues relating to minors' privacy…

  20. 75 FR 63703 - Privacy Act of 1974; Privacy Act Regulation

    Science.gov (United States)

    2010-10-18

    ... FEDERAL RESERVE SYSTEM 12 CFR Part 261a [Docket No. R-1313] Privacy Act of 1974; Privacy Act... implementing the Privacy Act of 1974 (Privacy Act). The primary changes concern the waiver of copying fees... records under the Privacy Act; the amendment of special procedures for the release of medical records to...

  1. A Taxonomy of Privacy Constructs for Privacy-Sensitive Robotics

    OpenAIRE

    Rueben, Matthew; Grimm, Cindy M.; Bernieri, Frank J.; Smart, William D.

    2017-01-01

    The introduction of robots into our society will also introduce new concerns about personal privacy. In order to study these concerns, we must do human-subject experiments that involve measuring privacy-relevant constructs. This paper presents a taxonomy of privacy constructs based on a review of the privacy literature. Future work in operationalizing privacy constructs for HRI studies is also discussed.

  2. Multi Scale Models for Flexure Deformation in Sheet Metal Forming

    Directory of Open Access Journals (Sweden)

    Di Pasquale Edmondo

    2016-01-01

    Full Text Available This paper presents the application of multi scale techniques to the simulation of sheet metal forming using the one-step method. When a blank flows over the die radius, it undergoes a complex cycle of bending and unbending. First, we describe an original model for the prediction of residual plastic deformation and stresses in the blank section. This model, working on a scale about one hundred times smaller than the element size, has been implemented in SIMEX, one-step sheet metal forming simulation code. The utilisation of this multi-scale modeling technique improves greatly the accuracy of the solution. Finally, we discuss the implications of this analysis on the prediction of springback in metal forming.

  3. Digital models: How can dental arch form be verified chairside?

    Directory of Open Access Journals (Sweden)

    Alana Tavares

    Full Text Available ABSTRACT Introduction: Plaster dental casts are routinely used during clinical practice to access maxillary dental arch form and assist on fabrication of individualized orthodontic archwires. Recently introduced, digital model technology may offer a limitation for the obtainment of a dental physical record. In this context, a tool for dental arch form assessment for chairside use is necessary when employing digital models. In this regard, paper print of the dental arch seems thus to be useful. Methods: In the present study, 37 lower arch models were used. Intercanine and intermolar widths and dental arch length measurements were performed and compared using plaster dental casts, digital models and paper print image of the models. Ortho Insight 3D scanner was employed for model digitalization. Results: No statistically significant differences were noted regarding the measurements performed on the plaster or digital models (p> 0.05. Paper print images, however, showed subestimated values for intercanine and intermolar widths and overestimated values for dental arch length. Despite being statistically significant (p< 0.001, the differences were considered clinically negligible. Conclusion: The present study suggests that paper print images obtained from digital models are clinically accurate and can be used as a tool for dental arch form assessment for fabrication of individualized orthodontic archwires.

  4. Digital models: How can dental arch form be verified chairside?

    Science.gov (United States)

    Tavares, Alana; Braga, Emanuel; de Araújo, Telma Martins

    2017-01-01

    ABSTRACT Introduction: Plaster dental casts are routinely used during clinical practice to access maxillary dental arch form and assist on fabrication of individualized orthodontic archwires. Recently introduced, digital model technology may offer a limitation for the obtainment of a dental physical record. In this context, a tool for dental arch form assessment for chairside use is necessary when employing digital models. In this regard, paper print of the dental arch seems thus to be useful. Methods: In the present study, 37 lower arch models were used. Intercanine and intermolar widths and dental arch length measurements were performed and compared using plaster dental casts, digital models and paper print image of the models. Ortho Insight 3D scanner was employed for model digitalization. Results: No statistically significant differences were noted regarding the measurements performed on the plaster or digital models (p> 0.05). Paper print images, however, showed subestimated values for intercanine and intermolar widths and overestimated values for dental arch length. Despite being statistically significant (p< 0.001), the differences were considered clinically negligible. Conclusion: The present study suggests that paper print images obtained from digital models are clinically accurate and can be used as a tool for dental arch form assessment for fabrication of individualized orthodontic archwires. PMID:29364382

  5. Security of statistical data bases: invasion of privacy through attribute correlational modeling

    Energy Technology Data Exchange (ETDEWEB)

    Palley, M.A.

    1985-01-01

    This study develops, defines, and applies a statistical technique for the compromise of confidential information in a statistical data base. Attribute Correlational Modeling (ACM) recognizes that the information contained in a statistical data base represents real world statistical phenomena. As such, ACM assumes correlational behavior among the database attributes. ACM proceeds to compromise confidential information through creation of a regression model, where the confidential attribute is treated as the dependent variable. The typical statistical data base may preclude the direct application of regression. In this scenario, the research introduces the notion of a synthetic data base, created through legitimate queries of the actual data base, and through proportional random variation of responses to these queries. The synthetic data base is constructed to resemble the actual data base as closely as possible in a statistical sense. ACM then applies regression analysis to the synthetic data base, and utilizes the derived model to estimate confidential information in the actual database.

  6. The Influence of Security Statement, Technical Protection, and Privacy on Satisfaction and Loyalty; A Structural Equation Modeling

    Science.gov (United States)

    Peikari, Hamid Reza

    Customer satisfaction and loyalty have been cited as the e-commerce critical success factors and various studies have been conducted to find the antecedent determinants of these concepts in the online transactions. One of the variables suggested by some studies is perceived security. However, these studies have referred to security from a broad general perspective and no attempts have been made to study the specific security related variables. This paper intends to study the influence on security statement and technical protection on satisfaction, loyalty and privacy. The data was collected from 337 respondents and after the reliability and validity tests, path analysis was applied to examine the hypotheses. The results suggest that loyalty is influenced by satisfaction and security statement and no empirical support was found for the influence on technical protection and privacy on loyalty. Moreover, it was found that security statement and technical protection have a positive significant influence on satisfaction while no significant effect was found for privacy. Furthermore, the analysis indicated that security statement have a positive significant influence on technical protection while technical protection was found to have a significant negative impact on perceived privacy.

  7. How to capture, model, and verify the knowledge of legal, security, and privacy experts: A pattern-based approach

    NARCIS (Netherlands)

    Compagna, L.; El Khoury, P.; Massacci, F.; Thomas, R.; Zannone, N.

    2007-01-01

    Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary security measures. Several frameworks have been proposed to deal with thii issue. For instance, purpose-based access control is

  8. Predicting user concerns about online privacy in Hong Kong.

    Science.gov (United States)

    Yao, Mike Z; Zhang, Jinguang

    2008-12-01

    Empirical studies on people's online privacy concerns have largely been conducted in the West. The global threat of privacy violations on the Internet calls for similar studies to be done in non-Western regions. To fill this void, the current study develops a path model to investigate the influence of people's Internet use-related factors, their beliefs in the right to privacy, and psychological need for privacy on Hong Kong people's concerns about online privacy. Survey responses from 332 university students were analyzed. Results from this study show that people's belief in the right to privacy was the most important predictor of their online privacy concerns. It also significantly mediated the relationship between people's psychological need for privacy and their concerns with privacy violations online. Moreover, while frequent use of the Internet may increase concerns about online privacy issues, Internet use diversity may actually reduce such worries. The final model, well supported by the observed data, successfully explained 25% of the variability in user concerns about online privacy.

  9. An Integrated Numerical Model of the Spray Forming Process

    DEFF Research Database (Denmark)

    Pryds, Nini; Hattel, Jesper; Pedersen, Trine Bjerre

    2002-01-01

    of the deposition model is accomplished using a 2D cylindrical heat flow model. This model is now coupled with an atomization model via a log-normal droplet size distribution. The coupling between the atomization and the deposition is accomplished by ensuring that the total droplet size distribution of the spray......In this paper, an integrated approach for modelling the entire spray forming process is presented. The basis for the analysis is a recently developed model which extents previous studies and includes the interaction between an array of droplets and the enveloping gas. The formulation...... is in fact the summation of 'local' droplet size distributions along the r-axis. A key parameter, which determines the yield and the shape of the deposit material, is the sticking efficiency. The sticking phenomenon is therefore incorporated into the deposition model. (C) 2002 Acta Materialia Inc. Published...

  10. AN EMPIRICAL EXAMINATION OF THE PRIVACY BEHAVIOUR WITH REFERENCE SOCIAL NETWORKING SITES

    OpenAIRE

    Tanvi Gupta*1, Mamta Rani2 & Ravneet Singh Bhandari3

    2018-01-01

    Purpose – The purpose of this paper is to propose and examine a privacy behaviour model in the context of Social networking factors (Indian scenario). The effects of key elements of SNS factors on perceived values of privacy behaviour were empirically determined. Design/methodology/approach – SNS is conceptualized as a multi-dimensional construct including emotional privacy, social privacy, personal privacy, and value. The investigated socio demographic factors included, age, gender, ethn...

  11. Hadron form factors in the constituent quark model

    International Nuclear Information System (INIS)

    Cardarelli, F.; Salme', G.; Simula, S.; Pace, E.

    1998-01-01

    Hadron electromagnetic form factors are evaluated in a light-front constituent quark model based on the eigenfunctions of a mass operator, including in the q-q interaction a confining term and a one-gluon-exchange term (OGE). The spin-dependent part of the interaction plays an essential role for obtaining both a proper fit of the experimental nucleon electromagnetic form factors and the faster than dipole decrease of the magnetic N-P 33 (1232) transition form factor. The effects of the D wave, produced by the tensor part of the OGE interaction, on the quadrupole and Coulomb N-P 33 (1232) transition form factors have been found to be negligible. (author)

  12. Form factors in the projected linear chiral sigma model

    International Nuclear Information System (INIS)

    Alberto, P.; Coimbra Univ.; Bochum Univ.; Ruiz Arriola, E.; Fiolhais, M.; Urbano, J.N.; Coimbra Univ.; Goeke, K.; Gruemmer, F.; Bochum Univ.

    1990-01-01

    Several nucleon form factors are computed within the framework of the linear chiral soliton model. To this end variational means and projection techniques applied to generalized hedgehog quark-boson Fock states are used. In this procedure the Goldberger-Treiman relation and a virial theorem for the pion-nucleon form factor are well fulfilled demonstrating the consistency of the treatment. Both proton and neutron charge form factors are correctly reproduced, as well as the proton magnetic one. The shapes of the neutron magnetic and of the axial form factors are good but their absolute values at the origin are too large. The slopes of all the form factors at zero momentum transfer are in good agreement with the experimental data. The pion-nucleon form factor exhibits to great extent a monopole shape with a cut-off mass of Λ=690 MeV. Electromagnetic form factors for the vertex γNΔ and the nucleon spin distribution are also evaluated and discussed. (orig.)

  13. Challenges in Modeling the Degradation of Ceramic Waste Forms

    Energy Technology Data Exchange (ETDEWEB)

    Devanathan, Ramaswami; Gao, Fei; Sun, Xin

    2011-09-01

    We identify the state of the art, gaps in current understanding, and key research needs in the area of modeling the long-term degradation of ceramic waste forms for nuclear waste disposition. The directed purpose of this report is to define a roadmap for Waste IPSC needs to extend capabilities of waste degradation to ceramic waste forms, which overlaps with the needs of the subconsinuum scale of FMM interests. The key knowledge gaps are in the areas of (i) methodology for developing reliable interatomic potentials to model the complex atomic-level interactions in waste forms; (ii) characterization of water interactions at ceramic surfaces and interfaces; and (iii) extension of atomic-level insights to the long time and distance scales relevant to the problem of actinide and fission product immobilization.

  14. Review of friction modeling in metal forming processes

    DEFF Research Database (Denmark)

    Nielsen, C.V.; Bay, N.

    2018-01-01

    Abstract In metal forming processes, friction between tool and workpiece is an important parameter influencing the material flow, surface quality and tool life. Theoretical models of friction in metal forming are based on analysis of the real contact area in tool-workpiece interfaces. Several...... research groups have studied and modeled the asperity flattening of workpiece material against tool surface in dry contact or in contact interfaces with only thin layers of lubrication with the aim to improve understanding of friction in metal forming. This paper aims at giving a review of the most...... conditions, normal pressure, sliding length and speed, temperature changes, friction on the flattened plateaus and deformation of the underlying material. The review illustrates the development in the understanding of asperity flattening and the methods of analysis....

  15. Challenges in Modeling the Degradation of Ceramic Waste Forms

    International Nuclear Information System (INIS)

    Devanathan, Ramaswami; Gao, Fei; Sun, Xin

    2011-01-01

    We identify the state of the art, gaps in current understanding, and key research needs in the area of modeling the long-term degradation of ceramic waste forms for nuclear waste disposition. The directed purpose of this report is to define a roadmap for Waste IPSC needs to extend capabilities of waste degradation to ceramic waste forms, which overlaps with the needs of the subconsinuum scale of FMM interests. The key knowledge gaps are in the areas of (i) methodology for developing reliable interatomic potentials to model the complex atomic-level interactions in waste forms; (ii) characterization of water interactions at ceramic surfaces and interfaces; and (iii) extension of atomic-level insights to the long time and distance scales relevant to the problem of actinide and fission product immobilization.

  16. Star-forming galaxy models: Blending star formation into TREESPH

    Science.gov (United States)

    Mihos, J. Christopher; Hernquist, Lars

    1994-01-01

    We have incorporated star-formation algorithms into a hybrid N-body/smoothed particle hydrodynamics code (TREESPH) in order to describe the star forming properties of disk galaxies over timescales of a few billion years. The models employ a Schmidt law of index n approximately 1.5 to calculate star-formation rates, and explicitly include the energy and metallicity feedback into the Interstellar Medium (ISM). Modeling the newly formed stellar population is achieved through the use of hybrid SPH/young star particles which gradually convert from gaseous to collisionless particles, avoiding the computational difficulties involved in creating new particles. The models are shown to reproduce well the star-forming properties of disk galaxies, such as the morphology, rate of star formation, and evolution of the global star-formation rate and disk gas content. As an example of the technique, we model an encounter between a disk galaxy and a small companion which gives rise to a ring galaxy reminiscent of the Cartwheel (AM 0035-35). The primary galaxy in this encounter experiences two phases of star forming activity: an initial period during the expansion of the ring, and a delayed phase as shocked material in the ring falls back into the central regions.

  17. Hacktivism 1-2-3: how privacy enhancing technologies change the face of anonymous hacktivism

    NARCIS (Netherlands)

    Bodó, B.

    2014-01-01

    This short essay explores how the notion of hacktivism changes due to easily accessible, military grade Privacy Enhancing Technologies (PETs). Privacy Enhancing Technologies, technological tools which provide anonymous communications and protect users from online surveillance enable new forms of

  18. The Factors of Forming the National HR-Management Model

    Directory of Open Access Journals (Sweden)

    Elena P. Kostenko

    2017-12-01

    Full Text Available There are some factors considered in this article, which influence the forming of national HR-management model. The group-forming criterion is the nature of factors, that determine the system of HR-management as a system of corporate culture values, norms and rules of organizational behavior, ways of realization some important managing functions and dominating approaches to make decisions. This article shows that the plurality of combinations in different factors leads to forming the unique HR-management model. The geoclimatic factor influences the principles of the labor organization (orientation primarily on individual or collective forms of labor, attitude to the management experience of other countries, attitude to resources, etc., the distribution of labor resources, the level of labor mobility, and the psychosocial type of employee. Models of man's labor behavior are constituted In the process of historical development. Attention is focused on the formation of a national HR-model, such as the conducted socio-economic policy, the characteristics of the institutional environment, economic goals and priorities of the country's development, the level of development and the nature of the national productive forces and economic structures. Much attention was paid to the analysis of the historically formed value system and labor traditions, which influence the approaches to HR-management. As far as religion influences the model of person’s inclusion in labor, motives of labor behavior, management culture of a certain employee, preferred payment etc., we examined how the main traditional religions (Christianity, Islam, Judaism, Buddhism, Confucianism, Hinduism influence the HR-management system in different countries.

  19. Designing Privacy for You : A User Centric Approach For Privacy

    OpenAIRE

    Senarath, Awanthika; Arachchilage, Nalin A. G.; Slay, Jill

    2017-01-01

    Privacy directly concerns the user as the data owner (data- subject) and hence privacy in systems should be implemented in a manner which concerns the user (user-centered). There are many concepts and guidelines that support development of privacy and embedding privacy into systems. However, none of them approaches privacy in a user- centered manner. Through this research we propose a framework that would enable developers and designers to grasp privacy in a user-centered manner and implement...

  20. Privacy-Preserving Restricted Boltzmann Machine

    Directory of Open Access Journals (Sweden)

    Yu Li

    2014-01-01

    Full Text Available With the arrival of the big data era, it is predicted that distributed data mining will lead to an information technology revolution. To motivate different institutes to collaborate with each other, the crucial issue is to eliminate their concerns regarding data privacy. In this paper, we propose a privacy-preserving method for training a restricted boltzmann machine (RBM. The RBM can be got without revealing their private data to each other when using our privacy-preserving method. We provide a correctness and efficiency analysis of our algorithms. The comparative experiment shows that the accuracy is very close to the original RBM model.

  1. Degradation modeling of the ANL ceramic waste form

    International Nuclear Information System (INIS)

    Fanning, T. H.; Morss, L. R.

    2000-01-01

    A ceramic waste form composed of glass-bonded sodalite is being developed at Argonne National Laboratory (ANL) for immobilization and disposition of the molten salt waste stream from the electrometallurgical treatment process for metallic DOE spent nuclear fuel. As part of the spent fuel treatment program at ANL, a model is being developed to predict the long-term release of radionuclides under repository conditions. Dissolution tests using dilute, pH-buffered solutions have been conducted at 40, 70, and 90 C to determine the temperature and pH dependence of the dissolution rate. Parameter values measured in these tests have been incorporated into the model, and preliminary repository performance assessment modeling has been completed. Results indicate that the ceramic waste form should be acceptable in a repository environment

  2. Regulating Online Data Privacy

    OpenAIRE

    Paul Reid

    2004-01-01

    With existing data protection laws proving inadequate in the fight to protect online data privacy and with the offline law of privacy in a state of change and uncertainty, the search for an alternative solution to the important problem of online data privacy should commence. With the inherent problem of jurisdiction that the Internet presents, such a solution is best coming from a multi-national body with the power to approximate laws in as many jurisdictions as possible, with a recognised au...

  3. Protecting genetic privacy.

    Science.gov (United States)

    Roche, P A; Annas, G J

    2001-05-01

    This article outlines the arguments for and against new rules to protect genetic privacy. We explain why genetic information is different to other sensitive medical information, why researchers and biotechnology companies have opposed new rules to protect genetic privacy (and favour anti-discrimination laws instead), and discuss what can be done to protect privacy in relation to genetic-sequence information and to DNA samples themselves.

  4. The disclosure of diagnosis codes can breach research participants' privacy.

    Science.gov (United States)

    Loukides, Grigorios; Denny, Joshua C; Malin, Bradley

    2010-01-01

    De-identified clinical data in standardized form (eg, diagnosis codes), derived from electronic medical records, are increasingly combined with research data (eg, DNA sequences) and disseminated to enable scientific investigations. This study examines whether released data can be linked with identified clinical records that are accessible via various resources to jeopardize patients' anonymity, and the ability of popular privacy protection methodologies to prevent such an attack. The study experimentally evaluates the re-identification risk of a de-identified sample of Vanderbilt's patient records involved in a genome-wide association study. It also measures the level of protection from re-identification, and data utility, provided by suppression and generalization. Privacy protection is quantified using the probability of re-identifying a patient in a larger population through diagnosis codes. Data utility is measured at a dataset level, using the percentage of retained information, as well as its description, and at a patient level, using two metrics based on the difference between the distribution of Internal Classification of Disease (ICD) version 9 codes before and after applying privacy protection. More than 96% of 2800 patients' records are shown to be uniquely identified by their diagnosis codes with respect to a population of 1.2 million patients. Generalization is shown to reduce further the percentage of de-identified records by less than 2%, and over 99% of the three-digit ICD-9 codes need to be suppressed to prevent re-identification. Popular privacy protection methods are inadequate to deliver a sufficiently protected and useful result when sharing data derived from complex clinical systems. The development of alternative privacy protection models is thus required.

  5. The role of privacy protection in healthcare information systems adoption.

    Science.gov (United States)

    Hsu, Chien-Lung; Lee, Ming-Ren; Su, Chien-Hui

    2013-10-01

    Privacy protection is an important issue and challenge in healthcare information systems (HISs). Recently, some privacy-enhanced HISs are proposed. Users' privacy perception, intention, and attitude might affect the adoption of such systems. This paper aims to propose a privacy-enhanced HIS framework and investigate the role of privacy protection in HISs adoption. In the proposed framework, privacy protection, access control, and secure transmission modules are designed to enhance the privacy protection of a HIS. An experimental privacy-enhanced HIS is also implemented. Furthermore, we proposed a research model extending the unified theory of acceptance and use of technology by considering perceived security and information security literacy and then investigate user adoption of a privacy-enhanced HIS. The experimental results and analyses showed that user adoption of a privacy-enhanced HIS is directly affected by social influence, performance expectancy, facilitating conditions, and perceived security. Perceived security has a mediating effect between information security literacy and user adoption. This study proposes several implications for research and practice to improve designing, development, and promotion of a good healthcare information system with privacy protection.

  6. Privacy in domestic environments

    OpenAIRE

    Radics, Peter J; Gracanin, Denis

    2011-01-01

    non-peer-reviewed While there is a growing body of research on privacy,most of the work puts the focus on information privacy. Physical and psychological privacy issues receive little to no attention. However, the introduction of technology into our lives can cause problems with regard to these aspects of privacy. This is especially true when it comes to our homes, both as nodes of our social life and places for relaxation. This paper presents the results of a study intended to captu...

  7. Privacy Training Program

    Science.gov (United States)

    Recognizing that training and awareness are critical to protecting agency Personally Identifiable Information (PII), the EPA is developing online training for privacy contacts in its programs and regions.

  8. Privacy-preserving heterogeneous health data sharing.

    Science.gov (United States)

    Mohammed, Noman; Jiang, Xiaoqian; Chen, Rui; Fung, Benjamin C M; Ohno-Machado, Lucila

    2013-05-01

    Privacy-preserving data publishing addresses the problem of disclosing sensitive data when mining for useful information. Among existing privacy models, ε-differential privacy provides one of the strongest privacy guarantees and makes no assumptions about an adversary's background knowledge. All existing solutions that ensure ε-differential privacy handle the problem of disclosing relational and set-valued data in a privacy-preserving manner separately. In this paper, we propose an algorithm that considers both relational and set-valued data in differentially private disclosure of healthcare data. The proposed approach makes a simple yet fundamental switch in differentially private algorithm design: instead of listing all possible records (ie, a contingency table) for noise addition, records are generalized before noise addition. The algorithm first generalizes the raw data in a probabilistic way, and then adds noise to guarantee ε-differential privacy. We showed that the disclosed data could be used effectively to build a decision tree induction classifier. Experimental results demonstrated that the proposed algorithm is scalable and performs better than existing solutions for classification analysis. The resulting utility may degrade when the output domain size is very large, making it potentially inappropriate to generate synthetic data for large health databases. Unlike existing techniques, the proposed algorithm allows the disclosure of health data containing both relational and set-valued data in a differentially private manner, and can retain essential information for discriminative analysis.

  9. Towards Industrial Application of Damage Models for Sheet Metal Forming

    Science.gov (United States)

    Doig, M.; Roll, K.

    2011-05-01

    Due to global warming and financial situation the demand to reduce the CO2-emission and the production costs leads to the permanent development of new materials. In the automotive industry the occupant safety is an additional condition. Bringing these arguments together the preferable approach for lightweight design of car components, especially for body-in-white, is the use of modern steels. Such steel grades, also called advanced high strength steels (AHSS), exhibit a high strength as well as a high formability. Not only their material behavior but also the damage behavior of AHSS is different compared to the performances of standard steels. Conventional methods for the damage prediction in the industry like the forming limit curve (FLC) are not reliable for AHSS. Physically based damage models are often used in crash and bulk forming simulations. The still open question is the industrial application of these models for sheet metal forming. This paper evaluates the Gurson-Tvergaard-Needleman (GTN) model and the model of Lemaitre within commercial codes with a goal of industrial application.

  10. Modeling the Spray Forming of H13 Steel Tooling

    Science.gov (United States)

    Lin, Yaojun; McHugh, Kevin M.; Zhou, Yizhang; Lavernia, Enrique J.

    2007-07-01

    On the basis of a numerical model, the temperature and liquid fraction of spray-formed H13 tool steel are calculated as a function of time. Results show that a preheated substrate at the appropriate temperature can lead to very low porosity by increasing the liquid fraction in the deposited steel. The calculated cooling rate can lead to a microstructure consisting of martensite, lower bainite, retained austenite, and proeutectoid carbides in as-spray-formed material. In the temperature range between the solidus and liquidus temperatures, the calculated temperature of the spray-formed material increases with increasing substrate preheat temperature, resulting in a very low porosity by increasing the liquid fraction of the deposited steel. In the temperature region where austenite decomposition occurs, the substrate preheat temperature has a negligible influence on the cooling rate of the spray-formed material. On the basis of the calculated results, it is possible to generate sufficient liquid fraction during spray forming by using a high growth rate of the deposit without preheating the substrate, and the growth rate of the deposit has almost no influence on the cooling rate in the temperature region of austenite decomposition.

  11. Baryon octet electromagnetic form factors in a confining NJL model

    Directory of Open Access Journals (Sweden)

    Manuel E. Carrillo-Serrano

    2016-08-01

    Full Text Available Electromagnetic form factors of the baryon octet are studied using a Nambu–Jona-Lasinio model which utilizes the proper-time regularization scheme to simulate aspects of colour confinement. In addition, the model also incorporates corrections to the dressed quarks from vector meson correlations in the t-channel and the pion cloud. Comparison with recent chiral extrapolations of lattice QCD results shows a remarkable level of consistency. For the charge radii we find the surprising result that rEp

  12. Calibrated and Interactive Modelling of Form-Active Hybrid Structures

    DEFF Research Database (Denmark)

    Quinn, Gregory; Holden Deleuran, Anders; Piker, Daniel

    2016-01-01

    Form-active hybrid structures (FAHS) couple two or more different structural elements of low self weight and low or negligible bending flexural stiffness (such as slender beams, cables and membranes) into one structural assembly of high global stiffness. They offer high load-bearing capacity...... software packages which introduce interruptions and data exchange issues in the modelling pipeline. The mechanical precision, stability and open software architecture of Kangaroo has facilitated the development of proof-of-concept modelling pipelines which tackle this challenge and enable powerful...... materially-informed sketching. Making use of a projection-based dynamic relaxation solver for structural analysis, explorative design has proven to be highly effective....

  13. Finite-lattice form factors in free-fermion models

    International Nuclear Information System (INIS)

    Iorgov, N; Lisovyy, O

    2011-01-01

    We consider the general Z 2 -symmetric free-fermion model on the finite periodic lattice, which includes as special cases the Ising model on the square and triangular lattices and the Z n -symmetric BBS τ (2) -model with n = 2. Translating Kaufman's fermionic approach to diagonalization of Ising-like transfer matrices into the language of Grassmann integrals, we determine the transfer matrix eigenvectors and observe that they coincide with the eigenvectors of a square lattice Ising transfer matrix. This allows us to find exact finite-lattice form factors of spin operators for the statistical model and the associated finite-length quantum chains, of which the most general is equivalent to the XY chain in a transverse field

  14. Privacy enhanced recommender system

    NARCIS (Netherlands)

    Erkin, Zekeriya; Erkin, Zekeriya; Beye, Michael; Veugen, Thijs; Lagendijk, Reginald L.

    2010-01-01

    Recommender systems are widely used in online applications since they enable personalized service to the users. The underlying collaborative filtering techniques work on user’s data which are mostly privacy sensitive and can be misused by the service provider. To protect the privacy of the users, we

  15. Information Privacy Revealed

    Science.gov (United States)

    Lavagnino, Merri Beth

    2013-01-01

    Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…

  16. Privacy Metrics and Boundaries

    NARCIS (Netherlands)

    L-F. Pau (Louis-François)

    2005-01-01

    textabstractThis paper aims at defining a set of privacy metrics (quantitative and qualitative) in the case of the relation between a privacy protector ,and an information gatherer .The aims with such metrics are: -to allow to assess and compare different user scenarios and their differences; for

  17. Electrochemical Corrosion Studies for Modeling Metallic Waste Form Release Rates

    International Nuclear Information System (INIS)

    Poineau, Frederic; Tamalis, Dimitri

    2016-01-01

    The isotope 99 Tc is an important fission product generated from nuclear power production. Because of its long half-life (t 1/2 = 2.13 ∙ 105 years) and beta-radiotoxicity (β - = 292 keV), it is a major concern in the long-term management of spent nuclear fuel. In the spent nuclear fuel, Tc is present as an alloy with Mo, Ru, Rh, and Pd called the epsilon-phase, the relative amount of which increases with fuel burn-up. In some separation schemes for spent nuclear fuel, Tc would be separated from the spent fuel and disposed of in a durable waste form. Technetium waste forms under consideration include metallic alloys, oxide ceramics and borosilicate glass. In the development of a metallic waste form, after separation from the spent fuel, Tc would be converted to the metal, incorporated into an alloy and the resulting waste form stored in a repository. Metallic alloys under consideration include Tc–Zr alloys, Tc–stainless steel alloys and Tc–Inconel alloys (Inconel is an alloy of Ni, Cr and iron which is resistant to corrosion). To predict the long-term behavior of the metallic Tc waste form, understanding the corrosion properties of Tc metal and Tc alloys in various chemical environments is needed, but efforts to model the behavior of Tc metallic alloys are limited. One parameter that should also be considered in predicting the long-term behavior of the Tc waste form is the ingrowth of stable Ru that occurs from the radioactive decay of 99 Tc ( 99 Tc → 99 Ru + β - ). After a geological period of time, significant amounts of Ru will be present in the Tc and may affect its corrosion properties. Studying the effect of Ru on the corrosion behavior of Tc is also of importance. In this context, we studied the electrochemical behavior of Tc metal, Tc-Ni alloys (to model Tc-Inconel alloy) and Tc-Ru alloys in acidic media. The study of Tc-U alloys has also been performed in order to better understand the nature of Tc in metallic spent fuel. Computational modeling

  18. Electrochemical Corrosion Studies for Modeling Metallic Waste Form Release Rates

    Energy Technology Data Exchange (ETDEWEB)

    Poineau, Frederic [Univ. of Nevada, Las Vegas, NV (United States); Tamalis, Dimitri [Florida Memorial Univ., Miami Gardens, FL (United States)

    2016-08-01

    The isotope 99Tc is an important fission product generated from nuclear power production. Because of its long half-life (t1/2 = 2.13 ∙ 105 years) and beta-radiotoxicity (β⁻ = 292 keV), it is a major concern in the long-term management of spent nuclear fuel. In the spent nuclear fuel, Tc is present as an alloy with Mo, Ru, Rh, and Pd called the epsilon-phase, the relative amount of which increases with fuel burn-up. In some separation schemes for spent nuclear fuel, Tc would be separated from the spent fuel and disposed of in a durable waste form. Technetium waste forms under consideration include metallic alloys, oxide ceramics and borosilicate glass. In the development of a metallic waste form, after separation from the spent fuel, Tc would be converted to the metal, incorporated into an alloy and the resulting waste form stored in a repository. Metallic alloys under consideration include Tc–Zr alloys, Tc–stainless steel alloys and Tc–Inconel alloys (Inconel is an alloy of Ni, Cr and iron which is resistant to corrosion). To predict the long-term behavior of the metallic Tc waste form, understanding the corrosion properties of Tc metal and Tc alloys in various chemical environments is needed, but efforts to model the behavior of Tc metallic alloys are limited. One parameter that should also be considered in predicting the long-term behavior of the Tc waste form is the ingrowth of stable Ru that occurs from the radioactive decay of 99Tc (99Tc → 99Ru + β⁻). After a geological period of time, significant amounts of Ru will be present in the Tc and may affect its corrosion properties. Studying the effect of Ru on the corrosion behavior of Tc is also of importance. In this context, we studied the electrochemical behavior of Tc metal, Tc-Ni alloys (to model Tc-Inconel alloy) and Tc-Ru alloys in acidic media. The study of Tc-U alloys has also been performed in order to better understand the

  19. Privacy under construction : A developmental perspective on privacy perception

    NARCIS (Netherlands)

    Steijn, W.M.P.; Vedder, A.H.

    2015-01-01

    We present a developmental perspective regarding the difference in perceptions toward privacy between young and old. Here, we introduce the notion of privacy conceptions, that is, the specific ideas that individuals have regarding what privacy actually is. The differences in privacy concerns often

  20. Privacy and security in teleradiology

    International Nuclear Information System (INIS)

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

  1. Trust and Privacy in Healthcare

    Science.gov (United States)

    Singleton, Peter; Kalra, Dipak

    This paper considers issues of trust and privacy in healthcare around increased data-sharing through Electronic Health Records (EHRs). It uses a model structured around different aspects of trust in the healthcare organisation’s reasons for greater data-sharing and their ability to execute EHR projects, particularly any associated confidentiality controls. It reflects the individual’s personal circumstances and attitude to use of health records.

  2. Privacy and security in teleradiology

    Energy Technology Data Exchange (ETDEWEB)

    Ruotsalainen, Pekka [National Institute for Health and Welfare, Helsinki (Finland)], E-mail: pekka.ruotsalainen@THL.fi

    2010-01-15

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

  3. Privacy and security in teleradiology.

    Science.gov (United States)

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper. Copyright (c) 2009 Elsevier Ireland Ltd. All rights reserved.

  4. Various forms of indexing HDMR for modelling multivariate classification problems

    Energy Technology Data Exchange (ETDEWEB)

    Aksu, Çağrı [Bahçeşehir University, Information Technologies Master Program, Beşiktaş, 34349 İstanbul (Turkey); Tunga, M. Alper [Bahçeşehir University, Software Engineering Department, Beşiktaş, 34349 İstanbul (Turkey)

    2014-12-10

    The Indexing HDMR method was recently developed for modelling multivariate interpolation problems. The method uses the Plain HDMR philosophy in partitioning the given multivariate data set into less variate data sets and then constructing an analytical structure through these partitioned data sets to represent the given multidimensional problem. Indexing HDMR makes HDMR be applicable to classification problems having real world data. Mostly, we do not know all possible class values in the domain of the given problem, that is, we have a non-orthogonal data structure. However, Plain HDMR needs an orthogonal data structure in the given problem to be modelled. In this sense, the main idea of this work is to offer various forms of Indexing HDMR to successfully model these real life classification problems. To test these different forms, several well-known multivariate classification problems given in UCI Machine Learning Repository were used and it was observed that the accuracy results lie between 80% and 95% which are very satisfactory.

  5. The future of privacy - Addressing singularities to identify bright-line rules that speak to us

    NARCIS (Netherlands)

    de Hert, Paul

    2016-01-01

    To apprehend the future of privacy I have opted for a controlled exploration of the issue, mainly taking the form of delamination: an exploration or assessment of privacy in a broad sense is not the object of this reflection. The focus is on technology-related privacy. Is the future of (some aspects

  6. Privacy and technology challenges for ubiquitous social networking

    DEFF Research Database (Denmark)

    Sapuppo, Antonio; Seet, Boon-Chong

    2015-01-01

    towards important challenges such as social sensing, enabling social networking and privacy protection. In this paper we firstly investigate the methods and technologies for acquisition of the relevant context for promotion of sociability among inhabitants of USN environments. Afterwards, we review...... architectures and techniques for enabling social interactions between participants. Finally, we identify privacy as the major challenge for networking in USN environments. Consequently, we depict design guidelines and review privacy protection models for facilitating personal information disclosure....

  7. Squashed Toric Sigma Models and Mock Modular Forms

    Science.gov (United States)

    Gupta, Rajesh Kumar; Murthy, Sameer

    2018-05-01

    We study a class of two-dimensional N}=(2,2)} sigma models called squashed toric sigma models, using their Gauged Linear Sigma Models (GLSM) description. These models are obtained by gauging the global {U(1)} symmetries of toric GLSMs and introducing a set of corresponding compensator superfields. The geometry of the resulting vacuum manifold is a deformation of the corresponding toric manifold in which the torus fibration maintains a constant size in the interior of the manifold, thus producing a neck-like region. We compute the elliptic genus of these models, using localization, in the case when the unsquashed vacuum manifolds obey the Calabi-Yau condition. The elliptic genera have a non-holomorphic dependence on the modular parameter {τ} coming from the continuum produced by the neck. In the simplest case corresponding to squashed {C / Z_{2 the elliptic genus is a mixed mock Jacobi form which coincides with the elliptic genus of the {N=(2,2)} {SL(2,R) / U(1)} cigar coset.

  8. Distributed privacy preserving data collection

    KAUST Repository

    Xue, Mingqiang

    2011-01-01

    We study the distributed privacy preserving data collection problem: an untrusted data collector (e.g., a medical research institute) wishes to collect data (e.g., medical records) from a group of respondents (e.g., patients). Each respondent owns a multi-attributed record which contains both non-sensitive (e.g., quasi-identifiers) and sensitive information (e.g., a particular disease), and submits it to the data collector. Assuming T is the table formed by all the respondent data records, we say that the data collection process is privacy preserving if it allows the data collector to obtain a k-anonymized or l-diversified version of T without revealing the original records to the adversary. We propose a distributed data collection protocol that outputs an anonymized table by generalization of quasi-identifier attributes. The protocol employs cryptographic techniques such as homomorphic encryption, private information retrieval and secure multiparty computation to ensure the privacy goal in the process of data collection. Meanwhile, the protocol is designed to leak limited but non-critical information to achieve practicability and efficiency. Experiments show that the utility of the anonymized table derived by our protocol is in par with the utility achieved by traditional anonymization techniques. © 2011 Springer-Verlag.

  9. Protecting patron privacy

    CERN Document Server

    Beckstrom, Matthew

    2015-01-01

    In a world where almost anyone with computer savvy can hack, track, and record the online activities of others, your library can serve as a protected haven for your visitors who rely on the Internet to conduct research-if you take the necessary steps to safeguard their privacy. This book shows you how to protect patrons' privacy while using the technology that your library provides, including public computers, Internet access, wireless networks, and other devices. Logically organized into two major sections, the first part of the book discusses why the privacy of your users is of paramount

  10. Web Security, Privacy & Commerce

    CERN Document Server

    Garfinkel, Simson

    2011-01-01

    Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that shut down popular web sites. Web Security, Privacy & Commerce goes behind the headlines, examines the major security risks facing us today, and explains how we can minimize them. It describes risks for Windows and Unix, Microsoft Internet Exp

  11. Comparative Approaches to Biobanks and Privacy.

    Science.gov (United States)

    Rothstein, Mark A; Knoppers, Bartha Maria; Harrell, Heather L

    2016-03-01

    Laws in the 20 jurisdictions studied for this project display many similar approaches to protecting privacy in biobank research. Although few have enacted biobank-specific legislation, many countries address biobanking within other laws. All provide for some oversight mechanisms for biobank research, even though the nature of that oversight varies between jurisdictions. Most have some sort of controlled access system in place for research with biobank specimens. While broad consent models facilitate biobanking, countries without national or federated biobanks have been slow to adopt broad consent. International guidelines have facilitated sharing and generally take a proportional risk approach, but many countries have provisions guiding international sharing and a few even limit international sharing. Although privacy laws may not prohibit international collaborations, the multi-prong approach to privacy unique to each jurisdiction can complicate international sharing. These symposium issues can serve as a resource for explaining the sometimes intricate privacy laws in each studied jurisdiction, outlining the key issues with regards to privacy and biobanking, and serving to describe a framework for the process of harmonization of privacy laws. © 2016 American Society of Law, Medicine & Ethics.

  12. FCJ-195 Privacy, Responsibility, and Human Rights Activism

    Directory of Open Access Journals (Sweden)

    Becky Kazansky

    2015-06-01

    Full Text Available In this article, we argue that many difficulties associated with the protection of digital privacy are rooted in the framing of privacy as a predominantly individual responsibility. We examine how models of privacy protection, such as Notice and Choice, contribute to the ‘responsibilisation’ of human rights activists who rely on the use of technologies for their work. We also consider how a group of human rights activists countered technology-mediated threats that this ‘responsibilisation’ causes by developing a collective approach to address their digital privacy and security needs. We conclude this article by discussing how technological tools used to maintain or counter the loss of privacy can be improved in order to support the privacy and digital security of human rights activists.

  13. Sex Differences in Attitudes towards Online Privacy and Anonymity among Israeli Students with Different Technical Backgrounds

    Science.gov (United States)

    Weinberger, Maor; Zhitomirsky-Geffet, Maayan; Bouhnik, Dan

    2017-01-01

    Introduction: In this exploratory study, we proposed an experimental framework to investigate and model male/female differences in attitudes towards online privacy and anonymity among Israeli students. Our aim was to comparatively model men and women's online privacy attitudes, and to assess the online privacy gender gap. Method: Various factors…

  14. Achieving Optimal Privacy in Trust-Aware Social Recommender Systems

    Science.gov (United States)

    Dokoohaki, Nima; Kaleli, Cihan; Polat, Huseyin; Matskin, Mihhail

    Collaborative filtering (CF) recommenders are subject to numerous shortcomings such as centralized processing, vulnerability to shilling attacks, and most important of all privacy. To overcome these obstacles, researchers proposed for utilization of interpersonal trust between users, to alleviate many of these crucial shortcomings. Till now, attention has been mainly paid to strong points about trust-aware recommenders such as alleviating profile sparsity or calculation cost efficiency, while least attention has been paid on investigating the notion of privacy surrounding the disclosure of individual ratings and most importantly protection of trust computation across social networks forming the backbone of these systems. To contribute to addressing problem of privacy in trust-aware recommenders, within this paper, first we introduce a framework for enabling privacy-preserving trust-aware recommendation generation. While trust mechanism aims at elevating recommender's accuracy, to preserve privacy, accuracy of the system needs to be decreased. Since within this context, privacy and accuracy are conflicting goals we show that a Pareto set can be found as an optimal setting for both privacy-preserving and trust-enabling mechanisms. We show that this Pareto set, when used as the configuration for measuring the accuracy of base collaborative filtering engine, yields an optimized tradeoff between conflicting goals of privacy and accuracy. We prove this concept along with applicability of our framework by experimenting with accuracy and privacy factors, and we show through experiment how such optimal set can be inferred.

  15. SmartPrivacy for the smart grid : embedding privacy into the design of electricity conservation

    Energy Technology Data Exchange (ETDEWEB)

    Cavoukian, A. [Ontario Information and Privacy Commissioner, Toronto, ON (Canada); Polonetsky, J.; Wolf, C. [Future of Privacy Forum, Washington, DC (United States)

    2009-11-15

    Modernization efforts are underway to make the current electrical grid smarter. The future of the Smart Grid will be capable of informing consumers of their day-to-day energy use, curbing greenhouse gas emissions, and reducing consumers' energy bills. However, the Smart Grid also brings with it the possibility of collecting detailed information on individual energy consumption use and patterns within peoples' homes. This paper discussed the Smart Grid and its benefits, as well as the questions that should be examined regarding privacy. The paper also outlined the concept of SmartPrivacy and discussed its application to the Smart Grid scenario. Privacy by design foundational principles and Smart Grid components were also presented in an appendix. It was concluded that the information collected on a Smart Grid will form a library of personal information. The mishandling of this information could be extremely invasive of consumer privacy. 46 refs., 1 fig., 2 appendices.

  16. A Bayesian statistical method for quantifying model form uncertainty and two model combination methods

    International Nuclear Information System (INIS)

    Park, Inseok; Grandhi, Ramana V.

    2014-01-01

    Apart from parametric uncertainty, model form uncertainty as well as prediction error may be involved in the analysis of engineering system. Model form uncertainty, inherently existing in selecting the best approximation from a model set cannot be ignored, especially when the predictions by competing models show significant differences. In this research, a methodology based on maximum likelihood estimation is presented to quantify model form uncertainty using the measured differences of experimental and model outcomes, and is compared with a fully Bayesian estimation to demonstrate its effectiveness. While a method called the adjustment factor approach is utilized to propagate model form uncertainty alone into the prediction of a system response, a method called model averaging is utilized to incorporate both model form uncertainty and prediction error into it. A numerical problem of concrete creep is used to demonstrate the processes for quantifying model form uncertainty and implementing the adjustment factor approach and model averaging. Finally, the presented methodology is applied to characterize the engineering benefits of a laser peening process

  17. National Privacy Research Strategy

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — On July 1, NITRD released the National Privacy Research Strategy. Research agencies across government participated in the development of the strategy, reviewing...

  18. Cybersecurity and Privacy

    DEFF Research Database (Denmark)

    he huge potential in future connected services has as a precondition that privacy and security needs are dealt with in order for new services to be accepted. This issue is increasingly on the agenda both at the company and at individual level. Cybersecurity and Privacy – bridging the gap addresses...... two very complex fields of the digital world, i.e., Cybersecurity and Privacy. These multifaceted, multidisciplinary and complex issues are usually understood and valued differently by different individuals, data holders and legal bodies. But a change in one field immediately affects the others....... Policies, frameworks, strategies, laws, tools, techniques, and technologies – all of these are tightly interwoven when it comes to security and privacy. This book is another attempt to bridge the gap between the industry and academia. The book addresses the views from academia and industry on the subject...

  19. Privacy for Sale?

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Sørensen, Jannick Kirk; Khajuria, Samant

    Data brokers have become central players in the collection online of private user data. Data brokers’ activities are however not very transparent or even known by users. Many users regard privacy a central element when they use online services. Based on 12 short interviews with users, this paper...... analyses how users perceive the concept of online privacy in respect to data brokers col- lection of private data, and particularly novel services that offer users the possi- bility to sell their private data. Two groups of users are identified: Those who are considering selling their data under specific...... conditions, and those who reject the idea completely. Based on the literature we identify two positions to privacy either as an instrumental good, or as an intrinsic good. The paper positions vari- ous user perceptions on privacy that are relevant for future service develop- ment....

  20. The pion form factor within the hidden local symmetry model

    International Nuclear Information System (INIS)

    Benayoun, M.; David, P.; DelBuono, L.; Leruste, P.; O'Connell, H.B.

    2003-01-01

    We analyze a pion form factor formulation which fulfills the Analyticity requirement within the Hidden Local Symmetry (HLS) Model. This implies an s-dependent dressing of the ρ-γ VMD coupling and an account of several coupled channels. The corresponding function F π (s) provides nice fits of the pion form factor data from s=-0.25 to s=1 GeV 2 . It is shown that the coupling to KK has little effect, while ωπ 0 improves significantly the fit probability below the φ mass. No need for additional states like ρ(1450) shows up in this invariant-mass range. All parameters, except for the subtraction polynomial coefficients, are fixed from the rest of the HLS phenomenology. The fits show consistency with the expected behaviour of F π (s) at s=0 up to O(s 2 ) and with the phase shift data on δ 1 1 (s) from threshold to somewhat above the φ mass. The ω sector is also examined in relation with recent data from CMD-2. (orig.)

  1. Certificate Transparency with Privacy

    Directory of Open Access Journals (Sweden)

    Eskandarian Saba

    2017-10-01

    Full Text Available Certificate transparency (CT is an elegant mechanism designed to detect when a certificate authority (CA has issued a certificate incorrectly. Many CAs now support CT and it is being actively deployed in browsers. However, a number of privacy-related challenges remain. In this paper we propose practical solutions to two issues. First, we develop a mechanism that enables web browsers to audit a CT log without violating user privacy. Second, we extend CT to support non-public subdomains.

  2. Culture, Privacy Conception and Privacy Concern: Evidence from Europe before PRISM

    OpenAIRE

    Omrani, Nessrine; Soulié, Nicolas

    2017-01-01

    This article analyses individuals’ online privacy concerns between cultural country groups. We use a dataset of more than 14 000 Internet users collected by the European Union in 2010 in 26 EU countries. We use a probit model to examine the variables associated with the probability of being concerned about privacy, in order to draw policy and regulatory implications. The results show that women and poor people are more concerned than their counterparts. People who often use Internet are not p...

  3. Modeling corrosion and constituent release from a metal waste form

    International Nuclear Information System (INIS)

    Bauer, T. H.; Fink, J. K.; Abraham, D. P.; Johnson, I.; Johnson, S. G.; Wigeland, R. A.

    2000-01-01

    Several ANL ongoing experimental programs have measured metal waste form (MWF) corrosion and constituent release. Analysis of this data has initiated development of a consistent and quantitative phenomenology of uniform aqueous MWF corrosion. The effort so far has produced a preliminary fission product and actinide release model based on measured corrosion rates and calibrated by immersion test data for a 90 C J-13 and concentrated J-13 solution environment over 1-2 year exposure times. Ongoing immersion tests of irradiated and unirradiated MWF samples using more aggressive test conditions and improved tracking of actinides will serve to further validate, modify, and expand the application base of the preliminary model-including effects of other corrosion mechanisms. Sample examination using both mechanical and spectrographic techniques will better define both the nature and durability of the protective barrier layer. It is particularly important to assess whether the observations made with J-13 solution at 900 C persist under more aggressive conditions. For example, all the multiplicative factors in Table 1 implicitly assume the presence of protective barriers. Under sufficiently aggressive test conditions, such protective barriers may very well be altered or even eliminated

  4. Recommendations for the Sharing Economy: Safeguarding Privacy

    NARCIS (Netherlands)

    Ranzini, G.; Kusber, Nina; Vermeulen, I.E.; Etter, Michael

    2018-01-01

    his report, ‘Recommendations: Privacy’, forms one element of a European Union Horizon 2020 Research Project on the sharing economy: Ps2Share ‘Participation, Privacy, and Power in the Sharing Economy’. The study is undertaken within the scope of the European Union’s Horizon 2020 research and

  5. E-Commerce and Privacy: Conflict and Opportunity.

    Science.gov (United States)

    Farah, Badie N.; Higby, Mary A.

    2001-01-01

    Electronic commerce has intensified conflict between businesses' need to collect data and customers' desire to protect privacy. Web-based privacy tools and legislation could add to the costs of e-commerce and reduce profitability. Business models not based on profiling customers may be needed. (SK)

  6. Microscopic models for hadronic form factors and vertex functions

    International Nuclear Information System (INIS)

    Santhanam, I.; Bhatnagar, S.; Mitra, A.N.

    1990-01-01

    We review the status of nucleon (N) and few-nucleon form factors (f.f.'s) from the view-point of a gradual unfolding of successively inner degrees of freedom (d.o.f.) with increase in q 2 . To this end we focus attention on the problem of a microscopic formulation of hadronic vertex functions (v.f.) from the point of view of their key role in understanding the physics of a large variety of few-hadron reactions on the one hand, and their practical usefulness in articulating the internal dynamics of hadron and few-hadron systems on the other hand. The criterion of an integrated view from low-energy spectroscopy to high-q 2 amplitudes is employed to emphasize the desirability of formulations in terms of relativistic dynamical equations based on Lorentz and gauge invariance in preference to phenomenological models, which often require additional assumptions beyond their original premises to extend their applicability domains. In this respect, the practical possibilities of the Bethe-Salpeter equation (BSE) in articulating the necessary dynamical ingredients are emphasized on a two-tier basis, the basis constants (3) being pre-determined from the mass spectral data (1 st stage) in preparation for the construction of the hadron-quark vertex functions (2 nd stage). An explicit construction is outlined for meson-quark and baryon-quark vertex functions as well as of meson-nucleon vertex functions in a stepwise fashion. The role of the latter as basic parameter-free ingredients is discussed for possible use in the more serious treatment in the current literature of quark-meson level (α) and meson-isobar (β) d.o.f. in 2-N and 3-N form factor studies. Since most of these studies are characterized by the use of RGM techniques at the six-quark level, a comparative discussion is also given of several contemporary RGM based models. Finally, the concrete prospects for employing such hardon-quark vertex functions for evaluating pp-bar annihilation amplitudes are briefly indicated

  7. LEA in Private: A Privacy and Data Protection Framework for a Learning Analytics Toolbox

    Science.gov (United States)

    Steiner, Christina M.; Kickmeier-Rust, Michael D.; Albert, Dietrich

    2016-01-01

    To find a balance between learning analytics research and individual privacy, learning analytics initiatives need to appropriately address ethical, privacy, and data protection issues. A range of general guidelines, model codes, and principles for handling ethical issues and for appropriate data and privacy protection are available, which may…

  8. Gain-Based Relief for Invasion of Privacy

    Directory of Open Access Journals (Sweden)

    Sirko Harder

    2013-11-01

    Full Text Available In many common law jurisdictions, some or all instances of invasion of privacy constitute a privacy-specific wrong either at common law (including equity or under statute. A remedy invariably available for such a wrong is compensation for loss. However, the plaintiff may instead seek to claim the profit the defendant has made from the invasion. This article examines when a plaintiff is, and should be, entitled to claim that profit, provided that invasion of privacy is actionable as such. After a brief overview of the relevant law in major common law jurisdictions, the article investigates how invasion of privacy fits into a general concept of what is called ‘restitution for wrongs’. It will be argued that the right to privacy is a right against the whole world and as such forms a proper basis of awarding gain-based relief for the unauthorised use of that right.

  9. Mathematical modeling of drug release from lipid dosage forms.

    Science.gov (United States)

    Siepmann, J; Siepmann, F

    2011-10-10

    Lipid dosage forms provide an interesting potential for controlled drug delivery. In contrast to frequently used poly(ester) based devices for parenteral administration, they do not lead to acidification upon degradation and potential drug inactivation, especially in the case of protein drugs and other acid-labile active agents. The aim of this article is to give an overview on the current state of the art of mathematical modeling of drug release from this type of advanced drug delivery systems. Empirical and semi-empirical models are described as well as mechanistic theories, considering diffusional mass transport, potentially limited drug solubility and the leaching of other, water-soluble excipients into the surrounding bulk fluid. Various practical examples are given, including lipid microparticles, beads and implants, which can successfully be used to control the release of an incorporated drug during periods ranging from a few hours up to several years. The great benefit of mechanistic mathematical theories is the possibility to quantitatively predict the effects of different formulation parameters and device dimensions on the resulting drug release kinetics. Thus, in silico simulations can significantly speed up product optimization. This is particularly useful if long release periods (e.g., several months) are targeted, since experimental trial-and-error studies are highly time-consuming in these cases. In the future it would be highly desirable to combine mechanistic theories with the quantitative description of the drug fate in vivo, ideally including the pharmacodynamic efficacy of the treatments. Copyright © 2011 Elsevier B.V. All rights reserved.

  10. Technical and policy approaches to balancing patient privacy and data sharing in clinical and translational research.

    Science.gov (United States)

    Malin, Bradley; Karp, David; Scheuermann, Richard H

    2010-01-01

    Clinical researchers need to share data to support scientific validation and information reuse and to comply with a host of regulations and directives from funders. Various organizations are constructing informatics resources in the form of centralized databases to ensure reuse of data derived from sponsored research. The widespread use of such open databases is contingent on the protection of patient privacy. We review privacy-related problems associated with data sharing for clinical research from technical and policy perspectives. We investigate existing policies for secondary data sharing and privacy requirements in the context of data derived from research and clinical settings. In particular, we focus on policies specified by the US National Institutes of Health and the Health Insurance Portability and Accountability Act and touch on how these policies are related to current and future use of data stored in public database archives. We address aspects of data privacy and identifiability from a technical, although approachable, perspective and summarize how biomedical databanks can be exploited and seemingly anonymous records can be reidentified using various resources without hacking into secure computer systems. We highlight which clinical and translational data features, specified in emerging research models, are potentially vulnerable or exploitable. In the process, we recount a recent privacy-related concern associated with the publication of aggregate statistics from pooled genome-wide association studies that have had a significant impact on the data sharing policies of National Institutes of Health-sponsored databanks. Based on our analysis and observations we provide a list of recommendations that cover various technical, legal, and policy mechanisms that open clinical databases can adopt to strengthen data privacy protection as they move toward wider deployment and adoption.

  11. Valuating Privacy with Option Pricing Theory

    Science.gov (United States)

    Berthold, Stefan; Böhme, Rainer

    One of the key challenges in the information society is responsible handling of personal data. An often-cited reason why people fail to make rational decisions regarding their own informational privacy is the high uncertainty about future consequences of information disclosures today. This chapter builds an analogy to financial options and draws on principles of option pricing to account for this uncertainty in the valuation of privacy. For this purpose, the development of a data subject's personal attributes over time and the development of the attribute distribution in the population are modeled as two stochastic processes, which fit into the Binomial Option Pricing Model (BOPM). Possible applications of such valuation methods to guide decision support in future privacy-enhancing technologies (PETs) are sketched.

  12. An informational theory of privacy

    NARCIS (Netherlands)

    Schottmuller, C.; Jann, Ole

    2016-01-01

    We develop a theory that explains how and when privacy can increase welfare. Without privacy, some individuals misrepresent their preferences, because they will otherwise be statistically discriminated against. This "chilling effect" hurts them individually, and impairs information aggregation. The

  13. Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Changbo Ke

    2014-01-01

    Full Text Available Cloud computing has provided services for users as a software paradigm. However, it is difficult to ensure privacy information security because of its opening, virtualization, and service outsourcing features. Therefore how to protect user privacy information has become a research focus. In this paper, firstly, we model service privacy policy and user privacy preference with description logic. Secondly, we use the pellet reasonor to verify the consistency and satisfiability, so as to detect the privacy conflict between services and user. Thirdly, we present the algorithm of detecting privacy conflict in the process of cloud service composition and prove the correctness and feasibility of this method by case study and experiment analysis. Our method can reduce the risk of user sensitive privacy information being illegally used and propagated by outsourcing services. In the meantime, the method avoids the exception in the process of service composition by the privacy conflict, and improves the trust degree of cloud service providers.

  14. User Privacy and Empowerment: Trends, Challenges, and Opportunities

    DEFF Research Database (Denmark)

    Dhotre, Prashant Shantaram; Olesen, Henning; Khajuria, Samant

    2018-01-01

    to the service providers. Considering business models that are slanted towards service provid-ers, privacy has become a crucial issue in today’s fast growing digital world. Hence, this paper elaborates personal information flow between users, service providers, and data brokers. We also discussed the significant...... privacy issues like present business models, user awareness about privacy and user control over per-sonal data. To address such issues, this paper also identified challenges that com-prise unavailability of effective privacy awareness or protection tools and the ef-fortless way to study and see the flow...... of personal information and its manage-ment. Thus, empowering users and enhancing awareness are essential to compre-hending the value of secrecy. This paper also introduced latest advances in the domain of privacy issues like User Managed Access (UMA) can state suitable requirements for user empowerment...

  15. Privacy-Aware Relevant Data Access with Semantically Enriched Search Queries for Untrusted Cloud Storage Services.

    Science.gov (United States)

    Pervez, Zeeshan; Ahmad, Mahmood; Khattak, Asad Masood; Lee, Sungyoung; Chung, Tae Choong

    2016-01-01

    Privacy-aware search of outsourced data ensures relevant data access in the untrusted domain of a public cloud service provider. Subscriber of a public cloud storage service can determine the presence or absence of a particular keyword by submitting search query in the form of a trapdoor. However, these trapdoor-based search queries are limited in functionality and cannot be used to identify secure outsourced data which contains semantically equivalent information. In addition, trapdoor-based methodologies are confined to pre-defined trapdoors and prevent subscribers from searching outsourced data with arbitrarily defined search criteria. To solve the problem of relevant data access, we have proposed an index-based privacy-aware search methodology that ensures semantic retrieval of data from an untrusted domain. This method ensures oblivious execution of a search query and leverages authorized subscribers to model conjunctive search queries without relying on predefined trapdoors. A security analysis of our proposed methodology shows that, in a conspired attack, unauthorized subscribers and untrusted cloud service providers cannot deduce any information that can lead to the potential loss of data privacy. A computational time analysis on commodity hardware demonstrates that our proposed methodology requires moderate computational resources to model a privacy-aware search query and for its oblivious evaluation on a cloud service provider.

  16. Privacy in social networking sites

    OpenAIRE

    Λεονάρδος, Γεώργιος; Leonardos, Giorgos

    2016-01-01

    The purpose of this study is to explore the aspects of privacy over the use of social networks web sites. More specific, we will show the types of social networks, their privacy mechanisms that are different in each social network site, their privacy options that are offered to users. We will report some serious privacy violations incidents of the most popular social networks sites such as Facebook, Twitter, LinkedIn. Also, we will report some important surveys about social networks and pr...

  17. 77 FR 31371 - Public Workshop: Privacy Compliance Workshop

    Science.gov (United States)

    2012-05-25

    ... presentations, including the privacy compliance fundamentals, privacy and data security, and the privacy... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Public Workshop: Privacy Compliance... Homeland Security Privacy Office will host a public workshop, ``Privacy Compliance Workshop.'' DATES: The...

  18. Safeguarding donors' personal rights and biobank autonomy in biobank networks: the CRIP privacy regime.

    Science.gov (United States)

    Schröder, Christina; Heidtke, Karsten R; Zacherl, Nikolaus; Zatloukal, Kurt; Taupitz, Jochen

    2011-08-01

    Governance, underlying general ICT (Information and Communication Technology) architecture, and workflow of the Central Research Infrastructure for molecular Pathology (CRIP) are discussed as a model enabling biobank networks to form operational "meta biobanks" whilst respecting the donors' privacy, biobank autonomy and confidentiality, and the researchers' needs for appropriate biospecimens and information, as well as confidentiality. Tailored to these needs, CRIP efficiently accelerates and facilitates research with human biospecimens and data.

  19. Analytic properties of form factors in strictly confining models

    International Nuclear Information System (INIS)

    Csikor, F.

    1979-12-01

    An argument is presented showing that strict confinement implies the possible existence of an (unwanted) branch point at q 2 =0 in the form factors. In case of a bag extended to infinity in the relative time, the branch point is certainly there (provided that the form factor is non zero at q 2 =0). (author)

  20. Form-finding of shell structures generated from physical models

    NARCIS (Netherlands)

    Li, Q.; Su, Y; Wu, Y; Borgart, A.; Rots, J.G.

    2017-01-01

    Vector form intrinsic finite element is a recently developed and promising numerical method for the analysis of complicated structural behavior. Taking the cable-link element as example, the framework of the vector form intrinsic finite element is explained first. Based on this, a constant strain

  1. Privacy and Open Government

    Directory of Open Access Journals (Sweden)

    Teresa Scassa

    2014-06-01

    Full Text Available The public-oriented goals of the open government movement promise increased transparency and accountability of governments, enhanced citizen engagement and participation, improved service delivery, economic development and the stimulation of innovation. In part, these goals are to be achieved by making more and more government information public in reusable formats and under open licences. This paper identifies three broad privacy challenges raised by open government. The first is how to balance privacy with transparency and accountability in the context of “public” personal information. The second challenge flows from the disruption of traditional approaches to privacy based on a collapse of the distinctions between public and private sector actors. The third challenge is that of the potential for open government data—even if anonymized—to contribute to the big data environment in which citizens and their activities are increasingly monitored and profiled.

  2. Advertising and Invasion of Privacy.

    Science.gov (United States)

    Rohrer, Daniel Morgan

    The right of privacy as it relates to advertising and the use of a person's name or likeness is discussed in this paper. After an introduction that traces some of the history of invasion of privacy in court decisions, the paper examines cases involving issues such as public figures and newsworthy items, right of privacy waived, right of privacy…

  3. Privacy in an Ambient World

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro; den Hartog, Jeremy

    Privacy is a prime concern in today's information society. To protect the privacy of individuals, enterprises must follow certain privacy practices, while collecting or processing personal data. In this chapter we look at the setting where an enterprise collects private data on its website,

  4. 76 FR 59073 - Privacy Act

    Science.gov (United States)

    2011-09-23

    ... CENTRAL INTELLIGENCE AGENCY 32 CFR Part 1901 Privacy Act AGENCY: Central Intelligence Agency. ACTION: Proposed rule. SUMMARY: Consistent with the Privacy Act (PA), the Central Intelligence Agency...-1379. SUPPLEMENTARY INFORMATION: Consistent with the Privacy Act (PA), the CIA has undertaken and...

  5. Privacy Expectations in Online Contexts

    Science.gov (United States)

    Pure, Rebekah Abigail

    2013-01-01

    Advances in digital networked communication technology over the last two decades have brought the issue of personal privacy into sharper focus within contemporary public discourse. In this dissertation, I explain the Fourth Amendment and the role that privacy expectations play in the constitutional protection of personal privacy generally, and…

  6. Designing Privacy-by-Design

    NARCIS (Netherlands)

    Rest, J.H.C. van; Boonstra, D.; Everts, M.H.; Rijn, M. van; Paassen, R.J.G. van

    2014-01-01

    The proposal for a new privacy regulation d.d. January 25th 2012 introduces sanctions of up to 2% of the annual turnover of enterprises. This elevates the importance of mitigation of privacy risks. This paper makes Privacy by Design more concrete, and positions it as the mechanism to mitigate these

  7. What was privacy?

    Science.gov (United States)

    McCreary, Lew

    2008-10-01

    Why is that question in the past tense? Because individuals can no longer feel confident that the details of their lives--from identifying numbers to cultural preferences--will be treated with discretion rather than exploited. Even as Facebook users happily share the names of their favorite books, movies, songs, and brands, they often regard marketers' use of that information as an invasion of privacy. In this wide-ranging essay, McCreary, a senior editor at HBR, examines numerous facets of the privacy issue, from Google searches, public shaming on the internet, and cell phone etiquette to passenger screening devices, public surveillance cameras, and corporate chief privacy officers. He notes that IBM has been a leader on privacy; its policy forswearing the use of employees' genetic information in hiring and benefits decisions predated the federal Genetic Information Nondiscrimination Act by three years. Now IBM is involved in an open-source project known as Higgins to provide users with transportable, potentially anonymous online presences. Craigslist, whose CEO calls it "as close to 100% user driven as you can get," has taken an extremely conservative position on privacy--perhaps easier for a company with a declared lack of interest in maximizing revenue. But TJX and other corporate victims of security breaches have discovered that retaining consumers' transaction information can be both costly and risky. Companies that underestimate the importance of privacy to their customers or fail to protect it may eventually face harsh regulation, reputational damage, or both. The best thing they can do, says the author, is negotiate directly with those customers over where to draw the line.

  8. In Situ Monitoring and Modeling of the Solution-Mediated Polymorphic Transformation of Rifampicin: From Form II to Form I.

    Science.gov (United States)

    Guo, Nannan; Hou, Baohong; Wang, Na; Xiao, Yan; Huang, Jingjing; Guo, Yanmei; Zong, Shuyi; Hao, Hongxun

    2018-01-01

    In this article, the solution-mediated polymorphic transformation of rifampicin was investigated and simulated in 3 solvents at 30°C. The solid-state form I and form II of rifampicin was characterized by powder X-ray diffraction, scanning electron microscopy, thermogravimetric analysis, Raman spectroscopy, and Fourier transform infrared spectroscopy (FTIR). To explore the relative stability, solubility data of form I and form II of rifampicin in butan-1-ol were determined using a dynamical method. In addition, Raman spectroscopy and focused beam reflectance measurement were used to in situ monitor the transformation of rifampicin from form II to form I. The liquid state concentration of rifampicin was measured by UV spectroscopic method. To investigate the effect of solvent on transformation, the transformation experiments were carried out in 3 solvents. Furthermore, a mathematical model was built to describe the kinetics of dissolution, nucleation, and growth processes during transformation by using experimental data. By combination of experimental and simulation results, it was found that the transformation process of rifampicin is controlled by dissolution of form II in heptane, whereas the transformation in hexane and octane was firstly controlled by dissolution of solid-state form and then controlled by growth of form I. Copyright © 2018 American Pharmacists Association®. Published by Elsevier Inc. All rights reserved.

  9. Privacy Bridges: EU and US Privacy Experts In Search of Transatlantic Privacy Solutions

    NARCIS (Netherlands)

    Abramatic, J.-F.; Bellamy, B.; Callahan, M.E.; Cate, F.; van Eecke, P.; van Eijk, N.; Guild, E.; de Hert, P.; Hustinx, P.; Kuner, C.; Mulligan, D.; O'Connor, N.; Reidenberg, J.; Rubinstein, I.; Schaar, P.; Shadbolt, N.; Spiekermann, S.; Vladeck, D.; Weitzner, D.J.; Zuiderveen Borgesius, F.; Hagenauw, D.; Hijmans, H.

    2015-01-01

    The EU and US share a common commitment to privacy protection as a cornerstone of democracy. Following the Treaty of Lisbon, data privacy is a fundamental right that the European Union must proactively guarantee. In the United States, data privacy derives from constitutional protections in the

  10. Reward-based spatial crowdsourcing with differential privacy preservation

    Science.gov (United States)

    Xiong, Ping; Zhang, Lefeng; Zhu, Tianqing

    2017-11-01

    In recent years, the popularity of mobile devices has transformed spatial crowdsourcing (SC) into a novel mode for performing complicated projects. Workers can perform tasks at specified locations in return for rewards offered by employers. Existing methods ensure the efficiency of their systems by submitting the workers' exact locations to a centralised server for task assignment, which can lead to privacy violations. Thus, implementing crowsourcing applications while preserving the privacy of workers' location is a key issue that needs to be tackled. We propose a reward-based SC method that achieves acceptable utility as measured by task assignment success rates, while efficiently preserving privacy. A differential privacy model ensures rigorous privacy guarantee, and Laplace noise is introduced to protect workers' exact locations. We then present a reward allocation mechanism that adjusts each piece of the reward for a task using the distribution of the workers' locations. Through experimental results, we demonstrate that this optimised-reward method is efficient for SC applications.

  11. Location Privacy Techniques in Client-Server Architectures

    DEFF Research Database (Denmark)

    Jensen, Christian Søndergaard; Lu, Hua; Yiu, Man Lung

    2009-01-01

    A typical location-based service returns nearby points of interest in response to a user location. As such services are becoming increasingly available and popular, location privacy emerges as an important issue. In a system that does not offer location privacy, users must disclose their exact...... locations in order to receive the desired services. We view location privacy as an enabling technology that may lead to increased use of location-based services. In this chapter, we consider location privacy techniques that work in traditional client-server architectures without any trusted components other....... Third, their effectiveness is independent of the distribution of other users, unlike the k-anonymity approach. The chapter characterizes the privacy models assumed by existing techniques and categorizes these according to their approach. The techniques are then covered in turn according...

  12. 76 FR 65196 - Privacy Act of 1974; Report of a New Routine Use for Selected CMS System of Records

    Science.gov (United States)

    2011-10-20

    ... and privacy requirements included. A Data Use Agreement (DUA) (CMS Form 0235) must be completed by the...: CMS Privacy Officer, Division of Information Security & Privacy Management, Enterprise Architecture... requirements that she may specify for QEs to meet, such as ensuring the security of data. The Medicare claims...

  13. The Privacy Jungle:On the Market for Data Protection in Social Networks

    Science.gov (United States)

    Bonneau, Joseph; Preibusch, Sören

    We have conducted the first thorough analysis of the market for privacy practices and policies in online social networks. From an evaluation of 45 social networking sites using 260 criteria we find that many popular assumptions regarding privacy and social networking need to be revisited when considering the entire ecosystem instead of only a handful of well-known sites. Contrary to the common perception of an oligopolistic market, we find evidence of vigorous competition for new users. Despite observing many poor security practices, there is evidence that social network providers are making efforts to implement privacy enhancing technologies with substantial diversity in the amount of privacy control offered. However, privacy is rarely used as a selling point, even then only as auxiliary, nondecisive feature. Sites also failed to promote their existing privacy controls within the site. We similarly found great diversity in the length and content of formal privacy policies, but found an opposite promotional trend: though almost all policies are not accessible to ordinary users due to obfuscating legal jargon, they conspicuously vaunt the sites' privacy practices. We conclude that the market for privacy in social networks is dysfunctional in that there is significant variation in sites' privacy controls, data collection requirements, and legal privacy policies, but this is not effectively conveyed to users. Our empirical findings motivate us to introduce the novel model of a privacy communication game, where the economically rational choice for a site operator is to make privacy control available to evade criticism from privacy fundamentalists, while hiding the privacy control interface and privacy policy to maximize sign-up numbers and encourage data sharing from the pragmatic majority of users.

  14. Public privacy: Reciprocity and Silence

    Directory of Open Access Journals (Sweden)

    Jenny Kennedy

    2014-10-01

    Full Text Available In his 1958 poem 'Dedication to my Wife' TS Eliot proclaims "these are private words addressed to you in public". Simultaneously written for his wife, Valerie Fletcher, and to the implied you of a discourse network, Eliot's poem helps to illustrate the narrative voices and silences that are constitutive of an intimate public sphere. This paper situates reciprocity as a condition of possibility for public privacy. It shows how reciprocity is enabled by systems of code operating through material and symbolic registers. Code promises to control communication, to produce neutral, systemic forms of meaning. Yet such automation is challenged by uneven and fragmented patterns of reciprocity. Moreover, examining the media of public privacy reveals historical trajectories important for understanding contemporary socio­technical platforms of reciprocity. To explore the implicit requirement of reciprocity in publicly private practices, three sites of communication are investigated framed by a media archaeology perspective: postal networks, the mail­art project PostSecret and the anonymous zine 'You'.

  15. Privacy-aware knowledge discovery novel applications and new techniques

    CERN Document Server

    Bonchi, Francesco

    2010-01-01

    Covering research at the frontier of this field, Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques presents state-of-the-art privacy-preserving data mining techniques for application domains, such as medicine and social networks, that face the increasing heterogeneity and complexity of new forms of data. Renowned authorities from prominent organizations not only cover well-established results-they also explore complex domains where privacy issues are generally clear and well defined, but the solutions are still preliminary and in continuous development. Divided into seve

  16. A material model for aluminium sheet forming at elevated temperatures

    NARCIS (Netherlands)

    van den Boogaard, Antonius H.; Werkhoven, R.J.; Bolt, P.J.

    2001-01-01

    In order to accurately simulate the deep drawing or stretching of aluminum sheet at elevated temperatures, a model is required that incorporates the temperature and strain-rate dependency of the material. In this paper two models are compared: a phenomenological material model in which the

  17. Biometrics and privacy

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.

    2001-01-01

    Biometrics offers many alternatives for protecting our privacy and preventing us from falling victim to crime. Biometrics can even serve as a solid basis for safe anonymous and semi-anonymous legal transactions. In this article Jan Grijpink clarifies which concepts and practical applications this

  18. Reconciling privacy and security

    NARCIS (Netherlands)

    Lieshout, M.J. van; Friedewald, M.; Wright, D.; Gutwirth, S.

    2013-01-01

    This paper considers the relationship between privacy and security and, in particular, the traditional "trade-off" paradigm. The issue is this: how, in a democracy, can one reconcile the trend towards increasing security (for example, as manifested by increasing surveillance) with the fundamental

  19. Privacy Policy | FNLCR Staging

    Science.gov (United States)

    The privacy of our users is of utmost importance to Frederick National Lab. The policy outlined below establishes how Frederick National Lab will use the information we gather about you from your visit to our website. We may collect and store

  20. Form factors and structure functions of hadrons in parton model

    International Nuclear Information System (INIS)

    Volkonskij, N.Yu.

    1979-01-01

    The hadron charge form factors and their relation to the deep-inelastic lepton-production structure functions in the regions of asymptotically high and small momentum transfer Q 2 are studied. The nucleon and pion charge radii are calculated. The results of calculations are in good agreement with the experimental data. The K- and D-meson charge radii are estimated. In the region of asymptotically high Q 2 the possibility of Drell-Yan-West relation violation is analyzed. It is shown, that for pseudoscalar mesons this relation is violated. The relation between the proton and neutron form factor asymptotics is obtained

  1. Pion form factor within QCD instanton vacuum model

    International Nuclear Information System (INIS)

    Dorokhov, A.E.

    1997-01-01

    Instanton induced pion wave function is constructed. It provides an intrinsic k 1 dependence which suppress soft virtual one-gluon exchanges and thus legitimate the perturbative QCD (pQCD) calculations of the pion electromagnetic form factor in the region of momentum transfers above the scale. (author)

  2. Trust-aware Privacy Control for Social Media

    OpenAIRE

    Li, Na; Najafian-Razavi, Maryam; Gillet, Denis

    2011-01-01

    Due to the huge exposure of personal information in social media, a challenge now is to design effective privacy mechanisms that protect against unauthorized access to social data. In this paper, a trust model for social media is first presented. Based on the trust model, a trust-aware privacy control protocol is proposed, that exploits the underlying inter-entity trust information. The objective is to design a fine-grained privacy scheme that ensures a user’s online information is disclosed ...

  3. Self-reflection on privacy research in social networking sites

    OpenAIRE

    De Wolf, Ralf; Vanderhoven, Ellen; Berendt, Bettina; Pierson, Jo; Schellens, Tammy

    2017-01-01

    The increasing popularity of social networking sites has been a source of many privacy concerns. To mitigate these concerns and empower users, different forms of educational and technological solutions have been developed. Developing and evaluating such solutions, however, cannot be considered a neutral process. Instead, it is socially bound and interwoven with norms and values of the researchers. In this contribution, we aim to make the research process and development of privacy solutions m...

  4. Disentangling privacy from property: toward a deeper understanding of genetic privacy.

    Science.gov (United States)

    Suter, Sonia M

    2004-04-01

    connoting commodification, disaggregation, and arms-length dealings, can negatively affect the self and harm these relationships. This Article concludes that a deeper understanding of genetic privacy calls for remedies for privacy violations that address dignitary harm and breach of trust, as opposed to market harms, as the property model suggests.

  5. Numerical Modelling of Drawbeads for Forming of Aluminium Alloys

    DEFF Research Database (Denmark)

    Joshi, Y; Christiansen, Peter; Masters, I

    2016-01-01

    from different semi-circular drawbead geometries commonly encountered in automotive dies and compares them to those obtained from Stoughton’s analytical drawbead model and the 2D plane strain drawbead model set up using LS-DYNA.The study was conducted on lubricated NG5754 strips. The results presented...

  6. Comparisons of friction models in bulk metal forming

    DEFF Research Database (Denmark)

    Tan, Xincai

    2002-01-01

    A friction model is one of the key input boundary conditions in finite element simulations. It is said that the friction model plays an important role in controlling the accuracy of necessary output results predicted. Among the various friction models, which one is of higher accuracy is still...... unknown and controversial. In this paper, finite element analyses applying five different friction models to experiments of upsetting of AA 6082 lubricated with four lubricants are presented. Frictional parameter values are determined by fitness of data of friction area ratio from finite element analysis...... to experimental results. It is found that calibration curves of the friction area ratio for all of the five chosen friction models used in the finite element simulation do fit the experimental results. Usually, calbration curves of the friction area ratio are more sensitive to friction at the tool...

  7. 77 FR 46643 - Children's Online Privacy Protection Rule

    Science.gov (United States)

    2012-08-06

    ... providing notice to and obtaining consent from parents. Conversely, online services whose business models..., challenging others to gameplay, swapping digital collectibles, participating in monitored `chat' with... Digital Democracy (``CDD''), Consumers Union (``CU''), and the Electronic Privacy Information Center...

  8. A MAGNETIC RIBBON MODEL FOR STAR-FORMING FILAMENTS

    Energy Technology Data Exchange (ETDEWEB)

    Auddy, Sayantan; Basu, Shantanu [Department of Physics and Astronomy, The University of Western Ontario, London, ON N6A 3K7 (Canada); Kudoh, Takahiro, E-mail: sauddy3@uwo.ca, E-mail: basu@uwo.ca, E-mail: kudoh@nagasaki-u.ac.jp [Faculty of Education, Nagasaki University, 1-14 Bunkyo-machi, Nagasaki 852-8521 (Japan)

    2016-11-01

    We develop a magnetic ribbon model for molecular cloud filaments. These result from turbulent compression in a molecular cloud in which the background magnetic field sets a preferred direction. We argue that this is a natural model for filaments and is based on the interplay between turbulence, strong magnetic fields, and gravitationally driven ambipolar diffusion, rather than pure gravity and thermal pressure. An analytic model for the formation of magnetic ribbons that is based on numerical simulations is used to derive a lateral width of a magnetic ribbon. This differs from the thickness along the magnetic field direction, which is essentially the Jeans scale. We use our model to calculate a synthetic observed relation between apparent width in projection versus observed column density. The relationship is relatively flat, similar to observations, and unlike the simple expectation based on a Jeans length argument.

  9. Indoor Air Quality Building Education and Assessment Model Forms

    Science.gov (United States)

    The Indoor Air Quality Building Education and Assessment Model (I-BEAM) is a guidance tool designed for use by building professionals and others interested in indoor air quality in commercial buildings.

  10. Isospin invariant forms of interacting boson model (IBM)

    International Nuclear Information System (INIS)

    Evans, A.

    1989-01-01

    In the original version of the interacting boson model, IBM1, there are only two quantum numbers with exact values: the angular momentum and the number of bosons. IBM2 distinguishes between two kinds of bosons. However, the IBM2 algebra does not include the operators T± and consequently the states in the model have no good isospin, generally. IBM3 includes the isospin in the algebra and therefore the construction of states with any number of bosons and good isospin presents no problem. In this work, IBM3 is compared with the shell model. IBFM3 is also studied, which describes an odd nucleus as a system of N bosons plus a single nucleon that is a neutron with some probability and a proton with the complementary probability. The spectra obtained in the shell model, IBFM3 and IBFM2 for 45 Ti and 45 Sc are compared. (Author) [es

  11. Towards Territorial Privacy in Smart Environments

    NARCIS (Netherlands)

    Könings, Bastian; Schaub, Florian; Weber, M.; Kargl, Frank

    Territorial privacy is an old concept for privacy of the personal space dating back to the 19th century. Despite its former relevance, territorial privacy has been neglected in recent years, while privacy research and legislation mainly focused on the issue of information privacy. However, with the

  12. Irreducible integrable theories form tensor products of conformal models

    International Nuclear Information System (INIS)

    Mathur, S.D.; Warner, N.P.

    1991-01-01

    By using Toda field theories we show that there are perturbations of direct products of conformal theories that lead to irreducible integrable field theories. The same affine Toda theory can be truncated to different quantum integrable models for different choices of the charge at infinity and the coupling. The classification of integrable models that can be obtained in this fashion follows the classification of symmetric spaces of type G/H with rank H = rank G. (orig.)

  13. Privacy Awareness: A Means to Solve the Privacy Paradox?

    Science.gov (United States)

    Pötzsch, Stefanie

    People are limited in their resources, i.e. they have limited memory capabilities, cannot pay attention to too many things at the same time, and forget much information after a while; computers do not suffer from these limitations. Thus, revealing personal data in electronic communication environments and being completely unaware of the impact of privacy might cause a lot of privacy issues later. Even if people are privacy aware in general, the so-called privacy paradox shows that they do not behave according to their stated attitudes. This paper discusses explanations for the existing dichotomy between the intentions of people towards disclosure of personal data and their behaviour. We present requirements on tools for privacy-awareness support in order to counteract the privacy paradox.

  14. Migration modelling of different plutonium chemical forms through porous media

    International Nuclear Information System (INIS)

    Saltelli, A.

    1979-01-01

    Two solutions of the migration equations are described. The first relates to the transport equations for the decay chain Am 243→Pu 239→U 235. Numerical integration was performed in this case by a simulation code written in CSMP III language and plutonium is considered to be all in the same chemical form. The second case relates to the problem of Pu speciation and migration. The decay chain Pu 240→U 236 is considered and numerical integration is performed by a modified version of Bo code COLUMN. Pseudo first order reactions are supposed to act between Pu states to maintain equilibrium during the migration

  15. Privacy issues in mobile advertising

    DEFF Research Database (Denmark)

    Cleff, Evelyne Beatrix

    The emergence of the wired Internet and mobile telecommunication networks is creating new opportunities for advertisers to generate new revenue streams through mobile users. As consumer adoption of mobile technology continues to increase, it is only a question of time when mobile advertising...... becomes an important part of marketing strategies. The development of mobile advertising, however, will be dependent on acceptance and usability issues in order to ensure permission-based advertising. Growing concerns about the protection of the users' privacy have been raised since mobile advertising may...... become extremely intrusive practices in an intimate personal space. This article focuses on the evaluation of legal problems raised by this novel form of advertising. It is assumed that a technological design, which is in line with the legal framework, will ensure that the benefits of mobile advertising...

  16. Probabilistic Seismic Performance Model for Tunnel Form Concrete Building Structures

    Directory of Open Access Journals (Sweden)

    S. Bahram Beheshti Aval

    2016-12-01

    Full Text Available Despite widespread construction of mass-production houses with tunnel form structural system across the world, unfortunately no special seismic code is published for design of this type of construction. Through a literature survey, only a few studies are about the seismic behavior of this type of structural system. Thus based on reasonable numerical results, the seismic performance of structures constructed with this technique considering the effective factors on structural behavior is highly noteworthy in a seismic code development process. In addition, due to newness of this system and observed damages in past earthquakes, and especially random nature of future earthquakes, the importance of probabilistic approach and necessity of developing fragility curves in a next generation Performance Based Earthquake Engineering (PBEE frame work are important. In this study, the seismic behavior of 2, 5 and 10 story tunnel form structures with a regular plan is examined. First, the performance levels of these structures under the design earthquake (return period of 475 years with time history analysis and pushover method are assessed, and then through incremental dynamic analysis, fragility curves are extracted for different levels of damage in walls and spandrels. The results indicated that the case study structures have high capacity and strength and show appropriate seismic performance. Moreover, all three structures subjected were in immediate occupancy performance level.

  17. Privacy Management and Networked PPD Systems - Challenges Solutions.

    Science.gov (United States)

    Ruotsalainen, Pekka; Pharow, Peter; Petersen, Francoise

    2015-01-01

    Modern personal portable health devices (PPDs) become increasingly part of a larger, inhomogeneous information system. Information collected by sensors are stored and processed in global clouds. Services are often free of charge, but at the same time service providers' business model is based on the disclosure of users' intimate health information. Health data processed in PPD networks is not regulated by health care specific legislation. In PPD networks, there is no guarantee that stakeholders share same ethical principles with the user. Often service providers have own security and privacy policies and they rarely offer to the user possibilities to define own, or adapt existing privacy policies. This all raises huge ethical and privacy concerns. In this paper, the authors have analyzed privacy challenges in PPD networks from users' viewpoint using system modeling method and propose the principle "Personal Health Data under Personal Control" must generally be accepted at global level. Among possible implementation of this principle, the authors propose encryption, computer understandable privacy policies, and privacy labels or trust based privacy management methods. The latter can be realized using infrastructural trust calculation and monitoring service. A first step is to require the protection of personal health information and the principle proposed being internationally mandatory. This requires both regulatory and standardization activities, and the availability of open and certified software application which all service providers can implement. One of those applications should be the independent Trust verifier.

  18. Incentivizing Verifiable Privacy-Protection Mechanisms for Offline Crowdsensing Applications.

    Science.gov (United States)

    Sun, Jiajun; Liu, Ningzhong

    2017-09-04

    Incentive mechanisms of crowdsensing have recently been intensively explored. Most of these mechanisms mainly focus on the standard economical goals like truthfulness and utility maximization. However, enormous privacy and security challenges need to be faced directly in real-life environments, such as cost privacies. In this paper, we investigate offline verifiable privacy-protection crowdsensing issues. We firstly present a general verifiable privacy-protection incentive mechanism for the offline homogeneous and heterogeneous sensing job model. In addition, we also propose a more complex verifiable privacy-protection incentive mechanism for the offline submodular sensing job model. The two mechanisms not only explore the private protection issues of users and platform, but also ensure the verifiable correctness of payments between platform and users. Finally, we demonstrate that the two mechanisms satisfy privacy-protection, verifiable correctness of payments and the same revenue as the generic one without privacy protection. Our experiments also validate that the two mechanisms are both scalable and efficient, and applicable for mobile devices in crowdsensing applications based on auctions, where the main incentive for the user is the remuneration.

  19. BORDERS OF COMMUNICATION PRIVACY IN SLOVENIAN CRIMINAL PROCEDURE – CONSTITUTIONAL CHALLENGES

    Directory of Open Access Journals (Sweden)

    Sabina Zgaga

    2015-01-01

    Full Text Available Due to fast technological development and our constant communication protection of communication privacy in every aspect of our (legal life has become more important than ever before. Regarding protection of privacy in criminal procedure special emphasis should be given to the regulation of privacy in Slovenian Constitution and its interpretation in the case law of the Constitutional Court. This paper presents the definition of privacy and communication privacy in Slovenian constitutional law and exposes the main issues of communication privacy that have been discussed in the case law of the Constitutional Court in the last twenty years. Thereby the paper tries to show the general trend in the case law of Constitutional Court regarding the protection of communication privacy and to expose certain unsolved issues and unanswered challenges. Slovenian constitutional regulation of communication privacy is very protective, considering the broad definition of privacy and the strict conditions for encroachment of communication privacy. The case law of Slovenian Constitutional Court has also shown such trend, with the possible exception of the recent decision on a dynamic IP address. The importance of this decision is however significant, since it could be applicable to all forms of communication via internet, the prevailing form of communication nowadays. Certain challenges still lay ahead, such as the current proposal for the amendment of Criminal Procedure Act-M, which includes the use of IMSI catchers and numerous unanswered issues regarding data retention after the decisive annulment of its partial legal basis by the Constitutional Court.

  20. Friction Modelling In Connection With Cold Forming Processes

    DEFF Research Database (Denmark)

    Tan, Xincai

    is first coated with aluminate conversion coatings and then lubricated by alkaline soap, molybdenum disulphide (MoS2), alkaline soap followed by molykote grease paste, or kerosene respectively. Steel and stainless steel are first coated with zinc phosphate coatings and then lubricated by either alkaline...... soap or molybdenum disulphide. As processes testing friction sensitive flow, the ring-compression tests and the double cup extrusion tests are carried out. An absolute constant friction model has been proposed to separate the influence of strain hardening from friction. This model has been applied...

  1. Multi-Scalar Modelling for Free-form Timber Structures

    DEFF Research Database (Denmark)

    Poinet, Paul; Nicholas, Paul; Tamke, Martin

    2016-01-01

    .The research explores the design probe of free-form structures composed of glue-laminated timber beams and looks at the different types of data that need to be shared among each discipline and across multiple scales from which different levels of resolution can be defined. A particular focus lies...... in the segmentation strategy of glue-laminated timber structures that depend on structural requirements and the different types of constraints related to fabrication, transportation and assembly. Where current working practices decouple segmentation processes within a discrete digital workflow, this research aims...... and techniques as a means to work within a continuous design environment in which an abstract network of timber beams is iteratively updated through geometrical and structural optimizations at different levels of resolution....

  2. A Computer Model of Simple Forms of Learning.

    Science.gov (United States)

    Jones, Thomas L.

    A basic unsolved problem in science is that of understanding learning, the process by which people and machines use their experience in a situation to guide future action in similar situations. The ideas of Piaget, Pavlov, Hull, and other learning theorists, as well as previous heuristic programing models of human intelligence, stimulated this…

  3. Modelling as a foundation for academic forming in mathematics education

    NARCIS (Netherlands)

    Perrenet, J.C.; Morsche, ter H.G.

    2004-01-01

    The Bachelor curriculum of Applied Mathematics in Eindhoven includes a series of modelling projects where pairs of students solve mathematical problems posed in non-mathematical language. Communication skills training is integrated with this track. Recently a new course has been added. The students

  4. Modelling Stochastic Route Choice Behaviours with a Closed-Form Mixed Logit Model

    Directory of Open Access Journals (Sweden)

    Xinjun Lai

    2015-01-01

    Full Text Available A closed-form mixed Logit approach is proposed to model the stochastic route choice behaviours. It combines both the advantages of Probit and Logit to provide a flexible form in alternatives correlation and a tractable form in expression; besides, the heterogeneity in alternative variance can also be addressed. Paths are compared by pairs where the superiority of the binary Probit can be fully used. The Probit-based aggregation is also used for a nested Logit structure. Case studies on both numerical and empirical examples demonstrate that the new method is valid and practical. This paper thus provides an operational solution to incorporate the normal distribution in route choice with an analytical expression.

  5. Gaussian operations and privacy

    International Nuclear Information System (INIS)

    Navascues, Miguel; Acin, Antonio

    2005-01-01

    We consider the possibilities offered by Gaussian states and operations for two honest parties, Alice and Bob, to obtain privacy against a third eavesdropping party, Eve. We first extend the security analysis of the protocol proposed in [Navascues et al. Phys. Rev. Lett. 94, 010502 (2005)]. Then, we prove that a generalized version of this protocol does not allow one to distill a secret key out of bound entangled Gaussian states

  6. Privacy 2.0

    Directory of Open Access Journals (Sweden)

    Stylianos Papathanassopoulos

    2015-04-01

    Full Text Available We live in the era of change. In this world, privacy is not a static concept, but instead has a dynamic component. Overall, it becomes clear that the public and private are not defined in the same manner as in the past and as in the actual world, while our personal information has become a commodity that can raise our visibility in the social media driven world.

  7. Location Privacy in RFID Applications

    Science.gov (United States)

    Sadeghi, Ahmad-Reza; Visconti, Ivan; Wachsmann, Christian

    RFID-enabled systems allow fully automatic wireless identification of objects and are rapidly becoming a pervasive technology with various applications. However, despite their benefits, RFID-based systems also pose challenging risks, in particular concerning user privacy. Indeed, improvident use of RFID can disclose sensitive information about users and their locations allowing detailed user profiles. Hence, it is crucial to identify and to enforce appropriate security and privacy requirements of RFID applications (that are also compliant to legislation). This chapter first discusses security and privacy requirements for RFID-enabled systems, focusing in particular on location privacy issues. Then it explores the advances in RFID applications, stressing the security and privacy shortcomings of existing proposals. Finally, it presents new promising directions for privacy-preserving RFID systems, where as a case study we focus electronic tickets (e-tickets) for public transportation.

  8. PRIVACY AS A CULTURAL PHENOMENON

    Directory of Open Access Journals (Sweden)

    Garfield Benjamin

    2017-07-01

    Full Text Available Privacy remains both contentious and ever more pertinent in contemporary society. Yet it persists as an ill-defined term, not only within specific fields but in its various uses and implications between and across technical, legal and political contexts. This article offers a new critical review of the history of privacy in terms of two dominant strands of thinking: freedom and property. These two conceptions of privacy can be seen as successive historical epochs brought together under digital technologies, yielding increasingly complex socio-technical dilemmas. By simplifying the taxonomy to its socio-cultural function, the article provides a generalisable, interdisciplinary approach to privacy. Drawing on new technologies, historical trends, sociological studies and political philosophy, the article presents a discussion of the value of privacy as a term, before proposing a defense of the term cyber security as a mode of scalable cognitive privacy that integrates the relative needs of individuals, governments and corporations.

  9. Enabling secure and privacy preserving communications in smart grids

    CERN Document Server

    Li, Hongwei

    2014-01-01

    This brief focuses on the current research on security and privacy preservation in smart grids. Along with a review of the existing works, this brief includes fundamental system models, possible frameworks, useful performance, and future research directions. It explores privacy preservation demand response with adaptive key evolution, secure and efficient Merkle tree based authentication, and fine-grained keywords comparison in the smart grid auction market. By examining the current and potential security and privacy threats, the author equips readers to understand the developing issues in sma

  10. Perceived Speech Privacy in Computer Simulated Open-plan Offices

    DEFF Research Database (Denmark)

    Pop, Claudiu B.; Rindel, Jens Holger

    2005-01-01

    In open plan offices the lack of speech privacy between the workstations is one of the major acoustic problems. Improving the speech privacy in an open plan design is therefore the main concern for a successful open plan environment. The project described in this paper aimed to find an objective...... parameter that correlates well with the perceived degree of speech privacy and to derive a clear method for evaluating the acoustic conditions in open plan offices. Acoustic measurements were carried out in an open plan office, followed by data analysis at the Acoustic Department, DTU. A computer model...

  11. Preconditions of forming of loyalty management model in pharmaceutical institution

    Directory of Open Access Journals (Sweden)

    O. O. Molodozhonova

    2013-04-01

    Full Text Available The first stage of the mechanism for implementing of two-level model of efficient management of loyalty was justified. It is based on the fundamental value systems of the formation of consumer commitment and institutional commitment of pharmaceutical professionals. The stage involves recruitment, selection and adaptation period for pharmaceutical professionals and pre-use of axiological questioning of consumers of pharmaceutic goods.

  12. The privacy implications of Bluetooth

    OpenAIRE

    Kostakos, Vassilis

    2008-01-01

    A substantial amount of research, as well as media hype, has surrounded RFID technology and its privacy implications. Currently, researchers and the media focus on the privacy threats posed by RFID, while consumer groups choose to boycott products bearing RFID tags. At the same, however, a very similar technology has quietly become part of our everyday lives: Bluetooth. In this paper we highlight the fact that Bluetooth is a widespread technology that has real privacy implications. Furthermor...

  13. Simple Peer-to-Peer SIP Privacy

    Science.gov (United States)

    Koskela, Joakim; Tarkoma, Sasu

    In this paper, we introduce a model for enhancing privacy in peer-to-peer communication systems. The model is based on data obfuscation, preventing intermediate nodes from tracking calls, while still utilizing the shared resources of the peer network. This increases security when moving between untrusted, limited and ad-hoc networks, when the user is forced to rely on peer-to-peer schemes. The model is evaluated using a Host Identity Protocol-based prototype on mobile devices, and is found to provide good privacy, especially when combined with a source address hiding scheme. The contribution of this paper is to present the model and results obtained from its use, including usability considerations.

  14. Thermodynamic modeling of mineralogical phases formed by continuous casting powders

    International Nuclear Information System (INIS)

    Romo-Castaneda, Julio; Cruz-Ramirez, Alejandro; Romero-Serrano, Antonio; Vargas-Ramirez, Marissa; Hallen-Lopez, Manuel

    2011-01-01

    A great amount of mineralogical phases were predicted and represented in stability phase diagrams, which were obtained by the use of the thermodynamic software FACTSage considering both the chemical composition and the melting temperature of the mould flux. Melting-solidification tests on commercial mould flux glasses for thin slab casting of steel revealed the existence of cuspidine (Ca 4 Si 2 O 7 F 2 ) as the main mineralogical phase formed during the flux solidification by X-ray powder diffraction (XRD). This phase directly influences the heat transfer phenomena from the strand to the mould and it is obtained with higher fluorite content (22% CaF 2 ). Cuspidine is desirable only in fluxes to produce medium carbon (included peritectic grade) steels, because it reduces the heat flux from the strand to the mould, thus controlling the shrinkage rate during the flux solidification. The experimental results are in agreement with those obtained by the thermodynamic software. The stability phase diagrams could be used as an important tool in the flux design for continuous casting process.

  15. Thermodynamic modeling of mineralogical phases formed by continuous casting powders

    Energy Technology Data Exchange (ETDEWEB)

    Romo-Castaneda, Julio [Metallurgy and Materials Department, Instituto Politecnico Nacional-ESIQIE, Apdo. P. 118-431, 07051 Mexico D.F. (Mexico); Cruz-Ramirez, Alejandro, E-mail: alcruzr@ipn.mx [Metallurgy and Materials Department, Instituto Politecnico Nacional-ESIQIE, Apdo. P. 118-431, 07051 Mexico D.F. (Mexico); Romero-Serrano, Antonio; Vargas-Ramirez, Marissa; Hallen-Lopez, Manuel [Metallurgy and Materials Department, Instituto Politecnico Nacional-ESIQIE, Apdo. P. 118-431, 07051 Mexico D.F. (Mexico)

    2011-01-10

    A great amount of mineralogical phases were predicted and represented in stability phase diagrams, which were obtained by the use of the thermodynamic software FACTSage considering both the chemical composition and the melting temperature of the mould flux. Melting-solidification tests on commercial mould flux glasses for thin slab casting of steel revealed the existence of cuspidine (Ca{sub 4}Si{sub 2}O{sub 7}F{sub 2}) as the main mineralogical phase formed during the flux solidification by X-ray powder diffraction (XRD). This phase directly influences the heat transfer phenomena from the strand to the mould and it is obtained with higher fluorite content (22% CaF{sub 2}). Cuspidine is desirable only in fluxes to produce medium carbon (included peritectic grade) steels, because it reduces the heat flux from the strand to the mould, thus controlling the shrinkage rate during the flux solidification. The experimental results are in agreement with those obtained by the thermodynamic software. The stability phase diagrams could be used as an important tool in the flux design for continuous casting process.

  16. Generalized Heteroskedasticity ACF for Moving Average Models in Explicit Forms

    Directory of Open Access Journals (Sweden)

    Samir Khaled Safi

    2014-02-01

    Full Text Available Normal 0 false false false MicrosoftInternetExplorer4 The autocorrelation function (ACF measures the correlation between observations at different   distances apart. We derive explicit equations for generalized heteroskedasticity ACF for moving average of order q, MA(q. We consider two cases: Firstly: when the disturbance term follow the general covariance matrix structure Cov(wi, wj=S with si,j ¹ 0 " i¹j . Secondly: when the diagonal elements of S are not all identical but sij = 0 " i¹j, i.e. S=diag(s11, s22,…,stt. The forms of the explicit equations depend essentially on the moving average coefficients and covariance structure of the disturbance terms.   /* Style Definitions */ table.MsoNormalTable {mso-style-name:"جدول عادي"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;}

  17. One Size Doesn’t Fit All: Measuring Individual Privacy in Aggregate Genomic Data

    Science.gov (United States)

    Simmons, Sean; Berger, Bonnie

    2017-01-01

    Even in the aggregate, genomic data can reveal sensitive information about individuals. We present a new model-based measure, PrivMAF, that provides provable privacy guarantees for aggregate data (namely minor allele frequencies) obtained from genomic studies. Unlike many previous measures that have been designed to measure the total privacy lost by all participants in a study, PrivMAF gives an individual privacy measure for each participant in the study, not just an average measure. These individual measures can then be combined to measure the worst case privacy loss in the study. Our measure also allows us to quantify the privacy gains achieved by perturbing the data, either by adding noise or binning. Our findings demonstrate that both perturbation approaches offer significant privacy gains. Moreover, we see that these privacy gains can be achieved while minimizing perturbation (and thus maximizing the utility) relative to stricter notions of privacy, such as differential privacy. We test PrivMAF using genotype data from the Wellcome Trust Case Control Consortium, providing a more nuanced understanding of the privacy risks involved in an actual genome-wide association studies. Interestingly, our analysis demonstrates that the privacy implications of releasing MAFs from a study can differ greatly from individual to individual. An implementation of our method is available at http://privmaf.csail.mit.edu. PMID:29202050

  18. Assessing the privacy policies in mobile personal health records.

    Science.gov (United States)

    Zapata, Belén Cruz; Hernández Niñirola, Antonio; Fernández-Alemán, José Luis; Toval, Ambrosio

    2014-01-01

    The huge increase in the number and use of smartphones and tablets has led health service providers to take an interest in mHealth. Popular mobile app markets like Apple App Store or Google Play contain thousands of health applications. Although mobile personal health records (mPHRs) have a number of benefits, important challenges appear in the form of adoption barriers. Security and privacy have been identified as part of these barriers and should be addressed. This paper analyzes and assesses a total of 24 free mPHRs for Android and iOS. Characteristics regarding privacy and security were extracted from the HIPAA. The results show important differences in both the mPHRs and the characteristics analyzed. A questionnaire containing six questions concerning privacy policies was defined. Our questionnaire may assist developers and stakeholders to evaluate the security and privacy of their mPHRs.

  19. European Perspectives on Privacy in the Sharing Economy

    DEFF Research Database (Denmark)

    Ranzini, Giulia; Etter, Michael; Vermeulen, Ivar

    Report from the EU H2020 Research Project Ps2Share: Participation, Privacy, and Power in the Sharing Economy. This report ‘European Perspectives on Privacy in the Sharing Economy’ forms one element of a European Union Horizon 2020 Research Project on the sharing economy: Ps2Share ‘Participation......, Privacy, and Power in the Sharing Economy’. The study is undertaken within the scope of the European Union’s Horizon 2020 research and innovation programme, funded under grant agreement No. 732117 and with the objective (ICT-35) of “Enabling responsible ICT-related research and innovation”. This project...... recommendations to Europe’s institutions. We focus on topics of participation, privacy, and power in the sharing economy....

  20. String model for the dynamics of glass-forming liquids.

    Science.gov (United States)

    Pazmiño Betancourt, Beatriz A; Douglas, Jack F; Starr, Francis W

    2014-05-28

    We test the applicability of a living polymerization theory to describe cooperative string-like particle rearrangement clusters (strings) observed in simulations of a coarse-grained polymer melt. The theory quantitatively describes the interrelation between the average string length L, configurational entropy Sconf, and the order parameter for string assembly Φ without free parameters. Combining this theory with the Adam-Gibbs model allows us to predict the relaxation time τ in a lower temperature T range than accessible by current simulations. In particular, the combined theories suggest a return to Arrhenius behavior near Tg and a low T residual entropy, thus avoiding a Kauzmann "entropy crisis."

  1. Permeability of model porous medium formed by random discs

    Science.gov (United States)

    Gubaidullin, A. A.; Gubkin, A. S.; Igoshin, D. E.; Ignatev, P. A.

    2018-03-01

    Two-dimension model of the porous medium with skeleton of randomly located overlapping discs is proposed. The geometry and computational grid are built in open package Salome. Flow of Newtonian liquid in longitudinal and transverse directions is calculated and its flow rate is defined. The numerical solution of the Navier-Stokes equations for a given pressure drop at the boundaries of the area is realized in the open package OpenFOAM. Calculated value of flow rate is used for defining of permeability coefficient on the base of Darcy law. For evaluating of representativeness of computational domain the permeability coefficients in longitudinal and transverse directions are compered.

  2. Cognitive Privacy for Personal Clouds

    Directory of Open Access Journals (Sweden)

    Milena Radenkovic

    2016-01-01

    Full Text Available This paper proposes a novel Cognitive Privacy (CogPriv framework that improves privacy of data sharing between Personal Clouds for different application types and across heterogeneous networks. Depending on the behaviour of neighbouring network nodes, their estimated privacy levels, resource availability, and social network connectivity, each Personal Cloud may decide to use different transmission network for different types of data and privacy requirements. CogPriv is fully distributed, uses complex graph contacts analytics and multiple implicit novel heuristics, and combines these with smart probing to identify presence and behaviour of privacy compromising nodes in the network. Based on sensed local context and through cooperation with remote nodes in the network, CogPriv is able to transparently and on-the-fly change the network in order to avoid transmissions when privacy may be compromised. We show that CogPriv achieves higher end-to-end privacy levels compared to both noncognitive cellular network communication and state-of-the-art strategies based on privacy-aware adaptive social mobile networks routing for a range of experiment scenarios based on real-world user and network traces. CogPriv is able to adapt to varying network connectivity and maintain high quality of service while managing to keep low data exposure for a wide range of privacy leakage levels in the infrastructure.

  3. Privacy vs. Reward in Indoor Location-Based Services

    Directory of Open Access Journals (Sweden)

    Fawaz Kassem

    2016-10-01

    Full Text Available With the advance of indoor localization technology, indoor location-based services (ILBS are gaining popularity. They, however, accompany privacy concerns. ILBS providers track the users’ mobility to learn more about their behavior, and then provide them with improved and personalized services. Our survey of 200 individuals highlighted their concerns about this tracking for potential leakage of their personal/private traits, but also showed their willingness to accept reduced tracking for improved service. In this paper, we propose PR-LBS (Privacy vs. Reward for Location-Based Service, a system that addresses these seemingly conflicting requirements by balancing the users’ privacy concerns and the benefits of sharing location information in indoor location tracking environments. PR-LBS relies on a novel location-privacy criterion to quantify the privacy risks pertaining to sharing indoor location information. It also employs a repeated play model to ensure that the received service is proportionate to the privacy risk. We implement and evaluate PR-LBS extensively with various real-world user mobility traces. Results show that PR-LBS has low overhead, protects the users’ privacy, and makes a good tradeoff between the quality of service for the users and the utility of shared location data for service providers.

  4. Technical Privacy Metrics: a Systematic Survey

    OpenAIRE

    Wagner, Isabel; Eckhoff, David

    2018-01-01

    The file attached to this record is the author's final peer reviewed version The goal of privacy metrics is to measure the degree of privacy enjoyed by users in a system and the amount of protection offered by privacy-enhancing technologies. In this way, privacy metrics contribute to improving user privacy in the digital world. The diversity and complexity of privacy metrics in the literature makes an informed choice of metrics challenging. As a result, instead of using existing metrics, n...

  5. Information privacy in organizations: empowering creative and extrarole performance.

    Science.gov (United States)

    Alge, Bradley J; Ballinger, Gary A; Tangirala, Subrahmaniam; Oakley, James L

    2006-01-01

    This article examines the relationship of employee perceptions of information privacy in their work organizations and important psychological and behavioral outcomes. A model is presented in which information privacy predicts psychological empowerment, which in turn predicts discretionary behaviors on the job, including creative performance and organizational citizenship behavior (OCB). Results from 2 studies (Study 1: single organization, N=310; Study 2: multiple organizations, N=303) confirm that information privacy entails judgments of information gathering control, information handling control, and legitimacy. Moreover, a model linking information privacy to empowerment and empowerment to creative performance and OCBs was supported. Findings are discussed in light of organizational attempts to control employees through the gathering and handling of their personal information. (c) 2006 APA, all rights reserved.

  6. Deriving a Set of Privacy Specific Heuristics for the Assessment of PHRs (Personal Health Records).

    Science.gov (United States)

    Furano, Riccardo F; Kushniruk, Andre; Barnett, Jeff

    2017-01-01

    With the emergence of personal health record (PHR) platforms becoming more widely available, this research focused on the development of privacy heuristics to assess PHRs regarding privacy. Existing sets of heuristics are typically not application specific and do not address patient-centric privacy as a main concern prior to undergoing PHR procurement. A set of privacy specific heuristics were developed based on a scoping review of the literature. An internet-based commercially available, vendor specific PHR application was evaluated using the derived set of privacy specific heuristics. The proposed set of privacy specific derived heuristics is explored in detail in relation to ISO 29100. The assessment of the internet-based commercially available, vendor specific PHR application indicated numerous violations. These violations were noted within the study. It is argued that the new derived privacy heuristics should be used in addition to Nielsen's well-established set of heuristics. Privacy specific heuristics could be used to assess PHR portal system-level privacy mechanisms in the procurement process of a PHR application and may prove to be a beneficial form of assessment to prevent the selection of a PHR platform with a poor privacy specific interface design.

  7. Privacy preserving interactive record linkage (PPIRL).

    Science.gov (United States)

    Kum, Hye-Chung; Krishnamurthy, Ashok; Machanavajjhala, Ashwin; Reiter, Michael K; Ahalt, Stanley

    2014-01-01

    Record linkage to integrate uncoordinated databases is critical in biomedical research using Big Data. Balancing privacy protection against the need for high quality record linkage requires a human-machine hybrid system to safely manage uncertainty in the ever changing streams of chaotic Big Data. In the computer science literature, private record linkage is the most published area. It investigates how to apply a known linkage function safely when linking two tables. However, in practice, the linkage function is rarely known. Thus, there are many data linkage centers whose main role is to be the trusted third party to determine the linkage function manually and link data for research via a master population list for a designated region. Recently, a more flexible computerized third-party linkage platform, Secure Decoupled Linkage (SDLink), has been proposed based on: (1) decoupling data via encryption, (2) obfuscation via chaffing (adding fake data) and universe manipulation; and (3) minimum information disclosure via recoding. We synthesize this literature to formalize a new framework for privacy preserving interactive record linkage (PPIRL) with tractable privacy and utility properties and then analyze the literature using this framework. Human-based third-party linkage centers for privacy preserving record linkage are the accepted norm internationally. We find that a computer-based third-party platform that can precisely control the information disclosed at the micro level and allow frequent human interaction during the linkage process, is an effective human-machine hybrid system that significantly improves on the linkage center model both in terms of privacy and utility.

  8. The Privacy Coach: Supporting customer privacy in the Internet of Things

    OpenAIRE

    Broenink, Gerben; Hoepman, Jaap-Henk; Hof, Christian van 't; van Kranenburg, Rob; Smits, David; Wisman, Tijmen

    2010-01-01

    The Privacy Coach is an application running on a mobile phone that supports customers in making privacy decisions when confronted with RFID tags. The approach we take to increase customer privacy is a radical departure from the mainstream research efforts that focus on implementing privacy enhancing technologies on the RFID tags themselves. Instead the Privacy Coach functions as a mediator between customer privacy preferences and corporate privacy policies, trying to find a match between the ...

  9. Privacy, Liveliness and Fairness for Reputation

    Science.gov (United States)

    Schiffner, Stefan; Clauß, Sebastian; Steinbrecher, Sandra

    In various Internet applications, reputation systems are typical means to collect experiences users make with each other. We present a reputation system that balances the security and privacy requirements of all users involed. Our system provides privacy in the form of information theoretic relationship anonymity w.r.t. users and the reputation provider. Furthermore, it preserves liveliness, i.e., all past ratings can influence the current reputation profile of a user. In addition, mutual ratings are forced to be simultaneous and self rating is prevented, which enforces fairness. What is more, without performing mock interactions - even if all users are colluding - users cannot forge ratings. As far as we know, this is the first protocol proposed that fulfills all these properties simultaneously.

  10. Privacy Law and Print Photojournalism.

    Science.gov (United States)

    Dykhouse, Caroline Dow

    Reviews of publications about privacy law, of recent court actions, and of interviews with newspaper photographers and attorneys indicate that torts of privacy often conflict with the freedoms to publish and to gather news. Although some guidelines have already been established (about running distorted pictures, "stealing" pictures, taking…

  11. Story Lab: Student Data Privacy

    Science.gov (United States)

    Herold, Benjamin

    2015-01-01

    Student data privacy is an increasingly high-profile--and controversial--issue that touches schools and families across the country. There are stories to tell in virtually every community. About three dozen states have passed legislation addressing student data privacy in the past two years, and eight different proposals were floating around…

  12. Privacy and Big Data

    CERN Document Server

    Craig, Terence

    2011-01-01

    Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once data's been collected, we have absolutely no control over who uses it or how it is used. Personal data is the hottest commodity on the market today-truly more valuable than gold. We are the asset that every company, industry, non-profit, and government wants. Pri

  13. Speech Privacy Problems

    Science.gov (United States)

    1945-08-18

    eondwious, «ach AnvoWnc either one or tiro staple m^aSattoa processes. The British teo -dimensioaai privacy system eUiissd both ire- oasaay ana time...of the 884 gas tube and ground showed that the tubs did not re- main fired throughout the duration of the 4- kc puls.e. Instead, the tube fired on...ouri’ent through the relay circuit was not sufficient to: permit its firm operation, especially when the amplitude of the 4~ kc pulse was low. This

  14. User Privacy in RFID Networks

    Science.gov (United States)

    Singelée, Dave; Seys, Stefaan

    Wireless RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty cards, etc. Although RFID technology offers interesting services to customers and retailers, it could also endanger the privacy of the end-users. The lack of protection mechanisms being deployed could potentially result in a privacy leakage of personal data. Furthermore, there is the emerging threat of location privacy. In this paper, we will show some practical attack scenarios and illustrates some of them with cases that have received press coverage. We will present the main challenges of enhancing privacy in RFID networks and evaluate some solutions proposed in literature. The main advantages and shortcomings will be briefly discussed. Finally, we will give an overview of some academic and industrial research initiatives on RFID privacy.

  15. GAIN RATIO BASED FEATURE SELECTION METHOD FOR PRIVACY PRESERVATION

    Directory of Open Access Journals (Sweden)

    R. Praveena Priyadarsini

    2011-04-01

    Full Text Available Privacy-preservation is a step in data mining that tries to safeguard sensitive information from unsanctioned disclosure and hence protecting individual data records and their privacy. There are various privacy preservation techniques like k-anonymity, l-diversity and t-closeness and data perturbation. In this paper k-anonymity privacy protection technique is applied to high dimensional datasets like adult and census. since, both the data sets are high dimensional, feature subset selection method like Gain Ratio is applied and the attributes of the datasets are ranked and low ranking attributes are filtered to form new reduced data subsets. K-anonymization privacy preservation technique is then applied on reduced datasets. The accuracy of the privacy preserved reduced datasets and the original datasets are compared for their accuracy on the two functionalities of data mining namely classification and clustering using naïve Bayesian and k-means algorithm respectively. Experimental results show that classification and clustering accuracy are comparatively the same for reduced k-anonym zed datasets and the original data sets.

  16. Preserving Differential Privacy for Similarity Measurement in Smart Environments

    Directory of Open Access Journals (Sweden)

    Kok-Seng Wong

    2014-01-01

    Full Text Available Advances in both sensor technologies and network infrastructures have encouraged the development of smart environments to enhance people’s life and living styles. However, collecting and storing user’s data in the smart environments pose severe privacy concerns because these data may contain sensitive information about the subject. Hence, privacy protection is now an emerging issue that we need to consider especially when data sharing is essential for analysis purpose. In this paper, we consider the case where two agents in the smart environment want to measure the similarity of their collected or stored data. We use similarity coefficient function FSC as the measurement metric for the comparison with differential privacy model. Unlike the existing solutions, our protocol can facilitate more than one request to compute FSC without modifying the protocol. Our solution ensures privacy protection for both the inputs and the computed FSC results.

  17. Privacy-preserving efficient searchable encryption

    OpenAIRE

    Ferreira, Bernardo Luís da Silva

    2016-01-01

    Data storage and computation outsourcing to third-party managed data centers, in environments such as Cloud Computing, is increasingly being adopted by individuals, organizations, and governments. However, as cloud-based outsourcing models expand to society-critical data and services, the lack of effective and independent control over security and privacy conditions in such settings presents significant challenges. An interesting solution to these issues is to perform comput...

  18. Redefining Genomic Privacy: Trust and Empowerment

    OpenAIRE

    Erlich, Yaniv; Williams, James B.; Glazer, David; Yocum, Kenneth; Farahany, Nita; Olson, Maynard; Narayanan, Arvind; Stein, Lincoln D.; Witkowski, Jan A.; Kain, Robert C.

    2014-01-01

    Fulfilling the promise of the genetic revolution requires the analysis of large datasets containing information from thousands to millions of participants. However, sharing human genomic data requires protecting subjects from potential harm. Current models rely on de-identification techniques in which privacy versus data utility becomes a zero-sum game. Instead, we propose the use of trust-enabling techniques to create a solution in which researchers and participants both win. To do so we int...

  19. PRIVACY IN CLOUD COMPUTING: A SURVEY

    OpenAIRE

    Arockiam L; Parthasarathy G; Monikandan S

    2012-01-01

    Various cloud computing models are used to increase the profit of an organization. Cloud provides a convenient environment and more advantages to business organizations to run their business. But, it has some issues related to the privacy of data. User’s data are stored and maintained out of user’s premises. The failure of data protection causes many issues like data theft which affects the individual organization. The cloud users may be satisfied, if their data are protected p...

  20. New Collaborative Filtering Algorithms Based on SVD++ and Differential Privacy

    Directory of Open Access Journals (Sweden)

    Zhengzheng Xian

    2017-01-01

    Full Text Available Collaborative filtering technology has been widely used in the recommender system, and its implementation is supported by the large amount of real and reliable user data from the big-data era. However, with the increase of the users’ information-security awareness, these data are reduced or the quality of the data becomes worse. Singular Value Decomposition (SVD is one of the common matrix factorization methods used in collaborative filtering, which introduces the bias information of users and items and is realized by using algebraic feature extraction. The derivative model SVD++ of SVD achieves better predictive accuracy due to the addition of implicit feedback information. Differential privacy is defined very strictly and can be proved, which has become an effective measure to solve the problem of attackers indirectly deducing the personal privacy information by using background knowledge. In this paper, differential privacy is applied to the SVD++ model through three approaches: gradient perturbation, objective-function perturbation, and output perturbation. Through theoretical derivation and experimental verification, the new algorithms proposed can better protect the privacy of the original data on the basis of ensuring the predictive accuracy. In addition, an effective scheme is given that can measure the privacy protection strength and predictive accuracy, and a reasonable range for selection of the differential privacy parameter is provided.

  1. A Study on Ganui-Dae's External Form and Its Modeling for Ganui-Dae's External Form and Its Modeling for Restoration

    Science.gov (United States)

    Lee, Min-Soo; Lee, Yong Sam; Jeon, Jun Hyeok; Kim, Sang Hyuk

    2013-12-01

    Ganui-Dae, built in the reign of King Sejong, Joseon Dynasty, is a comprehensive observatory. It has various instruments for observation and time signal such as Ganui, Gyupyo(Gnomon), water-hammering type Honui and Honsang, and so on. Studying on Ganui-Dae has been focused on its location, history, criterion, etc, so far. However, studying on its external form and construction method has been conducted insufficiently. This study suggests the model for restoration of Ganui-Dae. The model is based on the analysis about external form of Ganui-Dae in various antique maps, and its construction method in those days.

  2. A Generic Privacy Quantification Framework for Privacy-Preserving Data Publishing

    Science.gov (United States)

    Zhu, Zutao

    2010-01-01

    In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…

  3. 76 FR 64115 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-10-17

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-092)] Privacy Act of 1974; Privacy Act... retirement of one Privacy Act system of records notice. SUMMARY: In accordance with the Privacy Act of 1974, NASA is giving notice that it proposes to cancel the following Privacy Act system of records notice...

  4. Separating form factor and nuclear model effects in quasielastic neutrino-nucleus scattering

    Science.gov (United States)

    Wieske, Joseph

    2017-09-01

    When studying neutrino oscillations an understanding of charged current quasielastic (CCQE) neutrino-nucleus scattering is imperative. This interaction depends on a nuclear model as well as knowledge of form factors. In the past, CCQE data from the MiniBooNE experiment was analyzed assuming the Relativistic Fermi Gas (RFG) nuclear model, an axial dipole form factor in, and using the the z-expansion for the axial form factor in. We present the first analysis that combines a non-RFG nuclear model, in particular the Correlated Fermi Gas nuclear model (CFG) of, and the z expansion for the axial form factor. This will allow us to separate form factor and nuclear model effects in CCQE scattering. This project was supported through the Wayne State University REU program under NSF Grant PHY-1460853 and by the DOE Grant DE-SC0007983.

  5. Trust information-based privacy architecture for ubiquitous health.

    Science.gov (United States)

    Ruotsalainen, Pekka Sakari; Blobel, Bernd; Seppälä, Antto; Nykänen, Pirkko

    2013-10-08

    Ubiquitous health is defined as a dynamic network of interconnected systems that offers health services independent of time and location to a data subject (DS). The network takes place in open and unsecure information space. It is created and managed by the DS who sets rules that regulate the way personal health information is collected and used. Compared to health care, it is impossible in ubiquitous health to assume the existence of a priori trust between the DS and service providers and to produce privacy using static security services. In ubiquitous health features, business goals and regulations systems followed often remain unknown. Furthermore, health care-specific regulations do not rule the ways health data is processed and shared. To be successful, ubiquitous health requires novel privacy architecture. The goal of this study was to develop a privacy management architecture that helps the DS to create and dynamically manage the network and to maintain information privacy. The architecture should enable the DS to dynamically define service and system-specific rules that regulate the way subject data is processed. The architecture should provide to the DS reliable trust information about systems and assist in the formulation of privacy policies. Furthermore, the architecture should give feedback upon how systems follow the policies of DS and offer protection against privacy and trust threats existing in ubiquitous environments. A sequential method that combines methodologies used in system theory, systems engineering, requirement analysis, and system design was used in the study. In the first phase, principles, trust and privacy models, and viewpoints were selected. Thereafter, functional requirements and services were developed on the basis of a careful analysis of existing research published in journals and conference proceedings. Based on principles, models, and requirements, architectural components and their interconnections were developed using system

  6. 48 CFR 39.105 - Privacy.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  7. Collecting and Analyzing Data from Smart Device Users with Local Differential Privacy

    OpenAIRE

    Nguyên, Thông T.; Xiao, Xiaokui; Yang, Yin; Hui, Siu Cheung; Shin, Hyejin; Shin, Junbum

    2016-01-01

    Organizations with a large user base, such as Samsung and Google, can potentially benefit from collecting and mining users' data. However, doing so raises privacy concerns, and risks accidental privacy breaches with serious consequences. Local differential privacy (LDP) techniques address this problem by only collecting randomized answers from each user, with guarantees of plausible deniability; meanwhile, the aggregator can still build accurate models and predictors by analyzing large amount...

  8. A Simulation Model on the Competition for Light of Meadow-forming and Canopy-forming Aquatic Macrophytes at High and Low Nutrient Availability

    National Research Council Canada - National Science Library

    Best, Elly

    2004-01-01

    A simulation model has been developed that focuses on the ability of two competing submersed macrophytes, meadow-forming and canopy-forming, to maintain their biomass under different environmental conditions...

  9. Advanced research in data privacy

    CERN Document Server

    Torra, Vicenç

    2015-01-01

    This book provides an overview of the research work on data privacy and privacy enhancing technologies carried by the participants of the ARES project. ARES (Advanced Research in Privacy an Security, CSD2007-00004) has been one of the most important research projects funded by the Spanish Government in the fields of computer security and privacy. It is part of the now extinct CONSOLIDER INGENIO 2010 program, a highly competitive program which aimed to advance knowledge and open new research lines among top Spanish research groups. The project started in 2007 and will finish this 2014. Composed by 6 research groups from 6 different institutions, it has gathered an important number of researchers during its lifetime. Among the work produced by the ARES project, one specific work package has been related to privacy. This books gathers works produced by members of the project related to data privacy and privacy enhancing technologies. The presented works not only summarize important research carried in the proje...

  10. Redefining genomic privacy: trust and empowerment.

    Directory of Open Access Journals (Sweden)

    Yaniv Erlich

    2014-11-01

    Full Text Available Fulfilling the promise of the genetic revolution requires the analysis of large datasets containing information from thousands to millions of participants. However, sharing human genomic data requires protecting subjects from potential harm. Current models rely on de-identification techniques in which privacy versus data utility becomes a zero-sum game. Instead, we propose the use of trust-enabling techniques to create a solution in which researchers and participants both win. To do so we introduce three principles that facilitate trust in genetic research and outline one possible framework built upon those principles. Our hope is that such trust-centric frameworks provide a sustainable solution that reconciles genetic privacy with data sharing and facilitates genetic research.

  11. Redefining genomic privacy: trust and empowerment.

    Science.gov (United States)

    Erlich, Yaniv; Williams, James B; Glazer, David; Yocum, Kenneth; Farahany, Nita; Olson, Maynard; Narayanan, Arvind; Stein, Lincoln D; Witkowski, Jan A; Kain, Robert C

    2014-11-01

    Fulfilling the promise of the genetic revolution requires the analysis of large datasets containing information from thousands to millions of participants. However, sharing human genomic data requires protecting subjects from potential harm. Current models rely on de-identification techniques in which privacy versus data utility becomes a zero-sum game. Instead, we propose the use of trust-enabling techniques to create a solution in which researchers and participants both win. To do so we introduce three principles that facilitate trust in genetic research and outline one possible framework built upon those principles. Our hope is that such trust-centric frameworks provide a sustainable solution that reconciles genetic privacy with data sharing and facilitates genetic research.

  12. Towards Privacy Managment of Information Systems

    OpenAIRE

    Drageide, Vidar

    2009-01-01

    This masters thesis provides insight into the concept of privacy. It argues why privacy is important, and why developers and system owners should keep privacy in mind when developing and maintaining systems containing personal information. Following this, a strategy for evaluating the overall level of privacy in a system is defined. The strategy is then applied to parts of the cellphone system in an attempt to evaluate the privacy of traffic and location data in this system.

  13. An Alternative View of Privacy on Facebook

    OpenAIRE

    Christian Fuchs

    2011-01-01

    The predominant analysis of privacy on Facebook focuses on personal information revelation. This paper is critical of this kind of research and introduces an alternative analytical framework for studying privacy on Facebook, social networking sites and web 2.0. This framework is connecting the phenomenon of online privacy to the political economy of capitalism—a focus that has thus far been rather neglected in research literature about Internet and web 2.0 privacy. Liberal privacy philosophy ...

  14. Adding query privacy to robust DHTs

    DEFF Research Database (Denmark)

    Backes, Michael; Goldberg, Ian; Kate, Aniket

    2012-01-01

    intermediate peers that (help to) route the queries towards their destinations. In this paper, we satisfy this requirement by presenting an approach for providing privacy for the keys in DHT queries. We use the concept of oblivious transfer (OT) in communication over DHTs to preserve query privacy without...... privacy over robust DHTs. Finally, we compare the performance of our privacy-preserving protocols with their more privacy-invasive counterparts. We observe that there is no increase in the message complexity...

  15. Skyrme-model πNN form factor and nucleon-nucleon interaction

    International Nuclear Information System (INIS)

    Holzwarth, G.; Machleidt, R.

    1997-01-01

    We apply the strong πNN form factor, which emerges from the Skyrme model, in the two-nucleon system using a one-boson-exchange (OBE) model for the nucleon-nucleon (NN) interaction. Deuteron properties and phase parameters of NN scattering are reproduced well. In contrast to the form factor of monopole shape that is traditionally used in OBE models, the Skyrme form factor leaves low-momentum transfers essentially unaffected while it suppresses the high-momentum region strongly. It turns out that this behavior is very appropriate for models of the NN interaction and makes it possible to use a soft pion form factor in the NN system. As a consequence, the πN and the NN systems can be described using the same πNN form factor, which is impossible with the monopole. copyright 1997 The American Physical Society

  16. A secure data privacy preservation for on-demand

    Directory of Open Access Journals (Sweden)

    Dhasarathan Chandramohan

    2017-04-01

    Full Text Available This paper spotlights privacy and its obfuscation issues of intellectual, confidential information owned by insurance and finance sectors. Privacy risk in business era if authoritarians misuse secret information. Software interruptions in steeling digital data in the name of third party services. Liability in digital secrecy for the business continuity isolation, mishandling causing privacy breaching the vicinity and its preventive phenomenon is scrupulous in the cloud, where a huge amount of data is stored and maintained enormously. In this developing IT-world toward cloud, users privacy protection is becoming a big question , albeit cloud computing made changes in the computing field by increasing its effectiveness, efficiency and optimization of the service environment etc, cloud users data and their identity, reliability, maintainability and privacy may vary for different CPs (cloud providers. CP ensures that the user’s proprietary information is maintained more secretly with current technologies. More remarkable occurrence is even the cloud provider does not have suggestions regarding the information and the digital data stored and maintained globally anywhere in the cloud. The proposed system is one of the obligatory research issues in cloud computing. We came forward by proposing the Privacy Preserving Model to Prevent Digital Data Loss in the Cloud (PPM–DDLC. This proposal helps the CR (cloud requester/users to trust their proprietary information and data stored in the cloud.

  17. Privacy and CHI : methodologies for studying privacy issues

    NARCIS (Netherlands)

    Patil, S.; Romero, N.A.; Karat, J.

    2006-01-01

    This workshop aims to reflect on methodologies to empirically study privacy issues related to advanced technology. The goal is to address methodological concerns by drawing upon both theoretical perspectives as well as practical experiences.

  18. Modeling the degradation of a metallic waste form intended for geologic disposal

    International Nuclear Information System (INIS)

    Bauer, T.H.; Morris, E.E.

    2007-01-01

    Nuclear reactors operating with metallic fuels have led to development of robust metallic waste forms intended to immobilize hazardous constituents in oxidizing environments. Release data from a wide range of tests where small waste form samples have been immersed in a variety of oxidizing solutions have been analyzed and fit to a mechanistically-derived 'logarithmic growth' form for waste form degradation. A bounding model is described which plausibly extrapolates these fits to long-term degradation in a geologic repository. The resulting empirically-fit degradation model includes dependence on solution pH, temperature, and chloride concentration as well as plausible estimates of statistical uncertainty. (authors)

  19. When Differential Privacy Meets Randomized Perturbation: A Hybrid Approach for Privacy-Preserving Recommender System

    KAUST Repository

    Liu, Xiao; Liu, An; Zhang, Xiangliang; Li, Zhixu; Liu, Guanfeng; Zhao, Lei; Zhou, Xiaofang

    2017-01-01

    result. However, none is designed for both hiding users’ private data and preventing privacy inference. To achieve this goal, we propose in this paper a hybrid approach for privacy-preserving recommender systems by combining differential privacy (DP

  20. Performing privacy in schools

    DEFF Research Database (Denmark)

    Lauritsen, Peter; Bøge, Ask Risom; Andersen, Lars Bo

    with technologies is carried out as well as observation is conducted. We obtain and present new knowledge about how surveillance is practiced in the interpersonal relations of students and teachers. References: Monahan, T., & Torres, R. D. (2009). Schools Under Surveillance: Cultures of Control in Public Education....... Rutgers University Press. Selwyn, N. (2010). Schools and Schooling in the Digital Age: A Critical Analysis. Routledge. Taylor, E. (2013). Surveillance Schools: Security, Discipline and Control in Contemporary Education. Palgrave Macmillan UK. Taylor, E., & Rooney, T. (2016). Surveillance Futures: Social......In this presentation we pursue the question: How is privacy performed and perceived in schools by children? Our aim is to investigate how the boundaries between public and private spheres are continuously performed in the formal setting of the classroom as well as in the social lives of students...

  1. Parasiteware: Unlocking Personal Privacy

    Directory of Open Access Journals (Sweden)

    Daniel B. Garrie

    2006-09-01

    Full Text Available Spyware presents a threat of privacy infringement to unassuming internet users irrespective of their country of citizenship. European legislation attempts to protect end-users from unethical processing of their personal data. Spyware technologies, however, skirts these laws and often break them in their entirety. Outlawing the spyware and strengthening the legal consent requirement to mine data are statutory solutions that can prevent spyware users from skirting the law. An internationally standardized technology education system for the judiciaries in Europe and the U.S. can help ensure that when spyware users do break the law, they cannot hide by escaping from one nation to another without being held accountable. Transnational improvements are necessary to remedy the global spyware epidemic.

  2. The Privacy Calculus: Mobile Apps and User Perceptions of Privacy and Security

    Directory of Open Access Journals (Sweden)

    Elizabeth Fife

    2012-07-01

    Full Text Available A continuing stream of new mobile data services are being released that rely upon the collection of personal data to support a business model. New technologies including facial recognition, sensors and Near Field Communications (NFC will increasingly become a part of everyday services and applications that challenge traditional concepts of individual privacy. The average person as well as the “tech‐savvy” mobile phone user may not yet be fully aware of the extent to which their privacy and security are being affected through their mobile activities and how comparable this situation is to personal computer usage. We investigate perceptions and usage of mobile data services that appear to have specific privacy and security sensitivities, specifically social networking,\tbanking/payments\tand\thealth‐related activities. Our annual survey of smartphone users in the U.S. and Japan is presented from 2011. This nationally representative survey data is used to show demographic and cultural differences, and substantiate our hypotheses about the links between use and privacy concerns

  3. On form factors of the conjugated field in the non-linear Schroedinger model

    Energy Technology Data Exchange (ETDEWEB)

    Kozlowski, K.K.

    2011-05-15

    Izergin-Korepin's lattice discretization of the non-linear Schroedinger model along with Oota's inverse problem provides one with determinant representations for the form factors of the lattice discretized conjugated field operator. We prove that these form factors converge, in the zero lattice spacing limit, to those of the conjugated field operator in the continuous model. We also compute the large-volume asymptotic behavior of such form factors in the continuous model. These are in particular characterized by Fredholm determinants of operators acting on closed contours. We provide a way of defining these Fredholm determinants in the case of generic paramaters. (orig.)

  4. Personal Information Request Form

    International Development Research Centre (IDRC) Digital Library (Canada)

    PC Forms Inc. 834-4048

    To apply for information under the Privacy Act, complete this form or a written request mentioning the Act. Describe the information being sought and provide any relevant details necessary to help the. International Development Research Centre. (IDRC) find it. If you require assistance, refer to. Info Source (Sources of ...

  5. Biomedical databases: protecting privacy and promoting research.

    Science.gov (United States)

    Wylie, Jean E; Mineau, Geraldine P

    2003-03-01

    When combined with medical information, large electronic databases of information that identify individuals provide superlative resources for genetic, epidemiology and other biomedical research. Such research resources increasingly need to balance the protection of privacy and confidentiality with the promotion of research. Models that do not allow the use of such individual-identifying information constrain research; models that involve commercial interests raise concerns about what type of access is acceptable. Researchers, individuals representing the public interest and those developing regulatory guidelines must be involved in an ongoing dialogue to identify practical models.

  6. Physical factors that influence patients’ privacy perception toward a psychiatric behavioral monitoring system: a qualitative study

    Science.gov (United States)

    Zakaria, Nasriah; Ramli, Rusyaizila

    2018-01-01

    Background Psychiatric patients have privacy concerns when it comes to technology intervention in the hospital setting. In this paper, we present scenarios for psychiatric behavioral monitoring systems to be placed in psychiatric wards to understand patients’ perception regarding privacy. Psychiatric behavioral monitoring refers to systems that are deemed useful in measuring clinical outcomes, but little research has been done on how these systems will impact patients’ privacy. Methods We conducted a case study in one teaching hospital in Malaysia. We investigated the physical factors that influence patients’ perceived privacy with respect to a psychiatric monitoring system. The eight physical factors identified from the information system development privacy model, a comprehensive model for designing a privacy-sensitive information system, were adapted in this research. Scenario-based interviews were conducted with 25 patients in a psychiatric ward for 3 months. Results Psychiatric patients were able to share how physical factors influence their perception of privacy. Results show how patients responded to each of these dimensions in the context of a psychiatric behavioral monitoring system. Conclusion Some subfactors under physical privacy are modified to reflect the data obtained in the interviews. We were able to capture the different physical factors that influence patient privacy. PMID:29343963

  7. Physical factors that influence patients' privacy perception toward a psychiatric behavioral monitoring system: a qualitative study.

    Science.gov (United States)

    Zakaria, Nasriah; Ramli, Rusyaizila

    2018-01-01

    Psychiatric patients have privacy concerns when it comes to technology intervention in the hospital setting. In this paper, we present scenarios for psychiatric behavioral monitoring systems to be placed in psychiatric wards to understand patients' perception regarding privacy. Psychiatric behavioral monitoring refers to systems that are deemed useful in measuring clinical outcomes, but little research has been done on how these systems will impact patients' privacy. We conducted a case study in one teaching hospital in Malaysia. We investigated the physical factors that influence patients' perceived privacy with respect to a psychiatric monitoring system. The eight physical factors identified from the information system development privacy model, a comprehensive model for designing a privacy-sensitive information system, were adapted in this research. Scenario-based interviews were conducted with 25 patients in a psychiatric ward for 3 months. Psychiatric patients were able to share how physical factors influence their perception of privacy. Results show how patients responded to each of these dimensions in the context of a psychiatric behavioral monitoring system. Some subfactors under physical privacy are modified to reflect the data obtained in the interviews. We were able to capture the different physical factors that influence patient privacy.

  8. Privacy Preserving Distributed Data Mining

    Data.gov (United States)

    National Aeronautics and Space Administration — Distributed data mining from privacy-sensitive multi-party data is likely to play an important role in the next generation of integrated vehicle health monitoring...

  9. Distributed privacy preserving data collection

    KAUST Repository

    Xue, Mingqiang; Papadimitriou, Panagiotis D.; Raï ssi, Chedy; Kalnis, Panos; Pung, Hungkeng

    2011-01-01

    an anonymized table by generalization of quasi-identifier attributes. The protocol employs cryptographic techniques such as homomorphic encryption, private information retrieval and secure multiparty computation to ensure the privacy goal in the process of data

  10. Librarians, Civil Liberties and Privacy.

    Science.gov (United States)

    Fielding, Derek

    1978-01-01

    A comparison of current civil liberties issues in Australia with the status of similar issues in Britain and the United States. Included are political affiliation of government employees, censorship, rights of the individual, privacy, and freedom of information. (JAB)

  11. Privacy Impact Assessment (PIA) Repository

    Data.gov (United States)

    Department of Veterans Affairs — This repository contains Privacy Impact Assessments (PIA) that have been vetted/approved. Section 208 of the Electronic Government Act of 2002 (E-Gov Act) requires...

  12. Multi-scale friction modeling for sheet metal forming: the boundary lubrication regime

    NARCIS (Netherlands)

    Hol, J.D.; Meinders, Vincent T.; de Rooij, Matthias B.; van den Boogaard, Antonius H.

    2015-01-01

    A physical based friction model is presented to describe friction in full-scale forming simulations. The advanced friction model accounts for the change in surface topography and the evolution of friction in the boundary lubrication regime. The implementation of the friction model in FE software

  13. On the structure of the space of geometric product-form models

    NARCIS (Netherlands)

    Bayer, Nimrod; Boucherie, Richardus J.

    2002-01-01

    This article deals with Markovian models defined on a finite-dimensional discrete state space and possess a stationary state distribution of a product-form. We view the space of such models as a mathematical object and explore its structure. We focus on models on an orthant [script Z]+n, which are

  14. Remarks on electromagnetic form factors of hadrons in the quark model

    International Nuclear Information System (INIS)

    Vainshtein, A.I.; Zakharov, V.I.

    1977-01-01

    Relations between the transversal and longitudinal parts of elastic and quasielastic form factors are studied within the quark model. It is shown that for an even number of the constituent quarks the longitudinal part dominates while for an odd number the transversal part is the largest one. Consequences form this result are considered for deuteron form factor and for matrix elements of the electromagnetic transitions between π, rho, A 1 mesons

  15. Privacy-preserving Identity Management

    OpenAIRE

    Milutinovic, Milica

    2015-01-01

    With the technological advances and the evolution of online services, user privacy is becoming a crucial issue in the modern day society. Privacy in the general sense refers to individuals’ ability to protect information about themselves and selectively present it to other entities. This concept is nowadays strongly affected by everyday practices that assume personal data disclosure, such as online shopping and participation in loyalty schemes. This makes it difficult for an individual to con...

  16. PRIVACY CONCERNS IN FACEBOOK SITE

    OpenAIRE

    Vandana Singh

    2014-01-01

    Today social networking sites play an important role and inexpensive way to maintain existing relationships and present oneself. However, the increasing use of online sites give rise to privacy concerns and risks. All Internet sites are also under attack from phishers, fraudsters, and spammers. They aim to steal user information and expose users to unwanted spam. They have so many resources at their disposal.This paper studies the awareness of college students regarding the privacy in Faceboo...

  17. Security and privacy in biometrics

    CERN Document Server

    Campisi, Patrizio

    2013-01-01

    This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and features: presents a unique focus on novel approaches and new architectures for unimodal and multimodal template protection; examines signal processing techniques in the encrypted domain, security and privacy leakage assessment, and aspects of standardizati

  18. Hacking Facebook Privacy and Security

    Science.gov (United States)

    2012-08-28

    REPORT Hacking Facebook Privacy and Security 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: When people talk about hacking and social networks , they’re...12211 Research Triangle Park, NC 27709-2211 15. SUBJECT TERMS Facebook , Privacy, Security, Social Network Dr. Jeff Duffany (Advisor), Omar Galban...transmit personal information that many people that they dare not do it personally. FACEBOOK PLATFORM Facebook is a popular social networking

  19. Privacy concerns in smart cities

    OpenAIRE

    van Zoonen, Liesbet

    2016-01-01

    textabstractIn this paper a framework is constructed to hypothesize if and how smart city technologies and urban big data produce privacy concerns among the people in these cities (as inhabitants, workers, visitors, and otherwise). The framework is built on the basis of two recurring dimensions in research about people's concerns about privacy: one dimensions represents that people perceive particular data as more personal and sensitive than others, the other dimension represents that people'...

  20. A Distributed Ensemble Approach for Mining Healthcare Data under Privacy Constraints.

    Science.gov (United States)

    Li, Yan; Bai, Changxin; Reddy, Chandan K

    2016-02-10

    In recent years, electronic health records (EHRs) have been widely adapted at many healthcare facilities in an attempt to improve the quality of patient care and increase the productivity and efficiency of healthcare delivery. These EHRs can accurately diagnose diseases if utilized appropriately. While the EHRs can potentially resolve many of the existing problems associated with disease diagnosis, one of the main obstacles in effectively using them is the patient privacy and sensitivity of the medical information available in the EHR. Due to these concerns, even if the EHRs are available for storage and retrieval purposes, sharing of the patient records between different healthcare facilities has become a major concern and has hampered some of the effective advantages of using EHRs. Due to this lack of data sharing, most of the facilities aim at building clinical decision support systems using limited amount of patient data from their own EHR systems to provide important diagnosis related decisions. It becomes quite infeasible for a newly established healthcare facility to build a robust decision making system due to the lack of sufficient patient records. However, to make effective decisions from clinical data, it is indispensable to have large amounts of data to train the decision models. In this regard, there are conflicting objectives of preserving patient privacy and having sufficient data for modeling and decision making. To handle such disparate goals, we develop two adaptive distributed privacy-preserving algorithms based on a distributed ensemble strategy. The basic idea of our approach is to build an elegant model for each participating facility to accurately learn the data distribution, and then can transfer the useful healthcare knowledge acquired on their data from these participators in the form of their own decision models without revealing and sharing the patient-level sensitive data, thus protecting patient privacy. We demonstrate that our

  1. Form factors in quantum integrable models with GL(3)-invariant R-matrix

    Energy Technology Data Exchange (ETDEWEB)

    Pakuliak, S., E-mail: pakuliak@theor.jinr.ru [Laboratory of Theoretical Physics, JINR, 141980 Dubna, Moscow Reg. (Russian Federation); Moscow Institute of Physics and Technology, 141700 Dolgoprudny, Moscow Reg. (Russian Federation); Institute of Theoretical and Experimental Physics, 117259 Moscow (Russian Federation); Ragoucy, E., E-mail: eric.ragoucy@lapth.cnrs.fr [Laboratoire de Physique Théorique LAPTH, CNRS and Université de Savoie, BP 110, 74941 Annecy-le-Vieux Cedex (France); Slavnov, N.A., E-mail: nslavnov@mi.ras.ru [Steklov Mathematical Institute, Moscow (Russian Federation)

    2014-04-15

    We study integrable models solvable by the nested algebraic Bethe ansatz and possessing GL(3)-invariant R-matrix. We obtain determinant representations for form factors of off-diagonal entries of the monodromy matrix. These representations can be used for the calculation of form factors and correlation functions of the XXX SU(3)-invariant Heisenberg chain.

  2. Meson form factors and covariant three-dimensional formulation of the composite model

    International Nuclear Information System (INIS)

    Skachkov, N.B.; Solovtsov, I.L.

    1979-01-01

    An apparatus is developed which allows within the relativistic quark model, to find explicit expressions for meson form factors in terms of the wave functions of two-quark system that obey the covariant two-particle quasipotential equation. The exact form of wave functions is obtained by passing to the relativistic configurational representation. As an example, the quark Coulomb interaction is considered

  3. Using Canonical Forms for Isomorphism Reduction in Graph-based Model Checking

    NARCIS (Netherlands)

    Kant, Gijs

    Graph isomorphism checking can be used in graph-based model checking to achieve symmetry reduction. Instead of one-to-one comparing the graph representations of states, canonical forms of state graphs can be computed. These canonical forms can be used to store and compare states. However, computing

  4. Modeling of optimization strategies in the incremental CNC sheet metal forming process

    International Nuclear Information System (INIS)

    Bambach, M.; Hirt, G.; Ames, J.

    2004-01-01

    Incremental CNC sheet forming (ISF) is a relatively new sheet metal forming process for small batch production and prototyping. In ISF, a blank is shaped by the CNC movements of a simple tool in combination with a simplified die. The standard forming strategies in ISF entail two major drawbacks: (i) the inherent forming kinematics set limits on the maximum wall angle that can be formed with ISF. (ii) since elastic parts of the imposed deformation can currently not be accounted for in CNC code generation, the standard strategies can lead to undesired deviations between the target and the sample geometry.Several enhancements have recently been put forward to overcome the above limitations, among them a multistage forming strategy to manufacture steep flanges, and a correction algorithm to improve the geometric accuracy. Both strategies have been successful in improving the forming of simple parts. However, the high experimental effort to empirically optimize the tool paths motivates the use of process modeling techniques.This paper deals with finite element modeling of the ISF process. In particular, the outcome of different multistage strategies is modeled and compared to collated experimental results regarding aspects such as sheet thickness and the onset of wrinkling. Moreover, the feasibility of modeling the geometry of a part is investigated as this is of major importance with respect to optimizing the geometric accuracy. Experimental validation is achieved by optical deformation measurement that gives the local displacements and strains of the sheet during forming as benchmark quantities for the simulation

  5. 12 CFR Appendix B to Part 707 - Model Clauses and Sample Forms

    Science.gov (United States)

    2010-01-01

    ...) B-8—Sample Form (Money Market Share Account Disclosures) B-9—Sample Form (Term Share (Certificate... money market accounts. These are some of the more common limitations applicable. The credit union... will assist members in reviewing and understanding the change. B-3Model Clauses for Pre-Maturity...

  6. General Form of Model-Free Control Law and Convergence Analyzing

    Directory of Open Access Journals (Sweden)

    Xiuying Li

    2012-01-01

    Full Text Available The general form of model-free control law is introduced, and its convergence is analyzed. Firstly, the necessity to improve the basic form of model free control law is explained, and the functional combination method as the approach of improvement is presented. Then, a series of sufficient conditions of convergence are given. The analysis denotes that these conditions can be satisfied easily in the engineering practice.

  7. Factors and Predictors of Online Security and Privacy Behavior

    Directory of Open Access Journals (Sweden)

    Goran Bubaš

    2008-12-01

    Full Text Available Assumptions and habits regarding computer and Internet use are among the major factors which influence online privacy and security of Internet users. In our study a survey was performed on 312 subjects (college students who are Internet users with IT skills that investigated how assumptions and habits of Internet users are related to their online security and privacy. The following four factors of online security and privacy related behaviors were revealed in factor analysis: F1 – conscientiousness in the maintenance of the operating system, upgrading of the Internet browser and use of antivirus and antispyware programs; F2 –engagement in risky and careless online activities with lack of concern for personal online privacy; F3 – disbelief that privacy violations and security threats represent possible problems; F4 – lack of fear regarding potential privacy and security threats with no need for change in personal online behavior. Statistically significant correlations were found between some of the discovered factors on the one side, and criteria variables occurrence of malicious code (C1 and data loss on the home computer (C2 on the other. In addition, a regression analysis was performed which revealed that the potentially risky online behaviors of Internet users were associated with the two criteria variables. To properly interpret the results of correlation and regression analyses a conceptual model was developed of the potential causal relationships between the behavior of Internet users and their experiences with online security threats. An additional study was also performed which partly confirmed the conceptual model, as well as the factors of online security and privacy related behaviors.

  8. A new closed-form thermodynamic model for thermal simulation of spark ignition internal combustion engines

    International Nuclear Information System (INIS)

    Barjaneh, Afshin; Sayyaadi, Hoseyn

    2015-01-01

    Highlights: • A new closed-form thermal model was developed for SI engines. • Various irreversibilities of real engines were integrated into the model. • The accuracy of the model was examined on two real SI engines. • The superiority of the model to previous closed-form models was shown. • Accuracy and losses were studied over the operating range of engines. - Abstract: A closed form model based on finite speed thermodynamics, FST, modified to consider various losses was developed on Otto cycle. In this regard, the governing equations of the finite speed thermodynamics were developed for expansion/compression processes while heat absorption/rejection of the Otto cycle was determined based on finite time thermodynamics, FTT. In addition, other irreversibility including power loss caused by heat transfer through the cylinder walls and irreversibility due to throttling process was integrated into the model. The developed model was verified by implementing on two different spark ignition internal combustion engines and the results of modeling were compared with experimental results as well as FTT model. It was found that the developed model was not only very simple in use like a closed form thermodynamic model, but also it models a real spark ignition engine with reasonable accuracy. The error in predicting the output power at rated operating range of the engine was 39%, while in the case of the FTT model, this figure was 167.5%. This comparison for predicting thermal efficiency was +7% error (as difference) for the developed model compared to +39.4% error of FTT model.

  9. The Dilemma - The creation of Forms via Digital or manual models

    DEFF Research Database (Denmark)

    Thomsen, Bente Dahl; Chraudin, Marianna

    2008-01-01

    3D CAD sculpturing with subsequent printing or milling of physical models is becoming increasingly popular amongst university students and graduated designers. Thus this article raises the very pertinent question: If central parts of the process of form creation are solely based on 3D CAD...... sculpturing, what are the consequences for the result of the form creation? This question raises a new question: How do we set up a interpretation model for the registering of the characters that the digital and the manual process of form creations leave in the prototype? This question lays the ground...

  10. A unified spray forming model for the prediction of billet shape geometry

    DEFF Research Database (Denmark)

    Hattel, Jesper; Pryds, Nini

    2004-01-01

    In the present work a unified model for simulating the spray forming process has been developed. Models for the atomization and the deposition processes have been coupled together in order to obtain a new unified description of the spray forming process. The model is able to predict the shape...... and the temperatures of a spray-formed billet and takes into account the thermal coupling between the gas and the droplets, the change in droplet size distribution along the r-axis in the spray cone and the shading effect. The deposition describes the evolution of the preform with time. For this stage a novel 3D model......, which allows the atomizer to be placed asymmetrically over the substrate and also includes the withdrawal of the deposit, was developed. This makes it possible to model not only the growth of a Gaussian shaped preform in which case the spray axis and the rotation axis coincide, but also the surface...

  11. A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes

    NARCIS (Netherlands)

    Tang, Qiang; Bringer, Julien; Chabanne, Hervé; Pointcheval, David; Chen, L.; Mu, Y.; Susilo, W.

    With their increasing popularity in cryptosystems, biometrics have attracted more and more attention from the information security community. However, how to handle the relevant privacy concerns remains to be troublesome. In this paper, we propose a novel security model to formalize the privacy

  12. Finite element modelling of chain-die forming for ultra-high strength steel

    Science.gov (United States)

    Majji, Raju; Xiang, Yang; Ding, Scott; Yang, Chunhui

    2017-10-01

    There has been a high demand for weight reduction in automotive vehicles while maintaining passenger safety. A potential steel material to achieve this is Ultra High Strength Steel (UHSS). As a high strength material, it is difficult to be formed with desired profiles using traditional sheet metal forming processes such as Cold Roll Forming. To overcome this problem, a potentially alternative solution is Chain-die Forming (CDF), recently developed. The basic principal of the CDF is to fully combine roll forming and bending processes. The main advantage of this process is the elongated deformation length that significantly increases effective roll radius. This study focuses on identifying issues with the CDF by using CAD modelling, Motion Analysis and Finite Element Analysis (FEA) to devise solutions and construct a more reliable process in an optimal design sense. Some attempts on finite element modelling and simulation of the CDF were conducted using relatively simple models in literature and the research was still not sufficient enough for optimal design of a typical CDF for UHSS. Therefore two numerical models of Chain-die Forming process are developed in this study, including a) one having a set of rolls similar to roll forming but with a large radius, i.e., 20 meters; and b) the other one with dies and punch segments similar to a typical CDF machine. As a case study, to form a 60° channel with single pass was conducted using these two devised models for a comparison. The obtained numerical results clearly show the CDF could generate less residual stress, low strain and small springback of a single pass for the 60° UHSS channel. The design analysis procedure proposed in this study could greatly help the mechanical designers to devise a cost-effective and reliable CDF process for forming UHSS.

  13. Modelling the development of defects during composite reinforcements and prepreg forming

    Science.gov (United States)

    Hamila, N.; Madeo, A.

    2016-01-01

    Defects in composite materials are created during manufacture to a large extent. To avoid them as much as possible, it is important that process simulations model the onset and the development of these defects. It is then possible to determine the manufacturing conditions that lead to the absence or to the controlled presence of such defects. Three types of defects that may appear during textile composite reinforcement or prepreg forming are analysed and modelled in this paper. Wrinkling is one of the most common flaws that occur during textile composite reinforcement forming processes. The influence of the different rigidities of the textile reinforcement is studied. The concept of ‘locking angle’ is questioned. A second type of unusual behaviour of fibrous composite reinforcements that can be seen as a flaw during their forming process is the onset of peculiar ‘transition zones’ that are directly related to the bending stiffness of the fibres. The ‘transition zones’ are due to the bending stiffness of fibres. The standard continuum mechanics of Cauchy is not sufficient to model these defects. A second gradient approach is presented that allows one to account for such unusual behaviours and to master their onset and development during forming process simulations. Finally, the large slippages that may occur during a preform forming are discussed and simulated with meso finite-element models used for macroscopic forming. This article is part of the themed issue ‘Multiscale modelling of the structural integrity of composite materials’. PMID:27242300

  14. A New Form of Nondestructive Strength-Estimating Statistical Models Accounting for Uncertainty of Model and Aging Effect of Concrete

    International Nuclear Information System (INIS)

    Hong, Kee Jeung; Kim, Jee Sang

    2009-01-01

    As concrete ages, the surrounding environment is expected to have growing influences on the concrete. As all the impacts of the environment cannot be considered in the strength-estimating model of a nondestructive concrete test, the increase in concrete age leads to growing uncertainty in the strength-estimating model. Therefore, the variation of the model error increases. It is necessary to include those impacts in the probability model of concrete strength attained from the nondestructive tests so as to build a more accurate reliability model for structural performance evaluation. This paper reviews and categorizes the existing strength-estimating statistical models of nondestructive concrete test, and suggests a new form of the strength-estimating statistical models to properly reflect the model uncertainty due to aging of the concrete. This new form of the statistical models will lay foundation for more accurate structural performance evaluation.

  15. Privacy in the Genomic Era.

    Science.gov (United States)

    Naveed, Muhammad; Ayday, Erman; Clayton, Ellen W; Fellay, Jacques; Gunter, Carl A; Hubaux, Jean-Pierre; Malin, Bradley A; Wang, Xiaofeng

    2015-09-01

    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward.

  16. Privacy in the Genomic Era

    Science.gov (United States)

    NAVEED, MUHAMMAD; AYDAY, ERMAN; CLAYTON, ELLEN W.; FELLAY, JACQUES; GUNTER, CARL A.; HUBAUX, JEAN-PIERRE; MALIN, BRADLEY A.; WANG, XIAOFENG

    2015-01-01

    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward. PMID:26640318

  17. Implementation of virtual models from sheet metal forming simulation into physical 3D colour models using 3D printing

    Science.gov (United States)

    Junk, S.

    2016-08-01

    Today the methods of numerical simulation of sheet metal forming offer a great diversity of possibilities for optimization in product development and in process design. However, the results from simulation are only available as virtual models. Because there are any forming tools available during the early stages of product development, physical models that could serve to represent the virtual results are therefore lacking. Physical 3D-models can be created using 3D-printing and serve as an illustration and present a better understanding of the simulation results. In this way, the results from the simulation can be made more “comprehensible” within a development team. This paper presents the possibilities of 3D-colour printing with particular consideration of the requirements regarding the implementation of sheet metal forming simulation. Using concrete examples of sheet metal forming, the manufacturing of 3D colour models will be expounded upon on the basis of simulation results.

  18. Modeling of hydrogen storage in hydride-forming materials : statistical thermodynamics

    NARCIS (Netherlands)

    Ledovskikh, A.; Danilov, D.; Rey, W.J.J.; Notten, P.H.L.

    2006-01-01

    A new lattice gas model has been developed, describing the hydrogen storage in hydride-forming materials. This model is based on the mean-field theory and Bragg-Williams approximation. To describe first-order phase transitions and two-phase coexistence regions, a binary alloy approach has been

  19. Modeling plan-form deltaic response to changes in fluvial sediment supply

    NARCIS (Netherlands)

    Nienhuis, J.H.; Ashton, A.D.; Roos, Pieter C.; Hulscher, Suzanne J.M.H.; Giosan, L.; Kranenburg, W.M.; Horstman, E.M.; Wijnberg, K.M.

    2012-01-01

    This study focuses on the effects of changes in fluvial sediment supply on the plan-form shape of wave-dominated deltas. We apply a one-line numerical shoreline model to calculate shoreline evolution after (I) elimination and (II) time-periodic variation of fluvial input. Model results suggest four

  20. Structural and reduced-form modeling and forecasting with application to Armenia

    NARCIS (Netherlands)

    Poghosyan, K.

    2012-01-01

    The thesis deals with structural and reduced-form modeling and forecasting of key macroeconomic variables (real growth of GDP, inflation, exchange rate, and policy interest rate). The central part of the thesis (Chapters 2-4) consists of three chapters. Chapter 2 considers the structural DSGE model

  1. Friction modelling in sheet metal forming simulations: application and validation on an U-Bend product

    NARCIS (Netherlands)

    Sigvant, Mats; Hol, Johan; Chezan, Toni; van den Boogaard, Ton; Hora, P.

    2015-01-01

    The accuracy of sheet metal forming simulations strongly depends on, amongst others, friction modelling. The industrial standard is to use the Coulomb friction model with a constant coefficient of friction. However, it is known that the true friction conditions are dependent on the tribology system,

  2. COUPLED ATOMIZATION AND SPRAY MODELLING IN THE SPRAY FORMING PROCESS USING OPENFOAM

    DEFF Research Database (Denmark)

    Gjesing, Rasmus; Hattel, Jesper Henri; Fritsching, Udo

    2009-01-01

    The paper presents a numerical model capable of simulating the atomization, break-up and in-flight spray phenomena in the spray forming process. The model is developed and implemented in the freeware code openFOAM. The focus is on studying the coupling effect of the melt break-up phenomena...

  3. Testing the Granger noncausality hypothesis in stationary nonlinear models of unknown functional form

    DEFF Research Database (Denmark)

    Péguin-Feissolle, Anne; Strikholm, Birgit; Teräsvirta, Timo

    In this paper we propose a general method for testing the Granger noncausality hypothesis in stationary nonlinear models of unknown functional form. These tests are based on a Taylor expansion of the nonlinear model around a given point in the sample space. We study the performance of our tests b...

  4. An advanced material model for aluminum sheet forming at elevated temperatures

    NARCIS (Netherlands)

    Kurukuri, S.; Miroux, Alexis; Ghosh, Manojit; van den Boogaard, Antonius H.; Oñate, E.; Owen, D.R.J; Suárez, B.

    2009-01-01

    A physically-based material model according to Nes is used to simulate the warm forming of Al-Mg-Si sheet. This model incorporates the influence of the temperature and strain rate on the flow stress and on the hardening rate based on storage and dynamic recovery of dislocations. The effect of size

  5. A Model Based Approach to Increase the Part Accuracy in Robot Based Incremental Sheet Metal Forming

    International Nuclear Information System (INIS)

    Meier, Horst; Laurischkat, Roman; Zhu Junhong

    2011-01-01

    One main influence on the dimensional accuracy in robot based incremental sheet metal forming results from the compliance of the involved robot structures. Compared to conventional machine tools the low stiffness of the robot's kinematic results in a significant deviation of the planned tool path and therefore in a shape of insufficient quality. To predict and compensate these deviations offline, a model based approach, consisting of a finite element approach, to simulate the sheet forming, and a multi body system, modeling the compliant robot structure, has been developed. This paper describes the implementation and experimental verification of the multi body system model and its included compensation method.

  6. An Integrated Approach for the Numerical Modelling of the Spray Forming Process

    DEFF Research Database (Denmark)

    Hattel, Jesper; Thorborg, Jesper; Pryds, Nini

    2003-01-01

    In this paper, an integrated approach for modelling the entire spray forming process is presented. The basis for the analysis is a recently developed model which extents previous studies and includes the interaction between an array of droplets and the enveloping gas. The formulation of the depos......In this paper, an integrated approach for modelling the entire spray forming process is presented. The basis for the analysis is a recently developed model which extents previous studies and includes the interaction between an array of droplets and the enveloping gas. The formulation...... is in fact the summation of "local" droplet size distributions along the r-axis. Furthermore, the deposition model proposed in the paper involves both the sticking efficiency of the droplets to the substrate as well as a geometrical model involving the effects of shadowing for the production of billet...

  7. The privacy coach: Supporting customer privacy in the internet of things

    NARCIS (Netherlands)

    Broenink, E.G.; Hoepman, J.H.; Hof, C. van 't; Kranenburg, R. van; Smits, D.; Wisman, T.

    2010-01-01

    The Privacy Coach is an application running on a mobile phone that supports customers in making privacy decisions when confronted with RFID tags. The approach we take to increase customer privacy is a radical departure from the mainstream research efforts that focus on implementing privacy enhancing

  8. 75 FR 81205 - Privacy Act: Revision of Privacy Act Systems of Records

    Science.gov (United States)

    2010-12-27

    ... DEPARTMENT OF AGRICULTURE Office of the Secretary Privacy Act: Revision of Privacy Act Systems of Records AGENCY: Office of the Secretary, USDA. ACTION: Notice to Revise Privacy Act Systems of Records... two Privacy Act Systems of Records entitled ``Information on Persons Disqualified from the...

  9. 76 FR 67763 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-11-02

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-109)] Privacy Act of 1974; Privacy Act... proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is issuing public...

  10. 76 FR 64114 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-10-17

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-093)] Privacy Act of 1974; Privacy Act... proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is issuing public...

  11. 76 FR 64112 - Privacy Act of 1974; Privacy Act System of Records Appendices

    Science.gov (United States)

    2011-10-17

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-091)] Privacy Act of 1974; Privacy Act...: Revisions of NASA Appendices to Privacy Act System of Records. SUMMARY: Notice is hereby given that NASA is... Privacy Act of 1974. This notice publishes those amendments as set forth below under the caption...

  12. 78 FR 40515 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2013-07-05

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 13-071] Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of Privacy Act system of records. SUMMARY: Each Federal agency is required by the Privacy Act of 1974 to publish...

  13. 78 FR 77503 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2013-12-23

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 13-149] Privacy Act of 1974; Privacy Act... proposed revisions to existing Privacy Act systems of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is issuing public...

  14. 77 FR 69898 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2012-11-21

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 12-100] Privacy Act of 1974; Privacy Act... proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is issuing public...

  15. ARCHITECTURAL FORM CREATION IN THE DESIGN STUDIO: PHYSICAL MODELING AS AN EFFECTIVE DESIGN TOOL

    Directory of Open Access Journals (Sweden)

    Wael Abdelhameed

    2011-11-01

    Full Text Available This research paper attempts to shed more light on an area of the design studio, which concerns with the use of physical modeling as a design medium in architectural form creation. An experiment has been carried out during an architectural design studio in order to not only investigate physical modeling as a tool of form creation but also improve visual design thinking that students employ while using this manual tool. To achieve the research objective, a method was proposed and applied to track form creation processes, based upon three types of operation, namely: sketching transformations, divergent physical-modeling transformations, and convergent physical-modeling transformations. The method helps record the innovative transitions of form during conceptual designing in a simple way. Investigating form creation processes and activities associated with visual design thinking enables the research to conclude to general results of the role of physical modeling in the conceptual phase of designing, and to specific results of the methods used in this architectural design studio experiment.

  16. Internet privacy options for adequate realisation

    CERN Document Server

    2013-01-01

    A thorough multidisciplinary analysis of various perspectives on internet privacy was published as the first volume of a study, revealing the results of the achatech project "Internet Privacy - A Culture of Privacy and Trust on the Internet." The second publication from this project presents integrated, interdisciplinary options for improving privacy on the Internet utilising a normative, value-oriented approach. The ways in which privacy promotes and preconditions fundamental societal values and how privacy violations endanger the flourishing of said values are exemplified. The conditions which must be fulfilled in order to achieve a culture of privacy and trust on the internet are illuminated. This volume presents options for policy-makers, educators, businesses and technology experts how to facilitate solutions for more privacy on the Internet and identifies further research requirements in this area.

  17. CARAVAN: Providing Location Privacy for VANET

    National Research Council Canada - National Science Library

    Sampigethaya, Krishna; Huang, Leping; Li, Mingyan; Poovendran, Radha; Matsuura, Kanta; Sezaki, Kaoru

    2005-01-01

    .... This type of tracking leads to threats on the location privacy of the vehicle's user. In this paper, we study the problem of providing location privacy in VANET by allowing vehicles to prevent tracking of their broadcast communications...

  18. Implementation and identification of Preisach type hysteresis models with Everett Function in closed form

    Energy Technology Data Exchange (ETDEWEB)

    Szabó, Zsolt, E-mail: szabo@evt.bme.hu [Department of Broadband Infocommunications and Electromagnetic Theory, Budapest University of Technology and Economics, Budapest (Hungary); Füzi, János [Neutron Spectroscopy Department, Wigner Research Centre for Physics, Budapest (Hungary); Faculty of Engineering and Information Technology, University of Pécs (Hungary)

    2016-05-15

    The Preisach function is considered as a product of two special one dimensional functions, which allows the closed form evaluation of the Everett integral. The deduced closed form expressions are included in Preisach models, in particular in the static model, moving model and a rate dependent hysteresis model, which can simulate the frequency dependence of the magnetization process. The details of the freely available implementations, which are available online are presented. The identification of the model parameters and the accuracy to describe the magnetization process are discussed and demonstrated by fitting measured data. Transient electric circuit simulation with hysteresis demonstrates the applicability of the developed models. - Highlights: • Formulation of the Preisach model with Everett function in closed form. • Identification of the parameters: when the shape of the analytical Preisach function does not matches the ferromagnetic material the moving model can be applied to increase the accuracy. • Novel algorithm with Fixed Point iteration, which utilizes the closed formulation to simulate the frequency dependence of the magnetization process. • The developed hysteresis models are utilized in circuit simulation algorithm to determine the transient behavior of the current, which flows through a toroidal coil with ferromagnetic core.

  19. MODEL OF METHODS OF FORMING BIOLOGICAL PICTURE OF THE WORLD OF SECONDARY SCHOOL PUPILS

    Directory of Open Access Journals (Sweden)

    Mikhail A. Yakunchev

    2016-12-01

    Full Text Available Introduction: the problem of development of a model of methods of forming the biological picture of the world of pupils as a multicomponent and integrative expression of the complete educational process is considered in the article. It is stated that the results of the study have theoretical and practical importance for effective subject preparation of senior pupils based on acquiring of systematic and generalized knowledge about wildlife. The correspondence of the main idea of the article to the scientific profile of the journal “Integration of Education” determines the choice of the periodical for publication. Materials and Methods: the results of the analysis of materials on modeling of the educational process, on specific models of the formation of a complete comprehension of the scientific picture of the world and its biological component make it possible to suggest a lack of elaboration of the aspect of pedagogical research under study. Therefore, the search for methods to overcome these gaps and to substantiate a particular model, relevant for its practical application by a teacher, is important. The study was based on the use of methods of theoretical level, including the analysis of pedagogical and methodological literature, modeling and generalized expression of the model of forming the biological picture of the world of secondary school senior pupils, which were of higher priority. Results: the use of models of organization of subject preparation of secondary school pupils takes a priority position, as they help to achieve the desired results of training, education and development. The model of methods of forming a biological picture of the world is represented as a theoretical construct in the unity of objective, substantive, procedural, diagnostic and effective blocks. Discussion and Conclusions: in a generalized form the article expresses the model of methods of forming the biological picture of the world of secondary school

  20. Meson form factors and covariant three-dimensional formulation of composite model

    International Nuclear Information System (INIS)

    Skachkov, N.B.; Solovtsov, I.L.

    1978-01-01

    An approach is developed which is applied in the framework of the relativistic quark model to obtain explicit expressions for meson form factors in terms of covariant wave functions of the two-quark system. These wave functions obey the two-particle quasipotential equation in which the relative motion of quarks is singled out in a covariant way. The exact form of the wave functions is found using the transition to the relativistic configurational representation with the help of the harmonic analysis on the Lorentz group instead of the usual Fourier expansion and then solving the relativistic difference equation thus obtained. The expressions found for form factors are transformed into the three-dimensional covariant form which is a direct geometrical relativistic generalization of analogous expressions of the nonrelativistic quantum mechanics and provides the decrease of the meson form factor by the Fsub(π)(t) approximately t -1 law as -t infinity, in the Coulomb field

  1. Functional forms and price elasticities in a discrete continuous choice model of the residential water demand

    Science.gov (United States)

    Vásquez Lavín, F. A.; Hernandez, J. I.; Ponce, R. D.; Orrego, S. A.

    2017-07-01

    During recent decades, water demand estimation has gained considerable attention from scholars. From an econometric perspective, the most used functional forms include log-log and linear specifications. Despite the advances in this field and the relevance for policymaking, little attention has been paid to the functional forms used in these estimations, and most authors have not provided justifications for their selection of functional forms. A discrete continuous choice model of the residential water demand is estimated using six functional forms (log-log, full-log, log-quadratic, semilog, linear, and Stone-Geary), and the expected consumption and price elasticity are evaluated. From a policy perspective, our results highlight the relevance of functional form selection for both the expected consumption and price elasticity.

  2. Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing.

    Science.gov (United States)

    Fredrikson, Matthew; Lantz, Eric; Jha, Somesh; Lin, Simon; Page, David; Ristenpart, Thomas

    2014-08-01

    We initiate the study of privacy in pharmacogenetics, wherein machine learning models are used to guide medical treatments based on a patient's genotype and background. Performing an in-depth case study on privacy in personalized warfarin dosing, we show that suggested models carry privacy risks, in particular because attackers can perform what we call model inversion : an attacker, given the model and some demographic information about a patient, can predict the patient's genetic markers. As differential privacy (DP) is an oft-proposed solution for medical settings such as this, we evaluate its effectiveness for building private versions of pharmacogenetic models. We show that DP mechanisms prevent our model inversion attacks when the privacy budget is carefully selected . We go on to analyze the impact on utility by performing simulated clinical trials with DP dosing models. We find that for privacy budgets effective at preventing attacks, patients would be exposed to increased risk of stroke, bleeding events, and mortality . We conclude that current DP mechanisms do not simultaneously improve genomic privacy while retaining desirable clinical efficacy, highlighting the need for new mechanisms that should be evaluated in situ using the general methodology introduced by our work.

  3. Proton and neutron charge form factors in soliton model with dilaton-quarkonium fields

    International Nuclear Information System (INIS)

    Magar, E.N.; Nikolaev, V.A.; Tkachev, O.G.; Novozhilov, V.Yu.

    1997-01-01

    Nucleon electromagnetic form factors are considered in the framework of the generalized Skyrme model with dilaton-quarkonium fields. In our first publication we got big discrepancy between calculated form factors and dipole approximation formula. Here we have reasonably good accordance between them in finite impulse region after vector meson dominance has been taken into account. Omega- and rho-mesons have been included only into hadron structure of the photon

  4. Thermodynamic model for the elastic form factor in diffraction scattering of protons

    International Nuclear Information System (INIS)

    Grashin, A.F.; Evstratenko, A.S.; Lepeshkin, M.V.

    1988-01-01

    An explicit expression is obtained for the differential pp(p-bar)-scattering cross section in the diffraction-cone region by employing the thermodynamic model for the elastic form factor previously proposed in Ref. 4. Data for the energy region 16.3≤(s)/sup 1/2/ ≤546 GeV have been analyzed and significant deviations have been discovered from the commonly used approximations in the form of linear or quadratic exponentials

  5. SIED, a Data Privacy Engineering Framework

    OpenAIRE

    Mivule, Kato

    2013-01-01

    While a number of data privacy techniques have been proposed in the recent years, a few frameworks have been suggested for the implementation of the data privacy process. Most of the proposed approaches are tailored towards implementing a specific data privacy algorithm but not the overall data privacy engineering and design process. Therefore, as a contribution, this study proposes SIED (Specification, Implementation, Evaluation, and Dissemination), a conceptual framework that takes a holist...

  6. Privacy and Data-Based Research

    OpenAIRE

    Ori Heffetz; Katrina Ligett

    2013-01-01

    What can we, as users of microdata, formally guarantee to the individuals (or firms) in our dataset, regarding their privacy? We retell a few stories, well-known in data-privacy circles, of failed anonymization attempts in publicly released datasets. We then provide a mostly informal introduction to several ideas from the literature on differential privacy, an active literature in computer science that studies formal approaches to preserving the privacy of individuals in statistical databases...

  7. PriBots: Conversational Privacy with Chatbots

    OpenAIRE

    Harkous, Hamza; Fawaz, Kassem; Shin, Kang G.; Aberer, Karl

    2016-01-01

    Traditional mechanisms for delivering notice and enabling choice have so far failed to protect users’ privacy. Users are continuously frustrated by complex privacy policies, unreachable privacy settings, and a multitude of emerging standards. The miniaturization trend of smart devices and the emergence of the Internet of Things (IoTs) will exacerbate this problem further. In this paper, we propose Conversational Privacy Bots (PriBots) as a new way of delivering notice and choice through a two...

  8. 39 CFR 262.5 - Systems (Privacy).

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Systems (Privacy). 262.5 Section 262.5 Postal... DEFINITIONS § 262.5 Systems (Privacy). (a) Privacy Act system of records. A Postal Service system containing... individual. (c) Computer matching program. A “matching program,” as defined in the Privacy Act, 5 U.S.C. 552a...

  9. Balancing Health Information Exchange and Privacy Governance from a Patient-Centred Connected Health and Telehealth Perspective.

    Science.gov (United States)

    Kuziemsky, Craig E; Gogia, Shashi B; Househ, Mowafa; Petersen, Carolyn; Basu, Arindam

    2018-04-22

     Connected healthcare is an essential part of patient-centred care delivery. Technology such as telehealth is a critical part of connected healthcare. However, exchanging health information brings the risk of privacy issues. To better manage privacy risks we first need to understand the different patterns of patient-centred care in order to tailor solutions to address privacy risks.  Drawing upon published literature, we develop a business model to enable patient-centred care via telehealth. The model identifies three patient-centred connected health patterns. We then use the patterns to analyse potential privacy risks and possible solutions from different types of telehealth delivery.  Connected healthcare raises the risk of unwarranted access to health data and related invasion of privacy. However, the risk and extent of privacy issues differ according to the pattern of patient-centred care delivery and the type of particular challenge as they enable the highest degree of connectivity and thus the greatest potential for privacy breaches.  Privacy issues are a major concern in telehealth systems and patients, providers, and administrators need to be aware of these privacy issues and have guidance on how to manage them. This paper integrates patient-centred connected health care, telehealth, and privacy risks to provide an understanding of how risks vary across different patterns of patient-centred connected health and different types of telehealth delivery. Georg Thieme Verlag KG Stuttgart.

  10. CFD investigation of pentamaran ship model with chine hull form on the resistance characteristics

    Science.gov (United States)

    Yanuar; Sulistyawati, W.

    2018-03-01

    This paper presents an investigation of pentamaran hull form with chine hull form to the effects of outriggers position, asymmetry, and deadrise angles on the resistance characteristics. The investigation to the resistance characteristics by modelling pentamaran hull form using chine with symmetrical main hull and asymmetric outboard on the variation deadrise angles: 25°, 30°, 35° and Froude number 0,1 to 0,7. On calm water resistance characteristics of six pentamaran models with chine-hull form examined by variation of deadrise angles by using CFD. Comparation with Wigley hull form, the maximum resistance drag reduction of the chine hull form was reduced by 15.81% on deadrise 25°, 13.8% on deadrise 30°, and 20.38% on deadrise 35°. While the smallest value of total resistance coefficient was generated from chine 35° at R/L:1/14 and R/L:1/7. Optimum hull form for minimum resistance has been obtained, so it is interesting to continue with angle of entrance and stem angle of hull for further research.

  11. Efficiency and Privacy Enhancement for a Track and Trace System of RFID-Based Supply Chains

    Directory of Open Access Journals (Sweden)

    Xunjun Chen

    2015-06-01

    Full Text Available One of the major applications of Radio Frequency Identification (RFID technology is in supply chain management as it promises to provide real-time visibility based on the function of track and trace. However, such an RFID-based track and trace system raises new security and privacy challenges due to the restricted resource of tags. In this paper, we refine three privacy related models (i.e., the privacy, path unlinkability, and tag unlinkability of RFID-based track and trace systems, and clarify the relations among these privacy models. Specifically, we have proven that privacy is equivalent to path unlinkability and tag unlinkability implies privacy. Our results simplify the privacy concept and protocol design for RFID-based track and trace systems. Furthermore, we propose an efficient track and trace scheme, Tracker+, which allows for authentic and private identification of RFID-tagged objects in supply chains. In the Tracker+, no computational ability is required for tags, but only a few bytes of storage (such as EPC Class 1 Gen 2 tags are needed to store the tag state. Indeed, Tracker+ reduces the memory requirements for each tag by one group element compared to the Tracker presented in other literature. Moreover, Tracker+ provides privacy against supply chain inside attacks.

  12. A power-law coupled three-form dark energy model

    Science.gov (United States)

    Yao, Yan-Hong; Yan, Yang-Jie; Meng, Xin-He

    2018-02-01

    We consider a field theory model of coupled dark energy which treats dark energy as a three-form field and dark matter as a spinor field. By assuming the effective mass of dark matter as a power-law function of the three-form field and neglecting the potential term of dark energy, we obtain three solutions of the autonomous system of evolution equations, including a de Sitter attractor, a tracking solution and an approximate solution. To understand the strength of the coupling, we confront the model with the latest Type Ia Supernova, Baryon Acoustic Oscillations and Cosmic Microwave Background radiation observations, with the conclusion that the combination of these three databases marginalized over the present dark matter density parameter Ω _{m0} and the present three-form field κ X0 gives stringent constraints on the coupling constant, - 0.017< λ <0.047 (2σ confidence level), by which we present the model's applicable parameter range.

  13. An Efficient Context-Aware Privacy Preserving Approach for Smartphones

    Directory of Open Access Journals (Sweden)

    Lichen Zhang

    2017-01-01

    Full Text Available With the proliferation of smartphones and the usage of the smartphone apps, privacy preservation has become an important issue. The existing privacy preservation approaches for smartphones usually have less efficiency due to the absent consideration of the active defense policies and temporal correlations between contexts related to users. In this paper, through modeling the temporal correlations among contexts, we formalize the privacy preservation problem to an optimization problem and prove its correctness and the optimality through theoretical analysis. To further speed up the running time, we transform the original optimization problem to an approximate optimal problem, a linear programming problem. By resolving the linear programming problem, an efficient context-aware privacy preserving algorithm (CAPP is designed, which adopts active defense policy and decides how to release the current context of a user to maximize the level of quality of service (QoS of context-aware apps with privacy preservation. The conducted extensive simulations on real dataset demonstrate the improved performance of CAPP over other traditional approaches.

  14. Privacy-Preserving Trajectory Collection

    DEFF Research Database (Denmark)

    Gidofalvi, Gyozo; Xuegang, Huang; Pedersen, Torben Bach

    2008-01-01

    In order to provide context--aware Location--Based Services, real location data of mobile users must be collected and analyzed by spatio--temporal data mining methods. However, the data mining methods need precise location data, while the mobile users want to protect their location privacy....... To remedy this situation, this paper first formally defines novel location privacy requirements. Then, it briefly presents a system for privacy--preserving trajectory collection that meets these requirements. The system is composed of an untrusted server and clients communicating in a P2P network. Location...... data is anonymized in the system using data cloaking and data swapping techniques. Finally, the paper empirically demonstrates that the proposed system is effective and feasible....

  15. Privacy-preserving distributed clustering

    DEFF Research Database (Denmark)

    Erkin, Zekeriya; Veugen, Thijs; Toft, Tomas

    2013-01-01

    with any other entity, including the service provider. Such privacy concerns lead to trust issues between entities, which clearly damages the functioning of the service and even blocks cooperation between entities with similar data sets. To enable joint efforts with private data, we propose a protocol......, or in some cases, information from different databases is pooled to enrich the data so that the merged database can improve the clustering effort. However, in either case, the content of the database may be privacy sensitive and/or commercially valuable such that the owners may not want to share their data...... provider with computations. Experimental results clearly indicate that the work we present is an efficient way of deploying a privacy-preserving clustering algorithm in a distributed manner....

  16. Privacy in the Sharing Economy

    DEFF Research Database (Denmark)

    Ranzini, Giulia; Etter, Michael; Lutz, Christoph

    ’s digital services through providing recommendations to Europe’s institutions. The initial stage of this research project involves a set of three literature reviews of the state of research on three core topics in relation to the sharing economy: participation (1), privacy (2), and power (3). This piece...... is a literature review on the topic of privacy. It addresses key privacy challenges for different stakeholders in the sharing economy. Throughout, we use the term "consumers" to refer to users on the receiving end (e.g., Airbnb guests, Uber passengers), "providers" to refer to users on the providing end (e.......g., Airbnb hosts, Uber drivers) and "platforms" to refer to the mediating sites, apps and infrastructures matching consumers and providers (e.g., Airbnb, Uber)....

  17. A unified spray forming model for the prediction of billet shape geometry

    International Nuclear Information System (INIS)

    Hattel, J.H.; Pryds, N.H.

    2004-01-01

    In the present work a unified model for simulating the spray forming process has been developed. Models for the atomization and the deposition processes have been coupled together in order to obtain a new unified description of the spray forming process. The model is able to predict the shape and the temperatures of a spray-formed billet and takes into account the thermal coupling between the gas and the droplets, the change in droplet size distribution along the r-axis in the spray cone and the shading effect. The deposition describes the evolution of the preform with time. For this stage a novel 3D model, which allows the atomizer to be placed asymmetrically over the substrate and also includes the withdrawal of the deposit, was developed. This makes it possible to model not only the growth of a Gaussian shaped preform in which case the spray axis and the rotation axis coincide, but also the surface evolution during billet growth. For this purpose, shading must be taken into account as a core part of the surface evolution algorithm. The unified model involves coupling of three sub models for the atomization, the deposition and the shape of the billet. This coupling, which is a central part of the present work, is also described. Results from the integrated model are presented and the potential for better process understanding as well as process optimization is evident

  18. Sexiled: Privacy Acquisition Strategies of College Roommates

    Science.gov (United States)

    Erlandson, Karen

    2014-01-01

    This study sought to understand how roommates make privacy bids in college residence halls. The results indicate that privacy for sexual activity is a problem for students living in college residence halls, as almost all participants (82%) reported having dealt with this issue. Two sets of responses were collected and analyzed: privacy acquisition…

  19. 31 CFR 0.216 - Privacy Act.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Privacy Act. 0.216 Section 0.216... RULES OF CONDUCT Rules of Conduct § 0.216 Privacy Act. Employees involved in the design, development, operation, or maintenance of any system of records or in maintaining records subject to the Privacy Act of...

  20. 24 CFR 3280.107 - Interior privacy.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 5 2010-04-01 2010-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock. ...

  1. 49 CFR 10.13 - Privacy Officer.

    Science.gov (United States)

    2010-10-01

    ... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title Privacy... 49 Transportation 1 2010-10-01 2010-10-01 false Privacy Officer. 10.13 Section 10.13...

  2. Enhancing Privacy for Digital Rights Management

    NARCIS (Netherlands)

    Petkovic, M.; Conrado, C.; Schrijen, G.J.; Jonker, Willem

    2007-01-01

    This chapter addresses privacy issues in DRM systems. These systems provide a means of protecting digital content, but may violate the privacy of users in that the content they purchase and their actions in the system can be linked to specific users. The chapter proposes a privacy-preserving DRM

  3. Access to Information and Privacy | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    As a Crown corporation, IDRC is subject to Canada's laws on access to information and privacy protection. The following resources will help you learn more about IDRC and the access to information and privacy acts, including instructions for submitting an access to information or privacy act (ATIP) request. IDRC and ATIP ...

  4. Do privacy and security regulations need a status update? Perspectives from an intergenerational survey.

    Science.gov (United States)

    Pereira, Stacey; Robinson, Jill Oliver; Peoples, Hayley A; Gutierrez, Amanda M; Majumder, Mary A; McGuire, Amy L; Rothstein, Mark A

    2017-01-01

    The importance of health privacy protections in the era of the "Facebook Generation" has been called into question. The ease with which younger people share personal information about themselves has led to the assumption that they are less concerned than older generations about the privacy of their information, including health information. We explored whether survey respondents' views toward health privacy suggest that efforts to strengthen privacy protections as health information is moved online are unnecessary. Using Amazon's Mechanical Turk (MTurk), which is well-known for recruitment for survey research, we distributed a 45-item survey to individuals in the U.S. to assess their perspectives toward privacy and security of online and health information, social media behaviors, use of health and fitness devices, and demographic information. 1310 participants (mean age: 36 years, 50% female, 78% non-Hispanic white, 54% college graduates or higher) were categorized by generations: Millennials, Generation X, and Baby Boomers. In multivariate regression models, we found that generational cohort was an independent predictor of level of concern about privacy and security of both online and health information. Younger generations were significantly less likely to be concerned than older generations (all P privacy or security of online or health information (all P > 0.05). This study is limited by the non-representativeness of our sample. Though Millennials reported lower levels of concern about privacy and security, this was not related to internet or social media behaviors, and majorities within all generations reported concern about both the privacy and security of their health information. Thus, there is no intergenerational imperative to relax privacy and security standards, and it would be advisable to take privacy and security of health information more seriously.

  5. Do privacy and security regulations need a status update? Perspectives from an intergenerational survey

    Science.gov (United States)

    Pereira, Stacey; Robinson, Jill Oliver; Gutierrez, Amanda M.; Majumder, Mary A.; McGuire, Amy L.; Rothstein, Mark A.

    2017-01-01

    Background The importance of health privacy protections in the era of the “Facebook Generation” has been called into question. The ease with which younger people share personal information about themselves has led to the assumption that they are less concerned than older generations about the privacy of their information, including health information. We explored whether survey respondents’ views toward health privacy suggest that efforts to strengthen privacy protections as health information is moved online are unnecessary. Methods Using Amazon’s Mechanical Turk (MTurk), which is well-known for recruitment for survey research, we distributed a 45-item survey to individuals in the U.S. to assess their perspectives toward privacy and security of online and health information, social media behaviors, use of health and fitness devices, and demographic information. Results 1310 participants (mean age: 36 years, 50% female, 78% non-Hispanic white, 54% college graduates or higher) were categorized by generations: Millennials, Generation X, and Baby Boomers. In multivariate regression models, we found that generational cohort was an independent predictor of level of concern about privacy and security of both online and health information. Younger generations were significantly less likely to be concerned than older generations (all P privacy or security of online or health information (all P > 0.05). Limitations This study is limited by the non-representativeness of our sample. Conclusions Though Millennials reported lower levels of concern about privacy and security, this was not related to internet or social media behaviors, and majorities within all generations reported concern about both the privacy and security of their health information. Thus, there is no intergenerational imperative to relax privacy and security standards, and it would be advisable to take privacy and security of health information more seriously. PMID:28926626

  6. A Study on Ganui-Dae’s External Form and Its Modeling for Restoration

    Directory of Open Access Journals (Sweden)

    Min-Soo Lee

    2013-12-01

    Full Text Available Ganui-Dae, built in the reign of King Sejong, Joseon Dynasty, is a comprehensive observatory. It has various instruments for observation and time signal such as Ganui, Gyupyo(Gnomon, water-hammering type Honui and Honsang, and so on. Studying on Ganui-Dae has been focused on its location, history, criterion, etc, so far. However, studying on its external form and construction method has been conducted insufficiently. This study suggests the model for restoration of Ganui-Dae. The model is based on the analysis about external form of Ganui-Dae in various antique maps, and its construction method in those days.

  7. Ductile failure analysis of high strength steel in hot forming based on micromechanical damage model

    Directory of Open Access Journals (Sweden)

    Ying Liang

    2016-01-01

    Full Text Available The damage evolution of high strength steel at elevated temperature is investigated by using the Gurson-Tvergaard-Needleman (GTN model. A hybrid method integrated thermal tensile test and numerical technique is employed to identify the damage parameters. The analysis results show that the damage parameters are different at different temperature as the variation of tested material microstructure. Furthermore, the calibrated damage parameters are implemented to simulate a bugling forming at elevated temperature. The experimental results show the availability of GTN damage model in analyzing sheet formability in hot forming.

  8. Preserving Employee Privacy in Wellness.

    Science.gov (United States)

    Terry, Paul E

    2017-07-01

    The proposed "Preserving Employee Wellness Programs Act" states that the collection of information about the manifested disease or disorder of a family member shall not be considered an unlawful acquisition of genetic information. The bill recognizes employee privacy protections that are already in place and includes specific language relating to nondiscrimination based on illness. Why did legislation expressly intending to "preserve wellness programs" generate such antipathy about wellness among journalists? This article argues that those who are committed to preserving employee wellness must be equally committed to preserving employee privacy. Related to this, we should better parse between discussions and rules about commonplace health screenings versus much less common genetic testing.

  9. Location Privacy with Randomness Consistency

    Directory of Open Access Journals (Sweden)

    Wu Hao

    2016-10-01

    Full Text Available Location-Based Social Network (LBSN applications that support geo-location-based posting and queries to provide location-relevant information to mobile users are increasingly popular, but pose a location-privacy risk to posts. We investigated existing LBSNs and location privacy mechanisms, and found a powerful potential attack that can accurately locate users with relatively few queries, even when location data is well secured and location noise is applied. Our technique defeats previously proposed solutions including fake-location detection and query rate limits.

  10. Protecting location privacy for outsourced spatial data in cloud storage.

    Science.gov (United States)

    Tian, Feng; Gui, Xiaolin; An, Jian; Yang, Pan; Zhao, Jianqiang; Zhang, Xuejun

    2014-01-01

    As cloud computing services and location-aware devices are fully developed, a large amount of spatial data needs to be outsourced to the cloud storage provider, so the research on privacy protection for outsourced spatial data gets increasing attention from academia and industry. As a kind of spatial transformation method, Hilbert curve is widely used to protect the location privacy for spatial data. But sufficient security analysis for standard Hilbert curve (SHC) is seldom proceeded. In this paper, we propose an index modification method for SHC (SHC(∗)) and a density-based space filling curve (DSC) to improve the security of SHC; they can partially violate the distance-preserving property of SHC, so as to achieve better security. We formally define the indistinguishability and attack model for measuring the privacy disclosure risk of spatial transformation methods. The evaluation results indicate that SHC(∗) and DSC are more secure than SHC, and DSC achieves the best index generation performance.

  11. Functional form comparison between the population and the individual Poisson based TCP models

    International Nuclear Information System (INIS)

    Schinkel, C.; Stavreva, N.; Stavrev, P.; Carlone, M.; Fallone, B.G.

    2007-01-01

    In this work, the functional form similarity between the individual and fundamental population TCP models is investigated. Using the fact that both models can be expressed in terms of the geometric parameters γ 50 and D 50 , we show that they have almost identical functional form for values of γ 50 ≥1. The conceptual inadequacy of applying an individual model to clinical data is also discussed. A general individual response TCP expression is given, parameterized by D f and γ f - the dose corresponding to a control level of f, and the normalized slope at that point. It is shown that the dose-response may be interpreted as an individual response only if γ 50 is sufficiently high. Based on the functional form equivalency between the individual and the population TCP models, we discuss the possibility of applying the individual TCP model for the case of heterogeneous irradiations. Due to the fact that the fundamental population TCP model is derived for homogeneous irradiations only, we propose the use of the EUD, given by the generalized mean dose, when the fundamental population TCP model is used to fit clinical data. (author)

  12. Modeling of Possible Conditions for Origin of First Organic Forms in hot Mineral Water

    OpenAIRE

    Ignat Ignatov; Oleg Mosin

    2014-01-01

    The composition of water, its temperature and pH value was analyzed in experiments with modelling of primary hydrosphere and possible conditions for origin of first organic forms in hot mineral water. For this aim the authors performed experiments with hot mineral and seawater from Bulgaria by IR-spectrometry (DNES-method). As model systems were used cactus juice of Echinopsis pachanoi and Mediterranean jellyfish Cotylorhiza tuberculata. It was considered the reactions of condensation and deh...

  13. Health information: reconciling personal privacy with the public good of human health.

    Science.gov (United States)

    Gostin, L O

    2001-01-01

    The success of the health care system depends on the accuracy, correctness and trustworthiness of the information, and the privacy rights of individuals to control the disclosure of personal information. A national policy on health informational privacy should be guided by ethical principles that respect individual autonomy while recognizing the important collective interests in the use of health information. At present there are no adequate laws or constitutional principles to help guide a rational privacy policy. The laws are scattered and fragmented across the states. Constitutional law is highly general, without important specific safeguards. Finally, a case study is provided showing the important trade-offs that exist between public health and privacy. For a model public health law, see www.critpath.org/msphpa/privacy.

  14. Privacy enhancing techniques - the key to secure communication and management of clinical and genomic data.

    Science.gov (United States)

    De Moor, G J E; Claerhout, B; De Meyer, F

    2003-01-01

    To introduce some of the privacy protection problems related to genomics based medicine and to highlight the relevance of Trusted Third Parties (TTPs) and of Privacy Enhancing Techniques (PETs) in the restricted context of clinical research and statistics. Practical approaches based on two different pseudonymisation models, both for batch and interactive data collection and exchange, are described and analysed. The growing need of managing both clinical and genetic data raises important legal and ethical challenges. Protecting human rights in the realm of privacy, while optimising research potential and other statistical activities is a challenge that can easily be overcome with the assistance of a trust service provider offering advanced privacy enabling/enhancing solutions. As such, the use of pseudonymisation and other innovative Privacy Enhancing Techniques can unlock valuable data sources.

  15. A method for the quantification of model form error associated with physical systems.

    Energy Technology Data Exchange (ETDEWEB)

    Wallen, Samuel P.; Brake, Matthew Robert

    2014-03-01

    In the process of model validation, models are often declared valid when the differences between model predictions and experimental data sets are satisfactorily small. However, little consideration is given to the effectiveness of a model using parameters that deviate slightly from those that were fitted to data, such as a higher load level. Furthermore, few means exist to compare and choose between two or more models that reproduce data equally well. These issues can be addressed by analyzing model form error, which is the error associated with the differences between the physical phenomena captured by models and that of the real system. This report presents a new quantitative method for model form error analysis and applies it to data taken from experiments on tape joint bending vibrations. Two models for the tape joint system are compared, and suggestions for future improvements to the method are given. As the available data set is too small to draw any statistical conclusions, the focus of this paper is the development of a methodology that can be applied to general problems.

  16. Model for next-to-leading order threshold resummed form factors

    International Nuclear Information System (INIS)

    Aglietti, Ugo; Ricciardi, Giulia

    2004-01-01

    We present a model for next-to-leading order resummed threshold form factors based on a timelike coupling recently introduced in the framework of small x physics. Improved expressions for the form factors in N-space are obtained which are not plagued by Landau-pole singularities, as the included absorptive effects - usually neglected - act as regulators. The physical reason is that, because of faster decay of gluon jets, there is not enough resolution time to observe the Landau pole. Our form factors reduce to the standard ones when the absorptive parts related to the coupling are neglected. The inverse transform from N-space to x-space can be done directly without any prescription and we obtain analytical expressions for the form factors, which are well defined in all x-space

  17. Evaluation of arch form between Vietnamese and North American Caucasians using 3-dimensional virtual models.

    Science.gov (United States)

    Trang, Vu Thi Thu; Park, Jae Hyun; Bayome, Mohamed; Shastry, Shruti; Mellion, Alex; Kook, Yoon-Ah

    2015-01-01

    The purpose of this study was to investigate the three-dimensional (3D) morphologic differences in the mandibular arch of Vietnamese and North American White subjects. The sample included 113 Vietnamese subjects (41 Class I, 37 Class II and 35 Class III) and 96 White subjects (29 Class I, 30 Class II and 37 Class III). The samples were regrouped according to arch form types (tapered, ovoid, and square) to compare the frequency distribution of the three arch forms between ethnic groups in each angle classification. The facial axis point of each tooth was digitized on 3D virtual models. Four linear and two ratio variables were measured. In comparing arch dimensions, the intercanine and intermolar widths were wider in Vietnamese than in Whites (p Vietnamese group, the square arch form was the most frequent followed by tapered and ovoid arch forms. The arch forms of Whites were narrower than Vietnamese. In North American Whites, the distribution of the arch form types showed similar frequency. In Vietnamese, the square arch form was more frequent.

  18. Electromagnetic and Scalar Pion form factor in the Kroll-Lee-Zumino model

    International Nuclear Information System (INIS)

    Dominguez, C.A.; Jottar, J.I.; Loewe, M.; Willers, B.

    2009-01-01

    The renormalizable Abelian quantum field theory model of Kroll, Lee, and Zumino is used at the one loop level to compute vertex corrections to the tree-level, Vector Meson Dominance (VMD) electromagnetic pion form factor. These corrections, together with the one-loop vacuum polarization contribution, imply a resulting electromagnetic pion form factor in excellent agreement with data in the whole range of accessible momentum transfers in the space-like region. The time-like form factor, which reproduces the Gounaris-Sakurai formula at and near the rho-meson peak, is unaffected by the vertex correction at order O(g 2 ). The KLZ model is also used to compute the scalar radius of the pion at the one loop level, finding π 2 > S =0.40fm 2 . This value implies for the low energy constant of chiral perturbation theory l-bar 4 =3.4

  19. Bethe Ansatz and exact form factors of the O(N) Gross Neveu-model

    International Nuclear Information System (INIS)

    Babujian, Hrachya M.; Foerster, Angela; Karowski, Michael

    2016-01-01

    We apply previous results on the O(N) Bethe Ansatz http://dx.doi.org/10.1088/1751-8113/45/5/055207, http://arxiv.org/abs/1204.3479, http://dx.doi.org/10.1007/JHEP11(2013)089 to construct a general form factor formula for the O(N) Gross-Neveu model. We examine this formula for several operators, such as the energy momentum, the spin-field and the current. We also compare these results with the 1/N expansion of this model and obtain full agreement. We discuss bound state form factors, in particular for the three particle form factor of the field. In addition for the two particle case we prove a recursion relation for the K-functions of the higher level Bethe Ansatz.

  20. Online Privacy as a Corporate Social Responsibility

    DEFF Research Database (Denmark)

    Pollach, Irene

    2011-01-01

    Information technology and the Internet have added a new stakeholder concern to the corporate social responsibility agenda: online privacy. While theory suggests that online privacy is a corporate social responsibility, only very few studies in the business ethics literature have connected...... of the companies have comprehensive privacy programs, although more than half of them voice moral or relational motives for addressing online privacy. The privacy measures they have taken are primarily compliance measures, while measures that stimulate a stakeholder dialogue are rare. Overall, a wide variety...

  1. The Regulatory Framework for Privacy and Security

    Science.gov (United States)

    Hiller, Janine S.

    The internet enables the easy collection of massive amounts of personally identifiable information. Unregulated data collection causes distrust and conflicts with widely accepted principles of privacy. The regulatory framework in the United States for ensuring privacy and security in the online environment consists of federal, state, and self-regulatory elements. New laws have been passed to address technological and internet practices that conflict with privacy protecting policies. The United States and the European Union approaches to privacy differ significantly, and the global internet environment will likely cause regulators to face the challenge of balancing privacy interests with data collection for many years to come.

  2. Adding Query Privacy to Robust DHTs

    DEFF Research Database (Denmark)

    Backes, Michael; Goldberg, Ian; Kate, Aniket

    2011-01-01

    intermediate peers that (help to) route the queries towards their destinations. In this paper, we satisfy this requirement by presenting an approach for providing privacy for the keys in DHT queries. We use the concept of oblivious transfer (OT) in communication over DHTs to preserve query privacy without...... of obtaining query privacy over robust DHTs. Finally, we compare the performance of our privacy-preserving protocols with their more privacy-invasive counterparts. We observe that there is no increase in the message complexity and only a small overhead in the computational complexity....

  3. Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan.

    Science.gov (United States)

    Sahi, Aqeel; Lai, David; Li, Yan

    2016-11-01

    Cloud computing was introduced as an alternative storage and computing model in the health sector as well as other sectors to handle large amounts of data. Many healthcare companies have moved their electronic data to the cloud in order to reduce in-house storage, IT development and maintenance costs. However, storing the healthcare records in a third-party server may cause serious storage, security and privacy issues. Therefore, many approaches have been proposed to preserve security as well as privacy in cloud computing projects. Cryptographic-based approaches were presented as one of the best ways to ensure the security and privacy of healthcare data in the cloud. Nevertheless, the cryptographic-based approaches which are used to transfer health records safely remain vulnerable regarding security, privacy, or the lack of any disaster recovery strategy. In this paper, we review the related work on security and privacy preserving as well as disaster recovery in the eHealth cloud domain. Then we propose two approaches, the Security-Preserving approach and the Privacy-Preserving approach, and a disaster recovery plan. The Security-Preserving approach is a robust means of ensuring the security and integrity of Electronic Health Records, and the Privacy-Preserving approach is an efficient authentication approach which protects the privacy of Personal Health Records. Finally, we discuss how the integrated approaches and the disaster recovery plan can ensure the reliability and security of cloud projects. Copyright © 2016 Elsevier Ltd. All rights reserved.

  4. Teachers and Peers as Communication Models to Teach Grammatical Forms to Preschoolers with Hearing Loss

    Science.gov (United States)

    Richels, Corrin G.; Bobzien, Jonna L.; Schwartz, Kathryn S.; Raver, Sharon A.; Browning, Ellen L.; Hester, Peggy P.

    2016-01-01

    Structured input from both teachers and peers maximizes the opportunities for preschoolers to learn grammatical forms. The purpose of this pilot study was to evaluate the effectiveness of using a teacher and a peer with typical hearing and language skills to model grammatically correct verbal responses to action "wh-" questions…

  5. Nucleon electromagnetic form factors in a relativistic quark model with chiral symmetry

    International Nuclear Information System (INIS)

    Barik, N.

    1987-01-01

    The nucleon electromagnetic form factors are computed in an independent quark model based on the Dirac equation. Corrections for centre-of-mass motion and pion-cloud effects are incorporated. Results for static quantities are in reasonable agreement with the experimental data. (author)

  6. Nucleon electromagnetic form factors in a relativistic quark model with chiral symmetry

    Energy Technology Data Exchange (ETDEWEB)

    Barik, N; Das, M

    1987-05-01

    The nucleon electromagnetic form factors are computed in an independent quark model based on the Dirac equation. Corrections for centre-of-mass motion and pion-cloud effects are incorporated. Results for static quantities are in reasonable agreement with the experimental data.

  7. A Reduced Form Framework for Modeling Volatility of Speculative Prices based on Realized Variation Measures

    DEFF Research Database (Denmark)

    Andersen, Torben G.; Bollerslev, Tim; Huang, Xin

    Building on realized variance and bi-power variation measures constructed from high-frequency financial prices, we propose a simple reduced form framework for effectively incorporating intraday data into the modeling of daily return volatility. We decompose the total daily return variability...

  8. Modeling Multiple Human-Automation Distributed Systems using Network-form Games

    Science.gov (United States)

    Brat, Guillaume

    2012-01-01

    The paper describes at a high-level the network-form game framework (based on Bayes net and game theory), which can be used to model and analyze safety issues in large, distributed, mixed human-automation systems such as NextGen.

  9. 12 CFR Appendix A to Part 205 - Model Disclosure Clauses and Forms

    Science.gov (United States)

    2010-01-01

    ... Forms Link to an amendment published at 74 FR 59053, Nov. 17, 2009. Table of Contents A-1—Model Clauses...) Limitations on frequency of transfers—(i) You may make only [insert number, e.g., 3] cash withdrawals from our terminals each [insert time period, e.g., week]. (ii) You can use your telephone bill-payment service to pay...

  10. A new constitutive model for prediction of springback in sheet metal forming

    International Nuclear Information System (INIS)

    Appiah, E.; Jain, M.

    2004-01-01

    With advances in computer capabilities, cost of sheet metal forming has being reducing mainly due to the reduction of trial and error approaches. At the moment, a complete process can be simulated on computer and appropriate forming conditions optimized before actual industrial forming process is carried out. While formability predictions have improved, the problem of springback exhibited by most metal, including aluminum alloy AA6111-T4, after forming persist and often leads to significant part fit-up problems during assembly. There are a number of factors that affect springback and perhaps the most significant one is constitutive equation. In this paper springback predicted by six advanced kinematic models are evaluated. In addition an improved constitutive kinematic model is presented. It is shown that by adding stress correction term (SCT) to Armstrong-Frederick model a relatively simple and yet accurate stress prediction could be obtained. The SCT was developed with the assumption that the yield surface remains convex, yield center depends on translation, size and shape variations of the yield surface. The model is implemented in a commercial finite element code (ABAQUS/Standard) via its user material interface (UMAT). Numerical simulations of U-bending were performed using automotive aluminum sheet material (AA6111-T4). It was noted that springback has inverse relationship with residual stress

  11. Local elastic expansion model for viscous-flow activation energies of glass-forming molecular liquids

    DEFF Research Database (Denmark)

    Dyre, Jeppe; Olsen, Niels Boye; Christensen, Tage Emil

    1996-01-01

    A model for the viscosity of glass-forming molecular liquids is proposed in which a "flow event" requires a local volume increase. The activation energy for a flow event is identified with the work done in shoving aside the surrounding liquid; this work is proportional to the high-frequency shear...

  12. A Dislocation based Constitutive Model for Warm Forming of Aluminum Sheet

    NARCIS (Netherlands)

    Kurukuri, S.; Ghosh, M.; van den Boogaard, Antonius H.

    2008-01-01

    The formability of aluminum sheet can be improved considerably by increasing the temperature. At elevated temperatures, the mechanical response of the material becomes strain rate dependent. To accurately simulate warm forming of aluminum sheet, a material model is required that incorporates the

  13. Rare disease research: Breaking the privacy barrier

    Directory of Open Access Journals (Sweden)

    Deborah Mascalzoni

    2014-06-01

    Full Text Available Due to the few patients affected, rare disease research has to count on international registries to exist in order to produce significant research outputs. Data sharing of registries is therefore a unique resource to allow rare disease research to flourish and any lost data will jeopardize the quality of an already extremely difficult research. The rules usually applied to research such as the right to withdraw or the need for specific consent for every use of data can be detrimental in order to get effective results. Privacy rights regulated through traditional informed consent mechanisms have been regarded as a major barrier in order to effectively share data worldwide. Some authors argue that this barrier hampers results that could be beneficial to the patients so that another right will be overstated: the right to quality healthcare. We argue in this paper that privacy has been often interpreted just one-sided as the right to secrecy but it can entail another meaning: the right to manage one's own private sphere. Managing it pertains, not only to the right to deny access, but also to the right to grant access. At the same time research on patient participation and transparency shows that new forms of IT-based informed consent can provide a good balance between the right of individuals to be in control of their data and the opportunity for science to pursue international research.

  14. DEVELOPMENT OF MODEL FOR QUANTITATIVE EVALUATION OF DYNAMICALLY STABLE FORMS OF RIVER CHANNELS

    Directory of Open Access Journals (Sweden)

    O. V. Zenkin

    2017-01-01

    Full Text Available The article highlights the method of calculating the optimum curvature of the river channels using the kinematic model of the flow structure based on the concept of discrete nature of the channel process. It offers the analytic form of the equation of motion of river flow, which can be used simulation modeling for searching dynamically stable form of the river channel, and which can control water level in rivers. The source data for the illustrations of given in the article modeling methods have been served the images received from MODIS on the Terra satellite, for the lower reaches of the river Kur, which merges with the river Urmi, forming the Tunguska river – the left tributary of the Amur.The modified geometric method can be used to calculate obliquity of tangent to the curve and normal in those situations when observed on satellite imagery points are located on the coordinate of the network irregularly and when three points lying on the curve of the riverbed do not form isosceles triangle.The model assembles tangential and radial components of the forces acting on the water flow (centrifugal, friction and gravity. Curvature radius is explicitly expressed in the model through the parameter  – gradient angle relative to the axis X. As solution for the value of the angle  is searched, when the correlation function reaches its maximum. It is assumed that the riverbed shape “wrong” and could be modified so that the resulting curve better correlated with calculated curve. Morphometric dependences for macroforms allow creating series of morphological methods for the calculation of deformations and displacement of the shore in any section of meander scroll.The proposed technique has been tested also on satellite imagery of high resolution. The presented methods of calculation are used as the basis for hydrological projects of geoinformation systems oriented at prediction of morphodynamic processes and morphological evolution of river

  15. 76 FR 44888 - Privacy Act of 1974, System of Records

    Science.gov (United States)

    2011-07-27

    ... Privacy Act of 1974 (5 U.S.C. 552a), as amended, entitled ``USAID-30, Google Apps Business Edition''. This... . SUPPLEMENTARY INFORMATION: The Google Apps Business Edition is being established as an Agency-wide system of...'') cloud computing model. The suite is composed of Gmail for e-mail, Google Docs for office productivity...

  16. Investigating privacy attitudes and behavior in relation to personalization

    NARCIS (Netherlands)

    Garde - Perik, van de E.M.; Markopoulos, P.; Ruyter, de B.E.R.; Eggen, J.H.; IJsselsteijn, W.A.

    2008-01-01

    This article presents an experimental study of privacy-related attitudes and behaviors regarding a music recommender service based on two types of user modeling: personality traits and musical preferences. Contrary to prior expectations and attitudes reported by participants, personality traits are

  17. 75 FR 39500 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-07-09

    ... from the address above. The proposed system report, as required by 5 U.S.C. 552a(r) of the Privacy Act... location: Add to entry as last paragraph ``Defense Information Systems Agency (DISA) Mega Center, Building... plate number, drivers license number, vehicle make, model, year, color, drivers identification...

  18. Student Data Privacy Communications Toolkit

    Science.gov (United States)

    Foundation for Excellence in Education, 2016

    2016-01-01

    Parents expect school districts and schools to keep their children safe while they are in school. That expectation of safety and security also extends to the protection of their children's learning data. Therefore, it is critical that school districts and schools are open and transparent about their student data privacy practices, and that those…

  19. Privacy proof in the cloud

    NARCIS (Netherlands)

    Jessen, Veerle; Weigand, Hans; Mouratidis, Haris

    Cloud computing has been a frequently researched subject as it brings many advantages, such as the ability to store data remotely and scale rapidly, but also comes with several issues, including privacy, trust and security. The decision whether it is best to go `into the cloud' or to `stay inside'

  20. Patient privacy and social media.

    Science.gov (United States)

    Hader, Amy L; Brown, Evan D

    2010-08-01

    Healthcare providers using social media must remain mindful of professional boundaries and patients' privacy rights. Facebook and other online postings must comply with the Health Insurance Portability and Accountability Act of 1996 (HIPAA), applicable facility policy, state law, and AANA's Code of Ethics.

  1. Facebook: When Education Meets Privacy

    Science.gov (United States)

    Bruneel, Steven; De Wit, Kurt; Verhoeven, Jef C.; Elen, Jan

    2013-01-01

    The use of social networking sites (SNSs) has become commonplace amongst students. In this research, we aim to shed light upon the educational use and privacy issues on Facebook from the perspective of role theory and reference group theory. 15 bachelor students of the University of Leuven (KU Leuven) in Flanders, Belgium, were interviewed in…

  2. Privacy and Security: A Bibliography.

    Science.gov (United States)

    Computer and Business Equipment Manufacturers Association, Washington, DC.

    Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…

  3. Privacy in Online Social Networks

    NARCIS (Netherlands)

    Beye, Michael; Jeckmans, Arjan; Erkin, Zekeriya; Erkin, Zekeriya; Hartel, Pieter H.; Lagendijk, Reginald; Tang, Qiang; Abraham, A.

    Online Social Networks (OSNs) have become part of daily life for millions of users. Users building explicit networks that represent their social relationships and often share a wealth of personal information to their own benefit. The potential privacy risks of such behavior are often underestimated

  4. The European Approach to Privacy

    NARCIS (Netherlands)

    van Hoboken, J.

    2014-01-01

    This paper critically assesses the character of European (Union’s) privacy law and policy in the field of online media and electronic communications. Contrary to current understanding, this field of law is more fragmented and ill-developed than is often assumed, in particular by those discussing

  5. Biobanking and Privacy in India.

    Science.gov (United States)

    Chaturvedi, Sachin; Srinivas, Krishna Ravi; Muthuswamy, Vasantha

    2016-03-01

    Biobank-based research is not specifically addressed in Indian statutory law and therefore Indian Council for Medical Research guidelines are the primary regulators of biobank research in India. The guidelines allow for broad consent and for any level of identification of specimens. Although privacy is a fundamental right under the Indian Constitution, courts have limited this right when it conflicts with other rights or with the public interest. Furthermore, there is no established privacy test or actionable privacy right in the common law of India. In order to facilitate biobank-based research, both of these lacunae should be addressed by statutory law specifically addressing biobanking and more directly addressing the accompanying privacy concerns. A biobank-specific law should be written with international guidelines in mind, but harmonization with other laws should not be attempted until after India has created a law addressing biobank research within the unique legal and cultural environment of India. © 2016 American Society of Law, Medicine & Ethics.

  6. 78 FR 46256 - Privacy Act

    Science.gov (United States)

    2013-07-31

    ... FEDERAL ELECTION COMMISSION 11 CFR Part 1 Privacy Act CFR Correction In Title 11 of the Code of Federal Regulations, revised as of January 1, 2012, on page 5, in Sec. 1.2, the words ``95 and 96 of the Internal Revenue Code of 1954.'' are added at the end of the definition of Act. [FR Doc. 2013-18535 Filed 7...

  7. Privacy concerns in smart cities

    NARCIS (Netherlands)

    E.A. van Zoonen (Liesbet)

    2016-01-01

    textabstractIn this paper a framework is constructed to hypothesize if and how smart city technologies and urban big data produce privacy concerns among the people in these cities (as inhabitants, workers, visitors, and otherwise). The framework is built on the basis of two recurring dimensions in

  8. Protecting Your Child's Privacy Online

    Science.gov (United States)

    ... Keeping Up With Kids' Apps infographic Kids and Computer Security Kids and Mobile Phones Kids and Socializing Online ... email Looking for business guidance on privacy and ... The Federal Trade Commission (FTC) is the nation’s consumer protection agency. The FTC works to prevent fraudulent, deceptive ...

  9. Bridging the transatlantic divide in privacy

    Directory of Open Access Journals (Sweden)

    Paula Kift

    2013-08-01

    Full Text Available In the context of the US National Security Agency surveillance scandal, the transatlantic privacy divide has come back to the fore. In the United States, the right to privacy is primarily understood as a right to physical privacy, thus the protection from unwarranted government searches and seizures. In Germany on the other hand, it is also understood as a right to spiritual privacy, thus the right of citizens to develop into autonomous moral agents. The following article will discuss the different constitutional assumptions that underlie American and German attitudes towards privacy, namely privacy as an aspect of liberty or as an aspect of dignity. As data flows defy jurisdictional boundaries, however, policymakers across the Atlantic are faced with a conundrum: how can German and American privacy cultures be reconciled?

  10. Physical factors that influence patients’ privacy perception toward a psychiatric behavioral monitoring system: a qualitative study

    Directory of Open Access Journals (Sweden)

    Zakaria N

    2017-12-01

    Full Text Available Nasriah Zakaria,1,2 Rusyaizila Ramli3 1Research Chair of Health Informatics and Promotion, 2Medical Informatics and E-learning Unit, Medical Education Department, College of Medicine, King Saud University, Riyadh, Kingdom of Saudi Arabia; 3Advanced Military Maintenance Repair and Overhaul Center (AMMROC, Abu Dhabi, UAE Background: Psychiatric patients have privacy concerns when it comes to technology intervention in the hospital setting. In this paper, we present scenarios for psychiatric behavioral monitoring systems to be placed in psychiatric wards to understand patients’ perception regarding privacy. Psychiatric behavioral monitoring refers to systems that are deemed useful in measuring clinical outcomes, but little research has been done on how these systems will impact patients’ privacy. Methods: We conducted a case study in one teaching hospital in Malaysia. We investigated the physical factors that influence patients’ perceived privacy with respect to a psychiatric monitoring system. The eight physical factors identified from the information system development privacy model, a comprehensive model for designing a privacy-sensitive information system, were adapted in this research. Scenario-based interviews were conducted with 25 patients in a psychiatric ward for 3 months. Results: Psychiatric patients were able to share how physical factors influence their perception of privacy. Results show how patients responded to each of these dimensions in the context of a psychiatric behavioral monitoring system. Conclusion: Some subfactors under physical privacy are modified to reflect the data obtained in the interviews. We were able to capture the different physical factors that influence patient privacy. Keywords: information system development (ISD, physical factor, privacy, psychiatric monitoring system

  11. Development of Large Scale Bed Forms in the Sea –2DH Numerical Modeling

    DEFF Research Database (Denmark)

    Margalit, Jonatan; Fuhrman, David R.

    Large repetitive patterns on the sea bed are commonly observed in sandy areas. The formation of the bed forms have been studied extensively in literature using linear stability analyses, commonly conducted analytically and with simplifications in the governing equations. This work presents...... a shallow water equation model that is used to numerically simulate the morphodynamics of the water-bed system. The model includes separate formulations for bed load and suspended load, featuring bed load correction due to a sloping bed and modelled helical flow effects. Horizontal gradients are computed...... with spectral accuracy, which proves highly efficient for the analysis. Numerical linear stability analysis is used to identify the likely emergence of dominant finite sized bed forms, as a function of governing parameters. These are then used for interpretation of the results of a long time morphological...

  12. Exact closed-form solutions of a fully nonlinear asymptotic two-fluid model

    Science.gov (United States)

    Cheviakov, Alexei F.

    2018-05-01

    A fully nonlinear model of Choi and Camassa (1999) describing one-dimensional incompressible dynamics of two non-mixing fluids in a horizontal channel, under a shallow water approximation, is considered. An equivalence transformation is presented, leading to a special dimensionless form of the system, involving a single dimensionless constant physical parameter, as opposed to five parameters present in the original model. A first-order dimensionless ordinary differential equation describing traveling wave solutions is analyzed. Several multi-parameter families of physically meaningful exact closed-form solutions of the two-fluid model are derived, corresponding to periodic, solitary, and kink-type bidirectional traveling waves; specific examples are given, and properties of the exact solutions are analyzed.

  13. Tea Polyphenols as Inhibitors of Furan Formed in the Maillard Model System and Canned Coffee Model.

    Science.gov (United States)

    Bi, K H; Zhang, L; Qiao, X G; Xu, Z X

    2017-05-01

    In this article, the effects of sugars and amino acids on furan formation via the Maillard reaction in low-moisture model systems were investigated. Glucose and alanine are important furan precursors, and the effects of the heating temperature, heating time, and molar ratio of glucose to alanine on furan formation were studied in glucose/alanine model system by response surface methodology. The heating temperature greatly affected furan formation. The maximum furan concentration was obtained with a glucose-to-alanine molar ratio of 0.83:1.00, by heating at 151 °C for 41 min. Tea polyphenols effectively inhibited furan formation in the glucose/alanine model and a canned coffee model. A high inhibition rate of 42.4% ± 1.5% was obtained in the canned coffee model during sterilization procedure with addition of 84 mg (the mass fraction is 12.1%) of tea polyphenols (99%). However, the content of aromatic components in the canned coffee model was significantly reduced at the same time. This study provides evidence for a good furan inhibitor that can be used in food processing. © 2017 Institute of Food Technologists®.

  14. Modelling and simulating the forming of new dry automated lay-up reinforcements for primary structures

    Science.gov (United States)

    Bouquerel, Laure; Moulin, Nicolas; Drapier, Sylvain; Boisse, Philippe; Beraud, Jean-Marc

    2017-10-01

    While weight has been so far the main driver for the development of prepreg based-composites solutions for aeronautics, a new weight-cost trade-off tends to drive choices for next-generation aircrafts. As a response, Hexcel has designed a new dry reinforcement type for aircraft primary structures, which combines the benefits of automation, out-of-autoclave process cost-effectiveness, and mechanical performances competitive to prepreg solutions: HiTape® is a unidirectional (UD) dry carbon reinforcement with thermoplastic veil on each side designed for aircraft primary structures [1-3]. One privileged process route for HiTape® in high volume automated processes consists in forming initially flat dry reinforcement stacks, before resin infusion [4] or injection. Simulation of the forming step aims at predicting the geometry and mechanical properties of the formed stack (so-called preform) for process optimisation. Extensive work has been carried out on prepreg and dry woven fabrics forming behaviour and simulation, but the interest for dry non-woven reinforcements has emerged more recently. Some work has been achieved on non crimp fabrics but studies on the forming behaviour of UDs are seldom and deal with UD prepregs only. Tension and bending in the fibre direction, along with inter-ply friction have been identified as the main mechanisms controlling the HiTape® response during forming. Bending has been characterised using a modified Peirce's flexometer [5] and inter-ply friction study is under development. Anisotropic hyperelastic constitutive models have been selected to represent the assumed decoupled deformation mechanisms. Model parameters are then identified from associated experimental results. For forming simulation, a continuous approach at the macroscopic scale has been selected first, and simulation is carried out in the Zset framework [6] using proper shell finite elements.

  15. An advanced constitutive model in the sheet metal forming simulation: the Teodosiu microstructural model and the Cazacu Barlat yield criterion

    International Nuclear Information System (INIS)

    Alves, J.L.; Oliveira, M.C.; Menezes, L.F.

    2004-01-01

    Two constitutive models used to describe the plastic behavior of sheet metals in the numerical simulation of sheet metal forming process are studied: a recently proposed advanced constitutive model based on the Teodosiu microstructural model and the Cazacu Barlat yield criterion is compared with a more classical one, based on the Swift law and the Hill 1948 yield criterion. These constitutive models are implemented into DD3IMP, a finite element home code specifically developed to simulate sheet metal forming processes, which generically is a 3-D elastoplastic finite element code with an updated Lagrangian formulation, following a fully implicit time integration scheme, large elastoplastic strains and rotations. Solid finite elements and parametric surfaces are used to model the blank sheet and tool surfaces, respectively. Some details of the numerical implementation of the constitutive models are given. Finally, the theory is illustrated with the numerical simulation of the deep drawing of a cylindrical cup. The results show that the proposed advanced constitutive model predicts with more exactness the final shape (medium height and ears profile) of the formed part, as one can conclude from the comparison with the experimental results

  16. Form factors of descendant operators: reduction to perturbed M(2,2s+1) models

    International Nuclear Information System (INIS)

    Lashkevich, Michael; Pugai, Yaroslav

    2015-01-01

    In the framework of the algebraic approach to form factors in two-dimensional integrable models of quantum field theory we consider the reduction of the sine-Gordon model to the Φ 13 -perturbation of minimal conformal models of the M(2,2s+1) series. We find in an algebraic form the condition of compatibility of local operators with the reduction. We propose a construction that make it possible to obtain reduction compatible local operators in terms of screening currents. As an application we obtain exact multiparticle form factors for the compatible with the reduction conserved currents T ±2k , Θ ±(2k−2) , which correspond to the spin ±(2k−1) integrals of motion, for any positive integer k. Furthermore, we obtain all form factors of the operators T 2k T −2l , which generalize the famous TT̄ operator. The construction is analytic in the s parameter and, therefore, makes sense in the sine-Gordon theory.

  17. Governance Through Privacy, Fairness, and Respect for Individuals.

    Science.gov (United States)

    Baker, Dixie B; Kaye, Jane; Terry, Sharon F

    2016-01-01

    Individuals have a moral claim to be involved in the governance of their personal data. Individuals' rights include privacy, autonomy, and the ability to choose for themselves how they want to manage risk, consistent with their own personal values and life situations. The Fair Information Practices principles (FIPPs) offer a framework for governance. Privacy-enhancing technology that complies with applicable law and FIPPs offers a dynamic governance tool for enabling the fair and open use of individual's personal data. Any governance model must protect against the risks posed by data misuse. Individual perceptions of risks are a subjective function involving individuals' values toward self, family, and society, their perceptions of trust, and their cognitive decision-making skills. Individual privacy protections and individuals' right to choose are codified in the HIPAA Privacy Rule, which attempts to strike a balance between the dual goals of information flow and privacy protection. The choices most commonly given individuals regarding the use of their health information are binary ("yes" or "no") and immutable. Recent federal recommendations and law recognize the need for granular, dynamic choices. Individuals expect that they will govern the use of their own health and genomic data. Failure to build and maintain individuals' trust increases the likelihood that they will refuse to grant permission to access or use their data. The "no surprises principle" asserts that an individual's personal information should never be collected, used, transmitted, or disclosed in a way that would surprise the individual were she to learn about it. The FIPPs provide a powerful framework for enabling data sharing and use, while maintaining trust. We introduce the eight FIPPs adopted by the Department of Health and Human Services, and provide examples of their interpretation and implementation. Privacy risk and health risk can be reduced by giving consumers control, autonomy, and

  18. A method of LED free-form tilted lens rapid modeling based on scheme language

    Science.gov (United States)

    Dai, Yidan

    2017-10-01

    According to nonimaging optical principle and traditional LED free-form surface lens, a new kind of LED free-form tilted lens was designed. And a method of rapid modeling based on Scheme language was proposed. The mesh division method was applied to obtain the corresponding surface configuration according to the character of the light source and the desired energy distribution on the illumination plane. Then 3D modeling software and the Scheme language programming are used to generate lens model respectively. With the help of optical simulation software, a light source with the size of 1mm*1mm*1mm in volume is used in experiment, and the lateral migration distance of illumination area is 0.5m, in which total one million rays are computed. We could acquire the simulated results of both models. The simulated output result shows that the Scheme language can prevent the model deformation problems caused by the process of the model transfer, and the degree of illumination uniformity is reached to 82%, and the offset angle is 26°. Also, the efficiency of modeling process is greatly increased by using Scheme language.

  19. Didactic possibilities of computer communications - the foundation of didactic model of training teachers in remote form

    Directory of Open Access Journals (Sweden)

    Vasilchenko L.V.

    2010-04-01

    Full Text Available The didactic model of the remote form of raising the level of teacher's skill is considered. Directions of creation of single educational space of continuous education are rotined. The association of didactic possibilities of information telecommunication technologies is given by possibility to stimulate independent educational activity of teachers. The indicated system renders assistance to development of abilities in a short-story form to give information, create short information messages, assort necessary information on certain signs. All of it develops communicative capabilities which play an important role in development of the personal qualities of individual

  20. Is the Linear Modeling Technique Good Enough for Optimal Form Design? A Comparison of Quantitative Analysis Models

    Science.gov (United States)

    Lin, Yang-Cheng; Yeh, Chung-Hsing; Wang, Chen-Cheng; Wei, Chun-Chun

    2012-01-01

    How to design highly reputable and hot-selling products is an essential issue in product design. Whether consumers choose a product depends largely on their perception of the product image. A consumer-oriented design approach presented in this paper helps product designers incorporate consumers' perceptions of product forms in the design process. The consumer-oriented design approach uses quantification theory type I, grey prediction (the linear modeling technique), and neural networks (the nonlinear modeling technique) to determine the optimal form combination of product design for matching a given product image. An experimental study based on the concept of Kansei Engineering is conducted to collect numerical data for examining the relationship between consumers' perception of product image and product form elements of personal digital assistants (PDAs). The result of performance comparison shows that the QTTI model is good enough to help product designers determine the optimal form combination of product design. Although the PDA form design is used as a case study, the approach is applicable to other consumer products with various design elements and product images. The approach provides an effective mechanism for facilitating the consumer-oriented product design process. PMID:23258961

  1. Art form as an object of cognitive modeling (towards development of Vygotsky`s semiotic model)

    Energy Technology Data Exchange (ETDEWEB)

    Dmitriev, V. [Oklahoma State Univ. (United States); Perlovsky, L.I.

    1996-12-31

    We suggest a further development of Vygotsky`s esthetic-semiotic model. First, we discuss Vygotsky`s model originally developed for the analysis of Ivan Bunin`s story {open_quotes}Light Breath{close_quotes}. Vygotsky analyzes formal methods used by Bunin to achieve a specific esthetic effect of {open_quote}lightness{close_quotes} while describing {open_quotes}dirty{close_quotes} events of everyday life. According to Vygotsky, this effect is achieved by ordering of events in a non-linear fashion. Vygotsky creams an airy pattern of smooth lines connecting events of story that he first orders linearly in time. And, he insists that this airy pattern creates an impression of airy lightness. In the language of semiotics, the esthetic effect is created by a specific structural organization of signs. Second, we present our critique of Vygotsky`s model. Although, we do not agree with Vygotsky`s sometimes moralistic judgements, and we consider the dynamics between inner personal values and received moral values to be more complicated than implied in his judgements, our critique in this paper is limited to the structure of his semiotic model. We emphasize that Vygotsky`s model does not explicitly account for a hierarchy of multiple levels of semiotic analysis. His analysis regularly slips from one level to another: (1) a lever of cognitive perception by a regular reader is confused with a level of creative genius of a writer; (2) {open_quotes}open{close_quotes} time of real world is mixed up with {open_quote}closed{close_quote} time of the story; (3) events are not organized by the hierarchy of their importance, nor in real world, nor in the inner model of the personages, nor in the story.

  2. Quantifying the costs and benefits of privacy-preserving health data publishing.

    Science.gov (United States)

    Khokhar, Rashid Hussain; Chen, Rui; Fung, Benjamin C M; Lui, Siu Man

    2014-08-01

    Cost-benefit analysis is a prerequisite for making good business decisions. In the business environment, companies intend to make profit from maximizing information utility of published data while having an obligation to protect individual privacy. In this paper, we quantify the trade-off between privacy and data utility in health data publishing in terms of monetary value. We propose an analytical cost model that can help health information custodians (HICs) make better decisions about sharing person-specific health data with other parties. We examine relevant cost factors associated with the value of anonymized data and the possible damage cost due to potential privacy breaches. Our model guides an HIC to find the optimal value of publishing health data and could be utilized for both perturbative and non-perturbative anonymization techniques. We show that our approach can identify the optimal value for different privacy models, including K-anonymity, LKC-privacy, and ∊-differential privacy, under various anonymization algorithms and privacy parameters through extensive experiments on real-life data. Copyright © 2014 Elsevier Inc. All rights reserved.

  3. Promotion time cure rate model with nonparametric form of covariate effects.

    Science.gov (United States)

    Chen, Tianlei; Du, Pang

    2018-05-10

    Survival data with a cured portion are commonly seen in clinical trials. Motivated from a biological interpretation of cancer metastasis, promotion time cure model is a popular alternative to the mixture cure rate model for analyzing such data. The existing promotion cure models all assume a restrictive parametric form of covariate effects, which can be incorrectly specified especially at the exploratory stage. In this paper, we propose a nonparametric approach to modeling the covariate effects under the framework of promotion time cure model. The covariate effect function is estimated by smoothing splines via the optimization of a penalized profile likelihood. Point-wise interval estimates are also derived from the Bayesian interpretation of the penalized profile likelihood. Asymptotic convergence rates are established for the proposed estimates. Simulations show excellent performance of the proposed nonparametric method, which is then applied to a melanoma study. Copyright © 2018 John Wiley & Sons, Ltd.

  4. Micromechanics-based damage model for failure prediction in cold forming

    Energy Technology Data Exchange (ETDEWEB)

    Lu, X.Z.; Chan, L.C., E-mail: lc.chan@polyu.edu.hk

    2017-04-06

    The purpose of this study was to develop a micromechanics-based damage (micro-damage) model that was concerned with the evolution of micro-voids for failure prediction in cold forming. Typical stainless steel SS316L was selected as the specimen material, and the nonlinear isotropic hardening rule was extended to describe the large deformation of the specimen undergoing cold forming. A micro-focus high-resolution X-ray computed tomography (CT) system was employed to trace and measure the micro-voids inside the specimen directly. Three-dimensional (3D) representative volume element (RVE) models with different sizes and spatial locations were reconstructed from the processed CT images of the specimen, and the average size and volume fraction of micro-voids (VFMV) for the specimen were determined via statistical analysis. Subsequently, the micro-damage model was compiled as a user-defined material subroutine into the finite element (FE) package ABAQUS. The stress-strain responses and damage evolutions of SS316L specimens under tensile and compressive deformations at different strain rates were predicted and further verified experimentally. It was concluded that the proposed micro-damage model is convincing for failure prediction in cold forming of the SS316L material.

  5. 1/M corrections to baryonic form factors in the quark model

    International Nuclear Information System (INIS)

    Cheng, H.; Tseng, B.

    1996-01-01

    Weak current-induced baryonic form factors at zero recoil are evaluated in the rest frame of the heavy parent baryon using the nonrelativistic quark model. Contrary to previous similar work in the literature, our quark model results do satisfy the constraints imposed by heavy quark symmetry for heavy-heavy baryon transitions at the symmetric point v·v'=1 and are in agreement with the predictions of the heavy quark effective theory for antitriplet-antitriplet heavy baryon form factors at zero recoil evaluated to order 1/m Q . Furthermore, the quark model approach has the merit that it is applicable to any heavy-heavy and heavy-light baryonic transitions at maximum q 2 . Assuming a dipole q 2 behavior, we have applied the quark model form factors to nonleptonic, semileptonic, and weak radiative decays of the heavy baryons. It is emphasized that the flavor suppression factor occurring in many heavy-light baryonic transitions, which is unfortunately overlooked in most literature, is very crucial towards an agreement between theory and experiment for the semileptonic decay Λ c →Λe + ν e . Predictions for the decay modes Λ b →J/ψΛ, Λ c →pφ, Λ b →Λγ, Ξ b →Ξγ, and for the semileptonic decays of Λ b , Ξ b, c, and Ω b are presented. copyright 1996 The American Physical Society

  6. Robot-based additive manufacturing for flexible die-modelling in incremental sheet forming

    Science.gov (United States)

    Rieger, Michael; Störkle, Denis Daniel; Thyssen, Lars; Kuhlenkötter, Bernd

    2017-10-01

    The paper describes the application concept of additive manufactured dies to support the robot-based incremental sheet metal forming process (`Roboforming') for the production of sheet metal components in small batch sizes. Compared to the dieless kinematic-based generation of a shape by means of two cooperating industrial robots, the supporting robot models a die on the back of the metal sheet by using the robot-based fused layer manufacturing process (FLM). This tool chain is software-defined and preserves the high geometrical form flexibility of Roboforming while flexibly generating support structures adapted to the final part's geometry. Test series serve to confirm the feasibility of the concept by investigating the process challenges of the adhesion to the sheet surface and the general stability as well as the influence on the geometric accuracy compared to the well-known forming strategies.

  7. Nonasymptotic form of the recursion relations of the three-dimensional Ising model

    International Nuclear Information System (INIS)

    Kozlovskii, M.P.

    1989-01-01

    Approximate recursion relations for the three-dimensional Ising model are obtained in the form of rapidly converging series. The representation of the recursion relations in the form of nonasymptotic series entails the abandonment of traditional perturbation theory based on a Gaussian measure density. The recursion relations proposed in the paper are used to calculate the critical exponent ν of the correlation length. It is shown that the difference form of the recursion relations leads, when higher non-Gaussian basis measures are used, to disappearance of a dependence of the critical exponent ν on s when s > 2 (s is the parameter of the division of the phase space into layers). The obtained results make it possible to calculate explicit expressions for the thermodynamic functions near the phase transition point

  8. Do privacy and security regulations need a status update? Perspectives from an intergenerational survey.

    Directory of Open Access Journals (Sweden)

    Stacey Pereira

    Full Text Available The importance of health privacy protections in the era of the "Facebook Generation" has been called into question. The ease with which younger people share personal information about themselves has led to the assumption that they are less concerned than older generations about the privacy of their information, including health information. We explored whether survey respondents' views toward health privacy suggest that efforts to strengthen privacy protections as health information is moved online are unnecessary.Using Amazon's Mechanical Turk (MTurk, which is well-known for recruitment for survey research, we distributed a 45-item survey to individuals in the U.S. to assess their perspectives toward privacy and security of online and health information, social media behaviors, use of health and fitness devices, and demographic information.1310 participants (mean age: 36 years, 50% female, 78% non-Hispanic white, 54% college graduates or higher were categorized by generations: Millennials, Generation X, and Baby Boomers. In multivariate regression models, we found that generational cohort was an independent predictor of level of concern about privacy and security of both online and health information. Younger generations were significantly less likely to be concerned than older generations (all P 0.05.This study is limited by the non-representativeness of our sample.Though Millennials reported lower levels of concern about privacy and security, this was not related to internet or social media behaviors, and majorities within all generations reported concern about both the privacy and security of their health information. Thus, there is no intergenerational imperative to relax privacy and security standards, and it would be advisable to take privacy and security of health information more seriously.

  9. Adolescents' perceptions of privacy invasion in reaction to parental solicitation and control

    NARCIS (Netherlands)

    Hawk, S.T.; Hale, W.W., III; Raaijmakers, Q.A.W.; Meeus, W.

    2008-01-01

    Following suggestions from prior research, this 2-wave longitudinal study examined whether parental solicitation and control influenced adolescents’ later perceptions of privacy invasion. Data from 307 Dutch adolescents were tested with structural equation modeling (SEM). Differences in adolescents’

  10. A path model of different forms of impulsivity with externalizing and internalizing psychopathology: Towards greater specificity.

    Science.gov (United States)

    Johnson, Sheri L; Tharp, Jordan A; Peckham, Andrew D; Carver, Charles S; Haase, Claudia M

    2017-09-01

    A growing empirical literature indicates that emotion-related impulsivity (compared to impulsivity that is unrelated to emotion) is particularly relevant for understanding a broad range of psychopathologies. Recent work, however, has differentiated two forms of emotion-related impulsivity: A factor termed Pervasive Influence of Feelings captures tendencies for emotions (mostly negative emotions) to quickly shape thoughts, and a factor termed Feelings Trigger Action captures tendencies for positive and negative emotions to quickly and reflexively shape behaviour and speech. This study used path modelling to consider links from emotion-related and non-emotion-related impulsivity to a broad range of psychopathologies. Undergraduates completed self-report measures of impulsivity, depression, anxiety, aggression, and substance use symptoms. A path model (N = 261) indicated specificity of these forms of impulsivity. Pervasive Influence of Feelings was related to anxiety and depression, whereas Feelings Trigger Action and non-emotion-related impulsivity were related to aggression and substance use. The findings of this study suggest that emotion-relevant impulsivity could be a potentially important treatment target for a set of psychopathologies. Recent work has differentiated two forms of emotion-related impulsivity. This study tests a multivariate path model linking emotion-related and non-emotion-related impulsivity with multiple forms of psychopathology. Impulsive thoughts in response to negative emotions were related to anxiety and depression. Impulsive actions in response to emotions were related to aggression and substance use, as did non-emotion-related impulsivity. The study was limited by the reliance on self-report measures of impulsivity and psychopathology. There is a need for longitudinal work on how these forms of impulsivity predict the onset and course of psychopathology. © 2017 The British Psychological Society.

  11. Privacy information management for video surveillance

    Science.gov (United States)

    Luo, Ying; Cheung, Sen-ching S.

    2013-05-01

    The widespread deployment of surveillance cameras has raised serious privacy concerns. Many privacy-enhancing schemes have been proposed to automatically redact images of trusted individuals in the surveillance video. To identify these individuals for protection, the most reliable approach is to use biometric signals such as iris patterns as they are immutable and highly discriminative. In this paper, we propose a privacy data management system to be used in a privacy-aware video surveillance system. The privacy status of a subject is anonymously determined based on her iris pattern. For a trusted subject, the surveillance video is redacted and the original imagery is considered to be the privacy information. Our proposed system allows a subject to access her privacy information via the same biometric signal for privacy status determination. Two secure protocols, one for privacy information encryption and the other for privacy information retrieval are proposed. Error control coding is used to cope with the variability in iris patterns and efficient implementation is achieved using surrogate data records. Experimental results on a public iris biometric database demonstrate the validity of our framework.

  12. Information privacy fundamentals for librarians and information professionals

    CERN Document Server

    Givens, Cherie L

    2014-01-01

    This book introduces library and information professionals to information privacy, provides an overview of information privacy in the library and information science context, U.S. privacy laws by sector, information privacy policy, and key considerations when planning and creating a privacy program.

  13. Location-Related Privacy in Geo-Social Networks

    DEFF Research Database (Denmark)

    Ruiz Vicente, Carmen; Freni, Dario; Bettini, Claudio

    2011-01-01

    -ins." However, this ability to reveal users' locations causes new privacy threats, which in turn call for new privacy-protection methods. The authors study four privacy aspects central to these social networks - location, absence, co-location, and identity privacy - and describe possible means of protecting...... privacy in these circumstances....

  14. 32 CFR 701.101 - Privacy program terms and definitions.

    Science.gov (United States)

    2010-07-01

    ... from a project on privacy issues, identifying and resolving the privacy risks, and approval by a... 32 National Defense 5 2010-07-01 2010-07-01 false Privacy program terms and definitions. 701.101... DEPARTMENT OF THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.101 Privacy program terms and...

  15. Paradigm Change: Alternate Approaches to Constitutive and Necking Models for Sheet Metal Forming

    International Nuclear Information System (INIS)

    Stoughton, Thomas B.; Yoon, Jeong Whan

    2011-01-01

    This paper reviews recent work proposing paradigm changes for the currently popular approach to constitutive and failure modeling, focusing on the use of non-associated flow rules to enable greater flexibility to capture the anisotropic yield and flow behavior of metals using less complex functions than those needed under associated flow to achieve that same level of fidelity to experiment, and on the use of stress-based metrics to more reliably predict necking limits under complex conditions of non-linear forming. The paper discusses motivating factors and benefits in favor of both associated and non-associated flow models for metal forming, including experimental, theoretical, and practical aspects. This review is followed by a discussion of the topic of the forming limits, the limitations of strain analysis, the evidence in favor of stress analysis, the effects of curvature, bending/unbending cycles, triaxial stress conditions, and the motivation for the development of a new type of forming limit diagram based on the effective plastic strain or equivalent plastic work in combination with a directional parameter that accounts for the current stress condition.

  16. The Ising model: from elliptic curves to modular forms and Calabi-Yau equations

    International Nuclear Information System (INIS)

    Bostan, A; Boukraa, S; Hassani, S; Zenine, N; Van Hoeij, M; Maillard, J-M; Weil, J-A

    2011-01-01

    We show that almost all the linear differential operators factors obtained in the analysis of the n-particle contributions of the susceptibility of the Ising model for n ≤ 6 are linear differential operators associated with elliptic curves. Beyond the simplest differential operators factors which are homomorphic to symmetric powers of the second order operator associated with the complete elliptic integral E, the second and third order differential operators Z 2 , F 2 , F 3 , L-tilde 3 can actually be interpreted as modular forms of the elliptic curve of the Ising model. A last order-4 globally nilpotent linear differential operator is not reducible to this elliptic curve, modular form scheme. This operator is shown to actually correspond to a natural generalization of this elliptic curve, modular form scheme, with the emergence of a Calabi-Yau equation, corresponding to a selected 4 F 3 hypergeometric function. This hypergeometric function can also be seen as a Hadamard product of the complete elliptic integral K, with a remarkably simple algebraic pull-back (square root extension), the corresponding Calabi-Yau fourth order differential operator having a symplectic differential Galois group SP(4,C). The mirror maps and higher order Schwarzian ODEs, associated with this Calabi-Yau ODE, present all the nice physical and mathematical ingredients we had with elliptic curves and modular forms, in particular an exact (isogenies) representation of the generators of the renormalization group, extending the modular group SL(2,Z) to a GL(2,Z) symmetry group.

  17. Numerical modelling of the effect of using multi-explosives on the explosive forming of steel cones

    OpenAIRE

    De Vuyst, T; Kong, K; Djordjevic, N; Vignjevic, R; Campbell, JC; Hughes, K

    2016-01-01

    Modelling and analysis of underwater explosive forming process by using FEM and SPH formulation is presented in this work. The explosive forming of a steel cone is studied. The model setup includes a low carbon steel plate, plate holder, forming die as well as water and C4 explosive. The effect of multiple explosives on rate of targets deformation has been studied. Four different multi-explosives models have been developed and compared to the single explosive model. The formability of the ste...

  18. Chiral-model of weak-interaction form factors and magnetic moments of octet baryons

    International Nuclear Information System (INIS)

    Kubodera, K.; Kohyama, Y.; Tsushima, K.; Yamaguchi, T.

    1989-01-01

    For baryon spectroscopy, magnetic moments and weak interaction form factors provide valuable information, and the impressive amount of available experimental data on these quantities for the octet baryons invites detailed investigations. The authors of this paper have made extensive studies of the weak-interaction form factors and magnetic moments of the octet baryons within the framework of the volume-type cloudy-bag model (v-type CBM). The clouds of all octet mesons have been included. Furthermore, we have taken into account in a unified framework various effects that were so far only individually discussed in the literature. Thus, the gluonic effects, center-of-mass (CM0 corrections, and recoil corrections have been included). In this talk, after giving a brief summary of some salient features of the results, we discuss a very interesting application of our model to the problem of the spin content of nucleons

  19. Re-modeling Chara action potential: II. The action potential form under salinity stress

    Directory of Open Access Journals (Sweden)

    Mary Jane Beilby

    2017-04-01

    Full Text Available In part I we established Thiel-Beilby model of the Chara action potential (AP. In part II the AP is investigated in detail at the time of saline stress. Even very short exposure of salt-sensitive Chara cells to artificial pond water with 50 mM NaCl (Saline APW modified the AP threshold and drastically altered the AP form. Detailed modeling of 14 saline APs from 3 cells established that both the Ca2+ pump and the Ca2+ channels on internal stores seem to be affected, with the changes sometimes cancelling and sometimes re-enforcing each other, leading to APs with long durations and very complex forms. The exposure to salinity offers further insights into AP mechanism and suggests future experiments. The prolonged APs lead to greater loss of chloride and potassium ions, compounding the effects of saline stress.

  20. Strange mesonic transition form factor in the chiral constituent quark model

    International Nuclear Information System (INIS)

    Ito, H.; Ramsey-Musolf, M.J.

    1998-01-01

    The form factor g ρπ (S) (Q 2 ) of the strange vector current transition matrix element left-angle ρ|bar sγ μ s|π right-angle is calculated within the chiral quark model. A strange vector current of the constituent U and D quarks is induced by kaon radiative corrections and this mechanism yields the nonvanishing values of g ρπ (S) (0). The numerical result at the photon point is consistent with the one given by the φ-meson dominance model, but the falloff in the Q 2 dependence is faster than the monopole form factor. Mesonic radiative corrections are also examined for the electromagnetic ρ-to-π and K * -to-K transition amplitudes. copyright 1998 The American Physical Society

  1. 3-D Modelling of Electromagnetic, Thermal, Mechanical and Metallurgical Couplings in Metal Forming Processes

    International Nuclear Information System (INIS)

    Chenot, Jean-Loup; Bay, Francois

    2007-01-01

    The different stages of metal forming processes often involve - beyond the mechanical deformations processes - other physical coupled problems, such as heat transfer, electromagnetism or metallurgy. The purpose of this paper is to focus on problems involving electromagnetic couplings. After a brief recall on electromagnetic modeling, we shall then focus on induction heating processes and present some results regarding heat transfer, as well as mechanical couplings. A case showing coupling for metallurgic microstructure evolution will conclude this paper

  2. Forming Factors And Builder Indicators Of Brand Personality Models In Traditional Retail Traders

    OpenAIRE

    Yunelly Asra; Teguh Widodo

    2017-01-01

    This study aims to find the factors forming and indicator builder model of brand personality of traditional retail traders through measuring the influence of retail mix and culture. The formation of brand personality uses Aaker brand personality dimension to 250 consumers in Bengkalis Regency. The type of research is causal research design. The research variables are brand personality Retail Mix and Brand Personality. Data collection is done by probability sampling with purposive method. Data...

  3. Ductile failure analysis of high strength steel in hot forming based on micromechanical damage model

    OpenAIRE

    Ying Liang; Liu Wenquan; Wang Dantong; Hu Ping

    2016-01-01

    The damage evolution of high strength steel at elevated temperature is investigated by using the Gurson-Tvergaard-Needleman (GTN) model. A hybrid method integrated thermal tensile test and numerical technique is employed to identify the damage parameters. The analysis results show that the damage parameters are different at different temperature as the variation of tested material microstructure. Furthermore, the calibrated damage parameters are implemented to simulate a bugling forming at el...

  4. Prompt form of relativistic equations of motion in a model of singular lagrangian formalism

    International Nuclear Information System (INIS)

    Gajda, R.P.; Duviryak, A.A.; Klyuchkovskij, Yu.B.

    1983-01-01

    The purpose of the paper is to develope the way of transition from equations of motion in singular lagrangian formalism to three-dimensional equations of Newton type in the prompt form of dynamics in the framework of c -2 parameter expansion (s. c. quasireltativistic approaches), as well as to find corresponding integrals of motion. The first quasirelativistifc approach for Dominici, Gomis, Longhi model was obtained and investigated

  5. Relativistic form factors for hadrons with quark-model wave functions

    International Nuclear Information System (INIS)

    Stanley, D.P.; Robson, D.

    1982-01-01

    The relationship between relativistic form factors and quark-potential-model wave functions is examined using an improved version of an approach by Licht and Pagnamenta. Lorentz-contraction effects are expressed in terms of an effective hadron mass which varies as the square root of the number of quark constituents. The effective mass is calculated using the rest-frame wave functions from the mean-square momentum along the direction of the momentum transfer. Applications with the parameter-free approach are made to the elastic form factors of the pion, proton, and neutron using a Hamiltonian which simultaneously describes mesons and baryons. A comparison of the calculated radii for pions and kaons suggests that the measured kaon radius should be slightly smaller than the corresponding pion radius. The large negative squared charge radius for the neutron is partially explained via the quark model but a full description requires the inclusion of a small component of a pion ''cloud'' configuration. The problematic connection between the sizes of hadrons deduced from form factors and the ''measured'' values of average transverse momenta is reconciled in the present model

  6. A power-law coupled three-form dark energy model

    Energy Technology Data Exchange (ETDEWEB)

    Yao, Yan-Hong; Yan, Yang-Jie; Meng, Xin-He [Nankai University, Department of Physics, Tianjin (China)

    2018-02-15

    We consider a field theory model of coupled dark energy which treats dark energy as a three-form field and dark matter as a spinor field. By assuming the effective mass of dark matter as a power-law function of the three-form field and neglecting the potential term of dark energy, we obtain three solutions of the autonomous system of evolution equations, including a de Sitter attractor, a tracking solution and an approximate solution. To understand the strength of the coupling, we confront the model with the latest Type Ia Supernova, Baryon Acoustic Oscillations and Cosmic Microwave Background radiation observations, with the conclusion that the combination of these three databases marginalized over the present dark matter density parameter Ω{sub m0} and the present three-form field κX{sub 0} gives stringent constraints on the coupling constant, -0.017 < λ < 0.047 (2σ confidence level), by which we present the model's applicable parameter range. (orig.)

  7. Constitutive modeling for analysis and design of aluminum sheet forming processes

    International Nuclear Information System (INIS)

    Barlat, F.; Chung, K.; Yoon, J-W.; Choi, S-H.

    2000-01-01

    Finite element modeling (FEM) technology is one of the most powerful tools used to design new products, i.e. appliances, automotive, rigid packaging and aerospace parts, etc., and processes. However, FEM users need data and models to characterize the materials used to fabricate the new products. In fact, they need more information than the traditional and standard yield strength, ultimate strength, elongation, etc. Constitutive models and their associated coefficients represent a new way to describe material properties, a way that can be used by FEM users. In order to help manufacturers use more aluminum alloy sheet in their products, appropriate material models are needed to analyze and design specifically for these materials. This work describes a methodology that provides phenomenological constitutive equations based on three main microstructure components of aluminum alloys: dislocation density, second-phase particles and crystallographic texture. Examples of constitutive equations and their applications to numerical sheet forming process analysis and design are provided in this work. (author)

  8. Modelling and simulation of the consolidation behavior during thermoplastic prepreg composites forming process

    Science.gov (United States)

    Xiong, H.; Hamila, N.; Boisse, P.

    2017-10-01

    Pre-impregnated thermoplastic composites have recently attached increasing interest in the automotive industry for their excellent mechanical properties and their rapid cycle manufacturing process, modelling and numerical simulations of forming processes for composites parts with complex geometry is necessary to predict and optimize manufacturing practices, especially for the consolidation effects. A viscoelastic relaxation model is proposed to characterize the consolidation behavior of thermoplastic prepregs based on compaction tests with a range of temperatures. The intimate contact model is employed to predict the evolution of the consolidation which permits the microstructure prediction of void presented through the prepreg. Within a hyperelastic framework, several simulation tests are launched by combining a new developed solid shell finite element and the consolidation models.

  9. A realistic closed-form radiobiological model of clinical tumor-control data incorporating intertumor heterogeneity

    International Nuclear Information System (INIS)

    Roberts, Stephen A.; Hendry, Jolyon H.

    1998-01-01

    Purpose: To investigate the role of intertumor heterogeneity in clinical tumor control datasets and the relationship to in vitro measurements of tumor biopsy samples. Specifically, to develop a modified linear-quadratic (LQ) model incorporating such heterogeneity that it is practical to fit to clinical tumor-control datasets. Methods and Materials: We developed a modified version of the linear-quadratic (LQ) model for tumor control, incorporating a (lagged) time factor to allow for tumor cell repopulation. We explicitly took into account the interpatient heterogeneity in clonogen number, radiosensitivity, and repopulation rate. Using this model, we could generate realistic TCP curves using parameter estimates consistent with those reported from in vitro studies, subject to the inclusion of a radiosensitivity (or dose)-modifying factor. We then demonstrated that the model was dominated by the heterogeneity in α (tumor radiosensitivity) and derived an approximate simplified model incorporating this heterogeneity. This simplified model is expressible in a compact closed form, which it is practical to fit to clinical datasets. Using two previously analysed datasets, we fit the model using direct maximum-likelihood techniques and obtained parameter estimates that were, again, consistent with the experimental data on the radiosensitivity of primary human tumor cells. This heterogeneity model includes the same number of adjustable parameters as the standard LQ model. Results: The modified model provides parameter estimates that can easily be reconciled with the in vitro measurements. The simplified (approximate) form of the heterogeneity model is a compact, closed-form probit function that can readily be fitted to clinical series by conventional maximum-likelihood methodology. This heterogeneity model provides a slightly better fit to the datasets than the conventional LQ model, with the same numbers of fitted parameters. The parameter estimates of the clinically

  10. A porous flow model for the geometrical form of volcanoes - Critical comments

    Science.gov (United States)

    Wadge, G.; Francis, P.

    1982-01-01

    A critical evaluation is presented of the assumptions on which the mathematical model for the geometrical form of a volcano arising from the flow of magma in a porous medium of Lacey et al. (1981) is based. The lack of evidence for an equipotential surface or its equivalent in volcanoes prior to eruption is pointed out, and the preference of volcanic eruptions for low ground is attributed to the local stress field produced by topographic loading rather than a rising magma table. Other difficulties with the model involve the neglect of the surface flow of lava under gravity away from the vent, and the use of the Dupuit approximation for unconfined flow and the assumption of essentially horizontal magma flow. Comparisons of model predictions with the shapes of actual volcanoes reveal the model not to fit lava shield volcanoes, for which the cone represents the solidification of small lava flows, and to provide a poor fit to composite central volcanoes.

  11. Quantitative model of super-Arrhenian behavior in glass forming materials

    Science.gov (United States)

    Caruthers, J. M.; Medvedev, G. A.

    2018-05-01

    The key feature of glass forming liquids is the super-Arrhenian temperature dependence of the mobility, where the mobility can increase by ten orders of magnitude or more as the temperature is decreased if crystallization does not intervene. A fundamental description of the super-Arrhenian behavior has been developed; specifically, the logarithm of the relaxation time is a linear function of 1 /U¯x , where U¯x is the independently determined excess molar internal energy and B is a material constant. This one-parameter mobility model quantitatively describes data for 21 glass forming materials, which are all the materials where there are sufficient experimental data for analysis. The effect of pressure on the loga mobility is also described using the same U¯x(T ,p ) function determined from the difference between the liquid and crystalline internal energies. It is also shown that B is well correlated with the heat of fusion. The prediction of the B /U¯x model is compared to the Adam and Gibbs 1 /T S¯x model, where the B /U¯x model is significantly better in unifying the full complement of mobility data. The implications of the B /U¯x model for the development of a fundamental description of glass are discussed.

  12. An investigation of the sensitivity of a land surface model to climate change using a reduced form model

    Energy Technology Data Exchange (ETDEWEB)

    Lynch, A.H.; McIlwaine, S. [PAOS/CIRES, Univ. of Colorado, Boulder, CO (United States); Beringer, J. [Inst. of Arctic Biology, Univ. of Alaska, Fairbanks (United States); Bonan, G.B. [National Center for Atmospheric Research, Boulder, CO (United States)

    2001-05-01

    In an illustration of a model evaluation methodology, a multivariate reduced form model is developed to evaluate the sensitivity of a land surface model to changes in atmospheric forcing. The reduced form model is constructed in terms of a set of ten integrative response metrics, including the timing of spring snow melt, sensible and latent heat fluxes in summer, and soil temperature. The responses are evaluated as a function of a selected set of six atmospheric forcing perturbations which are varied simultaneously, and hence each may be thought of as a six-dimensional response surface. The sensitivities of the land surface model are interdependent and in some cases illustrate a physically plausible feedback process. The important predictors of land surface response in a changing climate are the atmospheric temperature and downwelling longwave radiation. Scenarios characterized by warming and drying produce a large relative response compared to warm, moist scenarios. The insensitivity of the model to increases in precipitation and atmospheric humidity is expected to change in applications to coupled models, since these parameters are also strongly implicated, through the representation of clouds, in the simulation of both longwave and shortwave radiation. (orig.)

  13. Tales from the dark side: Privacy dark strategies and privacy dark patterns

    DEFF Research Database (Denmark)

    Bösch, Christoph; Erb, Benjamin; Kargl, Frank

    2016-01-01

    Privacy strategies and privacy patterns are fundamental concepts of the privacy-by-design engineering approach. While they support a privacy-aware development process for IT systems, the concepts used by malicious, privacy-threatening parties are generally less understood and known. We argue...... that understanding the “dark side”, namely how personal data is abused, is of equal importance. In this paper, we introduce the concept of privacy dark strategies and privacy dark patterns and present a framework that collects, documents, and analyzes such malicious concepts. In addition, we investigate from...... a psychological perspective why privacy dark strategies are effective. The resulting framework allows for a better understanding of these dark concepts, fosters awareness, and supports the development of countermeasures. We aim to contribute to an easier detection and successive removal of such approaches from...

  14. Privacy Protection: Mandating New Arrangements to Implement and Assess Federal Privacy Policy and Practice

    National Research Council Canada - National Science Library

    Relyea, Harold C

    2004-01-01

    When Congress enacted the Privacy Act of 1974, it established a temporary national study commission to conduct a comprehensive assessment of privacy policy and practice in both the public and private...

  15. Morphodynamic Modeling of the Lower Yellow River, China: Flux (Equilibrium) Form or Entrainment (Nonequilibrium) Form of Sediment Mass Conservation?

    Science.gov (United States)

    An, C.; Parker, G.; Ma, H.; Naito, K.; Moodie, A. J.; Fu, X.

    2017-12-01

    Models of river morphodynamics consist of three elements: (1) a treatment of flow hydraulics, (2) a formulation relating some aspect of sediment transport to flow hydraulics, and (3) a description of sediment conservation. In the case of unidirectional river flow, the Exner equation of sediment conservation is commonly described in terms of a flux-based formulation, in which bed elevation variation is related to the streamwise gradient of sediment transport rate. An alternate formulation of the Exner equation, however, is the entrainment-based formulation in which bed elevation variation is related to the difference between the entrainment rate of bed sediment into suspension and the deposition rate of suspended sediment onto the bed. In the flux-based formulation, sediment transport is regarded to be in a local equilibrium state (i.e., sediment transport rate locally equals sediment transport capacity). However, the entrainment-based formulation does not require this constraint; the sediment transport rate may lag in space and time behind the changing flow conditions. In modeling the fine-grained Lower Yellow River, it is usual to treat sediment conservation in terms of an entrainment-based (nonequilibrium) rather than a flux-based (equilibrium) formulation with the consideration that fine-grained sediment may be entrained at one place but deposited only at some distant location downstream. However, the differences in prediction between the two formulations are still not well known, and the entrainment formulation may not always be necessary for the Lower Yellow River. Here we study this problem by comparing the results of flux-based and entrainment-based morphodynamics under conditions typical of the Yellow River, using sediment transport equations specifically designed for the Lower Yellow River. We find, somewhat unexpectedly, that in a treatment of a 200-km reach using uniform sediment, there is little difference between the two formulations unless the

  16. Privacy Protection on Multiple Sensitive Attributes

    Science.gov (United States)

    Li, Zhen; Ye, Xiaojun

    In recent years, a privacy model called k-anonymity has gained popularity in the microdata releasing. As the microdata may contain multiple sensitive attributes about an individual, the protection of multiple sensitive attributes has become an important problem. Different from the existing models of single sensitive attribute, extra associations among multiple sensitive attributes should be invested. Two kinds of disclosure scenarios may happen because of logical associations. The Q&S Diversity is checked to prevent the foregoing disclosure risks, with an α Requirement definition used to ensure the diversity requirement. At last, a two-step greedy generalization algorithm is used to carry out the multiple sensitive attributes processing which deal with quasi-identifiers and sensitive attributes respectively. We reduce the overall distortion by the measure of Masking SA.

  17. Fictional privacy among Facebook users.

    Science.gov (United States)

    Lemieux, Robert

    2012-08-01

    The current study involved the creation of a fictional Facebook account with limited information and was designed to assess whether participants would accept the friendship of an ambiguous, unknown person. Results indicated that 325 Facebook members (72% of the sample) willingly accepted the friendship of the unknown individual. Results are discussed in relation to privacy concerns, norms of reciprocity, and allowing access to potentially embarrassing information and/or pictures.

  18. A framework for privacy and security analysis of probe-based traffic information systems

    KAUST Repository

    Canepa, Edward S.; Claudel, Christian G.

    2013-01-01

    Most large scale traffic information systems rely on fixed sensors (e.g. loop detectors, cameras) and user generated data, this latter in the form of GPS traces sent by smartphones or GPS devices onboard vehicles. While this type of data is relatively inexpensive to gather, it can pose multiple security and privacy risks, even if the location tracks are anonymous. In particular, creating bogus location tracks and sending them to the system is relatively easy. This bogus data could perturb traffic flow estimates, and disrupt the transportation system whenever these estimates are used for actuation. In this article, we propose a new framework for solving a variety of privacy and cybersecurity problems arising in transportation systems. The state of traffic is modeled by the Lighthill-Whitham-Richards traffic flow model, which is a first order scalar conservation law with concave flux function. Given a set of traffic flow data, we show that the constraints resulting from this partial differential equation are mixed integer linear inequalities for some decision variable. The resulting framework is very flexible, and can in particular be used to detect spoofing attacks in real time, or carry out attacks on location tracks. Numerical implementations are performed on experimental data from the Mobile Century experiment to validate this framework. © 2013 ACM.

  19. Online Tracking Technologies and Web Privacy:Technologieën voor Online volgen en Web Privacy

    OpenAIRE

    Acar, Mustafa Gunes Can

    2017-01-01

    In my PhD thesis, I would like to study the problem of online privacy with a focus on Web and mobile applications. Key research questions to be addressed by my study are the following: How can we formalize and quantify web tracking? What are the threats presented against privacy by different tracking techniques such as browser fingerprinting and cookie based tracking? What kind of privacy enhancing technologies (PET) can be used to ensure privacy without degrading service quality? The stud...

  20. Gender and online privacy among teens: risk perception, privacy concerns, and protection behaviors.

    Science.gov (United States)

    Youn, Seounmi; Hall, Kimberly

    2008-12-01

    Survey data from 395 high school students revealed that girls perceive more privacy risks and have a higher level of privacy concerns than boys. Regarding privacy protection behaviors, boys tended to read unsolicited e-mail and register for Web sites while directly sending complaints in response to unsolicited e-mail. This study found girls to provide inaccurate information as their privacy concerns increased. Boys, however, refrained from registering to Web sites as their concerns increased.