WorldWideScience

Sample records for muc1-associated proliferation signature

  1. Current and potential technologies for the detection of radionuclide signatures of proliferation (R and D efforts)

    International Nuclear Information System (INIS)

    Perkins, R.W.; Wogman, N.A.

    1993-03-01

    A country with the goal of developing nuclear weapons could pursue their ambition in several ways. These could range from the purchase or theft of a weapon or of the principal weapons components to a basic development program which may independently produce all the materials and components which are necessary. If the latter approach were pursued, there would be many signatures of such an effort and the more definitive of these include the actual materials which would be produced in each phase of the fuel cycle/weapons production process. By identifying the more definitive signatures and employing appropriate environmental sampling and analysis techniques for their observation, including imaging procedures, it should be possible to detect nuclear proliferation processes. Possible proliferation processes include: uranium acquisition through fuel fabrication; uranium enrichment for weapons production; reactor operation for plutonium production; fuel reprocessing for plutonium extraction; weapons fabrication; and uranium 233 production. Each of these are briefly discussed. The technologies for the detection of proliferation signatures which are in concept or research and development phase are: whole air beta counter; radiokrypton/xenon separator/analyzer; I-129 detector; isotope analyzer; deuterium/tritium analysis by IR/Raman spectroscopy and scintillation counting; noble gas daughter analysis; and airborne radionuclide collector/analyzer

  2. Robust prognostic value of a knowledge-based proliferation signature across large patient microarray studies spanning different cancer types

    NARCIS (Netherlands)

    Starmans, M. H. W.; Krishnapuram, B.; Steck, H.; Horlings, H.; Nuyten, D. S. A.; van de Vijver, M. J.; Seigneuric, R.; Buffa, F. M.; Harris, A. L.; Wouters, B. G.; Lambin, P.

    2008-01-01

    Tumour proliferation is one of the main biological phenotypes limiting cure in oncology. Extensive research is being performed to unravel the key players in this process. To exploit the potential of published gene expression data, creation of a signature for proliferation can provide valuable

  3. Dissecting the T Cell Response: Proliferation Assays vs. Cytokine Signatures by ELISPOT

    Directory of Open Access Journals (Sweden)

    Magdalena Tary-Lehmann

    2012-05-01

    Full Text Available Chronic allograft rejection is in part mediated by host T cells that recognize allogeneic antigens on transplanted tissue. One factor that determines the outcome of a T cell response is clonal size, while another is the effector quality. Studies of alloimmune predictors of transplant graft survival have most commonly focused on only one measure of the alloimmune response. Because differing qualities and frequencies of the allospecific T cell response may provide distinctly different information we analyzed the relationship between frequency of soluble antigen and allo-antigen specific memory IFN-g secreting CD4 and CD8 T cells, their ability to secrete IL-2, and their proliferative capacity, while accounting for cognate and bystander proliferation. The results show proliferative responses primarily reflect on IL-2 production by antigen-specific T cells, and that proliferating cells in such assays entail a considerable fraction of bystander cells. On the other hand, proliferation (and IL-2 production did not reflect on the frequency of IFN-γ producing memory cells, a finding particularly accentuated in the CD8 T cell compartment. These data provide rationale for considering both frequency and effector function of pre-transplant T cell reactivity when analyzing immune predictors of graft rejection.

  4. Dissecting the T Cell Response: Proliferation Assays vs. Cytokine Signatures by ELISPOT

    Science.gov (United States)

    Anthony, Donald D.; Milkovich, Kimberly A.; Zhang, Wenji; Rodriguez, Benigno; Yonkers, Nicole L.; Tary-Lehmann, Magdalena; Lehmann, Paul V.

    2012-01-01

    Chronic allograft rejection is in part mediated by host T cells that recognize allogeneic antigens on transplanted tissue. One factor that determines the outcome of a T cell response is clonal size, while another is the effector quality. Studies of alloimmune predictors of transplant graft survival have most commonly focused on only one measure of the alloimmune response. Because differing qualities and frequencies of the allospecific T cell response may provide distinctly different information we analyzed the relationship between frequency of soluble antigen and allo-antigen specific memory IFN-γ secreting CD4 and CD8 T cells, their ability to secrete IL-2, and their proliferative capacity, while accounting for cognate and bystander proliferation. The results show proliferative responses primarily reflect on IL-2 production by antigen-specific T cells, and that proliferating cells in such assays entail a considerable fraction of bystander cells. On the other hand, proliferation (and IL-2 production) did not reflect on the frequency of IFN-γ producing memory cells, a finding particularly accentuated in the CD8 T cell compartment. These data provide rationale for considering both frequency and effector function of pre-transplant T cell reactivity when analyzing immune predictors of graft rejection. PMID:24710419

  5. Searching for a multifractal signature of the lake algal proliferation, a multifractal correlation

    Science.gov (United States)

    Mezemate, Yacine; Tchiguirinskaia, Ioulia; Bonhomme, Celine; Schertzer, Daniel; Lemaire, Bruno Jacques; Vinçon leite, Brigitte; Lovejoy, Shaun

    2013-04-01

    Green algae proliferations affect water bodies such as the Lake Bourget (France). They are an environmental issue as well as a mater of public health. In the framework of the PROLIPHYC project a system based on temperature and chlorophyll measurements coupled to a lake model was implemented to predict sudden algal blooms. This classical approach relies on the analysis of large scale trends of the measured fields and does not take into account small scale fluctuations. A more innovative approach has been developed by the R2DS PLUMMME project to investigate the correlation between environmental fields across the full range of space-time scales, down to the smallest scale of observations. The first results of the project demonstrate that multi-scaling behaviour of environmental fields, such as temperature and chlorophyll, becomes evident only after the removal of the large-scale data trends that otherwise induce biases to the multifractal parameter estimates. First, a spectral analysis of temperature and chlorophyll data is performed on sub-samples of the time series to investigate the scaling behaviour. The multifractal analysis (Trace Moment, Double Trace Moment) directly applied on each sub-sample shows unsatisfying results on some sub-samples, in particular on those having a strong gradient compared with the amplitude of the fluctuations. Hence, non-stationary and seasonal effects should be first removed from the time series. To put on evidence a good scaling of the analysed data, we choose the Hilbert-Huang transform to de-trend the data. This method has been widely used for different fields (see F.G.Schmitt et al, 2009 for review). After having applied this method, the K(q) function shows that the investigated fields are indeed multifractal and the determination of their multifractal parameters becomes robust. Then, we proceed to a multifractal correlation analysis between the fields. In conclusion, we discuss the prediction of algal blooms based on multifractal

  6. Identification of cell proliferation, immune response and cell migration as critical pathways in a prognostic signature for HER2+:ERα- breast cancer.

    Directory of Open Access Journals (Sweden)

    Jeffrey C Liu

    Full Text Available Multi-gene prognostic signatures derived from primary tumor biopsies can guide clinicians in designing an appropriate course of treatment. Identifying genes and pathways most essential to a signature performance may facilitate clinical application, provide insights into cancer progression, and uncover potentially new therapeutic targets. We previously developed a 17-gene prognostic signature (HTICS for HER2+:ERα- breast cancer patients, using genes that are differentially expressed in tumor initiating cells (TICs versus non-TICs from MMTV-Her2/neu mammary tumors. Here we probed the pathways and genes that underlie the prognostic power of HTICS.We used Leave-One Out, Data Combination Test, Gene Set Enrichment Analysis (GSEA, Correlation and Substitution analyses together with Receiver Operating Characteristic (ROC and Kaplan-Meier survival analysis to identify critical biological pathways within HTICS. Publically available cohorts with gene expression and clinical outcome were used to assess prognosis. NanoString technology was used to detect gene expression in formalin-fixed paraffin embedded (FFPE tissues.We show that three major biological pathways: cell proliferation, immune response, and cell migration, drive the prognostic power of HTICS, which is further tuned by Homeostatic and Glycan metabolic signalling. A 6-gene minimal Core that retained a significant prognostic power, albeit less than HTICS, also comprised the proliferation/immune/migration pathways. Finally, we developed NanoString probes that could detect expression of HTICS genes and their substitutions in FFPE samples.Our results demonstrate that the prognostic power of a signature is driven by the biological processes it monitors, identify cell proliferation, immune response and cell migration as critical pathways for HER2+:ERα- cancer progression, and defines substitutes and Core genes that should facilitate clinical application of HTICS.

  7. Signature Balancing

    NARCIS (Netherlands)

    Noordkamp, H.W.; Brink, M. van den

    2006-01-01

    Signatures are an important part of the design of a ship. In an ideal situation, signatures must be as low as possible. However, due to budget constraints it is most unlikely to reach this ideal situation. The arising question is which levels of signatures are optimal given the different scenarios

  8. Radiation signatures

    International Nuclear Information System (INIS)

    McGlynn, S.P.; Varma, M.N.

    1992-01-01

    A new concept for modelling radiation risk is proposed. This concept is based on the proposal that the spectrum of molecular lesions, which we dub ''the radiation signature'', can be used to identify the quality of the causal radiation. If the proposal concerning radiation signatures can be established then, in principle, both prospective and retrospective risk determination can be assessed on an individual basis. A major goal of biophysical modelling is to relate physical events such as ionization, excitation, etc. to the production of radiation carcinogenesis. A description of the physical events is provided by track structure. The track structure is determined by radiation quality, and it can be considered to be the ''physical signature'' of the radiation. Unfortunately, the uniqueness characteristics of this signature are dissipated in biological systems in ∼10 -9 s. Nonetheless, it is our contention that this physical disturbance of the biological system eventuates later, at ∼10 0 s, in molecular lesion spectra which also characterize the causal radiation. (author)

  9. Proliferation risks

    International Nuclear Information System (INIS)

    Carchon, R.

    1998-09-01

    The report gives an overview of different aspects related to safeguards of fissile materials. Existing treaties including the Non-Proliferation Treaty, and the Tlatelolco and the Rarotonga Treaties are discussed. An overview of safeguards systems for the control of fissile materials as well as the role of various authorities is given. An overall overview of proliferation risks, the physical protection of fissile materials and the trade in fissile materials is given. Finally, the status in problem countries and de facto nuclear weapon states is discussed

  10. Nuclear proliferation

    International Nuclear Information System (INIS)

    Stencel, S.

    1978-01-01

    The terms and reactions to President Carter's nuclear policy, culminating in the 1978 Nuclear Non-Proliferation Act, are reviewed and analyzed. The new law increases restrictions on nuclear exports, encourages continued use of light water reactors in preference to plutonium-fueled reactors, and emphasizes technical solutions to proliferation problems. Critics of the law point out that it will hurt U.S. trade unfairly, that other countries do not have as many fuel options as the U.S. has, and that nuclear sales have as many political and economic as technical solutions. Compromise areas include new international safety guidelines, the possibility of an international nuclear fuel bank, and a willingness to consider each case on its merits. 21 references

  11. Signature-based User Authentication

    OpenAIRE

    Hámorník, Juraj

    2015-01-01

    This work aims on missing handwritten signature authentication in Windows. Result of this work is standalone software that allow users to log into Windows by writing signature. We focus on security of signature authentification and best overall user experience. We implemented signature authentification service that accept signature and return user access token if signature is genuine. Signature authentification is done by comparing given signature to signature patterns by their similarity. Si...

  12. Electronic Signature Policy

    Science.gov (United States)

    Establishes the United States Environmental Protection Agency's approach to adopting electronic signature technology and best practices to ensure electronic signatures applied to official Agency documents are legally valid and enforceable

  13. Lesson 6: Signature Validation

    Science.gov (United States)

    Checklist items 13 through 17 are grouped under the Signature Validation Process, and represent CROMERR requirements that the system must satisfy as part of ensuring that electronic signatures it receives are valid.

  14. Exotic signatures from supersymmetry

    International Nuclear Information System (INIS)

    Hall, L.J.

    1989-08-01

    Minor changes to the standard supersymmetric model, such as soft flavor violation and R parity violation, cause large changes in the signatures. The origin of these changes and the resulting signatures are discussed. 15 refs., 7 figs., 2 tabs

  15. Blinding for unanticipated signatures

    NARCIS (Netherlands)

    D. Chaum (David)

    1987-01-01

    textabstractPreviously known blind signature systems require an amount of computation at least proportional to the number of signature types, and also that the number of such types be fixed in advance. These requirements are not practical in some applications. Here, a new blind signature technique

  16. Fair quantum blind signatures

    International Nuclear Information System (INIS)

    Tian-Yin, Wang; Qiao-Yan, Wen

    2010-01-01

    We present a new fair blind signature scheme based on the fundamental properties of quantum mechanics. In addition, we analyse the security of this scheme, and show that it is not possible to forge valid blind signatures. Moreover, comparisons between this scheme and public key blind signature schemes are also discussed. (general)

  17. Real Traceable Signatures

    Science.gov (United States)

    Chow, Sherman S. M.

    Traceable signature scheme extends a group signature scheme with an enhanced anonymity management mechanism. The group manager can compute a tracing trapdoor which enables anyone to test if a signature is signed by a given misbehaving user, while the only way to do so for group signatures requires revealing the signer of all signatures. Nevertheless, it is not tracing in a strict sense. For all existing schemes, T tracing agents need to recollect all N' signatures ever produced and perform RN' “checks” for R revoked users. This involves a high volume of transfer and computations. Increasing T increases the degree of parallelism for tracing but also the probability of “missing” some signatures in case some of the agents are dishonest.

  18. Preventing proliferation

    International Nuclear Information System (INIS)

    Rathjens, G.

    1983-01-01

    Challenging the argument that nuclear proliferation may be stabilizing, the author cites the Israeli attack on Iraq as evidence that emergent nuclear states may be moved to attack their adversaries.The larger the number of decision makers who can unleash nuclear weapons, the greater the liklihood of their use. Several reasons are cited for nations to seek nuclear capability: the accelerated spread of technology, the deterioration in US-Soviet relations and strength relative to their nations, the high cost of conventional weapons, and a loss of confidence in the international safeguards system. The imposition of constraints, such as a Comprehensive Test Ban Treaty, on nuclear trade and technology transfer are likely to have a high cost. The US position on this issue is likely to be determined by the balance of power with the Soviet Union. 5 references

  19. Unconditionally Secure Quantum Signatures

    Directory of Open Access Journals (Sweden)

    Ryan Amiri

    2015-08-01

    Full Text Available Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols—signatures based on the Rivest–Adleman–Shamir (RSA algorithm, the digital signature algorithm (DSA, and the elliptic curve digital signature algorithm (ECDSA—are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally securesecure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  20. Radar Signature Calculation Facility

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: The calculation, analysis, and visualization of the spatially extended radar signatures of complex objects such as ships in a sea multipath environment and...

  1. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  2. Advanced Missile Signature Center

    Data.gov (United States)

    Federal Laboratory Consortium — The Advanced Missile Signature Center (AMSC) is a national facility supporting the Missile Defense Agency (MDA) and other DoD programs and customers with analysis,...

  3. THE ELECTRONIC SIGNATURE

    Directory of Open Access Journals (Sweden)

    Voiculescu Madalina Irena

    2009-05-01

    Full Text Available Article refers to significance and the digital signature in electronic commerce. Internet and electronic commerce open up many new opportunities for the consumer, yet, the security (or perceived lack of security of exchanging personal and financial data

  4. Digital signature feasibility study

    Science.gov (United States)

    2008-06-01

    The purpose of this study was to assess the advantages and disadvantages of using digital signatures to assist the Arizona Department of Transportation in conducting business. The Department is evaluating the potential of performing more electronic t...

  5. Physics Signatures at CLIC

    CERN Document Server

    Battaglia, Marco

    2001-01-01

    A set of signatures for physics processes of potential interests for the CLIC programme at = 1 - 5 TeV are discussed. These signatures, that may correspond to the manifestation of different scenarios of new physics as well as to Standard Model precision tests, are proposed as benchmarks for the optimisation of the CLIC accelerator parameters and for a first definition of the required detector response.

  6. Uncertainty in hydrological signatures

    Science.gov (United States)

    McMillan, Hilary; Westerberg, Ida

    2015-04-01

    Information that summarises the hydrological behaviour or flow regime of a catchment is essential for comparing responses of different catchments to understand catchment organisation and similarity, and for many other modelling and water-management applications. Such information types derived as an index value from observed data are known as hydrological signatures, and can include descriptors of high flows (e.g. mean annual flood), low flows (e.g. mean annual low flow, recession shape), the flow variability, flow duration curve, and runoff ratio. Because the hydrological signatures are calculated from observed data such as rainfall and flow records, they are affected by uncertainty in those data. Subjective choices in the method used to calculate the signatures create a further source of uncertainty. Uncertainties in the signatures may affect our ability to compare different locations, to detect changes, or to compare future water resource management scenarios. The aim of this study was to contribute to the hydrological community's awareness and knowledge of data uncertainty in hydrological signatures, including typical sources, magnitude and methods for its assessment. We proposed a generally applicable method to calculate these uncertainties based on Monte Carlo sampling and demonstrated it for a variety of commonly used signatures. The study was made for two data rich catchments, the 50 km2 Mahurangi catchment in New Zealand and the 135 km2 Brue catchment in the UK. For rainfall data the uncertainty sources included point measurement uncertainty, the number of gauges used in calculation of the catchment spatial average, and uncertainties relating to lack of quality control. For flow data the uncertainty sources included uncertainties in stage/discharge measurement and in the approximation of the true stage-discharge relation by a rating curve. The resulting uncertainties were compared across the different signatures and catchments, to quantify uncertainty

  7. Practical quantum digital signature

    Science.gov (United States)

    Yin, Hua-Lei; Fu, Yao; Chen, Zeng-Bing

    2016-03-01

    Guaranteeing nonrepudiation, unforgeability as well as transferability of a signature is one of the most vital safeguards in today's e-commerce era. Based on fundamental laws of quantum physics, quantum digital signature (QDS) aims to provide information-theoretic security for this cryptographic task. However, up to date, the previously proposed QDS protocols are impractical due to various challenging problems and most importantly, the requirement of authenticated (secure) quantum channels between participants. Here, we present the first quantum digital signature protocol that removes the assumption of authenticated quantum channels while remaining secure against the collective attacks. Besides, our QDS protocol can be practically implemented over more than 100 km under current mature technology as used in quantum key distribution.

  8. The threat of proliferation

    International Nuclear Information System (INIS)

    Palme, Olof.

    1986-01-01

    The paper on the threat of proliferation, is a keynote speech delivered to the Colloquium on Nuclear War, Nuclear Proliferation and their Consequences, Geneva, 1985. Topics discussed in the address include: nuclear weapons, nuclear war, terrorists, Non-Proliferation Treaty, nuclear disarmament, and leadership in world affairs. (UK)

  9. Signatures of the Invisible

    CERN Multimedia

    Strom, D

    2003-01-01

    On the Net it is possible to take a look at art from afar via Virtual Museums. One such exhibition was recently in the New York Museum of Modern Art's branch, PS1. Entitled 'Signatures of the Invisible' it was a collaborative effort between artists and physicists (1/2 page).

  10. Fissile material proliferation risk

    International Nuclear Information System (INIS)

    Dreicer, J.S.; Rutherford, D.A.

    1996-01-01

    The proliferation risk of a facility depends on the material attractiveness, level of safeguards, and physical protection applied to the material in conjunction with an assessment of the impact of the socioeconomic circumstances and threat environment. Proliferation risk is a complementary extension of proliferation resistance. The authors believe a better determination of nuclear proliferation can be achieved by establishing the proliferation risk for facilities that contain nuclear material. Developing a method that incorporates the socioeconomic circumstances and threat environment inherent to each country enables a global proliferation assessment. To effectively reduce the nuclear danger, a broadly based set of criteria is needed that provides the capability to relatively assess a wide range of nuclear related sites and facilities in different countries and still ensure a global decrease in proliferation risk for fissile material (plutonium and highly enriched uranium)

  11. A Directed Signature Scheme and its Applications

    OpenAIRE

    Lal, Sunder; Kumar, Manoj

    2004-01-01

    This paper presents a directed signature scheme with the property that the signature can be verified only with the help of signer or signature receiver. We also propose its applications to share verification of signatures and to threshold cryptosystems.

  12. Predicting cellular growth from gene expression signatures.

    Directory of Open Access Journals (Sweden)

    Edoardo M Airoldi

    2009-01-01

    Full Text Available Maintaining balanced growth in a changing environment is a fundamental systems-level challenge for cellular physiology, particularly in microorganisms. While the complete set of regulatory and functional pathways supporting growth and cellular proliferation are not yet known, portions of them are well understood. In particular, cellular proliferation is governed by mechanisms that are highly conserved from unicellular to multicellular organisms, and the disruption of these processes in metazoans is a major factor in the development of cancer. In this paper, we develop statistical methodology to identify quantitative aspects of the regulatory mechanisms underlying cellular proliferation in Saccharomyces cerevisiae. We find that the expression levels of a small set of genes can be exploited to predict the instantaneous growth rate of any cellular culture with high accuracy. The predictions obtained in this fashion are robust to changing biological conditions, experimental methods, and technological platforms. The proposed model is also effective in predicting growth rates for the related yeast Saccharomyces bayanus and the highly diverged yeast Schizosaccharomyces pombe, suggesting that the underlying regulatory signature is conserved across a wide range of unicellular evolution. We investigate the biological significance of the gene expression signature that the predictions are based upon from multiple perspectives: by perturbing the regulatory network through the Ras/PKA pathway, observing strong upregulation of growth rate even in the absence of appropriate nutrients, and discovering putative transcription factor binding sites, observing enrichment in growth-correlated genes. More broadly, the proposed methodology enables biological insights about growth at an instantaneous time scale, inaccessible by direct experimental methods. Data and tools enabling others to apply our methods are available at http://function.princeton.edu/growthrate.

  13. Proliferation: myth or reality?

    International Nuclear Information System (INIS)

    2005-01-01

    This article analyzes the proliferation approach, its technical condition and political motivation, and the share between the myth (political deception, assumptions and extrapolations) and the reality of proliferation. Its appreciation is complicated by the irrational behaviour of some political actors and by the significant loss of the non-use taboo. The control of technologies is an important element for proliferation slowing down but an efficient and autonomous intelligence system remains indispensable. (J.S.)

  14. Director's series on proliferation

    International Nuclear Information System (INIS)

    Bailey, K.C.; Price, M.E.

    1995-01-01

    This is an occasional publication of essays on the topics of nuclear, chemical, biological, and missile proliferation. The views represented are those of the author's. Essay topics include: Nuclear Proliferation: Myth and Reality; Problems of Enforcing Compliance with Arms Control Agreements; The Unreliability of the Russian Officer Corps: Reluctant Domestic Warriors; and Russia's Nuclear Legacy

  15. Proliferation Networks and Financing

    International Nuclear Information System (INIS)

    Gruselle, Bruno

    2007-01-01

    The objective of this study is to propose practical solutions aimed at completing and strengthening the existing arrangement for the control of nuclear proliferation through a control of financial as well as material or immaterial flows. In a first part, the author proposes a systemic analysis of networks of suppliers and demanders. He notably evokes the Khan's network and the Iraqi acquisition network during the 1993-2001 period. He also proposes a modelling of proliferation networks (supplier networks and acquisition networks) and of their interactions. In a second part, the author examines possible means and policies aimed at neutralising proliferation networks: organisation, adaptation and improvement of intelligence tools in front of proliferation networks, and means, limitations and perspectives of network neutralisation. He also briefly addresses the possibility of military action to contain proliferation flows

  16. Signatures of topological superconductivity

    Energy Technology Data Exchange (ETDEWEB)

    Peng, Yang

    2017-07-19

    The prediction and experimental discovery of topological insulators brought the importance of topology in condensed matter physics into the limelight. Topology hence acts as a new dimension along which more and more new states of matter start to emerge. One of these topological states of matter, namely topological superconductors, comes into the focus because of their gapless excitations. These gapless excitations, especially in one dimensional topological superconductors, are Majorana zero modes localized at the ends of the superconductor and exhibit exotic nonabelian statistics, which can be potentially applied to fault-tolerant quantum computation. Given their highly interesting physical properties and potential applications to quantum computation, both theorists and experimentalists spend great efforts to realize topological supercondoctors and to detect Majoranas. In two projects within this thesis, we investigate the properties of Majorana zero modes in realistic materials which are absent in simple theoretical models. We find that the superconducting proximity effect, an essential ingredient in all existing platforms for topological superconductors, plays a significant role in determining the localization property of the Majoranas. Strong proximity coupling between the normal system and the superconducting substrate can lead to strongly localized Majoranas, which can explain the observation in a recent experiment. Motivated by experiments in Molenkamp's group, we also look at realistic quantum spin Hall Josephson junctions, in which charge puddles acting as magnetic impurities are coupled to the helical edge states. We find that with this setup, the junction generically realizes an exotic 8π periodic Josephson effect, which is absent in a pristine Josephson junction. In another two projects, we propose more pronounced signatures of Majoranas that are accessible with current experimental techniques. The first one is a transport measurement, which uses

  17. Modem Signature Analysis.

    Science.gov (United States)

    1982-10-01

    AD-A127 993 MODEM SIGNATURE ANALISIS (U) PAR TECHNOLOGY CORP NEW / HARTFORD NY V EDWARDS ET AL. OCT 82 RADC-TR-82-269 F30602-80-C-0264 NCLASSIFIED F/G...as an indication of the class clustering and separation between different classes in the modem data base. It is apparent from the projection that the...that as the clusters disperse, the likelihood of a sample crossing the boundary into an adjacent region and causing a symbol decision error increases. As

  18. Electronic Signature (eSig)

    Data.gov (United States)

    Department of Veterans Affairs — Beginning with the Government Paperwork Elimination Act of 1998 (GPEA), the Federal government has encouraged the use of electronic / digital signatures to enable...

  19. Expressiveness considerations of XML signatures

    DEFF Research Database (Denmark)

    Jensen, Meiko; Meyer, Christopher

    2011-01-01

    XML Signatures are used to protect XML-based Web Service communication against a broad range of attacks related to man-in-the-middle scenarios. However, due to the complexity of the Web Services specification landscape, the task of applying XML Signatures in a robust and reliable manner becomes...... more and more challenging. In this paper, we investigate this issue, describing how an attacker can still interfere with Web Services communication even in the presence of XML Signatures. Additionally, we discuss the interrelation of XML Signatures and XML Encryption, focussing on their security...

  20. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  1. Non-proliferation

    International Nuclear Information System (INIS)

    Manley, I.T.

    1981-01-01

    Proliferation is a problem that can only be solved when the political problems which lead countries to contemplate, the possession of nuclear weapons are solved; in the meantime it can only be managed. Non-proliferation policy has to deal both with the political and the technical aspects of proliferation. It must seek to buy time by addressing the reasons why nations feel the political need to construct nuclear weapons, as well as delaying the moment when such nations feel capable of doing so. The subject is examined and proposals made. (author)

  2. Getting serious about proliferation

    International Nuclear Information System (INIS)

    Leventhal, P.

    1984-01-01

    The US needs to give a higher priority to nuclear non-proliferation, but Reagan's policies assume that proliferation is inevitable and that it is more important to be a reliable supplier than to cause trade frictions by trading only with those nations which sign the non-proliferation treaty (NPT). This undercuts US leadership and the intent of the agreement. Several bills now before Congress could help to restore US leadership by tightening export restrictions and the use of plutonium from the US

  3. Signatures of Mechanosensitive Gating.

    Science.gov (United States)

    Morris, Richard G

    2017-01-10

    The question of how mechanically gated membrane channels open and close is notoriously difficult to address, especially if the protein structure is not available. This perspective highlights the relevance of micropipette-aspirated single-particle tracking-used to obtain a channel's diffusion coefficient, D, as a function of applied membrane tension, σ-as an indirect assay for determining functional behavior in mechanosensitive channels. While ensuring that the protein remains integral to the membrane, such methods can be used to identify not only the gating mechanism of a protein, but also associated physical moduli, such as torsional and dilational rigidity, which correspond to the protein's effective shape change. As an example, three distinct D-versus-σ "signatures" are calculated, corresponding to gating by dilation, gating by tilt, and gating by a combination of both dilation and tilt. Both advantages and disadvantages of the approach are discussed. Copyright © 2017 Biophysical Society. Published by Elsevier Inc. All rights reserved.

  4. Nuclear proliferation and terrorism

    International Nuclear Information System (INIS)

    Anon.

    1977-01-01

    This section of the book, Part III, has two chapters (9 and 10). Chapter 9, Nuclear Power and Proliferation of Nuclear Weapons, is disucssed under these subjects: nuclear nonproliferation: origins and status; requirements for nuclear weapons manufacture; current nuclear programs and proliferation capabilities; encouraging decisions to forego weapons; arms control; safeguards; attitudes and expectations. Chapter 10, Nuclear Terrorism, discusses these areas: theft of nuclear materials; attacks on nuclear reactors; responding to nuclear terrorism; security and civil liberties

  5. Signatures de l'invisible

    CERN Multimedia

    CERN Press Office. Geneva

    2000-01-01

    "Signatures of the Invisible" is an unique collaboration between contemporary artists and contemporary physicists which has the potential to help redefine the relationship between science and art. "Signatures of the Invisible" is jointly organised by the London Institute - the world's largest college of art and design and CERN*, the world's leading particle physics laboratory. 12 leading visual artists:

  6. An interpretation of signature inversion

    International Nuclear Information System (INIS)

    Onishi, Naoki; Tajima, Naoki

    1988-01-01

    An interpretation in terms of the cranking model is presented to explain why signature inversion occurs for positive γ of the axially asymmetric deformation parameter and emerges into specific orbitals. By introducing a continuous variable, the eigenvalue equation can be reduced to a one dimensional Schroedinger equation by means of which one can easily understand the cause of signature inversion. (author)

  7. Cell short circuit, preshort signature

    Science.gov (United States)

    Lurie, C.

    1980-01-01

    Short-circuit events observed in ground test simulations of DSCS-3 battery in-orbit operations are analyzed. Voltage signatures appearing in the data preceding the short-circuit event are evaluated. The ground test simulation is briefly described along with performance during reconditioning discharges. Results suggest that a characteristic signature develops prior to a shorting event.

  8. Ship Signature Management System : Functionality

    NARCIS (Netherlands)

    Arciszewski, H.F.R.; Lier, L. van; Meijer, Y.G.S.; Noordkamp, H.W.; Wassenaar, A.S.

    2010-01-01

    A signature of a platform is the manner in which the platform manifests itself to a certain type of sensor and how observable it is when such a sensor is used to detect the platform. Because many military platforms use sensors in different media, it is the total of its different signatures that

  9. Nuclear non-proliferation

    International Nuclear Information System (INIS)

    Anon.

    1984-01-01

    DOE's nuclear non-proliferation responsibilities are defined by the provisions of the Atomic Energy Act of 1954, as amended, and of the Nuclear Non-Proliferation Act of 1978 (NNPA). The Department's major responsibilities in this area are to: (1) provide technical assistance to the Department of State in negotiating agreements for civil cooperation in the peaceful uses of nuclear energy with other countries and international organizations; (2) join with other agencies to reach executive branch judgments with respect to the issuance of export licenses by the Nuclear Regulatory Commission; (3) be responsible for processing subsequent arrangements with other agencies as required by the Nuclear Non-Proliferation Act; (4) control the distribution of special nuclear materials, components, equipment, and nuclear technology exports; (5) participate in bilateral and multilateral cooperation with foreign governments and organizations to promote the peaceful uses of nuclear energy; and (6) act as a primary technical resource with respect to US participation in the International Atomic Energy Agency

  10. Dynamics of nuclear proliferation

    International Nuclear Information System (INIS)

    Meyer, S.M.

    1984-01-01

    This book looks beyond policy disputes to make a systematic examination of the assumptions and contending hypotheses that constitute contemporary thinking on nuclear proliferation. Rather than determine who is right or wrong, the intent is to develop a better picture by using the various schools of thought as analytic windows. A better understanding of how the process operates should offer better guidance for predicting future nuclear proliferation and, ultimately, for controlling it. Separate chapters deal with the contending views, the technological and motivational bases of nuclear proliferation, the presence of a technological imperative, testing the motivational hypothesis, the dynamics of the process, and forecasting. Four appendices present historical decisions, the technical model, cost-estimating procedures, and procedures for estimating nuclear propensities. 288 references, 17 figures, 26 tables

  11. Proliferation resistance modeling

    International Nuclear Information System (INIS)

    Bari, R.; Peterson, P.; Roglans, J.; Mladineo, S.; Nuclear Engineering Division; BNL; Univ. of California at Berkely; PNNL

    2004-01-01

    The National Nuclear Security Administration is developing methods for nonproliferation assessments. A working group on Nonproliferation Assessment Methodology (NPAM) assembled a toolbox of methods for various applications in the nonproliferation arena. One application of this methodology is to the evaluation of the proliferation resistance of Generation IV nuclear energy systems. This paper first summarizes the key results of the NPAM program and then provides results obtained thus far in the ongoing application, which is co-sponsored by the DOE Office of Nuclear Energy Science and Technology. In NPAM, a top-level measure of proliferation resistance for a fuel cycle system is developed from a hierarchy of metrics. The problem is decomposed into: metrics to be computed, barriers to proliferation, and a finite set of threats. The analyst models the process undertaken by the proliferant to overcome barriers to proliferation and evaluates the outcomes. In addition to proliferation resistance (PR) evaluation, the application also addresses physical protection (PP) evaluation against sabotage and theft. The Generation IV goal for future nuclear energy systems is to assure that they are very unattractive and the least desirable route for diversion or theft of weapons-usable materials, and provide increased physical protection against terrorism. An Expert Group, addressing this application, has identified six high-level measures for the PR goals (six measures have also been identified for the PP goals). Combined together, the complete set of measures provides information for program policy makers and system designers to compare specific system design features and integral system characteristics and to make choices among alternative options. The Group has developed a framework for a phased evaluation approach to analyzing PR and PP of system characteristics and to quantifying metrics and measures. This approach allows evaluations to become more detailed and representative

  12. Initial Semantics for Strengthened Signatures

    Directory of Open Access Journals (Sweden)

    André Hirschowitz

    2012-02-01

    Full Text Available We give a new general definition of arity, yielding the companion notions of signature and associated syntax. This setting is modular in the sense requested by Ghani and Uustalu: merging two extensions of syntax corresponds to building an amalgamated sum. These signatures are too general in the sense that we are not able to prove the existence of an associated syntax in this general context. So we have to select arities and signatures for which there exists the desired initial monad. For this, we follow a track opened by Matthes and Uustalu: we introduce a notion of strengthened arity and prove that the corresponding signatures have initial semantics (i.e. associated syntax. Our strengthened arities admit colimits, which allows the treatment of the λ-calculus with explicit substitution.

  13. Retail applications of signature verification

    Science.gov (United States)

    Zimmerman, Thomas G.; Russell, Gregory F.; Heilper, Andre; Smith, Barton A.; Hu, Jianying; Markman, Dmitry; Graham, Jon E.; Drews, Clemens

    2004-08-01

    The dramatic rise in identity theft, the ever pressing need to provide convenience in checkout services to attract and retain loyal customers, and the growing use of multi-function signature captures devices in the retail sector provides favorable conditions for the deployment of dynamic signature verification (DSV) in retail settings. We report on the development of a DSV system to meet the needs of the retail sector. We currently have a database of approximately 10,000 signatures collected from 600 subjects and forgers. Previous work at IBM on DSV has been merged and extended to achieve robust performance on pen position data available from commercial point of sale hardware, achieving equal error rates on skilled forgeries and authentic signatures of 1.5% to 4%.

  14. Magnetic Signature Analysis & Validation System

    National Research Council Canada - National Science Library

    Vliet, Scott

    2001-01-01

    The Magnetic Signature Analysis and Validation (MAGSAV) System is a mobile platform that is used to measure, record, and analyze the perturbations to the earth's ambient magnetic field caused by object such as armored vehicles...

  15. Cell Proliferation in Neuroblastoma

    Science.gov (United States)

    Stafman, Laura L.; Beierle, Elizabeth A.

    2016-01-01

    Neuroblastoma, the most common extracranial solid tumor of childhood, continues to carry a dismal prognosis for children diagnosed with advanced stage or relapsed disease. This review focuses upon factors responsible for cell proliferation in neuroblastoma including transcription factors, kinases, and regulators of the cell cycle. Novel therapeutic strategies directed toward these targets in neuroblastoma are discussed. PMID:26771642

  16. Controlling nuclear proliferation

    International Nuclear Information System (INIS)

    Sweet, W.

    1981-01-01

    Nuclear non-proliferation policy depends on the 1968 Non-Proliferation Treaty, in which countries promise not to acquire nuclear weapons in exchange for open access to peaceful nuclear technology, and a system of international safeguards that are imposed on exported nuclear equipment and facilities operated by parties to the treaty. Critics have feared all along that non-nuclear countries might circumvent or exploit the system to obtain nuclear weapons and that the Atoms for Peace plan would spread the very technology it sought to control. The nuclear weapons states would like everyone else to believe that atomic bombs are undesirable, but they continue to rely on the bombs for their own defense. Israel's raid on Iraq's nuclear reactor focused world attention on the proliferation problem and helped to broaden and sterengthen its prospects. It also highlighted the weakness that there are no effective sanctions against violators. Until the international community can ageee on enforcement measures powerful enough to prevent nuclear proliferation, individual countries may be tempted to follow Israel's example, 19 references

  17. 21 CFR 11.50 - Signature manifestations.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Signature manifestations. 11.50 Section 11.50 Food... RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.50 Signature manifestations. (a) Signed electronic...: (1) The printed name of the signer; (2) The date and time when the signature was executed; and (3...

  18. 76 FR 30542 - Adult Signature Services

    Science.gov (United States)

    2011-05-26

    ... POSTAL SERVICE 39 CFR Part 111 Adult Signature Services AGENCY: Postal Service\\TM\\. ACTION: Final..., Domestic Mail Manual (DMM[supreg]) 503.8, to add a new extra service called Adult Signature. This new service has two available options: Adult Signature Required and Adult Signature Restricted Delivery. DATES...

  19. 1 CFR 18.7 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 1 General Provisions 1 2010-01-01 2010-01-01 false Signature. 18.7 Section 18.7 General Provisions... PREPARATION AND TRANSMITTAL OF DOCUMENTS GENERALLY § 18.7 Signature. The original and each duplicate original... stamped beneath the signature. Initialed or impressed signatures will not be accepted. Documents submitted...

  20. Attribute-Based Digital Signature System

    NARCIS (Netherlands)

    Ibraimi, L.; Asim, Muhammad; Petkovic, M.

    2011-01-01

    An attribute-based digital signature system comprises a signature generation unit (1) for signing a message (m) by generating a signature (s) based on a user secret key (SK) associated with a set of user attributes, wherein the signature generation unit (1) is arranged for combining the user secret

  1. Quantum messages with signatures forgeable in arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Kim, Taewan; Choi, Jeong Woon; Jho, Nam-Su; Lee, Soojoon

    2015-01-01

    Even though a method to perfectly sign quantum messages has not been known, the arbitrated quantum signature scheme has been considered as one of the good candidates. However, its forgery problem has been an obstacle to the scheme becoming a successful method. In this paper, we consider one situation, which is slightly different from the forgery problem, that we use to check whether at least one quantum message with signature can be forged in a given scheme, although all the messages cannot be forged. If there are only a finite number of forgeable quantum messages in the scheme, then the scheme can be secured against the forgery attack by not sending forgeable quantum messages, and so our situation does not directly imply that we check whether the scheme is secure against the attack. However, if users run a given scheme without any consideration of forgeable quantum messages, then a sender might transmit such forgeable messages to a receiver and in such a case an attacker can forge the messages if the attacker knows them. Thus it is important and necessary to look into forgeable quantum messages. We show here that there always exists such a forgeable quantum message-signature pair for every known scheme with quantum encryption and rotation, and numerically show that there are no forgeable quantum message-signature pairs that exist in an arbitrated quantum signature scheme. (paper)

  2. SIGNATURE: A workbench for gene expression signature analysis

    Directory of Open Access Journals (Sweden)

    Chang Jeffrey T

    2011-11-01

    Full Text Available Abstract Background The biological phenotype of a cell, such as a characteristic visual image or behavior, reflects activities derived from the expression of collections of genes. As such, an ability to measure the expression of these genes provides an opportunity to develop more precise and varied sets of phenotypes. However, to use this approach requires computational methods that are difficult to implement and apply, and thus there is a critical need for intelligent software tools that can reduce the technical burden of the analysis. Tools for gene expression analyses are unusually difficult to implement in a user-friendly way because their application requires a combination of biological data curation, statistical computational methods, and database expertise. Results We have developed SIGNATURE, a web-based resource that simplifies gene expression signature analysis by providing software, data, and protocols to perform the analysis successfully. This resource uses Bayesian methods for processing gene expression data coupled with a curated database of gene expression signatures, all carried out within a GenePattern web interface for easy use and access. Conclusions SIGNATURE is available for public use at http://genepattern.genome.duke.edu/signature/.

  3. Nuclear non-proliferation

    International Nuclear Information System (INIS)

    Anon.

    1990-01-01

    This patent describes the treaty on the non-proliferation of nuclear weapons which is the corner-stone of an international non-proliferation regime which has grown to embrace the overwhelming majority of countries in the world in the period since the Treaty. The other elements of the regime include, first of all, the safeguards system of IAEA-which operates to prevent the diversion of nuclear materials to military or other prohibited activities and must be accepted by all non-nuclear-weapon parties to the Treaty and, secondly, the Antarctic Treaty, the Treaty for the Prohibition of Nuclear Weapons in Latin America (Treaty of Tlatelolco) and the south Pacific Nuclear Free zone Treaty (Treaty of Rarotonga)-which serve to extend the regime geographically. The last two Treaties require safeguards agreements with IAEA. In addition, the Treaty of Tlatelolco contains provisions establishing the agency for the Prohibition of Nuclear Weapons in Latin America and the Caribbean to ensure compliance

  4. Proliferation in cycle

    Energy Technology Data Exchange (ETDEWEB)

    Piao Yunsong [College of Physical Sciences, Graduate School of Chinese Academy of Sciences, Beijing 100049 (China)], E-mail: yspiao@gucas.ac.cn

    2009-06-15

    In the contracting phase with w{approx_equal}0, the scale invariant spectrum of curvature perturbation is given by the increasing mode of metric perturbation. In this Letter, it is found that if the contracting phase with w{approx_equal}0 is included in each cycle of a cycle universe, since the metric perturbation is amplified on super horizon scale cycle by cycle, after each cycle the universe will be inevitably separated into many parts independent of one another, each of which corresponds to a new universe and evolves up to next cycle, and then is separated again. In this sense, a cyclic multiverse scenario is actually presented, in which the universe proliferates cycle by cycle. We estimate the number of new universes proliferated in each cycle, and discuss the implications of this result.

  5. Proliferation in cycle

    International Nuclear Information System (INIS)

    Piao Yunsong

    2009-01-01

    In the contracting phase with w≅0, the scale invariant spectrum of curvature perturbation is given by the increasing mode of metric perturbation. In this Letter, it is found that if the contracting phase with w≅0 is included in each cycle of a cycle universe, since the metric perturbation is amplified on super horizon scale cycle by cycle, after each cycle the universe will be inevitably separated into many parts independent of one another, each of which corresponds to a new universe and evolves up to next cycle, and then is separated again. In this sense, a cyclic multiverse scenario is actually presented, in which the universe proliferates cycle by cycle. We estimate the number of new universes proliferated in each cycle, and discuss the implications of this result.

  6. Global proliferation concerns

    International Nuclear Information System (INIS)

    Simpkins, R.

    1978-01-01

    The Non-Proliferation Treaty and the IAGA Safeguards System are discussed. President Carter's program to defer commercial reprocessing and recycle, to restructure the breeder program, to develop alternative fuel cycles, to increase US uranium enrichment capability, to provide fuel assurance for consumer nations, to continue the embargo of sensitive technology and equipment and to develop the International Nuclear Fuel Cycle Evaluation Program is outlined

  7. Signature molecular descriptor : advanced applications.

    Energy Technology Data Exchange (ETDEWEB)

    Visco, Donald Patrick, Jr. (Tennessee Technological University, Cookeville, TN)

    2010-04-01

    In this work we report on the development of the Signature Molecular Descriptor (or Signature) for use in the solution of inverse design problems as well as in highthroughput screening applications. The ultimate goal of using Signature is to identify novel and non-intuitive chemical structures with optimal predicted properties for a given application. We demonstrate this in three studies: green solvent design, glucocorticoid receptor ligand design and the design of inhibitors for Factor XIa. In many areas of engineering, compounds are designed and/or modified in incremental ways which rely upon heuristics or institutional knowledge. Often multiple experiments are performed and the optimal compound is identified in this brute-force fashion. Perhaps a traditional chemical scaffold is identified and movement of a substituent group around a ring constitutes the whole of the design process. Also notably, a chemical being evaluated in one area might demonstrate properties very attractive in another area and serendipity was the mechanism for solution. In contrast to such approaches, computer-aided molecular design (CAMD) looks to encompass both experimental and heuristic-based knowledge into a strategy that will design a molecule on a computer to meet a given target. Depending on the algorithm employed, the molecule which is designed might be quite novel (re: no CAS registration number) and/or non-intuitive relative to what is known about the problem at hand. While CAMD is a fairly recent strategy (dating to the early 1980s), it contains a variety of bottlenecks and limitations which have prevented the technique from garnering more attention in the academic, governmental and industrial institutions. A main reason for this is how the molecules are described in the computer. This step can control how models are developed for the properties of interest on a given problem as well as how to go from an output of the algorithm to an actual chemical structure. This report

  8. Proliferation after the Iraq war

    International Nuclear Information System (INIS)

    Daguzan, J.F.

    2004-09-01

    This article uses the Iraq war major event to analyze the approach used by the US to fight against proliferation. It questions the decision and analysis process which has led to the US-British intervention and analyzes the consequences of the war on the proliferation of other countries and on the expected perspectives. Finally, the future of proliferation itself is questioned: do we have to fear more threat or is the virtuous circle of non-proliferation well started? (J.S.)

  9. Five Guidelines for Selecting Hydrological Signatures

    Science.gov (United States)

    McMillan, H. K.; Westerberg, I.; Branger, F.

    2017-12-01

    Hydrological signatures are index values derived from observed or modeled series of hydrological data such as rainfall, flow or soil moisture. They are designed to extract relevant information about hydrological behavior, such as to identify dominant processes, and to determine the strength, speed and spatiotemporal variability of the rainfall-runoff response. Hydrological signatures play an important role in model evaluation. They allow us to test whether particular model structures or parameter sets accurately reproduce the runoff generation processes within the watershed of interest. Most modeling studies use a selection of different signatures to capture different aspects of the catchment response, for example evaluating overall flow distribution as well as high and low flow extremes and flow timing. Such studies often choose their own set of signatures, or may borrow subsets of signatures used in multiple other works. The link between signature values and hydrological processes is not always straightforward, leading to uncertainty and variability in hydrologists' signature choices. In this presentation, we aim to encourage a more rigorous approach to hydrological signature selection, which considers the ability of signatures to represent hydrological behavior and underlying processes for the catchment and application in question. To this end, we propose a set of guidelines for selecting hydrological signatures. We describe five criteria that any hydrological signature should conform to: Identifiability, Robustness, Consistency, Representativeness, and Discriminatory Power. We describe an example of the design process for a signature, assessing possible signature designs against the guidelines above. Due to their ubiquity, we chose a signature related to the Flow Duration Curve, selecting the FDC mid-section slope as a proposed signature to quantify catchment overall behavior and flashiness. We demonstrate how assessment against each guideline could be used to

  10. Can we predict nuclear proliferation

    International Nuclear Information System (INIS)

    Tertrais, Bruno

    2011-01-01

    The author aims at improving nuclear proliferation prediction capacities, i.e. the capacities to identify countries susceptible to acquire nuclear weapons, to interpret sensitive activities, and to assess nuclear program modalities. He first proposes a retrospective assessment of counter-proliferation actions since 1945. Then, based on academic studies, he analyzes what causes and motivates proliferation, with notably the possibility of existence of a chain phenomenon (mechanisms driving from one program to another). He makes recommendations for a global approach to proliferation prediction, and proposes proliferation indices and indicators

  11. Digital Signature Schemes with Complementary Functionality and Applications

    OpenAIRE

    S. N. Kyazhin

    2012-01-01

    Digital signature schemes with additional functionality (an undeniable signature, a signature of the designated confirmee, a signature blind, a group signature, a signature of the additional protection) and examples of their application are considered. These schemes are more practical, effective and useful than schemes of ordinary digital signature.

  12. Signature Pedagogy in Theatre Arts

    Science.gov (United States)

    Kornetsky, Lisa

    2017-01-01

    Critique in undergraduate theatre programs is at the heart of training actors at all levels. It is accepted as the signature pedagogy and is practiced in multiple ways. This essay defines critique and presents the case for why it is used as the single most important way that performers come to understand the language, values, and discourse of the…

  13. Motif signatures of transcribed enhancers

    KAUST Repository

    Kleftogiannis, Dimitrios

    2017-09-14

    In mammalian cells, transcribed enhancers (TrEn) play important roles in the initiation of gene expression and maintenance of gene expression levels in spatiotemporal manner. One of the most challenging questions in biology today is how the genomic characteristics of enhancers relate to enhancer activities. This is particularly critical, as several recent studies have linked enhancer sequence motifs to specific functional roles. To date, only a limited number of enhancer sequence characteristics have been investigated, leaving space for exploring the enhancers genomic code in a more systematic way. To address this problem, we developed a novel computational method, TELS, aimed at identifying predictive cell type/tissue specific motif signatures. We used TELS to compile a comprehensive catalog of motif signatures for all known TrEn identified by the FANTOM5 consortium across 112 human primary cells and tissues. Our results confirm that distinct cell type/tissue specific motif signatures characterize TrEn. These signatures allow discriminating successfully a) TrEn from random controls, proxy of non-enhancer activity, and b) cell type/tissue specific TrEn from enhancers expressed and transcribed in different cell types/tissues. TELS codes and datasets are publicly available at http://www.cbrc.kaust.edu.sa/TELS.

  14. Quark-Gluon Plasma Signatures

    CERN Document Server

    Vogt, Ramona

    1998-01-01

    Aspects of quark-gluon plasma signatures that can be measured by CMS are discussed. First the initial conditions of the system from minijet production are introduced, including shadowing effects. Color screening of the Upsilon family is then presented, followed by energy loss effects on charm and bottom hadrons, high Pt jets and global observables.

  15. Galaxy interactions : The HI signature

    NARCIS (Netherlands)

    Sancisi, R; Barnes, JE; Sanders, DB

    1999-01-01

    HI observations are an excellent tool for investigating tidal interactions. Ongoing major and minor interactions which can lead to traumatic mergers or to accretion and the triggering of star formation, show distinct HI signatures. Interactions and mergers in the recent past can also be recognized

  16. Non-proliferation

    International Nuclear Information System (INIS)

    Deiseroth, D.; Gustafsson, S.

    1993-01-01

    The issue of Nuclear Non Proliferation has been moved to a leading place on the contemporary international security agenda. What about the situation of nuclear weapons and nuclear technology in Russia, Kazakhstan, Ukraine and Belorussia? Why did the IAEA-inspectors totally failed to discover any sign of Iraq's clandestine nuclear-weapon programme before the Gulf War? Do the NATO and their nuclear power states violate Art. VI of the Non-Proliferation-Treaty (NPT), because they are - despite the end of the cold war - not willing to renounce of the ''option of the first use of nuclear weapons''? Does the NPT establish a form of nuclear apartheid? What will be the situation if the NPT-Extension-Conference in 1995 will be unable to obtain a majority of the parties for any one extension proposal? Do we need a new international nuclear control agency with severe powers, a sort of nuclear Interpol? The Colloquium ''Saving NPT and abolishing Nuclear Weapons'', held in Stockholm in September 1992, organized by the Swedish and the German Sections of IALANA, tried to analyse some of the raised issues. (orig.) [de

  17. Non Proliferation of Nuclear

    International Nuclear Information System (INIS)

    Bambang S Irawan

    2004-01-01

    Non-Proliferation Treaty of Nuclear Weapons is the international community's efforts to maintain the security of the world, in order to prevent the spread of nuclear technology and the use of nuclear weapons, promoting cooperation for the use of nuclear peaceful purposes, build mutual trust (Confidence Building Measures) as well as to achieve the ultimate goal of disarmament overall (General and Complete Disarmament). Addressing the post-WTC tragedy, 11 September 2001, the Indonesian government should set up a National Measures (National Action Plan), among others formed the National Security Council and NBC Counter Proliferation Unit, or the National Authority for Nuclear Treaty, preparing national legislation, to prevent the abuse nuclear materials for terrorist acts, prevent Illicit Trafficking of Nuclear materials, developed a National Preparedness and Emergency Response Management in the event of a nuclear accident or attack by the use of nuclear terrorism. Importance of a National Action Plan meant the existence of a national commitment in the context of compliance with treaties and conventions which have been ratified relating to safety, security, safeguards towards a general and complete disarmament, to safeguard national security and maintain peace (safeguards) international

  18. Initiatives for proliferation prevention

    International Nuclear Information System (INIS)

    1997-04-01

    Preventing the proliferation of weapons of mass destruction is a central part of US national security policy. A principal instrument of the Department of Energy's (DOE's) program for securing weapons of mass destruction technology and expertise and removing incentives for scientists, engineers and technicians in the newly independent states (NIS) of the former Soviet Union to go to rogue countries or assist terrorist groups is the Initiatives for Proliferation Prevention (IPP). IPP was initiated pursuant to the 1994 Foreign Operations Appropriations Act. IPP is a nonproliferation program with a commercialization strategy. IPP seeks to enhance US national security and to achieve nonproliferation objectives by engaging scientists, engineers and technicians from former NIS weapons institutes; redirecting their activities in cooperatively-developed, commercially viable non-weapons related projects. These projects lead to commercial and economic benefits for both the NIS and the US IPP projects are funded in Russian, Ukraine, Kazakhstan and Belarus. This booklet offers an overview of the IPP program as well as a sampling of some of the projects which are currently underway

  19. Modeling and inferring cleavage patterns in proliferating epithelia.

    Directory of Open Access Journals (Sweden)

    Ankit B Patel

    2009-06-01

    Full Text Available The regulation of cleavage plane orientation is one of the key mechanisms driving epithelial morphogenesis. Still, many aspects of the relationship between local cleavage patterns and tissue-level properties remain poorly understood. Here we develop a topological model that simulates the dynamics of a 2D proliferating epithelium from generation to generation, enabling the exploration of a wide variety of biologically plausible cleavage patterns. We investigate a spectrum of models that incorporate the spatial impact of neighboring cells and the temporal influence of parent cells on the choice of cleavage plane. Our findings show that cleavage patterns generate "signature" equilibrium distributions of polygonal cell shapes. These signatures enable the inference of local cleavage parameters such as neighbor impact, maternal influence, and division symmetry from global observations of the distribution of cell shape. Applying these insights to the proliferating epithelia of five diverse organisms, we find that strong division symmetry and moderate neighbor/maternal influence are required to reproduce the predominance of hexagonal cells and low variability in cell shape seen empirically. Furthermore, we present two distinct cleavage pattern models, one stochastic and one deterministic, that can reproduce the empirical distribution of cell shapes. Although the proliferating epithelia of the five diverse organisms show a highly conserved cell shape distribution, there are multiple plausible cleavage patterns that can generate this distribution, and experimental evidence suggests that indeed plants and fruitflies use distinct division mechanisms.

  20. Uncertainties in Nuclear Proliferation Modeling

    International Nuclear Information System (INIS)

    Kim, Chul Min; Yim, Man-Sung; Park, Hyeon Seok

    2015-01-01

    There have been various efforts in the research community to understand the determinants of nuclear proliferation and develop quantitative tools to predict nuclear proliferation events. Such systematic approaches have shown the possibility to provide warning for the international community to prevent nuclear proliferation activities. However, there are still large debates for the robustness of the actual effect of determinants and projection results. Some studies have shown that several factors can cause uncertainties in previous quantitative nuclear proliferation modeling works. This paper analyzes the uncertainties in the past approaches and suggests future works in the view of proliferation history, analysis methods, and variable selection. The research community still lacks the knowledge for the source of uncertainty in current models. Fundamental problems in modeling will remain even other advanced modeling method is developed. Before starting to develop fancy model based on the time dependent proliferation determinants' hypothesis, using graph theory, etc., it is important to analyze the uncertainty of current model to solve the fundamental problems of nuclear proliferation modeling. The uncertainty from different proliferation history coding is small. Serious problems are from limited analysis methods and correlation among the variables. Problems in regression analysis and survival analysis cause huge uncertainties when using the same dataset, which decreases the robustness of the result. Inaccurate variables for nuclear proliferation also increase the uncertainty. To overcome these problems, further quantitative research should focus on analyzing the knowledge suggested on the qualitative nuclear proliferation studies

  1. Proliferation: myth or reality?; La proliferation: mythe ou realite?

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-07-01

    This article analyzes the proliferation approach, its technical condition and political motivation, and the share between the myth (political deception, assumptions and extrapolations) and the reality of proliferation. Its appreciation is complicated by the irrational behaviour of some political actors and by the significant loss of the non-use taboo. The control of technologies is an important element for proliferation slowing down but an efficient and autonomous intelligence system remains indispensable. (J.S.)

  2. Online Signature Verification on MOBISIG Finger-Drawn Signature Corpus

    Directory of Open Access Journals (Sweden)

    Margit Antal

    2018-01-01

    Full Text Available We present MOBISIG, a pseudosignature dataset containing finger-drawn signatures from 83 users captured with a capacitive touchscreen-based mobile device. The database was captured in three sessions resulting in 45 genuine signatures and 20 skilled forgeries for each user. The database was evaluated by two state-of-the-art methods: a function-based system using local features and a feature-based system using global features. Two types of equal error rate computations are performed: one using a global threshold and the other using user-specific thresholds. The lowest equal error rate was 0.01% against random forgeries and 5.81% against skilled forgeries using user-specific thresholds that were computed a posteriori. However, these equal error rates were significantly raised to 1.68% (random forgeries case and 14.31% (skilled forgeries case using global thresholds. The same evaluation protocol was performed on the DooDB publicly available dataset. Besides verification performance evaluations conducted on the two finger-drawn datasets, we evaluated the quality of the samples and the users of the two datasets using basic quality measures. The results show that finger-drawn signatures can be used by biometric systems with reasonable accuracy.

  3. Unsupervised signature extraction from forensic logs

    NARCIS (Netherlands)

    Thaler, S.M.; Menkovski, V.; Petkovic, M.; Altun, Y.; Das, K.; Mielikäinen, T.; Malerba, D.; Stefanowski, J.; Read, J.; Žitnik, M.; Ceci, M.

    2017-01-01

    Signature extraction is a key part of forensic log analysis. It involves recognizing patterns in log lines such that log lines that originated from the same line of code are grouped together. A log signature consists of immutable parts and mutable parts. The immutable parts define the signature, and

  4. 7 CFR 718.9 - Signature requirements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Signature requirements. 718.9 Section 718.9... MULTIPLE PROGRAMS General Provisions § 718.9 Signature requirements. (a) When a program authorized by this chapter or Chapter XIV of this title requires the signature of a producer; landowner; landlord; or tenant...

  5. 42 CFR 424.36 - Signature requirements.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Signature requirements. 424.36 Section 424.36... (CONTINUED) MEDICARE PROGRAM CONDITIONS FOR MEDICARE PAYMENT Claims for Payment § 424.36 Signature requirements. (a) General rule. The beneficiary's own signature is required on the claim unless the beneficiary...

  6. 17 CFR 12.12 - Signature.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Signature. 12.12 Section 12.12... General Information and Preliminary Consideration of Pleadings § 12.12 Signature. (a) By whom. All... document on behalf of another person. (b) Effect. The signature on any document of any person acting either...

  7. 25 CFR 213.10 - Lessor's signature.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Lessor's signature. 213.10 Section 213.10 Indians BUREAU... MEMBERS OF FIVE CIVILIZED TRIBES, OKLAHOMA, FOR MINING How to Acquire Leases § 213.10 Lessor's signature... thumbprint which shall be designated as “right” or “left” thumbmark. Such signatures must be witnessed by two...

  8. Signature effects in 2-qp rotational bands

    International Nuclear Information System (INIS)

    Jain, A.K.; Goel, A.

    1992-01-01

    The authors briefly review the progress in understanding the 2-qp rotational bands in odd-odd nuclei. Signature effects and the phenomenon of signature inversion are discussed. The Coriolis coupling appears to have all the ingredients to explain the inversion. Some recent work on signature dependence in 2-qp bands of even-even nuclei is also discussed; interesting features are pointed out

  9. 27 CFR 17.6 - Signature authority.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Signature authority. 17.6... PRODUCTS General Provisions § 17.6 Signature authority. No claim, bond, tax return, or other required... other proper notification of signature authority has been filed with the TTB office where the required...

  10. High-speed high-security signatures

    NARCIS (Netherlands)

    Bernstein, D.J.; Duif, N.; Lange, T.; Schwabe, P.; Yang, B.Y.

    2011-01-01

    This paper shows that a $390 mass-market quad-core 2.4GHz Intel Westmere (Xeon E5620) CPU can create 108000 signatures per second and verify 71000 signatures per second on an elliptic curve at a 2128 security level. Public keys are 32 bytes, and signatures are 64 bytes. These performance figures

  11. The nuclear proliferation

    International Nuclear Information System (INIS)

    Gere, F.

    1995-04-01

    In this book is detailed the beginning of nuclear military power, with the first bomb of Hiroshima, the different ways of getting uranium 235 and plutonium 239, and how the first countries (Usa, Ussr, China, United kingdom, France) got nuclear weapons. Then the most important part is reviewed with the details of non-proliferation treaty and the creation of IAEA to promote civilian nuclear power in the world and to control the use of plutonium and uranium in nuclear power plants. The cases of countries who reached the atom mastery, such Israel, South Africa, Pakistan, Iraq, North Korea, Argentina, Brazil, Iran, Algeria, Taiwan and the reasons which they wanted nuclear weapon for or why they gave up, are exposed

  12. Some Proxy Signature and Designated verifier Signature Schemes over Braid Groups

    OpenAIRE

    Lal, Sunder; Verma, Vandani

    2009-01-01

    Braids groups provide an alternative to number theoretic public cryptography and can be implemented quite efficiently. The paper proposes five signature schemes: Proxy Signature, Designated Verifier, Bi-Designated Verifier, Designated Verifier Proxy Signature And Bi-Designated Verifier Proxy Signature scheme based on braid groups. We also discuss the security aspects of each of the proposed schemes.

  13. Nonlinear control of magnetic signatures

    Science.gov (United States)

    Niemoczynski, Bogdan

    Magnetic properties of ferrite structures are known to cause fluctuations in Earth's magnetic field around the object. These fluctuations are known as the object's magnetic signature and are unique based on the object's geometry and material. It is a common practice to neutralize magnetic signatures periodically after certain time intervals, however there is a growing interest to develop real time degaussing systems for various applications. Development of real time degaussing system is a challenging problem because of magnetic hysteresis and difficulties in measurement or estimation of near-field flux data. The goal of this research is to develop a real time feedback control system that can be used to minimize magnetic signatures for ferrite structures. Experimental work on controlling the magnetic signature of a cylindrical steel shell structure with a magnetic disturbance provided evidence that the control process substantially increased the interior magnetic flux. This means near field estimation using interior sensor data is likely to be inaccurate. Follow up numerical work for rectangular and cylindrical cross sections investigated variations in shell wall flux density under a variety of ambient excitation and applied disturbances. Results showed magnetic disturbances could corrupt interior sensor data and magnetic shielding due to the shell walls makes the interior very sensitive to noise. The magnetic flux inside the shell wall showed little variation due to inner disturbances and its high base value makes it less susceptible to noise. This research proceeds to describe a nonlinear controller to use the shell wall data as an input. A nonlinear plant model of magnetics is developed using a constant tau to represent domain rotation lag and a gain function k to describe the magnetic hysteresis curve for the shell wall. The model is justified by producing hysteresis curves for multiple materials, matching experimental data using a particle swarm algorithm, and

  14. Nonlinear analysis of dynamic signature

    Science.gov (United States)

    Rashidi, S.; Fallah, A.; Towhidkhah, F.

    2013-12-01

    Signature is a long trained motor skill resulting in well combination of segments like strokes and loops. It is a physical manifestation of complex motor processes. The problem, generally stated, is that how relative simplicity in behavior emerges from considerable complexity of perception-action system that produces behavior within an infinitely variable biomechanical and environmental context. To solve this problem, we present evidences which indicate that motor control dynamic in signing process is a chaotic process. This chaotic dynamic may explain a richer array of time series behavior in motor skill of signature. Nonlinear analysis is a powerful approach and suitable tool which seeks for characterizing dynamical systems through concepts such as fractal dimension and Lyapunov exponent. As a result, they can be analyzed in both horizontal and vertical for time series of position and velocity. We observed from the results that noninteger values for the correlation dimension indicates low dimensional deterministic dynamics. This result could be confirmed by using surrogate data tests. We have also used time series to calculate the largest Lyapunov exponent and obtain a positive value. These results constitute significant evidence that signature data are outcome of chaos in a nonlinear dynamical system of motor control.

  15. Spectral signature selection for mapping unvegetated soils

    Science.gov (United States)

    May, G. A.; Petersen, G. W.

    1975-01-01

    Airborne multispectral scanner data covering the wavelength interval from 0.40-2.60 microns were collected at an altitude of 1000 m above the terrain in southeastern Pennsylvania. Uniform training areas were selected within three sites from this flightline. Soil samples were collected from each site and a procedure developed to allow assignment of scan line and element number from the multispectral scanner data to each sampling location. These soil samples were analyzed on a spectrophotometer and laboratory spectral signatures were derived. After correcting for solar radiation and atmospheric attenuation, the laboratory signatures were compared to the spectral signatures derived from these same soils using multispectral scanner data. Both signatures were used in supervised and unsupervised classification routines. Computer-generated maps using the laboratory and multispectral scanner derived signatures resulted in maps that were similar to maps resulting from field surveys. Approximately 90% agreement was obtained between classification maps produced using multispectral scanner derived signatures and laboratory derived signatures.

  16. Time Series Based for Online Signature Verification

    Directory of Open Access Journals (Sweden)

    I Ketut Gede Darma Putra

    2013-11-01

    Full Text Available Signature verification system is to match the tested signature with a claimed signature. This paper proposes time series based for feature extraction method and dynamic time warping for match method. The system made by process of testing 900 signatures belong to 50 participants, 3 signatures for reference and 5 signatures from original user, simple imposters and trained imposters for signatures test. The final result system was tested with 50 participants with 3 references. This test obtained that system accuracy without imposters is 90,44897959% at threshold 44 with rejection errors (FNMR is 5,2% and acceptance errors (FMR is 4,35102%, when with imposters system accuracy is 80,1361% at threshold 27 with error rejection (FNMR is 15,6% and acceptance errors (average FMR is 4,263946%, with details as follows: acceptance errors is 0,391837%, acceptance errors simple imposters is 3,2% and acceptance errors trained imposters is 9,2%.

  17. Nuclear proliferation: linkages and solutions

    International Nuclear Information System (INIS)

    Quester, G.H.

    1979-01-01

    Nuclear proliferation must be periodically re-examined as a moral as well as a practical foreign policy dilemma. The question is asked whether proliferation precludes a safe and peaceful world, or if a halt to proliferation is adequate without other arms control. The moral dilemma in foreign policy arises over the need to make practical choices which often serve one goal while sacrificing another. The ramifications of nuclear proliferation are examined and the conclusions reached that it is not an acceptable option. It is also decided that, because general disarmament steps will be more difficult to achieve, the world may have to accept a small number of nuclear arsenals as the price of state sovereignties. A high priority for making the effort to prevent proliferation is advised. 8 references

  18. A 7-Gene Signature Depicts the Biochemical Profile of Early Prefibrotic Myelofibrosis

    DEFF Research Database (Denmark)

    Skov, Vibe; Burton, Mark; Thomassen, Mads

    2016-01-01

    was performed in 17 and 9 patients diagnosed with ET and PMF, respectively. Using elevated LDH obtained at the time of diagnosis as a marker of prePMF, a 7-gene signature was identified which correctly predicted the prePMF group with a sensitivity of 100% and a specificity of 89%. The 7 genes included MPO......, CEACAM8, CRISP3, MS4A3, CEACAM6, HEMGN, and MMP8, which are genes known to be involved in inflammation, cell adhesion, differentiation and proliferation. Evaluation of bone marrow biopsies and the 7-gene signature showed a concordance rate of 71%, 79%, 62%, and 38%. Our 7-gene signature may be a useful...

  19. Thorium cycles and proliferation

    International Nuclear Information System (INIS)

    Lovins, A.B.

    1979-01-01

    This paper analyzes several prevalent misconceptions about nuclear fuel cycles that breed fissile uranium-233 from thorium. Its main conclusions are: U-233, despite the gamma radioactivity of associated isotopes, is a rather attractive material for making fission bombs, and is a credible material for subnational as well as national groups to use for this purpose; (2) pure thorium cycles, which in effect merely substitute U-233 for Pu, would take many decades and much U to establish, and offer no significant safeguards advantage over Pu, cycles; (3) denatured Th-U cycles, which dilute the U-233 with inert U-238 to a level not directly usable in bombs, are not an effective safeguard even against subnational bomb-making; (4) several other features of mixed Th-U cycles are rather unattractive from a safeguards point of view; (5) thus, Th cycles of any kind are not a technical fix for proliferation (national or subnational) and, though probably more safeguardable than Pu cycles, are less so than once-through U cycles that entail no reprocessing; (6) while thorium cycles have some potential technical advantages, including flexibility, they cannot provide major savings in nuclear fuel resources compared to simpler ways of saving neutrons and U; and (7) while advocates of nuclear power may find Th cycles worth exploring, such cycles do not differ fundamentally from U cycles in any of the respects--including safeguards and fuel resources--that are relevant to the broader nuclear debate, and should not be euphorically embraced as if they did

  20. Infrared signatures for remote sensing

    International Nuclear Information System (INIS)

    McDowell, R.S.; Sharpe, S.W.; Kelly, J.F.

    1994-04-01

    PNL's capabilities for infrared and near-infrared spectroscopy include tunable-diode-laser (TDL) systems covering 300--3,000 cm -1 at 2 laser. PNL also has a beam expansion source with a 12-cm slit, which provides a 3-m effective path for gases at ∼10 K, giving a Doppler width of typically 10 MHz; and long-path static gas cells (to 100 m). In applying this equipment to signatures work, the authors emphasize the importance of high spectral resolution for detecting and identifying atmospheric interferences; for identifying the optimum analytical frequencies; for deriving, by spectroscopic analysis, the molecular parameters needed for modeling; and for obtaining data on species and/or bands that are not in existing databases. As an example of such spectroscopy, the authors have assigned and analyzed the C-Cl stretching region of CCl 4 at 770--800 cm -1 . This is an important potential signature species whose IR absorption has remained puzzling because of the natural isotopic mix, extensive hot-band structure, and a Fermi resonance involving a nearby combination band. Instrument development projects include the IR sniffer, a small high-sensitivity, high-discrimination (Doppler-limited) device for fence-line or downwind monitoring that is effective even in regions of atmospheric absorption; preliminary work has achieved sensitivities at the low-ppb level. Other work covers trace species detection with TDLs, and FM-modulated CO 2 laser LIDAR. The authors are planning a field experiment to interrogate the Hanford tank farm for signature species from Rattlesnake Mountain, a standoff of ca. 15 km, to be accompanied by simultaneous ground-truthing at the tanks

  1. Theoretical Approaches to Nuclear Proliferation

    Directory of Open Access Journals (Sweden)

    Konstantin S. Tarasov

    2015-01-01

    Full Text Available This article analyses discussions between representatives of three schools in the theory of international relations - realism, liberalism and constructivism - on the driving factors of nuclear proliferation. The paper examines major theoretical approaches, outlined in the studies of Russian and foreign scientists, to the causes of nuclear weapons development, while unveiling their advantages and limitations. Much of the article has been devoted to alternative approaches, particularly, the role of mathematical modeling in assessing proliferation risks. The analysis also reveals a variety of different approaches to nuclear weapons acquisition, as well as the absence of a comprehensive proliferation theory. Based on the research results the study uncovers major factors both favoring and impeding nuclear proliferation. The author shows that the lack of consensus between realists, liberals and constructivists on the nature of proliferation led a number of scientists to an attempt to explain nuclear rationale by drawing from the insights of more than one school in the theory of IR. Detailed study of the proliferation puzzle contributes to a greater understating of contemporary international realities, helps to identify mechanisms that are most likely to deter states from obtaining nuclear weapons and is of the outmost importance in predicting short- and long-term security environment. Furthermore, analysis of the existing scientific literature on nuclear proliferation helps to determine future research agenda of the subject at hand.

  2. Nuclear non proliferation and disarmament

    International Nuclear Information System (INIS)

    2000-01-01

    In the framework of the publication of a document on the ''weapons mastership, disarmament and non proliferation: the french action'', by the ministry of Foreign Affairs and the ministry of Defense, the French Documentation organization presents a whole document. This document describes and details the following topics: the conference on the treaty of non proliferation of nuclear weapons, the France, Usa and Non Governmental Organizations position, the threats of the proliferation, the french actions towards the disarmament, the disarmament in the world, a chronology and some bibliographic resources. (A.L.B.)

  3. International proliferation on nuclear weapons

    International Nuclear Information System (INIS)

    Hill, J.

    1977-01-01

    The subject is dealt with under the following headings: introduction; routes to proliferation (preparation of U 235 , Pu 239 , U 233 ); nuclear power fuel cycles and proliferation; the fast reactor fuel cycle; security aspects of the existing fuel cycle; the IAEA and the nuclear non-proliferation treaty. It is concluded that 'the basis for sound international control exists, and taken together with the further technical steps which will be taken to make the existing fuel cycles more robust against the diversion of materials by terrorists and the abuse of civil nuclear power programmes by governments, we have good reason to proceed now with the orderly exploitation of ...nuclear energy...'. (U.K.)

  4. Signature Curves Statistics of DNA Supercoils

    OpenAIRE

    Shakiban, Cheri; Lloyd, Peter

    2004-01-01

    In this paper we describe the Euclidean signature curves for two dimensional closed curves in the plane and their generalization to closed space curves. The focus will be on discrete numerical methods for approximating such curves. Further we will apply these numerical methods to plot the signature curves related to three-dimensional simulated DNA supercoils. Our primary focus will be on statistical analysis of the data generated for the signature curves of the supercoils. We will try to esta...

  5. Institute of Geophysics, Planetary Physics, and Signatures

    Data.gov (United States)

    Federal Laboratory Consortium — The Institute of Geophysics, Planetary Physics, and Signatures at Los Alamos National Laboratory is committed to promoting and supporting high quality, cutting-edge...

  6. On reliable discovery of molecular signatures

    Directory of Open Access Journals (Sweden)

    Björkegren Johan

    2009-01-01

    Full Text Available Abstract Background Molecular signatures are sets of genes, proteins, genetic variants or other variables that can be used as markers for a particular phenotype. Reliable signature discovery methods could yield valuable insight into cell biology and mechanisms of human disease. However, it is currently not clear how to control error rates such as the false discovery rate (FDR in signature discovery. Moreover, signatures for cancer gene expression have been shown to be unstable, that is, difficult to replicate in independent studies, casting doubts on their reliability. Results We demonstrate that with modern prediction methods, signatures that yield accurate predictions may still have a high FDR. Further, we show that even signatures with low FDR may fail to replicate in independent studies due to limited statistical power. Thus, neither stability nor predictive accuracy are relevant when FDR control is the primary goal. We therefore develop a general statistical hypothesis testing framework that for the first time provides FDR control for signature discovery. Our method is demonstrated to be correct in simulation studies. When applied to five cancer data sets, the method was able to discover molecular signatures with 5% FDR in three cases, while two data sets yielded no significant findings. Conclusion Our approach enables reliable discovery of molecular signatures from genome-wide data with current sample sizes. The statistical framework developed herein is potentially applicable to a wide range of prediction problems in bioinformatics.

  7. Modeling the Thermal Signature of Natural Backgrounds

    National Research Council Canada - National Science Library

    Gamborg, Marius

    2002-01-01

    Two measuring stations have been established the purpose being to collect comprehensive databases of thermal signatures of background elements in addition to the prevailing meteorological conditions...

  8. An Arbitrated Quantum Signature Scheme without Entanglement*

    International Nuclear Information System (INIS)

    Li Hui-Ran; Luo Ming-Xing; Peng Dai-Yuan; Wang Xiao-Jun

    2017-01-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks . (paper)

  9. Non-proliferation and nuclear data

    International Nuclear Information System (INIS)

    Sowerby, M.G.

    1978-01-01

    A review is made of the problem of the proliferation of nuclear weapons with particular emphasis on proliferation and nuclear power. Some indications of the nuclear data requirements associated with methods of reducing proliferation risks are presented

  10. Imaging-based surrogate markers of transcriptome subclasses and signatures in hepatocellular carcinoma. Preliminary results

    International Nuclear Information System (INIS)

    Taouli, Bachir; Hoshida, Yujin; Chen, Xintong; Sun, Xiaochen; Kojima, Kensuke; Toffanin, Sara; Hirschfield, Hadassa; Kakite, Suguru; Tan, Poh Seng; Kihira, Shingo; Fiel, M.I.; Wagner, Mathilde; Llovet, Josep M.

    2017-01-01

    In this preliminary study, we examined whether imaging-based phenotypes are associated with reported predictive gene signatures in hepatocellular carcinoma (HCC). Thirty-eight patients (M/F 30/8, mean age 61 years) who underwent pre-operative CT or MR imaging before surgery as well as transcriptome profiling were included in this IRB-approved single-centre retrospective study. Eleven qualitative and four quantitative imaging traits (size, enhancement ratios, wash-out ratio, tumour-to-liver contrast ratios) were assessed by three observers and were correlated with 13 previously reported HCC gene signatures using logistic regression analysis. Thirty-nine HCC tumours (mean size 5.7 ± 3.2 cm) were assessed. Significant positive associations were observed between certain imaging traits and gene signatures of aggressive HCC phenotype (G3-Boyault, Proliferation-Chiang profiles, CK19-Villanueva, S1/S2-Hoshida) with odds ratios ranging from 4.44-12.73 (P <0.045). Infiltrative pattern at imaging was significantly associated with signatures of microvascular invasion and aggressive phenotype. Significant but weak associations were also observed between each enhancement ratio and tumour-to-liver contrast ratios and certain gene expression profiles. This preliminary study demonstrates a correlation between phenotypic imaging traits with gene signatures of aggressive HCC, which warrants further prospective validation to establish imaging-based surrogate markers of molecular phenotypes in HCC. (orig.)

  11. Imaging-based surrogate markers of transcriptome subclasses and signatures in hepatocellular carcinoma. Preliminary results

    Energy Technology Data Exchange (ETDEWEB)

    Taouli, Bachir [Icahn School of Medicine at Mount Sinai, Department of Radiology, New York, NY (United States); Icahn School of Medicine at Mount Sinai, Translational and Molecular Imaging Institute, New York, NY (United States); Icahn School of Medicine at Mount Sinai, Liver Cancer Program, Tisch Cancer Institute, New York, NY (United States); Hoshida, Yujin; Chen, Xintong; Sun, Xiaochen; Kojima, Kensuke; Toffanin, Sara; Hirschfield, Hadassa [Icahn School of Medicine at Mount Sinai, Liver Cancer Program, Tisch Cancer Institute, New York, NY (United States); Icahn School of Medicine at Mount Sinai, Division of Liver Diseases, Department of Medicine, New York, NY (United States); Kakite, Suguru [Icahn School of Medicine at Mount Sinai, Translational and Molecular Imaging Institute, New York, NY (United States); Tottori University, Division of Radiology, Department of Pathophysiological and Therapeutic Science, Faculty of Medicine, Yonago City (Japan); Tan, Poh Seng [Icahn School of Medicine at Mount Sinai, Liver Cancer Program, Tisch Cancer Institute, New York, NY (United States); Icahn School of Medicine at Mount Sinai, Division of Liver Diseases, Department of Medicine, New York, NY (United States); National University Health System, Division of Gastroenterology and Hepatology, University Medicine Cluster, Singapore (Singapore); Kihira, Shingo [Icahn School of Medicine at Mount Sinai, Department of Radiology, New York, NY (United States); Fiel, M.I. [Icahn School of Medicine at Mount Sinai, Department of Pathology, New York, NY (United States); Wagner, Mathilde [Icahn School of Medicine at Mount Sinai, Translational and Molecular Imaging Institute, New York, NY (United States); Sorbonne Universites, UPMC, Department of Radiology, Hopital Pitie-Salpetriere, Paris (France); Llovet, Josep M. [Icahn School of Medicine at Mount Sinai, Liver Cancer Program, Tisch Cancer Institute, New York, NY (United States); Icahn School of Medicine at Mount Sinai, Division of Liver Diseases, Department of Medicine, New York, NY (United States); Universitat de Barcelona, HCC Translational Research Laboratory, Barcelona-Clinic Liver Cancer Group Institut d' Investigacions Biomediques August Pi i Sunyer (IDIBAPS), Hospital Clinic de Barcelona, Barcelona (Spain); Institucio Catalana de Recerca i Estudis Avancats, Barcelona (Spain)

    2017-11-15

    In this preliminary study, we examined whether imaging-based phenotypes are associated with reported predictive gene signatures in hepatocellular carcinoma (HCC). Thirty-eight patients (M/F 30/8, mean age 61 years) who underwent pre-operative CT or MR imaging before surgery as well as transcriptome profiling were included in this IRB-approved single-centre retrospective study. Eleven qualitative and four quantitative imaging traits (size, enhancement ratios, wash-out ratio, tumour-to-liver contrast ratios) were assessed by three observers and were correlated with 13 previously reported HCC gene signatures using logistic regression analysis. Thirty-nine HCC tumours (mean size 5.7 ± 3.2 cm) were assessed. Significant positive associations were observed between certain imaging traits and gene signatures of aggressive HCC phenotype (G3-Boyault, Proliferation-Chiang profiles, CK19-Villanueva, S1/S2-Hoshida) with odds ratios ranging from 4.44-12.73 (P <0.045). Infiltrative pattern at imaging was significantly associated with signatures of microvascular invasion and aggressive phenotype. Significant but weak associations were also observed between each enhancement ratio and tumour-to-liver contrast ratios and certain gene expression profiles. This preliminary study demonstrates a correlation between phenotypic imaging traits with gene signatures of aggressive HCC, which warrants further prospective validation to establish imaging-based surrogate markers of molecular phenotypes in HCC. (orig.)

  12. 21 CFR 11.70 - Signature/record linking.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Signature/record linking. 11.70 Section 11.70 Food... RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.70 Signature/record linking. Electronic signatures and handwritten signatures executed to electronic records shall be linked to their respective...

  13. Prognostic Biomarker Identification Through Integrating the Gene Signatures of Hepatocellular Carcinoma Properties

    Directory of Open Access Journals (Sweden)

    Jialin Cai

    2017-05-01

    Full Text Available Many molecular classification and prognostic gene signatures for hepatocellular carcinoma (HCC patients have been established based on genome-wide gene expression profiling; however, their generalizability is unclear. Herein, we systematically assessed the prognostic effects of these gene signatures and identified valuable prognostic biomarkers by integrating these gene signatures. With two independent HCC datasets (GSE14520, N = 242 and GSE54236, N = 78, 30 published gene signatures were evaluated, and 11 were significantly associated with the overall survival (OS of postoperative HCC patients in both datasets. The random survival forest models suggested that the gene signatures were superior to clinical characteristics for predicting the prognosis of the patients. Based on the 11 gene signatures, a functional protein-protein interaction (PPI network with 1406 nodes and 10,135 edges was established. With tissue microarrays of HCC patients (N = 60, we determined the prognostic values of the core genes in the network and found that RAD21, CDK1, and HDAC2 expression levels were negatively associated with OS for HCC patients. The multivariate Cox regression analyses suggested that CDK1 was an independent prognostic factor, which was validated in an independent case cohort (N = 78. In cellular models, inhibition of CDK1 by siRNA or a specific inhibitor, RO-3306, reduced cellular proliferation and viability for HCC cells. These results suggest that the prognostic predictive capacities of these gene signatures are reproducible and that CDK1 is a potential prognostic biomarker or therapeutic target for HCC patients.

  14. 15 CFR 908.16 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Signature. 908.16 Section 908.16 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) NATIONAL OCEANIC... SUBMITTING REPORTS ON WEATHER MODIFICATION ACTIVITIES § 908.16 Signature. All reports filed with the National...

  15. 12 CFR 269b.731 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Signature. 269b.731 Section 269b.731 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM CHARGES OF UNFAIR LABOR PRACTICES General Rules § 269b.731 Signature. The original of each document filed shall be...

  16. The Pedagogic Signature of the Teaching Profession

    Science.gov (United States)

    Kiel, Ewald; Lerche, Thomas; Kollmannsberger, Markus; Oubaid, Viktor; Weiss, Sabine

    2016-01-01

    Lee S. Shulman deplores that the field of education as a profession does not have a pedagogic signature, which he characterizes as a synthesis of cognitive, practical and moral apprenticeship. In this context, the following study has three goals: 1) In the first theoretical part, the basic problems of constructing a pedagogic signature are…

  17. Infrared ship signature analysis and optimisation

    NARCIS (Netherlands)

    Neele, F.P.

    2005-01-01

    The last decade has seen an increase in the awareness of the infrared signature of naval ships. New ship designs show that infrared signature reduction measures are being incorporated, such as exhaust gas cooling systems, relocation of the exhausts and surface cooling systems. Hull and

  18. Does Social Work Have a Signature Pedagogy?

    Science.gov (United States)

    Earls Larrison, Tara; Korr, Wynne S.

    2013-01-01

    This article contributes to discourse on signature pedagogy by reconceptualizing how our pedagogies are understood and defined for social work education. We critique the view that field education is social work's signature pedagogy and consider what pedagogies are distinct about the teaching and learning of social work. Using Shulman's…

  19. Quantum signature scheme for known quantum messages

    International Nuclear Information System (INIS)

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  20. Analysis of signature wrapping attacks and countermeasures

    DEFF Research Database (Denmark)

    Gajek, Sebastian; Jensen, Meiko; Liao, Lijun

    2009-01-01

    In recent research it turned out that Boolean verification, of digital signatures in the context of WSSecurity, is likely to fail: If parts of a SOAP message, are signed and the signature verification applied to, the whole document returns true, then nevertheless the, document may have been...

  1. 48 CFR 4.102 - Contractor's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Contractor's signature. 4.102 Section 4.102 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Contract Execution 4.102 Contractor's signature. (a) Individuals. A contract with an...

  2. Future non-proliferation challenges

    International Nuclear Information System (INIS)

    Yelchenko, Volodymyr

    2008-01-01

    Having chaired the Second Session of the Preparatory Committee Mr. Volodymyr Yelchenko noted that the NPT States parties reaffirmed the important role of the Treaty as the cornerstone of the global non-proliferation regime. They stressed that non-compliance with the Treaty provisions by States parties undermined non-proliferation and placed emphasis on the mutually reinforcing nature of disarmament and non-proliferation, and due respect for the right of States parties to the peaceful use of nuclear energy in conformity with the treaty. They reaffirmed the importance of promoting the peaceful uses of nuclear energy and international nuclear cooperation for peaceful purposes in ways consistent with the non-proliferation goal of the Treaty. The universality aspect was brought to the front with the lack of progress in this area. States parties called upon India, Israel and Pakistan to accede to the Treaty as non-nuclear-weapons states, promptly and without conditions and to bring into force comprehensive safeguards agreements, together with Additional Protocols, for ensuring non-proliferation. There is concern that non-States actors could gain access to weapons of mass destruction. One of the underlying themes at the Second Prepcom was the total elimination of nuclear weapons as the only absolute guarantee against their proliferation. Negative consequences to nuclear non-proliferation were also mentioned in the context of the abrogation of the Anti-Ballistic Missile Treaty and the development of missile defense systems, with the risk of a new arms race on Earth and in outer space. The importance of the immediate commencement of negotiations in the Conference of Disarmament on a treaty concerning fissile material for nuclear weapons or other nuclear explosive devices and the urgent conclusion of such a treaty as a beneficial step towards non-proliferation was stressed. The NPT states parties reaffirmed the role of the IAEA as the sole competent authority responsible for

  3. Real time gamma-ray signature identifier

    Science.gov (United States)

    Rowland, Mark [Alamo, CA; Gosnell, Tom B [Moraga, CA; Ham, Cheryl [Livermore, CA; Perkins, Dwight [Livermore, CA; Wong, James [Dublin, CA

    2012-05-15

    A real time gamma-ray signature/source identification method and system using principal components analysis (PCA) for transforming and substantially reducing one or more comprehensive spectral libraries of nuclear materials types and configurations into a corresponding concise representation/signature(s) representing and indexing each individual predetermined spectrum in principal component (PC) space, wherein an unknown gamma-ray signature may be compared against the representative signature to find a match or at least characterize the unknown signature from among all the entries in the library with a single regression or simple projection into the PC space, so as to substantially reduce processing time and computing resources and enable real-time characterization and/or identification.

  4. DIGITAL SIGNATURE IN THE WAY OF LAW

    Directory of Open Access Journals (Sweden)

    Ruya Samlı

    2013-01-01

    Full Text Available Signature can be defined as a person’s name or special signs that he/she writes when he/she wants to indicate he/she wrote or confirm that writing. A person signs many times in his/her life. A person’s signature that is used for thousands of times for many things from formal documents to exams has importance for that person. Especially, signing in legal operations is an operation that can build important results. If a person’s signature is imitated by another person, he/she can become beholden, donate his/her whole wealth, commits offences or do some judicial operations. Today, because many operations can be done with digital environments and internet, signature operation that provides identity validation must also be carried to digital environment. In this paper digital signature concept that is approved for this reason and its situation in international areas and Turkish laws are investigated.

  5. Polyphenols as Promising Drugs against Main Breast Cancer Signatures

    Directory of Open Access Journals (Sweden)

    María Losada-Echeberría

    2017-11-01

    Full Text Available Breast cancer is one of the most common neoplasms worldwide, and in spite of clinical and pharmacological advances, it is still a clinical problem, causing morbidity and mortality. On the one hand, breast cancer shares with other neoplasms some molecular signatures such as an imbalanced redox state, cell cycle alterations, increased proliferation and an inflammatory status. On the other hand, breast cancer shows differential molecular subtypes that determine its prognosis and treatment. These are characterized mainly by hormone receptors especially estrogen receptors (ERs and epidermal growth factor receptor 2 (HER2. Tumors with none of these receptors are classified as triple negative breast cancer (TNBC and are associated with a worse prognosis. The success of treatments partially depends on their specificity and the adequate molecular classification of tumors. New advances in anticancer drug discovery using natural compounds have been made in the last few decades, and polyphenols have emerged as promising molecules. They may act on various molecular targets because of their promiscuous behavior, presenting several physiological effects, some of which confer antitumor activity. This review analyzes the accumulated evidence of the antitumor effects of plant polyphenols on breast cancer, with special attention to their activity on ERs and HER2 targets and also covering different aspects such as redox balance, uncontrolled proliferation and chronic inflammation.

  6. Polyphenols as Promising Drugs against Main Breast Cancer Signatures

    Science.gov (United States)

    Herranz-López, María; Micol, Vicente

    2017-01-01

    Breast cancer is one of the most common neoplasms worldwide, and in spite of clinical and pharmacological advances, it is still a clinical problem, causing morbidity and mortality. On the one hand, breast cancer shares with other neoplasms some molecular signatures such as an imbalanced redox state, cell cycle alterations, increased proliferation and an inflammatory status. On the other hand, breast cancer shows differential molecular subtypes that determine its prognosis and treatment. These are characterized mainly by hormone receptors especially estrogen receptors (ERs) and epidermal growth factor receptor 2 (HER2). Tumors with none of these receptors are classified as triple negative breast cancer (TNBC) and are associated with a worse prognosis. The success of treatments partially depends on their specificity and the adequate molecular classification of tumors. New advances in anticancer drug discovery using natural compounds have been made in the last few decades, and polyphenols have emerged as promising molecules. They may act on various molecular targets because of their promiscuous behavior, presenting several physiological effects, some of which confer antitumor activity. This review analyzes the accumulated evidence of the antitumor effects of plant polyphenols on breast cancer, with special attention to their activity on ERs and HER2 targets and also covering different aspects such as redox balance, uncontrolled proliferation and chronic inflammation. PMID:29112149

  7. 48 CFR 804.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... signature. 804.101 Section 804.101 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS GENERAL ADMINISTRATIVE MATTERS Contract Execution 804.101 Contracting officer's signature. (a) If a... signature. ...

  8. Nuclear proliferation and safeguards. Summary

    International Nuclear Information System (INIS)

    1982-03-01

    This comprehensive analysis of the technological, economic, and political factors affecting the potential spread of nuclear weapons proved useful in the congressional debate which culminated in the Nuclear Non-Proliferation Act of 1978. The report was subsequently published commercially and has been a frequently cited reference in the literature on proliferation and nuclear power. Despite developments since 1977, the information in the OTA report is still useful to those wishing to obtain an indepth understanding of the issues. Included is an analysis of why a nation might want nuclear weapons development program and the various sources of nuclear material are discussed. The control of proliferation is considered as well as its relation to the nuclear industry

  9. Domestic Politics and Nuclear Proliferation

    International Nuclear Information System (INIS)

    Kim, Chul Min; Yim, Man Sung

    2016-01-01

    The external security threat is known as the most important factor of nuclear weapons program, the domestic politics situation can also affect the nuclear proliferation decision of a country. For example, when a leader wants nuclear weapons as an ultimate weapon, the domestic politics situation can determine the effectiveness of the weapons program of a country. This study analyzes the current knowledge of the relationship between domestic politics and nuclear proliferation and suggests the main challenges of the quantitative models trying to calculate nuclear proliferation risk of countries. The domestic politics status is one of the most important indicators of nuclear program. However, some variables have never been used in quantitative analyses; for example, number of veto players and the public opinion on nuclear weapons; despite they are considered to be important in various qualitative studies. Future studies should focus on how should they be coded and how can they be linked with existing domestic politics variables

  10. Domestic Politics and Nuclear Proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Chul Min; Yim, Man Sung [KAIST, Daejeon (Korea, Republic of)

    2016-05-15

    The external security threat is known as the most important factor of nuclear weapons program, the domestic politics situation can also affect the nuclear proliferation decision of a country. For example, when a leader wants nuclear weapons as an ultimate weapon, the domestic politics situation can determine the effectiveness of the weapons program of a country. This study analyzes the current knowledge of the relationship between domestic politics and nuclear proliferation and suggests the main challenges of the quantitative models trying to calculate nuclear proliferation risk of countries. The domestic politics status is one of the most important indicators of nuclear program. However, some variables have never been used in quantitative analyses; for example, number of veto players and the public opinion on nuclear weapons; despite they are considered to be important in various qualitative studies. Future studies should focus on how should they be coded and how can they be linked with existing domestic politics variables.

  11. Maximizing biomarker discovery by minimizing gene signatures

    Directory of Open Access Journals (Sweden)

    Chang Chang

    2011-12-01

    Full Text Available Abstract Background The use of gene signatures can potentially be of considerable value in the field of clinical diagnosis. However, gene signatures defined with different methods can be quite various even when applied the same disease and the same endpoint. Previous studies have shown that the correct selection of subsets of genes from microarray data is key for the accurate classification of disease phenotypes, and a number of methods have been proposed for the purpose. However, these methods refine the subsets by only considering each single feature, and they do not confirm the association between the genes identified in each gene signature and the phenotype of the disease. We proposed an innovative new method termed Minimize Feature's Size (MFS based on multiple level similarity analyses and association between the genes and disease for breast cancer endpoints by comparing classifier models generated from the second phase of MicroArray Quality Control (MAQC-II, trying to develop effective meta-analysis strategies to transform the MAQC-II signatures into a robust and reliable set of biomarker for clinical applications. Results We analyzed the similarity of the multiple gene signatures in an endpoint and between the two endpoints of breast cancer at probe and gene levels, the results indicate that disease-related genes can be preferably selected as the components of gene signature, and that the gene signatures for the two endpoints could be interchangeable. The minimized signatures were built at probe level by using MFS for each endpoint. By applying the approach, we generated a much smaller set of gene signature with the similar predictive power compared with those gene signatures from MAQC-II. Conclusions Our results indicate that gene signatures of both large and small sizes could perform equally well in clinical applications. Besides, consistency and biological significances can be detected among different gene signatures, reflecting the

  12. Ultracentrifuge and non-proliferation

    International Nuclear Information System (INIS)

    Voortman, A.J.

    1977-01-01

    The author states that there is no meaningful difference, from the point of view of proliferation between peaceful, civil, scientific application of nuclear fission, and the use of it in nuclear weapons. The proliferation of the nuclear technology for weapons appeared and appears to be closely connected with the spread of peaceful applications of nuclear technology. In connection with this, he discusses the Ultracentrifuge plant at Almelo (Netherlands) and the supply of nuclear technology by West-Germany especially to Brazil. Further the changed American policy and the possibility of an American/Russian deal to prevent the spread of the nuclear enrichment technology is discussed

  13. The prognostic value of temporal in vitro and in vivo derived hypoxia gene-expression signatures in breast cancer

    International Nuclear Information System (INIS)

    Starmans, Maud H.W.; Chu, Kenneth C.; Haider, Syed; Nguyen, Francis; Seigneuric, Renaud; Magagnin, Michael G.; Koritzinsky, Marianne; Kasprzyk, Arek; Boutros, Paul C.; Wouters, Bradly G.

    2012-01-01

    Background and purpose: Recent data suggest that in vitro and in vivo derived hypoxia gene-expression signatures have prognostic power in breast and possibly other cancers. However, both tumour hypoxia and the biological adaptation to this stress are highly dynamic. Assessment of time-dependent gene-expression changes in response to hypoxia may thus provide additional biological insights and assist in predicting the impact of hypoxia on patient prognosis. Materials and methods: Transcriptome profiling was performed for three cell lines derived from diverse tumour-types after hypoxic exposure at eight time-points, which include a normoxic time-point. Time-dependent sets of co-regulated genes were identified from these data. Subsequently, gene ontology (GO) and pathway analyses were performed. The prognostic power of these novel signatures was assessed in parallel with previous in vitro and in vivo derived hypoxia signatures in a large breast cancer microarray meta-dataset (n = 2312). Results: We identified seven recurrent temporal and two general hypoxia signatures. GO and pathway analyses revealed regulation of both common and unique underlying biological processes within these signatures. None of the new or previously published in vitro signatures consisting of hypoxia-induced genes were prognostic in the large breast cancer dataset. In contrast, signatures of repressed genes, as well as the in vivo derived signatures of hypoxia-induced genes showed clear prognostic power. Conclusions: Only a subset of hypoxia-induced genes in vitro demonstrates prognostic value when evaluated in a large clinical dataset. Despite clear evidence of temporal patterns of gene-expression in vitro, the subset of prognostic hypoxia regulated genes cannot be identified based on temporal pattern alone. In vivo derived signatures appear to identify the prognostic hypoxia induced genes. The prognostic value of hypoxia-repressed genes is likely a surrogate for the known importance of

  14. Genomic Signatures of Sexual Conflict.

    Science.gov (United States)

    Kasimatis, Katja R; Nelson, Thomas C; Phillips, Patrick C

    2017-10-30

    Sexual conflict is a specific class of intergenomic conflict that describes the reciprocal sex-specific fitness costs generated by antagonistic reproductive interactions. The potential for sexual conflict is an inherent property of having a shared genome between the sexes and, therefore, is an extreme form of an environment-dependent fitness effect. In this way, many of the predictions from environment-dependent selection can be used to formulate expected patterns of genome evolution under sexual conflict. However, the pleiotropic and transmission constraints inherent to having alleles move across sex-specific backgrounds from generation to generation further modulate the anticipated signatures of selection. We outline methods for detecting candidate sexual conflict loci both across and within populations. Additionally, we consider the ability of genome scans to identify sexually antagonistic loci by modeling allele frequency changes within males and females due to a single generation of selection. In particular, we highlight the need to integrate genotype, phenotype, and functional information to truly distinguish sexual conflict from other forms of sexual differentiation. © The American Genetic Association 2017. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  15. Transcriptomic signatures in cartilage ageing

    Science.gov (United States)

    2013-01-01

    Introduction Age is an important factor in the development of osteoarthritis. Microarray studies provide insight into cartilage aging but do not reveal the full transcriptomic phenotype of chondrocytes such as small noncoding RNAs, pseudogenes, and microRNAs. RNA-Seq is a powerful technique for the interrogation of large numbers of transcripts including nonprotein coding RNAs. The aim of the study was to characterise molecular mechanisms associated with age-related changes in gene signatures. Methods RNA for gene expression analysis using RNA-Seq and real-time PCR analysis was isolated from macroscopically normal cartilage of the metacarpophalangeal joints of eight horses; four young donors (4 years old) and four old donors (>15 years old). RNA sequence libraries were prepared following ribosomal RNA depletion and sequencing was undertaken using the Illumina HiSeq 2000 platform. Differentially expressed genes were defined using Benjamini-Hochberg false discovery rate correction with a generalised linear model likelihood ratio test (P ageing cartilage. Conclusion There was an age-related dysregulation of matrix, anabolic and catabolic cartilage factors. This study has increased our knowledge of transcriptional networks in cartilage ageing by providing a global view of the transcriptome. PMID:23971731

  16. Reduction of a Ship's Magnetic Field Signatures

    CERN Document Server

    Holmes, John

    2008-01-01

    Decreasing the magnetic field signature of a naval vessel will reduce its susceptibility to detonating naval influence mines and the probability of a submarine being detected by underwater barriers and maritime patrol aircraft. Both passive and active techniques for reducing the magnetic signatures produced by a vessel's ferromagnetism, roll-induced eddy currents, corrosion-related sources, and stray fields are presented. Mathematical models of simple hull shapes are used to predict the levels of signature reduction that might be achieved through the use of alternate construction materials. Al

  17. Molecular signatures of thyroid follicular neoplasia

    DEFF Research Database (Denmark)

    Borup, R.; Rossing, M.; Henao, Ricardo

    2010-01-01

    The molecular pathways leading to thyroid follicular neoplasia are incompletely understood, and the diagnosis of follicular tumors is a clinical challenge. To provide leads to the pathogenesis and diagnosis of the tumors, we examined the global transcriptome signatures of follicular thyroid...... a mechanism for cancer progression, which is why we exploited the results in order to generate a molecular classifier that could identify 95% of all carcinomas. Validation employing public domain and cross-platform data demonstrated that the signature was robust and could diagnose follicular nodules...... and robust genetic signature for the diagnosis of FA and FC. Endocrine-Related Cancer (2010) 17 691-708...

  18. DIGITAL SIGNATURE IN THE WAY OF LAW

    OpenAIRE

    Ruya Samlı

    2013-01-01

    Signature can be defined as a person’s name or special signs that he/she writes when he/she wants to indicate he/she wrote or confirm that writing. A person signs many times in his/her life. A person’s signature that is used for thousands of times for many things from formal documents to exams has importance for that person. Especially, signing in legal operations is an operation that can build important results. If a person’s signature is imitated by another person, he/she can be...

  19. Molecular signatures associated with HCV-induced hepatocellular carcinoma and liver metastasis.

    Directory of Open Access Journals (Sweden)

    Valeria De Giorgi

    Full Text Available Hepatocellular carcinomas (HCCs are a heterogeneous group of tumors that differ in risk factors and genetic alterations. In Italy, particularly Southern Italy, chronic hepatitis C virus (HCV infection represents the main cause of HCC. Using high-density oligoarrays, we identified consistent differences in gene-expression between HCC and normal liver tissue. Expression patterns in HCC were also readily distinguishable from those associated with liver metastases. To characterize molecular events relevant to hepatocarcinogenesis and identify biomarkers for early HCC detection, gene expression profiling of 71 liver biopsies from HCV-related primary HCC and corresponding HCV-positive non-HCC hepatic tissue, as well as gastrointestinal liver metastases paired with the apparently normal peri-tumoral liver tissue, were compared to 6 liver biopsies from healthy individuals. Characteristic gene signatures were identified when normal tissue was compared with HCV-related primary HCC, corresponding HCV-positive non-HCC as well as gastrointestinal liver metastases. Pathway analysis classified the cellular and biological functions of the genes differentially expressed as related to regulation of gene expression and post-translational modification in HCV-related primary HCC; cellular Growth and Proliferation, and Cell-To-Cell Signaling and Interaction in HCV-related non HCC samples; Cellular Growth and Proliferation and Cell Cycle in metastasis. Also characteristic gene signatures were identified of HCV-HCC progression for early HCC diagnosis.A diagnostic molecular signature complementing conventional pathologic assessment was identified.

  20. Proliferating macrophages prevail in atherosclerosis.

    Science.gov (United States)

    Randolph, Gwendalyn J

    2013-09-01

    Macrophages accumulate in atherosclerotic lesions during the inflammation that is part of atherosclerosis development and progression. A new study in mice indicates that the accumulation of macrophages in atherosclerotic plaques depends on local macrophage proliferation rather than the recruitment of circulating monocytes.

  1. Nuclear Proliferation Technology Trends Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Zentner, Michael D.; Coles, Garill A.; Talbert, Robert J.

    2005-10-04

    A process is underway to develop mature, integrated methodologies to address nonproliferation issues. A variety of methodologies (both qualitative and quantitative) are being considered. All have one thing in common, a need for a consistent set of proliferation related data that can be used as a basis for application. One approach to providing a basis for predicting and evaluating future proliferation events is to understand past proliferation events, that is, the different paths that have actually been taken to acquire or attempt to acquire special nuclear material. In order to provide this information, this report describing previous material acquisition activities (obtained from open source material) has been prepared. This report describes how, based on an evaluation of historical trends in nuclear technology development, conclusions can be reached concerning: (1) The length of time it takes to acquire a technology; (2) The length of time it takes for production of special nuclear material to begin; and (3) The type of approaches taken for acquiring the technology. In addition to examining time constants, the report is intended to provide information that could be used to support the use of the different non-proliferation analysis methodologies. Accordingly, each section includes: (1) Technology description; (2) Technology origin; (3) Basic theory; (4) Important components/materials; (5) Technology development; (6) Technological difficulties involved in use; (7) Changes/improvements in technology; (8) Countries that have used/attempted to use the technology; (9) Technology Information; (10) Acquisition approaches; (11) Time constants for technology development; and (12) Required Concurrent Technologies.

  2. Magnetic Signature of Brushless Electric Motors

    National Research Council Canada - National Science Library

    Clarke, David

    2006-01-01

    Brushless electric motors are used in a number of underwater vehicles. When these underwater vehicles are used for mine clearance operations the magnetic signature of the brushless motors is important...

  3. Magnetic signature surveillance of nuclear fuel

    International Nuclear Information System (INIS)

    Bernatowicz, H.; Schoenig, F.C.

    1981-01-01

    Typical nuclear fuel material contains tramp ferromagnetic particles of random size and distribution. Also, selected amounts of paramagnetic or ferromagnetic material can be added at random or at known positions in the fuel material. The fuel material in its non-magnetic container is scanned along its length by magnetic susceptibility detecting apparatus whereby susceptibility changes along its length are obtained and provide a unique signal waveform of the container of fuel material as a signature thereof. The output signature is stored. At subsequent times in its life the container is again scanned and respective signatures obtained which are compared with the initially obtained signature, any differences indicating alteration or tampering with the fuel material. If the fuel material includes a paramagnetic additive by taking two measurements along the container the effects thereof can be cancelled out. (author)

  4. Blind Quantum Signature with Blind Quantum Computation

    Science.gov (United States)

    Li, Wei; Shi, Ronghua; Guo, Ying

    2017-04-01

    Blind quantum computation allows a client without quantum abilities to interact with a quantum server to perform a unconditional secure computing protocol, while protecting client's privacy. Motivated by confidentiality of blind quantum computation, a blind quantum signature scheme is designed with laconic structure. Different from the traditional signature schemes, the signing and verifying operations are performed through measurement-based quantum computation. Inputs of blind quantum computation are securely controlled with multi-qubit entangled states. The unique signature of the transmitted message is generated by the signer without leaking information in imperfect channels. Whereas, the receiver can verify the validity of the signature using the quantum matching algorithm. The security is guaranteed by entanglement of quantum system for blind quantum computation. It provides a potential practical application for e-commerce in the cloud computing and first-generation quantum computation.

  5. Signature scheme based on bilinear pairs

    Science.gov (United States)

    Tong, Rui Y.; Geng, Yong J.

    2013-03-01

    An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.

  6. Signature for the shape of the universe

    International Nuclear Information System (INIS)

    Gomero, G.I.; Reboucas, M.J.; Teixeira, A.F.F.

    2001-03-01

    If the universe has a nontrival shape (topology) the sky may show multiple correlated images of cosmic objects. These correlations can be counched in terms of distance correlations. We propose a statistical quantity which can be used to reveal the topological signature of any Roberston-Walker (RW) spacetime with nontrivial topology. We also show through computer-aided simulations how one can extract the topological signatures of flat elliptic and hyperbolic RW universes with nontrivial topology. (author)

  7. Signature-based store checking buffer

    Science.gov (United States)

    Sridharan, Vilas; Gurumurthi, Sudhanva

    2015-06-02

    A system and method for optimizing redundant output verification, are provided. A hardware-based store fingerprint buffer receives multiple instances of output from multiple instances of computation. The store fingerprint buffer generates a signature from the content included in the multiple instances of output. When a barrier is reached, the store fingerprint buffer uses the signature to verify the content is error-free.

  8. Neutral signature Walker-VSI metrics

    International Nuclear Information System (INIS)

    Coley, A; McNutt, D; Musoke, N; Brooks, D; Hervik, S

    2014-01-01

    We will construct explicit examples of four-dimensional neutral signature Walker (but not necessarily degenerate Kundt) spaces for which all of the polynomial scalar curvature invariants vanish. We then investigate the properties of some particular subclasses of Ricci flat spaces. We also briefly describe some four-dimensional neutral signature Einstein spaces for which all of the polynomial scalar curvature invariants are constant. (paper)

  9. Tightly Secure Signatures From Lossy Identification Schemes

    OpenAIRE

    Abdalla , Michel; Fouque , Pierre-Alain; Lyubashevsky , Vadim; Tibouchi , Mehdi

    2015-01-01

    International audience; In this paper, we present three digital signature schemes with tight security reductions in the random oracle model. Our first signature scheme is a particularly efficient version of the short exponent discrete log-based scheme of Girault et al. (J Cryptol 19(4):463–487, 2006). Our scheme has a tight reduction to the decisional short discrete logarithm problem, while still maintaining the non-tight reduction to the computational version of the problem upon which the or...

  10. Non proliferation of nuclear weapons?

    International Nuclear Information System (INIS)

    Le Guelte, Georges

    2015-10-01

    After having evoked the behaviour of nuclear countries regarding the development of nuclear weapons and uranium procurement, or nuclear programmes after the Second World War until nowadays, the author presents the non proliferation Treaty (NPT) as a construction at the service of super-powers. He comments and discusses the role of the IAEA control system and its evolutions: a control limited to declared installations, an export control with the spectre of plutonium, a control system thwarted by some technological innovations, information systems coming in, and an additional protocol related to the application of guarantees. He comments the evolution of the context from a bipolar world to a world without pole which raises the issue of how to have commitments respected: description of the role and practice of non proliferation during the Cold War, after the Cold War, and in a world without governance

  11. Proliferation Vulnerability Red Team report

    Energy Technology Data Exchange (ETDEWEB)

    Hinton, J.P.; Barnard, R.W.; Bennett, D.E. [and others

    1996-10-01

    This report is the product of a four-month independent technical assessment of potential proliferation vulnerabilities associated with the plutonium disposition alternatives currently under review by DOE/MD. The scope of this MD-chartered/Sandia-led study was limited to technical considerations that could reduce proliferation resistance during various stages of the disposition processes below the Stored Weapon/Spent Fuel standards. Both overt and covert threats from host nation and unauthorized parties were considered. The results of this study will be integrated with complementary work by others into an overall Nonproliferation and Arms Control Assessment in support of a Secretarial Record of Decision later this year for disposition of surplus U.S. weapons plutonium.

  12. A Black Hole Spectral Signature

    Science.gov (United States)

    Titarchuk, Lev; Laurent, Philippe

    2000-03-01

    An accreting black hole is, by definition, characterized by the drain. Namely, the matter falls into a black hole much the same way as water disappears down a drain matter goes in and nothing comes out. As this can only happen in a black hole, it provides a way to see ``a black hole'', an unique observational signature. The accretion proceeds almost in a free-fall manner close to the black hole horizon, where the strong gravitational field dominates the pressure forces. In this paper we present analytical calculations and Monte-Carlo simulations of the specific features of X-ray spectra formed as a result of upscattering of the soft (disk) photons in the converging inflow (CI) into the black hole. The full relativistic treatment has been implemented to reproduce these spectra. We show that spectra in the soft state of black hole systems (BHS) can be described as the sum of a thermal (disk) component and the convolution of some fraction of this component with the CI upscattering spread (Greens) function. The latter boosted photon component is seen as an extended power-law at energies much higher than the characteristic energy of the soft photons. We demonstrate the stability of the power spectral index over a wide range of the plasma temperature 0 - 10 keV and mass accretion rates (higher than 2 in Eddington units). We also demonstrate that the sharp high energy cutoff occurs at energies of 200-400 keV which are related to the average energy of electrons mec2 impinging upon the event horizon. The spectrum is practically identical to the standard thermal Comptonization spectrum when the CI plasma temperature is getting of order of 50 keV (the typical ones for the hard state of BHS). In this case one can see the effect of the bulk motion only at high energies where there is an excess in the CI spectrum with respect to the pure thermal one. Furthermore we demonstrate that the change of spectral shapes from the soft X-ray state to the hard X-ray state is clearly to be

  13. Nuclear power and weapons proliferation

    International Nuclear Information System (INIS)

    Greenwood, T.; Rathjens, C.W.; Ruina, J.

    1977-01-01

    The relationship between nuclear weapons development and nuclear electric power is examined. A brief description of nuclear weapons design is first given. This is then followed by a discussion of various aspects of nuclear power technology and of how they affect a nuclear weapon programme. These include fuel cycles, chemical reprocessing of spent fuel, uranium enrichment, and the control of dissemination of nuclear technology. In conclusion there is a discussion of possible political and institutional controls for limiting nuclear proliferation. (U.K.)

  14. CBRN and proliferation in Asia

    International Nuclear Information System (INIS)

    Brisset, Jean-Vincent

    2015-01-01

    The author proposes a brief overview of the history, evolution and status of military nuclear weapons and programmes as well as bacteriologic and chemical weapons (nuclear weapons, ballistic missile, and position with respect with the Conventions on chemical and bacteriologic weapons) in Asian countries (China, Japan, India, Pakistan, North Korea). In a second part, he discusses issues related to exports and possible proliferation from these countries

  15. Neural control of colonic cell proliferation.

    Science.gov (United States)

    Tutton, P J; Barkla, D H

    1980-03-15

    The mitotic rate in rat colonic crypts and in dimethylhydrazine-induced colonic carcinomas was measured using a stathmokinetic technique. In sympathectomized animals cell proliferation was retarded in the crypts but not in the tumors, whereas in animals treated with Metaraminol, a drug which releases norepinephrine from nerve terminals, crypt cell but not tumor cell proliferation was accelerated. Blockade of alpha-adrenoceptors also inhibited crypt cell proliferation. However, stimulation of beta-adrenoceptors inhibited and blockade of beta-adrenoceptors accelerated tumor cell proliferation without influencing crypt cell proliferation. Injection of either serotonin or histamine stimulated tumor but not crypt cell proliferation and blockade or serotonin receptors or histamine H2-receptors inhibited tumor cell proliferation. It is postulated that cell proliferation in the colonic crypts, like that in the jejunal crypts, is under both endocrine and autonomic neural control whereas colonic tumor cell division is subject to endocrine regulation alone.

  16. Does Twitter trigger bursts in signature collections?

    Directory of Open Access Journals (Sweden)

    Rui Yamaguchi

    Full Text Available INTRODUCTION: The quantification of social media impacts on societal and political events is a difficult undertaking. The Japanese Society of Oriental Medicine started a signature-collecting campaign to oppose a medical policy of the Government Revitalization Unit to exclude a traditional Japanese medicine, "Kampo," from the public insurance system. The signature count showed a series of aberrant bursts from November 26 to 29, 2009. In the same interval, the number of messages on Twitter including the keywords "Signature" and "Kampo," increased abruptly. Moreover, the number of messages on an Internet forum that discussed the policy and called for signatures showed a train of spikes. METHODS AND FINDINGS: In order to estimate the contributions of social media, we developed a statistical model with state-space modeling framework that distinguishes the contributions of multiple social media in time-series of collected public opinions. We applied the model to the time-series of signature counts of the campaign and quantified contributions of two social media, i.e., Twitter and an Internet forum, by the estimation. We found that a considerable portion (78% of the signatures was affected from either of the social media throughout the campaign and the Twitter effect (26% was smaller than the Forum effect (52% in total, although Twitter probably triggered the initial two bursts of signatures. Comparisons of the estimated profiles of the both effects suggested distinctions between the social media in terms of sustainable impact of messages or tweets. Twitter shows messages on various topics on a time-line; newer messages push out older ones. Twitter may diminish the impact of messages that are tweeted intermittently. CONCLUSIONS: The quantification of social media impacts is beneficial to better understand people's tendency and may promote developing strategies to engage public opinions effectively. Our proposed method is a promising tool to explore

  17. Does Twitter trigger bursts in signature collections?

    Science.gov (United States)

    Yamaguchi, Rui; Imoto, Seiya; Kami, Masahiro; Watanabe, Kenji; Miyano, Satoru; Yuji, Koichiro

    2013-01-01

    The quantification of social media impacts on societal and political events is a difficult undertaking. The Japanese Society of Oriental Medicine started a signature-collecting campaign to oppose a medical policy of the Government Revitalization Unit to exclude a traditional Japanese medicine, "Kampo," from the public insurance system. The signature count showed a series of aberrant bursts from November 26 to 29, 2009. In the same interval, the number of messages on Twitter including the keywords "Signature" and "Kampo," increased abruptly. Moreover, the number of messages on an Internet forum that discussed the policy and called for signatures showed a train of spikes. In order to estimate the contributions of social media, we developed a statistical model with state-space modeling framework that distinguishes the contributions of multiple social media in time-series of collected public opinions. We applied the model to the time-series of signature counts of the campaign and quantified contributions of two social media, i.e., Twitter and an Internet forum, by the estimation. We found that a considerable portion (78%) of the signatures was affected from either of the social media throughout the campaign and the Twitter effect (26%) was smaller than the Forum effect (52%) in total, although Twitter probably triggered the initial two bursts of signatures. Comparisons of the estimated profiles of the both effects suggested distinctions between the social media in terms of sustainable impact of messages or tweets. Twitter shows messages on various topics on a time-line; newer messages push out older ones. Twitter may diminish the impact of messages that are tweeted intermittently. The quantification of social media impacts is beneficial to better understand people's tendency and may promote developing strategies to engage public opinions effectively. Our proposed method is a promising tool to explore information hidden in social phenomena.

  18. Molecular subsets in the gene expression signatures of scleroderma skin.

    Directory of Open Access Journals (Sweden)

    Ausra Milano

    2008-07-01

    Full Text Available Scleroderma is a clinically heterogeneous disease with a complex phenotype. The disease is characterized by vascular dysfunction, tissue fibrosis, internal organ dysfunction, and immune dysfunction resulting in autoantibody production.We analyzed the genome-wide patterns of gene expression with DNA microarrays in skin biopsies from distinct scleroderma subsets including 17 patients with systemic sclerosis (SSc with diffuse scleroderma (dSSc, 7 patients with SSc with limited scleroderma (lSSc, 3 patients with morphea, and 6 healthy controls. 61 skin biopsies were analyzed in a total of 75 microarray hybridizations. Analysis by hierarchical clustering demonstrates nearly identical patterns of gene expression in 17 out of 22 of the forearm and back skin pairs of SSc patients. Using this property of the gene expression, we selected a set of 'intrinsic' genes and analyzed the inherent data-driven groupings. Distinct patterns of gene expression separate patients with dSSc from those with lSSc and both are easily distinguished from normal controls. Our data show three distinct patient groups among the patients with dSSc and two groups among patients with lSSc. Each group can be distinguished by unique gene expression signatures indicative of proliferating cells, immune infiltrates and a fibrotic program. The intrinsic groups are statistically significant (p<0.001 and each has been mapped to clinical covariates of modified Rodnan skin score, interstitial lung disease, gastrointestinal involvement, digital ulcers, Raynaud's phenomenon and disease duration. We report a 177-gene signature that is associated with severity of skin disease in dSSc.Genome-wide gene expression profiling of skin biopsies demonstrates that the heterogeneity in scleroderma can be measured quantitatively with DNA microarrays. The diversity in gene expression demonstrates multiple distinct gene expression programs in the skin of patients with scleroderma.

  19. Liver regeneration signature in hepatitis B virus (HBV-associated acute liver failure identified by gene expression profiling.

    Directory of Open Access Journals (Sweden)

    Oriel Nissim

    Full Text Available The liver has inherent regenerative capacity via mitotic division of mature hepatocytes or, when the hepatic loss is massive or hepatocyte proliferation is impaired, through activation of hepatic stem/progenitor cells (HSPC. The dramatic clinical course of acute liver failure (ALF has posed major limitations to investigating the molecular mechanisms of liver regeneration and the role of HSPC in this setting. We investigated the molecular mechanisms of liver regeneration in 4 patients who underwent liver transplantation for hepatitis B virus (HBV-associated ALF.Gene expression profiling of 17 liver specimens from the 4 ALF cases and individual specimens from 10 liver donors documented a distinct gene signature for ALF. However, unsupervised multidimensional scaling and hierarchical clustering identified two clusters of ALF that segregated according to histopathological severity massive hepatic necrosis (MHN; 2 patients and submassive hepatic necrosis (SHN; 2 patients. We found that ALF is characterized by a strong HSPC gene signature, along with ductular reaction, both of which are more prominent in MHN. Interestingly, no evidence of further lineage differentiation was seen in MHN, whereas in SHN we detected cells with hepatocyte-like morphology. Strikingly, ALF was associated with a strong tumorigenesis gene signature. MHN had the greatest upregulation of stem cell genes (EpCAM, CK19, CK7, whereas the most up-regulated genes in SHN were related to cellular growth and proliferation. The extent of liver necrosis correlated with an overriding fibrogenesis gene signature, reflecting the wound-healing process.Our data provide evidence for a distinct gene signature in HBV-associated ALF whose intensity is directly correlated with the histopathological severity. HSPC activation and fibrogenesis positively correlated with the extent of liver necrosis. Moreover, we detected a tumorigenesis gene signature in ALF, emphasizing the close relationship between

  20. Research on a New Signature Scheme on Blockchain

    Directory of Open Access Journals (Sweden)

    Chao Yuan

    2017-01-01

    Full Text Available With the rise of Bitcoin, blockchain which is the core technology of Bitcoin has received increasing attention. Privacy preserving and performance on blockchain are two research points in academia and business, but there are still some unresolved issues in both respects. An aggregate signature scheme is a digital signature that supports making signatures on many different messages generated by many different users. Using aggregate signature, the size of the signature could be shortened by compressing multiple signatures into a single signature. In this paper, a new signature scheme for transactions on blockchain based on the aggregate signature was proposed. It was worth noting that elliptic curve discrete logarithm problem and bilinear maps played major roles in our signature scheme. And the security properties of our signature scheme were proved. In our signature scheme, the amount will be hidden especially in the transactions which contain multiple inputs and outputs. Additionally, the size of the signature on transaction is constant regardless of the number of inputs and outputs that the transaction contains, which can improve the performance of signature. Finally, we gave an application scenario for our signature scheme which aims to achieve the transactions of big data on blockchain.

  1. Lattice-Based Revocable Certificateless Signature

    Directory of Open Access Journals (Sweden)

    Ying-Hao Hung

    2017-10-01

    Full Text Available Certificateless signatures (CLS are noticeable because they may resolve the key escrow problem in ID-based signatures and break away the management problem regarding certificate in conventional signatures. However, the security of the mostly previous CLS schemes relies on the difficulty of solving discrete logarithm or large integer factorization problems. These two problems would be solved by quantum computers in the future so that the signature schemes based on them will also become insecure. For post-quantum cryptography, lattice-based cryptography is significant due to its efficiency and security. However, no study on addressing the revocation problem in the existing lattice-based CLS schemes is presented. In this paper, we focus on the revocation issue and present the first revocable CLS (RCLS scheme over lattices. Based on the short integer solution (SIS assumption over lattices, the proposed lattice-based RCLS scheme is shown to be existential unforgeability against adaptive chosen message attacks. By performance analysis and comparisons, the proposed lattice-based RCLS scheme is better than the previously proposed lattice-based CLS scheme, in terms of private key size, signature length and the revocation mechanism.

  2. Calculated NWIS signatures for enriched uranium metal

    International Nuclear Information System (INIS)

    Valentine, T.E.; Mihalczo, J.T.; Koehler, P.E.

    1995-01-01

    Nuclear Weapons Identification System (NWIS) signatures have been calculated using a Monte Carlo transport code for measurement configurations of a 252 Cf source, detectors, and a uranium metal casting. NWIS signatures consist of a wide variety of time-and frequency-analysis signatures such as the time distribution of neutrons after californium fission, the time distribution of counts in a detector after a previous count, the number of times n pulses occur in a time interval, and various frequency-analysis signatures, such as auto-power and cross-power spectral densities, coherences, and a ratio of spectral densities. This ratio is independent of detection efficiency. The analysis presented here, using the MCNP-DSP code, evaluates the applicability of this method for measurement of the 235 U content of 19-kg castings of depleted uranium and uranium with enrichments of 20, 40, 60, 80, 90, and 93.2 wt % 235 U. The dependence of the wide variety of NWIS signatures on 235 U content and possible configurations of a measurement system are presented. These preliminary calculations indicate short measurement times. Additional calculations are being performed to optimize the source-detector-moderator-casting configuration for the shortest measurement time. Although the NWIS method was developed for nuclear weapons identification, the development of a small processor now allows it to be also applied in a practical way to subcriticality measurements, nuclear fuel process monitoring and qualitative nondestructive assay of special nuclear material

  3. The European dimension in non-proliferation

    International Nuclear Information System (INIS)

    Krause, J.

    1996-01-01

    Europe was for decades the focal point of efforts to prevent or constrain nuclear proliferation and the first region in which non-proliferation efforts failed. Paper deals with current proliferation problems in Europe, namely, diversion of weapons, diversion from dismantling, production over-capacity, security concerns. Legal instruments against proliferation in Europe described here include development of international norms; instruments of security assurance and cooperation; disarmament assistance; fissile material management; assistance in creating export control systems; improving and harmonizing export controls for dual-purpose items. Problems in implementing non-proliferation instruments are described separately

  4. The international nuclear non-proliferation system

    International Nuclear Information System (INIS)

    Simpson, J.; McGrew, T.

    1985-01-01

    This volume focuses upon the issues raised at this Conference, and attempts to address the international diplomatic, political and trading, rather than technical, questions which surround nuclear non-proliferation policies. It does so by bringing together chapters contributed by participants in non-proliferation diplomacy, those with experience in shaping International Atomic Energy Agency and national policies and academic observers of non-proliferation activities and the international nuclear industry. An analysis is provided of past non-proliferation policies and activities and current issues, and an attempt is made to offer ideas for new initiatives which may sustain the non-proliferation system in the future

  5. Trace element ink spiking for signature authentication

    International Nuclear Information System (INIS)

    Hatzistavros, V.S.; Kallithrakas-Kontos, N.G.

    2008-01-01

    Signature authentication is a critical question in forensic document examination. Last years the evolution of personal computers made signature copying a quite easy task, so the development of new ways for signature authentication is crucial. In the present work a commercial ink was spiked with many trace elements in various concentrations. Inorganic and organometallic ink soluble compounds were used as spiking agents, whilst ink retained its initial properties. The spiked inks were used for paper writing and the documents were analyzed by a non destructive method, the energy dispersive X-ray fluorescence. The thin target model was proved right for quantitative analysis and a very good linear relationship of the intensity (X-ray signal) against concentration was estimated for all used elements. Intensity ratios between different elements in the same ink gave very stable results, independent on the writing alterations. The impact of time both to written document and prepared inks was also investigated. (author)

  6. A Methodology for Calculating Radiation Signatures

    Energy Technology Data Exchange (ETDEWEB)

    Klasky, Marc Louis [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Wilcox, Trevor [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Bathke, Charles G. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); James, Michael R. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-05-01

    A rigorous formalism is presented for calculating radiation signatures from both Special Nuclear Material (SNM) as well as radiological sources. The use of MCNP6 in conjunction with CINDER/ORIGEN is described to allow for the determination of both neutron and photon leakages from objects of interest. In addition, a description of the use of MCNP6 to properly model the background neutron and photon sources is also presented. Examinations of the physics issues encountered in the modeling are investigated so as to allow for guidance in the user discerning the relevant physics to incorporate into general radiation signature calculations. Furthermore, examples are provided to assist in delineating the pertinent physics that must be accounted for. Finally, examples of detector modeling utilizing MCNP are provided along with a discussion on the generation of Receiver Operating Curves, which are the suggested means by which to determine detectability radiation signatures emanating from objects.

  7. Cryptanalysis of the arbitrated quantum signature protocols

    International Nuclear Information System (INIS)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-01-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  8. Molecular Signature in HCV-Positive Lymphomas

    Directory of Open Access Journals (Sweden)

    Valli De Re

    2012-01-01

    Full Text Available Hepatitis C virus (HCV is a positive, single-stranded RNA virus, which has been associated to different subtypes of B-cell non-Hodgkin lymphoma (B-NHL. Cumulative evidence suggests an HCV-related antigen driven process in the B-NHL development. The underlying molecular signature associated to HCV-related B-NHL has to date remained obscure. In this review, we discuss the recent developments in this field with a special mention to different sets of genes whose expression is associated with BCR coupled to Blys signaling which in turn was found to be linked to B-cell maturation stages and NF-κb transcription factor. Even if recent progress on HCV-B-NHL signature has been made, the precise relationship between HCV and lymphoma development and phenotype signature remain to be clarified.

  9. Selection signatures in worldwide sheep populations.

    Science.gov (United States)

    Fariello, Maria-Ines; Servin, Bertrand; Tosser-Klopp, Gwenola; Rupp, Rachel; Moreno, Carole; San Cristobal, Magali; Boitard, Simon

    2014-01-01

    The diversity of populations in domestic species offers great opportunities to study genome response to selection. The recently published Sheep HapMap dataset is a great example of characterization of the world wide genetic diversity in sheep. In this study, we re-analyzed the Sheep HapMap dataset to identify selection signatures in worldwide sheep populations. Compared to previous analyses, we made use of statistical methods that (i) take account of the hierarchical structure of sheep populations, (ii) make use of linkage disequilibrium information and (iii) focus specifically on either recent or older selection signatures. We show that this allows pinpointing several new selection signatures in the sheep genome and distinguishing those related to modern breeding objectives and to earlier post-domestication constraints. The newly identified regions, together with the ones previously identified, reveal the extensive genome response to selection on morphology, color and adaptation to new environments.

  10. Biomarker Gene Signature Discovery Integrating Network Knowledge

    Directory of Open Access Journals (Sweden)

    Holger Fröhlich

    2012-02-01

    Full Text Available Discovery of prognostic and diagnostic biomarker gene signatures for diseases, such as cancer, is seen as a major step towards a better personalized medicine. During the last decade various methods, mainly coming from the machine learning or statistical domain, have been proposed for that purpose. However, one important obstacle for making gene signatures a standard tool in clinical diagnosis is the typical low reproducibility of these signatures combined with the difficulty to achieve a clear biological interpretation. For that purpose in the last years there has been a growing interest in approaches that try to integrate information from molecular interaction networks. Here we review the current state of research in this field by giving an overview about so-far proposed approaches.

  11. Estimating physiological skin parameters from hyperspectral signatures

    Science.gov (United States)

    Vyas, Saurabh; Banerjee, Amit; Burlina, Philippe

    2013-05-01

    We describe an approach for estimating human skin parameters, such as melanosome concentration, collagen concentration, oxygen saturation, and blood volume, using hyperspectral radiometric measurements (signatures) obtained from in vivo skin. We use a computational model based on Kubelka-Munk theory and the Fresnel equations. This model forward maps the skin parameters to a corresponding multiband reflectance spectra. Machine-learning-based regression is used to generate the inverse map, and hence estimate skin parameters from hyperspectral signatures. We test our methods using synthetic and in vivo skin signatures obtained in the visible through the short wave infrared domains from 24 patients of both genders and Caucasian, Asian, and African American ethnicities. Performance validation shows promising results: good agreement with the ground truth and well-established physiological precepts. These methods have potential use in the characterization of skin abnormalities and in minimally-invasive prescreening of malignant skin cancers.

  12. Nanoparticles for cells proliferation enhancement

    International Nuclear Information System (INIS)

    Popa, V.; Braniste, F.; Tiginyanu, I.M.; Lisii, C.; Nacu, V.

    2013-01-01

    The potential of semiconductor nanoparticles as stimulator for avian mesenchyme stem cells proliferation enhancement is demonstrated. The effect is related to nanoparticles polarization due to external ultrasound field resulting in local electrical stimulation. Our preliminary results demonstrates that the number of cells have been increased by 23 % ±2%) in cell cultures under the action of external ultrasound stimulation. Morphological analysis and viability shows no differences between the control group and the group studied. These results suggest the possibility for tissue regeneration enhancement by remote stimulation of implanted semiconductor nanoparticles. (authors)

  13. Peripheral blood signatures of lead exposure.

    Directory of Open Access Journals (Sweden)

    Heather G LaBreche

    Full Text Available BACKGROUND: Current evidence indicates that even low-level lead (Pb exposure can have detrimental effects, especially in children. We tested the hypothesis that Pb exposure alters gene expression patterns in peripheral blood cells and that these changes reflect dose-specific alterations in the activity of particular pathways. METHODOLOGY/PRINCIPAL FINDING: Using Affymetrix Mouse Genome 430 2.0 arrays, we examined gene expression changes in the peripheral blood of female Balb/c mice following exposure to per os lead acetate trihydrate or plain drinking water for two weeks and after a two-week recovery period. Data sets were RMA-normalized and dose-specific signatures were generated using established methods of supervised classification and binary regression. Pathway activity was analyzed using the ScoreSignatures module from GenePattern. CONCLUSIONS/SIGNIFICANCE: The low-level Pb signature was 93% sensitive and 100% specific in classifying samples a leave-one-out crossvalidation. The high-level Pb signature demonstrated 100% sensitivity and specificity in the leave-one-out crossvalidation. These two signatures exhibited dose-specificity in their ability to predict Pb exposure and had little overlap in terms of constituent genes. The signatures also seemed to reflect current levels of Pb exposure rather than past exposure. Finally, the two doses showed differential activation of cellular pathways. Low-level Pb exposure increased activity of the interferon-gamma pathway, whereas high-level Pb exposure increased activity of the E2F1 pathway.

  14. The USA and proliferation in Northeast Asia

    International Nuclear Information System (INIS)

    Weeks, S.B.

    1995-01-01

    United States policy on proliferation in Northeast Asia poses a test of balance between general US global non-proliferation goals and specific US regional security goals for Northeast Asia. US policy on proliferation in Northeast Asia further poses a test of priorities for US bilateral relations with the key Northeast Asian states, as non-proliferation and regional security goals must be weighed against other (e.g., economic, human rights) declared US policy goals. The result is a US policy equation for Northeast Asia proliferation that is considerably more complex in execution than might be expected from the simple statement of the US goal to avoid nuclear proliferation in Northeast Asia. The question of security assurances - both negative and positive - may be closely related to US policies to avoid proliferation in Northeast Asia

  15. Fissile material disposition and proliferation risk

    Energy Technology Data Exchange (ETDEWEB)

    Dreicer, J.S.; Rutherford, D.A. [Los Alamos National Lab., NM (United States). NIS Div.

    1996-05-01

    The proliferation risk of a facility is dependent on the material attractiveness, level of safeguards, and physical protection applied to the material in conjunction with an assessment of the impact of the socioeconomic circumstances and threat environment. Proliferation risk is a complementary extension of proliferation resistance. The authors believe a better determination of nuclear material proliferation can be achieved by establishing the proliferation risk for facilities that contain nuclear material. Developing a method that incorporates the socioeconomic circumstances and threat environment inherent to each country enables a global proliferation assessment. In order to effectively reduce the nuclear danger, a broadly based set of criteria is needed that provides the capability to relatively assess a wide range of disposition options/facilities in different countries and still ensure a global decrease in proliferation risk for plutonium.

  16. Fissile material disposition and proliferation risk

    International Nuclear Information System (INIS)

    Dreicer, J.S.; Rutherford, D.A.

    1996-01-01

    The proliferation risk of a facility is dependent on the material attractiveness, level of safeguards, and physical protection applied to the material in conjunction with an assessment of the impact of the socioeconomic circumstances and threat environment. Proliferation risk is a complementary extension of proliferation resistance. The authors believe a better determination of nuclear material proliferation can be achieved by establishing the proliferation risk for facilities that contain nuclear material. Developing a method that incorporates the socioeconomic circumstances and threat environment inherent to each country enables a global proliferation assessment. In order to effectively reduce the nuclear danger, a broadly based set of criteria is needed that provides the capability to relatively assess a wide range of disposition options/facilities in different countries and still ensure a global decrease in proliferation risk for plutonium

  17. Predictive gene signatures: molecular markers distinguishing colon adenomatous polyp and carcinoma.

    Directory of Open Access Journals (Sweden)

    Janice E Drew

    Full Text Available Cancers exhibit abnormal molecular signatures associated with disease initiation and progression. Molecular signatures could improve cancer screening, detection, drug development and selection of appropriate drug therapies for individual patients. Typically only very small amounts of tissue are available from patients for analysis and biopsy samples exhibit broad heterogeneity that cannot be captured using a single marker. This report details application of an in-house custom designed GenomeLab System multiplex gene expression assay, the hCellMarkerPlex, to assess predictive gene signatures of normal, adenomatous polyp and carcinoma colon tissue using archived tissue bank material. The hCellMarkerPlex incorporates twenty-one gene markers: epithelial (EZR, KRT18, NOX1, SLC9A2, proliferation (PCNA, CCND1, MS4A12, differentiation (B4GANLT2, CDX1, CDX2, apoptotic (CASP3, NOX1, NTN1, fibroblast (FSP1, COL1A1, structural (ACTG2, CNN1, DES, gene transcription (HDAC1, stem cell (LGR5, endothelial (VWF and mucin production (MUC2. Gene signatures distinguished normal, adenomatous polyp and carcinoma. Individual gene targets significantly contributing to molecular tissue types, classifier genes, were further characterised using real-time PCR, in-situ hybridisation and immunohistochemistry revealing aberrant epithelial expression of MS4A12, LGR5 CDX2, NOX1 and SLC9A2 prior to development of carcinoma. Identified gene signatures identify aberrant epithelial expression of genes prior to cancer development using in-house custom designed gene expression multiplex assays. This approach may be used to assist in objective classification of disease initiation, staging, progression and therapeutic responses using biopsy material.

  18. Doppler Velocity Signatures of Idealized Elliptical Vortices

    Directory of Open Access Journals (Sweden)

    Wen-Chau Lee

    2006-01-01

    Full Text Available Doppler radar observations have revealed a class of atmospheric vortices (tropical cyclones, tornadoes, dust devils that possess elliptical radar reflectivity signatures. One famous example is Typhoon Herb (1996 that maintained its elliptical reflectivity structure over a 40-hour period. Theoretical work and dual-Doppler analyses of observed tropical cyclones have suggested two physical mechanisms that can explain the formation of two types of elliptical vortices observed in nature, namely, the combination of a circular vortex with either a wavenumber two vortex Rossby wave or a deformation field. The characteristics of these two types of elliptical vortices and their corresponding Doppler velocity signatures have not been previously examined.

  19. KEA-71 Smart Current Signature Sensor (SCSS)

    Science.gov (United States)

    Perotti, Jose M.

    2010-01-01

    This slide presentation reviews the development and uses of the Smart Current Signature Sensor (SCSS), also known as the Valve Health Monitor (VHM) system. SCSS provides a way to not only monitor real-time the valve's operation in a non invasive manner, but also to monitor its health (Fault Detection and Isolation) and identify potential faults and/or degradation in the near future (Prediction/Prognosis). This technology approach is not only applicable for solenoid valves, and it could be extrapolated to other electrical components with repeatable electrical current signatures such as motors.

  20. Security problem on arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Choi, Jeong Woon; Chang, Ku-Young; Hong, Dowon

    2011-01-01

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  1. Plasma Signatures of Radial Field Power Dropouts

    International Nuclear Information System (INIS)

    Lucek, E.A.; Horbury, T.S.; Balogh, A.; McComas, D.J.

    1998-01-01

    A class of small scale structures, with a near-radial magnetic field and a drop in magnetic field fluctuation power, have recently been identified in the polar solar wind. An earlier study of 24 events, each lasting for 6 hours or more, identified no clear plasma signature. In an extension of that work, radial intervals lasting for 4 hours or more (89 in total), have been used to search for a statistically significant plasma signature. It was found that, despite considerable variations between intervals, there was a small but significant drop, on average, in plasma temperature, density and β during these events

  2. Transient thermal camouflage and heat signature control

    Science.gov (United States)

    Yang, Tian-Zhi; Su, Yishu; Xu, Weikai; Yang, Xiao-Dong

    2016-09-01

    Thermal metamaterials have been proposed to manipulate heat flux as a new way to cloak or camouflage objects in the infrared world. To date, however, thermal metamaterials only operate in the steady-state and exhibit detectable, transient heat signatures. In this letter, the theoretical basis for a thermal camouflaging technique with controlled transient diffusion is presented. This technique renders an object invisible in real time. More importantly, the thermal camouflaging device instantaneously generates a pre-designed heat signature and behaves as a perfect thermal illusion device. A metamaterial coating with homogeneous and isotropic thermal conductivity, density, and volumetric heat capacity was fabricated and very good camouflaging performance was achieved.

  3. Security problem on arbitrated quantum signature schemes

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Jeong Woon [Emerging Technology R and D Center, SK Telecom, Kyunggi 463-784 (Korea, Republic of); Chang, Ku-Young; Hong, Dowon [Cryptography Research Team, Electronics and Telecommunications Research Institute, Daejeon 305-700 (Korea, Republic of)

    2011-12-15

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  4. Non-proliferation and disarmament

    International Nuclear Information System (INIS)

    Ritter von Wagner, A.

    1993-01-01

    In 1995 the Conference on the prolongation of the Non-Proliferation Treaty will take place. Will it be extended for a long term, indefinitely or only for a fixed period? The Federal Government of Germany advocates an unlimited extension of the Non-Proliferation Treaty. Others have different ideas alleging that the Treaty is imperfect and discriminating. It is a thorn in the side of many States, in particular of the Third World, which no longer want to put up with being treated as second-class states. One argument which is considered especially embarrassing by developing countries as a visible expression of such discrimination, are the nuclear tests which are still carried out by nuclear weapon states. Is the political situation still such that one needs those weapons? Strategists gradually find it difficult to argument; over and over again they claim that an abandonment of nuclear weapons would make the world unsafer. But development has gradually passed over them. Nevertheless, one finds it hard to throw overboard considerations which for years have determined one's thinking. (orig./HSCH) [de

  5. Gas Centrifuges and Nuclear Proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Albright, David

    2004-09-15

    Gas centrifuges have been an ideal enrichment method for a wide variety of countries. Many countries have built gas centrifuges to make enriched uranium for peaceful nuclear purposes. Other countries have secretly sought centrifuges to make highly enriched uranium for nuclear weapons. In more recent times, several countries have secretly sought or built gas centrifuges in regions of tension. The main countries that have been of interest in the last two decades have been Pakistan, Iraq, Iran, and North Korea. Currently, most attention is focused on Iran, Pakistan, and North Korea. These states did not have the indigenous abilities to make gas centrifuges, focusing instead on illicit and questionable foreign procurement. The presentation covered the following main sections: Spread of centrifuges through illicit procurement; Role of export controls in stopping proliferation; Increasing the transparency of gas centrifuge programs in non-nuclear weapon states; and, Verified dismantlement of gas centrifuge programs. Gas centrifuges are important providers of low enriched uranium for civil nuclear power reactors. They also pose special nuclear proliferation risks. We all have special responsibilities to prevent the spread of gas centrifuges into regions of tension and to mitigate the consequences of their spread into the Middle East, South Asia, and North Asia.

  6. COMPUTER-IMPLEMENTED METHOD OF PERFORMING A SEARCH USING SIGNATURES

    DEFF Research Database (Denmark)

    2017-01-01

    A computer-implemented method of processing a query vector and a data vector), comprising: generating a set of masks and a first set of multiple signatures and a second set of multiple signatures by applying the set of masks to the query vector and the data vector, respectively, and generating...... candidate pairs, of a first signature and a second signature, by identifying matches of a first signature and a second signature. The set of masks comprises a configuration of the elements that is a Hadamard code; a permutation of a Hadamard code; or a code that deviates from a Hadamard code...

  7. Quantum multi-signature protocol based on teleportation

    International Nuclear Information System (INIS)

    Wen Xiao-jun; Liu Yun; Sun Yu

    2007-01-01

    In this paper, a protocol which can be used in multi-user quantum signature is proposed. The scheme of signature and verification is based on the correlation of Greenberger-Horne-Zeilinger (GHZ) states and the controlled quantum teleportation. Different from the digital signatures, which are based on computational complexity, the proposed protocol has perfect security in the noiseless quantum channels. Compared to previous quantum signature schemes, this protocol can verify the signature independent of an arbitrator as well as realize multi-user signature together. (orig.)

  8. A group signature scheme based on quantum teleportation

    International Nuclear Information System (INIS)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu

    2010-01-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  9. A group signature scheme based on quantum teleportation

    Energy Technology Data Exchange (ETDEWEB)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu, E-mail: wxjun36@gmail.co [Information Countermeasure Technique Research Institute, Harbin Institute of Technology, Harbin 150001 (China)

    2010-05-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  10. Gene Expression Signature in Adipose Tissue of Acromegaly Patients

    Science.gov (United States)

    Hochberg, Irit; Tran, Quynh T.; Barkan, Ariel L.; Saltiel, Alan R.; Chandler, William F.; Bridges, Dave

    2015-01-01

    To study the effect of chronic excess growth hormone on adipose tissue, we performed RNA sequencing in adipose tissue biopsies from patients with acromegaly (n = 7) or non-functioning pituitary adenomas (n = 11). The patients underwent clinical and metabolic profiling including assessment of HOMA-IR. Explants of adipose tissue were assayed ex vivo for lipolysis and ceramide levels. Patients with acromegaly had higher glucose, higher insulin levels and higher HOMA-IR score. We observed several previously reported transcriptional changes (IGF1, IGFBP3, CISH, SOCS2) that are known to be induced by GH/IGF-1 in liver but are also induced in adipose tissue. We also identified several novel transcriptional changes, some of which may be important for GH/IGF responses (PTPN3 and PTPN4) and the effects of acromegaly on growth and proliferation. Several differentially expressed transcripts may be important in GH/IGF-1-induced metabolic changes. Specifically, induction of LPL, ABHD5, and NRIP1 can contribute to enhanced lipolysis and may explain the elevated adipose tissue lipolysis in acromegalic patients. Higher expression of TCF7L2 and the fatty acid desaturases FADS1, FADS2 and SCD could contribute to insulin resistance. Ceramides were not different between the two groups. In summary, we have identified the acromegaly gene expression signature in human adipose tissue. The significance of altered expression of specific transcripts will enhance our understanding of the metabolic and proliferative changes associated with acromegaly. PMID:26087292

  11. Integrated microRNA and mRNA signatures associated with survival in triple negative breast cancer.

    Science.gov (United States)

    Cascione, Luciano; Gasparini, Pierluigi; Lovat, Francesca; Carasi, Stefania; Pulvirenti, Alfredo; Ferro, Alfredo; Alder, Hansjuerg; He, Gang; Vecchione, Andrea; Croce, Carlo M; Shapiro, Charles L; Huebner, Kay

    2013-01-01

    Triple negative breast cancer (TNBC) is a heterogeneous disease at the molecular, pathologic and clinical levels. To stratify TNBCs, we determined microRNA (miRNA) expression profiles, as well as expression profiles of a cancer-focused mRNA panel, in tumor, adjacent non-tumor (normal) and lymph node metastatic lesion (mets) tissues, from 173 women with TNBCs; we linked specific miRNA signatures to patient survival and used miRNA/mRNA anti-correlations to identify clinically and genetically different TNBC subclasses. We also assessed miRNA signatures as potential regulators of TNBC subclass-specific gene expression networks defined by expression of canonical signal pathways.Tissue specific miRNAs and mRNAs were identified for normal vs tumor vs mets comparisons. miRNA signatures correlated with prognosis were identified and predicted anti-correlated targets within the mRNA profile were defined. Two miRNA signatures (miR-16, 155, 125b, 374a and miR-16, 125b, 374a, 374b, 421, 655, 497) predictive of overall survival (P = 0.05) and distant-disease free survival (P = 0.009), respectively, were identified for patients 50 yrs of age or younger. By multivariate analysis the risk signatures were independent predictors for overall survival and distant-disease free survival. mRNA expression profiling, using the cancer-focused mRNA panel, resulted in clustering of TNBCs into 4 molecular subclasses with different expression signatures anti-correlated with the prognostic miRNAs. Our findings suggest that miRNAs play a key role in triple negative breast cancer through their ability to regulate fundamental pathways such as: cellular growth and proliferation, cellular movement and migration, Extra Cellular Matrix degradation. The results define miRNA expression signatures that characterize and contribute to the phenotypic diversity of TNBC and its metastasis.

  12. Lorentz violations and Euclidean signature metrics

    International Nuclear Information System (INIS)

    Barbero G, J. Fernando; Villasenor, Eduardo J.S.

    2003-01-01

    We show that the families of effective actions considered by Jacobson et al. to study Lorentz invariance violations contain a class of models that represent pure general relativity with a Euclidean signature. We also point out that some members of this family of actions preserve Lorentz invariance in a generalized sense

  13. Mechanical System Simulations for Seismic Signature Modeling

    National Research Council Canada - National Science Library

    Lacombe, J

    2001-01-01

    .... Results for an M1A1 and T72 are discussed. By analyzing the simulated seismic signature data in conjunction with the spectral features associated with the vibrations of specific vehicle sprung and un-sprung components we are able to make...

  14. Exploring Signature Pedagogies in Undergraduate Leadership Education

    Science.gov (United States)

    Jenkins, Daniel M.

    2012-01-01

    This research explores the instructional strategies most frequently used by leadership educators who teach academic credit-bearing undergraduate leadership studies courses through a national survey and identifies signature pedagogies within the leadership discipline. Findings from this study suggest that class discussion--whether in the form of…

  15. The Pedagogic Signature of Special Needs Education

    Science.gov (United States)

    Weiß, Sabine; Kollmannsberger, Markus; Lerche, Thomas; Oubaid, Viktor; Kiel, Ewald

    2014-01-01

    The goal of the following study is to identify a pedagogic signature, according to LS Shulman, for working with students who have special educational needs. Special educational needs are defined as significant limitations in personal development and learning which require particular educational measures beyond regular education. The development of…

  16. Arbitrated quantum signature scheme with message recovery

    International Nuclear Information System (INIS)

    Lee, Hwayean; Hong, Changho; Kim, Hyunsang; Lim, Jongin; Yang, Hyung Jin

    2004-01-01

    Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed. One scheme uses a public board and the other does not. However both schemes provide confidentiality of the message and a higher efficiency in transmission

  17. Hyperspectral signature analysis of skin parameters

    Science.gov (United States)

    Vyas, Saurabh; Banerjee, Amit; Garza, Luis; Kang, Sewon; Burlina, Philippe

    2013-02-01

    The temporal analysis of changes in biological skin parameters, including melanosome concentration, collagen concentration and blood oxygenation, may serve as a valuable tool in diagnosing the progression of malignant skin cancers and in understanding the pathophysiology of cancerous tumors. Quantitative knowledge of these parameters can also be useful in applications such as wound assessment, and point-of-care diagnostics, amongst others. We propose an approach to estimate in vivo skin parameters using a forward computational model based on Kubelka-Munk theory and the Fresnel Equations. We use this model to map the skin parameters to their corresponding hyperspectral signature. We then use machine learning based regression to develop an inverse map from hyperspectral signatures to skin parameters. In particular, we employ support vector machine based regression to estimate the in vivo skin parameters given their corresponding hyperspectral signature. We build on our work from SPIE 2012, and validate our methodology on an in vivo dataset. This dataset consists of 241 signatures collected from in vivo hyperspectral imaging of patients of both genders and Caucasian, Asian and African American ethnicities. In addition, we also extend our methodology past the visible region and through the short-wave infrared region of the electromagnetic spectrum. We find promising results when comparing the estimated skin parameters to the ground truth, demonstrating good agreement with well-established physiological precepts. This methodology can have potential use in non-invasive skin anomaly detection and for developing minimally invasive pre-screening tools.

  18. Dictionary of Large Hadron Collider signatures

    Indian Academy of Sciences (India)

    We report on a plan to establish a `Dictionary of LHC Signatures', an initiative that started at the WHEPP-X workshop in Chennai, January 2008. This study aims at the strategy of distinguishing 3 classes of dark matter motivated scenarios such as -parity conserved supersymmetry, little Higgs models with -parity ...

  19. Signatures of mutational processes in human cancer

    NARCIS (Netherlands)

    Alexandrov, L.B.; Nik-Zainal, S.; Wedge, D.C.; Aparicio, S.A.; Behjati, S.; Biankin, A.V.; Bignell, G.R.; Bolli, N.; Borg, A.; Borresen-Dale, A.L.; Boyault, S.; Burkhardt, B.; Butler, A.P.; Caldas, C.; Davies, H.R.; Desmedt, C.; Eils, R.; Eyfjord, J.E.; Foekens, J.A.; Greaves, M.; Hosoda, F.; Hutter, B.; Ilicic, T.; Imbeaud, S.; Imielinsk, M.; Jager, N.; Jones, D.T.; Knappskog, S.; Kool, M.; Lakhani, S.R.; Lopez-Otin, C.; Martin, S.; Munshi, N.C.; Nakamura, H.; Northcott, P.A.; Pajic, M.; Papaemmanuil, E.; Paradiso, A.; Pearson, J.V.; Puente, X.S.; Raine, K.; Ramakrishna, M.; Richardson, A.L.; Richter, J.; Rosenstiel, P.; Schlesner, M.; Schumacher, T.N.; Span, P.N.; Teague, J.W.; Totoki, Y.; Tutt, A.N.; Valdes-Mas, R.; Buuren, M.M. van; Veer, L. van 't; Vincent-Salomon, A.; Waddell, N.; Yates, L.R.; Zucman-Rossi, J.; Futreal, P.A.; McDermott, U.; Lichter, P.; Meyerson, M.; Grimmond, S.M.; Siebert, R.; Campo, E.; Shibata, T.; Pfister, S.M.; Campbell, P.J.; Stratton, M.R.; Schlooz-Vries, M.S.; Tol, J.J. van; Laarhoven, H.W. van; Sweep, F.C.; Bult, P.; et al.,

    2013-01-01

    All cancers are caused by somatic mutations; however, understanding of the biological processes generating these mutations is limited. The catalogue of somatic mutations from a cancer genome bears the signatures of the mutational processes that have been operative. Here we analysed 4,938,362

  20. Ankle and Other Signatures in Uhecr

    Science.gov (United States)

    Berezinsky, Veniamin

    2015-03-01

    The interaction signatures of UHE protons propagating through CMB are discussed. Much attention is given to ankle, which starting from 1963 is usually interpreted as a feature of transition from galactic to extragalactic cosmic rays. We argue here that this interpretation is now excluded. It gives more credit to alternative explanation of the ankle as an intrinsic part of the pair-production dip.

  1. Detection of proteolytic signatures for Parkinson's disease

    DEFF Research Database (Denmark)

    Jordal, Peter Lüttge; Dyrlund, Thomas F.; Winge, Kristian

    2016-01-01

    Aim: To investigate if idiopathic Parkinson's disease (IPD) is associated with distinct proteolytic signatures relative to non-neurodegenerative controls (NND) and patients with multiple system atrophy (MSA). Materials & methods: A subtiligase-based N-terminomics screening method was exploited...

  2. Proliferation resistance fuel cycle technology

    Energy Technology Data Exchange (ETDEWEB)

    Lee, J. S.; Ko, W. I

    1999-02-01

    The issues of dual use in nuclear technology are analysed for nuclear fuel cycle with special focus on uranium enrichment and spent fuel reprocessing which are considered as the most sensitive components in terms of vulnerability to diversion. Technical alternatives to mitigrate the vulnerability, as has been analysed in depth during the NASAP and INFCE era in the late seventies, are reviewed to characterize the DUPIC fuel cycle alternative. On the other hand, the new realities in nuclear energy including the disposition of weapon materials as a legacy of cold war are recast in an angle of nuclear proliferation resistance and safeguards with a discussion on the concept of spent fuel standard concept and its compliance with the DUPIC fuel cycle technology. (author)

  3. Missile proliferation and missile defense

    International Nuclear Information System (INIS)

    Zarif, M. Javad

    2002-01-01

    The global security environment is becoming increasingly volatile and dangerous. A new arms race is looming in the horizon ... [Missiles have] become the strong weapon of the poor and the discriminated against who find themselves vulnerable to outside threat. They believe missiles may prove instrumental in deterring the enemy from beginning a full scale war ... the engagement of all states at the United Nations in the issue of missiles, through the panel of governmental experts, and the new idea of exploring the subject in the Conference on Disarmament do provide a dim light at the end of the tunnel. ... Efforts at non-proliferation of missiles are more likely to succeed when viewed as an integral part of a global and comprehensive negotiation and progress in other areas of disarmament. (author)

  4. Romania non-proliferation policy

    International Nuclear Information System (INIS)

    Biro, Lucian; Grama, Viviana

    2001-01-01

    Full text: Non-proliferation concept in Romania is based on the Treaty on the Non-proliferation of Nuclear Weapons, which was ratified in 1970. According to the Article III of the Treaty, Romania ratified in 1972, the Agreement between Romania and IAEA for the application of Safeguards in connection with the Treaty on the Non-proliferation of Nuclear Weapons. In 2000 Romania ratified the Additional Protocol to contribute through increased transparency, to confidence that no undeclared nuclear activities are concealed within the declared programme or make use of elements of that programme. Under the Additional Protocol Romania understands to increase the transparency of its nuclear activities lengthways fuel cycle. Romania has a strong legal framework to control nuclear material and nuclear activities. The Law 111/1996, republished is the Law on the safe deployment of nuclear activities. CNCAN issued National Regulations for Safeguards and Physical Protection. Prospecting for uranium in Romania was initiated in 1950. Between 1962 and 1978 all the uranium ore production was stockpiled at the mine sites. In 1978 the Feldioara Powder Plant was commissioned, since then both ore stockpiles and ore exploited have been processed to uranium chemical concentrates. The Powder Plant Feldioara was conceived and built following the necessity of milling and processing the uranium ore to UO 2 , in concordance with the national nuclear programme in order to produce electric energy from nuclear fuel. The Nuclear Fuel Plant has capability to manufacture CANDU-6 nuclear fuel. Nuclear Fuel Plant consists of two Production areas, the Quality Assurance and Engineering Departments. There are two Production Departments: Pelleting area including granulation, pressing, sintering, pellet grinding, uranium recycling and Assembling area including components fabrication, beryllium coating, brazing, graphite coating, fuel element and bundle assembly welding. Romania's Strategy for Energy Sector

  5. Perancangan Aplikasi Undeniable Digital Signature Dengan Algoritma Chaum’s Blind Signature

    OpenAIRE

    Simanjuntak, Martin Dennain

    2012-01-01

    Desperaty need a securiry system in the exchange of information via computer media, so that information can not be accessed by unauthorized parties. One of the security system is to use a system of digital signatures as a means of authenticating the authenticity of digital document that are exchanged. By using a digital a digital signature system is undeniable, the security system can be generated digital document exchange, where the system is free from the from of rejection...

  6. The effects of extrinsic motivation on signature authorship opinions in forensic signature blind trials.

    Science.gov (United States)

    Dewhurst, Tahnee N; Found, Bryan; Ballantyne, Kaye N; Rogers, Doug

    2014-03-01

    Expertise studies in forensic handwriting examination involve comparisons of Forensic Handwriting Examiners' (FHEs) opinions with lay-persons on blind tests. All published studies of this type have reported real and demonstrable skill differences between the specialist and lay groups. However, critics have proposed that any difference shown may be indicative of a lack of motivation on the part of lay participants, rather than a real difference in skill. It has been suggested that qualified FHEs would be inherently more motivated to succeed in blinded validation trials, as their professional reputations could be at risk, should they perform poorly on the task provided. Furthermore, critics suggest that lay-persons would be unlikely to be highly motivated to succeed, as they would have no fear of negative consequences should they perform badly. In an effort to investigate this concern, a blind signature trial was designed and administered to forty lay-persons. Participants were required to compare known (exemplar) signatures of an individual to questioned signatures and asked to express an opinion regarding whether the writer of the known signatures wrote each of the questioned signatures. The questioned signatures comprised a mixture of genuine, disguised and simulated signatures. The forty participants were divided into two separate groupings. Group 'A' were requested to complete the trial as directed and were advised that for each correct answer they would be financially rewarded, for each incorrect answer they would be financially penalized, and for each inconclusive opinion they would receive neither penalty nor reward. Group 'B' was requested to complete the trial as directed, with no mention of financial recompense or penalty. The results of this study do not support the proposition that motivation rather than skill difference is the source of the statistical difference in opinions between individuals' results in blinded signature proficiency trials. Crown

  7. Optical/Infrared Signatures for Space-Based Remote Sensing

    National Research Council Canada - National Science Library

    Picard, R. H; Dewan, E. M; Winick, J. R; O'Neil, R. R

    2007-01-01

    This report describes work carried out under the Air Force Research Laboratory's basic research task in optical remote-sensing signatures, entitled Optical / Infrared Signatures for Space-Based Remote Sensing...

  8. Methods and apparatus for multi-parameter acoustic signature inspection

    Energy Technology Data Exchange (ETDEWEB)

    Diaz, Aaron A [Richland, WA; Samuel, Todd J [Pasco, WA; Valencia, Juan D [Kennewick, WA; Gervais, Kevin L [Richland, WA; Tucker, Brian J [Pasco, WA; Kirihara, Leslie J [Richland, WA; Skorpik, James R [Kennewick, WA; Reid, Larry D [Benton City, WA; Munley, John T [Benton City, WA; Pappas, Richard A [Richland, WA; Wright, Bob W [West Richland, WA; Panetta, Paul D [Richland, WA; Thompson, Jason S [Richland, WA

    2007-07-24

    A multiparameter acoustic signature inspection device and method are described for non-invasive inspection of containers. Dual acoustic signatures discriminate between various fluids and materials for identification of the same.

  9. Passive Infrared Signature Augmentation of Full-Scale Plastic Targets

    National Research Council Canada - National Science Library

    Gebus, Lisa M; Sanders, Jeffrey S

    2002-01-01

    ... (IR), and radar signatures of threat systems. To address this need, a program was initiated by TMO to augment an existing full-scale, vacuum-formed plastic target with sufficient signature fidelity to adequately stress U.S...

  10. China's position on nuclear non-proliferation

    International Nuclear Information System (INIS)

    Qian Jiadong.

    1986-01-01

    The paper discusses China's position on nuclear non-proliferation, in view of the fact that China does not subscribe to the Non-Proliferation Treaty (NPT). China refuses to accede to the NPT because it considers the treaty to be discriminatory, and reasons are given for this point of view. However its stand for nuclear disarmament and disapproval of nuclear proliferation are declared. Nuclear arms race, prevention of nuclear war, and nuclear disarmament are also considered. (UK)

  11. Nuclear power and nuclear-weapons proliferation

    International Nuclear Information System (INIS)

    Moniz, E.J.; Neff, T.L.

    1978-01-01

    Concern over the risk of nuclear proliferation has led to extensive reexamination of the technical, economic, and political assumptions underlying both national and international nuclear policies. An attempt is made in the present article to clarify the basic technical and political issues. The connections between various fuel cycles and their possible proliferation risks are discussed. As the resolution of the existing differing views on proliferation risks will be largely a political process, solutions to the problem are not proposed

  12. Nuclear energy and nuclear weapons proliferation

    International Nuclear Information System (INIS)

    1989-01-01

    A summary of the report dispatched in the middle of 1978 by the Atlantic Council of United States, organized by North American citizens, is presented. The report considers the relation between the production of nucleoelectric energy and the capacity of proliferation of nuclear weapons. The factors which affect the grade of proliferation risk represented by the use of nuclear energy in the world comparing this risk with the proliferation risks independently of nuclear energy, are examined. (M.C.K.) [pt

  13. Re-examining the security of blind quantum signature protocols

    International Nuclear Information System (INIS)

    Wang Mingming; Chen Xiubo; Niu Xinxin; Yang Yixian

    2012-01-01

    Recently, blind quantum signature (BQS) protocols have been proposed with the help of a third-party verifier. However, our research shows that some of the BQS protocols are unable to complete the blind signature task fairly if the verifier is dishonest. Indeed, these protocols can be viewed as variants of the classical digital signature scheme of symmetric-key cryptography. If nobody is trusted in such protocols, digital signature cannot be implemented since disagreements cannot be solved fairly.

  14. Quantum signature scheme based on a quantum search algorithm

    International Nuclear Information System (INIS)

    Yoon, Chun Seok; Kang, Min Sung; Lim, Jong In; Yang, Hyung Jin

    2015-01-01

    We present a quantum signature scheme based on a two-qubit quantum search algorithm. For secure transmission of signatures, we use a quantum search algorithm that has not been used in previous quantum signature schemes. A two-step protocol secures the quantum channel, and a trusted center guarantees non-repudiation that is similar to other quantum signature schemes. We discuss the security of our protocol. (paper)

  15. A Signature Comparing Android Mobile Application Utilizing Feature Extracting Algorithms

    Directory of Open Access Journals (Sweden)

    Paul Grafilon

    2017-08-01

    Full Text Available The paper presented one of the application that can be done using smartphones camera. Nowadays forgery is one of the most undetected crimes. With the forensic technology used today it is still difficult for authorities to compare and define what a real signature is and what a forged signature is. A signature is a legal representation of a person. All transactions are based on a signature. Forgers may use a signature to sign illegal contracts and withdraw from bank accounts undetected. A signature can also be forged during election periods for repeated voting. Addressing the issues a signature should always be secure. Signature verification is a reduced problem that still poses a real challenge for researchers. The literature on signature verification is quite extensive and shows two main areas of research off-line and on-line systems. Off-line systems deal with a static image of the signature i.e. the result of the action of signing while on-line systems work on the dynamic process of generating the signature i.e. the action of signing itself. The researchers have found a way to resolve the concerns. A mobile application that integrates the camera to take a picture of a signature analyzes it and compares it to other signatures for verification. It will exist to help citizens to be more cautious and aware with issues regarding the signatures. This might also be relevant to help organizations and institutions such as banks and insurance companies in verifying signatures that may avoid unwanted transactions and identity theft. Furthermore this might help the authorities in the never ending battle against crime especially against forgers and thieves. The project aimed to design and develop a mobile application that integrates the smartphone camera for verifying and comparing signatures for security using the best algorithm possible. As the result of the development the said smartphone camera application is functional and reliable.

  16. The handbook of nuclear non-proliferation

    International Nuclear Information System (INIS)

    Yang, M. H.; Lee, B. W.; Oh, K. B.; Lee, H. M.; Ko, H. S.; Ryu, J. S.; Lee, K. S.

    2003-07-01

    This report analyzed international non-proliferation regime preventing from spread of nuclear weapon. This report took review from the historical background of non-proliferation regime to the recent changes and current status. It is here divided into multilateral and bilateral regime. First of all, this report dealt four multilateral treaties concluded for international non-proliferation such as NPT, NWFZ, CTBT and others. And international organization and regimes concerned with non-proliferation are also analyzed focused on UN, IAEA, ZC and NSG, regional safeguards system and international conferences. In addition, this report reviewed the nuclear cooperation agreement related with Korea which is a important tool for bilateral regime

  17. Strengthening the non proliferation regime: French views

    International Nuclear Information System (INIS)

    Delaune, P.

    2013-01-01

    3 main issues can be identified in the French policy concerning the backing of non proliferation: 1) responding resolutely to proliferation crises, 2) reinforcing substantive efforts to prevent and impede proliferation, and 3) strengthening the non-proliferation regime. The first issue is very important because combating proliferation is vital to the security of all. Concerning the second issue, France attaches particular importance to strengthening specific measures to prevent and check proliferation. Let me mention a few proposals that we put forward: exports need to be controlled more effectively, proliferation activities have to be criminalized, or the development of proliferation-resistant technologies should be supported. Concerning the third issue it means the strengthening of the non-proliferation regime, France proposes several means: -) aiming at the universalization of the additional protocol; -) ensuring that the Agency continues to have sufficient human, financial and technical resources to fulfill its verification mission effectively; -) encouraging the IAEA to make full use of the authority available to it; -) enhancing the use of information relevant to the delivery of the IAEA mandate; and -) sharing more accurate information concerning the breaches of commitments that happen. The paper is followed by the slides of the presentation. (A.C.)

  18. Intelligence and Nuclear Proliferation: Lessons Learned

    International Nuclear Information System (INIS)

    Hansen, Keith A.

    2011-09-01

    Intelligence agencies play a fundamental role in the prevention of nuclear proliferation, as they help to understand other countries' intentions and assess their technical capabilities and the nature of their nuclear activities. The challenges in this area remain, however, formidable. Past experiences and the discoveries of Iraq's WMD programs, of North Korean nuclear weapon program, and of Iranian activities, have put into question the ability of intelligence to monitor small, clandestine proliferation activities from either states or non-state entities. This Proliferation Paper analyzes the complex challenges intelligence faces and the various roles it plays in supporting national and international nuclear non-proliferation efforts, and reviews its track record. In an effort to shed light on the role and contribution of intelligence in national and international efforts to halt, if not prevent, further nuclear weapon proliferation, this paper first analyzes the challenges intelligence faces in monitoring small, clandestine proliferation activities and the role it plays in supporting non-proliferation efforts. It then reviews the intelligence track record in monitoring proliferation including the lessons learned from Iraq. Finally, it addresses whether it is possible for intelligence to accurately monitor future clandestine proliferation efforts. (author)

  19. Can specific transcriptional regulators assemble a universal cancer signature?

    Science.gov (United States)

    Roy, Janine; Isik, Zerrin; Pilarsky, Christian; Schroeder, Michael

    2013-10-01

    Recently, there is a lot of interest in using biomarker signatures derived from gene expression data to predict cancer progression. We assembled signatures of 25 published datasets covering 13 types of cancers. How do these signatures compare with each other? On one hand signatures answering the same biological question should overlap, whereas signatures predicting different cancer types should differ. On the other hand, there could also be a Universal Cancer Signature that is predictive independently of the cancer type. Initially, we generate signatures for all datasets using classical approaches such as t-test and fold change and then, we explore signatures resulting from a network-based method, that applies the random surfer model of Google's PageRank algorithm. We show that the signatures as published by the authors and the signatures generated with classical methods do not overlap - not even for the same cancer type - whereas the network-based signatures strongly overlap. Selecting 10 out of 37 universal cancer genes gives the optimal prediction for all cancers thus taking a first step towards a Universal Cancer Signature. We furthermore analyze and discuss the involved genes in terms of the Hallmarks of cancer and in particular single out SP1, JUN/FOS and NFKB1 and examine their specific role in cancer progression.

  20. Radar micro-doppler signatures processing and applications

    CERN Document Server

    Chen, Victor C; Miceli, William J

    2014-01-01

    Radar Micro-Doppler Signatures: Processing and applications concentrates on the processing and application of radar micro-Doppler signatures in real world situations, providing readers with a good working knowledge on a variety of applications of radar micro-Doppler signatures.

  1. Acoustic Signature Monitoring and Management of Naval Platforms

    NARCIS (Netherlands)

    Basten, T.G.H.; Jong, C.A.F. de; Graafland, F.; Hof, J. van 't

    2015-01-01

    Acoustic signatures make naval platforms susceptible to detection by threat sensors. The variable operational conditions and lifespan of a platform cause variations in the acoustic signature. To deal with these variations, a real time signature monitoring capability is being developed, with advisory

  2. 22 CFR 92.28 - Signature of affiant on affidavit.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Signature of affiant on affidavit. 92.28 Section 92.28 Foreign Relations DEPARTMENT OF STATE LEGAL AND RELATED SERVICES NOTARIAL AND RELATED SERVICES Specific Notarial Acts § 92.28 Signature of affiant on affidavit. The signature of the affiant is...

  3. 45 CFR 81.32 - Signature of documents.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Signature of documents. 81.32 Section 81.32 Public... UNDER PART 80 OF THIS TITLE Form, Execution, Service and Filing of Documents § 81.32 Signature of documents. The signature of a party, authorized officer, employee or attorney constitutes a certificate that...

  4. 21 CFR 1309.32 - Application forms; contents; signature.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Application forms; contents; signature. 1309.32... Application forms; contents; signature. (a) Any person who is required to be registered pursuant to § 1309.21... this paragraph and shall contain the signature of the individual being authorized to sign the...

  5. 17 CFR 201.65 - Identity and signature.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Identity and signature. 201.65... of 1934 § 201.65 Identity and signature. Applications pursuant to this subpart may omit the identity, mailing address, and signature of the applicant; provided, that such identity, mailing address and...

  6. Signature Pedagogies in Support of Teachers' Professional Learning

    Science.gov (United States)

    Parker, Melissa; Patton, Kevin; O'Sullivan, Mary

    2016-01-01

    Signature pedagogies [Shulman, L. 2005. "Signature pedagogies in the professions." "Daedalus" 134 (3): 52--59.] are a focus of teacher educators seeking to improve teaching and teacher education. The purpose of this paper is to present a preliminary common language of signature pedagogies for teacher professional development…

  7. 34 CFR 101.32 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Signature of documents. 101.32 Section 101.32 Education Regulations of the Offices of the Department of Education OFFICE FOR CIVIL RIGHTS, DEPARTMENT OF EDUCATION... Documents § 101.32 Signature of documents. The signature of a party, authorized officer, employee or...

  8. 36 CFR 1150.22 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Signature of documents. 1150.22 Section 1150.22 Parks, Forests, and Public Property ARCHITECTURAL AND TRANSPORTATION BARRIERS... Documents for Proceedings on Citations § 1150.22 Signature of documents. The signature of a party...

  9. 29 CFR 102.116 - Signature of orders.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 2 2010-07-01 2010-07-01 false Signature of orders. 102.116 Section 102.116 Labor Regulations Relating to Labor NATIONAL LABOR RELATIONS BOARD RULES AND REGULATIONS, SERIES 8 Certification and Signature of Documents § 102.116 Signature of orders. The executive secretary or the associate executive...

  10. 48 CFR 204.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Contracting officer's signature. 204.101 Section 204.101 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS... officer's signature. Follow the procedures at PGI 204.101 for signature of contract documents. [71 FR 9268...

  11. 32 CFR 842.6 - Signature on the claim form.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Signature on the claim form. 842.6 Section 842.6... ADMINISTRATIVE CLAIMS General Information § 842.6 Signature on the claim form. The claimant or authorized agent... authorized agent signing for a claimant shows, after the signature, the title or capacity and attaches...

  12. 38 CFR 18b.21 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Signature of documents. 18b.21 Section 18b.21 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS... Documents § 18b.21 Signature of documents. The signature of a party, authorized officer, employee, or...

  13. 37 CFR 2.74 - Form and signature of amendment.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Form and signature of... signature of amendment. (a) Form of Amendment. Amendments should be set forth clearly and completely... record. (b) Signature. A request for amendment of an application must be signed by the applicant, someone...

  14. 21 CFR 11.200 - Electronic signature components and controls.

    Science.gov (United States)

    2010-04-01

    ... signature components and controls. (a) Electronic signatures that are not based upon biometrics shall: (1) Employ at least two distinct identification components such as an identification code and password. (i... signatures based upon biometrics shall be designed to ensure that they cannot be used by anyone other than...

  15. Brexit, Euratom and nuclear proliferation

    International Nuclear Information System (INIS)

    Soedersten, Anna

    2016-01-01

    One of the issues absent from the academic (and public) debate on the United Kingdom's (UK) referendum vote to withdraw from the European Union (EU) (commonly referred to as 'Brexit') is what will happen to the UK's membership in the European Atomic Energy Community (Euratom). The Euratom Treaty was signed in Rome in 1957, together with the European Economic Community (EEC) Treaty. It was concluded for an unlimited period and it establishes a Community that has a separate legal personality from the EU. Thus, the EU and Euratom form two separate, although closely linked entities. Euratom's principal mission is related to the economy, tasked with 'creating the conditions necessary for the speedy establishment and growth of nuclear industries'; in other words, to promote the nuclear industry. This reflects the high expectations for nuclear energy in the 1950's. Some even believed that the development of nuclear energy would trigger an industrial revolution; however, Euratom only came to play a minor role in the European integration process. Despite this, the Euratom Treaty has remained, almost unchanged, since its adoption and is still frequently applied, although it is unclear to what extent it has boosted the nuclear industry. This article has a two-fold purpose. The first purpose is to address the constitutional issue of 'partial membership'. All EU member states are also members of Euratom. It has always been assumed that with membership in the EU also comes a membership in Euratom. But, what about withdrawal? What are the arguments for 'partial membership'? The second purpose of this article is to shed light on some implications of Brexit as it relates to Euratom. The most serious consequences are perhaps found in the area of nuclear non-proliferation. The United Kingdom is one of two nuclear weapon states in the EU (France being the other one). Withdrawal from Euratom means withdrawal from its control system, the system of so-called nuclear safeguards. Under

  16. Proliferation after the Iraq war; La proliferation apres la guerre d'Irak

    Energy Technology Data Exchange (ETDEWEB)

    Daguzan, J.F

    2004-09-15

    This article uses the Iraq war major event to analyze the approach used by the US to fight against proliferation. It questions the decision and analysis process which has led to the US-British intervention and analyzes the consequences of the war on the proliferation of other countries and on the expected perspectives. Finally, the future of proliferation itself is questioned: do we have to fear more threat or is the virtuous circle of non-proliferation well started? (J.S.)

  17. Dilatonic imprints on exact gravitational wave signatures

    Science.gov (United States)

    McCarthy, Fiona; KubizÅák, David; Mann, Robert B.

    2018-05-01

    By employing the moduli space approximation, we analytically calculate the gravitational wave signatures emitted upon the merger of two extremally charged dilatonic black holes. We probe several values of the dilatonic coupling constant a , and find significant departures from the Einstein-Maxwell (a =0 ) counterpart studied in [Phys. Rev. D 96, 061501 (2017), 10.1103/PhysRevD.96.061501]. For (low-energy) string theory black holes (a =1 ) there are no coalescence orbits and only a memory effect is observed, whereas for an intermediate value of the coupling (a =1 /√{3 } ) the late-time merger signature becomes exponentially suppressed, compared to the polynomial decay in the a =0 case without a dilaton. Such an imprint shows a clear difference between the case with and without a scalar field (as, for example, predicted by string theory) in black hole mergers.

  18. Chameleon dark energy models with characteristic signatures

    International Nuclear Information System (INIS)

    Gannouji, Radouane; Moraes, Bruno; Polarski, David; Mota, David F.; Winther, Hans A.; Tsujikawa, Shinji

    2010-01-01

    In chameleon dark energy models, local gravity constraints tend to rule out parameters in which observable cosmological signatures can be found. We study viable chameleon potentials consistent with a number of recent observational and experimental bounds. A novel chameleon field potential, motivated by f(R) gravity, is constructed where observable cosmological signatures are present both at the background evolution and in the growth rate of the perturbations. We study the evolution of matter density perturbations on low redshifts for this potential and show that the growth index today γ 0 can have significant dispersion on scales relevant for large scale structures. The values of γ 0 can be even smaller than 0.2 with large variations of γ on very low redshifts for the model parameters constrained by local gravity tests. This gives a possibility to clearly distinguish these chameleon models from the Λ-cold-dark-matter (ΛCDM) model in future high-precision observations.

  19. Entanglement as a signature of quantum chaos.

    Science.gov (United States)

    Wang, Xiaoguang; Ghose, Shohini; Sanders, Barry C; Hu, Bambi

    2004-01-01

    We explore the dynamics of entanglement in classically chaotic systems by considering a multiqubit system that behaves collectively as a spin system obeying the dynamics of the quantum kicked top. In the classical limit, the kicked top exhibits both regular and chaotic dynamics depending on the strength of the chaoticity parameter kappa in the Hamiltonian. We show that the entanglement of the multiqubit system, considered for both the bipartite and the pairwise entanglement, yields a signature of quantum chaos. Whereas bipartite entanglement is enhanced in the chaotic region, pairwise entanglement is suppressed. Furthermore, we define a time-averaged entangling power and show that this entangling power changes markedly as kappa moves the system from being predominantly regular to being predominantly chaotic, thus sharply identifying the edge of chaos. When this entangling power is averaged over all states, it yields a signature of global chaos. The qualitative behavior of this global entangling power is similar to that of the classical Lyapunov exponent.

  20. Quark-gluon plasma: experimental signatures

    International Nuclear Information System (INIS)

    Drapier, O.

    1995-01-01

    The existence of a deconfining phase transition of nuclear matter is a clear prediction of lattice quantum chromodynamics calculations. The signatures of this quark-gluon plasma (QGP) have been searched for, since the first high energy ion beams became available at BNL and CERN in 1986, and gold and lead beams are now accelerated at 11 and 160 GeV per nucleon by the AGS and SPS. An overview of the main signatures expected in case of QGP formation is presented here. Although some recent results have been found in agreement with the predictions of the QGP scenario, no clear evidence for its formation has been observed at present. Nevertheless, new high statistics results are expected from CERN lead beams. In addition, future experiments are being prepared at RHIC and LHCC, providing an increase by two orders of magnitude of the c.m.s. energy within a few years. (author). 66 refs., 28 figs

  1. Supernova signatures of neutrino mass ordering

    Science.gov (United States)

    Scholberg, Kate

    2018-01-01

    A suite of detectors around the world is poised to measure the flavor-energy-time evolution of the ten-second burst of neutrinos from a core-collapse supernova occurring in the Milky Way or nearby. Next-generation detectors to be built in the next decade will have enhanced flavor sensitivity and statistics. Not only will the observation of this burst allow us to peer inside the dense matter of the extreme event and learn about the collapse processes and the birth of the remnant, but the neutrinos will bring information about neutrino properties themselves. This review surveys some of the physical signatures that the currently-unknown neutrino mass pattern will imprint on the observed neutrino events at Earth, emphasizing the most robust and least model-dependent signatures of mass ordering.

  2. Cryptographic key generation using handwritten signature

    OpenAIRE

    Freire, Manuel R.; Fiérrez, Julián; Ortega-García, Javier

    2006-01-01

    M. Freire-Santos ; J. Fierrez-Aguilar ; J. Ortega-Garcia; "Cryptographic key generation using handwritten signature", Biometric Technology for Human Identification III, Proc. SPIE 6202 (April 17, 2006); doi:10.1117/12.665875. Copyright 2006 Society of Photo‑Optical Instrumentation Engineers. One print or electronic copy may be made for personal use only. Systematic reproduction and distribution, duplication of any material in this paper for a fee or for commercial purposes, or modification of...

  3. Limits and signatures of relativistic spaceflight

    Science.gov (United States)

    Yurtsever, Ulvi; Wilkinson, Steven

    2018-01-01

    While special relativity imposes an absolute speed limit at the speed of light, our Universe is not empty Minkowski spacetime. The constituents that fill the interstellar/intergalactic vacuum, including the cosmic microwave background photons, impose a lower speed limit on any object travelling at relativistic velocities. Scattering of cosmic microwave photons from an ultra-relativistic object may create radiation with a characteristic signature allowing the detection of such objects at large distances.

  4. Signatures of quark-gluon plasma production

    International Nuclear Information System (INIS)

    Gyulassy, M.

    1985-01-01

    A critical analysis of a variety of proposed signatures for quark-gluon formation in ultrarelativistic nuclear collisions is given. The authors emphasize that longitudinal growth rather than the nuclear radius controls the time scales for expansion. The author pointed out the qualitative difference of the evolution of the plasma produced in the stopping regime E approx. 10 GeV/nucleon and the scaling regime E > 1 TeV/nucleon. This difference reflects itself in the the rmal profile function

  5. Selection signatures in worldwide sheep populations.

    OpenAIRE

    Fariello, Maria-Ines; Servin, Bertrand; Tosser-Klopp, Gwenola; Rupp, Rachel; Moreno, Carole; San Cristobal, Magali; Boitard, Simon; Drögemüller, Cord; The International Sheep Genomics Consortium, ISGC

    2014-01-01

    The diversity of populations in domestic species offers great opportunities to study genome response to selection. The recently published Sheep HapMap dataset is a great example of characterization of the world wide genetic diversity in sheep. In this study, we re-analyzed the Sheep HapMap dataset to identify selection signatures in worldwide sheep populations. Compared to previous analyses, we made use of statistical methods that (i) take account of the hierarchical structure of sheep popula...

  6. Selection Signatures in Worldwide Sheep Populations

    OpenAIRE

    Fariello, Maria-Ines; Servin, Bertrand; Tosser-Klopp, Gwenola; Rupp, Rachel; Moreno, Carole; Cristobal, Magali San; Boitard, Simon

    2014-01-01

    The diversity of populations in domestic species offers great opportunities to study genome response to selection. The recently published Sheep HapMap dataset is a great example of characterization of the world wide genetic diversity in sheep. In this study, we re-analyzed the Sheep HapMap dataset to identify selection signatures in worldwide sheep populations. Compared to previous analyses, we made use of statistical methods that (i) take account of the hierarchical structure of sheep popula...

  7. ALPs effective field theory and collider signatures

    DEFF Research Database (Denmark)

    Brivio, I.; Gavela, M. B.; Merlo, L.

    2017-01-01

    We study the leading effective interactions between the Standard Model fields and a generic singlet CP-odd (pseudo-) Goldstone boson. Two possible frameworks for electroweak symmetry breaking are considered: linear and non-linear. For the latter case, the basis of leading effective operators is d...... final states are most promising signals expected in both frameworks. In addition, non-standard Higgs decays and mono-Higgs signatures are especially prominent and expected to be dominant in non-linear realisations....

  8. The challenges of nuclear proliferation

    International Nuclear Information System (INIS)

    Le Guelte, Georges

    2015-01-01

    The author of this article first outlines that the Non Proliferation Treaty (NPT) is a tool of domination used by nuclear powers: they can keep and even develop their own nuclear arsenal, while other countries who sign this treaty commit themselves not to try to acquire nuclear weapons. The USA and USSR kept on persuading various countries to sign this treaty, but eventually let some countries develop their military nuclear programme (Israel, Pakistan, or India). He evokes technical difficulties in the application of the Treaty, notably for the control of centrifugation activities. He outlines that the USA have now a dominant position with respect to this Treaty and its application, but that the Treaty remains a major safety element for the world. He evokes more recent and negative evolutions: the withdrawal of North Korea from the Treaty, the destruction of an Iraqi nuclear reactor by Israel (i.e. the destruction of a nuclear installation belonging to a country who signed the NPT by a country who did not sign it). He proposes an overview of the Iranian issue (history of the Iranian nuclear programme, of the nuclear crisis, of the still going on negotiations), and describes what could be the worst possible scenario

  9. North Korea: a mercenary proliferator?

    International Nuclear Information System (INIS)

    Hemez, Remy

    2015-01-01

    After having recalled that North Korea possesses a rather advanced ballistic programme which has been started in the 1970 with the Chinese support, that North Korea is the fourth world producer of ballistic missiles, the author outlines that this country has become a major proliferator as it exports this production to different States and non-State actors. He recalls the long history of relationships between North Korea and terrorist organisations (even during the Cold War), comments the current and major support of North Korea to Hamas and Hezbollah in Gaza and in Lebanon. These relationships are then related with those these both organisations have with Syria and Iran who are in fact the relays between them and North Korea. The author explains why Hamas and Hezbollah must buy their weapons to such a far country: Iran is submitted to international sanctions, Iran and Syria want to avoid being banned from the international community for selling weapon to a terrorist (or so-said) organisation, and prices are rather competitive. If North Korea is also submitted to international sanctions, weapon smuggling seems to be institutional in this country. The author finally briefly evokes the issue of chemical weapons: North Korea possesses few thousand tonnes of these weapons, and could export them to non-state organisations

  10. Director`s series on proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Bailey, K.C.; Price, M.E. [eds.

    1995-11-17

    This is an occasional publication of essays on the topics of nuclear, chemical, biological, and missile proliferation. The views represented are those of the author`s. Essay topics include: Nuclear Proliferation: Myth and Reality; Problems of Enforcing Compliance with Arms Control Agreements; The Unreliability of the Russian Officer Corps: Reluctant Domestic Warriors; and Russia`s Nuclear Legacy.

  11. Proliferation resistance of small modular reactors fuels

    Energy Technology Data Exchange (ETDEWEB)

    Polidoro, F.; Parozzi, F. [RSE - Ricerca sul Sistema Energetico,Via Rubattino 54, 20134, Milano (Italy); Fassnacht, F.; Kuett, M.; Englert, M. [IANUS, Darmstadt University of Technology, Alexanderstr. 35, D-64283 Darmstadt (Germany)

    2013-07-01

    In this paper the proliferation resistance of different types of Small Modular Reactors (SMRs) has been examined and classified with criteria available in the literature. In the first part of the study, the level of proliferation attractiveness of traditional low-enriched UO{sub 2} and MOX fuels to be used in SMRs based on pressurized water technology has been analyzed. On the basis of numerical simulations both cores show significant proliferation risks. Although the MOX core is less proliferation prone in comparison to the UO{sub 2} core, it still can be highly attractive for diversion or undeclared production of nuclear material. In the second part of the paper, calculations to assess the proliferation attractiveness of fuel in typical small sodium cooled fast reactor show that proliferation risks from spent fuel cannot be neglected. The core contains a highly attractive plutonium composition during the whole life cycle. Despite some aspects of the design like the sealed core that enables easy detection of unauthorized withdrawal of fissile material and enhances proliferation resistance, in case of open Non-Proliferation Treaty break-out, weapon-grade plutonium in sufficient quantities could be extracted from the reactor core.

  12. Staggering in signature partners of A∼190 mass region of superdeformed rotational bands

    International Nuclear Information System (INIS)

    Uma, V.S.; Goel, Alpana; Yadav, Archana

    2014-01-01

    This paper discuss about ΔI=1 signature splitting in signature partner pairs of A∼190 mass region. Around twenty signature partner pairs (usually called as two bands, each with a fixed signature) have been reported in this mass region. For these signature pairs, band head moment of inertia (J 0 ) and intrinsic structure of each pair of signature partners have been found as almost identical. Also, these signature partner pairs showed large amplitude signature splitting. As each of the two signature partner forms a regular spin sequence and signature bands are not equivalent in terms of energies. This difference in energies results in signature splitting

  13. On signature change in p-adic space-times

    International Nuclear Information System (INIS)

    Dragovic, B.G.

    1991-01-01

    Change of signature by linear coordinate transformations in p-adic space-times is considered. In this paper it is shown that there exists arbitrary change of trivial signature in Q p n for all n ≥ 1 if p ≡ 1 (mod 4). In other cases it is possible to change only even number of the signs of the signature. The authors suggest new concept of signature with respect to distinct quadratic extensions, of Q p . If space-time dimension is restricted to four there is no signature change

  14. A Digital Signature Scheme Based on MST3 Cryptosystems

    Directory of Open Access Journals (Sweden)

    Haibo Hong

    2014-01-01

    Full Text Available As special types of factorization of finite groups, logarithmic signature and cover have been used as the main components of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2, and MST3. Recently, Svaba et. al proposed a revised MST3 encryption scheme with greater security. Meanwhile, they put forward an idea of constructing signature schemes on the basis of logarithmic signatures and random covers. In this paper, we firstly design a secure digital signature scheme based on logarithmic signatures and random covers. In order to complete the task, we devise a new encryption scheme based on MST3 cryptosystems.

  15. New particles and their experimental signatures

    International Nuclear Information System (INIS)

    Ellis, J.; Gelmini, G.; Kowalski, H.

    1984-08-01

    This report summarizes work done by our theoretical working group on exotic particles before, during and since the Lausanne meeting. We discuss the motivations, rates and experimental signatures for new physics and new particles in the 1 TeV mass range. Section 2 reviews some of the motivations for expecting new physics in this range. Of particular interest is the physics of gauge symmetry breaking. In section 3 we discuss the rates and experimental signatures of new particles predicted by theoretical models of gauge symmetry breaking, notably the Higgs boson supersymmetry and technicolour. Among the signatures we discuss are multiple Wsup(+-) and/or Z 0 events (for the Higgs), missing transverse energy (for supersymmetry) and multiple anti tt events (for the Higgs and technicolour). We provide many examples of final state differential distributions in rapidity and Psub(T), particularly for Higgses and for supersymmetry. We also analyse some physics backgrounds to the new particle production processes which interest us. Examples include W + W - , Z 0 Z 0 , W(anti tt) and (anti tt) production as backgrounds to Higgs production. However, we do not consider in detail non-physics backgrounds such as the jet fluctuation background to missing energy signals for supersymmetry production. Section 4 summarizes our preliminary conclusions on the observability at a high energy hadron collider of the new particles studied in this report. (orig./HSI)

  16. Mirage: a visible signature evaluation tool

    Science.gov (United States)

    Culpepper, Joanne B.; Meehan, Alaster J.; Shao, Q. T.; Richards, Noel

    2017-10-01

    This paper presents the Mirage visible signature evaluation tool, designed to provide a visible signature evaluation capability that will appropriately reflect the effect of scene content on the detectability of targets, providing a capability to assess visible signatures in the context of the environment. Mirage is based on a parametric evaluation of input images, assessing the value of a range of image metrics and combining them using the boosted decision tree machine learning method to produce target detectability estimates. It has been developed using experimental data from photosimulation experiments, where human observers search for vehicle targets in a variety of digital images. The images used for tool development are synthetic (computer generated) images, showing vehicles in many different scenes and exhibiting a wide variation in scene content. A preliminary validation has been performed using k-fold cross validation, where 90% of the image data set was used for training and 10% of the image data set was used for testing. The results of the k-fold validation from 200 independent tests show a prediction accuracy between Mirage predictions of detection probability and observed probability of detection of r(262) = 0:63, p Pearson correlation) and a MAE = 0:21 (mean absolute error).

  17. SIGNATURES OF LONG-LIVED SPIRAL PATTERNS

    International Nuclear Information System (INIS)

    Martínez-García, Eric E.; González-Lópezlira, Rosa A.

    2013-01-01

    Azimuthal age/color gradients across spiral arms are a signature of long-lived spirals. From a sample of 19 normal (or weakly barred) spirals where we have previously found azimuthal age/color gradient candidates, 13 objects were further selected if a two-armed grand-design pattern survived in a surface density stellar mass map. Mass maps were obtained from optical and near-infrared imaging, by comparison with a Monte Carlo library of stellar population synthesis models that allowed us to obtain the mass-to-light ratio in the J band, (M/L) J , as a function of (g – i) versus (i – J) color. The selected spirals were analyzed with Fourier methods in search of other signatures of long-lived modes related to the gradients, such as the gradient divergence toward corotation, and the behavior of the phase angle of the two-armed spiral in different wavebands, as expected from theory. The results show additional signatures of long-lived spirals in at least 50% of the objects.

  18. On psychoanalytic supervision as signature pedagogy.

    Science.gov (United States)

    Watkins, C Edward

    2014-04-01

    What is signature pedagogy in psychoanalytic education? This paper examines that question, considering why psychoanalytic supervision best deserves that designation. In focusing on supervision as signature pedagogy, I accentuate its role in building psychoanalytic habits of mind, habits of hand, and habits of heart, and transforming theory and self-knowledge into practical product. Other facets of supervision as signature pedagogy addressed in this paper include its features of engagement, uncertainty, formation, and pervasiveness, as well as levels of surface, deep, and implicit structure. Epistemological, ontological, and axiological in nature, psychoanalytic supervision engages trainees in learning to do, think, and value what psychoanalytic practitioners in the field do, think, and value: It is, most fundamentally, professional preparation for competent, "good work." In this paper, effort is made to shine a light on and celebrate the pivotal role of supervision in "making" or developing budding psychoanalysts and psychoanalytic psychotherapists. Now over a century old, psychoanalytic supervision remains unparalleled in (1) connecting and integrating conceptualization and practice, (2) transforming psychoanalytic theory and self-knowledge into an informed analyzing instrument, and (3) teaching, transmitting, and perpetuating the traditions, practice, and culture of psychoanalytic treatment.

  19. Enhanced vibration diagnostics using vibration signature analysis

    International Nuclear Information System (INIS)

    Ahmed, S.; Shehzad, K.; Zahoor, Y.; Mahmood, A.; Bibi, A.

    2001-01-01

    Symptoms will appear in equipment, as well as in human beings. when 'suffering from sickness. Symptoms of abnormality in equipment are vibration, noise, deformation, temperature, pressure, electric current, crack, wearing, leakage etc. these are called modes of failure. If the mode of failure is vibration then the vibration signature analysis can be effectively used in order to diagnose the machinery problems. Much valuable information is contained within these vibration 'Spectra' or 'Signatures' but is only of use if the analyst can unlock its 'Secrets'. This paper documents a vibration problem in the motor of a centrifugal pump (Type ETA). It focuses mainly on the roll of modern vibration monitoring system in problem analysis. The problem experienced was the motor unstability and noise due to high vibration. Using enhanced vibration signature data, the problem was analyzed. which suggested that the rotor eccentricity was the cause of excessive noise and vibration in the motor. In conclusion, advanced electronic monitoring and diagnostic systems provide powerful information for machine's condition assessment and problem analysis. Appropriate interpretation and use of this information is important for accurate and effective vibration analysis. (author)

  20. Measurement-device-independent quantum digital signatures

    Science.gov (United States)

    Puthoor, Ittoop Vergheese; Amiri, Ryan; Wallden, Petros; Curty, Marcos; Andersson, Erika

    2016-08-01

    Digital signatures play an important role in software distribution, modern communication, and financial transactions, where it is important to detect forgery and tampering. Signatures are a cryptographic technique for validating the authenticity and integrity of messages, software, or digital documents. The security of currently used classical schemes relies on computational assumptions. Quantum digital signatures (QDS), on the other hand, provide information-theoretic security based on the laws of quantum physics. Recent work on QDS Amiri et al., Phys. Rev. A 93, 032325 (2016);, 10.1103/PhysRevA.93.032325 Yin, Fu, and Zeng-Bing, Phys. Rev. A 93, 032316 (2016), 10.1103/PhysRevA.93.032316 shows that such schemes do not require trusted quantum channels and are unconditionally secure against general coherent attacks. However, in practical QDS, just as in quantum key distribution (QKD), the detectors can be subjected to side-channel attacks, which can make the actual implementations insecure. Motivated by the idea of measurement-device-independent quantum key distribution (MDI-QKD), we present a measurement-device-independent QDS (MDI-QDS) scheme, which is secure against all detector side-channel attacks. Based on the rapid development of practical MDI-QKD, our MDI-QDS protocol could also be experimentally implemented, since it requires a similar experimental setup.

  1. A signature-based method for indexing cell cycle phase distribution from microarray profiles

    Directory of Open Access Journals (Sweden)

    Mizuno Hideaki

    2009-03-01

    Full Text Available Abstract Background The cell cycle machinery interprets oncogenic signals and reflects the biology of cancers. To date, various methods for cell cycle phase estimation such as mitotic index, S phase fraction, and immunohistochemistry have provided valuable information on cancers (e.g. proliferation rate. However, those methods rely on one or few measurements and the scope of the information is limited. There is a need for more systematic cell cycle analysis methods. Results We developed a signature-based method for indexing cell cycle phase distribution from microarray profiles under consideration of cycling and non-cycling cells. A cell cycle signature masterset, composed of genes which express preferentially in cycling cells and in a cell cycle-regulated manner, was created to index the proportion of cycling cells in the sample. Cell cycle signature subsets, composed of genes whose expressions peak at specific stages of the cell cycle, were also created to index the proportion of cells in the corresponding stages. The method was validated using cell cycle datasets and quiescence-induced cell datasets. Analyses of a mouse tumor model dataset and human breast cancer datasets revealed variations in the proportion of cycling cells. When the influence of non-cycling cells was taken into account, "buried" cell cycle phase distributions were depicted that were oncogenic-event specific in the mouse tumor model dataset and were associated with patients' prognosis in the human breast cancer datasets. Conclusion The signature-based cell cycle analysis method presented in this report, would potentially be of value for cancer characterization and diagnostics.

  2. Meta-analysis of crowdsourced data compendia suggests pan-disease transcriptional signatures of autoimmunity [version 1; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    William W. Lau

    2016-12-01

    Full Text Available Background: The proliferation of publicly accessible large-scale biological data together with increasing availability of bioinformatics tools have the potential to transform biomedical research. Here we report a crowdsourcing Jamboree that explored whether a team of volunteer biologists without formal bioinformatics training could use OMiCC, a crowdsourcing web platform that facilitates the reuse and (meta- analysis of public gene expression data, to compile and annotate gene expression data, and design comparisons between disease and control sample groups. Methods: The Jamboree focused on several common human autoimmune diseases, including systemic lupus erythematosus (SLE, multiple sclerosis (MS, type I diabetes (DM1, and rheumatoid arthritis (RA, and the corresponding mouse models. Meta-analyses were performed in OMiCC using comparisons constructed by the participants to identify 1 gene expression signatures for each disease (disease versus healthy controls at the gene expression and biological pathway levels, 2 conserved signatures across all diseases within each species (pan-disease signatures, and 3 conserved signatures between species for each disease and across all diseases (cross-species signatures. Results: A large number of differentially expressed genes were identified for each disease based on meta-analysis, with observed overlap among diseases both within and across species. Gene set/pathway enrichment of upregulated genes suggested conserved signatures (e.g., interferon across all human and mouse conditions. Conclusions: Our Jamboree exercise provides evidence that when enabled by appropriate tools, a "crowd" of biologists can work together to accelerate the pace by which the increasingly large amounts of public data can be reused and meta-analyzed for generating and testing hypotheses. Our encouraging experience suggests that a similar crowdsourcing approach can be used to explore other biological questions.

  3. Treaty on the non-proliferation of nuclear weapons: Review conference of the States Parties Geneva 1985

    International Nuclear Information System (INIS)

    1984-01-01

    The Third Review Conference of the Parties to the Treaty on the Non-Proliferation of Nuclear Weapons will be held in Geneva, Switzerland, in 1985 with a view to assuring that the purposes and provisions of the Treaty are being realized. The Treaty, commonly referred to as the non-proliferation Treaty, is the fundamental instrument to avert the danger of proliferation of nuclear weapons and is, perhaps, the most important multilateral arms regulation agreement of our time. It was negotiated in the 1960s in the Eighteen-Nation Committee on Disarmament in Geneva and in the United Nations General Assembly. The Treaty was opened for signature in London, Moscow and Washington on July 1, 1968. On that date, it was signed by the three Depositary Governments - the Soviet Union, the United Kingdom and the United States - and by 58 other States. As of December 31, 1983 the number of States parties to the Treaty had risen to 119

  4. The electronic identification, signature and security of information systems

    Directory of Open Access Journals (Sweden)

    Horovèák Pavel

    2002-12-01

    Full Text Available The contribution deals with the actual methods and technologies of information and communication systems security. It introduces the overview of electronic identification elements such as static password, dynamic password and single sign-on. Into this category belong also biometric and dynamic characteristics of verified person. Widespread is authentication based on identification elements ownership, such as various cards and authentication calculators. In the next part is specified a definition and characterization of electronic signature, its basic functions and certificate categories. Practical utilization of electronic signature consists of electronic signature acquirement, signature of outgoing email message, receiving of electronic signature and verification of electronic signature. The use of electronic signature is continuously growing and in connection with legislation development it exercises in all resorts.

  5. Exosomes Derived From Pancreatic Stellate Cells: MicroRNA Signature and Effects on Pancreatic Cancer Cells.

    Science.gov (United States)

    Takikawa, Tetsuya; Masamune, Atsushi; Yoshida, Naoki; Hamada, Shin; Kogure, Takayuki; Shimosegawa, Tooru

    2017-01-01

    Pancreatic stellate cells (PSCs) interact with pancreatic cancer cells in the tumor microenvironment. Cell constituents including microRNAs may be exported from cells within membranous nanovesicles termed exosomes. Exosomes might play a pivotal role in intercellular communication. This study aimed to clarify the microRNA signature of PSC-derived exosomes and their effects on pancreatic cancer cells. Exosomes were prepared from the conditioned medium of immortalized human PSCs. MicroRNAs were prepared from the exosomes and their source PSCs, and the microRNA expression profiles were compared by microarray. The effects of PSC-derived exosomes on proliferation, migration, and the mRNA expression profiles were examined in pancreatic cancer cells. Pancreatic stellate cell-derived exosomes contained a variety of microRNAs including miR-21-5p. Several microRNAs such as miR-451a were enriched in exosomes compared to their source PSCs. Pancreatic stellate cell-derived exosomes stimulated the proliferation, migration and expression of mRNAs for chemokine (C - X - C motif) ligands 1 and 2 in pancreatic cancer cells. The stimulation of proliferation, migration, and chemokine gene expression by the conditioned medium of PSCs was suppressed by GW4869, an exosome inhibitor. We clarified the microRNA expression profile in PSC-derived exosomes. Pancreatic stellate cell-derived exosomes might play a role in the interactions between PSCs and pancreatic cancer cells.

  6. The non-proliferation experiment

    Energy Technology Data Exchange (ETDEWEB)

    Hannon, W.J. [Lawrence Livermore National Lab., CA (United States)

    1994-12-31

    On September 22, 1993, the Department of Energy detonated more than 1.2 million kg of blasting agent in a tunnel in Rainier Mesa at the Nevada Test Site. The resulting explosion generated seismic, electromagnetic, and air pressure signals that were recorded on instruments deployed at distances ranging from a few meters to hundreds and, in some cases, thousands of kilometers. More than 12 organizations made measurements before, during, and after the explosions. The explosion and its associated experiments are known as the Non-Proliferation Experiment (NPE). Analyses of the measurements made during the NPE and comparisons with similar measurements made on previous nearly nuclear explosions and on a co-located smaller explosion detonated at the same site are providing basic phenomenological insights into what is potentially one of the comprehensive Test Ban Treaty (CTBT)-distinguishing between nuclear explosions and some of the many conventional explosions that occur each year. The NPE is also providing information on the use of chemical explosions to develop empirical discriminants in regions where no nuclear explosions have been recorded. In another verification application, several NPE projects are examining the utility of on-site, pre-shot, shot-time, and post-shot measurements of gas seepage, seismic activity, and other observables as a means of identifying the source of signals that appear like nuclear explosions at regional distances. Two related activities are being considered. First, challenge on-site inspections, conducted after an event has occurred, may be able to use the characteristics of phenomena that persist after the explosion to detect and identify the source of the signals that appeared ambiguous or explosion-like to remote sensors. Second, cooperative, on-site measurements made at the time of a pre-nounced conventional explosion may provide assurance that a nuclear explosion did not occur as part of or in place of the pre-announced explosion.

  7. Framework of Comprehensive Proliferation Resistance Evaluation Methodology

    International Nuclear Information System (INIS)

    Kim, Min Su; Jo, Seong Youn; Kim, Min Soo; Kim, Jae San; Lee, Hyun Kyung

    2007-01-01

    Civilian nuclear programs can be used as a pretext to acquire technologies, materials, equipment for military weapon programs. Consequently, international society has a strong incentive to develop a nuclear system more proliferation resistant to assure that the civilian nuclear energy system is an unattractive and least desirable route for diversion of weapon usable material. The First step developing a more proliferation resistant nuclear energy system is to develop a systematic and standardized evaluation methodology to ensure that any future nuclear energy system satisfies the proliferation resistance goals. Many attempts to develop systematic evaluation methodology have been proposed and many systems for assessing proliferation resistance have been previously studied. However, a comprehensive proliferation resistance evaluation can not be achieved by simply applying one method since complicated proliferation resistance characteristics, including inherent features and extrinsic features, should be completely evaluated. Therefore, it is necessary to develop one incorporated evaluation methodology to make up for weak points of each evaluation method. The objective of this study is to provide a framework of comprehensive proliferation resistance evaluation methodology by incorporating two generally used evaluation methods, attribute and scenario analysis

  8. Nuclear proliferation: prospects, problems, and proposals

    International Nuclear Information System (INIS)

    Anon.

    1977-01-01

    This issue of the ANNALS addresses itself to three aspects of nuclear proliferation: the prospect that new nuclear powers will come on the scene, the problems that their arrival may create, and ways of coping with those problems. In an introductory paper, ''Quo Vadimus,'' Joseph I. Coffey investigates the pros and cons of proliferation, concluding that it is not a question of whether there will be nuclear proliferation, but in what countries. Part I, Where We Are, contains five papers preceded by introductory comments by Joseph I. Coffey. The papers and their authors are: Why States Go--and Don't Go--Nuclear, William Epstein; How States Can ''Go Nuclear,'' Frank C. Barnaby; What Happens If. . .Terrorists, Revolutionaries, and Nuclear Weapons, David Kreiger; Safeguards Against Diversion of Nuclear Material: An Overview, Ryukichi Imai; and Reducing the Incentives to Proliferation, George H. Quester. Part II, And Where We May Go, again includes some introductory remarks by Joseph I. Coffey. The seven succeeding papers are: Nth Powers of the Future, Ashok Kapur; Nuclear Proliferation and World Politics, Lewis A. Dunn; Arms Control in a Nuclear Armed World, Colin Gray; The United Nations, the Superpowers, and Proliferation, Abraham Bargman; Proliferation and the Future: Destruction or Transformation, Frederick C. Thayer; Decision Making in a Nuclear Armed World, Michael Brenner; and The United States in a World of Nuclear Powers, Michael Nacht. This special report is concluded with a glossary

  9. Which future for nuclear counter-proliferation?

    International Nuclear Information System (INIS)

    Duval, M.

    2010-01-01

    Dealing with the case of nuclear weapons possessed by nuclear states (but not eventually by terrorists), the author first identifies the constants of counter-proliferation: it is linked to interest conflicts between those who try to preserve their monopoly and those who try to acquire a new weapon either because of a threat or for reasons of regional prestige, the evolution from use to deterrence, the appearance of new actors after the USA and Russia, the role of nuclear tactical weapons, and the future of Russian weapons and know-how. He presents the international counter-proliferation context: the Non Proliferation Treaty (NPT), the IAEA and its controls, the Nuclear Supplier Group (NSG), the nuclear-free zones, the Comprehensive Test Ban Treaty (CTBT), the Missile Technology Control Regime (MTCR). He describes how and why proliferation occurs: uranium enrichment and plutonium technology, political reasons in different parts of the world. Then, he gives an overview of the proliferation status by commenting the cases of Israel, Iraq, India, Pakistan, North Korea, and Iran. He discusses the future of proliferation (involved countries, existence of a nuclear black market) and of counter-proliferation as far as Middle-East and North Korea are concerned. He tries finally to anticipate the consequences for nuclear deterrence strategy, and more particularly for Europe and France

  10. Harmine stimulates proliferation of human neural progenitors

    Directory of Open Access Journals (Sweden)

    Vanja Dakic

    2016-12-01

    Full Text Available Harmine is the β-carboline alkaloid with the highest concentration in the psychotropic plant decoction Ayahuasca. In rodents, classical antidepressants reverse the symptoms of depression by stimulating neuronal proliferation. It has been shown that Ayahuasca presents antidepressant effects in patients with depressive disorder. In the present study, we investigated the effects of harmine in cell cultures containing human neural progenitor cells (hNPCs, 97% nestin-positive derived from pluripotent stem cells. After 4 days of treatment, the pool of proliferating hNPCs increased by 71.5%. Harmine has been reported as a potent inhibitor of the dual specificity tyrosine-phosphorylation-regulated kinase (DYRK1A, which regulates cell proliferation and brain development. We tested the effect of analogs of harmine, an inhibitor of DYRK1A (INDY, and an irreversible selective inhibitor of monoamine oxidase (MAO but not DYRK1A (pargyline. INDY but not pargyline induced proliferation of hNPCs similarly to harmine, suggesting that inhibition of DYRK1A is a possible mechanism to explain harmine effects upon the proliferation of hNPCs. Our findings show that harmine enhances proliferation of hNPCs and suggest that inhibition of DYRK1A may explain its effects upon proliferation in vitro and antidepressant effects in vivo.

  11. The Complex Conductivity Signature of Geobacter Species in Geological Media

    Science.gov (United States)

    Brown, I.; Atekwana, E. A.; Sarkisova, S.; Achang, M.

    2013-12-01

    The Complex Conductivity (CC) technique is a promising biogeophysical approach for sensing microbially-induced changes in geological media because of its low-invasive character and sufficient sensitivity to enhanced microbial activity in the near subsurface. Geobacter species have been shown to play important roles in the bioremediation of groundwater contaminated with petroleum and landfill leachate. This capability is based on the ability of Geobacter species to reduce Fe(III) by transferring of electrons from the reduced equivalents to Fe(III) rich minerals through respiration chain and special metallic-like conductors - pili. Only the cultivation of Geobacter species on Fe(III) oxides specifically express pili biosynthesis. Moreover, mutants that cannot produce pili are unable to reduce Fe(III) oxides. However, little is known about the contribution of these molecular conductors (nanowires) to the generation of complex conductivity signatures in geological media. Here, we present the results about the modulation of CC signatures in geological media by Geobacter sulfurreducens (G.s.). Cultures of wild strain G.s. and its pilA(-) mutant were anaerobically cultivated in the presence of the pair of such donors and acceptors of electrons: acetate - fumarate, and acetate - magnetite under anaerobic conditions. Each culture was injected in CC sample holders filled either with N2-CO2 mix (planktonic variant) or with this gases mix and glass beads, d=1 mm, (porous medium variant). Both strains of G.s. proliferated well in a medium supplemented with acetate-fumarate. However, pilA(-) mutant did not multiply in a medium supplemented with ox-red pair yeast extract - magnetite. This observation confirmed that only wild pilA(+) strain is capable of the dissimilatory reduction of Fe(III) within magnetite molecule. The measurement of CC responses from planktonic culture of G.s. wild strain grown with acetate-fumarate did not show linear correlation with their magnitudes but

  12. Molecular signatures define two main classes of meningiomas

    Directory of Open Access Journals (Sweden)

    Costello Joseph F

    2007-10-01

    Full Text Available Abstract Background Meningiomas are common brain tumors that are classified into three World Health Organization grades (benign, atypical and malignant and are molecularly ill-defined tumors. The purpose of this study was identify molecular signatures unique to the different grades of meningiomas and to unravel underlying molecular mechanisms driving meningioma tumorigenesis. Results We have used a combination of gene expression microarrays and array comparative genomic hybridization (aCGH to show that meningiomas of all three grades fall into two main molecular groups designated 'low-proliferative' and 'high-proliferative' meningiomas. While all benign meningiomas fall into the low-proliferative group and all malignant meningiomas fall into the high-proliferative group, atypical meningiomas distribute into either one of these groups. High-proliferative atypical meningiomas had an elevated median MIB-1 labeling index and a greater frequency of copy number aberrations (CNAs compared to low-proliferative atypical meningiomas. Additionally, losses on chromosome 6q, 9p, 13 and 14 were found exclusively in the high-proliferative meningiomas. We have identified genes that distinguish benign low-proliferative meningiomas from malignant high-proliferative meningiomas and have found that gain of cell-proliferation markers and loss of components of the transforming growth factor-beta signaling pathway were the major molecular mechanisms that distinguish these two groups. Conclusion Collectively, our data suggests that atypical meningiomas are not a molecularly distinct group but are similar to either benign or malignant meningiomas. It is anticipated that identified molecular and CNA markers will potentially be more accurate prognostic markers of meningiomas.

  13. Non-proliferation and multinational enterprises

    International Nuclear Information System (INIS)

    1979-04-01

    The paper supplements CC/WG.2/9 in presenting the Japanese delegation's contribution in the areas of non-proliferation and multi-national enterprises. The paper questions whether multinational enrichment enterprises would constitute a significant non-proliferation factor, noting that the nature of the venture might create a potential for the dissemination of sensitive information. The paper also argues that a multi-national venture which was not economically competitive (with national facilities) would have questionable viability. The conclusion is that non-proliferation advantages, if any, would be a result, not an objective of such a venture

  14. Comparative analysis of proliferation resistance assessment methodologies

    International Nuclear Information System (INIS)

    Takaki, Naoyuki; Kikuchi, Masahiro; Inoue, Naoko; Osabe, Takeshi

    2005-01-01

    Comparative analysis of the methodologies was performed based on the discussions in the international workshop on 'Assessment Methodology of Proliferation Resistance for Future Nuclear Energy Systems' held in Tokyo, on March 2005. Through the workshop and succeeding considerations, it is clarified that the proliferation resistance assessment methodologies are affected by the broader nuclear options being pursued and also by the political situations of the state. Even the definition of proliferation resistance, despite the commonality of fundamental issues, derives from perceived threat and implementation circumstances inherent to the larger programs. Deep recognitions of the 'difference' among communities would help us to make further essential and progressed discussion with harmonization. (author)

  15. The Solar-flux Third Granulation Signature

    Science.gov (United States)

    Gray, David F.; Oostra, Benjamin

    2018-01-01

    The velocity shifts of spectral lines as a function of line strength, so-called the third signature of granulation, are investigated using three published solar-flux atlases. We use flux atlases because we wish to treat the Sun as a star, against which stellar observations can be compared and judged. The atlases are critiqued and compared to the lower-resolution observations taken with the Elginfield stellar spectrograph. Third-signature plots are constructed for the 6020–6340 Å region. No dependence on excitation potential or wavelength is found over this wavelength span. The shape of the plots from the three solar atlases is essentially the same, with rms line-core velocity differences of 30–35 m s‑1. High-resolution atlas data are degraded to the level of the Elginfield spectrograph and compared to direct observations taken with that spectrograph. The line-core velocities show good agreement, with rms differences of 38 m s‑1. A new standard curve is derived and compared with the previously published one. Only small differences in shape are found, but a significant (+97 m s‑1) change in the zero point is indicated. The bisector of the Fe I 6253 line is mapped onto the third-signature plots and flux deficits are derived, which measure the granule/lane flux imbalance. The lower spectral resolution lowers the flux deficit area slightly and moves the peak of the deficit 0.3–0.5 km s‑1 toward higher velocities. These differences, while significant, are not large compared to measurement errors for stellar data.

  16. Identification of host response signatures of infection.

    Energy Technology Data Exchange (ETDEWEB)

    Branda, Steven S.; Sinha, Anupama; Bent, Zachary

    2013-02-01

    Biological weapons of mass destruction and emerging infectious diseases represent a serious and growing threat to our national security. Effective response to a bioattack or disease outbreak critically depends upon efficient and reliable distinguishing between infected vs healthy individuals, to enable rational use of scarce, invasive, and/or costly countermeasures (diagnostics, therapies, quarantine). Screening based on direct detection of the causative pathogen can be problematic, because culture- and probe-based assays are confounded by unanticipated pathogens (e.g., deeply diverged, engineered), and readily-accessible specimens (e.g., blood) often contain little or no pathogen, particularly at pre-symptomatic stages of disease. Thus, in addition to the pathogen itself, one would like to detect infection-specific host response signatures in the specimen, preferably ones comprised of nucleic acids (NA), which can be recovered and amplified from tiny specimens (e.g., fingerstick draws). Proof-of-concept studies have not been definitive, however, largely due to use of sub-optimal sample preparation and detection technologies. For purposes of pathogen detection, Sandia has developed novel molecular biology methods that enable selective isolation of NA unique to, or shared between, complex samples, followed by identification and quantitation via Second Generation Sequencing (SGS). The central hypothesis of the current study is that variations on this approach will support efficient identification and verification of NA-based host response signatures of infectious disease. To test this hypothesis, we re-engineered Sandia's sophisticated sample preparation pipelines, and developed new SGS data analysis tools and strategies, in order to pioneer use of SGS for identification of host NA correlating with infection. Proof-of-concept studies were carried out using specimens drawn from pathogen-infected non-human primates (NHP). This work provides a strong foundation for

  17. Signatures for quark clustering in nuclei

    Energy Technology Data Exchange (ETDEWEB)

    Carlson, C.E. [College of William and Mary, Williamsburg, VA (United States); Lassila, K.E. [Iowa State Univ., Ames, IA (United States)

    1994-04-01

    As a signature for the presence of quark clusters in nuclei, the authors suggest studying backward protons produced by electron scattering off deuterons and suggest a ratio that cancels out much of the detailed properties of deuterons or 6-quark clusters. The test may be viewed as a test that the short range part of the deuteron is still a 2-nucleon system. They make estimates to show how it fails in characteristic and significant ways if the two nucleons at short range coalesce into a kneaded 6-quark cluster.

  18. Study on the signatures for a magazine

    International Nuclear Information System (INIS)

    Chai, Jan Bom; Kim, Tae Hwan; Park, Sung Keun

    2004-01-01

    In this paper, diagnostic algorithms are developed to be utilized to monitor the condition of and to diagnose defects in the magazine of a fuelling machine installed in CANDU plants. The magazine plays a role in storing fuels, plugs and tools. Since the magazine operates in the high radiation area, it is impossible to give direct access to it for measuring the signals. Therefore, inlet and outlet pressures of a hydraulic motor, which can be acquired remotely, were selected as the measuring variables. The measured signals are further processed to extract the diagnostic signatures. They were examined and validated in the various experiments with the magazine mock-up

  19. Signatures for quark clustering in nuclei

    International Nuclear Information System (INIS)

    Carlson, C.E.; Lassila, K.E.

    1994-01-01

    As a signature for the presence of quark clusters in nuclei, the authors suggest studying backward protons produced by electron scattering off deuterons and suggest a ratio that cancels out much of the detailed properties of deuterons or 6-quark clusters. The test may be viewed as a test that the short range part of the deuteron is still a 2-nucleon system. They make estimates to show how it fails in characteristic and significant ways if the two nucleons at short range coalesce into a kneaded 6-quark cluster

  20. Strong signatures of right-handed compositeness

    Energy Technology Data Exchange (ETDEWEB)

    Redi, Michele [INFN, Sesto Fiorentino, Firenze (Italy); Sanz, Veronica [York Univ., Toronto, ON (Canada). Dept. of Physics and Astronomy; Sussex Univ., Brighton (United Kingdom). Dept. of Physics and Astronomy; Vries, Maikel de; Weiler, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2013-05-15

    Right-handed light quarks could be significantly composite, yet compatible with experimental searches at the LHC and precision tests on Standard Model couplings. In these scenarios, that are motivated by flavor physics, one expects large cross sections for the production of new resonances coupled to light quarks. We study experimental strong signatures of right-handed compositeness at the LHC, and constrain the parameter space of these models with recent results by ATLAS and CMS. We show that the LHC sensitivity could be significantly improved if dedicated searches were performed, in particular in multi-jet signals.

  1. Ulysses and the Signature of Things

    OpenAIRE

    Dukes, Hunter

    2017-01-01

    James Joyce’s depiction of autographic signatures resembles the “doctrine of signatures” — a pre-modern system of correspondence between medicinal plants and parts of the body. Certain aspects of this episteme reappear in the late nineteenth century. This recurrence is due, in large part, to developments in the technology of writing that threaten what Friedrich Kittler calls the “surrogate sensuality of handwriting.” Reading the “Nausicaa” episode of Ulysses against fin-de-siècle ideas about ...

  2. Characterizing Resident Space Object Earthshine Signature Variability

    Science.gov (United States)

    Van Cor, Jared D.

    There are three major sources of illumination on objects in the near Earth space environment: Sunshine, Moonshine, and Earthshine. For objects in this environment (satellites, orbital debris, etc.) known as Resident Space Objects (RSOs), the sun and the moon have consistently small illuminating solid angles and can be treated as point sources; this makes their incident illumination easily modeled. The Earth on the other hand has a large illuminating solid angle, is heterogeneous, and is in a constant state of change. The objective of this thesis was to characterize the impact and variability of observed RSO Earthshine on apparent magnitude signatures in the visible optical spectral region. A key component of this research was creating Earth object models incorporating the reflectance properties of the Earth. Two Earth objects were created: a homogeneous diffuse Earth object and a time sensitive heterogeneous Earth object. The homogeneous diffuse Earth object has a reflectance equal to the average global albedo, a standard model used when modeling Earthshine. The time sensitive heterogeneous Earth object was created with two material maps representative of the dynamic reflectance of the surface of the earth, and a shell representative of the atmosphere. NASA's Moderate-resolution Imaging Spectroradiometer (MODIS) Earth observing satellite product libraries, MCD43C1 global surface BRDF map and MOD06 global fractional cloud map, were utilized to create the material maps, and a hybridized version of the Empirical Line Method (ELM) was used to create the atmosphere. This dynamic Earth object was validated by comparing simulated color imagery of the Earth to that taken by: NASAs Earth Polychromatic Imaging Camera (EPIC) located on the Deep Space Climate Observatory (DSCOVR), and by MODIS located on the Terra satellite. The time sensitive heterogeneous Earth object deviated from MODIS imagery by a spectral radiance root mean square error (RMSE) of +/-14.86 [watts/m. 2sr

  3. Canada's nuclear non-proliferation policy

    International Nuclear Information System (INIS)

    1982-05-01

    Canada's non-proliferation safeguards policy has two objectives: 1) to promote a more effective and comprehensive international non-proliferation regime; and 2) to ensure that Canadian nuclear exports will not be used for any nuclear explosive purpose. By emphasizing the key role of the Non-Proliferation Treaty, promoting reliance upon and improvements in the IAEA safeguards system, treating nuclear weapon and non-weapon states alike, and working for new approaches covering reprocessing, Canada promotes attainment of the first objective. The second is served through the network of bilateral nuclear agreements that Canada has put into place with its partners. The Canadian objective in post-INFCE forums is to persuade the international community to devise a more effective and comprehensive non-proliferation regime into which Canada and other suppliers may subsume their national requirements

  4. Handbook for nuclear non-proliferation

    International Nuclear Information System (INIS)

    Lee, Byung Wook; Oh, Keun Bae; Lee, Kwang Seok; Lee, Dong Jin; Ko, Han Seok.

    1997-05-01

    This book analyzed international non-proliferation regime preventing from spread of nuclear weapon. This book took review from the historical background of non-proliferation regime to the recent changes and status. The regime, here, is divided into multilateral and bilateral regime. First of all, this book reports four multilateral treaties concluded for non-proliferation such as NPT, NWFZ, CTBT and others. Secondly, international organization and regimes concerned with non-proliferation are analyzed with emphasis of UN, IAEA, ZC and NSG, Regional Safeguards System and international conference. Finally, this book report the current circumstances of nuclear cooperation agreement related with Korea which is an important means for bilateral regime. (author). 13 tabs., 2 figs

  5. Nuclear experts and nuclear weapons proliferation

    International Nuclear Information System (INIS)

    Mueller, H.

    1979-01-01

    In Germany the issue of nuclear weapons proliferation has attracted scant attention. Most potential nuclear weapon states are important trade partners of the FRG and, since further proliferation of nuclear weapons could worsen conflicts involving these, it should be in the FRG's interest to limit proliferation. The security of the FRG is also dependent on the common interest of the great powers to avoid nuclear war. The contradictory positions of Usa and the USSR on nuclear weapons policy regarding themselves and non-nuclear weapon states encourages less developed countries to see nuclear weaponry as useful. The NPT and IAEA safeguards have only limited inhibiting effect. The nuclear export policy of the FRG has been dominated by short term economic advantage, neglecting the negative long term effects of decreased political stability. The FRG should formulate a policy based on self-restraint, positive stimuli and extension of controls, using its economic strength to deter proliferation. (JIW)

  6. Handbook for nuclear non-proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Byung Wook; Oh, Keun Bae; Lee, Kwang Seok; Lee, Dong Jin; Ko, Han Seok

    1997-05-01

    This book analyzed international non-proliferation regime preventing from spread of nuclear weapon. This book took review from the historical background of non-proliferation regime to the recent changes and status. The regime, here, is divided into multilateral and bilateral regime. First of all, this book reports four multilateral treaties concluded for non-proliferation such as NPT, NWFZ, CTBT and others. Secondly, international organization and regimes concerned with non-proliferation are analyzed with emphasis of UN, IAEA, ZC and NSG, Regional Safeguards System and international conference. Finally, this book report the current circumstances of nuclear cooperation agreement related with Korea which is an important means for bilateral regime. (author). 13 tabs., 2 figs.

  7. The future of non-proliferation

    International Nuclear Information System (INIS)

    Gere, F.

    2000-01-01

    This paper comprises two parts. The first part makes a status of the non-proliferation policy: problems of ratification of Start 2 and CTBT treaties, nuclear tests in India and Pakistan in May 1998 etc. The second part makes a prospective reflexion on the evolution of the position of nuclearized countries at the 2015-2030 vista: role of Asia, nuclear perception, evolution of the US perception of non-proliferation, military strategy and European unification. (J.S.)

  8. Nuclear power and the proliferation issue

    International Nuclear Information System (INIS)

    Marshall, W.

    1978-02-01

    The purpose of the lecture is to discuss nuclear proliferation, analyse which problems are real and which are a misapprehension, and to suggest a way forward which retains the benefits of nuclear power while providing a more certain protection against undesirable proliferation. After an introductory section the lecture continues under the following headings: plutonium production and accessibility; the use of plutonium; fast reactor fuel; the interim period; conclusions. (U.K.)

  9. Panel on nuclear export and proliferation

    International Nuclear Information System (INIS)

    Kimel, W.R.

    1977-01-01

    Summaries of six panelists' remarks make the following points: one cannot suppress nuclear weapons by suppressing nuclear power; a proliferated world would be extremely dangerous; US supports IAEA safeguards; plutonium shouldn't be recycled in power reactors; and the problem of nonproliferation is a social and institutional problem, not a technological one. Viewographs showing the semantics of proliferation, ways to get nuclear weapons materials, etc. are included

  10. Energy efficiency and proliferation assessment factors

    International Nuclear Information System (INIS)

    1979-02-01

    The objective of INFCE is to evaluate the nuclear fuel cycles from the point of view of their ability to satisfy the worldwide nuclear energy needs, while minimizing the proliferation risks. Accordingly, the different working groups have to take into consideration as well the energy-efficiency and the proliferation-resistance of these nuclear fuel cycles. The present working paper is aimed at suggesting the main assessment factors which should be taken into consideration

  11. Russia and proliferation in Northeast Asia

    International Nuclear Information System (INIS)

    Ignatov, A.I.

    1995-01-01

    For Russia, security, including non-proliferation, in Northeast Asia means in particular the maintenance of stability. Progress in arms control and non-proliferation may enhance regional stability. A common regional approach is proposed. Russia recognizes the US alliances with Japan and republic of Korea and is searching for a new cooperation framework in the region, namely further development of relations with China and reasonable rapprochement with Japan

  12. Managing Proliferation Issues with Iran

    International Nuclear Information System (INIS)

    Nelson, C. Richard; Saltiel, David H.

    2002-01-01

    particular, will continue to play a vital role in determining the extent to which Iran is able to pursue WMD options. Without a fundamental change in the regional security environment, however, there is little reason to expect changes in Iranian WMD and missile policies, and the United States, acting alone and short of war, cannot prevent Iran from ultimately developing WMD and delivery systems. Furthermore, U.S. policies that take a tougher line with Russia, China and North Korea are not likely to lead to more restraint among these potential sources of WMD and missile technology. In the absence of engagement with Iran, unilateral U.S. economic sanctions will remain the principal, if flawed, U.S. policy tool for seeking to prevent Iran from acquiring WMD. The rationale is that by discouraging trade and investment, particularly in Iran's energy sector, the government of Iran will have less revenue to pursue proliferation. Without broad international support for economic isolation, however, such an effort may hinder Iran's WMD programs, though it cannot block them. Finally, options are needed to deal with major failures in nonproliferation efforts. These options include measures to deter Iranian use of WMD, to defend against their use if deterrence fails, and to destroy Iranian WMD capabilities should the need arise

  13. Strengthening the nuclear non-proliferation regime

    International Nuclear Information System (INIS)

    Carlson, J.

    2003-01-01

    Although the nuclear non-proliferation regime has enjoyed considerable success, today the regime has never been under greater threat. Three states have challenged the objectives of the NPT, and there is a technology challenge - the spread of centrifuge enrichment technology and know-how. A major issue confronting the international community is, how to deal with a determined proliferator? Despite this gloomy scenario, however, the non-proliferation regime has considerable strengths - many of which can be developed further. The regime comprises complex interacting and mutually reinforcing elements. At its centre is the NPT - with IAEA safeguards as the Treaty's verification mechanism. Important complementary elements include: restraint in the supply and the acquisition of sensitive technologies; multilateral regimes such as the CTBT and proposed FMCT; various regional and bilateral regimes; the range of security and arms control arrangements outside the nuclear area (including other WMD regimes); and the development of proliferation-resistant technologies. Especially important are political incentives and sanctions in support of non-proliferation objectives. This paper outlines some of the key issues facing the non-proliferation regime

  14. Supporting non proliferation and global security efforts

    International Nuclear Information System (INIS)

    Pochon, E.

    2013-01-01

    CEA contributes as a major actor of France's action against nuclear proliferation and to the strengthening of nuclear security at national level as European and International levels, in particular through the support of the IAEA activities in nuclear non proliferation with the French Support Programme for the IAEA safeguards system and security with the contribution to the IAEA Nuclear Security Plan and cooperation projects with the European Commission. The CEA is a French government funded technological research organization, organized around 5 branches: Nuclear Energy, Technological Researches, Defence (DAM), Material Sciences and Life Sciences. Within the scope of its activities, CEA covers most of the research areas and techniques in nuclear non-proliferation and security. The CEA is also the advisor of the French Government on nuclear policy. Treaty monitoring and the development and implementation of non proliferation and global security programs is an important mission of DAM which rely on nuclear weapons manufacture and past testing experience. The programmes on non proliferation and global security carried out to fulfil DAM's mission cover the following areas: development of monitoring and detection methods and equipments, country profiles and nuclear stockpiles assessment, arms control instruments, proliferation resistance of nuclear fuel cycle, monitoring of nuclear tests, operation and maintenance of national detection capabilities and contribution to CTBT verification systems. (A.C.)

  15. Signatures of unstable semiclassical trajectories in tunneling

    International Nuclear Information System (INIS)

    Levkov, D G; Panin, A G; Sibiryakov, S M

    2009-01-01

    It was found recently that processes of multidimensional tunneling are generally described at high energies by unstable semiclassical trajectories. We study two observational signatures related to the instability of trajectories. First, we find an additional power-law dependence of the tunneling probability on the semiclassical parameter as compared to the standard case of potential tunneling. The second signature is a substantial widening of the probability distribution over final-state quantum numbers. These effects are studied using a modified semiclassical technique which incorporates stabilization of the tunneling trajectories. The technique is derived from first principles. We obtain expressions for the inclusive and exclusive tunneling probabilities in the case of unstable semiclassical trajectories. We also investigate the 'phase transition' between the cases of stable and unstable trajectories across certain 'critical' values of energy. Finally, we derive the relation between the semiclassical probabilities of tunneling from the low-lying and highly excited initial states. This puts on firm ground a conjecture made previously in the semiclassical description of collision-induced tunneling in field theory

  16. Theoretical Characterizaiton of Visual Signatures (Muzzle Flash)

    Science.gov (United States)

    Kashinski, D. O.; Scales, A. N.; Vanderley, D. L.; Chase, G. M.; di Nallo, O. E.; Byrd, E. F. C.

    2014-05-01

    We are investigating the accuracy of theoretical models used to predict the visible, ultraviolet and infrared spectra of product materials ejected from the muzzle of currently fielded systems. Recent advances in solid propellants has made the management of muzzle signature (flash) a principle issue in weapons development across the calibers. A priori prediction of the electromagnetic spectra of formulations will allow researchers to tailor blends that yield desired signatures and determine spectrographic detection ranges. We are currently employing quantum chemistry methods at various levels of sophistication to optimize molecular geometries, compute vibrational frequencies, and determine the optical spectra of specific gas-phase molecules and radicals of interest. Electronic excitations are being computed using Time Dependent Density Functional Theory (TD-DFT). A comparison of computational results to experimental values found in the literature is used to assess the affect of basis set and functional choice on calculation accuracy. The current status of this work will be presented at the conference. Work supported by the ARL, and USMA.

  17. Signature inversion in doubly odd 124La

    International Nuclear Information System (INIS)

    Chantler, H.J.; Paul, E.S.; Boston, A.J.; Choy, P.T.W.; Nolan, P.J.; Carpenter, M.P.; Davids, C.N.; Seweryniak, D.; Charity, R.; Devlin, M.; Sarantites, D.G.; Chiara, C.J.; Fossan, D.B.; Koike, T.; LaFosse, D.R.; Starosta, K.; Fletcher, A.M.; Smith, J.F.; Jenkins, D.G.; Kelsall, N.S.

    2002-01-01

    High-spin states have been studied in neutron-deficient 57 124 La 67 , populated through the 64 Zn( 64 Zn,3pn) reaction at 260 MeV. The Gammasphere γ-ray spectrometer has been used in conjunction with the Microball charged-particle detector, the Neutron Shell, and the Argonne Fragment Mass Analyzer, in order to select evaporation residues of interest. The known band structures have been extended and new bands found. Most of the bands are linked together, allowing more consistent spin and parity assignments. Comparison of band properties to cranking calculations has allowed configuration assignments to be made and includes the first identification of the g 9/2 proton-hole in an odd-odd lanthanum isotope. Two bands have been assigned a πh 11/2 xνh 11/2 structure; the yrast one exhibits a signature inversion in its level energies below I=18.5(ℎ/2π), while the excited one exhibits a signature inversion above I=18.5(ℎ/2π)

  18. Persistence of social signatures in human communication.

    Science.gov (United States)

    Saramäki, Jari; Leicht, E A; López, Eduardo; Roberts, Sam G B; Reed-Tsochas, Felix; Dunbar, Robin I M

    2014-01-21

    The social network maintained by a focal individual, or ego, is intrinsically dynamic and typically exhibits some turnover in membership over time as personal circumstances change. However, the consequences of such changes on the distribution of an ego's network ties are not well understood. Here we use a unique 18-mo dataset that combines mobile phone calls and survey data to track changes in the ego networks and communication patterns of students making the transition from school to university or work. Our analysis reveals that individuals display a distinctive and robust social signature, captured by how interactions are distributed across different alters. Notably, for a given ego, these social signatures tend to persist over time, despite considerable turnover in the identity of alters in the ego network. Thus, as new network members are added, some old network members either are replaced or receive fewer calls, preserving the overall distribution of calls across network members. This is likely to reflect the consequences of finite resources such as the time available for communication, the cognitive and emotional effort required to sustain close relationships, and the ability to make emotional investments.

  19. Corticosteroid receptors adopt distinct cyclical transcriptional signatures.

    Science.gov (United States)

    Le Billan, Florian; Amazit, Larbi; Bleakley, Kevin; Xue, Qiong-Yao; Pussard, Eric; Lhadj, Christophe; Kolkhof, Peter; Viengchareun, Say; Fagart, Jérôme; Lombès, Marc

    2018-05-07

    Mineralocorticoid receptors (MRs) and glucocorticoid receptors (GRs) are two closely related hormone-activated transcription factors that regulate major pathophysiologic functions. High homology between these receptors accounts for the crossbinding of their corresponding ligands, MR being activated by both aldosterone and cortisol and GR essentially activated by cortisol. Their coexpression and ability to bind similar DNA motifs highlight the need to investigate their respective contributions to overall corticosteroid signaling. Here, we decipher the transcriptional regulatory mechanisms that underlie selective effects of MRs and GRs on shared genomic targets in a human renal cellular model. Kinetic, serial, and sequential chromatin immunoprecipitation approaches were performed on the period circadian protein 1 ( PER1) target gene, providing evidence that both receptors dynamically and cyclically interact at the same target promoter in a specific and distinct transcriptional signature. During this process, both receptors regulate PER1 gene by binding as homo- or heterodimers to the same promoter region. Our results suggest a novel level of MR-GR target gene regulation, which should be considered for a better and integrated understanding of corticosteroid-related pathophysiology.-Le Billan, F., Amazit, L., Bleakley, K., Xue, Q.-Y., Pussard, E., Lhadj, C., Kolkhof, P., Viengchareun, S., Fagart, J., Lombès, M. Corticosteroid receptors adopt distinct cyclical transcriptional signatures.

  20. Monotop signature from a fermionic top partner

    Science.gov (United States)

    Gonçalves, Dorival; Kong, Kyoungchul; Sakurai, Kazuki; Takeuchi, Michihisa

    2018-01-01

    We investigate monotop signatures arising from phenomenological models of fermionic top partners, which are degenerate in mass and decay into a bosonic dark matter candidate, either spin 0 or spin 1. Such a model provides a monotop signature as a smoking gun, while conventional searches with t t ¯ + missing transverse momentum are limited. Two such scenarios, (i) a phenomenological third generation extradimensional model with excited top and electroweak sectors, and (ii) a model where only a top partner and a dark matter particle are added to the standard model, are studied in the degenerate mass regime. We find that in the case of extra dimension a number of different processes give rise to effectively the same monotop final state, and a great gain can be obtained in the sensitivity for this channel. We show that the monotop search can explore top-partner masses up to 630 and 300 GeV for the third generation extradimensional model and the minimal fermionic top-partner model, respectively, at the high luminosity LHC.

  1. Automated defect spatial signature analysis for semiconductor manufacturing process

    Science.gov (United States)

    Tobin, Jr., Kenneth W.; Gleason, Shaun S.; Karnowski, Thomas P.; Sari-Sarraf, Hamed

    1999-01-01

    An apparatus and method for performing automated defect spatial signature alysis on a data set representing defect coordinates and wafer processing information includes categorizing data from the data set into a plurality of high level categories, classifying the categorized data contained in each high level category into user-labeled signature events, and correlating the categorized, classified signature events to a present or incipient anomalous process condition.

  2. Provably Secure and Subliminal-Free Variant of Schnorr Signature

    OpenAIRE

    Zhang , Yinghui; Li , Hui; Li , Xiaoqing; Zhu , Hui

    2013-01-01

    Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES); International audience; Subliminal channels present a severe challenge to information security. Currently, subliminal channels still exist in Schnorr signature. In this paper, we propose a subliminal-free variant of Schnorr signature. In the proposed scheme, an honest-but-curious warden is introduced to help the signer to generate a signature on a given message, but it is disallowed to sign messages independently. ...

  3. Invariance Signatures: Characterizing contours by their departures from invariance

    OpenAIRE

    Squire, David; Caelli, Terry M.

    1997-01-01

    In this paper, a new invariant feature of two-dimensional contours is reported: the Invariance Signature. The Invariance Signature is a measure of the degree to which a contour is invariant under a variety of transformations, derived from the theory of Lie transformation groups. It is shown that the Invariance Signature is itself invariant under shift, rotation and scaling of the contour. Since it is derived from local properties of the contour, it is well-suited to a neural network implement...

  4. Analysis of Non-contact Acousto Thermal Signature Data (Postprint)

    Science.gov (United States)

    2016-02-01

    AFRL-RX-WP-JA-2016-0321 ANALYSIS OF NON-CONTACT ACOUSTO-THERMAL SIGNATURE DATA (POSTPRINT) Amanda K. Criner AFRL/RX...October 2014 – 16 September 2015 4. TITLE AND SUBTITLE ANALYSIS OF NON-CONTACT ACOUSTO-THERMAL SIGNATURE DATA (POSTPRINT) 5a. CONTRACT NUMBER...words) The non-contact acousto-thermal signature (NCATS) is a nondestructive evaluation technique with potential to detect fatigue in materials such as

  5. Proliferating cell nuclear antigen (PCNA): a new marker to study human colonic cell proliferation.

    OpenAIRE

    Kubben, F J; Peeters-Haesevoets, A; Engels, L G; Baeten, C G; Schutte, B; Arends, J W; Stockbrügger, R W; Blijham, G H

    1994-01-01

    Immunohistochemistry of the S phase related proliferating cell nuclear antigen (PCNA) was studied as an alternative to ex-vivo bromodeoxyuridine (BrdU) immunohistochemistry for assessment of human colonic cell proliferation. From 16 subjects without colonic disease biopsy specimens were collected from five different sites along the colorectum and processed for BrdU and PCNA immunohistochemistry. The mean proliferation index of PCNA was significantly higher at 133% of the value obtained with B...

  6. General Conversion for Obtaining Strongly Existentially Unforgeable Signatures

    Science.gov (United States)

    Teranishi, Isamu; Oyama, Takuro; Ogata, Wakaha

    We say that a signature scheme is strongly existentially unforgeable (SEU) if no adversary, given message/signature pairs adaptively, can generate a signature on a new message or a new signature on a previously signed message. We propose a general and efficient conversion in the standard model that transforms a secure signature scheme to SEU signature scheme. In order to construct that conversion, we use a chameleon commitment scheme. Here a chameleon commitment scheme is a variant of commitment scheme such that one can change the committed value after publishing the commitment if one knows the secret key. We define the chosen message security notion for the chameleon commitment scheme, and show that the signature scheme transformed by our proposed conversion satisfies the SEU property if the chameleon commitment scheme is chosen message secure. By modifying the proposed conversion, we also give a general and efficient conversion in the random oracle model, that transforms a secure signature scheme into a SEU signature scheme. This second conversion also uses a chameleon commitment scheme but only requires the key only attack security for it.

  7. Enhanced arbitrated quantum signature scheme using Bell states

    International Nuclear Information System (INIS)

    Wang Chao; Liu Jian-Wei; Shang Tao

    2014-01-01

    We investigate the existing arbitrated quantum signature schemes as well as their cryptanalysis, including intercept-resend attack and denial-of-service attack. By exploring the loopholes of these schemes, a malicious signatory may successfully disavow signed messages, or the receiver may actively negate the signature from the signatory without being detected. By modifying the existing schemes, we develop counter-measures to these attacks using Bell states. The newly proposed scheme puts forward the security of arbitrated quantum signature. Furthermore, several valuable topics are also presented for further research of the quantum signature scheme

  8. FIR signature verification system characterizing dynamics of handwriting features

    Science.gov (United States)

    Thumwarin, Pitak; Pernwong, Jitawat; Matsuura, Takenobu

    2013-12-01

    This paper proposes an online signature verification method based on the finite impulse response (FIR) system characterizing time-frequency characteristics of dynamic handwriting features. First, the barycenter determined from both the center point of signature and two adjacent pen-point positions in the signing process, instead of one pen-point position, is used to reduce the fluctuation of handwriting motion. In this paper, among the available dynamic handwriting features, motion pressure and area pressure are employed to investigate handwriting behavior. Thus, the stable dynamic handwriting features can be described by the relation of the time-frequency characteristics of the dynamic handwriting features. In this study, the aforesaid relation can be represented by the FIR system with the wavelet coefficients of the dynamic handwriting features as both input and output of the system. The impulse response of the FIR system is used as the individual feature for a particular signature. In short, the signature can be verified by evaluating the difference between the impulse responses of the FIR systems for a reference signature and the signature to be verified. The signature verification experiments in this paper were conducted using the SUBCORPUS MCYT-100 signature database consisting of 5,000 signatures from 100 signers. The proposed method yielded equal error rate (EER) of 3.21% on skilled forgeries.

  9. Nuclear arbitration: Interpreting non-proliferation agreements

    International Nuclear Information System (INIS)

    Tzeng, Peter

    2015-01-01

    At the core of the nuclear non-proliferation regime lie international agreements. These agreements include, inter alia, the Nuclear Non-proliferation Treaty, nuclear co-operation agreements and nuclear export control agreements.1 States, however, do not always comply with their obligations under these agreements. In response, commentators have proposed various enforcement mechanisms to promote compliance. The inconvenient truth, however, is that states are generally unwilling to consent to enforcement mechanisms concerning issues as critical to national security as nuclear non-proliferation.3 This article suggests an alternative solution to the non-compliance problem: interpretation mechanisms. Although an interpretation mechanism does not have the teeth of an enforcement mechanism, it can induce compliance by providing an authoritative interpretation of a legal obligation. Interpretation mechanisms would help solve the non-compliance problem because, as this article shows, in many cases of alleged non-compliance with a non-proliferation agreement, the fundamental problem has been the lack of an authoritative interpretation of the agreement, not the lack of an enforcement mechanism. Specifically, this article proposes arbitration as the proper interpretation mechanism for non-proliferation agreements. It advocates the establishment of a 'Nuclear Arbitration Centre' as an independent branch of the International Atomic Energy Agency (IAEA), and recommends the gradual introduction of arbitration clauses into the texts of non-proliferation agreements. Section I begins with a discussion of international agreements in general and the importance of interpretation and enforcement mechanisms. Section II then discusses nuclear non-proliferation agreements and their lack of interpretation and enforcement mechanisms. Section III examines seven case studies of alleged non-compliance with non-proliferation agreements in order to show that the main problem in many cases

  10. Genome signature analysis of thermal virus metagenomes reveals Archaea and thermophilic signatures

    Directory of Open Access Journals (Sweden)

    Pride David T

    2008-09-01

    Full Text Available Abstract Background Metagenomic analysis provides a rich source of biological information for otherwise intractable viral communities. However, study of viral metagenomes has been hampered by its nearly complete reliance on BLAST algorithms for identification of DNA sequences. We sought to develop algorithms for examination of viral metagenomes to identify the origin of sequences independent of BLAST algorithms. We chose viral metagenomes obtained from two hot springs, Bear Paw and Octopus, in Yellowstone National Park, as they represent simple microbial populations where comparatively large contigs were obtained. Thermal spring metagenomes have high proportions of sequences without significant Genbank homology, which has hampered identification of viruses and their linkage with hosts. To analyze each metagenome, we developed a method to classify DNA fragments using genome signature-based phylogenetic classification (GSPC, where metagenomic fragments are compared to a database of oligonucleotide signatures for all previously sequenced Bacteria, Archaea, and viruses. Results From both Bear Paw and Octopus hot springs, each assembled contig had more similarity to other metagenome contigs than to any sequenced microbial genome based on GSPC analysis, suggesting a genome signature common to each of these extreme environments. While viral metagenomes from Bear Paw and Octopus share some similarity, the genome signatures from each locale are largely unique. GSPC using a microbial database predicts most of the Octopus metagenome has archaeal signatures, while bacterial signatures predominate in Bear Paw; a finding consistent with those of Genbank BLAST. When using a viral database, the majority of the Octopus metagenome is predicted to belong to archaeal virus Families Globuloviridae and Fuselloviridae, while none of the Bear Paw metagenome is predicted to belong to archaeal viruses. As expected, when microbial and viral databases are combined, each of

  11. Genome signature analysis of thermal virus metagenomes reveals Archaea and thermophilic signatures.

    Science.gov (United States)

    Pride, David T; Schoenfeld, Thomas

    2008-09-17

    Metagenomic analysis provides a rich source of biological information for otherwise intractable viral communities. However, study of viral metagenomes has been hampered by its nearly complete reliance on BLAST algorithms for identification of DNA sequences. We sought to develop algorithms for examination of viral metagenomes to identify the origin of sequences independent of BLAST algorithms. We chose viral metagenomes obtained from two hot springs, Bear Paw and Octopus, in Yellowstone National Park, as they represent simple microbial populations where comparatively large contigs were obtained. Thermal spring metagenomes have high proportions of sequences without significant Genbank homology, which has hampered identification of viruses and their linkage with hosts. To analyze each metagenome, we developed a method to classify DNA fragments using genome signature-based phylogenetic classification (GSPC), where metagenomic fragments are compared to a database of oligonucleotide signatures for all previously sequenced Bacteria, Archaea, and viruses. From both Bear Paw and Octopus hot springs, each assembled contig had more similarity to other metagenome contigs than to any sequenced microbial genome based on GSPC analysis, suggesting a genome signature common to each of these extreme environments. While viral metagenomes from Bear Paw and Octopus share some similarity, the genome signatures from each locale are largely unique. GSPC using a microbial database predicts most of the Octopus metagenome has archaeal signatures, while bacterial signatures predominate in Bear Paw; a finding consistent with those of Genbank BLAST. When using a viral database, the majority of the Octopus metagenome is predicted to belong to archaeal virus Families Globuloviridae and Fuselloviridae, while none of the Bear Paw metagenome is predicted to belong to archaeal viruses. As expected, when microbial and viral databases are combined, each of the Octopus and Bear Paw metagenomic contigs

  12. A Cell Proliferation Signature Is a Marker of Extremely Poor Outcome in a Subpopulation of Breast Cancer Patients

    NARCIS (Netherlands)

    Dai, H.; Veer, L.J. van 't; Lamb, J.; He, Y.; Mao, M.; Fine, B.M.; Bernards, R.A.; Vijver, M.J.; Deutsch, P.; Sachs, A.; Stoughton, R.; Friend, S.H.

    2005-01-01

    Breast cancer comprises a group of distinct subtypes that despite having similar histologic appearances, have very different metastatic potentials. Being able to identify the biological driving force, even for a subset of patients, is crucially important given the large population of women diagnosed

  13. A cell proliferation signature is a marker of extremely poor outcome in a subpopulation of breast cancer patients

    NARCIS (Netherlands)

    Dai, Hongyue; van't Veer, Laura; Lamb, John; He, Yudong D.; Mao, Mao; Fine, Bernard M.; Bernards, Rene; van de Vijver, Marc; Deutsch, Paul; Sachs, Alan; Stoughton, Roland; Friend, Stephen

    2005-01-01

    Breast cancer comprises a group of distinct subtypes that despite having similar histologic appearances, have very different metastatic potentials. Being able to identify the biological driving force, even for a subset of patients, is crucially important given the large population of women diagnosed

  14. Identification of colonic fibroblast secretomes reveals secretory factors regulating colon cancer cell proliferation.

    Science.gov (United States)

    Chen, Sun-Xia; Xu, Xiao-En; Wang, Xiao-Qing; Cui, Shu-Jian; Xu, Lei-Lei; Jiang, Ying-Hua; Zhang, Yang; Yan, Hai-Bo; Zhang, Qian; Qiao, Jie; Yang, Peng-Yuan; Liu, Feng

    2014-10-14

    Stromal microenvironment influences tumor cell proliferation and migration. Fibroblasts represent the most abundant stromal constituents. Here, we established two pairs of normal fibroblast (NF) and cancer-associated fibroblast (CAF) cultures from colorectal adenocarcinoma tissues and the normal counterparts. The NFs and CAFs were stained positive for typical fibroblast markers and inhibited colon cancer (CC) cell proliferation in in vitro cocultures and in xenograft mouse models. The fibroblast conditioned media were analyzed using LC-MS and 227 proteins were identified at a false discovery rate of 1.3%, including 131 putative secretory and 20 plasma membrane proteins. These proteins were enriched for functional categories of extracellular matrix, adhesion, cell motion, inflammatory response, redox homeostasis and peptidase inhibitor. Secreted protein acidic and rich in cysteine, transgelin, follistatin-related protein 1 (FSTL1) and decorin was abundant in the fibroblast secretome as confirmed by Western blot. Silencing of FSTL1 and transgelin in colonic fibroblast cell line CCD-18Co induced an accelerated proliferation of CC cells in cocultures. Exogenous FSTL1 attenuates CC cell proliferation in a negative fashion. FSTL1 was upregulated in CC patient plasma and cancerous tissues but had no implication in prognosis. Our results provided novel insights into the molecular signatures and modulatory role of CC associated fibroblasts. In this study, a label-free LC-MS was performed to analyze the secretomes of two paired primary fibroblasts, which were isolated from fresh surgical specimen of colorectal adenocarcinoma and adjacent normal colonic tissues and exhibited negative modulatory activity for colon cancer cell growth in in vitro cocultures and in vivo xenograph mouse models. Follistatin-related protein 1 was further revealed to be one of the stroma-derived factors of potential suppression role for colon cancer cell proliferation. Our results provide novel

  15. A proteomics analysis for certain signature proteins of rabbit lacrimal passages after 125I seeds brachytherapy

    International Nuclear Information System (INIS)

    Li Dandan; Liu Lin; Gao Shi; Qi Liangchen; Ma Qingjie; Jin Longyun

    2010-01-01

    To search for certain signature proteins and the expression profiles in lacrimal passage stenosis, rabbit models of lacrimal passage stenosis were treated by 125 I seed brachytherapy. All the signature proteins were separated by two-dimensional electrophoresis, and identified by mass spectrometry. The results show that the up-regulated proteins are peptidyl-prolyl cis-trans isomerase A (PPIase A), and epidermal fatty acid-binding protein (E-FABP), while the down-regulated proteins are myosin light chain 1 (isomer of skeletal muscle), myosin light polypeptide 6 (isomer 1 of smooth muscle and non-muscle), myosin light chain 1 (isomer of slow-twitch muscle A), isomer 2 of ERC protein 2, and α-crystalline family protein. The proteins may play a role in healing the wound and regulating synaptic active zone of neurons due to correlation to cell apoptosis, proliferation and migration of smooth muscle cell. These provide molecular mechanism for preventing stenosis and restenosis of lacrimal passage. (authors)

  16. Do two machine-learning based prognostic signatures for breast cancer capture the same biological processes?

    Science.gov (United States)

    Drier, Yotam; Domany, Eytan

    2011-03-14

    The fact that there is very little if any overlap between the genes of different prognostic signatures for early-discovery breast cancer is well documented. The reasons for this apparent discrepancy have been explained by the limits of simple machine-learning identification and ranking techniques, and the biological relevance and meaning of the prognostic gene lists was questioned. Subsequently, proponents of the prognostic gene lists claimed that different lists do capture similar underlying biological processes and pathways. The present study places under scrutiny the validity of this claim, for two important gene lists that are at the focus of current large-scale validation efforts. We performed careful enrichment analysis, controlling the effects of multiple testing in a manner which takes into account the nested dependent structure of gene ontologies. In contradiction to several previous publications, we find that the only biological process or pathway for which statistically significant concordance can be claimed is cell proliferation, a process whose relevance and prognostic value was well known long before gene expression profiling. We found that the claims reported by others, of wider concordance between the biological processes captured by the two prognostic signatures studied, were found either to be lacking statistical rigor or were in fact based on addressing some other question.

  17. Do two machine-learning based prognostic signatures for breast cancer capture the same biological processes?

    Directory of Open Access Journals (Sweden)

    Yotam Drier

    2011-03-01

    Full Text Available The fact that there is very little if any overlap between the genes of different prognostic signatures for early-discovery breast cancer is well documented. The reasons for this apparent discrepancy have been explained by the limits of simple machine-learning identification and ranking techniques, and the biological relevance and meaning of the prognostic gene lists was questioned. Subsequently, proponents of the prognostic gene lists claimed that different lists do capture similar underlying biological processes and pathways. The present study places under scrutiny the validity of this claim, for two important gene lists that are at the focus of current large-scale validation efforts. We performed careful enrichment analysis, controlling the effects of multiple testing in a manner which takes into account the nested dependent structure of gene ontologies. In contradiction to several previous publications, we find that the only biological process or pathway for which statistically significant concordance can be claimed is cell proliferation, a process whose relevance and prognostic value was well known long before gene expression profiling. We found that the claims reported by others, of wider concordance between the biological processes captured by the two prognostic signatures studied, were found either to be lacking statistical rigor or were in fact based on addressing some other question.

  18. Quantum liquid signatures in dwarf stars

    Energy Technology Data Exchange (ETDEWEB)

    Gabadadze, Gregory; Pirtskhalava, David, E-mail: gg32@nyu.edu, E-mail: dmp371@nyu.edu [Center for Cosmology and Particle Physics, Department of Physics, New York University, New York, NY 10003 (United States)

    2009-05-15

    We develop further the proposal of arXiv:0806.3692 that a new state of matter - charged condensate of spin-0 nuclei - may exist in helium-core dwarf stars. The charged condensate and its fluctuations are described by an effective field theory Lagrangian. The spectrum of bosonic fluctuations is gapped, while electrons, at temperatures of interest, give rise to gapless excitations near the Fermi surface. These properties determine the evolution of the dwarfs with condensed cores. In particular, we show that such dwarf stars would cool significantly faster than their crystallized counterparts. As a result, the luminosity function for the helium-core dwarfs will have a sharp drop-off after the condensation. It is tempting to interpret the recently discovered abrupt termination of a sequence of 24 helium-core dwarf candidates in NGC 6397 as a signature of the charged condensation.

  19. SSC physics signatures and trigger requirements

    International Nuclear Information System (INIS)

    1985-01-01

    Strategies are considered for triggering on new physics processes on the environment of the SSC, where interaction rates will be very high and most new physics processes quite rare. The quantities available for use in the trigger at various levels are related to the signatures of possible new physics. Two examples were investigated in some detail using the ISAJET Monte Carlo program: Higgs decays to W pairs and a missing energy trigger applied to gluino pair production. In both of the examples studied in detail, it was found that workable strategies for reducing the trigger rate were obtainable which also produced acceptable efficiency for the processes of interest. In future work, it will be necessary to carry out such a program for the full spectrum of suggested new physics

  20. Signatures of massive sgoldstinos at hadron colliders

    International Nuclear Information System (INIS)

    Perazzi, Elena; Ridolfi, Giovanni; Zwirner, Fabio

    2000-01-01

    In supersymmetric extensions of the Standard Model with a very light gravitino, the effective theory at the weak scale should contain not only the goldstino G-tilde, but also its supersymmetric partners, the sgoldstinos. In the simplest case, the goldstino is a gauge-singlet and its superpartners are two neutral spin-0 particles, S and P. We study possible signals of massive sgoldstinos at hadron colliders, focusing on those that are most relevant for the Tevatron. We show that inclusive production of sgoldstinos, followed by their decay into two photons, can lead to observable signals or to stringent combined bounds on the gravitino and sgoldstino masses. Sgoldstino decays into two gluon jets may provide a useful complementary signature

  1. Signatures of chromodynamics in hadron collisions

    International Nuclear Information System (INIS)

    Halzen, F.

    1979-01-01

    The quantum chromodynamics (QCD) describes the interaction of the parton constituents of hadrons (quarks and gluons) via eight colored photons (gluons) interacting with the quarks, and unlike the photons, with each other. The simple picture of Drell-Yan model has made surprising success. The marriage of the old fashion Drell-Yan parton model with QCD has not only made its phenomenological success in the study of lepton pair production, but has allowed to study quantitatively the gluon correction to the model. Information from beam dump and emulsion experiments on charm production is compared with the typical QCD diagram. The results indicate some possible non-perturbative contribution to the photon- and hadron-production of heavy quarks. The definite features of dilepton as well as large transverse momentum data are direct signature of gluons. (Kato, T.)

  2. Collider signatures of flavorful Higgs bosons

    International Nuclear Information System (INIS)

    Altmannshofer, Wolfgang; Eby, Joshua; Gori, Stefania; Lotito, Matteo

    2016-01-01

    Motivated by our limited knowledge of the Higgs couplings to the first two generation fermions, we analyze the collider phenomenology of a class of two Higgs doublet models (2HDMs) with a nonstandard Yukawa sector. One Higgs doublet is mainly responsible for the masses of the weak gauge bosons and the third-generation fermions, while the second Higgs doublet provides mass for the lighter fermion generations. The characteristic collider signatures of this setup differ significantly from well-studied 2HDMs with natural flavor conservation, flavor alignment, or minimal flavor violation. New production mechanisms for the heavy scalar, pseudoscalar, and charged Higgs involving second-generation quarks can become dominant. The most interesting decay modes include H/A → cc,tc,μμ,τμ and H"± → cb,cs,μν. As a result, searches for low-mass dimuon resonances are currently among the best probes of the heavy Higgs bosons in this setup.

  3. ALPs effective field theory and collider signatures

    Energy Technology Data Exchange (ETDEWEB)

    Brivio, I. [Universidad Autonoma de Madrid, Departamento de Fisica Teorica y Instituto de Fisica Teorica, IFT-UAM/CSIC, Madrid (Spain); University of Copenhagen, Niels Bohr International Academy, Copenhagen (Denmark); Gavela, M.B.; Merlo, L.; Rey, R. del [Universidad Autonoma de Madrid, Departamento de Fisica Teorica y Instituto de Fisica Teorica, IFT-UAM/CSIC, Madrid (Spain); Mimasu, K. [University of Sussex, Department of Physics and Astronomy, Brighton (United Kingdom); Universite Catholique de Louvain, Centre for Cosmology, Particle Physics and Phenomenology (CP3), Louvain-la-Neuve (Belgium); No, J.M. [University of Sussex, Department of Physics and Astronomy, Brighton (United Kingdom); King' s College London, Department of Physics, London (United Kingdom); Sanz, V. [University of Sussex, Department of Physics and Astronomy, Brighton (United Kingdom)

    2017-08-15

    We study the leading effective interactions between the Standard Model fields and a generic singlet CP-odd (pseudo-) Goldstone boson. Two possible frameworks for electroweak symmetry breaking are considered: linear and non-linear. For the latter case, the basis of leading effective operators is determined and compared with that for the linear expansion. Associated phenomenological signals at colliders are explored for both scenarios, deriving new bounds and analyzing future prospects, including LHC and High Luminosity LHC sensitivities. Mono-Z, mono-W, W-photon plus missing energy and on-shell top final states are most promising signals expected in both frameworks. In addition, non-standard Higgs decays and mono-Higgs signatures are especially prominent and expected to be dominant in non-linear realisations. (orig.)

  4. Signatures of Beam - and Anisotropy Driven Oscillitons

    Science.gov (United States)

    Sauer, K.; Dubinin, E.; McKenzie, J. F.

    Oscillitons represent a new class of stationary nonlinear waves, first found in bi-ion plasmas (Sauer et al., 1991) where mode splitting of the `individual' wave modes leads to conditions for phase- and group-standing waves near the `crossing points'. The corresponding structures have signatures of the usual solitons, superimposed by spatial oscillations. Oscillitons may also occur in single-ion plasmas, e.g. in the elec- tron whistler branch. The characteristic features of different types of oscillitons under realistic conditions in space plasmas including damping, beams and anisotropies are analyzed. Relevant mechanisms of coherent waves observed in different frequency ranges (Lion Roars at Earth, ion cyclotron waves near Io and Mars) are discussed.

  5. Thermal Signature Identification System (TheSIS)

    Science.gov (United States)

    Merritt, Scott; Bean, Brian

    2015-01-01

    We characterize both nonlinear and high order linear responses of fiber-optic and optoelectronic components using spread spectrum temperature cycling methods. This Thermal Signature Identification System (TheSIS) provides much more detail than conventional narrowband or quasi-static temperature profiling methods. This detail allows us to match components more thoroughly, detect subtle reversible shifts in performance, and investigate the cause of instabilities or irreversible changes. In particular, we create parameterized models of athermal fiber Bragg gratings (FBGs), delay line interferometers (DLIs), and distributed feedback (DFB) lasers, then subject the alternative models to selection via the Akaike Information Criterion (AIC). Detailed pairing of components, e.g. FBGs, is accomplished by means of weighted distance metrics or norms, rather than on the basis of a single parameter, such as center wavelength.

  6. Spin-3/2 Pentaquark Resonance Signature

    International Nuclear Information System (INIS)

    Ben Lasscock; John Hedditch; Derek Leinweber; Anthony Williams; Waseem Kamleh; Wolodymyr Melnitchouk; Anthony Thomas; Ross Young; James Zanotti

    2005-01-01

    We search for the standard lattice resonance signature of attraction between the resonance constituents which leads to a bound state at quark masses near the physical regime. We study a variety of spin-1/2 interpolators and for the first time, interpolators providing access to spin-3/2 pentaquark states. In looking for evidence of binding, a precise determination of the mass splitting between the pentaquark state and its lowest-lying decay channel is performed by constructing the effective mass splitting from the various two-point correlation functions. While the binding of the pentaquark state is not a requirement, the observation of such binding would provide compelling evidence for the existence of the theta+ pentaquark resonance. Evidence of binding is observed in the isoscalar spin-3/2 positive parity channel, making it an interesting state for further research

  7. Signature of Microbial Dysbiosis in Periodontitis.

    Science.gov (United States)

    Meuric, Vincent; Le Gall-David, Sandrine; Boyer, Emile; Acuña-Amador, Luis; Martin, Bénédicte; Fong, Shao Bing; Barloy-Hubler, Frederique; Bonnaure-Mallet, Martine

    2017-07-15

    Periodontitis is driven by disproportionate host inflammatory immune responses induced by an imbalance in the composition of oral bacteria; this instigates microbial dysbiosis, along with failed resolution of the chronic destructive inflammation. The objectives of this study were to identify microbial signatures for health and chronic periodontitis at the genus level and to propose a model of dysbiosis, including the calculation of bacterial ratios. Published sequencing data obtained from several different studies (196 subgingival samples from patients with chronic periodontitis and 422 subgingival samples from healthy subjects) were pooled and subjected to a new microbiota analysis using the same Visualization and Analysis of Microbial Population Structures (VAMPS) pipeline, to identify microbiota specific to health and disease. Microbiota were visualized using CoNet and Cytoscape. Dysbiosis ratios, defined as the percentage of genera associated with disease relative to the percentage of genera associated with health, were calculated to distinguish disease from health. Correlations between the proposed dysbiosis ratio and the periodontal pocket depth were tested with a different set of data obtained from a recent study, to confirm the relevance of the ratio as a potential indicator of dysbiosis. Beta diversity showed significant clustering of periodontitis-associated microbiota, at the genus level, according to the clinical status and independent of the methods used. Specific genera ( Veillonella , Neisseria , Rothia , Corynebacterium , and Actinomyces ) were highly prevalent (>95%) in health, while other genera ( Eubacterium , Campylobacter , Treponema , and Tannerella ) were associated with chronic periodontitis. The calculation of dysbiosis ratios based on the relative abundance of the genera found in health versus periodontitis was tested. Nonperiodontitis samples were significantly identifiable by low ratios, compared to chronic periodontitis samples. When

  8. Experimental signatures of gravitational wave bursters

    International Nuclear Information System (INIS)

    Dubath, Florian; Foffa, Stefano; Gasparini, Maria Alice; Maggiore, Michele; Sturani, Riccardo

    2005-01-01

    Gravitational wave bursters are sources which emit repeatedly bursts of gravitational waves, and have been recently suggested as potentially interesting candidates for gravitational wave (GW) detectors. Mechanisms that could give rise to a GW burster can be found for instance in highly magnetized neutron stars (the 'magnetars' which explain the phenomenon of soft gamma repeaters), in accreting neutron stars and in hybrid stars with a quark core. We point out that these sources have very distinctive experimental signatures. In particular, as already observed in the γ-ray bursts from soft gamma repeaters, the energy spectrum of the events is a power-law, dN∼E -γ dE with γ≅1.6, and they have a distribution of waiting times (the times between one outburst and the next) significantly different from the distribution of uncorrelated events. We discuss possible detection strategies that could be used to search for these events in existing gravitational wave detectors

  9. Continuous-variable quantum homomorphic signature

    Science.gov (United States)

    Li, Ke; Shang, Tao; Liu, Jian-wei

    2017-10-01

    Quantum cryptography is believed to be unconditionally secure because its security is ensured by physical laws rather than computational complexity. According to spectrum characteristic, quantum information can be classified into two categories, namely discrete variables and continuous variables. Continuous-variable quantum protocols have gained much attention for their ability to transmit more information with lower cost. To verify the identities of different data sources in a quantum network, we propose a continuous-variable quantum homomorphic signature scheme. It is based on continuous-variable entanglement swapping and provides additive and subtractive homomorphism. Security analysis shows the proposed scheme is secure against replay, forgery and repudiation. Even under nonideal conditions, it supports effective verification within a certain verification threshold.

  10. Gene signature associated with benign neurofibroma transformation to malignant peripheral nerve sheath tumors.

    Directory of Open Access Journals (Sweden)

    Marta Martínez

    Full Text Available Benign neurofibromas, the main phenotypic manifestations of the rare neurological disorder neurofibromatosis type 1, degenerate to malignant tumors associated to poor prognosis in about 10% of patients. Despite efforts in the field of (epigenomics, the lack of prognostic biomarkers with which to predict disease evolution frustrates the adoption of appropriate early therapeutic measures. To identify potential biomarkers of malignant neurofibroma transformation, we integrated four human experimental studies and one for mouse, using a gene score-based meta-analysis method, from which we obtained a score-ranked signature of 579 genes. Genes with the highest absolute scores were classified as promising disease biomarkers. By grouping genes with similar neurofibromatosis-related profiles, we derived panels of potential biomarkers. The addition of promoter methylation data to gene profiles indicated a panel of genes probably silenced by hypermethylation. To identify possible therapeutic treatments, we used the gene signature to query drug expression databases. Trichostatin A and other histone deacetylase inhibitors, as well as cantharidin and tamoxifen, were retrieved as putative therapeutic means to reverse the aberrant regulation that drives to malignant cell proliferation and metastasis. This in silico prediction corroborated reported experimental results that suggested the inclusion of these compounds in clinical trials. This experimental validation supported the suitability of the meta-analysis method used to integrate several sources of public genomic information, and the reliability of the gene signature associated to the malignant evolution of neurofibromas to generate working hypotheses for prognostic and drug-responsive biomarkers or therapeutic measures, thus showing the potential of this in silico approach for biomarker discovery.

  11. Machine monitoring via current signature analysis techniques

    International Nuclear Information System (INIS)

    Smith, S.F.; Castleberry, K.N.; Nowlin, C.H.

    1992-01-01

    A significant need in the effort to provide increased production quality is to provide improved plant equipment monitoring capabilities. Unfortunately, in today's tight economy, even such monitoring instrumentation must be implemented in a recognizably cost effective manner. By analyzing the electric current drawn by motors, actuator, and other line-powered industrial equipment, significant insights into the operations of the movers, driven equipment, and even the power source can be obtained. The generic term 'current signature analysis' (CSA) has been coined to describe several techniques for extracting useful equipment or process monitoring information from the electrical power feed system. A patented method developed at Oak Ridge National Laboratory is described which recognizes the presence of line-current modulation produced by motors and actuators driving varying loads. The in-situ application of applicable linear demodulation techniques to the analysis of numerous motor-driven systems is also discussed. The use of high-quality amplitude and angle-demodulation circuitry has permitted remote status monitoring of several types of medium and high-power gas compressors in (US DOE facilities) driven by 3-phase induction motors rated from 100 to 3,500 hp, both with and without intervening speed increasers. Flow characteristics of the compressors, including various forms of abnormal behavior such as surging and rotating stall, produce at the output of the specialized detectors specific time and frequency signatures which can be easily identified for monitoring, control, and fault-prevention purposes. The resultant data are similar in form to information obtained via standard vibration-sensing techniques and can be analyzed using essentially identical methods. In addition, other machinery such as refrigeration compressors, brine pumps, vacuum pumps, fans, and electric motors have been characterized

  12. Extracellular Signatures as Indicators of Processing Methods

    Energy Technology Data Exchange (ETDEWEB)

    Wahl, Karen L.

    2012-01-09

    As described in other chapters within this volume, many aspects of microbial cells vary with culture conditions and therefore can potentially be analyzed as forensic signatures of growth conditions. In addition to changes or variations in components of the microbes themselves, extracellular materials indicative of production processes may remain associated with the final bacterial product. It is well recognized that even with considerable effort to make pure products such as fine chemicals or pharmaceuticals, trace impurities from components or synthesis steps associated with production processes can be detected in the final product. These impurities can be used as indicators of production source or methods, such as to help connect drugs of abuse to supply chains. Extracellular residue associated with microbial cells could similarly help to characterize production processes. For successful growth of microorganisms on culture media there must be an available source of carbon, nitrogen, inorganic phosphate and sulfur, trace metals, water and vitamins. The pH, temperature, and a supply of oxygen or other gases must also be appropriate for a given organism for successful culture. The sources of these components and the range in temperature, pH and other variables has adapted over the years with currently a wide range of possible combinations of media components, recipes and parameters to choose from for a given organism. Because of this wide variability in components, mixtures of components, and other parameters, there is the potential for differentiation of cultured organisms based on changes in culture conditions. The challenge remains how to narrow the field of potential combinations and be able to attribute variations in the final bacterial product and extracellular signatures associated with the final product to information about the culture conditions or recipe used in the production of that product.

  13. Acoustic signature of thunder from seismic records

    Science.gov (United States)

    Kappus, Mary E.; Vernon, Frank L.

    1991-06-01

    Thunder, the sound wave through the air associated with lightning, transfers sufficient energy to the ground to trigger seismometers set to record regional earthquakes. The acoustic signature recorded on seismometers, in the form of ground velocity as a function of time, contains the same type features as pressure variations recorded with microphones in air. At a seismic station in Kislovodsk, USSR, a nearly direct lightning strike caused electronic failure of borehole instruments while leaving a brief impulsive acoustic signature on the surface instruments. The peak frequency of 25-55 Hz is consistent with previously published values for cloud-to-ground lightning strikes, but spectra from this station are contaminated by very strong wind noise in this band. A thunderstorm near a similar station in Karasu triggered more than a dozen records of individual lightning strikes during a 2-hour period. The spectra for these events are fairly broadband, with peaks at low frequencies, varying from 6 to 13 Hz. The spectra were all computed by multitaper analysis, which deals appropriately with the nonstationary thunder signal. These independent measurements of low-frequency peaks corroborate the occasional occurrences in traditional microphone records, but a theory concerning the physical mechanism to account for them is still in question. Examined separately, the individual claps in each record have similar frequency distributions, discounting a need for multiple mechanisms to explain different phases of the thunder sequence. Particle motion, determined from polarization analysis of the three-component records, is predominantly vertical downward, with smaller horizontal components indicative of the direction to the lightning bolt. In three of the records the azimuth to the lightning bolt changes with time, confirming a significant horizontal component to the lightning channel itself.

  14. Thermal-Signature-Based Sleep Analysis Sensor

    Directory of Open Access Journals (Sweden)

    Ali Seba

    2017-10-01

    Full Text Available This paper addresses the development of a new technique in the sleep analysis domain. Sleep is defined as a periodic physiological state during which vigilance is suspended and reactivity to external stimulations diminished. We sleep on average between six and nine hours per night and our sleep is composed of four to six cycles of about 90 min each. Each of these cycles is composed of a succession of several stages of sleep that vary in depth. Analysis of sleep is usually done via polysomnography. This examination consists of recording, among other things, electrical cerebral activity by electroencephalography (EEG, ocular movements by electrooculography (EOG, and chin muscle tone by electromyography (EMG. Recordings are made mostly in a hospital, more specifically in a service for monitoring the pathologies related to sleep. The readings are then interpreted manually by an expert to generate a hypnogram, a curve showing the succession of sleep stages during the night in 30s epochs. The proposed method is based on the follow-up of the thermal signature that makes it possible to classify the activity into three classes: “awakening,” “calm sleep,” and “restless sleep”. The contribution of this non-invasive method is part of the screening of sleep disorders, to be validated by a more complete analysis of the sleep. The measure provided by this new system, based on temperature monitoring (patient and ambient, aims to be integrated into the tele-medicine platform developed within the framework of the Smart-EEG project by the SYEL–SYstèmes ELectroniques team. Analysis of the data collected during the first surveys carried out with this method showed a correlation between thermal signature and activity during sleep. The advantage of this method lies in its simplicity and the possibility of carrying out measurements of activity during sleep and without direct contact with the patient at home or hospitals.

  15. Implication of unfolded protein response in resveratrol-induced inhibition of K562 cell proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Bao-Qin; Gao, Yan-Yan; Niu, Xiao-Fang [Department of Biochemistry and Molecular Biology, China Medical University, Shenyang 110001 (China); Xie, Ji-Sheng [Youjiang Medical College for Nationalities, Guangxi 533000 (China); Meng, Xin; Guan, Yifu [Department of Biochemistry and Molecular Biology, China Medical University, Shenyang 110001 (China); Wang, Hua-Qin, E-mail: wanghq_doctor@hotmail.com [Department of Biochemistry and Molecular Biology, China Medical University, Shenyang 110001 (China)

    2010-01-01

    Resveratrol (RES), a natural plant polyphenol, is an effective inducer of cell cycle arrest and apoptosis in a variety of carcinoma cell types. In addition, RES has been reported to inhibit tumorigenesis in several animal models suggesting that it functions as a chemopreventive and anti-tumor agent in vivo. The chemopreventive and chemotherapeutic properties associated with resveratrol offer promise for the design of new chemotherapeutic agents. However, the mechanisms by which RES mediates its effects are not yet fully understood. In this study, we showed that RES caused cell cycle arrest and proliferation inhibition via induction of unfolded protein response (UPR) in human leukemia K562 cell line. Treatment of K562 cells with RES induced a number of signature UPR markers, including transcriptional induction of GRP78 and CHOP, phosphorylation of eukaryotic initiation factor 2{alpha} (eIF2{alpha}), ER stress-specific XBP-1 splicing, suggesting the induction of UPR by RES. RES inhibited proliferation of K562 in a concentration-dependent manner. Flow cytometric analyses revealed that K562 cells were arrested in G1 phase upon RES treatment. Salubrinal, an eIF2{alpha} inhibitor, or overexpression of dominant negative mutants of PERK or eIF2{alpha}, effectively restored RES-induced cell cycle arrest, underscoring the important role of PERK/eIF2{alpha} branch of UPR in RES-induced inhibition of cell proliferation.

  16. Implication of unfolded protein response in resveratrol-induced inhibition of K562 cell proliferation

    International Nuclear Information System (INIS)

    Liu, Bao-Qin; Gao, Yan-Yan; Niu, Xiao-Fang; Xie, Ji-Sheng; Meng, Xin; Guan, Yifu; Wang, Hua-Qin

    2010-01-01

    Resveratrol (RES), a natural plant polyphenol, is an effective inducer of cell cycle arrest and apoptosis in a variety of carcinoma cell types. In addition, RES has been reported to inhibit tumorigenesis in several animal models suggesting that it functions as a chemopreventive and anti-tumor agent in vivo. The chemopreventive and chemotherapeutic properties associated with resveratrol offer promise for the design of new chemotherapeutic agents. However, the mechanisms by which RES mediates its effects are not yet fully understood. In this study, we showed that RES caused cell cycle arrest and proliferation inhibition via induction of unfolded protein response (UPR) in human leukemia K562 cell line. Treatment of K562 cells with RES induced a number of signature UPR markers, including transcriptional induction of GRP78 and CHOP, phosphorylation of eukaryotic initiation factor 2α (eIF2α), ER stress-specific XBP-1 splicing, suggesting the induction of UPR by RES. RES inhibited proliferation of K562 in a concentration-dependent manner. Flow cytometric analyses revealed that K562 cells were arrested in G1 phase upon RES treatment. Salubrinal, an eIF2α inhibitor, or overexpression of dominant negative mutants of PERK or eIF2α, effectively restored RES-induced cell cycle arrest, underscoring the important role of PERK/eIF2α branch of UPR in RES-induced inhibition of cell proliferation.

  17. Searches with long-lived or unusual signatures

    CERN Document Server

    Haug, S; The ATLAS collaboration

    2013-01-01

    We present recent ATLAS and CMS results from searches with long-lived and unusual signatures. They are based on analysis of LHC proton-proton collisions at center of mass energies at 7 and 8 TeV. Long-lived and heavy particles may cause peculiar signatures in the detectors, but are in several Standard Model extensions well motivated.

  18. 27 CFR 70.52 - Signature presumed authentic.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false Signature presumed authentic. 70.52 Section 70.52 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE... Collection of Excise and Special (Occupational) Tax Collection-General Provisions § 70.52 Signature presumed...

  19. 25 CFR 117.33 - Signature of illiterates.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Signature of illiterates. 117.33 Section 117.33 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR FINANCIAL ACTIVITIES DEPOSIT AND EXPENDITURE OF... Signature of illiterates. An Indian who cannot write shall be required to endorse checks payable to his...

  20. 26 CFR 301.6064-1 - Signature presumed authentic.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Signature presumed authentic. 301.6064-1 Section 301.6064-1 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE TREASURY (CONTINUED....6064-1 Signature presumed authentic. An individual's name signed to a return, statement, or other...

  1. Field Education as the Signature Pedagogy of Social Work Education

    Science.gov (United States)

    Wayne, Julianne; Bogo, Marion; Raskin, Miriam

    2010-01-01

    In its EPAS, CSWE (2008) identifies field education as the signature pedagogy (Shulman, 2005b) of social work education. This article analyzes the field education-signature pedagogy fit. It finds congruence in selected organizational arrangements that are pervasive and routine, and disparities with respect to expectations about public student…

  2. 12 CFR 18.6 - Signature and attestation.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Signature and attestation. 18.6 Section 18.6 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY DISCLOSURE OF FINANCIAL AND OTHER INFORMATION BY NATIONAL BANKS § 18.6 Signature and attestation. A duly authorized officer of the...

  3. 12 CFR 350.6 - Signature and attestation.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Signature and attestation. 350.6 Section 350.6 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY DISCLOSURE OF FINANCIAL AND OTHER INFORMATION BY FDIC-INSURED STATE NONMEMBER BANKS § 350.6 Signature and...

  4. 13 CFR 134.209 - Requirement of signature.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Requirement of signature. 134.209 Section 134.209 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION RULES OF PROCEDURE GOVERNING... of signature. Every written submission to OHA, other than evidence, must be signed by the party...

  5. 48 CFR 4.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Contracting officer's signature. 4.101 Section 4.101 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Contract Execution 4.101 Contracting officer's signature. Only contracting officers shall...

  6. Selective forgery of RSA signatures with fixed-pattern padding

    NARCIS (Netherlands)

    Lenstra, A.K.; Shparlinski, I.E.; Naccache, D.; Paillier, P.

    2002-01-01

    We present a practical selective forgery attack against RSA signatures with fixed-pattern padding shorter than two thirds of the modulus length. Our result extends the practical existential forgery of such RSA signatures that was presented at Crypto 2001. For an n-bit modulus the heuristic

  7. Subsurface signatures and timing of extreme wave events along the ...

    Indian Academy of Sciences (India)

    The diagnostic event signatures include the extent and elevation of the deposits, as well as morphologic similarity ... Historical archives of the origin, timing, and impact of tsunamis, storms, and floods along the mar- gins of ... High-resolution GPR studies (by the IIT Madras group) of erosional signatures from the beach ridge.

  8. Restrictive partially blind signature for resource-constrained information systems

    NARCIS (Netherlands)

    Qiu, Weidong; Gong, Zheng; Liu, Bozhong; Long, Yu; Chen, Kefei

    2010-01-01

    Restrictive partially blind signature, which is designed for privacy oriented information systems, allows a user to obtain a blind signature from a signer whilst the blind message must obey some certain rules. In order to reduce storage and communication costs, several public-key cryptosystems are

  9. Electronic Signatures in Global and National Commerce Act. Public Law.

    Science.gov (United States)

    Congress of the U.S., Washington, DC.

    This document presents the text of Public Law 106-229, the "Electronic Signatures in Global and National Commerce Act." The act states that, with respect to any transaction in or affecting interstate or foreign commerce: a signature, contract, or other record relating to such transaction may not be denied legal effect, validity, or…

  10. Space Object Radiometric Modeling for Hardbody Optical Signature Database Generation

    Science.gov (United States)

    2009-09-01

    Introduction This presentation summarizes recent activity in monitoring spacecraft health status using passive remote optical nonimaging ...Approved for public release; distribution is unlimited. Space Object Radiometric Modeling for Hardbody Optical Signature Database Generation...It is beneficial to the observer/analyst to understand the fundamental optical signature variability associated with these detection and

  11. Detection of chemical explosives using multiple photon signatures

    International Nuclear Information System (INIS)

    Loschke, K.W.; Dunn, W.L.

    2008-01-01

    Full text: A template-matching procedure to aid in rapid detection of improvised explosive devices (IEDs) is being investigated. Multiple photon-scattered and photon-induced positron annihilation radiation responses are being used as part of a photon-neutron signature-based radiation scanning (SBRS) approach (see companion reference for description of the neutron component), in an attempt to detect chemical explosives at safe standoff distances. Many past and present photon interrogation methods are based on imaging. Imaging techniques seek to determine at high special resolution the internal structure of a target of interest. Our technique simply seeks to determine if an unknown target contains a detectable amount of chemical explosives by comparing multiple responses (signatures) that depend on both density and composition of portions of a target. In the photon component, beams of photons are used to create back-streaming signatures, which are dependent on the density and composition of part of the target being interrogated. These signatures are compared to templates, which are collections of the same signatures if the interrogated volume contained a significant amount of explosives. The signature analysis produces a figure-of-merit and a standard deviation of the figure-of-merit. These two metrics are used to filter safe from dangerous targets. Experiments have been conducted that show that explosive surrogates (fertilizers) can be distinguished from several inert materials using these photon signatures, demonstrating that these signatures can be used effectively to help IEDs

  12. Online Signature Verification using Recurrent Neural Network and Length-normalized Path Signature

    OpenAIRE

    Lai, Songxuan; Jin, Lianwen; Yang, Weixin

    2017-01-01

    Inspired by the great success of recurrent neural networks (RNNs) in sequential modeling, we introduce a novel RNN system to improve the performance of online signature verification. The training objective is to directly minimize intra-class variations and to push the distances between skilled forgeries and genuine samples above a given threshold. By back-propagating the training signals, our RNN network produced discriminative features with desired metrics. Additionally, we propose a novel d...

  13. A semi-classical approach to signature splitting and signature inversion in odd–odd nuclei

    International Nuclear Information System (INIS)

    Kumar, Vinod; Kumar, Suresh; Kumar, Sushil; Hasan, Zafrul; Koranga, B.S.; Kumar, Deepak; Negi, D.; Angus, Lee

    2011-01-01

    The signature inversion observed in rotational bands belonging to high-j configurations of odd–odd deformed nuclei has been analyzed within the framework of an axially symmetric rotor plus two-particle model. The Coriolis and n–p interaction are considered the main cause of energy staggering. However, γ-triaxial deformation and the numbers of valence protons, N p , and neutrons, N n also contribute to the energy staggering between odd- and even-spin states. (author)

  14. The US proliferation security initiative (PSI)

    International Nuclear Information System (INIS)

    Gregoire, B.

    2004-01-01

    The proliferation security initiative (PSI), launched by President Bush on May 31, 2003, aims at intercepting any transfer of mass destruction weapons, of their vectors and related equipments, towards or coming from countries or organizations suspected to have a proliferation activity. This initiative, which involves coercive means to fight against proliferation, raises international lawfulness and legal questions, the answers of which are today under construction. This article analyzes the place of the European Union in the PSI, the action means (optimization of existing means, cooperation between intelligence and interception services), and the PSI stakes (lawfulness with respect to the international law, bilateral agreements, draft boarding agreement, sustain of the United Nations, widening of the partnership and of the field of action). (J.S.)

  15. Proliferation resistance assessment of thermal recycle systems

    International Nuclear Information System (INIS)

    1979-02-01

    This paper examines the major proliferation aspects of thermal recycle systems and the extent to which technical or institutional measures could increase the difficulty or detectability of misuse of the system by would-be proliferators. It does this by examining the various activities necessary to acquire weapons-usable material using a series of assessment factors; resources required, time required, detectability. It is concluded that resistance to proliferation could be improved substantially by collecting reprocessing, conversion and fuel fabrication plants under multi national control and instituting new measures to protect fresh MOX fuel. Resistance to theft at sub-national level could be improved by co-location of sensitive facilities high levels of physical protection at plants and during transportation and possibly by adding a radiation barrier to MOX prior to shipment

  16. Israel's position on non-proliferation

    International Nuclear Information System (INIS)

    Marom, R.

    1986-01-01

    Israel maintained that the complex international system and worldwide political tension created a situation in which comprehensive plans of disarmament could not produce any positive result. The deadlock in the field of general and complete disarmament has brought Israel to the realization that one possible way to alleviate the stalemate could be progress by stages through partial measures of disarmament. Israel's position on non-proliferation indicates that the establishment of a nuclear-weapon-free-zone (NWFZ), as it relates to the Middle-East, could serve as a credible alternative to the unilateral adherence to the Non-Proliferation of Nuclear Weapon (NPT) and an effective measure of non-proliferation in the region. (Author)

  17. Director`s series on proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Bailey, K.C. [ed.

    1993-09-07

    Two essays are included in this booklet. Their titles are ``The Dynamics of the NPT Extension Decision`` and ``North Korea`s Nuclear Gambit.`` The first paper discusses the conference to be held in 1995 to review the Nuclear Non-Proliferation Treaty (NPT) which will decide whether the treaty shall continue in force indefinitely, or shall be extended for an additional fixed period or periods. Topics relevant to this discussion are: Arms control issues, the nuclear test ban, the limited test ban treaty, the French nuclear testing moratorium, former Soviet nuclear weapons, Iraq, North Korea, nuclear-weapon-free zones, security, controls on nuclear weapon materials, peaceful uses of nuclear energy, safeguards, politics, and organizational and procedural issues. The second paper examines short, medium, and long term issues entailed in Korea`s nuclear proliferation. Topics considered include: Korean unification, North Korean politics, the nuclear issue as leverage, and the Nuclear Non- Proliferation Treaty.

  18. The economics of proliferation and counterproliferation

    International Nuclear Information System (INIS)

    Murray, B.L.; Hallenbeck, R.A.; Gill, J.M.

    1993-01-01

    On June 2, 1993, the fourth meeting of the seminar series on open-quotes Proliferation of Ballistic Missiles and Weapons of Mass Destruction and Implications for Regional Stabilityclose quotes was held at SAIC in McLean, Virginia. This series is sponsored by the Arms Control and Disarmament Agency and is cosponsored by the Ballistic Missile Defense Organization, the Defense Nuclear Agency, the Department of Energy, and the Office of the Secretary of Defense for International Security Policy. The June seminar, open-quotes The Economics of Proliferation and Counterproliferation,close quotes discussed how economic issues and interests affect proliferation judgments. Seminar participants also examined three economic tools for advancing counterproliferation objectives: Economic Development Assistance, Export Controls, and Economic open-quotes Burdensharingclose quotes and Conversion Assistance

  19. Nuclear dilemma: power, proliferation, and development

    International Nuclear Information System (INIS)

    Miller, M.

    1979-01-01

    Debate over President Carter's nuclear energy policy centers on how to develop nuclear power for civilian use and prevent the proliferation of nuclear materials for weapons. Both supporters and opponents of nuclear energy have been critical of Carter's policies because each side fails to see the linkage between the two concerns as codified in the 1978 Non-Proliferation Act. The author uses a dialogue format to illustrate the arguments for resisting proliferation and recognizing nuclear energy as an appropriate technology. The consequences of a nuclear moratorium are explored along with implications for foreign policy. U.S. leadership in developing energy technologies that can meet a broad range of appropriate applications, combined with leadership in building appropriate political frameworks, is needed if nuclear energy is to make a positive contribution toward world peace and acceptable living standards. 8 references

  20. Nuclear exports and non-proliferation

    International Nuclear Information System (INIS)

    Courteix, Simone.

    1978-01-01

    Increased preoccupation in present times with the risk of proliferation of nuclear weapons is reflected in the multiplication of international agreements such as the Non-proliferation Treaty and in the strengthening of consultations between industrialised countries (London Club). After analysing the IAEA safeguards system under the Non-proliferation Treaty and its shortcomings both technically and otherwise, the author considers how this situation can be remedied in the light of the London Agreements and in view of the position of the main countries concerned. The annex to the book contains the texts of many international agreements and relevant national regulations as well as nuclear policy statements. It also includes a detailed bibliograaphy. (NEA) [fr

  1. Nuclear power and nuclear weapon proliferation

    International Nuclear Information System (INIS)

    Apold, A.

    1978-01-01

    The theme of Dr. Marshall's lecture was that it is, from the viewpoint of prevention of proliferation of nuclear weapons,preferable to use plutonium as a fuel in FBR reactors rather than store it in what, in effect, would be plutonium mines. The true threat of proliferation lies in uranium enrichment. The FBR reactor is misunderstood and the US policy is not against breeders as such. Safeguards against the misuse of plutonium by leaving a residue of radioactivity after reprocessing is quite feasible, despite certain practical problems and extra costs. Weapon proliferation is subject to political objectives and intentions. Definite proposals are, (a) a limited number of reprocessing centres, (b) an accelerated development of FBR reactors, (c) a new FBR fuel cycle, (d) stop storage of spent thermal reactor fuel, (e) reinforced safeguards. (JIW)

  2. Time-dependent delayed signatures from energetic photon interrogations

    International Nuclear Information System (INIS)

    Norman, Daren R.; Jones, James L.; Blackburn, Brandon W.; Haskell, Kevin J.; Johnson, James T.; Watson, Scott M.; Hunt, Alan W.; Spaulding, Randy; Harmon, Frank

    2007-01-01

    Pulsed photonuclear interrogation environments generated by 8-24 MeV electron linac are rich with time-dependent, material-specific, radiation signatures. Nitrogen-based explosives and nuclear materials can be detected by exploiting these signatures in different delayed-time regions. Numerical and experimental results presented in this paper show the unique time and energy dependence of these signatures. It is shown that appropriate delayed-time windows are essential to acquire material-specific signatures in pulsed photonuclear assessment environments. These developments demonstrate that pulsed, high-energy, photon-inspection environments can be exploited for time-dependent, material-specific signatures through the proper operation of specialized detectors and detection methods

  3. Signature scheme for the microscopic description of nuclear collective excitations

    International Nuclear Information System (INIS)

    Ogawa, K.

    1980-04-01

    The symmetries between the proton and neutron systems in a nucleus are described in terms of the signatures. Three kinds of signatures (i.e. the pn-, p anti n- and p anti p- (or n anti n-) signatures) are introduced and they are related to the appearance of various collective motions such as rotations or vibrations. It is shown that the pn-signature scheme provides a band-like structure of deformed nuclei, while the features associated with the quadrupole vibration are obtained in the p anti n- and p anti p-signature scheme. From the detail investigation of the p anti n-symmetric wave functions, it is concluded that the reguralities provided by the present shell model are more analogous to those of the γ-unstable surface vibration model (Wilets-Jean model) than to those of harmonic phonon model. (author)

  4. An Efficient Homomorphic Aggregate Signature Scheme Based on Lattice

    Directory of Open Access Journals (Sweden)

    Zhengjun Jing

    2014-01-01

    Full Text Available Homomorphic aggregate signature (HAS is a linearly homomorphic signature (LHS for multiple users, which can be applied for a variety of purposes, such as multi-source network coding and sensor data aggregation. In order to design an efficient postquantum secure HAS scheme, we borrow the idea of the lattice-based LHS scheme over binary field in the single-user case, and develop it into a new lattice-based HAS scheme in this paper. The security of the proposed scheme is proved by showing a reduction to the single-user case and the signature length remains invariant. Compared with the existing lattice-based homomorphic aggregate signature scheme, our new scheme enjoys shorter signature length and high efficiency.

  5. Dedifferentiation and proliferation of mammalian cardiomyocytes.

    Directory of Open Access Journals (Sweden)

    Yiqiang Zhang

    2010-09-01

    Full Text Available It has long been thought that mammalian cardiomyocytes are terminally-differentiated and unable to proliferate. However, myocytes in more primitive animals such as zebrafish are able to dedifferentiate and proliferate to regenerate amputated cardiac muscle.Here we test the hypothesis that mature mammalian cardiomyocytes retain substantial cellular plasticity, including the ability to dedifferentiate, proliferate, and acquire progenitor cell phenotypes. Two complementary methods were used: 1 cardiomyocyte purification from rat hearts, and 2 genetic fate mapping in cardiac explants from bi-transgenic mice. Cardiomyocytes isolated from rodent hearts were purified by multiple centrifugation and Percoll gradient separation steps, and the purity verified by immunostaining and RT-PCR. Within days in culture, purified cardiomyocytes lost their characteristic electrophysiological properties and striations, flattened and began to divide, as confirmed by proliferation markers and BrdU incorporation. Many dedifferentiated cardiomyocytes went on to express the stem cell antigen c-kit, and the early cardiac transcription factors GATA4 and Nkx2.5. Underlying these changes, inhibitory cell cycle molecules were suppressed in myocyte-derived cells (MDCs, while microRNAs known to orchestrate proliferation and pluripotency increased dramatically. Some, but not all, MDCs self-organized into spheres and re-differentiated into myocytes and endothelial cells in vitro. Cell fate tracking of cardiomyocytes from 4-OH-Tamoxifen-treated double-transgenic MerCreMer/ZEG mouse hearts revealed that green fluorescent protein (GFP continues to be expressed in dedifferentiated cardiomyocytes, two-thirds of which were also c-kit(+.Contradicting the prevailing view that they are terminally-differentiated, postnatal mammalian cardiomyocytes are instead capable of substantial plasticity. Dedifferentiation of myocytes facilitates proliferation and confers a degree of stemness

  6. Nuclear war nuclear proliferation and their consequences

    International Nuclear Information System (INIS)

    Aga Khan, Sadruddin

    1986-01-01

    The paper concerns the proceedings of a conference hosted by the Groupe de Bellerive to explore and discuss the implications for humanity of nuclear war, nuclear proliferation and their consequences, Geneva 1985. The conference was divided into five sessions, headed by the subject titles: the nuclear non-proliferation treaty (NPT) and its future, the spread of nuclear weapons among nations, global effects of a nuclear war, the nuclear arms race and arms control, the NPT and its future. Twenty eight papers were presented in the five sessions. (UK)

  7. Director`s series on proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Bailey, K.C.; Price, M.E. [eds.

    1994-12-27

    The Director`s Series on Proliferation is an occasional publication of essays on the topics of nuclear, chemical, biological, and missile proliferation. The seven papers presented in this issue cover the following topics: Should the Treaty on the Nonproliferation of Nuclear Weapons (NPT) be amended?; NPT extension - Legal and procedural issues; An Indonesian view of NPT review conference issues; The treaty of Tlatelolco and the NPT - Tools for peace and development; Perspectives on cut-off, weapons dismantlement, and security assurances; Belarus and NPT challenges; A perspective on the chemical weapons convention - Lessons learned from the preparatory commission.

  8. The G8 global partnership against proliferation

    International Nuclear Information System (INIS)

    Devaux, O.

    2003-01-01

    Launched in 2002, the G8 global partnership against the proliferation of massive destruction weapons will contribute up to 20 billion dollars to the dismantling of the nuclear and chemical weapons of the former USSR (20000 nuclear warheads stored in 123 sites, 1350 tons of weapon grade plutonium and enriched uranium, 40000 tons of chemical agents, 190 decommissioned nuclear submarines etc..). This partnership, which has entered its realization phase, inaugurates a new cooperation with the Russian Federation. I could be used tomorrow in other regions of the world and become an instrument of the international community for the fight against proliferation. (J.S.)

  9. Proliferation risks; Proliferatierisico's

    Energy Technology Data Exchange (ETDEWEB)

    Carchon, R

    1998-09-01

    The report gives an overview of different aspects related to safeguards of fissile materials. Existing treaties including the Non-Proliferation Treaty, and the Tlatelolco and the Rarotonga Treaties are discussed. An overview of safeguards systems for the control of fissile materials as well as the role of various authorities is given. An overall overview of proliferation risks, the physical protection of fissile materials and the trade in fissile materials is given. Finally, the status in problem countries and de facto nuclear weapon states is discussed.

  10. Proliferation resistance criteria for fissile material disposition

    International Nuclear Information System (INIS)

    Close, D.A.; Fearey, B.L.; Markin, J.T.; Rutherford, D.A.; Duggan, R.A.; Jaeger, C.D.; Mangan, D.L.; Moya, R.W.; Moore, L.R.; Strait, R.S.

    1995-04-01

    The 1994 National Academy of Sciences study open-quotes Management and Disposition of Excess Weapons Plutoniumclose quotes defined options for reducing the national and international proliferation risks of materials declared excess to the nuclear weapons program. This report proposes criteria for assessing the proliferation resistance of these options. The criteria are general, encompassing all stages of the disposition process from storage through intermediate processing to final disposition including the facilities, processing technologies and materials, the level of safeguards for these materials, and the national/subnational threat to the materials

  11. United States non-proliferation policy

    International Nuclear Information System (INIS)

    Scheinman, L.

    1978-01-01

    U.S. non-proliferation policy is aimed at slowing the spread of nuclear weapons capabilities, managing the destabilizing effects of nuclear technology for energy purposes, and fostering international standards and institutions to deal responsibly with global nuclear development. These goals assume that nuclear technology has not already precluded social control and recognize the social benefits offered by peaceful uses of atomic energy. Non-proliferation policies recognize that the motivation for possessing nuclear weapons is a more-difficult problem than technical ability and will concentrate on reducing those incentives through international agreements and safeguards and by maintaining the separation of commercial nuclear fuel cycles and military uses

  12. Network signatures of cellular immortalization in human lymphoblastoid cell lines

    Energy Technology Data Exchange (ETDEWEB)

    Shim, Sung-Mi; Jung, So-Young; Nam, Hye-Young; Kim, Hye-Ryun; Lee, Mee-Hee; Kim, Jun-Woo; Han, Bok-Ghee [National Biobank of Korea, Center for Genome Science, Korea National Institute of Health, Osong 363-951 (Korea, Republic of); Jeon, Jae-Pil, E-mail: jaepiljeon@hanmail.net [Division of Brain Diseases, Center for Biomedical Science, Korea National Institute of Health, Osong 363-951 (Korea, Republic of)

    2013-11-15

    Highlights: •We identified network signatures of LCL immortalization from transcriptomic profiles. •More than 41% of DEGs are possibly regulated by miRNAs in LCLs. •MicroRNA target genes in LCLs are involved in apoptosis and immune-related functions. •This approach is useful to find functional miRNA targets in specific cell conditions. -- Abstract: Human lymphoblastoid cell line (LCL) has been used as an in vitro cell model in genetic and pharmacogenomic studies, as well as a good model for studying gene expression regulatory machinery using integrated genomic analyses. In this study, we aimed to identify biological networks of LCL immortalization from transcriptomic profiles of microRNAs and their target genes in LCLs. We first selected differentially expressed genes (DEGs) and microRNAs (DEmiRs) between early passage LCLs (eLCLs) and terminally differentiated late passage LCLs (tLCLs). The in silico and correlation analysis of these DEGs and DEmiRs revealed that 1098 DEG–DEmiR pairs were found to be positively (n = 591 pairs) or negatively (n = 507 pairs) correlated with each other. More than 41% of DEGs are possibly regulated by miRNAs in LCL immortalizations. The target DEGs of DEmiRs were enriched for cellular functions associated with apoptosis, immune response, cell death, JAK–STAT cascade and lymphocyte activation while non-miRNA target DEGs were over-represented for basic cell metabolisms. The target DEGs correlated negatively with miR-548a-3p and miR-219-5p were significantly associated with protein kinase cascade, and the lymphocyte proliferation and apoptosis, respectively. In addition, the miR-106a and miR-424 clusters located in the X chromosome were enriched in DEmiR–mRNA pairs for LCL immortalization. In this study, the integrated transcriptomic analysis of LCLs could identify functional networks of biologically active microRNAs and their target genes involved in LCL immortalization.

  13. A distinct epigenetic signature at targets of a leukemia protein

    Directory of Open Access Journals (Sweden)

    van der Spek Peter

    2007-02-01

    Full Text Available Abstract Background Human myelogenous leukemia characterized by either the non random t(8; 21(q22; q22 or t(16; 21(q24; q22 chromosome translocations differ for both their biological and clinical features. Some of these features could be consequent to differential epigenetic transcriptional deregulation at AML1 targets imposed by AML1-MTG8 and AML1-MTG16, the fusion proteins deriving from the two translocations. Preliminary findings showing that these fusion proteins lead to transcriptional downregulation of AML1 targets, marked by repressive chromatin changes, would support this hypothesis. Here we show that combining conventional global gene expression arrays with the power of bioinformatic genomic survey of AML1-consensus sequences is an effective strategy to identify AML1 targets whose transcription is epigenetically downregulated by the leukemia-associated AML1-MTG16 protein. Results We interrogated mouse gene expression microarrays with probes generated either from 32D cells infected with a retroviral vector carrying AML1-MTG16 and unable of granulocyte differentiation and proliferation in response to the granulocyte colony stimulating factor (G-CSF, or from 32D cells infected with the cognate empty vector. From the analysis of differential gene expression alone (using as criteria a p value 3, we were unable to conclude which of the 37 genes downregulated by AML1-MTG16 were, or not, direct AML1 targets. However, when we applied a bioinformatic approach to search for AML1-consensus sequences in the 10 Kb around the gene transcription start sites, we closed on 17 potential direct AML1 targets. By focusing on the most significantly downregulated genes, we found that both the AML1-consensus and the transcription start site chromatin regions were significantly marked by aberrant repressive histone tail changes. Further, the promoter of one of these genes, containing a CpG island, was aberrantly methylated. Conclusion This study shows that a

  14. Phosphoproteomics of Primary Cells Reveals Druggable Kinase Signatures in Ovarian Cancer.

    Science.gov (United States)

    Francavilla, Chiara; Lupia, Michela; Tsafou, Kalliopi; Villa, Alessandra; Kowalczyk, Katarzyna; Rakownikow Jersie-Christensen, Rosa; Bertalot, Giovanni; Confalonieri, Stefano; Brunak, Søren; Jensen, Lars J; Cavallaro, Ugo; Olsen, Jesper V

    2017-03-28

    Our understanding of the molecular determinants of cancer is still inadequate because of cancer heterogeneity. Here, using epithelial ovarian cancer (EOC) as a model system, we analyzed a minute amount of patient-derived epithelial cells from either healthy or cancerous tissues by single-shot mass-spectrometry-based phosphoproteomics. Using a multi-disciplinary approach, we demonstrated that primary cells recapitulate tissue complexity and represent a valuable source of differentially expressed proteins and phosphorylation sites that discriminate cancer from healthy cells. Furthermore, we uncovered kinase signatures associated with EOC. In particular, CDK7 targets were characterized in both EOC primary cells and ovarian cancer cell lines. We showed that CDK7 controls cell proliferation and that pharmacological inhibition of CDK7 selectively represses EOC cell proliferation. Our approach defines the molecular landscape of EOC, paving the way for efficient therapeutic approaches for patients. Finally, we highlight the potential of phosphoproteomics to identify clinically relevant and druggable pathways in cancer. Copyright © 2017 The Author(s). Published by Elsevier Inc. All rights reserved.

  15. Phosphoproteomics of Primary Cells Reveals Druggable Kinase Signatures in Ovarian Cancer

    Directory of Open Access Journals (Sweden)

    Chiara Francavilla

    2017-03-01

    Full Text Available Our understanding of the molecular determinants of cancer is still inadequate because of cancer heterogeneity. Here, using epithelial ovarian cancer (EOC as a model system, we analyzed a minute amount of patient-derived epithelial cells from either healthy or cancerous tissues by single-shot mass-spectrometry-based phosphoproteomics. Using a multi-disciplinary approach, we demonstrated that primary cells recapitulate tissue complexity and represent a valuable source of differentially expressed proteins and phosphorylation sites that discriminate cancer from healthy cells. Furthermore, we uncovered kinase signatures associated with EOC. In particular, CDK7 targets were characterized in both EOC primary cells and ovarian cancer cell lines. We showed that CDK7 controls cell proliferation and that pharmacological inhibition of CDK7 selectively represses EOC cell proliferation. Our approach defines the molecular landscape of EOC, paving the way for efficient therapeutic approaches for patients. Finally, we highlight the potential of phosphoproteomics to identify clinically relevant and druggable pathways in cancer.

  16. Which future for nuclear counter-proliferation?; Quel avenir pour la contre-proliferation nucleaire?

    Energy Technology Data Exchange (ETDEWEB)

    Duval, M.

    2010-07-15

    Dealing with the case of nuclear weapons possessed by nuclear states (but not eventually by terrorists), the author first identifies the constants of counter-proliferation: it is linked to interest conflicts between those who try to preserve their monopoly and those who try to acquire a new weapon either because of a threat or for reasons of regional prestige, the evolution from use to deterrence, the appearance of new actors after the USA and Russia, the role of nuclear tactical weapons, and the future of Russian weapons and know-how. He presents the international counter-proliferation context: the Non Proliferation Treaty (NPT), the IAEA and its controls, the Nuclear Supplier Group (NSG), the nuclear-free zones, the Comprehensive Test Ban Treaty (CTBT), the Missile Technology Control Regime (MTCR). He describes how and why proliferation occurs: uranium enrichment and plutonium technology, political reasons in different parts of the world. Then, he gives an overview of the proliferation status by commenting the cases of Israel, Iraq, India, Pakistan, North Korea, and Iran. He discusses the future of proliferation (involved countries, existence of a nuclear black market) and of counter-proliferation as far as Middle-East and North Korea are concerned. He tries finally to anticipate the consequences for nuclear deterrence strategy, and more particularly for Europe and France

  17. Implementing Signature Neural Networks with Spiking Neurons.

    Science.gov (United States)

    Carrillo-Medina, José Luis; Latorre, Roberto

    2016-01-01

    Spiking Neural Networks constitute the most promising approach to develop realistic Artificial Neural Networks (ANNs). Unlike traditional firing rate-based paradigms, information coding in spiking models is based on the precise timing of individual spikes. It has been demonstrated that spiking ANNs can be successfully and efficiently applied to multiple realistic problems solvable with traditional strategies (e.g., data classification or pattern recognition). In recent years, major breakthroughs in neuroscience research have discovered new relevant computational principles in different living neural systems. Could ANNs benefit from some of these recent findings providing novel elements of inspiration? This is an intriguing question for the research community and the development of spiking ANNs including novel bio-inspired information coding and processing strategies is gaining attention. From this perspective, in this work, we adapt the core concepts of the recently proposed Signature Neural Network paradigm-i.e., neural signatures to identify each unit in the network, local information contextualization during the processing, and multicoding strategies for information propagation regarding the origin and the content of the data-to be employed in a spiking neural network. To the best of our knowledge, none of these mechanisms have been used yet in the context of ANNs of spiking neurons. This paper provides a proof-of-concept for their applicability in such networks. Computer simulations show that a simple network model like the discussed here exhibits complex self-organizing properties. The combination of multiple simultaneous encoding schemes allows the network to generate coexisting spatio-temporal patterns of activity encoding information in different spatio-temporal spaces. As a function of the network and/or intra-unit parameters shaping the corresponding encoding modality, different forms of competition among the evoked patterns can emerge even in the absence

  18. Noble Gas signatures of Enhanced Oil Recovery

    Science.gov (United States)

    Barry, P. H.; Kulongoski, J. T.; Tyne, R. L.; Hillegonds, D.; Byrne, D. J.; Landon, M. K.; Ballentine, C. J.

    2017-12-01

    Noble gases are powerful tracers of fluids from various oil and gas production activities in hydrocarbon reservoirs and nearby groundwater. Non-radiogenic noble gases are introduced into undisturbed oil and natural gas reservoirs through exchange with formation waters [1-3]. Reservoirs with extensive hydraulic fracturing, injection for enhanced oil recovery (EOR), and/or waste disposal also show evidence for a component of noble gases introduced from air [4]. Isotopic and elemental ratios of noble gases can be used to 1) assess the migration history of the injected and formation fluids, and 2) determine the extent of exchange between multiphase fluids in different reservoirs. We present noble gas isotope and abundance data from casing, separator and injectate gases of the Lost Hills and Fruitvale oil fields in the San Joaquin basin, California. Samples were collected as part of the California State Water Resource Control Board's Oil and Gas Regional Groundwater Monitoring Program. Lost Hills (n=7) and Fruitvale (n=2) gases are geochemically distinct and duplicate samples are highly reproducible. Lost Hills casing gas samples were collected from areas where EOR and hydraulic fracturing has occurred in the past several years, and from areas where EOR is absent. The Fruitvale samples were collected from a re-injection port. All samples are radiogenic in their He isotopes, typical of a crustal environment, and show enrichments in heavy noble gases, resulting from preferential adsorption on sediments. Fruitvale samples reflect air-like surface conditions, with higher air-derived noble gas concentrations. Lost Hills gases show a gradation from pristine crustal signatures - indicative of closed-system exchange with formation fluids - to strongly air-contaminated signatures in the EOR region. Pristine samples can be used to determine the extent of hydrocarbon exchange with fluids, whereas samples with excess air can be used to quantify the extent of EOR. Determining noble

  19. 7-Piperazinethylchrysin inhibits melanoma cell proliferation by ...

    African Journals Online (AJOL)

    In B16F10 and A375 cells, treatment with PEC caused the inhibition ... Conclusion: PEC inhibited melanoma cell proliferation, apparently by blocking the cell cycle at G0/G1 .... all statistical analyses. .... Financial support from the Department of.

  20. Limiting Future Proliferation and Security Risks

    International Nuclear Information System (INIS)

    Bari, R.

    2011-01-01

    A major new technical tool for evaluation of proliferation and security risks has emerged over the past decade as part the activities of the Generation IV International Forum. The tool has been developed by a consensus group from participating countries and organizations and is termed the Proliferation Resistance and Physical Protection (PR and PP) Evaluation Methodology. The methodology defines a set of challenges, analyzes system response to these challenges, and assesses outcomes. The challenges are the threats posed by potential actors (proliferant states or sub-national adversaries). It is of paramount importance in an evaluation to establish the objectives, capabilities, resources, and strategies of the adversary as well as the design and protection contexts. Technical and institutional characteristics are both used to evaluate the response of the system and to determine its resistance against proliferation threats and robustness against sabotage and terrorism threats. The outcomes of the system response are expressed in terms of a set of measures, which thereby define the PR and PP characteristics of the system. This paper summarizes results of applications of the methodology to nuclear energy systems including reprocessing facilities and large and small modular reactors. The use of the methodology in the design phase a facility will be discussed as it applies to future safeguards concepts.

  1. Does programmed CTL proliferation optimize virus control?

    DEFF Research Database (Denmark)

    Wodarz, Dominik; Thomsen, Allan Randrup

    2005-01-01

    CD8 T-cell or cytotoxic T-lymphocyte responses develop through an antigen-independent proliferation and differentiation program. This is in contrast to the previous thinking, which was that continuous antigenic stimulation was required. This Opinion discusses why nature has chosen the proliferati...

  2. Canada's nuclear non-proliferation policy

    International Nuclear Information System (INIS)

    1985-01-01

    Canada's non-proliferation and safeguards policy has two objectives: 1) to promote the emergence of a more effective and comprehensive international non-proliferation regime; and 2) to assure the Canadian people and the international community that Canadian nuclear exports will not be used for any nuclear explosive purpose. By emphasizing the key role of the NPT, by promoting reliance upon and improvements in the IAEA safeguards system, by treating nuclear weapon and non-nuclear weapon states alike regarding Canadian nuclear exports, by working for new approaches covering the sensitive phases (e.g. reprocessing) of the nuclear fuel cycle, Canada's policy promotes attainment of the first objective. The latter objective is served through the network of bilateral nuclear agreements that Canada has put into place with its nuclear partners. Those agreements provide assurance that Canada's nuclear exports are used solely for legitimate, peaceful, nuclear energy production purposes. At the same time, Canada, having formulated its non-proliferation and safeguards policy during the period 1945 to 1980, has recognized that it has gone as far as it can on its own in this field and that from this point on any further changes should be made on the basis of international agreement. The Canadian objective in post-INFCE forums such as the Committee on Assurances of Supply is to exert Canada's best efforts to persuade the international community to devise a more effective and comprehensive international non-proliferation regime into which Canada and other suppliers might subsume their national requirements

  3. Luteoloside Inhibits Proliferation of Human Chronic Myeloid ...

    African Journals Online (AJOL)

    Purpose: To investigate the effects of luteoloside on the proliferation of human chronic ..... Zhang N, Wang D, Zhu Y, Wang J, Lin H. Inhibition ... Han X. Protection of Luteolin-7-O-Glucoside Against ... Hwang YJ, Lee EJ, Kim HR, Hwang KA.

  4. Arsenic and urinary bladder cell proliferation

    International Nuclear Information System (INIS)

    Luster, Michael I.; Simeonova, Petia P.

    2004-01-01

    Epidemiologic studies have demonstrated that a close association exists between the elevated levels of arsenic in drinking water and the incidence of certain cancers, including transitional cell carcinomas of the urinary bladder. We have employed in vitro and in vivo models to examine the effects of sodium arsenite on the urinary bladder epithelium. Mice exposed to 0.01% sodium arsenite in drinking water demonstrated hyperproliferation of the bladder uroepithelium within 4 weeks after initiating treatment. This occurred in the absence of amorphous precipitates and was accompanied by the accumulation of trivalent arsenite (iAs 3+ ), and to a lesser extent dimethylarsenic (DMA), arsenate (iAs 5+ ), and monomethylarsenic (MMA) in bladder tissue. In contrast to the bladder, urinary secretion was primarily in the form of DMA and MMA. Arsenic-induced cell proliferation in the bladder epithelium was correlated with activation of the MAP kinase pathway, leading to extracellular signal-regulated kinase (ERK) kinase activity, AP-1 activation, and expression of AP-1-associated genes involved in cell proliferation. Activation of the MAP kinase pathway involved both epidermal growth factor (EGF) receptor-dependent and -independent events, the latter involving Src activation. Studies summarized in this review suggest that arsenic accumulates in urinary bladder epithelium causing activation of specific signaling pathways that lead to chronic increased cell proliferation. This may play a non-epigenetic role in carcinogenesis by increasing the proliferation of initiated cells or increasing the mutational rate

  5. Non-proliferation and nuclear disarmament

    International Nuclear Information System (INIS)

    Shea, M.

    2000-01-01

    Fissionable materials are common to all nuclear weapons and controls on the production, storage, processing and use of fissionable materials provides one means to address non-proliferation and disarmament. In this article, the relevance of such controls is examined and the current situation and future prospects are assessed. (authors)

  6. Nuclear Society and non-proliferation problems

    International Nuclear Information System (INIS)

    Gagarinskij, A.Ya.; Kushnarev, S.V.; Ponomarev-Stepnoj, N.N.; Sukhoruchkin, V.K.; Khromov, V.V.; Shmelev, V.M.

    1997-01-01

    In the USSR Nuclear Society in 1991 the special working group on the problems of nuclear weapons non-proliferation and nuclear materials control, uniting the experts of different types (nuclear physicists, lawyers, teachers), was created. This group became the mechanism of the practical Nuclear Society activity realization in this sphere. Three milestones of the innovative activity can be specified. First Milestone. In January 1992 the Central Nuclear Society Board (of the International Public Nuclear Society Association) published a special appeal to the First Leaders of all countries - former USSR republics. This address paid a special attention to the unity of the USSR power-industrial complex, and numerous problems arisen while separating this complex, including nuclear weapons non-proliferation problems, were indicated as well. Second Milestone. In 1992 and 1993 the Nuclear Society experts issued two selection 'Nuclear Non-proliferation and Control Problems' including reviewing basic papers. In addition, materials on non-proliferation and control are published regularly in the organs. Third Milestone.In 1993 - 1997 some special scientific and technical events (conferences, workshops, meetings) allowing to analyze the joint international projects and contracts outcomes, and establish new contacts between the specialists of NIS, Baltic states and others, have been hold

  7. EMP at the Non-Proliferation Experiment

    Energy Technology Data Exchange (ETDEWEB)

    Bell, J. [AWE, Aldermaston (United Kingdom)

    1994-12-31

    This experiment presented an opportunity to field customized equipment designed to detect and record electromagnetic pulse (EMP) emanations from an explosion over a wide frequency range. Any data recorded could be used in conjunction with the seismic methods to further non-proliferation studies. No EMP emanations were detectable from the four sensors deployed outside the tunnel confines.

  8. Some remarks on rockbursts and nuclear proliferation

    Energy Technology Data Exchange (ETDEWEB)

    McGarr, A. [Geological Survey, Menlo Park, CA (United States)

    1994-12-31

    This report describes problems associated with non-proliferation verification. Issues are described which can arise in the course of monitoring test ban treaties, with an example of an occurrence in South Africa. A problem for most situations appears to be the seismic source.

  9. Luteoloside Inhibits Proliferation of Human Chronic Myeloid ...

    African Journals Online (AJOL)

    Purpose: To investigate the effects of luteoloside on the proliferation of human chronic myeloid leukemia K562 cells and whether luteoloside induces cell cycle arrest and apoptosis in K562 cells. Methods: Luteoloside's cytotoxicity was assessed using a cell counting kit. Cell cycle distribution was analysed by flow cytometry ...

  10. Thalidomide increases human keratinocyte migration and proliferation.

    Science.gov (United States)

    Nasca, M R; O'Toole, E A; Palicharla, P; West, D P; Woodley, D T

    1999-11-01

    Thalidomide is reported to have therapeutic utility in the treatment of pyoderma gangrenosum, Behçet's disease, aphthous ulcers, and skin wounds. We investigated the effect of thalidomide on human keratinocyte proliferation and migration, two early and critical events in the re-epithelialization of skin wounds. Thalidomide at concentrations less than 1 microM did not affect keratinocyte viability. Using a thymidine incorporation assay, we found that thalidomide, at therapeutic concentrations, induced more than a 2. 5-fold increase in the proliferative potential of the cells. Keratinocyte migration was assessed by two independent motility assays: a colloidal gold assay and an in vitro scratch assay. At optimal concentrations, thalidomide increased keratinocyte migration on a collagen matrix more than 2-fold in the colloidal gold assay and more than 3-fold in the scratch assay over control. Although pro-migratory, thalidomide did not alter the level of metalloproteinase-9 secreted into culture medium. Thalidomide did, however, induce a 2-4-fold increase in keratinocyte-derived interleukin-8, a pro-migratory cellular autocrine factor. Human keratinocyte migration and proliferation are essential for re-epithelialization of skin wounds. Interleukin-8 increases human keratinocyte migration and proliferation and is chemotactic for keratinocytes. Therefore, thalidomide may modulate keratinocyte proliferation and motility by a chemokine-dependent pathway.

  11. Signature change events: a challenge for quantum gravity?

    International Nuclear Information System (INIS)

    White, Angela; Weinfurtner, Silke; Visser, Matt

    2010-01-01

    Within the framework of either Euclidean (functional integral) quantum gravity or canonical general relativity the signature of the manifold is a priori unconstrained. Furthermore, recent developments in the emergent spacetime programme have led to a physically feasible implementation of (analogue) signature change events. This suggests that it is time to revisit the sometimes controversial topic of signature change in general relativity. Specifically, we shall focus on the behaviour of a quantum field defined on a manifold containing regions of different signature. We emphasize that regardless of the underlying classical theory, there are severe problems associated with any quantum field theory residing on a signature-changing background. (Such as the production of what is naively an infinite number of particles, with an infinite energy density.) We show how the problem of quantum fields exposed to finite regions of Euclidean-signature (Riemannian) geometry has similarities with the quantum barrier penetration problem. Finally we raise the question as to whether signature change transitions could be fully understood and dynamically generated within (modified) classical general relativity, or whether they require the knowledge of a theory of quantum gravity.

  12. Forged Signature Distinction Using Convolutional Neural Network for Feature Extraction

    Directory of Open Access Journals (Sweden)

    Seungsoo Nam

    2018-01-01

    Full Text Available This paper proposes a dynamic verification scheme for finger-drawn signatures in smartphones. As a dynamic feature, the movement of a smartphone is recorded with accelerometer sensors in the smartphone, in addition to the moving coordinates of the signature. To extract high-level longitudinal and topological features, the proposed scheme uses a convolution neural network (CNN for feature extraction, and not as a conventional classifier. We assume that a CNN trained with forged signatures can extract effective features (called S-vector, which are common in forging activities such as hesitation and delay before drawing the complicated part. The proposed scheme also exploits an autoencoder (AE as a classifier, and the S-vector is used as the input vector to the AE. An AE has high accuracy for the one-class distinction problem such as signature verification, and is also greatly dependent on the accuracy of input data. S-vector is valuable as the input of AE, and, consequently, could lead to improved verification accuracy especially for distinguishing forged signatures. Compared to the previous work, i.e., the MLP-based finger-drawn signature verification scheme, the proposed scheme decreases the equal error rate by 13.7%, specifically, from 18.1% to 4.4%, for discriminating forged signatures.

  13. Modeling the lexical morphology of Western handwritten signatures.

    Directory of Open Access Journals (Sweden)

    Moises Diaz-Cabrera

    Full Text Available A handwritten signature is the final response to a complex cognitive and neuromuscular process which is the result of the learning process. Because of the many factors involved in signing, it is possible to study the signature from many points of view: graphologists, forensic experts, neurologists and computer vision experts have all examined them. Researchers study written signatures for psychiatric, penal, health and automatic verification purposes. As a potentially useful, multi-purpose study, this paper is focused on the lexical morphology of handwritten signatures. This we understand to mean the identification, analysis, and description of the signature structures of a given signer. In this work we analyze different public datasets involving 1533 signers from different Western geographical areas. Some relevant characteristics of signature lexical morphology have been selected, examined in terms of their probability distribution functions and modeled through a General Extreme Value distribution. This study suggests some useful models for multi-disciplinary sciences which depend on handwriting signatures.

  14. Server-Aided Verification Signature with Privacy for Mobile Computing

    Directory of Open Access Journals (Sweden)

    Lingling Xu

    2015-01-01

    Full Text Available With the development of wireless technology, much data communication and processing has been conducted in mobile devices with wireless connection. As we know that the mobile devices will always be resource-poor relative to static ones though they will improve in absolute ability, therefore, they cannot process some expensive computational tasks due to the constrained computational resources. According to this problem, server-aided computing has been studied in which the power-constrained mobile devices can outsource some expensive computation to a server with powerful resources in order to reduce their computational load. However, in existing server-aided verification signature schemes, the server can learn some information about the message-signature pair to be verified, which is undesirable especially when the message includes some secret information. In this paper, we mainly study the server-aided verification signatures with privacy in which the message-signature pair to be verified can be protected from the server. Two definitions of privacy for server-aided verification signatures are presented under collusion attacks between the server and the signer. Then based on existing signatures, two concrete server-aided verification signature schemes with privacy are proposed which are both proved secure.

  15. Starry messages: Searching for signatures of interstellar archaeology

    Energy Technology Data Exchange (ETDEWEB)

    Carrigan, Richard A., Jr.; /Fermilab

    2009-12-01

    Searching for signatures of cosmic-scale archaeological artifacts such as Dyson spheres or Kardashev civilizations is an interesting alternative to conventional SETI. Uncovering such an artifact does not require the intentional transmission of a signal on the part of the original civilization. This type of search is called interstellar archaeology or sometimes cosmic archaeology. The detection of intelligence elsewhere in the Universe with interstellar archaeology or SETI would have broad implications for science. For example, the constraints of the anthropic principle would have to be loosened if a different type of intelligence was discovered elsewhere. A variety of interstellar archaeology signatures are discussed including non-natural planetary atmospheric constituents, stellar doping with isotopes of nuclear wastes, Dyson spheres, as well as signatures of stellar and galactic-scale engineering. The concept of a Fermi bubble due to interstellar migration is introduced in the discussion of galactic signatures. These potential interstellar archaeological signatures are classified using the Kardashev scale. A modified Drake equation is used to evaluate the relative challenges of finding various sources. With few exceptions interstellar archaeological signatures are clouded and beyond current technological capabilities. However SETI for so-called cultural transmissions and planetary atmosphere signatures are within reach.

  16. Signature detection and matching for document image retrieval.

    Science.gov (United States)

    Zhu, Guangyu; Zheng, Yefeng; Doermann, David; Jaeger, Stefan

    2009-11-01

    As one of the most pervasive methods of individual identification and document authentication, signatures present convincing evidence and provide an important form of indexing for effective document image processing and retrieval in a broad range of applications. However, detection and segmentation of free-form objects such as signatures from clustered background is currently an open document analysis problem. In this paper, we focus on two fundamental problems in signature-based document image retrieval. First, we propose a novel multiscale approach to jointly detecting and segmenting signatures from document images. Rather than focusing on local features that typically have large variations, our approach captures the structural saliency using a signature production model and computes the dynamic curvature of 2D contour fragments over multiple scales. This detection framework is general and computationally tractable. Second, we treat the problem of signature retrieval in the unconstrained setting of translation, scale, and rotation invariant nonrigid shape matching. We propose two novel measures of shape dissimilarity based on anisotropic scaling and registration residual error and present a supervised learning framework for combining complementary shape information from different dissimilarity metrics using LDA. We quantitatively study state-of-the-art shape representations, shape matching algorithms, measures of dissimilarity, and the use of multiple instances as query in document image retrieval. We further demonstrate our matching techniques in offline signature verification. Extensive experiments using large real-world collections of English and Arabic machine-printed and handwritten documents demonstrate the excellent performance of our approaches.

  17. Nuclear non proliferation and disarmament; Non-proliferation nucleaire et desarmement

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-07-01

    In the framework of the publication of a document on the ''weapons mastership, disarmament and non proliferation: the french action'', by the ministry of Foreign Affairs and the ministry of Defense, the French Documentation organization presents a whole document. This document describes and details the following topics: the conference on the treaty of non proliferation of nuclear weapons, the France, Usa and Non Governmental Organizations position, the threats of the proliferation, the french actions towards the disarmament, the disarmament in the world, a chronology and some bibliographic resources. (A.L.B.)

  18. Proliferation: does the peaceful use of nuclear energy have to lead to proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    Muench, E.; Stein, G.

    The question of whether the proliferation of nuclear weapons is promoted by an increasing use of peaceful nuclear energy can be answered with a well-founded no. Even a regional renouncing of the peaceful use of nuclear energy would not reduce the worldwide problem of nuclear weapons' proliferation. Therefore, joint efforts must be aimed at promoting trust between peoples in the nuclear sphere and the political reasons for the proliferation of nuclear weapons must be reduced in order also to promote international harmony

  19. Does interdependence alleviate proliferation risks in Asia?

    International Nuclear Information System (INIS)

    Yoshida, Osamu

    1997-01-01

    As the extension Conference of the Non-Proliferation Treaty ended with its unlimited extension without any modification of the treaty obligation of the nuclear-weapon states to nuclear disarmament, the prospect of the regime to incorporate those suspected nuclear powers in Asia, namely India, Pakistan and Israel, has become dark. In this paper the problem of proliferation risk centred in India is analysed. It is well known that India was the first to criticize the Non-Proliferation Treaty regime as highly discriminating between the five nuclear haves and the rest. As was always the case, India's point is logically persuasive and consistent. However, it is also true that the logical or legal point of view does not always solve the problem. Therefore, we look at the regional and international political constellation in which any assertion has to be constructed. At present there is very little possibility that this region will become nuclear-free. This is because the horizontal proliferation, that has seemingly taken place here, is the result of a 'nuclear chain reaction', starting with a minor nuclear-weapon state, China. However, the economic upsurge in the region now throws the nuclear chain-reactions into the background. It has come to a standstill and the future of nuclear proliferation here will have to be decided by global nuclear disarmament, as there is no motivation on the side of the two Asian giants to agree on the reduction in their nuclear arsenals, though under American pressure, another suspected nuclear power, Pakistan, may have to give up its nuclear development plan

  20. Nuclear proliferation: present, past and future

    International Nuclear Information System (INIS)

    Alonso, M.; Zaleski, P.

    1993-01-01

    Since the end of WW II one of the more, if not the most, serious concerns of all people in the world has been to preserve this planet avoiding a nuclear war. On the positive side, in spite of the huge arsenal of strategic and tactical nuclear weapons (NW) accumulated over the years by the US and the former SU and the innumerable military conflicts we have witnessed since WW II, no NW have been used again. But this should not be a great consolation: the fact that countries have refrained from using NW does not necessarily mean that it will always be that way. As long as countries try to solve their differences by the use of force the danger of a nuclear confrontation remains, and nuclear disarmament and proliferation should cotinue to be a serious concern. This concern has profound political, social and ethical components that have been analyzed extensively and profusely. The purpose of this paper is more limited: to provide an overview of the national and international efforts to minimize the risk of a nuclear war by regulating, restricting and containing the development and possession of NW. This is what has become know as the nuclear non-proliferation regime. Any nuclear non-proliferation regime must have two essential goals: achieving nuclear disarmament by the NWS (and thereby eliminating vertical proliferation). To make a regime effective it must rely on international agreements, a system of safeguards coupled with inspection and verification procedures, and above all on the good faith of all nations involved. It should be stated from the very beginning that nuclear non-proliferation efforts, like all disarmament efforts, are essentially of political nature, albeit having an important scientific and technological component. They are effective only to the extent that countries really renounce NW and are prepared to severely sanction those who do not. (Author) 31 refs

  1. Proliferation resistance assessment of pyro processing

    Energy Technology Data Exchange (ETDEWEB)

    Kwon, E. H.; Ko, W. I.; Kim, H. D. [KAERI, Daejeon (Korea, Republic of)

    2012-10-15

    In 2002, world experts gathered and defined the term proliferation resistance as 'the characteristic of a nuclear energy system that impedes the diversion or undeclared production of nuclear material, or misuse of technology, by State in order to acquire nuclear weapons or other nuclear explosive devices.' The same report also defines the following terms: Intrinsic barriers (technical features) of proliferation resistance are features that result from the technical design of nuclear energy systems, including those that facilitate the implementation of extrinsic measures. Extrinsic barriers (institutional measures) of proliferation resistance are features that result from the decisions and undertakings of states related to nuclear energy system. Intrinsic barriers are further divided into material barriers.the 'intrinsic, or inherent, qualities of materials that reduce the inherent desirability or attractiveness of the material as an explosive' and technical barriers. The 'intrinsic technical lements of the fuel cycle, its facilities, processes, and equipment that serve to make it difficult to gain access to materials and/or to use or misuse facilities to obtain weapons usable materials.' Material barriers include isotopic, chemical, radiological, mass and bulk, and detectability, whereas technical barriers include facility unattractiveness, accessibility, available fissile mass, detectability of and time required for diversion, and skills, expertise, and knowledge. Assessing the proliferation resistance of pyro processing is meaningful only when compared with other processes. This paper attempts to discuss the features of pyro processing by comparing it with direct disposal and aqueous separation processes from a proliferation resistance viewpoint.

  2. Modeling ground vehicle acoustic signatures for analysis and synthesis

    International Nuclear Information System (INIS)

    Haschke, G.; Stanfield, R.

    1995-01-01

    Security and weapon systems use acoustic sensor signals to classify and identify moving ground vehicles. Developing robust signal processing algorithms for this is expensive, particularly in presence of acoustic clutter or countermeasures. This paper proposes a parametric ground vehicle acoustic signature model to aid the system designer in understanding which signature features are important, developing corresponding feature extraction algorithms and generating low-cost, high-fidelity synthetic signatures for testing. The authors have proposed computer-generated acoustic signatures of armored, tracked ground vehicles to deceive acoustic-sensored smart munitions. They have developed quantitative measures of how accurately a synthetic acoustic signature matches those produced by actual vehicles. This paper describes parameters of the model used to generate these synthetic signatures and suggests methods for extracting these parameters from signatures of valid vehicle encounters. The model incorporates wide-bandwidth and narrow- bandwidth components that are modulated in a pseudo-random fashion to mimic the time dynamics of valid vehicle signatures. Narrow- bandwidth feature extraction techniques estimate frequency, amplitude and phase information contained in a single set of narrow frequency- band harmonics. Wide-bandwidth feature extraction techniques estimate parameters of a correlated-noise-floor model. Finally, the authors propose a method of modeling the time dynamics of the harmonic amplitudes as a means adding necessary time-varying features to the narrow-bandwidth signal components. The authors present results of applying this modeling technique to acoustic signatures recorded during encounters with one armored, tracked vehicle. Similar modeling techniques can be applied to security systems

  3. Photon signature analysis using template matching

    Energy Technology Data Exchange (ETDEWEB)

    Bradley, D.A., E-mail: d.a.bradley@surrey.ac.uk [Department of Physics, University of Surrey, Guildford GU2 7XH (United Kingdom); Hashim, S., E-mail: suhairul@utm.my [Department of Physics, Universiti Teknologi Malaysia, 81310 Skudai, Johor (Malaysia); Saripan, M.I. [Faculty of Engineering, Universiti Putra Malaysia, 43400 Serdang, Selangor (Malaysia); Wells, K. [Centre for Vision, Speech and Signal Processing, University of Surrey, Guildford GU2 7XH (United Kingdom); Dunn, W.L. [Department of Mechanical and Nuclear Engineering, Kansas State University, 3002 Rathbone Hall, Manhattan, KS 66506 (United States)

    2011-10-01

    We describe an approach to detect improvised explosive devices (IEDs) by using a template matching procedure. This approach relies on the signature due to backstreaming {gamma} photons from various targets. In this work we have simulated cylindrical targets of aluminum, iron, copper, water and ammonium nitrate (nitrogen-rich fertilizer). We simulate 3.5 MeV source photons distributed on a plane inside a shielded area using Monte Carlo N-Particle (MCNP{sup TM}) code version 5 (V5). The 3.5 MeV source gamma rays yield 511 keV peaks due to pair production and scattered gamma rays. In this work, we simulate capture of those photons that backstream, after impinging on the target element, toward a NaI detector. The captured backstreamed photons are expected to produce a unique spectrum that will become part of a simple signal processing recognition system based on the template matching method. Different elements were simulated using different sets of random numbers in the Monte Carlo simulation. To date, the sum of absolute differences (SAD) method has been used to match the template. In the examples investigated, template matching was found to detect all elements correctly.

  4. Discrete Neural Signatures of Basic Emotions.

    Science.gov (United States)

    Saarimäki, Heini; Gotsopoulos, Athanasios; Jääskeläinen, Iiro P; Lampinen, Jouko; Vuilleumier, Patrik; Hari, Riitta; Sams, Mikko; Nummenmaa, Lauri

    2016-06-01

    Categorical models of emotions posit neurally and physiologically distinct human basic emotions. We tested this assumption by using multivariate pattern analysis (MVPA) to classify brain activity patterns of 6 basic emotions (disgust, fear, happiness, sadness, anger, and surprise) in 3 experiments. Emotions were induced with short movies or mental imagery during functional magnetic resonance imaging. MVPA accurately classified emotions induced by both methods, and the classification generalized from one induction condition to another and across individuals. Brain regions contributing most to the classification accuracy included medial and inferior lateral prefrontal cortices, frontal pole, precentral and postcentral gyri, precuneus, and posterior cingulate cortex. Thus, specific neural signatures across these regions hold representations of different emotional states in multimodal fashion, independently of how the emotions are induced. Similarity of subjective experiences between emotions was associated with similarity of neural patterns for the same emotions, suggesting a direct link between activity in these brain regions and the subjective emotional experience. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  5. Geochemical signature of radioactive waste: oil NORM

    Energy Technology Data Exchange (ETDEWEB)

    Costa, Gilberto T. de Paula; Costa-de-Moura, Jorge; Gomes, Carlos de Almeida; Sampaio, Emidio A. Lopes, E-mail: gilberto.costa@cnen.gov.br, E-mail: jcmoura@cnen.gov.br, E-mail: cgomes@cnen.gov.br [Comissao Nacional de Energia Nuclear (CNEN), Rio de Janeiro, RJ (Brazil). Div. de Controle de Rejeitos e Transporte de Materiais Radioativos

    2017-07-01

    The Brazilian Nuclear Agency (CNEN) rules all nuclear activity in Brazil as demanded by the Federal Constitution, articles 21, XXIII, and 177, V, and by the Federal Acts 4.118/62 and 10.308/2001. Therefore, the CNEN is responsible for any radioactive waste disposal in the country. Oil Naturally Occurring Radioactive Materials (Oil NORM) in this paper refers to waste coming from oil exploration. Oil NORM has called much attention during the last decades, mostly because it is not possible to determine its primary source due to the actual absence of regulatory control mechanism. There is no efficient regulatory tool which allows determining the origin of such NORM wastes even among those facilities under regulatory control. This fact may encourage non-authorized radioactive material transportation, smuggling and terrorism. The aim of this project is to provide a geochemical signature for each oil NORM waste using its naturally occurring isotopic composition to identify its origin. The here proposed method is a specific geochemical modeling of oil sludge NORM samples which are analyzed for radioisotopes normally present in oil pipes, such as {sup 228}Ac, {sup 214}Bi and {sup 214}Pb. The activity ratios are plotted in scatter diagrams. This method was successfully tested with data of different sources obtained from analysis reports from the Campos Basin/Brazil and from literature. (author)

  6. DNA methylation signatures of educational attainment

    Science.gov (United States)

    van Dongen, Jenny; Bonder, Marc Jan; Dekkers, Koen F.; Nivard, Michel G.; van Iterson, Maarten; Willemsen, Gonneke; Beekman, Marian; van der Spek, Ashley; van Meurs, Joyce B. J.; Franke, Lude; Heijmans, Bastiaan T.; van Duijn, Cornelia M.; Slagboom, P. Eline; Boomsma, Dorret I.; BIOS consortium

    2018-03-01

    Educational attainment is a key behavioural measure in studies of cognitive and physical health, and socioeconomic status. We measured DNA methylation at 410,746 CpGs (N = 4152) and identified 58 CpGs associated with educational attainment at loci characterized by pleiotropic functions shared with neuronal, immune and developmental processes. Associations overlapped with those for smoking behaviour, but remained after accounting for smoking at many CpGs: Effect sizes were on average 28% smaller and genome-wide significant at 11 CpGs after adjusting for smoking and were 62% smaller in never smokers. We examined sources and biological implications of education-related methylation differences, demonstrating correlations with maternal prenatal folate, smoking and air pollution signatures, and associations with gene expression in cis, dynamic methylation in foetal brain, and correlations between blood and brain. Our findings show that the methylome of lower-educated people resembles that of smokers beyond effects of their own smoking behaviour and shows traces of various other exposures.

  7. Geochemical signature of radioactive waste: oil NORM

    International Nuclear Information System (INIS)

    Costa, Gilberto T. de Paula; Costa-de-Moura, Jorge; Gomes, Carlos de Almeida; Sampaio, Emidio A. Lopes

    2017-01-01

    The Brazilian Nuclear Agency (CNEN) rules all nuclear activity in Brazil as demanded by the Federal Constitution, articles 21, XXIII, and 177, V, and by the Federal Acts 4.118/62 and 10.308/2001. Therefore, the CNEN is responsible for any radioactive waste disposal in the country. Oil Naturally Occurring Radioactive Materials (Oil NORM) in this paper refers to waste coming from oil exploration. Oil NORM has called much attention during the last decades, mostly because it is not possible to determine its primary source due to the actual absence of regulatory control mechanism. There is no efficient regulatory tool which allows determining the origin of such NORM wastes even among those facilities under regulatory control. This fact may encourage non-authorized radioactive material transportation, smuggling and terrorism. The aim of this project is to provide a geochemical signature for each oil NORM waste using its naturally occurring isotopic composition to identify its origin. The here proposed method is a specific geochemical modeling of oil sludge NORM samples which are analyzed for radioisotopes normally present in oil pipes, such as 228 Ac, 214 Bi and 214 Pb. The activity ratios are plotted in scatter diagrams. This method was successfully tested with data of different sources obtained from analysis reports from the Campos Basin/Brazil and from literature. (author)

  8. Multimodal three-dimensional dynamic signature

    Directory of Open Access Journals (Sweden)

    Yury E. Kozlov

    2017-11-01

    Full Text Available Reliable authentication in mobile applications is among the most important information security challenges. Today, we can hardly imagine a person who would not own a mobile device that connects to the Internet. Mobile devices are being used to store large amounts of confidential information, ranging from personal photos to electronic banking tools. In 2009, colleagues from Rice University together with their collaborators from Motorola, proposed an authentication through in-air gestures. This and subsequent work contributing to the development of the method are reviewed in our introduction. At the moment, there exists a version of the gesture-based authentication software available for Android mobile devices. This software has not become widespread yet. One of likely reasons for that is the insufficient reliability of the method, which involves similar to its earlier analogs the use of only one device. Here we discuss the authentication based on the multimodal three-dimensional dynamic signature (MTDS performed by two independent mobile devices. The MTDS-based authentication technique is an advanced version of in-air gesture authentication. We describe the operation of a prototype of MTDS-based authentication, including the main implemented algorithms, as well as some preliminary results of testing the software. We expect that our method can be used in any mobile application, provided a number of additional improvements discussed in the conclusion are made.

  9. Movement Pattern Analysis Based on Sequence Signatures

    Directory of Open Access Journals (Sweden)

    Seyed Hossein Chavoshi

    2015-09-01

    Full Text Available Increased affordability and deployment of advanced tracking technologies have led researchers from various domains to analyze the resulting spatio-temporal movement data sets for the purpose of knowledge discovery. Two different approaches can be considered in the analysis of moving objects: quantitative analysis and qualitative analysis. This research focuses on the latter and uses the qualitative trajectory calculus (QTC, a type of calculus that represents qualitative data on moving point objects (MPOs, and establishes a framework to analyze the relative movement of multiple MPOs. A visualization technique called sequence signature (SESI is used, which enables to map QTC patterns in a 2D indexed rasterized space in order to evaluate the similarity of relative movement patterns of multiple MPOs. The applicability of the proposed methodology is illustrated by means of two practical examples of interacting MPOs: cars on a highway and body parts of a samba dancer. The results show that the proposed method can be effectively used to analyze interactions of multiple MPOs in different domains.

  10. Brain morphological signatures for chronic pain.

    Directory of Open Access Journals (Sweden)

    Marwan N Baliki

    Full Text Available Chronic pain can be understood not only as an altered functional state, but also as a consequence of neuronal plasticity. Here we use in vivo structural MRI to compare global, local, and architectural changes in gray matter properties in patients suffering from chronic back pain (CBP, complex regional pain syndrome (CRPS and knee osteoarthritis (OA, relative to healthy controls. We find that different chronic pain types exhibit unique anatomical 'brain signatures'. Only the CBP group showed altered whole-brain gray matter volume, while regional gray matter density was distinct for each group. Voxel-wise comparison of gray matter density showed that the impact on the extent of chronicity of pain was localized to a common set of regions across all conditions. When gray matter density was examined for large regions approximating Brodmann areas, it exhibited unique large-scale distributed networks for each group. We derived a barcode, summarized by a single index of within-subject co-variation of gray matter density, which enabled classification of individual brains to their conditions with high accuracy. This index also enabled calculating time constants and asymptotic amplitudes for an exponential increase in brain re-organization with pain chronicity, and showed that brain reorganization with pain chronicity was 6 times slower and twice as large in CBP in comparison to CRPS. The results show an exuberance of brain anatomical reorganization peculiar to each condition and as such reflecting the unique maladaptive physiology of different types of chronic pain.

  11. Overloaded CDMA Systems with Displaced Binary Signatures

    Directory of Open Access Journals (Sweden)

    Vanhaverbeke Frederik

    2004-01-01

    Full Text Available We extend three types of overloaded CDMA systems, by displacing in time the binary signature sequences of these systems: (1 random spreading (PN, (2 multiple-OCDMA (MO, and (3 PN/OCDMA (PN/O. For each of these systems, we determine the time shifts that minimize the overall multiuser interference power. The achievable channel load with coded and uncoded data is evaluated for the conventional (without displacement and improved (with displacement systems, as well as for systems based on quasi-Welch-bound-equality (QWBE sequences, by means of several types of turbo detectors. For each system, the best performing turbo detector is selected in order to compare the performance of these systems. It is found that the improved systems substantially outperform their original counterparts. With uncoded data, (improved PN/O yields the highest acceptable channel load. For coded data, MO allows for the highest acceptable channel load over all considered systems, both for the conventional and the improved systems. In the latter case, channel loads of about 280% are achievable with a low degradation as compared to a single user system.

  12. Microbial Signatures of Cadaver Gravesoil During Decomposition.

    Science.gov (United States)

    Finley, Sheree J; Pechal, Jennifer L; Benbow, M Eric; Robertson, B K; Javan, Gulnaz T

    2016-04-01

    Genomic studies have estimated there are approximately 10(3)-10(6) bacterial species per gram of soil. The microbial species found in soil associated with decomposing human remains (gravesoil) have been investigated and recognized as potential molecular determinants for estimates of time since death. The nascent era of high-throughput amplicon sequencing of the conserved 16S ribosomal RNA (rRNA) gene region of gravesoil microbes is allowing research to expand beyond more subjective empirical methods used in forensic microbiology. The goal of the present study was to evaluate microbial communities and identify taxonomic signatures associated with the gravesoil human cadavers. Using 16S rRNA gene amplicon-based sequencing, soil microbial communities were surveyed from 18 cadavers placed on the surface or buried that were allowed to decompose over a range of decomposition time periods (3-303 days). Surface soil microbial communities showed a decreasing trend in taxon richness, diversity, and evenness over decomposition, while buried cadaver-soil microbial communities demonstrated increasing taxon richness, consistent diversity, and decreasing evenness. The results show that ubiquitous Proteobacteria was confirmed as the most abundant phylum in all gravesoil samples. Surface cadaver-soil communities demonstrated a decrease in Acidobacteria and an increase in Firmicutes relative abundance over decomposition, while buried soil communities were consistent in their community composition throughout decomposition. Better understanding of microbial community structure and its shifts over time may be important for advancing general knowledge of decomposition soil ecology and its potential use during forensic investigations.

  13. Raman Signatures of Polytypism in Molybdenum Disulfide.

    Science.gov (United States)

    Lee, Jae-Ung; Kim, Kangwon; Han, Songhee; Ryu, Gyeong Hee; Lee, Zonghoon; Cheong, Hyeonsik

    2016-02-23

    Since the stacking order sensitively affects various physical properties of layered materials, accurate determination of the stacking order is important for studying the basic properties of these materials as well as for device applications. Because 2H-molybdenum disulfide (MoS2) is most common in nature, most studies so far have focused on 2H-MoS2. However, we found that the 2H, 3R, and mixed stacking sequences exist in few-layer MoS2 exfoliated from natural molybdenite crystals. The crystal structures are confirmed by HR-TEM measurements. The Raman signatures of different polytypes are investigated by using three different excitation energies that are nonresonant and resonant with A and C excitons, respectively. The low-frequency breathing and shear modes show distinct differences for each polytype, whereas the high-frequency intralayer modes show little difference. For resonant excitations at 1.96 and 2.81 eV, distinct features are observed that enable determination of the stacking order.

  14. Degradation Signatures of Open Ocean Microplastic Debris

    Science.gov (United States)

    Lavender Law, K. L.; Donohue, J. L.; Collins, T.; Proskurowsi, G.; Andrady, A. L.

    2016-02-01

    Microplastics collected from the open ocean offer few clues about their origin and history. There is currently no method to determine how long ocean plastic has undergone environmental weathering, how quickly fragmentation has occurred, or how small microplastic particles will ultimately become before (or if) they are fully degraded by microbial action. In the current absence of results from laboratory and field experiments designed to address these questions, we meticulously examined physical and chemical characteristics of open ocean microplastic particles collected over a 16-year period for clues about their weathering history. More than 1000 microplastic particles collected in the western North Atlantic between 1991 and 2007 were analyzed to determine polymer type, material density, mass and particle size, and were used to create a detailed catalogue of common microscopic surface features likely related to environmental exposure and weathering. Polyethylene and polypropylene, the two buoyant resins most commonly collected at the sea surface, can typically be distinguished by visual microscopy alone, and their particular characteristics lead us to hypothesize that these two resins weaken and fragment in different ways and on different time scales. A subset of resin pellets collected at sea were also analyzed using FTIR-ATR and/or FTIR microscopy for signatures of chemical degradation (e.g., carbonyl index) that are related to physical weathering characteristics such as color, quantified by the yellowness index.

  15. Infrared Signature Masking by Air Plasma Radiation

    Science.gov (United States)

    Kruger, Charles H.; Laux, C. O.

    2001-01-01

    This report summarizes the results obtained during a research program on the infrared radiation of air plasmas conducted in the High Temperature Gasdynamics Laboratory at Stanford University under the direction of Professor Charles H. Kruger, with Dr. Christophe O. Laux as Associate Investigator. The goal of this research was to investigate the masking of infrared signatures by the air plasma formed behind the bow shock of high velocity missiles. To this end, spectral measurements and modeling were made of the radiation emitted between 2.4 and 5.5 micrometers by an atmospheric pressure air plasma in chemical and thermal equilibrium at a temperature of approximately 3000 K. The objective was to examine the spectral emission of air species including nitric oxide, atomic oxygen and nitrogen lines, molecular and atomic continua, as well as secondary species such as water vapor or carbon dioxide. The cold air stream injected in the plasma torch contained approximately 330 parts per million of CO2, which is the natural CO2 concentration in atmospheric air at room temperatures, and a small amount of water vapor with an estimated mole fraction of 3.8x10(exp -4).

  16. Robust signatures of solar neutrino oscillation solutions

    CERN Document Server

    Bahcall, J N; Peña-Garay, C; Bahcall, John N.; Peña-Garay, Carlos

    2002-01-01

    With the goal of identifying signatures that select specific neutrino oscillation parameters, we test the robustness of global oscillation solutions that fit all the available solar and reactor experimental data. We use three global analysis strategies previously applied by different authors and also determine the sensitivity of the oscillation solutions to the critical nuclear fusion cross section, S_{17}(0), for the production of 8B. The neutral current to charged current ratio for SNO is predicted to be 3.5 +- 0.6 (1 sigma) for the favored LMA, LOW, and VAC solutions, which is separated from the no-oscillation value of 1.0 by much more than the expected experimental error. The predicted range of the day-night difference in charged current rates is between 0% and 21% (3 sigma) and is to be strongly correlated with the day-night effect for neutrino-electron scattering. A measurement by SNO of either a NC to CC ratio > 3.3 or a day-night difference > 10%, would favor a small region of the currently allowed LM...

  17. Magnetic signature of surface defects at nanodiamonds

    Energy Technology Data Exchange (ETDEWEB)

    Vollmers, Nora Jenny; Gerstmann, Uwe; Schmidt, Wolf Gero [Theoretische Physik, Universitaet Paderborn (Germany)

    2011-07-01

    The n-type doping of diamond has been a long-standing issue, which recently gained attention in the context of nanodiamonds. Attempts of doping with nitrogen failed to result in the Electron paramagnetic Resonance (EPR) fingerprints expected from bulk material. Instead, the nanodiamond signals show a much larger deviation from the free-electron g-value and are believed to be related to intrinsic, carbon inherited defects. However, the absence of the bulk-like EPR spectra does not mean that nitrogen is not incorporated at all. The N atoms could be built in predominantly at or at least close to the surfaces yielding EPR spectra, very different from those measured in the bulk. In this work, we elucidate the situation by investigating the magnetic signature of paramagnetic defects in the nanodiamonds. We use the gauge-including projector augmented plane wave (GI-PAW) approach to calculate the hyperfine splittings and the elements of the electronic g-tensor. Taking the C(100) surface as a first model system, a possible contribution of nitrogen is discussed by comparing EPR parameters for different N incorporation depths: Incorporated directly at the surface, N gives rise to surface states similar to intrinsic carbon dangling bond-like states. Otherwise N is able to introduce surface conductivity as demonstrated by calculated effective mass tensors.

  18. Protein signature of lung cancer tissues.

    Directory of Open Access Journals (Sweden)

    Michael R Mehan

    Full Text Available Lung cancer remains the most common cause of cancer-related mortality. We applied a highly multiplexed proteomic technology (SOMAscan to compare protein expression signatures of non small-cell lung cancer (NSCLC tissues with healthy adjacent and distant tissues from surgical resections. In this first report of SOMAscan applied to tissues, we highlight 36 proteins that exhibit the largest expression differences between matched tumor and non-tumor tissues. The concentrations of twenty proteins increased and sixteen decreased in tumor tissue, thirteen of which are novel for NSCLC. NSCLC tissue biomarkers identified here overlap with a core set identified in a large serum-based NSCLC study with SOMAscan. We show that large-scale comparative analysis of protein expression can be used to develop novel histochemical probes. As expected, relative differences in protein expression are greater in tissues than in serum. The combined results from tissue and serum present the most extensive view to date of the complex changes in NSCLC protein expression and provide important implications for diagnosis and treatment.

  19. Electronic signatures and their specificity in national and European regulations

    Directory of Open Access Journals (Sweden)

    R. MATEFI

    2017-07-01

    Full Text Available The paper aims to emphasize the particularities of the electronic signature by reference to the national as well as to the European legislation, trying to point out its utility in the business environment as well as the controversies in this matter. The starting point of this analysis was the Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures, which establishes the legal framework for electronic signatures and the recognition of certification-service providers. Its main aim was to ease its use and help it become legally recognized within all EU countries.

  20. An ID-based Blind Signature Scheme from Bilinear Pairings

    OpenAIRE

    B.Umaprasada Rao; K.A.Ajmath

    2010-01-01

    Blind signatures, introduced by Chaum, allow a user to obtain a signature on a message without revealing any thing about the message to the signer. Blind signatures play on important role in plenty of applications such as e-voting, e-cash system where anonymity is of great concern. Identity based(ID-based) public key cryptography can be a good alternative for certified based public key setting, especially when efficient key management and moderate security are required. In this paper, we prop...

  1. Review and Analysis of Cryptographic Schemes Implementing Threshold Signature

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-03-01

    Full Text Available This work is devoted to the study of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, ellipt ic curves and bilinear pairings were investigated. Different methods of generation and verification of threshold signatures were explored, e.g. used in a mobile agents, Internet banking and e-currency. The significance of the work is determined by the reduction of the level of counterfeit electronic documents, signed by certain group of users.

  2. Spectral decomposition of MR spectroscopy signatures with use of eigenanalysis

    International Nuclear Information System (INIS)

    Hearshen, D.O.; Windham, J.P.; Roebuck, J.R.; Helpern, J.A.

    1989-01-01

    Partial-volume contamination and overlapping resonances are common problems in whole-body MR spectroscopy and can affect absolute or relative intensity and chemical-shift measurements. One technique, based on solution of constrained eigenvalue problems, treats spectra as N-dimensional signatures and minimizes contributions of undesired signatures while maximizing contributions of desired signatures in compromised spectra. Computer simulations and both high-resolution (400-MHz) and whole-body (63.8-MHz) phantom studies tested accuracy and reproducibility of spectral decomposition. Results demonstrated excellent decomposition and good reproducibility within certain constraints. The authors conclude that eigenanalysis may improve quantitation of spectra without introducing operator bias

  3. Improvement of a Quantum Proxy Blind Signature Scheme

    Science.gov (United States)

    Zhang, Jia-Lei; Zhang, Jian-Zhong; Xie, Shu-Cui

    2018-06-01

    Improvement of a quantum proxy blind signature scheme is proposed in this paper. Six-qubit entangled state functions as quantum channel. In our scheme, a trust party Trent is introduced so as to avoid David's dishonest behavior. The receiver David verifies the signature with the help of Trent in our scheme. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, delegation, signature and verification. Security analysis proves that our scheme has the properties of undeniability, unforgeability, anonymity and can resist some common attacks.

  4. A secure quantum group signature scheme based on Bell states

    International Nuclear Information System (INIS)

    Zhang Kejia; Song Tingting; Zuo Huijuan; Zhang Weiwei

    2013-01-01

    In this paper, we propose a new secure quantum group signature with Bell states, which may have applications in e-payment system, e-government, e-business, etc. Compared with the recent quantum group signature protocols, our scheme is focused on the most general situation in practice, i.e. only the arbitrator is trusted and no intermediate information needs to be stored in the signing phase to ensure the security. Furthermore, our scheme has achieved all the characteristics of group signature—anonymity, verifiability, traceability, unforgetability and undeniability, by using some current developed quantum and classical technologies. Finally, a feasible security analysis model for quantum group signature is presented. (paper)

  5. Secure Certificateless Signature with Revocation in the Standard Model

    Directory of Open Access Journals (Sweden)

    Tung-Tso Tsai

    2014-01-01

    previously proposed certificateless signature schemes were insecure under a considerably strong security model in the sense that they suffered from outsiders’ key replacement attacks or the attacks from the key generation center (KGC. In this paper, we propose a certificateless signature scheme without random oracles. Moreover, our scheme is secure under the strong security model and provides a public revocation mechanism, called revocable certificateless signature (RCLS. Under the standard computational Diffie-Hellman assumption, we formally demonstrate that our scheme possesses existential unforgeability against adaptive chosen-message attacks.

  6. Environmental measurements and technology for non-proliferation objectives. Final report

    International Nuclear Information System (INIS)

    Broadway, J.A.

    1998-01-01

    The purpose of this study is to identify multi-disciplinary and single focus laboratories from the environmental and public health communities that can serve as technical center of opportunity for nuclear, inorganic and organic analyses. The objectives of the Office of Research and Development effort are twofold: (1) to identify the technology shortcomings and technologies gaps (thus requirements) within these communities that could benefit from state-of-the-art infield analysis technologies currently under development and (2) to promote scientist-to-scientist dialog and technical exchange under such existing US government internship programs (eg SABIT/USDOC) to improve skills and work relationships. Although the data analysis will focus on environmentally sensitive signatures and materials, the office of Research and Development wishes to further its nuclear non-proliferation objectives by assessing the current technical skill and ingenious analytical tools in less-developed countries so as to broaden the base of capability for multi-species measurement technology development

  7. Which future for the nuclear counter-proliferation?; Quel avenir pour la contre-proliferation nucleaire?

    Energy Technology Data Exchange (ETDEWEB)

    Duval, M

    2004-10-01

    After a recall of the permanent data about proliferation and of the safeguards implemented by the international community, the author demonstrates that proliferation has moved towards Asia where a real 'black market' has been created. Then he analyzes the consequences of this change on the future of nuclear deterrent. Finally, he expresses his nostalgia in front of this drift and worries about the future uselessness of the means devoted to this 'pacifying' strategy. (J.S.)

  8. Cell cycle dependent RRM2 may serve as proliferation marker and pharmaceutical target in adrenocortical cancer.

    Science.gov (United States)

    Grolmusz, Vince Kornél; Karászi, Katalin; Micsik, Tamás; Tóth, Eszter Angéla; Mészáros, Katalin; Karvaly, Gellért; Barna, Gábor; Szabó, Péter Márton; Baghy, Kornélia; Matkó, János; Kovalszky, Ilona; Tóth, Miklós; Rácz, Károly; Igaz, Péter; Patócs, Attila

    2016-01-01

    Adrenocortical cancer (ACC) is a rare, but agressive malignancy with poor prognosis. Histopathological diagnosis is challenging and pharmacological options for treatment are limited. By the comparative reanalysis of the transcriptional malignancy signature with the cell cycle dependent transcriptional program of ACC, we aimed to identify novel biomarkers which may be used in the histopathological diagnosis and for the prediction of therapeutical response of ACC. Comparative reanalysis of publicly available microarray datasets included three earlier studies comparing transcriptional differences between ACC and benign adrenocortical adenoma (ACA) and one study presenting the cell cycle dependent gene expressional program of human ACC cell line NCI-H295R. Immunohistochemical analysis was performed on ACC samples. In vitro effects of antineoplastic drugs including gemcitabine, mitotane and 9-cis-retinoic acid alone and in combination were tested in the NCI-H295R adrenocortical cell line. Upon the comparative reanalysis, ribonucleotide reductase subunit 2 (RRM2), responsible for the ribonucleotide dezoxyribonucleotide conversion during the S phase of the cell cycle has been validated as cell cycle dependently expressed. Moreover, its expression was associated with the malignancy signature, as well. Immunohistochemical analysis of RRM2 revealed a strong correlation with Ki67 index in ACC. Among the antiproliferative effects of the investigated compounds, gemcitabine showed a strong inhibition of proliferation and an increase of apoptotic events. Additionally, RRM2 has been upregulated upon gemcitabine treatment. Upon our results, RRM2 might be used as a proliferation marker in ACC. RRM2 upregulation upon gemcitabine treatment might contribute to an emerging chemoresistance against gemcitabine, which is in line with its limited therapeutical efficacy in ACC, and which should be overcome for successful clinical applications.

  9. Quantum blind dual-signature scheme without arbitrator

    International Nuclear Information System (INIS)

    Li, Wei; Shi, Ronghua; Huang, Dazu; Shi, Jinjing; Guo, Ying

    2016-01-01

    Motivated by the elegant features of a bind signature, we suggest the design of a quantum blind dual-signature scheme with three phases, i.e., initial phase, signing phase and verification phase. Different from conventional schemes, legal messages are signed not only by the blind signatory but also by the sender in the signing phase. It does not rely much on an arbitrator in the verification phase as the previous quantum signature schemes usually do. The security is guaranteed by entanglement in quantum information processing. Security analysis demonstrates that the signature can be neither forged nor disavowed by illegal participants or attacker. It provides a potential application for e-commerce or e-payment systems with the current technology. (paper)

  10. Radiation signatures from a locally energized flaring loop

    International Nuclear Information System (INIS)

    Emslie, A.G.; Vlahos, L.; and Institute for Plasma Research, Stanford University)

    1980-01-01

    We calculate the radiation signatures from a locally energized solar flare loop, at a variety of wavelengths. Our calculations depend strongly on the physical properties of the energy release mechanism which we qualitatively discuss

  11. Signature Schemes Secure against Hard-to-Invert Leakage

    DEFF Research Database (Denmark)

    Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus

    2012-01-01

    of the secret key. As a second contribution, we construct a signature scheme that achieves security for random messages assuming that the adversary is given a polynomial-time hard to invert function. Here, polynomial-hardness is required even when given the entire public-key – so called weak auxiliary input......-theoretically reveal the entire secret key. In this work, we propose the first constructions of digital signature schemes that are secure in the auxiliary input model. Our main contribution is a digital signature scheme that is secure against chosen message attacks when given an exponentially hard-to-invert function...... security. We show that such signature schemes readily give us auxiliary input secure identification schemes...

  12. Distinct microbiological signatures associated with triple negative breast cancer.

    Science.gov (United States)

    Banerjee, Sagarika; Wei, Zhi; Tan, Fei; Peck, Kristen N; Shih, Natalie; Feldman, Michael; Rebbeck, Timothy R; Alwine, James C; Robertson, Erle S

    2015-10-15

    Infectious agents are the third highest human cancer risk factor and may have a greater role in the origin and/or progression of cancers, and related pathogenesis. Thus, knowing the specific viruses and microbial agents associated with a cancer type may provide insights into cause, diagnosis and treatment. We utilized a pan-pathogen array technology to identify the microbial signatures associated with triple negative breast cancer (TNBC). This technology detects low copy number and fragmented genomes extracted from formalin-fixed paraffin embedded archival tissues. The results, validated by PCR and sequencing, define a microbial signature present in TNBC tissue which was underrepresented in normal tissue. Hierarchical clustering analysis displayed two broad microbial signatures, one prevalent in bacteria and parasites and one prevalent in viruses. These signatures demonstrate a new paradigm in our understanding of the link between microorganisms and cancer, as causative or commensal in the tumor microenvironment and provide new diagnostic potential.

  13. The curse of namespaces in the domain of XML signature

    DEFF Research Database (Denmark)

    Jensen, Meiko; Liao, Lijun; Schwenk, Jörg

    2009-01-01

    The XML signature wrapping attack is one of the most discussed security issues of the Web Services security community during the last years. Until now, the issue has not been solved, and all countermeasure approaches proposed so far were shown to be insufficient. In this paper, we present yet...... another way to perform signature wrapping attacks by using the XML namespace injection technique. We show that the interplay of XML Signature, XPath, and the XML namespace concept has severe flaws that can be exploited for an attack, and that XML namespaces in general pose real troubles to digital...... signatures in the XML domain. Additionally, we present and discuss some new approaches in countering the proposed attack vector....

  14. Methyl-CpG island-associated genome signature tags

    Science.gov (United States)

    Dunn, John J

    2014-05-20

    Disclosed is a method for analyzing the organismic complexity of a sample through analysis of the nucleic acid in the sample. In the disclosed method, through a series of steps, including digestion with a type II restriction enzyme, ligation of capture adapters and linkers and digestion with a type IIS restriction enzyme, genome signature tags are produced. The sequences of a statistically significant number of the signature tags are determined and the sequences are used to identify and quantify the organisms in the sample. Various embodiments of the invention described herein include methods for using single point genome signature tags to analyze the related families present in a sample, methods for analyzing sequences associated with hyper- and hypo-methylated CpG islands, methods for visualizing organismic complexity change in a sampling location over time and methods for generating the genome signature tag profile of a sample of fragmented DNA.

  15. The 82-plex plasma protein signature that predicts increasing inflammation

    DEFF Research Database (Denmark)

    Tepel, Martin; Beck, Hans C; Tan, Qihua

    2015-01-01

    The objective of the study was to define the specific plasma protein signature that predicts the increase of the inflammation marker C-reactive protein from index day to next-day using proteome analysis and novel bioinformatics tools. We performed a prospective study of 91 incident kidney....... The prediction model selected and validated 82 plasma proteins which determined increased next-day C-reactive protein (area under receiver-operator-characteristics curve, 0.772; 95% confidence interval, 0.669 to 0.876; P signature (P ....001) was associated with observed increased next-day C-reactive protein. The 82-plex protein signature outperformed routine clinical procedures. The category-free net reclassification index improved with 82-plex plasma protein signature (total net reclassification index, 88.3%). Using the 82-plex plasma protein...

  16. Quantum blind dual-signature scheme without arbitrator

    Science.gov (United States)

    Li, Wei; Shi, Ronghua; Huang, Dazu; Shi, Jinjing; Guo, Ying

    2016-03-01

    Motivated by the elegant features of a bind signature, we suggest the design of a quantum blind dual-signature scheme with three phases, i.e., initial phase, signing phase and verification phase. Different from conventional schemes, legal messages are signed not only by the blind signatory but also by the sender in the signing phase. It does not rely much on an arbitrator in the verification phase as the previous quantum signature schemes usually do. The security is guaranteed by entanglement in quantum information processing. Security analysis demonstrates that the signature can be neither forged nor disavowed by illegal participants or attacker. It provides a potential application for e-commerce or e-payment systems with the current technology.

  17. Signature of a Collaboration agreement between Unitar & CERN.

    CERN Multimedia

    Pierre Gildemyn

    2012-01-01

    Signature of agreement with Mr Carlos Lopes (UNITAR) and Prof Rolf Heuer (CERN). From left to right : Einar Bjorgo, Francesco Pisano, Calors Lopes, Rolf Heuer, Maurizio Bona, Frédéric Hemmer, Olivier Van Damme

  18. Fault Management: Degradation Signature Detection, Modeling, and Processing, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Fault to Failure Progression (FFP) signature modeling and processing is a new method for applying condition-based signal data to detect degradation, to identify...

  19. eμ signal as heavy lepton signature at PEP

    International Nuclear Information System (INIS)

    Smith, J.

    1978-01-01

    A planned experiment to detect heavy leptons is described including the signature, cross sections, cuts to reduce the two-photon background to a tolerable level, and the computer program. The expected luminosity is also noted

  20. Fiddling with the ECT act – Electronic signatures | Eiselen ...

    African Journals Online (AJOL)

    Potchefstroom Electronic Law Journal/Potchefstroomse Elektroniese Regsblad ... is considering is an amendment of the definition of "electronic signature". ... of the UNCITRAL Model Laws on eCommerce and the 2005 UN Convention on the ...

  1. A novel quantum group signature scheme without using entangled states

    Science.gov (United States)

    Xu, Guang-Bao; Zhang, Ke-Jia

    2015-07-01

    In this paper, we propose a novel quantum group signature scheme. It can make the signer sign a message on behalf of the group without the help of group manager (the arbitrator), which is different from the previous schemes. In addition, a signature can be verified again when its signer disavows she has ever generated it. We analyze the validity and the security of the proposed signature scheme. Moreover, we discuss the advantages and the disadvantages of the new scheme and the existing ones. The results show that our scheme satisfies all the characteristics of a group signature and has more advantages than the previous ones. Like its classic counterpart, our scheme can be used in many application scenarios, such as e-government and e-business.

  2. A Secure and Efficient Certificateless Short Signature Scheme

    Directory of Open Access Journals (Sweden)

    Lin Cheng

    2013-07-01

    Full Text Available Certificateless public key cryptography combines advantage of traditional public key cryptography and identity-based public key cryptography as it avoids usage of certificates and resolves the key escrow problem. In 2007, Huang et al. classified adversaries against certificateless signatures according to their attack power into normal, strong and super adversaries (ordered by their attack power. In this paper, we propose a new certificateless short signature scheme and prove that it is secure against both of the super type I and the super type II adversaries. Our new scheme not only achieves the strongest security level but also has the shortest signature length (one group element. Compared with the other short certificateless signature schemes which have a similar security level, our new scheme has less operation cost.

  3. New signatures of flavor violating Higgs couplings

    Energy Technology Data Exchange (ETDEWEB)

    Buschmann, Malte; Kopp, Joachim; Liu, Jia; Wang, Xiao-Ping [PRISMA Cluster of Excellence and Mainz Institute for Theoretical Physics,Johannes Gutenberg University, 55099 Mainz (Germany)

    2016-06-24

    We explore several novel LHC signatures arising from quark or lepton flavor violating couplings in the Higgs sector, and we constrain such couplings using LHC data. Since the largest signals are possible in channels involving top quarks or tau leptons, we consider in particular the following flavor violating processes: (1) pp→thh (top plus di-Higgs final state) arising from a dimension six coupling of up-type quarks to three insertions of the Higgs field. We develop a search strategy for this final state and demonstrate that detection is possible at the high luminosity LHC if flavor violating top-up-Higgs couplings are not too far below the current limit. (2) pp→tH{sup 0}, where H{sup 0} is the heavy neutral CP-even Higgs boson in a two Higgs doublet model (2HDM). We consider the decay channels H{sup 0}→tu,WW,ZZ,hh and use existing LHC data to constrain the first three of them. For the fourth, we adapt our search for the thh final state, and we demonstrate that in large regions of the parameter space, it is superior to other searches, including searches for flavor violating top quark decays (t→hq). (3) H{sup 0}→τμ, again in the context of a 2HDM. This channel is particularly well motivated by the recent CMS excess in h→τμ, and we use the data from this search to constrain the properties of H{sup 0}.

  4. GRAVITATIONAL WAVE SIGNATURES OF HYPERACCRETING COLLAPSAR DISKS

    International Nuclear Information System (INIS)

    Kotake, Kei; Takiwaki, Tomoya; Harikae, Seiji

    2012-01-01

    By performing two-dimensional special relativistic (SR) magnetohydrodynamic simulations, we study possible signatures of gravitational waves (GWs) in the context of the collapsar model for long-duration gamma-ray bursts. In our SR simulations, the central black hole is treated as an absorbing boundary. By doing so, we focus on the GWs generated by asphericities in neutrino emission and matter motions in the vicinity of the hyperaccreting disks. We compute nine models by adding initial angular momenta and magnetic fields parametrically to a precollapse core of a 35 M ☉ progenitor star. As for the microphysics, a realistic equation of state is employed and the neutrino cooling is taken into account via a multi-flavor neutrino leakage scheme. To accurately estimate GWs produced by anisotropic neutrino emission, we perform a ray-tracing analysis in general relativity by a post-processing procedure. By employing a stress formula that includes contributions from both magnetic fields and SR corrections, we also study the effects of magnetic fields on the gravitational waveforms. We find that the GW amplitudes from anisotropic neutrino emission show a monotonic increase with time, whose amplitudes are much larger than those from matter motions of the accreting material. We show that the increasing trend of the neutrino GWs stems from the excess of neutrino emission in the direction near parallel to the spin axis illuminated from the hyperaccreting disks. We point out that a recently proposed future space-based interferometer like Fabry-Perot-type DECIGO would permit the detection of these GW signals within ≈100 Mpc.

  5. Modeling Profiles and Signatures of Enrichments

    Science.gov (United States)

    Ali, A.; Qualls, C.; Lucas, S. G.; Lombari, G.; Appenzeller, O.

    2014-12-01

    Anthropogenic and geochemical enrichment of soils and living matter have been well documented 1, 2, 3.Here we report on geochemical, anthropogenic and biological enrichments with heavy metals in Modern Peru and compared this to Modern and ancient data from New Mexico, USA. We established a signature derived from the quantities of 25 metals in various biological, fossil and soil materials. We also speculate that human adaptation to mercury toxicity may occur in remarkably short time spans during the Holocene. We found mercury concentrations in Modern pigeon feathers and llama wool from free foraging birds and animals in Albuquerque, NM, ranging from 0.006 to 0.019 mg/Kg of tissue. The values for Modern Peru ranged from 22.0 to 556 mg/Kg for the same tissues. We discovered, in 64 million-year-old fossilized plants from New Mexico (Paleocene Nacimiento Formation, San Juan Basin), a mercury concentration of 1.11 mg/Kg of fossil, whereas Modern plant material from the Rio Grande Basin in New Mexico contained no mercury. Profiling of metal content of these samples suggests that mercury is a proxy for anthropogenic rather than geochemical enrichment in the localities we examined. We found no overt signs of mercury toxicity in contemporaneous inhabitants of Huancavelica4, Peru; one of the ten most mercury-polluted places in the world and the mercury concentration in their hair is well below modern admissible levels. However, assessment of their annual scalp hair growth-rate showed marked reduction in growth (~ 5cm/yr) versus ~ 16cm/year for normal scalp hair from other continents4. This is consistent with a toxic effect of heavy metals on human metabolism and especially autonomic nervous system function in Huancavelica, Peru. Contemporaneous anthropogenic activities are known to increase heavy metal content in the biosphere with potentially toxic effects on humans. However, signs of human evolutionary adaptation to such toxins might already be evident in Peru4.

  6. Magnetotail processes and their ionospheric signatures

    Science.gov (United States)

    Ferdousi, B.; Raeder, J.; Zesta, E.; Murphy, K. R.; Cramer, W. D.

    2017-12-01

    In-situ observations in the magnetotail are sparse and limited to single point measurements. In the ionosphere, on the other hand, there is a broad range of observations, including magnetometers, auroral imagers, and various radars. Since the ionosphere is to some extent a mirror of plasmasheet processes it can be used as a monitor of magnetotail dynamics. Thus, it is of great importance to understand the coupling between the ionosphere and the magnetosphere in order to properly interpret the ionosphere and ground observations in terms of magnetotail dynamics. For this purpose, the global magnetohydrodynamic model OpenGGCM is used to investigate magnetosphere-ionosphere coupling. One of the key processes in magnetotail dynamics are bursty bulk flows (BBFs) which are the major means by which momentum and energy get transferred through the magnetotail and down to the ionosphere. BBFs often manifested in the ionosphere as auroral streamers. This study focuses on mapping such flow bursts from the magnetotail to the ionosphere along the magnetic field lines for three states of the magnetotail: pre-substorm onset through substorm expansion and during steady magnetospheric convection (SMC) following the substorm. We find that the orientation of streamers in the ionosphere differes for different local times, and that, for both tail and ionospheric signatures, activity increases during the SCM configutation compared to the pre-onset and quiet times. We also find that the background convection in the tail impacts the direction and deflection of the BBFs and the subsequent orientation of the auroral streamers in the ionosphere.

  7. Mapping the space of genomic signatures.

    Directory of Open Access Journals (Sweden)

    Lila Kari

    Full Text Available We propose a computational method to measure and visualize interrelationships among any number of DNA sequences allowing, for example, the examination of hundreds or thousands of complete mitochondrial genomes. An "image distance" is computed for each pair of graphical representations of DNA sequences, and the distances are visualized as a Molecular Distance Map: Each point on the map represents a DNA sequence, and the spatial proximity between any two points reflects the degree of structural similarity between the corresponding sequences. The graphical representation of DNA sequences utilized, Chaos Game Representation (CGR, is genome- and species-specific and can thus act as a genomic signature. Consequently, Molecular Distance Maps could inform species identification, taxonomic classifications and, to a certain extent, evolutionary history. The image distance employed, Structural Dissimilarity Index (DSSIM, implicitly compares the occurrences of oligomers of length up to k (herein k = 9 in DNA sequences. We computed DSSIM distances for more than 5 million pairs of complete mitochondrial genomes, and used Multi-Dimensional Scaling (MDS to obtain Molecular Distance Maps that visually display the sequence relatedness in various subsets, at different taxonomic levels. This general-purpose method does not require DNA sequence alignment and can thus be used to compare similar or vastly different DNA sequences, genomic or computer-generated, of the same or different lengths. We illustrate potential uses of this approach by applying it to several taxonomic subsets: phylum Vertebrata, (superkingdom Protista, classes Amphibia-Insecta-Mammalia, class Amphibia, and order Primates. This analysis of an extensive dataset confirms that the oligomer composition of full mtDNA sequences can be a source of taxonomic information. This method also correctly finds the mtDNA sequences most closely related to that of the anatomically modern human (the Neanderthal

  8. Integrative Metabolic Signatures for Hepatic Radiation Injury.

    Directory of Open Access Journals (Sweden)

    Irwin Jack Kurland

    Full Text Available Radiation-induced liver disease (RILD is a dose-limiting factor in curative radiation therapy (RT for liver cancers, making early detection of radiation-associated liver injury absolutely essential for medical intervention. A metabolomic approach was used to determine metabolic signatures that could serve as biomarkers for early detection of RILD in mice.Anesthetized C57BL/6 mice received 0, 10 or 50 Gy Whole Liver Irradiation (WLI and were contrasted to mice, which received 10 Gy whole body irradiation (WBI. Liver and plasma samples were collected at 24 hours after irradiation. The samples were processed using Gas Chromatography/Mass Spectrometry and Liquid Chromatography/Mass Spectrometry.Twenty four hours after WLI, 407 metabolites were detected in liver samples while 347 metabolites were detected in plasma. Plasma metabolites associated with 50 Gy WLI included several amino acids, purine and pyrimidine metabolites, microbial metabolites, and most prominently bradykinin and 3-indoxyl-sulfate. Liver metabolites associated with 50 Gy WLI included pentose phosphate, purine, and pyrimidine metabolites in liver. Plasma biomarkers in common between WLI and WBI were enriched in microbial metabolites such as 3 indoxyl sulfate, indole-3-lactic acid, phenyllactic acid, pipecolic acid, hippuric acid, and markers of DNA damage such as 2-deoxyuridine. Metabolites associated with tryptophan and indoles may reflect radiation-induced gut microbiome effects. Predominant liver biomarkers in common between WBI and WLI were amino acids, sugars, TCA metabolites (fumarate, fatty acids (lineolate, n-hexadecanoic acid and DNA damage markers (uridine.We identified a set of metabolomic markers that may prove useful as plasma biomarkers of RILD and WBI. Pathway analysis also suggested that the unique metabolic changes observed after liver irradiation was an integrative response of the intestine, liver and kidney.

  9. Signatures derived from increase in SHARPIN gene copy number are associated with poor prognosis in patients with breast cancer

    Directory of Open Access Journals (Sweden)

    Diane Ojo

    2017-12-01

    Full Text Available We report three signatures produced from SHARPIN gene copy number increase (GCN-Increase and their effects on patients with breast cancer (BC. In the Metabric dataset (n = 2059, cBioPortal, SHARPIN GCN-Increase occurs preferentially or mutual exclusively with mutations in TP53, PIK3CA, and CDH1. These genomic alterations constitute a signature (SigMut that significantly correlates with reductions in overall survival (OS in BC patients (n = 1980; p = 1.081e−6. Additionally, SHARPIN GCN-Increase is associated with 4220 differentially expressed genes (DEGs. These DEGs are enriched in activation of the pathways regulating cell cycle progression, RNA transport, ribosome biosynthesis, DNA replication, and in downregulation of the pathways related to extracellular matrix. These DEGs are thus likely to facilitate the proliferation and metastasis of BC cells. Additionally, through forward (FWD and backward (BWD stepwise variate selections among the top 160 downregulated and top 200 upregulated DEGs using the Cox regression model, a 6-gene (SigFWD and a 50-gene (SigBWD signature were derived. Both signatures robustly associate with decreases in OS in BC patients within the Curtis (n = 1980; p = 6.16e−11 for SigFWD; p = 1.06e−10, for SigBWD and TCGA cohort (n = 817; p = 4.53e−4 for SigFWD and p = 0.00525 for SigBWD. After adjusting for known clinical factors, SigMut (HR 1.21, p = 0.0297, SigBWD (HR 1.25, p = 0.0263, and likely SigFWD (HR 1.17, p = 0.062 remain independent risk factors of BC deaths. Furthermore, the proportion of patients positive for these signatures is significantly increased in ER−, Her2-enriched, basal-like, and claudin-low BCs compared to ER+ and luminal BCs. Collectively, these SHARPIN GCN-Increase-derived signatures may have clinical applications in management of patients with BC.

  10. Littoral Assessment of Mine Burial Signatures (LAMBS) buried land mine/background spectral signature analyses

    Science.gov (United States)

    Kenton, A.C.; Geci, D.M.; Ray, K.J.; Thomas, C.M.; Salisbury, J.W.; Mars, J.C.; Crowley, J.K.; Witherspoon, N.H.; Holloway, J.H.; Harmon R.S.Broach J.T.Holloway, Jr. J.H.

    2004-01-01

    The objective of the Office of Naval Research (ONR) Rapid Overt Reconnaissance (ROR) program and the Airborne Littoral Reconnaissance Technologies (ALRT) project's LAMBS effort is to determine if electro-optical spectral discriminants exist that are useful for the detection of land mines in littoral regions. Statistically significant buried mine overburden and background signature data were collected over a wide spectral range (0.35 to 14 ??m) to identify robust spectral features that might serve as discriminants for new airborne sensor concepts. LAMBS has expanded previously collected databases to littoral areas - primarily dry and wet sandy soils - where tidal, surf, and wind conditions can severely modify spectral signatures. At AeroSense 2003, we reported completion of three buried mine collections at an inland bay, Atlantic and Gulf of Mexico beach sites.1 We now report LAMBS spectral database analyses results using metrics which characterize the detection performance of general types of spectral detection algorithms. These metrics include mean contrast, spectral signal-to-clutter, covariance, information content, and spectral matched filter analyses. Detection performance of the buried land mines was analyzed with regard to burial age, background type, and environmental conditions. These analyses considered features observed due to particle size differences, surface roughness, surface moisture, and compositional differences.

  11. Cell proliferation and ageing in mouse colon

    International Nuclear Information System (INIS)

    Hamilton, E.; Franks, L.M.

    1980-01-01

    Cell kinetic parameters in the descending colon of unirradiated mice, 3-30-months-old were compared with those in mice irradiated repeatedly from the age of 6 or 24 months. The latter animals were given 1250 rad local X-irradiation to the colon every 6 weeks. Dose-survival curves showed the colon crypts of 6 and 24-months-old mice were similarly radiosensitive. In unirradiated mice the number of crypts per colon section decreased significantly at 30 months, but no significant age-related changes were seen in crypt size or labelling index (LI). Cell proliferation returned to control levels within 6 weeks of each X-ray dose and remained at this level for 20 weeks after the final dose. Later, cell proliferation in the irradiated colon fell significantly below control. A total of 6 or 7 doses each of 1250 rad produced only 1 colon carcinoma amongst 50 mice kept until they died. (author)

  12. Ki67 and proliferation in breast cancer.

    Science.gov (United States)

    Pathmanathan, Nirmala; Balleine, Rosemary L

    2013-06-01

    New approaches to the prognostic assessment of breast cancer have come from molecular profiling studies. A major feature of this work has been to emphasise the importance of cancer cell proliferation as a key discriminative indicator of recurrence risk for oestrogen receptor positive breast cancer in particular. Mitotic count scoring, as a component of histopathological grade, has long formed part of a routine evaluation of breast cancer biology. However, there is an increasingly compelling case to include a specific proliferation score in breast cancer pathology reports based on expression of the cell cycle regulated protein Ki67. Immunohistochemical staining for Ki67 is a widely available and economical test with good tolerance of pre-analytical variations and staining conditions. However, there is currently no evidence based protocol established to derive a reliable and informative Ki67 score for routine clinical use. In this circumstance, pathologists must establish a standardised framework for scoring Ki67 and communicating results to a multidisciplinary team.

  13. Wp specific methylation of highly proliferated LCLs

    International Nuclear Information System (INIS)

    Park, Jung-Hoon; Jeon, Jae-Pil; Shim, Sung-Mi; Nam, Hye-Young; Kim, Joon-Woo; Han, Bok-Ghee; Lee, Suman

    2007-01-01

    The epigenetic regulation of viral genes may be important for the life cycle of EBV. We determined the methylation status of three viral promoters (Wp, Cp, Qp) from EBV B-lymphoblastoid cell lines (LCLs) by pyrosequencing. Our pyrosequencing data showed that the CpG region of Wp was methylated, but the others were not. Interestingly, Wp methylation was increased with proliferation of LCLs. Wp methylation was as high as 74.9% in late-passage LCLs, but 25.6% in early-passage LCLs. From two Burkitt's lymphoma cell lines, Wp specific hypermethylation was also found (>80%). Interestingly, the expression of EBNA2 gene which located directly next to Wp was associated with its methylation. Our data suggested that Wp specific methylation may be important for the indicator of the proliferation status of LCLs, and the epigenetic viral gene regulation of EBNA2 gene by Wp should be further defined possibly with other biological processes

  14. HTGR strategy for reduced proliferation potential

    International Nuclear Information System (INIS)

    Stewart, H.B.; Dahlberg, R.C.

    1978-01-01

    The HTGR stratregy for reduced proliferation potential is one aspect of a potential broader nuclear strategy aimed primarily toward a transition nuclear period between today's uranium-consumption reactors and the long-range balanced system of breeder and advanced near-breeder reactors. In particular, the normal commerce of U-233 could be made acceptable by: (a) dependence on the gamma radiation from U-232 daughter products, (b) enhancement of that radioactivity by incomplete fission-product decontamination of the bred-fuel, or (c) denaturing of the U-233 with U-238. These approaches would, of course, supplement institutional initiatives to improve proliferation resistance such as the collocation of facilities and the establishment of secure energy centers. 6 refs

  15. Nerves Regulate Cardiomyocyte Proliferation and Heart Regeneration.

    Science.gov (United States)

    Mahmoud, Ahmed I; O'Meara, Caitlin C; Gemberling, Matthew; Zhao, Long; Bryant, Donald M; Zheng, Ruimao; Gannon, Joseph B; Cai, Lei; Choi, Wen-Yee; Egnaczyk, Gregory F; Burns, Caroline E; Burns, C Geoffrey; MacRae, Calum A; Poss, Kenneth D; Lee, Richard T

    2015-08-24

    Some organisms, such as adult zebrafish and newborn mice, have the capacity to regenerate heart tissue following injury. Unraveling the mechanisms of heart regeneration is fundamental to understanding why regeneration fails in adult humans. Numerous studies have revealed that nerves are crucial for organ regeneration, thus we aimed to determine whether nerves guide heart regeneration. Here, we show using transgenic zebrafish that inhibition of cardiac innervation leads to reduction of myocyte proliferation following injury. Specifically, pharmacological inhibition of cholinergic nerve function reduces cardiomyocyte proliferation in the injured hearts of both zebrafish and neonatal mice. Direct mechanical denervation impairs heart regeneration in neonatal mice, which was rescued by the administration of neuregulin 1 (NRG1) and nerve growth factor (NGF) recombinant proteins. Transcriptional analysis of mechanically denervated hearts revealed a blunted inflammatory and immune response following injury. These findings demonstrate that nerve function is required for both zebrafish and mouse heart regeneration. Copyright © 2015 Elsevier Inc. All rights reserved.

  16. Risk assessment of alternative proliferation routes

    International Nuclear Information System (INIS)

    Ahmed, S.; Husseiny, A.A.

    1982-01-01

    Multi-Attribute Decision Theory is applied to rank II alternative routes to nuclear proliferation in order of difficulty in acquiring nuclear weapons by nonnuclear countries. The method is based on reducing the various variables affecting the decision to a single function providing a measure for the proliferation route. The results indicate that the most difficult route to obtain atomic weapons is through nuclear power reactors, specifically the liquid-metal fast breeder reactor, heavy water Canada deuterium uranium reactor, and light water reactors such as boiling water and pressurized water reactors. The easiest routes are supercritical centrifuge isotope separation, laser isotope separation, and research reactor. However, nonnuclear routes available that result in substantial damage to life and property are easier than any nuclear route

  17. Uncertainty in hydrological signatures for gauged and ungauged catchments

    Science.gov (United States)

    Westerberg, Ida K.; Wagener, Thorsten; Coxon, Gemma; McMillan, Hilary K.; Castellarin, Attilio; Montanari, Alberto; Freer, Jim

    2016-03-01

    Reliable information about hydrological behavior is needed for water-resource management and scientific investigations. Hydrological signatures quantify catchment behavior as index values, and can be predicted for ungauged catchments using a regionalization procedure. The prediction reliability is affected by data uncertainties for the gauged catchments used in prediction and by uncertainties in the regionalization procedure. We quantified signature uncertainty stemming from discharge data uncertainty for 43 UK catchments and propagated these uncertainties in signature regionalization, while accounting for regionalization uncertainty with a weighted-pooling-group approach. Discharge uncertainty was estimated using Monte Carlo sampling of multiple feasible rating curves. For each sampled rating curve, a discharge time series was calculated and used in deriving the gauged signature uncertainty distribution. We found that the gauged uncertainty varied with signature type, local measurement conditions and catchment behavior, with the highest uncertainties (median relative uncertainty ±30-40% across all catchments) for signatures measuring high- and low-flow magnitude and dynamics. Our regionalization method allowed assessing the role and relative magnitudes of the gauged and regionalized uncertainty sources in shaping the signature uncertainty distributions predicted for catchments treated as ungauged. We found that (1) if the gauged uncertainties were neglected there was a clear risk of overconditioning the regionalization inference, e.g., by attributing catchment differences resulting from gauged uncertainty to differences in catchment behavior, and (2) uncertainty in the regionalization results was lower for signatures measuring flow distribution (e.g., mean flow) than flow dynamics (e.g., autocorrelation), and for average flows (and then high flows) compared to low flows.

  18. Anogenital distance as a phenotypic signature through infancy

    DEFF Research Database (Denmark)

    Priskorn, Lærke; Petersen, Jørgen H; Jørgensen, Niels

    2018-01-01

    BACKGROUND: Anogenital distance (AGD) has been suggested to represent a phenotypic signature reflecting in utero androgen action. However, it is not known whether an individual's AGD at birth correlates to AGD later in life. We investigate correlations of AGD between 3 and 18 months and asses rep......-up through childhood and puberty will reveal whether AGD represents a phenotypic signature throughout life.Pediatric Research accepted article preview online, 20 November 2017. doi:10.1038/pr.2017.287....

  19. Signatures for isoscalar spin transitions excited in (d, d,) reactions

    International Nuclear Information System (INIS)

    Morlet, M.; Willis, A.; Van de Wiele, J.; Marty, N.; Guillot, J.; Langevin-Joliot, H.; Bimbot, L.; Rosier, L.; Djalali, C.; Duchazeaubeneix, J.C.

    1990-01-01

    Three different signatures for isoscalar spin transitions in nuclei have been tested in the 12 C(d, d , ) 12 C reaction at 400 MeV. These signatures have values of close to zero for the natural parity states, and values ranging from 0.22 to 0.50 for the ΔS=1 ΔT=0, 12.7 MeV state

  20. Epigenetic signature of birth weight discordance in adult twins

    DEFF Research Database (Denmark)

    Tan, Qihua; Nielsen, Morten Frost Munk; Heijmans, Bastiaan T

    2014-01-01

    between birth weight and adult life health while controlling for not only genetics but also postnatal rearing environment. We performed an epigenome-wide profiling on blood samples from 150 pairs of adult monozygotic twins discordant for birth weight to look for molecular evidence of epigenetic signatures...... profiling did not reveal epigenetic signatures of birth weight discordance although some sites displayed age-dependent intra-pair differential methylation in the extremely discordant twin pairs....

  1. Neural Signatures of Trust During Human-Automation Interactions

    Science.gov (United States)

    2016-04-01

    also automated devices such as a Global Positioning System. For instance, to provide advanced safety measures, the Transportation Safety...AFRL-AFOSR-VA-TR-2016-0160 Neural Signatures of Trust during Human- Automation Interactions Frank Krueger GEORGE MASON UNIVERSITY Final Report 04/01...SUBTITLE Neural Signatures of Trust during Human- Automation Interactions 5a. CONTRACT NUMBER FA9550-13-1-0017 5b. GRANT NUMBER 5c. PROGRAM ELEMENT

  2. IAEA safeguards and non-proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Harry, R J.S.

    1995-02-01

    An overview is given of efforts to contain the nuclear weapons proliferation during half a century of man-controlled nuclear fission. An initial policy of denial did not work, a following period of cooperation needed a gradual strengthening of international assurances on the peaceful character of the flourishing use of nuclear techniques for power generation and of other applications. The focus of the nuclear weapon proliferation concern changed from the highly developed states to developing states. The Non-Proliferation Treaty laid the basis for a unique system of voluntarily accepted international inspections to verify the peaceful use of nuclear energy. The IAEA got the task to implement this `Full Scope Safeguards` on all nuclear material and all nuclear activities in the non-nuclear weapon states. Thanks to the structure of the IAEA, in which both proponent and states with a critical attitude take part in the decision making process on the IAEA execution of its tasks, a balanced, and widely acceptable system emerged. International developments necessitated additional improvements of the non-proliferation system. The increase of strength of sub-national groups triggered international cooperation on physical protection, about a quarter of a century ago. More recently, it appeared that NPT states with assumed nuclear weapon ambitions operated in the margins between the interpretation of IAEA safeguards and the spirit and purpose of NPT. Improvements of the IAEA safeguards and a stronger cooperation between states, including the constraints which exporting states have imposed on nuclear supplies, strengthen the safeguards system. The important reductions in the two largest nuclear weapon arsenals lead, together with the delay in the fast breeder implementation, to large stockpiles of nuclear weapon usable materials. Also in this areas new internationally credible assurances have to be obtained, that these materials will never return to nuclear weapon applications.

  3. Non-proliferation efforts in South Asia

    International Nuclear Information System (INIS)

    Chellaney, B.

    1994-01-01

    Southern Asia is one of the most volatile regions in the world because of inter-State and intra-State conflicts. Security in the region highly depends on the rival capabilities of the involved states, Pakistan, India, China. Increased Confidence building and nuclear transparency are becoming more significant issues in attaining stability in the region, although non-proliferation efforts in this region have attained little headway

  4. IAEA safeguards and non-proliferation

    International Nuclear Information System (INIS)

    Harry, R.J.S.

    1995-02-01

    An overview is given of the efforts to contain the nuclear weapons proliferation during half a century of man-controlled nuclear fission. An initial policy of denial did not work, a following period of cooperation needed a gradual strengthening of international assurances on the exclusively peaceful character of the flourishing use of nuclear techniques for power generation and of other applications. The focus of the nuclear weapon proliferation concern changed from the highly developed states to developing states. The Non-Proliferation Treaty laid the basis for a unique system of voluntarily accepted international inspections to verify the peaceful use of nuclear energy. The IAEA got the task to implement this 'Full Scope Safeguards' on all nuclear material and all nuclear activities in the non-nuclear weapon states. Thanks to the structure of the IAEA, in which both proponent and states with a critical attitude take part in the decision making process on the IAEA execution of its tasks, a balanced, and widely acceptable system emerged. International developments necessitated additional improvements of the non-proliferation system. The increase of strength of sub-national groups triggered international cooperation on physical protection, about a quarter of a century ago. More recently, it appeared that NPT states with assumed nuclear weapon ambitions operated in the margins between the interpretation of IAEA safeguards and the spirit and purpose of NPT. Improvements of the IAEA safeguards and a stronger cooperation between states, including the constraints which exporting states have imposed on nuclear supplies, strengthen the safeguards system. The important reductions in the two largest nuclear weapon arsenals lead, together with the delay in the fast breeder implementation, to large stockpiles of nuclear weapon usable materials. Also in this areas new internationally credible assurances have to be obtained, that these materials will never return to nuclear

  5. Note: How Does Product Proliferation Affect Responsiveness?

    OpenAIRE

    Diwakar Gupta; Mandyam M. Srinivasan

    1998-01-01

    In this note we consider some strategies that a manufacturing firm may use to deal with an increase in the variety of products it offers. We indicate how alternate strategies for dealing with product proliferation impact the firm's responsiveness, measured in terms of average production lead time and average work-in-process inventory. Focusing on the make-to-order environment and using queueing models, we derive conditions under which an increase in product variety can improve both individual...

  6. Security Guarantees and Nuclear Non-Proliferation

    International Nuclear Information System (INIS)

    Bruno Tertrais

    2011-01-01

    The purpose of this paper is to discuss the value of 'security guarantees', that is, positive security assurances that include a formal or informal defense commitment, in preventing nuclear proliferation. It demonstrates that such guarantees have proven to be a very effective instrument in preventing States from going nuclear. It would thus seem logical to reinforce or extend them. However, this path is fraught with obstacles and dilemmas

  7. Security Guarantees and Nuclear Non-Proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Bruno Tertrais

    2011-07-01

    The purpose of this paper is to discuss the value of 'security guarantees', that is, positive security assurances that include a formal or informal defense commitment, in preventing nuclear proliferation. It demonstrates that such guarantees have proven to be a very effective instrument in preventing States from going nuclear. It would thus seem logical to reinforce or extend them. However, this path is fraught with obstacles and dilemmas

  8. Plutonium Proliferation: The Achilles Heel of Disarmament

    International Nuclear Information System (INIS)

    Leventhal, Paul

    2001-01-01

    Plutonium is a byproduct of nuclear fission, and it is produced at the rate of about 70 metric tons a year in the world's nuclear power reactors. Concerns about civilian plutonium ran high in the 1970s and prompted enactment of the Nuclear Non-Proliferation Act of 1978 to give the United States a veto over separating plutonium from U.S.-supplied uranium fuel. Over the years, however, so-called reactor-grade plutonium has become the orphan issue of nuclear non-proliferation, largely as a consequence of pressures from plutonium-separating countries. The demise of the fast breeder reactor and the reluctance of utilities to introduce plutonium fuel in light-water reactors have resulted in large surpluses of civilian, weapons-usable plutonium, which now approach in size the 250 tons of military plutonium in the world. Yet reprocessing of spent fuel for recovery and use of plutonium proceeds apace outside the United States and threatens to overwhelm safeguards and security measures for keeping this material out of the hands of nations and terrorists for weapons. A number of historical and current developments are reviewed to demonstrate that plutonium commerce is undercutting efforts both to stop the spread of nuclear weapons and to work toward eliminating existing nuclear arsenals. These developments include the breakdown of U.S. anti-plutonium policy, the production of nuclear weapons by India with Atoms-for-Peace plutonium, the U.S.-Russian plan to introduce excess military plutonium as fuel in civilian power reactors, the failure to include civilian plutonium and bomb-grade uranium in the proposed Fissile Material Cutoff Treaty, and the perception of emerging proliferation threats as the rationale for development of a ballistic missile defense system. Finally, immobilization of separated plutonium in high-level waste is explored as a proliferation-resistant and disarmament-friendly solution for eliminating excess stocks of civilian and military plutonium.

  9. Director`s series on proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Bailey, K.C.; Price, M.E. [eds.

    1994-10-17

    This series is an occasional publication of essays on the topics of nuclear, chemical, biological, and missile proliferation. Essays contained in this document include: Key issues on NPT renewal and extension, Africa and nuclear nonproliferation, Kenya`s views on the NPT, Prospects for establishing a zone free of weapons of mass destruction in the middle east, effects of a special nuclear weapon materials cut-off convention, and The UK view of NPT renewal.

  10. Proliferation resistance assessment of nuclear systems

    International Nuclear Information System (INIS)

    1978-09-01

    The paper focuses on examining the degree to which nuclear systems could be used to acquire nuclear weapons material. It establishes a framework for proliferation resistance assessment and illustrates its applicability through an analysis of reference systems for once-through cycles, breeder cycles and thermal recycle. On a more tentative basis, the approach is applied to various alternative technical and institutional measures. This paper was also submitted to Working Groups 5 and 8

  11. Proliferation Persuasion. Coercive Bargaining with Nuclear Technology

    Energy Technology Data Exchange (ETDEWEB)

    Volpe, Tristan A. [George Washington Univ., Washington, DC (United States)

    2015-08-31

    Why do states wait for prolonged periods of time with the technical capacity to produce nuclear weapons? Only a handful of countries have ever acquired the sensitive nuclear fuel cycle technology needed to produce fissile material for nuclear weapons. Yet the enduring trend over the last five decades is for these states to delay or forgo exercising the nuclear weapons option provided by uranium enrichment or plutonium reprocessing capabilities. I show that states pause at this threshold stage because they use nuclear technology to bargain for concessions from both allies and adversaries. But when does nuclear latency offer bargaining benefits? My central argument is that challengers must surmount a dilemma to make coercive diplomacy work: the more they threaten to proliferate, the harder it becomes to reassure others that compliance will be rewarded with nuclear restraint. I identify a range of mechanisms able to solve this credibility problem, from arms control over breakout capacity to third party mediation and confidence building measures. Since each step towards the bomb raises the costs of implementing these policies, a state hits a sweet spot when it first acquires enrichment and/or reprocessing (ENR) technology. Subsequent increases in proliferation capability generate diminishing returns at the bargaining table for two reasons: the state must go to greater lengths to make a credible nonproliferation promise, and nuclear programs exhibit considerable path dependency as they mature over time. Contrary to the conventional wisdom about power in world politics, less nuclear latency thereby yields more coercive threat advantages. I marshal new primary source evidence from archives and interviews to identify episodes in the historical record when states made clear decisions to use ENR technology as a bargaining chip, and employ this theory of proliferation persuasion to explain how Japan, North Korea, and Iran succeeded and failed to barter concessions from the

  12. Sovereignty and non-proliferation policy

    International Nuclear Information System (INIS)

    Kimminich, O.

    1990-01-01

    The Non-Proliferation Treaty seems to violate the fundamental principle of the quality of the states. However, if interpreted in the light of the latest developments of the international law, it is possible to justify the discriminations which it imposes on the non-nuclear states. A crucial point is the implementation of article VI by the nuclear states. If the latter procrastinate in nuclear disarmament the whole NPT-regime will collapse. (orig.) [de

  13. INFCE and US non-proliferation policy

    Energy Technology Data Exchange (ETDEWEB)

    Donnelly, W H [Library of Congress, Washington, DC (USA)

    1980-12-01

    The International Fuel Cycle Evaluation (INFCE), which published its final reports in February 1980 produced a massive international effort of a kind never before seen. Over a period of two years its eight working groups held 61 meetings involving 519 experts from 46 countries and five international organizations. This article outlines the background and structure of INFCE and discusses how its recommendations diverge from US non-proliferation policy.

  14. Enhancement by Enlargement: The Proliferation Security Initiative

    Science.gov (United States)

    2008-01-01

    Minister Mahathir Mohammad. In any event, Malaysia’s expressions of common interest with the United States in cooperative efforts to combat terrorism...instances 10 The sharp change in the current Malaysian government’s stance toward cooperation with the United States from that of the preceding, Mahathir ...preceding prime minister, Mahathir , Malaysia was implicated in the proliferation network of Pakistan’s A. Q. Khan. As part of that network

  15. Future technology challenges in non-proliferation

    International Nuclear Information System (INIS)

    Richardson, J.H.

    2004-01-01

    Radiation detection technologies are an important tool in the prevention of proliferation. A variety of new developments have enabled enhanced performance in terms of energy resolution, spatial resolution, predictive modeling and simulation, active interrogation, and ease of operation and deployment in the field. For example, various gamma ray imaging approaches are being explored to combine spatial resolution with background suppression in order to enhance sensitivity at reasonable standoff distances and acquisition times. New materials and approaches are being developed in order to provide adequate energy resolution in field use without the necessity for liquid nitrogen. Finally, different detectors combined into distributed networks offer promise for detection and tracking of radioactive materials. As the world moves into the 21st century, the possibility of greater reliance on nuclear energy will impose additional technical requirements to prevent proliferation. In addition to proliferation resistant reactors, a careful examination of the various possible fuel cycles from cradle to grave will provide additional technical and nonproliferation challenges in the areas of conversion, enrichment, transportation, recycling and waste disposal. Radiation detection technology and information management have a prominent role in any future global regime for nonproliferation beyond the current Advanced Protocol. This work was performed under the auspices of the U.S. Department of Energy by University of California, Lawrence Livermore National Laboratory under contract No. W-7405-Eng-48. (author)

  16. NSAIDs and Cell Proliferation in Colorectal Cancer

    Directory of Open Access Journals (Sweden)

    Raj Ettarh

    2010-06-01

    Full Text Available Colon cancer is common worldwide and accounts for significant morbidity and mortality in patients. Fortunately, epidemiological studies have demonstrated that continuous therapy with NSAIDs offers real promise of chemoprevention and adjunct therapy for colon cancer patients. Tumour growth is the result of complex regulation that determines the balance between cell proliferation and cell death. How NSAIDs affect this balance is important for understanding and improving treatment strategies and drug effectiveness. NSAIDs inhibit proliferation and impair the growth of colon cancer cell lines when tested in culture in vitro and many NSAIDs also prevent tumorigenesis and reduce tumour growth in animal models and in patients, but the relationship to inhibition of tumour cell proliferation is less convincing, principally due to gaps in the available data. High concentrations of NSAIDs are required in vitro to achieve cancer cell inhibition and growth retardation at varying time-points following treatment. However, the results from studies with colon cancer cell xenografts are promising and, together with better comparative data on anti-proliferative NSAID concentrations and doses (for in vitro and in vivo administration, could provide more information to improve our understanding of the relationships between these agents, dose and dosing regimen, and cellular environment.

  17. Elements of safety and non proliferation

    International Nuclear Information System (INIS)

    Jalouneix, Jean; Aurelle, Jacques; Funk, Pierre; Ladsous, David; Bon Nguyen, Romuald; Goue, Georges; Lefevre, Odile

    2015-01-01

    This book on nuclear safety and non proliferation is based on knowledge and expertise of the IRSN. The first chapter addresses the safety of nuclear materials, of their installations and of their transportations. It proposes some contextual elements, presents the general guidelines of the French nuclear safety arrangement, the approach to take risks into account, the involved governmental and public bodies, the legal framework, and the protection and control arrangement (in terms of planning of safety-related activities, in terms of operator obligations, in terms of exercises and management crisis). The second part addresses the safety of radioactive sources: context (peculiarity, losses and thefts), international framework (source categories, Euratom directive), and the French organisation. The third chapter addresses nuclear non proliferation: historical background (creation and role of the IAEA and of the EAEC, definitions), principle of statements, inspection process, and French organisation (legal framework, governmental bodies, the IRSN). The last chapter addresses the issue of chemical non proliferation: historical background, international context (Convention on chemical weapons, organisation for their ban), and the French organisation

  18. Proliferation networks: between Sopranos and Supermarket

    International Nuclear Information System (INIS)

    Schlumberger, Guillaume; Gruselle, Bruno

    2006-01-01

    One success in the struggle against proliferation during the last decade has been that Western countries have reinforced mechanisms for control over exports of goods and technologies intended for the perfection of weapons of mass destruction. These new constraints have probably resulted in the appearance of a genuine proliferation economy, partly underground, organized around contacts between acquisition and sales networks, searching to exploit weaknesses in existing control systems to obtain wanted goods and technologies. This phenomenon is particularly worrying, because the level of technical skills attained by some suppliers is sufficiently high to guarantee that their customers will have a functional product satisfying their demand. Apart from systematic exploitation of vulnerabilities in export control systems, the capacity of these networks of suppliers to conduct their operations is reinforced by access to technologies and globalization of the market and financial tools. This article is the first of a series of two and explores the operation of these proliferation networks. The second article will be dedicated to an analysis of existing tools or other tools that can be implemented to combat them. (authors)

  19. Uranium dependence and the proliferation problem

    International Nuclear Information System (INIS)

    Jacoby, H.D.

    1977-01-01

    A 20-year ''breathing space'' of adequate uranium supplies is felt to warrant delaying breeder technology until the threat of proliferation can be met with adequate internationally controlled stockpiles and marketing. Although a shift to breeder reactors developed as concern grew over the possibility of depleted uranium reserves, U.S. policy has now reversed this trend in favor of nuclear systems with a lower risk of proliferation. A review of uranium dependence analyzes the fuel cycle, current and projected reserves, reliable enrichment services, and international effects of proliferation and market disruptions. Uranium supply forecasts are more positive now because overstated reactor buildup projections led utilities to order more fuel than they will need until the late 1980s. These surpluses of light-water reactor fuel could be stockpiled at a cost of $20 billion, felt to be a relatively modest figure in terms of the total cost of nuclear power. A stockpile able to meet demand levels could offer the security of domestic supplies with trade opportunities and would retain levels of exploration and extraction. Several strategies for managing stockpiles are possible, but international control is seen as the best way to maintain reliable prices and uniform supply policies for all nations

  20. The motivations of proliferating countries. Final report

    International Nuclear Information System (INIS)

    Archambault, Jean-Claude; Daguzan, Jean-Francois; Pasco, Xavier; Sitt, Bernard

    2006-01-01

    This report is based on previous works made by the GSPP group (GSPP stands for geographic-social-psychological-political) which defined conceptual backgrounds for a new approach to nuclear proliferation, notably by introducing an associated method, the GSPP method, which is used in this study. Thus, this report first presents the GSPP method through its application to the analysis of the decision dynamics in the case of a proliferating State, a discussion of the seven determining factors (national resources, history and strategic context, type of political regime, leader's history and personal typology, international dependencies and alliances, elites and mediators, public opinions), a discussion of the interactions between these factors, an application of the first determining factor, and an application of the GSPP method to the case of biological and chemical proliferation. In the next part, the authors propose sheets which report the application of the method to different countries (Iran, Israel, Iraq, Algeria, Libya, China, India, Pakistan, North and South Korea, Taiwan, Japan, Australia, Indonesia, South Africa). The content and the exploitation of these sheets is then discussed, and the authors address the perspective of development of a GSPP model, notably by using the Maslowe pyramid. They propose an application of this model to the case of Iran

  1. Nuclear non-proliferation: failures and prospects

    International Nuclear Information System (INIS)

    Imai, R.; Press, R.

    1980-01-01

    The objective of this paper is to examine the evolution of combined political and technical attempts to achieve worldwide acceptance of a commitment to non-proliferation, to note failures to date, and to identify essential factors to be satisfied if greater and necessary success is to be achieved in the immediate future. For this it is necessary to separate the realism and unrealism so often involved in discussing the concept of non-proliferation, as defined above, particularly if treated as a moral principle rather than as part of a general security issue reflecting shifts in regional and global stability. The political nature of the non-proliferation problem is underlined by the fact that whereas five nuclear weapon states are currently accepted, any threatened increase in that number is discouraged by every possible peaceful means. This fact combines political acceptance of an existing international situation with a belief that any addition to the present number must lead to international instability. Success in preventing additions may be more readily achieved through political understanding and perhaps some compromises, in particular cases, rather than through seeking a universal solution to a generalized problem

  2. Nuclear power and nuclear weapons proliferation

    International Nuclear Information System (INIS)

    Anon.

    1978-01-01

    An appropriate non-proliferation treaty should not discriminate among the non-weapon states, but should seek a cooperative approach with all countries seeking nuclear power and willing to accept international safeguards. Near-term proliferation problems, represented by nations already on the threshold of weapon capability, should not be confused with the long-term problem of world-wide nuclear development. The first can be handled with incentives and disincentives imposed on specific countries, while the latter involves the distribution of plutonium on the basis of alternative fuel cycles. To retain world leadership, U.S. efforts along these lines should be to encourage a dialogue between suppliers and recipients and to coordinate the economic and security issues of its own non-proliferation and foreign policies. One option is a U.S. commitment to a multinational fuel storage and reprocessing facility. Technical evaluation and demonstration of alternative fuel cycles to reach an international consensus would be a parallel activity

  3. Laser enrichment: a new path to proliferation

    International Nuclear Information System (INIS)

    Casper, B.M.

    1977-01-01

    The use of lasers to obtain enriched uranium is an easier and cheaper method than methods currently in use. The immediate concern is that it could promote easy access to nuclear weapons by countries that do not presently have them. Mr. Casper feels that the U.S. government is working against itself; while the State Department is seeking to block one path to proliferation, ERDA laboratories are developing new technology that could open another. The proliferation implications have not been factored in a serious way into the decisions to proceed with this research. It is also clear that the United States does not now have a comprehensive policy that deals with all potentially important paths to proliferation, including laser enrichment. Mr. Casper states that there is still time to stop and consider whether laser enrichment should be developed, in light of its broader consequences. But this will not happen if the decisions are left exclusively in the hands of those promoting the technology, the author says. It is just this sort of situation that prompted the creation of several government institutions to provide independent assessments of new technologies. The Office of Technology Assessment, the Nuclear Regulatory Commission, and the Arms Control and Disarmament Agency all have the authority to intervene. Laser enrichment provides a good test of these institutions and of the viability of the concept of technology assessment. The status, benefits and risks, and the policy needed on laser research are discussed

  4. The Non-Proliferation Treaty increases security

    International Nuclear Information System (INIS)

    Kahiluoto, K.

    1995-01-01

    Extension of the Nuclear Non-Proliferation Treaty indefinitely was a historic decision. The Treaty is the most extensive international agreement on security policy to date; now its obligations have become a permanent part of international justice. Moreover, the NPT represents a political and moral obligation. Through the NPT, the international community has made a permanent commitment to restrict the proliferation of nuclear weapons. Increasing pressures will be applied to the few countries still outside the NPT, making it more likely that these countries will eventually change their views. The likelihood of regional bans on nuclear weapons in the Middle East and in Asia, too, will increase. The Treaty promotes the establishment of new nuclear-free zones. The nuclear-free zone in Latin America - the countries covered by the Tlatelolco Treaty - is already very close to its full implementation. Finland is firmly committed to the obligations of the Non-Proliferation Treaty. The NPT Conference of 1995 was among the first international meetings in which Finland participated, and took an active role, as a Member State of the European Union. (orig.)

  5. TWEAK induces liver progenitor cell proliferation

    Science.gov (United States)

    Jakubowski, Aniela; Ambrose, Christine; Parr, Michael; Lincecum, John M.; Wang, Monica Z.; Zheng, Timothy S.; Browning, Beth; Michaelson, Jennifer S.; Baestcher, Manfred; Wang, Bruce; Bissell, D. Montgomery; Burkly, Linda C.

    2005-01-01

    Progenitor (“oval”) cell expansion accompanies many forms of liver injury, including alcohol toxicity and submassive parenchymal necrosis as well as experimental injury models featuring blocked hepatocyte replication. Oval cells can potentially become either hepatocytes or biliary epithelial cells and may be critical to liver regeneration, particularly when hepatocyte replication is impaired. The regulation of oval cell proliferation is incompletely understood. Herein we present evidence that a TNF family member called TWEAK (TNF-like weak inducer of apoptosis) stimulates oval cell proliferation in mouse liver through its receptor Fn14. TWEAK has no effect on mature hepatocytes and thus appears to be selective for oval cells. Transgenic mice overexpressing TWEAK in hepatocytes exhibit periportal oval cell hyperplasia. A similar phenotype was obtained in adult wild-type mice, but not Fn14-null mice, by administering TWEAK-expressing adenovirus. Oval cell expansion induced by 3,5-diethoxycarbonyl-1,4-dihydrocollidine (DDC) was significantly reduced in Fn14-null mice as well as in adult wild-type mice with a blocking anti-TWEAK mAb. Importantly, TWEAK stimulated the proliferation of an oval cell culture model. Finally, we show increased Fn14 expression in chronic hepatitis C and other human liver diseases relative to its expression in normal liver, which suggests a role for the TWEAK/Fn14 pathway in human liver injury. We conclude that TWEAK has a selective mitogenic effect for liver oval cells that distinguishes it from other previously described growth factors. PMID:16110324

  6. GPNMB promotes proliferation of developing eosinophils.

    Science.gov (United States)

    Hwang, Sae Mi; Kang, Jin Hyun; Kim, Bo Kyum; Uhm, Tae Gi; Kim, Hye Jeong; Lee, Hyune-Hwan; Binas, Bert; Chung, Il Yup

    2017-08-01

    Glycoprotein non-metastatic melanoma protein B (GPNMB) is a type I transmembrane protein that is expressed in a wide variety of cell types, including haematopoietic lineages. We previously demonstrated that GPNMB is one of the most highly expressed genes at an early and intermediate stage of eosinophil development. We herein examined GPNMB expression and its possible functional effect using cord blood (CB) CD34+ haematopoietic stem cells differentiating toward eosinophils during a 24-day culture period. Western blot and confocal microscopy analyses showed that GPNMB reached its highest levels at day 12 with most GPNMB-positive cells also expressing major basic protein 1 (MBP1), an eosinophil granule protein. GPNMB declined thereafter, but was still present at an appreciable level at day 24, the time when CB eosinophils most abundantly expressed MBP1 and were thus considered fully differentiated. When the developing CB cells were cultured in the presence of a blocking anti-GPNMB antibody, cell proliferation was significantly reduced. In agreement, ectopic expression of GPNMB in heterologous cells resulted in a significant increase in cell proliferation, while small interfering RNA of GPNMB inhibited the GPNMB-mediated proliferation. Thus, GPNMB is expressed in a temporal manner during eosinophil development and delivers a proliferative signal upon activation. © The Authors 2017. Published by Oxford University Press on behalf of the Japanese Biochemical Society. All rights reserved.

  7. The Asian countries and the non-proliferation treaty prorogation

    International Nuclear Information System (INIS)

    Hoffmann, N.

    1995-01-01

    This work deals with the non-proliferation treaty prorogation of Asia. The position of the asian countries under the old non-proliferation treaty is given. It includes the 1968 non-proliferation treaty signatories, the calling in question again and the criticisms revealed by the asian countries. The positions and the open forecasts expressed on the non-proliferation treaty prorogation and the article on the elimination of the nuclear weapons are also given. (O.L.)

  8. 17 CFR 201.153 - Filing of papers: Signature requirement and effect.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Filing of papers: Signature... COMMISSION RULES OF PRACTICE Rules of Practice General Rules § 201.153 Filing of papers: Signature... telephone number on every filing. (b) Effect of signature. (1) The signature of a counsel or party shall...

  9. 76 FR 75461 - Express Mail Domestic Postage Refund Policy and Waiver of Signature

    Science.gov (United States)

    2011-12-02

    ... POSTAL SERVICE 39 CFR Part 111 Express Mail Domestic Postage Refund Policy and Waiver of Signature... to 30 days after the date of mailing, and to change the Express Mail ``waiver of signature'' standard for domestic items by obtaining an addressee's signature only when the mailer selects the ``signature...

  10. 7 CFR Appendix B to Subpart E of... - Certificate of Incumbency and Signature

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 14 2010-01-01 2009-01-01 true Certificate of Incumbency and Signature B Appendix B... Signature U.S. Department of Agriculture—Farmers Home Administration or its successor agency under Public... successor agency under Public Law 103-354 and that the signature appearing below and that the signatures...

  11. SPECTROSCOPIC SIGNATURES RELATED TO A SUNQUAKE

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, S. A.; Harra, L. K.; Green, L. M. [UCL Mullard Space Science Laboratory, Holmbury St. Mary, Dorking, Surrey RH5 6NT (United Kingdom); Zharkov, S., E-mail: sarah.matthews@ucl.ac.uk [Department of Mathematics and Physics, University of Hull, Hull (United Kingdom)

    2015-10-10

    The presence of flare-related acoustic emission (sunquakes (SQs)) in some flares, and only in specific locations within the flaring environment, represents a severe challenge to our current understanding of flare energy transport processes. In an attempt to contribute to understanding the origins of SQs we present a comparison of new spectral observations from Hinode’s EUV imaging Spectrometer (EIS) and the Interface Region Imaging Spectrograph (IRIS) of the chromosphere, transition region, and corona above an SQ, and compare them to the spectra observed in a part of the flaring region with no acoustic signature. Evidence for the SQ is determined using both time–distance and acoustic holography methods, and we find that unlike many previous SQ detections, the signal is rather dispersed, but that the time–distance and 6 and 7 mHz sources converge at the same spatial location. We also see some evidence for different evolution at different frequencies, with an earlier peak at 7 mHz than at 6 mHz. Using EIS and IRIS spectroscopic measurements we find that in this location, at the time of the 7 mHz peak the spectral emission is significantly more intense, shows larger velocity shifts and substantially broader profiles than in the location with no SQ, and there is a good correlation between blueshifted, hot coronal, hard X-ray (HXR), and redshifted chromospheric emission, consistent with the idea of a strong downward motion driven by rapid heating by nonthermal electrons and the formation of chromospheric shocks. Exploiting the diagnostic potential of the Mg ii triplet lines, we also find evidence for a single large temperature increase deep in the atmosphere, which is consistent with this scenario. The time of the 6 mHz and time–distance peak signal coincides with a secondary peak in the energy release process, but in this case we find no evidence of HXR emission in the quake location, instead finding very broad spectral lines, strongly shifted to the red

  12. Oxidative stress induced pulmonary endothelial cell proliferation is ...

    African Journals Online (AJOL)

    Cellular hyper-proliferation, endothelial dysfunction and oxidative stress are hallmarks of the pathobiology of pulmonary hypertension. Indeed, pulmonary endothelial cells proliferation is susceptible to redox state modulation. Some studies suggest that superoxide stimulates endothelial cell proliferation while others have ...

  13. RELATIVE PROLIFERATION RISKS FOR NUCLEAR FUEL LEASING ARRANGEMENT

    International Nuclear Information System (INIS)

    CHENG, L.Y.; YUE, M.; BARI, R.A.

    2007-01-01

    The present study demonstrates a probabilistic approach to quantify the proliferation risks of fuel leasing and recycling. A Markov model approach is applied to evaluate the probability of proliferation success by diversion or theft. Proliferation risk is calculated as a product of the probability of success and the corresponding consequences

  14. Research on Signature Verification Method Based on Discrete Fréchet Distance

    Science.gov (United States)

    Fang, J. L.; Wu, W.

    2018-05-01

    This paper proposes a multi-feature signature template based on discrete Fréchet distance, which breaks through the limitation of traditional signature authentication using a single signature feature. It solves the online handwritten signature authentication signature global feature template extraction calculation workload, signature feature selection unreasonable problem. In this experiment, the false recognition rate (FAR) and false rejection rate (FRR) of the statistical signature are calculated and the average equal error rate (AEER) is calculated. The feasibility of the combined template scheme is verified by comparing the average equal error rate of the combination template and the original template.

  15. Nuclear proliferation using laser isotope separation - Verification options

    International Nuclear Information System (INIS)

    Erickson, Stanley A.

    2001-01-01

    Full text: This paper discusses the use of laser isotope separation techniques for the purpose of nuclear proliferation by a Non-Nuclear Weapons State (NNWS) that is a signatory of the Non- Proliferation Treaty (NPT) and is subject to inspections by the IAEA. It includes an analysis of the feasibility of the technique by a NNWS, what conditions are necessary for success, what would be required for either the use of the technique as a covert enrichment method or its use as a non-declared adjunct to a declared enrichment facility, and what signs might be available for the detection of such activity. The Atomic Vapor Laser Isotope Separation (AVLIS) technology, developed by LLNL from 1973 through 1999, is used as a concrete example to allow more determination of the questions of feasibility, requirements, and signatures, as this technology has been further developed than others, and has been documented extensively. The question of feasibility of the technique for the enrichment of significant quantities of uranium or plutonium to produce weapons-grade materials is investigated by decomposing the development necessary for the technique into steps that can be analyzed for requirements, both in expertise, equipment, and scientific knowledge. The paper concludes that the technique is usable for proliferation, although with difficulty, by some nations during the next two decades. The technique may be developed in a completely covert method, with no declarations and no public indication that it is under research and development, or alternatively, some admissions may be made to allow or promote exchange of information. The technique can be disclosed as a research and development technology for the separation of non-radioactive isotopes, for the separation of radioactive isotopes including those in commercial use for medical or industrial purposes, or as part of a nuclear fuel cycle. The ability to translate development work from the first two of these to a system usable for

  16. Proliferation resistance design of a plutonium cycle (Proliferation Resistance Engineering Program: PREP)

    Energy Technology Data Exchange (ETDEWEB)

    Sorenson, R.J.; Roberts, F.P.; Clark, R.G.

    1979-01-19

    This document describes the proliferation resistance engineering concepts developed to counter the threat of proliferation of nuclear weapons in an International Fuel Service Center (IFSC). The basic elements of an International Fuel Service Center are described. Possible methods for resisting proliferation such as processing alternatives, close-coupling of facilities, process equipment layout, maintenance philosophy, process control, and process monitoring are discussed. Political and institutional issues in providing proliferation resistance for an International Fuel Service Center are analyzed. The conclusions drawn are (1) use-denial can provide time for international response in the event of a host nation takeover. Passive use-denial is more acceptable than active use-denial, and acceptability of active-denial concepts is highly dependent on sovereignty, energy dependence and economic considerations; (2) multinational presence can enhance proliferation resistance; and (3) use-denial must be nonprejudicial with balanced interests for governments and/or private corporations being served. Comparisons between an IFSC as a national facility, an IFSC with minimum multinational effect, and an IFSC with maximum multinational effect show incremental design costs to be less than 2% of total cost of the baseline non-PRE concept facility. The total equipment acquisition cost increment is estimated to be less than 2% of total baseline facility costs. Personnel costs are estimated to increase by less than 10% due to maximum international presence. 46 figures, 9 tables.

  17. Proliferation resistance design of a plutonium cycle (Proliferation Resistance Engineering Program: PREP)

    International Nuclear Information System (INIS)

    Sorenson, R.J.; Roberts, F.P.; Clark, R.G.

    1979-01-01

    This document describes the proliferation resistance engineering concepts developed to counter the threat of proliferation of nuclear weapons in an International Fuel Service Center (IFSC). The basic elements of an International Fuel Service Center are described. Possible methods for resisting proliferation such as processing alternatives, close-coupling of facilities, process equipment layout, maintenance philosophy, process control, and process monitoring are discussed. Political and institutional issues in providing proliferation resistance for an International Fuel Service Center are analyzed. The conclusions drawn are (1) use-denial can provide time for international response in the event of a host nation takeover. Passive use-denial is more acceptable than active use-denial, and acceptability of active-denial concepts is highly dependent on sovereignty, energy dependence and economic considerations; (2) multinational presence can enhance proliferation resistance; and (3) use-denial must be nonprejudicial with balanced interests for governments and/or private corporations being served. Comparisons between an IFSC as a national facility, an IFSC with minimum multinational effect, and an IFSC with maximum multinational effect show incremental design costs to be less than 2% of total cost of the baseline non-PRE concept facility. The total equipment acquisition cost increment is estimated to be less than 2% of total baseline facility costs. Personnel costs are estimated to increase by less than 10% due to maximum international presence. 46 figures, 9 tables

  18. Cubic Bezier Curve Approach for Automated Offline Signature Verification with Intrusion Identification

    Directory of Open Access Journals (Sweden)

    Arun Vijayaragavan

    2014-01-01

    Full Text Available Authentication is a process of identifying person’s rights over a system. Many authentication types are used in various systems, wherein biometrics authentication systems are of a special concern. Signature verification is a basic biometric authentication technique used widely. The signature matching algorithm uses image correlation and graph matching technique which provides false rejection or acceptance. We proposed a model to compare knowledge from signature. Intrusion in the signature repository system results in copy of the signature that leads to false acceptance. Our approach uses a Bezier curve algorithm to identify the curve points and uses the behaviors of the signature for verification. An analyzing mobile agent is used to identify the input signature parameters and compare them with reference signature repository. It identifies duplication of signature over intrusion and rejects it. Experiments are conducted on a database with thousands of signature images from various sources and the results are favorable.

  19. Molecular signatures for the Crenarchaeota and the Thaumarchaeota.

    Science.gov (United States)

    Gupta, Radhey S; Shami, Ali

    2011-02-01

    Crenarchaeotes found in mesophilic marine environments were recently placed into a new phylum of Archaea called the Thaumarchaeota. However, very few molecular characteristics of this new phylum are currently known which can be used to distinguish them from the Crenarchaeota. In addition, their relationships to deep-branching archaeal lineages are unclear. We report here detailed analyses of protein sequences from Crenarchaeota and Thaumarchaeota that have identified many conserved signature indels (CSIs) and signature proteins (SPs) (i.e., proteins for which all significant blast hits are from these groups) that are specific for these archaeal groups. Of the identified signatures 6 CSIs and 13 SPs are specific for the Crenarchaeota phylum; 6 CSIs and >250 SPs are uniquely found in various Thaumarchaeota (viz. Cenarchaeum symbiosum, Nitrosopumilus maritimus and a number of uncultured marine crenarchaeotes) and 3 CSIs and ~10 SPs are found in both Thaumarchaeota and Crenarchaeota species. Some of the molecular signatures are also present in Korarchaeum cryptofilum, which forms the independent phylum Korarchaeota. Although some of these molecular signatures suggest a distant shared ancestry between Thaumarchaeota and Crenarchaeota, our identification of large numbers of Thaumarchaeota-specific proteins and their deep branching between the Crenarchaeota and Euryarchaeota phyla in phylogenetic trees shows that they are distinct from both Crenarchaeota and Euryarchaeota in both genetic and phylogenetic terms. These observations support the placement of marine mesophilic archaea into the separate phylum Thaumarchaeota. Additionally, many CSIs and SPs have been found that are specific for different orders within Crenarchaeota (viz. Sulfolobales-3 CSIs and 169 SPs, Thermoproteales-5 CSIs and 25 SPs, Desulfurococcales-4 SPs, and Sulfolobales and Desulfurococcales-2 CSIs and 18 SPs). The signatures described here provide novel means for distinguishing the Crenarchaeota and

  20. Distinct Transcriptional and Alternative Splicing Signatures of Decidual CD4+ T Cells in Early Human Pregnancy

    Directory of Open Access Journals (Sweden)

    Weihong Zeng

    2017-06-01

    Full Text Available Decidual CD4+ T (dCD4 T cells are crucial for the maternal-fetal immune tolerance required for a healthy pregnancy outcome. However, their molecular and functional characteristics are not well elucidated. In this study, we performed the first analysis of transcriptional and alternative splicing (AS landscapes for paired decidual and peripheral blood CD4+ T (pCD4 T cells in human early pregnancy using high throughput mRNA sequencing. Our data showed that dCD4 T cells are endowed with a unique transcriptional signature when compared to pCD4 T cells: dCD4 T cells upregulate 1,695 genes enriched in immune system process whereas downregulate 1,011 genes mainly related to mRNA catabolic process and the ribosome. Moreover, dCD4 T cells were observed to be at M phase, and show increased activation, proliferation, and cytokine production, as well as display an effector-memory phenotype and a heterogenous nature containing Th1, Th17, and Treg cell subsets. However, dCD4 T cells undergo a comparable number of upregulated and downregulated AS events, both of which are enriched in the genes related to cellular metabolic process. And the changes at the AS event level do not reflect measurable differences at the gene expression level in dCD4 T cells. Collectively, our findings provide a comprehensive portrait of the unique transcriptional signature and AS profile of CD4+ T cells in human decidua and help us gain more understanding of the functional characteristic of these cells during early pregnancy.