WorldWideScience

Sample records for personal digital signatures

  1. DIGITAL SIGNATURE IN THE WAY OF LAW

    Directory of Open Access Journals (Sweden)

    Ruya Samlı

    2013-01-01

    Full Text Available Signature can be defined as a person’s name or special signs that he/she writes when he/she wants to indicate he/she wrote or confirm that writing. A person signs many times in his/her life. A person’s signature that is used for thousands of times for many things from formal documents to exams has importance for that person. Especially, signing in legal operations is an operation that can build important results. If a person’s signature is imitated by another person, he/she can become beholden, donate his/her whole wealth, commits offences or do some judicial operations. Today, because many operations can be done with digital environments and internet, signature operation that provides identity validation must also be carried to digital environment. In this paper digital signature concept that is approved for this reason and its situation in international areas and Turkish laws are investigated.

  2. Digital Signature Schemes with Complementary Functionality and Applications

    OpenAIRE

    S. N. Kyazhin

    2012-01-01

    Digital signature schemes with additional functionality (an undeniable signature, a signature of the designated confirmee, a signature blind, a group signature, a signature of the additional protection) and examples of their application are considered. These schemes are more practical, effective and useful than schemes of ordinary digital signature.

  3. Attribute-Based Digital Signature System

    NARCIS (Netherlands)

    Ibraimi, L.; Asim, Muhammad; Petkovic, M.

    2011-01-01

    An attribute-based digital signature system comprises a signature generation unit (1) for signing a message (m) by generating a signature (s) based on a user secret key (SK) associated with a set of user attributes, wherein the signature generation unit (1) is arranged for combining the user secret

  4. Practical quantum digital signature

    Science.gov (United States)

    Yin, Hua-Lei; Fu, Yao; Chen, Zeng-Bing

    2016-03-01

    Guaranteeing nonrepudiation, unforgeability as well as transferability of a signature is one of the most vital safeguards in today's e-commerce era. Based on fundamental laws of quantum physics, quantum digital signature (QDS) aims to provide information-theoretic security for this cryptographic task. However, up to date, the previously proposed QDS protocols are impractical due to various challenging problems and most importantly, the requirement of authenticated (secure) quantum channels between participants. Here, we present the first quantum digital signature protocol that removes the assumption of authenticated quantum channels while remaining secure against the collective attacks. Besides, our QDS protocol can be practically implemented over more than 100 km under current mature technology as used in quantum key distribution.

  5. Perancangan Aplikasi Undeniable Digital Signature Dengan Algoritma Chaum’s Blind Signature

    OpenAIRE

    Simanjuntak, Martin Dennain

    2012-01-01

    Desperaty need a securiry system in the exchange of information via computer media, so that information can not be accessed by unauthorized parties. One of the security system is to use a system of digital signatures as a means of authenticating the authenticity of digital document that are exchanged. By using a digital a digital signature system is undeniable, the security system can be generated digital document exchange, where the system is free from the from of rejection...

  6. On the Theory and Practice of Personal Digital Signatures

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Mikkelsen, Gert Læssøe

    2009-01-01

    and the PC are not both corrupted at the same time. In other words, our solution cannot be broken by phising or key-logging via the PC. The protocol allows for mobile units with very small computing power by securely outsourcing computation to the PC and also allows usage of any PC that can communicate...... digital signatures on behalf of the user. This protocol is proactively UC-secure assuming at most one player is corrupted in every operational phase. In more practical terms, this means that one can securely sign using terminals (PC’s) that are not necessarily trusted, as long as the mobile unit...

  7. ANALYSIS OF DIGITAL SIGNATURE RULE IN THE ELECTRONIC COMMERCE LAW OF INDONESIA

    Directory of Open Access Journals (Sweden)

    Irna Nurhayati

    2015-02-01

    Full Text Available The Indonesian legislature has enacted the Information and Electronic Transaction Bill (the Bill in 2003, in which digital signature as a technology specific electronic (e commerce has been promoted. The promotion of digital signature is still problematic, since there is an uncertainty whether Indonesia can develop well a required viable technology of digital signature. Moreover, there is a gap between the actual use of digital signature and the projections of future utilization of digital signature by interested parties on e-commerce. This paper will discuss the reason of the Indonesian legislature promotes digital signature. It will then analyse the gap between the actual use of digital signature and the projections of future utilization of digital signature by interested parties on e-commerce. This paper will finally argue whether the promotion of digital signature of the Bill is useful for the growth of e-commerce in Indonesia.

  8. Digital signature feasibility study

    Science.gov (United States)

    2008-06-01

    The purpose of this study was to assess the advantages and disadvantages of using digital signatures to assist the Arizona Department of Transportation in conducting business. The Department is evaluating the potential of performing more electronic t...

  9. DIGITAL SIGNATURE IN THE WAY OF LAW

    OpenAIRE

    Ruya Samlı

    2013-01-01

    Signature can be defined as a person’s name or special signs that he/she writes when he/she wants to indicate he/she wrote or confirm that writing. A person signs many times in his/her life. A person’s signature that is used for thousands of times for many things from formal documents to exams has importance for that person. Especially, signing in legal operations is an operation that can build important results. If a person’s signature is imitated by another person, he/she can be...

  10. Measurement-device-independent quantum digital signatures

    Science.gov (United States)

    Puthoor, Ittoop Vergheese; Amiri, Ryan; Wallden, Petros; Curty, Marcos; Andersson, Erika

    2016-08-01

    Digital signatures play an important role in software distribution, modern communication, and financial transactions, where it is important to detect forgery and tampering. Signatures are a cryptographic technique for validating the authenticity and integrity of messages, software, or digital documents. The security of currently used classical schemes relies on computational assumptions. Quantum digital signatures (QDS), on the other hand, provide information-theoretic security based on the laws of quantum physics. Recent work on QDS Amiri et al., Phys. Rev. A 93, 032325 (2016);, 10.1103/PhysRevA.93.032325 Yin, Fu, and Zeng-Bing, Phys. Rev. A 93, 032316 (2016), 10.1103/PhysRevA.93.032316 shows that such schemes do not require trusted quantum channels and are unconditionally secure against general coherent attacks. However, in practical QDS, just as in quantum key distribution (QKD), the detectors can be subjected to side-channel attacks, which can make the actual implementations insecure. Motivated by the idea of measurement-device-independent quantum key distribution (MDI-QKD), we present a measurement-device-independent QDS (MDI-QDS) scheme, which is secure against all detector side-channel attacks. Based on the rapid development of practical MDI-QKD, our MDI-QDS protocol could also be experimentally implemented, since it requires a similar experimental setup.

  11. Photonic quantum digital signatures operating over kilometer ranges in installed optical fiber

    Science.gov (United States)

    Collins, Robert J.; Fujiwara, Mikio; Amiri, Ryan; Honjo, Toshimori; Shimizu, Kaoru; Tamaki, Kiyoshi; Takeoka, Masahiro; Andersson, Erika; Buller, Gerald S.; Sasaki, Masahide

    2016-10-01

    The security of electronic communications is a topic that has gained noteworthy public interest in recent years. As a result, there is an increasing public recognition of the existence and importance of mathematically based approaches to digital security. Many of these implement digital signatures to ensure that a malicious party has not tampered with the message in transit, that a legitimate receiver can validate the identity of the signer and that messages are transferable. The security of most digital signature schemes relies on the assumed computational difficulty of solving certain mathematical problems. However, reports in the media have shown that certain implementations of such signature schemes are vulnerable to algorithmic breakthroughs and emerging quantum processing technologies. Indeed, even without quantum processors, the possibility remains that classical algorithmic breakthroughs will render these schemes insecure. There is ongoing research into information-theoretically secure signature schemes, where the security is guaranteed against an attacker with arbitrary computational resources. One such approach is quantum digital signatures. Quantum signature schemes can be made information-theoretically secure based on the laws of quantum mechanics while comparable classical protocols require additional resources such as anonymous broadcast and/or a trusted authority. Previously, most early demonstrations of quantum digital signatures required dedicated single-purpose hardware and operated over restricted ranges in a laboratory environment. Here, for the first time, we present a demonstration of quantum digital signatures conducted over several kilometers of installed optical fiber. The system reported here operates at a higher signature generation rate than previous fiber systems.

  12. Quantum Digital Signatures for Unconditional Safe Authenticity Protection of Medical Documentation

    Directory of Open Access Journals (Sweden)

    Arkadiusz Liber

    2015-12-01

    Full Text Available Modern medical documentation appears most often in an online form which requires some digital methods to ensure its confidentiality, integrity and authenticity. The document authenticity may be secured with the use of a signature. A classical handwritten signature is directly related to its owner by his/her psychomotor character traits. Such a signature is also connected with the material it is written on, and a writing tool. Because of these properties, a handwritten signature reflects certain close material bonds between the owner and the document. In case of modern digital signatures, the document authentication has a mathematical nature. The verification of the authenticity becomes the verification of a key instead of a human. Since 1994 it has been known that classical digital signature algorithms may not be safe because of the Shor’s factorization algorithm. To implement the modern authenticity protection of medical data, some new types of algorithms should be used. One of the groups of such algorithms is based on the quantum computations. In this paper, the analysis of the current knowledge status of Quantum Digital Signature protocols, with its basic principles, phases and common elements such as transmission, comparison and encryption, was outlined. Some of the most promising protocols for signing digital medical documentation, that fulfill the requirements for QDS, were also briefly described. We showed that, a QDS protocol with QKD components requires the equipment similar to the equipment used for a QKD, for its implementation, which is already commercially available. If it is properly implemented, it provides the shortest lifetime of qubits in comparison to other protocols. It can be used not only to sign classical messages but probably it could be well adopted to implement unconditionally safe protection of medical documentation in the nearest future, as well.

  13. Comparison of Fingerprint and Iris Biometric Authentication for Control of Digital Signatures

    OpenAIRE

    Zuckerman, Alan E.; Moon, Kenneth A.; Eaddy, Kenneth

    2002-01-01

    Biometric authentication systems can be used to control digital signature of medical documents. This pilot study evaluated the use of two different fingerprint technologies and one iris technology to control creation of digital signatures on a central server using public private key pairs stored on the server. Documents and signatures were stored in XML for portability. Key pairs and authentication certificates were generated during biometric enrollment. Usability and user acceptance were gua...

  14. Digital "Testimonio" as a Signature Pedagogy for Latin@ Studies

    Science.gov (United States)

    Benmayor, Rina

    2012-01-01

    This article proposes the curricular integration of digital "testimonio" as a "signature" pedagogy in Latin@ Studies. The "testimonio" tradition of urgent narratives and the creative multimedia languages of digital storytelling--text, voice, image, and sound--invite historically marginalized subjects, especially younger generations, to author and…

  15. A Digital Signature Scheme Based on MST3 Cryptosystems

    Directory of Open Access Journals (Sweden)

    Haibo Hong

    2014-01-01

    Full Text Available As special types of factorization of finite groups, logarithmic signature and cover have been used as the main components of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2, and MST3. Recently, Svaba et. al proposed a revised MST3 encryption scheme with greater security. Meanwhile, they put forward an idea of constructing signature schemes on the basis of logarithmic signatures and random covers. In this paper, we firstly design a secure digital signature scheme based on logarithmic signatures and random covers. In order to complete the task, we devise a new encryption scheme based on MST3 cryptosystems.

  16. Extending the similarity-based XML multicast approach with digital signatures

    DEFF Research Database (Denmark)

    Azzini, Antonia; Marrara, Stefania; Jensen, Meiko

    2009-01-01

    This paper investigates the interplay between similarity-based SOAP message aggregation and digital signature application. An overview on the approaches resulting from the different orders for the tasks of signature application, verification, similarity aggregation and splitting is provided....... Depending on the intersection between similarity-aggregated and signed SOAP message parts, the paper discusses three different cases of signature application, and sketches their applicability and performance implications....

  17. Measurement-Device Independency Analysis of Continuous-Variable Quantum Digital Signature

    Directory of Open Access Journals (Sweden)

    Tao Shang

    2018-04-01

    Full Text Available With the practical implementation of continuous-variable quantum cryptographic protocols, security problems resulting from measurement-device loopholes are being given increasing attention. At present, research on measurement-device independency analysis is limited in quantum key distribution protocols, while there exist different security problems for different protocols. Considering the importance of quantum digital signature in quantum cryptography, in this paper, we attempt to analyze the measurement-device independency of continuous-variable quantum digital signature, especially continuous-variable quantum homomorphic signature. Firstly, we calculate the upper bound of the error rate of a protocol. If it is negligible on condition that all measurement devices are untrusted, the protocol is deemed to be measurement-device-independent. Then, we simplify the calculation by using the characteristics of continuous variables and prove the measurement-device independency of the protocol according to the calculation result. In addition, the proposed analysis method can be extended to other quantum cryptographic protocols besides continuous-variable quantum homomorphic signature.

  18. Construction of Graduation Certificate Issuing System Based on Digital Signature Technique

    Directory of Open Access Journals (Sweden)

    Mohammed Issam Younis

    2015-06-01

    Full Text Available With the development of computer architecture and its technologies in recent years, applications like e-commerce, e-government, e-governance and e-finance are widely used, and they act as active research areas. In addition, in order to increase the quality and quantity of the ordinary everyday transactions, it is desired to migrate from the paper-based environment to a digital-based computerized environment. Such migration increases efficiency, saves time, eliminates paperwork, increases safety and reduces the cost in an organization. Digital signatures are playing an essential role in many electronic and automatic based systems and facilitate this migration. The digital signatures are used to provide many services and solutions that would not have been possible by the conventional hand-written signature. In the educational environment, the process of issuing the graduation certificates can no longer be restricted to the traditional methods. Hence, a computerized system for issuing certificates of graduation in an electronic form is needed and desired. This paper proposes a Graduation Certificates Issuing System (GCIS based on digital signature technology. In doing so, this research highlights the state-of-the-art and the art-of-the-practice for some existing digital signature-based systems in the literatures. In addition, eight intertwined elected services are identified, namely: message authentication, entity authentication, integrity, non-repudiation, time stamping, distinguished signing authorities, delegating signing capability and supporting workflow systems. Moreover, this research examines nine existing systems, showing their merits and demerits in terms of these elected services. Furthermore, the research describes the architectural design using the Unified Modeling Language (UML and provides the concrete implementation of the proposed GCIS. The GCIS is implemented using Visual Basic.Net programming language and SQL Server database

  19. On the security of pairing-free certificateless digital signature schemes using ECC

    Directory of Open Access Journals (Sweden)

    Namita Tiwari

    2015-09-01

    Full Text Available I cryptanalyze the pairing-free digital signature scheme of Islam et al. which is proven secure against “adaptive chosen message attacks”. I introduce this type of forgery to analyze their scheme. Furthermore, I comment on general security issues that should be considered when making improvements on their scheme. My security analysis is also applicable to other digital signatures designed in a similar manner.

  20. Comparison of Fingerprint and Iris Biometric Authentication for Control of Digital Signatures

    Science.gov (United States)

    Zuckerman, Alan E.; Moon, Kenneth A.; Eaddy, Kenneth

    2002-01-01

    Biometric authentication systems can be used to control digital signature of medical documents. This pilot study evaluated the use of two different fingerprint technologies and one iris technology to control creation of digital signatures on a central server using public private key pairs stored on the server. Documents and signatures were stored in XML for portability. Key pairs and authentication certificates were generated during biometric enrollment. Usability and user acceptance were guarded and limitations of biometric systems prevented use of the system with all test subjects. The system detected alternations in the data content and provided future signer re-authentication for non-repudiation.

  1. THE ELECTRONIC SIGNATURE

    Directory of Open Access Journals (Sweden)

    Voiculescu Madalina Irena

    2009-05-01

    Full Text Available Article refers to significance and the digital signature in electronic commerce. Internet and electronic commerce open up many new opportunities for the consumer, yet, the security (or perceived lack of security of exchanging personal and financial data

  2. 15 CFR 80.4 - Signature of persons unable to sign their name.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Signature of persons unable to sign... POPULATION SCHEDULES § 80.4 Signature of persons unable to sign their name. A person requesting Census information who is unable to sign his or her name shall make an “X” mark where signature is required, and the...

  3. Quantum random oracle model for quantum digital signature

    Science.gov (United States)

    Shang, Tao; Lei, Qi; Liu, Jianwei

    2016-10-01

    The goal of this work is to provide a general security analysis tool, namely, the quantum random oracle (QRO), for facilitating the security analysis of quantum cryptographic protocols, especially protocols based on quantum one-way function. QRO is used to model quantum one-way function and different queries to QRO are used to model quantum attacks. A typical application of quantum one-way function is the quantum digital signature, whose progress has been hampered by the slow pace of the experimental realization. Alternatively, we use the QRO model to analyze the provable security of a quantum digital signature scheme and elaborate the analysis procedure. The QRO model differs from the prior quantum-accessible random oracle in that it can output quantum states as public keys and give responses to different queries. This tool can be a test bed for the cryptanalysis of more quantum cryptographic protocols based on the quantum one-way function.

  4. Key-Insulated Undetachable Digital Signature Scheme and Solution for Secure Mobile Agents in Electronic Commerce

    Directory of Open Access Journals (Sweden)

    Yang Shi

    2016-01-01

    Full Text Available Considering the security of both the customers’ hosts and the eShops’ servers, we introduce the idea of a key-insulated undetachable digital signature, enabling mobile agents to generate undetachable digital signatures on remote hosts with the key-insulated property of the original signer’s signing key. From the theoretical perspective, we provide the formal definition and security notion of a key-insulated undetachable digital signature. From the practical perspective, we propose a concrete scheme to secure mobile agents in electronic commerce. The scheme is mainly focused on protecting the signing key from leakage and preventing the misuse of the signature algorithm on malicious servers. Agents do not carry the signing key when they generate digital signatures on behalf of the original signer, so the key is protected on remote servers. Furthermore, if a hacker gains the signing key of the original signer, the hacker is still unable to forge a signature for any time period other than the key being accessed. In addition, the encrypted function is combined with the original signer’s requirement to prevent the misuse of signing algorithm. The scheme is constructed on gap Diffie–Hellman groups with provable security, and the performance testing indicates that the scheme is efficient.

  5. Adaptive Digital Signature Design and Short-Data-Record Adaptive Filtering

    National Research Council Canada - National Science Library

    Pados, Dimitiris A

    2008-01-01

    This report covers the research performed to create and develop a digital signature design analysis and development methodology that will support robust multi-user communications in rapidly changing environments...

  6. An in fiber experimental approach to photonic quantum digital signatures that does not require quantum memory

    Science.gov (United States)

    Collins, Robert J.; Donaldon, Ross J.; Dunjko, Vedran; Wallden, Petros; Clarke, Patrick J.; Andersson, Erika; Jeffers, John; Buller, Gerald S.

    2014-10-01

    Classical digital signatures are commonly used in e-mail, electronic financial transactions and other forms of electronic communications to ensure that messages have not been tampered with in transit, and that messages are transferrable. The security of commonly used classical digital signature schemes relies on the computational difficulty of inverting certain mathematical functions. However, at present, there are no such one-way functions which have been proven to be hard to invert. With enough computational resources certain implementations of classical public key cryptosystems can be, and have been, broken with current technology. It is nevertheless possible to construct information-theoretically secure signature schemes, including quantum digital signature schemes. Quantum signature schemes can be made information theoretically secure based on the laws of quantum mechanics, while classical comparable protocols require additional resources such as secret communication and a trusted authority. Early demonstrations of quantum digital signatures required quantum memory, rendering them impractical at present. Our present implementation is based on a protocol that does not require quantum memory. It also uses the new technique of unambiguous quantum state elimination, Here we report experimental results for a test-bed system, recorded with a variety of different operating parameters, along with a discussion of aspects of the system security.

  7. Security Analysis of Randomize-Hash-then-Sign Digital Signatures

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Knudsen, Lars Ramkilde

    2012-01-01

    At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the security of digital signature algorithms based on these constructions. They showed that the security of signature schemes based on the two randomized hash function modes relies on properties similar...... functions, such as for the Davies-Meyer construction used in the popular hash functions such as MD5 designed by Rivest and the SHA family of hash functions designed by the National Security Agency (NSA), USA and published by NIST in the Federal Information Processing Standards (FIPS). We show an online...... 800-106. We discuss some important applications of our attacks and discuss their applicability on signature schemes based on hash functions with ‘built-in’ randomization. Finally, we compare our attacks on randomize-hash-then-sign schemes with the generic forgery attacks on the standard hash...

  8. An Enhanced Data Integrity Model In Mobile Cloud Environment Using Digital Signature Algorithm And Robust Reversible Watermarking

    Directory of Open Access Journals (Sweden)

    Boukari Souley

    2017-10-01

    Full Text Available the increase use of hand held devices such as smart phones to access multimedia content in the cloud is increasing with rise and growth in information technology. Mobile cloud computing is increasingly used today because it allows users to have access to variety of resources in the cloud such as image video audio and software applications with minimal usage of their inbuilt resources such as storage memory by using the one available in the cloud. The major challenge faced with mobile cloud computing is security. Watermarking and digital signature are some techniques used to provide security and authentication on user data in the cloud. Watermarking is a technique used to embed digital data within a multimedia content such as image video or audio in order to prevent authorized access to those content by intruders whereas digital signature is used to identify and verify user data when accessed. In this work we implemented digital signature and robust reversible image watermarking in order enhance mobile cloud computing security and integrity of data by providing double authentication techniques. The results obtained show the effectiveness of combining the two techniques robust reversible watermarking and digital signature by providing strong authentication to ensures data integrity and extract the original content watermarked without changes.

  9. Implementation of QR Code and Digital Signature to Determine the Validity of KRS and KHS Documents

    Directory of Open Access Journals (Sweden)

    Fatich Fazlur Rochman

    2017-05-01

    Full Text Available Universitas Airlangga students often find it difficult to verify the mark that came out in the Kartu Hasil Studi (KHS is called Study Result Card or courses taken in the Kartu Rencana Studi (KRS is called Study Plan Card, if there are changes to the data on the system used Universitas Airlangga. This complicated KRS and KHS verification process happened because the KRS and KHS documents that owned by student is easier to counterfeit than the data in the system. Implementation digital signature and QR Code technology as a solution that can prove the validity of KRS or KHS. The KRS and KHS validation system developed by Digital Signature and QR Code. QR Code is a type of matrix code that was developed as a code that allows its contents to be decoded at high speed while the Digital Signature has a function as a marker on the data to ensure that the data is the original data. The verification process was divided into two types are reading the Digital Signature and printing document that works by scanning the data from QR Code. The application of the system is carried out were the addition of the QR Code on KRS and KHS, required a readiness of human resources. 

  10. Basis for the implementation of digital signature in Argentine's health environment

    International Nuclear Information System (INIS)

    Escobar, P P; Formica, M

    2007-01-01

    The growth of telemedical applications and electronic transactions in health environments is paced by the constant technology evolution. This implies a big cultural change in traditional medicine and in hospital information systems' users which arrival is delayed, basically, by the lack of solid laws and a well defined role-based infrastructure. The use of digital signature as a mean of identification, authentication, confidentiality and non-repudiation is the most suitable tool for assuring the electronic transactions and patient's data protection. The implementation of a Public Key Infrastructure (PKI) in health environment allows for authentication, encryption and use of digital signature for assuring confidentiality and control of the movement of sensitive information. This work defines the minimum technological, legal and procedural basis for a successful PKI implementation and establishes the roles for the different actors in the chain of confidence in the public health environment of Argentine

  11. Personal Identification and the Assessment of the Psychophysiological State While Writing a Signature

    Directory of Open Access Journals (Sweden)

    Pavel Lozhnikov

    2015-08-01

    Full Text Available This article discusses the problem of user identification and psychophysiological state assessment while writing a signature using a graphics tablet. The solution of the problem includes the creation of templates containing handwriting signature features simultaneously with the hidden registration of physiological parameters of a person being tested. Heart rate variability description in the different time points is used as a physiological parameter. As a result, a signature template is automatically generated for psychophysiological states of an identified person. The problem of user identification and psychophysiological state assessment is solved depending on the registered value of a physiological parameter.

  12. Design And Implementation of Low Area/Power Elliptic Curve Digital Signature Hardware Core

    Directory of Open Access Journals (Sweden)

    Anissa Sghaier

    2017-06-01

    Full Text Available The Elliptic Curve Digital Signature Algorithm(ECDSA is the analog to the Digital Signature Algorithm(DSA. Based on the elliptic curve, which uses a small key compared to the others public-key algorithms, ECDSA is the most suitable scheme for environments where processor power and storage are limited. This paper focuses on the hardware implementation of the ECDSA over elliptic curveswith the 163-bit key length recommended by the NIST (National Institute of Standards and Technology. It offers two services: signature generation and signature verification. The proposed processor integrates an ECC IP, a Secure Hash Standard 2 IP (SHA-2 Ip and Random Number Generator IP (RNG IP. Thus, all IPs will be optimized, and different types of RNG will be implemented in order to choose the most appropriate one. A co-simulation was done to verify the ECDSA processor using MATLAB Software. All modules were implemented on a Xilinx Virtex 5 ML 50 FPGA platform; they require respectively 9670 slices, 2530 slices and 18,504 slices. FPGA implementations represent generally the first step for obtaining faster ASIC implementations. Further, the proposed design was also implemented on an ASIC CMOS 45-nm technology; it requires a 0.257 mm2 area cell achieving a maximum frequency of 532 MHz and consumes 63.444 (mW. Furthermore, in this paper, we analyze the security of our proposed ECDSA processor against the no correctness check for input points and restart attacks.

  13. A Fast lattice-based polynomial digital signature system for m-commerce

    Science.gov (United States)

    Wei, Xinzhou; Leung, Lin; Anshel, Michael

    2003-01-01

    The privacy and data integrity are not guaranteed in current wireless communications due to the security hole inside the Wireless Application Protocol (WAP) version 1.2 gateway. One of the remedies is to provide an end-to-end security in m-commerce by applying application level security on top of current WAP1.2. The traditional security technologies like RSA and ECC applied on enterprise's server are not practical for wireless devices because wireless devices have relatively weak computation power and limited memory compared with server. In this paper, we developed a lattice based polynomial digital signature system based on NTRU's Polynomial Authentication and Signature Scheme (PASS), which enabled the feasibility of applying high-level security on both server and wireless device sides.

  14. Model of informational system for freight insurance automation based on digital signature

    OpenAIRE

    Maxim E. SLOBODYANYUK

    2009-01-01

    In the article considered a model of informational system for freight insurance automation based on digital signature, showed architecture, macro flowchart of information flow in model, components (modules) and their functions. Described calculation method of costs on interactive cargo insurance via proposed system, represented main characteristics and options of existing transport management systems, conceptual cost models.

  15. Model of informational system for freight insurance automation based on digital signature

    Directory of Open Access Journals (Sweden)

    Maxim E. SLOBODYANYUK

    2009-01-01

    Full Text Available In the article considered a model of informational system for freight insurance automation based on digital signature, showed architecture, macro flowchart of information flow in model, components (modules and their functions. Described calculation method of costs on interactive cargo insurance via proposed system, represented main characteristics and options of existing transport management systems, conceptual cost models.

  16. Exploring the Role of In-Person Components for Online Health Behavior Change Interventions: Can a Digital Person-to-Person Component Suffice?

    Science.gov (United States)

    Santarossa, Sara; Kane, Deborah; Senn, Charlene Y; Woodruff, Sarah J

    2018-04-11

    The growth of the digital environment provides tremendous opportunities to revolutionize health behavior change efforts. This paper explores the use of Web-based, mobile, and social media health behavior change interventions and determines whether there is a need for a face-to-face or an in-person component. It is further argued that that although in-person components can be beneficial for online interventions, a digital person-to-person component can foster similar results while dealing with challenges faced by traditional intervention approaches. Using a digital person-to-person component is rooted in social and behavioral theories such as the theory of reasoned action, and the social cognitive theory, and further justified by the human support constructs of the model of supportive accountability. Overall, face-to-face and online behavior change interventions have their respective advantages and disadvantages and functions, yet both serve important roles. It appears that it is in fact human support that is the most important component in the effectiveness and adherence of both face-to-face and online behavior change interventions, and thoughtfully introducing a digital person-to-person component, to replace face-to-face interactions, can provide the needed human support while diminishing the barriers of in-person meetings. The digital person-to-person component must create accountability, generate opportunities for tailored feedback, and create social support to successfully create health behavior change. As the popularity of the online world grows, and the interest in using the digital environment for health behavior change interventions continues to be embraced, further research into not only the use of online interventions, but the use of a digital person-to-person component, must be explored. ©Sara Santarossa, Deborah Kane, Charlene Y Senn, Sarah J Woodruff. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 11.04.2018.

  17. Generation of a Skeleton Corpus of Digital Objects for the Validation and Evaluation of Format Identification Tools and Signatures

    Directory of Open Access Journals (Sweden)

    Ross Spencer

    2013-06-01

    Full Text Available To preserve digital information it is vital that the format of that information can be identified, in-perpetuity. This is the major focus of research within the field of Digital Preservation. The National Archives of the UK called for the Digital Preservation and Digital Curation communities to develop a test corpus of digital objects to help further develop tools to aid this purpose. Following that call, an attempt has been made to develop the suite.This paper initially outlines a methodology to generate a skeleton corpus using simple user-generated digital objects. It then explores the lessons learnt in the generation of a corpus using scripting language techniques from the file format signatures described in The National Archives PRONOM technical registry. It will also discuss the use of the digital signature for this purpose, the benefits of developing a test corpus using this technique. Finally, this paper will outline a methodology for future research before exploring how the community can best make use of the output of this project and how this project needs to be taken forward to completion.

  18. Assuring image authenticity within a data grid using lossless digital signature embedding and a HIPAA-compliant auditing system

    Science.gov (United States)

    Lee, Jasper C.; Ma, Kevin C.; Liu, Brent J.

    2008-03-01

    A Data Grid for medical images has been developed at the Image Processing and Informatics Laboratory, USC to provide distribution and fault-tolerant storage of medical imaging studies across Internet2 and public domain. Although back-up policies and grid certificates guarantee privacy and authenticity of grid-access-points, there still lacks a method to guarantee the sensitive DICOM images have not been altered or corrupted during transmission across a public domain. This paper takes steps toward achieving full image transfer security within the Data Grid by utilizing DICOM image authentication and a HIPAA-compliant auditing system. The 3-D lossless digital signature embedding procedure involves a private 64 byte signature that is embedded into each original DICOM image volume, whereby on the receiving end the signature can to be extracted and verified following the DICOM transmission. This digital signature method has also been developed at the IPILab. The HIPAA-Compliant Auditing System (H-CAS) is required to monitor embedding and verification events, and allows monitoring of other grid activity as well. The H-CAS system federates the logs of transmission and authentication events at each grid-access-point and stores it into a HIPAA-compliant database. The auditing toolkit is installed at the local grid-access-point and utilizes Syslog [1], a client-server standard for log messaging over an IP network, to send messages to the H-CAS centralized database. By integrating digital image signatures and centralized logging capabilities, DICOM image integrity within the Medical Imaging and Informatics Data Grid can be monitored and guaranteed without loss to any image quality.

  19. Personal Sports Branding in the Digital Age: The Case of Zlatan Ibrahimovic

    OpenAIRE

    Samoylina, Ekaterina

    2015-01-01

    The rise of digital media has caused transformations and new phenomena in different fields. In the digital age such branches as personal sports branding and nation branding has acquired new opportunities for development. The research focuses on representation of the personal sports brand of Zlatan Ibrahimovic on digital media platforms and its connection to the nation brand of Sweden. Previous research deals with existing studies on personal branding, personal sports branding in digital media...

  20. Personal Digital Branding as a Professional Asset in the Digital Age.

    Science.gov (United States)

    Kleppinger, Courtney A; Cain, Jeff

    2015-08-25

    In recent years, society's rapid adoption of social media has made the boundary between professional and private life nearly indistinguishable. The literature provides guidance on how to demonstrate professionalism via social media platforms. Social media policies within health professions education tend to be legalistic in nature, serving primarily to highlight behaviors students should avoid. One missing element in social media literature is the concept of online invisibility. In this paper, we define personal digital branding, discuss the professional implications of choosing to abstain from social media use, and urge educators to recognize that the personal digital branding may be an emerging asset for young professionals in the twenty-first century.

  1. 78 FR 43145 - Announcing Approval of Federal Information Processing Standard 186-4, Digital Signature Standard

    Science.gov (United States)

    2013-07-19

    ...-01] Announcing Approval of Federal Information Processing Standard 186-4, Digital Signature Standard.... SUMMARY: This notice announces the Secretary of Commerce's approval of Federal Information Processing... changes are effective on July 19, 2013. FOR FURTHER INFORMATION CONTACT: Elaine Barker (301) 975-2911...

  2. On Randomizing Hash Functions to Strengthen the Security of Digital Signatures

    DEFF Research Database (Denmark)

    Halevi and Krawczyk proposed a message randomization algorithm called RMX as a front-end tool to the hash-then-sign digital signature schemes such as DSS and RSA in order to free their reliance on the collision resistance property of the hash functions. They have shown that to forge a RMX-hash-th...... that use Davies-Meyer schemes and a variant of RMX published by NIST in its Draft Special Publication (SP) 800-106. We discuss some important applications of our attack....

  3. On randomizing hash functions to strengthen the security of digital signatures

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Knudsen, Lars Ramkilde

    2009-01-01

    Halevi and Krawczyk proposed a message randomization algorithm called RMX as a front-end tool to the hash-then-sign digital signature schemes such as DSS and RSA in order to free their reliance on the collision resistance property of the hash functions. They have shown that to forge a RMX-hash-th...... schemes that use Davies-Meyer schemes and a variant of RMX published by NIST in its Draft Special Publication (SP) 800-106. We discuss some important applications of our attack....

  4. Personal Digital Branding as a Professional Asset in the Digital Age

    Science.gov (United States)

    Kleppinger, Courtney A.

    2015-01-01

    In recent years, society’s rapid adoption of social media has made the boundary between professional and private life nearly indistinguishable. The literature provides guidance on how to demonstrate professionalism via social media platforms. Social media policies within health professions education tend to be legalistic in nature, serving primarily to highlight behaviors students should avoid. One missing element in social media literature is the concept of online invisibility. In this paper, we define personal digital branding, discuss the professional implications of choosing to abstain from social media use, and urge educators to recognize that the personal digital branding may be an emerging asset for young professionals in the twenty-first century. PMID:26430266

  5. MyLibrary: A Web Personalized Digital Library.

    Science.gov (United States)

    Rocha, Catarina; Xexeo, Geraldo; da Rocha, Ana Regina C.

    With the increasing availability of information on Internet information providers, like search engines, digital libraries and online databases, it becomes more important to have personalized systems that help users to find relevant information. One type of personalization that is growing in use is recommender systems. This paper presents…

  6. 2nd German-Japanese Workshop on Digital Signatures 1999: ATR (Advanced Telecommunications Research Institute International), Kyoto, 21st/22nd of September, 1999

    OpenAIRE

    Thielmann, H.; Mennicken, J.-B.

    2000-01-01

    This report contains the proceedings of a second German-Japanese Workshop on digital signatures held in Kyoto, September 21./22. 1999. The workshop aimed at legal, technical and economic aspects of digital signatures as a means to promote electronic commerce. Special attention was devoted to Identification and classification of requirements on the technical platform and requirements for international interoperability, Identification of legal requirements and other social environments that nee...

  7. Soldier Flexible Personal Digital Assistant Program

    National Research Council Canada - National Science Library

    Price, Mark; Woytowich, Jason; Carlson, Marc

    2008-01-01

    The main goal of the Soldier Flexible Personal Digital Assistant Program was to develop prototypes of a novel flexible display technology device for demonstration in a laboratory setting and use in Future Force Warrior (FFW) demonstrations...

  8. Application of Modified Digital Halftoning Techniques to Data Hiding in Personalized Stamps

    Institute of Scientific and Technical Information of China (English)

    Hsi-Chun Wang; Chi-Ming Lian; Pei-Chi Hsiao

    2004-01-01

    The objective of this research is to embed information in personalized stamps by modified digital halftoning techniques. The displaced and deformed halftone dots are used to encode data in the personalized stamps. Hidden information can be retrieved by either an optical decoder or digital image processing techniques.The results show that personalized stamps with value-added features like data hiding or digital watermarking can be successfully implemented.

  9. Development of multigene expression signature maps at the protein level from digitized immunohistochemistry slides.

    Directory of Open Access Journals (Sweden)

    Gregory J Metzger

    Full Text Available Molecular classification of diseases based on multigene expression signatures is increasingly used for diagnosis, prognosis, and prediction of response to therapy. Immunohistochemistry (IHC is an optimal method for validating expression signatures obtained using high-throughput genomics techniques since IHC allows a pathologist to examine gene expression at the protein level within the context of histologically interpretable tissue sections. Additionally, validated IHC assays may be readily implemented as clinical tests since IHC is performed on routinely processed clinical tissue samples. However, methods have not been available for automated n-gene expression profiling at the protein level using IHC data. We have developed methods to compute expression level maps (signature maps of multiple genes from IHC data digitized on a commercial whole slide imaging system. Areas of cancer for these expression level maps are defined by a pathologist on adjacent, co-registered H&E slides, allowing assessment of IHC statistics and heterogeneity within the diseased tissue. This novel way of representing multiple IHC assays as signature maps will allow the development of n-gene expression profiling databases in three dimensions throughout virtual whole organ reconstructions.

  10. Unconditionally Secure Quantum Signatures

    Directory of Open Access Journals (Sweden)

    Ryan Amiri

    2015-08-01

    Full Text Available Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols—signatures based on the Rivest–Adleman–Shamir (RSA algorithm, the digital signature algorithm (DSA, and the elliptic curve digital signature algorithm (ECDSA—are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally securesecure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  11. Concierge: Personal database software for managing digital research resources

    Directory of Open Access Journals (Sweden)

    Hiroyuki Sakai

    2007-11-01

    Full Text Available This article introduces a desktop application, named Concierge, for managing personal digital research resources. Using simple operations, it enables storage of various types of files and indexes them based on content descriptions. A key feature of the software is a high level of extensibility. By installing optional plug-ins, users can customize and extend the usability of the software based on their needs. In this paper, we also introduce a few optional plug-ins: literaturemanagement, electronic laboratory notebook, and XooNlps client plug-ins. XooNIps is a content management system developed to share digital research resources among neuroscience communities. It has been adopted as the standard database system in Japanese neuroinformatics projects. Concierge, therefore, offers comprehensive support from management of personal digital research resources to their sharing in open-access neuroinformatics databases such as XooNIps. This interaction between personal and open-access neuroinformatics databases is expected to enhance the dissemination of digital research resources. Concierge is developed as an open source project; Mac OS X and Windows XP versions have been released at the official site (http://concierge.sourceforge.jp.

  12. Controlled sharing of personal content using digital rights management

    NARCIS (Netherlands)

    Conrado, C.; Petkovic, M.; Veen, van der M.; Velde, van der W.H.

    2006-01-01

    This paper describes a system which allows controlled distribution of personal digital content by users. The system extends an existing Digital Rights Management system for the protection of commercial copyrighted content by essentially allowing users to become content providers. This fact, however,

  13. Value of wireless personal digital assistants for practice: perceptions of advanced practice nurses.

    Science.gov (United States)

    Garrett, Bernard; Klein, Gerri

    2008-08-01

    The aims were to explore advanced practice nurses' perceptions on wireless Personal Digital Assistant technologies, to establish the type and range of tools that would be useful to support their practice and to identify any requirements and limitations that may impact the implementation of wireless Personal Digital Assistants in practice. The wireless Personal Digital Assistant is becoming established as a hand-held computing tool for healthcare professionals. The reflections of advanced practice nurses' about the value of wireless Personal Digital Assistants and its potential to contribute to improved patient care has not been investigated. A qualitative interpretivist design was used to explore advanced practice nurses' perceptions on the value of wireless Personal Digital Assistant technologies to support their practice. The data were collected using survey questionnaires and individual and focus group interviews with nurse practitioners, clinical nurse specialists and information technology managers based in British Columbia, Canada. An open-coding content analysis was performed using qualitative data analysis software. Wireless Personal Digital Assistant's use supports the principles of pervasivity and is a technology rapidly being adopted by advanced practice nurses. Some nurses indicated a reluctance to integrate wireless Personal Digital Assistant technologies into their practices because of the cost and the short technological life cycle of these devices. Many of the barriers which precluded the use of wireless networks within facilities are being removed. Nurses demonstrated a complex understanding of wireless Personal Digital Assistant technologies and gave good rationales for its integration in their practice. Nurses identified improved client care as the major benefit of this technology in practice and the type and range of tools they identified included clinical reference tools such as drug and diagnostic/laboratory reference applications and wireless

  14. HYBRID CHRIPTOGRAPHY STREAM CIPHER AND RSA ALGORITHM WITH DIGITAL SIGNATURE AS A KEY

    Directory of Open Access Journals (Sweden)

    Grace Lamudur Arta Sihombing

    2017-03-01

    Full Text Available Confidentiality of data is very important in communication. Many cyber crimes that exploit security holes for entry and manipulation. To ensure the security and confidentiality of the data, required a certain technique to encrypt data or information called cryptography. It is one of the components that can not be ignored in building security. And this research aimed to analyze the hybrid cryptography with symmetric key by using a stream cipher algorithm and asymmetric key by using RSA (Rivest Shamir Adleman algorithm. The advantages of hybrid cryptography is the speed in processing data using a symmetric algorithm and easy transfer of key using asymmetric algorithm. This can increase the speed of transaction processing data. Stream Cipher Algorithm using the image digital signature as a keys, that will be secured by the RSA algorithm. So, the key for encryption and decryption are different. Blum Blum Shub methods used to generate keys for the value p, q on the RSA algorithm. It will be very difficult for a cryptanalyst to break the key. Analysis of hybrid cryptography stream cipher and RSA algorithms with digital signatures as a key, indicates that the size of the encrypted file is equal to the size of the plaintext, not to be larger or smaller so that the time required for encryption and decryption process is relatively fast.

  15. A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents

    Science.gov (United States)

    Kabir, Muhammad N.; Alginahi, Yasser M.

    2014-01-01

    This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. Such issues were largely addressed in the literature for images, audio, and video, with only a few papers addressing the challenge of sensitive plain-text media under known constraints. Specifically, with text as the predominant online communication medium, it becomes crucial that techniques are deployed to protect such information. A number of digital-signature, hashing, and watermarking schemes have been proposed that essentially bind source data or embed invisible data in a cover media to achieve its goal. While many such complex schemes with resource redundancies are sufficient in offline and less-sensitive texts, this paper proposes a hybrid approach based on zero-watermarking and digital-signature-like manipulations for sensitive text documents in order to achieve content originality and integrity verification without physically modifying the cover text in anyway. The proposed algorithm was implemented and shown to be robust against undetected content modifications and is capable of confirming proof of originality whilst detecting and locating deliberate/nondeliberate tampering. Additionally, enhancements in resource utilisation and reduced redundancies were achieved in comparison to traditional encryption-based approaches. Finally, analysis and remarks are made about the current state of the art, and future research issues are discussed under the given constraints. PMID:25254247

  16. A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents

    Directory of Open Access Journals (Sweden)

    Omar Tayan

    2014-01-01

    Full Text Available This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. Such issues were largely addressed in the literature for images, audio, and video, with only a few papers addressing the challenge of sensitive plain-text media under known constraints. Specifically, with text as the predominant online communication medium, it becomes crucial that techniques are deployed to protect such information. A number of digital-signature, hashing, and watermarking schemes have been proposed that essentially bind source data or embed invisible data in a cover media to achieve its goal. While many such complex schemes with resource redundancies are sufficient in offline and less-sensitive texts, this paper proposes a hybrid approach based on zero-watermarking and digital-signature-like manipulations for sensitive text documents in order to achieve content originality and integrity verification without physically modifying the cover text in anyway. The proposed algorithm was implemented and shown to be robust against undetected content modifications and is capable of confirming proof of originality whilst detecting and locating deliberate/nondeliberate tampering. Additionally, enhancements in resource utilisation and reduced redundancies were achieved in comparison to traditional encryption-based approaches. Finally, analysis and remarks are made about the current state of the art, and future research issues are discussed under the given constraints.

  17. 17 CFR 12.12 - Signature.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Signature. 12.12 Section 12.12... General Information and Preliminary Consideration of Pleadings § 12.12 Signature. (a) By whom. All... document on behalf of another person. (b) Effect. The signature on any document of any person acting either...

  18. Re-examining the security of blind quantum signature protocols

    International Nuclear Information System (INIS)

    Wang Mingming; Chen Xiubo; Niu Xinxin; Yang Yixian

    2012-01-01

    Recently, blind quantum signature (BQS) protocols have been proposed with the help of a third-party verifier. However, our research shows that some of the BQS protocols are unable to complete the blind signature task fairly if the verifier is dishonest. Indeed, these protocols can be viewed as variants of the classical digital signature scheme of symmetric-key cryptography. If nobody is trusted in such protocols, digital signature cannot be implemented since disagreements cannot be solved fairly.

  19. Nurses' satisfaction with use of a personal digital assistants with a mobile nursing information system in China.

    Science.gov (United States)

    Shen, Li-Qiong; Zang, Xiao-Ying; Cong, Ji-Yan

    2018-04-01

    Personal digital assistants, technology with various functions, have been applied in international clinical practice. Great benefits in reducing medical errors and enhancing the efficiency of clinical work have been achieved, but little research has investigated nurses' satisfaction with the use of personal digital assistants. To investigate nurses' satisfaction with use of personal digital assistants, and to explore the predictors of this. This is a cross-sectional descriptive study. We conducted a cross-sectional survey targeting nurses who used personal digital assistants in a comprehensive tertiary hospital in Beijing. A total of 383 nurses were recruited in this survey in 2015. The total score of nurses' satisfaction with use of personal digital assistants was 238.91 (SD 39.25). Nurses were less satisfied with the function of documentation, compared with the function of administering medical orders. The time length of using personal digital assistants, academic degree, and different departments predicted nurses' satisfaction towards personal digital assistant use (all P < 0.05). Nurses were satisfied with the accuracy of administering medical orders and the safety of recording data. The stability of the wireless network and efficiency related to nursing work were less promising. To some extent, nurses with higher education and longer working time with personal digital assistants were more satisfied with them. © 2018 John Wiley & Sons Australia, Ltd.

  20. Personalized direct marketing using digital publishing

    Science.gov (United States)

    Kutty, Cheeniyil L.; Prabhakaran, Jayasree K.

    2006-02-01

    In today's cost-conscious business climate, marketing and customer service decision makers are increasingly concerned with how to increase customer response and retention rates. Companies spend large amounts of money on Customer Relationship Management (CRM) solutions and data acquisition but they don't know how to use the information stored in these systems to improve the effectiveness of their direct marketing campaigns. By leveraging the customer information they already have, companies can create personalized, printed direct mail programs that generate high response rates, greater returns, and stronger customer loyalty, while gaining a significant edge over their competitors. To reach the promised land of one-to-one direct marketing (personalized direct marketing - PDM), companies need an end-to-end solution for creating, managing, printing, and distributing personalized direct mail "on demand." Having access to digital printing is just one piece of the solution. A more complete approach includes leveraging personalization technology into a useful direct marketing tool that provides true one-to-one marketing, allowing variable images and text in a personalized direct mail. This paper discusses integration of CRM with a Print-on-Demand solution so as to create truly personalized printed marketing campaigns for one or many individuals based on the profile information, preferences and purchase history stored in the CRM.

  1. Implementation of RSA 2048-bit and AES 256-bit with Digital Signature for Secure Electronic Health Record Application

    Directory of Open Access Journals (Sweden)

    Mohamad Ali Sadikin

    2016-10-01

    Full Text Available This research addresses the implementation of encryption and digital signature technique for electronic health record to prevent cybercrime such as robbery, modification and unauthorised access. In this research, RSA 2048-bit algorithm, AES 256-bit and SHA 256 will be implemented in Java programming language. Secure Electronic Health Record Information (SEHR application design is intended to combine given services, such as confidentiality, integrity, authentication, and nonrepudiation. Cryptography is used to ensure the file records and electronic documents for detailed information on the medical past, present and future forecasts that have been given only to the intended patients. The document will be encrypted using an encryption algorithm based on NIST Standard. In the application, there are two schemes, namely the protection and verification scheme. This research uses black-box testing and whitebox testing to test the software input, output, and code without testing the process and design that occurs in the system.We demonstrated the implementation of cryptography in SEHR. The implementation of encryption and digital signature in this research can prevent archive thievery.

  2. Signature Schemes Secure against Hard-to-Invert Leakage

    DEFF Research Database (Denmark)

    Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus

    2012-01-01

    of the secret key. As a second contribution, we construct a signature scheme that achieves security for random messages assuming that the adversary is given a polynomial-time hard to invert function. Here, polynomial-hardness is required even when given the entire public-key – so called weak auxiliary input......-theoretically reveal the entire secret key. In this work, we propose the first constructions of digital signature schemes that are secure in the auxiliary input model. Our main contribution is a digital signature scheme that is secure against chosen message attacks when given an exponentially hard-to-invert function...... security. We show that such signature schemes readily give us auxiliary input secure identification schemes...

  3. Quantum multi-signature protocol based on teleportation

    International Nuclear Information System (INIS)

    Wen Xiao-jun; Liu Yun; Sun Yu

    2007-01-01

    In this paper, a protocol which can be used in multi-user quantum signature is proposed. The scheme of signature and verification is based on the correlation of Greenberger-Horne-Zeilinger (GHZ) states and the controlled quantum teleportation. Different from the digital signatures, which are based on computational complexity, the proposed protocol has perfect security in the noiseless quantum channels. Compared to previous quantum signature schemes, this protocol can verify the signature independent of an arbitrator as well as realize multi-user signature together. (orig.)

  4. Personal Digital Information Archiving among Students of Social Sciences and Humanities

    Science.gov (United States)

    Krtalic, Maja; Marcetic, Hana; Micunovic, Milijana

    2016-01-01

    Introduction: As both academic citizens and active participants in information society who use information, students produce huge amounts of personal digital data and documents. It is therefore important to raise questions about their awareness, responsibility, tendencies and activities they undertake to preserve their collective digital heritage.…

  5. Analysis of Personal Digital Library and MyLibrary%"Personal Digital Library"与"MyLibrary"辨析

    Institute of Scientific and Technical Information of China (English)

    秦飞飞

    2011-01-01

    学术界一些研究者认为"Personal Digital Library"与"MyLibrary"均可指个人数字图书馆.然而,两者是不同概念、特征及功能的事物.论文对两者的概念、研究现状及趋势作了详细的论述,旨在揭示这两种事物,为后续研究者提供借鉴.

  6. Electronic Signature (eSig)

    Data.gov (United States)

    Department of Veterans Affairs — Beginning with the Government Paperwork Elimination Act of 1998 (GPEA), the Federal government has encouraged the use of electronic / digital signatures to enable...

  7. Temporal digital subtraction radiography with a personal computer digital workstation

    International Nuclear Information System (INIS)

    Kircos, L.; Holt, W.; Khademi, J.

    1990-01-01

    Technique have been developed and implemented on a personal computer (PC)-based digital workstation to accomplish temporal digital subtraction radiography (TDSR). TDSR is useful in recording radiologic change over time. Thus, this technique is useful not only for monitoring chronic disease processes but also for monitoring the temporal course of interventional therapies. A PC-based digital workstation was developed on a PC386 platform with add-in hardware and software. Image acquisition, storage, and processing was accomplished using 512 x 512 x 8- or 12-bit frame grabber. Software and hardware were developed to accomplish image orientation, registration, gray scale compensation, subtraction, and enhancement. Temporal radiographs of the jaws were made in a fixed and reproducible orientation between the x-ray source and image receptor enabling TDSR. Temporal changes secondary to chronic periodontal disease, osseointegration of endosseous implants, and wound healing were demonstrated. Use of TDSR for chest imaging was also demonstrated with identification of small, subtle focal masses that were not apparent with routine viewing. The large amount of radiologic information in images of the jaws and chest may obfuscate subtle changes that TDSR seems to identify. TDSR appears to be useful as a tool to record temporal and subtle changes in radiologic images

  8. Digital Technologies Supporting Person-Centered Integrated Care - A Perspective.

    Science.gov (United States)

    Øvretveit, John

    2017-09-25

    Shared electronic health and social care records in some service systems are already showing some of the benefits of digital technology and digital data for integrating health and social care. These records are one example of the beginning "digitalisation" of services that gives a glimpse of the potential of digital technology and systems for building coordinated and individualized integrated care. Yet the promise has been greater than the benefits, and progress has been slow compared to other industries. This paper describes for non-technical readers how information technology was used to support integrated care schemes in six EU services, and suggests practical ways forward to use the new opportunities to build person-centered integrated care.

  9. Open source platform Digital Personal Assistant

    OpenAIRE

    Usachev, Denis; Khusnutdinov, Azat; Mazzara, Manuel; Khan, Adil; Panchenko, Ivan

    2018-01-01

    Nowadays Digital Personal Assistants (DPA) become more and more popular. DPAs help to increase quality of life especially for elderly or disabled people. In this paper we develop an open source DPA and smart home system as a 3-rd party extension to show the functionality of the assistant. The system is designed to use the DPA as a learning platform for engineers to provide them with the opportunity to create and test their own hypothesis. The DPA is able to recognize users' commands in natura...

  10. Evaluating a Personal Learning Environment for Digital Storytelling

    Directory of Open Access Journals (Sweden)

    Nikolaos Marianos

    2011-10-01

    Full Text Available The evaluation of flexible and personal learning environments is extremely challenging. It should not be limited to the assessment of products, but should address the quality of educative experience with close monitoring. The evaluation of a PLE using digital storytelling is even more complicated, due to the unpredictability of the usage scenarios. This paper presents an evaluation methodology for PLEs using digital storytelling, using a participatory design approach. The results from an open validation trial indicate that this methodology is able to incorporate all necessary factors and that the selected evaluation tools are appropriate for addressing the quality of educative experience.

  11. User Evaluation of a Soldier Flexible Display Personal Digital Assistant

    National Research Council Canada - National Science Library

    Sampson, James B; Boynton, Angela C; Mitchell, K. B; Magnifico, Dennis S; DuPont, Frederick J

    2008-01-01

    The U.S. Army Natick Soldier Research, Development and Engineering Center and U.S. Army Research Laboratory, Human Research and Engineering Directorate conducted an evaluation of a Soldier Flexible Display Personal Digital Assistant...

  12. Analysis of signature wrapping attacks and countermeasures

    DEFF Research Database (Denmark)

    Gajek, Sebastian; Jensen, Meiko; Liao, Lijun

    2009-01-01

    In recent research it turned out that Boolean verification, of digital signatures in the context of WSSecurity, is likely to fail: If parts of a SOAP message, are signed and the signature verification applied to, the whole document returns true, then nevertheless the, document may have been...

  13. The effects of extrinsic motivation on signature authorship opinions in forensic signature blind trials.

    Science.gov (United States)

    Dewhurst, Tahnee N; Found, Bryan; Ballantyne, Kaye N; Rogers, Doug

    2014-03-01

    Expertise studies in forensic handwriting examination involve comparisons of Forensic Handwriting Examiners' (FHEs) opinions with lay-persons on blind tests. All published studies of this type have reported real and demonstrable skill differences between the specialist and lay groups. However, critics have proposed that any difference shown may be indicative of a lack of motivation on the part of lay participants, rather than a real difference in skill. It has been suggested that qualified FHEs would be inherently more motivated to succeed in blinded validation trials, as their professional reputations could be at risk, should they perform poorly on the task provided. Furthermore, critics suggest that lay-persons would be unlikely to be highly motivated to succeed, as they would have no fear of negative consequences should they perform badly. In an effort to investigate this concern, a blind signature trial was designed and administered to forty lay-persons. Participants were required to compare known (exemplar) signatures of an individual to questioned signatures and asked to express an opinion regarding whether the writer of the known signatures wrote each of the questioned signatures. The questioned signatures comprised a mixture of genuine, disguised and simulated signatures. The forty participants were divided into two separate groupings. Group 'A' were requested to complete the trial as directed and were advised that for each correct answer they would be financially rewarded, for each incorrect answer they would be financially penalized, and for each inconclusive opinion they would receive neither penalty nor reward. Group 'B' was requested to complete the trial as directed, with no mention of financial recompense or penalty. The results of this study do not support the proposition that motivation rather than skill difference is the source of the statistical difference in opinions between individuals' results in blinded signature proficiency trials. Crown

  14. Digital holographic-based cancellable biometric for personal authentication

    International Nuclear Information System (INIS)

    Verma, Gaurav; Sinha, Aloka

    2016-01-01

    In this paper, we propose a new digital holographic-based cancellable biometric scheme for personal authentication and verification. The realization of cancellable biometric is presented by using an optoelectronic experimental approach, in which an optically recorded hologram of the fingerprint of a person is numerically reconstructed. Each reconstructed feature has its own perspective, which is utilized to generate user-specific fingerprint features by using a feature-extraction process. New representations of the user-specific fingerprint features can be obtained from the same hologram, by changing the reconstruction distance (d) by an amount Δd between the recording plane and the reconstruction plane. This parameter is the key to make the cancellable user-specific fingerprint features using a digital holographic technique, which allows us to choose different reconstruction distances when reissuing the user-specific fingerprint features in the event of compromise. We have shown theoretically that each user-specific fingerprint feature has a unique identity with a high discrimination ability, and the chances of a match between them are minimal. In this aspect, a recognition system has also been demonstrated using the fingerprint biometric of the enrolled person at a particular reconstruction distance. For the performance evaluation of a fingerprint recognition system—the false acceptance ratio, the false rejection ratio and the equal error rate are calculated using correlation. The obtained results show good discrimination ability between the genuine and the impostor populations with the highest recognition rate of 98.23%. (paper)

  15. Involving a young person in the development of a digital resource in nurse education.

    Science.gov (United States)

    Fenton, Gaynor

    2014-01-01

    Health policies across western societies have embedded the need for service user and carer perspectives in service design and delivery of educational programmes. There is a growing recognition of the need to include the perspectives of children and young people as service users in the design and delivery of child focused educational programmes. Digital storytelling provides a strategy for student nurses to gain insight into the lived experiences of children and young people. Engaging with these stories enables students to develop an understanding of a young persons' experience of healthcare. This paper outlines a project that developed a digital learning object based upon a young person's experience of cancer and student evaluations of the digital learning object as a teaching and learning strategy. Over 80% of students rated the digital learning object as interesting and were motivated to explore its content. In addition, the evaluation highlighted that listening to the young person's experiences of her treatment regimes was informative and assisted understanding of a patients' perspective of care delivery. Copyright © 2013 Elsevier Ltd. All rights reserved.

  16. Digital Technologies Supporting Person-Centered Integrated Care – A Perspective

    Directory of Open Access Journals (Sweden)

    John Øvretveit

    2017-09-01

    Full Text Available Shared electronic health and social care records in some service systems are already showing some of the benefits of digital technology and digital data for integrating health and social care. These records are one example of the beginning “digitalisation” of services that gives a glimpse of the potential of digital technology and systems for building coordinated and individualized integrated care. Yet the promise has been greater than the benefits, and progress has been slow compared to other industries. This paper describes for non-technical readers how information technology was used to support integrated care schemes in six EU services, and suggests practical ways forward to use the new opportunities to build person-centered integrated care.

  17. Digital Technologies Supporting Person-Centered Integrated Care – A Perspective

    Science.gov (United States)

    2017-01-01

    Shared electronic health and social care records in some service systems are already showing some of the benefits of digital technology and digital data for integrating health and social care. These records are one example of the beginning “digitalisation” of services that gives a glimpse of the potential of digital technology and systems for building coordinated and individualized integrated care. Yet the promise has been greater than the benefits, and progress has been slow compared to other industries. This paper describes for non-technical readers how information technology was used to support integrated care schemes in six EU services, and suggests practical ways forward to use the new opportunities to build person-centered integrated care. PMID:29588629

  18. Cognitive Hacking and Digital Government: Digital Identity

    OpenAIRE

    Paul Thompson

    2004-01-01

    Recently the National Center for Digital Government held a workshop on "The Virtual Citizen: Identity, Autonomy, and Accountability: A Civic Scenario Exploration of the Role of Identity in On-Line. Discussions at the workshop focused on five scenarios for future authentication policies with respect to digital identity. The underlying technologies considered for authentication were: biometrics: cryptography, with a focus on digital signatures; secure processing/computation; and reputation syst...

  19. Comparison of In-Person vs. Digital Climate Education Program

    Science.gov (United States)

    Anderson, R. K.; Flora, J. A.; Saphir, M.

    2017-12-01

    In 2014, ACE (Alliance for Climate Education) evaluated the impact of its 45-minute live climate edutainment education program on the knowledge, attitudes and behavior of high school students with respect to climate change. The results showed gains in knowledge, increased engagement, as well as increased communication about climate change with number of students reporting talking about climate change with friends and family more than doubling. In 2016, ACE launched a digital version of its in-person edutainment education program, a 40-minute video version of the live program. This digital version, Our Climate Our Future (OCOF), has now been used by nearly 4,000 teachers nationwide and viewed by over 150,000 students. We experimentally tested the impact of the digital program (OCOF) compared to the live program and a control group. The experiment was conducted with 709 students in 27 classes at two North Carolina public high schools. Classes were assigned to one of three conditions: digital, live and control. In the digital version, students watched the 40-minute OCOF video featuring the same educator that presented the live program. In the live version, students received an identical 40-minute live presentation by an ACE staff educator The control group received neither treatment. When compared to controls, both programs were effective in positively increasing climate change knowledge, climate justice knowledge, perceived self-efficacy to make climate-friendly behavior changes, and beliefs about climate change (all statistically significant at or above P<.01). In the areas of hope that people can solve climate change and intent to change behavior, only the live program showed significant increases. In these two areas, it may be that an in-person experience is key to affecting change. In light of these positive results, ACE plans to increase the use of OCOF in schools across the country to assist teachers in their efforts to teach about climate change.

  20. Securing Digital Images Integrity using Artificial Neural Networks

    Science.gov (United States)

    Hajji, Tarik; Itahriouan, Zakaria; Ouazzani Jamil, Mohammed

    2018-05-01

    Digital image signature is a technique used to protect the image integrity. The application of this technique can serve several areas of imaging applied to smart cities. The objective of this work is to propose two methods to protect digital image integrity. We present a description of two approaches using artificial neural networks (ANN) to digitally sign an image. The first one is “Direct Signature without learning” and the second is “Direct Signature with learning”. This paper presents the theory of proposed approaches and an experimental study to test their effectiveness.

  1. Digital knowledge in the coat pocket - hand-held personal digital assistants in radiology

    International Nuclear Information System (INIS)

    Niehues, S.M.; Froehlich, M.; Felix, R.; Lemke, A.J.

    2004-01-01

    The personal digital assistant (PDA) enables the independent access to large data in a pocket-sized format. The applications for hand-held computers are growing steadily and can support almost any kind of problem. An overview of the available hardware and software is provided and evaluated. Furthermore, the use of the PDA in the clinical daily routine is described. In view of the numerous software programs available in radiology, the range of software solutions for radiologists is presented. Despite the high acquisition cost, the PDA has already become the digital assistant for the radiologist. After a short time of getting used to the PDA, nobody wants to miss it at work or at home. New technical features and available software programs will continuously increase the integration of the PDA into the medical workflow in the near future. (orig.)

  2. A miRNA Signature for Cognitive Deficits and Alcohol Use Disorder in Persons Living with HIV/AIDS

    Directory of Open Access Journals (Sweden)

    Dorota Wyczechowska

    2017-11-01

    Full Text Available HIV-associated neurocognitive disorders (HAND affects more than half of persons living with HIV-1/AIDS (PLWHA. Identification of biomarkers representing the cognitive status of PLWHA is a critical step for implementation of successful cognitive, behavioral and pharmacological strategies to prevent onset and progression of HAND. However, the presence of co-morbidity factors in PLWHA, the most common being substance abuse, can prevent the identification of such biomarkers. We have optimized a protocol to profile plasma miRNAs using quantitative RT-qPCR and found a miRNA signature with very good discriminatory ability to distinguish PLWHA with cognitive impairment from those without cognitive impairment. Here, we have evaluated this miRNA signature in PLWHA with alcohol use disorder (AUD at LSU Health Sciences Center (LSUHSC. The results show that AUD is a potential confounding factor for the miRNAs associated with cognitive impairment in PLWHA. Furthermore, we have investigated the miRNA signature associated with cognitive impairment in an independent cohort of PLWHA using plasma samples from the CNS HIV Antiretroviral Therapy Effects Research (CHARTER program. Despite differences between the two cohorts in socioeconomic status, AUD, and likely misuse of illicit or prescription drugs, we validated a miRNA signature for cognitive deficits found at LSUHSC in the CHARTER samples.

  3. ESA personal communications and digital audio broadcasting systems based on non-geostationary satellites

    Science.gov (United States)

    Logalbo, P.; Benedicto, J.; Viola, R.

    1993-01-01

    Personal Communications and Digital Audio Broadcasting are two new services that the European Space Agency (ESA) is investigating for future European and Global Mobile Satellite systems. ESA is active in promoting these services in their various mission options including non-geostationary and geostationary satellite systems. A Medium Altitude Global Satellite System (MAGSS) for global personal communications at L and S-band, and a Multiregional Highly inclined Elliptical Orbit (M-HEO) system for multiregional digital audio broadcasting at L-band are described. Both systems are being investigated by ESA in the context of future programs, such as Archimedes, which are intended to demonstrate the new services and to develop the technology for future non-geostationary mobile communication and broadcasting satellites.

  4. Quantum signature scheme for known quantum messages

    International Nuclear Information System (INIS)

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  5. Novel Perspectives on the Characterization of Species-Dependent Optical Signatures of Bacterial Colonies by Digital Holography.

    Directory of Open Access Journals (Sweden)

    Igor Buzalewicz

    Full Text Available The use of light diffraction for the microbiological diagnosis of bacterial colonies was a significant breakthrough with widespread implications for the food industry and clinical practice. We previously confirmed that optical sensors for bacterial colony light diffraction can be used for bacterial identification. This paper is focused on the novel perspectives of this method based on digital in-line holography (DIH, which is able to reconstruct the amplitude and phase properties of examined objects, as well as the amplitude and phase patterns of the optical field scattered/diffracted by the bacterial colony in any chosen observation plane behind the object from single digital hologram. Analysis of the amplitude and phase patterns inside a colony revealed its unique optical properties, which are associated with the internal structure and geometry of the bacterial colony. Moreover, on a computational level, it is possible to select the desired scattered/diffracted pattern within the entire observation volume that exhibits the largest amount of unique, differentiating bacterial features. These properties distinguish this method from the already proposed sensing techniques based on light diffraction/scattering of bacterial colonies. The reconstructed diffraction patterns have a similar spatial distribution as the recorded Fresnel patterns, previously applied for bacterial identification with over 98% accuracy, but they are characterized by both intensity and phase distributions. Our results using digital holography provide new optical discriminators of bacterial species revealed in one single step in form of new optical signatures of bacterial colonies: digital holograms, reconstructed amplitude and phase patterns, as well as diffraction patterns from all observation space, which exhibit species-dependent features. To the best of our knowledge, this is the first report on bacterial colony analysis via digital holography and our study represents an

  6. Novel Perspectives on the Characterization of Species-Dependent Optical Signatures of Bacterial Colonies by Digital Holography.

    Science.gov (United States)

    Buzalewicz, Igor; Kujawińska, Małgorzata; Krauze, Wojciech; Podbielska, Halina

    2016-01-01

    The use of light diffraction for the microbiological diagnosis of bacterial colonies was a significant breakthrough with widespread implications for the food industry and clinical practice. We previously confirmed that optical sensors for bacterial colony light diffraction can be used for bacterial identification. This paper is focused on the novel perspectives of this method based on digital in-line holography (DIH), which is able to reconstruct the amplitude and phase properties of examined objects, as well as the amplitude and phase patterns of the optical field scattered/diffracted by the bacterial colony in any chosen observation plane behind the object from single digital hologram. Analysis of the amplitude and phase patterns inside a colony revealed its unique optical properties, which are associated with the internal structure and geometry of the bacterial colony. Moreover, on a computational level, it is possible to select the desired scattered/diffracted pattern within the entire observation volume that exhibits the largest amount of unique, differentiating bacterial features. These properties distinguish this method from the already proposed sensing techniques based on light diffraction/scattering of bacterial colonies. The reconstructed diffraction patterns have a similar spatial distribution as the recorded Fresnel patterns, previously applied for bacterial identification with over 98% accuracy, but they are characterized by both intensity and phase distributions. Our results using digital holography provide new optical discriminators of bacterial species revealed in one single step in form of new optical signatures of bacterial colonies: digital holograms, reconstructed amplitude and phase patterns, as well as diffraction patterns from all observation space, which exhibit species-dependent features. To the best of our knowledge, this is the first report on bacterial colony analysis via digital holography and our study represents an innovative approach

  7. Research on a New Signature Scheme on Blockchain

    Directory of Open Access Journals (Sweden)

    Chao Yuan

    2017-01-01

    Full Text Available With the rise of Bitcoin, blockchain which is the core technology of Bitcoin has received increasing attention. Privacy preserving and performance on blockchain are two research points in academia and business, but there are still some unresolved issues in both respects. An aggregate signature scheme is a digital signature that supports making signatures on many different messages generated by many different users. Using aggregate signature, the size of the signature could be shortened by compressing multiple signatures into a single signature. In this paper, a new signature scheme for transactions on blockchain based on the aggregate signature was proposed. It was worth noting that elliptic curve discrete logarithm problem and bilinear maps played major roles in our signature scheme. And the security properties of our signature scheme were proved. In our signature scheme, the amount will be hidden especially in the transactions which contain multiple inputs and outputs. Additionally, the size of the signature on transaction is constant regardless of the number of inputs and outputs that the transaction contains, which can improve the performance of signature. Finally, we gave an application scenario for our signature scheme which aims to achieve the transactions of big data on blockchain.

  8. Digital-Networked Images as Personal Acts of Political Expression: New Categories for Meaning Formation

    Directory of Open Access Journals (Sweden)

    Mona Kasra

    2017-12-01

    Full Text Available This article examines the growing use of digital-networked images, specifically online self-portraits or “selfies”, as deliberate and personal acts of political expression and the ways in which meaning evolves and expands from their presence on the Internet. To understand the role of digital-networked images as a site for engaging in a personal and connective “visual” action that leads to formation of transient communities, the author analyzes the nude self-portrait of the young Egyptian woman Aliaa Magda Elmahdy, which during the Egyptian uprisings in 2011 drew attention across social media. As an object of analysis this image is a prime example of the use of digital-networked images in temporally intentional distribution, and as an instance of political enactment unique to this era. This article also explains the concept of participatory narratives as an ongoing process of meaning formation in the digital-networked image, shaped by the fluidity of the multiple and immediate textual narratives, visual derivatives, re-appropriation, and remixes contributed by other interested viewers. The online circulation of digital-networked images in fact culminates in a flow of ever-changing and overarching narratives, broadening the contextual scope around which images are traditionally viewed.

  9. 21 CFR 1309.32 - Application forms; contents; signature.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Application forms; contents; signature. 1309.32... Application forms; contents; signature. (a) Any person who is required to be registered pursuant to § 1309.21... this paragraph and shall contain the signature of the individual being authorized to sign the...

  10. “What Goes Around Comes Around”: Lessons Learned from Economic Evaluations of Personalized Medicine Applied to Digital Medicine

    Science.gov (United States)

    Phillips, Kathryn A.; Douglas, Michael P.; Trosman, Julia R.; Marshall, Deborah A.

    2016-01-01

    Two key trends that emerge from the growth of “Big Data” and the emphasis on patient-centered healthcare are the increasing use of personalized medicine and digital medicine. In order for these technologies to move into mainstream health care and be reimbursed by insurers, it will be essential to have evidence that their benefits provide reasonable value relative to their costs. However, these technologies have complex characteristics that present challenges to assessment of their economic value. Previous work has identified these challenges for personalized medicine and thus this work can inform the more nascent topic of digital medicine. Our objective is to examine the methodological challenges and future opportunities for assessing the economic value of digital medicine, using personalized medicine as a comparison. We focus specifically on “digital biomarker technologies” and “multigene tests”. We identified similarities in these technologies that can present challenges to economic evaluation: multiple results, results with different types of utilities, secondary findings, downstream impact (including on family members), and interactive effects. Using a structured review, we found that there are few economic evaluations of digital biomarker technologies, with limited results. We conclude that more evidence on effectiveness of digital medicine will be needed but that the experiences with personalized medicine can inform what data will be needed and how such analyses can be conducted. Our study points out the critical need for typologies and terminology for digital medicine technologies that would enable them to be classified in ways that will facilitate research on their effectiveness and value. PMID:28212968

  11. Meshing the Personal with the Professional: Digital Storytelling in Higher Education

    Directory of Open Access Journals (Sweden)

    Mary F. Wright

    2010-11-01

    Full Text Available This paper chronicles a yearlong journey of learning about digital storytelling and leading the creation of five digital stories within a higher education community. We bring two complementary perspectives to guide this inquiry: as a faculty member in teacher education and as the University of Wisconsin system representative for the Learning Technology Development Council as well as director of our educational technology center. Our passion for the arts, aesthetics and education bring us to extend an inquiry into teacher identity and reflection by connecting our colleagues’ stories with the art of digital storytelling. We see its place and value in an academic environment; although not always currently clear, the roots of personal insight permeate the lives of professionals within the academy. Digital storytelling spans the artificial divide between the experiences of the past and our professional identities. The myriad uses of digital storytelling in higher education are explored as a reflective tool for practice, to highlight academic projects, interests or initiatives, and most importantly, to simply reflect on how we are shaped by the stories we live and how we in turn share our diverse identities.

  12. Professional Caregivers' Perceptions on how Persons with Mild Dementia Might Experience the Usage of a Digital Photo Diary.

    Science.gov (United States)

    Harrefors, Christina; Sävenstedt, Stefan; Lundquist, Anders; Lundquist, Bengt; Axelsson, Karin

    2012-01-01

    Cognitive impairments influence the possibility of persons with dementia to remember daily events and maintain a sense of self. In order to address these problems a digital photo diary was developed to capture information about events in daily life. The device consisted of a wearable digital camera, smart phone with Global Positioning System (GPS) and a home memory station with computer for uploading the photographs and touch screen. The aim of this study was to describe professional caregiver's perceptions on how persons with mild dementia might experience the usage of this digital photo diary from both a situation when wearing the camera and a situation when viewing the uploaded photos, through a questionnaire with 408 respondents. In order to catch the professional caregivers' perceptions a questionnaire with the semantic differential technique was used and the main question was "How do you think Hilda (the fictive person in the questionnaire) feels when she is using the digital photo diary?". The factor analysis revealed three factors; Sense of autonomy, Sense of self-esteem and Sense of trust. An interesting conclusion that can be drawn is that professional caregivers had an overall positive view of the usage of digital photo diary as supporting autonomy for persons with mild dementia. The meaningfulness of each situation when wearing the camera and viewing the uploaded pictures to be used in two different situations and a part of an integrated assistive device has to be considered separately. Individual needs and desires of the person who is living with dementia and the context of each individual has to be reflected on and taken into account before implementing assistive digital devices as a tool in care.

  13. Method of Anti-Virus Protection Based on (n, t Threshold Proxy Signature with an Arbitrator

    Directory of Open Access Journals (Sweden)

    E. A. Tolyupa

    2014-01-01

    Full Text Available The article suggests the method of anti-virus protection of mobile devices based on the usage of proxy digital signatures and an (n;t-threshold proxy signature scheme with an arbitrator. The unique feature of the suggested method is in the absence of necessity to install anti-virus software in a mobile device. It will be enough only to have the software verifying digital signatures and the Internet. The method is used on the base of public keys infrastructure /PKI/, thus minimizing implementation expenses.

  14. Why Don’t Physicians Use Their Personal Digital Assistants?

    OpenAIRE

    Lu, Yen-Chiao; Lee, Jin (Janet) Kyung; Xiao, Yan; Sears, Andrew; Jacko, Julie A.; Charters, Kathleen

    2003-01-01

    As the Personal Digital Assistant (PDA) user population continues to expand, there is a need to design more useful devices and applications to facilitate the utilization of PDAs. We conducted a structured interview study to examine PDA usage and non-usage patterns among physicians. The purpose of this descriptive study was to identify the barriers that impede physicians in their PDA use. A data collection tool was developed to record: 1) how physicians use their PDAs, 2) functions and applica...

  15. [The digital reprocessing of under- and overexposed x-ray films with a personal computer].

    Science.gov (United States)

    Fuhrmann, R; Diedrich, P

    1993-02-01

    An image processing work station for digitalizing and interactively manipulating under- and overexposed X-rays was set up by adding modules to an IBM compatible personal computer. Overexposed X-rays can be qualitatively enhanced by means of controlled manipulation of contrast and brightness and by means of the use of various digital filtering techniques. With underexposed X-rays an equalized grey scale can be achieved by means of regulating contrast and brightness. Digital filtering is not required. To assure a high degree of anatomical detail (periodontal ligament) in the digitalized image a maximum pixel of 0.1 mm was defined as a qualitative norm. Since in every digitalization process resolution is diminished, it proved best to select for interactive manipulation out of the total image only the section of interest.

  16. Tightly Secure Signatures From Lossy Identification Schemes

    OpenAIRE

    Abdalla , Michel; Fouque , Pierre-Alain; Lyubashevsky , Vadim; Tibouchi , Mehdi

    2015-01-01

    International audience; In this paper, we present three digital signature schemes with tight security reductions in the random oracle model. Our first signature scheme is a particularly efficient version of the short exponent discrete log-based scheme of Girault et al. (J Cryptol 19(4):463–487, 2006). Our scheme has a tight reduction to the decisional short discrete logarithm problem, while still maintaining the non-tight reduction to the computational version of the problem upon which the or...

  17. Security analysis and improvements of arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Zou Xiangfu; Qiu Daowen

    2010-01-01

    A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. For signing quantum messages, some arbitrated quantum signature (AQS) schemes have been proposed. It was claimed that these AQS schemes could guarantee unconditional security. However, we show that they can be repudiated by the receiver Bob. To conquer this shortcoming, we construct an AQS scheme using a public board. The AQS scheme not only avoids being disavowed by the receiver but also preserves all merits in the existing schemes. Furthermore, we discover that entanglement is not necessary while all these existing AQS schemes depend on entanglement. Therefore, we present another AQS scheme without utilizing entangled states in the signing phase and the verifying phase. This scheme has three advantages: it does not utilize entangled states and it preserves all merits in the existing schemes; the signature can avoid being disavowed by the receiver; and it provides a higher efficiency in transmission and reduces the complexity of implementation.

  18. The end of ownership personal property in the digital economy

    CERN Document Server

    Perzanowski, Aaron

    2016-01-01

    If you buy a book at the bookstore, you own it. You can take it home, scribble in the margins, put in on the shelf, lend it to a friend, sell it at a garage sale. But is the same thing true for the ebooks or other digital goods you buy? Retailers and copyright holders argue that you don't own those purchases, you merely license them. That means your ebook vendor can delete the book from your device without warning or explanation -- as Amazon deleted Orwell's "1984" from the Kindles of surprised readers several years ago. These readers thought they owned their copies of "1984." Until, it turned out, they didn't. In "The End of Ownership," Aaron Perzanowski and Jason Schultz explore how notions of ownership have shifted in the digital marketplace, and make an argument for the benefits of personal property. Of course, ebooks, cloud storage, streaming, and other digital goods offer users convenience and flexibility. But, Perzanowski and Schultz warn, consumers should be aware of the tradeoffs involving user cons...

  19. Variability of grip kinetics during adult signature writing.

    Directory of Open Access Journals (Sweden)

    Bassma Ghali

    Full Text Available Grip kinetics and their variation are emerging as important considerations in the clinical assessment of handwriting pathologies, fine motor rehabilitation, biometrics, forensics and ergonomic pen design. This study evaluated the intra- and inter-participant variability of grip shape kinetics in adults during signature writing. Twenty (20 adult participants wrote on a digitizing tablet using an instrumented pen that measured the forces exerted on its barrel. Signature samples were collected over 10 days, 3 times a day, to capture temporal variations in grip shape kinetics. A kinetic topography (i.e., grip shape image was derived per signature by time-averaging the measured force at each of 32 locations around the pen barrel. The normalized cross correlations (NCC of grip shape images were calculated within- and between-participants. Several classification algorithms were implemented to gauge the error rate of participant discrimination based on grip shape kinetics. Four different grip shapes emerged and several participants made grip adjustments (change in grip shape or grip height or rotated the pen during writing. Nonetheless, intra-participant variation in grip kinetics was generally much smaller than inter-participant force variations. Using the entire grip shape images as a 32-dimensional input feature vector, a K-nearest neighbor classifier achieved an error rate of 1.2±0.4% in discriminating among participants. These results indicate that writers had unique grip shape kinetics that were repeatable over time but distinct from those of other participants. The topographic analysis of grip kinetics may inform the development of personalized interventions or customizable grips in clinical and industrial applications, respectively.

  20. Digital image envelope: method and evaluation

    Science.gov (United States)

    Huang, H. K.; Cao, Fei; Zhou, Michael Z.; Mogel, Greg T.; Liu, Brent J.; Zhou, Xiaoqiang

    2003-05-01

    Health data security, characterized in terms of data privacy, authenticity, and integrity, is a vital issue when digital images and other patient information are transmitted through public networks in telehealth applications such as teleradiology. Mandates for ensuring health data security have been extensively discussed (for example The Health Insurance Portability and Accountability Act, HIPAA) and health informatics guidelines (such as the DICOM standard) are beginning to focus on issues of data continue to be published by organizing bodies in healthcare; however, there has not been a systematic method developed to ensure data security in medical imaging Because data privacy and authenticity are often managed primarily with firewall and password protection, we have focused our research and development on data integrity. We have developed a systematic method of ensuring medical image data integrity across public networks using the concept of the digital envelope. When a medical image is generated regardless of the modality, three processes are performed: the image signature is obtained, the DICOM image header is encrypted, and a digital envelope is formed by combining the signature and the encrypted header. The envelope is encrypted and embedded in the original image. This assures the security of both the image and the patient ID. The embedded image is encrypted again and transmitted across the network. The reverse process is performed at the receiving site. The result is two digital signatures, one from the original image before transmission, and second from the image after transmission. If the signatures are identical, there has been no alteration of the image. This paper concentrates in the method and evaluation of the digital image envelope.

  1. Doing What We Teach: Promoting Digital Literacies for Professional Development through Personal Learning Environments and Participation

    Science.gov (United States)

    Laakkonen, Ilona

    2015-01-01

    Despite the proliferation of social media, few learners make effective use of digital technology to support their learning or graduate with the skills necessary for developing and communicating their expertise in the knowledge-driven networked society of the digital age. This article makes use of the concept of Personal Learning Environments (PLE)…

  2. The curse of namespaces in the domain of XML signature

    DEFF Research Database (Denmark)

    Jensen, Meiko; Liao, Lijun; Schwenk, Jörg

    2009-01-01

    The XML signature wrapping attack is one of the most discussed security issues of the Web Services security community during the last years. Until now, the issue has not been solved, and all countermeasure approaches proposed so far were shown to be insufficient. In this paper, we present yet...... another way to perform signature wrapping attacks by using the XML namespace injection technique. We show that the interplay of XML Signature, XPath, and the XML namespace concept has severe flaws that can be exploited for an attack, and that XML namespaces in general pose real troubles to digital...... signatures in the XML domain. Additionally, we present and discuss some new approaches in countering the proposed attack vector....

  3. Digital citizens Digital nations: the next agenda

    NARCIS (Netherlands)

    A.W. (Bert) Mulder; M.W. (Martijn) Hartog

    2015-01-01

    DIGITAL CITIZENS CREATE A DIGITAL NATION Citizens will play the lead role as they – in the next phase of the information society – collectively create a digital nation. Personal adoption of information and communication technology will create a digital infrastructure that supports individual and

  4. Cognitive Hacking and Digital Government: Digital Identity

    Directory of Open Access Journals (Sweden)

    Paul Thompson

    2004-04-01

    Full Text Available Recently the National Center for Digital Government held a workshop on "The Virtual Citizen: Identity, Autonomy, and Accountability: A Civic Scenario Exploration of the Role of Identity in On-Line. Discussions at the workshop focused on five scenarios for future authentication policies with respect to digital identity. The underlying technologies considered for authentication were: biometrics: cryptography, with a focus on digital signatures; secure processing/computation; and reputation systems. Most discussion at the workshop focused on issues related to authentication of users of digital government, but, as implied by the inclusion of a scenario related to ubiquitous identity theft, there was also discussion of problems related to misinformation, including cognitive hacking. Cognitive hacking refers to a computer or information system attack that relies on changing human users' perceptions and corresponding behaviors in order to succeed. This paper describes cognitive hacking, suggests countermeasures, and discusses the implications of cognitive hacking for identity in digital government. In particular, spoofing of government websites and insider misuse are considered.

  5. The electronic identification, signature and security of information systems

    Directory of Open Access Journals (Sweden)

    Horovèák Pavel

    2002-12-01

    Full Text Available The contribution deals with the actual methods and technologies of information and communication systems security. It introduces the overview of electronic identification elements such as static password, dynamic password and single sign-on. Into this category belong also biometric and dynamic characteristics of verified person. Widespread is authentication based on identification elements ownership, such as various cards and authentication calculators. In the next part is specified a definition and characterization of electronic signature, its basic functions and certificate categories. Practical utilization of electronic signature consists of electronic signature acquirement, signature of outgoing email message, receiving of electronic signature and verification of electronic signature. The use of electronic signature is continuously growing and in connection with legislation development it exercises in all resorts.

  6. Searchable Signatures: Context and the Struggle for Recognition

    Directory of Open Access Journals (Sweden)

    Gina Schlesselman-Tarango

    2013-09-01

    Full Text Available Social networking sites made possible through Web 2.0 allow for unique user-generated tags called “searchable signatures.”  These tags move beyond the descriptive and act as means for users to assert online individual and group identities.  A study of searchable signatures on the Instagram application demonstrates that these types of tags are valuable not only because they allow for both individuals and groups to engage in what social theorist Axel Honneth calls the struggle for recognition, but also because they provide contextual use data and sociohistorical information so important to the understanding of digital objects.  This article explores how searchable signatures might be used by both patrons and staff in library environments.

  7. Device interoperability and authentication for telemedical appliance based on the ISO/IEEE 11073 Personal Health Device (PHD) Standards.

    Science.gov (United States)

    Caranguian, Luther Paul R; Pancho-Festin, Susan; Sison, Luis G

    2012-01-01

    In this study, we focused on the interoperability and authentication of medical devices in the context of telemedical systems. A recent standard called the ISO/IEEE 11073 Personal Health Device (X73-PHD) Standards addresses the device interoperability problem by defining common protocols for agent (medical device) and manager (appliance) interface. The X73-PHD standard however has not addressed security and authentication of medical devices which is important in establishing integrity of a telemedical system. We have designed and implemented a security policy within the X73-PHD standards. The policy will enable device authentication using Asymmetric-Key Cryptography and the RSA algorithm as the digital signature scheme. We used two approaches for performing the digital signatures: direct software implementation and use of embedded security modules (ESM). The two approaches were evaluated and compared in terms of execution time and memory requirement. For the standard 2048-bit RSA, ESM calculates digital signatures only 12% of the total time for the direct implementation. Moreover, analysis shows that ESM offers more security advantage such as secure storage of keys compared to using direct implementation. Interoperability with other systems was verified by testing the system with LNI Healthlink, a manager software that implements the X73-PHD standard. Lastly, security analysis was done and the system's response to common attacks on authentication systems was analyzed and several measures were implemented to protect the system against them.

  8. Semantic Web, Reusable Learning Objects, Personal Learning Networks in Health: Key Pieces for Digital Health Literacy.

    Science.gov (United States)

    Konstantinidis, Stathis Th; Wharrad, Heather; Windle, Richard; Bamidis, Panagiotis D

    2017-01-01

    The knowledge existing in the World Wide Web is exponentially expanding, while continuous advancements in health sciences contribute to the creation of new knowledge. There are a lot of efforts trying to identify how the social connectivity can endorse patients' empowerment, while other studies look at the identification and the quality of online materials. However, emphasis has not been put on the big picture of connecting the existing resources with the patients "new habits" of learning through their own Personal Learning Networks. In this paper we propose a framework for empowering patients' digital health literacy adjusted to patients' currents needs by utilizing the contemporary way of learning through Personal Learning Networks, existing high quality learning resources and semantics technologies for interconnecting knowledge pieces. The framework based on the concept of knowledge maps for health as defined in this paper. Health Digital Literacy needs definitely further enhancement and the use of the proposed concept might lead to useful tools which enable use of understandable health trusted resources tailored to each person needs.

  9. Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain

    Directory of Open Access Journals (Sweden)

    Nehad Hameed Hussein

    2015-04-01

    Full Text Available Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they are less sensitive to the Human Visual System (HVS and preserve high image fidelity. MD-5 and RSA algorithms are used for generating the digital signature from the watermark data that is also embedded in the medical image. We apply the algorithm on number of medical images. The Electronic Patient Record (EPR is used as watermark data. Experiments demonstrate the effectiveness of our algorithm in terms of robustness, invisibility, and fragility. Watermark and digital signature can be extracted without the need to the original image.

  10. Learning Tools for Knowledge Nomads: Using Personal Digital Assistants (PDAs) in Web-based Learning Environments.

    Science.gov (United States)

    Loh, Christian Sebastian

    2001-01-01

    Examines how mobile computers, or personal digital assistants (PDAs), can be used in a Web-based learning environment. Topics include wireless networks on college campuses; online learning; Web-based learning technologies; synchronous and asynchronous communication via the Web; content resources; Web connections; and collaborative learning. (LRW)

  11. Digital dosimetry and personal and environmental monitoring assembly

    International Nuclear Information System (INIS)

    Cerovac, Z.; Radalj, Z.; Prlic, I.; Cerovac, H.

    1996-01-01

    Film+TLD and film or TLD Dosimetry have a certain delay in dose reporting, since the reports on occupational doses are usually available to the users within 40 days after the actual exposure. This is particularly important when the dose is received within the short-time interval or when the radiation source has some technical failures. For this reason, the additional monitoring is recommendable. The common Dosimetry service in Croatia is well established and the data available shows that over 80% of occupationally exposed persons are working in medical facilities, mainly with x-ray sources. Dosimetry services in the country are providing three types of dosemeters, film dosemeter badge, film+TLD dosemeter badge or plane TLD badge. We have decided to introduce the palette of digital pocket dosemeters to be used at different workplaces occupationally exposed to ionizing radiation. After the first experience with the ALARA 1G digital dosemeter it came out that this type of ionizing radiation measuring device is suitable for the various non-occupational purposes. After some technical improvement and with some telecommunication electronics this device is usable as a point environmental measuring station. This means that the probe of the record any change in normal environmental radiation field, send the data to the central station and to raise alarm if necessary. That is why we have made a prototype for environmental monitoring able to be connected to any kind of telecommunication net. (author)

  12. A Prototype of Mathematical Treatment of Pen Pressure Data for Signature Verification.

    Science.gov (United States)

    Li, Chi-Keung; Wong, Siu-Kay; Chim, Lai-Chu Joyce

    2018-01-01

    A prototype using simple mathematical treatment of the pen pressure data recorded by a digital pen movement recording device was derived. In this study, a total of 48 sets of signature and initial specimens were collected. Pearson's correlation coefficient was used to compare the data of the pen pressure patterns. From the 820 pair comparisons of the 48 sets of genuine signatures, a high degree of matching was found in which 95.4% (782 pairs) and 80% (656 pairs) had rPA > 0.7 and rPA > 0.8, respectively. In the comparison of the 23 forged signatures with their corresponding control signatures, 20 of them (89.2% of pairs) had rPA values prototype could be used as a complementary technique to improve the objectivity of signature examination and also has a good potential to be developed as a tool for automated signature identification. © 2017 American Academy of Forensic Sciences.

  13. Defining What Matters When Preserving Web-Based Personal Digital Collections: Listening to Bloggers

    Directory of Open Access Journals (Sweden)

    Ayoung Yoon

    2013-06-01

    Full Text Available User-generated content (UGC has become a part of personal digital collections on the Web, as such collections often contain personal memories, activities, thoughts and even profiles. With the increase in the creation of personal materials on the Web, the needs for archiving and preserving these materials are increasing, not only for the purpose of developing personal archives but also for the purpose of capturing social memory and tracking human traces in this era. Using both survey and interview methods, this study investigated blogs, one popular type of UGC, and analyzed travel bloggers’ perceptions of the value of blogs and the elements of blogs that are important for preservation. The study respondents found personal and sentimental value (e.g., a way to express themselves, a way to keep personal memories and thoughts, and a way to maintain a record for their family to be the most important reason for preserving blogs, followed by informational value and cultural/historical value. Sharing also appeared as one of the values that respondents found in their blogs. The respondents reported that self-created blog posts (content and information related to the blog posts (context are more important to preserve than some other elements (behavior and appearance. Integrating what bloggers consider as most valuable and what archivists think are worth preserving may be an important step when collecting personal blogs.

  14. The Role of Digital Certificates in EGoverning. The Case of the Romanian Regulation and Surveillance Authority

    Directory of Open Access Journals (Sweden)

    Andra Marin

    2012-08-01

    Full Text Available The implementation of electronic governance related projects implies user authentication,accounts activation and personal data verification. Certain public services, particularly thoseinvolving financial transactions or statements, require a high security level. The use of the PKI technology and, consequently, of digital signatures, constitutes the most viable solution, meeting the required security standards, protecting, on the one hand, the signatory’s identity, and, on the other hand, the integrity of the transmitted message. Due to the use of the digital certificate, the development of online public services is now possible, especially since it meets the requirements of security standards, but also because it is highly trusted by users. This article intends to analyze the impact of the digital certificate on the improvement of communication between state authorities, including specific transactional relations, and also to consider its influence on security improvement of dataflow. The study demonstrates that the digital certificate is closely connected to the information society, directly determining the dynamics of the development of new applications that provide a better interface between the state and its citizens.

  15. Biomarker Gene Signature Discovery Integrating Network Knowledge

    Directory of Open Access Journals (Sweden)

    Holger Fröhlich

    2012-02-01

    Full Text Available Discovery of prognostic and diagnostic biomarker gene signatures for diseases, such as cancer, is seen as a major step towards a better personalized medicine. During the last decade various methods, mainly coming from the machine learning or statistical domain, have been proposed for that purpose. However, one important obstacle for making gene signatures a standard tool in clinical diagnosis is the typical low reproducibility of these signatures combined with the difficulty to achieve a clear biological interpretation. For that purpose in the last years there has been a growing interest in approaches that try to integrate information from molecular interaction networks. Here we review the current state of research in this field by giving an overview about so-far proposed approaches.

  16. Download Your Doctor: Implementation of a Digitally Mediated Personal Physician Presence to Enhance Patient Engagement With a Health-Promoting Internet Application.

    Science.gov (United States)

    Lygidakis, Charilaos; Wallace, Paul; Tersar, Costanza; Marcatto, Francesco; Ferrante, Donatella; Della Vedova, Roberto; Scafuri, Francesca; Scafato, Emanuele; Struzzo, Pierluigi

    2016-03-04

    Brief interventions delivered in primary health care are effective in reducing excessive drinking; online behavior-changing technique interventions may be helpful. Physicians may actively encourage the use of such interventions by helping patients access selected websites (a process known as "facilitated access"). Although the therapeutic working alliance plays a significant role in the achievement of positive outcomes in face-to-face psychotherapy and its development has been shown to be feasible online, little research has been done on its impact on brief interventions. Strengthening patients' perception of their physician's endorsement of a website could facilitate the development of an effective alliance between the patient and the app. We describe the implementation of a digitally mediated personal physician presence to enhance patient engagement with an alcohol-reduction website as part of the experimental online intervention in a noninferiority randomized controlled trial. We also report the feedback of the users on the module. The Download Your Doctor module was created to simulate the personal physician presence for an alcohol-reduction website that was developed for the EFAR-FVG trial conducted in the Italian region of Friuli-Venezia-Giulia. The module was designed to enhance therapeutic alliance and thus improve outcomes in the intervention group (facilitated access to the website). Participating general and family practitioners could customize messages and visual elements and upload a personal photo, signature, and video recordings. To assess the perceptions and attitudes of the physicians, a semistructured interview was carried out 3 months after the start of the trial. Participating patients were invited to respond to a short online questionnaire 12 months following recruitment to investigate their evaluation of their online experiences. Nearly three-quarters (23/32, 72%) of the physicians interviewed chose to customize the contents of the interaction

  17. Algorithmic Skin: Health-Tracking Technologies, Personal Analytics and the Biopedagogies of Digitized Health and Physical Education

    Science.gov (United States)

    Williamson, Ben

    2015-01-01

    The emergence of digitized health and physical education, or "eHPE", embeds software algorithms in the organization of health and physical education pedagogies. Particularly with the emergence of wearable and mobile activity trackers, biosensors and personal analytics apps, algorithmic processes have an increasingly powerful part to play…

  18. X-ray film digitization using a personal computer and hand-held scanner: a simple technique for storing images

    International Nuclear Information System (INIS)

    Munoz-Nunez, C. F.; Lloret-Alcaniz, A.

    1998-01-01

    To develop a simple, low-cost technique for the digitization of X-ray films for personal use. A 66-MHz 486 PC with 8 MB of RAM, a Logitech ScanMan 256 hand-held scanner and a standard negatoscope with the power source converted to direct current. Although the system was originally designed for the digitization of mammographies, it has also been used with computed tomography, magnetic resonance, digital angiography and ultrasonographic images, as well as plain X-rays. After a minimal training period, the system digitized X-ray films easily and rapidly. Although the scanning values vary depending on the type of image to be digitized, an input spatial resolution of 200 dpi and a contrast resolution of 256 levels of gray are generally adequate. Of the storage formats tested, JPEG presented the best quality/image size ratio. A simple, low-cost technique has been developed for the digitization of X-ray films. This technique enables the storage of images in a digital format, thus facilitating their presentation and transmission. (Author) 9 refs

  19. 6 CFR 37.3 - Definitions.

    Science.gov (United States)

    2010-01-01

    ... cards issued by the State for official purposes. Digital photograph means a digital image of the face of... denotes identity and citizenship as determined by the U.S. Department of State. Personally identifiable..., including a digital photograph or signature; alone, or when combined with other personal or identifying...

  20. Apparatuses and methods of determining if a person operating equipment is experiencing an elevated cognitive load

    Science.gov (United States)

    Watkins, Michael L.; Keller, Paul Edwin; Amaya, Ivan A.

    2015-06-16

    A method of, and apparatus for, determining if a person operating equipment is experiencing an elevated cognitive load, wherein the person's use of a device at a first time is monitored so as to set a baseline signature. Then, at a later time, the person's use of the device is monitored to determine the person's performance at the second time, as represented by a performance signature. This performance signature can then be compared against the baseline signature to predict whether the person is experiencing an elevated cognitive load.

  1. Digital health increasing the impact with personalized design

    OpenAIRE

    Empelen, P. van; Otten, W.; Molema, H.; Keijsers, J.; Mooij, R.

    2016-01-01

    Digital health is considered the ‘holy grail’ of effective and sustainable health(care). It uses the latest technology, apps and data to support and improve health. Digital health tools can benefit both patients and healthy individuals, with support and advice. But healthcare professionals, policymakers and scientist can also benefit from the (big) data and insights collected by digital health applications. A well-known example of digital health is eHealth, which provides information- and com...

  2. Proposal for internet-based Digital Dental Chart for personal dental identification in forensics.

    Science.gov (United States)

    Hanaoka, Yoichi; Ueno, Asao; Tsuzuki, Tamiyuki; Kajiwara, Masahiro; Minaguchi, Kiyoshi; Sato, Yoshinobu

    2007-05-03

    A dental chart is very useful as a standard source of evidence in the personal identification of bodies. However, the kind of dental chart available will often vary as a number of types of odontogram have been developed where the visual representation of dental conditions has relied on hand-drawn representation. We propose the Digital Dental Chart (DDC) as a new style of dental chart, especially for open investigations aimed at establishing the identity of unknown bodies. Each DDC is constructed using actual oral digital images and dental data, and is easy to upload onto an Internet website. The DDC is a more useful forensic resource than the standard types of dental chart in current use as it has several advantages, among which are its ability to carry a large volume of information and reproduce dental conditions clearly and in detail on a cost-effective basis.

  3. Towards Trustable Digital Evidence with PKIDEV: PKI Based Digital Evidence Verification Model

    Science.gov (United States)

    Uzunay, Yusuf; Incebacak, Davut; Bicakci, Kemal

    How to Capture and Preserve Digital Evidence Securely? For the investigation and prosecution of criminal activities that involve computers, digital evidence collected in the crime scene has a vital importance. On one side, it is a very challenging task for forensics professionals to collect them without any loss or damage. On the other, there is the second problem of providing the integrity and authenticity in order to achieve legal acceptance in a court of law. By conceiving digital evidence simply as one instance of digital data, it is evident that modern cryptography offers elegant solutions for this second problem. However, to our knowledge, there is not any previous work proposing a systematic model having a holistic view to address all the related security problems in this particular case of digital evidence verification. In this paper, we present PKIDEV (Public Key Infrastructure based Digital Evidence Verification model) as an integrated solution to provide security for the process of capturing and preserving digital evidence. PKIDEV employs, inter alia, cryptographic techniques like digital signatures and secure time-stamping as well as latest technologies such as GPS and EDGE. In our study, we also identify the problems public-key cryptography brings when it is applied to the verification of digital evidence.

  4. A Cross-Disciplinary Successful Aging Intervention and Evaluation: Comparison of Person-to-Person and Digital-Assisted Approaches

    Directory of Open Access Journals (Sweden)

    Hui-Chuan Hsu

    2018-05-01

    Full Text Available Background: Successful aging has been the paradigm of old-age life. The purpose of this study was to implement and evaluate a cross-disciplinary intervention program using two approaches for community-based older adults in Taichung, Taiwan. Methods: The content of the intervention included successful aging concepts and preparation, physical activity, chronic disease and health management, dietary and nutrition information, cognitive training, emotional awareness and coping skills, family relationship and resilience, legal concepts regarding financial protection, and Internet use. The traditional person-to-person (P2P intervention approach was implemented among participants at urban centers, and the personal-and-digital (P&D intervention approach was implemented among participants at rural centers; before the P&D group received the intervention, participants were assessed as the control group for comparison. Results: Healthy behavior and nutrition improved for the P2P group, although not significantly. Strategies for adapting to old age and reducing ineffective coping were significantly improved in the P2P group. The ability to search for health information improved in the P&D group, and knowledge of finance-related law increased in the P2P group. Conclusion: A continuous, well-designed and evidence-based intervention program is beneficial for improving the health of older adults, or at least delaying its decline.

  5. The Effects of Visual Illustrations on Learners' Achievement and Interest in PDA- (Personal Digital Assistant) Based Learning

    Science.gov (United States)

    Park, Sanghoon; Kim, Minjeong; Lee, Youngmin; Son, Chanhee; Lee, Miyoung

    2005-01-01

    PDAs (Personal Digital Assistants) have been used widely in educational settings. In this study, the visual illustration of a scientific text (cognitive-interest illustration, emotional-interest illustration, or no illustration) was manipulated to investigate its impact on student interest in instructional materials, achievement, and time spent on…

  6. Using a Personal Digital Assistant to Increase Independent Task Completion by Students with Autism Spectrum Disorder

    Science.gov (United States)

    Mechling, Linda C.; Gast, David L.; Seid, Nicole H.

    2009-01-01

    In this study, a personal digital assistant (PDA) with picture, auditory, and video prompts with voice over, was evaluated as a portable self-prompting device for students with autism spectrum disorder (ASD). Using a multiple probe design across three cooking recipes and replicated with three students with ASD, the system was tested for its…

  7. Mirage: a visible signature evaluation tool

    Science.gov (United States)

    Culpepper, Joanne B.; Meehan, Alaster J.; Shao, Q. T.; Richards, Noel

    2017-10-01

    This paper presents the Mirage visible signature evaluation tool, designed to provide a visible signature evaluation capability that will appropriately reflect the effect of scene content on the detectability of targets, providing a capability to assess visible signatures in the context of the environment. Mirage is based on a parametric evaluation of input images, assessing the value of a range of image metrics and combining them using the boosted decision tree machine learning method to produce target detectability estimates. It has been developed using experimental data from photosimulation experiments, where human observers search for vehicle targets in a variety of digital images. The images used for tool development are synthetic (computer generated) images, showing vehicles in many different scenes and exhibiting a wide variation in scene content. A preliminary validation has been performed using k-fold cross validation, where 90% of the image data set was used for training and 10% of the image data set was used for testing. The results of the k-fold validation from 200 independent tests show a prediction accuracy between Mirage predictions of detection probability and observed probability of detection of r(262) = 0:63, p Pearson correlation) and a MAE = 0:21 (mean absolute error).

  8. The Pedagogic Signature of Special Needs Education

    Science.gov (United States)

    Weiß, Sabine; Kollmannsberger, Markus; Lerche, Thomas; Oubaid, Viktor; Kiel, Ewald

    2014-01-01

    The goal of the following study is to identify a pedagogic signature, according to LS Shulman, for working with students who have special educational needs. Special educational needs are defined as significant limitations in personal development and learning which require particular educational measures beyond regular education. The development of…

  9. Authentication, Time-Stamping and Digital Signatures

    Science.gov (United States)

    Levine, Judah

    1996-01-01

    Time and frequency data are often transmitted over public packet-switched networks, and the use of this mode of distribution is likely to increase in the near future as high-speed logical circuits transmitted via networks replace point-to-point physical circuits. ALthough these networks have many technical advantages, they are susceptible to evesdropping, spoofing, and the alteration of messages enroute using techniques that are relatively simple to implement and quite difficult to detect. I will discuss a number of solutions to these problems, including the authentication mechanism used in the Network Time Protocol (NTP) and the more general technique of signing time-stamps using public key cryptography. This public key method can also be used to implement the digital analog of a Notary Public, and I will discuss how such a system could be realized on a public network such as the Internet.

  10. Digital Video as a Personalized Learning Assignment: A Qualitative Study of Student Authored Video Using the ICSDR Model

    Science.gov (United States)

    Campbell, Laurie O.; Cox, Thomas D.

    2018-01-01

    Students within this study followed the ICSDR (Identify, Conceptualize/Connect, Storyboard, Develop, Review/Reflect/Revise) development model to create digital video, as a personalized and active learning assignment. The participants, graduate students in education, indicated that following the ICSDR framework for student-authored video guided…

  11. Automated Offline Arabic Signature Verification System using Multiple Features Fusion for Forensic Applications

    Directory of Open Access Journals (Sweden)

    Saad M. Darwish

    2016-12-01

    Full Text Available The signature of a person is one of the most popular and legally accepted behavioral biometrics that provides a secure means for verification and personal identification in many applications such as financial, commercial and legal transactions. The objective of the signature verification system is to classify between genuine and forged signatures that are often associated with intrapersonal and interpersonal variability. Unlike other languages, Arabic has unique features; it contains diacritics, ligatures, and overlapping. Because of lacking any form of dynamic information during the Arabic signature’s writing process, it will be more difficult to obtain higher verification accuracy. This paper addresses the above difficulty by introducing a novel offline Arabic signature verification algorithm. The key point is using multiple feature fusion with fuzzy modeling to capture different aspects of a signature individually in order to improve the verification accuracy. State-of-the-art techniques adopt the fuzzy set to describe the properties of the extracted features to handle a signature’s uncertainty; this work also employs the fuzzy variables to describe the degree of similarity of the signature’s features to deal with the ambiguity of questioned document examiner judgment of signature similarity. It is concluded from the experimental results that the verification system performs well and has the ability to reduce both False Acceptance Rate (FAR and False Rejection Rate (FRR.

  12. E-learning platform for automated testing of electronic circuits using signature analysis method

    Science.gov (United States)

    Gherghina, Cǎtǎlina; Bacivarov, Angelica; Bacivarov, Ioan C.; Petricǎ, Gabriel

    2016-12-01

    Dependability of electronic circuits can be ensured only through testing of circuit modules. This is done by generating test vectors and their application to the circuit. Testability should be viewed as a concerted effort to ensure maximum efficiency throughout the product life cycle, from conception and design stage, through production to repairs during products operating. In this paper, is presented the platform developed by authors for training for testability in electronics, in general and in using signature analysis method, in particular. The platform allows highlighting the two approaches in the field namely analog and digital signature of circuits. As a part of this e-learning platform, it has been developed a database for signatures of different electronic components meant to put into the spotlight different techniques implying fault detection, and from this there were also self-repairing techniques of the systems with this kind of components. An approach for realizing self-testing circuits based on MATLAB environment and using signature analysis method is proposed. This paper analyses the benefits of signature analysis method and simulates signature analyzer performance based on the use of pseudo-random sequences, too.

  13. Trace element ink spiking for signature authentication

    International Nuclear Information System (INIS)

    Hatzistavros, V.S.; Kallithrakas-Kontos, N.G.

    2008-01-01

    Signature authentication is a critical question in forensic document examination. Last years the evolution of personal computers made signature copying a quite easy task, so the development of new ways for signature authentication is crucial. In the present work a commercial ink was spiked with many trace elements in various concentrations. Inorganic and organometallic ink soluble compounds were used as spiking agents, whilst ink retained its initial properties. The spiked inks were used for paper writing and the documents were analyzed by a non destructive method, the energy dispersive X-ray fluorescence. The thin target model was proved right for quantitative analysis and a very good linear relationship of the intensity (X-ray signal) against concentration was estimated for all used elements. Intensity ratios between different elements in the same ink gave very stable results, independent on the writing alterations. The impact of time both to written document and prepared inks was also investigated. (author)

  14. Field evaluation of personal digital assistant enabled by global positioning system : impact on quality of activity and diary data

    NARCIS (Netherlands)

    Bellemans, T.; Kochan, B.; Janssens, D.; Wets, G.; Timmermans, H.J.P.; Stopher, P.

    2016-01-01

    Tom Bellemans, Bruno Kochan, Davy Janssens, Geert Wets and Harry Timmermans (2008), ‘Field Evaluation of Personal Digital Assistant Enabled by Global Positioning System: Impact on Quality of Activity and Diary Data’, Transportation Research Record: Journal of the Transportation Research Board, No.

  15. OLS DIGITAL DERIVED LIGHTNING FROM DMSP F10 V1

    Data.gov (United States)

    National Aeronautics and Space Administration — The OLS Digital Derived Lightning from DMSP F10 dataset consists of global lightning signatures from the Defense Meteorological Satellite Program (DMSP) Operational...

  16. A novel digital workflow to manufacture personalized three-dimensional-printed hollow surgical obturators after maxillectomy.

    Science.gov (United States)

    Kortes, J; Dehnad, H; Kotte, A N T; Fennis, W M M; Rosenberg, A J W P

    2018-04-07

    Partial or complete resection of the maxilla during tumour surgery causes oronasal defects, leading to oral-maxillofacial dysfunction, for which the surgical obturator (SO) is an important treatment option. Traditional manufacturing of SOs is complex, time-consuming, and often results in inadequate fit and function. This technical note describes a novel digital workflow to design and manufacture a three-dimensional (3D)-printed hollow SO. Registered computed tomography and magnetic resonance imaging images are used for gross tumour delineation. The produced RTStruct set is exported as a stereolitography (STL) file and merged with a 3D model of the dental status. Based on these merged files, a personalized and hollow digital SO design is created, and 3D printed. Due to the proper fit of the prefabricated SO, a soft silicone lining material can be used during surgery to adapt the prosthesis to the oronasal defect, instead of putty materials that are not suitable for this purpose. An STL file of this final SO is created during surgery, based on a scan of the relined SO. The digital workflow results in a SO weight reduction, an increased fit, an up-to-date digital SO copy, and overall easier clinical handling. Copyright © 2018 International Association of Oral and Maxillofacial Surgeons. Published by Elsevier Ltd. All rights reserved.

  17. Image Processing Based Signature Verification Technique to Reduce Fraud in Financial Institutions

    Directory of Open Access Journals (Sweden)

    Hussein Walid

    2016-01-01

    Full Text Available Handwritten signature is broadly utilized as personal verification in financial institutions ensures the necessity for a robust automatic signature verification tool. This tool aims to reduce fraud in all related financial transactions’ sectors. This paper proposes an online, robust, and automatic signature verification technique using the recent advances in image processing and machine learning. Once the image of a handwritten signature for a customer is captured, several pre-processing steps are performed on it including filtration and detection of the signature edges. Afterwards, a feature extraction process is applied on the image to extract Speeded up Robust Features (SURF and Scale-Invariant Feature Transform (SIFT features. Finally, a verification process is developed and applied to compare the extracted image features with those stored in the database for the specified customer. Results indicate high accuracy, simplicity, and rapidity of the developed technique, which are the main criteria to judge a signature verification tool in banking and other financial institutions.

  18. Using Network Oriented Research Assistant (NORA) Technology to Compare Digital Photographic With In-Person Assessment of Acne Vulgaris.

    Science.gov (United States)

    Singer, Hannah M; Almazan, Timothy; Craft, Noah; David, Consuelo V; Eells, Samantha; Erfe, Crisel; Lazzaro, Cynthia; Nguyen, Kathy; Preciado, Katy; Tan, Belinda; Patel, Vishal A

    2018-02-01

    Teledermatology has undergone exponential growth in the past 2 decades. Many technological innovations are becoming available without necessarily undergoing validation studies for specific dermatologic applications. To determine whether patient-taken photographs of acne using Network Oriented Research Assistant (NORA) result in similar lesion counts and Investigator's Global Assessment (IGA) findings compared with in-person examination findings. This pilot reliability study enrolled consecutive patients with acne vulgaris from a single general dermatology practice in Los Angeles, California, who were able to use NORA on an iPhone 6 to take self-photographs. Patients were enrolled from January 1 through March 31, 2016. Each individual underwent in-person and digital evaluation of his or her acne by the same dermatologist. A period of at least 1 week separated the in-person and digital assessments of acne. All participants were trained on how to use NORA on the iPhone 6 and take photographs of their face with the rear-facing camera. Reliability of patient-taken photographs with NORA for acne evaluation compared with in-person examination findings. Acne assessment measures included lesion count (total, inflammatory, noninflammatory, and cystic) and IGA for acne severity. A total of 69 patients (37 male [54%] and 32 female [46%]; mean [SD] age, 22.7 [7.7] years) enrolled in the study. The intraclass correlation coefficients of in-person and photograph-based acne evaluations indicated strong agreement. The intraclass correlation coefficient for total lesion count was 0.81; for the IGA, 0.75. Inflammatory lesion count, noninflammatory lesion count, and cyst count had intraclass correlation coefficients of 0.72, 0.72, and 0.82, respectively. This study found agreement between acne evaluations performed in person and from self-photographs with NORA. As a reliable telehealth technology for acne, NORA can be used as a teledermatology platform for dermatology research and can

  19. Digital watermarks in electronic document circulation

    Directory of Open Access Journals (Sweden)

    Vitaliy Grigorievich Ivanenko

    2017-07-01

    Full Text Available This paper reviews different protection methods for electronic documents, their good and bad qualities. Common attacks on electronic documents are analyzed. Digital signature and ways of eliminating its flaws are studied. Different digital watermark embedding methods are described, they are divided into 2 types. The solution to protection of electronic documents is based on embedding digital watermarks. Comparative analysis of this methods is given. As a result, the most convenient method is suggested – reversible data hiding. It’s remarked that this technique excels at securing the integrity of the container and its digital watermark. Digital watermark embedding system should prevent illegal access to the digital watermark and its container. Digital watermark requirements for electronic document protection are produced. Legal aspect of copyright protection is reviewed. Advantages of embedding digital watermarks in electronic documents are produced. Modern reversible data hiding techniques are studied. Distinctive features of digital watermark use in Russia are highlighted. Digital watermark serves as an additional layer of defense, that is in most cases unknown to the violator. With an embedded digital watermark, it’s impossible to misappropriate the authorship of the document, even if the intruder signs his name on it. Therefore, digital watermarks can act as an effective additional tool to protect electronic documents.

  20. Learning Global-Local Distance Metrics for Signature-Based Biometric Cryptosystems

    Directory of Open Access Journals (Sweden)

    George S. Eskander Ekladious

    2017-11-01

    Full Text Available Biometric traits, such as fingerprints, faces and signatures have been employed in bio-cryptosystems to secure cryptographic keys within digital security schemes. Reliable implementations of these systems employ error correction codes formulated as simple distance thresholds, although they may not effectively model the complex variability of behavioral biometrics like signatures. In this paper, a Global-Local Distance Metric (GLDM framework is proposed to learn cost-effective distance metrics, which reduce within-class variability and augment between-class variability, so that simple error correction thresholds of bio-cryptosystems provide high classification accuracy. First, a large number of samples from a development dataset are used to train a global distance metric that differentiates within-class from between-class samples of the population. Then, once user-specific samples are available for enrollment, the global metric is tuned to a local user-specific one. Proof-of-concept experiments on two reference offline signature databases confirm the viability of the proposed approach. Distance metrics are produced based on concise signature representations consisting of about 20 features and a single prototype. A signature-based bio-cryptosystem is designed using the produced metrics and has shown average classification error rates of about 7% and 17% for the PUCPR and the GPDS-300 databases, respectively. This level of performance is comparable to that obtained with complex state-of-the-art classifiers.

  1. A Signature Comparing Android Mobile Application Utilizing Feature Extracting Algorithms

    Directory of Open Access Journals (Sweden)

    Paul Grafilon

    2017-08-01

    Full Text Available The paper presented one of the application that can be done using smartphones camera. Nowadays forgery is one of the most undetected crimes. With the forensic technology used today it is still difficult for authorities to compare and define what a real signature is and what a forged signature is. A signature is a legal representation of a person. All transactions are based on a signature. Forgers may use a signature to sign illegal contracts and withdraw from bank accounts undetected. A signature can also be forged during election periods for repeated voting. Addressing the issues a signature should always be secure. Signature verification is a reduced problem that still poses a real challenge for researchers. The literature on signature verification is quite extensive and shows two main areas of research off-line and on-line systems. Off-line systems deal with a static image of the signature i.e. the result of the action of signing while on-line systems work on the dynamic process of generating the signature i.e. the action of signing itself. The researchers have found a way to resolve the concerns. A mobile application that integrates the camera to take a picture of a signature analyzes it and compares it to other signatures for verification. It will exist to help citizens to be more cautious and aware with issues regarding the signatures. This might also be relevant to help organizations and institutions such as banks and insurance companies in verifying signatures that may avoid unwanted transactions and identity theft. Furthermore this might help the authorities in the never ending battle against crime especially against forgers and thieves. The project aimed to design and develop a mobile application that integrates the smartphone camera for verifying and comparing signatures for security using the best algorithm possible. As the result of the development the said smartphone camera application is functional and reliable.

  2. Intersubjectivity in a digital genre: the Spanish indefinite pronoun uno (“one”) and person deixis in Yahoo Questions&Answers

    OpenAIRE

    Rasson, Marie; De Cock, Barbara; 14th International Pragmatics Conference

    2015-01-01

    In this paper, we study various mechanisms to create intersubjectivity in a digital genre, namely Yahoo Questions and Answers (YQA). More concretely, we focus on the Spanish indefinite strategy uno (“one”) and its interaction with deictic person pronouns. YQA aims to provide assistance to users, who can ask other users questions on topics of all types. The other users respond by giving advice - often by referring to their personal experience - or their opinion on a given issue (Placencia, 201...

  3. Digital health increasing the impact with personalized design

    NARCIS (Netherlands)

    Empelen, P. van; Otten, W.; Molema, H.; Keijsers, J.; Mooij, R.

    2016-01-01

    Digital health is considered the ‘holy grail’ of effective and sustainable health(care). It uses the latest technology, apps and data to support and improve health. Digital health tools can benefit both patients and healthy individuals, with support and advice. But healthcare professionals,

  4. The Personal Digital Library (PDL)-based e-learning: Using the PDL as an e-learning support tool

    Science.gov (United States)

    Deng, Xiaozhao; Ruan, Jianhai

    The paper describes a support tool for learners engaged in e-learning, the Personal Digital Library (PDL). The characteristics and functionality of the PDL are presented. Suggested steps for constructing and managing a PDL are outlined and discussed briefly. The authors believe that the PDL as a support tool of e-learning will be important and essential in the future.

  5. Integrating Iris and Signature Traits for Personal Authentication Using User-SpecificWeighting

    Directory of Open Access Journals (Sweden)

    Serestina Viriri

    2012-03-01

    Full Text Available Biometric systems based on uni-modal traits are characterized by noisy sensor data, restricted degrees of freedom, non-universality and are susceptible to spoof attacks. Multi-modal biometric systems seek to alleviate some of these drawbacks by providing multiple evidences of the same identity. In this paper, a user-score-based weighting technique for integrating the iris and signature traits is presented. This user-specific weighting technique has proved to be an efficient and effective fusion scheme which increases the authentication accuracy rate of multi-modal biometric systems. The weights are used to indicate the importance of matching scores output by each biometrics trait. The experimental results show that our biometric system based on the integration of iris and signature traits achieve a false rejection rate (FRR of 0.08% and a false acceptance rate (FAR of 0.01%.

  6. Lung Cancer Signature Biomarkers: tissue specific semantic similarity based clustering of Digital Differential Display (DDD data

    Directory of Open Access Journals (Sweden)

    Srivastava Mousami

    2012-11-01

    Full Text Available Abstract Background The tissue-specific Unigene Sets derived from more than one million expressed sequence tags (ESTs in the NCBI, GenBank database offers a platform for identifying significantly and differentially expressed tissue-specific genes by in-silico methods. Digital differential display (DDD rapidly creates transcription profiles based on EST comparisons and numerically calculates, as a fraction of the pool of ESTs, the relative sequence abundance of known and novel genes. However, the process of identifying the most likely tissue for a specific disease in which to search for candidate genes from the pool of differentially expressed genes remains difficult. Therefore, we have used ‘Gene Ontology semantic similarity score’ to measure the GO similarity between gene products of lung tissue-specific candidate genes from control (normal and disease (cancer sets. This semantic similarity score matrix based on hierarchical clustering represents in the form of a dendrogram. The dendrogram cluster stability was assessed by multiple bootstrapping. Multiple bootstrapping also computes a p-value for each cluster and corrects the bias of the bootstrap probability. Results Subsequent hierarchical clustering by the multiple bootstrapping method (α = 0.95 identified seven clusters. The comparative, as well as subtractive, approach revealed a set of 38 biomarkers comprising four distinct lung cancer signature biomarker clusters (panel 1–4. Further gene enrichment analysis of the four panels revealed that each panel represents a set of lung cancer linked metastasis diagnostic biomarkers (panel 1, chemotherapy/drug resistance biomarkers (panel 2, hypoxia regulated biomarkers (panel 3 and lung extra cellular matrix biomarkers (panel 4. Conclusions Expression analysis reveals that hypoxia induced lung cancer related biomarkers (panel 3, HIF and its modulating proteins (TGM2, CSNK1A1, CTNNA1, NAMPT/Visfatin, TNFRSF1A, ETS1, SRC-1, FN1, APLP2, DMBT1

  7. Is Personalized Communication Superior? Personalization and Consumers’ Characteristics

    NARCIS (Netherlands)

    Maslowska, E.; Smit, E.G.; van den Putte, B.

    2011-01-01

    Personalized communication has become a very popular marketing strategy, but the research on its effectiveness is still limited. This study examined the effectiveness of personalized digital newsletters in terms of increased attention, evaluation, attitude, and intention. Participants (N = 124) were

  8. Current Trends in the Detection of Sociocultural Signatures: Data-Driven Models

    Energy Technology Data Exchange (ETDEWEB)

    Sanfilippo, Antonio P.; Bell, Eric B.; Corley, Courtney D.

    2014-09-15

    The harvesting of behavioral data and their analysis through evidence-based reasoning enable the detection of sociocultural signatures in their context to support situation awareness and decision making. Harvested data are used as training materials from which to infer computational models of sociocultural behaviors or calibrate parameters for such models. Harvested data also serve as evidence input that the models use to provide insights about observed and future behaviors for targets of interest. The harvested data is often the result of assembling diverse data types and aggregating them into a form suitable for analysis. Data need to be analyzed to bring out the categories of content that are relevant to the domain being addressed in order to train or run a model. If, for example, we are modeling the intent of a group to engage in violent behavior using messages that the group has broadcasted, then these messages need to be processed to extract and measure indicators of violent intent. The extracted indicators and the associated measurements (e.g. rates or counts of occurrence) can then be used to train/calibrate and run computational models that assess the propensity for violence expressed in the source message. Ubiquitous access to the Internet, mobile telephony and technologies such as digital photography and digital video have enabled social media application platforms such as Facebook, YouTube, and Twitter that are altering the nature of human social interaction. The fast increasing pace of online social interaction introduces new challenges and opportunities for gathering sociocultural data. Challenges include the development of harvesting and processing techniques tailored to new data environments and formats (e.g. Twitter, Facebook), the integration of social media content with traditional media content, and the protection of personal privacy. As these and other challenges are addressed, a new wealth of behavioral data and data analysis methods becomes

  9. An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model

    Directory of Open Access Journals (Sweden)

    Guomin Zhou

    2017-01-01

    Full Text Available Digital signature schemes with additional properties have broad applications, such as in protecting the identity of signers allowing a signer to anonymously sign a message in a group of signers (also known as a ring. While these number-theoretic problems are still secure at the time of this research, the situation could change with advances in quantum computing. There is a pressing need to design PKC schemes that are secure against quantum attacks. In this paper, we propose a novel code-based threshold ring signature scheme with a leader-participant model. A leader is appointed, who chooses some shared parameters for other signers to participate in the signing process. This leader-participant model enhances the performance because every participant including the leader could execute the decoding algorithm (as a part of signing process upon receiving the shared parameters from the leader. The time complexity of our scheme is close to Courtois et al.’s (2001 scheme. The latter is often used as a basis to construct other types of code-based signature schemes. Moreover, as a threshold ring signature scheme, our scheme is as efficient as the normal code-based ring signature.

  10. CANDID: Comparison algorithm for navigating digital image databases

    Energy Technology Data Exchange (ETDEWEB)

    Kelly, P.M.; Cannon, T.M.

    1994-02-21

    In this paper, we propose a method for calculating the similarity between two digital images. A global signature describing the texture, shape, or color content is first computed for every image stored in a database, and a normalized distance between probability density functions of feature vectors is used to match signatures. This method can be used to retrieve images from a database that are similar to an example target image. This algorithm is applied to the problem of search and retrieval for database containing pulmonary CT imagery, and experimental results are provided.

  11. Digital patient: Personalized and translational data management through the MyHealthAvatar EU project.

    Science.gov (United States)

    Kondylakis, Haridimos; Spanakis, Emmanouil G; Sfakianakis, Stelios; Sakkalis, Vangelis; Tsiknakis, Manolis; Marias, Kostas; Xia Zhao; Hong Qing Yu; Feng Dong

    2015-08-01

    The advancements in healthcare practice have brought to the fore the need for flexible access to health-related information and created an ever-growing demand for the design and the development of data management infrastructures for translational and personalized medicine. In this paper, we present the data management solution implemented for the MyHealthAvatar EU research project, a project that attempts to create a digital representation of a patient's health status. The platform is capable of aggregating several knowledge sources relevant for the provision of individualized personal services. To this end, state of the art technologies are exploited, such as ontologies to model all available information, semantic integration to enable data and query translation and a variety of linking services to allow connecting to external sources. All original information is stored in a NoSQL database for reasons of efficiency and fault tolerance. Then it is semantically uplifted through a semantic warehouse which enables efficient access to it. All different technologies are combined to create a novel web-based platform allowing seamless user interaction through APIs that support personalized, granular and secure access to the relevant information.

  12. Cryptographic key generation using handwritten signature

    OpenAIRE

    Freire, Manuel R.; Fiérrez, Julián; Ortega-García, Javier

    2006-01-01

    M. Freire-Santos ; J. Fierrez-Aguilar ; J. Ortega-Garcia; "Cryptographic key generation using handwritten signature", Biometric Technology for Human Identification III, Proc. SPIE 6202 (April 17, 2006); doi:10.1117/12.665875. Copyright 2006 Society of Photo‑Optical Instrumentation Engineers. One print or electronic copy may be made for personal use only. Systematic reproduction and distribution, duplication of any material in this paper for a fee or for commercial purposes, or modification of...

  13. Signature-based User Authentication

    OpenAIRE

    Hámorník, Juraj

    2015-01-01

    This work aims on missing handwritten signature authentication in Windows. Result of this work is standalone software that allow users to log into Windows by writing signature. We focus on security of signature authentification and best overall user experience. We implemented signature authentification service that accept signature and return user access token if signature is genuine. Signature authentification is done by comparing given signature to signature patterns by their similarity. Si...

  14. A Lattice-Based Identity-Based Proxy Blind Signature Scheme in the Standard Model

    Directory of Open Access Journals (Sweden)

    Lili Zhang

    2014-01-01

    Full Text Available A proxy blind signature scheme is a special form of blind signature which allowed a designated person called proxy signer to sign on behalf of original signers without knowing the content of the message. It combines the advantages of proxy signature and blind signature. Up to date, most proxy blind signature schemes rely on hard number theory problems, discrete logarithm, and bilinear pairings. Unfortunately, the above underlying number theory problems will be solvable in the postquantum era. Lattice-based cryptography is enjoying great interest these days, due to implementation simplicity and provable security reductions. Moreover, lattice-based cryptography is believed to be hard even for quantum computers. In this paper, we present a new identity-based proxy blind signature scheme from lattices without random oracles. The new scheme is proven to be strongly unforgeable under the standard hardness assumption of the short integer solution problem (SIS and the inhomogeneous small integer solution problem (ISIS. Furthermore, the secret key size and the signature length of our scheme are invariant and much shorter than those of the previous lattice-based proxy blind signature schemes. To the best of our knowledge, our construction is the first short lattice-based identity-based proxy blind signature scheme in the standard model.

  15. Desain Sistem Keamanan Distribusi Data Dengan Menerapkan XML Encryption Dan XML Signature Berbasis Teknologi Web Service

    Directory of Open Access Journals (Sweden)

    Slamet Widodo

    2012-01-01

    Full Text Available Development of information technologies is often misused by an organization or a person to take criminal acts, such as the ability to steal and modify information in the data distribution for evil criminal purpose. The Rural Bank of Boyolali is conducting online financial transactions rather intensively, thus it requiring a security system on the distribution of data and credit transactions for their customer among branches offices to head office. The purpose of this study was to build a security system in credit transactions in Rural Bank of Boyolali for their customers among branches offices to head office. One way in protecting data distribution was used XML encryption and XML signature. The application of encryption technique in XML and digital signature in XML by using web service by using the AES (Advanced Encryption Standard and RSA (Rivest-Shamir-Adleman algorithms. This study was resulted the SOAP (Simple Object Access Protocol message security system, with XML and WSDL (Web Services Description Language, over HTTP (Hypertext Transfer Protocol to protect the customers’ credit transactions from intruders. Analysis of examination indicated that the data size (bytes transferred as results of uncompressed XML encryption were larger than compressed XML Encryption, which leads to significant changes between the data transferred that was the processing time of the compressed data was faster than uncompressed XML encryption.

  16. Effects of Aesthetic Chills on a Cardiac Signature of Emotionality.

    Directory of Open Access Journals (Sweden)

    Maria Sumpf

    Full Text Available Previous studies have shown that a cardiac signature of emotionality (referred to as EK, which can be computed from the standard 12 lead electrocardiogram, ECG, predicts inter-individual differences in the tendency to experience and express positive emotion. Here, we investigated whether EK values can be transiently modulated during stimulation with participant-selected music pieces and film scenes that elicit strongly positive emotion.The phenomenon of aesthetic chills, as indicated by measurable piloerection on the forearm, was used to accurately locate moments of peak emotional responses during stimulation. From 58 healthy participants, continuous EK values, heart rate, and respiratory frequency were recorded during stimulation with film scenes and music pieces, and were related to the aesthetic chills. EK values, as well as heart rate, increased significantly during moments of peak positive emotion accompanied by piloerection.These results are the first to provide evidence for an influence of momentary psychological state on a cardiac signature of emotional personality (as reflected in EK values. The possibility to modulate ECG amplitude signatures via stimulation with emotionally significant music pieces and film scenes opens up new perspectives for the use of emotional peak experiences in the therapy of disorders characterized by flattened emotionality, such as depression or schizoid personality disorder.

  17. Effects of Aesthetic Chills on a Cardiac Signature of Emotionality.

    Science.gov (United States)

    Sumpf, Maria; Jentschke, Sebastian; Koelsch, Stefan

    2015-01-01

    Previous studies have shown that a cardiac signature of emotionality (referred to as EK, which can be computed from the standard 12 lead electrocardiogram, ECG), predicts inter-individual differences in the tendency to experience and express positive emotion. Here, we investigated whether EK values can be transiently modulated during stimulation with participant-selected music pieces and film scenes that elicit strongly positive emotion. The phenomenon of aesthetic chills, as indicated by measurable piloerection on the forearm, was used to accurately locate moments of peak emotional responses during stimulation. From 58 healthy participants, continuous EK values, heart rate, and respiratory frequency were recorded during stimulation with film scenes and music pieces, and were related to the aesthetic chills. EK values, as well as heart rate, increased significantly during moments of peak positive emotion accompanied by piloerection. These results are the first to provide evidence for an influence of momentary psychological state on a cardiac signature of emotional personality (as reflected in EK values). The possibility to modulate ECG amplitude signatures via stimulation with emotionally significant music pieces and film scenes opens up new perspectives for the use of emotional peak experiences in the therapy of disorders characterized by flattened emotionality, such as depression or schizoid personality disorder.

  18. Automatic Generation of Mashups for Personalized Commerce in Digital TV by Semantic Reasoning

    Science.gov (United States)

    Blanco-Fernández, Yolanda; López-Nores, Martín; Pazos-Arias, José J.; Martín-Vicente, Manuela I.

    The evolution of information technologies is consolidating recommender systems as essential tools in e-commerce. To date, these systems have focused on discovering the items that best match the preferences, interests and needs of individual users, to end up listing those items by decreasing relevance in some menus. In this paper, we propose extending the current scope of recommender systems to better support trading activities, by automatically generating interactive applications that provide the users with personalized commercial functionalities related to the selected items. We explore this idea in the context of Digital TV advertising, with a system that brings together semantic reasoning techniques and new architectural solutions for web services and mashups.

  19. Real Traceable Signatures

    Science.gov (United States)

    Chow, Sherman S. M.

    Traceable signature scheme extends a group signature scheme with an enhanced anonymity management mechanism. The group manager can compute a tracing trapdoor which enables anyone to test if a signature is signed by a given misbehaving user, while the only way to do so for group signatures requires revealing the signer of all signatures. Nevertheless, it is not tracing in a strict sense. For all existing schemes, T tracing agents need to recollect all N' signatures ever produced and perform RN' “checks” for R revoked users. This involves a high volume of transfer and computations. Increasing T increases the degree of parallelism for tracing but also the probability of “missing” some signatures in case some of the agents are dishonest.

  20. Signature Balancing

    NARCIS (Netherlands)

    Noordkamp, H.W.; Brink, M. van den

    2006-01-01

    Signatures are an important part of the design of a ship. In an ideal situation, signatures must be as low as possible. However, due to budget constraints it is most unlikely to reach this ideal situation. The arising question is which levels of signatures are optimal given the different scenarios

  1. Digital Signature : Comparative study of its usage in developed and developing countries

    OpenAIRE

    Thangavel, Jayakumar

    2014-01-01

    The online trading is growing widely day by day, which makes safety the biggest concern while carrying out trading by electronic means. As many other operations can be done with digital environment and internet, operation that provides identity validation should also be added to the digital environment. When data are transferred, the user should make sure that there are no changes in the original data while transferring them from sender to receiver. And it has also become necessary to authent...

  2. CRC-113 gene expression signature for predicting prognosis in patients with colorectal cancer.

    Science.gov (United States)

    Nguyen, Minh Nam; Choi, Tae Gyu; Nguyen, Dinh Truong; Kim, Jin-Hwan; Jo, Yong Hwa; Shahid, Muhammad; Akter, Salima; Aryal, Saurav Nath; Yoo, Ji Youn; Ahn, Yong-Joo; Cho, Kyoung Min; Lee, Ju-Seog; Choe, Wonchae; Kang, Insug; Ha, Joohun; Kim, Sung Soo

    2015-10-13

    Colorectal cancer (CRC) is the third leading cause of global cancer mortality. Recent studies have proposed several gene signatures to predict CRC prognosis, but none of those have proven reliable for predicting prognosis in clinical practice yet due to poor reproducibility and molecular heterogeneity. Here, we have established a prognostic signature of 113 probe sets (CRC-113) that include potential biomarkers and reflect the biological and clinical characteristics. Robustness and accuracy were significantly validated in external data sets from 19 centers in five countries. In multivariate analysis, CRC-113 gene signature showed a stronger prognostic value for survival and disease recurrence in CRC patients than current clinicopathological risk factors and molecular alterations. We also demonstrated that the CRC-113 gene signature reflected both genetic and epigenetic molecular heterogeneity in CRC patients. Furthermore, incorporation of the CRC-113 gene signature into a clinical context and molecular markers further refined the selection of the CRC patients who might benefit from postoperative chemotherapy. Conclusively, CRC-113 gene signature provides new possibilities for improving prognostic models and personalized therapeutic strategies.

  3. Experience with digital acoustic monitoring systems for PWRs and BWRs

    International Nuclear Information System (INIS)

    Olma, B.J.

    1998-01-01

    Substantial progress could be reached both in system technics and in application of digital acoustic monitoring systems for assessing mechanical integrity of reactor primary systems. For the surveillance of PWRs and BWRs during power operation of the plants, acoustic signals of Loose Parts Monitoring System sensors are continuously monitored for signal bursts associated with metallic impacts. ISTec/GRS experience with its digital systems MEDEA and RAMSES has shown that acoustic signature analysis is very successful for detecting component failures at an early stage. Methods for trending and classification of digital burst signals are shown, experience with their practical use will be presented. (author)

  4. Supervised Multi-Authority Scheme with Blind Signature for IoT with Attribute Based Encryption

    Science.gov (United States)

    Nissenbaum, O. V.; Ponomarov, K. Y.; Zaharov, A. A.

    2018-04-01

    This article proposes a three-side cryptographic scheme for verifying device attributes with a Supervisor and a Certification Authority (CA) for attribute-based encryption. Two options are suggested: using a message authentication code and using a digital signature. The first version is suitable for networks with one CA, and the second one for networks with several CAs, including dynamic systems. Also, the addition of this scheme with a blind signature is proposed to preserve the confidentiality of the device attributes from the CA. The introduction gives a definition and a brief historical overview of attribute-based encryption (ABE), addresses the use of ABE in the Internet of Things.

  5. Methods for using a biometric parameter in the identification of persons

    Science.gov (United States)

    Hively, Lee M [Philadelphia, TN

    2011-11-22

    Brain waves are used as a biometric parameter to provide for authentication and identification of personnel. The brain waves are sampled using EEG equipment and are processed using phase-space distribution functions to compare digital signature data from enrollment of authorized individuals to data taken from a test subject to determine if the data from the test subject matches the signature data to a degree to support positive identification.

  6. Personalized Recommender System for Digital Libraries

    Science.gov (United States)

    Omisore, M. O.; Samuel, O. W.

    2014-01-01

    The huge amount of information available online has given rise to personalization and filtering systems. Recommender systems (RS) constitute a specific type of information filtering technique that present items according to user's interests. In this research, a web-based personalized recommender system capable of providing learners with books that…

  7. On the Privacy Protection of Biometric Traits: Palmprint, Face, and Signature

    Science.gov (United States)

    Panigrahy, Saroj Kumar; Jena, Debasish; Korra, Sathya Babu; Jena, Sanjay Kumar

    Biometrics are expected to add a new level of security to applications, as a person attempting access must prove who he or she really is by presenting a biometric to the system. The recent developments in the biometrics area have lead to smaller, faster and cheaper systems, which in turn has increased the number of possible application areas for biometric identity verification. The biometric data, being derived from human bodies (and especially when used to identify or verify those bodies) is considered personally identifiable information (PII). The collection, use and disclosure of biometric data — image or template, invokes rights on the part of an individual and obligations on the part of an organization. As biometric uses and databases grow, so do concerns that the personal data collected will not be used in reasonable and accountable ways. Privacy concerns arise when biometric data are used for secondary purposes, invoking function creep, data matching, aggregation, surveillance and profiling. Biometric data transmitted across networks and stored in various databases by others can also be stolen, copied, or otherwise misused in ways that can materially affect the individual involved. As Biometric systems are vulnerable to replay, database and brute-force attacks, such potential attacks must be analysed before they are massively deployed in security systems. Along with security, also the privacy of the users is an important factor as the constructions of lines in palmprints contain personal characteristics, from face images a person can be recognised, and fake signatures can be practised by carefully watching the signature images available in the database. We propose a cryptographic approach to encrypt the images of palmprints, faces, and signatures by an advanced Hill cipher technique for hiding the information in the images. It also provides security to these images from being attacked by above mentioned attacks. So, during the feature extraction, the

  8. Crafting a positive professional digital profile to augment your practice.

    Science.gov (United States)

    Kraakevik, Jeff

    2016-02-01

    A digital profile is the sum content about a person on the Internet. A digital profile can be composed of personal or professional information shared on public Web sites posted personally or by others. One of the most effective ways to build a positive professional digital profile is through social media. It is increasingly important to maintain a positive digital profile as others mine the Internet to find out about a professional prior to meeting him or her. As the digital environment continues to grow, it will become increasingly difficult to neglect a professional digital profile without potential negative consequences. There are many benefits to creating a digital presence and using the tools available to learn about neurology and interact with other professionals and patients in ways that were not possible in the past. The spread of social media to a large part of the population makes it unlikely to go away.

  9. Digital Discretion

    DEFF Research Database (Denmark)

    Busch, Peter Andre; Zinner Henriksen, Helle

    2018-01-01

    discretion is suggested to reduce this footprint by influencing or replacing their discretionary practices using ICT. What is less researched is whether digital discretion can cause changes in public policy outcomes, and under what conditions such changes can occur. Using the concept of public service values......This study reviews 44 peer-reviewed articles on digital discretion published in the period from 1998 to January 2017. Street-level bureaucrats have traditionally had a wide ability to exercise discretion stirring debate since they can add their personal footprint on public policies. Digital......, we suggest that digital discretion can strengthen ethical and democratic values but weaken professional and relational values. Furthermore, we conclude that contextual factors such as considerations made by policy makers on the macro-level and the degree of professionalization of street...

  10. Some Proxy Signature and Designated verifier Signature Schemes over Braid Groups

    OpenAIRE

    Lal, Sunder; Verma, Vandani

    2009-01-01

    Braids groups provide an alternative to number theoretic public cryptography and can be implemented quite efficiently. The paper proposes five signature schemes: Proxy Signature, Designated Verifier, Bi-Designated Verifier, Designated Verifier Proxy Signature And Bi-Designated Verifier Proxy Signature scheme based on braid groups. We also discuss the security aspects of each of the proposed schemes.

  11. Securing optical code-division multiple-access networks with a postswitching coding scheme of signature reconfiguration

    Science.gov (United States)

    Huang, Jen-Fa; Meng, Sheng-Hui; Lin, Ying-Chen

    2014-11-01

    The optical code-division multiple-access (OCDMA) technique is considered a good candidate for providing optical layer security. An enhanced OCDMA network security mechanism with a pseudonoise (PN) random digital signals type of maximal-length sequence (M-sequence) code switching to protect against eavesdropping is presented. Signature codes unique to individual OCDMA-network users are reconfigured according to the register state of the controlling electrical shift registers. Examples of signature reconfiguration following state switching of the controlling shift register for both the network user and the eavesdropper are numerically illustrated. Dynamically changing the PN state of the shift register to reconfigure the user signature sequence is shown; this hinders eavesdroppers' efforts to decode correct data sequences. The proposed scheme increases the probability of eavesdroppers committing errors in decoding and thereby substantially enhances the degree of an OCDMA network's confidentiality.

  12. A Method for Automatic Inspection of Printed Circuit Boards by Using the Thermal Signature

    International Nuclear Information System (INIS)

    Amer, H.H.; Zekry, A.A.; Elaraby, S.; Ghareeb, K.E.

    2012-01-01

    This paper aims to design a system for automating inspection of the printed circuit boards (PCBs) by using the thermal signature of the different integrated circuits (I.C). The proposed inspection system consists of the inspection circuit, data acquisition system (DAS) and personal computer. Inspection is done by comparing the thermal signature of normally operated circuit with the thermal signature of circuit under test. One thermistor is assigned to each component in the circuit. The thermistor must touch tightly the surface of the I.C. to sense its temperature during the inspection process. Matlab software is used to represent the thermal signature through different colors. The Turbo C software is used to develop a program for acquiring and comparing the thermal signature of the circuit under the test with the reference circuit. If the colors of the two thermal signatures for the same I.C. are same then the circuit under test is fault free and does not contain any defect. On the other side, if the colors of the two thermal signatures for the same I.C. are different then the circuit under test is defective

  13. The influence of physical and biomechanical processes on the ink trace. Methodological foundations for the forensic analysis of signatures

    NARCIS (Netherlands)

    Franke, Katrin

    2005-01-01

    Handwritten signatures play an important role in daily life. They are widely accepted and frequently used to verify the claimed identity of a person. Consequently, there is a strong need for objective and automatic signature evaluation. The dissertation at hand aims (i) to provide a scientific basis

  14. Security analysis of boolean algebra based on Zhang-Wang digital signature scheme

    International Nuclear Information System (INIS)

    Zheng, Jinbin

    2014-01-01

    In 2005, Zhang and Wang proposed an improvement signature scheme without using one-way hash function and message redundancy. In this paper, we show that this scheme exits potential safety concerns through the analysis of boolean algebra, such as bitwise exclusive-or, and point out that mapping is not one to one between assembly instructions and machine code actually by means of the analysis of the result of the assembly program segment, and which possibly causes safety problems unknown to the software

  15. Security analysis of boolean algebra based on Zhang-Wang digital signature scheme

    Energy Technology Data Exchange (ETDEWEB)

    Zheng, Jinbin, E-mail: jbzheng518@163.com [School of Mathematics and Computer Science, Long Yan University, Longyan 364012 (China)

    2014-10-06

    In 2005, Zhang and Wang proposed an improvement signature scheme without using one-way hash function and message redundancy. In this paper, we show that this scheme exits potential safety concerns through the analysis of boolean algebra, such as bitwise exclusive-or, and point out that mapping is not one to one between assembly instructions and machine code actually by means of the analysis of the result of the assembly program segment, and which possibly causes safety problems unknown to the software.

  16. Quantifying radionuclide signatures from a γ–γ coincidence system

    International Nuclear Information System (INIS)

    Britton, Richard; Jackson, Mark J.; Davies, Ashley V.

    2015-01-01

    A method for quantifying gamma coincidence signatures has been developed, and tested in conjunction with a high-efficiency multi-detector system to quickly identify trace amounts of radioactive material. The γ–γ system utilises fully digital electronics and list-mode acquisition to time–stamp each event, allowing coincidence matrices to be easily produced alongside typical ‘singles’ spectra. To quantify the coincidence signatures a software package has been developed to calculate efficiency and cascade summing corrected branching ratios. This utilises ENSDF records as an input, and can be fully automated, allowing the user to quickly and easily create/update a coincidence library that contains all possible γ and conversion electron cascades, associated cascade emission probabilities, and true-coincidence summing corrected γ cascade detection probabilities. It is also fully searchable by energy, nuclide, coincidence pair, γ multiplicity, cascade probability and half-life of the cascade. The probabilities calculated were tested using measurements performed on the γ–γ system, and found to provide accurate results for the nuclides investigated. Given the flexibility of the method, (it only relies on evaluated nuclear data, and accurate efficiency characterisations), the software can now be utilised for a variety of systems, quickly and easily calculating coincidence signature probabilities. - Highlights: • Monte-Carlo based software developed to easily create/update a coincidence signal library for environmental radionuclides. • Coincidence library utilised to accurately quantify gamma coincidence signatures. • All coincidence signature probabilities are corrected for cascade summing, conversion electron emission and pair production. • Key CTBTO relevant radionuclides have been tested to verify the calculated correction factors. • Accurately quantifying coincidence signals during routine analysis will allow dramatically improved detection

  17. Video - Personal Competence Manager (Digital Cinema pilot)

    NARCIS (Netherlands)

    Santos, Patricia

    2008-01-01

    Video demonstrating the PCM (version year 2007) in the context of the Digital Cinema pilot. Elaborated for a eLearning Seminar within the International Master on Communication and Education (Autonomous University of Barcelona, academic year 2008)

  18. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  19. Your digital home is no longer your castle: how cloud computing transforms the (legal) relationship between individuals and their personal records

    NARCIS (Netherlands)

    Irion, K.

    2015-01-01

    In line with the overall trend individuals’ personal affairs, too, are composed of digital records to an increasing amount. At about the same time, the era of local storage in end-user equipment is about to give way to remote computing where data resides on third party equipment (cloud computing).

  20. Molecular signatures from omics data: from chaos to consensus.

    Science.gov (United States)

    Sung, Jaeyun; Wang, Yuliang; Chandrasekaran, Sriram; Witten, Daniela M; Price, Nathan D

    2012-08-01

    In the past 15 years, new "omics" technologies have made it possible to obtain high-resolution molecular snapshots of organisms, tissues, and even individual cells at various disease states and experimental conditions. It is hoped that these developments will usher in a new era of personalized medicine in which an individual's molecular measurements are used to diagnose disease, guide therapy, and perform other tasks more accurately and effectively than is possible using standard approaches. There now exists a vast literature of reported "molecular signatures". However, despite some notable exceptions, many of these signatures have suffered from limited reproducibility in independent datasets, insufficient sensitivity or specificity to meet clinical needs, or other challenges. In this paper, we discuss the process of molecular signature discovery on the basis of omics data. In particular, we highlight potential pitfalls in the discovery process, as well as strategies that can be used to increase the odds of successful discovery. Despite the difficulties that have plagued the field of molecular signature discovery, we remain optimistic about the potential to harness the vast amounts of available omics data in order to substantially impact clinical practice. Copyright © 2012 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  1. SIGNATURE: A workbench for gene expression signature analysis

    Directory of Open Access Journals (Sweden)

    Chang Jeffrey T

    2011-11-01

    Full Text Available Abstract Background The biological phenotype of a cell, such as a characteristic visual image or behavior, reflects activities derived from the expression of collections of genes. As such, an ability to measure the expression of these genes provides an opportunity to develop more precise and varied sets of phenotypes. However, to use this approach requires computational methods that are difficult to implement and apply, and thus there is a critical need for intelligent software tools that can reduce the technical burden of the analysis. Tools for gene expression analyses are unusually difficult to implement in a user-friendly way because their application requires a combination of biological data curation, statistical computational methods, and database expertise. Results We have developed SIGNATURE, a web-based resource that simplifies gene expression signature analysis by providing software, data, and protocols to perform the analysis successfully. This resource uses Bayesian methods for processing gene expression data coupled with a curated database of gene expression signatures, all carried out within a GenePattern web interface for easy use and access. Conclusions SIGNATURE is available for public use at http://genepattern.genome.duke.edu/signature/.

  2. Signature movements lead to efficient search for threatening actions.

    Directory of Open Access Journals (Sweden)

    Jeroen J A van Boxtel

    Full Text Available The ability to find and evade fighting persons in a crowd is potentially life-saving. To investigate how the visual system processes threatening actions, we employed a visual search paradigm with threatening boxer targets among emotionally-neutral walker distractors, and vice versa. We found that a boxer popped out for both intact and scrambled actions, whereas walkers did not. A reverse correlation analysis revealed that observers' responses clustered around the time of the "punch", a signature movement of boxing actions, but not around specific movements of the walker. These findings support the existence of a detector for signature movements in action perception. This detector helps in rapidly detecting aggressive behavior in a crowd, potentially through an expedited (subcortical threat-detection mechanism.

  3. Improving symptom communication through personal digital assistants: the CHAT (Communicating Health Assisted by Technology) project.

    Science.gov (United States)

    Post, Douglas M; Shapiro, Charles L; Cegala, Donald J; David, Prabu; Katz, Mira L; Krok, Jessica L; Phillips, Gary S; McAlearney, Ann Sheck; Lehman, Jennifer S; Hicks, William; Paskett, Electra D

    2013-12-01

    Communication problems impede effective symptom management during chemotherapy. The primary aim of this pilot randomized controlled trial was to test the effects of a personal digital assistant-delivered communication intervention on pain, depression, and fatigue symptoms among breast cancer patients undergoing chemotherapy. Secondary aims included assessment of 1) study feasibility, 2) patient and clinician responses to study participation, and 3) intervention effects on health-related quality of life (HRQoL) and communication self-efficacy. Intervention group participants (n = 27) completed symptom inventories at baseline, once per week during treatment, and at posttreatment. Depending on symptom severity, they viewed race-concordant videos on how to communicate about pain, depression and/or fatigue, using the personal digital assistant. Symptom records were tracked and shared with clinicians. Control group participants (n = 23) received usual care. Longitudinal random effects modeling assessed the changes in average symptom scores over time. Descriptive statistics assessed study feasibility and intervention effects on HRQoL and communication self-efficacy. Postintervention focus groups, interviews, and surveys assessed responses to study participation. Mean age of the participants was 51.0 years; 42 participants (84%) were white. In comparison with control, intervention group participants reported lower average pain severity over time (P = .015). Mean pain interference scores over time were marginally different between groups (P = .07); mean depression and fatigue scores over time were statistically nonsignificant. Feasibility outcomes and perspectives about study participation were positive. Mean pre-post decreases in HRQoL were generally higher among intervention group participants; pre-post changes in communication self-efficacy were equivalent. Mixed findings of the study indicate the need for future research.

  4. Anvendelse af den personlige, elektroniske medicinprofil i et ambulatorium

    DEFF Research Database (Denmark)

    Reuther, L.O.; List, S.B.; Christensen, Hanne Rolighed

    2008-01-01

    INTRODUCTION: A person with a digital signature can access his or her own personal electronic medicinal profile (PEM) which can also be accessed by the person's prescribing doctors. The PEM provides an overview and contains an overview of the prescription medicine sold to the patient over the pre...

  5. Digital Marketing in the Business Environment

    OpenAIRE

    Ištvanić, Marin; Crnjac Milić, Dominika; Krpić, Zdravko

    2017-01-01

    Promotion of products has become an increasingly important component in the new digital age, mostly thanks to digital marketing. The traditional form of marketing is lagging behind digital marketing, which offers users new opportunities like personalized messages or answers to a search query. There are several ways to advertise on the internet, and in this paper, ways and tools will be presented that allow digital advertising as well as their advantages an...

  6. Digital printing

    Science.gov (United States)

    Sobotka, Werner K.

    1997-02-01

    Digital printing is described as a tool to replace conventional printing machines completely. Still this goal was not reached until now with any of the digital printing technologies to be described in the paper. Productivity and costs are still the main parameters and are not really solved until now. Quality in digital printing is no problem anymore. Definition of digital printing is to transfer digital datas directly on the paper surface. This step can be carried out directly or with the use of an intermediate image carrier. Keywords in digital printing are: computer- to-press; erasable image carrier; image carrier with memory. Digital printing is also the logical development of the new digital area as it is pointed out in Nicholas Negropotes book 'Being Digital' and also the answer to networking and Internet technologies. Creating images text and color in one country and publishing the datas in another country or continent is the main advantage. Printing on demand another big advantage and last but not least personalization the last big advantage. Costs and being able to coop with this new world of prepress technology is the biggest disadvantage. Therefore the very optimistic growth rates for the next few years are really nonexistent. The development of complete new markets is too slow and the replacing of old markets is too small.

  7. Exploring digital professionalism.

    Science.gov (United States)

    Ellaway, Rachel H; Coral, Janet; Topps, David; Topps, Maureen

    2015-01-01

    The widespread use of digital media (both computing devices and the services they access) has blurred the boundaries between our personal and professional lives. Contemporary students are the last to remember a time before the widespread use of the Internet and they will be the first to practice in a largely e-health environment. This article explores concepts of digital professionalism and their place in contemporary medical education, and proposes a series of principles of digital professionalism to guide teaching, learning and practice in the healthcare professions. Despite the many risks and fears surrounding their use, digital media are not an intrinsic threat to medical professionalism. Professionals should maintain the capacity for deliberate, ethical, and accountable practice when using digital media. The authors describe a digital professionalism framework structured around concepts of proficiency, reputation, and responsibility. Digital professionalism can be integrated into medical education using strategies based on awareness, alignment, assessment, and accountability. These principles of digital professionalism provide a way for medical students and medical practitioners to embrace the positive aspects of digital media use while being mindful and deliberate in its use to avoid or minimize any negative consequences.

  8. Practical implementation of a methodology for digital images authentication using forensics techniques

    OpenAIRE

    Francisco Rodríguez-Santos; Guillermo Delgado-Gutierréz; Leonardo Palacios-Luengas; Rubén Vázquez Medina

    2015-01-01

    This work presents a forensics analysis methodology implemented to detect modifications in JPEG digital images by analyzing the image’s metadata, thumbnail, camera traces and compression signatures. Best practices related with digital evidence and forensics analysis are considered to determine if the technical attributes and the qualities of an image are consistent with each other. This methodology is defined according to the recommendations of the Good Practice Guide for Computer-Based Elect...

  9. Experience with CANDID: Comparison algorithm for navigating digital image databases

    Energy Technology Data Exchange (ETDEWEB)

    Kelly, P.; Cannon, M.

    1994-10-01

    This paper presents results from the authors experience with CANDID (Comparison Algorithm for Navigating Digital Image Databases), which was designed to facilitate image retrieval by content using a query-by-example methodology. A global signature describing the texture, shape, or color content is first computed for every image stored in a database, and a normalized similarity measure between probability density functions of feature vectors is used to match signatures. This method can be used to retrieve images from a database that are similar to a user-provided example image. Results for three test applications are included.

  10. 12 CFR 225.86 - What activities are permissible for any financial holding company?

    Science.gov (United States)

    2010-01-01

    ... authority for digital signatures and authenticating the identity of persons conducting financial and... such products or services; or (2) A government or government agency that provides information concerning the services or benefits made available by the government or government agency, assists persons in...

  11. Digital Relationships

    DEFF Research Database (Denmark)

    Ledborg Hansen, Richard

    -­rich information and highly interesting communication are sky-­high and rising. With a continuous increase in digitized communication follows a decrease in face-­to-­face encounters and our ability to engage in inter-­personal relationships are suffering for it (Davis, 2013). The behavior described in this paper......-­‐Jones, 2011) for increases in effectiveness and efficiency we indiscriminately embrace digital communication and digitized information dissemination with enthusiasm – at the risk of ignoring the potentially dark side of technology. However, technology also holds a promise for better understanding precisely...... for the same reasons – that the growing amount of digitized communication “out there” represents data waiting to be sifted, analyzed and decoded. In this paper “Facebook behavior” refers to a particular behavior characterized by presenting your self and representations of selected self in the hope of getting...

  12. Digital health and digital biomarkers – enabling value chains on health data

    Directory of Open Access Journals (Sweden)

    Meister Sven

    2016-09-01

    Full Text Available Smart Devices, IoT and Co. are changing healthcare. The possibilities for pervasive sensing and analysis are fast increasing and new therapy concepts as well as business models are arising, related to the term “Digital Health”. The paper will give a brief overview on the history and ask, whether Digital Health is more than Telemedicine 4.0. Furthermore, we will ask for the prospective currency to participate in new preventive offer. Data is the new oil – Digital Biomarkers enable new value chains on health data and allow for the personalization of healthcare. We will present ongoing work of Fraunhofer ISST on a Digital Biomarker called beHealthy Health Score.

  13. Concept of digital nomad: fundamental risks of digital economy development

    Directory of Open Access Journals (Sweden)

    Elena Lyudvigovna Iakovleva

    2017-12-01

    Full Text Available Objective to identify the key risks of the digital economy development. Methods abstractlogical and dialectical methods. Results a modern individual cannot imagine their life without digital devices which facilitate their functioning and enable them to be included into the virtual space. The role of digital economy in the changes in all spheres of human life is analyzed in the article. With the growing role of the digital economy the approaches to business models formation are changing as well as the role of digital assets. This also leads to the transformation of human behavior the new risks of the digital economy accelerated development. In this regard the article characterizes an individual as a digital nomad defines the features of their behavior in the socioeconomic environment and highlights the main risks that arise in connection with digital nomadism. It is determined that one of the most characteristic features of a modern person is hypermobility eparkourism. In addition the paper describes the problems of anonymity in virtual space and the emergence of systems that provide anonymity of the individual as well as the risks arising in connection with that. The problem of lack of culture and value systems in the virtual space is highlighted as well the problem of developing contradictions in information leading to the alienation of people from the real world. It was determined that the informatization of economy on the one hand leads to faster business processes reduced transaction costs saving of variable costs due to robotization of production and on the other hand it leads to the transformation of competition growth of tension in society in connection with the job cuts. Another problem is personal and national security associated with the development of social networks the developers of which are other countries and also with the emergence of mechanisms of influence on mass consciousness. Scientific novelty it is shown that the risks

  14. Promoting Culturally Respectful Cancer Education Through Digital Storytelling.

    Science.gov (United States)

    Cueva, Melany; Kuhnley, Regina; Lanier, Anne; Dignan, Mark; Revels, Laura; Schoenberg, Nancy E; Cueva, Katie

    Cancer is the leading cause of mortality among Alaska Native people. Over half of Alaska Native people live in rural communities where specially trained community members called Community Health Aides/Practitioners (CHA/Ps) provide health care. In response to CHA/Ps' expressed desire to learn more about cancer, four 5-day cancer education and digital storytelling courses were provided in 2014. Throughout each course, participants explored cancer information, reflected on their personal experiences, and envisioned how they might apply their knowledge within their communities. Each course participant also created a personal and authentic digital story, a methodology increasingly embraced by Indigenous communities as a way to combine storytelling traditions with modern technology to promote both individual and community health. Opportunities to learn of CHA/Ps' experiences with cancer and digital storytelling included a 3-page end-of-course written evaluation, a weekly story-showing log kept for 4 weeks post-course, a group teleconference held 1-2 weeks post-course, and a survey administered 6 months post-course. Participants described digital storytelling as a culturally respectful way to support cancer awareness and education. Participants described the process of creating digital stories as supporting knowledge acquisition, encouraging personal reflection, and sparking a desire to engage in cancer risk reduction activities for themselves and with their families and patients. As a result of creating a personalized digital story, CHA/Ps reported feeling differently about cancer, noting an increase in cancer knowledge and comfort to talk about cancer with clients and family. Indigenous digital stories have potential for broad use as a culturally appropriate health messaging tool.

  15. Digital literacies

    CERN Document Server

    Hockly, Nicky; Pegrum, Mark

    2014-01-01

    Dramatic shifts in our communication landscape have made it crucial for language teaching to go beyond print literacy and encompass the digital literacies which are increasingly central to learners' personal, social, educational and professional lives. By situating these digital literacies within a clear theoretical framework, this book provides educators and students alike with not just the background for a deeper understanding of these key 21st-century skills, but also the rationale for integrating these skills into classroom practice. This is the first methodology book to address not jus

  16. A survey of passive technology for digital image forensics

    Institute of Scientific and Technical Information of China (English)

    LUO Weiqi; QU Zhenhua; PAN Feng; HUANG Jiwu

    2007-01-01

    Over the past years,digital images have been widely used in the Internet and other applications.Whilst image processing techniques are developing at a rapid speed,tampering with digital images without leaving any obvious traces becomes easier and easier.This may give rise to some problems such as image authentication.A new passive technology for image forensics has evolved quickly during the last few years.Unlike the signature-based or watermark-based methods,the new technology does not need any signature generated or watermark embedded in advance,it assumes that different imaging devices or processing would introduce different inherent patterns into the output images.These underlying patterns are consistent in the original untampered images and would be altered after some kind of manipulations.Thus,they can be used as evidence for image source identification and alteration detection.In this paper,we will discuss this new forensics technology and give an overview of the prior literatures.Some concluding remarks are made about the state of the art and the challenges in this novel technology.

  17. Promoting Personal Recovery in People with Persisting Psychotic Disorders: Development and Pilot Study of a Novel Digital Intervention.

    Science.gov (United States)

    Thomas, Neil; Farhall, John; Foley, Fiona; Leitan, Nuwan Dominic; Villagonzalo, Kristi-Ann; Ladd, Emma; Nunan, Cassy; Farnan, Sue; Frankish, Rosalie; Smark, Tara; Rossell, Susan L; Sterling, Leon; Murray, Greg; Castle, David Jonathon; Kyrios, Michael

    2016-01-01

    For people with persisting psychotic disorders, personal recovery has become an important target of mental health services worldwide. Strongly influenced by mental health service consumer perspectives, personal recovery refers to being able to live a satisfying and contributing life irrespective of ongoing symptoms and disability. Contact with peers with shared lived experience is often cited as facilitative of recovery. We aimed to develop and pilot a novel recovery-based digitally supported intervention for people with a psychotic illness. We developed a website to be used on a tablet computer by mental health workers to structure therapeutic discussions about personal recovery. Central to the site was a series of video interviews of people with lived experience of psychosis discussing how they had navigated issues within their own recovery based on the Connectedness-Hope-Identity-Meaning-Empowerment model of recovery. We examined the feasibility and acceptability of an 8-session low intensity intervention using this site in 10 participants with persisting psychotic disorders and conducted a proof-of-concept analysis of outcomes. All 10 participants completed the full course of sessions, and it was possible to integrate use of the website into nearly all sessions. Participant feedback confirmed that use of the website was a feasible and acceptable way of working. All participants stated that they would recommend the intervention to others. Post-intervention, personal recovery measured by the Questionnaire for the Process of Recovery had improved by an average standardized effect of d  = 0.46, 95% CI [0.07, 0.84], and 8 of the 10 participants reported that their mental health had improved since taking part in the intervention. In-session use of digital resources featuring peer accounts of recovery is feasible and acceptable and shows promising outcomes. A randomized controlled trial is the next step in evaluating the efficacy of this low intensity intervention

  18. Vehicle recognition by using acoustic signature and classic DSP techniques

    Directory of Open Access Journals (Sweden)

    María Fernanda Díaz Velásquez

    2016-06-01

    Full Text Available This paper shows the application of the classic technique of digital signal processing (DSP, the cross-correlation, used for the detection of acoustic signatures of road traffic in Cali city, Colombia. Future goal is to build a detection software that through real time measures allows us estimate the levels of acoustic pollution in the city by using simulation models of road traffic, in the framework of environmentally-friendly smart cities. Final results of the experimental tests showed an accuracy of 71.43% for specific vehicle detection.

  19. Securing the Digital Economy

    Directory of Open Access Journals (Sweden)

    Valentin P. MĂZĂREANU

    2010-01-01

    Full Text Available The Digital economy has naturally led to thereconfiguration of communication and information processes.These processes are depending on the computer, starting fromthe personal one and reaching to computer networks, whetherlocal, metropolitan or global. These led to the development ofsuch information systems able to communicate information,systems that must also ensure the security of communicationsbetween computers within the company, but also betweencomputers of different parties, outside the company. As thecommunication between computers in the network has evolvedto electronic funds transfer (EFT, digital money andcommunication of personal data, internet banking, etc., theimportance of security issues of data transmitted over thenetwork also has increased. Even more as the network hasevolved into a “wireless” one.

  20. Hearing Aid Personalization

    DEFF Research Database (Denmark)

    Nielsen, Jens Brehm; Nielsen, Jakob; Jensen, Bjørn Sand

    2013-01-01

    Modern digital hearing aids require and offer a great level of personalization. Today, this personalization is not performed based directly on what the user actually perceives, but on a hearing-care professional’s interpretation of what the user explains about what is perceived. In this paper......, an interactive personalization system based on Gaussian process regression and active learning is proposed, which personalize the hearing aids based directly on what the user perceives. Preliminary results demonstrate a significant difference between a truly personalized setting obtained with the proposed system...

  1. Digital Afterlife : A General Overview

    OpenAIRE

    Adhikari, Sandeep

    2012-01-01

    In this age of information, the means and mediums of exchanging information are adapting digital technologies that are developing at very rapid pace. Digital Afterlife can be understood as maintaining or transforming digital content of users present in the web-space according to users will in case of users deceased or incapability of operating their personal accounts which are considered to be a virtual representation of users in the web platforms. The user generated content can be termed as ...

  2. How digital design shapes political participation: A natural experiment with social information.

    Science.gov (United States)

    Hale, Scott A; John, Peter; Margetts, Helen; Yasseri, Taha

    2018-01-01

    Political behaviour increasingly takes place on digital platforms, where people are presented with a range of social information-real-time feedback about the behaviour of peers and reference groups-which can stimulate (or depress) participation. This social information is hypothesized to impact the distribution of political activity, stimulating participation in mobilizations that are increasing in popularity, and depressing participation in those that appear to be less popular, leading to a non-normal distribution. Changes to these platforms can generate natural experiments allowing for an estimate of the impact of different kinds of social information on participation. This paper tests the hypothesis that social information shapes the distribution of political mobilizations by examining the introduction of trending information to the homepage of the UK government petition platform. The introduction of the trending feature did not increase the overall number of signatures per day, but the distribution of signatures across petitions changed significantly-the most popular petitions gained more signatures at the expense of those with fewer signatories. We further find significant differences between petitions trending at different ranks on the homepage. This evidence suggests that the ubiquity of trending information on digital platforms is introducing instability into political markets, as has been shown for cultural markets. As well as highlighting the importance of digital design in shaping political behaviour, the findings suggest that a non-negligible group of individuals visit the homepage of the site looking for petitions to sign, without having decided the issues they wish to support in advance. These 'aimless petitioners' are particularly susceptible to changes in social information.

  3. Compound and Sequential Digital Exclusion : Internet Skills, Uses, and Outcomes

    NARCIS (Netherlands)

    van Deursen, Alexander Johannes Aloysius Maria; Helsper, Ellen; Eynon, Rebecca; van Dijk, Johannes A.G.M.

    2016-01-01

    Through a survey with a representative sample of Dutch Internet users, this paper examines (1) compound digital exclusion, that is, whether a person who lacks a particular type of digital skill also lacks another kind of skill; whether a person who does not engage in a particular way with the

  4. Radiation signatures

    International Nuclear Information System (INIS)

    McGlynn, S.P.; Varma, M.N.

    1992-01-01

    A new concept for modelling radiation risk is proposed. This concept is based on the proposal that the spectrum of molecular lesions, which we dub ''the radiation signature'', can be used to identify the quality of the causal radiation. If the proposal concerning radiation signatures can be established then, in principle, both prospective and retrospective risk determination can be assessed on an individual basis. A major goal of biophysical modelling is to relate physical events such as ionization, excitation, etc. to the production of radiation carcinogenesis. A description of the physical events is provided by track structure. The track structure is determined by radiation quality, and it can be considered to be the ''physical signature'' of the radiation. Unfortunately, the uniqueness characteristics of this signature are dissipated in biological systems in ∼10 -9 s. Nonetheless, it is our contention that this physical disturbance of the biological system eventuates later, at ∼10 0 s, in molecular lesion spectra which also characterize the causal radiation. (author)

  5. Analysis of Radar Doppler Signature from Human Data

    Directory of Open Access Journals (Sweden)

    M. ANDRIĆ

    2014-04-01

    Full Text Available This paper presents the results of time (autocorrelation and time-frequency (spectrogram analyses of radar signals returned from the moving human targets. When a radar signal falls on the human target which is moving toward or away from the radar, the signals reflected from different parts of his body produce a Doppler shift that is proportional to the velocity of those parts. Moving parts of the body causes the characteristic Doppler signature. The main contribution comes from the torso which causes the central Doppler frequency of target. The motion of arms and legs induces modulation on the returned radar signal and generates sidebands around the central Doppler frequency, referred to as micro-Doppler signatures. Through analyses on experimental data it was demonstrated that the human motion signature extraction is better using spectrogram. While the central Doppler frequency can be determined using the autocorrelation and the spectrogram, the extraction of the fundamental cadence frequency using the autocorrelation is unreliable when the target is in the clutter presence. It was shown that the fundamental cadence frequency increases with increasing dynamic movement of people and simultaneously the possibility of its extraction is proportional to the degree of synchronization movements of persons in the group.

  6. Digital signal integrity and stability in the ATLAS Level-1 Calorimeter Trigger

    CERN Document Server

    Achenbach, R; Aharrouche, M; Andrei, V; Åsman, B; Barnett, B M; Bauss, B; Bendel, M; Bohm, C; Booth, J R A; Bracinik, J; Brawn, I P; Charlton, D G; Childers, J T; Collins, N J; Curtis, C J; Davis, A O; Eckweiler, S; Eisenhandler, E F; Faulkner, P J W; Fleckner, J; Föhlisch, F; Gee, C N P; Gillman, A R; Goringer, C; Groll, M; Hadley, D R; Hanke, P; Hellman, S; Hidvegi, A; Hillier, S J; Johansen, M; Kluge, E E; Kühl, T; Landon, M; Lendermann, V; Lilley, J N; Mahboubi, K; Mahout, G; Meier, K; Middleton, R P; Moa, T; Morris, J D; Müller, F; Neusiedl, A; Ohm, C; Oltmann, B; Perera, V J O; Prieur, D P F; Qian, W; Rieke, S; Rühr, F; Sankey, D P C; Schäfer, U; Schmitt, K; Schultz-Coulon, H C; Silverstein, S; Sjölin, J; Staley, R J; Stamen, R; Stockton, M C; Tan, C L A; Tapprogge, S; Thomas, J P; Thompson, P D; Watkins, P M; Watson, A; Weber, P; Wessels, M; Wildt, M

    2008-01-01

    The ATLAS Level-1 calorimeter trigger is a hardware-based system with the goal of identifying high-pT objects and to measure total and missing ET in the ATLAS calorimeters within an overall latency of 2.5 microseconds. This trigger system is composed of the Preprocessor which digitises about 7200 analogue input channels and two digital processors to identify high-pT signatures and to calculate the energy sums. The digital part consists of multi-stage, pipelined custom-built modules. The high demands on connectivity between the initial analogue stage and digital part and between the custom-built modules are presented. Furthermore the techniques to establish timing regimes and verify connectivity and stable operation of these digital links will be described.

  7. Radiation Gene-expression Signatures in Primary Breast Cancer Cells.

    Science.gov (United States)

    Minafra, Luigi; Bravatà, Valentina; Cammarata, Francesco P; Russo, Giorgio; Gilardi, Maria C; Forte, Giusi I

    2018-05-01

    In breast cancer (BC) care, radiation therapy (RT) is an efficient treatment to control localized tumor. Radiobiological research is needed to understand molecular differences that affect radiosensitivity of different tumor subtypes and the response variability. The aim of this study was to analyze gene expression profiling (GEP) in primary BC cells following irradiation with doses of 9 Gy and 23 Gy delivered by intraoperative electron radiation therapy (IOERT) in order to define gene signatures of response to high doses of ionizing radiation. We performed GEP by cDNA microarrays and evaluated cell survival after IOERT treatment in primary BC cell cultures. Real-time quantitative reverse transcription polymerase chain reaction (qRT-PCR) was performed to validate candidate genes. We showed, for the first time, a 4-gene and a 6-gene signature, as new molecular biomarkers, in two primary BC cell cultures after exposure at 9 Gy and 23 Gy respectively, for which we observed a significantly high survival rate. Gene signatures activated by different doses of ionizing radiation may predict response to RT and contribute to defining a personalized biological-driven treatment plan. Copyright© 2018, International Institute of Anticancer Research (Dr. George J. Delinasios), All rights reserved.

  8. Chief Marketing Officer and the Challenge of Digital Maturity

    OpenAIRE

    PURCAREA, Ioan Matei; NEGRICEA, Costel Iliuta

    2014-01-01

    Digital is the new normal today, the digitally transformation allowing step by step a closer connection with customers, and accordingly answer to the new requirements of the supply chain management. The rules of engagement are changed by the digital lives of customers, the digital leaders creating value across physical/digital products, services, and experience. Chief Marketing Officer (CMO) is proving a more devoted personal attention and a more directly involvement in digital initiatives, t...

  9. Design and Implementation of a Mobile Voting System Using a Novel Oblivious and Proxy Signature

    Directory of Open Access Journals (Sweden)

    Shin-Yan Chiou

    2017-01-01

    Full Text Available Electronic voting systems can make the voting process much more convenient. However, in such systems, if a server signs blank votes before users vote, it may cause undue multivoting. Furthermore, if users vote before the signing of the server, voting information will be leaked to the server and may be compromised. Blind signatures could be used to prevent leaking voting information from the server; however, malicious users could produce noncandidate signatures for illegal usage at that time or in the future. To overcome these problems, this paper proposes a novel oblivious signature scheme with a proxy signature function to satisfy security requirements such as information protection, personal privacy, and message verification and to ensure that no one can cheat other users (including the server. We propose an electronic voting system based on the proposed oblivious and proxy signature scheme and implement this scheme in a smartphone application to allow users to vote securely and conveniently. Security analyses and performance comparisons are provided to show the capability and efficiency of the proposed scheme.

  10. Digital pathology in nephrology clinical trials, research, and pathology practice.

    Science.gov (United States)

    Barisoni, Laura; Hodgin, Jeffrey B

    2017-11-01

    In this review, we will discuss (i) how the recent advancements in digital technology and computational engineering are currently applied to nephropathology in the setting of clinical research, trials, and practice; (ii) the benefits of the new digital environment; (iii) how recognizing its challenges provides opportunities for transformation; and (iv) nephropathology in the upcoming era of kidney precision and predictive medicine. Recent studies highlighted how new standardized protocols facilitate the harmonization of digital pathology database infrastructure and morphologic, morphometric, and computer-aided quantitative analyses. Digital pathology enables robust protocols for clinical trials and research, with the potential to identify previously underused or unrecognized clinically useful parameters. The integration of digital pathology with molecular signatures is leading the way to establishing clinically relevant morpho-omic taxonomies of renal diseases. The introduction of digital pathology in clinical research and trials, and the progressive implementation of the modern software ecosystem, opens opportunities for the development of new predictive diagnostic paradigms and computer-aided algorithms, transforming the practice of renal disease into a modern computational science.

  11. Two-Step Injection Method for Collecting Digital Evidence in Digital Forensics

    Directory of Open Access Journals (Sweden)

    Nana Rachmana Syambas

    2015-01-01

    Full Text Available In digital forensic investigations, the investigators take digital evidence from computers, laptops or other electronic goods. There are many complications when a suspect or related person does not want to cooperate or has removed digital evidence. A lot of research has been done with the goal of retrieving data from flash memory or other digital storage media from which the content has been deleted. Unfortunately, such methods cannot guarantee that all data will be recovered. Most data can only be recovered partially and sometimes not perfectly, so that some or all files cannot be opened. This paper proposes the development of a new method for the retrieval of digital evidence called the Two-Step Injection method (TSI. It focuses on the prevention of the loss of digital evidence through the deletion of data by suspects or other parties. The advantage of this method is that the system works in secret and can be combined with other digital evidence applications that already exist, so that the accuracy and completeness of the resulting digital evidence can be improved. An experiment to test the effectiveness of the method was set up. The developed TSI system worked properly and had a 100% success rate.

  12. Archetype-Based Modeling of Persona for Comprehensive Personality Computing from Personal Big Data

    Science.gov (United States)

    Ma, Jianhua

    2018-01-01

    A model describing the wide variety of human behaviours called personality, is becoming increasingly popular among researchers due to the widespread availability of personal big data generated from the use of prevalent digital devices, e.g., smartphones and wearables. Such an approach can be used to model an individual and even digitally clone a person, e.g., a Cyber-I (cyber individual). This work is aimed at establishing a unique and comprehensive description for an individual to mesh with various personalized services and applications. An extensive research literature on or related to psychological modelling exists, i.e., into automatic personality computing. However, the integrity and accuracy of the results from current automatic personality computing is insufficient for the elaborate modeling in Cyber-I due to an insufficient number of data sources. To reach a comprehensive psychological description of a person, it is critical to bring in heterogeneous data sources that could provide plenty of personal data, i.e., the physiological data, and the Internet data. In addition, instead of calculating personality traits from personal data directly, an approach to a personality model derived from the theories of Carl Gustav Jung is used to measure a human subject’s persona. Therefore, this research is focused on designing an archetype-based modeling of persona covering an individual’s facets in different situations to approach a comprehensive personality model. Using personal big data to measure a specific persona in a certain scenario, our research is designed to ensure the accuracy and integrity of the generated personality model. PMID:29495343

  13. Archetype-Based Modeling of Persona for Comprehensive Personality Computing from Personal Big Data

    Directory of Open Access Journals (Sweden)

    Ao Guo

    2018-02-01

    Full Text Available A model describing the wide variety of human behaviours called personality, is becoming increasingly popular among researchers due to the widespread availability of personal big data generated from the use of prevalent digital devices, e.g., smartphones and wearables. Such an approach can be used to model an individual and even digitally clone a person, e.g., a Cyber-I (cyber individual. This work is aimed at establishing a unique and comprehensive description for an individual to mesh with various personalized services and applications. An extensive research literature on or related to psychological modelling exists, i.e., into automatic personality computing. However, the integrity and accuracy of the results from current automatic personality computing is insufficient for the elaborate modeling in Cyber-I due to an insufficient number of data sources. To reach a comprehensive psychological description of a person, it is critical to bring in heterogeneous data sources that could provide plenty of personal data, i.e., the physiological data, and the Internet data. In addition, instead of calculating personality traits from personal data directly, an approach to a personality model derived from the theories of Carl Gustav Jung is used to measure a human subject’s persona. Therefore, this research is focused on designing an archetype-based modeling of persona covering an individual’s facets in different situations to approach a comprehensive personality model. Using personal big data to measure a specific persona in a certain scenario, our research is designed to ensure the accuracy and integrity of the generated personality model.

  14. Archetype-Based Modeling of Persona for Comprehensive Personality Computing from Personal Big Data.

    Science.gov (United States)

    Guo, Ao; Ma, Jianhua

    2018-02-25

    A model describing the wide variety of human behaviours called personality, is becoming increasingly popular among researchers due to the widespread availability of personal big data generated from the use of prevalent digital devices, e.g., smartphones and wearables. Such an approach can be used to model an individual and even digitally clone a person, e.g., a Cyber-I (cyber individual). This work is aimed at establishing a unique and comprehensive description for an individual to mesh with various personalized services and applications. An extensive research literature on or related to psychological modelling exists, i.e., into automatic personality computing. However, the integrity and accuracy of the results from current automatic personality computing is insufficient for the elaborate modeling in Cyber-I due to an insufficient number of data sources. To reach a comprehensive psychological description of a person, it is critical to bring in heterogeneous data sources that could provide plenty of personal data, i.e., the physiological data, and the Internet data. In addition, instead of calculating personality traits from personal data directly, an approach to a personality model derived from the theories of Carl Gustav Jung is used to measure a human subject's persona. Therefore, this research is focused on designing an archetype-based modeling of persona covering an individual's facets in different situations to approach a comprehensive personality model. Using personal big data to measure a specific persona in a certain scenario, our research is designed to ensure the accuracy and integrity of the generated personality model.

  15. A novel prognostic six-CpG signature in glioblastomas.

    Science.gov (United States)

    Yin, An-An; Lu, Nan; Etcheverry, Amandine; Aubry, Marc; Barnholtz-Sloan, Jill; Zhang, Lu-Hua; Mosser, Jean; Zhang, Wei; Zhang, Xiang; Liu, Yu-He; He, Ya-Long

    2018-03-01

    We aimed to identify a clinically useful biomarker using DNA methylation-based information to optimize individual treatment of patients with glioblastoma (GBM). A six-CpG panel was identified by incorporating genome-wide DNA methylation data and clinical information of three distinct discovery sets and was combined using a risk-score model. Different validation sets of GBMs and lower-grade gliomas and different statistical methods were implemented for prognostic evaluation. An integrative analysis of multidimensional TCGA data was performed to molecularly characterize different risk tumors. The six-CpG risk-score signature robustly predicted overall survival (OS) in all discovery and validation cohorts and in a treatment-independent manner. It also predicted progression-free survival (PFS) in available patients. The multimarker epigenetic signature was demonstrated as an independent prognosticator and had better performance than known molecular indicators such as glioma-CpG island methylator phenotype (G-CIMP) and proneural subtype. The defined risk subgroups were molecularly distinct; high-risk tumors were biologically more aggressive with concordant activation of proangiogenic signaling at multimolecular levels. Accordingly, we observed better OS benefits of bevacizumab-contained therapy to high-risk patients in independent sets, supporting its implication in guiding usage of antiangiogenic therapy. Finally, the six-CpG signature refined the risk classification based on G-CIMP and MGMT methylation status. The novel six-CpG signature is a robust and independent prognostic indicator for GBMs and is of promising value to improve personalized management. © 2018 John Wiley & Sons Ltd.

  16. Optical spectral signatures of liquids by means of fiber optic technology for product and quality parameter identification

    Science.gov (United States)

    Mignani, A. G.; Ciaccheri, L.; Mencaglia, A. A.; Diaz-Herrera, N.; Garcia-Allende, P. B.; Ottevaere, H.; Thienpont, H.; Attilio, C.; Cimato, A.; Francalanci, S.; Paccagnini, A.; Pavone, F. S.

    2009-01-01

    Absorption spectroscopy in the wide 200-1700 nm spectral range is carried out by means of optical fiber instrumentation to achieve a digital mapping of liquids for the prediction of important quality parameters. Extra virgin olive oils from Italy and lubricant oils from turbines with different degrees of degradation were considered as "case studies". The spectral data were processed by means of multivariate analysis so as to obtain a correlation to quality parameters. In practice, the wide range absorption spectra were considered as an optical signature of the liquids from which to extract product quality information. The optical signatures of extra virgin olive oils were used to predict the content of the most important fatty acids. The optical signatures of lubricant oils were used to predict the concentration of the most important parameters for indicating the oil's degree of degradation, such as TAN, JOAP anti-wear index, and water content.

  17. Digitized forensics: retaining a link between physical and digital crime scene traces using QR-codes

    Science.gov (United States)

    Hildebrandt, Mario; Kiltz, Stefan; Dittmann, Jana

    2013-03-01

    The digitization of physical traces from crime scenes in forensic investigations in effect creates a digital chain-of-custody and entrains the challenge of creating a link between the two or more representations of the same trace. In order to be forensically sound, especially the two security aspects of integrity and authenticity need to be maintained at all times. Especially the adherence to the authenticity using technical means proves to be a challenge at the boundary between the physical object and its digital representations. In this article we propose a new method of linking physical objects with its digital counterparts using two-dimensional bar codes and additional meta-data accompanying the acquired data for integration in the conventional documentation of collection of items of evidence (bagging and tagging process). Using the exemplary chosen QR-code as particular implementation of a bar code and a model of the forensic process, we also supply a means to integrate our suggested approach into forensically sound proceedings as described by Holder et al.1 We use the example of the digital dactyloscopy as a forensic discipline, where currently progress is being made by digitizing some of the processing steps. We show an exemplary demonstrator of the suggested approach using a smartphone as a mobile device for the verification of the physical trace to extend the chain-of-custody from the physical to the digital domain. Our evaluation of the demonstrator is performed towards the readability and the verification of its contents. We can read the bar code despite its limited size of 42 x 42 mm and rather large amount of embedded data using various devices. Furthermore, the QR-code's error correction features help to recover contents of damaged codes. Subsequently, our appended digital signature allows for detecting malicious manipulations of the embedded data.

  18. Electronic Signature Policy

    Science.gov (United States)

    Establishes the United States Environmental Protection Agency's approach to adopting electronic signature technology and best practices to ensure electronic signatures applied to official Agency documents are legally valid and enforceable

  19. Image-based surveillance and security systems using personal computers for device aiming and digital image comparison

    International Nuclear Information System (INIS)

    Quiett, S.; Axtell, L.H.

    1987-01-01

    A detection-type security system using enhanced capability cameras or other imaging devices can aid in maintaining security from long distance and/or for large areas. To do so requires that the imaging device(s) be repeatedly and accurately positioned so that no areas are overlooked. Digital control using personal computers is the simplest method of achieving positional accuracy. The monitoring of large areas and/or a large number of areas also requires that a substantial quantity of visual information be catalogued and evaluated for potential security problems. While security personnel alone are typically used for such monitoring, as the quantity of visual information increases, the likelihood that potential security threats will be missed also increases. The ability of an image-based security system to detect potential security problems can be further increased with the use of selected image processing techniques. Utilizing personal computers for both imaging device position control as well as image processing, surveillance of large areas can be performed by a limited number of individuals with a high level of system confidence

  20. Engaging Elements of Cancer-Related Digital Stories in Alaska

    Science.gov (United States)

    Cueva, Melany; Kuhnley, Regina; Revels, Laura; Schoenberg, Nancy E.; Lanier, Anne; Dignan, Mark

    2015-01-01

    The tradition of storytelling is an integral part of Alaska Native cultures that continues to be a way of passing on knowledge. Using a story-based approach to share cancer education is grounded in Alaska Native traditions and people’s experiences and has the potential to positively impact cancer knowledge, understandings, and wellness choices. Community health workers (CHWs) in Alaska created a personal digital story as part of a 5-day, in-person cancer education course. To identify engaging elements of digital stories among Alaska Native people, one focus group was held in each of three different Alaska communities with a total of 29 adult participants. After viewing CHWs’ digital stories created during CHW cancer education courses, focus group participants commented verbally and in writing about cultural relevance, engaging elements, information learned, and intent to change health behavior. Digital stories were described by Alaska focus group participants as being culturally respectful, informational, inspiring, and motivational. Viewers shared that they liked digital stories because they were short (only 2–3 min); nondirective and not preachy; emotional, told as a personal story and not just facts and figures; and relevant, using photos that showed Alaskan places and people. PMID:25865400

  1. INCORRECT PRESERVATION OF AMPUTATED DIGITS

    Directory of Open Access Journals (Sweden)

    Uroš Ahčan

    2004-09-01

    Full Text Available Background. A decision to replant is critically dependent on the condition of the amputated digit and the way it was preserved during transport. The most common error is exposing the amputated digit to very low temperatures. Preservation directly on ice, on cooling devices in portable refrigerators, or on top of packets of frozen meat often result in a frozen and therefore unusable body digit.Methods. An inquiry questionnaire on correct methods of preservation of amputated digits was conducted on a sample of 30 lay persons, 30 medical students, and 15 physicians.Three simulations of most frequently used methods of preservation of amputated digit were conducted (the correct method; directly on ice; on cooling devices of portable refrigerators. Environment temperature of the (simulated amputated digits stored was measured.In a retrospective study, hospital records of patients treated at the Clinical department of plastic surgery and burns in Ljubljana between 1998 and 2002 were examined. We determined the number of replantations performed, gender of the patients, their age, the mechanism of the injury, the success rate of the replantation, and the duration of hospitalisation. In five case described in detail, we present an inadequate treatment of the amputated digits.Results. The results of the questionnaire survey show that no less than 86.7% of lay person respondents would have treated the injuries in an incorrect way; same holds for 43.4% students of medicine, and 33.3% of practicing physicians.The temperature of the simulated amputated digit remained above 5°C throughout the simulated correct treatment. When preserved directly on ice on or coolant bodies, the temperature dropped below the freezing point and never climbed above 0°C throughout the duration of the simulation (150 minutes.Between years 1998 and 2002, Clinical department of plastic surgery and burns at the University clinical centre Ljubljana admitted 124 injured persons with

  2. Inflammatory signatures distinguish metabolic health in African American women with obesity.

    Directory of Open Access Journals (Sweden)

    Gerald V Denis

    Full Text Available Obesity-driven Type 2 diabetes (T2D is a systemic inflammatory condition associated with cardiovascular disease. However, plasma cytokines and tissue inflammation that discriminate T2D risk in African American women with obese phenotypes are not well understood. We analyzed 64 circulating cytokines and chemokines in plasma of 120 African American women enrolled in the Black Women's Health Study. We used regression analysis to identify cytokines and chemokines associated with obesity, co-morbid T2D and hypertension, and compared results to obese women without these co-morbidities, as well as to lean women without the co-morbidities. We then used hierarchical clustering to generate inflammation signatures by combining the effects of identified cytokines and chemokines and summarized the signatures using an inflammation score. The analyses revealed six distinct signatures of sixteen cytokines/chemokines (P = 0.05 that differed significantly by prevalence of T2D (P = 0.004, obesity (P = 0.0231 and overall inflammation score (P < E-12. Signatures were validated in two independent cohorts of African American women with obesity: thirty nine subjects with no metabolic complications or with T2D and hypertension; and thirteen breast reduction surgical patients. The signatures in the validation cohorts closely resembled the distributions in the discovery cohort. We find that blood-based cytokine profiles usefully associate inflammation with T2D risks in vulnerable subjects, and should be combined with metabolism and obesity counselling for personalized risk assessment.

  3. Comparison of electronic digital alarm dosimeter with TLD

    International Nuclear Information System (INIS)

    Kumar, Pankaj; Pandey, J.P.N.; Shinde, A M.; Purohit, R.G.; Sarkar, P.K.

    2012-01-01

    Control of exposure of radiation workers on day to day basis has been made easy by use of semiconductor based electronic digital dosimeter. Additional dose constraints of 10 mSv for occupational radiation workers have made it essential to use such type of digital personal monitoring devices. In addition to conventional ionisation chamber based direct reading dosimeters, additional 35 semiconductor based digital dosimeters model MGP DMC 2000 S were used for the monitoring of personal exposure of radiation workers in a spent fuel reprocessing plant. Though better least count and good performance over a wide range of dose rate are claimed by the manufacture, before making use of such dosimeter on large scale, validation of its performance is required to be checked. In this paper, an effort is made to determine the performance of digital dosimeters, by exposing these digital dosimeters in combination with TLDs at different radiation levels and obtained results were compared and analysed

  4. Blinding for unanticipated signatures

    NARCIS (Netherlands)

    D. Chaum (David)

    1987-01-01

    textabstractPreviously known blind signature systems require an amount of computation at least proportional to the number of signature types, and also that the number of such types be fixed in advance. These requirements are not practical in some applications. Here, a new blind signature technique

  5. 1 CFR 18.7 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 1 General Provisions 1 2010-01-01 2010-01-01 false Signature. 18.7 Section 18.7 General Provisions... PREPARATION AND TRANSMITTAL OF DOCUMENTS GENERALLY § 18.7 Signature. The original and each duplicate original... stamped beneath the signature. Initialed or impressed signatures will not be accepted. Documents submitted...

  6. Audience Response Made Easy: Using Personal Digital Assistants as a Classroom Polling Tool

    Science.gov (United States)

    Menon, Anil S.; Moffett, Shannon; Enriquez, Melissa; Martinez, Miriam M.; Dev, Parvati; Grappone, Todd

    2004-01-01

    Both teachers and students benefit from an interactive classroom. The teacher receives valuable input about effectiveness, student interest, and comprehension, whereas student participation, active learning, and enjoyment of the class are enhanced. Cost and deployment have limited the use of existing audience response systems, allowing anonymous linking of teachers and students in the classroom. These limitations can be circumvented, however, by use of personal digital assistants (PDAs), which are cheaper and widely used by students. In this study, the authors equipped a summer histology class of 12 students with PDAs and wireless Bluetooth cards to allow access to a central server. Teachers displayed questions in multiple-choice format as a Web page on the server and students responded with their PDAs, a process referred to as polling. Responses were immediately compiled, analyzed, and displayed. End-of-class survey results indicated that students were enthusiastic about the polling tool. The surveys also provided technical feedback that will be valuable in streamlining future trials. PMID:14764615

  7. TANDA TANGAN DIGITAL MENGGUNAKAN QR CODE DENGAN METODE ADVANCED ENCRYPTION STANDARD

    Directory of Open Access Journals (Sweden)

    Abdul Gani Putra Suratma

    2017-04-01

    Full Text Available Tanda tangan digital (digital signature adalah sebuah skema matematis yang secara unik mengidentifikasikan seorang pengirim, sekaligus untuk membuktikan keaslian dari pemilik sebuah pesan atau dokumen digital, sehingga sebuah tanda tangan digital yang autentik (sah, sudah cukup menjadi alasan bagi penerima un- tuk percaya bahwa sebuah pesan atau dokumen yang diterima adalah berasal dari pengirim yang telah diketahui. Perkembangan teknologi memungkinkan adanya tanda tangan digital yang dapat digunakan untuk melakukan pembuktian secara matematis, sehingga informasi yang didapat oleh satu pihak dari pihak lain dapat diidentifikasi untuk memastikan keaslian informasi yang diterima. Tanda tangan digital merupakan mekanisme otentikasi yang memungkinkan pembuat pesan menambahkan sebuah kode yang bertindak sebagai tanda tangannya. Tujuan dari penelitian ini menerapkan QR Code atau yang dikenal dengan istilah QR (Quick Respon dan Algoritma yang akan ditambahkan yaitu AES (Advanced Encryption Standard sebagai tanda tangan digital sehingga hasil dari penelitian penerapan QR Code menggunakan algoritma Advanced Encryption Standard sebagai tanda tangan digital dapat berfungsi sebagai otentikasi tanda tangan pimpinan serta ve- rivikasi dokumen pengambilan barang yang sah. dari penelitian ini akurasi klasifi- kasi QR Code dengan menggunakan naïve bayes classifier sebesar 90% dengan precision positif sebesar 80% dan precision negatif sebesar 100%.

  8. An algorithm of discovering signatures from DNA databases on a computer cluster.

    Science.gov (United States)

    Lee, Hsiao Ping; Sheu, Tzu-Fang

    2014-10-05

    Signatures are short sequences that are unique and not similar to any other sequence in a database that can be used as the basis to identify different species. Even though several signature discovery algorithms have been proposed in the past, these algorithms require the entirety of databases to be loaded in the memory, thus restricting the amount of data that they can process. It makes those algorithms unable to process databases with large amounts of data. Also, those algorithms use sequential models and have slower discovery speeds, meaning that the efficiency can be improved. In this research, we are debuting the utilization of a divide-and-conquer strategy in signature discovery and have proposed a parallel signature discovery algorithm on a computer cluster. The algorithm applies the divide-and-conquer strategy to solve the problem posed to the existing algorithms where they are unable to process large databases and uses a parallel computing mechanism to effectively improve the efficiency of signature discovery. Even when run with just the memory of regular personal computers, the algorithm can still process large databases such as the human whole-genome EST database which were previously unable to be processed by the existing algorithms. The algorithm proposed in this research is not limited by the amount of usable memory and can rapidly find signatures in large databases, making it useful in applications such as Next Generation Sequencing and other large database analysis and processing. The implementation of the proposed algorithm is available at http://www.cs.pu.edu.tw/~fang/DDCSDPrograms/DDCSD.htm.

  9. Figure 2. Representation of the technological dimension of privacy-Educational Research on the Technological Dimension of Private Life

    OpenAIRE

    Liliana Mâţă

    2010-01-01

    Following the development of new technologies in recent decades have been a number of innovative, but also privacy threats, elements: bank cards, personal computers, communication networks, internet, digital signature, email, surveillance systems for children. The structure of the technological dimension of private life can be represented by the following elements (Figure 2): personal objects technology (material itSelf), electronic identity, personal blog (personal Self), spec...

  10. Dental practitioners and a digital future: an initial exploration of barriers and incentives to adopting digital technologies.

    Science.gov (United States)

    van der Zande, M M; Gorter, R C; Wismeijer, D

    2013-12-01

    Digital technologies are proliferating into dental practices. While their technical attributes have often been studied, it remains unclear why some dentists adopt and use these technologies more than others. AIM To explore the incentives for and barriers against accepting and using digital dental technologies. Eleven semi-structured qualitative interviews were conducted with experts in dentistry, dental technology and dental education in the Netherlands. Dentists' acceptance and use of digital technologies are to varying degrees driven by the perceived advantages over analogue methods, perceived influence on treatment quality, dentists' personal and professional orientation, and social influence from peers and external groups. These effects are complemented by personal and dental-practice characteristics. The findings suggest that there are large differences in motivation to adopt and use digital technologies between early adopters, late adopters and non-adopters, which should be examined in greater detail. We recommend that educators, dentists, and representatives of the dental industry who deal with the diffusion of these technologies take account of dentists' widely different attitudes to digitalisation.

  11. Fair quantum blind signatures

    International Nuclear Information System (INIS)

    Tian-Yin, Wang; Qiao-Yan, Wen

    2010-01-01

    We present a new fair blind signature scheme based on the fundamental properties of quantum mechanics. In addition, we analyse the security of this scheme, and show that it is not possible to forge valid blind signatures. Moreover, comparisons between this scheme and public key blind signature schemes are also discussed. (general)

  12. Bridging the digital divide: mobile access to personal health records among patients with diabetes.

    Science.gov (United States)

    Graetz, Ilana; Huang, Jie; Brand, Richard J; Hsu, John; Yamin, Cyrus K; Reed, Mary E

    2018-01-01

    Some patients lack regular computer access and experience a digital divide that causes them to miss internet-based health innovations. The diffusion of smartphones has increased internet access across the socioeconomic spectrum, and increasing the channels through which patients can access their personal health records (PHRs) could help bridge the divide in PHR use. We examined PHR use through a computer-based Web browser or mobile device. Cross-sectional historical cohort analysis. Among adult patients in the diabetes registry of an integrated healthcare delivery system, we studied the devices used to access their PHR during 2016. Among 267,208 patients with diabetes, 68.1% used the PHR in 2016; 60.6% of all log-ins were via computer and 39.4% were via mobile device. Overall, 63.9% used it from both a computer and mobile device, 29.6% used only a computer, and 6.5% used only a mobile device. After adjustment, patients who were black, Hispanic, or Asian; lived in lower socioeconomic status (SES) neighborhoods; or had lower engagement were all significantly more likely to use the PHR only from a mobile device (P digital divide in computer use, disproportionately reaching racial/ethnic minorities and lower SES patients. Nonetheless, even with a mobile-optimized and app-accessible PHR, differences in PHR use by race/ethnicity and SES remain. Continued efforts are needed to increase equitable access to PHRs among patients with chronic conditions.

  13. Five Guidelines for Selecting Hydrological Signatures

    Science.gov (United States)

    McMillan, H. K.; Westerberg, I.; Branger, F.

    2017-12-01

    Hydrological signatures are index values derived from observed or modeled series of hydrological data such as rainfall, flow or soil moisture. They are designed to extract relevant information about hydrological behavior, such as to identify dominant processes, and to determine the strength, speed and spatiotemporal variability of the rainfall-runoff response. Hydrological signatures play an important role in model evaluation. They allow us to test whether particular model structures or parameter sets accurately reproduce the runoff generation processes within the watershed of interest. Most modeling studies use a selection of different signatures to capture different aspects of the catchment response, for example evaluating overall flow distribution as well as high and low flow extremes and flow timing. Such studies often choose their own set of signatures, or may borrow subsets of signatures used in multiple other works. The link between signature values and hydrological processes is not always straightforward, leading to uncertainty and variability in hydrologists' signature choices. In this presentation, we aim to encourage a more rigorous approach to hydrological signature selection, which considers the ability of signatures to represent hydrological behavior and underlying processes for the catchment and application in question. To this end, we propose a set of guidelines for selecting hydrological signatures. We describe five criteria that any hydrological signature should conform to: Identifiability, Robustness, Consistency, Representativeness, and Discriminatory Power. We describe an example of the design process for a signature, assessing possible signature designs against the guidelines above. Due to their ubiquity, we chose a signature related to the Flow Duration Curve, selecting the FDC mid-section slope as a proposed signature to quantify catchment overall behavior and flashiness. We demonstrate how assessment against each guideline could be used to

  14. Digital enlightenment yearbook 2013 : the value of personal data

    CERN Document Server

    Hildebrandt, M; Waidner, M

    2013-01-01

    The value of personal data has traditionally been understood in ethical terms as a safeguard for personality rights such as human dignity and privacy. However, we have entered an era where personal data are mined, traded and monetized in the process of creating added value - often in terms of free services including efficient search, support for social networking and personalized communications. This volume investigates whether the economic value of personal data can be realized without compromising privacy, fairness and contextual integrity. It brings scholars and scientists from the discipli

  15. Malingering in Toxic Exposure. Classification Accuracy of Reliable Digit Span and WAIS-III Digit Span Scaled Scores

    Science.gov (United States)

    Greve, Kevin W.; Springer, Steven; Bianchini, Kevin J.; Black, F. William; Heinly, Matthew T.; Love, Jeffrey M.; Swift, Douglas A.; Ciota, Megan A.

    2007-01-01

    This study examined the sensitivity and false-positive error rate of reliable digit span (RDS) and the WAIS-III Digit Span (DS) scaled score in persons alleging toxic exposure and determined whether error rates differed from published rates in traumatic brain injury (TBI) and chronic pain (CP). Data were obtained from the files of 123 persons…

  16. Hyperspectral signatures and WorldView-3 imagery of Indian River Lagoon and Banana River Estuarine water and bottom types

    Science.gov (United States)

    Bostater, Charles R.; Oney, Taylor S.; Rotkiske, Tyler; Aziz, Samin; Morrisette, Charles; Callahan, Kelby; Mcallister, Devin

    2017-10-01

    Hyperspectral signatures and imagery collected during the spring and summer of 2017 and 2016 are presented. Ground sampling distances (GSD) and pixel sizes were sampled from just over a meter to less than 4.0 mm. A pushbroom hyperspectral imager was used to calculate bidirectional reflectance factor (BRF) signatures. Hyperspectral signatures of different water types and bottom habitats such as submerged seagrasses, drift algae and algal bloom waters were scanned using a high spectral and digital resolution solid state spectrograph. WorldView-3 satellite imagery with minimal water wave sun glint effects was used to demonstrate the ability to detect bottom features using a derivative reflectance spectroscopy approach with the 1.3 m GSD multispectral satellite channels centered at the solar induced fluorescence band. The hyperspectral remote sensing data collected from the Banana River and Indian River Lagoon watersheds represents previously unknown signatures to be used in satellite and airborne remote sensing of water in turbid waters along the US Atlantic Ocean coastal region and the Florida littoral zone.

  17. Quantum messages with signatures forgeable in arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Kim, Taewan; Choi, Jeong Woon; Jho, Nam-Su; Lee, Soojoon

    2015-01-01

    Even though a method to perfectly sign quantum messages has not been known, the arbitrated quantum signature scheme has been considered as one of the good candidates. However, its forgery problem has been an obstacle to the scheme becoming a successful method. In this paper, we consider one situation, which is slightly different from the forgery problem, that we use to check whether at least one quantum message with signature can be forged in a given scheme, although all the messages cannot be forged. If there are only a finite number of forgeable quantum messages in the scheme, then the scheme can be secured against the forgery attack by not sending forgeable quantum messages, and so our situation does not directly imply that we check whether the scheme is secure against the attack. However, if users run a given scheme without any consideration of forgeable quantum messages, then a sender might transmit such forgeable messages to a receiver and in such a case an attacker can forge the messages if the attacker knows them. Thus it is important and necessary to look into forgeable quantum messages. We show here that there always exists such a forgeable quantum message-signature pair for every known scheme with quantum encryption and rotation, and numerically show that there are no forgeable quantum message-signature pairs that exist in an arbitrated quantum signature scheme. (paper)

  18. Treating personal data like digital pollution

    CSIR Research Space (South Africa)

    Burke, Ivan D

    2017-06-01

    Full Text Available During the past 10 years data breaches have become more frequent than ever. Large volumes of personal and corporate data are being leaked via these breaches. The corporate responses to these breaches, as well as, the remediation of these breaches...

  19. Uncertainty in hydrological signatures

    Science.gov (United States)

    McMillan, Hilary; Westerberg, Ida

    2015-04-01

    Information that summarises the hydrological behaviour or flow regime of a catchment is essential for comparing responses of different catchments to understand catchment organisation and similarity, and for many other modelling and water-management applications. Such information types derived as an index value from observed data are known as hydrological signatures, and can include descriptors of high flows (e.g. mean annual flood), low flows (e.g. mean annual low flow, recession shape), the flow variability, flow duration curve, and runoff ratio. Because the hydrological signatures are calculated from observed data such as rainfall and flow records, they are affected by uncertainty in those data. Subjective choices in the method used to calculate the signatures create a further source of uncertainty. Uncertainties in the signatures may affect our ability to compare different locations, to detect changes, or to compare future water resource management scenarios. The aim of this study was to contribute to the hydrological community's awareness and knowledge of data uncertainty in hydrological signatures, including typical sources, magnitude and methods for its assessment. We proposed a generally applicable method to calculate these uncertainties based on Monte Carlo sampling and demonstrated it for a variety of commonly used signatures. The study was made for two data rich catchments, the 50 km2 Mahurangi catchment in New Zealand and the 135 km2 Brue catchment in the UK. For rainfall data the uncertainty sources included point measurement uncertainty, the number of gauges used in calculation of the catchment spatial average, and uncertainties relating to lack of quality control. For flow data the uncertainty sources included uncertainties in stage/discharge measurement and in the approximation of the true stage-discharge relation by a rating curve. The resulting uncertainties were compared across the different signatures and catchments, to quantify uncertainty

  20. Health care professionals’ perception of security of personal health devices

    Directory of Open Access Journals (Sweden)

    Ondiege B

    2017-04-01

    Full Text Available Brian Ondiege, Malcolm Clarke Department of Computer Science, College of Engineering, Design and Physical Sciences, Brunel University London, UK Abstract: With the rapid advances in the capabilities of telehealth devices and their increasing connection to the Internet, security is becoming an issue of major concern. Therefore, the perceptions of the health care professionals regarding security are of interest, as the patients trust them to make informed decisions on issues concerning their privacy, data, and health. Eight health care professionals were interviewed to determine their perceptions and knowledge of security in health care. The research further examines one specific aspect of security which is considered of significant concern: the authenticity of a device being from the actual manufacturer and not a counterfeit. This research proposes device registration together with digital signatures and one-time passwords to address the issue of counterfeit remote patient-monitoring devices and identify and authenticate the user of the device. Keywords: telehealth security, health care professionals’ perception, personal health device, authentication

  1. Effect of Digital Games on Children’s Cognitive Achievement

    OpenAIRE

    Tsung-Yen Chuang; Wei-Fan Chen

    2007-01-01

    Technologies’ rapid advance in developing digital media has been extensively applied in contemporary play materials to enrich children’s play, such as electronic or computerized toys, electronic story books, television, personal computers, and game consoles. Recently, studies about digital games in these areas have begun to appear. Some educators have a vision that these games have the potential to become powerful motivating digital environments and they study digital games in order to determ...

  2. Development of a personal digital assistant-based wireless application in clinical practice.

    Science.gov (United States)

    Chen, Yen-Cheng; Chiu, Hou-Chang; Tsai, Ming-Dar; Chang, Hang; Chong, Chee-Fah

    2007-02-01

    Our study aims to develop a personal digital assistant (PDA)-based wireless application in medical information processing by using Bluetooth and IEEE 802.11b wireless standards and SyncML codes. In this study, an "integrated database access module" is used to provide a unified integrated access interface while consistency of wireless data transmission is achieved by using the standardized SyncML protocol. A prototype of the system has been developed, implemented, and tested for its mobility, usability, stability, and performance with questionnaire survey. Response time for browsing/searching was usually less than 3s. The average time intervals needed for data transmissions were 68.6+/-8.5s for Bluetooth and 47.0+/-4.8s for 802.11b. The five-point Likert scale (from 1=least to 5=most) questionnaire survey of 30 medical professionals yielded a high degree of satisfaction with the system's mobility (4.18+/-0.89), usability (4.69+/-0.90), stability (3.81+/-0.94), and performance (3.97+/-0.88). The results of our study suggested that PDA applications which exploit wireless communication are convenient and feasible in clinical practice.

  3. Pen and platen, piezo-electric (21 Aug 1978) (Engineering Materials). [Signature verification

    Energy Technology Data Exchange (ETDEWEB)

    The set of five drawings defines a writing instrument system that will reliably verify signatures, thus providing a method useful in screening persons seeking entrance to restricted areas or access to computer programs. Using a conventional ballpoint pen refill, the instrument's input derives from signals generated in its writing tip and from pressure exerted by a person writing his name or a code word on the platen (tablet). The basic principle is that accelerations of the writing tip and pressures exerted by the person writing are recorded in three axes. This combination of signals can be processed by a computer and compared with a record in the computer's memory, or a graphic transcription may be compared visually with an earlier record.

  4. Persistence of social signatures in human communication.

    Science.gov (United States)

    Saramäki, Jari; Leicht, E A; López, Eduardo; Roberts, Sam G B; Reed-Tsochas, Felix; Dunbar, Robin I M

    2014-01-21

    The social network maintained by a focal individual, or ego, is intrinsically dynamic and typically exhibits some turnover in membership over time as personal circumstances change. However, the consequences of such changes on the distribution of an ego's network ties are not well understood. Here we use a unique 18-mo dataset that combines mobile phone calls and survey data to track changes in the ego networks and communication patterns of students making the transition from school to university or work. Our analysis reveals that individuals display a distinctive and robust social signature, captured by how interactions are distributed across different alters. Notably, for a given ego, these social signatures tend to persist over time, despite considerable turnover in the identity of alters in the ego network. Thus, as new network members are added, some old network members either are replaced or receive fewer calls, preserving the overall distribution of calls across network members. This is likely to reflect the consequences of finite resources such as the time available for communication, the cognitive and emotional effort required to sustain close relationships, and the ability to make emotional investments.

  5. A Circulating microRNA Signature Predicts Age-Based Development of Lymphoma.

    Directory of Open Access Journals (Sweden)

    Afshin Beheshti

    Full Text Available Extensive epidemiological data have demonstrated an exponential rise in the incidence of non-Hodgkin lymphoma (NHL that is associated with increasing age. The molecular etiology of this remains largely unknown, which impacts the effectiveness of treatment for patients. We proposed that age-dependent circulating microRNA (miRNA signatures in the host influence diffuse large B cell lymphoma (DLBCL development. Our objective was to examine tumor development in an age-based DLBCL system using an inventive systems biology approach. We harnessed a novel murine model of spontaneous DLBCL initiation (Smurf2-deficient at two age groups: 3 and 15 months old. All Smurf2-deficient mice develop visible DLBCL tumor starting at 15 months of age. Total miRNA was isolated from serum, bone marrow and spleen and were collected for all age groups for Smurf2-deficient mice and age-matched wild-type C57BL/6 mice. Using systems biology techniques, we identified a list of 10 circulating miRNAs being regulated in both the spleen and bone marrow that were present in DLBCL forming mice starting at 3 months of age that were not present in the control mice. Furthermore, this miRNA signature was found to occur circulating in the blood and it strongly impacted JUN and MYC oncogenic signaling. In addition, quantification of the miRNA signature was performed via Droplet Digital PCR technology. It was discovered that a key miRNA signature circulates throughout a host prior to the formation of a tumor starting at 3 months old, which becomes further modulated by age and yielded calculation of a 'carcinogenic risk score'. This novel age-based circulating miRNA signature may potentially be leveraged as a DLBCL risk profile at a young age to predict future lymphoma development or disease progression as well as for potential innovative miRNA-based targeted therapeutic strategies in lymphoma.

  6. Comparative seasonal variations of spectral signatures of broad-leaved and coniferous stands from Landsat data. Comparison with other perennial environments

    International Nuclear Information System (INIS)

    Chaume, R.; Combeau, A.

    1984-01-01

    Spectral signatures of two distinct forest test areas were identified from digital data including 15 LANDSAT scenes covering the same geographical area: a broad-leaved forest (oak and beech) and a coniferous forest (scotch pine). Seasonal variations of the signatures were examined and were expressed in terms of various data: date, solar height and phenological state of vegetation cover. Results were compared to these obtained from other perennial surface conditions (grassland, bare soils) . Range of the seasonal variations of radiance is noted, as well as evolutionary peculiarities on each band and between themes. Rationing of spectral bands (particularly MSS 5 and 7) and their variation with time are specified [fr

  7. Comment on ‘A technique for image encryption using digital signature’

    Science.gov (United States)

    Hernández Encinas, L.; Peinado Domínguez, A.

    2006-12-01

    The security of a recently proposed technique for encryption images by Sinha and Singh [A. Sinha, K. Singh, Opt. Commun. 218 (2003) 229], based on the use of digital signatures and error correcting codes, is analyzed. The proposed cryptosystem is shown to have some weakness. In fact, the secret key and the original image can be recovered efficiently by a brute force attack.

  8. Summary of: dental practitioners and a digital future: an initial exploration of barriers and incentives to adopting digital technologies.

    Science.gov (United States)

    Addy, Liam

    2013-12-01

    Digital technologies are proliferating into dental practices. While their technical attributes have often been studied, it remains unclear why some dentists adopt and use these technologies more than others. AIM To explore the incentives for and barriers against accepting and using digital dental technologies. Eleven semi-structured qualitative interviews were conducted with experts in dentistry, dental technology and dental education in the Netherlands. Dentists' acceptance and use of digital technologies are to varying degrees driven by the perceived advantages over analogue methods, perceived influence on treatment quality, dentists' personal and professional orientation, and social influence from peers and external groups. These effects are complemented by personal and dental-practice characteristics. The findings suggest that there are large differences in motivation to adopt and use digital technologies between early adopters, late adopters and non-adopters, which should be examined in greater detail. We recommend that educators, dentists, and representatives of the dental industry who deal with the diffusion of these technologies take account of dentists' widely different attitudes to digitalisation.

  9. [Sexting as a risk? : On consensual and non-consensual distribution of personal erotic pictures using digital media].

    Science.gov (United States)

    Dekker, Arne; Thula Koops

    2017-09-01

    Digital media are used for the purpose of various sexual experiences. In recent years the exchange of erotic text messages or images ("sexting") has gained the attention of academic research and has increasingly been the center of public discussion on sexual boundary violations and violence via digital media. The unwanted forwarding of images to a third party is especially relevant in this respect. In contrast to media reports about sexting as a risk behavior with serious consequences, there is little empirical analysis about the actual sexting practice of adolescents and adults in Germany. This paper is the first to describe sexting behavior of young adults in Germany on the basis of a large representative student sample. Data were collected in 2012 in the course of a nationwide study. Students from 15 universities were asked among other things about their experiences with sending erotic text messages or images, the non-consensual forwarding of images and its consequences. More than half of the student sample reported sending erotic text messages, 26.8% of women and 16.8% of men had sent erotic images to someone, in most cases to their partner. Of the sexters, 2% mentioned that their images had been forwarded to another person without their consent. The results indicate that in Germany sexting is mostly practiced in the context of a romantic relationship. Only a small percentage experience unwanted forwarding of images, and negative consequences are not reported for all incidents; however, this does not relativize the impact of those events implicating serious negative consequences for the involved person.

  10. 76 FR 30542 - Adult Signature Services

    Science.gov (United States)

    2011-05-26

    ... POSTAL SERVICE 39 CFR Part 111 Adult Signature Services AGENCY: Postal Service\\TM\\. ACTION: Final..., Domestic Mail Manual (DMM[supreg]) 503.8, to add a new extra service called Adult Signature. This new service has two available options: Adult Signature Required and Adult Signature Restricted Delivery. DATES...

  11. Digital case-based learning system in school.

    Science.gov (United States)

    Gu, Peipei; Guo, Jiayang

    2017-01-01

    With the continuing growth of multi-media learning resources, it is important to offer methods helping learners to explore and acquire relevant learning information effectively. As services that organize multi-media learning materials together to support programming learning, the digital case-based learning system is needed. In order to create a case-oriented e-learning system, this paper concentrates on the digital case study of multi-media resources and learning processes with an integrated framework. An integration of multi-media resources, testing and learning strategies recommendation as the learning unit is proposed in the digital case-based learning framework. The learning mechanism of learning guidance, multi-media materials learning and testing feedback is supported in our project. An improved personalized genetic algorithm which incorporates preference information and usage degree into the crossover and mutation process is proposed to assemble the personalized test sheet for each learner. A learning strategies recommendation solution is proposed to recommend learning strategies for learners to help them to learn. The experiments are conducted to prove that the proposed approaches are capable of constructing personalized sheets and the effectiveness of the framework.

  12. Digital case-based learning system in school.

    Directory of Open Access Journals (Sweden)

    Peipei Gu

    Full Text Available With the continuing growth of multi-media learning resources, it is important to offer methods helping learners to explore and acquire relevant learning information effectively. As services that organize multi-media learning materials together to support programming learning, the digital case-based learning system is needed. In order to create a case-oriented e-learning system, this paper concentrates on the digital case study of multi-media resources and learning processes with an integrated framework. An integration of multi-media resources, testing and learning strategies recommendation as the learning unit is proposed in the digital case-based learning framework. The learning mechanism of learning guidance, multi-media materials learning and testing feedback is supported in our project. An improved personalized genetic algorithm which incorporates preference information and usage degree into the crossover and mutation process is proposed to assemble the personalized test sheet for each learner. A learning strategies recommendation solution is proposed to recommend learning strategies for learners to help them to learn. The experiments are conducted to prove that the proposed approaches are capable of constructing personalized sheets and the effectiveness of the framework.

  13. Benefit of Analog, Programmable and Digital Hearing Aids

    Directory of Open Access Journals (Sweden)

    Jamileh Fatahi

    2006-12-01

    Full Text Available Background and Aims: As the hearing aid technology progressively promotes toward replacing analog hearing aids with digital and programmable ones, comparison of the patient satisfaction of those kinds of hearing aids by means of a valuable tool seems so necessary. So, the aim of this study was to compare self-reported benefit of analog, digitally controlled programmable and digital hearing aids for reducing disability caused by hearing impairment in mild to severe sensorineural hearing impaired persons. Materials and Methods: This cross-sectional study was performed on 90 persons with mild to severe sensorineural hearing loss dividing into three groups: 43 subjects were fitted with digital, 15 with programmable, 32 with analog hearing aids. After pure tone audiometry, Abbreviated profile of hearing aid benefit (APHAB was completed before and one month after using hearing aids to determine the benefit of them. Results: Global APHAB mean scores for digital, programmable and analog hearing aids were 49.05, 33.19 and 39.53, respectively. Ease of Communication subscale mean scores were 53.46 for digitals, 37.66 for programmables and 39.09 for analogs. Background noise subscale mean scores for digital programmable and analog hearing aids were 46.36, 25.53 and 35.31, respectively. Global and also both subscale mean scores showed significant difference between digital hearing aids and programmable and analog ones. There was no significant difference between reverberation subscale mean scores of three groups. Conclusion: It seems digital hearing aids may be more beneficial to reduce disability caused by hearing loss than analog and programmable hearing aids are.

  14. Building Personal Brands with Digital Storytelling ePortfolios

    Science.gov (United States)

    Jones, Beata; Leverenz, Carrie

    2017-01-01

    Antoine de Saint-Exupery said, "If you want to build a ship, don't drum up people to collect wood and don't assign them tasks and work, but rather teach them to long for the endless immensity of the sea." This article presents a pedagogical approach for framing a digital-identity-enhancing ePortfolio that maximizes student engagement and…

  15. Lesson 6: Signature Validation

    Science.gov (United States)

    Checklist items 13 through 17 are grouped under the Signature Validation Process, and represent CROMERR requirements that the system must satisfy as part of ensuring that electronic signatures it receives are valid.

  16. 21 CFR 11.50 - Signature manifestations.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Signature manifestations. 11.50 Section 11.50 Food... RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.50 Signature manifestations. (a) Signed electronic...: (1) The printed name of the signer; (2) The date and time when the signature was executed; and (3...

  17. Examining live cell cultures during apoptosis by digital holographic phase imaging and Raman spectroscopy

    Science.gov (United States)

    Khmaladze, Alexander

    2017-11-01

    Cellular apoptosis is a unique, organized series of events, leading to programmed cell death. In this work, we present a combined digital holography/Raman spectroscopy technique to study live cell cultures during apoptosis. Digital holographic microscopy measurements of live cell cultures yield information about cell shape and volume, changes to which are indicative of alterations in cell cycle and initiation of cell death mechanisms. Raman spectroscopic measurements provide complementary information about cells, such as protein, lipid and nucleic acid content, and the spectral signatures associated with structural changes in molecules. Our work indicates that the chemical changes in proteins, which were detected by Raman measurements, preceded morphological changes, which were seen with digital holographic microscopy.

  18. 21 CFR 11.70 - Signature/record linking.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Signature/record linking. 11.70 Section 11.70 Food... RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.70 Signature/record linking. Electronic signatures and handwritten signatures executed to electronic records shall be linked to their respective...

  19. Examining the (in)effectiveness of personalized communication

    NARCIS (Netherlands)

    Maslowska, E.; Smit, E.; van den Putte, B.; Eisend, M.; Langner, T.

    2011-01-01

    Personalized communication has become a very popular marketing strategy, but the research on its effectiveness is still limited. This study examined the persuasiveness of personalized digital newsletters in terms of increased attention, cognitive activity, evaluation, attitude, intention, and

  20. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations.

    Science.gov (United States)

    Nieto, Ana; Rios, Ruben; Lopez, Javier

    2018-02-07

    IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT) context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntarily providing electronic evidence to the authorities. However, this solution is highly dependent on the willingness of citizens to collaborate and they may be reluctant to do so if the sensitive information within their personal devices is not sufficiently protected when shared with the investigators. In this paper, we provide the digital witness approach with a methodology that enables citizens to share their data with some privacy guarantees. We apply the PRoFIT methodology, originally defined for IoT-Forensics environments, to the digital witness approach in order to unleash its full potential. Finally, we show the feasibility of a PRoFIT-compliant digital witness with two use cases.

  1. "There's Not Enough Knowledge Out There": Examining Older Adults' Perceptions of Digital Technology Use and Digital Inclusion Classes.

    Science.gov (United States)

    Betts, Lucy R; Hill, Rowena; Gardner, Sarah E

    2017-10-01

    Older adults' definitions of digital technology, and experiences of digital inclusion sessions, were examined using qualitative approaches. Seventeen older adults (aged between 54 and 85 years) participated in two focus groups that each lasted approximately 90 min to explore how older adults understood technology within their lived experience. Interpretative phenomenological analysis yielded two main themes: thirst for knowledge and a wish list for digital technology sessions. A separate content analysis was performed to identify what technology older adults identified as digital technology. This analysis revealed that the older adults most frequently defined digital technology as computers and telephones. The findings support the conclusions that this group of older adults, some of whom were "successful users," have a wide knowledge of digital technology, are interested in gaining more skills, and desire knowledge acquisition through personalized one-to-one learning sessions.

  2. Expressiveness considerations of XML signatures

    DEFF Research Database (Denmark)

    Jensen, Meiko; Meyer, Christopher

    2011-01-01

    XML Signatures are used to protect XML-based Web Service communication against a broad range of attacks related to man-in-the-middle scenarios. However, due to the complexity of the Web Services specification landscape, the task of applying XML Signatures in a robust and reliable manner becomes...... more and more challenging. In this paper, we investigate this issue, describing how an attacker can still interfere with Web Services communication even in the presence of XML Signatures. Additionally, we discuss the interrelation of XML Signatures and XML Encryption, focussing on their security...

  3. FORMATION OF THE TEACHER-RESEARCHER ACADEMIC CULTURE IN A DIGITAL CREATIVE ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    Olena M. Semenoh

    2017-12-01

    Full Text Available The article outlines conceptual foundations of the future teachers-researchers academic culture formation in a digital creative environment. Academic culture of the researcher as an integral personal characteristic that is manifested in the culture of creative-critical thinking, academic virtue, scientific linguistic, narrative-digital culture has been investigated. The formation of the academic culture of the future teacher-researcher in terms of digital creative environment is seen as a complex, multidimensional process of qualitative changes, which happens in stages. The digital creative environment as a learning environment that involves the purposeful use of tools, technologies and information resources that enable creative expression of personality by means of digital technologies, integrating information and communication technologies, intellectual systems, human sensitivity and contextual experience of scientific and pedagogical activity has been defined.

  4. High-speed high-security signatures

    NARCIS (Netherlands)

    Bernstein, D.J.; Duif, N.; Lange, T.; Schwabe, P.; Yang, B.Y.

    2011-01-01

    This paper shows that a $390 mass-market quad-core 2.4GHz Intel Westmere (Xeon E5620) CPU can create 108000 signatures per second and verify 71000 signatures per second on an elliptic curve at a 2128 security level. Public keys are 32 bytes, and signatures are 64 bytes. These performance figures

  5. Learning in the Digital Age: Control or Connection?

    Science.gov (United States)

    Van Galen, Jane

    2013-01-01

    In October 2011, 200 state school officers and legislators gathered at a hotel in San Francisco to learn how to "revolutionize" learning by "personalizing" instruction. The occasion was former Florida Gov. Jeb Bush's second annual National Summit on Education Reform. The topic was digital learning. The vision of digitally managed curriculum and…

  6. Spectral features based tea garden extraction from digital orthophoto maps

    Science.gov (United States)

    Jamil, Akhtar; Bayram, Bulent; Kucuk, Turgay; Zafer Seker, Dursun

    2018-05-01

    The advancements in the photogrammetry and remote sensing technologies has made it possible to extract useful tangible information from data which plays a pivotal role in various application such as management and monitoring of forests and agricultural lands etc. This study aimed to evaluate the effectiveness of spectral signatures for extraction of tea gardens from 1 : 5000 scaled digital orthophoto maps obtained from Rize city in Turkey. First, the normalized difference vegetation index (NDVI) was derived from the input images to suppress the non-vegetation areas. NDVI values less than zero were discarded and the output images was normalized in the range 0-255. Individual pixels were then mapped into meaningful objects using global region growing technique. The resulting image was filtered and smoothed to reduce the impact of noise. Furthermore, geometrical constraints were applied to remove small objects (less than 500 pixels) followed by morphological opening operator to enhance the results. These objects served as building blocks for further image analysis. Finally, for the classification stage, a range of spectral values were empirically calculated for each band and applied on candidate objects to extract tea gardens. For accuracy assessment, we employed an area based similarity metric by overlapping obtained tea garden boundaries with the manually digitized tea garden boundaries created by experts of photogrammetry. The overall accuracy of the proposed method scored 89 % for tea gardens from 10 sample orthophoto maps. We concluded that exploiting the spectral signatures using object based analysis is an effective technique for extraction of dominant tree species from digital orthophoto maps.

  7. Advanced digital image archival system using MPEG technologies

    Science.gov (United States)

    Chang, Wo

    2009-08-01

    Digital information and records are vital to the human race regardless of the nationalities and eras in which they were produced. Digital image contents are produced at a rapid pace from cultural heritages via digitalization, scientific and experimental data via high speed imaging sensors, national defense satellite images from governments, medical and healthcare imaging records from hospitals, personal collection of photos from digital cameras. With these mass amounts of precious and irreplaceable data and knowledge, what standards technologies can be applied to preserve and yet provide an interoperable framework for accessing the data across varieties of systems and devices? This paper presents an advanced digital image archival system by applying the international standard of MPEG technologies to preserve digital image content.

  8. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  9. Exotic signatures from supersymmetry

    International Nuclear Information System (INIS)

    Hall, L.J.

    1989-08-01

    Minor changes to the standard supersymmetric model, such as soft flavor violation and R parity violation, cause large changes in the signatures. The origin of these changes and the resulting signatures are discussed. 15 refs., 7 figs., 2 tabs

  10. Engaging Digital Natives through Social Learning

    Directory of Open Access Journals (Sweden)

    Nina Sarkar

    2017-04-01

    Full Text Available Digital natives account for a substantial portion of the total enrollment in higher education. This calls for significant educational reforms because traditional education systems do not cater to the needs and interests of digital natives. The most effective way that both students and instructors can benefit from this paradigm shift is to integrate technology that is appropriate to the cognitive learning patterns of the digital natives into the curriculum. This paper builds upon previous research in technology/personality theory and specifically attempts to provide examples of technology that will address the instructional needs of digital natives. Further this paper provides empirical evidence of the impact of technology integration on the learning outcomes of digital natives. In this study, the authors explored the impact of targeted technology on academic performance in three businesses courses. Three functional technologies were used by the authors to build engaging course content, efficiently manage course content, and to interact with digital native students. This study found that these technologies can assist digital natives in the learning process and lead to better academic performance.

  11. Digital Twins in Health Care: Ethical Implications of an Emerging Engineering Paradigm.

    Science.gov (United States)

    Bruynseels, Koen; Santoni de Sio, Filippo; van den Hoven, Jeroen

    2018-01-01

    Personalized medicine uses fine grained information on individual persons, to pinpoint deviations from the normal. 'Digital Twins' in engineering provide a conceptual framework to analyze these emerging data-driven health care practices, as well as their conceptual and ethical implications for therapy, preventative care and human enhancement. Digital Twins stand for a specific engineering paradigm, where individual physical artifacts are paired with digital models that dynamically reflects the status of those artifacts. When applied to persons, Digital Twins are an emerging technology that builds on in silico representations of an individual that dynamically reflect molecular status, physiological status and life style over time. We use Digital Twins as the hypothesis that one would be in the possession of very detailed bio-physical and lifestyle information of a person over time. This perspective redefines the concept of 'normality' or 'health,' as a set of patterns that are regular for a particular individual , against the backdrop of patterns observed in the population. This perspective also will impact what is considered therapy and what is enhancement, as can be illustrated with the cases of the 'asymptomatic ill' and life extension via anti-aging medicine. These changes are the consequence of how meaning is derived, in case measurement data is available. Moral distinctions namely may be based on patterns found in these data and the meanings that are grafted on these patterns. Ethical and societal implications of Digital Twins are explored. Digital Twins imply a data-driven approach to health care. This approach has the potential to deliver significant societal benefits, and can function as a social equalizer, by allowing for effective equalizing enhancement interventions. It can as well though be a driver for inequality, given the fact that a Digital Twin might not be an accessible technology for everyone, and given the fact that patterns identified across a

  12. Digital communication communication, multimedia, security

    CERN Document Server

    Meinel, Christoph

    2014-01-01

    The authors give a detailed summary about the fundamentals and the historical background of digital communication. This includes an overview of the encoding principles and algorithms of textual information, audio information, as well as images, graphics, and video in the Internet. Furthermore the fundamentals of computer networking, digital security and cryptography are covered. Thus, the book provides a well-founded access to communication technology of computer networks, the internet and the WWW. Numerous pictures and images, a subject-index and a detailed list of historical personalities in

  13. Personal Learning Environments: A proposal to develop digital competences and information in university teaching of Law in Colombia

    Directory of Open Access Journals (Sweden)

    Marcos CABEZAS GONZÁLEZ

    2017-12-01

    Full Text Available Personal Learning Enviroment (PLE is one of the most interesting concepts that has aroused among teachers and software engineers in the last time and that will have an impact on the next years among all the levels and modalities of education. ple is a product of various factors including a social web that is shown by tools and free access services based in an open code technology. But a PLE is not a kind of software or platform; it is a new view about how to use the technologies for the learning process both in the initial formation and the lifelong learning. This article has teaching in Law Schools in Colombia and the inexistence of juridical practice proposals that may develop the professional competencies linked to the non-formal and everyday learning and linked to personal learning environments. The target that we try to acquire is to create a PLE proposal supported by 2.0 technologies and orientated to encourage a lifelong learning that may develop the digital and informative competences in Law practice. We strongly believe that a PLE model will help the student acquire the knowledge, abilities and experiences that may allow them a personal and professional development in the frame of a lifelong learning program that will contribute to approach goals and opportunities in the information and communication society that is in constant evolution.

  14. A Directed Signature Scheme and its Applications

    OpenAIRE

    Lal, Sunder; Kumar, Manoj

    2004-01-01

    This paper presents a directed signature scheme with the property that the signature can be verified only with the help of signer or signature receiver. We also propose its applications to share verification of signatures and to threshold cryptosystems.

  15. Implications of the Protection of Personal Information (POPI)

    African Journals Online (AJOL)

    The main purpose of the POPI act is to protect the processing of personal information ... a smartphone, iPad or personal computer), digital storage devices. (iCloud, Dropbox ... (vi) Reasonable security regarding the safeguarding, integrity and.

  16. On reliable discovery of molecular signatures

    Directory of Open Access Journals (Sweden)

    Björkegren Johan

    2009-01-01

    Full Text Available Abstract Background Molecular signatures are sets of genes, proteins, genetic variants or other variables that can be used as markers for a particular phenotype. Reliable signature discovery methods could yield valuable insight into cell biology and mechanisms of human disease. However, it is currently not clear how to control error rates such as the false discovery rate (FDR in signature discovery. Moreover, signatures for cancer gene expression have been shown to be unstable, that is, difficult to replicate in independent studies, casting doubts on their reliability. Results We demonstrate that with modern prediction methods, signatures that yield accurate predictions may still have a high FDR. Further, we show that even signatures with low FDR may fail to replicate in independent studies due to limited statistical power. Thus, neither stability nor predictive accuracy are relevant when FDR control is the primary goal. We therefore develop a general statistical hypothesis testing framework that for the first time provides FDR control for signature discovery. Our method is demonstrated to be correct in simulation studies. When applied to five cancer data sets, the method was able to discover molecular signatures with 5% FDR in three cases, while two data sets yielded no significant findings. Conclusion Our approach enables reliable discovery of molecular signatures from genome-wide data with current sample sizes. The statistical framework developed herein is potentially applicable to a wide range of prediction problems in bioinformatics.

  17. Characterizing Resident Space Object Earthshine Signature Variability

    Science.gov (United States)

    Van Cor, Jared D.

    ?m]over a sample of ROIs. Further analysis using EPIC imagery found a total albedo difference of +0.03% and a cross correlation of 0.656. Also compared to EPIC imagery it was found our heterogeneous Earth model produced a reflected Earthshine radiance RMSE of +/-28 [watts/m. 2sr?m] incident on diffuse sphericalRSOs, specular spherical RSOs, and diffuse flat plate RSOs with an altitude of 1000km; this resulted in an apparent magnitude error of +/-0.28. Furthermore, it was found our heterogeneous Earthmodel produced a reflected Earthshine radiance RMSE of +/-68 [watts/m. 2sr?m] for specular flat plate RSOs withan altitude of 1000km; this resulted in an apparent magnitude error of +/-0.68. The Earth objects were used in a workflow with the Digital Imaging and Remote Sensing Image Generation (DIRSIG) tool to explore the impact of a range of characteristic RSO geometries, geographies, orientations, and materials on the signatures from an RSO due to Earthshine. An apparent magnitude was calculated and used to quantify RSO Earthshine signature variability; this is discussed in terms of the RMSE and maximum deviations of visible RSO Earthshine apparent magnitude signatures comparing the homogeneous Earth model to heterogeneous Earth model. The homogeneous diffuse Earth object was shown to approximate visible RSO Earthshine apparent magnitude signatures from spheres with a RMSE in reflected Earthshine apparent magnitude of +/-0.4 and a maximum apparent magnitude difference of 1.09 when compared to the heterogeneous Earth model. Similarly for diffuse flat plates, the visible RSO Earthshine apparent magnitude signature RMSE was shown to be +/-0.64, with a maximum apparent magnitude difference of 0.82. For specular flat plates, the visible RSO Earthshine apparent magnitude signature RMSE was shown to be +/-0.97 with maximum apparent magnitude difference of 2.26. This thesis explored only a portion of the parameter dependencies of Earth shine, but has enabled a preliminary understanding

  18. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations

    Directory of Open Access Journals (Sweden)

    Ana Nieto

    2018-02-01

    Full Text Available IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntarily providing electronic evidence to the authorities. However, this solution is highly dependent on the willingness of citizens to collaborate and they may be reluctant to do so if the sensitive information within their personal devices is not sufficiently protected when shared with the investigators. In this paper, we provide the digital witness approach with a methodology that enables citizens to share their data with some privacy guarantees. We apply the PRoFIT methodology, originally defined for IoT-Forensics environments, to the digital witness approach in order to unleash its full potential. Finally, we show the feasibility of a PRoFIT-compliant digital witness with two use cases.

  19. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations

    Science.gov (United States)

    Lopez, Javier

    2018-01-01

    IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT) context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntarily providing electronic evidence to the authorities. However, this solution is highly dependent on the willingness of citizens to collaborate and they may be reluctant to do so if the sensitive information within their personal devices is not sufficiently protected when shared with the investigators. In this paper, we provide the digital witness approach with a methodology that enables citizens to share their data with some privacy guarantees. We apply the PRoFIT methodology, originally defined for IoT-Forensics environments, to the digital witness approach in order to unleash its full potential. Finally, we show the feasibility of a PRoFIT-compliant digital witness with two use cases. PMID:29414864

  20. A cognitive-affective system theory of personality: reconceptualizing situations, dispositions, dynamics, and invariance in personality structure.

    Science.gov (United States)

    Mischel, W; Shoda, Y

    1995-04-01

    A theory was proposed to reconcile paradoxical findings on the invariance of personality and the variability of behavior across situations. For this purpose, individuals were assumed to differ in (a) the accessibility of cognitive-affective mediating units (such as encodings, expectancies and beliefs, affects, and goals) and (b) the organization of relationships through which these units interact with each other and with psychological features of situations. The theory accounts for individual differences in predictable patterns of variability across situations (e.g., if A then she X, but if B then she Y), as well as for overall average levels of behavior, as essential expressions or behavioral signatures of the same underlying personality system. Situations, personality dispositions, dynamics, and structure were reconceptualized from this perspective.

  1. A Personal Digital Assistant (PDA) system for data acquisition during shoreline assessment field surveys

    International Nuclear Information System (INIS)

    Lamarche, A.; Owens, E.H.; Laflamme, A.; Laforest, S.; Clement, S.

    2004-01-01

    The Shoreline Cleanup Assessment Technique (SCAT) is a recognized method in North America to collect shoreline information and report observations on an oil spill. The long processing time required to analyze SCAT observations sometimes causes delays in oil spill response. Computerized systems have been developed to address this problem, but data entry of SCAT within such system involves much effort and is subject to potential errors. This paper described the development of a tool dedicated to the field capture of SCAT data on a Windows CE based Personal Digital Assistant (PDA). The system is compatible with both the SCAT methodology and Global Positioning System technology. A prototype of the system was tested during oil spills in Ontario and Nova Scotia. This paper described how the field data collection system was designed, developed and tested. Details of some user interfaces were provided to demonstrate how the large paper Shoreline Oiling Summary forms were made to fit on the small display screen of pocket-size devices. 8 refs., 1 tab., 12 figs

  2. Utilization of KSC Present Broadband Communications Data System for Digital Video Services

    Science.gov (United States)

    Andrawis, Alfred S.

    2002-01-01

    This report covers a visibility study of utilizing present KSC broadband communications data system (BCDS) for digital video services. Digital video services include compressed digital TV delivery and video-on-demand. Furthermore, the study examines the possibility of providing interactive video on demand to desktop personal computers via KSC computer network.

  3. Real time gamma-ray signature identifier

    Science.gov (United States)

    Rowland, Mark [Alamo, CA; Gosnell, Tom B [Moraga, CA; Ham, Cheryl [Livermore, CA; Perkins, Dwight [Livermore, CA; Wong, James [Dublin, CA

    2012-05-15

    A real time gamma-ray signature/source identification method and system using principal components analysis (PCA) for transforming and substantially reducing one or more comprehensive spectral libraries of nuclear materials types and configurations into a corresponding concise representation/signature(s) representing and indexing each individual predetermined spectrum in principal component (PC) space, wherein an unknown gamma-ray signature may be compared against the representative signature to find a match or at least characterize the unknown signature from among all the entries in the library with a single regression or simple projection into the PC space, so as to substantially reduce processing time and computing resources and enable real-time characterization and/or identification.

  4. The contribution of the body and motion to whole person recognition.

    Science.gov (United States)

    Simhi, Noa; Yovel, Galit

    2016-05-01

    While the importance of faces in person recognition has been the subject of many studies, there are relatively few studies examining recognition of the whole person in motion even though this most closely resembles daily experience. Most studies examining the whole body in motion use point light displays, which have many advantages but are impoverished and unnatural compared to real life. To determine which factors are used when recognizing the whole person in motion we conducted two experiments using naturalistic videos. In Experiment 1 we used a matching task in which the first stimulus in each pair could either be a video or multiple still images from a video of the full body. The second stimulus, on which person recognition was performed, could be an image of either the full body or face alone. We found that the body contributed to person recognition beyond the face, but only after exposure to motion. Since person recognition was performed on still images, the contribution of motion to person recognition was mediated by form-from-motion processes. To assess whether dynamic identity signatures may also contribute to person recognition, in Experiment 2 we presented people in motion and examined person recognition from videos compared to still images. Results show that dynamic identity signatures did not contribute to person recognition beyond form-from-motion processes. We conclude that the face, body and form-from-motion processes all appear to play a role in unfamiliar person recognition, suggesting the importance of considering the whole body and motion when examining person perception. Copyright © 2016 Elsevier Ltd. All rights reserved.

  5. Toward a hyperspectral optical signature of extra virgin olive oil

    Science.gov (United States)

    Mignani, A. G.; Ciaccheri, L.; Thienpont, H.; Ottevaere, H.; Attilio, C.; Cimato, A.

    2007-05-01

    Italian extra virgin olive oils bearing labels of certified area of origin were considered. Their multispectral digital signature was measured by means of absorption spectroscopy in the 200-1700 nm spectral range. The instrumentation was a fiber optic-based, cheap, and compact device. The spectral data were processed by means of multivariate analysis and plotted on a 2D classification map. The map showed sharp clusters according to the geographical origin of the oils, thus demonstrating the potentials of UV-VIS-NIR spectroscopy for optical fingerprinting. Then, the spectral data were correlated to the content of the most important fatty acids. The good fitting achieved demonstrated that the optical fingerprinting can be used also for predicting nutritional and chemical parameters.

  6. Pen and platen, piezo-electric (Engineering Materials). [Signature verification for access to restricted areas

    Energy Technology Data Exchange (ETDEWEB)

    The set of five drawings defines a writing instrument system that will reliably verify signatures, thus providing a method useful in screening persons seeking entrance to restricted areas or access to computer programs. Using a conventional ballpoint pen refill, the instrument's input derives from signals generated in its writing tip and from pressure exerted by a person writing his name or a code word on the platen (tablet). The basic principle is that accelerations of the writing tip and pressures exerted by the person writing are recorded in three axes. This combination of signals can be processed by a computer and compared with a record in the computer's memory, or a graphic transcription may be compared visually with an earlier record.

  7. Neurobiological Correlates and Predictors of Two Distinct Personality Trait Pathways to Escalated Alcohol Use

    Directory of Open Access Journals (Sweden)

    Malak Abu Shakra

    2018-01-01

    Interpretation: This double dissociation provides evidence of distinct neurobiological profiles in a priori identified personality trait-based risk groups for AUDs, and links these signatures to clinically relevant substance use outcomes at follow-up. AUD subtypes might benefit from motivationally and personality-specific ameliorative and preventative interventions.

  8. The Profiles in Science Digital Library: Behind the Scenes.

    Science.gov (United States)

    Gallagher, Marie E; Moffatt, Christie

    2012-01-01

    This demonstration shows the Profiles in Science ® digital library. Profiles in Science contains digitized selections from the personal manuscript collections of prominent biomedical researchers, medical practitioners, and those fostering science and health. The Profiles in Science Web site is the delivery mechanism for content derived from the digital library system. The system is designed according to our basic principles for digital library development [1]. The digital library includes the rules and software used for digitizing items, creating and editing database records and performing quality control as well as serving the digital content to the public. Among the types of data managed by the digital library are detailed item-level, collection-level and cross-collection metadata, digitized photographs, papers, audio clips, movies, born-digital electronic files, optical character recognized (OCR) text, and annotations (see Figure 1). The digital library also tracks the status of each item, including digitization quality, sensitivity of content, and copyright. Only items satisfying all required criteria are released to the public through the World Wide Web. External factors have influenced all aspects of the digital library's infrastructure.

  9. Designing Computer Agents With Facial Personality To Improve Human-Machine Collaboration

    National Research Council Canada - National Science Library

    Tidball, Brian E

    2006-01-01

    .... This study examined whether people perceive personality in static digital faces that portray expressions of emotion, and if the digital faces would influence human performance on a simple human...

  10. Discovering History in a Digital World: The Texas Story Project

    Science.gov (United States)

    Munns, David

    2016-01-01

    New digital tools and technologies create an opportunity for history museums to personalize visitor experiences, reach new audiences, and increase their relevancy by including visitors' historical narratives in museum content and programming. By adapting to the shift in social narrative prompted by digital media advancements, museums are…

  11. Becoming digital

    DEFF Research Database (Denmark)

    Pors, Anja Svejgaard

    2015-01-01

    government, and draws on empirical material generated through observations, field notes, interviews and policy documents. The material is documenting how service is performed by frontline agents in the ‘bureaucratic encounter’ with citizens, who needs assistance to use digital self-service in order to apply...... online for a public benefit. Findings: The paper shows that e-government technology changes the mode of professionalism in citizen service from service to support. The paper gives an empirical account of recent Danish digital reforms and shows how the reforms both enable and constrain the work...... of ‘becoming digital’ by frontline agents. Overall the street-level bureaucrat’s classical tasks such as specialized casework are being displaced into promoting and educational tasks. An implication of this is blurred distinctions between professional skills and personal competences of the frontline agent...

  12. 42 CFR 424.36 - Signature requirements.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Signature requirements. 424.36 Section 424.36... (CONTINUED) MEDICARE PROGRAM CONDITIONS FOR MEDICARE PAYMENT Claims for Payment § 424.36 Signature requirements. (a) General rule. The beneficiary's own signature is required on the claim unless the beneficiary...

  13. Unsupervised signature extraction from forensic logs

    NARCIS (Netherlands)

    Thaler, S.M.; Menkovski, V.; Petkovic, M.; Altun, Y.; Das, K.; Mielikäinen, T.; Malerba, D.; Stefanowski, J.; Read, J.; Žitnik, M.; Ceci, M.

    2017-01-01

    Signature extraction is a key part of forensic log analysis. It involves recognizing patterns in log lines such that log lines that originated from the same line of code are grouped together. A log signature consists of immutable parts and mutable parts. The immutable parts define the signature, and

  14. Retail applications of signature verification

    Science.gov (United States)

    Zimmerman, Thomas G.; Russell, Gregory F.; Heilper, Andre; Smith, Barton A.; Hu, Jianying; Markman, Dmitry; Graham, Jon E.; Drews, Clemens

    2004-08-01

    The dramatic rise in identity theft, the ever pressing need to provide convenience in checkout services to attract and retain loyal customers, and the growing use of multi-function signature captures devices in the retail sector provides favorable conditions for the deployment of dynamic signature verification (DSV) in retail settings. We report on the development of a DSV system to meet the needs of the retail sector. We currently have a database of approximately 10,000 signatures collected from 600 subjects and forgers. Previous work at IBM on DSV has been merged and extended to achieve robust performance on pen position data available from commercial point of sale hardware, achieving equal error rates on skilled forgeries and authentic signatures of 1.5% to 4%.

  15. Development of a Personal Digital Assistant (PDA) based client/server NICU patient data and charting system.

    Science.gov (United States)

    Carroll, A E; Saluja, S; Tarczy-Hornoch, P

    2001-01-01

    Personal Digital Assistants (PDAs) offer clinicians the ability to enter and manage critical information at the point of care. Although PDAs have always been designed to be intuitive and easy to use, recent advances in technology have made them even more accessible. The ability to link data on a PDA (client) to a central database (server) allows for near-unlimited potential in developing point of care applications and systems for patient data management. Although many stand-alone systems exist for PDAs, none are designed to work in an integrated client/server environment. This paper describes the design, software and hardware selection, and preliminary testing of a PDA based patient data and charting system for use in the University of Washington Neonatal Intensive Care Unit (NICU). This system will be the subject of a subsequent study to determine its impact on patient outcomes and clinician efficiency.

  16. 7 CFR 718.9 - Signature requirements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Signature requirements. 718.9 Section 718.9... MULTIPLE PROGRAMS General Provisions § 718.9 Signature requirements. (a) When a program authorized by this chapter or Chapter XIV of this title requires the signature of a producer; landowner; landlord; or tenant...

  17. 27 CFR 17.6 - Signature authority.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Signature authority. 17.6... PRODUCTS General Provisions § 17.6 Signature authority. No claim, bond, tax return, or other required... other proper notification of signature authority has been filed with the TTB office where the required...

  18. Online Signature Verification on MOBISIG Finger-Drawn Signature Corpus

    Directory of Open Access Journals (Sweden)

    Margit Antal

    2018-01-01

    Full Text Available We present MOBISIG, a pseudosignature dataset containing finger-drawn signatures from 83 users captured with a capacitive touchscreen-based mobile device. The database was captured in three sessions resulting in 45 genuine signatures and 20 skilled forgeries for each user. The database was evaluated by two state-of-the-art methods: a function-based system using local features and a feature-based system using global features. Two types of equal error rate computations are performed: one using a global threshold and the other using user-specific thresholds. The lowest equal error rate was 0.01% against random forgeries and 5.81% against skilled forgeries using user-specific thresholds that were computed a posteriori. However, these equal error rates were significantly raised to 1.68% (random forgeries case and 14.31% (skilled forgeries case using global thresholds. The same evaluation protocol was performed on the DooDB publicly available dataset. Besides verification performance evaluations conducted on the two finger-drawn datasets, we evaluated the quality of the samples and the users of the two datasets using basic quality measures. The results show that finger-drawn signatures can be used by biometric systems with reasonable accuracy.

  19. 48 CFR 804.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... signature. 804.101 Section 804.101 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS GENERAL ADMINISTRATIVE MATTERS Contract Execution 804.101 Contracting officer's signature. (a) If a... signature. ...

  20. Digital Twins in Health Care: Ethical Implications of an Emerging Engineering Paradigm

    Directory of Open Access Journals (Sweden)

    Koen Bruynseels

    2018-02-01

    Full Text Available Personalized medicine uses fine grained information on individual persons, to pinpoint deviations from the normal. ‘Digital Twins’ in engineering provide a conceptual framework to analyze these emerging data-driven health care practices, as well as their conceptual and ethical implications for therapy, preventative care and human enhancement. Digital Twins stand for a specific engineering paradigm, where individual physical artifacts are paired with digital models that dynamically reflects the status of those artifacts. When applied to persons, Digital Twins are an emerging technology that builds on in silico representations of an individual that dynamically reflect molecular status, physiological status and life style over time. We use Digital Twins as the hypothesis that one would be in the possession of very detailed bio-physical and lifestyle information of a person over time. This perspective redefines the concept of ‘normality’ or ‘health,’ as a set of patterns that are regular for a particular individual, against the backdrop of patterns observed in the population. This perspective also will impact what is considered therapy and what is enhancement, as can be illustrated with the cases of the ‘asymptomatic ill’ and life extension via anti-aging medicine. These changes are the consequence of how meaning is derived, in case measurement data is available. Moral distinctions namely may be based on patterns found in these data and the meanings that are grafted on these patterns. Ethical and societal implications of Digital Twins are explored. Digital Twins imply a data-driven approach to health care. This approach has the potential to deliver significant societal benefits, and can function as a social equalizer, by allowing for effective equalizing enhancement interventions. It can as well though be a driver for inequality, given the fact that a Digital Twin might not be an accessible technology for everyone, and given the fact

  1. Digital Twins in Health Care: Ethical Implications of an Emerging Engineering Paradigm

    Science.gov (United States)

    Bruynseels, Koen; Santoni de Sio, Filippo; van den Hoven, Jeroen

    2018-01-01

    Personalized medicine uses fine grained information on individual persons, to pinpoint deviations from the normal. ‘Digital Twins’ in engineering provide a conceptual framework to analyze these emerging data-driven health care practices, as well as their conceptual and ethical implications for therapy, preventative care and human enhancement. Digital Twins stand for a specific engineering paradigm, where individual physical artifacts are paired with digital models that dynamically reflects the status of those artifacts. When applied to persons, Digital Twins are an emerging technology that builds on in silico representations of an individual that dynamically reflect molecular status, physiological status and life style over time. We use Digital Twins as the hypothesis that one would be in the possession of very detailed bio-physical and lifestyle information of a person over time. This perspective redefines the concept of ‘normality’ or ‘health,’ as a set of patterns that are regular for a particular individual, against the backdrop of patterns observed in the population. This perspective also will impact what is considered therapy and what is enhancement, as can be illustrated with the cases of the ‘asymptomatic ill’ and life extension via anti-aging medicine. These changes are the consequence of how meaning is derived, in case measurement data is available. Moral distinctions namely may be based on patterns found in these data and the meanings that are grafted on these patterns. Ethical and societal implications of Digital Twins are explored. Digital Twins imply a data-driven approach to health care. This approach has the potential to deliver significant societal benefits, and can function as a social equalizer, by allowing for effective equalizing enhancement interventions. It can as well though be a driver for inequality, given the fact that a Digital Twin might not be an accessible technology for everyone, and given the fact that patterns

  2. How residents and interns utilise and perceive the personal digital assistant and UpToDate

    Directory of Open Access Journals (Sweden)

    Lim Tow

    2008-07-01

    Full Text Available Abstract Background In this era of evidence-based medicine, doctors are increasingly using information technology to acquire medical knowledge. This study evaluates how residents and interns utilise and perceive the personal digital assistant (PDA and the online resource UpToDate. Methods This is a questionnaire survey of all residents and interns in a tertiary teaching hospital. Results Out of 168 doctors, 134 (79.8% responded to the questionnaire. Only 54 doctors (40.3% owned a PDA. Although these owners perceived that the PDA was most useful for providing drug information, followed by medical references, scheduling and medical calculators, the majority of them did not actually have medical software applications downloaded on their PDAs. The greatest concerns highlighted for the PDA were the fear of loss and breakage, and the preference for working with desktop computers and paper. Meanwhile, only 76 doctors (56.7% used UpToDate, even though the hospital had an institutional subscription for it. Although 93.4% of these users would recommend UpToDate to a colleague, only 57.9% stated that the use of UpToDate had led to a change in their management of patients. Conclusion Although UpToDate and various PDA software applications were deemed useful by some of the residents and interns in our study, both digital tools were under-utilised. More should be done to facilitate the use of medical software applications on PDAs, to promote awareness of tools for evidence-based medicine such as UpToDate, and to facilitate the application of evidence-based medicine in daily clinical practice.

  3. Digital poly-victimization: The increasing importance of online crime and harassment to the burden of victimization.

    Science.gov (United States)

    Hamby, Sherry; Blount, Zach; Smith, Alli; Jones, Lisa; Mitchell, Kimberly; Taylor, Elizabeth

    2018-01-01

    Many forms of victimization, including bullying and property crime, are increasingly moving online, but most studies of poly-victimization still primarily focus on in-person crime and violence. Few studies have examined the importance of incorporating technology-based victimizations for assessing the true burden of violence. The purpose of this study is to explore whether digital poly-victimization contributes to post-traumatic stress and anxiety/dysphoria symptoms after controlling for in-person poly-victimization. Given that technology use and technology-based victimization are changing rapidly, a mixed methods approach was adopted. In the first two phases, focus groups and cognitive interviews (89 total participants) were used to identify the range of digital victimization and develop the Digital Poly-Victimization Scale. In the third phase, the new measure was included in a community survey (n = 478, 57.5% female; 62.6% earning under $50,000 per year) in a rural Southern region, along with measures of in-person poly-victimization, posttraumatic stress and anxiety/dysphoria symptoms, and other outcomes and personal characteristics. A comprehensive measure of digital poly-victimization indicated that almost 3 in 4 participants (72.3%) had experienced at least one form of digital victimization. The results indicated that digital poly-victimization contributed unique variance to post-traumatic stress and anxiety/dysphoria symptoms (p Digital victimization often presents fewer risks to perpetrators and can be expected to represent an increasing share of the societal burden of violence. Future research on poly-victimization should pay more attention to the role of digital victimization.

  4. Multimodal three-dimensional dynamic signature

    Directory of Open Access Journals (Sweden)

    Yury E. Kozlov

    2017-11-01

    Full Text Available Reliable authentication in mobile applications is among the most important information security challenges. Today, we can hardly imagine a person who would not own a mobile device that connects to the Internet. Mobile devices are being used to store large amounts of confidential information, ranging from personal photos to electronic banking tools. In 2009, colleagues from Rice University together with their collaborators from Motorola, proposed an authentication through in-air gestures. This and subsequent work contributing to the development of the method are reviewed in our introduction. At the moment, there exists a version of the gesture-based authentication software available for Android mobile devices. This software has not become widespread yet. One of likely reasons for that is the insufficient reliability of the method, which involves similar to its earlier analogs the use of only one device. Here we discuss the authentication based on the multimodal three-dimensional dynamic signature (MTDS performed by two independent mobile devices. The MTDS-based authentication technique is an advanced version of in-air gesture authentication. We describe the operation of a prototype of MTDS-based authentication, including the main implemented algorithms, as well as some preliminary results of testing the software. We expect that our method can be used in any mobile application, provided a number of additional improvements discussed in the conclusion are made.

  5. 25 CFR 213.10 - Lessor's signature.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Lessor's signature. 213.10 Section 213.10 Indians BUREAU... MEMBERS OF FIVE CIVILIZED TRIBES, OKLAHOMA, FOR MINING How to Acquire Leases § 213.10 Lessor's signature... thumbprint which shall be designated as “right” or “left” thumbmark. Such signatures must be witnessed by two...

  6. Initial Semantics for Strengthened Signatures

    Directory of Open Access Journals (Sweden)

    André Hirschowitz

    2012-02-01

    Full Text Available We give a new general definition of arity, yielding the companion notions of signature and associated syntax. This setting is modular in the sense requested by Ghani and Uustalu: merging two extensions of syntax corresponds to building an amalgamated sum. These signatures are too general in the sense that we are not able to prove the existence of an associated syntax in this general context. So we have to select arities and signatures for which there exists the desired initial monad. For this, we follow a track opened by Matthes and Uustalu: we introduce a notion of strengthened arity and prove that the corresponding signatures have initial semantics (i.e. associated syntax. Our strengthened arities admit colimits, which allows the treatment of the λ-calculus with explicit substitution.

  7. Poaching Museum Collections using Digital 3D Technologies

    Directory of Open Access Journals (Sweden)

    Sarah Younan

    2015-12-01

    Full Text Available This paper investigates the creative engagement with digital 3D models of museum artefacts and gives insight into new uses of museum collections enabled by digital scanning, editing and 3D printing technologies. Digital 3D models of museum artefacts are malleable and increasingly easy to use. Additionally, freely available 3D software has made 3D scanning, editing and manufacturing possible for non-specialists. These technologies allow users to create new artworks through the creation and transformation of digital replicas of museum artefacts. Examples of creative works, taken from two case studies that involve the creative use of digital reproductions of museum artefacts are presented in this paper. These projects are illustrative of a larger trend: the digital ‘poaching’ of heritage artefacts. This paper examines how digital 3D technologies can foster creative forms of museum engagement, democratise access to museum collections and engage users with personal forms of museum experience.

  8. Digital intelligent booster for DCC miniature train networks

    Science.gov (United States)

    Ursu, M. P.; Condruz, D. A.

    2017-08-01

    Modern miniature trains are now driven by means of the DCC (Digital Command and Control) system, which allows the human operator or a personal computer to launch commands to each individual train or even to control different features of the same train. The digital command station encodes these commands and sends them to the trains by means of electrical pulses via the rails of the railway network. Due to the development of the miniature railway network, it may happen that the power requirement of the increasing number of digital locomotives, carriages and accessories exceeds the nominal output power of the digital command station. This digital intelligent booster relieves the digital command station from powering the entire railway network all by itself, and it automatically handles the multiple powered sections of the network. This electronic device is also able to detect and process short-circuits and overload conditions, without the intervention of the digital command station.

  9. Spectral signature selection for mapping unvegetated soils

    Science.gov (United States)

    May, G. A.; Petersen, G. W.

    1975-01-01

    Airborne multispectral scanner data covering the wavelength interval from 0.40-2.60 microns were collected at an altitude of 1000 m above the terrain in southeastern Pennsylvania. Uniform training areas were selected within three sites from this flightline. Soil samples were collected from each site and a procedure developed to allow assignment of scan line and element number from the multispectral scanner data to each sampling location. These soil samples were analyzed on a spectrophotometer and laboratory spectral signatures were derived. After correcting for solar radiation and atmospheric attenuation, the laboratory signatures were compared to the spectral signatures derived from these same soils using multispectral scanner data. Both signatures were used in supervised and unsupervised classification routines. Computer-generated maps using the laboratory and multispectral scanner derived signatures resulted in maps that were similar to maps resulting from field surveys. Approximately 90% agreement was obtained between classification maps produced using multispectral scanner derived signatures and laboratory derived signatures.

  10. Time Series Based for Online Signature Verification

    Directory of Open Access Journals (Sweden)

    I Ketut Gede Darma Putra

    2013-11-01

    Full Text Available Signature verification system is to match the tested signature with a claimed signature. This paper proposes time series based for feature extraction method and dynamic time warping for match method. The system made by process of testing 900 signatures belong to 50 participants, 3 signatures for reference and 5 signatures from original user, simple imposters and trained imposters for signatures test. The final result system was tested with 50 participants with 3 references. This test obtained that system accuracy without imposters is 90,44897959% at threshold 44 with rejection errors (FNMR is 5,2% and acceptance errors (FMR is 4,35102%, when with imposters system accuracy is 80,1361% at threshold 27 with error rejection (FNMR is 15,6% and acceptance errors (average FMR is 4,263946%, with details as follows: acceptance errors is 0,391837%, acceptance errors simple imposters is 3,2% and acceptance errors trained imposters is 9,2%.

  11. Genome signature analysis of thermal virus metagenomes reveals Archaea and thermophilic signatures.

    Science.gov (United States)

    Pride, David T; Schoenfeld, Thomas

    2008-09-17

    Metagenomic analysis provides a rich source of biological information for otherwise intractable viral communities. However, study of viral metagenomes has been hampered by its nearly complete reliance on BLAST algorithms for identification of DNA sequences. We sought to develop algorithms for examination of viral metagenomes to identify the origin of sequences independent of BLAST algorithms. We chose viral metagenomes obtained from two hot springs, Bear Paw and Octopus, in Yellowstone National Park, as they represent simple microbial populations where comparatively large contigs were obtained. Thermal spring metagenomes have high proportions of sequences without significant Genbank homology, which has hampered identification of viruses and their linkage with hosts. To analyze each metagenome, we developed a method to classify DNA fragments using genome signature-based phylogenetic classification (GSPC), where metagenomic fragments are compared to a database of oligonucleotide signatures for all previously sequenced Bacteria, Archaea, and viruses. From both Bear Paw and Octopus hot springs, each assembled contig had more similarity to other metagenome contigs than to any sequenced microbial genome based on GSPC analysis, suggesting a genome signature common to each of these extreme environments. While viral metagenomes from Bear Paw and Octopus share some similarity, the genome signatures from each locale are largely unique. GSPC using a microbial database predicts most of the Octopus metagenome has archaeal signatures, while bacterial signatures predominate in Bear Paw; a finding consistent with those of Genbank BLAST. When using a viral database, the majority of the Octopus metagenome is predicted to belong to archaeal virus Families Globuloviridae and Fuselloviridae, while none of the Bear Paw metagenome is predicted to belong to archaeal viruses. As expected, when microbial and viral databases are combined, each of the Octopus and Bear Paw metagenomic contigs

  12. Signatures de l'invisible

    CERN Multimedia

    CERN Press Office. Geneva

    2000-01-01

    "Signatures of the Invisible" is an unique collaboration between contemporary artists and contemporary physicists which has the potential to help redefine the relationship between science and art. "Signatures of the Invisible" is jointly organised by the London Institute - the world's largest college of art and design and CERN*, the world's leading particle physics laboratory. 12 leading visual artists:

  13. West Virginia Digital Learning: Report to the Governor, Legislature, and West Virginia Board of Education

    Science.gov (United States)

    Alliance for Excellent Education, 2014

    2014-01-01

    Accomplishing personalized, deeper learning through anywhere, anytime digital learning requires a redesign of the K-12 education system. This report looks at readiness for digital learning at two levels in West Virginia: the district capacity building to ready the system for digital learning and school implementation of digital learning. The…

  14. Sites of Possibility: Applied Theatre and Digital Storytelling with Youth

    Science.gov (United States)

    Alrutz, Megan

    2013-01-01

    As a process for engaging marginalised voices in the social/cultural economy of the media, digital storytelling has garnered much attention from media artists, community organisers and scholars since the early 1990s. The practice of digital storytelling, or the making and sharing of personal narratives through recorded voice-overs, digital…

  15. A group signature scheme based on quantum teleportation

    International Nuclear Information System (INIS)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu

    2010-01-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  16. A group signature scheme based on quantum teleportation

    Energy Technology Data Exchange (ETDEWEB)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu, E-mail: wxjun36@gmail.co [Information Countermeasure Technique Research Institute, Harbin Institute of Technology, Harbin 150001 (China)

    2010-05-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  17. Maximizing biomarker discovery by minimizing gene signatures

    Directory of Open Access Journals (Sweden)

    Chang Chang

    2011-12-01

    Full Text Available Abstract Background The use of gene signatures can potentially be of considerable value in the field of clinical diagnosis. However, gene signatures defined with different methods can be quite various even when applied the same disease and the same endpoint. Previous studies have shown that the correct selection of subsets of genes from microarray data is key for the accurate classification of disease phenotypes, and a number of methods have been proposed for the purpose. However, these methods refine the subsets by only considering each single feature, and they do not confirm the association between the genes identified in each gene signature and the phenotype of the disease. We proposed an innovative new method termed Minimize Feature's Size (MFS based on multiple level similarity analyses and association between the genes and disease for breast cancer endpoints by comparing classifier models generated from the second phase of MicroArray Quality Control (MAQC-II, trying to develop effective meta-analysis strategies to transform the MAQC-II signatures into a robust and reliable set of biomarker for clinical applications. Results We analyzed the similarity of the multiple gene signatures in an endpoint and between the two endpoints of breast cancer at probe and gene levels, the results indicate that disease-related genes can be preferably selected as the components of gene signature, and that the gene signatures for the two endpoints could be interchangeable. The minimized signatures were built at probe level by using MFS for each endpoint. By applying the approach, we generated a much smaller set of gene signature with the similar predictive power compared with those gene signatures from MAQC-II. Conclusions Our results indicate that gene signatures of both large and small sizes could perform equally well in clinical applications. Besides, consistency and biological significances can be detected among different gene signatures, reflecting the

  18. Personal Library Curation

    DEFF Research Database (Denmark)

    Antonijević, Smiljana; Stern Cahoy, Ellysa

    2014-01-01

    This paper presents findings of a Mellon Foundation–funded study conducted at Penn State University at University Park during Fall 2012 that explored scholars’ information practices across disciplines encompassing the sciences, humanities, and social sciences. Drawing on results of the Web......-based survey and ethnographic interviews, we present findings related to academics’ practices in discovering, storing, citing, and archiving information, as well as their views on the role of library in the digital age. The paper harvests a comparative multidisciplinary perspective of our study, identifying...... principles and technical architecture that support digital scholarship and facilitate the development of literacies for faculty personal information management....

  19. Impacting Academic Achievement with Student Learners Teaching Digital Storytelling to Others: The ATTTCSE Digital Video Project

    Science.gov (United States)

    Figg, Candace; McCartney, Robin

    2010-01-01

    University researchers, teacher candidates, language and technology instructors, student learners, and families from diverse backgrounds partnered in an invitational teaching/learning experience--middle school student learners teaching their VIPs (very important persons) how to create stories and construct digital movies with reference to their…

  20. Lattice-Based Revocable Certificateless Signature

    Directory of Open Access Journals (Sweden)

    Ying-Hao Hung

    2017-10-01

    Full Text Available Certificateless signatures (CLS are noticeable because they may resolve the key escrow problem in ID-based signatures and break away the management problem regarding certificate in conventional signatures. However, the security of the mostly previous CLS schemes relies on the difficulty of solving discrete logarithm or large integer factorization problems. These two problems would be solved by quantum computers in the future so that the signature schemes based on them will also become insecure. For post-quantum cryptography, lattice-based cryptography is significant due to its efficiency and security. However, no study on addressing the revocation problem in the existing lattice-based CLS schemes is presented. In this paper, we focus on the revocation issue and present the first revocable CLS (RCLS scheme over lattices. Based on the short integer solution (SIS assumption over lattices, the proposed lattice-based RCLS scheme is shown to be existential unforgeability against adaptive chosen message attacks. By performance analysis and comparisons, the proposed lattice-based RCLS scheme is better than the previously proposed lattice-based CLS scheme, in terms of private key size, signature length and the revocation mechanism.

  1. General Conversion for Obtaining Strongly Existentially Unforgeable Signatures

    Science.gov (United States)

    Teranishi, Isamu; Oyama, Takuro; Ogata, Wakaha

    We say that a signature scheme is strongly existentially unforgeable (SEU) if no adversary, given message/signature pairs adaptively, can generate a signature on a new message or a new signature on a previously signed message. We propose a general and efficient conversion in the standard model that transforms a secure signature scheme to SEU signature scheme. In order to construct that conversion, we use a chameleon commitment scheme. Here a chameleon commitment scheme is a variant of commitment scheme such that one can change the committed value after publishing the commitment if one knows the secret key. We define the chosen message security notion for the chameleon commitment scheme, and show that the signature scheme transformed by our proposed conversion satisfies the SEU property if the chameleon commitment scheme is chosen message secure. By modifying the proposed conversion, we also give a general and efficient conversion in the random oracle model, that transforms a secure signature scheme into a SEU signature scheme. This second conversion also uses a chameleon commitment scheme but only requires the key only attack security for it.

  2. Professional Ethics for Digital Age Psychiatry: Boundaries, Privacy, and Communication.

    Science.gov (United States)

    Sabin, James E; Harland, Jonathan Clark

    2017-09-01

    Internet and social media use continue to expand rapidly. Many patients and psychiatrists are bringing digital technologies into the treatment process, but relatively little attention has been paid to the ethical challenges in doing this. This review presents ethical guidelines for psychiatry in the digital age. Surveys demonstrate that patients are eager to make digital technologies part of their treatment. Substantial numbers search for professional and personal information about their therapists. Attitudes among psychiatrists about using digital technologies with patients range from dread to enthusiastic adoption. Digital technologies create four major ethical challenges for psychiatry: managing clinical boundaries; maintaining privacy and confidentiality; establishing realistic expectations regarding digital communications; and upholding professional ideals. Traditional ethical expectations are valid for the evolving digital arena, but guidance must be adapted for actual application in practice.

  3. The interaction between digital marketing communication and customer loyalty

    OpenAIRE

    Merisavo, Marko

    2008-01-01

    Digital channels and information technology are changing the way that companies communicate and maintain relationships with their customers. The Internet, email, mobile phones, digital TV, and other evolving channels offer opportunities for frequent, costeffective, personalized, and interactive communication between the company and their customers. In addition to traditional offers and persuasion, customers can be provided with relational communication like newsletters, usage tips, maintenanc...

  4. Radar micro-doppler signatures processing and applications

    CERN Document Server

    Chen, Victor C; Miceli, William J

    2014-01-01

    Radar Micro-Doppler Signatures: Processing and applications concentrates on the processing and application of radar micro-Doppler signatures in real world situations, providing readers with a good working knowledge on a variety of applications of radar micro-Doppler signatures.

  5. Handbook of digital forensics of multimedia data and devices

    CERN Document Server

    Li, Shujun

    2015-01-01

    Digital forensics and multimedia forensics are rapidly growing disciplines whereby electronic information is extracted and interpreted for use in a court of law. These two fields are finding increasing importance in law enforcement and the investigation of cybercrime as the ubiquity of personal computing and the internet becomes ever-more apparent. Digital forensics involves investigating computer systems and digital artefacts in general, while multimedia forensics is a sub-topic of digital forensics focusing on evidence extracted from both normal computer systems and special multimedia devices, such as digital cameras. This book focuses on the interface between digital forensics and multimedia forensics, bringing two closely related fields of forensic expertise together to identify and understand the current state-of-the-art in digital forensic investigation. Both fields are expertly attended to by contributions from researchers and forensic practitioners specializ ng in diverse topics such as forensic aut...

  6. CERN: Digitally open, too

    CERN Multimedia

    Computer Security Team

    2013-01-01

    The Open Days are here!! From tomorrow onwards, we will be welcoming thousands of people to CERN. No barriers, no boundaries!   For decades, we have welcomed researchers and visitors from around the world to work at CERN, discuss physics research and attend our training sessions, lectures and conferences. This is how fundamental research should be conducted!!! But have you ever noticed how you are welcome at CERN in the digital world, too? Once you are affiliated and are registered with CERN, you receive a CERN computing account and e-mail address.  You can register your laptops, PCs and smartphones to use our (wireless) network, you can easily create your personal webpage, and profit from a vast disk space for file storage (AFS and DFS). CERN is indeed an Open Campus and not only during the Open Days. CERN is an Open Campus in the digital world. This digital Open Campus culture is exactly the reason why “computer security” has been dele...

  7. Dynamics of person-to-person interactions from distributed RFID sensor networks.

    Directory of Open Access Journals (Sweden)

    Ciro Cattuto

    Full Text Available BACKGROUND: Digital networks, mobile devices, and the possibility of mining the ever-increasing amount of digital traces that we leave behind in our daily activities are changing the way we can approach the study of human and social interactions. Large-scale datasets, however, are mostly available for collective and statistical behaviors, at coarse granularities, while high-resolution data on person-to-person interactions are generally limited to relatively small groups of individuals. Here we present a scalable experimental framework for gathering real-time data resolving face-to-face social interactions with tunable spatial and temporal granularities. METHODS AND FINDINGS: We use active Radio Frequency Identification (RFID devices that assess mutual proximity in a distributed fashion by exchanging low-power radio packets. We analyze the dynamics of person-to-person interaction networks obtained in three high-resolution experiments carried out at different orders of magnitude in community size. The data sets exhibit common statistical properties and lack of a characteristic time scale from 20 seconds to several hours. The association between the number of connections and their duration shows an interesting super-linear behavior, which indicates the possibility of defining super-connectors both in the number and intensity of connections. CONCLUSIONS: Taking advantage of scalability and resolution, this experimental framework allows the monitoring of social interactions, uncovering similarities in the way individuals interact in different contexts, and identifying patterns of super-connector behavior in the community. These results could impact our understanding of all phenomena driven by face-to-face interactions, such as the spreading of transmissible infectious diseases and information.

  8. Physics Signatures at CLIC

    CERN Document Server

    Battaglia, Marco

    2001-01-01

    A set of signatures for physics processes of potential interests for the CLIC programme at = 1 - 5 TeV are discussed. These signatures, that may correspond to the manifestation of different scenarios of new physics as well as to Standard Model precision tests, are proposed as benchmarks for the optimisation of the CLIC accelerator parameters and for a first definition of the required detector response.

  9. Genome signature analysis of thermal virus metagenomes reveals Archaea and thermophilic signatures

    Directory of Open Access Journals (Sweden)

    Pride David T

    2008-09-01

    Full Text Available Abstract Background Metagenomic analysis provides a rich source of biological information for otherwise intractable viral communities. However, study of viral metagenomes has been hampered by its nearly complete reliance on BLAST algorithms for identification of DNA sequences. We sought to develop algorithms for examination of viral metagenomes to identify the origin of sequences independent of BLAST algorithms. We chose viral metagenomes obtained from two hot springs, Bear Paw and Octopus, in Yellowstone National Park, as they represent simple microbial populations where comparatively large contigs were obtained. Thermal spring metagenomes have high proportions of sequences without significant Genbank homology, which has hampered identification of viruses and their linkage with hosts. To analyze each metagenome, we developed a method to classify DNA fragments using genome signature-based phylogenetic classification (GSPC, where metagenomic fragments are compared to a database of oligonucleotide signatures for all previously sequenced Bacteria, Archaea, and viruses. Results From both Bear Paw and Octopus hot springs, each assembled contig had more similarity to other metagenome contigs than to any sequenced microbial genome based on GSPC analysis, suggesting a genome signature common to each of these extreme environments. While viral metagenomes from Bear Paw and Octopus share some similarity, the genome signatures from each locale are largely unique. GSPC using a microbial database predicts most of the Octopus metagenome has archaeal signatures, while bacterial signatures predominate in Bear Paw; a finding consistent with those of Genbank BLAST. When using a viral database, the majority of the Octopus metagenome is predicted to belong to archaeal virus Families Globuloviridae and Fuselloviridae, while none of the Bear Paw metagenome is predicted to belong to archaeal viruses. As expected, when microbial and viral databases are combined, each of

  10. 48 CFR 204.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Contracting officer's signature. 204.101 Section 204.101 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS... officer's signature. Follow the procedures at PGI 204.101 for signature of contract documents. [71 FR 9268...

  11. Can specific transcriptional regulators assemble a universal cancer signature?

    Science.gov (United States)

    Roy, Janine; Isik, Zerrin; Pilarsky, Christian; Schroeder, Michael

    2013-10-01

    Recently, there is a lot of interest in using biomarker signatures derived from gene expression data to predict cancer progression. We assembled signatures of 25 published datasets covering 13 types of cancers. How do these signatures compare with each other? On one hand signatures answering the same biological question should overlap, whereas signatures predicting different cancer types should differ. On the other hand, there could also be a Universal Cancer Signature that is predictive independently of the cancer type. Initially, we generate signatures for all datasets using classical approaches such as t-test and fold change and then, we explore signatures resulting from a network-based method, that applies the random surfer model of Google's PageRank algorithm. We show that the signatures as published by the authors and the signatures generated with classical methods do not overlap - not even for the same cancer type - whereas the network-based signatures strongly overlap. Selecting 10 out of 37 universal cancer genes gives the optimal prediction for all cancers thus taking a first step towards a Universal Cancer Signature. We furthermore analyze and discuss the involved genes in terms of the Hallmarks of cancer and in particular single out SP1, JUN/FOS and NFKB1 and examine their specific role in cancer progression.

  12. A Study of Applying Digital Mobile Museum Guide

    Directory of Open Access Journals (Sweden)

    Chao-yun Chaucer Liang

    2003-09-01

    Full Text Available With the prosperous development of information technology, museums begin to apply new technology to enhance operation and communication efficiency. One of the information technology. Personal Digital Mobile, featuring light weight and mobility, can help museum to set up an interactive navigation system, which offering capability of user-controlled guidance and both broad and depth information. In this study, literature related to museum tour guide, digital mobile navigation, and multimedia interaction design were reviewed, and two examples were offered for reference. The first one example is Exploratorium in American, which is cooperated with HP labs to integrate wireless networking and PDA devices. The domestic example is the design project of the Personal Digital Mobile Guide for the Emperor Ch’ien-lung’s Grand Cultural Enterprise Exhibition in National Palace Museum, 2002. This paper introduces the techniques involved, interactive storyboard, interface design, color planning, electronic element planning, etc. The process of applying theory into creative project may help future researches in the related areas.[Article content in Chinese

  13. Personal digital assistants are comparable to traditional diaries for dietary self-monitoring during a weight loss program.

    Science.gov (United States)

    Yon, Bethany A; Johnson, Rachel K; Harvey-Berino, Jean; Gold, Beth Casey; Howard, Alan B

    2007-04-01

    Dietary self-monitoring is considered the core of behavioral weight control programs. As software for personal digital assistants (PDA) has become more available, this study investigated whether the use of a PDA would improve dietary self-monitoring frequency and subsequent weight loss over the use of traditional paper diaries. One-hundred-seventy-six adults (BMI 25-39.9) participated in a 6-month behavioral weight control program. Treatment subjects (n = 61) were provided with a PalmZire 21 with Calorie King's Diet Diary software installed. Their self-monitoring habits and weight loss were compared with the results from a previous program (n = 115) which followed the same protocol using paper diaries for self-monitoring. No significant differences in weight loss or dietary self-monitoring were found. More frequent self-monitoring correlated with weight loss in both groups (pself-monitoring that is fitting to their lifestyle and skills.

  14. 36 CFR 1150.22 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Signature of documents. 1150.22 Section 1150.22 Parks, Forests, and Public Property ARCHITECTURAL AND TRANSPORTATION BARRIERS... Documents for Proceedings on Citations § 1150.22 Signature of documents. The signature of a party...

  15. General Impact Of A Single Market - Albania Goes Digital

    Directory of Open Access Journals (Sweden)

    Nikollaq Pano

    2015-08-01

    Full Text Available Although Brexit did trigger some discussion about the European Single Market future The Commission strategy for an area without internal frontiers in which the free movement of goods persons services and capital is ensured remains the same and increasingly attracts the attention and interest of policy makers and researchers. The digital single market a recent concept developed in the context of the European Union goes beyond the Cloud computing IoT and Big Data that are present-day words frequently mentioned in country strategies. The aim of coming together into a single market is to maximise the benefits of technology while simultaneously preserving values we hold timeless. Expanding this concept and considering the configuration of a digital market in Albania is the underpinning of this paper. Goods and services provided on-line will grant a better access and improved service to the benefit of customers under conditions of fair competition and a high level of consumer and personal data protection. A single platform necessarily digital can incorporate the banking industrial education investment markets and contribute to their unification. This first step of placing the idea should be followed by considering components like digital infrastructure development digitally educated people collaborative economy and others. There is a vision for the country development with no timeline yet above and beyond the brainstorming approach.

  16. A digital imaging teaching file by using the internet, HTML and personal computers

    International Nuclear Information System (INIS)

    Chun, Tong Jin; Jeon, Eun Ju; Baek, Ho Gil; Kang, Eun Joo; Baik, Seung Kug; Choi, Han Yong; Kim, Bong Ki

    1996-01-01

    A film-based teaching file takes up space and the need to search through such a file places limits on the extent to which it is likely to be used. Furthermore it is not easy for doctors in a medium-sized hospital to experience a variety of cases, and so for these reasons we created an easy-to-use digital imaging teaching file with HTML(Hypertext Markup Language) and downloaded images via World Wide Web(WWW) services on the Internet. This was suitable for use by computer novices. We used WWW internet services as a resource for various images and three different IMB-PC compatible computers(386DX, 486DX-II, and Pentium) in downloading the images and in developing a digitalized teaching file. These computers were connected with the Internet through a high speed dial-up modem(28.8Kbps) and to navigate the Internet. Twinsock and Netscape were used. 3.0, Korean word processing software, was used to create HTML(Hypertext Markup Language) files and the downloaded images were linked to the HTML files. In this way, a digital imaging teaching file program was created. Access to a Web service via the Internet required a high speed computer(at least 486DX II with 8MB RAM) for comfortabel use; this also ensured that the quality of downloaded images was not degraded during downloading and that these were good enough to use as a teaching file. The time needed to retrieve the text and related images depends on the size of the file, the speed of the network, and the network traffic at the time of connection. For computer novices, a digital image teaching file using HTML is easy to use. Our method of creating a digital imaging teaching file by using Internet and HTML would be easy to create and radiologists with little computer experience who want to study various digital radiologic imaging cases would find it easy to use

  17. 17 CFR 201.65 - Identity and signature.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Identity and signature. 201.65... of 1934 § 201.65 Identity and signature. Applications pursuant to this subpart may omit the identity, mailing address, and signature of the applicant; provided, that such identity, mailing address and...

  18. 15 CFR 908.16 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Signature. 908.16 Section 908.16 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) NATIONAL OCEANIC... SUBMITTING REPORTS ON WEATHER MODIFICATION ACTIVITIES § 908.16 Signature. All reports filed with the National...

  19. 34 CFR 101.32 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Signature of documents. 101.32 Section 101.32 Education Regulations of the Offices of the Department of Education OFFICE FOR CIVIL RIGHTS, DEPARTMENT OF EDUCATION... Documents § 101.32 Signature of documents. The signature of a party, authorized officer, employee or...

  20. 29 CFR 102.116 - Signature of orders.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 2 2010-07-01 2010-07-01 false Signature of orders. 102.116 Section 102.116 Labor Regulations Relating to Labor NATIONAL LABOR RELATIONS BOARD RULES AND REGULATIONS, SERIES 8 Certification and Signature of Documents § 102.116 Signature of orders. The executive secretary or the associate executive...

  1. On signature change in p-adic space-times

    International Nuclear Information System (INIS)

    Dragovic, B.G.

    1991-01-01

    Change of signature by linear coordinate transformations in p-adic space-times is considered. In this paper it is shown that there exists arbitrary change of trivial signature in Q p n for all n ≥ 1 if p ≡ 1 (mod 4). In other cases it is possible to change only even number of the signs of the signature. The authors suggest new concept of signature with respect to distinct quadratic extensions, of Q p . If space-time dimension is restricted to four there is no signature change

  2. Users Behavior in Location-Aware Services: Digital Natives versus Digital Immigrants

    Directory of Open Access Journals (Sweden)

    Marco Furini

    2014-01-01

    Full Text Available Location-aware services may expose users to privacy risks as they usually attach user’s location to the generated contents. Different studies have focused on privacy in location-aware services, but the results are often conflicting. Our hypothesis is that users are not fully aware of the features of the location-aware scenario and this lack of knowledge affects the results. Hence, in this paper we present a different approach: the analysis is conducted on two different groups of users (digital natives and digital immigrants and is divided into two steps: (i understanding users’ knowledge of a location-aware scenario and (ii investigating users’ opinion toward location-aware services after showing them an example of an effective location-aware service able to extract personal and sensitive information from contents publicly available in social media platforms. The analysis reveals that there is relation between users’ knowledge and users’ concerns toward privacy in location-aware services and also reveals that digital natives are more interested in the location-aware scenario than digital immigrants. The analysis also discloses that users’ concerns toward these services may be ameliorated if these services ask for users’ authorization and provide benefits to users. Other interesting findings allow us to draw guidelines that might be helpful in developing effective location-aware services.

  3. Signature Curves Statistics of DNA Supercoils

    OpenAIRE

    Shakiban, Cheri; Lloyd, Peter

    2004-01-01

    In this paper we describe the Euclidean signature curves for two dimensional closed curves in the plane and their generalization to closed space curves. The focus will be on discrete numerical methods for approximating such curves. Further we will apply these numerical methods to plot the signature curves related to three-dimensional simulated DNA supercoils. Our primary focus will be on statistical analysis of the data generated for the signature curves of the supercoils. We will try to esta...

  4. 45 CFR 81.32 - Signature of documents.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Signature of documents. 81.32 Section 81.32 Public... UNDER PART 80 OF THIS TITLE Form, Execution, Service and Filing of Documents § 81.32 Signature of documents. The signature of a party, authorized officer, employee or attorney constitutes a certificate that...

  5. Digital storytelling: an innovative tool for practice, education, and research.

    Science.gov (United States)

    Lal, Shalini; Donnelly, Catherine; Shin, Jennifer

    2015-01-01

    Digital storytelling is a method of using storytelling, group work, and modern technology to facilitate the creation of 2-3 minute multi-media video clips to convey personal or community stories. Digital storytelling is being used within the health care field; however, there has been limited documentation of its application within occupational therapy. This paper introduces digital storytelling and proposes how it can be applied in occupational therapy clinical practice, education, and research. The ethical and methodological challenges in relation to using the method are also discussed.

  6. Modeling the lexical morphology of Western handwritten signatures.

    Directory of Open Access Journals (Sweden)

    Moises Diaz-Cabrera

    Full Text Available A handwritten signature is the final response to a complex cognitive and neuromuscular process which is the result of the learning process. Because of the many factors involved in signing, it is possible to study the signature from many points of view: graphologists, forensic experts, neurologists and computer vision experts have all examined them. Researchers study written signatures for psychiatric, penal, health and automatic verification purposes. As a potentially useful, multi-purpose study, this paper is focused on the lexical morphology of handwritten signatures. This we understand to mean the identification, analysis, and description of the signature structures of a given signer. In this work we analyze different public datasets involving 1533 signers from different Western geographical areas. Some relevant characteristics of signature lexical morphology have been selected, examined in terms of their probability distribution functions and modeled through a General Extreme Value distribution. This study suggests some useful models for multi-disciplinary sciences which depend on handwriting signatures.

  7. The Design Process and User Focused Digital Spaces

    OpenAIRE

    Keating, Elaine M.

    2004-01-01

    This thesis presents a qualitative inquiry into how the graphic design process is being reconfigured within the new digital media landscape. The literature review looks at the historical relationship between graphic design and technology from the invention of the printing press to the personal computer and reviews how this relationship is again affected by the emergence of the computer as a medium for communication. The products of digital design are no longer static and fixed but are dynamic...

  8. Signature molecular descriptor : advanced applications.

    Energy Technology Data Exchange (ETDEWEB)

    Visco, Donald Patrick, Jr. (Tennessee Technological University, Cookeville, TN)

    2010-04-01

    In this work we report on the development of the Signature Molecular Descriptor (or Signature) for use in the solution of inverse design problems as well as in highthroughput screening applications. The ultimate goal of using Signature is to identify novel and non-intuitive chemical structures with optimal predicted properties for a given application. We demonstrate this in three studies: green solvent design, glucocorticoid receptor ligand design and the design of inhibitors for Factor XIa. In many areas of engineering, compounds are designed and/or modified in incremental ways which rely upon heuristics or institutional knowledge. Often multiple experiments are performed and the optimal compound is identified in this brute-force fashion. Perhaps a traditional chemical scaffold is identified and movement of a substituent group around a ring constitutes the whole of the design process. Also notably, a chemical being evaluated in one area might demonstrate properties very attractive in another area and serendipity was the mechanism for solution. In contrast to such approaches, computer-aided molecular design (CAMD) looks to encompass both experimental and heuristic-based knowledge into a strategy that will design a molecule on a computer to meet a given target. Depending on the algorithm employed, the molecule which is designed might be quite novel (re: no CAS registration number) and/or non-intuitive relative to what is known about the problem at hand. While CAMD is a fairly recent strategy (dating to the early 1980s), it contains a variety of bottlenecks and limitations which have prevented the technique from garnering more attention in the academic, governmental and industrial institutions. A main reason for this is how the molecules are described in the computer. This step can control how models are developed for the properties of interest on a given problem as well as how to go from an output of the algorithm to an actual chemical structure. This report

  9. A Balance of Primary and Secondary Values: Exploring a Digital Legacy

    Directory of Open Access Journals (Sweden)

    Amber L. Cushing

    2014-06-01

    Full Text Available This exploratory research explores the concept of a digital legacy as a general concept and as a collection of digital possessions with unique characteristics. The results reported in this article are part of a larger study. In Cushing (2013, the author identified the characteristics of a digital possession. In this study, these characteristics of a digital possession were utilized to explore how the characteristics of several digital possessions could form a collection, or a digital legacy. In addition to being explored as a collection of digital possessions, data was collected about the general concept of a digital legacy. In part I of the study, 23 participants from three age groups were interviewed about their general concept of a digital legacy. Five general characteristics describing a digital legacy were identified. In part II of the study, interview data from Cushing (2013 was used to create statements describing digital possessions. The statements were classified utilizing the archival concept of primary and secondary values, as well as the consumer behavior concepts of self extension to possessions and possession attachment. Primary value refers to the purpose for which the item was created, while secondary value refers to an additional value that the participants can perceive the item to hold, such as a perception that an item can represent one's identity. Using standard Q method procedure, 48 participants were directed to rank their agreement with 60 statements (written on cards, along a distribution of -5 to +5, according to the characteristics of the digital possession they would most like to maintain for a digital legacy. The ranked statements were analyzed using Q factor analysis, in order to perceive the most common statements associated with maintaining digital possessions for a digital legacy. Q method results suggested that most individuals described the digital possessions they wanted to maintain for a digital legacy using

  10. Ship Signature Management System : Functionality

    NARCIS (Netherlands)

    Arciszewski, H.F.R.; Lier, L. van; Meijer, Y.G.S.; Noordkamp, H.W.; Wassenaar, A.S.

    2010-01-01

    A signature of a platform is the manner in which the platform manifests itself to a certain type of sensor and how observable it is when such a sensor is used to detect the platform. Because many military platforms use sensors in different media, it is the total of its different signatures that

  11. Digital Literacy - Is It Necessary for eInclusion?

    Science.gov (United States)

    Leahy, Denise; Dolan, Dudley

    In order to live and work in today's technological world, it is important to be able to use information and communications technology. More and more of us are communicating with family and friends using technology; business is carried out using technology; in the work environment companies use intranets to communicate with staff; governments are moving towards interacting with citizens online. While accessibility and usability in technology are absolutely necessary, is digital literacy a pre-requisite to benefit from what the Information Society can offer? The EU has recognised the need for digital literacy and has included this in the definition of eInclusion [1]. This paper examines definitions of digital literacy and suggests that digital literacy is necessary for a person to take a full part in today's Information Society.

  12. Information access tasks and evaluation for personal lifelogs

    OpenAIRE

    Jones, Gareth J.F.; Gurrin, Cathal; Kelly, Liadh; Byrne, Daragh; Chen, Yi

    2008-01-01

    Emerging personal lifelog (PL) collections contain permanent digital records of information associated with individuals’ daily lives. This can include materials such as emails received and sent, web content and other documents with which they have interacted, photographs, videos and music experienced passively or created, logs of phone calls and text messages, and also personal and contextual data such as location (e.g. via GPS sensors), persons and objects present (e.g. via Bluetooth) and ph...

  13. Cell short circuit, preshort signature

    Science.gov (United States)

    Lurie, C.

    1980-01-01

    Short-circuit events observed in ground test simulations of DSCS-3 battery in-orbit operations are analyzed. Voltage signatures appearing in the data preceding the short-circuit event are evaluated. The ground test simulation is briefly described along with performance during reconditioning discharges. Results suggest that a characteristic signature develops prior to a shorting event.

  14. Intervention planning for a digital intervention for self-management of hypertension: a theory-, evidence- and person-based approach.

    Science.gov (United States)

    Band, Rebecca; Bradbury, Katherine; Morton, Katherine; May, Carl; Michie, Susan; Mair, Frances S; Murray, Elizabeth; McManus, Richard J; Little, Paul; Yardley, Lucy

    2017-02-23

    This paper describes the intervention planning process for the Home and Online Management and Evaluation of Blood Pressure (HOME BP), a digital intervention to promote hypertension self-management. It illustrates how a Person-Based Approach can be integrated with theory- and evidence-based approaches. The Person-Based Approach to intervention development emphasises the use of qualitative research to ensure that the intervention is acceptable, persuasive, engaging and easy to implement. Our intervention planning process comprised two parallel, integrated work streams, which combined theory-, evidence- and person-based elements. The first work stream involved collating evidence from a mixed methods feasibility study, a systematic review and a synthesis of qualitative research. This evidence was analysed to identify likely barriers and facilitators to uptake and implementation as well as design features that should be incorporated in the HOME BP intervention. The second work stream used three complementary approaches to theoretical modelling: developing brief guiding principles for intervention design, causal modelling to map behaviour change techniques in the intervention onto the Behaviour Change Wheel and Normalisation Process Theory frameworks, and developing a logic model. The different elements of our integrated approach to intervention planning yielded important, complementary insights into how to design the intervention to maximise acceptability and ease of implementation by both patients and health professionals. From the primary and secondary evidence, we identified key barriers to overcome (such as patient and health professional concerns about side effects of escalating medication) and effective intervention ingredients (such as providing in-person support for making healthy behaviour changes). Our guiding principles highlighted unique design features that could address these issues (such as online reassurance and procedures for managing concerns). Causal

  15. MODERN APPROACH TO DIGITAL LITERACY DEVELOPMENT IN EDUCATION

    Directory of Open Access Journals (Sweden)

    Sergey S. Khromov

    2016-01-01

    Full Text Available The article is dedicated to the necessity of formation and development of digital literacies for the professional, educational and personal purposes. The article also provides a detailed classification of digital literacies and competences.Rapid penetration of information technologies in almost all spheres of our life, including education, and the fact that most ordinary users received unlimited access to the Internet, has led to a rapid rise of the information volume or information explosion and massive changes in the way of communication between people in all spheres and also to forming the information society as one of the leading contemporary social processes. Such changes in socio-economic conditions modified the socio-psychological and psycho-pedagogical portrait of the students, the nature of their participation in educational, professional and social life, as well as the methods of teaching the humanities, computer and natural sciences.The basis of modern educational paradigm are such theoretical concepts as digital literacies, distance learning technologies, information and communication technologies, internet resources, multimedia electronic textbooks, online courses, social networks, Internet resources, individualization and differentiation of learning activities, Personal Learning Network, etc. The importance of improving the educational process through the methodical training of faculty members and tutors, the application of use new technologies in teaching, the formation and development of information and communication competences, digital literacies and knowledge is emphasized. 

  16. The representation of older people playing a digital game in the short film ‘Pony Place’: A semiotic and narratological analysis

    Directory of Open Access Journals (Sweden)

    Eugène Loos

    2017-12-01

    Full Text Available This article focuses on Dutch older adults’ use of digital devices in general, and digital games in particular, from an intergenerational perspective. We first present some facts related to provide insight into how Dutch older adults use such new media. Then, the case of the Dutch short film Pony Place is analyzed using a semiotic and narratological approach, to examine how older adults are represented as so-called ‘digital immigrants’, digitally illiterate persons who are unable to master a digital game device. Finally, an intergenerational digital game design approach is presented to show how older adults can actively be involved in the world of digital games, which could lead to a change from their unbalanced representation as digital immigrants to persons who are, like younger players, able to be active in the world of digital games.

  17. Digital Twins in Health Care : Ethical Implications of an Emerging Engineering Paradigm

    NARCIS (Netherlands)

    Bruynseels, K.R.C.; Santoni De Sio, F.; van den Hoven, M.J.

    2018-01-01

    Personalized medicine uses fine grained information on individual persons, to pinpoint deviations from the normal. ‘Digital Twins’ in engineering provide a conceptual framework to analyze these emerging data-driven health care practices, as well as their conceptual and ethical implications for

  18. COMPUTER-IMPLEMENTED METHOD OF PERFORMING A SEARCH USING SIGNATURES

    DEFF Research Database (Denmark)

    2017-01-01

    A computer-implemented method of processing a query vector and a data vector), comprising: generating a set of masks and a first set of multiple signatures and a second set of multiple signatures by applying the set of masks to the query vector and the data vector, respectively, and generating...... candidate pairs, of a first signature and a second signature, by identifying matches of a first signature and a second signature. The set of masks comprises a configuration of the elements that is a Hadamard code; a permutation of a Hadamard code; or a code that deviates from a Hadamard code...

  19. Signature effects in 2-qp rotational bands

    International Nuclear Information System (INIS)

    Jain, A.K.; Goel, A.

    1992-01-01

    The authors briefly review the progress in understanding the 2-qp rotational bands in odd-odd nuclei. Signature effects and the phenomenon of signature inversion are discussed. The Coriolis coupling appears to have all the ingredients to explain the inversion. Some recent work on signature dependence in 2-qp bands of even-even nuclei is also discussed; interesting features are pointed out

  20. Digital Heritage Experiences

    DEFF Research Database (Denmark)

    Munar, Ana Maria; Ooi, Can-Seng

    ) and netnography (Kozinets, 2002). The social media platform analysed is TripAdvisor, which is the largest networking site focusing on tourism and travel. Study findings indicate that while heritage sites tend to promote their uniqueness and the cultural value of their products, tourists are just as concerned...... about sensory impressions, imagination, practical issues and personal comfort in the immediate moment as they are about historical and cultural details. Social media provide the technological tools and platforms to communicate and share tourism imaginations, feelings and practical tips. The analysis......The evolution of the Web and the expansion of social media are transforming our heritage experiences. Social media offer an innovative element to personal travel reflections by providing digital global platforms on which tourists can create and publish their travel stories. Social media transform...

  1. Code as Code: Speculations on Diversity, Inequity, and Digital Women

    Directory of Open Access Journals (Sweden)

    Sharon L. Comstock

    2015-04-01

    Full Text Available All technologies are social. Taking this socio-technological position becomes less a political stance as a necessity when considering the lived experience of digital inequity, divides, and –isms as they are encountered in every-day library work spheres. Personal experience as women and women of color in our respective technological and leadership communities provides both fore- and background to explore the private-public lines delineating definitions of “diversity”, “inequity”, and digital literacies in library practice. We suggest that by not probing these definitions at the most personal level of lived experience, we in the LIS and technology professions will remain well-intentioned, but ineffective, in genuine inclusion.

  2. Time-dependent delayed signatures from energetic photon interrogations

    International Nuclear Information System (INIS)

    Norman, Daren R.; Jones, James L.; Blackburn, Brandon W.; Haskell, Kevin J.; Johnson, James T.; Watson, Scott M.; Hunt, Alan W.; Spaulding, Randy; Harmon, Frank

    2007-01-01

    Pulsed photonuclear interrogation environments generated by 8-24 MeV electron linac are rich with time-dependent, material-specific, radiation signatures. Nitrogen-based explosives and nuclear materials can be detected by exploiting these signatures in different delayed-time regions. Numerical and experimental results presented in this paper show the unique time and energy dependence of these signatures. It is shown that appropriate delayed-time windows are essential to acquire material-specific signatures in pulsed photonuclear assessment environments. These developments demonstrate that pulsed, high-energy, photon-inspection environments can be exploited for time-dependent, material-specific signatures through the proper operation of specialized detectors and detection methods

  3. Peripheral blood signatures of lead exposure.

    Directory of Open Access Journals (Sweden)

    Heather G LaBreche

    Full Text Available BACKGROUND: Current evidence indicates that even low-level lead (Pb exposure can have detrimental effects, especially in children. We tested the hypothesis that Pb exposure alters gene expression patterns in peripheral blood cells and that these changes reflect dose-specific alterations in the activity of particular pathways. METHODOLOGY/PRINCIPAL FINDING: Using Affymetrix Mouse Genome 430 2.0 arrays, we examined gene expression changes in the peripheral blood of female Balb/c mice following exposure to per os lead acetate trihydrate or plain drinking water for two weeks and after a two-week recovery period. Data sets were RMA-normalized and dose-specific signatures were generated using established methods of supervised classification and binary regression. Pathway activity was analyzed using the ScoreSignatures module from GenePattern. CONCLUSIONS/SIGNIFICANCE: The low-level Pb signature was 93% sensitive and 100% specific in classifying samples a leave-one-out crossvalidation. The high-level Pb signature demonstrated 100% sensitivity and specificity in the leave-one-out crossvalidation. These two signatures exhibited dose-specificity in their ability to predict Pb exposure and had little overlap in terms of constituent genes. The signatures also seemed to reflect current levels of Pb exposure rather than past exposure. Finally, the two doses showed differential activation of cellular pathways. Low-level Pb exposure increased activity of the interferon-gamma pathway, whereas high-level Pb exposure increased activity of the E2F1 pathway.

  4. Magnetic signature surveillance of nuclear fuel

    International Nuclear Information System (INIS)

    Bernatowicz, H.; Schoenig, F.C.

    1981-01-01

    Typical nuclear fuel material contains tramp ferromagnetic particles of random size and distribution. Also, selected amounts of paramagnetic or ferromagnetic material can be added at random or at known positions in the fuel material. The fuel material in its non-magnetic container is scanned along its length by magnetic susceptibility detecting apparatus whereby susceptibility changes along its length are obtained and provide a unique signal waveform of the container of fuel material as a signature thereof. The output signature is stored. At subsequent times in its life the container is again scanned and respective signatures obtained which are compared with the initially obtained signature, any differences indicating alteration or tampering with the fuel material. If the fuel material includes a paramagnetic additive by taking two measurements along the container the effects thereof can be cancelled out. (author)

  5. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations

    OpenAIRE

    Ana Nieto; Ruben Rios; Javier Lopez

    2018-01-01

    IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT) context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntar...

  6. [Application of three-dimensional digital technology in the diagnosis and treatment planning in orthodontics].

    Science.gov (United States)

    Bai, Y X

    2016-06-01

    Three-dimensional(3D)digital technology has been widely used in the field of orthodontics in clinical examination, diagnosis, treatment and curative effect evaluation. 3D digital technology greatly improves the accuracy of diagnosis and treatment, and provides effective means for personalized orthodontic treatment. This review focuses on the application of 3D digital technology in the field of orthodontics.

  7. An Arbitrated Quantum Signature Scheme without Entanglement*

    International Nuclear Information System (INIS)

    Li Hui-Ran; Luo Ming-Xing; Peng Dai-Yuan; Wang Xiao-Jun

    2017-01-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks . (paper)

  8. Signature-based store checking buffer

    Science.gov (United States)

    Sridharan, Vilas; Gurumurthi, Sudhanva

    2015-06-02

    A system and method for optimizing redundant output verification, are provided. A hardware-based store fingerprint buffer receives multiple instances of output from multiple instances of computation. The store fingerprint buffer generates a signature from the content included in the multiple instances of output. When a barrier is reached, the store fingerprint buffer uses the signature to verify the content is error-free.

  9. Neutral signature Walker-VSI metrics

    International Nuclear Information System (INIS)

    Coley, A; McNutt, D; Musoke, N; Brooks, D; Hervik, S

    2014-01-01

    We will construct explicit examples of four-dimensional neutral signature Walker (but not necessarily degenerate Kundt) spaces for which all of the polynomial scalar curvature invariants vanish. We then investigate the properties of some particular subclasses of Ricci flat spaces. We also briefly describe some four-dimensional neutral signature Einstein spaces for which all of the polynomial scalar curvature invariants are constant. (paper)

  10. An interpretation of signature inversion

    International Nuclear Information System (INIS)

    Onishi, Naoki; Tajima, Naoki

    1988-01-01

    An interpretation in terms of the cranking model is presented to explain why signature inversion occurs for positive γ of the axially asymmetric deformation parameter and emerges into specific orbitals. By introducing a continuous variable, the eigenvalue equation can be reduced to a one dimensional Schroedinger equation by means of which one can easily understand the cause of signature inversion. (author)

  11. Acoustic Signature Monitoring and Management of Naval Platforms

    NARCIS (Netherlands)

    Basten, T.G.H.; Jong, C.A.F. de; Graafland, F.; Hof, J. van 't

    2015-01-01

    Acoustic signatures make naval platforms susceptible to detection by threat sensors. The variable operational conditions and lifespan of a platform cause variations in the acoustic signature. To deal with these variations, a real time signature monitoring capability is being developed, with advisory

  12. Digital library and the Slovenian academic environment

    Directory of Open Access Journals (Sweden)

    Martina Kerec

    2001-01-01

    Full Text Available Digital library is a term for a library of the present and of the future challenging the traditional libraries. Authors are interested mostly in the digital space of Slovene academic instutions. In the research, the digital collections of most of the University of Ljubljana faculties are examined. A questionnaire was used to obtain information about the users' (students' needs and their acquaintance with the concept of the digital library. Two things were expected: the research was aimed at finding the positive effect of digital libraries on studies, and the questionnaire as an incentive in the library profession for further research. The questionnaire was made in the end of 1999 at the Faculty of Arts in Ljubljana (FF. It included 275 students of FF. The results showed that the students of librarianship had a better understanding of the term digital library than the students of other courses. A personal computer is used frequently and with pleasure by most questioned students. The term digital library is known to 71,1% of the students of librarianship, and only to 43,8% of others. Most of the students chose the correct definition of the digital library (the digital library is a collection of disparate systems and resources, accessible on the net, but that was, by the authors' opinion, mostly a lucky guess. According to the findings of the research, the authors believe that future development will improve and accelerate a wider use of digital libraries, in Slovenia as well.

  13. Comparing Analog and Digital Hearing Aids in Reducing Hearing Disability

    Directory of Open Access Journals (Sweden)

    Ghassem Mohammad Khani

    2004-06-01

    Full Text Available Objective: Comparing analog and digital hearing aids reducing disability caused by hearing deficiency among moderate to severe sensorineural hearing-impaired persons. Method and Material: This descriptive-analytic study was carried out on two groups of subjects participated in this study in some audiology clinics of hearing aid since May 2002 to October 2003. Twenty subjects wore analog hearing aids and twenty one subjects wore digital hearing aids. In this study , no subject had previous middle ear or psychological problems. APHAB questionnaire was completed before using hearing aid and 2 months after to determine benefit of hearing aid use. Results: Total score mean of APHAB inventory before and after use of analoge hearing aids were 52.215+6.420 and 32.300+3.443 respectively. Also total score mean of APHAB inventory before and after use of digital hearing aids were 54.9252+9.028 and 26.321+10.916 respectively. There was no significant difference between total mean score of APHAB inventory before and after using analog and digital hearing aids (P=0.058.While there was significant difference between total mean score of APHAB questionnaire before and after use of analog hearing aids (P<0.001 and also before and after use of digital hearing aids (P<0.001. Moreover age, gender , litracy level , occupation , degree of hearing loss and manner of hearing aid usage did not have significant effect on APHAB results. Configuration of loss had siginficant effect on aversiveness subscale before and after use of analog hearing aids (P=0.008. Previous experience and duration of hearing aid usage had significant effect on aversiveness subscale before and after use of digital hearing aids (P=0.043 and (P=0.024, respectively , while all of these three items did not have significant effect on total mean score of APHAB inventory and also total mean scores of three subscales of ease of communication , reverberation and background noise. Conclusion: Comparing to

  14. enhanced digital library system that supports sustainable knowledge

    African Journals Online (AJOL)

    Digital libraries are well known for sharing resources all over the world. Several ... The person with more information will guide a group or society and he ..... librarians should work out among themselves a co-operative means of tracking the.

  15. What a Difference a Year Makes.

    Science.gov (United States)

    Birt, Carina

    1998-01-01

    Addresses the growth of signatures in document management. Describes the three basic types of electronic signature technology: image signatures, digital signatures, and digitized biometric signatures. Discusses legal and regulatory acceptability and bringing signatures into document management. (AEF)

  16. Digital Labour in the Platform Economy: The Case of Facebook

    Directory of Open Access Journals (Sweden)

    Andrea Fumagalli

    2018-05-01

    Full Text Available The aim of the paper is to analyse the features of the digital labour connected with the so-called platform economy. Many platform-based business models rely on a new composition of capital capable of capturing personal information and transforming it into big data. Starting with the example of the Facebook business model, we explain the valorisation process at the core of platform capitalism, stressing the relevance of digital labour, to clarify the crucial distinction between labour and work. Our analysis differs from Fuchs and Sevignani’s thesis about digital work and digital labour and seems consistent with the idea that Facebook extracts a rent from the information produced by the free labour of its users.

  17. Concepts of Digital Labour: Schelling's Naturphilosophie

    Directory of Open Access Journals (Sweden)

    Kevin Michael Mitchell

    2014-09-01

    Full Text Available This paper uses F.W.J. Schelling’s Naturphilsophie as a point of departure to theorize the concept of digital labour. Beginning with Marx’s distinction between fulfilling and unfulfilling labour, it is argued that the former is labour that is immanent to, and in line with, the Schellingian notion of Nature as process and ungrounded ground, while the unfulfilling variant externalizes Nature and attempts to use it against itself in the service of capital, and the establishment of what I call a state-of-power. Schelling’s The Ages of the World is re-interpreted by exchanging his version of immaterial spirituality for digital virtuality, and as a result, digital labour is viewed as a consequence of previous forms of world historical developments. While digital virtuality is in fact materialist in terms of both the labour that activates it, and the substrate that sustains it, the materiality of the digital is often overlooked in favour of an anti-materialist stance that works to disconnect the digital labourer from their online activity, and preclude the critical self-awareness necessary for the acknowledgement of their online “playful” activity as work. It ends with an analysis of Mark Zuckerberg’s ideational attempt to “re-wire” the world via Facebook’s digital infrastructure, which begins to set the conditions of possibility for inter-personal interaction, and explores the possibilities for resistance available in Foucault’s notion of the care of the self.

  18. Adaptive digital beamforming for a CDMA mobile communications payload

    Science.gov (United States)

    Munoz-Garcia, Samuel G.; Ruiz, Javier Benedicto

    1993-01-01

    In recent years, Spread-Spectrum Code Division Multiple Access (CDMA) has become a very popular access scheme for mobile communications due to a variety of reasons: excellent performance in multipath environments, high scope for frequency reuse, graceful degradation near saturation, etc. In this way, a CDMA system can support simultaneous digital communication among a large community of relatively uncoordinated users sharing a given frequency band. Nevertheless, there are also important problems associated with the use of CDMA. First, in a conventional CDMA scheme, the signature sequences of asynchronous users are not orthogonal and, as the number of active users increases, the self-noise generated by the mutual interference between users considerably degrades the performance, particularly in the return link. Furthermore, when there is a large disparity in received powers - due to differences in slant range or atmospheric attenuation - the non-zero cross-correlation between the signals gives rise to the so-called near-far problem. This leads to an inefficient utilization of the satellite resources and, consequently, to a drastic reduction in capacity. Several techniques were proposed to overcome this problem, such as Synchronized CDMA - in which the signature sequences of the different users are quasi-orthogonal - and power control. At the expense of increased network complexity and user coordination, these techniques enable the system capacity to be restored by equitably sharing the satellite resources among the users. An alternative solution is presented based upon the use of time-reference adaptive digital beamforming on board the satellite. This technique enables a high number of independently steered beams to be generated from a single phased array antenna, which automatically track the desired user signal and null the unwanted interference source. In order to use a time-reference adaptive antenna in a communications system, the main challenge is to obtain a

  19. 48 CFR 4.102 - Contractor's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Contractor's signature. 4.102 Section 4.102 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Contract Execution 4.102 Contractor's signature. (a) Individuals. A contract with an...

  20. Bridging storytelling traditions with digital technology.

    Science.gov (United States)

    Cueva, Melany; Kuhnley, Regina; Revels, Laura J; Cueva, Katie; Dignan, Mark; Lanier, Anne P

    2013-01-01

    The purpose of this project was to learn how Community Health Workers (CHWs) in Alaska perceived digital storytelling as a component of the "Path to Understanding Cancer" curriculum and as a culturally respectful tool for sharing cancer-related health messages. A pre-course written application, end-of-course written evaluation, and internet survey informed this project. Digital storytelling was included in seven 5-day cancer education courses (May 2009-2012) in which 67 CHWs each created a personal 2-3 minute cancer-related digital story. Participant-chosen digital story topics included tobacco cessation, the importance of recommended cancer screening exams, cancer survivorship, loss, grief and end-of-life comfort care, and self-care as patient care providers. All participants completed an end-of-course written evaluation. In July 2012, contact information was available for 48 participants, of whom 24 completed an internet survey. All 67 participants successfully completed a digital story which they shared and discussed with course members. On the written post-course evaluation, all participants reported that combining digital storytelling with cancer education supported their learning and was a culturally respectful way to provide health messages. Additionally, 62 of 67 CHWs reported that the course increased their confidence to share cancer information with their communities. Up to 3 years post-course, all 24 CHW survey respondents reported they had shown their digital story. Of note, 23 of 24 CHWs also reported change in their own behavior as a result of the experience. All CHWs, regardless of computer skills, successfully created a digital story as part of the cancer education course. CHWs reported that digital stories enhanced their learning and were a culturally respectful way to share cancer-related information. Digital storytelling gave the power of the media into the hands of CHWs to increase their cancer knowledge, facilitate patient and community cancer

  1. Lessons from Personal Photography: The Digital Disruption of Selectivity and Reflection

    Science.gov (United States)

    Fawns, Tim

    2015-01-01

    Recent technological, cultural and economic factors have shifted the balance between recalling and reconstructing internalised information and accessing externalised information. While digital artefacts constitute an enormous and valuable set of resources, human engagement and reflection are important to the meaningful synthesis and application of…

  2. Signature change events: a challenge for quantum gravity?

    International Nuclear Information System (INIS)

    White, Angela; Weinfurtner, Silke; Visser, Matt

    2010-01-01

    Within the framework of either Euclidean (functional integral) quantum gravity or canonical general relativity the signature of the manifold is a priori unconstrained. Furthermore, recent developments in the emergent spacetime programme have led to a physically feasible implementation of (analogue) signature change events. This suggests that it is time to revisit the sometimes controversial topic of signature change in general relativity. Specifically, we shall focus on the behaviour of a quantum field defined on a manifold containing regions of different signature. We emphasize that regardless of the underlying classical theory, there are severe problems associated with any quantum field theory residing on a signature-changing background. (Such as the production of what is naively an infinite number of particles, with an infinite energy density.) We show how the problem of quantum fields exposed to finite regions of Euclidean-signature (Riemannian) geometry has similarities with the quantum barrier penetration problem. Finally we raise the question as to whether signature change transitions could be fully understood and dynamically generated within (modified) classical general relativity, or whether they require the knowledge of a theory of quantum gravity.

  3. Starry messages: Searching for signatures of interstellar archaeology

    Energy Technology Data Exchange (ETDEWEB)

    Carrigan, Richard A., Jr.; /Fermilab

    2009-12-01

    Searching for signatures of cosmic-scale archaeological artifacts such as Dyson spheres or Kardashev civilizations is an interesting alternative to conventional SETI. Uncovering such an artifact does not require the intentional transmission of a signal on the part of the original civilization. This type of search is called interstellar archaeology or sometimes cosmic archaeology. The detection of intelligence elsewhere in the Universe with interstellar archaeology or SETI would have broad implications for science. For example, the constraints of the anthropic principle would have to be loosened if a different type of intelligence was discovered elsewhere. A variety of interstellar archaeology signatures are discussed including non-natural planetary atmospheric constituents, stellar doping with isotopes of nuclear wastes, Dyson spheres, as well as signatures of stellar and galactic-scale engineering. The concept of a Fermi bubble due to interstellar migration is introduced in the discussion of galactic signatures. These potential interstellar archaeological signatures are classified using the Kardashev scale. A modified Drake equation is used to evaluate the relative challenges of finding various sources. With few exceptions interstellar archaeological signatures are clouded and beyond current technological capabilities. However SETI for so-called cultural transmissions and planetary atmosphere signatures are within reach.

  4. Signature Pedagogies in Support of Teachers' Professional Learning

    Science.gov (United States)

    Parker, Melissa; Patton, Kevin; O'Sullivan, Mary

    2016-01-01

    Signature pedagogies [Shulman, L. 2005. "Signature pedagogies in the professions." "Daedalus" 134 (3): 52--59.] are a focus of teacher educators seeking to improve teaching and teacher education. The purpose of this paper is to present a preliminary common language of signature pedagogies for teacher professional development…

  5. Characteristics and Validation Techniques for PCA-Based Gene-Expression Signatures

    Directory of Open Access Journals (Sweden)

    Anders E. Berglund

    2017-01-01

    Full Text Available Background. Many gene-expression signatures exist for describing the biological state of profiled tumors. Principal Component Analysis (PCA can be used to summarize a gene signature into a single score. Our hypothesis is that gene signatures can be validated when applied to new datasets, using inherent properties of PCA. Results. This validation is based on four key concepts. Coherence: elements of a gene signature should be correlated beyond chance. Uniqueness: the general direction of the data being examined can drive most of the observed signal. Robustness: if a gene signature is designed to measure a single biological effect, then this signal should be sufficiently strong and distinct compared to other signals within the signature. Transferability: the derived PCA gene signature score should describe the same biology in the target dataset as it does in the training dataset. Conclusions. The proposed validation procedure ensures that PCA-based gene signatures perform as expected when applied to datasets other than those that the signatures were trained upon. Complex signatures, describing multiple independent biological components, are also easily identified.

  6. Quantum blind dual-signature scheme without arbitrator

    International Nuclear Information System (INIS)

    Li, Wei; Shi, Ronghua; Huang, Dazu; Shi, Jinjing; Guo, Ying

    2016-01-01

    Motivated by the elegant features of a bind signature, we suggest the design of a quantum blind dual-signature scheme with three phases, i.e., initial phase, signing phase and verification phase. Different from conventional schemes, legal messages are signed not only by the blind signatory but also by the sender in the signing phase. It does not rely much on an arbitrator in the verification phase as the previous quantum signature schemes usually do. The security is guaranteed by entanglement in quantum information processing. Security analysis demonstrates that the signature can be neither forged nor disavowed by illegal participants or attacker. It provides a potential application for e-commerce or e-payment systems with the current technology. (paper)

  7. Quantum blind dual-signature scheme without arbitrator

    Science.gov (United States)

    Li, Wei; Shi, Ronghua; Huang, Dazu; Shi, Jinjing; Guo, Ying

    2016-03-01

    Motivated by the elegant features of a bind signature, we suggest the design of a quantum blind dual-signature scheme with three phases, i.e., initial phase, signing phase and verification phase. Different from conventional schemes, legal messages are signed not only by the blind signatory but also by the sender in the signing phase. It does not rely much on an arbitrator in the verification phase as the previous quantum signature schemes usually do. The security is guaranteed by entanglement in quantum information processing. Security analysis demonstrates that the signature can be neither forged nor disavowed by illegal participants or attacker. It provides a potential application for e-commerce or e-payment systems with the current technology.

  8. Unobtrusive Observation of Team Learning Attributes in Digital Learning

    Directory of Open Access Journals (Sweden)

    David C. Gibson

    2018-05-01

    Full Text Available This article presents a new framework for unobtrusive observation analytics of knowledge and skills-in-action through continuous collection of data from individuals while they interact with digital assets either as individuals or on problem-solving teams. The framework includes measures of the skill and knowledge areas of collaboration, creativity, personal learning, problem solving, and global sustainability, which are observed during natural production and use of communications, intentional artifacts, and resources in a digital learning space designed for self-directed and team-based learning challenges. The article describes the digital context for data collection and shows some example data and analyses.

  9. Digital pathology for the primary diagnosis of breast histopathological specimens: an innovative validation and concordance study on digital pathology validation and training.

    Science.gov (United States)

    Williams, Bethany Jill; Hanby, Andrew; Millican-Slater, Rebecca; Nijhawan, Anju; Verghese, Eldo; Treanor, Darren

    2018-03-01

    To train and individually validate a group of breast pathologists in specialty-specific digital primary diagnosis by using a novel protocol endorsed by the Royal College of Pathologists' new guideline for digital pathology. The protocol allows early exposure to live digital reporting, in a risk-mitigated environment, and focuses on patient safety and professional development. Three specialty breast pathologists completed training in the use of a digital microscopy system, and were exposed to a training set of 20 challenging cases, designed to help them identify personal digital diagnostic pitfalls. Following this, the three pathologists viewed a total of 694 live, entire breast cases. All primary diagnoses were made on digital slides, with immediate glass slide review and reconciliation before final case sign-out. There was complete clinical concordance between the glass and digital impression of the case in 98.8% of cases. Only 1.2% of cases had a clinically significant difference in diagnosis/prognosis on glass and digital slide reads. All pathologists elected to continue using the digital microscope as the standard for breast histopathology specimens, with deferral to glass for a limited number of clinical/histological scenarios as a safety net. Individual training and validation for digital primary diagnosis allows pathologists to develop competence and confidence in their digital diagnostic skills, and aids safe and responsible transition from the light microscope to the digital microscope. © 2017 John Wiley & Sons Ltd.

  10. Infrared ship signature analysis and optimisation

    NARCIS (Netherlands)

    Neele, F.P.

    2005-01-01

    The last decade has seen an increase in the awareness of the infrared signature of naval ships. New ship designs show that infrared signature reduction measures are being incorporated, such as exhaust gas cooling systems, relocation of the exhausts and surface cooling systems. Hull and

  11. SocioPath: Bridging the Gap between Digital and Social Worlds

    OpenAIRE

    Alhadad , Nagham; Lamarre , Philippe; Busnel , Yann; Serrano-Alvarado , Patricia; Biazzini , Marco; Sibertin-Blanc , Christophe

    2012-01-01

    International audience; In everyday life, people use more and more digital resources (data, application systems, Internet, etc.) for all aspects of their life like administrative procedures, financial management, private exchanges, collaborative work, etc. This leads to non-negligible dependences on the digital distributed resources that reveal strong reliance at the social level, for instance on providers, physical or moral persons, of these resources. Users are often not aware of their real...

  12. Fine-Grained Forward-Secure Signature Schemes without Random Oracles

    DEFF Research Database (Denmark)

    Camenisch, Jan; Koprowski, Maciej

    2006-01-01

    We propose the concept of fine-grained forward-secure signature schemes. Such signature schemes not only provide nonrepudiation w.r.t. past time periods the way ordinary forward-secure signature schemes do but, in addition, allow the signer to specify which signatures of the current time period...... remain valid when revoking the public key. This is an important advantage if the signer produces many signatures per time period as otherwise the signer would have to re-issue those signatures (and possibly re-negotiate the respective messages) with a new key.Apart from a formal model for fine......-grained forward-secure signature schemes, we present practical schemes and prove them secure under the strong RSA assumption only, i.e., we do not resort to the random oracle model to prove security. As a side-result, we provide an ordinary forward-secure scheme whose key-update time is significantly smaller than...

  13. 38 CFR 18b.21 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Signature of documents. 18b.21 Section 18b.21 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS... Documents § 18b.21 Signature of documents. The signature of a party, authorized officer, employee, or...

  14. Detection of chemical explosives using multiple photon signatures

    International Nuclear Information System (INIS)

    Loschke, K.W.; Dunn, W.L.

    2008-01-01

    Full text: A template-matching procedure to aid in rapid detection of improvised explosive devices (IEDs) is being investigated. Multiple photon-scattered and photon-induced positron annihilation radiation responses are being used as part of a photon-neutron signature-based radiation scanning (SBRS) approach (see companion reference for description of the neutron component), in an attempt to detect chemical explosives at safe standoff distances. Many past and present photon interrogation methods are based on imaging. Imaging techniques seek to determine at high special resolution the internal structure of a target of interest. Our technique simply seeks to determine if an unknown target contains a detectable amount of chemical explosives by comparing multiple responses (signatures) that depend on both density and composition of portions of a target. In the photon component, beams of photons are used to create back-streaming signatures, which are dependent on the density and composition of part of the target being interrogated. These signatures are compared to templates, which are collections of the same signatures if the interrogated volume contained a significant amount of explosives. The signature analysis produces a figure-of-merit and a standard deviation of the figure-of-merit. These two metrics are used to filter safe from dangerous targets. Experiments have been conducted that show that explosive surrogates (fertilizers) can be distinguished from several inert materials using these photon signatures, demonstrating that these signatures can be used effectively to help IEDs

  15. A Security Architecture for Personal Networks

    NARCIS (Netherlands)

    Jehangir, A.

    2009-01-01

    The proliferation of personal mobile computing devices such as laptops and mo- bile phones, as well as wearable computing devices such as belt computers, digital bracelets and bio-medical sensors has created an opportunity to create a wireless network to share information and resources amongst

  16. Improvement of personal dosimetry - Digital pocket dosemeter

    International Nuclear Information System (INIS)

    Radalj, Z.; Cerovac, Z.; Cerovac, H.; Brumen, V.; Prlic, I.

    1996-01-01

    Physical dosimetric surveillance of professional groups working with various radiation sources is a regular procedure in Croatia, established almost 40 years ago. Data available point out that the majority of professionals under surveillance are those employed in medical facilities, most of them working with X-ray sources. Depending on the nature of professional activities, personnel occupationally exposed to radiation sources are obliged to wear either film badge, TLD or film+TLD badge. Unfortunately, due to the line of data processing, all standard dosemeters have the same disadvantage i.e. up to 40 days delay in dose reporting, regarding the time of actual exposure. The significance of such a delay raises in cases when radiation dose was received within the short time or when technical failure on the operating unit(s) is suspected. Bearing this in mind, the additional dosimetric monitoring becomes an imperative. Therefore, we decided to introduce a palette of digital pocket dosemeters, meant to be used in different workplaces in the radiation zone, each of them being adjusted to the specificities of a particular workplace

  17. Digital image display system for emergency room

    International Nuclear Information System (INIS)

    Murry, R.C.; Lane, T.J.; Miax, L.S.

    1989-01-01

    This paper reports on a digital image display system for the emergency room (ER) in a major trauma hospital. Its objective is to reduce radiographic image delivery time to a busy ER while simultaneously providing a multimodality capability. Image storage, retrieval, and display will also be facilitated with this system. The system's backbone is a token-ring network of RISC and personal computers. The display terminals are higher- function RISC computers with 1,024 2 color or gray-scale monitors. The PCs serve as administrative terminals. Nuclear medicine, CT, MR, and digitized film images are transferred to the image display system

  18. Tangible Cooperative Gestures: Improving Control and Initiative in Digital Photo Sharing

    Directory of Open Access Journals (Sweden)

    Elise van den Hoven

    2015-09-01

    Full Text Available This paper focuses on co-present digital photo sharing on a notebook and investigates how this could be supported. While analyzing the current digital photo sharing situation we noticed that there was a high threshold for visitors to take control of the personal computer of the photo owner, resulting in inequity of participation. It was assumed that visitors would have the opportunity to interact with the notebook more freely if this threshold was lowered by distributing the user interface and creating a more public, instead of personal, interaction space. This, in turn, could make them feel more involved and in control during a session, creating a more enjoyable experience. To test these assumptions a design prototype was created that stimulates participants to use tangible artifacts for cooperative gestures, a promising direction for the future of HCI. The situation with the cooperative gestures was compared with the regular digital photo sharing situation, which makes use of a keyboard. In dyads, visitors felt more involved and in control in the design prototype cooperative gestures condition (especially during storytelling, resulting in a more enjoyable digital photo sharing experience.

  19. Imagining the Digital Library in a Commercialized Internet.

    Science.gov (United States)

    Heckart, Ronald J.

    1999-01-01

    Discusses digital library planning in light of Internet commerce and technological innovation in marketing and customer relations that are transforming user expectations about Web sites that offer products and services. Topics include user self-sufficiency; personalized service; artificial intelligence; collaborative filtering; and electronic…

  20. Enhanced arbitrated quantum signature scheme using Bell states

    International Nuclear Information System (INIS)

    Wang Chao; Liu Jian-Wei; Shang Tao

    2014-01-01

    We investigate the existing arbitrated quantum signature schemes as well as their cryptanalysis, including intercept-resend attack and denial-of-service attack. By exploring the loopholes of these schemes, a malicious signatory may successfully disavow signed messages, or the receiver may actively negate the signature from the signatory without being detected. By modifying the existing schemes, we develop counter-measures to these attacks using Bell states. The newly proposed scheme puts forward the security of arbitrated quantum signature. Furthermore, several valuable topics are also presented for further research of the quantum signature scheme

  1. How to optimize radiological images captured from digital cameras, using the Adobe Photoshop 6.0 program.

    Science.gov (United States)

    Chalazonitis, A N; Koumarianos, D; Tzovara, J; Chronopoulos, P

    2003-06-01

    Over the past decade, the technology that permits images to be digitized and the reduction in the cost of digital equipment allows quick digital transfer of any conventional radiological film. Images then can be transferred to a personal computer, and several software programs are available that can manipulate their digital appearance. In this article, the fundamentals of digital imaging are discussed, as well as the wide variety of optional adjustments that the Adobe Photoshop 6.0 (Adobe Systems, San Jose, CA) program can offer to present radiological images with satisfactory digital imaging quality.

  2. Main Features in the Concept of Digital Bildung

    DEFF Research Database (Denmark)

    Tække, Jesper; Paulsen, Michael

    The question of this paper is how we can understand the concept of Bildung in the time of digital media seen from a Klafkian perspective. It draws on Klafki (2014) by extrapolating what he suggest is the main features of Bildung, answering six questions: how can education 1. Foster persons who can......, bringing about different levels of what we from a Klafkian perspective call Digital Bildung. (2) We relate the Klafkian concept of Bildung to an action research experiment called Socio Media Education (SME). In this research project we have worked together with teachers in an upper secondary school...... features of Bildung are then discussed in regard to digital media. We do this by relating the Klafkian concept of Bildung to (1) a general theory about how schools seem to respond to the new digital challenges and possibilities. Our main point is that these responses can be divided into three waves...

  3. Quantification of 235U and 238U activity concentrations for undeclared nuclear materials by a digital gamma-gamma coincidence spectroscopy.

    Science.gov (United States)

    Zhang, Weihua; Yi, Jing; Mekarski, Pawel; Ungar, Kurt; Hauck, Barry; Kramer, Gary H

    2011-06-01

    The purpose of this study is to investigate the possibility of verifying depleted uranium (DU), natural uranium (NU), low enriched uranium (LEU) and high enriched uranium (HEU) by a developed digital gamma-gamma coincidence spectroscopy. The spectroscopy consists of two NaI(Tl) scintillators and XIA LLC Digital Gamma Finder (DGF)/Pixie-4 software and card package. The results demonstrate that the spectroscopy provides an effective method of (235)U and (238)U quantification based on the count rate of their gamma-gamma coincidence counting signatures. The main advantages of this approach over the conventional gamma spectrometry include the facts of low background continuum near coincident signatures of (235)U and (238)U, less interference from other radionuclides by the gamma-gamma coincidence counting, and region-of-interest (ROI) imagine analysis for uranium enrichment determination. Compared to conventional gamma spectrometry, the method offers additional advantage of requiring minimal calibrations for (235)U and (238)U quantification at different sample geometries. Crown Copyright © 2011. Published by Elsevier Ltd. All rights reserved.

  4. Personal branding: building your pathway to professional success.

    Science.gov (United States)

    Philbrick, Jodi L; Cleveland, Ana D

    2015-01-01

    Personal branding is an introspective process by which you define yourself professionally, and it can serve as your pathway to professional success. There are six steps to building your personal brand: (1) taking an introspective look, (2) understanding the brand that may already exist, (3) developing your personal brand mantra, (4) crafting your physical footprint, (5) creating your digital footprint, and (6) communicating your message. Your personal brand is a promise of value and performance, and it is necessary to meet the expectations of your audience. Effective brand management is a key component to maintaining a positive brand reputation.

  5. FIR signature verification system characterizing dynamics of handwriting features

    Science.gov (United States)

    Thumwarin, Pitak; Pernwong, Jitawat; Matsuura, Takenobu

    2013-12-01

    This paper proposes an online signature verification method based on the finite impulse response (FIR) system characterizing time-frequency characteristics of dynamic handwriting features. First, the barycenter determined from both the center point of signature and two adjacent pen-point positions in the signing process, instead of one pen-point position, is used to reduce the fluctuation of handwriting motion. In this paper, among the available dynamic handwriting features, motion pressure and area pressure are employed to investigate handwriting behavior. Thus, the stable dynamic handwriting features can be described by the relation of the time-frequency characteristics of the dynamic handwriting features. In this study, the aforesaid relation can be represented by the FIR system with the wavelet coefficients of the dynamic handwriting features as both input and output of the system. The impulse response of the FIR system is used as the individual feature for a particular signature. In short, the signature can be verified by evaluating the difference between the impulse responses of the FIR systems for a reference signature and the signature to be verified. The signature verification experiments in this paper were conducted using the SUBCORPUS MCYT-100 signature database consisting of 5,000 signatures from 100 signers. The proposed method yielded equal error rate (EER) of 3.21% on skilled forgeries.

  6. Research and implementation of geographic information service mode in digital home

    Science.gov (United States)

    Lei, B.; Liu, K.; Gan, Y.; Zhong, M.

    2014-04-01

    Accompanying infrastructure improvements and networking technology innovation, the development of digital home service industry has gotten more and more attention. However, the digital home service levels have not sufficiently met rising demand from users. Therefore, it is urgent to propose and develop new service modes for the digital home. Geographic information services can provide various spatial information services such as map search, spatial information query. It has become an inevitable trend to implement geographic information services in the digital home. This paper proposes three new geographic information services modes for the digital home after sufficient requirement analysis: pushed information service mode, interactive information service mode, personalized information service mode. The key technologies to implement geographic information services on digital televisions are studied, involving digital television middleware technology, network transmission technology and visualization technology. According to the service modes' characteristics mentioned above, a service system in the digital home is established to implement geographic information services on the basis of digital television. The implementation of geographic information services in the digital home not only enriches the digital home services content, but also promotes geographic information from specialization to public popularity.

  7. Digital Culture and Digital Library

    Directory of Open Access Journals (Sweden)

    Yalçın Yalçınkaya

    2016-12-01

    Full Text Available In this study; digital culture and digital library which have a vital connection with each other are examined together. The content of the research consists of the interaction of culture, information, digital culture, intellectual technologies, and digital library concepts. The study is an entry work to integrity of digital culture and digital library theories and aims to expand the symmetry. The purpose of the study is to emphasize the relation between the digital culture and digital library theories acting intersection of the subjects that are examined. Also the perspective of the study is based on examining the literature and analytical evaluation in both studies (digital culture and digital library. Within this context, the methodology of the study is essentially descriptive and has an attribute for the transmission and synthesis of distributed findings produced in the field of the research. According to the findings of the study results, digital culture is an inclusive term that describes the effects of intellectual technologies in the field of information and communication. Information becomes energy and the spectrum of the information is expanding in the vertical rise through the digital culture. In this context, the digital library appears as a new living space of a new environment. In essence, the digital library is information-oriented; has intellectual technology support and digital platform; is in a digital format; combines information resources and tools in relationship/communication/cooperation by connectedness, and also it is the dynamic face of the digital culture in time and space independence. Resolved with the study is that the digital libraries are active and effective in the formation of global knowing and/or mass wisdom in the process of digital culture.

  8. Quantum signature scheme based on a quantum search algorithm

    International Nuclear Information System (INIS)

    Yoon, Chun Seok; Kang, Min Sung; Lim, Jong In; Yang, Hyung Jin

    2015-01-01

    We present a quantum signature scheme based on a two-qubit quantum search algorithm. For secure transmission of signatures, we use a quantum search algorithm that has not been used in previous quantum signature schemes. A two-step protocol secures the quantum channel, and a trusted center guarantees non-repudiation that is similar to other quantum signature schemes. We discuss the security of our protocol. (paper)

  9. Digital Mental Health - Innovations in Consumer Driven Care.

    Science.gov (United States)

    Ackerman, Mary Lou; Virani, Tazim; Billings, Barry

    2017-01-01

    Barriers such as stigma and access issues prevent 60% of Canadians with mental health issues from seeking help. Saint Elizabeth Health Care's IntelligentCare™ Platform supports a range of digital health solutions for holistic health including three specific innovations: a secure social networking tool, an artificial intelligence-driven assistant that uses conversational cognitive behaviour therapy techniques, and a mobile mindfulness meditation application that generates personalized meditation suggestions. People use these self-help tools to cope with their mental health challenges. Healthcare providers are encouraged to explore the benefits and drawbacks of digital solutions for mental health, and consider the new skills, ethical implications and research opportunities that are needed when supporting patients who use these digital tools. © 2017 Longwoods Publishing.

  10. Things to do in the digital afterlife when you're dead

    OpenAIRE

    Buzzo, D.

    2011-01-01

    There are currently few procedures or public awareness about what happens to online digital identities after death. This paper discusses what happens with personal electronic information after death and looks to what is argued to be the rapidly approaching digital Afterlife. This afterlife of new emergent behaviour offers a challenge of almost unimaginable scope to the creative vision of Artists, Philosophers, Technologists and Cultural thinkers.

  11. A secure and lightweight ad-hoc routing algorithm for personal networks

    NARCIS (Netherlands)

    Jehangir, A.; Heemstra de Groot, S.M.

    2005-01-01

    Over the past few years, there has been increasing interest in utilizing Personal Area Networks (PANs) to offer users innovative and personalized services. This interest is a consequence of the widespread use of mobile devices such as laptops, mobile phones, PDAs, digital cameras, wireless headsets,

  12. Molecular signatures of thyroid follicular neoplasia

    DEFF Research Database (Denmark)

    Borup, R.; Rossing, M.; Henao, Ricardo

    2010-01-01

    The molecular pathways leading to thyroid follicular neoplasia are incompletely understood, and the diagnosis of follicular tumors is a clinical challenge. To provide leads to the pathogenesis and diagnosis of the tumors, we examined the global transcriptome signatures of follicular thyroid...... a mechanism for cancer progression, which is why we exploited the results in order to generate a molecular classifier that could identify 95% of all carcinomas. Validation employing public domain and cross-platform data demonstrated that the signature was robust and could diagnose follicular nodules...... and robust genetic signature for the diagnosis of FA and FC. Endocrine-Related Cancer (2010) 17 691-708...

  13. Motif signatures of transcribed enhancers

    KAUST Repository

    Kleftogiannis, Dimitrios

    2017-09-14

    In mammalian cells, transcribed enhancers (TrEn) play important roles in the initiation of gene expression and maintenance of gene expression levels in spatiotemporal manner. One of the most challenging questions in biology today is how the genomic characteristics of enhancers relate to enhancer activities. This is particularly critical, as several recent studies have linked enhancer sequence motifs to specific functional roles. To date, only a limited number of enhancer sequence characteristics have been investigated, leaving space for exploring the enhancers genomic code in a more systematic way. To address this problem, we developed a novel computational method, TELS, aimed at identifying predictive cell type/tissue specific motif signatures. We used TELS to compile a comprehensive catalog of motif signatures for all known TrEn identified by the FANTOM5 consortium across 112 human primary cells and tissues. Our results confirm that distinct cell type/tissue specific motif signatures characterize TrEn. These signatures allow discriminating successfully a) TrEn from random controls, proxy of non-enhancer activity, and b) cell type/tissue specific TrEn from enhancers expressed and transcribed in different cell types/tissues. TELS codes and datasets are publicly available at http://www.cbrc.kaust.edu.sa/TELS.

  14. Rationalizing a Personalized Conceptualization for the Digital Transition and Sustainability of Knowledge Management Using the SVIDT Method

    Directory of Open Access Journals (Sweden)

    Ulrich Schmitt

    2018-03-01

    Full Text Available The objective of a current design science research (DSR undertaking is responding to the call for a decentralizing Knowledge Management (KM revolution by conceptualizing a Personal Knowledge Management (PKM system. The rationale is rooted in today’s accelerating information abundance and lack of adequate tools which signify—in the author’s view—the presently emerging and most crucial barriers to individual and collective development. For validation, it employs prototyping and verifies its design decisions against DSR guidelines and KM-related methodologies and practices. For the latter purpose, this article employs the SVIDT methodology (Strengths, Vulnerability, and Intervention Assessment related to Digital Threats by adopting a hindsight reverse-engineered logical perspective in order to present the line of reasoning from the proposed technologies back to the underlying motivations. Its focus is the sustainability of PKM systems, processes, and outcomes combined with SVIDT’s concerns with goals and environments, actors and affiliations, strengths and weaknesses, threat and intervention scenarios, and synergies and strategies. In following the SVIDT’s nine steps, the broad span of the Personal Knowledge Management (PKM concept’s “wicked” problem space is presented. The results reaffirm the DSR concept of theory effectiveness in terms of the system’s utility and communication, and present the PKM concept and system as sustainable interventions to confront opportunity divides independent of space (e.g., developed/developing countries, time (e.g., study or career phase, discipline (e.g., natural or social science, or role (e.g., student, professional, or leader.

  15. Smile attractiveness. Self-perception and influence on personality.

    OpenAIRE

    Geld, P.A.A.M. van der; Oosterveld, P.; Heck, G.L. van; Kuijpers-Jagtman, A.M.

    2007-01-01

    OBJECTIVES: To investigate self-perception of smile attractiveness and to determine the role of smile line and other aspects correlated with smile attractiveness and their influence on personality traits. SUBJECTS AND METHODS: Participants judged their smile attractiveness with a patient-specific questionnaire. The questionnaire contained a spontaneous smiling photograph of the participant. Objective smile-line height was measured using a digital videographic method for smile analysis. Person...

  16. Blending technology in teaching advanced health assessment in a family nurse practitioner program: using personal digital assistants in a simulation laboratory.

    Science.gov (United States)

    Elliott, Lydia; DeCristofaro, Claire; Carpenter, Alesia

    2012-09-01

    This article describes the development and implementation of integrated use of personal handheld devices (personal digital assistants, PDAs) and high-fidelity simulation in an advanced health assessment course in a graduate family nurse practitioner (NP) program. A teaching tool was developed that can be utilized as a template for clinical case scenarios blending these separate technologies. Review of the evidence-based literature, including peer-reviewed articles and reviews. Blending the technologies of high-fidelity simulation and handheld devices (PDAs) provided a positive learning experience for graduate NP students in a teaching laboratory setting. Combining both technologies in clinical case scenarios offered a more real-world learning experience, with a focus on point-of-care service and integration of interview and physical assessment skills with existing standards of care and external clinical resources. Faculty modeling and advance training with PDA technology was crucial to success. Faculty developed a general template tool and systems-based clinical scenarios integrating PDA and high-fidelity simulation. Faculty observations, the general template tool, and one scenario example are included in this article. ©2012 The Author(s) Journal compilation ©2012 American Academy of Nurse Practitioners.

  17. Feasibility of digital footprint data for health analytics and services: an explorative pilot study.

    Science.gov (United States)

    Harjumaa, Marja; Saraniemi, Saila; Pekkarinen, Saara; Lappi, Minna; Similä, Heidi; Isomursu, Minna

    2016-11-09

    As a result of digitalization, data is available about almost every aspect of our lives. Personal data collected by individuals themselves or stored by organizations interacting with people is known as a digital footprint. The purpose of this study was to identify prerequisites for collecting and using digital data that could be valuable for health data analytics and new health services. Researchers and their contacts involved in a nationwide research project focusing on digital health in Finland were asked to participate in a pilot study on collecting their own personal data from various organizations of their own choice, such as retail chains, banks, insurance companies, and healthcare providers. After the pilot, a qualitative inquiry was adopted to collect semi-structured interview data from twelve active participants in the pilot. Interviews comprised themes such as the experiences of collecting personal data, as well as the usefulness of the data in general and for the participants themselves. Interview data was then analyzed thematically. Even if the participants had an academic background and were highly motivated to collect and use their data, they faced many challenges, such as quite long delays in the provision of the data, and the unresponsiveness of some organizations. Regarding the usefulness of the acquired personal data, our results show that participants had high expectations, but they were disappointed with the small amount of data and its irrelevant content. For the most part, the data was not in a format that would be useful for health data analytics and new health services. Participants also found that there were actual mistakes in their health data reports. The study revealed that collecting and using digital footprint data, even by knowledgeable individuals, is not an easy task. As the usefulness of the acquired personal health data mainly depended on its form and usability for services or solutions relevant to an individual, rather than on

  18. Análisis de la eficacia de las campañas de marketing digital en el sector de cuidado personal. Empresas de venta de cosméticos durante los años 2013 – 2014. Caso de estudio

    OpenAIRE

    Vallejo Herrera, Oscar Gabriel

    2016-01-01

    Esta tesis de Maestría analiza la eficacia de las campañas de marketing digital en el sector de cuidado personal en el periodo 2013 – 2014. El resultado de este trabajo es un análisis entre el marketing digital versus el tradicional, una revisión de la evolución del marketing, un manual de medios en el cuál se recopilan las características más importantes de las ocho redes sociales más utilizadas en el país y el mundo, una metodología que permite evaluar campañas de marketing digital para que...

  19. Visual cues for person-centered communication.

    Science.gov (United States)

    Williams, Kristine; Harris, Brynn; Lueger, Amy; Ward, Kathleen; Wassmer, Rebecca; Weber, Amy

    2011-11-01

    Nursing home communication is frequently limited and task-focused and fails to affirm resident personhood. We tested the feasibility and effects of automated digital displays of resident photographs to remind staff (N = 11) of resident (n = 6) personhood. Historical photographs were displayed in digital photo frames mounted in each resident's room. To evaluate the intervention's effects, staff-resident conversations were audio-recorded prior to displaying the frames and repeated 2 weeks and 3 months later. Conversations were transcribed and statements were topic coded (task-focused vs. interpersonal). Staff person-centered talk increased from 11% to 32% (z = 2.37, p = .02) after the intervention and task-talk decreased from 64% to 40%. Resident interpersonal topics increased from 20% to 37%. Staff statements increased from 29 at baseline, to 37 postintervention, and 41 at 3-month follow-up and resident engagement and reminiscence also increased. Effects were reduced after 3 months. Automated photo displays are an easily implemented, low-cost intervention to promote person-centered communication.

  20. 22 CFR 51.1 - Definitions.

    Science.gov (United States)

    2010-04-01

    ... photograph, a unique chip number, and a digital signature to protect the integrity of the stored information... territories and possessions. (k) U.S. citizen means a person who acquired U.S. citizenship at birth or upon naturalization as provided by law and who has not subsequently lost such citizenship. (l) U.S. national means a U...

  1. Prospective, randomized evaluation of a personal digital assistant-based research tool in the emergency department

    Directory of Open Access Journals (Sweden)

    Dinizio Anthony

    2008-01-01

    Full Text Available Abstract Background Personal digital assistants (PDA offer putative advantages over paper for collecting research data. However, there are no data prospectively comparing PDA and paper in the emergency department. The aim of this study was to prospectively compare the performance of PDA and paper enrollment instruments with respect to time required and errors generated. Methods We randomized consecutive patients enrolled in an ongoing prospective study to having their data recorded either on a PDA or a paper data collection instrument. For each method, we recorded the total time required for enrollment, and the time required for manual transcription (paper onto a computer database. We compared data error rates by examining missing data, nonsensical data, and errors made during the transcription of paper forms. Statistical comparisons were performed by Kruskal-Wallis and Poisson regression analyses for time and errors, respectively. Results We enrolled 68 patients (37 PDA, 31 paper. Two of 31 paper forms were not available for analysis. Total data gathering times, inclusive of transcription, were significantly less for PDA (6:13 min per patient compared to paper (9:12 min per patient; p Conclusion Using a PDA-based data collection instrument for clinical research reduces the time required for data gathering and significantly improves data integrity.

  2. Recognition of Learner's Personality Traits through Digital Annotations in Distance Learning

    Science.gov (United States)

    Omheni, Nizar; Kalboussi, Anis; Mazhoud, Omar; Kacem, Ahmed Hadj

    2017-01-01

    Researchers in distance education are interested in observing and modelling of learner's personality profile, and adapting their learning experiences accordingly. When learners read and interact with their reading materials, they do unselfconscious activities like annotation which may be a key feature of their personalities. Annotation activity…

  3. Gender and personality traits' (BFI-10) effect on self-perceived tech savviness

    DEFF Research Database (Denmark)

    Olexova, Cecilia; Kirchner, Kathrin; Sudzina, Frantisek

    2017-01-01

    Today's students are considered as digital natives that grew up digitally. They use smartphones and services like social media on a regular basis. The aim of this paper is to analyze if gender and personality traits (Big Five Inventory-10) influence self-perceived tech savviness of Slovak business...

  4. Girls, identities and agency in adolescents' digital literacy practices

    Directory of Open Access Journals (Sweden)

    Vassiliki Adampa

    2012-03-01

    Full Text Available This paper focuses on the ways girls use digital environments, like Word, PowerPoint and chatting programmes, for writing and communication purposes. By combining quantitative and qualitative methods of analysis and by adopting a critical discourse framework, we will explore the relationship between girls and new media, especially the ones related to digital writing, in terms of three interconnected variables. The first one is related to the role of the two most important socialisation institutions, home and school, at the present historical juncture, characterised by intense mobility and an expansion of traditional forms of literacy. The strategic choices of the girls' families and their schools' teaching practices contributed significantly to the formulation of their digital writing practices. The second variable is gender. Our data clearly show that a substantial number of girls were more inclined than their male peers to use word-processing and presentation software, performing, thus, the school discourses of 'diligent students'. The third key variable concerns the personality of the girls who filtered in their own unique ways their social experiences, overcame limitations, took initiatives and appropriated technologically-mediated writing media for personally meaningful ends that enhanced their school and/or entertainment Discourses.

  5. Digital Collections, Digital Libraries & the Digitization of Cultural Heritage Information.

    Science.gov (United States)

    Lynch, Clifford

    2002-01-01

    Discusses digital collections and digital libraries. Topics include broadband availability; digital rights protection; content, both non-profit and commercial; digitization of cultural content; sustainability; metadata harvesting protocol; infrastructure; authorship; linking multiple resources; data mining; digitization of reference works;…

  6. 12 CFR 269b.731 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Signature. 269b.731 Section 269b.731 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM CHARGES OF UNFAIR LABOR PRACTICES General Rules § 269b.731 Signature. The original of each document filed shall be...

  7. H. Sapiens Digital: From Digital Immigrants and Digital Natives to Digital Wisdom

    Science.gov (United States)

    Prensky, Marc

    2009-01-01

    As we move further into the 21st century, the digital native/digital immigrant paradigm created by Marc Prensky in 2001 is becoming less relevant. In this article, Prensky suggests that we should focus instead on the development of what he calls "digital wisdom." Arguing that digital technology can make us not just smarter but truly wiser, Prensky…

  8. No-hardware-signature cybersecurity-crypto-module: a resilient cyber defense agent

    Science.gov (United States)

    Zaghloul, A. R. M.; Zaghloul, Y. A.

    2014-06-01

    We present an optical cybersecurity-crypto-module as a resilient cyber defense agent. It has no hardware signature since it is bitstream reconfigurable, where single hardware architecture functions as any selected device of all possible ones of the same number of inputs. For a two-input digital device, a 4-digit bitstream of 0s and 1s determines which device, of a total of 16 devices, the hardware performs as. Accordingly, the hardware itself is not physically reconfigured, but its performance is. Such a defense agent allows the attack to take place, rendering it harmless. On the other hand, if the system is already infected with malware sending out information, the defense agent allows the information to go out, rendering it meaningless. The hardware architecture is immune to side attacks since such an attack would reveal information on the attack itself and not on the hardware. This cyber defense agent can be used to secure a point-to-point, point-to-multipoint, a whole network, and/or a single entity in the cyberspace. Therefore, ensuring trust between cyber resources. It can provide secure communication in an insecure network. We provide the hardware design and explain how it works. Scalability of the design is briefly discussed. (Protected by United States Patents No.: US 8,004,734; US 8,325,404; and other National Patents worldwide.)

  9. Reduction of a Ship's Magnetic Field Signatures

    CERN Document Server

    Holmes, John

    2008-01-01

    Decreasing the magnetic field signature of a naval vessel will reduce its susceptibility to detonating naval influence mines and the probability of a submarine being detected by underwater barriers and maritime patrol aircraft. Both passive and active techniques for reducing the magnetic signatures produced by a vessel's ferromagnetism, roll-induced eddy currents, corrosion-related sources, and stray fields are presented. Mathematical models of simple hull shapes are used to predict the levels of signature reduction that might be achieved through the use of alternate construction materials. Al

  10. Classrooms as ‘safe houses’? The ethical and emotional implications of digital storytelling in a university writing classroom

    Directory of Open Access Journals (Sweden)

    Kristian D Stewart

    2017-06-01

    Full Text Available This paper reports the findings of a digital storytelling praxis within a higher education classroom located outside of Metro Detroit in the United States. Drawing on Zembylas’s (2006, 2008 scholarship on emotion in the production of knowledge and the teacher’s role, adjacent to literature surrounding personal writing and safe houses for learning, an investigation of student perceptions of digital storytelling within a writing classroom took place during the 2016 and 2017 academic years. Data highlights the students’ interest for the emotionally-driven course content digital storytelling encourages, as it taught students how to insert genre conventions into their own writing. Digital storytelling, according to the students, also supplied a means for students to develop relationships with their peers as many students felt isolated on this largely commuter campus. Students additionally viewed the curriculum as promoting ‘real world’ skills they could transfer outside of the classroom and into their lives. However, to craft digital stories, data revealed how students turned toward sharing personal (and or traumatic narratives. This can be problematic in terms of emotional safety if students are made to feel they must leverage emotions for grades and are then forced to broadcast their digital stories in a public forum. To lessen these concerns, strategies for implementing digital storytelling into the curriculum are provided. Lastly, the author concludes that educating students within a Trump presidency requires a different pedagogical approach. Assignments such as digital storytelling that merge the scholarly and the personal, alongside nurturing empathy, open dialogue, and building relationships might offer a direction forward.

  11. Digital advertising in cross-channel communications

    Directory of Open Access Journals (Sweden)

    A. V. Mordovin

    2017-01-01

    Full Text Available Advertising has passed a long way of development and today it is no longer limited to the printed press, static billboards, radio and television commercials. Digital technology has started a completely new era of digital advertising, which allows marketers and advertisers to target audiences with great precision. To meet the needs and expectations of customers who gain new personal experience through involvement in the process of continuous network communication advertisers make use of digital technologies that continue to develop intensively. Based on technological advances, new advertising technologies employ tracking methods to produce tailor-made advertisements that meet specific needs of customers, and new advertising platforms that can host new types of ads with dynamic content provide endless opportunities for marketers and advertisers. This paper will explore the key trends in the segment of digital advertising. In the process of this research methods of desk research and expert interviews were used. The received results can be used for updating of strategy and structure of marketing communications of the enterprises, their marketing budgets; in the educational process and for the further deepening of scientific and applied research.

  12. Digital Collections, Digital Libraries and the Digitization of Cultural Heritage Information.

    Science.gov (United States)

    Lynch, Clifford

    2002-01-01

    Discusses the development of digital collections and digital libraries. Topics include digitization of cultural heritage information; broadband issues; lack of compelling content; training issues; types of materials being digitized; sustainability; digital preservation; infrastructure; digital images; data mining; and future possibilities for…

  13. Does Twitter trigger bursts in signature collections?

    Science.gov (United States)

    Yamaguchi, Rui; Imoto, Seiya; Kami, Masahiro; Watanabe, Kenji; Miyano, Satoru; Yuji, Koichiro

    2013-01-01

    The quantification of social media impacts on societal and political events is a difficult undertaking. The Japanese Society of Oriental Medicine started a signature-collecting campaign to oppose a medical policy of the Government Revitalization Unit to exclude a traditional Japanese medicine, "Kampo," from the public insurance system. The signature count showed a series of aberrant bursts from November 26 to 29, 2009. In the same interval, the number of messages on Twitter including the keywords "Signature" and "Kampo," increased abruptly. Moreover, the number of messages on an Internet forum that discussed the policy and called for signatures showed a train of spikes. In order to estimate the contributions of social media, we developed a statistical model with state-space modeling framework that distinguishes the contributions of multiple social media in time-series of collected public opinions. We applied the model to the time-series of signature counts of the campaign and quantified contributions of two social media, i.e., Twitter and an Internet forum, by the estimation. We found that a considerable portion (78%) of the signatures was affected from either of the social media throughout the campaign and the Twitter effect (26%) was smaller than the Forum effect (52%) in total, although Twitter probably triggered the initial two bursts of signatures. Comparisons of the estimated profiles of the both effects suggested distinctions between the social media in terms of sustainable impact of messages or tweets. Twitter shows messages on various topics on a time-line; newer messages push out older ones. Twitter may diminish the impact of messages that are tweeted intermittently. The quantification of social media impacts is beneficial to better understand people's tendency and may promote developing strategies to engage public opinions effectively. Our proposed method is a promising tool to explore information hidden in social phenomena.

  14. Does Twitter trigger bursts in signature collections?

    Directory of Open Access Journals (Sweden)

    Rui Yamaguchi

    Full Text Available INTRODUCTION: The quantification of social media impacts on societal and political events is a difficult undertaking. The Japanese Society of Oriental Medicine started a signature-collecting campaign to oppose a medical policy of the Government Revitalization Unit to exclude a traditional Japanese medicine, "Kampo," from the public insurance system. The signature count showed a series of aberrant bursts from November 26 to 29, 2009. In the same interval, the number of messages on Twitter including the keywords "Signature" and "Kampo," increased abruptly. Moreover, the number of messages on an Internet forum that discussed the policy and called for signatures showed a train of spikes. METHODS AND FINDINGS: In order to estimate the contributions of social media, we developed a statistical model with state-space modeling framework that distinguishes the contributions of multiple social media in time-series of collected public opinions. We applied the model to the time-series of signature counts of the campaign and quantified contributions of two social media, i.e., Twitter and an Internet forum, by the estimation. We found that a considerable portion (78% of the signatures was affected from either of the social media throughout the campaign and the Twitter effect (26% was smaller than the Forum effect (52% in total, although Twitter probably triggered the initial two bursts of signatures. Comparisons of the estimated profiles of the both effects suggested distinctions between the social media in terms of sustainable impact of messages or tweets. Twitter shows messages on various topics on a time-line; newer messages push out older ones. Twitter may diminish the impact of messages that are tweeted intermittently. CONCLUSIONS: The quantification of social media impacts is beneficial to better understand people's tendency and may promote developing strategies to engage public opinions effectively. Our proposed method is a promising tool to explore

  15. Digital Marketing of Ninjamails

    OpenAIRE

    Kolmakova, Alina

    2016-01-01

    The following thesis was conducted for Ninja Stars startup company, based in Madrid, Spain. Ninja mails offers an all new professional online service, which allows finding the email address of any person from any company by only knowing the name of the desired recipient and the recipient’s company. In the thesis the author examined the digital marketing concepts in terms of startup development and the improvement of the external company’s image for a particular target group of recent universi...

  16. Blind Quantum Signature with Blind Quantum Computation

    Science.gov (United States)

    Li, Wei; Shi, Ronghua; Guo, Ying

    2017-04-01

    Blind quantum computation allows a client without quantum abilities to interact with a quantum server to perform a unconditional secure computing protocol, while protecting client's privacy. Motivated by confidentiality of blind quantum computation, a blind quantum signature scheme is designed with laconic structure. Different from the traditional signature schemes, the signing and verifying operations are performed through measurement-based quantum computation. Inputs of blind quantum computation are securely controlled with multi-qubit entangled states. The unique signature of the transmitted message is generated by the signer without leaking information in imperfect channels. Whereas, the receiver can verify the validity of the signature using the quantum matching algorithm. The security is guaranteed by entanglement of quantum system for blind quantum computation. It provides a potential practical application for e-commerce in the cloud computing and first-generation quantum computation.

  17. Bridging storytelling traditions with digital technology

    Directory of Open Access Journals (Sweden)

    Melany Cueva

    2013-08-01

    Full Text Available Objective. The purpose of this project was to learn how Community Health Workers (CHWs in Alaska perceived digital storytelling as a component of the “Path to Understanding Cancer” curriculum and as a culturally respectful tool for sharing cancer-related health messages. Design. A pre-course written application, end-of-course written evaluation, and internet survey informed this project. Methods. Digital storytelling was included in seven 5-day cancer education courses (May 2009–2012 in which 67 CHWs each created a personal 2–3 minute cancer-related digital story. Participant-chosen digital story topics included tobacco cessation, the importance of recommended cancer screening exams, cancer survivorship, loss, grief and end-of-life comfort care, and self-care as patient care providers. All participants completed an end-of-course written evaluation. In July 2012, contact information was available for 48 participants, of whom 24 completed an internet survey. Results. All 67 participants successfully completed a digital story which they shared and discussed with course members. On the written post-course evaluation, all participants reported that combining digital storytelling with cancer education supported their learning and was a culturally respectful way to provide health messages. Additionally, 62 of 67 CHWs reported that the course increased their confidence to share cancer information with their communities. Up to 3 years post-course, all 24 CHW survey respondents reported they had shown their digital story. Of note, 23 of 24 CHWs also reported change in their own behaviour as a result of the experience. Conclusions. All CHWs, regardless of computer skills, successfully created a digital story as part of the cancer education course. CHWs reported that digital stories enhanced their learning and were a culturally respectful way to share cancer-related information. Digital storytelling gave the power of the media into the hands of CHWs

  18. Modeling ground vehicle acoustic signatures for analysis and synthesis

    International Nuclear Information System (INIS)

    Haschke, G.; Stanfield, R.

    1995-01-01

    Security and weapon systems use acoustic sensor signals to classify and identify moving ground vehicles. Developing robust signal processing algorithms for this is expensive, particularly in presence of acoustic clutter or countermeasures. This paper proposes a parametric ground vehicle acoustic signature model to aid the system designer in understanding which signature features are important, developing corresponding feature extraction algorithms and generating low-cost, high-fidelity synthetic signatures for testing. The authors have proposed computer-generated acoustic signatures of armored, tracked ground vehicles to deceive acoustic-sensored smart munitions. They have developed quantitative measures of how accurately a synthetic acoustic signature matches those produced by actual vehicles. This paper describes parameters of the model used to generate these synthetic signatures and suggests methods for extracting these parameters from signatures of valid vehicle encounters. The model incorporates wide-bandwidth and narrow- bandwidth components that are modulated in a pseudo-random fashion to mimic the time dynamics of valid vehicle signatures. Narrow- bandwidth feature extraction techniques estimate frequency, amplitude and phase information contained in a single set of narrow frequency- band harmonics. Wide-bandwidth feature extraction techniques estimate parameters of a correlated-noise-floor model. Finally, the authors propose a method of modeling the time dynamics of the harmonic amplitudes as a means adding necessary time-varying features to the narrow-bandwidth signal components. The authors present results of applying this modeling technique to acoustic signatures recorded during encounters with one armored, tracked vehicle. Similar modeling techniques can be applied to security systems

  19. An Efficient Homomorphic Aggregate Signature Scheme Based on Lattice

    Directory of Open Access Journals (Sweden)

    Zhengjun Jing

    2014-01-01

    Full Text Available Homomorphic aggregate signature (HAS is a linearly homomorphic signature (LHS for multiple users, which can be applied for a variety of purposes, such as multi-source network coding and sensor data aggregation. In order to design an efficient postquantum secure HAS scheme, we borrow the idea of the lattice-based LHS scheme over binary field in the single-user case, and develop it into a new lattice-based HAS scheme in this paper. The security of the proposed scheme is proved by showing a reduction to the single-user case and the signature length remains invariant. Compared with the existing lattice-based homomorphic aggregate signature scheme, our new scheme enjoys shorter signature length and high efficiency.

  20. Moving From Digitalization to Digitization in Cardiovascular Care: Why Is it Important, and What Could it Mean for Patients and Providers?

    Science.gov (United States)

    Steinhubl, Steven R; Topol, Eric J

    2015-09-29

    So far, the digitization of health care is best exemplified by electronic medical records, which have been far from favorably or uniformly accepted. However, properly implemented digitization can enable better patient outcomes, improve convenience, potentially lower healthcare costs, and possibly lead to much greater physician satisfaction. Precision (also known as personalized or individualized) medicine is frequently discussed today, but, in reality, it is what physicians have attempted to do as best they could for millennia. But now we have new tools that can begin to give us a much more high-definition view of our patients; from affordable and rapid genetic testing to wearable sensors that track a wide range of important physiologic parameters continuously. Although seemingly counterintuitive, the digitization of health care can also markedly improve the physician-patient relationship, allowing more time for human interaction when care is bolstered by digital technologies that better individualize diagnostics and treatments. Copyright © 2015 American College of Cardiology Foundation. Published by Elsevier Inc. All rights reserved.

  1. Landsat Thematic Mapper digital information content for agricultural environments

    Science.gov (United States)

    Haack, Barry; Bryant, Nevin; Adams, Steven

    1986-01-01

    Landsat Thematic Mapper (TM) data collected for Imperial Valley, California in December, 1982 were digitally examined to assess their utility to distinguish among agricultural and other land-covers. Statistics for thirty-seven training sites representing a variety of crops plus urban, water and desert land-covers were obtained and analyzed using transformed divergence (TD) calculations. TD values were employed to assess intraclass variability and the best bands for classification. Four subscenes were selected for clustering or unsupervised signature extraction. These areas were agriculture, urban, desert and water land-covers. The number of clusters for these subscenes were examined and the best TM bands for interclass separability were identified. The results of the clustering and training site analyses for interclass separability were compared. The TM data were useful for the digital delimitation of most crops and other cover types in this analysis. Four bands of data are adequate for classification with the best results obtained by the selection of one band from each of the available portions of the electromagnetic spectrum. Different band combinations are best for various land-cover intraclass separability.

  2. Credibility and Authenticity of Digitally Signed Videos in Traffic

    Directory of Open Access Journals (Sweden)

    Ivan Grgurević

    2008-11-01

    Full Text Available The paper presents the possibilities of insuring the credibilityand authenticity of the surveillance camera video by digitalsigning, using the public key infrastructure as part of interoperabletraffic and information system in the future intelligenttransport systems. The surveillance camera video is a sequenceof individual frames and a unique digital print, i. e. hash valueis calculated for each of these. By encryption of the hash valuesof the frames using private encryption key of the surveillancecentre, digital signatures are created and they are stored in thedatabase. The surveillance centre can issue a copy of the videoto all the interested subjects for scientific and research workand investigation. Regardless of the scope, each subsequentmanipulation of the video copy contents will certainly changethe hash value of all the frames. The procedure of determiningthe authenticity and credibility of videos is reduced to the comparisonof the hash values of the frames stored in the databaseof the surveillance centre with the values obtained from the interestedsubjects such as the traffic experts and investigators,surveillance-security services etc.

  3. A study on online learner profile for supporting personalized learning

    Directory of Open Access Journals (Sweden)

    Jie Yang

    2013-09-01

    Full Text Available Digital learning as a popular learning approach has received increasing attention in modern education. The learner profile in online learning plays a critical role in supporting personalized learning. This article uses an information flow-based approach to build the learner profile for supporting personalized learning. The learner profile includes the individual profile to capture the personal features and the community profile to capture the social features in online learning environment.

  4. Signature detection and matching for document image retrieval.

    Science.gov (United States)

    Zhu, Guangyu; Zheng, Yefeng; Doermann, David; Jaeger, Stefan

    2009-11-01

    As one of the most pervasive methods of individual identification and document authentication, signatures present convincing evidence and provide an important form of indexing for effective document image processing and retrieval in a broad range of applications. However, detection and segmentation of free-form objects such as signatures from clustered background is currently an open document analysis problem. In this paper, we focus on two fundamental problems in signature-based document image retrieval. First, we propose a novel multiscale approach to jointly detecting and segmenting signatures from document images. Rather than focusing on local features that typically have large variations, our approach captures the structural saliency using a signature production model and computes the dynamic curvature of 2D contour fragments over multiple scales. This detection framework is general and computationally tractable. Second, we treat the problem of signature retrieval in the unconstrained setting of translation, scale, and rotation invariant nonrigid shape matching. We propose two novel measures of shape dissimilarity based on anisotropic scaling and registration residual error and present a supervised learning framework for combining complementary shape information from different dissimilarity metrics using LDA. We quantitatively study state-of-the-art shape representations, shape matching algorithms, measures of dissimilarity, and the use of multiple instances as query in document image retrieval. We further demonstrate our matching techniques in offline signature verification. Extensive experiments using large real-world collections of English and Arabic machine-printed and handwritten documents demonstrate the excellent performance of our approaches.

  5. Server-Aided Verification Signature with Privacy for Mobile Computing

    Directory of Open Access Journals (Sweden)

    Lingling Xu

    2015-01-01

    Full Text Available With the development of wireless technology, much data communication and processing has been conducted in mobile devices with wireless connection. As we know that the mobile devices will always be resource-poor relative to static ones though they will improve in absolute ability, therefore, they cannot process some expensive computational tasks due to the constrained computational resources. According to this problem, server-aided computing has been studied in which the power-constrained mobile devices can outsource some expensive computation to a server with powerful resources in order to reduce their computational load. However, in existing server-aided verification signature schemes, the server can learn some information about the message-signature pair to be verified, which is undesirable especially when the message includes some secret information. In this paper, we mainly study the server-aided verification signatures with privacy in which the message-signature pair to be verified can be protected from the server. Two definitions of privacy for server-aided verification signatures are presented under collusion attacks between the server and the signer. Then based on existing signatures, two concrete server-aided verification signature schemes with privacy are proposed which are both proved secure.

  6. The digital divide in adoption and use of a personal health record.

    Science.gov (United States)

    Yamin, Cyrus K; Emani, Srinivas; Williams, Deborah H; Lipsitz, Stuart R; Karson, Andrew S; Wald, Jonathan S; Bates, David W

    2011-03-28

    Personal health records (PHRs) offer the potential to improve the patient experience and the quality of patient care. However, the "digital divide," the population-level gap in Internet and computer access, may prevent certain groups from accessing the PHR. We conducted a cross-sectional analysis of a PHR within a northeastern health system. We compared adopters (ie, those activating a PHR account online) with nonadopters (ie, those who see a physician offering the PHR but do not activate an account). We further categorized adopters by intensity of PHR use, measured by number of log-ins and number of messages sent to physicians' practices. As of September 30, 2009, among 75,056 patients, 43% had adopted the PHR since 2002. Blacks and Hispanics were less likely to adopt the PHR compared with whites (odds ratio [OR], 0.50; 95% confidence interval [CI], 0.45-0.55; and 0.64; 0.57-0.73, respectively), and those with lower annual income were less likely to adopt the PHR than were those with higher income. Compared with nonadopters, adopters were more likely to have more than 2 comorbidities (OR, 1.27; 95% CI, 1.17-1.30). Use of an aggressive marketing strategy for PHR enrollment increased adoption nearly 3-fold (OR, 2.92; 95% CI, 1.58-5.40). Intensity of use was best predicted by increasing number of comorbidities, followed by race/ethnicity (whites more than blacks and Hispanics) and insurance status. We found no association between income and log-in frequency or secure messages sent. Despite increasing Internet availability, racial/ethnic minority patients adopted a PHR less frequently than white patients, and patients with the lowest annual income adopted a PHR less often than those with higher incomes. Among adopters, however, income did not have an effect on PHR use.

  7. MULTI - multifunctional interface of the IBM XT and AT type personal computers

    International Nuclear Information System (INIS)

    Gross, T.; Kalavski, D.; Rubin, D.; Tulaev, A.B.; Tumanov, A.V.

    1988-01-01

    MULTI multifunctional interface which enables to solve problems of personal computer connestion with physical equipment without application of intermediate buses is described. Parallel 32-digit bidirectional 1/10 register and buffered bus of personal computer represent MULTI base. Ways of MULTI application are described

  8. Digital questionnaire platform in the Danish Blood Donor Study

    DEFF Research Database (Denmark)

    Burgdorf, K S; Felsted, N; Mikkelsen, S

    2016-01-01

    with the questionnaire data in the DBDS database. RESULTS: The digital platform enables personalized questionnaires, presenting only questions relevant to the specific donor by hiding unneeded follow-up questions on screening question results. New versions of questionnaires are immediately available at all blood...

  9. 48 CFR 4.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Contracting officer's signature. 4.101 Section 4.101 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Contract Execution 4.101 Contracting officer's signature. Only contracting officers shall...

  10. Camac interface for digitally recording infrared camera images

    International Nuclear Information System (INIS)

    Dyer, G.R.

    1986-01-01

    An instrument has been built to store the digital signals from a modified imaging infrared scanner directly in a digital memory. This procedure avoids the signal-to-noise degradation and dynamic range limitations associated with successive analog-to-digital and digital-to-analog conversions and the analog recording method normally used to store data from the scanner. This technique also allows digital data processing methods to be applied directly to recorded data and permits processing and image reconstruction to be done using either a mainframe or a microcomputer. If a suitable computer and CAMAC-based data collection system are already available, digital storage of up to 12 scanner images can be implemented for less than $1750 in materials cost. Each image is stored as a frame of 60 x 80 eight-bit pixels, with an acquisition rate of one frame every 16.7 ms. The number of frames stored is limited only by the available memory. Initially, data processing for this equipment was done on a VAX 11-780, but images may also be displayed on the screen of a microcomputer. Software for setting the displayed gray scale, generating contour plots and false-color displays, and subtracting one image from another (e.g., background suppression) has been developed for IBM-compatible personal computers

  11. 37 CFR 2.74 - Form and signature of amendment.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Form and signature of... signature of amendment. (a) Form of Amendment. Amendments should be set forth clearly and completely... record. (b) Signature. A request for amendment of an application must be signed by the applicant, someone...

  12. 21 CFR 11.200 - Electronic signature components and controls.

    Science.gov (United States)

    2010-04-01

    ... signature components and controls. (a) Electronic signatures that are not based upon biometrics shall: (1) Employ at least two distinct identification components such as an identification code and password. (i... signatures based upon biometrics shall be designed to ensure that they cannot be used by anyone other than...

  13. Digital Humanities and networked digital media

    DEFF Research Database (Denmark)

    Finnemann, Niels Ole

    2014-01-01

    This article discusses digital humanities and the growing diversity of digital media, digital materials and digital methods. The first section describes the humanities computing tradition formed around the interpretation of computation as a rule-based process connected to a concept of digital...... materials centred on the digitisation of non-digital, finite works, corpora and oeuvres. The second section discusses “the big tent” of contemporary digital humanities. It is argued that there can be no unifying interpretation of digital humanities above the level of studying digital materials with the help...... of software-supported methods. This is so, in part, because of the complexity of the world and, in part, because digital media remain open to the projection of new epistemologies onto the functional architecture of these media. The third section discusses the heterogeneous character of digital materials...

  14. Staggering in signature partners of A∼190 mass region of superdeformed rotational bands

    International Nuclear Information System (INIS)

    Uma, V.S.; Goel, Alpana; Yadav, Archana

    2014-01-01

    This paper discuss about ΔI=1 signature splitting in signature partner pairs of A∼190 mass region. Around twenty signature partner pairs (usually called as two bands, each with a fixed signature) have been reported in this mass region. For these signature pairs, band head moment of inertia (J 0 ) and intrinsic structure of each pair of signature partners have been found as almost identical. Also, these signature partner pairs showed large amplitude signature splitting. As each of the two signature partner forms a regular spin sequence and signature bands are not equivalent in terms of energies. This difference in energies results in signature splitting

  15. From Indymedia to Anonymous: rethinking action and identity in digital cultures

    OpenAIRE

    McDonald, Kevin

    2015-01-01

    The period following the social mobilizations of 2011 has seen a renewed focus on the place of communication in collective action, linked to the increasing importance of digital communications. Framed in terms of personalized ‘connective action’ or the social morphology of networks, these analyses have criticized previously dominant models of ‘collective identity’, arguing that collective action needs to be understood as ‘digital networking’. These influential approaches have been significant...

  16. 22 CFR 92.28 - Signature of affiant on affidavit.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Signature of affiant on affidavit. 92.28 Section 92.28 Foreign Relations DEPARTMENT OF STATE LEGAL AND RELATED SERVICES NOTARIAL AND RELATED SERVICES Specific Notarial Acts § 92.28 Signature of affiant on affidavit. The signature of the affiant is...

  17. Cyborg Cinema: (Dis)Embodying Cultural Memory in the Digital Age

    OpenAIRE

    Parfitt, Clare

    2009-01-01

    In postmodernity, a range of digital technologies are used to store memories. These include digital cameras, ipods, memory sticks, and online repositories such as YouTube and Flickr. This process is not just personal. Mediated memories, such as songs stored on ipods and films stored on YouTube, often refer to collective experiences, whether those of a group of friends, or a global audience. Once stored, these memory files have the capacity to reinforce existing group identities, as well as cr...

  18. Induced Temporal Signatures for Point-Source Detection

    International Nuclear Information System (INIS)

    Stephens, Daniel L.; Runkle, Robert C.; Carlson, Deborah K.; Peurrung, Anthony J.; Seifert, Allen; Wyatt, Cory R.

    2005-01-01

    Detection of radioactive point-sized sources is inherently divided into two regimes encompassing stationary and moving detectors. The two cases differ in their treatment of background radiation and its influence on detection sensitivity. In the stationary detector case the statistical fluctuation of the background determines the minimum detectable quantity. In the moving detector case the detector may be subjected to widely and irregularly varying background radiation, as a result of geographical and environmental variation. This significant systematic variation, in conjunction with the statistical variation of the background, requires a conservative threshold to be selected to yield the same false-positive rate as the stationary detection case. This results in lost detection sensitivity for real sources. This work focuses on a simple and practical modification of the detector geometry that increase point-source recognition via a distinctive temporal signature. A key part of this effort is the integrated development of both detector geometries that induce a highly distinctive signature for point sources and the development of statistical algorithms able to optimize detection of this signature amidst varying background. The identification of temporal signatures for point sources has been demonstrated and compared with the canonical method showing good results. This work demonstrates that temporal signatures are efficient at increasing point-source discrimination in a moving detector system

  19. Content-oriented presentation and personalized interface of cultural heritage in digital dossiers

    NARCIS (Netherlands)

    Wang, Y.; Eliëns, A.; Riel, van C.; Guerrero-Bote, V.P.

    2006-01-01

    Digitization of cultural heritage becomes an important requisite for remote co-operation, education and tourism between art institutes, museums and the general public since the 90’s. Based on the demand to access the scattered collections from the Netherlands Institute for Cultural Heritage and

  20. Digital Clusters: How the Net is Marking Us

    Directory of Open Access Journals (Sweden)

    Luciano Giustini

    2017-12-01

    Full Text Available The work moves from the analysis of data from digital illiteracies as well as cognitive biases, deepening the specific criticalities of the phenomenon of the conversational decay, made pervasive by the diffusion of social networks - touching the topics of false news, fanaticism and online hate speech. In this context, even due to the algorithms’ filtering action, the user, being protagonist of the network and its contents, risks to be confined in large online structures, closed in echo chambers and finding only converging and polarized ideas. Deepening the theme of personal and collective narration, and how this is augmented and expanded in social media, the work explores a new digital aggregation object, called “Digital cluster”. These aggregations overcome and widen the phenomenon of “digital bubbles” described by Eli Pariser in 2011, and outline a digital context in which different subjects select contents to reinforce the choices and the common narratives. In these aggregations, there are also other elements, from the topology of the network to the presence of other distortions, which bring the phenomenon towards a wider scale magnitude, which is examined in rate and implications.

  1. Early detection of the incidence of malignancy in mammograms using digital image correlation

    International Nuclear Information System (INIS)

    Espitia, J.; Jacome, J.; Torres, C.

    2016-01-01

    The digital image correlation has proved an effective way for Pattern Recognition, this research to identify the using Findings digitally extracted from a mammographic image, which is the means used by more specialists to determine if a person is a candidate or not, a Suffer Breast Cancer. This shown that early detection of symptom logy 'carcinogenic' is the key . (Author)

  2. Optical/Infrared Signatures for Space-Based Remote Sensing

    National Research Council Canada - National Science Library

    Picard, R. H; Dewan, E. M; Winick, J. R; O'Neil, R. R

    2007-01-01

    This report describes work carried out under the Air Force Research Laboratory's basic research task in optical remote-sensing signatures, entitled Optical / Infrared Signatures for Space-Based Remote Sensing...

  3. Signature scheme based on bilinear pairs

    Science.gov (United States)

    Tong, Rui Y.; Geng, Yong J.

    2013-03-01

    An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.

  4. Demonetization to Digitalization: A Step Toward Progress

    Directory of Open Access Journals (Sweden)

    Harshita Bhatnagar

    2017-05-01

    Full Text Available Journey from demonetization to digitalization is very hard hitting but not impossible. Recent demonetization in India on November 8, 2016, created lot of panic in the economy but also paved the way to digitalization. Cash crunch and availability of e-sources of transactions compelled many people to use electronic modes of payment. Credit cards, debit cards/RuPay card, USSD/UPI, Internet banking, mobile wallets like Oxigen, Paytm, Mobiwik, aadhar-enabled payment system, POS, and so on are few popular modes of electronic transaction, which are commonly used by the citizen. Digitalization will embrace higher transparency in monetary terms; low-cost maintenance; more convenience in use; and help in financial inclusion and weeding out black money and counterfeit money from the economy. But journey to a destination is always full of roadblocks, and similarly the journey of India toward a digital India is also full of hurdles like a huge illiteracy rate; low bandwidth; more unbanked areas; late adoption of technology; lack of full-time electricity; security concerns like hacking, cybercrime, and safety of personal details; and need for high investments. So, to defend the dream of a digital India, we have to develop well-defined strategies to coach people in using technology like focusing on customer education as well as employee education in technology by conducting workshops, presentations, enforcing strict cyber laws, use of local language, and developing user-friendly websites that leverage technology using the development of simple and smart digital tools, such as the use of a one-time password (OTP. The government has started Vittiya Sakharata Abhiyaan (VISAKA and outreach campaigns like DigiDhan Abhiyan and so on to encourage people to adopt digital tools. Overall demonetization is greasing the wheels of digitalization and transforming India into Digital India.

  5. Studying episodic access to personal digital activity : activity trails prototype

    OpenAIRE

    Cangiano, Gaston R.

    2011-01-01

    It was just a generation ago that computers entered the workplace. Back then, they only represented the work we did, nothing else. But today, some sort of computing device is involved in how we play, how we communicate, how we get our news and of course, how we work. What this means is that today almost all aspects of our lives are represented in some digital form. The rapid pace of change in technology and the dramatic shift in the use of computers has a cost associated with it. The legacy d...

  6. Molecular Signature in HCV-Positive Lymphomas

    Directory of Open Access Journals (Sweden)

    Valli De Re

    2012-01-01

    Full Text Available Hepatitis C virus (HCV is a positive, single-stranded RNA virus, which has been associated to different subtypes of B-cell non-Hodgkin lymphoma (B-NHL. Cumulative evidence suggests an HCV-related antigen driven process in the B-NHL development. The underlying molecular signature associated to HCV-related B-NHL has to date remained obscure. In this review, we discuss the recent developments in this field with a special mention to different sets of genes whose expression is associated with BCR coupled to Blys signaling which in turn was found to be linked to B-cell maturation stages and NF-κb transcription factor. Even if recent progress on HCV-B-NHL signature has been made, the precise relationship between HCV and lymphoma development and phenotype signature remain to be clarified.

  7. Using Machine Learning to Advance Personality Assessment and Theory.

    Science.gov (United States)

    Bleidorn, Wiebke; Hopwood, Christopher James

    2018-05-01

    Machine learning has led to important advances in society. One of the most exciting applications of machine learning in psychological science has been the development of assessment tools that can powerfully predict human behavior and personality traits. Thus far, machine learning approaches to personality assessment have focused on the associations between social media and other digital records with established personality measures. The goal of this article is to expand the potential of machine learning approaches to personality assessment by embedding it in a more comprehensive construct validation framework. We review recent applications of machine learning to personality assessment, place machine learning research in the broader context of fundamental principles of construct validation, and provide recommendations for how to use machine learning to advance our understanding of personality.

  8. ePatient Conference Explores Future of Personalized Medicine | NIH MedlinePlus the Magazine

    Science.gov (United States)

    ... page please turn Javascript on. ePatient Conference Explores Future of Personalized Medicine Past Issues / Spring - Summer 2010 Table of Contents ... your healthcare provider communicate better in the digital future? What is personalized medicine? Some of the nation's top health researchers, computer ...

  9. 32 CFR 842.6 - Signature on the claim form.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Signature on the claim form. 842.6 Section 842.6... ADMINISTRATIVE CLAIMS General Information § 842.6 Signature on the claim form. The claimant or authorized agent... authorized agent signing for a claimant shows, after the signature, the title or capacity and attaches...

  10. Neural correlates of emotional personality: a structural and functional magnetic resonance imaging study.

    Directory of Open Access Journals (Sweden)

    Stefan Koelsch

    Full Text Available Studies addressing brain correlates of emotional personality have remained sparse, despite the involvement of emotional personality in health and well-being. This study investigates structural and functional brain correlates of psychological and physiological measures related to emotional personality. Psychological measures included neuroticism, extraversion, and agreeableness scores, as assessed using a standard personality questionnaire. As a physiological measure we used a cardiac amplitude signature, the so-called E κ value (computed from the electrocardiogram which has previously been related to tender emotionality. Questionnaire scores and E κ values were related to both functional (eigenvector centrality mapping, ECM and structural (voxel-based morphometry, VBM neuroimaging data. Functional magnetic resonance imaging (fMRI data were obtained from 22 individuals (12 females while listening to music (joy, fear, or neutral music. ECM results showed that agreeableness scores correlated with centrality values in the dorsolateral prefrontal cortex, the anterior cingulate cortex, and the ventral striatum (nucleus accumbens. Individuals with higher E κ values (indexing higher tender emotionality showed higher centrality values in the subiculum of the right hippocampal formation. Structural MRI data from an independent sample of 59 individuals (34 females showed that neuroticism scores correlated with volume of the left amygdaloid complex. In addition, individuals with higher E κ showed larger gray matter volume in the same portion of the subiculum in which individuals with higher E κ showed higher centrality values. Our results highlight a role of the amygdala in neuroticism. Moreover, they indicate that a cardiac signature related to emotionality (E κ correlates with both function (increased network centrality and structure (grey matter volume of the subiculum of the hippocampal formation, suggesting a role of the hippocampal formation for

  11. Neural correlates of emotional personality: a structural and functional magnetic resonance imaging study.

    Science.gov (United States)

    Koelsch, Stefan; Skouras, Stavros; Jentschke, Sebastian

    2013-01-01

    Studies addressing brain correlates of emotional personality have remained sparse, despite the involvement of emotional personality in health and well-being. This study investigates structural and functional brain correlates of psychological and physiological measures related to emotional personality. Psychological measures included neuroticism, extraversion, and agreeableness scores, as assessed using a standard personality questionnaire. As a physiological measure we used a cardiac amplitude signature, the so-called E κ value (computed from the electrocardiogram) which has previously been related to tender emotionality. Questionnaire scores and E κ values were related to both functional (eigenvector centrality mapping, ECM) and structural (voxel-based morphometry, VBM) neuroimaging data. Functional magnetic resonance imaging (fMRI) data were obtained from 22 individuals (12 females) while listening to music (joy, fear, or neutral music). ECM results showed that agreeableness scores correlated with centrality values in the dorsolateral prefrontal cortex, the anterior cingulate cortex, and the ventral striatum (nucleus accumbens). Individuals with higher E κ values (indexing higher tender emotionality) showed higher centrality values in the subiculum of the right hippocampal formation. Structural MRI data from an independent sample of 59 individuals (34 females) showed that neuroticism scores correlated with volume of the left amygdaloid complex. In addition, individuals with higher E κ showed larger gray matter volume in the same portion of the subiculum in which individuals with higher E κ showed higher centrality values. Our results highlight a role of the amygdala in neuroticism. Moreover, they indicate that a cardiac signature related to emotionality (E κ) correlates with both function (increased network centrality) and structure (grey matter volume) of the subiculum of the hippocampal formation, suggesting a role of the hippocampal formation for

  12. Thermal signature measurements for ammonium nitrate/fuel mixtures by laser heating

    International Nuclear Information System (INIS)

    Nazarian, Ashot; Presser, Cary

    2016-01-01

    Highlights: • LDTR is a useful diagnostic for characterizing AN/fuel mixture thermochemical behavior. • Each AN/fuel mixture thermal signature was different. • AN/fuel mixture signature features were defined by the individual constituents. • Baseline signatures changed after an experiment. - Abstract: Measurements were carried out to obtain thermal signatures of several ammonium nitrate/fuel (ANF) mixtures, using a laser-heating technique referred to as the laser-driven thermal reactor (LDTR). The mixtures were ammonium nitrate (AN)/kerosene, AN/ethylene glycol, AN/paraffin wax, AN/petroleum jelly, AN/confectioner's sugar, AN/cellulose (tissue paper), nitromethane/cellulose, nitrobenzene/cellulose, AN/cellulose/nitromethane, AN/cellulose/nitrobenzene. These mixtures were also compared with AN/nitromethane and AN/diesel fuel oil, obtained from an earlier investigation. Thermograms for the mixtures, as well as individual constituents, were compared to better understand how sample thermal signature changes with mixture composition. This is the first step in development of a thermal-signature database, to be used along with other signature databases, to improve identification of energetic substances of unknown composition. The results indicated that each individual thermal signature was associated unambiguously with a particular mixture composition. The signature features of a particular mixture were shaped by the individual constituent signatures. It was also uncovered that the baseline signature was modified after an experiment due to coating of unreacted residue on the substrate surface and a change in the reactor sphere oxide layer. Thus, care was required to pre-oxidize the sphere prior to an experiment. A minimum sample mass (which was dependent on composition) was required to detect the signature characteristics. Increased laser power served to magnify signal strength while preserving the signature features. For the mixtures examined, the thermal

  13. Cubic Bezier Curve Approach for Automated Offline Signature Verification with Intrusion Identification

    Directory of Open Access Journals (Sweden)

    Arun Vijayaragavan

    2014-01-01

    Full Text Available Authentication is a process of identifying person’s rights over a system. Many authentication types are used in various systems, wherein biometrics authentication systems are of a special concern. Signature verification is a basic biometric authentication technique used widely. The signature matching algorithm uses image correlation and graph matching technique which provides false rejection or acceptance. We proposed a model to compare knowledge from signature. Intrusion in the signature repository system results in copy of the signature that leads to false acceptance. Our approach uses a Bezier curve algorithm to identify the curve points and uses the behaviors of the signature for verification. An analyzing mobile agent is used to identify the input signature parameters and compare them with reference signature repository. It identifies duplication of signature over intrusion and rejects it. Experiments are conducted on a database with thousands of signature images from various sources and the results are favorable.

  14. 27 CFR 70.52 - Signature presumed authentic.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false Signature presumed authentic. 70.52 Section 70.52 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE... Collection of Excise and Special (Occupational) Tax Collection-General Provisions § 70.52 Signature presumed...

  15. 13 CFR 134.209 - Requirement of signature.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Requirement of signature. 134.209 Section 134.209 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION RULES OF PROCEDURE GOVERNING... of signature. Every written submission to OHA, other than evidence, must be signed by the party...

  16. Radar Signature Calculation Facility

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: The calculation, analysis, and visualization of the spatially extended radar signatures of complex objects such as ships in a sea multipath environment and...

  17. Uncertainty in hydrological signatures for gauged and ungauged catchments

    Science.gov (United States)

    Westerberg, Ida K.; Wagener, Thorsten; Coxon, Gemma; McMillan, Hilary K.; Castellarin, Attilio; Montanari, Alberto; Freer, Jim

    2016-03-01

    Reliable information about hydrological behavior is needed for water-resource management and scientific investigations. Hydrological signatures quantify catchment behavior as index values, and can be predicted for ungauged catchments using a regionalization procedure. The prediction reliability is affected by data uncertainties for the gauged catchments used in prediction and by uncertainties in the regionalization procedure. We quantified signature uncertainty stemming from discharge data uncertainty for 43 UK catchments and propagated these uncertainties in signature regionalization, while accounting for regionalization uncertainty with a weighted-pooling-group approach. Discharge uncertainty was estimated using Monte Carlo sampling of multiple feasible rating curves. For each sampled rating curve, a discharge time series was calculated and used in deriving the gauged signature uncertainty distribution. We found that the gauged uncertainty varied with signature type, local measurement conditions and catchment behavior, with the highest uncertainties (median relative uncertainty ±30-40% across all catchments) for signatures measuring high- and low-flow magnitude and dynamics. Our regionalization method allowed assessing the role and relative magnitudes of the gauged and regionalized uncertainty sources in shaping the signature uncertainty distributions predicted for catchments treated as ungauged. We found that (1) if the gauged uncertainties were neglected there was a clear risk of overconditioning the regionalization inference, e.g., by attributing catchment differences resulting from gauged uncertainty to differences in catchment behavior, and (2) uncertainty in the regionalization results was lower for signatures measuring flow distribution (e.g., mean flow) than flow dynamics (e.g., autocorrelation), and for average flows (and then high flows) compared to low flows.

  18. ADAGE signature analysis: differential expression analysis with data-defined gene sets.

    Science.gov (United States)

    Tan, Jie; Huyck, Matthew; Hu, Dongbo; Zelaya, René A; Hogan, Deborah A; Greene, Casey S

    2017-11-22

    Gene set enrichment analysis and overrepresentation analyses are commonly used methods to determine the biological processes affected by a differential expression experiment. This approach requires biologically relevant gene sets, which are currently curated manually, limiting their availability and accuracy in many organisms without extensively curated resources. New feature learning approaches can now be paired with existing data collections to directly extract functional gene sets from big data. Here we introduce a method to identify perturbed processes. In contrast with methods that use curated gene sets, this approach uses signatures extracted from public expression data. We first extract expression signatures from public data using ADAGE, a neural network-based feature extraction approach. We next identify signatures that are differentially active under a given treatment. Our results demonstrate that these signatures represent biological processes that are perturbed by the experiment. Because these signatures are directly learned from data without supervision, they can identify uncurated or novel biological processes. We implemented ADAGE signature analysis for the bacterial pathogen Pseudomonas aeruginosa. For the convenience of different user groups, we implemented both an R package (ADAGEpath) and a web server ( http://adage.greenelab.com ) to run these analyses. Both are open-source to allow easy expansion to other organisms or signature generation methods. We applied ADAGE signature analysis to an example dataset in which wild-type and ∆anr mutant cells were grown as biofilms on the Cystic Fibrosis genotype bronchial epithelial cells. We mapped active signatures in the dataset to KEGG pathways and compared with pathways identified using GSEA. The two approaches generally return consistent results; however, ADAGE signature analysis also identified a signature that revealed the molecularly supported link between the MexT regulon and Anr. We designed

  19. Internally displaced "victims of armed conflict" in Colombia: the trajectory and trauma signature of forced migration.

    Science.gov (United States)

    Shultz, James M; Garfin, Dana Rose; Espinel, Zelde; Araya, Ricardo; Oquendo, Maria A; Wainberg, Milton L; Chaskel, Roberto; Gaviria, Silvia L; Ordóñez, Anna E; Espinola, Maria; Wilson, Fiona E; Muñoz García, Natalia; Gómez Ceballos, Angela Milena; Garcia-Barcena, Yanira; Verdeli, Helen; Neria, Yuval

    2014-10-01

    While conflict-induced forced migration is a global phenomenon, the situation in Colombia, South America, is distinctive. Colombia has ranked either first or second in the number of internally displaced persons for 10 years, a consequence of decades of armed conflict compounded by high prevalence of drug trafficking. The displacement trajectory for displaced persons in Colombia proceeds through a sequence of stages: (1) pre-expulsion threats and vulnerability, (2) expulsion, (3) migration, (4) initial adaptation to relocation, (5) protracted resettlement (the end point for most forced migrants), and, rarely, (6) return to the community of origin. Trauma signature analysis, an evidence-based method that elucidates the physical and psychological consequences associated with exposures to harm and loss during disasters and complex emergencies, was used to identify the psychological risk factors and potentially traumatic events experienced by conflict-displaced persons in Colombia, stratified across the phases of displacement. Trauma and loss are experienced differentially throughout the pathway of displacement.

  20. Articulation of young adult readers in a digitalized and medialized landscape of texts

    DEFF Research Database (Denmark)

    Henkel, Ayoe Qvist

    The digital turn does not bring about changes in young adultliterature considered as aesthetic artifacts and literary works but it changes the perception and reception of the reader. Digital young adult literature is increasingly multimodal, including interactivity and the integration of elements...... of game aesthetics. The way the young person is articulated within such texts must be presumed to be new, and the pivotal point of this paper will be to explore how the young adult reader is thematized in content, form, and medium in digital young adult literature....

  1. Arnold Roosendaal, Digital Personae and Profiles in Law. Protecting Individuals’ Rights in Online Contexts [Bespreking van: Digital Personae and Profiles in Law

    NARCIS (Netherlands)

    Lodder, A.R.

    2014-01-01

    Op 21 mei 2013 verdedigde Arnold Roosendaal aan de Universiteit Tilburg zijn proefschrift Digital Personae and Profiles in Law, promotoren waren Ronald Leenes en Bert-Jaap Koops. In de openingszin wordt het belang van het proefschrift direct duidelijk: “Personal data is the new oil of the Internet

  2. Advanced Missile Signature Center

    Data.gov (United States)

    Federal Laboratory Consortium — The Advanced Missile Signature Center (AMSC) is a national facility supporting the Missile Defense Agency (MDA) and other DoD programs and customers with analysis,...

  3. 25 CFR 117.33 - Signature of illiterates.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Signature of illiterates. 117.33 Section 117.33 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR FINANCIAL ACTIVITIES DEPOSIT AND EXPENDITURE OF... Signature of illiterates. An Indian who cannot write shall be required to endorse checks payable to his...

  4. 12 CFR 350.6 - Signature and attestation.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Signature and attestation. 350.6 Section 350.6 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY DISCLOSURE OF FINANCIAL AND OTHER INFORMATION BY FDIC-INSURED STATE NONMEMBER BANKS § 350.6 Signature and...

  5. Quantum dual signature scheme based on coherent states with entanglement swapping

    International Nuclear Information System (INIS)

    Liu Jia-Li; Shi Rong-Hua; Shi Jin-Jing; Lv Ge-Li; Guo Ying

    2016-01-01

    A novel quantum dual signature scheme, which combines two signed messages expected to be sent to two diverse receivers Bob and Charlie, is designed by applying entanglement swapping with coherent states. The signatory Alice signs two different messages with unitary operations (corresponding to the secret keys) and applies entanglement swapping to generate a quantum dual signature. The dual signature is firstly sent to the verifier Bob who extracts and verifies the signature of one message and transmits the rest of the dual signature to the verifier Charlie who verifies the signature of the other message. The transmission of the dual signature is realized with quantum teleportation of coherent states. The analysis shows that the security of secret keys and the security criteria of the signature protocol can be greatly guaranteed. An extensional multi-party quantum dual signature scheme which considers the case with more than three participants is also proposed in this paper and this scheme can remain secure. The proposed schemes are completely suited for the quantum communication network including multiple participants and can be applied to the e-commerce system which requires a secure payment among the customer, business and bank. (paper)

  6. Real-Time Capable Micro-Doppler Signature Decomposition of Walking Human Limbs

    OpenAIRE

    Abdulatif, Sherif; Aziz, Fady; Kleiner, Bernhard; Schneider, Urs

    2017-01-01

    Unique micro-Doppler signature ($\\boldsymbol{\\mu}$-D) of a human body motion can be analyzed as the superposition of different body parts $\\boldsymbol{\\mu}$-D signatures. Extraction of human limbs $\\boldsymbol{\\mu}$-D signatures in real-time can be used to detect, classify and track human motion especially for safety application. In this paper, two methods are combined to simulate $\\boldsymbol{\\mu}$-D signatures of a walking human. Furthermore, a novel limbs $\\mu$-D signature time independent...

  7. Digital Storytelling: A Novel Methodology for Sexual Health Promotion

    Science.gov (United States)

    Guse, Kylene; Spagat, Andrea; Hill, Amy; Lira, Andrea; Heathcock, Stephen; Gilliam, Melissa

    2013-01-01

    Digital storytelling draws on the power of narrative for personal and social transformation. This technique has many desirable attributes for sexuality education, including a participatory methodology, provision of a "safe space" to collaboratively address stigmatized topics, and an emphasis on the social and political contexts that…

  8. Sound card based digital correlation detection of weak photoelectrical signals

    International Nuclear Information System (INIS)

    Tang Guanghui; Wang Jiangcheng

    2005-01-01

    A simple and low-cost digital correlation method is proposed to investigate weak photoelectrical signals, using a high-speed photodiode as detector, which is directly connected to a programmably triggered sound card analogue-to-digital converter and a personal computer. Two testing experiments, autocorrelation detection of weak flickering signals from a computer monitor under background of noisy outdoor stray light and cross-correlation measurement of the surface velocity of a motional tape, are performed, showing that the results are reliable and the method is easy to implement

  9. Research on Signature Verification Method Based on Discrete Fréchet Distance

    Science.gov (United States)

    Fang, J. L.; Wu, W.

    2018-05-01

    This paper proposes a multi-feature signature template based on discrete Fréchet distance, which breaks through the limitation of traditional signature authentication using a single signature feature. It solves the online handwritten signature authentication signature global feature template extraction calculation workload, signature feature selection unreasonable problem. In this experiment, the false recognition rate (FAR) and false rejection rate (FRR) of the statistical signature are calculated and the average equal error rate (AEER) is calculated. The feasibility of the combined template scheme is verified by comparing the average equal error rate of the combination template and the original template.

  10. 17 CFR 201.153 - Filing of papers: Signature requirement and effect.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Filing of papers: Signature... COMMISSION RULES OF PRACTICE Rules of Practice General Rules § 201.153 Filing of papers: Signature... telephone number on every filing. (b) Effect of signature. (1) The signature of a counsel or party shall...

  11. A Secure and Efficient Certificateless Short Signature Scheme

    Directory of Open Access Journals (Sweden)

    Lin Cheng

    2013-07-01

    Full Text Available Certificateless public key cryptography combines advantage of traditional public key cryptography and identity-based public key cryptography as it avoids usage of certificates and resolves the key escrow problem. In 2007, Huang et al. classified adversaries against certificateless signatures according to their attack power into normal, strong and super adversaries (ordered by their attack power. In this paper, we propose a new certificateless short signature scheme and prove that it is secure against both of the super type I and the super type II adversaries. Our new scheme not only achieves the strongest security level but also has the shortest signature length (one group element. Compared with the other short certificateless signature schemes which have a similar security level, our new scheme has less operation cost.

  12. An RNA-Based Digital Circulating Tumor Cell Signature Is Predictive of Drug Response and Early Dissemination in Prostate Cancer.

    Science.gov (United States)

    Miyamoto, David T; Lee, Richard J; Kalinich, Mark; LiCausi, Joseph A; Zheng, Yu; Chen, Tianqi; Milner, John D; Emmons, Erin; Ho, Uyen; Broderick, Katherine; Silva, Erin; Javaid, Sarah; Kwan, Tanya Todorova; Hong, Xin; Dahl, Douglas M; McGovern, Francis J; Efstathiou, Jason A; Smith, Matthew R; Sequist, Lecia V; Kapur, Ravi; Wu, Chin-Lee; Stott, Shannon L; Ting, David T; Giobbie-Hurder, Anita; Toner, Mehmet; Maheswaran, Shyamala; Haber, Daniel A

    2018-03-01

    Blood-based biomarkers are critical in metastatic prostate cancer, where characteristic bone metastases are not readily sampled, and they may enable risk stratification in localized disease. We established a sensitive and high-throughput strategy for analyzing prostate circulating tumor cells (CTC) using microfluidic cell enrichment followed by digital quantitation of prostate-derived transcripts. In a prospective study of 27 patients with metastatic castration-resistant prostate cancer treated with first-line abiraterone, pretreatment elevation of the digital CTC M score identifies a high-risk population with poor overall survival (HR = 6.0; P = 0.01) and short radiographic progression-free survival (HR = 3.2; P = 0.046). Expression of HOXB13 in CTCs identifies 6 of 6 patients with ≤12-month survival, with a subset also expressing the ARV7 splice variant. In a second cohort of 34 men with localized prostate cancer, an elevated preoperative CTC L score predicts microscopic dissemination to seminal vesicles and/or lymph nodes ( P digital quantitation of CTC-specific transcripts enables noninvasive monitoring that may guide treatment selection in both metastatic and localized prostate cancer. Significance: There is an unmet need for biomarkers to guide prostate cancer therapies, for curative treatment of localized cancer and for application of molecularly targeted agents in metastatic disease. Digital quantitation of prostate CTC-derived transcripts in blood specimens is predictive of abiraterone response in metastatic cancer and of early dissemination in localized cancer. Cancer Discov; 8(3); 288-303. ©2018 AACR. See related commentary by Heitzer and Speicher, p. 269 This article is highlighted in the In This Issue feature, p. 253 . ©2018 American Association for Cancer Research.

  13. Digital Storytelling – Special issue

    Directory of Open Access Journals (Sweden)

    Yngve Nordkvelle

    2010-11-01

    Full Text Available Since the inception of Seminar.net the phenomenon of Digital Storytelling has often been suggested as a promising genre for teaching and learning in a variety of areas. Academically, the genre has attracted interest from scholars in media studies, political science, social work, health and education. In this issue we have sought attention from a huge number of academically inclined persons who either use the genre to teach with media, for teaching and learning about media, or studying how this specific way of working with media offers new possibilities for the articulation of the voice of the common people.When we invited authors for this special issue we did so expecting – and hoping for – contributions from a wide field of interests. We have landed 11 different manuscripts and have organised them according to a tentative order of themes they address: “Teaching and learning with Digital Storytelling”, “Community building”, “Genres of communication” and “Practical papers”.  Being a journal for lifelong learning, the educational use has gained the most interest. But also emerging new areas of use related to health, leisure, recreation, activism, community building, planning, professional communication, and reflection are reflected in the papers. We think the contributions together support our efforts for building the knowledge about digital storytelling as a genre and its potential in the media society. Scholarly publications in this field are generally mediated on paper. And there has been no shortage of superb exemplars of scholarly work these last couple of years: Story Circle: Digital Storytelling around the World, edited by John Hartley and Kelly McWilliams and Digital Storytelling, Mediatized Stories: Self-representations in New Media, edited by Knut Lundby, as well as a conference report, “Storytelling – Reflections in the Age of Digitalization” edited by Yvonne Gächter, Heike Ortner, Claudia Scwartz, Andreas

  14. Development of a prototype of the tele-localisation system in radiotherapy using personal digital assistant via wireless communication.

    Science.gov (United States)

    Wu, Vincent Wing-Cheung; Tang, Fuk-hay; Cheung, Wai-kwan; Chan, Kit-chi

    2013-02-01

    In localisation of radiotherapy treatment field, the oncologist is present at the simulator to approve treatment details produced by the therapist. Problems may arise if the oncologist is not available and the patient requires urgent treatment. The development of a tele-localisation system is a potential solution, where the oncologist uses a personal digital assistant (PDA) to localise the treatment field on the image sent from the simulator through wireless communication and returns the information to the therapist after his or her approval. Our team developed the first tele-localisation prototype, which consisted of a server workstation (simulator) for the administration of digital imaging and communication in medicine localisation images including viewing and communication with the PDA via a Wi-Fi network; a PDA (oncologist's site) installed with the custom-built programme that synchronises with the server workstation and performs treatment field editing. Trial tests on accuracy and speed of the prototype system were conducted on 30 subjects with the treatment regions covering the neck, skull, chest and pelvis. The average time required in performing the localisation using the PDA was less than 1.5 min, with the blocked field longer than the open field. The transmission speed of the four treatment regions was similar. The average physical distortion of the images was within 4.4% and the accuracy of field size indication was within 5.3%. Compared with the manual method, the tele-localisation system presented with an average deviation of 5.5%. The prototype system fulfilled the planned objectives of tele-localisation procedure with reasonable speed and accuracy. © 2012 The Authors. Journal of Medical Imaging and Radiation Oncology © 2012 The Royal Australian and New Zealand College of Radiologists.

  15. 12 CFR 18.6 - Signature and attestation.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Signature and attestation. 18.6 Section 18.6 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY DISCLOSURE OF FINANCIAL AND OTHER INFORMATION BY NATIONAL BANKS § 18.6 Signature and attestation. A duly authorized officer of the...

  16. Does Social Work Have a Signature Pedagogy?

    Science.gov (United States)

    Earls Larrison, Tara; Korr, Wynne S.

    2013-01-01

    This article contributes to discourse on signature pedagogy by reconceptualizing how our pedagogies are understood and defined for social work education. We critique the view that field education is social work's signature pedagogy and consider what pedagogies are distinct about the teaching and learning of social work. Using Shulman's…

  17. The Mining Minds digital health and wellness framework.

    Science.gov (United States)

    Banos, Oresti; Bilal Amin, Muhammad; Ali Khan, Wajahat; Afzal, Muhammad; Hussain, Maqbool; Kang, Byeong Ho; Lee, Sungyong

    2016-07-15

    The provision of health and wellness care is undergoing an enormous transformation. A key element of this revolution consists in prioritizing prevention and proactivity based on the analysis of people's conducts and the empowerment of individuals in their self-management. Digital technologies are unquestionably destined to be the main engine of this change, with an increasing number of domain-specific applications and devices commercialized every year; however, there is an apparent lack of frameworks capable of orchestrating and intelligently leveraging, all the data, information and knowledge generated through these systems. This work presents Mining Minds, a novel framework that builds on the core ideas of the digital health and wellness paradigms to enable the provision of personalized support. Mining Minds embraces some of the most prominent digital technologies, ranging from Big Data and Cloud Computing to Wearables and Internet of Things, as well as modern concepts and methods, such as context-awareness, knowledge bases or analytics, to holistically and continuously investigate on people's lifestyles and provide a variety of smart coaching and support services. This paper comprehensively describes the efficient and rational combination and interoperation of these technologies and methods through Mining Minds, while meeting the essential requirements posed by a framework for personalized health and wellness support. Moreover, this work presents a realization of the key architectural components of Mining Minds, as well as various exemplary user applications and expert tools to illustrate some of the potential services supported by the proposed framework. Mining Minds constitutes an innovative holistic means to inspect human behavior and provide personalized health and wellness support. The principles behind this framework uncover new research ideas and may serve as a reference for similar initiatives.

  18. Improvement of a Quantum Proxy Blind Signature Scheme

    Science.gov (United States)

    Zhang, Jia-Lei; Zhang, Jian-Zhong; Xie, Shu-Cui

    2018-06-01

    Improvement of a quantum proxy blind signature scheme is proposed in this paper. Six-qubit entangled state functions as quantum channel. In our scheme, a trust party Trent is introduced so as to avoid David's dishonest behavior. The receiver David verifies the signature with the help of Trent in our scheme. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, delegation, signature and verification. Security analysis proves that our scheme has the properties of undeniability, unforgeability, anonymity and can resist some common attacks.

  19. Advanced framework for digital forensic technologies and procedures.

    Science.gov (United States)

    Trček, Denis; Abie, Habtamu; Skomedal, Asmund; Starc, Iztok

    2010-11-01

    Recent trends in global networks are leading toward service-oriented architectures and sensor networks. On one hand of the spectrum, this means deployment of services from numerous providers to form new service composites, and on the other hand this means emergence of Internet of things. Both these kinds belong to a plethora of realms and can be deployed in many ways, which will pose serious problems in cases of abuse. Consequently, both trends increase the need for new approaches to digital forensics that would furnish admissible evidence for litigation. Because technology alone is clearly not sufficient, it has to be adequately supported by appropriate investigative procedures, which have yet become a subject of an international consensus. This paper therefore provides appropriate a holistic framework to foster an internationally agreed upon approach in digital forensics along with necessary improvements. It is based on a top-down approach, starting with legal, continuing with organizational, and ending with technical issues. More precisely, the paper presents a new architectural technological solution that addresses the core forensic principles at its roots. It deploys so-called leveled message authentication codes and digital signatures to provide data integrity in a way that significantly eases forensic investigations into attacked systems in their operational state. Further, using a top-down approach a conceptual framework for forensics readiness is given, which provides levels of abstraction and procedural guides embellished with a process model that allow investigators perform routine investigations, without becoming overwhelmed by low-level details. As low-level details should not be left out, the framework is further evaluated to include these details to allow organizations to configure their systems for proactive collection and preservation of potential digital evidence in a structured manner. The main reason behind this approach is to stimulate efforts

  20. Digital broadcasting

    International Nuclear Information System (INIS)

    Park, Ji Hyeong

    1999-06-01

    This book contains twelve chapters, which deals with digitization of broadcast signal such as digital open, digitization of video signal and sound signal digitization of broadcasting equipment like DTPP and digital VTR, digitization of equipment to transmit such as digital STL, digital FPU and digital SNG, digitization of transmit about digital TV transmit and radio transmit, digital broadcasting system on necessity and advantage, digital broadcasting system abroad and Korea, digital broadcasting of outline, advantage of digital TV, ripple effect of digital broadcasting and consideration of digital broadcasting, ground wave digital broadcasting of DVB-T in Europe DTV in U.S.A and ISDB-T in Japan, HDTV broadcasting, satellite broadcasting, digital TV broadcasting in Korea, digital radio broadcasting and new broadcasting service.