Damgård, Ivan Bjerre; Mikkelsen, Gert Læssøe
and the PC are not both corrupted at the same time. In other words, our solution cannot be broken by phising or key-logging via the PC. The protocol allows for mobile units with very small computing power by securely outsourcing computation to the PC and also allows usage of any PC that can communicate...... digital signatures on behalf of the user. This protocol is proactively UC-secure assuming at most one player is corrupted in every operational phase. In more practical terms, this means that one can securely sign using terminals (PC’s) that are not necessarily trusted, as long as the mobile unit...
The purpose of this study was to assess the advantages and disadvantages of using digital signatures to assist the Arizona Department of Transportation in conducting business. The Department is evaluating the potential of performing more electronic t...
Yin, Hua-Lei; Fu, Yao; Chen, Zeng-Bing
Guaranteeing nonrepudiation, unforgeability as well as transferability of a signature is one of the most vital safeguards in today's e-commerce era. Based on fundamental laws of quantum physics, quantum digital signature (QDS) aims to provide information-theoretic security for this cryptographic task. However, up to date, the previously proposed QDS protocols are impractical due to various challenging problems and most importantly, the requirement of authenticated (secure) quantum channels between participants. Here, we present the first quantum digital signature protocol that removes the assumption of authenticated quantum channels while remaining secure against the collective attacks. Besides, our QDS protocol can be practically implemented over more than 100 km under current mature technology as used in quantum key distribution.
Full Text Available Signature can be defined as a person’s name or special signs that he/she writes when he/she wants to indicate he/she wrote or confirm that writing. A person signs many times in his/her life. A person’s signature that is used for thousands of times for many things from formal documents to exams has importance for that person. Especially, signing in legal operations is an operation that can build important results. If a person’s signature is imitated by another person, he/she can become beholden, donate his/her whole wealth, commits offences or do some judicial operations. Today, because many operations can be done with digital environments and internet, signature operation that provides identity validation must also be carried to digital environment. In this paper digital signature concept that is approved for this reason and its situation in international areas and Turkish laws are investigated.
Ibraimi, L.; Asim, Muhammad; Petkovic, M.
An attribute-based digital signature system comprises a signature generation unit (1) for signing a message (m) by generating a signature (s) based on a user secret key (SK) associated with a set of user attributes, wherein the signature generation unit (1) is arranged for combining the user secret
S. N. Kyazhin
Digital signature schemes with additional functionality (an undeniable signature, a signature of the designated confirmee, a signature blind, a group signature, a signature of the additional protection) and examples of their application are considered. These schemes are more practical, effective and useful than schemes of ordinary digital signature.
Signature can be defined as a person’s name or special signs that he/she writes when he/she wants to indicate he/she wrote or confirm that writing. A person signs many times in his/her life. A person’s signature that is used for thousands of times for many things from formal documents to exams has importance for that person. Especially, signing in legal operations is an operation that can build important results. If a person’s signature is imitated by another person, he/she can be...
Puthoor, Ittoop Vergheese; Amiri, Ryan; Wallden, Petros; Curty, Marcos; Andersson, Erika
Digital signatures play an important role in software distribution, modern communication, and financial transactions, where it is important to detect forgery and tampering. Signatures are a cryptographic technique for validating the authenticity and integrity of messages, software, or digital documents. The security of currently used classical schemes relies on computational assumptions. Quantum digital signatures (QDS), on the other hand, provide information-theoretic security based on the laws of quantum physics. Recent work on QDS Amiri et al., Phys. Rev. A 93, 032325 (2016);, 10.1103/PhysRevA.93.032325 Yin, Fu, and Zeng-Bing, Phys. Rev. A 93, 032316 (2016), 10.1103/PhysRevA.93.032316 shows that such schemes do not require trusted quantum channels and are unconditionally secure against general coherent attacks. However, in practical QDS, just as in quantum key distribution (QKD), the detectors can be subjected to side-channel attacks, which can make the actual implementations insecure. Motivated by the idea of measurement-device-independent quantum key distribution (MDI-QKD), we present a measurement-device-independent QDS (MDI-QDS) scheme, which is secure against all detector side-channel attacks. Based on the rapid development of practical MDI-QKD, our MDI-QDS protocol could also be experimentally implemented, since it requires a similar experimental setup.
Simanjuntak, Martin Dennain
Desperaty need a securiry system in the exchange of information via computer media, so that information can not be accessed by unauthorized parties. One of the security system is to use a system of digital signatures as a means of authenticating the authenticity of digital document that are exchanged. By using a digital a digital signature system is undeniable, the security system can be generated digital document exchange, where the system is free from the from of rejection...
Full Text Available As special types of factorization of finite groups, logarithmic signature and cover have been used as the main components of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2, and MST3. Recently, Svaba et. al proposed a revised MST3 encryption scheme with greater security. Meanwhile, they put forward an idea of constructing signature schemes on the basis of logarithmic signatures and random covers. In this paper, we firstly design a secure digital signature scheme based on logarithmic signatures and random covers. In order to complete the task, we devise a new encryption scheme based on MST3 cryptosystems.
This article proposes the curricular integration of digital "testimonio" as a "signature" pedagogy in Latin@ Studies. The "testimonio" tradition of urgent narratives and the creative multimedia languages of digital storytelling--text, voice, image, and sound--invite historically marginalized subjects, especially younger generations, to author and…
Full Text Available The Indonesian legislature has enacted the Information and Electronic Transaction Bill (the Bill in 2003, in which digital signature as a technology specific electronic (e commerce has been promoted. The promotion of digital signature is still problematic, since there is an uncertainty whether Indonesia can develop well a required viable technology of digital signature. Moreover, there is a gap between the actual use of digital signature and the projections of future utilization of digital signature by interested parties on e-commerce. This paper will discuss the reason of the Indonesian legislature promotes digital signature. It will then analyse the gap between the actual use of digital signature and the projections of future utilization of digital signature by interested parties on e-commerce. This paper will finally argue whether the promotion of digital signature of the Bill is useful for the growth of e-commerce in Indonesia.
Time and frequency data are often transmitted over public packet-switched networks, and the use of this mode of distribution is likely to increase in the near future as high-speed logical circuits transmitted via networks replace point-to-point physical circuits. ALthough these networks have many technical advantages, they are susceptible to evesdropping, spoofing, and the alteration of messages enroute using techniques that are relatively simple to implement and quite difficult to detect. I will discuss a number of solutions to these problems, including the authentication mechanism used in the Network Time Protocol (NTP) and the more general technique of signing time-stamps using public key cryptography. This public key method can also be used to implement the digital analog of a Notary Public, and I will discuss how such a system could be realized on a public network such as the Internet.
Gauravaram, Praveen; Knudsen, Lars Ramkilde
At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the security of digital signature algorithms based on these constructions. They showed that the security of signature schemes based on the two randomized hash function modes relies on properties similar...... functions, such as for the Davies-Meyer construction used in the popular hash functions such as MD5 designed by Rivest and the SHA family of hash functions designed by the National Security Agency (NSA), USA and published by NIST in the Federal Information Processing Standards (FIPS). We show an online...... 800-106. We discuss some important applications of our attacks and discuss their applicability on signature schemes based on hash functions with ‘built-in’ randomization. Finally, we compare our attacks on randomize-hash-then-sign schemes with the generic forgery attacks on the standard hash...
Shang, Tao; Lei, Qi; Liu, Jianwei
The goal of this work is to provide a general security analysis tool, namely, the quantum random oracle (QRO), for facilitating the security analysis of quantum cryptographic protocols, especially protocols based on quantum one-way function. QRO is used to model quantum one-way function and different queries to QRO are used to model quantum attacks. A typical application of quantum one-way function is the quantum digital signature, whose progress has been hampered by the slow pace of the experimental realization. Alternatively, we use the QRO model to analyze the provable security of a quantum digital signature scheme and elaborate the analysis procedure. The QRO model differs from the prior quantum-accessible random oracle in that it can output quantum states as public keys and give responses to different queries. This tool can be a test bed for the cryptanalysis of more quantum cryptographic protocols based on the quantum one-way function.
Price, Mark; Woytowich, Jason; Carlson, Marc
The main goal of the Soldier Flexible Personal Digital Assistant Program was to develop prototypes of a novel flexible display technology device for demonstration in a laboratory setting and use in Future Force Warrior (FFW) demonstrations...
Zuckerman, Alan E.; Moon, Kenneth A.; Eaddy, Kenneth
Biometric authentication systems can be used to control digital signature of medical documents. This pilot study evaluated the use of two different fingerprint technologies and one iris technology to control creation of digital signatures on a central server using public private key pairs stored on the server. Documents and signatures were stored in XML for portability. Key pairs and authentication certificates were generated during biometric enrollment. Usability and user acceptance were gua...
... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Signature of persons unable to sign... POPULATION SCHEDULES § 80.4 Signature of persons unable to sign their name. A person requesting Census information who is unable to sign his or her name shall make an “X” mark where signature is required, and the...
Collins, Robert J.; Fujiwara, Mikio; Amiri, Ryan; Honjo, Toshimori; Shimizu, Kaoru; Tamaki, Kiyoshi; Takeoka, Masahiro; Andersson, Erika; Buller, Gerald S.; Sasaki, Masahide
The security of electronic communications is a topic that has gained noteworthy public interest in recent years. As a result, there is an increasing public recognition of the existence and importance of mathematically based approaches to digital security. Many of these implement digital signatures to ensure that a malicious party has not tampered with the message in transit, that a legitimate receiver can validate the identity of the signer and that messages are transferable. The security of most digital signature schemes relies on the assumed computational difficulty of solving certain mathematical problems. However, reports in the media have shown that certain implementations of such signature schemes are vulnerable to algorithmic breakthroughs and emerging quantum processing technologies. Indeed, even without quantum processors, the possibility remains that classical algorithmic breakthroughs will render these schemes insecure. There is ongoing research into information-theoretically secure signature schemes, where the security is guaranteed against an attacker with arbitrary computational resources. One such approach is quantum digital signatures. Quantum signature schemes can be made information-theoretically secure based on the laws of quantum mechanics while comparable classical protocols require additional resources such as anonymous broadcast and/or a trusted authority. Previously, most early demonstrations of quantum digital signatures required dedicated single-purpose hardware and operated over restricted ranges in a laboratory environment. Here, for the first time, we present a demonstration of quantum digital signatures conducted over several kilometers of installed optical fiber. The system reported here operates at a higher signature generation rate than previous fiber systems.
Pados, Dimitiris A
This report covers the research performed to create and develop a digital signature design analysis and development methodology that will support robust multi-user communications in rapidly changing environments...
Azzini, Antonia; Marrara, Stefania; Jensen, Meiko
This paper investigates the interplay between similarity-based SOAP message aggregation and digital signature application. An overview on the approaches resulting from the different orders for the tasks of signature application, verification, similarity aggregation and splitting is provided....... Depending on the intersection between similarity-aggregated and signed SOAP message parts, the paper discusses three different cases of signature application, and sketches their applicability and performance implications....
Full Text Available I cryptanalyze the pairing-free digital signature scheme of Islam et al. which is proven secure against “adaptive chosen message attacks”. I introduce this type of forgery to analyze their scheme. Furthermore, I comment on general security issues that should be considered when making improvements on their scheme. My security analysis is also applicable to other digital signatures designed in a similar manner.
Zuckerman, Alan E.; Moon, Kenneth A.; Eaddy, Kenneth
Biometric authentication systems can be used to control digital signature of medical documents. This pilot study evaluated the use of two different fingerprint technologies and one iris technology to control creation of digital signatures on a central server using public private key pairs stored on the server. Documents and signatures were stored in XML for portability. Key pairs and authentication certificates were generated during biometric enrollment. Usability and user acceptance were guarded and limitations of biometric systems prevented use of the system with all test subjects. The system detected alternations in the data content and provided future signer re-authentication for non-repudiation.
Collins, Robert J.; Donaldon, Ross J.; Dunjko, Vedran; Wallden, Petros; Clarke, Patrick J.; Andersson, Erika; Jeffers, John; Buller, Gerald S.
Classical digital signatures are commonly used in e-mail, electronic financial transactions and other forms of electronic communications to ensure that messages have not been tampered with in transit, and that messages are transferrable. The security of commonly used classical digital signature schemes relies on the computational difficulty of inverting certain mathematical functions. However, at present, there are no such one-way functions which have been proven to be hard to invert. With enough computational resources certain implementations of classical public key cryptosystems can be, and have been, broken with current technology. It is nevertheless possible to construct information-theoretically secure signature schemes, including quantum digital signature schemes. Quantum signature schemes can be made information theoretically secure based on the laws of quantum mechanics, while classical comparable protocols require additional resources such as secret communication and a trusted authority. Early demonstrations of quantum digital signatures required quantum memory, rendering them impractical at present. Our present implementation is based on a protocol that does not require quantum memory. It also uses the new technique of unambiguous quantum state elimination, Here we report experimental results for a test-bed system, recorded with a variety of different operating parameters, along with a discussion of aspects of the system security.
Full Text Available Considering the security of both the customers’ hosts and the eShops’ servers, we introduce the idea of a key-insulated undetachable digital signature, enabling mobile agents to generate undetachable digital signatures on remote hosts with the key-insulated property of the original signer’s signing key. From the theoretical perspective, we provide the formal definition and security notion of a key-insulated undetachable digital signature. From the practical perspective, we propose a concrete scheme to secure mobile agents in electronic commerce. The scheme is mainly focused on protecting the signing key from leakage and preventing the misuse of the signature algorithm on malicious servers. Agents do not carry the signing key when they generate digital signatures on behalf of the original signer, so the key is protected on remote servers. Furthermore, if a hacker gains the signing key of the original signer, the hacker is still unable to forge a signature for any time period other than the key being accessed. In addition, the encrypted function is combined with the original signer’s requirement to prevent the misuse of signing algorithm. The scheme is constructed on gap Diffie–Hellman groups with provable security, and the performance testing indicates that the scheme is efficient.
Voiculescu Madalina Irena
Full Text Available Article refers to significance and the digital signature in electronic commerce. Internet and electronic commerce open up many new opportunities for the consumer, yet, the security (or perceived lack of security of exchanging personal and financial data
Kutty, Cheeniyil L.; Prabhakaran, Jayasree K.
In today's cost-conscious business climate, marketing and customer service decision makers are increasingly concerned with how to increase customer response and retention rates. Companies spend large amounts of money on Customer Relationship Management (CRM) solutions and data acquisition but they don't know how to use the information stored in these systems to improve the effectiveness of their direct marketing campaigns. By leveraging the customer information they already have, companies can create personalized, printed direct mail programs that generate high response rates, greater returns, and stronger customer loyalty, while gaining a significant edge over their competitors. To reach the promised land of one-to-one direct marketing (personalized direct marketing - PDM), companies need an end-to-end solution for creating, managing, printing, and distributing personalized direct mail "on demand." Having access to digital printing is just one piece of the solution. A more complete approach includes leveraging personalization technology into a useful direct marketing tool that provides true one-to-one marketing, allowing variable images and text in a personalized direct mail. This paper discusses integration of CRM with a Print-on-Demand solution so as to create truly personalized printed marketing campaigns for one or many individuals based on the profile information, preferences and purchase history stored in the CRM.
Kircos, L.; Holt, W.; Khademi, J.
Technique have been developed and implemented on a personal computer (PC)-based digital workstation to accomplish temporal digital subtraction radiography (TDSR). TDSR is useful in recording radiologic change over time. Thus, this technique is useful not only for monitoring chronic disease processes but also for monitoring the temporal course of interventional therapies. A PC-based digital workstation was developed on a PC386 platform with add-in hardware and software. Image acquisition, storage, and processing was accomplished using 512 x 512 x 8- or 12-bit frame grabber. Software and hardware were developed to accomplish image orientation, registration, gray scale compensation, subtraction, and enhancement. Temporal radiographs of the jaws were made in a fixed and reproducible orientation between the x-ray source and image receptor enabling TDSR. Temporal changes secondary to chronic periodontal disease, osseointegration of endosseous implants, and wound healing were demonstrated. Use of TDSR for chest imaging was also demonstrated with identification of small, subtle focal masses that were not apparent with routine viewing. The large amount of radiologic information in images of the jaws and chest may obfuscate subtle changes that TDSR seems to identify. TDSR appears to be useful as a tool to record temporal and subtle changes in radiologic images
Usachev, Denis; Khusnutdinov, Azat; Mazzara, Manuel; Khan, Adil; Panchenko, Ivan
Nowadays Digital Personal Assistants (DPA) become more and more popular. DPAs help to increase quality of life especially for elderly or disabled people. In this paper we develop an open source DPA and smart home system as a 3-rd party extension to show the functionality of the assistant. The system is designed to use the DPA as a learning platform for engineers to provide them with the opportunity to create and test their own hypothesis. The DPA is able to recognize users' commands in natura...
Full Text Available Modern medical documentation appears most often in an online form which requires some digital methods to ensure its confidentiality, integrity and authenticity. The document authenticity may be secured with the use of a signature. A classical handwritten signature is directly related to its owner by his/her psychomotor character traits. Such a signature is also connected with the material it is written on, and a writing tool. Because of these properties, a handwritten signature reflects certain close material bonds between the owner and the document. In case of modern digital signatures, the document authentication has a mathematical nature. The verification of the authenticity becomes the verification of a key instead of a human. Since 1994 it has been known that classical digital signature algorithms may not be safe because of the Shor’s factorization algorithm. To implement the modern authenticity protection of medical data, some new types of algorithms should be used. One of the groups of such algorithms is based on the quantum computations. In this paper, the analysis of the current knowledge status of Quantum Digital Signature protocols, with its basic principles, phases and common elements such as transmission, comparison and encryption, was outlined. Some of the most promising protocols for signing digital medical documentation, that fulfill the requirements for QDS, were also briefly described. We showed that, a QDS protocol with QKD components requires the equipment similar to the equipment used for a QKD, for its implementation, which is already commercially available. If it is properly implemented, it provides the shortest lifetime of qubits in comparison to other protocols. It can be used not only to sign classical messages but probably it could be well adopted to implement unconditionally safe protection of medical documentation in the nearest future, as well.
...-01] Announcing Approval of Federal Information Processing Standard 186-4, Digital Signature Standard.... SUMMARY: This notice announces the Secretary of Commerce's approval of Federal Information Processing... changes are effective on July 19, 2013. FOR FURTHER INFORMATION CONTACT: Elaine Barker (301) 975-2911...
Maxim E. SLOBODYANYUK
In the article considered a model of informational system for freight insurance automation based on digital signature, showed architecture, macro flowchart of information flow in model, components (modules) and their functions. Described calculation method of costs on interactive cargo insurance via proposed system, represented main characteristics and options of existing transport management systems, conceptual cost models.
Maxim E. SLOBODYANYUK
Full Text Available In the article considered a model of informational system for freight insurance automation based on digital signature, showed architecture, macro flowchart of information flow in model, components (modules and their functions. Described calculation method of costs on interactive cargo insurance via proposed system, represented main characteristics and options of existing transport management systems, conceptual cost models.
Fatich Fazlur Rochman
Full Text Available Universitas Airlangga students often find it difficult to verify the mark that came out in the Kartu Hasil Studi (KHS is called Study Result Card or courses taken in the Kartu Rencana Studi (KRS is called Study Plan Card, if there are changes to the data on the system used Universitas Airlangga. This complicated KRS and KHS verification process happened because the KRS and KHS documents that owned by student is easier to counterfeit than the data in the system. Implementation digital signature and QR Code technology as a solution that can prove the validity of KRS or KHS. The KRS and KHS validation system developed by Digital Signature and QR Code. QR Code is a type of matrix code that was developed as a code that allows its contents to be decoded at high speed while the Digital Signature has a function as a marker on the data to ensure that the data is the original data. The verification process was divided into two types are reading the Digital Signature and printing document that works by scanning the data from QR Code. The application of the system is carried out were the addition of the QR Code on KRS and KHS, required a readiness of human resources.
Mohammed Issam Younis
Full Text Available With the development of computer architecture and its technologies in recent years, applications like e-commerce, e-government, e-governance and e-finance are widely used, and they act as active research areas. In addition, in order to increase the quality and quantity of the ordinary everyday transactions, it is desired to migrate from the paper-based environment to a digital-based computerized environment. Such migration increases efficiency, saves time, eliminates paperwork, increases safety and reduces the cost in an organization. Digital signatures are playing an essential role in many electronic and automatic based systems and facilitate this migration. The digital signatures are used to provide many services and solutions that would not have been possible by the conventional hand-written signature. In the educational environment, the process of issuing the graduation certificates can no longer be restricted to the traditional methods. Hence, a computerized system for issuing certificates of graduation in an electronic form is needed and desired. This paper proposes a Graduation Certificates Issuing System (GCIS based on digital signature technology. In doing so, this research highlights the state-of-the-art and the art-of-the-practice for some existing digital signature-based systems in the literatures. In addition, eight intertwined elected services are identified, namely: message authentication, entity authentication, integrity, non-repudiation, time stamping, distinguished signing authorities, delegating signing capability and supporting workflow systems. Moreover, this research examines nine existing systems, showing their merits and demerits in terms of these elected services. Furthermore, the research describes the architectural design using the Unified Modeling Language (UML and provides the concrete implementation of the proposed GCIS. The GCIS is implemented using Visual Basic.Net programming language and SQL Server database
Full Text Available This article discusses the problem of user identification and psychophysiological state assessment while writing a signature using a graphics tablet. The solution of the problem includes the creation of templates containing handwriting signature features simultaneously with the hidden registration of physiological parameters of a person being tested. Heart rate variability description in the different time points is used as a physiological parameter. As a result, a signature template is automatically generated for psychophysiological states of an identified person. The problem of user identification and psychophysiological state assessment is solved depending on the registered value of a physiological parameter.
Escobar, P P; Formica, M
The growth of telemedical applications and electronic transactions in health environments is paced by the constant technology evolution. This implies a big cultural change in traditional medicine and in hospital information systems' users which arrival is delayed, basically, by the lack of solid laws and a well defined role-based infrastructure. The use of digital signature as a mean of identification, authentication, confidentiality and non-repudiation is the most suitable tool for assuring the electronic transactions and patient's data protection. The implementation of a Public Key Infrastructure (PKI) in health environment allows for authentication, encryption and use of digital signature for assuring confidentiality and control of the movement of sensitive information. This work defines the minimum technological, legal and procedural basis for a successful PKI implementation and establishes the roles for the different actors in the chain of confidence in the public health environment of Argentine
Full Text Available The Elliptic Curve Digital Signature Algorithm(ECDSA is the analog to the Digital Signature Algorithm(DSA. Based on the elliptic curve, which uses a small key compared to the others public-key algorithms, ECDSA is the most suitable scheme for environments where processor power and storage are limited. This paper focuses on the hardware implementation of the ECDSA over elliptic curveswith the 163-bit key length recommended by the NIST (National Institute of Standards and Technology. It offers two services: signature generation and signature verification. The proposed processor integrates an ECC IP, a Secure Hash Standard 2 IP (SHA-2 Ip and Random Number Generator IP (RNG IP. Thus, all IPs will be optimized, and different types of RNG will be implemented in order to choose the most appropriate one. A co-simulation was done to verify the ECDSA processor using MATLAB Software. All modules were implemented on a Xilinx Virtex 5 ML 50 FPGA platform; they require respectively 9670 slices, 2530 slices and 18,504 slices. FPGA implementations represent generally the first step for obtaining faster ASIC implementations. Further, the proposed design was also implemented on an ASIC CMOS 45-nm technology; it requires a 0.257 mm2 area cell achieving a maximum frequency of 532 MHz and consumes 63.444 (mW. Furthermore, in this paper, we analyze the security of our proposed ECDSA processor against the no correctness check for input points and restart attacks.
Full Text Available With the practical implementation of continuous-variable quantum cryptographic protocols, security problems resulting from measurement-device loopholes are being given increasing attention. At present, research on measurement-device independency analysis is limited in quantum key distribution protocols, while there exist different security problems for different protocols. Considering the importance of quantum digital signature in quantum cryptography, in this paper, we attempt to analyze the measurement-device independency of continuous-variable quantum digital signature, especially continuous-variable quantum homomorphic signature. Firstly, we calculate the upper bound of the error rate of a protocol. If it is negligible on condition that all measurement devices are untrusted, the protocol is deemed to be measurement-device-independent. Then, we simplify the calculation by using the characteristics of continuous variables and prove the measurement-device independency of the protocol according to the calculation result. In addition, the proposed analysis method can be extended to other quantum cryptographic protocols besides continuous-variable quantum homomorphic signature.
Sampson, James B; Boynton, Angela C; Mitchell, K. B; Magnifico, Dennis S; DuPont, Frederick J
The U.S. Army Natick Soldier Research, Development and Engineering Center and U.S. Army Research Laboratory, Human Research and Engineering Directorate conducted an evaluation of a Soldier Flexible Display Personal Digital Assistant...
Conrado, C.; Petkovic, M.; Veen, van der M.; Velde, van der W.H.
This paper describes a system which allows controlled distribution of personal digital content by users. The system extends an existing Digital Rights Management system for the protection of commercial copyrighted content by essentially allowing users to become content providers. This fact, however,
Video demonstrating the PCM (version year 2007) in the context of the Digital Cinema pilot. Elaborated for a eLearning Seminar within the International Master on Communication and Education (Autonomous University of Barcelona, academic year 2008)
Gregory J Metzger
Full Text Available Molecular classification of diseases based on multigene expression signatures is increasingly used for diagnosis, prognosis, and prediction of response to therapy. Immunohistochemistry (IHC is an optimal method for validating expression signatures obtained using high-throughput genomics techniques since IHC allows a pathologist to examine gene expression at the protein level within the context of histologically interpretable tissue sections. Additionally, validated IHC assays may be readily implemented as clinical tests since IHC is performed on routinely processed clinical tissue samples. However, methods have not been available for automated n-gene expression profiling at the protein level using IHC data. We have developed methods to compute expression level maps (signature maps of multiple genes from IHC data digitized on a commercial whole slide imaging system. Areas of cancer for these expression level maps are defined by a pathologist on adjacent, co-registered H&E slides, allowing assessment of IHC statistics and heterogeneity within the diseased tissue. This novel way of representing multiple IHC assays as signature maps will allow the development of n-gene expression profiling databases in three dimensions throughout virtual whole organ reconstructions.
Wei, Xinzhou; Leung, Lin; Anshel, Michael
The privacy and data integrity are not guaranteed in current wireless communications due to the security hole inside the Wireless Application Protocol (WAP) version 1.2 gateway. One of the remedies is to provide an end-to-end security in m-commerce by applying application level security on top of current WAP1.2. The traditional security technologies like RSA and ECC applied on enterprise's server are not practical for wireless devices because wireless devices have relatively weak computation power and limited memory compared with server. In this paper, we developed a lattice based polynomial digital signature system based on NTRU's Polynomial Authentication and Signature Scheme (PASS), which enabled the feasibility of applying high-level security on both server and wireless device sides.
Rocha, Catarina; Xexeo, Geraldo; da Rocha, Ana Regina C.
With the increasing availability of information on Internet information providers, like search engines, digital libraries and online databases, it becomes more important to have personalized systems that help users to find relevant information. One type of personalization that is growing in use is recommender systems. This paper presents…
Omisore, M. O.; Samuel, O. W.
The huge amount of information available online has given rise to personalization and filtering systems. Recommender systems (RS) constitute a specific type of information filtering technique that present items according to user's interests. In this research, a web-based personalized recommender system capable of providing learners with books that…
Halevi and Krawczyk proposed a message randomization algorithm called RMX as a front-end tool to the hash-then-sign digital signature schemes such as DSS and RSA in order to free their reliance on the collision resistance property of the hash functions. They have shown that to forge a RMX-hash-th...... that use Davies-Meyer schemes and a variant of RMX published by NIST in its Draft Special Publication (SP) 800-106. We discuss some important applications of our attack....
Gauravaram, Praveen; Knudsen, Lars Ramkilde
Halevi and Krawczyk proposed a message randomization algorithm called RMX as a front-end tool to the hash-then-sign digital signature schemes such as DSS and RSA in order to free their reliance on the collision resistance property of the hash functions. They have shown that to forge a RMX-hash-th...... schemes that use Davies-Meyer schemes and a variant of RMX published by NIST in its Draft Special Publication (SP) 800-106. We discuss some important applications of our attack....
Grace Lamudur Arta Sihombing
Full Text Available Confidentiality of data is very important in communication. Many cyber crimes that exploit security holes for entry and manipulation. To ensure the security and confidentiality of the data, required a certain technique to encrypt data or information called cryptography. It is one of the components that can not be ignored in building security. And this research aimed to analyze the hybrid cryptography with symmetric key by using a stream cipher algorithm and asymmetric key by using RSA (Rivest Shamir Adleman algorithm. The advantages of hybrid cryptography is the speed in processing data using a symmetric algorithm and easy transfer of key using asymmetric algorithm. This can increase the speed of transaction processing data. Stream Cipher Algorithm using the image digital signature as a keys, that will be secured by the RSA algorithm. So, the key for encryption and decryption are different. Blum Blum Shub methods used to generate keys for the value p, q on the RSA algorithm. It will be very difficult for a cryptanalyst to break the key. Analysis of hybrid cryptography stream cipher and RSA algorithms with digital signatures as a key, indicates that the size of the encrypted file is equal to the size of the plaintext, not to be larger or smaller so that the time required for encryption and decryption process is relatively fast.
Burke, Ivan D
Full Text Available During the past 10 years data breaches have become more frequent than ever. Large volumes of personal and corporate data are being leaked via these breaches. The corporate responses to these breaches, as well as, the remediation of these breaches...
Radalj, Z.; Cerovac, Z.; Cerovac, H.; Brumen, V.; Prlic, I.
Physical dosimetric surveillance of professional groups working with various radiation sources is a regular procedure in Croatia, established almost 40 years ago. Data available point out that the majority of professionals under surveillance are those employed in medical facilities, most of them working with X-ray sources. Depending on the nature of professional activities, personnel occupationally exposed to radiation sources are obliged to wear either film badge, TLD or film+TLD badge. Unfortunately, due to the line of data processing, all standard dosemeters have the same disadvantage i.e. up to 40 days delay in dose reporting, regarding the time of actual exposure. The significance of such a delay raises in cases when radiation dose was received within the short time or when technical failure on the operating unit(s) is suspected. Bearing this in mind, the additional dosimetric monitoring becomes an imperative. Therefore, we decided to introduce a palette of digital pocket dosemeters, meant to be used in different workplaces in the radiation zone, each of them being adjusted to the specificities of a particular workplace
Full Text Available the increase use of hand held devices such as smart phones to access multimedia content in the cloud is increasing with rise and growth in information technology. Mobile cloud computing is increasingly used today because it allows users to have access to variety of resources in the cloud such as image video audio and software applications with minimal usage of their inbuilt resources such as storage memory by using the one available in the cloud. The major challenge faced with mobile cloud computing is security. Watermarking and digital signature are some techniques used to provide security and authentication on user data in the cloud. Watermarking is a technique used to embed digital data within a multimedia content such as image video or audio in order to prevent authorized access to those content by intruders whereas digital signature is used to identify and verify user data when accessed. In this work we implemented digital signature and robust reversible image watermarking in order enhance mobile cloud computing security and integrity of data by providing double authentication techniques. The results obtained show the effectiveness of combining the two techniques robust reversible watermarking and digital signature by providing strong authentication to ensures data integrity and extract the original content watermarked without changes.
Kleppinger, Courtney A; Cain, Jeff
In recent years, society's rapid adoption of social media has made the boundary between professional and private life nearly indistinguishable. The literature provides guidance on how to demonstrate professionalism via social media platforms. Social media policies within health professions education tend to be legalistic in nature, serving primarily to highlight behaviors students should avoid. One missing element in social media literature is the concept of online invisibility. In this paper, we define personal digital branding, discuss the professional implications of choosing to abstain from social media use, and urge educators to recognize that the personal digital branding may be an emerging asset for young professionals in the twenty-first century.
Full Text Available This article introduces a desktop application, named Concierge, for managing personal digital research resources. Using simple operations, it enables storage of various types of files and indexes them based on content descriptions. A key feature of the software is a high level of extensibility. By installing optional plug-ins, users can customize and extend the usability of the software based on their needs. In this paper, we also introduce a few optional plug-ins: literaturemanagement, electronic laboratory notebook, and XooNlps client plug-ins. XooNIps is a content management system developed to share digital research resources among neuroscience communities. It has been adopted as the standard database system in Japanese neuroinformatics projects. Concierge, therefore, offers comprehensive support from management of personal digital research resources to their sharing in open-access neuroinformatics databases such as XooNIps. This interaction between personal and open-access neuroinformatics databases is expected to enhance the dissemination of digital research resources. Concierge is developed as an open source project; Mac OS X and Windows XP versions have been released at the official site (http://concierge.sourceforge.jp.
Full Text Available The evaluation of flexible and personal learning environments is extremely challenging. It should not be limited to the assessment of products, but should address the quality of educative experience with close monitoring. The evaluation of a PLE using digital storytelling is even more complicated, due to the unpredictability of the usage scenarios. This paper presents an evaluation methodology for PLEs using digital storytelling, using a participatory design approach. The results from an open validation trial indicate that this methodology is able to incorporate all necessary factors and that the selected evaluation tools are appropriate for addressing the quality of educative experience.
Full Text Available To preserve digital information it is vital that the format of that information can be identified, in-perpetuity. This is the major focus of research within the field of Digital Preservation. The National Archives of the UK called for the Digital Preservation and Digital Curation communities to develop a test corpus of digital objects to help further develop tools to aid this purpose. Following that call, an attempt has been made to develop the suite.This paper initially outlines a methodology to generate a skeleton corpus using simple user-generated digital objects. It then explores the lessons learnt in the generation of a corpus using scripting language techniques from the file format signatures described in The National Archives PRONOM technical registry. It will also discuss the use of the digital signature for this purpose, the benefits of developing a test corpus using this technique. Finally, this paper will outline a methodology for future research before exploring how the community can best make use of the output of this project and how this project needs to be taken forward to completion.
Shared electronic health and social care records in some service systems are already showing some of the benefits of digital technology and digital data for integrating health and social care. These records are one example of the beginning "digitalisation" of services that gives a glimpse of the potential of digital technology and systems for building coordinated and individualized integrated care. Yet the promise has been greater than the benefits, and progress has been slow compared to other industries. This paper describes for non-technical readers how information technology was used to support integrated care schemes in six EU services, and suggests practical ways forward to use the new opportunities to build person-centered integrated care.
The rise of digital media has caused transformations and new phenomena in different fields. In the digital age such branches as personal sports branding and nation branding has acquired new opportunities for development. The research focuses on representation of the personal sports brand of Zlatan Ibrahimovic on digital media platforms and its connection to the nation brand of Sweden. Previous research deals with existing studies on personal branding, personal sports branding in digital media...
Lu, Yen-Chiao; Lee, Jin (Janet) Kyung; Xiao, Yan; Sears, Andrew; Jacko, Julie A.; Charters, Kathleen
As the Personal Digital Assistant (PDA) user population continues to expand, there is a need to design more useful devices and applications to facilitate the utilization of PDAs. We conducted a structured interview study to examine PDA usage and non-usage patterns among physicians. The purpose of this descriptive study was to identify the barriers that impede physicians in their PDA use. A data collection tool was developed to record: 1) how physicians use their PDAs, 2) functions and applica...
Anderson, R. K.; Flora, J. A.; Saphir, M.
In 2014, ACE (Alliance for Climate Education) evaluated the impact of its 45-minute live climate edutainment education program on the knowledge, attitudes and behavior of high school students with respect to climate change. The results showed gains in knowledge, increased engagement, as well as increased communication about climate change with number of students reporting talking about climate change with friends and family more than doubling. In 2016, ACE launched a digital version of its in-person edutainment education program, a 40-minute video version of the live program. This digital version, Our Climate Our Future (OCOF), has now been used by nearly 4,000 teachers nationwide and viewed by over 150,000 students. We experimentally tested the impact of the digital program (OCOF) compared to the live program and a control group. The experiment was conducted with 709 students in 27 classes at two North Carolina public high schools. Classes were assigned to one of three conditions: digital, live and control. In the digital version, students watched the 40-minute OCOF video featuring the same educator that presented the live program. In the live version, students received an identical 40-minute live presentation by an ACE staff educator The control group received neither treatment. When compared to controls, both programs were effective in positively increasing climate change knowledge, climate justice knowledge, perceived self-efficacy to make climate-friendly behavior changes, and beliefs about climate change (all statistically significant at or above P<.01). In the areas of hope that people can solve climate change and intent to change behavior, only the live program showed significant increases. In these two areas, it may be that an in-person experience is key to affecting change. In light of these positive results, ACE plans to increase the use of OCOF in schools across the country to assist teachers in their efforts to teach about climate change.
Lee, Jasper C.; Ma, Kevin C.; Liu, Brent J.
A Data Grid for medical images has been developed at the Image Processing and Informatics Laboratory, USC to provide distribution and fault-tolerant storage of medical imaging studies across Internet2 and public domain. Although back-up policies and grid certificates guarantee privacy and authenticity of grid-access-points, there still lacks a method to guarantee the sensitive DICOM images have not been altered or corrupted during transmission across a public domain. This paper takes steps toward achieving full image transfer security within the Data Grid by utilizing DICOM image authentication and a HIPAA-compliant auditing system. The 3-D lossless digital signature embedding procedure involves a private 64 byte signature that is embedded into each original DICOM image volume, whereby on the receiving end the signature can to be extracted and verified following the DICOM transmission. This digital signature method has also been developed at the IPILab. The HIPAA-Compliant Auditing System (H-CAS) is required to monitor embedding and verification events, and allows monitoring of other grid activity as well. The H-CAS system federates the logs of transmission and authentication events at each grid-access-point and stores it into a HIPAA-compliant database. The auditing toolkit is installed at the local grid-access-point and utilizes Syslog , a client-server standard for log messaging over an IP network, to send messages to the H-CAS centralized database. By integrating digital image signatures and centralized logging capabilities, DICOM image integrity within the Medical Imaging and Informatics Data Grid can be monitored and guaranteed without loss to any image quality.
Verma, Gaurav; Sinha, Aloka
In this paper, we propose a new digital holographic-based cancellable biometric scheme for personal authentication and verification. The realization of cancellable biometric is presented by using an optoelectronic experimental approach, in which an optically recorded hologram of the fingerprint of a person is numerically reconstructed. Each reconstructed feature has its own perspective, which is utilized to generate user-specific fingerprint features by using a feature-extraction process. New representations of the user-specific fingerprint features can be obtained from the same hologram, by changing the reconstruction distance (d) by an amount Δd between the recording plane and the reconstruction plane. This parameter is the key to make the cancellable user-specific fingerprint features using a digital holographic technique, which allows us to choose different reconstruction distances when reissuing the user-specific fingerprint features in the event of compromise. We have shown theoretically that each user-specific fingerprint feature has a unique identity with a high discrimination ability, and the chances of a match between them are minimal. In this aspect, a recognition system has also been demonstrated using the fingerprint biometric of the enrolled person at a particular reconstruction distance. For the performance evaluation of a fingerprint recognition system—the false acceptance ratio, the false rejection ratio and the equal error rate are calculated using correlation. The obtained results show good discrimination ability between the genuine and the impostor populations with the highest recognition rate of 98.23%. (paper)
Kleppinger, Courtney A.
In recent years, society’s rapid adoption of social media has made the boundary between professional and private life nearly indistinguishable. The literature provides guidance on how to demonstrate professionalism via social media platforms. Social media policies within health professions education tend to be legalistic in nature, serving primarily to highlight behaviors students should avoid. One missing element in social media literature is the concept of online invisibility. In this paper, we define personal digital branding, discuss the professional implications of choosing to abstain from social media use, and urge educators to recognize that the personal digital branding may be an emerging asset for young professionals in the twenty-first century. PMID:26430266
Full Text Available Abstract Background The tissue-specific Unigene Sets derived from more than one million expressed sequence tags (ESTs in the NCBI, GenBank database offers a platform for identifying significantly and differentially expressed tissue-specific genes by in-silico methods. Digital differential display (DDD rapidly creates transcription profiles based on EST comparisons and numerically calculates, as a fraction of the pool of ESTs, the relative sequence abundance of known and novel genes. However, the process of identifying the most likely tissue for a specific disease in which to search for candidate genes from the pool of differentially expressed genes remains difficult. Therefore, we have used ‘Gene Ontology semantic similarity score’ to measure the GO similarity between gene products of lung tissue-specific candidate genes from control (normal and disease (cancer sets. This semantic similarity score matrix based on hierarchical clustering represents in the form of a dendrogram. The dendrogram cluster stability was assessed by multiple bootstrapping. Multiple bootstrapping also computes a p-value for each cluster and corrects the bias of the bootstrap probability. Results Subsequent hierarchical clustering by the multiple bootstrapping method (α = 0.95 identified seven clusters. The comparative, as well as subtractive, approach revealed a set of 38 biomarkers comprising four distinct lung cancer signature biomarker clusters (panel 1–4. Further gene enrichment analysis of the four panels revealed that each panel represents a set of lung cancer linked metastasis diagnostic biomarkers (panel 1, chemotherapy/drug resistance biomarkers (panel 2, hypoxia regulated biomarkers (panel 3 and lung extra cellular matrix biomarkers (panel 4. Conclusions Expression analysis reveals that hypoxia induced lung cancer related biomarkers (panel 3, HIF and its modulating proteins (TGM2, CSNK1A1, CTNNA1, NAMPT/Visfatin, TNFRSF1A, ETS1, SRC-1, FN1, APLP2, DMBT1
Thielmann, H.; Mennicken, J.-B.
This report contains the proceedings of a second German-Japanese Workshop on digital signatures held in Kyoto, September 21./22. 1999. The workshop aimed at legal, technical and economic aspects of digital signatures as a means to promote electronic commerce. Special attention was devoted to Identification and classification of requirements on the technical platform and requirements for international interoperability, Identification of legal requirements and other social environments that nee...
If you buy a book at the bookstore, you own it. You can take it home, scribble in the margins, put in on the shelf, lend it to a friend, sell it at a garage sale. But is the same thing true for the ebooks or other digital goods you buy? Retailers and copyright holders argue that you don't own those purchases, you merely license them. That means your ebook vendor can delete the book from your device without warning or explanation -- as Amazon deleted Orwell's "1984" from the Kindles of surprised readers several years ago. These readers thought they owned their copies of "1984." Until, it turned out, they didn't. In "The End of Ownership," Aaron Perzanowski and Jason Schultz explore how notions of ownership have shifted in the digital marketplace, and make an argument for the benefits of personal property. Of course, ebooks, cloud storage, streaming, and other digital goods offer users convenience and flexibility. But, Perzanowski and Schultz warn, consumers should be aware of the tradeoffs involving user cons...
学术界一些研究者认为"Personal Digital Library"与"MyLibrary"均可指个人数字图书馆.然而,两者是不同概念、特征及功能的事物.论文对两者的概念、研究现状及趋势作了详细的论述,旨在揭示这两种事物,为后续研究者提供借鉴.
Niehues, S.M.; Froehlich, M.; Felix, R.; Lemke, A.J.
The personal digital assistant (PDA) enables the independent access to large data in a pocket-sized format. The applications for hand-held computers are growing steadily and can support almost any kind of problem. An overview of the available hardware and software is provided and evaluated. Furthermore, the use of the PDA in the clinical daily routine is described. In view of the numerous software programs available in radiology, the range of software solutions for radiologists is presented. Despite the high acquisition cost, the PDA has already become the digital assistant for the radiologist. After a short time of getting used to the PDA, nobody wants to miss it at work or at home. New technical features and available software programs will continuously increase the integration of the PDA into the medical workflow in the near future. (orig.)
Hsi-Chun Wang; Chi-Ming Lian; Pei-Chi Hsiao
The objective of this research is to embed information in personalized stamps by modified digital halftoning techniques. The displaced and deformed halftone dots are used to encode data in the personalized stamps. Hidden information can be retrieved by either an optical decoder or digital image processing techniques.The results show that personalized stamps with value-added features like data hiding or digital watermarking can be successfully implemented.
Full Text Available This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. Such issues were largely addressed in the literature for images, audio, and video, with only a few papers addressing the challenge of sensitive plain-text media under known constraints. Specifically, with text as the predominant online communication medium, it becomes crucial that techniques are deployed to protect such information. A number of digital-signature, hashing, and watermarking schemes have been proposed that essentially bind source data or embed invisible data in a cover media to achieve its goal. While many such complex schemes with resource redundancies are sufficient in offline and less-sensitive texts, this paper proposes a hybrid approach based on zero-watermarking and digital-signature-like manipulations for sensitive text documents in order to achieve content originality and integrity verification without physically modifying the cover text in anyway. The proposed algorithm was implemented and shown to be robust against undetected content modifications and is capable of confirming proof of originality whilst detecting and locating deliberate/nondeliberate tampering. Additionally, enhancements in resource utilisation and reduced redundancies were achieved in comparison to traditional encryption-based approaches. Finally, analysis and remarks are made about the current state of the art, and future research issues are discussed under the given constraints.
Kabir, Muhammad N.; Alginahi, Yasser M.
This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. Such issues were largely addressed in the literature for images, audio, and video, with only a few papers addressing the challenge of sensitive plain-text media under known constraints. Specifically, with text as the predominant online communication medium, it becomes crucial that techniques are deployed to protect such information. A number of digital-signature, hashing, and watermarking schemes have been proposed that essentially bind source data or embed invisible data in a cover media to achieve its goal. While many such complex schemes with resource redundancies are sufficient in offline and less-sensitive texts, this paper proposes a hybrid approach based on zero-watermarking and digital-signature-like manipulations for sensitive text documents in order to achieve content originality and integrity verification without physically modifying the cover text in anyway. The proposed algorithm was implemented and shown to be robust against undetected content modifications and is capable of confirming proof of originality whilst detecting and locating deliberate/nondeliberate tampering. Additionally, enhancements in resource utilisation and reduced redundancies were achieved in comparison to traditional encryption-based approaches. Finally, analysis and remarks are made about the current state of the art, and future research issues are discussed under the given constraints. PMID:25254247
Cerovac, Z.; Radalj, Z.; Prlic, I.; Cerovac, H.
Film+TLD and film or TLD Dosimetry have a certain delay in dose reporting, since the reports on occupational doses are usually available to the users within 40 days after the actual exposure. This is particularly important when the dose is received within the short-time interval or when the radiation source has some technical failures. For this reason, the additional monitoring is recommendable. The common Dosimetry service in Croatia is well established and the data available shows that over 80% of occupationally exposed persons are working in medical facilities, mainly with x-ray sources. Dosimetry services in the country are providing three types of dosemeters, film dosemeter badge, film+TLD dosemeter badge or plane TLD badge. We have decided to introduce the palette of digital pocket dosemeters to be used at different workplaces occupationally exposed to ionizing radiation. After the first experience with the ALARA 1G digital dosemeter it came out that this type of ionizing radiation measuring device is suitable for the various non-occupational purposes. After some technical improvement and with some telecommunication electronics this device is usable as a point environmental measuring station. This means that the probe of the record any change in normal environmental radiation field, send the data to the central station and to raise alarm if necessary. That is why we have made a prototype for environmental monitoring able to be connected to any kind of telecommunication net. (author)
Mohamad Ali Sadikin
Full Text Available This research addresses the implementation of encryption and digital signature technique for electronic health record to prevent cybercrime such as robbery, modification and unauthorised access. In this research, RSA 2048-bit algorithm, AES 256-bit and SHA 256 will be implemented in Java programming language. Secure Electronic Health Record Information (SEHR application design is intended to combine given services, such as confidentiality, integrity, authentication, and nonrepudiation. Cryptography is used to ensure the file records and electronic documents for detailed information on the medical past, present and future forecasts that have been given only to the intended patients. The document will be encrypted using an encryption algorithm based on NIST Standard. In the application, there are two schemes, namely the protection and verification scheme. This research uses black-box testing and whitebox testing to test the software input, output, and code without testing the process and design that occurs in the system.We demonstrated the implementation of cryptography in SEHR. The implementation of encryption and digital signature in this research can prevent archive thievery.
Empelen, P. van; Otten, W.; Molema, H.; Keijsers, J.; Mooij, R.
Digital health is considered the ‘holy grail’ of effective and sustainable health(care). It uses the latest technology, apps and data to support and improve health. Digital health tools can benefit both patients and healthy individuals, with support and advice. But healthcare professionals, policymakers and scientist can also benefit from the (big) data and insights collected by digital health applications. A well-known example of digital health is eHealth, which provides information- and com...
Santarossa, Sara; Kane, Deborah; Senn, Charlene Y; Woodruff, Sarah J
The growth of the digital environment provides tremendous opportunities to revolutionize health behavior change efforts. This paper explores the use of Web-based, mobile, and social media health behavior change interventions and determines whether there is a need for a face-to-face or an in-person component. It is further argued that that although in-person components can be beneficial for online interventions, a digital person-to-person component can foster similar results while dealing with challenges faced by traditional intervention approaches. Using a digital person-to-person component is rooted in social and behavioral theories such as the theory of reasoned action, and the social cognitive theory, and further justified by the human support constructs of the model of supportive accountability. Overall, face-to-face and online behavior change interventions have their respective advantages and disadvantages and functions, yet both serve important roles. It appears that it is in fact human support that is the most important component in the effectiveness and adherence of both face-to-face and online behavior change interventions, and thoughtfully introducing a digital person-to-person component, to replace face-to-face interactions, can provide the needed human support while diminishing the barriers of in-person meetings. The digital person-to-person component must create accountability, generate opportunities for tailored feedback, and create social support to successfully create health behavior change. As the popularity of the online world grows, and the interest in using the digital environment for health behavior change interventions continues to be embraced, further research into not only the use of online interventions, but the use of a digital person-to-person component, must be explored. ©Sara Santarossa, Deborah Kane, Charlene Y Senn, Sarah J Woodruff. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 11.04.2018.
Full Text Available The use of light diffraction for the microbiological diagnosis of bacterial colonies was a significant breakthrough with widespread implications for the food industry and clinical practice. We previously confirmed that optical sensors for bacterial colony light diffraction can be used for bacterial identification. This paper is focused on the novel perspectives of this method based on digital in-line holography (DIH, which is able to reconstruct the amplitude and phase properties of examined objects, as well as the amplitude and phase patterns of the optical field scattered/diffracted by the bacterial colony in any chosen observation plane behind the object from single digital hologram. Analysis of the amplitude and phase patterns inside a colony revealed its unique optical properties, which are associated with the internal structure and geometry of the bacterial colony. Moreover, on a computational level, it is possible to select the desired scattered/diffracted pattern within the entire observation volume that exhibits the largest amount of unique, differentiating bacterial features. These properties distinguish this method from the already proposed sensing techniques based on light diffraction/scattering of bacterial colonies. The reconstructed diffraction patterns have a similar spatial distribution as the recorded Fresnel patterns, previously applied for bacterial identification with over 98% accuracy, but they are characterized by both intensity and phase distributions. Our results using digital holography provide new optical discriminators of bacterial species revealed in one single step in form of new optical signatures of bacterial colonies: digital holograms, reconstructed amplitude and phase patterns, as well as diffraction patterns from all observation space, which exhibit species-dependent features. To the best of our knowledge, this is the first report on bacterial colony analysis via digital holography and our study represents an
Buzalewicz, Igor; Kujawińska, Małgorzata; Krauze, Wojciech; Podbielska, Halina
The use of light diffraction for the microbiological diagnosis of bacterial colonies was a significant breakthrough with widespread implications for the food industry and clinical practice. We previously confirmed that optical sensors for bacterial colony light diffraction can be used for bacterial identification. This paper is focused on the novel perspectives of this method based on digital in-line holography (DIH), which is able to reconstruct the amplitude and phase properties of examined objects, as well as the amplitude and phase patterns of the optical field scattered/diffracted by the bacterial colony in any chosen observation plane behind the object from single digital hologram. Analysis of the amplitude and phase patterns inside a colony revealed its unique optical properties, which are associated with the internal structure and geometry of the bacterial colony. Moreover, on a computational level, it is possible to select the desired scattered/diffracted pattern within the entire observation volume that exhibits the largest amount of unique, differentiating bacterial features. These properties distinguish this method from the already proposed sensing techniques based on light diffraction/scattering of bacterial colonies. The reconstructed diffraction patterns have a similar spatial distribution as the recorded Fresnel patterns, previously applied for bacterial identification with over 98% accuracy, but they are characterized by both intensity and phase distributions. Our results using digital holography provide new optical discriminators of bacterial species revealed in one single step in form of new optical signatures of bacterial colonies: digital holograms, reconstructed amplitude and phase patterns, as well as diffraction patterns from all observation space, which exhibit species-dependent features. To the best of our knowledge, this is the first report on bacterial colony analysis via digital holography and our study represents an innovative approach
The online trading is growing widely day by day, which makes safety the biggest concern while carrying out trading by electronic means. As many other operations can be done with digital environment and internet, operation that provides identity validation should also be added to the digital environment. When data are transferred, the user should make sure that there are no changes in the original data while transferring them from sender to receiver. And it has also become necessary to authent...
Empelen, P. van; Otten, W.; Molema, H.; Keijsers, J.; Mooij, R.
Digital health is considered the ‘holy grail’ of effective and sustainable health(care). It uses the latest technology, apps and data to support and improve health. Digital health tools can benefit both patients and healthy individuals, with support and advice. But healthcare professionals,
Full Text Available HIV-associated neurocognitive disorders (HAND affects more than half of persons living with HIV-1/AIDS (PLWHA. Identification of biomarkers representing the cognitive status of PLWHA is a critical step for implementation of successful cognitive, behavioral and pharmacological strategies to prevent onset and progression of HAND. However, the presence of co-morbidity factors in PLWHA, the most common being substance abuse, can prevent the identification of such biomarkers. We have optimized a protocol to profile plasma miRNAs using quantitative RT-qPCR and found a miRNA signature with very good discriminatory ability to distinguish PLWHA with cognitive impairment from those without cognitive impairment. Here, we have evaluated this miRNA signature in PLWHA with alcohol use disorder (AUD at LSU Health Sciences Center (LSUHSC. The results show that AUD is a potential confounding factor for the miRNAs associated with cognitive impairment in PLWHA. Furthermore, we have investigated the miRNA signature associated with cognitive impairment in an independent cohort of PLWHA using plasma samples from the CNS HIV Antiretroviral Therapy Effects Research (CHARTER program. Despite differences between the two cohorts in socioeconomic status, AUD, and likely misuse of illicit or prescription drugs, we validated a miRNA signature for cognitive deficits found at LSUHSC in the CHARTER samples.
In 2005, Zhang and Wang proposed an improvement signature scheme without using one-way hash function and message redundancy. In this paper, we show that this scheme exits potential safety concerns through the analysis of boolean algebra, such as bitwise exclusive-or, and point out that mapping is not one to one between assembly instructions and machine code actually by means of the analysis of the result of the assembly program segment, and which possibly causes safety problems unknown to the software
Zheng, Jinbin, E-mail: email@example.com [School of Mathematics and Computer Science, Long Yan University, Longyan 364012 (China)
In 2005, Zhang and Wang proposed an improvement signature scheme without using one-way hash function and message redundancy. In this paper, we show that this scheme exits potential safety concerns through the analysis of boolean algebra, such as bitwise exclusive-or, and point out that mapping is not one to one between assembly instructions and machine code actually by means of the analysis of the result of the assembly program segment, and which possibly causes safety problems unknown to the software.
Krtalic, Maja; Marcetic, Hana; Micunovic, Milijana
Introduction: As both academic citizens and active participants in information society who use information, students produce huge amounts of personal digital data and documents. It is therefore important to raise questions about their awareness, responsibility, tendencies and activities they undertake to preserve their collective digital heritage.…
Despite the proliferation of social media, few learners make effective use of digital technology to support their learning or graduate with the skills necessary for developing and communicating their expertise in the knowledge-driven networked society of the digital age. This article makes use of the concept of Personal Learning Environments (PLE)…
Garrett, Bernard; Klein, Gerri
The aims were to explore advanced practice nurses' perceptions on wireless Personal Digital Assistant technologies, to establish the type and range of tools that would be useful to support their practice and to identify any requirements and limitations that may impact the implementation of wireless Personal Digital Assistants in practice. The wireless Personal Digital Assistant is becoming established as a hand-held computing tool for healthcare professionals. The reflections of advanced practice nurses' about the value of wireless Personal Digital Assistants and its potential to contribute to improved patient care has not been investigated. A qualitative interpretivist design was used to explore advanced practice nurses' perceptions on the value of wireless Personal Digital Assistant technologies to support their practice. The data were collected using survey questionnaires and individual and focus group interviews with nurse practitioners, clinical nurse specialists and information technology managers based in British Columbia, Canada. An open-coding content analysis was performed using qualitative data analysis software. Wireless Personal Digital Assistant's use supports the principles of pervasivity and is a technology rapidly being adopted by advanced practice nurses. Some nurses indicated a reluctance to integrate wireless Personal Digital Assistant technologies into their practices because of the cost and the short technological life cycle of these devices. Many of the barriers which precluded the use of wireless networks within facilities are being removed. Nurses demonstrated a complex understanding of wireless Personal Digital Assistant technologies and gave good rationales for its integration in their practice. Nurses identified improved client care as the major benefit of this technology in practice and the type and range of tools they identified included clinical reference tools such as drug and diagnostic/laboratory reference applications and wireless
Hildebrandt, M; Waidner, M
The value of personal data has traditionally been understood in ethical terms as a safeguard for personality rights such as human dignity and privacy. However, we have entered an era where personal data are mined, traded and monetized in the process of creating added value - often in terms of free services including efficient search, support for social networking and personalized communications. This volume investigates whether the economic value of personal data can be realized without compromising privacy, fairness and contextual integrity. It brings scholars and scientists from the discipli
Full Text Available Biometric systems based on uni-modal traits are characterized by noisy sensor data, restricted degrees of freedom, non-universality and are susceptible to spoof attacks. Multi-modal biometric systems seek to alleviate some of these drawbacks by providing multiple evidences of the same identity. In this paper, a user-score-based weighting technique for integrating the iris and signature traits is presented. This user-specific weighting technique has proved to be an efficient and effective fusion scheme which increases the authentication accuracy rate of multi-modal biometric systems. The weights are used to indicate the importance of matching scores output by each biometrics trait. The experimental results show that our biometric system based on the integration of iris and signature traits achieve a false rejection rate (FRR of 0.08% and a false acceptance rate (FAR of 0.01%.
Jones, Beata; Leverenz, Carrie
Antoine de Saint-Exupery said, "If you want to build a ship, don't drum up people to collect wood and don't assign them tasks and work, but rather teach them to long for the endless immensity of the sea." This article presents a pedagogical approach for framing a digital-identity-enhancing ePortfolio that maximizes student engagement and…
Cangiano, Gaston R.
It was just a generation ago that computers entered the workplace. Back then, they only represented the work we did, nothing else. But today, some sort of computing device is involved in how we play, how we communicate, how we get our news and of course, how we work. What this means is that today almost all aspects of our lives are represented in some digital form. The rapid pace of change in technology and the dramatic shift in the use of computers has a cost associated with it. The legacy d...
Fuhrmann, R; Diedrich, P
An image processing work station for digitalizing and interactively manipulating under- and overexposed X-rays was set up by adding modules to an IBM compatible personal computer. Overexposed X-rays can be qualitatively enhanced by means of controlled manipulation of contrast and brightness and by means of the use of various digital filtering techniques. With underexposed X-rays an equalized grey scale can be achieved by means of regulating contrast and brightness. Digital filtering is not required. To assure a high degree of anatomical detail (periodontal ligament) in the digitalized image a maximum pixel of 0.1 mm was defined as a qualitative norm. Since in every digitalization process resolution is diminished, it proved best to select for interactive manipulation out of the total image only the section of interest.
Kotler, Howard S
To construct a reliable, accurate, and easy-to-use handheld computer database that facilitates the point-of-care acquisition of perioperative text and image data specific to rhinoplasty. A user-modified database (Pendragon Forms [v.3.2]; Pendragon Software Corporation, Libertyville, Ill) and graphic image program (Tealpaint [v.4.87]; Tealpaint Software, San Rafael, Calif) were used to capture text and image data, respectively, on a Palm OS (v.4.11) handheld operating with 8 megabytes of memory. The handheld and desktop databases were maintained secure using PDASecure (v.2.0) and GoldSecure (v.3.0) (Trust Digital LLC, Fairfax, Va). The handheld data were then uploaded to a desktop database of either FileMaker Pro 5.0 (v.1) (FileMaker Inc, Santa Clara, Calif) or Microsoft Access 2000 (Microsoft Corp, Redmond, Wash). Patient data were collected from 15 patients undergoing rhinoplasty in a private practice outpatient ambulatory setting. Data integrity was assessed after 6 months' disk and hard drive storage. The handheld database was able to facilitate data collection and accurately record, transfer, and reliably maintain perioperative rhinoplasty data. Query capability allowed rapid search using a multitude of keyword search terms specific to the operative maneuvers performed in rhinoplasty. Handheld computer technology provides a method of reliably recording and storing perioperative rhinoplasty information. The handheld computer facilitates the reliable and accurate storage and query of perioperative data, assisting the retrospective review of one's own results and enhancement of surgical skills.
Mechling, Linda C.; Gast, David L.; Seid, Nicole H.
In this study, a personal digital assistant (PDA) with picture, auditory, and video prompts with voice over, was evaluated as a portable self-prompting device for students with autism spectrum disorder (ASD). Using a multiple probe design across three cooking recipes and replicated with three students with ASD, the system was tested for its…
Loh, Christian Sebastian
Examines how mobile computers, or personal digital assistants (PDAs), can be used in a Web-based learning environment. Topics include wireless networks on college campuses; online learning; Web-based learning technologies; synchronous and asynchronous communication via the Web; content resources; Web connections; and collaborative learning. (LRW)
Shen, Li-Qiong; Zang, Xiao-Ying; Cong, Ji-Yan
Personal digital assistants, technology with various functions, have been applied in international clinical practice. Great benefits in reducing medical errors and enhancing the efficiency of clinical work have been achieved, but little research has investigated nurses' satisfaction with the use of personal digital assistants. To investigate nurses' satisfaction with use of personal digital assistants, and to explore the predictors of this. This is a cross-sectional descriptive study. We conducted a cross-sectional survey targeting nurses who used personal digital assistants in a comprehensive tertiary hospital in Beijing. A total of 383 nurses were recruited in this survey in 2015. The total score of nurses' satisfaction with use of personal digital assistants was 238.91 (SD 39.25). Nurses were less satisfied with the function of documentation, compared with the function of administering medical orders. The time length of using personal digital assistants, academic degree, and different departments predicted nurses' satisfaction towards personal digital assistant use (all P < 0.05). Nurses were satisfied with the accuracy of administering medical orders and the safety of recording data. The stability of the wireless network and efficiency related to nursing work were less promising. To some extent, nurses with higher education and longer working time with personal digital assistants were more satisfied with them. © 2018 John Wiley & Sons Australia, Ltd.
Full Text Available This article examines the growing use of digital-networked images, specifically online self-portraits or “selfies”, as deliberate and personal acts of political expression and the ways in which meaning evolves and expands from their presence on the Internet. To understand the role of digital-networked images as a site for engaging in a personal and connective “visual” action that leads to formation of transient communities, the author analyzes the nude self-portrait of the young Egyptian woman Aliaa Magda Elmahdy, which during the Egyptian uprisings in 2011 drew attention across social media. As an object of analysis this image is a prime example of the use of digital-networked images in temporally intentional distribution, and as an instance of political enactment unique to this era. This article also explains the concept of participatory narratives as an ongoing process of meaning formation in the digital-networked image, shaped by the fluidity of the multiple and immediate textual narratives, visual derivatives, re-appropriation, and remixes contributed by other interested viewers. The online circulation of digital-networked images in fact culminates in a flow of ever-changing and overarching narratives, broadening the contextual scope around which images are traditionally viewed.
Health policies across western societies have embedded the need for service user and carer perspectives in service design and delivery of educational programmes. There is a growing recognition of the need to include the perspectives of children and young people as service users in the design and delivery of child focused educational programmes. Digital storytelling provides a strategy for student nurses to gain insight into the lived experiences of children and young people. Engaging with these stories enables students to develop an understanding of a young persons' experience of healthcare. This paper outlines a project that developed a digital learning object based upon a young person's experience of cancer and student evaluations of the digital learning object as a teaching and learning strategy. Over 80% of students rated the digital learning object as interesting and were motivated to explore its content. In addition, the evaluation highlighted that listening to the young person's experiences of her treatment regimes was informative and assisted understanding of a patients' perspective of care delivery. Copyright © 2013 Elsevier Ltd. All rights reserved.
Department of Veterans Affairs — Beginning with the Government Paperwork Elimination Act of 1998 (GPEA), the Federal government has encouraged the use of electronic / digital signatures to enable...
Shared electronic health and social care records in some service systems are already showing some of the benefits of digital technology and digital data for integrating health and social care. These records are one example of the beginning “digitalisation” of services that gives a glimpse of the potential of digital technology and systems for building coordinated and individualized integrated care. Yet the promise has been greater than the benefits, and progress has been slow compared to other industries. This paper describes for non-technical readers how information technology was used to support integrated care schemes in six EU services, and suggests practical ways forward to use the new opportunities to build person-centered integrated care. PMID:29588629
Full Text Available Shared electronic health and social care records in some service systems are already showing some of the benefits of digital technology and digital data for integrating health and social care. These records are one example of the beginning “digitalisation” of services that gives a glimpse of the potential of digital technology and systems for building coordinated and individualized integrated care. Yet the promise has been greater than the benefits, and progress has been slow compared to other industries. This paper describes for non-technical readers how information technology was used to support integrated care schemes in six EU services, and suggests practical ways forward to use the new opportunities to build person-centered integrated care.
Logalbo, P.; Benedicto, J.; Viola, R.
Personal Communications and Digital Audio Broadcasting are two new services that the European Space Agency (ESA) is investigating for future European and Global Mobile Satellite systems. ESA is active in promoting these services in their various mission options including non-geostationary and geostationary satellite systems. A Medium Altitude Global Satellite System (MAGSS) for global personal communications at L and S-band, and a Multiregional Highly inclined Elliptical Orbit (M-HEO) system for multiregional digital audio broadcasting at L-band are described. Both systems are being investigated by ESA in the context of future programs, such as Archimedes, which are intended to demonstrate the new services and to develop the technology for future non-geostationary mobile communication and broadcasting satellites.
Mary F. Wright
Full Text Available This paper chronicles a yearlong journey of learning about digital storytelling and leading the creation of five digital stories within a higher education community. We bring two complementary perspectives to guide this inquiry: as a faculty member in teacher education and as the University of Wisconsin system representative for the Learning Technology Development Council as well as director of our educational technology center. Our passion for the arts, aesthetics and education bring us to extend an inquiry into teacher identity and reflection by connecting our colleagues’ stories with the art of digital storytelling. We see its place and value in an academic environment; although not always currently clear, the roots of personal insight permeate the lives of professionals within the academy. Digital storytelling spans the artificial divide between the experiences of the past and our professional identities. The myriad uses of digital storytelling in higher education are explored as a reflective tool for practice, to highlight academic projects, interests or initiatives, and most importantly, to simply reflect on how we are shaped by the stories we live and how we in turn share our diverse identities.
Full Text Available User-generated content (UGC has become a part of personal digital collections on the Web, as such collections often contain personal memories, activities, thoughts and even profiles. With the increase in the creation of personal materials on the Web, the needs for archiving and preserving these materials are increasing, not only for the purpose of developing personal archives but also for the purpose of capturing social memory and tracking human traces in this era. Using both survey and interview methods, this study investigated blogs, one popular type of UGC, and analyzed travel bloggers’ perceptions of the value of blogs and the elements of blogs that are important for preservation. The study respondents found personal and sentimental value (e.g., a way to express themselves, a way to keep personal memories and thoughts, and a way to maintain a record for their family to be the most important reason for preserving blogs, followed by informational value and cultural/historical value. Sharing also appeared as one of the values that respondents found in their blogs. The respondents reported that self-created blog posts (content and information related to the blog posts (context are more important to preserve than some other elements (behavior and appearance. Integrating what bloggers consider as most valuable and what archivists think are worth preserving may be an important step when collecting personal blogs.
Full Text Available Background: Successful aging has been the paradigm of old-age life. The purpose of this study was to implement and evaluate a cross-disciplinary intervention program using two approaches for community-based older adults in Taichung, Taiwan. Methods: The content of the intervention included successful aging concepts and preparation, physical activity, chronic disease and health management, dietary and nutrition information, cognitive training, emotional awareness and coping skills, family relationship and resilience, legal concepts regarding financial protection, and Internet use. The traditional person-to-person (P2P intervention approach was implemented among participants at urban centers, and the personal-and-digital (P&D intervention approach was implemented among participants at rural centers; before the P&D group received the intervention, participants were assessed as the control group for comparison. Results: Healthy behavior and nutrition improved for the P2P group, although not significantly. Strategies for adapting to old age and reducing ineffective coping were significantly improved in the P2P group. The ability to search for health information improved in the P&D group, and knowledge of finance-related law increased in the P2P group. Conclusion: A continuous, well-designed and evidence-based intervention program is beneficial for improving the health of older adults, or at least delaying its decline.
Kortes, J; Dehnad, H; Kotte, A N T; Fennis, W M M; Rosenberg, A J W P
Partial or complete resection of the maxilla during tumour surgery causes oronasal defects, leading to oral-maxillofacial dysfunction, for which the surgical obturator (SO) is an important treatment option. Traditional manufacturing of SOs is complex, time-consuming, and often results in inadequate fit and function. This technical note describes a novel digital workflow to design and manufacture a three-dimensional (3D)-printed hollow SO. Registered computed tomography and magnetic resonance imaging images are used for gross tumour delineation. The produced RTStruct set is exported as a stereolitography (STL) file and merged with a 3D model of the dental status. Based on these merged files, a personalized and hollow digital SO design is created, and 3D printed. Due to the proper fit of the prefabricated SO, a soft silicone lining material can be used during surgery to adapt the prosthesis to the oronasal defect, instead of putty materials that are not suitable for this purpose. An STL file of this final SO is created during surgery, based on a scan of the relined SO. The digital workflow results in a SO weight reduction, an increased fit, an up-to-date digital SO copy, and overall easier clinical handling. Copyright © 2018 International Association of Oral and Maxillofacial Surgeons. Published by Elsevier Ltd. All rights reserved.
Hanaoka, Yoichi; Ueno, Asao; Tsuzuki, Tamiyuki; Kajiwara, Masahiro; Minaguchi, Kiyoshi; Sato, Yoshinobu
A dental chart is very useful as a standard source of evidence in the personal identification of bodies. However, the kind of dental chart available will often vary as a number of types of odontogram have been developed where the visual representation of dental conditions has relied on hand-drawn representation. We propose the Digital Dental Chart (DDC) as a new style of dental chart, especially for open investigations aimed at establishing the identity of unknown bodies. Each DDC is constructed using actual oral digital images and dental data, and is easy to upload onto an Internet website. The DDC is a more useful forensic resource than the standard types of dental chart in current use as it has several advantages, among which are its ability to carry a large volume of information and reproduce dental conditions clearly and in detail on a cost-effective basis.
Full Text Available Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols—signatures based on the Rivest–Adleman–Shamir (RSA algorithm, the digital signature algorithm (DSA, and the elliptic curve digital signature algorithm (ECDSA—are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally securesecure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.
Konstantinidis, Stathis Th; Wharrad, Heather; Windle, Richard; Bamidis, Panagiotis D
The knowledge existing in the World Wide Web is exponentially expanding, while continuous advancements in health sciences contribute to the creation of new knowledge. There are a lot of efforts trying to identify how the social connectivity can endorse patients' empowerment, while other studies look at the identification and the quality of online materials. However, emphasis has not been put on the big picture of connecting the existing resources with the patients "new habits" of learning through their own Personal Learning Networks. In this paper we propose a framework for empowering patients' digital health literacy adjusted to patients' currents needs by utilizing the contemporary way of learning through Personal Learning Networks, existing high quality learning resources and semantics technologies for interconnecting knowledge pieces. The framework based on the concept of knowledge maps for health as defined in this paper. Health Digital Literacy needs definitely further enhancement and the use of the proposed concept might lead to useful tools which enable use of understandable health trusted resources tailored to each person needs.
Blanco-Fernández, Yolanda; López-Nores, Martín; Pazos-Arias, José J.; Martín-Vicente, Manuela I.
The evolution of information technologies is consolidating recommender systems as essential tools in e-commerce. To date, these systems have focused on discovering the items that best match the preferences, interests and needs of individual users, to end up listing those items by decreasing relevance in some menus. In this paper, we propose extending the current scope of recommender systems to better support trading activities, by automatically generating interactive applications that provide the users with personalized commercial functionalities related to the selected items. We explore this idea in the context of Digital TV advertising, with a system that brings together semantic reasoning techniques and new architectural solutions for web services and mashups.
Finnemann, Niels Ole
what a concept of digital media might add to the understanding of processes of mediatization and what the concept of mediatization might add to the understanding of digital media. It is argued that digital media open an array of new trajectories in human communication, trajectories which were...
Miyamoto, David T; Lee, Richard J; Kalinich, Mark; LiCausi, Joseph A; Zheng, Yu; Chen, Tianqi; Milner, John D; Emmons, Erin; Ho, Uyen; Broderick, Katherine; Silva, Erin; Javaid, Sarah; Kwan, Tanya Todorova; Hong, Xin; Dahl, Douglas M; McGovern, Francis J; Efstathiou, Jason A; Smith, Matthew R; Sequist, Lecia V; Kapur, Ravi; Wu, Chin-Lee; Stott, Shannon L; Ting, David T; Giobbie-Hurder, Anita; Toner, Mehmet; Maheswaran, Shyamala; Haber, Daniel A
Blood-based biomarkers are critical in metastatic prostate cancer, where characteristic bone metastases are not readily sampled, and they may enable risk stratification in localized disease. We established a sensitive and high-throughput strategy for analyzing prostate circulating tumor cells (CTC) using microfluidic cell enrichment followed by digital quantitation of prostate-derived transcripts. In a prospective study of 27 patients with metastatic castration-resistant prostate cancer treated with first-line abiraterone, pretreatment elevation of the digital CTC M score identifies a high-risk population with poor overall survival (HR = 6.0; P = 0.01) and short radiographic progression-free survival (HR = 3.2; P = 0.046). Expression of HOXB13 in CTCs identifies 6 of 6 patients with ≤12-month survival, with a subset also expressing the ARV7 splice variant. In a second cohort of 34 men with localized prostate cancer, an elevated preoperative CTC L score predicts microscopic dissemination to seminal vesicles and/or lymph nodes ( P digital quantitation of CTC-specific transcripts enables noninvasive monitoring that may guide treatment selection in both metastatic and localized prostate cancer. Significance: There is an unmet need for biomarkers to guide prostate cancer therapies, for curative treatment of localized cancer and for application of molecularly targeted agents in metastatic disease. Digital quantitation of prostate CTC-derived transcripts in blood specimens is predictive of abiraterone response in metastatic cancer and of early dissemination in localized cancer. Cancer Discov; 8(3); 288-303. ©2018 AACR. See related commentary by Heitzer and Speicher, p. 269 This article is highlighted in the In This Issue feature, p. 253 . ©2018 American Association for Cancer Research.
Kondylakis, Haridimos; Spanakis, Emmanouil G; Sfakianakis, Stelios; Sakkalis, Vangelis; Tsiknakis, Manolis; Marias, Kostas; Xia Zhao; Hong Qing Yu; Feng Dong
The advancements in healthcare practice have brought to the fore the need for flexible access to health-related information and created an ever-growing demand for the design and the development of data management infrastructures for translational and personalized medicine. In this paper, we present the data management solution implemented for the MyHealthAvatar EU research project, a project that attempts to create a digital representation of a patient's health status. The platform is capable of aggregating several knowledge sources relevant for the provision of individualized personal services. To this end, state of the art technologies are exploited, such as ontologies to model all available information, semantic integration to enable data and query translation and a variety of linking services to allow connecting to external sources. All original information is stored in a NoSQL database for reasons of efficiency and fault tolerance. Then it is semantically uplifted through a semantic warehouse which enables efficient access to it. All different technologies are combined to create a novel web-based platform allowing seamless user interaction through APIs that support personalized, granular and secure access to the relevant information.
Graetz, Ilana; Huang, Jie; Brand, Richard J; Hsu, John; Yamin, Cyrus K; Reed, Mary E
Some patients lack regular computer access and experience a digital divide that causes them to miss internet-based health innovations. The diffusion of smartphones has increased internet access across the socioeconomic spectrum, and increasing the channels through which patients can access their personal health records (PHRs) could help bridge the divide in PHR use. We examined PHR use through a computer-based Web browser or mobile device. Cross-sectional historical cohort analysis. Among adult patients in the diabetes registry of an integrated healthcare delivery system, we studied the devices used to access their PHR during 2016. Among 267,208 patients with diabetes, 68.1% used the PHR in 2016; 60.6% of all log-ins were via computer and 39.4% were via mobile device. Overall, 63.9% used it from both a computer and mobile device, 29.6% used only a computer, and 6.5% used only a mobile device. After adjustment, patients who were black, Hispanic, or Asian; lived in lower socioeconomic status (SES) neighborhoods; or had lower engagement were all significantly more likely to use the PHR only from a mobile device (P digital divide in computer use, disproportionately reaching racial/ethnic minorities and lower SES patients. Nonetheless, even with a mobile-optimized and app-accessible PHR, differences in PHR use by race/ethnicity and SES remain. Continued efforts are needed to increase equitable access to PHRs among patients with chronic conditions.
Post, Douglas M; Shapiro, Charles L; Cegala, Donald J; David, Prabu; Katz, Mira L; Krok, Jessica L; Phillips, Gary S; McAlearney, Ann Sheck; Lehman, Jennifer S; Hicks, William; Paskett, Electra D
Communication problems impede effective symptom management during chemotherapy. The primary aim of this pilot randomized controlled trial was to test the effects of a personal digital assistant-delivered communication intervention on pain, depression, and fatigue symptoms among breast cancer patients undergoing chemotherapy. Secondary aims included assessment of 1) study feasibility, 2) patient and clinician responses to study participation, and 3) intervention effects on health-related quality of life (HRQoL) and communication self-efficacy. Intervention group participants (n = 27) completed symptom inventories at baseline, once per week during treatment, and at posttreatment. Depending on symptom severity, they viewed race-concordant videos on how to communicate about pain, depression and/or fatigue, using the personal digital assistant. Symptom records were tracked and shared with clinicians. Control group participants (n = 23) received usual care. Longitudinal random effects modeling assessed the changes in average symptom scores over time. Descriptive statistics assessed study feasibility and intervention effects on HRQoL and communication self-efficacy. Postintervention focus groups, interviews, and surveys assessed responses to study participation. Mean age of the participants was 51.0 years; 42 participants (84%) were white. In comparison with control, intervention group participants reported lower average pain severity over time (P = .015). Mean pain interference scores over time were marginally different between groups (P = .07); mean depression and fatigue scores over time were statistically nonsignificant. Feasibility outcomes and perspectives about study participation were positive. Mean pre-post decreases in HRQoL were generally higher among intervention group participants; pre-post changes in communication self-efficacy were equivalent. Mixed findings of the study indicate the need for future research.
Phillips, Kathryn A.; Douglas, Michael P.; Trosman, Julia R.; Marshall, Deborah A.
Two key trends that emerge from the growth of “Big Data” and the emphasis on patient-centered healthcare are the increasing use of personalized medicine and digital medicine. In order for these technologies to move into mainstream health care and be reimbursed by insurers, it will be essential to have evidence that their benefits provide reasonable value relative to their costs. However, these technologies have complex characteristics that present challenges to assessment of their economic value. Previous work has identified these challenges for personalized medicine and thus this work can inform the more nascent topic of digital medicine. Our objective is to examine the methodological challenges and future opportunities for assessing the economic value of digital medicine, using personalized medicine as a comparison. We focus specifically on “digital biomarker technologies” and “multigene tests”. We identified similarities in these technologies that can present challenges to economic evaluation: multiple results, results with different types of utilities, secondary findings, downstream impact (including on family members), and interactive effects. Using a structured review, we found that there are few economic evaluations of digital biomarker technologies, with limited results. We conclude that more evidence on effectiveness of digital medicine will be needed but that the experiences with personalized medicine can inform what data will be needed and how such analyses can be conducted. Our study points out the critical need for typologies and terminology for digital medicine technologies that would enable them to be classified in ways that will facilitate research on their effectiveness and value. PMID:28212968
Harrefors, Christina; Sävenstedt, Stefan; Lundquist, Anders; Lundquist, Bengt; Axelsson, Karin
Cognitive impairments influence the possibility of persons with dementia to remember daily events and maintain a sense of self. In order to address these problems a digital photo diary was developed to capture information about events in daily life. The device consisted of a wearable digital camera, smart phone with Global Positioning System (GPS) and a home memory station with computer for uploading the photographs and touch screen. The aim of this study was to describe professional caregiver's perceptions on how persons with mild dementia might experience the usage of this digital photo diary from both a situation when wearing the camera and a situation when viewing the uploaded photos, through a questionnaire with 408 respondents. In order to catch the professional caregivers' perceptions a questionnaire with the semantic differential technique was used and the main question was "How do you think Hilda (the fictive person in the questionnaire) feels when she is using the digital photo diary?". The factor analysis revealed three factors; Sense of autonomy, Sense of self-esteem and Sense of trust. An interesting conclusion that can be drawn is that professional caregivers had an overall positive view of the usage of digital photo diary as supporting autonomy for persons with mild dementia. The meaningfulness of each situation when wearing the camera and viewing the uploaded pictures to be used in two different situations and a part of an integrated assistive device has to be considered separately. Individual needs and desires of the person who is living with dementia and the context of each individual has to be reflected on and taken into account before implementing assistive digital devices as a tool in care.
Campbell, Laurie O.; Cox, Thomas D.
Students within this study followed the ICSDR (Identify, Conceptualize/Connect, Storyboard, Develop, Review/Reflect/Revise) development model to create digital video, as a personalized and active learning assignment. The participants, graduate students in education, indicated that following the ICSDR framework for student-authored video guided…
Bellemans, T.; Kochan, B.; Janssens, D.; Wets, G.; Timmermans, H.J.P.; Stopher, P.
Tom Bellemans, Bruno Kochan, Davy Janssens, Geert Wets and Harry Timmermans (2008), ‘Field Evaluation of Personal Digital Assistant Enabled by Global Positioning System: Impact on Quality of Activity and Diary Data’, Transportation Research Record: Journal of the Transportation Research Board, No.
Deng, Xiaozhao; Ruan, Jianhai
The paper describes a support tool for learners engaged in e-learning, the Personal Digital Library (PDL). The characteristics and functionality of the PDL are presented. Suggested steps for constructing and managing a PDL are outlined and discussed briefly. The authors believe that the PDL as a support tool of e-learning will be important and essential in the future.
Park, Sanghoon; Kim, Minjeong; Lee, Youngmin; Son, Chanhee; Lee, Miyoung
PDAs (Personal Digital Assistants) have been used widely in educational settings. In this study, the visual illustration of a scientific text (cognitive-interest illustration, emotional-interest illustration, or no illustration) was manipulated to investigate its impact on student interest in instructional materials, achievement, and time spent on…
The emergence of digitized health and physical education, or "eHPE", embeds software algorithms in the organization of health and physical education pedagogies. Particularly with the emergence of wearable and mobile activity trackers, biosensors and personal analytics apps, algorithmic processes have an increasingly powerful part to play…
Munoz-Nunez, C. F.; Lloret-Alcaniz, A.
To develop a simple, low-cost technique for the digitization of X-ray films for personal use. A 66-MHz 486 PC with 8 MB of RAM, a Logitech ScanMan 256 hand-held scanner and a standard negatoscope with the power source converted to direct current. Although the system was originally designed for the digitization of mammographies, it has also been used with computed tomography, magnetic resonance, digital angiography and ultrasonographic images, as well as plain X-rays. After a minimal training period, the system digitized X-ray films easily and rapidly. Although the scanning values vary depending on the type of image to be digitized, an input spatial resolution of 200 dpi and a contrast resolution of 256 levels of gray are generally adequate. Of the storage formats tested, JPEG presented the best quality/image size ratio. A simple, low-cost technique has been developed for the digitization of X-ray films. This technique enables the storage of images in a digital format, thus facilitating their presentation and transmission. (Author) 9 refs
Full Text Available Abstract Background In this era of evidence-based medicine, doctors are increasingly using information technology to acquire medical knowledge. This study evaluates how residents and interns utilise and perceive the personal digital assistant (PDA and the online resource UpToDate. Methods This is a questionnaire survey of all residents and interns in a tertiary teaching hospital. Results Out of 168 doctors, 134 (79.8% responded to the questionnaire. Only 54 doctors (40.3% owned a PDA. Although these owners perceived that the PDA was most useful for providing drug information, followed by medical references, scheduling and medical calculators, the majority of them did not actually have medical software applications downloaded on their PDAs. The greatest concerns highlighted for the PDA were the fear of loss and breakage, and the preference for working with desktop computers and paper. Meanwhile, only 76 doctors (56.7% used UpToDate, even though the hospital had an institutional subscription for it. Although 93.4% of these users would recommend UpToDate to a colleague, only 57.9% stated that the use of UpToDate had led to a change in their management of patients. Conclusion Although UpToDate and various PDA software applications were deemed useful by some of the residents and interns in our study, both digital tools were under-utilised. More should be done to facilitate the use of medical software applications on PDAs, to promote awareness of tools for evidence-based medicine such as UpToDate, and to facilitate the application of evidence-based medicine in daily clinical practice.
Federal Emergency Management Agency, Department of Homeland Security — The Digital Flood Insurance Rate Map (DFIRM) Database depicts flood risk information and supporting data used to develop the risk data. The primary risk...
Rathore, Saima; Akbari, Hamed; Doshi, Jimit; Shukla, Gaurav; Rozycki, Martin; Bilello, Michel; Lustig, Robert; Davatzikos, Christos
Standard surgical resection of glioblastoma, mainly guided by the enhancement on postcontrast T1-weighted magnetic resonance imaging (MRI), disregards infiltrating tumor within the peritumoral edema region (ED). Subsequent radiotherapy typically delivers uniform radiation to peritumoral FLAIR-hyperintense regions, without attempting to target areas likely to be infiltrated more heavily. Noninvasive in vivo delineation of the areas of tumor infiltration and prediction of early recurrence in peritumoral ED could assist in targeted intensification of local therapies, thereby potentially delaying recurrence and prolonging survival. This paper presents a method for estimating peritumoral edema infiltration using radiomic signatures determined via machine learning methods, and tests it on 90 patients with de novo glioblastoma. The generalizability of the proposed predictive model was evaluated via cross-validation in a discovery cohort ([Formula: see text]) and was subsequently evaluated in a replication cohort ([Formula: see text]). Spatial maps representing the likelihood of tumor infiltration and future early recurrence were compared with regions of recurrence on postresection follow-up studies with pathology confirmation. The cross-validated accuracy of our predictive infiltration model on the discovery and replication cohorts was 87.51% (odds ratio = 10.22, sensitivity = 80.65, and specificity = 87.63) and 89.54% (odds ratio = 13.66, sensitivity = 97.06, and specificity = 76.73), respectively. The radiomic signature of the recurrent tumor region revealed higher vascularity and cellularity when compared with the nonrecurrent region. The proposed model shows evidence that multiparametric pattern analysis from clinical MRI sequences can assist in in vivo estimation of the spatial extent and pattern of tumor recurrence in peritumoral edema, which may guide supratotal resection and/or intensification of postoperative radiation therapy.
Noordkamp, H.W.; Brink, M. van den
Signatures are an important part of the design of a ship. In an ideal situation, signatures must be as low as possible. However, due to budget constraints it is most unlikely to reach this ideal situation. The arising question is which levels of signatures are optimal given the different scenarios
Full Text Available Abstract Background Personal digital assistants (PDA offer putative advantages over paper for collecting research data. However, there are no data prospectively comparing PDA and paper in the emergency department. The aim of this study was to prospectively compare the performance of PDA and paper enrollment instruments with respect to time required and errors generated. Methods We randomized consecutive patients enrolled in an ongoing prospective study to having their data recorded either on a PDA or a paper data collection instrument. For each method, we recorded the total time required for enrollment, and the time required for manual transcription (paper onto a computer database. We compared data error rates by examining missing data, nonsensical data, and errors made during the transcription of paper forms. Statistical comparisons were performed by Kruskal-Wallis and Poisson regression analyses for time and errors, respectively. Results We enrolled 68 patients (37 PDA, 31 paper. Two of 31 paper forms were not available for analysis. Total data gathering times, inclusive of transcription, were significantly less for PDA (6:13 min per patient compared to paper (9:12 min per patient; p Conclusion Using a PDA-based data collection instrument for clinical research reduces the time required for data gathering and significantly improves data integrity.
Lamarche, A.; Owens, E.H.; Laflamme, A.; Laforest, S.; Clement, S.
The Shoreline Cleanup Assessment Technique (SCAT) is a recognized method in North America to collect shoreline information and report observations on an oil spill. The long processing time required to analyze SCAT observations sometimes causes delays in oil spill response. Computerized systems have been developed to address this problem, but data entry of SCAT within such system involves much effort and is subject to potential errors. This paper described the development of a tool dedicated to the field capture of SCAT data on a Windows CE based Personal Digital Assistant (PDA). The system is compatible with both the SCAT methodology and Global Positioning System technology. A prototype of the system was tested during oil spills in Ontario and Nova Scotia. This paper described how the field data collection system was designed, developed and tested. Details of some user interfaces were provided to demonstrate how the large paper Shoreline Oiling Summary forms were made to fit on the small display screen of pocket-size devices. 8 refs., 1 tab., 12 figs
Menon, Anil S.; Moffett, Shannon; Enriquez, Melissa; Martinez, Miriam M.; Dev, Parvati; Grappone, Todd
Both teachers and students benefit from an interactive classroom. The teacher receives valuable input about effectiveness, student interest, and comprehension, whereas student participation, active learning, and enjoyment of the class are enhanced. Cost and deployment have limited the use of existing audience response systems, allowing anonymous linking of teachers and students in the classroom. These limitations can be circumvented, however, by use of personal digital assistants (PDAs), which are cheaper and widely used by students. In this study, the authors equipped a summer histology class of 12 students with PDAs and wireless Bluetooth cards to allow access to a central server. Teachers displayed questions in multiple-choice format as a Web page on the server and students responded with their PDAs, a process referred to as polling. Responses were immediately compiled, analyzed, and displayed. End-of-class survey results indicated that students were enthusiastic about the polling tool. The surveys also provided technical feedback that will be valuable in streamlining future trials. PMID:14764615
Chen, Yen-Cheng; Chiu, Hou-Chang; Tsai, Ming-Dar; Chang, Hang; Chong, Chee-Fah
Our study aims to develop a personal digital assistant (PDA)-based wireless application in medical information processing by using Bluetooth and IEEE 802.11b wireless standards and SyncML codes. In this study, an "integrated database access module" is used to provide a unified integrated access interface while consistency of wireless data transmission is achieved by using the standardized SyncML protocol. A prototype of the system has been developed, implemented, and tested for its mobility, usability, stability, and performance with questionnaire survey. Response time for browsing/searching was usually less than 3s. The average time intervals needed for data transmissions were 68.6+/-8.5s for Bluetooth and 47.0+/-4.8s for 802.11b. The five-point Likert scale (from 1=least to 5=most) questionnaire survey of 30 medical professionals yielded a high degree of satisfaction with the system's mobility (4.18+/-0.89), usability (4.69+/-0.90), stability (3.81+/-0.94), and performance (3.97+/-0.88). The results of our study suggested that PDA applications which exploit wireless communication are convenient and feasible in clinical practice.
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Signature. 12.12 Section 12.12... General Information and Preliminary Consideration of Pleadings § 12.12 Signature. (a) By whom. All... document on behalf of another person. (b) Effect. The signature on any document of any person acting either...
Yamin, Cyrus K; Emani, Srinivas; Williams, Deborah H; Lipsitz, Stuart R; Karson, Andrew S; Wald, Jonathan S; Bates, David W
Personal health records (PHRs) offer the potential to improve the patient experience and the quality of patient care. However, the "digital divide," the population-level gap in Internet and computer access, may prevent certain groups from accessing the PHR. We conducted a cross-sectional analysis of a PHR within a northeastern health system. We compared adopters (ie, those activating a PHR account online) with nonadopters (ie, those who see a physician offering the PHR but do not activate an account). We further categorized adopters by intensity of PHR use, measured by number of log-ins and number of messages sent to physicians' practices. As of September 30, 2009, among 75,056 patients, 43% had adopted the PHR since 2002. Blacks and Hispanics were less likely to adopt the PHR compared with whites (odds ratio [OR], 0.50; 95% confidence interval [CI], 0.45-0.55; and 0.64; 0.57-0.73, respectively), and those with lower annual income were less likely to adopt the PHR than were those with higher income. Compared with nonadopters, adopters were more likely to have more than 2 comorbidities (OR, 1.27; 95% CI, 1.17-1.30). Use of an aggressive marketing strategy for PHR enrollment increased adoption nearly 3-fold (OR, 2.92; 95% CI, 1.58-5.40). Intensity of use was best predicted by increasing number of comorbidities, followed by race/ethnicity (whites more than blacks and Hispanics) and insurance status. We found no association between income and log-in frequency or secure messages sent. Despite increasing Internet availability, racial/ethnic minority patients adopted a PHR less frequently than white patients, and patients with the lowest annual income adopted a PHR less often than those with higher incomes. Among adopters, however, income did not have an effect on PHR use.
Serdar, Muhittin A; Turan, Mustafa; Cihan, Murat
Laboratory specialists currently need to access scientific-based information at anytime and anywhere. A considerable period of time and too much effort are required to access this information through existing accumulated data. Personal digital assistants (PDA) are supposed to provide an effective solution with commercial software for this problem. In this study, 11 commercial software products (UpToDate, ePocrates, Inforetrive, Pepid, eMedicine, FIRST Consult, and 5 laboratory e-books released by Skyscape and/or Isilo) were selected and the benefits of their use were evaluated by seven laboratory specialists. The assessment of the software was performed based on the number of the tests included, the software content of detailed information for each test-like process, method, interpretation of results, reference ranges, critical values, interferences, equations, pathophysiology, supplementary technical details such as sample collection principles, and additional information such as linked references, evidence-based data, test cost, etc. In terms of technique, the following items are considered: the amount of memory required to run the software, the graphical user interface, which is a user-friendly instrument, and the frequency of new and/or up-date releases. There is still no perfect program, as we have anticipated. Interpretation of laboratory results may require software with an integrated program. However, methodological data are mostly not included in the software evaluated. It seems that these shortcomings will be fixed in the near future, and PDAs and relevant medical applications will also become indispensable for all physicians including laboratory specialists in the field of training/education and in patient care.
Lygidakis, Charilaos; Wallace, Paul; Tersar, Costanza; Marcatto, Francesco; Ferrante, Donatella; Della Vedova, Roberto; Scafuri, Francesca; Scafato, Emanuele; Struzzo, Pierluigi
Brief interventions delivered in primary health care are effective in reducing excessive drinking; online behavior-changing technique interventions may be helpful. Physicians may actively encourage the use of such interventions by helping patients access selected websites (a process known as "facilitated access"). Although the therapeutic working alliance plays a significant role in the achievement of positive outcomes in face-to-face psychotherapy and its development has been shown to be feasible online, little research has been done on its impact on brief interventions. Strengthening patients' perception of their physician's endorsement of a website could facilitate the development of an effective alliance between the patient and the app. We describe the implementation of a digitally mediated personal physician presence to enhance patient engagement with an alcohol-reduction website as part of the experimental online intervention in a noninferiority randomized controlled trial. We also report the feedback of the users on the module. The Download Your Doctor module was created to simulate the personal physician presence for an alcohol-reduction website that was developed for the EFAR-FVG trial conducted in the Italian region of Friuli-Venezia-Giulia. The module was designed to enhance therapeutic alliance and thus improve outcomes in the intervention group (facilitated access to the website). Participating general and family practitioners could customize messages and visual elements and upload a personal photo, signature, and video recordings. To assess the perceptions and attitudes of the physicians, a semistructured interview was carried out 3 months after the start of the trial. Participating patients were invited to respond to a short online questionnaire 12 months following recruitment to investigate their evaluation of their online experiences. Nearly three-quarters (23/32, 72%) of the physicians interviewed chose to customize the contents of the interaction
Ninos, K.; Georgiadis, P.; Cavouras, D.; Nomicos, C.
This study presents the design and development of a mobile wireless platform to be used for monitoring and analysis of seismic events and related electromagnetic (EM) signals, employing Personal Digital Assistants (PDAs). A prototype custom-developed application was deployed on a 3G enabled PDA that could connect to the FTP server of the Institute of Geodynamics of the National Observatory of Athens and receive and display EM signals at 4 receiver frequencies (3 KHz (E-W, N-S), 10 KHz (E-W, N-S), 41 MHz and 46 MHz). Signals may originate from any one of the 16 field-stations located around the Greek territory. Employing continuous recordings of EM signals gathered from January 2003 till December 2007, a Support Vector Machines (SVM)-based classification system was designed to distinguish EM precursor signals within noisy background. EM-signals corresponding to recordings preceding major seismic events (Ms≥5R) were segmented, by an experienced scientist, and five features (mean, variance, skewness, kurtosis, and a wavelet based feature), derived from the EM-signals were calculated. These features were used to train the SVM-based classification scheme. The performance of the system was evaluated by the exhaustive search and leave-one-out methods giving 87.2% overall classification accuracy, in correctly identifying EM precursor signals within noisy background employing all calculated features. Due to the insufficient processing power of the PDAs, this task was performed on a typical desktop computer. This optimal trained context of the SVM classifier was then integrated in the PDA based application rendering the platform capable to discriminate between EM precursor signals and noise. System's efficiency was evaluated by an expert who reviewed 1/ multiple EM-signals, up to 18 days prior to corresponding past seismic events, and 2/ the possible EM-activity of a specific region employing the trained SVM classifier. Additionally, the proposed architecture can form a
Singer, Hannah M; Almazan, Timothy; Craft, Noah; David, Consuelo V; Eells, Samantha; Erfe, Crisel; Lazzaro, Cynthia; Nguyen, Kathy; Preciado, Katy; Tan, Belinda; Patel, Vishal A
Teledermatology has undergone exponential growth in the past 2 decades. Many technological innovations are becoming available without necessarily undergoing validation studies for specific dermatologic applications. To determine whether patient-taken photographs of acne using Network Oriented Research Assistant (NORA) result in similar lesion counts and Investigator's Global Assessment (IGA) findings compared with in-person examination findings. This pilot reliability study enrolled consecutive patients with acne vulgaris from a single general dermatology practice in Los Angeles, California, who were able to use NORA on an iPhone 6 to take self-photographs. Patients were enrolled from January 1 through March 31, 2016. Each individual underwent in-person and digital evaluation of his or her acne by the same dermatologist. A period of at least 1 week separated the in-person and digital assessments of acne. All participants were trained on how to use NORA on the iPhone 6 and take photographs of their face with the rear-facing camera. Reliability of patient-taken photographs with NORA for acne evaluation compared with in-person examination findings. Acne assessment measures included lesion count (total, inflammatory, noninflammatory, and cystic) and IGA for acne severity. A total of 69 patients (37 male [54%] and 32 female [46%]; mean [SD] age, 22.7 [7.7] years) enrolled in the study. The intraclass correlation coefficients of in-person and photograph-based acne evaluations indicated strong agreement. The intraclass correlation coefficient for total lesion count was 0.81; for the IGA, 0.75. Inflammatory lesion count, noninflammatory lesion count, and cyst count had intraclass correlation coefficients of 0.72, 0.72, and 0.82, respectively. This study found agreement between acne evaluations performed in person and from self-photographs with NORA. As a reliable telehealth technology for acne, NORA can be used as a teledermatology platform for dermatology research and can
Lane David R
Full Text Available Abstract Background Personal Digital Assistants (PDAs have been integrated into daily practice for many emergency physicians and house officers. Few objective data exist that quantify the effect of PDAs on documentation. The objective of this study was to determine whether use of a PDA would improve emergency medicine house officer documentation of procedures and patient resuscitations. Methods Twelve first-year Emergency Medicine (EM residents were provided a Palm V (Palm, Inc., Santa Clara, California, USA PDA. A customizable patient procedure and encounter program was constructed and loaded into each PDA. Residents were instructed to enter information on patients who had any of 20 procedures performed, were deemed clinically unstable, or on whom follow-up was obtained. These data were downloaded to the residency coordinator's desktop computer on a weekly basis for 36 months. The mean number of procedures and encounters performed per resident over a three year period were then compared with those of 12 historical controls from a previous residency class that had recorded the same information using a handwritten card system for 36 months. Means of both groups were compared a two-tailed Student's t test with a Bonferroni correction for multiple comparisons. One hundred randomly selected entries from both the PDA and handwritten groups were reviewed for completeness. Another group of 11 residents who had used both handwritten and PDA procedure logs for one year each were asked to complete a questionnaire regarding their satisfaction with the PDA system. Results Mean documentation of three procedures significantly increased in the PDA vs handwritten groups: conscious sedation 24.0 vs 0.03 (p = 0.001; thoracentesis 3.0 vs 0.0 (p = 0.001; and ED ultrasound 24.5 vs. 0.0 (p = 0.001. In the handwritten cohort, only the number of cardioversions/defibrillations (26.5 vs 11.5 was statistically increased (p = 0.001. Of the PDA entries, 100% were entered
Wang Mingming; Chen Xiubo; Niu Xinxin; Yang Yixian
Recently, blind quantum signature (BQS) protocols have been proposed with the help of a third-party verifier. However, our research shows that some of the BQS protocols are unable to complete the blind signature task fairly if the verifier is dishonest. Indeed, these protocols can be viewed as variants of the classical digital signature scheme of symmetric-key cryptography. If nobody is trusted in such protocols, digital signature cannot be implemented since disagreements cannot be solved fairly.
Omheni, Nizar; Kalboussi, Anis; Mazhoud, Omar; Kacem, Ahmed Hadj
Researchers in distance education are interested in observing and modelling of learner's personality profile, and adapting their learning experiences accordingly. When learners read and interact with their reading materials, they do unselfconscious activities like annotation which may be a key feature of their personalities. Annotation activity…
Thomas, Neil; Farhall, John; Foley, Fiona; Leitan, Nuwan Dominic; Villagonzalo, Kristi-Ann; Ladd, Emma; Nunan, Cassy; Farnan, Sue; Frankish, Rosalie; Smark, Tara; Rossell, Susan L; Sterling, Leon; Murray, Greg; Castle, David Jonathon; Kyrios, Michael
For people with persisting psychotic disorders, personal recovery has become an important target of mental health services worldwide. Strongly influenced by mental health service consumer perspectives, personal recovery refers to being able to live a satisfying and contributing life irrespective of ongoing symptoms and disability. Contact with peers with shared lived experience is often cited as facilitative of recovery. We aimed to develop and pilot a novel recovery-based digitally supported intervention for people with a psychotic illness. We developed a website to be used on a tablet computer by mental health workers to structure therapeutic discussions about personal recovery. Central to the site was a series of video interviews of people with lived experience of psychosis discussing how they had navigated issues within their own recovery based on the Connectedness-Hope-Identity-Meaning-Empowerment model of recovery. We examined the feasibility and acceptability of an 8-session low intensity intervention using this site in 10 participants with persisting psychotic disorders and conducted a proof-of-concept analysis of outcomes. All 10 participants completed the full course of sessions, and it was possible to integrate use of the website into nearly all sessions. Participant feedback confirmed that use of the website was a feasible and acceptable way of working. All participants stated that they would recommend the intervention to others. Post-intervention, personal recovery measured by the Questionnaire for the Process of Recovery had improved by an average standardized effect of d = 0.46, 95% CI [0.07, 0.84], and 8 of the 10 participants reported that their mental health had improved since taking part in the intervention. In-session use of digital resources featuring peer accounts of recovery is feasible and acceptable and shows promising outcomes. A randomized controlled trial is the next step in evaluating the efficacy of this low intensity intervention
Recent technological, cultural and economic factors have shifted the balance between recalling and reconstructing internalised information and accessing externalised information. While digital artefacts constitute an enormous and valuable set of resources, human engagement and reflection are important to the meaningful synthesis and application of…
Wang, Y.; Eliëns, A.; Riel, van C.; Guerrero-Bote, V.P.
Digitization of cultural heritage becomes an important requisite for remote co-operation, education and tourism between art institutes, museums and the general public since the 90’s. Based on the demand to access the scattered collections from the Netherlands Institute for Cultural Heritage and
Chun, Tong Jin; Jeon, Eun Ju; Baek, Ho Gil; Kang, Eun Joo; Baik, Seung Kug; Choi, Han Yong; Kim, Bong Ki
A film-based teaching file takes up space and the need to search through such a file places limits on the extent to which it is likely to be used. Furthermore it is not easy for doctors in a medium-sized hospital to experience a variety of cases, and so for these reasons we created an easy-to-use digital imaging teaching file with HTML(Hypertext Markup Language) and downloaded images via World Wide Web(WWW) services on the Internet. This was suitable for use by computer novices. We used WWW internet services as a resource for various images and three different IMB-PC compatible computers(386DX, 486DX-II, and Pentium) in downloading the images and in developing a digitalized teaching file. These computers were connected with the Internet through a high speed dial-up modem(28.8Kbps) and to navigate the Internet. Twinsock and Netscape were used. 3.0, Korean word processing software, was used to create HTML(Hypertext Markup Language) files and the downloaded images were linked to the HTML files. In this way, a digital imaging teaching file program was created. Access to a Web service via the Internet required a high speed computer(at least 486DX II with 8MB RAM) for comfortabel use; this also ensured that the quality of downloaded images was not degraded during downloading and that these were good enough to use as a teaching file. The time needed to retrieve the text and related images depends on the size of the file, the speed of the network, and the network traffic at the time of connection. For computer novices, a digital image teaching file using HTML is easy to use. Our method of creating a digital imaging teaching file by using Internet and HTML would be easy to create and radiologists with little computer experience who want to study various digital radiologic imaging cases would find it easy to use
Gajek, Sebastian; Jensen, Meiko; Liao, Lijun
In recent research it turned out that Boolean verification, of digital signatures in the context of WSSecurity, is likely to fail: If parts of a SOAP message, are signed and the signature verification applied to, the whole document returns true, then nevertheless the, document may have been...
Marcos CABEZAS GONZÁLEZ
Full Text Available Personal Learning Enviroment (PLE is one of the most interesting concepts that has aroused among teachers and software engineers in the last time and that will have an impact on the next years among all the levels and modalities of education. ple is a product of various factors including a social web that is shown by tools and free access services based in an open code technology. But a PLE is not a kind of software or platform; it is a new view about how to use the technologies for the learning process both in the initial formation and the lifelong learning. This article has teaching in Law Schools in Colombia and the inexistence of juridical practice proposals that may develop the professional competencies linked to the non-formal and everyday learning and linked to personal learning environments. The target that we try to acquire is to create a PLE proposal supported by 2.0 technologies and orientated to encourage a lifelong learning that may develop the digital and informative competences in Law practice. We strongly believe that a PLE model will help the student acquire the knowledge, abilities and experiences that may allow them a personal and professional development in the frame of a lifelong learning program that will contribute to approach goals and opportunities in the information and communication society that is in constant evolution.
van Noort, G.; Kruikemeier, S.; Vliegenthart, R.
In communication research, it has been claimed that two important characteristics of online political communication, personalized and interactive two-way communication, can mobilize citizens to become more politically involved. In a survey-embedded experiment, we examine whether levels of
McGlynn, S.P.; Varma, M.N.
A new concept for modelling radiation risk is proposed. This concept is based on the proposal that the spectrum of molecular lesions, which we dub ''the radiation signature'', can be used to identify the quality of the causal radiation. If the proposal concerning radiation signatures can be established then, in principle, both prospective and retrospective risk determination can be assessed on an individual basis. A major goal of biophysical modelling is to relate physical events such as ionization, excitation, etc. to the production of radiation carcinogenesis. A description of the physical events is provided by track structure. The track structure is determined by radiation quality, and it can be considered to be the ''physical signature'' of the radiation. Unfortunately, the uniqueness characteristics of this signature are dissipated in biological systems in ∼10 -9 s. Nonetheless, it is our contention that this physical disturbance of the biological system eventuates later, at ∼10 0 s, in molecular lesion spectra which also characterize the causal radiation. (author)
Carroll, A E; Saluja, S; Tarczy-Hornoch, P
Personal Digital Assistants (PDAs) offer clinicians the ability to enter and manage critical information at the point of care. Although PDAs have always been designed to be intuitive and easy to use, recent advances in technology have made them even more accessible. The ability to link data on a PDA (client) to a central database (server) allows for near-unlimited potential in developing point of care applications and systems for patient data management. Although many stand-alone systems exist for PDAs, none are designed to work in an integrated client/server environment. This paper describes the design, software and hardware selection, and preliminary testing of a PDA based patient data and charting system for use in the University of Washington Neonatal Intensive Care Unit (NICU). This system will be the subject of a subsequent study to determine its impact on patient outcomes and clinician efficiency.
Yon, Bethany A; Johnson, Rachel K; Harvey-Berino, Jean; Gold, Beth Casey; Howard, Alan B
Dietary self-monitoring is considered the core of behavioral weight control programs. As software for personal digital assistants (PDA) has become more available, this study investigated whether the use of a PDA would improve dietary self-monitoring frequency and subsequent weight loss over the use of traditional paper diaries. One-hundred-seventy-six adults (BMI 25-39.9) participated in a 6-month behavioral weight control program. Treatment subjects (n = 61) were provided with a PalmZire 21 with Calorie King's Diet Diary software installed. Their self-monitoring habits and weight loss were compared with the results from a previous program (n = 115) which followed the same protocol using paper diaries for self-monitoring. No significant differences in weight loss or dietary self-monitoring were found. More frequent self-monitoring correlated with weight loss in both groups (pself-monitoring that is fitting to their lifestyle and skills.
Dekker, Arne; Thula Koops
Digital media are used for the purpose of various sexual experiences. In recent years the exchange of erotic text messages or images ("sexting") has gained the attention of academic research and has increasingly been the center of public discussion on sexual boundary violations and violence via digital media. The unwanted forwarding of images to a third party is especially relevant in this respect. In contrast to media reports about sexting as a risk behavior with serious consequences, there is little empirical analysis about the actual sexting practice of adolescents and adults in Germany. This paper is the first to describe sexting behavior of young adults in Germany on the basis of a large representative student sample. Data were collected in 2012 in the course of a nationwide study. Students from 15 universities were asked among other things about their experiences with sending erotic text messages or images, the non-consensual forwarding of images and its consequences. More than half of the student sample reported sending erotic text messages, 26.8% of women and 16.8% of men had sent erotic images to someone, in most cases to their partner. Of the sexters, 2% mentioned that their images had been forwarded to another person without their consent. The results indicate that in Germany sexting is mostly practiced in the context of a romantic relationship. Only a small percentage experience unwanted forwarding of images, and negative consequences are not reported for all incidents; however, this does not relativize the impact of those events implicating serious negative consequences for the involved person.
López-Nores, Martín; Pazos-Arias, José Juan; Blanco-Fernández, Yolanda; García-Duque, Jorge; Tubío-Pardavila, Ricardo; Rey-López, Marta
The development of Interactive Digital TV bears a great potential for electronic commerce, which remains heavily underexploited to date. The early initiatives to harness these technologies rely on the advertising techniques traditionally employed by the television industry, which have proven deficiencies related to viewers' comfort, locality and targeting. Furthermore, out of dedicated channels, there are very few attempts to provide interactive commercial functionalities through the TV, for example to sell products or to hire services. This chapter presents an overview of a system called MiSPOT that introduces solutions to these problems in two levels: (i) to advertise items that match the preferences and needs of the viewers, without interfering with their enjoyment of the TV programs; and (ii) to assemble specialized interactive applications that provide them with tailor-made commercial functionalities. These solutions are grounded on techniques from the Semantic Web, and are valid for both domestic TV receivers and mobile ones.
Alexandr V. Mamaev
Full Text Available Number of cybercrimes is constantly rising both in Europe, and around the world. The costs incurred from such malicious activities are rising correspondingly. According to the data collected by Jupiter Research these costs increased from $1.5 trillion in 2015 to $2 trillion in 2019. That is why European Union is expected to introduce major changes to the Personal Data Protection Acts which stayed mostly unchanged since the 1990s. The consequences of those changes will be felt in countries beyond the European Union. The personal data of internet users have long become a commodity on the e-commerce market. Yet the manipulations with the personal data cause concerns among both the users, who do not fully realize how and to what purposes their data are used, and governments, who try to protect the confidentiality remains by the law. Despite that the number of incidents with data leaks continues to rise exponentially. In December 2017 the lawyers from Hill Dickinson, a UK commercial law firm, filed a lawsuit against Google regarding unlawful collection of the iPhone users’ data. Another company that is about to have problems with law is Uber Technologiesm, which sent SMS messages to its clients without obtaining formal permissions for that. Finally, in March 2018 it was Facebook which had to explain the way the personal data on more than 80 million users have leaked and ended up in the hands of a third party. The authors of this article assessed the possibilities for introducing the ecosystem of virtual assistants and blockchain technology for safe and depersonalized data processing as well as its further use. This system opens broad unexpected opportunities for the machine-to-machine-marketing.
Rasson, Marie; De Cock, Barbara; 14th International Pragmatics Conference
In this paper, we study various mechanisms to create intersubjectivity in a digital genre, namely Yahoo Questions and Answers (YQA). More concretely, we focus on the Spanish indefinite strategy uno (“one”) and its interaction with deictic person pronouns. YQA aims to provide assistance to users, who can ask other users questions on topics of all types. The other users respond by giving advice - often by referring to their personal experience - or their opinion on a given issue (Placencia, 201...
Quiett, S.; Axtell, L.H.
A detection-type security system using enhanced capability cameras or other imaging devices can aid in maintaining security from long distance and/or for large areas. To do so requires that the imaging device(s) be repeatedly and accurately positioned so that no areas are overlooked. Digital control using personal computers is the simplest method of achieving positional accuracy. The monitoring of large areas and/or a large number of areas also requires that a substantial quantity of visual information be catalogued and evaluated for potential security problems. While security personnel alone are typically used for such monitoring, as the quantity of visual information increases, the likelihood that potential security threats will be missed also increases. The ability of an image-based security system to detect potential security problems can be further increased with the use of selected image processing techniques. Utilizing personal computers for both imaging device position control as well as image processing, surveillance of large areas can be performed by a limited number of individuals with a high level of system confidence
Kim, Eung-Hun; Kim, Yongmin
Personal Health Record (PHR) has been increasingly recognized and actively promoted by the federal government, experts and industry as an important tool for improving healthcare in the U.S. However, the PHR use by patients and its utility have not been studied well. We have evaluated a web-based PHR in multiple locations covering diverse population groups. The study sites included a surgical specialty clinic, a medical specialty clinic, and a mental health clinic at the University of Washington, and a low-income elderly housing facility near Seattle in the state of Washington. The PHR use by the low-income elderly was limited due to poor technical skills and low physical/cognitive abilities. On the other hand, the younger and affluent populations used the web-based PHR much easily and efficiently compared to the older and low-income group. They regarded managing personal health information easy while the older group struggled. As more computer literate individuals age, the next-generation elderly are certain to be more technically skilled than the current generation. Although the reduced physical/cognitive abilities due to aging would still be a challenge, more elderly people will be able to not only use a PHR system but also use it to the full extent to get the maximum benefit.
Band, Rebecca; Bradbury, Katherine; Morton, Katherine; May, Carl; Michie, Susan; Mair, Frances S; Murray, Elizabeth; McManus, Richard J; Little, Paul; Yardley, Lucy
This paper describes the intervention planning process for the Home and Online Management and Evaluation of Blood Pressure (HOME BP), a digital intervention to promote hypertension self-management. It illustrates how a Person-Based Approach can be integrated with theory- and evidence-based approaches. The Person-Based Approach to intervention development emphasises the use of qualitative research to ensure that the intervention is acceptable, persuasive, engaging and easy to implement. Our intervention planning process comprised two parallel, integrated work streams, which combined theory-, evidence- and person-based elements. The first work stream involved collating evidence from a mixed methods feasibility study, a systematic review and a synthesis of qualitative research. This evidence was analysed to identify likely barriers and facilitators to uptake and implementation as well as design features that should be incorporated in the HOME BP intervention. The second work stream used three complementary approaches to theoretical modelling: developing brief guiding principles for intervention design, causal modelling to map behaviour change techniques in the intervention onto the Behaviour Change Wheel and Normalisation Process Theory frameworks, and developing a logic model. The different elements of our integrated approach to intervention planning yielded important, complementary insights into how to design the intervention to maximise acceptability and ease of implementation by both patients and health professionals. From the primary and secondary evidence, we identified key barriers to overcome (such as patient and health professional concerns about side effects of escalating medication) and effective intervention ingredients (such as providing in-person support for making healthy behaviour changes). Our guiding principles highlighted unique design features that could address these issues (such as online reassurance and procedures for managing concerns). Causal
In line with the overall trend individuals’ personal affairs, too, are composed of digital records to an increasing amount. At about the same time, the era of local storage in end-user equipment is about to give way to remote computing where data resides on third party equipment (cloud computing).
Wu, Vincent Wing-Cheung; Tang, Fuk-hay; Cheung, Wai-kwan; Chan, Kit-chi
In localisation of radiotherapy treatment field, the oncologist is present at the simulator to approve treatment details produced by the therapist. Problems may arise if the oncologist is not available and the patient requires urgent treatment. The development of a tele-localisation system is a potential solution, where the oncologist uses a personal digital assistant (PDA) to localise the treatment field on the image sent from the simulator through wireless communication and returns the information to the therapist after his or her approval. Our team developed the first tele-localisation prototype, which consisted of a server workstation (simulator) for the administration of digital imaging and communication in medicine localisation images including viewing and communication with the PDA via a Wi-Fi network; a PDA (oncologist's site) installed with the custom-built programme that synchronises with the server workstation and performs treatment field editing. Trial tests on accuracy and speed of the prototype system were conducted on 30 subjects with the treatment regions covering the neck, skull, chest and pelvis. The average time required in performing the localisation using the PDA was less than 1.5 min, with the blocked field longer than the open field. The transmission speed of the four treatment regions was similar. The average physical distortion of the images was within 4.4% and the accuracy of field size indication was within 5.3%. Compared with the manual method, the tele-localisation system presented with an average deviation of 5.5%. The prototype system fulfilled the planned objectives of tele-localisation procedure with reasonable speed and accuracy. © 2012 The Authors. Journal of Medical Imaging and Radiation Oncology © 2012 The Royal Australian and New Zealand College of Radiologists.
Volynskaya, Zoya; Chow, Hung; Evans, Andrew; Wolff, Alan; Lagmay-Traya, Cecilia; Asa, Sylvia L
- The critical role of pathology in diagnosis, prognosis, and prediction demands high-quality subspecialty diagnostics that integrates information from multiple laboratories. - To identify key requirements and to establish a systematic approach to providing high-quality pathology in a health care system that is responsible for services across a large geographic area. - This report focuses on the development of a multisite pathology informatics platform to support high-quality surgical pathology and hematopathology using a sophisticated laboratory information system and whole slide imaging for histology and immunohistochemistry, integrated with ancillary tools, including electron microscopy, flow cytometry, cytogenetics, and molecular diagnostics. - These tools enable patients in numerous geographic locations access to a model of subspecialty pathology that allows reporting of every specimen by the right pathologist at the right time. The use of whole slide imaging for multidisciplinary case conferences enables better communication among members of patient care teams. The system encourages data collection using a discrete data synoptic reporting module, has implemented documentation of quality assurance activities, and allows workload measurement, providing examples of additional benefits that can be gained by this electronic approach to pathology. - This approach builds the foundation for accurate big data collection and high-quality personalized and precision medicine.
Wen Xiao-jun; Liu Yun; Sun Yu
In this paper, a protocol which can be used in multi-user quantum signature is proposed. The scheme of signature and verification is based on the correlation of Greenberger-Horne-Zeilinger (GHZ) states and the controlled quantum teleportation. Different from the digital signatures, which are based on computational complexity, the proposed protocol has perfect security in the noiseless quantum channels. Compared to previous quantum signature schemes, this protocol can verify the signature independent of an arbitrator as well as realize multi-user signature together. (orig.)
Full Text Available The objective of a current design science research (DSR undertaking is responding to the call for a decentralizing Knowledge Management (KM revolution by conceptualizing a Personal Knowledge Management (PKM system. The rationale is rooted in today’s accelerating information abundance and lack of adequate tools which signify—in the author’s view—the presently emerging and most crucial barriers to individual and collective development. For validation, it employs prototyping and verifies its design decisions against DSR guidelines and KM-related methodologies and practices. For the latter purpose, this article employs the SVIDT methodology (Strengths, Vulnerability, and Intervention Assessment related to Digital Threats by adopting a hindsight reverse-engineered logical perspective in order to present the line of reasoning from the proposed technologies back to the underlying motivations. Its focus is the sustainability of PKM systems, processes, and outcomes combined with SVIDT’s concerns with goals and environments, actors and affiliations, strengths and weaknesses, threat and intervention scenarios, and synergies and strategies. In following the SVIDT’s nine steps, the broad span of the Personal Knowledge Management (PKM concept’s “wicked” problem space is presented. The results reaffirm the DSR concept of theory effectiveness in terms of the system’s utility and communication, and present the PKM concept and system as sustainable interventions to confront opportunity divides independent of space (e.g., developed/developing countries, time (e.g., study or career phase, discipline (e.g., natural or social science, or role (e.g., student, professional, or leader.
Forsell, M; Häggström, M; Johansson, O; Sjögren, P
To develop a personal digital assistant (PDA) application for oral health assessment fieldwork, including back-office and database systems (MobilDent). System design, construction and implementation of PDA, back-office and database systems. System requirements for MobilDent were collected, analysed and translated into system functions. User interfaces were implemented and system architecture was outlined. MobilDent was based on a platform with. NET (Microsoft) components, using an SQL Server 2005 (Microsoft) for data storage with Windows Mobile (Microsoft) operating system. The PDA devices were Dell Axim. System functions and user interfaces were specified for MobilDent. User interfaces for PDA, back-office and database systems were based on. NET programming. The PDA user interface was based on Windows suitable to a PDA display, whereas the back-office interface was designed for a normal-sized computer screen. A synchronisation module (MS Active Sync, Microsoft) was used to enable download of field data from PDA to the database. MobilDent is a feasible application for oral health assessment fieldwork, and the oral health assessment database may prove a valuable source for care planning, educational and research purposes. Further development of the MobilDent system will include wireless connectivity with download-on-demand technology.
Li, Ya-Pin; Gao, Hong-Wei; Fan, Hao-Jun; Wei, Wei; Xu, Bo; Dong, Wen-Long; Li, Qing-Feng; Song, Wen-Jing; Hou, Shi-Ke
The objective of this study was to build a database to collect infectious disease information at the scene of a disaster through the use of 128 epidemiological questionnaires and 47 types of options, with rapid acquisition of information regarding infectious disease and rapid questionnaire customization at the scene of disaster relief by use of a personal digital assistant (PDA). SQL Server 2005 (Microsoft Corp, Redmond, WA) was used to create the option database for the infectious disease investigation, to develop a client application for the PDA, and to deploy the application on the server side. The users accessed the server for data collection and questionnaire customization with the PDA. A database with a set of comprehensive options was created and an application system was developed for the Android operating system (Google Inc, Mountain View, CA). On this basis, an infectious disease information collection system was built for use at the scene of disaster relief. The creation of an infectious disease information collection system and rapid questionnaire customization through the use of a PDA was achieved. This system integrated computer technology and mobile communication technology to develop an infectious disease information collection system and to allow for rapid questionnaire customization at the scene of disaster relief. (Disaster Med Public Health Preparedness. 2017;11:668-673).
Campbell, Joyce K; Ortiz, Michael V; Ottolini, Mary C; Birch, Sarah; Agrawal, Dewesh
Optimizing clinical proficiency and education of residents has become more important with restricted residency duty hours. Our objective was to investigate how interns spend their time on inpatient rotations and the perceived educational value of workday activities. We performed a descriptive self-work sampling study using a personal digital assistant (PDA) to randomly query interns on inpatient rotations in real time regarding their activity and the perceived educational value of that activity on a 4-point Likert scale. A total of 31 interns participated on 88 workdays over a 5-month period, generating 2082 samples from which the average workday was modeled. Time spent using the electronic health record (EHR) accounted for 33% of intern time, communicating with the health care team 23%, educational activities 17%, and time with patients and families 12%. Time with patients and families was perceived to be the most educational part of clinical service. Time spent using the EHR was perceived as the least educational. Interns perceived clinical service as excellent or good 37% of the time, while planned educational activities were perceived as excellent or good 81% of the time. Interns spend the majority of their time using the EHR and communicating with the health care team. Interns perceive time spent in planned educational activities has more educational value than time spent in clinical service. The distribution of daily activities is discordant with the perceived educational value of those activities. Copyright © 2016 Academic Pediatric Association. Published by Elsevier Inc. All rights reserved.
Recently the National Center for Digital Government held a workshop on "The Virtual Citizen: Identity, Autonomy, and Accountability: A Civic Scenario Exploration of the Role of Identity in On-Line. Discussions at the workshop focused on five scenarios for future authentication policies with respect to digital identity. The underlying technologies considered for authentication were: biometrics: cryptography, with a focus on digital signatures; secure processing/computation; and reputation syst...
A.W. (Bert) Mulder; M.W. (Martijn) Hartog
DIGITAL CITIZENS CREATE A DIGITAL NATION Citizens will play the lead role as they – in the next phase of the information society – collectively create a digital nation. Personal adoption of information and communication technology will create a digital infrastructure that supports individual and
Full Text Available With the rise of Bitcoin, blockchain which is the core technology of Bitcoin has received increasing attention. Privacy preserving and performance on blockchain are two research points in academia and business, but there are still some unresolved issues in both respects. An aggregate signature scheme is a digital signature that supports making signatures on many different messages generated by many different users. Using aggregate signature, the size of the signature could be shortened by compressing multiple signatures into a single signature. In this paper, a new signature scheme for transactions on blockchain based on the aggregate signature was proposed. It was worth noting that elliptic curve discrete logarithm problem and bilinear maps played major roles in our signature scheme. And the security properties of our signature scheme were proved. In our signature scheme, the amount will be hidden especially in the transactions which contain multiple inputs and outputs. Additionally, the size of the signature on transaction is constant regardless of the number of inputs and outputs that the transaction contains, which can improve the performance of signature. Finally, we gave an application scenario for our signature scheme which aims to achieve the transactions of big data on blockchain.
Abdalla , Michel; Fouque , Pierre-Alain; Lyubashevsky , Vadim; Tibouchi , Mehdi
International audience; In this paper, we present three digital signature schemes with tight security reductions in the random oracle model. Our first signature scheme is a particularly efficient version of the short exponent discrete log-based scheme of Girault et al. (J Cryptol 19(4):463–487, 2006). Our scheme has a tight reduction to the decisional short discrete logarithm problem, while still maintaining the non-tight reduction to the computational version of the problem upon which the or...
Davies, Emma L; Lonsdale, Adam J; Hennelly, Sarah E; Winstock, Adam R; Foxcroft, David R
To assess the effectiveness of two personalized digital interventions (OneTooMany and Drinks Meter) compared to controls. Randomized controlled trial (AEARCTR-0,001,082). Volunteers for the study, aged 18-30, were randomly allocated to one of two interventions or one of two control groups and were followed up 4 weeks later. Primary outcomes were AUDIT-C, drinking harms and pre-loading. Drinks Meter provided participants with brief screening and advice for alcohol in addition to normative feedback, information on calories consumed and money spent. OneTooMany presented a series of socially embarrassing scenarios that may occur when drinking, and participants were scored according to if/how recently they had been experienced. The study failed to recruit and obtain sufficient follow-up data to reach a prior estimated power for detecting a difference between groups and there was no indication in the analysable sample of 402 subjects of a difference on the primary outcome measures (Drinks Meter; AUDIT-C IRR = 0.98 (0.89-1.09); Pre-loading IRR = 1.01 (0.95-1.07); Harms IRR = 0.97 (0.79-1.20); OneTooMany; AUDIT-C IRR = 0.96 (0.86-1.07); Pre-loading IRR = 0.99 (0.93-1.06); Harms IRR = 1.16 (0.94-1.43). Further research is needed on the efficacy of such instruments and their ingredients. However, recruitment and follow-up are a challenge. © The Author 2017. Medical Council on Alcohol and Oxford University Press. All rights reserved.
Ørngreen, Rikke; Henningsen, Birgitte Sølbeck; Louw, Arnt Vestergaard
The drop-out rate among students attending vocational training institutions is higher than for other forms of education at the same entry level (in Denmark, but also generally in Europe). A recent Danish reform has aided students, who enter the first part of the basic program directly from primar...... students are at school and in practical placements with companies. This may increase students’ social engagement and interest in the subject matter, together with greater awareness of professional identity, which could help decrease drop-out rates for vocational training.......The drop-out rate among students attending vocational training institutions is higher than for other forms of education at the same entry level (in Denmark, but also generally in Europe). A recent Danish reform has aided students, who enter the first part of the basic program directly from primary...... multimedia and video productions in Vocational Educational Training (VET). These video productions focused on the subjects of their future profession, and increased students’ motivation and experience of professional pride. Through a semistructured literature review, the paper then argues for a research...
... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Application forms; contents; signature. 1309.32... Application forms; contents; signature. (a) Any person who is required to be registered pursuant to § 1309.21... this paragraph and shall contain the signature of the individual being authorized to sign the...
Kim, Taewan; Lee, Hyang-Sook
When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)
Pavone, Enea Francesco; Tieri, Gaetano; Rizza, Giulia; Tidoni, Emmanuele; Grisoni, Luigi; Aglioti, Salvatore Maria
Brain monitoring of errors in one's own and other's actions is crucial for a variety of processes, ranging from the fine-tuning of motor skill learning to important social functions, such as reading out and anticipating the intentions of others. Here, we combined immersive virtual reality and EEG recording to explore whether embodying the errors of an avatar by seeing it from a first-person perspective may activate the error monitoring system in the brain of an onlooker. We asked healthy participants to observe, from a first- or third-person perspective, an avatar performing a correct or an incorrect reach-to-grasp movement toward one of two virtual mugs placed on a table. At the end of each trial, participants reported verbally how much they embodied the avatar's arm. Ratings were maximal in first-person perspective, indicating that immersive virtual reality can be a powerful tool to induce embodiment of an artificial agent, even through mere visual perception and in the absence of any cross-modal boosting. Observation of erroneous grasping from a first-person perspective enhanced error-related negativity and medial-frontal theta power in the trials where human onlookers embodied the virtual character, hinting at the tight link between early, automatic coding of error detection and sense of embodiment. Error positivity was similar in 1PP and 3PP, suggesting that conscious coding of errors is similar for self and other. Thus, embodiment plays an important role in activating specific components of the action monitoring system when others' errors are coded as if they are one's own errors. Detecting errors in other's actions is crucial for social functions, such as reading out and anticipating the intentions of others. Using immersive virtual reality and EEG recording, we explored how the brain of an onlooker reacted to the errors of an avatar seen from a first-person perspective. We found that mere observation of erroneous actions enhances electrocortical markers of
Sobotka, Werner K.
Digital printing is described as a tool to replace conventional printing machines completely. Still this goal was not reached until now with any of the digital printing technologies to be described in the paper. Productivity and costs are still the main parameters and are not really solved until now. Quality in digital printing is no problem anymore. Definition of digital printing is to transfer digital datas directly on the paper surface. This step can be carried out directly or with the use of an intermediate image carrier. Keywords in digital printing are: computer- to-press; erasable image carrier; image carrier with memory. Digital printing is also the logical development of the new digital area as it is pointed out in Nicholas Negropotes book 'Being Digital' and also the answer to networking and Internet technologies. Creating images text and color in one country and publishing the datas in another country or continent is the main advantage. Printing on demand another big advantage and last but not least personalization the last big advantage. Costs and being able to coop with this new world of prepress technology is the biggest disadvantage. Therefore the very optimistic growth rates for the next few years are really nonexistent. The development of complete new markets is too slow and the replacing of old markets is too small.
This work aims on missing handwritten signature authentication in Windows. Result of this work is standalone software that allow users to log into Windows by writing signature. We focus on security of signature authentification and best overall user experience. We implemented signature authentification service that accept signature and return user access token if signature is genuine. Signature authentification is done by comparing given signature to signature patterns by their similarity. Si...
Establishes the United States Environmental Protection Agency's approach to adopting electronic signature technology and best practices to ensure electronic signatures applied to official Agency documents are legally valid and enforceable
Checklist items 13 through 17 are grouped under the Signature Validation Process, and represent CROMERR requirements that the system must satisfy as part of ensuring that electronic signatures it receives are valid.
Minor changes to the standard supersymmetric model, such as soft flavor violation and R parity violation, cause large changes in the signatures. The origin of these changes and the resulting signatures are discussed. 15 refs., 7 figs., 2 tabs
Carroll, Erin Ashley
Creativity is understood intuitively, but it is not easily defined and therefore difficult to measure. This makes it challenging to evaluate the ability of a digital tool to support the creative process. When evaluating creativity support tools (CSTs), it is critical to look beyond traditional time, error, and other productivity measurements that…
D. Chaum (David)
textabstractPreviously known blind signature systems require an amount of computation at least proportional to the number of signature types, and also that the number of such types be fixed in advance. These requirements are not practical in some applications. Here, a new blind signature technique
Tian-Yin, Wang; Qiao-Yan, Wen
We present a new fair blind signature scheme based on the fundamental properties of quantum mechanics. In addition, we analyse the security of this scheme, and show that it is not possible to forge valid blind signatures. Moreover, comparisons between this scheme and public key blind signature schemes are also discussed. (general)
Soloff, Paul H; Abraham, Kristy; Ramaseshan, Karthik; Burgess, Ashley; Diwadkar, Vaibhav A
Emotion dysregulation is a core characteristic of patients with Borderline Personality Disorder (BPD), and is often attributed to an imbalance in fronto-limbic network function. Hyperarousal of amygdala, especially in response to negative affective stimuli, results in affective interference with cognitive processing of executive functions. Clinical consequences include the impulsive-aggression, suicidal and self-injurious behaviors which characterize BPD. Dysfunctional interactions between amygdala and its network targets have not been well characterized during cognitive task performance. Using psychophysiological interaction analysis (PPI), we mapped network profiles of amygdala interaction with key regulatory regions during a Go No-Go task, modified to use negative, positive and neutral Ekman faces as targets. Fifty-six female subjects, 31 BPD and 25 healthy controls (HC), completed the affectively valenced Go No-Go task during fMRI scanning. In the negative affective condition, the amygdala exerted greater modulation of its targets in BPD compared to HC subjects in Rt. OFC, Rt. dACC, Rt. Parietal cortex, Rt. Basal Ganglia, and Rt. dlPFC. Across the spectrum of affective contrasts, hypermodulation in BPD subjects observed the following ordering: Negative > Neutral > Positive contrast. The amygdala seed exerted modulatory effects on specific target regions important in processing response inhibition and motor impulsiveness. The vulnerability of BPD subjects to affective interference with impulse control may be due to specific network dysfunction related to amygdala hyper-arousal and its effects on prefrontal regulatory regions such as the OFC and dACC. Copyright © 2017 Elsevier Ltd. All rights reserved.
Full Text Available A considerable amount of information, particularly in image form, is shared on the web through social networking sites. If any of this content is worthy of preservation, who decides what is to be preserved and based on what criteria. This paper explores the potential for public libraries to assume this role of community digital repositories through the creation of digital collections. Thirty public library users and thirty librarians were solicited from the Indianapolis metropolitan area to evaluate five images selected from Flickr in terms of their value to public library digital collections and their worthiness of long-term preservation. Using a seven-point Likert scale, participants assigned a value to each image in terms of its importance to self, family and society. Participants were then asked to explain the reasoning behind their valuations. Public library users and librarians had similar value estimations of the images in the study. This is perhaps the most significant finding of the study, given the importance of collaboration and forming partnerships for building and sustaining community collections and archives.
Chow, Sherman S. M.
Traceable signature scheme extends a group signature scheme with an enhanced anonymity management mechanism. The group manager can compute a tracing trapdoor which enables anyone to test if a signature is signed by a given misbehaving user, while the only way to do so for group signatures requires revealing the signer of all signatures. Nevertheless, it is not tracing in a strict sense. For all existing schemes, T tracing agents need to recollect all N' signatures ever produced and perform RN' “checks” for R revoked users. This involves a high volume of transfer and computations. Increasing T increases the degree of parallelism for tracing but also the probability of “missing” some signatures in case some of the agents are dishonest.
Ledborg Hansen, Richard
-rich information and highly interesting communication are sky-high and rising. With a continuous increase in digitized communication follows a decrease in face-to-face encounters and our ability to engage in inter-personal relationships are suffering for it (Davis, 2013). The behavior described in this paper......-‐Jones, 2011) for increases in effectiveness and efficiency we indiscriminately embrace digital communication and digitized information dissemination with enthusiasm – at the risk of ignoring the potentially dark side of technology. However, technology also holds a promise for better understanding precisely...... for the same reasons – that the growing amount of digitized communication “out there” represents data waiting to be sifted, analyzed and decoded. In this paper “Facebook behavior” refers to a particular behavior characterized by presenting your self and representations of selected self in the hope of getting...
Busch, Peter Andre; Zinner Henriksen, Helle
discretion is suggested to reduce this footprint by influencing or replacing their discretionary practices using ICT. What is less researched is whether digital discretion can cause changes in public policy outcomes, and under what conditions such changes can occur. Using the concept of public service values......This study reviews 44 peer-reviewed articles on digital discretion published in the period from 1998 to January 2017. Street-level bureaucrats have traditionally had a wide ability to exercise discretion stirring debate since they can add their personal footprint on public policies. Digital......, we suggest that digital discretion can strengthen ethical and democratic values but weaken professional and relational values. Furthermore, we conclude that contextual factors such as considerations made by policy makers on the macro-level and the degree of professionalization of street...
Full Text Available The contribution deals with the actual methods and technologies of information and communication systems security. It introduces the overview of electronic identification elements such as static password, dynamic password and single sign-on. Into this category belong also biometric and dynamic characteristics of verified person. Widespread is authentication based on identification elements ownership, such as various cards and authentication calculators. In the next part is specified a definition and characterization of electronic signature, its basic functions and certificate categories. Practical utilization of electronic signature consists of electronic signature acquirement, signature of outgoing email message, receiving of electronic signature and verification of electronic signature. The use of electronic signature is continuously growing and in connection with legislation development it exercises in all resorts.
Full Text Available The paper presented one of the application that can be done using smartphones camera. Nowadays forgery is one of the most undetected crimes. With the forensic technology used today it is still difficult for authorities to compare and define what a real signature is and what a forged signature is. A signature is a legal representation of a person. All transactions are based on a signature. Forgers may use a signature to sign illegal contracts and withdraw from bank accounts undetected. A signature can also be forged during election periods for repeated voting. Addressing the issues a signature should always be secure. Signature verification is a reduced problem that still poses a real challenge for researchers. The literature on signature verification is quite extensive and shows two main areas of research off-line and on-line systems. Off-line systems deal with a static image of the signature i.e. the result of the action of signing while on-line systems work on the dynamic process of generating the signature i.e. the action of signing itself. The researchers have found a way to resolve the concerns. A mobile application that integrates the camera to take a picture of a signature analyzes it and compares it to other signatures for verification. It will exist to help citizens to be more cautious and aware with issues regarding the signatures. This might also be relevant to help organizations and institutions such as banks and insurance companies in verifying signatures that may avoid unwanted transactions and identity theft. Furthermore this might help the authorities in the never ending battle against crime especially against forgers and thieves. The project aimed to design and develop a mobile application that integrates the smartphone camera for verifying and comparing signatures for security using the best algorithm possible. As the result of the development the said smartphone camera application is functional and reliable.
Federal Laboratory Consortium — FUNCTION: The calculation, analysis, and visualization of the spatially extended radar signatures of complex objects such as ships in a sea multipath environment and...
Full Text Available Grip kinetics and their variation are emerging as important considerations in the clinical assessment of handwriting pathologies, fine motor rehabilitation, biometrics, forensics and ergonomic pen design. This study evaluated the intra- and inter-participant variability of grip shape kinetics in adults during signature writing. Twenty (20 adult participants wrote on a digitizing tablet using an instrumented pen that measured the forces exerted on its barrel. Signature samples were collected over 10 days, 3 times a day, to capture temporal variations in grip shape kinetics. A kinetic topography (i.e., grip shape image was derived per signature by time-averaging the measured force at each of 32 locations around the pen barrel. The normalized cross correlations (NCC of grip shape images were calculated within- and between-participants. Several classification algorithms were implemented to gauge the error rate of participant discrimination based on grip shape kinetics. Four different grip shapes emerged and several participants made grip adjustments (change in grip shape or grip height or rotated the pen during writing. Nonetheless, intra-participant variation in grip kinetics was generally much smaller than inter-participant force variations. Using the entire grip shape images as a 32-dimensional input feature vector, a K-nearest neighbor classifier achieved an error rate of 1.2±0.4% in discriminating among participants. These results indicate that writers had unique grip shape kinetics that were repeatable over time but distinct from those of other participants. The topographic analysis of grip kinetics may inform the development of personalized interventions or customizable grips in clinical and industrial applications, respectively.
Hockly, Nicky; Pegrum, Mark
Dramatic shifts in our communication landscape have made it crucial for language teaching to go beyond print literacy and encompass the digital literacies which are increasingly central to learners' personal, social, educational and professional lives. By situating these digital literacies within a clear theoretical framework, this book provides educators and students alike with not just the background for a deeper understanding of these key 21st-century skills, but also the rationale for integrating these skills into classroom practice. This is the first methodology book to address not jus
Elliott, Lydia; DeCristofaro, Claire; Carpenter, Alesia
This article describes the development and implementation of integrated use of personal handheld devices (personal digital assistants, PDAs) and high-fidelity simulation in an advanced health assessment course in a graduate family nurse practitioner (NP) program. A teaching tool was developed that can be utilized as a template for clinical case scenarios blending these separate technologies. Review of the evidence-based literature, including peer-reviewed articles and reviews. Blending the technologies of high-fidelity simulation and handheld devices (PDAs) provided a positive learning experience for graduate NP students in a teaching laboratory setting. Combining both technologies in clinical case scenarios offered a more real-world learning experience, with a focus on point-of-care service and integration of interview and physical assessment skills with existing standards of care and external clinical resources. Faculty modeling and advance training with PDA technology was crucial to success. Faculty developed a general template tool and systems-based clinical scenarios integrating PDA and high-fidelity simulation. Faculty observations, the general template tool, and one scenario example are included in this article. ©2012 The Author(s) Journal compilation ©2012 American Academy of Nurse Practitioners.
Yon, Bethany Ann; Johnson, Rachel K; Harvey-Berino, Jean; Gold, Beth Casey
Underreporting of energy intake is a pervasive problem and resistant to improvement, especially among people with overweight and obesity. The goal of this study was to investigate whether the use of a personal digital assistant (PDA) for dietary self-monitoring would reduce underreporting prevalence and improve the validity of self-reported energy intake. Adults with overweight and obesity (n=61, 92% women, mean age 48.2 years, mean body mass index 32.3) were provided with a PalmZire 21 (Palm, Inc, Sunnyvale, CA) loaded with Calorie King's Diet Diary software (version 3.2.2, 2002, Family Health Network, Costa Mesa, CA). Subjects participated in a 24-week in-person behavioral weight control program and were asked to self-monitor their diet and exercise habits using the PDA. Basal metabolic rate and physical activity level were estimated at baseline. Energy intake from 7-day electronic food records were collected within the first month of the weight-control program. As subjects were actively losing weight, Bandini's adjustments were used to correct self-reported energy intake for weight loss. In this group, where 41% of the subjects were categorized as low-energy reporters, the use of a PDA did not improve validity of energy reporting when compared to what is reported in the literature.
Weiß, Sabine; Kollmannsberger, Markus; Lerche, Thomas; Oubaid, Viktor; Kiel, Ewald
The goal of the following study is to identify a pedagogic signature, according to LS Shulman, for working with students who have special educational needs. Special educational needs are defined as significant limitations in personal development and learning which require particular educational measures beyond regular education. The development of…
Luque, Amneris E; Corales, Roberto; Fowler, Richard J; DiMarco, Jamie; van Keken, Adjuah; Winters, Paul; Keefer, Michael C; Fiscella, Kevin
Persons living with HIV (PLWH) need practical tools to self-manage their condition. We conducted a proof-of-concept study among PLWH to assess whether patients could learn to use a personal health record (PHR) on a hand-held device (iPod Touch) to manage their condition. We began individual trainings and later adapted this to group training. We assessed usability, acceptability and also effects on self-efficacy for treatment adherence using the HIV Treatment Adherence Self-Efficacy Scale (HIV-ASES). Nine PLWH participated in the individual training and 29 participated in the group sessions. The participants were largely middle aged, low-income and of racial/ethnic minorities. The sessions were well attended and participants fully engaged in tasks and shared learning. Most participants stated they intended to use the PHR and reported improved self-efficacy in treatment adherence (P = .05) particularly on the integration of treatment adherence into one's routine (P < .02). Training PLWH in use of a handheld PHR shows promise.
Thomas, Neil; Farhall, John; Foley, Fiona; Rossell, Susan L; Castle, David; Ladd, Emma; Meyer, Denny; Mihalopoulos, Cathrine; Leitan, Nuwan; Nunan, Cassy; Frankish, Rosalie; Smark, Tara; Farnan, Sue; McLeod, Bronte; Sterling, Leon; Murray, Greg; Fossey, Ellie; Brophy, Lisa; Kyrios, Michael
Psychosocial interventions have an important role in promoting recovery in people with persisting psychotic disorders such as schizophrenia. Readily available, digital technology provides a means of developing therapeutic resources for use together by practitioners and mental health service users. As part of the Self-Management and Recovery Technology (SMART) research program, we have developed an online resource providing materials on illness self-management and personal recovery based on the Connectedness-Hope-Identity-Meaning-Empowerment (CHIME) framework. Content is communicated using videos featuring persons with lived experience of psychosis discussing how they have navigated issues in their own recovery. This was developed to be suitable for use on a tablet computer during sessions with a mental health worker to promote discussion about recovery. This is a rater-blinded randomised controlled trial comparing a low intensity recovery intervention of eight one-to-one face-to-face sessions with a mental health worker using the SMART website alongside routine care, versus an eight-session comparison condition, befriending. The recruitment target is 148 participants with a schizophrenia-related disorder or mood disorder with a history of psychosis, recruited from mental health services in Victoria, Australia. Following baseline assessment, participants are randomised to intervention, and complete follow up assessments at 3, 6 and 9 months post-baseline. The primary outcome is personal recovery measured using the Process of Recovery Questionnaire (QPR). Secondary outcomes include positive and negative symptoms assessed with the Positive and Negative Syndrome Scale, subjective experiences of psychosis, emotional symptoms, quality of life and resource use. Mechanisms of change via effects on self-stigma and self-efficacy will be examined. This protocol describes a novel intervention which tests new therapeutic methods including in-session tablet computer use and
Dewhurst, Tahnee N; Found, Bryan; Ballantyne, Kaye N; Rogers, Doug
Expertise studies in forensic handwriting examination involve comparisons of Forensic Handwriting Examiners' (FHEs) opinions with lay-persons on blind tests. All published studies of this type have reported real and demonstrable skill differences between the specialist and lay groups. However, critics have proposed that any difference shown may be indicative of a lack of motivation on the part of lay participants, rather than a real difference in skill. It has been suggested that qualified FHEs would be inherently more motivated to succeed in blinded validation trials, as their professional reputations could be at risk, should they perform poorly on the task provided. Furthermore, critics suggest that lay-persons would be unlikely to be highly motivated to succeed, as they would have no fear of negative consequences should they perform badly. In an effort to investigate this concern, a blind signature trial was designed and administered to forty lay-persons. Participants were required to compare known (exemplar) signatures of an individual to questioned signatures and asked to express an opinion regarding whether the writer of the known signatures wrote each of the questioned signatures. The questioned signatures comprised a mixture of genuine, disguised and simulated signatures. The forty participants were divided into two separate groupings. Group 'A' were requested to complete the trial as directed and were advised that for each correct answer they would be financially rewarded, for each incorrect answer they would be financially penalized, and for each inconclusive opinion they would receive neither penalty nor reward. Group 'B' was requested to complete the trial as directed, with no mention of financial recompense or penalty. The results of this study do not support the proposition that motivation rather than skill difference is the source of the statistical difference in opinions between individuals' results in blinded signature proficiency trials. Crown
Nam, Kyoung Won; Lee, Jung Joo; Hwang, Chang Mo; Choi, Seong Wook; Son, Ho Sung; Sun, Kyung
Currently, personal mobile communication devices have become quite common, and the applications of such devices have expanded quickly. Remote communication systems might be employed for the telemonitoring of patients or the operating status of their medical devices. In this article, we describe the development of a mobile-based artificial heart telemanagement system for use in a wearable extracorporeal pneumatic biventricular assist device, which is capable of telemonitoring and telecontrolling the operating status of the ventricular assist device from any site. The system developed herein utilized small mobile phones for the client device and adopted a standard transmission control protocol/Internet protocol communication protocol for the purposes of telecommunication. The results of in vitro and animal experiments showed that the telemanagement system developed herein operated in accordance with the desired parameters.
Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus
of the secret key. As a second contribution, we construct a signature scheme that achieves security for random messages assuming that the adversary is given a polynomial-time hard to invert function. Here, polynomial-hardness is required even when given the entire public-key – so called weak auxiliary input......-theoretically reveal the entire secret key. In this work, we propose the first constructions of digital signature schemes that are secure in the auxiliary input model. Our main contribution is a digital signature scheme that is secure against chosen message attacks when given an exponentially hard-to-invert function...... security. We show that such signature schemes readily give us auxiliary input secure identification schemes...
Anastasiya Victorovna Beresneva
Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.
Federal Laboratory Consortium — The Advanced Missile Signature Center (AMSC) is a national facility supporting the Missile Defense Agency (MDA) and other DoD programs and customers with analysis,...
A set of signatures for physics processes of potential interests for the CLIC programme at = 1 - 5 TeV are discussed. These signatures, that may correspond to the manifestation of different scenarios of new physics as well as to Standard Model precision tests, are proposed as benchmarks for the optimisation of the CLIC accelerator parameters and for a first definition of the required detector response.
Hatzistavros, V.S.; Kallithrakas-Kontos, N.G.
Signature authentication is a critical question in forensic document examination. Last years the evolution of personal computers made signature copying a quite easy task, so the development of new ways for signature authentication is crucial. In the present work a commercial ink was spiked with many trace elements in various concentrations. Inorganic and organometallic ink soluble compounds were used as spiking agents, whilst ink retained its initial properties. The spiked inks were used for paper writing and the documents were analyzed by a non destructive method, the energy dispersive X-ray fluorescence. The thin target model was proved right for quantitative analysis and a very good linear relationship of the intensity (X-ray signal) against concentration was estimated for all used elements. Intensity ratios between different elements in the same ink gave very stable results, independent on the writing alterations. The impact of time both to written document and prepared inks was also investigated. (author)
Full Text Available Discovery of prognostic and diagnostic biomarker gene signatures for diseases, such as cancer, is seen as a major step towards a better personalized medicine. During the last decade various methods, mainly coming from the machine learning or statistical domain, have been proposed for that purpose. However, one important obstacle for making gene signatures a standard tool in clinical diagnosis is the typical low reproducibility of these signatures combined with the difficulty to achieve a clear biological interpretation. For that purpose in the last years there has been a growing interest in approaches that try to integrate information from molecular interaction networks. Here we review the current state of research in this field by giving an overview about so-far proposed approaches.
Park, Ji Hyeong
This book contains twelve chapters, which deals with digitization of broadcast signal such as digital open, digitization of video signal and sound signal digitization of broadcasting equipment like DTPP and digital VTR, digitization of equipment to transmit such as digital STL, digital FPU and digital SNG, digitization of transmit about digital TV transmit and radio transmit, digital broadcasting system on necessity and advantage, digital broadcasting system abroad and Korea, digital broadcasting of outline, advantage of digital TV, ripple effect of digital broadcasting and consideration of digital broadcasting, ground wave digital broadcasting of DVB-T in Europe DTV in U.S.A and ISDB-T in Japan, HDTV broadcasting, satellite broadcasting, digital TV broadcasting in Korea, digital radio broadcasting and new broadcasting service.
McMillan, Hilary; Westerberg, Ida
Information that summarises the hydrological behaviour or flow regime of a catchment is essential for comparing responses of different catchments to understand catchment organisation and similarity, and for many other modelling and water-management applications. Such information types derived as an index value from observed data are known as hydrological signatures, and can include descriptors of high flows (e.g. mean annual flood), low flows (e.g. mean annual low flow, recession shape), the flow variability, flow duration curve, and runoff ratio. Because the hydrological signatures are calculated from observed data such as rainfall and flow records, they are affected by uncertainty in those data. Subjective choices in the method used to calculate the signatures create a further source of uncertainty. Uncertainties in the signatures may affect our ability to compare different locations, to detect changes, or to compare future water resource management scenarios. The aim of this study was to contribute to the hydrological community's awareness and knowledge of data uncertainty in hydrological signatures, including typical sources, magnitude and methods for its assessment. We proposed a generally applicable method to calculate these uncertainties based on Monte Carlo sampling and demonstrated it for a variety of commonly used signatures. The study was made for two data rich catchments, the 50 km2 Mahurangi catchment in New Zealand and the 135 km2 Brue catchment in the UK. For rainfall data the uncertainty sources included point measurement uncertainty, the number of gauges used in calculation of the catchment spatial average, and uncertainties relating to lack of quality control. For flow data the uncertainty sources included uncertainties in stage/discharge measurement and in the approximation of the true stage-discharge relation by a rating curve. The resulting uncertainties were compared across the different signatures and catchments, to quantify uncertainty
Pors, Anja Svejgaard
government, and draws on empirical material generated through observations, field notes, interviews and policy documents. The material is documenting how service is performed by frontline agents in the ‘bureaucratic encounter’ with citizens, who needs assistance to use digital self-service in order to apply...... online for a public benefit. Findings: The paper shows that e-government technology changes the mode of professionalism in citizen service from service to support. The paper gives an empirical account of recent Danish digital reforms and shows how the reforms both enable and constrain the work...... of ‘becoming digital’ by frontline agents. Overall the street-level bureaucrat’s classical tasks such as specialized casework are being displaced into promoting and educational tasks. An implication of this is blurred distinctions between professional skills and personal competences of the frontline agent...
Salbach, Nancy M; Veinot, Paula; Jaglal, Susan B; Bayley, Mark; Rolfe, Danielle
Understanding how to structure educational interventions and resources to facilitate physical therapists' application of the research literature is required. The objective of this study was to explore physical therapists' preferences for strategies to facilitate their access to, evaluation and implementation of the stroke research literature in clinical practice. In-depth, qualitative telephone interviews were conducted with 23 physical therapists who treat people with stroke in Ontario, Canada and who had participated in a previous survey on evidence-based practice. Data were analysed using a constant comparative approach to identify emergent themes. Participants preferred online access to research summaries or systematic reviews to save time to filter and critique research articles. To enable access in the workplace, an acceptable computer-to-staff ratio, permission to access web sites and protected work time were suggested. Participants considered personal digital assistants as excellent tools for quick access to online resources but were unsure of their advantage over a desktop computer. Therapists favoured use of non-technical language, glossaries of research terms and quality ratings of studies to ease understanding and appraisal. Teleconferencing or videoconferencing overcame geographical but not scheduling barriers to accessing education. To achieve behaviour change in clinical practice, therapists preferred multiple interactive, face-to-face education sessions in a group format, with opportunities for case-based learning and practice of new skills. Physical therapists prefer technology-assisted access to resources and education and favour attending multiple interactive, expert-facilitated education sessions incorporating opportunities for case-based learning and practice of new skills to change behaviour related to evidence-based practice. © 2010 Blackwell Publishing Ltd.
Full Text Available Abstract Background In clinical and research practice linked to prostate cancer treatment, frequent monitoring of patient health-related quality of life (HRQOL is essential. Practical and analytic limitations of paper questionnaire data capture may be overcome with the use of self-administered personal digital assistant (PDA data collection. The objective of this study was to assess the reliability, validity, and feasibility of using PDA in place of paper versions of the International Prostate Symptom Score (IPSS, the Patient Oriented Prostate Cancer Utility Survey (PORPUS, and the International Index of Erectile Function-5 (IIEF-5 in a prostate cancer clinic setting. Methods 152 participants were randomly assigned to one of three conditions: 1 paper followed by PDA survey; 2 PDA followed by paper survey; or 3 PDA followed by PDA survey. Evaluation included an assessment of data quality (internal consistency, test-retest reliability, response correlation, completeness of data, and feasibility (participation rates, time to completion, preference and difficultly/ease of using PDA. Results Internal consistency was similar for both PDA and paper applications. Test-retest reliability was confirmed for PDA repeated administration. Data from paper and PDA questionnaires were strongly correlated. Lower missed item rates were found in PDA administration. 82.8% of participants preferred using the PDA or had no preference. Mean difficulty/ease ratings indicated that participants found the PDA easy to use. Age did not significantly correlate with preference or difficulty. Conclusion The results confirm the adaptability of the IPSS, IIEF-5, and the PORPUS to PDA administration. Similarly, the findings of this study support the feasibility of using PDA technology for HRQOL serial data capture in the prostate cancer patient population.
Freire, Manuel R.; Fiérrez, Julián; Ortega-García, Javier
M. Freire-Santos ; J. Fierrez-Aguilar ; J. Ortega-Garcia; "Cryptographic key generation using handwritten signature", Biometric Technology for Human Identification III, Proc. SPIE 6202 (April 17, 2006); doi:10.1117/12.665875. Copyright 2006 Society of Photo‑Optical Instrumentation Engineers. One print or electronic copy may be made for personal use only. Systematic reproduction and distribution, duplication of any material in this paper for a fee or for commercial purposes, or modification of...
On the Net it is possible to take a look at art from afar via Virtual Museums. One such exhibition was recently in the New York Museum of Modern Art's branch, PS1. Entitled 'Signatures of the Invisible' it was a collaborative effort between artists and physicists (1/2 page).
Jensen, Meiko; Liao, Lijun; Schwenk, Jörg
The XML signature wrapping attack is one of the most discussed security issues of the Web Services security community during the last years. Until now, the issue has not been solved, and all countermeasure approaches proposed so far were shown to be insufficient. In this paper, we present yet...... another way to perform signature wrapping attacks by using the XML namespace injection technique. We show that the interplay of XML Signature, XPath, and the XML namespace concept has severe flaws that can be exploited for an attack, and that XML namespaces in general pose real troubles to digital...... signatures in the XML domain. Additionally, we present and discuss some new approaches in countering the proposed attack vector....
Scaglione, Bernard J
Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.
Full Text Available Recently the National Center for Digital Government held a workshop on "The Virtual Citizen: Identity, Autonomy, and Accountability: A Civic Scenario Exploration of the Role of Identity in On-Line. Discussions at the workshop focused on five scenarios for future authentication policies with respect to digital identity. The underlying technologies considered for authentication were: biometrics: cryptography, with a focus on digital signatures; secure processing/computation; and reputation systems. Most discussion at the workshop focused on issues related to authentication of users of digital government, but, as implied by the inclusion of a scenario related to ubiquitous identity theft, there was also discussion of problems related to misinformation, including cognitive hacking. Cognitive hacking refers to a computer or information system attack that relies on changing human users' perceptions and corresponding behaviors in order to succeed. This paper describes cognitive hacking, suggests countermeasures, and discusses the implications of cognitive hacking for identity in digital government. In particular, spoofing of government websites and insider misuse are considered.
E. A. Tolyupa
Full Text Available The article suggests the method of anti-virus protection of mobile devices based on the usage of proxy digital signatures and an (n;t-threshold proxy signature scheme with an arbitrator. The unique feature of the suggested method is in the absence of necessity to install anti-virus software in a mobile device. It will be enough only to have the software verifying digital signatures and the Internet. The method is used on the base of public keys infrastructure /PKI/, thus minimizing implementation expenses.
Lal, Sunder; Kumar, Manoj
This paper presents a directed signature scheme with the property that the signature can be verified only with the help of signer or signature receiver. We also propose its applications to share verification of signatures and to threshold cryptosystems.
Culpepper, Joanne B.; Meehan, Alaster J.; Shao, Q. T.; Richards, Noel
This paper presents the Mirage visible signature evaluation tool, designed to provide a visible signature evaluation capability that will appropriately reflect the effect of scene content on the detectability of targets, providing a capability to assess visible signatures in the context of the environment. Mirage is based on a parametric evaluation of input images, assessing the value of a range of image metrics and combining them using the boosted decision tree machine learning method to produce target detectability estimates. It has been developed using experimental data from photosimulation experiments, where human observers search for vehicle targets in a variety of digital images. The images used for tool development are synthetic (computer generated) images, showing vehicles in many different scenes and exhibiting a wide variation in scene content. A preliminary validation has been performed using k-fold cross validation, where 90% of the image data set was used for training and 10% of the image data set was used for testing. The results of the k-fold validation from 200 independent tests show a prediction accuracy between Mirage predictions of detection probability and observed probability of detection of r(262) = 0:63, p Pearson correlation) and a MAE = 0:21 (mean absolute error).
Hajji, Tarik; Itahriouan, Zakaria; Ouazzani Jamil, Mohammed
Digital image signature is a technique used to protect the image integrity. The application of this technique can serve several areas of imaging applied to smart cities. The objective of this work is to propose two methods to protect digital image integrity. We present a description of two approaches using artificial neural networks (ANN) to digitally sign an image. The first one is “Direct Signature without learning” and the second is “Direct Signature with learning”. This paper presents the theory of proposed approaches and an experimental study to test their effectiveness.
Maslowska, E.; Smit, E.G.; van den Putte, B.
Personalized communication has become a very popular marketing strategy, but the research on its effectiveness is still limited. This study examined the effectiveness of personalized digital newsletters in terms of increased attention, evaluation, attitude, and intention. Participants (N = 124) were
The prediction and experimental discovery of topological insulators brought the importance of topology in condensed matter physics into the limelight. Topology hence acts as a new dimension along which more and more new states of matter start to emerge. One of these topological states of matter, namely topological superconductors, comes into the focus because of their gapless excitations. These gapless excitations, especially in one dimensional topological superconductors, are Majorana zero modes localized at the ends of the superconductor and exhibit exotic nonabelian statistics, which can be potentially applied to fault-tolerant quantum computation. Given their highly interesting physical properties and potential applications to quantum computation, both theorists and experimentalists spend great efforts to realize topological supercondoctors and to detect Majoranas. In two projects within this thesis, we investigate the properties of Majorana zero modes in realistic materials which are absent in simple theoretical models. We find that the superconducting proximity effect, an essential ingredient in all existing platforms for topological superconductors, plays a significant role in determining the localization property of the Majoranas. Strong proximity coupling between the normal system and the superconducting substrate can lead to strongly localized Majoranas, which can explain the observation in a recent experiment. Motivated by experiments in Molenkamp's group, we also look at realistic quantum spin Hall Josephson junctions, in which charge puddles acting as magnetic impurities are coupled to the helical edge states. We find that with this setup, the junction generically realizes an exotic 8π periodic Josephson effect, which is absent in a pristine Josephson junction. In another two projects, we propose more pronounced signatures of Majoranas that are accessible with current experimental techniques. The first one is a transport measurement, which uses
AD-A127 993 MODEM SIGNATURE ANALISIS (U) PAR TECHNOLOGY CORP NEW / HARTFORD NY V EDWARDS ET AL. OCT 82 RADC-TR-82-269 F30602-80-C-0264 NCLASSIFIED F/G...as an indication of the class clustering and separation between different classes in the modem data base. It is apparent from the projection that the...that as the clusters disperse, the likelihood of a sample crossing the boundary into an adjacent region and causing a symbol decision error increases. As
Full Text Available Development of information technologies is often misused by an organization or a person to take criminal acts, such as the ability to steal and modify information in the data distribution for evil criminal purpose. The Rural Bank of Boyolali is conducting online financial transactions rather intensively, thus it requiring a security system on the distribution of data and credit transactions for their customer among branches offices to head office. The purpose of this study was to build a security system in credit transactions in Rural Bank of Boyolali for their customers among branches offices to head office. One way in protecting data distribution was used XML encryption and XML signature. The application of encryption technique in XML and digital signature in XML by using web service by using the AES (Advanced Encryption Standard and RSA (Rivest-Shamir-Adleman algorithms. This study was resulted the SOAP (Simple Object Access Protocol message security system, with XML and WSDL (Web Services Description Language, over HTTP (Hypertext Transfer Protocol to protect the customers’ credit transactions from intruders. Analysis of examination indicated that the data size (bytes transferred as results of uncompressed XML encryption were larger than compressed XML Encryption, which leads to significant changes between the data transferred that was the processing time of the compressed data was faster than uncompressed XML encryption.
Li, Chi-Keung; Wong, Siu-Kay; Chim, Lai-Chu Joyce
A prototype using simple mathematical treatment of the pen pressure data recorded by a digital pen movement recording device was derived. In this study, a total of 48 sets of signature and initial specimens were collected. Pearson's correlation coefficient was used to compare the data of the pen pressure patterns. From the 820 pair comparisons of the 48 sets of genuine signatures, a high degree of matching was found in which 95.4% (782 pairs) and 80% (656 pairs) had rPA > 0.7 and rPA > 0.8, respectively. In the comparison of the 23 forged signatures with their corresponding control signatures, 20 of them (89.2% of pairs) had rPA values prototype could be used as a complementary technique to improve the objectivity of signature examination and also has a good potential to be developed as a tool for automated signature identification. © 2017 American Academy of Forensic Sciences.
Ellaway, Rachel H; Coral, Janet; Topps, David; Topps, Maureen
The widespread use of digital media (both computing devices and the services they access) has blurred the boundaries between our personal and professional lives. Contemporary students are the last to remember a time before the widespread use of the Internet and they will be the first to practice in a largely e-health environment. This article explores concepts of digital professionalism and their place in contemporary medical education, and proposes a series of principles of digital professionalism to guide teaching, learning and practice in the healthcare professions. Despite the many risks and fears surrounding their use, digital media are not an intrinsic threat to medical professionalism. Professionals should maintain the capacity for deliberate, ethical, and accountable practice when using digital media. The authors describe a digital professionalism framework structured around concepts of proficiency, reputation, and responsibility. Digital professionalism can be integrated into medical education using strategies based on awareness, alignment, assessment, and accountability. These principles of digital professionalism provide a way for medical students and medical practitioners to embrace the positive aspects of digital media use while being mindful and deliberate in its use to avoid or minimize any negative consequences.
Jensen, Meiko; Meyer, Christopher
XML Signatures are used to protect XML-based Web Service communication against a broad range of attacks related to man-in-the-middle scenarios. However, due to the complexity of the Web Services specification landscape, the task of applying XML Signatures in a robust and reliable manner becomes...... more and more challenging. In this paper, we investigate this issue, describing how an attacker can still interfere with Web Services communication even in the presence of XML Signatures. Additionally, we discuss the interrelation of XML Signatures and XML Encryption, focussing on their security...
Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...
National Aeronautics and Space Administration — The OLS Digital Derived Lightning from DMSP F10 dataset consists of global lightning signatures from the Defense Meteorological Satellite Program (DMSP) Operational...
Full Text Available Social networking sites made possible through Web 2.0 allow for unique user-generated tags called “searchable signatures.” These tags move beyond the descriptive and act as means for users to assert online individual and group identities. A study of searchable signatures on the Instagram application demonstrates that these types of tags are valuable not only because they allow for both individuals and groups to engage in what social theorist Axel Honneth calls the struggle for recognition, but also because they provide contextual use data and sociohistorical information so important to the understanding of digital objects. This article explores how searchable signatures might be used by both patrons and staff in library environments.
Morris, Richard G
The question of how mechanically gated membrane channels open and close is notoriously difficult to address, especially if the protein structure is not available. This perspective highlights the relevance of micropipette-aspirated single-particle tracking-used to obtain a channel's diffusion coefficient, D, as a function of applied membrane tension, σ-as an indirect assay for determining functional behavior in mechanosensitive channels. While ensuring that the protein remains integral to the membrane, such methods can be used to identify not only the gating mechanism of a protein, but also associated physical moduli, such as torsional and dilational rigidity, which correspond to the protein's effective shape change. As an example, three distinct D-versus-σ "signatures" are calculated, corresponding to gating by dilation, gating by tilt, and gating by a combination of both dilation and tilt. Both advantages and disadvantages of the approach are discussed. Copyright © 2017 Biophysical Society. Published by Elsevier Inc. All rights reserved.
CERN Press Office. Geneva
"Signatures of the Invisible" is an unique collaboration between contemporary artists and contemporary physicists which has the potential to help redefine the relationship between science and art. "Signatures of the Invisible" is jointly organised by the London Institute - the world's largest college of art and design and CERN*, the world's leading particle physics laboratory. 12 leading visual artists:
Onishi, Naoki; Tajima, Naoki
An interpretation in terms of the cranking model is presented to explain why signature inversion occurs for positive γ of the axially asymmetric deformation parameter and emerges into specific orbitals. By introducing a continuous variable, the eigenvalue equation can be reduced to a one dimensional Schroedinger equation by means of which one can easily understand the cause of signature inversion. (author)
Short-circuit events observed in ground test simulations of DSCS-3 battery in-orbit operations are analyzed. Voltage signatures appearing in the data preceding the short-circuit event are evaluated. The ground test simulation is briefly described along with performance during reconditioning discharges. Results suggest that a characteristic signature develops prior to a shorting event.
Arciszewski, H.F.R.; Lier, L. van; Meijer, Y.G.S.; Noordkamp, H.W.; Wassenaar, A.S.
A signature of a platform is the manner in which the platform manifests itself to a certain type of sensor and how observable it is when such a sensor is used to detect the platform. Because many military platforms use sensors in different media, it is the total of its different signatures that
In this age of information, the means and mediums of exchanging information are adapting digital technologies that are developing at very rapid pace. Digital Afterlife can be understood as maintaining or transforming digital content of users present in the web-space according to users will in case of users deceased or incapability of operating their personal accounts which are considered to be a virtual representation of users in the web platforms. The user generated content can be termed as ...
Caranguian, Luther Paul R; Pancho-Festin, Susan; Sison, Luis G
In this study, we focused on the interoperability and authentication of medical devices in the context of telemedical systems. A recent standard called the ISO/IEEE 11073 Personal Health Device (X73-PHD) Standards addresses the device interoperability problem by defining common protocols for agent (medical device) and manager (appliance) interface. The X73-PHD standard however has not addressed security and authentication of medical devices which is important in establishing integrity of a telemedical system. We have designed and implemented a security policy within the X73-PHD standards. The policy will enable device authentication using Asymmetric-Key Cryptography and the RSA algorithm as the digital signature scheme. We used two approaches for performing the digital signatures: direct software implementation and use of embedded security modules (ESM). The two approaches were evaluated and compared in terms of execution time and memory requirement. For the standard 2048-bit RSA, ESM calculates digital signatures only 12% of the total time for the direct implementation. Moreover, analysis shows that ESM offers more security advantage such as secure storage of keys compared to using direct implementation. Interoperability with other systems was verified by testing the system with LNI Healthlink, a manager software that implements the X73-PHD standard. Lastly, security analysis was done and the system's response to common attacks on authentication systems was analyzed and several measures were implemented to protect the system against them.
Digital Radiography begins with an orderly introduction to the fundamental concepts of digital imaging. The entire X-ray digital imagining system is described, from an overall characterization of image quality to specific components required for a digital radiographic system. Because subtraction is central to digital radiographic systems, the author details the use of various subtraction methods for image enhancement. Complex concepts are illustrated with numerous examples and presented in terms that can readily be understood by physicians without an advanced mathematics background. The second part of the book discusses implementations and applications of digital imagining systems based on area and scanned detector technologies. This section includes thorough coverage of digital fluoroscopy, scanned projection radiography, and film-based digital imaging systems, and features a state-of-the-art synopsis of the applications of digital subtraction angiography. The book concludes with a timely assessment of anticipated technological advances
Full Text Available In this study; digital culture and digital library which have a vital connection with each other are examined together. The content of the research consists of the interaction of culture, information, digital culture, intellectual technologies, and digital library concepts. The study is an entry work to integrity of digital culture and digital library theories and aims to expand the symmetry. The purpose of the study is to emphasize the relation between the digital culture and digital library theories acting intersection of the subjects that are examined. Also the perspective of the study is based on examining the literature and analytical evaluation in both studies (digital culture and digital library. Within this context, the methodology of the study is essentially descriptive and has an attribute for the transmission and synthesis of distributed findings produced in the field of the research. According to the findings of the study results, digital culture is an inclusive term that describes the effects of intellectual technologies in the field of information and communication. Information becomes energy and the spectrum of the information is expanding in the vertical rise through the digital culture. In this context, the digital library appears as a new living space of a new environment. In essence, the digital library is information-oriented; has intellectual technology support and digital platform; is in a digital format; combines information resources and tools in relationship/communication/cooperation by connectedness, and also it is the dynamic face of the digital culture in time and space independence. Resolved with the study is that the digital libraries are active and effective in the formation of global knowing and/or mass wisdom in the process of digital culture.
Full Text Available Handwritten signature is broadly utilized as personal verification in financial institutions ensures the necessity for a robust automatic signature verification tool. This tool aims to reduce fraud in all related financial transactions’ sectors. This paper proposes an online, robust, and automatic signature verification technique using the recent advances in image processing and machine learning. Once the image of a handwritten signature for a customer is captured, several pre-processing steps are performed on it including filtration and detection of the signature edges. Afterwards, a feature extraction process is applied on the image to extract Speeded up Robust Features (SURF and Scale-Invariant Feature Transform (SIFT features. Finally, a verification process is developed and applied to compare the extracted image features with those stored in the database for the specified customer. Results indicate high accuracy, simplicity, and rapidity of the developed technique, which are the main criteria to judge a signature verification tool in banking and other financial institutions.
Sanfilippo, Antonio P.; Bell, Eric B.; Corley, Courtney D.
The harvesting of behavioral data and their analysis through evidence-based reasoning enable the detection of sociocultural signatures in their context to support situation awareness and decision making. Harvested data are used as training materials from which to infer computational models of sociocultural behaviors or calibrate parameters for such models. Harvested data also serve as evidence input that the models use to provide insights about observed and future behaviors for targets of interest. The harvested data is often the result of assembling diverse data types and aggregating them into a form suitable for analysis. Data need to be analyzed to bring out the categories of content that are relevant to the domain being addressed in order to train or run a model. If, for example, we are modeling the intent of a group to engage in violent behavior using messages that the group has broadcasted, then these messages need to be processed to extract and measure indicators of violent intent. The extracted indicators and the associated measurements (e.g. rates or counts of occurrence) can then be used to train/calibrate and run computational models that assess the propensity for violence expressed in the source message. Ubiquitous access to the Internet, mobile telephony and technologies such as digital photography and digital video have enabled social media application platforms such as Facebook, YouTube, and Twitter that are altering the nature of human social interaction. The fast increasing pace of online social interaction introduces new challenges and opportunities for gathering sociocultural data. Challenges include the development of harvesting and processing techniques tailored to new data environments and formats (e.g. Twitter, Facebook), the integration of social media content with traditional media content, and the protection of personal privacy. As these and other challenges are addressed, a new wealth of behavioral data and data analysis methods becomes
Full Text Available We give a new general definition of arity, yielding the companion notions of signature and associated syntax. This setting is modular in the sense requested by Ghani and Uustalu: merging two extensions of syntax corresponds to building an amalgamated sum. These signatures are too general in the sense that we are not able to prove the existence of an associated syntax in this general context. So we have to select arities and signatures for which there exists the desired initial monad. For this, we follow a track opened by Matthes and Uustalu: we introduce a notion of strengthened arity and prove that the corresponding signatures have initial semantics (i.e. associated syntax. Our strengthened arities admit colimits, which allows the treatment of the λ-calculus with explicit substitution.
Zimmerman, Thomas G.; Russell, Gregory F.; Heilper, Andre; Smith, Barton A.; Hu, Jianying; Markman, Dmitry; Graham, Jon E.; Drews, Clemens
The dramatic rise in identity theft, the ever pressing need to provide convenience in checkout services to attract and retain loyal customers, and the growing use of multi-function signature captures devices in the retail sector provides favorable conditions for the deployment of dynamic signature verification (DSV) in retail settings. We report on the development of a DSV system to meet the needs of the retail sector. We currently have a database of approximately 10,000 signatures collected from 600 subjects and forgers. Previous work at IBM on DSV has been merged and extended to achieve robust performance on pen position data available from commercial point of sale hardware, achieving equal error rates on skilled forgeries and authentic signatures of 1.5% to 4%.
The Magnetic Signature Analysis and Validation (MAGSAV) System is a mobile platform that is used to measure, record, and analyze the perturbations to the earth's ambient magnetic field caused by object such as armored vehicles...
Chevalier, M.; Torres, R.
Mammography represents one of the most demanding radiographic applications, simultaneously requiring excellent contrast sensitivity, high spatial resolution, and wide dynamic range. Film/screen is the most widely extended image receptor in mammography due to both its high spatial resolution and contrast. The film/screen limitations are related with its narrow latitude, structural noise and that is at the same time the medium for the image acquisition, storage and presentation. Several digital detector made with different technologies can overcome these difficulties. Here, these technologies as well as their main advantages and disadvantages are analyzed. Also it is discussed its impact on the mammography examinations, mainly on the breast screening programs. (Author).
How Much We Think of Ourselves and How Little We Think of Others: An Investigation of the Neuronal Signature of Self-Consciousness between Different Personality Traits through an Event-Related Potential Study.
Hassan, Auwal Bello; Begum, Tahamina; Reza, Mohammed Faruque; Yusoff, Nasir
Previous studies have revealed that self-related tasks (items) receive more attention than non-self-related, and that they elicit event-related potential (ERP) components with larger amplitudes. Since personality has been reported as one of the biological correlates influencing these components, as well as our behavioural differences, it is important to examine how it affects our self-consciousness in relation to tasks of varied relevance and the neurological basis. A total of 33 male and female undergraduate Malaysian medical students of Universiti Sains Malaysia (USM) participated in the study. The participants were divided into two groups, Ambivert ( n = 18) and Extravert ( n = 15) groups, using the USM personality inventory questionnaire. In the ERP experiment, squares containing standard stimuli of any word other than self and non-self-related nouns (e.g., Bola , Gigi , Anak , etc.; in English: Ball, Teeth, Kids, etc., respectively), those containing self-related pronouns ( Saya , Kami or Kita ; in English: I, Us or We, respectively), and non-self-related pronouns ( Dia , Anda or Mereka ; in English: He/She, You or They, respectively), were shown 58%, 21% and 21% of the time, respectively, in a three-stimulus visual oddball paradigm. All words were presented in Bahasa Melayu. The participants were instructed to press 1 for self and 2 for non-self, and ignore standard stimuli. Comparison of both N200 and P300 amplitudes for self-related and non-self-related pronouns in the Extravert group revealed significant differences at seven electrode sites, with self-related having larger amplitude at anterior electrodes and less at posterior. This was not seen in the Ambivert group. The present study suggests that self-relevant pronouns are psychologically more important to extraverts than to ambiverts; hence, they have more self-awareness. This may be due to large amount of dopamine in the brains of extraverts, which is more concentrated in the frontal lobe.
Christiansen, Karl; Borup, Ruben; Søndergaard, Asbjørn
Digital Tectonics treats the architectonical possibilities in digital generation of form and production. The publication is the first volume of a series, in which aspects of the strategic focus areas of the Aarhus School of Architecture will be disseminated.......Digital Tectonics treats the architectonical possibilities in digital generation of form and production. The publication is the first volume of a series, in which aspects of the strategic focus areas of the Aarhus School of Architecture will be disseminated....
Forchhammer, Søren; Kim, Chul E
Digital squares are defined and their geometric properties characterized. A linear time algorithm is presented that considers a convex digital region and determines whether or not it is a digital square. The algorithm also determines the range of the values of the parameter set of its preimages....... The analysis involves transforming the boundary of a digital region into parameter space of slope and y-intercept...
Digital skrivedidaktik består af to dele. Første del præsenterer teori om skrivekompetence og digital skrivning. Digital skrivning er karakteriseret ved at tekster skrives på computer og med digitale værktøjer, hvilket ændrer skrivningens traditionelle praksis, produkt og processer. Hvad er digital...... om elevens skriveproces) og Blogskrivning (der styrker eleverne i at bruge blogs i undervisningen)....
Nielsen, Jens Brehm; Nielsen, Jakob; Jensen, Bjørn Sand
Modern digital hearing aids require and offer a great level of personalization. Today, this personalization is not performed based directly on what the user actually perceives, but on a hearing-care professional’s interpretation of what the user explains about what is perceived. In this paper......, an interactive personalization system based on Gaussian process regression and active learning is proposed, which personalize the hearing aids based directly on what the user perceives. Preliminary results demonstrate a significant difference between a truly personalized setting obtained with the proposed system...
Vitaliy Grigorievich Ivanenko
Full Text Available This paper reviews different protection methods for electronic documents, their good and bad qualities. Common attacks on electronic documents are analyzed. Digital signature and ways of eliminating its flaws are studied. Different digital watermark embedding methods are described, they are divided into 2 types. The solution to protection of electronic documents is based on embedding digital watermarks. Comparative analysis of this methods is given. As a result, the most convenient method is suggested – reversible data hiding. It’s remarked that this technique excels at securing the integrity of the container and its digital watermark. Digital watermark embedding system should prevent illegal access to the digital watermark and its container. Digital watermark requirements for electronic document protection are produced. Legal aspect of copyright protection is reviewed. Advantages of embedding digital watermarks in electronic documents are produced. Modern reversible data hiding techniques are studied. Distinctive features of digital watermark use in Russia are highlighted. Digital watermark serves as an additional layer of defense, that is in most cases unknown to the violator. With an embedded digital watermark, it’s impossible to misappropriate the authorship of the document, even if the intruder signs his name on it. Therefore, digital watermarks can act as an effective additional tool to protect electronic documents.
Isman, Aytekin; Canan Gungoren, Ozlem
Era in which we live is known and referred as digital age.In this age technology is rapidly changed and developed. In light of these technological advances in 21st century, schools have the responsibility of training "digital citizen" as well as a good citizen. Digital citizens must have extensive skills, knowledge, Internet and …
The promise of the globalization of trade and particularly electronic commerce to deliver goods and services much faster to clients is talked about in almost all circles of life. Governments are moving towards electronic governance, in an effort to cut down the cost of bureaucratic process and reduce the time spent on paper ...
Sep 14, 2017 ... WSN applications do not even consider the security aspects because of the heavy ...... security scheme in wireless sensor networks with mobile sinks. IEEE Trans. ... security protocols. PhD Thesis, Eindhoven University of.
Distributed protocols allow a cryptographic scheme to distribute its operation among a group of participants (servers). This new concept of cryptosystems was introduced by Desmedt . We consider two different flavours of distributed protocols. One of them considers a distributed model with n parties where all of these parties are honest. The other allows up to t − 1 parties to be faulty. Such cryptosystems are called threshold cryptosystems. The distribution of cryptographic process is ...
... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Signature manifestations. 11.50 Section 11.50 Food... RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.50 Signature manifestations. (a) Signed electronic...: (1) The printed name of the signer; (2) The date and time when the signature was executed; and (3...
... POSTAL SERVICE 39 CFR Part 111 Adult Signature Services AGENCY: Postal Service\\TM\\. ACTION: Final..., Domestic Mail Manual (DMM[supreg]) 503.8, to add a new extra service called Adult Signature. This new service has two available options: Adult Signature Required and Adult Signature Restricted Delivery. DATES...
... 1 General Provisions 1 2010-01-01 2010-01-01 false Signature. 18.7 Section 18.7 General Provisions... PREPARATION AND TRANSMITTAL OF DOCUMENTS GENERALLY § 18.7 Signature. The original and each duplicate original... stamped beneath the signature. Initialed or impressed signatures will not be accepted. Documents submitted...
Mussmann, Bo Redder
Digital subtraktion er en metode til at fjerne uønskede oplysninger i et røntgenbillede. Subtraktionsteknikken bruges primært i forbindelse med angiografi hvor man kun er interesseret i at se selve karret. Derfor er digital subtraktion i daglig tale synonymt med DSA eller DVI – hhv. Digital...... Subtraction Angiography eller Digital Vascular Imaging. Benævnelserne er to røntgenfirmaers navn for den samme teknik. Digital subtraktion kræver speciel software, samt at apparaturet kan eksponere i serier....
Digital preservation is an issue of huge importance to the library and information profession right now. With the widescale adoption of the internet and the rise of the world wide web, the world has been overwhelmed by digital information. Digital data is being produced on a massive scale by individuals and institutions: some of it is born, lives and dies only in digital form, and it is the potential death of this data, with its impact on the preservation of culture, that is the concern of this book. So how can information professionals try to remedy this? Digital preservation is a complex iss
Kim, Taewan; Choi, Jeong Woon; Jho, Nam-Su; Lee, Soojoon
Even though a method to perfectly sign quantum messages has not been known, the arbitrated quantum signature scheme has been considered as one of the good candidates. However, its forgery problem has been an obstacle to the scheme becoming a successful method. In this paper, we consider one situation, which is slightly different from the forgery problem, that we use to check whether at least one quantum message with signature can be forged in a given scheme, although all the messages cannot be forged. If there are only a finite number of forgeable quantum messages in the scheme, then the scheme can be secured against the forgery attack by not sending forgeable quantum messages, and so our situation does not directly imply that we check whether the scheme is secure against the attack. However, if users run a given scheme without any consideration of forgeable quantum messages, then a sender might transmit such forgeable messages to a receiver and in such a case an attacker can forge the messages if the attacker knows them. Thus it is important and necessary to look into forgeable quantum messages. We show here that there always exists such a forgeable quantum message-signature pair for every known scheme with quantum encryption and rotation, and numerically show that there are no forgeable quantum message-signature pairs that exist in an arbitrated quantum signature scheme. (paper)
Chang Jeffrey T
Full Text Available Abstract Background The biological phenotype of a cell, such as a characteristic visual image or behavior, reflects activities derived from the expression of collections of genes. As such, an ability to measure the expression of these genes provides an opportunity to develop more precise and varied sets of phenotypes. However, to use this approach requires computational methods that are difficult to implement and apply, and thus there is a critical need for intelligent software tools that can reduce the technical burden of the analysis. Tools for gene expression analyses are unusually difficult to implement in a user-friendly way because their application requires a combination of biological data curation, statistical computational methods, and database expertise. Results We have developed SIGNATURE, a web-based resource that simplifies gene expression signature analysis by providing software, data, and protocols to perform the analysis successfully. This resource uses Bayesian methods for processing gene expression data coupled with a curated database of gene expression signatures, all carried out within a GenePattern web interface for easy use and access. Conclusions SIGNATURE is available for public use at http://genepattern.genome.duke.edu/signature/.
Watson, Ian Robert
This research builds upon the discourse surrounding digital natives. A literature review into the digital native phenomena was undertaken and found that researchers are beginning to identify the digital native as not one cohesive group but of individuals influenced by other factors. Primary research by means of questionnaire survey of technologies…
PURCAREA, Ioan Matei; NEGRICEA, Costel Iliuta
Digital is the new normal today, the digitally transformation allowing step by step a closer connection with customers, and accordingly answer to the new requirements of the supply chain management. The rules of engagement are changed by the digital lives of customers, the digital leaders creating value across physical/digital products, services, and experience. Chief Marketing Officer (CMO) is proving a more devoted personal attention and a more directly involvement in digital initiatives, t...
Ištvanić, Marin; Crnjac Milić, Dominika; Krpić, Zdravko
Promotion of products has become an increasingly important component in the new digital age, mostly thanks to digital marketing. The traditional form of marketing is lagging behind digital marketing, which offers users new opportunities like personalized messages or answers to a search query. There are several ways to advertise on the internet, and in this paper, ways and tools will be presented that allow digital advertising as well as their advantages an...
Zou Xiangfu; Qiu Daowen
A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. For signing quantum messages, some arbitrated quantum signature (AQS) schemes have been proposed. It was claimed that these AQS schemes could guarantee unconditional security. However, we show that they can be repudiated by the receiver Bob. To conquer this shortcoming, we construct an AQS scheme using a public board. The AQS scheme not only avoids being disavowed by the receiver but also preserves all merits in the existing schemes. Furthermore, we discover that entanglement is not necessary while all these existing AQS schemes depend on entanglement. Therefore, we present another AQS scheme without utilizing entangled states in the signing phase and the verifying phase. This scheme has three advantages: it does not utilize entangled states and it preserves all merits in the existing schemes; the signature can avoid being disavowed by the receiver; and it provides a higher efficiency in transmission and reduces the complexity of implementation.
Visco, Donald Patrick, Jr. (Tennessee Technological University, Cookeville, TN)
In this work we report on the development of the Signature Molecular Descriptor (or Signature) for use in the solution of inverse design problems as well as in highthroughput screening applications. The ultimate goal of using Signature is to identify novel and non-intuitive chemical structures with optimal predicted properties for a given application. We demonstrate this in three studies: green solvent design, glucocorticoid receptor ligand design and the design of inhibitors for Factor XIa. In many areas of engineering, compounds are designed and/or modified in incremental ways which rely upon heuristics or institutional knowledge. Often multiple experiments are performed and the optimal compound is identified in this brute-force fashion. Perhaps a traditional chemical scaffold is identified and movement of a substituent group around a ring constitutes the whole of the design process. Also notably, a chemical being evaluated in one area might demonstrate properties very attractive in another area and serendipity was the mechanism for solution. In contrast to such approaches, computer-aided molecular design (CAMD) looks to encompass both experimental and heuristic-based knowledge into a strategy that will design a molecule on a computer to meet a given target. Depending on the algorithm employed, the molecule which is designed might be quite novel (re: no CAS registration number) and/or non-intuitive relative to what is known about the problem at hand. While CAMD is a fairly recent strategy (dating to the early 1980s), it contains a variety of bottlenecks and limitations which have prevented the technique from garnering more attention in the academic, governmental and industrial institutions. A main reason for this is how the molecules are described in the computer. This step can control how models are developed for the properties of interest on a given problem as well as how to go from an output of the algorithm to an actual chemical structure. This report
Saramäki, Jari; Leicht, E A; López, Eduardo; Roberts, Sam G B; Reed-Tsochas, Felix; Dunbar, Robin I M
The social network maintained by a focal individual, or ego, is intrinsically dynamic and typically exhibits some turnover in membership over time as personal circumstances change. However, the consequences of such changes on the distribution of an ego's network ties are not well understood. Here we use a unique 18-mo dataset that combines mobile phone calls and survey data to track changes in the ego networks and communication patterns of students making the transition from school to university or work. Our analysis reveals that individuals display a distinctive and robust social signature, captured by how interactions are distributed across different alters. Notably, for a given ego, these social signatures tend to persist over time, despite considerable turnover in the identity of alters in the ego network. Thus, as new network members are added, some old network members either are replaced or receive fewer calls, preserving the overall distribution of calls across network members. This is likely to reflect the consequences of finite resources such as the time available for communication, the cognitive and emotional effort required to sustain close relationships, and the ability to make emotional investments.
Watkins, Michael L.; Keller, Paul Edwin; Amaya, Ivan A.
A method of, and apparatus for, determining if a person operating equipment is experiencing an elevated cognitive load, wherein the person's use of a device at a first time is monitored so as to set a baseline signature. Then, at a later time, the person's use of the device is monitored to determine the person's performance at the second time, as represented by a performance signature. This performance signature can then be compared against the baseline signature to predict whether the person is experiencing an elevated cognitive load.
Whitley, Edgar A; Lund, David; Kaye, Jane
detrimental consequences of data falling into the wrong hands, such as insurance companies, 39 out of 40 (98%) participants generally considered that the altruistic benefits of sharing health care data outweighed the risks. Views were mostly positive about the use of an electronic interface to enable greater control over consent choices, although some patients were happy to share their data without further engagement. Participants were particularly enthusiastic about the system as a means of enabling feedback regarding data recipients and associated research results, noting that this would improve trust and public engagement in research. This underlines the importance of patient and public involvement and engagement throughout the research process, including the reuse of anonymized health care data for research. More than half of patients found the touch screen interface easy to use, although a significant minority, especially those with limited access to technology, expressed some trepidation and felt they may need support to use the system. Conclusions Patients from a range of socioeconomic backgrounds viewed a digital system for Dynamic Consent positively, in particular, feedback about data recipients and research results. Implementation of a digital Dynamic Consent system would require careful interface design and would need to be located within a robust data infrastructure; it has the potential to improve trust and engagement in electronic medical record research. PMID:27083521
Spencer, Karen; Sanders, Caroline; Whitley, Edgar A; Lund, David; Kaye, Jane; Dixon, William Gregory
into the wrong hands, such as insurance companies, 39 out of 40 (98%) participants generally considered that the altruistic benefits of sharing health care data outweighed the risks. Views were mostly positive about the use of an electronic interface to enable greater control over consent choices, although some patients were happy to share their data without further engagement. Participants were particularly enthusiastic about the system as a means of enabling feedback regarding data recipients and associated research results, noting that this would improve trust and public engagement in research. This underlines the importance of patient and public involvement and engagement throughout the research process, including the reuse of anonymized health care data for research. More than half of patients found the touch screen interface easy to use, although a significant minority, especially those with limited access to technology, expressed some trepidation and felt they may need support to use the system. Patients from a range of socioeconomic backgrounds viewed a digital system for Dynamic Consent positively, in particular, feedback about data recipients and research results. Implementation of a digital Dynamic Consent system would require careful interface design and would need to be located within a robust data infrastructure; it has the potential to improve trust and engagement in electronic medical record research.
Full Text Available A proxy blind signature scheme is a special form of blind signature which allowed a designated person called proxy signer to sign on behalf of original signers without knowing the content of the message. It combines the advantages of proxy signature and blind signature. Up to date, most proxy blind signature schemes rely on hard number theory problems, discrete logarithm, and bilinear pairings. Unfortunately, the above underlying number theory problems will be solvable in the postquantum era. Lattice-based cryptography is enjoying great interest these days, due to implementation simplicity and provable security reductions. Moreover, lattice-based cryptography is believed to be hard even for quantum computers. In this paper, we present a new identity-based proxy blind signature scheme from lattices without random oracles. The new scheme is proven to be strongly unforgeable under the standard hardness assumption of the short integer solution problem (SIS and the inhomogeneous small integer solution problem (ISIS. Furthermore, the secret key size and the signature length of our scheme are invariant and much shorter than those of the previous lattice-based proxy blind signature schemes. To the best of our knowledge, our construction is the first short lattice-based identity-based proxy blind signature scheme in the standard model.
Bick, Ulrich; Diekmann, Felix
This state-of-the-art reference book provides in-depth coverage of all aspects of digital mammography, including detector technology, image processing, computer-aided diagnosis, soft-copy reading, digital workflow, and PACS. Specific advantages and disadvantages of digital mammography in comparison to screen-film mammography are thoroughly discussed. By including authors from both North America and Europe, the book is able to outline variations in the use, acceptance, and quality assurance of digital mammography between the different countries and screening programs. Advanced imaging techniques and future developments such as contrast mammography and digital breast tomosynthesis are also covered in detail. All of the chapters are written by internationally recognized experts and contain numerous high-quality illustrations. This book will be of great interest both to clinicians who already use or are transitioning to digital mammography and to basic scientists working in the field. (orig.)
Knudsen, Gry Høngsmark
, by incorporating media as both channel, frame, and apparatus for advertising response, the dissertation brings into attention that more aspects than the text-reader relationship influence ad response. Finally, the dissertation proposes the assemblage approach for exploring big data in consumer culture research...... and practices with digital media, when they meet and interpret advertising. Through studies of advertising response on YouTube and experiments with consumers’ response to digitally manipulated images, the dissertation shows how digital media practices facilitate polysemic and socially embedded advertising......This dissertation forwards the theory of digital consumer-response as a perspective to examine how digital media practices influence consumers’ response to advertising. Digital consumer-response is a development of advertising theory that encompasses how consumers employ their knowledge...
Fischer, Karl Peter
Digital Signage for in-store advertising at gas stations/retail stores in Germany: A field study Digital Signage networks provide a novel means of advertising with the advantage of easily changeable and highly customizable animated content. Despite the potential and increasing use of these media empirical research is scarce. In a field study at 8 gas stations (with integrated convenience stores) we studied the effect of digital signage advertising on sales for different products and servi...
Van Cor, Jared D.
?m]over a sample of ROIs. Further analysis using EPIC imagery found a total albedo difference of +0.03% and a cross correlation of 0.656. Also compared to EPIC imagery it was found our heterogeneous Earth model produced a reflected Earthshine radiance RMSE of +/-28 [watts/m. 2sr?m] incident on diffuse sphericalRSOs, specular spherical RSOs, and diffuse flat plate RSOs with an altitude of 1000km; this resulted in an apparent magnitude error of +/-0.28. Furthermore, it was found our heterogeneous Earthmodel produced a reflected Earthshine radiance RMSE of +/-68 [watts/m. 2sr?m] for specular flat plate RSOs withan altitude of 1000km; this resulted in an apparent magnitude error of +/-0.68. The Earth objects were used in a workflow with the Digital Imaging and Remote Sensing Image Generation (DIRSIG) tool to explore the impact of a range of characteristic RSO geometries, geographies, orientations, and materials on the signatures from an RSO due to Earthshine. An apparent magnitude was calculated and used to quantify RSO Earthshine signature variability; this is discussed in terms of the RMSE and maximum deviations of visible RSO Earthshine apparent magnitude signatures comparing the homogeneous Earth model to heterogeneous Earth model. The homogeneous diffuse Earth object was shown to approximate visible RSO Earthshine apparent magnitude signatures from spheres with a RMSE in reflected Earthshine apparent magnitude of +/-0.4 and a maximum apparent magnitude difference of 1.09 when compared to the heterogeneous Earth model. Similarly for diffuse flat plates, the visible RSO Earthshine apparent magnitude signature RMSE was shown to be +/-0.64, with a maximum apparent magnitude difference of 0.82. For specular flat plates, the visible RSO Earthshine apparent magnitude signature RMSE was shown to be +/-0.97 with maximum apparent magnitude difference of 2.26. This thesis explored only a portion of the parameter dependencies of Earth shine, but has enabled a preliminary understanding
Xiao, Xiao; Hedman, Jonas; Tan, Felix Ter Chian
evolution, as digital technologies are increasingly entrenched in a wide range of sporting activities and for applications beyond mere performance enhancement. Despite such trends, research on sports digitalization in the IS discipline is surprisingly still nascent. This paper aims at establishing...... a discourse on sports digitalization within the discipline. Toward this, we first provide an understanding of the institutional characteristics of the sports industry, establishing its theoretical importance and relevance in our discipline; second, we reveal the latest trends of digitalization in the sports...
McMillan, H. K.; Westerberg, I.; Branger, F.
Hydrological signatures are index values derived from observed or modeled series of hydrological data such as rainfall, flow or soil moisture. They are designed to extract relevant information about hydrological behavior, such as to identify dominant processes, and to determine the strength, speed and spatiotemporal variability of the rainfall-runoff response. Hydrological signatures play an important role in model evaluation. They allow us to test whether particular model structures or parameter sets accurately reproduce the runoff generation processes within the watershed of interest. Most modeling studies use a selection of different signatures to capture different aspects of the catchment response, for example evaluating overall flow distribution as well as high and low flow extremes and flow timing. Such studies often choose their own set of signatures, or may borrow subsets of signatures used in multiple other works. The link between signature values and hydrological processes is not always straightforward, leading to uncertainty and variability in hydrologists' signature choices. In this presentation, we aim to encourage a more rigorous approach to hydrological signature selection, which considers the ability of signatures to represent hydrological behavior and underlying processes for the catchment and application in question. To this end, we propose a set of guidelines for selecting hydrological signatures. We describe five criteria that any hydrological signature should conform to: Identifiability, Robustness, Consistency, Representativeness, and Discriminatory Power. We describe an example of the design process for a signature, assessing possible signature designs against the guidelines above. Due to their ubiquity, we chose a signature related to the Flow Duration Curve, selecting the FDC mid-section slope as a proposed signature to quantify catchment overall behavior and flashiness. We demonstrate how assessment against each guideline could be used to
Full Text Available The implementation of electronic governance related projects implies user authentication,accounts activation and personal data verification. Certain public services, particularly thoseinvolving financial transactions or statements, require a high security level. The use of the PKI technology and, consequently, of digital signatures, constitutes the most viable solution, meeting the required security standards, protecting, on the one hand, the signatory’s identity, and, on the other hand, the integrity of the transmitted message. Due to the use of the digital certificate, the development of online public services is now possible, especially since it meets the requirements of security standards, but also because it is highly trusted by users. This article intends to analyze the impact of the digital certificate on the improvement of communication between state authorities, including specific transactional relations, and also to consider its influence on security improvement of dataflow. The study demonstrates that the digital certificate is closely connected to the information society, directly determining the dynamics of the development of new applications that provide a better interface between the state and its citizens.
Valentin P. MĂZĂREANU
Full Text Available The Digital economy has naturally led to thereconfiguration of communication and information processes.These processes are depending on the computer, starting fromthe personal one and reaching to computer networks, whetherlocal, metropolitan or global. These led to the development ofsuch information systems able to communicate information,systems that must also ensure the security of communicationsbetween computers within the company, but also betweencomputers of different parties, outside the company. As thecommunication between computers in the network has evolvedto electronic funds transfer (EFT, digital money andcommunication of personal data, internet banking, etc., theimportance of security issues of data transmitted over thenetwork also has increased. Even more as the network hasevolved into a “wireless” one.
Alison J. Kennedy
Full Text Available Abstract Background Australian farming communities have up to twice the suicide rate of the general population. Men, particularly, demonstrate debilitating self- and perceived-stigma associated with an experience of suicide. The Ripple Effect is aimed to reduce suicide stigma within the social, cultural, geographical and psychological contexts in which it occurs. Methods A mixed-method design with multi-level evaluation will be effected following the development and delivery of a personalised website experience (combining shared stories, education, personal goal setting and links to resources to farming men, aged 30–64 years, with an experience of suicide. Pre- and post-surveys will be used to assess changes in self- and perceived-stigma and suicide literacy. Online feedback from participants and semi-structured interviews during follow-up will be thematically analysed. Discussion This project will provide information about increasingly accessible, innovative approaches to reducing the debilitating health and wellbeing effects of suicide stigma on a population of Australia’s farmers. Trial registration This research protocol was registered with the Australian New Zealand Clinical Trials Registry (ANZCTR (ACTRN: ACTRN12616000289415 on 7th March, 2016.
Kennedy, Alison J; Versace, Vincent Lawrence; Brumby, Susan A
Australian farming communities have up to twice the suicide rate of the general population. Men, particularly, demonstrate debilitating self- and perceived-stigma associated with an experience of suicide. The Ripple Effect is aimed to reduce suicide stigma within the social, cultural, geographical and psychological contexts in which it occurs. A mixed-method design with multi-level evaluation will be effected following the development and delivery of a personalised website experience (combining shared stories, education, personal goal setting and links to resources) to farming men, aged 30-64 years, with an experience of suicide. Pre- and post-surveys will be used to assess changes in self- and perceived-stigma and suicide literacy. Online feedback from participants and semi-structured interviews during follow-up will be thematically analysed. This project will provide information about increasingly accessible, innovative approaches to reducing the debilitating health and wellbeing effects of suicide stigma on a population of Australia's farmers. This research protocol was registered with the Australian New Zealand Clinical Trials Registry (ANZCTR) (ACTRN: ACTRN12616000289415 ) on 7 th March, 2016.
Handwritten signatures play an important role in daily life. They are widely accepted and frequently used to verify the claimed identity of a person. Consequently, there is a strong need for objective and automatic signature evaluation. The dissertation at hand aims (i) to provide a scientific basis
The following thesis was conducted for Ninja Stars startup company, based in Madrid, Spain. Ninja mails offers an all new professional online service, which allows finding the email address of any person from any company by only knowing the name of the desired recipient and the recipient’s company. In the thesis the author examined the digital marketing concepts in terms of startup development and the improvement of the external company’s image for a particular target group of recent universi...
Critique in undergraduate theatre programs is at the heart of training actors at all levels. It is accepted as the signature pedagogy and is practiced in multiple ways. This essay defines critique and presents the case for why it is used as the single most important way that performers come to understand the language, values, and discourse of the…
In mammalian cells, transcribed enhancers (TrEn) play important roles in the initiation of gene expression and maintenance of gene expression levels in spatiotemporal manner. One of the most challenging questions in biology today is how the genomic characteristics of enhancers relate to enhancer activities. This is particularly critical, as several recent studies have linked enhancer sequence motifs to specific functional roles. To date, only a limited number of enhancer sequence characteristics have been investigated, leaving space for exploring the enhancers genomic code in a more systematic way. To address this problem, we developed a novel computational method, TELS, aimed at identifying predictive cell type/tissue specific motif signatures. We used TELS to compile a comprehensive catalog of motif signatures for all known TrEn identified by the FANTOM5 consortium across 112 human primary cells and tissues. Our results confirm that distinct cell type/tissue specific motif signatures characterize TrEn. These signatures allow discriminating successfully a) TrEn from random controls, proxy of non-enhancer activity, and b) cell type/tissue specific TrEn from enhancers expressed and transcribed in different cell types/tissues. TELS codes and datasets are publicly available at http://www.cbrc.kaust.edu.sa/TELS.
Aspects of quark-gluon plasma signatures that can be measured by CMS are discussed. First the initial conditions of the system from minijet production are introduced, including shadowing effects. Color screening of the Upsilon family is then presented, followed by energy loss effects on charm and bottom hadrons, high Pt jets and global observables.
Sancisi, R; Barnes, JE; Sanders, DB
HI observations are an excellent tool for investigating tidal interactions. Ongoing major and minor interactions which can lead to traumatic mergers or to accretion and the triggering of star formation, show distinct HI signatures. Interactions and mergers in the recent past can also be recognized
Have, Iben; Pedersen, Birgitte Stougaard
Audiobooks are rapidly gaining popularity with widely accessible digital downloading and streaming services. The paper is framing how the digital audiobook expands and changes the target groups for book publications and how it as an everyday activity is creating new reading experiences, places...
Presenting the current status of the Digital TMI project to visiting members of the FAA Command Center. Digital TMI is an effort to store national-level traffic management initiatives in a standards-compliant manner. Work is funded by the FAA.
Pors, Anja Svejgaard
In recent years digital reforms are being introduced in the municipal landscape of Denmark. The reforms address the interaction between citizen and local authority. The aim is, that by 2015 at least 80 per cent of all correspondence between citizens and public authority will be transmitted through...... digital interface. However, the transformation of citizen services from traditional face-to-face interaction to digital self-service gives rise to new practices; some citizens need support to be able to manage self-service through digital tools. A mixture of support and teaching, named co......-service, is a new task in public administration, where street level bureaucrats assist citizens in using the new digital solutions. The paper is based on a case study conducted primarily in a citizen service centre in Copenhagen, Denmark. Based on ethnography the paper gives an empirical account of the ongoing...
Bruneton, J.N.; Balu-Maestro, C.; Rogopoulos, A.; Chauvel, C.; Geoffray, A.
Two observers conducted a blind evaluation of 100 mammography files, including 47 malignant cases. Films were read both before and after image digitization at 50 μm and 100 μm with the FilmDRSII. Digitization permitted better analysis of the normal anatomic structures and moderately improved diagnostic sensitivity. Searches for microcalcifications before and after digitization at 100 μm and 50 μm showed better analysis of anatomic structures after digitization (especially for solitary microcalcifications). The diagnostic benefit, with discovery of clustered microcalcifications, was more limited (one case at 100 μm, nine cases at 50 μm). Recognition of microcalcifications was clearly improved in dense breasts, which can benefit from reinterpretation after digitization at 50 μm rather 100μm
María Fernanda Díaz Velásquez
Full Text Available This paper shows the application of the classic technique of digital signal processing (DSP, the cross-correlation, used for the detection of acoustic signatures of road traffic in Cali city, Colombia. Future goal is to build a detection software that through real time measures allows us estimate the levels of acoustic pollution in the city by using simulation models of road traffic, in the framework of environmentally-friendly smart cities. Final results of the experimental tests showed an accuracy of 71.43% for specific vehicle detection.
Finds that the recent National Press Photographers Association code of ethics can serve as a model for any photography staff. Discusses how digital imaging is becoming commonplace in classrooms, due to decreasing costs and easier software. Explains digital terminology. Concludes that time saved in the darkroom and at the printer is now spent on…
Full Text Available We present MOBISIG, a pseudosignature dataset containing finger-drawn signatures from 83 users captured with a capacitive touchscreen-based mobile device. The database was captured in three sessions resulting in 45 genuine signatures and 20 skilled forgeries for each user. The database was evaluated by two state-of-the-art methods: a function-based system using local features and a feature-based system using global features. Two types of equal error rate computations are performed: one using a global threshold and the other using user-specific thresholds. The lowest equal error rate was 0.01% against random forgeries and 5.81% against skilled forgeries using user-specific thresholds that were computed a posteriori. However, these equal error rates were significantly raised to 1.68% (random forgeries case and 14.31% (skilled forgeries case using global thresholds. The same evaluation protocol was performed on the DooDB publicly available dataset. Besides verification performance evaluations conducted on the two finger-drawn datasets, we evaluated the quality of the samples and the users of the two datasets using basic quality measures. The results show that finger-drawn signatures can be used by biometric systems with reasonable accuracy.
Thaler, S.M.; Menkovski, V.; Petkovic, M.; Altun, Y.; Das, K.; Mielikäinen, T.; Malerba, D.; Stefanowski, J.; Read, J.; Žitnik, M.; Ceci, M.
Signature extraction is a key part of forensic log analysis. It involves recognizing patterns in log lines such that log lines that originated from the same line of code are grouped together. A log signature consists of immutable parts and mutable parts. The immutable parts define the signature, and
... 7 Agriculture 7 2010-01-01 2010-01-01 false Signature requirements. 718.9 Section 718.9... MULTIPLE PROGRAMS General Provisions § 718.9 Signature requirements. (a) When a program authorized by this chapter or Chapter XIV of this title requires the signature of a producer; landowner; landlord; or tenant...
... 42 Public Health 3 2010-10-01 2010-10-01 false Signature requirements. 424.36 Section 424.36... (CONTINUED) MEDICARE PROGRAM CONDITIONS FOR MEDICARE PAYMENT Claims for Payment § 424.36 Signature requirements. (a) General rule. The beneficiary's own signature is required on the claim unless the beneficiary...
... 25 Indians 1 2010-04-01 2010-04-01 false Lessor's signature. 213.10 Section 213.10 Indians BUREAU... MEMBERS OF FIVE CIVILIZED TRIBES, OKLAHOMA, FOR MINING How to Acquire Leases § 213.10 Lessor's signature... thumbprint which shall be designated as “right” or “left” thumbmark. Such signatures must be witnessed by two...
Jain, A.K.; Goel, A.
The authors briefly review the progress in understanding the 2-qp rotational bands in odd-odd nuclei. Signature effects and the phenomenon of signature inversion are discussed. The Coriolis coupling appears to have all the ingredients to explain the inversion. Some recent work on signature dependence in 2-qp bands of even-even nuclei is also discussed; interesting features are pointed out
... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Signature authority. 17.6... PRODUCTS General Provisions § 17.6 Signature authority. No claim, bond, tax return, or other required... other proper notification of signature authority has been filed with the TTB office where the required...
Bernstein, D.J.; Duif, N.; Lange, T.; Schwabe, P.; Yang, B.Y.
This paper shows that a $390 mass-market quad-core 2.4GHz Intel Westmere (Xeon E5620) CPU can create 108000 signatures per second and verify 71000 signatures per second on an elliptic curve at a 2128 security level. Public keys are 32 bytes, and signatures are 64 bytes. These performance figures
Yury E. Kozlov
Full Text Available Reliable authentication in mobile applications is among the most important information security challenges. Today, we can hardly imagine a person who would not own a mobile device that connects to the Internet. Mobile devices are being used to store large amounts of confidential information, ranging from personal photos to electronic banking tools. In 2009, colleagues from Rice University together with their collaborators from Motorola, proposed an authentication through in-air gestures. This and subsequent work contributing to the development of the method are reviewed in our introduction. At the moment, there exists a version of the gesture-based authentication software available for Android mobile devices. This software has not become widespread yet. One of likely reasons for that is the insufficient reliability of the method, which involves similar to its earlier analogs the use of only one device. Here we discuss the authentication based on the multimodal three-dimensional dynamic signature (MTDS performed by two independent mobile devices. The MTDS-based authentication technique is an advanced version of in-air gesture authentication. We describe the operation of a prototype of MTDS-based authentication, including the main implemented algorithms, as well as some preliminary results of testing the software. We expect that our method can be used in any mobile application, provided a number of additional improvements discussed in the conclusion are made.
Coulomb, M.; Dal Soglio, S.; Pittet-Barbier, L.; Ranchoup, Y.; Thony, F.; Ferretti, G.; Robert, F.
Digital projection radiography may replace conventional radiography some day, provided it can meet several requirements: equal or better diagnostic effectiveness of the screen-film systems; reasonable image cost; real improvement in the productivity of the Departments of Imaging. All digital radiographic systems include an X-ray source, an image acquisition and formatting sub-system, a display and manipulation sub-system, and archiving subsystem and a laser editing system, preferably shared by other sources of digital images. Three digitization processes are available: digitization of the radiographic film, digital fluorography and phospholuminescent detectors with memory. The advantages of digital fluoroscopy are appealing: real-time image acquisition, suppression of cassettes; but its disadvantages are far from negligible: it cannot be applied to bedside radiography, the field of examination is limited, and the wide-field spatial resolution is poor. Phospholuminescent detectors with memory have great advantages: they can be used for bedside radiographs and on all the common radiographic systems; spatial resolution is satisfactory; its current disadvantages are considerable. These two systems, have common properties making up the entire philosophy of digital radiology and specific features that must guide our choice according to the application. Digital fluorography is best applied in pediatric radiology. However, evaluation works have showed that it was applicable with sufficient quality to many indications of general radiology in which a fluoroscopic control and fast acquisition of the images are essential; the time gained on the examination may be considerable, as well as the savings on film. Detectors with memory are required for bedside radiographs, in osteoarticular and thoracic radiology, in all cases of traumatic emergency and in the resuscitation and intensive care departments
Lal, Sunder; Verma, Vandani
Braids groups provide an alternative to number theoretic public cryptography and can be implemented quite efficiently. The paper proposes five signature schemes: Proxy Signature, Designated Verifier, Bi-Designated Verifier, Designated Verifier Proxy Signature And Bi-Designated Verifier Proxy Signature scheme based on braid groups. We also discuss the security aspects of each of the proposed schemes.
Pors, Anja Svejgaard
. An ethnographic account of how digital reforms are implemented in practice shows how street-level bureaucrat’s classic tasks such as specialized casework are being reconfigured into educational tasks that promote the idea of “becoming digital”. In the paper, the author argues that the work of “becoming digital....... Originality/value: The study contributes to ethnographic research in public administration by combining two separate subfields, e-government and street-level bureaucracy, to discern recent transformations in public service delivery. In the digital era, tasks, control and equality are distributed in ways...
, and preserving material to study, as an object of study in its own right, as an analytical tool, or for collaborating, and for disseminating results. The term "digital humanities" was coined around 2001, and gained currency within academia in the following years. However, computers had been used within......Digital humanities is an umbrella term for theories, methodologies, and practices related to humanities scholarship that use the digital computer as an integrated and essential part of its research and teaching activities. The computer can be used for establishing, finding, collecting...
Sandbye, Mette; Larsen, Jonas
. Distance as the New Punctum / Mikko Villi -- pt. II. FAMILY ALBUMS IN TRANSITION -- ch. 4. How Digital Technologies Do Family Snaps, Only Better / Gillian Rose -- ch. 5. Friendship Photography: Memory, Mobility and Social Networking / Joanne Garde-Hansen -- ch. 6. Play, Process and Materiality in Japanese...... -- ch. 9. Retouch Yourself: The Pleasures and Politics of Digital Cosmetic Surgery / Tanya Sheehan -- ch. 10. Virtual Selves: Art and Digital Autobiography / Louise Wolthers -- ch. 11. Mobile-Media Photography: New Modes of Engagement / Michael Shanks and Connie Svabo....
An essential companion to John C Morris's 'Analogue Electronics', this clear and accessible text is designed for electronics students, teachers and enthusiasts who already have a basic understanding of electronics, and who wish to develop their knowledge of digital techniques and applications. Employing a discovery-based approach, the author covers fundamental theory before going on to develop an appreciation of logic networks, integrated circuit applications and analogue-digital conversion. A section on digital fault finding and useful ic data sheets completes th
Zupancic, Tadeja; Verbeke, Johan; Achten, Henri
Leadership is an important quality in organisations. Leadership is needed to introduce change and innovation. In our opinion, in architectural and design practices, the role of leadership has not yet been sufficiently studied, especially when it comes to the role of digital tools and media....... With this paper we intend to initiate a discussion in the eCAADe community to reflect and develop ideas in order to develop digital leadership skills amongst the membership. This paper introduces some important aspects, which may be valuable to look into when developing digital leadership skills....
X-ray radiography is a very common technique used to check the homogeneity of a material or the inside of a mechanical part. Generally the radiation that goes through the material to check, produced an image on a sensitized film. This method requires time because the film needs to be developed, digital radiography has no longer this inconvenient. In digital radiography the film is replaced by digital data and can be processed as any computer file. This new technique is promising but its main inconvenient is that today its resolution is not so good as that of film radiography. (A.C.)
Firstly, from an historic point of view, fundamental concepts on digital imaging were reviewed to provide a foundation for discussion of digital radiography. Secondly, this review summarized the results of ongoing research in computed radiography that replaces the conventional film-screen system with a photo-stimulable phosphor plate; and thirdly, image quality, radiation protection, and image processing techniques were discussed with emphasis on picture archiving and communication system environment as our final goal. Finally, future expansion of digital radiography was described based on the present utilization of computed tomography at the National Defense Medical College Hospital. (author) 60 refs
Sung, Jaeyun; Wang, Yuliang; Chandrasekaran, Sriram; Witten, Daniela M; Price, Nathan D
In the past 15 years, new "omics" technologies have made it possible to obtain high-resolution molecular snapshots of organisms, tissues, and even individual cells at various disease states and experimental conditions. It is hoped that these developments will usher in a new era of personalized medicine in which an individual's molecular measurements are used to diagnose disease, guide therapy, and perform other tasks more accurately and effectively than is possible using standard approaches. There now exists a vast literature of reported "molecular signatures". However, despite some notable exceptions, many of these signatures have suffered from limited reproducibility in independent datasets, insufficient sensitivity or specificity to meet clinical needs, or other challenges. In this paper, we discuss the process of molecular signature discovery on the basis of omics data. In particular, we highlight potential pitfalls in the discovery process, as well as strategies that can be used to increase the odds of successful discovery. Despite the difficulties that have plagued the field of molecular signature discovery, we remain optimistic about the potential to harness the vast amounts of available omics data in order to substantially impact clinical practice. Copyright © 2012 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Huang, H. K.; Cao, Fei; Zhou, Michael Z.; Mogel, Greg T.; Liu, Brent J.; Zhou, Xiaoqiang
Health data security, characterized in terms of data privacy, authenticity, and integrity, is a vital issue when digital images and other patient information are transmitted through public networks in telehealth applications such as teleradiology. Mandates for ensuring health data security have been extensively discussed (for example The Health Insurance Portability and Accountability Act, HIPAA) and health informatics guidelines (such as the DICOM standard) are beginning to focus on issues of data continue to be published by organizing bodies in healthcare; however, there has not been a systematic method developed to ensure data security in medical imaging Because data privacy and authenticity are often managed primarily with firewall and password protection, we have focused our research and development on data integrity. We have developed a systematic method of ensuring medical image data integrity across public networks using the concept of the digital envelope. When a medical image is generated regardless of the modality, three processes are performed: the image signature is obtained, the DICOM image header is encrypted, and a digital envelope is formed by combining the signature and the encrypted header. The envelope is encrypted and embedded in the original image. This assures the security of both the image and the patient ID. The embedded image is encrypted again and transmitted across the network. The reverse process is performed at the receiving site. The result is two digital signatures, one from the original image before transmission, and second from the image after transmission. If the signatures are identical, there has been no alteration of the image. This paper concentrates in the method and evaluation of the digital image envelope.
Magnetic properties of ferrite structures are known to cause fluctuations in Earth's magnetic field around the object. These fluctuations are known as the object's magnetic signature and are unique based on the object's geometry and material. It is a common practice to neutralize magnetic signatures periodically after certain time intervals, however there is a growing interest to develop real time degaussing systems for various applications. Development of real time degaussing system is a challenging problem because of magnetic hysteresis and difficulties in measurement or estimation of near-field flux data. The goal of this research is to develop a real time feedback control system that can be used to minimize magnetic signatures for ferrite structures. Experimental work on controlling the magnetic signature of a cylindrical steel shell structure with a magnetic disturbance provided evidence that the control process substantially increased the interior magnetic flux. This means near field estimation using interior sensor data is likely to be inaccurate. Follow up numerical work for rectangular and cylindrical cross sections investigated variations in shell wall flux density under a variety of ambient excitation and applied disturbances. Results showed magnetic disturbances could corrupt interior sensor data and magnetic shielding due to the shell walls makes the interior very sensitive to noise. The magnetic flux inside the shell wall showed little variation due to inner disturbances and its high base value makes it less susceptible to noise. This research proceeds to describe a nonlinear controller to use the shell wall data as an input. A nonlinear plant model of magnetics is developed using a constant tau to represent domain rotation lag and a gain function k to describe the magnetic hysteresis curve for the shell wall. The model is justified by producing hysteresis curves for multiple materials, matching experimental data using a particle swarm algorithm, and
The Winter 2012 (vol. 14 no. 3) issue of the Nexus Network Journal features seven original papers dedicated to the theme “Digital Fabrication”. Digital fabrication is changing architecture in fundamental ways in every phase, from concept to artifact. Projects growing out of research in digital fabrication are dependent on software that is entirely surface-oriented in its underlying mathematics. Decisions made during design, prototyping, fabrication and assembly rely on codes, scripts, parameters, operating systems and software, creating the need for teams with multidisciplinary expertise and different skills, from IT to architecture, design, material engineering, and mathematics, among others The papers grew out of a Lisbon symposium hosted by the ISCTE-Instituto Universitario de Lisboa entitled “Digital Fabrication – A State of the Art”. The issue is completed with four other research papers which address different mathematical instruments applied to architecture, including geometric tracing system...
Rashidi, S.; Fallah, A.; Towhidkhah, F.
Signature is a long trained motor skill resulting in well combination of segments like strokes and loops. It is a physical manifestation of complex motor processes. The problem, generally stated, is that how relative simplicity in behavior emerges from considerable complexity of perception-action system that produces behavior within an infinitely variable biomechanical and environmental context. To solve this problem, we present evidences which indicate that motor control dynamic in signing process is a chaotic process. This chaotic dynamic may explain a richer array of time series behavior in motor skill of signature. Nonlinear analysis is a powerful approach and suitable tool which seeks for characterizing dynamical systems through concepts such as fractal dimension and Lyapunov exponent. As a result, they can be analyzed in both horizontal and vertical for time series of position and velocity. We observed from the results that noninteger values for the correlation dimension indicates low dimensional deterministic dynamics. This result could be confirmed by using surrogate data tests. We have also used time series to calculate the largest Lyapunov exponent and obtain a positive value. These results constitute significant evidence that signature data are outcome of chaos in a nonlinear dynamical system of motor control.
May, G. A.; Petersen, G. W.
Airborne multispectral scanner data covering the wavelength interval from 0.40-2.60 microns were collected at an altitude of 1000 m above the terrain in southeastern Pennsylvania. Uniform training areas were selected within three sites from this flightline. Soil samples were collected from each site and a procedure developed to allow assignment of scan line and element number from the multispectral scanner data to each sampling location. These soil samples were analyzed on a spectrophotometer and laboratory spectral signatures were derived. After correcting for solar radiation and atmospheric attenuation, the laboratory signatures were compared to the spectral signatures derived from these same soils using multispectral scanner data. Both signatures were used in supervised and unsupervised classification routines. Computer-generated maps using the laboratory and multispectral scanner derived signatures resulted in maps that were similar to maps resulting from field surveys. Approximately 90% agreement was obtained between classification maps produced using multispectral scanner derived signatures and laboratory derived signatures.
I Ketut Gede Darma Putra
Full Text Available Signature verification system is to match the tested signature with a claimed signature. This paper proposes time series based for feature extraction method and dynamic time warping for match method. The system made by process of testing 900 signatures belong to 50 participants, 3 signatures for reference and 5 signatures from original user, simple imposters and trained imposters for signatures test. The final result system was tested with 50 participants with 3 references. This test obtained that system accuracy without imposters is 90,44897959% at threshold 44 with rejection errors (FNMR is 5,2% and acceptance errors (FMR is 4,35102%, when with imposters system accuracy is 80,1361% at threshold 27 with error rejection (FNMR is 15,6% and acceptance errors (average FMR is 4,263946%, with details as follows: acceptance errors is 0,391837%, acceptance errors simple imposters is 3,2% and acceptance errors trained imposters is 9,2%.
Full Text Available Previous studies have shown that a cardiac signature of emotionality (referred to as EK, which can be computed from the standard 12 lead electrocardiogram, ECG, predicts inter-individual differences in the tendency to experience and express positive emotion. Here, we investigated whether EK values can be transiently modulated during stimulation with participant-selected music pieces and film scenes that elicit strongly positive emotion.The phenomenon of aesthetic chills, as indicated by measurable piloerection on the forearm, was used to accurately locate moments of peak emotional responses during stimulation. From 58 healthy participants, continuous EK values, heart rate, and respiratory frequency were recorded during stimulation with film scenes and music pieces, and were related to the aesthetic chills. EK values, as well as heart rate, increased significantly during moments of peak positive emotion accompanied by piloerection.These results are the first to provide evidence for an influence of momentary psychological state on a cardiac signature of emotional personality (as reflected in EK values. The possibility to modulate ECG amplitude signatures via stimulation with emotionally significant music pieces and film scenes opens up new perspectives for the use of emotional peak experiences in the therapy of disorders characterized by flattened emotionality, such as depression or schizoid personality disorder.
Sumpf, Maria; Jentschke, Sebastian; Koelsch, Stefan
Previous studies have shown that a cardiac signature of emotionality (referred to as EK, which can be computed from the standard 12 lead electrocardiogram, ECG), predicts inter-individual differences in the tendency to experience and express positive emotion. Here, we investigated whether EK values can be transiently modulated during stimulation with participant-selected music pieces and film scenes that elicit strongly positive emotion. The phenomenon of aesthetic chills, as indicated by measurable piloerection on the forearm, was used to accurately locate moments of peak emotional responses during stimulation. From 58 healthy participants, continuous EK values, heart rate, and respiratory frequency were recorded during stimulation with film scenes and music pieces, and were related to the aesthetic chills. EK values, as well as heart rate, increased significantly during moments of peak positive emotion accompanied by piloerection. These results are the first to provide evidence for an influence of momentary psychological state on a cardiac signature of emotional personality (as reflected in EK values). The possibility to modulate ECG amplitude signatures via stimulation with emotionally significant music pieces and film scenes opens up new perspectives for the use of emotional peak experiences in the therapy of disorders characterized by flattened emotionality, such as depression or schizoid personality disorder.
Vallejo Herrera, Oscar Gabriel
Esta tesis de Maestría analiza la eficacia de las campañas de marketing digital en el sector de cuidado personal en el periodo 2013 – 2014. El resultado de este trabajo es un análisis entre el marketing digital versus el tradicional, una revisión de la evolución del marketing, un manual de medios en el cuál se recopilan las características más importantes de las ocho redes sociales más utilizadas en el país y el mundo, una metodología que permite evaluar campañas de marketing digital para que...
Discusses digital collections and digital libraries. Topics include broadband availability; digital rights protection; content, both non-profit and commercial; digitization of cultural content; sustainability; metadata harvesting protocol; infrastructure; authorship; linking multiple resources; data mining; digitization of reference works;…
Cardina, Bruno; Francisco, Jerónimo; Reis, Pedro; trad. Silva, Fátima
This article focuses on the generational gaps in school learning. Initially, we have tried to provide the framework in relation to the term digital native in order to understand the key aspects of the generation born after the advent and the global use of the Internet. They were found to be “multitasking” people, linked to technology and connectivity, as opposed to digital immigrants, born in an earlier period and seeking to adapt to the technological world. We also present some r...
Jeroen J A van Boxtel
Full Text Available The ability to find and evade fighting persons in a crowd is potentially life-saving. To investigate how the visual system processes threatening actions, we employed a visual search paradigm with threatening boxer targets among emotionally-neutral walker distractors, and vice versa. We found that a boxer popped out for both intact and scrambled actions, whereas walkers did not. A reverse correlation analysis revealed that observers' responses clustered around the time of the "punch", a signature movement of boxing actions, but not around specific movements of the walker. These findings support the existence of a detector for signature movements in action perception. This detector helps in rapidly detecting aggressive behavior in a crowd, potentially through an expedited (subcortical threat-detection mechanism.
Nissenbaum, O. V.; Ponomarov, K. Y.; Zaharov, A. A.
This article proposes a three-side cryptographic scheme for verifying device attributes with a Supervisor and a Certification Authority (CA) for attribute-based encryption. Two options are suggested: using a message authentication code and using a digital signature. The first version is suitable for networks with one CA, and the second one for networks with several CAs, including dynamic systems. Also, the addition of this scheme with a blind signature is proposed to preserve the confidentiality of the device attributes from the CA. The introduction gives a definition and a brief historical overview of attribute-based encryption (ABE), addresses the use of ABE in the Internet of Things.
Full Text Available Although computer makes human activities faster and easier, innovating and creating new forms of work and other kinds of activities, it also influenced the criminal activity. The development of information technology directly affects the development of computer forensics without which, it can not even imagine the discovering and proving the computer offences and apprehending the perpetrator. Information technology and computer forensic allows us to detect and prove the crimes committed by computer and capture the perpetrators. Computer forensics is a type of forensics which can be defined as a process of collecting, preserving, analyzing and presenting digital evidence in court proceedings. Bearing in mind, that combat against crime, in which computers appear as an asset or object of the offense, requires knowledge of digital evidence as well as specific rules and procedures, the author in this article specifically addresses the issues of digital evidence, forensic (computer investigation, specific rules and procedures for detecting, fixing and collecting digital evidence and use of this type of evidence in criminal proceedings. The author also delas with international standards regarding digital evidence and cyber-space investigation.
Full Text Available The huge amount of multimedia contents available on the World-Wide-Web is beginning to raise the question of their protection. Digital watermarking is a technique which can serve various purposes, including intellectual property protection, authentication and integrity verification, as well as visible or invisible content labelling of multimedia content. Due to the diversity of digital watermarking applicability, there are many different techniques, which can be categorised according to different criteria. A digital watermark can be categorised as visible or invisible and as robust or fragile. In contrast to the visible watermark where a visible pattern or image is embedded into the original image, the invisible watermark does not change the visual appearance of the image. The existence of such a watermark can be determined only through a watermark ex¬traction or detection algorithm. The robust watermark is used for copyright protection, while the fragile watermark is designed for authentication and integrity verification of multimedia content. A watermark must be detectable or extractable to be useful. In some watermarking schemes, a watermark can be extracted in its exact form, in other cases, we can detect only whether a specific given watermarking signal is present in an image. Digital libraries, through which cultural institutions will make multimedia contents available, should support a wide range of service models for intellectual property protection, where digital watermarking may play an important role.
Price, Mark; Woytowich, Jason; Carlson, Marc
... and mechanical enclosures that better conform to body-worn computing requirements and also have relatively low power requirements. The reduction of the size and weight of batteries needed will lengthen mission profiles and also improve body-worn requirements.
Each project used a different software, however, and this proved costly in terms of ... development and evaluation of PDACT, a Palm TM pilot interviewing system ... IWRA/IDRC webinar on climate change and adaptive water management.
Articles de revue. Handheld computers for survey and trial data collection in resource-poor settings : development and evaluation of PDACT, a Palm TM pilot interviewing system ... L'Initiative des conseils subventionnaires de la recherche scientifique en Afrique subsaharienne remporte le prix de la diplomatie scientifique.
McDowell, R.S.; Sharpe, S.W.; Kelly, J.F.
PNL's capabilities for infrared and near-infrared spectroscopy include tunable-diode-laser (TDL) systems covering 300--3,000 cm -1 at 2 laser. PNL also has a beam expansion source with a 12-cm slit, which provides a 3-m effective path for gases at ∼10 K, giving a Doppler width of typically 10 MHz; and long-path static gas cells (to 100 m). In applying this equipment to signatures work, the authors emphasize the importance of high spectral resolution for detecting and identifying atmospheric interferences; for identifying the optimum analytical frequencies; for deriving, by spectroscopic analysis, the molecular parameters needed for modeling; and for obtaining data on species and/or bands that are not in existing databases. As an example of such spectroscopy, the authors have assigned and analyzed the C-Cl stretching region of CCl 4 at 770--800 cm -1 . This is an important potential signature species whose IR absorption has remained puzzling because of the natural isotopic mix, extensive hot-band structure, and a Fermi resonance involving a nearby combination band. Instrument development projects include the IR sniffer, a small high-sensitivity, high-discrimination (Doppler-limited) device for fence-line or downwind monitoring that is effective even in regions of atmospheric absorption; preliminary work has achieved sensitivities at the low-ppb level. Other work covers trace species detection with TDLs, and FM-modulated CO 2 laser LIDAR. The authors are planning a field experiment to interrogate the Hanford tank farm for signature species from Rattlesnake Mountain, a standoff of ca. 15 km, to be accompanied by simultaneous ground-truthing at the tanks
Saad M. Darwish
Full Text Available The signature of a person is one of the most popular and legally accepted behavioral biometrics that provides a secure means for verification and personal identification in many applications such as financial, commercial and legal transactions. The objective of the signature verification system is to classify between genuine and forged signatures that are often associated with intrapersonal and interpersonal variability. Unlike other languages, Arabic has unique features; it contains diacritics, ligatures, and overlapping. Because of lacking any form of dynamic information during the Arabic signature’s writing process, it will be more difficult to obtain higher verification accuracy. This paper addresses the above difficulty by introducing a novel offline Arabic signature verification algorithm. The key point is using multiple feature fusion with fuzzy modeling to capture different aspects of a signature individually in order to improve the verification accuracy. State-of-the-art techniques adopt the fuzzy set to describe the properties of the extracted features to handle a signature’s uncertainty; this work also employs the fuzzy variables to describe the degree of similarity of the signature’s features to deal with the ambiguity of questioned document examiner judgment of signature similarity. It is concluded from the experimental results that the verification system performs well and has the ability to reduce both False Acceptance Rate (FAR and False Rejection Rate (FRR.
Petersson Brooks, Eva; Brooks, Anthony Lewis
This paper reports on a study exploring the outcomes from children’s play with technology in early childhood learning practices. The paper addresses questions related to how digital technology can foster creativity in early childhood learning environments. It consists of an analysis of children......’s interaction with the KidSmart furniture focusing on digital creativity potentials and play values suggested by the technology. The study applied a qualitative approach and included125 children (aged three to five), 10 pedagogues, and two librarians. The results suggests that educators should sensitively...... consider intervening when children are interacting with technology, and rather put emphasize into the integration of the technology into the environment and to the curriculum in order to shape playful structures for children’s digital creativity....
Rath, M.; Lissner, J.; Rienmueller, R.; Haendle, J.; Siemens A.G., Erlangen
Using a prototype of an electronic, universal examination unit equipped with a special X-ray TV installation, spotfilm exposures and digital angiographies with high spatial resolution and wide-range contrast could be made in the clinic for the first time. With transvenous contrast medium injection, the clinical results of digital angiography show excellent image quality in the region of the carotids and renal arteries as well as the arteries of the extremities. The electronic series exposures have an image quality almost comparable to the quality obtained with cutfilm changers in conventional angiography. There are certain limitations due to the input field of 25 cm X-ray image intensified used. In respect of the digital angiography imaging technique, the electronic universal unit is fully suitable for clinical application. (orig.) [de
Gherghina, Cǎtǎlina; Bacivarov, Angelica; Bacivarov, Ioan C.; Petricǎ, Gabriel
Dependability of electronic circuits can be ensured only through testing of circuit modules. This is done by generating test vectors and their application to the circuit. Testability should be viewed as a concerted effort to ensure maximum efficiency throughout the product life cycle, from conception and design stage, through production to repairs during products operating. In this paper, is presented the platform developed by authors for training for testability in electronics, in general and in using signature analysis method, in particular. The platform allows highlighting the two approaches in the field namely analog and digital signature of circuits. As a part of this e-learning platform, it has been developed a database for signatures of different electronic components meant to put into the spotlight different techniques implying fault detection, and from this there were also self-repairing techniques of the systems with this kind of components. An approach for realizing self-testing circuits based on MATLAB environment and using signature analysis method is proposed. This paper analyses the benefits of signature analysis method and simulates signature analyzer performance based on the use of pseudo-random sequences, too.
Amer, H.H.; Zekry, A.A.; Elaraby, S.; Ghareeb, K.E.
This paper aims to design a system for automating inspection of the printed circuit boards (PCBs) by using the thermal signature of the different integrated circuits (I.C). The proposed inspection system consists of the inspection circuit, data acquisition system (DAS) and personal computer. Inspection is done by comparing the thermal signature of normally operated circuit with the thermal signature of circuit under test. One thermistor is assigned to each component in the circuit. The thermistor must touch tightly the surface of the I.C. to sense its temperature during the inspection process. Matlab software is used to represent the thermal signature through different colors. The Turbo C software is used to develop a program for acquiring and comparing the thermal signature of the circuit under the test with the reference circuit. If the colors of the two thermal signatures for the same I.C. are same then the circuit under test is fault free and does not contain any defect. On the other side, if the colors of the two thermal signatures for the same I.C. are different then the circuit under test is defective
Photogrammetry is the use of photography for surveying primarily and is used for the production of maps from aerial photographs. Along with remote sensing, it represents the primary means of generating data for Geographic Information Systems (GIS). As technology develops, it is becoming easier to gain access to it. The cost of digital photogrammetric workstations are falling quickly and these new tools are therefore becoming accessible to more and more users. Digital Photogrammetry is particularly useful as a text for graduate students in geomantic and is also suitable for people with a good basic scientific knowledge who need to understand photogrammetry, and who wish to use the book as a reference.
Jerry Wind; Vijay Mahajan
The digital revolution has shaken marketing to its core with consumers being offered greater price transparency and often even the chance to dictate the price. What does pricing mean in a world in which customers propose their own prices (as at priceline.com) or buyers and sellers haggle independently in auctions (as at e-Bay)? The most significant changes in the digital marketing show the emergence of 'cyber consumers', the cyber business-to-business world and the changing reality of an incr...
Baiyere, Abayomi; Grover, Varun; Gupta, Alok
Interest in using digital before existing research concepts seem to be on the rise in the IS field. This panel is positioned to explore what value lies in labelling our research as digital “x” as opposed to the well established IT “x” (where “x” can be strategy, infrastructure, innovation, artifa...... between this stream of research and existing research. Central among the expected output of the panel is the advancement of suggestions for future research and the critical pitfalls to avoid in doing so....
System One, a digital radiography system, incorporates a reusable image medium (RIM) which retains an image. No film is needed; the RIM is read with a laser scanner, and the information is used to produce a digital image on an image processor. The image is stored on an optical disc. System allows the radiologist to "dial away" unwanted images to compare views on three screens. It is compatible with existing equipment and cost efficient. It was commercialized by a Stanford researcher from energy selective technology developed under a NASA grant.
Hamming, Richard W
Digital signals occur in an increasing number of applications: in telephone communications; in radio, television, and stereo sound systems; and in spacecraft transmissions, to name just a few. This introductory text examines digital filtering, the processes of smoothing, predicting, differentiating, integrating, and separating signals, as well as the removal of noise from a signal. The processes bear particular relevance to computer applications, one of the focuses of this book.Readers will find Hamming's analysis accessible and engaging, in recognition of the fact that many people with the s
Yohannes Kamadi; Soekarno.
The electrical voltage measuring equipment with digital display has been made. This equipment uses four digits display with single polarity measurement and integrating system. Pulses from the oscillator will be counted and converted to the staircase voltages, and compared to the voltage measured. When the balance is already achieved, the pulse will appear at the comparator circuit. This pulse will be used to trigger univibrator circuit. The univibrator output is used as signal for stopping the counting, and when reading time T already stops, the counting system will be reset. (authors)
""Digital Communications"" presents the theory and application of the philosophy of Digital Communication systems in a unique but lucid form. This book inserts equal importance to the theory and application aspect of the subject whereby the authors selected a wide class of problems. The Salient features of the book are: the foundation of Fourier series, Transform and wavelets are introduces in a unique way but in lucid language; the application area is rich and resemblance to the present trend of research, as we are attached with those areas professionally; a CD is included which contains code
Antonijević, Smiljana; Stern Cahoy, Ellysa
This paper presents findings of a Mellon Foundation–funded study conducted at Penn State University at University Park during Fall 2012 that explored scholars’ information practices across disciplines encompassing the sciences, humanities, and social sciences. Drawing on results of the Web......-based survey and ethnographic interviews, we present findings related to academics’ practices in discovering, storing, citing, and archiving information, as well as their views on the role of library in the digital age. The paper harvests a comparative multidisciplinary perspective of our study, identifying...... principles and technical architecture that support digital scholarship and facilitate the development of literacies for faculty personal information management....
Shakiban, Cheri; Lloyd, Peter
In this paper we describe the Euclidean signature curves for two dimensional closed curves in the plane and their generalization to closed space curves. The focus will be on discrete numerical methods for approximating such curves. Further we will apply these numerical methods to plot the signature curves related to three-dimensional simulated DNA supercoils. Our primary focus will be on statistical analysis of the data generated for the signature curves of the supercoils. We will try to esta...
Uzunay, Yusuf; Incebacak, Davut; Bicakci, Kemal
How to Capture and Preserve Digital Evidence Securely? For the investigation and prosecution of criminal activities that involve computers, digital evidence collected in the crime scene has a vital importance. On one side, it is a very challenging task for forensics professionals to collect them without any loss or damage. On the other, there is the second problem of providing the integrity and authenticity in order to achieve legal acceptance in a court of law. By conceiving digital evidence simply as one instance of digital data, it is evident that modern cryptography offers elegant solutions for this second problem. However, to our knowledge, there is not any previous work proposing a systematic model having a holistic view to address all the related security problems in this particular case of digital evidence verification. In this paper, we present PKIDEV (Public Key Infrastructure based Digital Evidence Verification model) as an integrated solution to provide security for the process of capturing and preserving digital evidence. PKIDEV employs, inter alia, cryptographic techniques like digital signatures and secure time-stamping as well as latest technologies such as GPS and EDGE. In our study, we also identify the problems public-key cryptography brings when it is applied to the verification of digital evidence.
Federal Laboratory Consortium — The Institute of Geophysics, Planetary Physics, and Signatures at Los Alamos National Laboratory is committed to promoting and supporting high quality, cutting-edge...
Full Text Available Abstract Background Molecular signatures are sets of genes, proteins, genetic variants or other variables that can be used as markers for a particular phenotype. Reliable signature discovery methods could yield valuable insight into cell biology and mechanisms of human disease. However, it is currently not clear how to control error rates such as the false discovery rate (FDR in signature discovery. Moreover, signatures for cancer gene expression have been shown to be unstable, that is, difficult to replicate in independent studies, casting doubts on their reliability. Results We demonstrate that with modern prediction methods, signatures that yield accurate predictions may still have a high FDR. Further, we show that even signatures with low FDR may fail to replicate in independent studies due to limited statistical power. Thus, neither stability nor predictive accuracy are relevant when FDR control is the primary goal. We therefore develop a general statistical hypothesis testing framework that for the first time provides FDR control for signature discovery. Our method is demonstrated to be correct in simulation studies. When applied to five cancer data sets, the method was able to discover molecular signatures with 5% FDR in three cases, while two data sets yielded no significant findings. Conclusion Our approach enables reliable discovery of molecular signatures from genome-wide data with current sample sizes. The statistical framework developed herein is potentially applicable to a wide range of prediction problems in bioinformatics.
Two measuring stations have been established the purpose being to collect comprehensive databases of thermal signatures of background elements in addition to the prevailing meteorological conditions...
Li Hui-Ran; Luo Ming-Xing; Peng Dai-Yuan; Wang Xiao-Jun
Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks . (paper)
This presentation outlines the purpose and work of the newly appointed Digital Projects Librarian at the University of Auckland. It gives a brief overview of what digitisation is, the benefits, the stages of a digitisation project and also samples of interesting international digitisation projects and new University of Auckland Library Digitisation projects.
Harron, Jason; Langdon, John; Gonzalez, Jennifer; Cater, Scott
The term forensic science may evoke thoughts of blood-spatter analysis, DNA testing, and identifying molds, spores, and larvae. A growing part of this field, however, is that of digital forensics, involving techniques with clear connections to math and physics. This article describes a five-part project involving smartphones and the investigation…
Rosenstand, Claus Andreas Foss
det digitale domæne ud over det niveau, der kendetegner den nuværende debat, så præsenteres der ny viden om digital disruption. Som noget nyt udlægges Clayton Christens teori om disruptiv innovation med et særligt fokus på små organisationers mulighed for eksponentiel vækst. Specielt udfoldes...... forholdet mellem disruption og den stadig accelererende digitale udvikling i konturerne til ny teoridannelse om digital disruption. Bogens undertitel ”faretruende og fascinerende forandringer” peger på, at der er behov for en nuanceret debat om digital disruption i modsætning til den tone, der er slået an i...... videre kalder et ”disruption-råd”. Faktisk er rådet skrevet ind i 2016 regeringsgrundlaget for VLK-regeringen. Disruption af organisationer er ikke et nyt fænomen; men hastigheden, hvormed det sker, er stadig accelererende. Årsagen er den globale mega-trend: Digitalisering. Og derfor er specielt digital...
Wink, Diane M
In this bimonthly series, the author examines how nurse educators can use the Internet and Web-based computer technologies such as search, communication, and collaborative writing tools; social networking and social bookmarking sites; virtual worlds; and Web-based teaching and learning programs. This article describes digital books.
Remmen, Arne; Larsen, Torben; Mosgaard, Mette
Større effektivitet, bedre service og mere demokrai er blot nogle af forventningerne til indførelse af digital forveltning i kommunerne. Kapitlet giver bland andet svar på spørgsmålene : Hvordan lever kommunerne op hertil i dagligdagen? hvilke virkemidler anvender de? Hvilke barrierer har der været...
In Digital Methods, Richard Rogers proposes a methodological outlook for social and cultural scholarly research on the Web that seeks to move Internet research beyond the study of online culture. It is not a toolkit for Internet research, or operating instructions for a software package; it deals
Elena Lyudvigovna Iakovleva
Full Text Available Objective to identify the key risks of the digital economy development. Methods abstractlogical and dialectical methods. Results a modern individual cannot imagine their life without digital devices which facilitate their functioning and enable them to be included into the virtual space. The role of digital economy in the changes in all spheres of human life is analyzed in the article. With the growing role of the digital economy the approaches to business models formation are changing as well as the role of digital assets. This also leads to the transformation of human behavior the new risks of the digital economy accelerated development. In this regard the article characterizes an individual as a digital nomad defines the features of their behavior in the socioeconomic environment and highlights the main risks that arise in connection with digital nomadism. It is determined that one of the most characteristic features of a modern person is hypermobility eparkourism. In addition the paper describes the problems of anonymity in virtual space and the emergence of systems that provide anonymity of the individual as well as the risks arising in connection with that. The problem of lack of culture and value systems in the virtual space is highlighted as well the problem of developing contradictions in information leading to the alienation of people from the real world. It was determined that the informatization of economy on the one hand leads to faster business processes reduced transaction costs saving of variable costs due to robotization of production and on the other hand it leads to the transformation of competition growth of tension in society in connection with the job cuts. Another problem is personal and national security associated with the development of social networks the developers of which are other countries and also with the emergence of mechanisms of influence on mass consciousness. Scientific novelty it is shown that the risks
A digital profile is the sum content about a person on the Internet. A digital profile can be composed of personal or professional information shared on public Web sites posted personally or by others. One of the most effective ways to build a positive professional digital profile is through social media. It is increasingly important to maintain a positive digital profile as others mine the Internet to find out about a professional prior to meeting him or her. As the digital environment continues to grow, it will become increasingly difficult to neglect a professional digital profile without potential negative consequences. There are many benefits to creating a digital presence and using the tools available to learn about neurology and interact with other professionals and patients in ways that were not possible in the past. The spread of social media to a large part of the population makes it unlikely to go away.
Munar, Ana Maria; Ooi, Can-Seng
) and netnography (Kozinets, 2002). The social media platform analysed is TripAdvisor, which is the largest networking site focusing on tourism and travel. Study findings indicate that while heritage sites tend to promote their uniqueness and the cultural value of their products, tourists are just as concerned...... about sensory impressions, imagination, practical issues and personal comfort in the immediate moment as they are about historical and cultural details. Social media provide the technological tools and platforms to communicate and share tourism imaginations, feelings and practical tips. The analysis......The evolution of the Web and the expansion of social media are transforming our heritage experiences. Social media offer an innovative element to personal travel reflections by providing digital global platforms on which tourists can create and publish their travel stories. Social media transform...
van Deursen, Alexander Johannes Aloysius Maria; Helsper, Ellen; Eynon, Rebecca; van Dijk, Johannes A.G.M.
Through a survey with a representative sample of Dutch Internet users, this paper examines (1) compound digital exclusion, that is, whether a person who lacks a particular type of digital skill also lacks another kind of skill; whether a person who does not engage in a particular way with the
Minafra, Luigi; Bravatà, Valentina; Cammarata, Francesco P; Russo, Giorgio; Gilardi, Maria C; Forte, Giusi I
In breast cancer (BC) care, radiation therapy (RT) is an efficient treatment to control localized tumor. Radiobiological research is needed to understand molecular differences that affect radiosensitivity of different tumor subtypes and the response variability. The aim of this study was to analyze gene expression profiling (GEP) in primary BC cells following irradiation with doses of 9 Gy and 23 Gy delivered by intraoperative electron radiation therapy (IOERT) in order to define gene signatures of response to high doses of ionizing radiation. We performed GEP by cDNA microarrays and evaluated cell survival after IOERT treatment in primary BC cell cultures. Real-time quantitative reverse transcription polymerase chain reaction (qRT-PCR) was performed to validate candidate genes. We showed, for the first time, a 4-gene and a 6-gene signature, as new molecular biomarkers, in two primary BC cell cultures after exposure at 9 Gy and 23 Gy respectively, for which we observed a significantly high survival rate. Gene signatures activated by different doses of ionizing radiation may predict response to RT and contribute to defining a personalized biological-driven treatment plan. Copyright© 2018, International Institute of Anticancer Research (Dr. George J. Delinasios), All rights reserved.
Full Text Available This paper presents the results of time (autocorrelation and time-frequency (spectrogram analyses of radar signals returned from the moving human targets. When a radar signal falls on the human target which is moving toward or away from the radar, the signals reflected from different parts of his body produce a Doppler shift that is proportional to the velocity of those parts. Moving parts of the body causes the characteristic Doppler signature. The main contribution comes from the torso which causes the central Doppler frequency of target. The motion of arms and legs induces modulation on the returned radar signal and generates sidebands around the central Doppler frequency, referred to as micro-Doppler signatures. Through analyses on experimental data it was demonstrated that the human motion signature extraction is better using spectrogram. While the central Doppler frequency can be determined using the autocorrelation and the spectrogram, the extraction of the fundamental cadence frequency using the autocorrelation is unreliable when the target is in the clutter presence. It was shown that the fundamental cadence frequency increases with increasing dynamic movement of people and simultaneously the possibility of its extraction is proportional to the degree of synchronization movements of persons in the group.
... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Signature/record linking. 11.70 Section 11.70 Food... RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.70 Signature/record linking. Electronic signatures and handwritten signatures executed to electronic records shall be linked to their respective...
Finnemann, Niels Ole
This article discusses digital humanities and the growing diversity of digital media, digital materials and digital methods. The first section describes the humanities computing tradition formed around the interpretation of computation as a rule-based process connected to a concept of digital...... materials centred on the digitisation of non-digital, finite works, corpora and oeuvres. The second section discusses “the big tent” of contemporary digital humanities. It is argued that there can be no unifying interpretation of digital humanities above the level of studying digital materials with the help...... of software-supported methods. This is so, in part, because of the complexity of the world and, in part, because digital media remain open to the projection of new epistemologies onto the functional architecture of these media. The third section discusses the heterogeneous character of digital materials...
Computer Security Team
The Open Days are here!! From tomorrow onwards, we will be welcoming thousands of people to CERN. No barriers, no boundaries! For decades, we have welcomed researchers and visitors from around the world to work at CERN, discuss physics research and attend our training sessions, lectures and conferences. This is how fundamental research should be conducted!!! But have you ever noticed how you are welcome at CERN in the digital world, too? Once you are affiliated and are registered with CERN, you receive a CERN computing account and e-mail address. You can register your laptops, PCs and smartphones to use our (wireless) network, you can easily create your personal webpage, and profit from a vast disk space for file storage (AFS and DFS). CERN is indeed an Open Campus and not only during the Open Days. CERN is an Open Campus in the digital world. This digital Open Campus culture is exactly the reason why “computer security” has been dele...
... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Signature. 908.16 Section 908.16 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) NATIONAL OCEANIC... SUBMITTING REPORTS ON WEATHER MODIFICATION ACTIVITIES § 908.16 Signature. All reports filed with the National...
... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Signature. 269b.731 Section 269b.731 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM CHARGES OF UNFAIR LABOR PRACTICES General Rules § 269b.731 Signature. The original of each document filed shall be...
Kiel, Ewald; Lerche, Thomas; Kollmannsberger, Markus; Oubaid, Viktor; Weiss, Sabine
Lee S. Shulman deplores that the field of education as a profession does not have a pedagogic signature, which he characterizes as a synthesis of cognitive, practical and moral apprenticeship. In this context, the following study has three goals: 1) In the first theoretical part, the basic problems of constructing a pedagogic signature are…
The last decade has seen an increase in the awareness of the infrared signature of naval ships. New ship designs show that infrared signature reduction measures are being incorporated, such as exhaust gas cooling systems, relocation of the exhausts and surface cooling systems. Hull and
Earls Larrison, Tara; Korr, Wynne S.
This article contributes to discourse on signature pedagogy by reconceptualizing how our pedagogies are understood and defined for social work education. We critique the view that field education is social work's signature pedagogy and consider what pedagogies are distinct about the teaching and learning of social work. Using Shulman's…
... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Contractor's signature. 4.102 Section 4.102 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Contract Execution 4.102 Contractor's signature. (a) Individuals. A contract with an...
Lindgren, Marcus; Richey, Emma
Med tankar från pedagogen Montessori och filosoferna Platon och Baudrillard har detta arbete behandlat frågor om datorn och dess betydelse för en grafiker. Frågeställningen formulerades efter hand och lydde tillslut: ”Hur kan materia te sig i digital form?” Forskningen resulterade i en hypotes för hur digital materia skulle födas i datorn: genom att blanda två uppsättningar av data, såsom två genuppsättningar tillsammans skapar en ny organism. Under produktionen utvecklades därmed en metod fö...
Redazione Reti Medievali (a cura di
Full Text Available Bibliotheca Latinitatis Mediaevalis (circa VII sec. - XIV sec. IntraText Digital Library [01/06] Corpus Scriptorum Latinorum. A digital library of Latin literature by David Camden [01/06] Fonti disponibili online concernenti la vita religiosa medievale Rete Vitae Religiosae Mediaevalis Studia Conectens [01/06] Fuentes del Medievo Hispanico Instituto de Historia, Consejo Superior de Investigaciones Científicas [01/06] Latin Literature Forum Romanum [01/06] Ludovico Antonio Muratori, Dissertazioni sopra le antichità italiane, 1751 Biblioteca dei Classici Italiani di Giuseppe Bonghi [01/06] Medieval Latin The Latin Library [01/06] Médiévales Presses Universitaires de Vincennes - Revues.org [01/06] Regesta imperii Deutsche Kommission für die Bearbeitung der Regesta Imperii e.V. [01/06] Suda On Line Byzantine Lexicography [01/06
Rafael Conde Melguizo
Full Text Available Espín, Manuel (Coord.(2011 Adolescentes Digitales. Revista Estudios de Juventud, Nº 92. Marzo 2011. INJUVE, Madrid."Adolescentes digitales" se nos muestra como una obra que pretende explorar desde distintos puntos de vista la realidad de la generación conocida como “nativos digitales” (Prensky, la generación actual de adolescentes que ha crecido con internet y el mundo digital como su entorno normal de socialización.
This research is concerned with developing a new business model for flexible small scale ceramic production that exploits the customisation capabilities of digital manufacturing technologies and the market potential and global connectivity of the world wide web. It is arguably of particular relevance to regional economic development in remote areas (Amin, Tomaney, Sabel) such as Cornwall where there is a culture of high quality small scale production, limited market and manufacturing opportun...
Rowland, Mark [Alamo, CA; Gosnell, Tom B [Moraga, CA; Ham, Cheryl [Livermore, CA; Perkins, Dwight [Livermore, CA; Wong, James [Dublin, CA
A real time gamma-ray signature/source identification method and system using principal components analysis (PCA) for transforming and substantially reducing one or more comprehensive spectral libraries of nuclear materials types and configurations into a corresponding concise representation/signature(s) representing and indexing each individual predetermined spectrum in principal component (PC) space, wherein an unknown gamma-ray signature may be compared against the representative signature to find a match or at least characterize the unknown signature from among all the entries in the library with a single regression or simple projection into the PC space, so as to substantially reduce processing time and computing resources and enable real-time characterization and/or identification.
Tsung-Yen Chuang; Wei-Fan Chen
Technologies’ rapid advance in developing digital media has been extensively applied in contemporary play materials to enrich children’s play, such as electronic or computerized toys, electronic story books, television, personal computers, and game consoles. Recently, studies about digital games in these areas have begun to appear. Some educators have a vision that these games have the potential to become powerful motivating digital environments and they study digital games in order to determ...
The authors give a detailed summary about the fundamentals and the historical background of digital communication. This includes an overview of the encoding principles and algorithms of textual information, audio information, as well as images, graphics, and video in the Internet. Furthermore the fundamentals of computer networking, digital security and cryptography are covered. Thus, the book provides a well-founded access to communication technology of computer networks, the internet and the WWW. Numerous pictures and images, a subject-index and a detailed list of historical personalities in
Yin, An-An; Lu, Nan; Etcheverry, Amandine; Aubry, Marc; Barnholtz-Sloan, Jill; Zhang, Lu-Hua; Mosser, Jean; Zhang, Wei; Zhang, Xiang; Liu, Yu-He; He, Ya-Long
We aimed to identify a clinically useful biomarker using DNA methylation-based information to optimize individual treatment of patients with glioblastoma (GBM). A six-CpG panel was identified by incorporating genome-wide DNA methylation data and clinical information of three distinct discovery sets and was combined using a risk-score model. Different validation sets of GBMs and lower-grade gliomas and different statistical methods were implemented for prognostic evaluation. An integrative analysis of multidimensional TCGA data was performed to molecularly characterize different risk tumors. The six-CpG risk-score signature robustly predicted overall survival (OS) in all discovery and validation cohorts and in a treatment-independent manner. It also predicted progression-free survival (PFS) in available patients. The multimarker epigenetic signature was demonstrated as an independent prognosticator and had better performance than known molecular indicators such as glioma-CpG island methylator phenotype (G-CIMP) and proneural subtype. The defined risk subgroups were molecularly distinct; high-risk tumors were biologically more aggressive with concordant activation of proangiogenic signaling at multimolecular levels. Accordingly, we observed better OS benefits of bevacizumab-contained therapy to high-risk patients in independent sets, supporting its implication in guiding usage of antiangiogenic therapy. Finally, the six-CpG signature refined the risk classification based on G-CIMP and MGMT methylation status. The novel six-CpG signature is a robust and independent prognostic indicator for GBMs and is of promising value to improve personalized management. © 2018 John Wiley & Sons Ltd.
... signature. 804.101 Section 804.101 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS GENERAL ADMINISTRATIVE MATTERS Contract Execution 804.101 Contracting officer's signature. (a) If a... signature. ...
Full Text Available Abstract Background The use of gene signatures can potentially be of considerable value in the field of clinical diagnosis. However, gene signatures defined with different methods can be quite various even when applied the same disease and the same endpoint. Previous studies have shown that the correct selection of subsets of genes from microarray data is key for the accurate classification of disease phenotypes, and a number of methods have been proposed for the purpose. However, these methods refine the subsets by only considering each single feature, and they do not confirm the association between the genes identified in each gene signature and the phenotype of the disease. We proposed an innovative new method termed Minimize Feature's Size (MFS based on multiple level similarity analyses and association between the genes and disease for breast cancer endpoints by comparing classifier models generated from the second phase of MicroArray Quality Control (MAQC-II, trying to develop effective meta-analysis strategies to transform the MAQC-II signatures into a robust and reliable set of biomarker for clinical applications. Results We analyzed the similarity of the multiple gene signatures in an endpoint and between the two endpoints of breast cancer at probe and gene levels, the results indicate that disease-related genes can be preferably selected as the components of gene signature, and that the gene signatures for the two endpoints could be interchangeable. The minimized signatures were built at probe level by using MFS for each endpoint. By applying the approach, we generated a much smaller set of gene signature with the similar predictive power compared with those gene signatures from MAQC-II. Conclusions Our results indicate that gene signatures of both large and small sizes could perform equally well in clinical applications. Besides, consistency and biological significances can be detected among different gene signatures, reflecting the
Nguyen, Minh Nam; Choi, Tae Gyu; Nguyen, Dinh Truong; Kim, Jin-Hwan; Jo, Yong Hwa; Shahid, Muhammad; Akter, Salima; Aryal, Saurav Nath; Yoo, Ji Youn; Ahn, Yong-Joo; Cho, Kyoung Min; Lee, Ju-Seog; Choe, Wonchae; Kang, Insug; Ha, Joohun; Kim, Sung Soo
Colorectal cancer (CRC) is the third leading cause of global cancer mortality. Recent studies have proposed several gene signatures to predict CRC prognosis, but none of those have proven reliable for predicting prognosis in clinical practice yet due to poor reproducibility and molecular heterogeneity. Here, we have established a prognostic signature of 113 probe sets (CRC-113) that include potential biomarkers and reflect the biological and clinical characteristics. Robustness and accuracy were significantly validated in external data sets from 19 centers in five countries. In multivariate analysis, CRC-113 gene signature showed a stronger prognostic value for survival and disease recurrence in CRC patients than current clinicopathological risk factors and molecular alterations. We also demonstrated that the CRC-113 gene signature reflected both genetic and epigenetic molecular heterogeneity in CRC patients. Furthermore, incorporation of the CRC-113 gene signature into a clinical context and molecular markers further refined the selection of the CRC patients who might benefit from postoperative chemotherapy. Conclusively, CRC-113 gene signature provides new possibilities for improving prognostic models and personalized therapeutic strategies.
Mignani, A. G.; Ciaccheri, L.; Thienpont, H.; Ottevaere, H.; Attilio, C.; Cimato, A.
Italian extra virgin olive oils bearing labels of certified area of origin were considered. Their multispectral digital signature was measured by means of absorption spectroscopy in the 200-1700 nm spectral range. The instrumentation was a fiber optic-based, cheap, and compact device. The spectral data were processed by means of multivariate analysis and plotted on a 2D classification map. The map showed sharp clusters according to the geographical origin of the oils, thus demonstrating the potentials of UV-VIS-NIR spectroscopy for optical fingerprinting. Then, the spectral data were correlated to the content of the most important fatty acids. The good fitting achieved demonstrated that the optical fingerprinting can be used also for predicting nutritional and chemical parameters.
Full Text Available Digital signature schemes with additional properties have broad applications, such as in protecting the identity of signers allowing a signer to anonymously sign a message in a group of signers (also known as a ring. While these number-theoretic problems are still secure at the time of this research, the situation could change with advances in quantum computing. There is a pressing need to design PKC schemes that are secure against quantum attacks. In this paper, we propose a novel code-based threshold ring signature scheme with a leader-participant model. A leader is appointed, who chooses some shared parameters for other signers to participate in the signing process. This leader-participant model enhances the performance because every participant including the leader could execute the decoding algorithm (as a part of signing process upon receiving the shared parameters from the leader. The time complexity of our scheme is close to Courtois et al.’s (2001 scheme. The latter is often used as a basis to construct other types of code-based signature schemes. Moreover, as a threshold ring signature scheme, our scheme is as efficient as the normal code-based ring signature.
George S. Eskander Ekladious
Full Text Available Biometric traits, such as fingerprints, faces and signatures have been employed in bio-cryptosystems to secure cryptographic keys within digital security schemes. Reliable implementations of these systems employ error correction codes formulated as simple distance thresholds, although they may not effectively model the complex variability of behavioral biometrics like signatures. In this paper, a Global-Local Distance Metric (GLDM framework is proposed to learn cost-effective distance metrics, which reduce within-class variability and augment between-class variability, so that simple error correction thresholds of bio-cryptosystems provide high classification accuracy. First, a large number of samples from a development dataset are used to train a global distance metric that differentiates within-class from between-class samples of the population. Then, once user-specific samples are available for enrollment, the global metric is tuned to a local user-specific one. Proof-of-concept experiments on two reference offline signature databases confirm the viability of the proposed approach. Distance metrics are produced based on concise signature representations consisting of about 20 features and a single prototype. A signature-based bio-cryptosystem is designed using the produced metrics and has shown average classification error rates of about 7% and 17% for the PUCPR and the GPDS-300 databases, respectively. This level of performance is comparable to that obtained with complex state-of-the-art classifiers.
Substantial progress could be reached both in system technics and in application of digital acoustic monitoring systems for assessing mechanical integrity of reactor primary systems. For the surveillance of PWRs and BWRs during power operation of the plants, acoustic signals of Loose Parts Monitoring System sensors are continuously monitored for signal bursts associated with metallic impacts. ISTec/GRS experience with its digital systems MEDEA and RAMSES has shown that acoustic signature analysis is very successful for detecting component failures at an early stage. Methods for trending and classification of digital burst signals are shown, experience with their practical use will be presented. (author)
Full Text Available Digital library is a term for a library of the present and of the future challenging the traditional libraries. Authors are interested mostly in the digital space of Slovene academic instutions. In the research, the digital collections of most of the University of Ljubljana faculties are examined. A questionnaire was used to obtain information about the users' (students' needs and their acquaintance with the concept of the digital library. Two things were expected: the research was aimed at finding the positive effect of digital libraries on studies, and the questionnaire as an incentive in the library profession for further research. The questionnaire was made in the end of 1999 at the Faculty of Arts in Ljubljana (FF. It included 275 students of FF. The results showed that the students of librarianship had a better understanding of the term digital library than the students of other courses. A personal computer is used frequently and with pleasure by most questioned students. The term digital library is known to 71,1% of the students of librarianship, and only to 43,8% of others. Most of the students chose the correct definition of the digital library (the digital library is a collection of disparate systems and resources, accessible on the net, but that was, by the authors' opinion, mostly a lucky guess. According to the findings of the research, the authors believe that future development will improve and accelerate a wider use of digital libraries, in Slovenia as well.
Maslowska, E.; Smit, E.; van den Putte, B.; Eisend, M.; Langner, T.
Personalized communication has become a very popular marketing strategy, but the research on its effectiveness is still limited. This study examined the persuasiveness of personalized digital newsletters in terms of increased attention, cognitive activity, evaluation, attitude, intention, and
The main purpose of the POPI act is to protect the processing of personal information ... a smartphone, iPad or personal computer), digital storage devices. (iCloud, Dropbox ... (vi) Reasonable security regarding the safeguarding, integrity and.
Alliance for Excellent Education, 2014
Accomplishing personalized, deeper learning through anywhere, anytime digital learning requires a redesign of the K-12 education system. This report looks at readiness for digital learning at two levels in West Virginia: the district capacity building to ready the system for digital learning and school implementation of digital learning. The…
Mello, H.A. de.
The specifications of a digital fluorimeter. That with adequated analytical techniques permits to determine trace amounts of fluorescents materials in samples, are described. The fluorimeter is of the reflection type, and uses fluorescents lamps for the excitation and an optical system which is connected to a photomultiplyer machine and permits the measurement of the light intensity. In the case of IEN (Instituto de Engenharia Nuclear) the equipment is used for to determine the uranium content in sample materials to be exported. The precision of the instrument is about + - 1% in the scale of 0.1 which is the normally one used in the current researchs. (E.G.) [pt
Brem, Alexander; Richter, Chris; Kraus, Sascha
comprising guided interviews with 14 companies from Germany, Austria and Switzerland provides detailed insights into different aspects of the sharing economy phenomenon. Our results make a direct contribution to sharing economy research, especially regarding the new business models of start-ups. Here, we...... find a clear difference between the relevance of economic and social orientation. The latter appears to be in higher demand among customers than entrepreneurs. The increasingly digitalized environment has led to a changed living situation characterized by urbanity, openness to new solutions, changed...
Technology has been an all-important and defining element within the arts throughout the 20th century, and it has fundamentally changed the ways in which we produce and consume music. With this Focus we investigate the latest developments in the digital domain – and their pervasiveness and rapid...... production and reception of contemporary music and sound art. With ‘Digital’ we present four composers' very different answers to how technology impact their work. To Juliana Hodkinson it has become an integral part of her sonic writing. Rudiger Meyer analyses the relationships between art and design and how...
Kasimatis, Katja R; Nelson, Thomas C; Phillips, Patrick C
Sexual conflict is a specific class of intergenomic conflict that describes the reciprocal sex-specific fitness costs generated by antagonistic reproductive interactions. The potential for sexual conflict is an inherent property of having a shared genome between the sexes and, therefore, is an extreme form of an environment-dependent fitness effect. In this way, many of the predictions from environment-dependent selection can be used to formulate expected patterns of genome evolution under sexual conflict. However, the pleiotropic and transmission constraints inherent to having alleles move across sex-specific backgrounds from generation to generation further modulate the anticipated signatures of selection. We outline methods for detecting candidate sexual conflict loci both across and within populations. Additionally, we consider the ability of genome scans to identify sexually antagonistic loci by modeling allele frequency changes within males and females due to a single generation of selection. In particular, we highlight the need to integrate genotype, phenotype, and functional information to truly distinguish sexual conflict from other forms of sexual differentiation. © The American Genetic Association 2017. All rights reserved. For permissions, please e-mail: firstname.lastname@example.org.
Introduction Age is an important factor in the development of osteoarthritis. Microarray studies provide insight into cartilage aging but do not reveal the full transcriptomic phenotype of chondrocytes such as small noncoding RNAs, pseudogenes, and microRNAs. RNA-Seq is a powerful technique for the interrogation of large numbers of transcripts including nonprotein coding RNAs. The aim of the study was to characterise molecular mechanisms associated with age-related changes in gene signatures. Methods RNA for gene expression analysis using RNA-Seq and real-time PCR analysis was isolated from macroscopically normal cartilage of the metacarpophalangeal joints of eight horses; four young donors (4 years old) and four old donors (>15 years old). RNA sequence libraries were prepared following ribosomal RNA depletion and sequencing was undertaken using the Illumina HiSeq 2000 platform. Differentially expressed genes were defined using Benjamini-Hochberg false discovery rate correction with a generalised linear model likelihood ratio test (P ageing cartilage. Conclusion There was an age-related dysregulation of matrix, anabolic and catabolic cartilage factors. This study has increased our knowledge of transcriptional networks in cartilage ageing by providing a global view of the transcriptome. PMID:23971731
Decreasing the magnetic field signature of a naval vessel will reduce its susceptibility to detonating naval influence mines and the probability of a submarine being detected by underwater barriers and maritime patrol aircraft. Both passive and active techniques for reducing the magnetic signatures produced by a vessel's ferromagnetism, roll-induced eddy currents, corrosion-related sources, and stray fields are presented. Mathematical models of simple hull shapes are used to predict the levels of signature reduction that might be achieved through the use of alternate construction materials. Al
Borup, R.; Rossing, M.; Henao, Ricardo
The molecular pathways leading to thyroid follicular neoplasia are incompletely understood, and the diagnosis of follicular tumors is a clinical challenge. To provide leads to the pathogenesis and diagnosis of the tumors, we examined the global transcriptome signatures of follicular thyroid...... a mechanism for cancer progression, which is why we exploited the results in order to generate a molecular classifier that could identify 95% of all carcinomas. Validation employing public domain and cross-platform data demonstrated that the signature was robust and could diagnose follicular nodules...... and robust genetic signature for the diagnosis of FA and FC. Endocrine-Related Cancer (2010) 17 691-708...
Nielsen, Hans Jørn
overgangen fra trykkekultur til digital kultur. For det første problemstillingen omkring digitalisering af litterær kulturarv med fokus på kodning og tagging af teksten samt organisering i hypertekststrukturer. For det andet reorganiseringen af det digitale dokument i dataelementer og database. For det......Artiklen præsenterer først nogle generelle problemstillinger omkring Digital Humanities (DH) med det formål at undersøge dem nærmere i relation til konkrete eksempler på forskellige digitaliseringsmåder og ændringer i dokumentproduktion. I en nærmere afgrænsning vælger artiklen den tendens i DH......, der betragter DH som forbundet med "making" og "building" af digitale objekter og former. Dette kan også karakteriseres som DH som praktisk-produktiv vending. Artiklen har valgt tre typer af digitalisering. De er valgt ud fra, at de skal repræsentere forskellige måder at håndtere digitaliseringen på...
Since the inception of Seminar.net the phenomenon of Digital Storytelling has often been suggested as a promising genre for teaching and learning in a variety of areas. Academically, the genre has attracted interest from scholars in media studies, political science, social work, health and education. In this issue we have sought attention from a huge number of academically inclined persons who either use the genre to teach with media, for teaching and learning about media, or studying how thi...
Brushless electric motors are used in a number of underwater vehicles. When these underwater vehicles are used for mine clearance operations the magnetic signature of the brushless motors is important...
Bernatowicz, H.; Schoenig, F.C.
Typical nuclear fuel material contains tramp ferromagnetic particles of random size and distribution. Also, selected amounts of paramagnetic or ferromagnetic material can be added at random or at known positions in the fuel material. The fuel material in its non-magnetic container is scanned along its length by magnetic susceptibility detecting apparatus whereby susceptibility changes along its length are obtained and provide a unique signal waveform of the container of fuel material as a signature thereof. The output signature is stored. At subsequent times in its life the container is again scanned and respective signatures obtained which are compared with the initially obtained signature, any differences indicating alteration or tampering with the fuel material. If the fuel material includes a paramagnetic additive by taking two measurements along the container the effects thereof can be cancelled out. (author)
Li, Wei; Shi, Ronghua; Guo, Ying
Blind quantum computation allows a client without quantum abilities to interact with a quantum server to perform a unconditional secure computing protocol, while protecting client's privacy. Motivated by confidentiality of blind quantum computation, a blind quantum signature scheme is designed with laconic structure. Different from the traditional signature schemes, the signing and verifying operations are performed through measurement-based quantum computation. Inputs of blind quantum computation are securely controlled with multi-qubit entangled states. The unique signature of the transmitted message is generated by the signer without leaking information in imperfect channels. Whereas, the receiver can verify the validity of the signature using the quantum matching algorithm. The security is guaranteed by entanglement of quantum system for blind quantum computation. It provides a potential practical application for e-commerce in the cloud computing and first-generation quantum computation.
Tong, Rui Y.; Geng, Yong J.
An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.
Gomero, G.I.; Reboucas, M.J.; Teixeira, A.F.F.
If the universe has a nontrival shape (topology) the sky may show multiple correlated images of cosmic objects. These correlations can be counched in terms of distance correlations. We propose a statistical quantity which can be used to reveal the topological signature of any Roberston-Walker (RW) spacetime with nontrivial topology. We also show through computer-aided simulations how one can extract the topological signatures of flat elliptic and hyperbolic RW universes with nontrivial topology. (author)
Sridharan, Vilas; Gurumurthi, Sudhanva
A system and method for optimizing redundant output verification, are provided. A hardware-based store fingerprint buffer receives multiple instances of output from multiple instances of computation. The store fingerprint buffer generates a signature from the content included in the multiple instances of output. When a barrier is reached, the store fingerprint buffer uses the signature to verify the content is error-free.
Coley, A; McNutt, D; Musoke, N; Brooks, D; Hervik, S
We will construct explicit examples of four-dimensional neutral signature Walker (but not necessarily degenerate Kundt) spaces for which all of the polynomial scalar curvature invariants vanish. We then investigate the properties of some particular subclasses of Ricci flat spaces. We also briefly describe some four-dimensional neutral signature Einstein spaces for which all of the polynomial scalar curvature invariants are constant. (paper)
Full Text Available Background. A decision to replant is critically dependent on the condition of the amputated digit and the way it was preserved during transport. The most common error is exposing the amputated digit to very low temperatures. Preservation directly on ice, on cooling devices in portable refrigerators, or on top of packets of frozen meat often result in a frozen and therefore unusable body digit.Methods. An inquiry questionnaire on correct methods of preservation of amputated digits was conducted on a sample of 30 lay persons, 30 medical students, and 15 physicians.Three simulations of most frequently used methods of preservation of amputated digit were conducted (the correct method; directly on ice; on cooling devices of portable refrigerators. Environment temperature of the (simulated amputated digits stored was measured.In a retrospective study, hospital records of patients treated at the Clinical department of plastic surgery and burns in Ljubljana between 1998 and 2002 were examined. We determined the number of replantations performed, gender of the patients, their age, the mechanism of the injury, the success rate of the replantation, and the duration of hospitalisation. In five case described in detail, we present an inadequate treatment of the amputated digits.Results. The results of the questionnaire survey show that no less than 86.7% of lay person respondents would have treated the injuries in an incorrect way; same holds for 43.4% students of medicine, and 33.3% of practicing physicians.The temperature of the simulated amputated digit remained above 5°C throughout the simulated correct treatment. When preserved directly on ice on or coolant bodies, the temperature dropped below the freezing point and never climbed above 0°C throughout the duration of the simulation (150 minutes.Between years 1998 and 2002, Clinical department of plastic surgery and burns at the University clinical centre Ljubljana admitted 124 injured persons with
Precht, H; Gerke, O; Rosendahl, K
BACKGROUND: New developments in processing of digital radiographs (DR), including multi-frequency processing (MFP), allow optimization of image quality and radiation dose. This is particularly promising in children as they are believed to be more sensitive to ionizing radiation than adults....... OBJECTIVE: To examine whether the use of MFP software reduces the radiation dose without compromising quality at DR of the femur in 5-year-old-equivalent anthropomorphic and technical phantoms. MATERIALS AND METHODS: A total of 110 images of an anthropomorphic phantom were imaged on a DR system (Canon DR...... with CXDI-50 C detector and MLT[S] software) and analyzed by three pediatric radiologists using Visual Grading Analysis. In addition, 3,500 images taken of a technical contrast-detail phantom (CDRAD 2.0) provide an objective image-quality assessment. RESULTS: Optimal image-quality was maintained at a dose...
i det digitale domæne – udviklinger, der foregår hastigt og er gennemgribende, og som derfor kræver et nærmere blik på forholdet mellem kunsten og teknologien. Komponistens forståelse af sin metier udfordres – samtidig med at befæstede ideer om kunstværket møder modstand fra nye mediemæssige...... sammenhænge og fra forandrede distributionsformer. Dette betyder ændrede betingelser for både produktion og reception af kunstmusik og lydkunst. Med Digital tager vi udgangspunkt i fire komponisters meget forskellige bud på hvordan teknologien spiller en rolle i arbejdet. Juliana Hodkinson beskriver hvordan...
Davison, R.M.; Ou, Carol
Digitally literate employees are accustomed to having free access to digital media technologies. However, some organizations enact information technology (IT) governance structures that explicitly proscribe access to these technologies, resulting in considerable tension between employees and the
Hart, Rob; Campbell, Mark R
With the permanent habitation of the International Space Station, the planning of longer duration exploration missions, and the possibility of space tourism, it is likely that digital radiography will be needed in the future to support medical care in space. Ultrasound is currently the medical imaging modality of choice for spaceflight. Digital radiography in space is limited because of prohibitive launch costs (in the region of $20,000/kg) that severely restrict the volume, weight, and power requirements of medical care hardware. Technological increases in radiography, a predicted ten-fold decrease in future launch costs, and an increasing clinical need for definitive medical care in space will drive efforts to expand the ability to provide medical care in space including diagnostic imaging. Normal physiological responses to microgravity, in conjunction with the high-risk environment of spaceflight, increase the risk of injury and could imply an extended recovery period for common injuries. The advantages of gravity on Earth, such as the stabilization of patients undergoing radiography and the drainage of fluids, which provide radiographic contrast, are unavailable in space. This creates significant difficulties in patient immobilization and radiographic positioning. Gravity-dependent radiological signs, such as lipohemarthrosis in knee and shoulder trauma, air or fluid levels in pneumoperitoneum, pleural effusion, or bowel obstruction, and the apical pleural edge in pneumothorax become unavailable. Impaired healing processes such as delayed callus formation following fracture will have implications on imaging, and recovery time lines are unknown. The confined nature of spacecraft and the economic impossibility of launching lead-based personal protective equipment present significant challenges to crew radiation safety. A modified, free-floating radiographic C-arm device equipped with a digital detector and utilizing teleradiology support is proposed as a
Titarchuk, Lev; Laurent, Philippe
An accreting black hole is, by definition, characterized by the drain. Namely, the matter falls into a black hole much the same way as water disappears down a drain matter goes in and nothing comes out. As this can only happen in a black hole, it provides a way to see ``a black hole'', an unique observational signature. The accretion proceeds almost in a free-fall manner close to the black hole horizon, where the strong gravitational field dominates the pressure forces. In this paper we present analytical calculations and Monte-Carlo simulations of the specific features of X-ray spectra formed as a result of upscattering of the soft (disk) photons in the converging inflow (CI) into the black hole. The full relativistic treatment has been implemented to reproduce these spectra. We show that spectra in the soft state of black hole systems (BHS) can be described as the sum of a thermal (disk) component and the convolution of some fraction of this component with the CI upscattering spread (Greens) function. The latter boosted photon component is seen as an extended power-law at energies much higher than the characteristic energy of the soft photons. We demonstrate the stability of the power spectral index over a wide range of the plasma temperature 0 - 10 keV and mass accretion rates (higher than 2 in Eddington units). We also demonstrate that the sharp high energy cutoff occurs at energies of 200-400 keV which are related to the average energy of electrons mec2 impinging upon the event horizon. The spectrum is practically identical to the standard thermal Comptonization spectrum when the CI plasma temperature is getting of order of 50 keV (the typical ones for the hard state of BHS). In this case one can see the effect of the bulk motion only at high energies where there is an excess in the CI spectrum with respect to the pure thermal one. Furthermore we demonstrate that the change of spectral shapes from the soft X-ray state to the hard X-ray state is clearly to be
Federal Laboratory Consortium — To enable Digital Forensics and Computer Security research and educational opportunities across majors and departments. Lab MissionEstablish and maintain a Digital...
In recent years, there has been much debate about the concept of digital natives, in particular the differences between the digital natives' knowledge and adoption of digital technologies in informal versus formal educational contexts. This paper investigates the knowledge about educational technologies of a group of undergraduate students…
Kelly, P.M.; Cannon, T.M.
In this paper, we propose a method for calculating the similarity between two digital images. A global signature describing the texture, shape, or color content is first computed for every image stored in a database, and a normalized distance between probability density functions of feature vectors is used to match signatures. This method can be used to retrieve images from a database that are similar to an example target image. This algorithm is applied to the problem of search and retrieval for database containing pulmonary CT imagery, and experimental results are provided.
Kelly, P.; Cannon, M.
This paper presents results from the authors experience with CANDID (Comparison Algorithm for Navigating Digital Image Databases), which was designed to facilitate image retrieval by content using a query-by-example methodology. A global signature describing the texture, shape, or color content is first computed for every image stored in a database, and a normalized similarity measure between probability density functions of feature vectors is used to match signatures. This method can be used to retrieve images from a database that are similar to a user-provided example image. Results for three test applications are included.
Full Text Available INTRODUCTION: The quantification of social media impacts on societal and political events is a difficult undertaking. The Japanese Society of Oriental Medicine started a signature-collecting campaign to oppose a medical policy of the Government Revitalization Unit to exclude a traditional Japanese medicine, "Kampo," from the public insurance system. The signature count showed a series of aberrant bursts from November 26 to 29, 2009. In the same interval, the number of messages on Twitter including the keywords "Signature" and "Kampo," increased abruptly. Moreover, the number of messages on an Internet forum that discussed the policy and called for signatures showed a train of spikes. METHODS AND FINDINGS: In order to estimate the contributions of social media, we developed a statistical model with state-space modeling framework that distinguishes the contributions of multiple social media in time-series of collected public opinions. We applied the model to the time-series of signature counts of the campaign and quantified contributions of two social media, i.e., Twitter and an Internet forum, by the estimation. We found that a considerable portion (78% of the signatures was affected from either of the social media throughout the campaign and the Twitter effect (26% was smaller than the Forum effect (52% in total, although Twitter probably triggered the initial two bursts of signatures. Comparisons of the estimated profiles of the both effects suggested distinctions between the social media in terms of sustainable impact of messages or tweets. Twitter shows messages on various topics on a time-line; newer messages push out older ones. Twitter may diminish the impact of messages that are tweeted intermittently. CONCLUSIONS: The quantification of social media impacts is beneficial to better understand people's tendency and may promote developing strategies to engage public opinions effectively. Our proposed method is a promising tool to explore
Yamaguchi, Rui; Imoto, Seiya; Kami, Masahiro; Watanabe, Kenji; Miyano, Satoru; Yuji, Koichiro
The quantification of social media impacts on societal and political events is a difficult undertaking. The Japanese Society of Oriental Medicine started a signature-collecting campaign to oppose a medical policy of the Government Revitalization Unit to exclude a traditional Japanese medicine, "Kampo," from the public insurance system. The signature count showed a series of aberrant bursts from November 26 to 29, 2009. In the same interval, the number of messages on Twitter including the keywords "Signature" and "Kampo," increased abruptly. Moreover, the number of messages on an Internet forum that discussed the policy and called for signatures showed a train of spikes. In order to estimate the contributions of social media, we developed a statistical model with state-space modeling framework that distinguishes the contributions of multiple social media in time-series of collected public opinions. We applied the model to the time-series of signature counts of the campaign and quantified contributions of two social media, i.e., Twitter and an Internet forum, by the estimation. We found that a considerable portion (78%) of the signatures was affected from either of the social media throughout the campaign and the Twitter effect (26%) was smaller than the Forum effect (52%) in total, although Twitter probably triggered the initial two bursts of signatures. Comparisons of the estimated profiles of the both effects suggested distinctions between the social media in terms of sustainable impact of messages or tweets. Twitter shows messages on various topics on a time-line; newer messages push out older ones. Twitter may diminish the impact of messages that are tweeted intermittently. The quantification of social media impacts is beneficial to better understand people's tendency and may promote developing strategies to engage public opinions effectively. Our proposed method is a promising tool to explore information hidden in social phenomena.
Personality disorders are a group of mental illnesses. They involve long-term patterns of thoughts and behaviors ... serious problems with relationships and work. People with personality disorders have trouble dealing with everyday stresses and ...
... Disorders in Adults Data Sources Share Personality Disorders Definitions Personality disorders represent “an enduring pattern of inner ... MSC 9663 Bethesda, MD 20892-9663 Follow Us Facebook Twitter YouTube Google Plus NIMH Newsletter NIMH RSS ...
Bogen sætter fokus på digital produktion, som er en stærk læringsform, der faciliterer elevernes læreprocesser og kvalificerer elevernes faglige læringsresultater. Det sker når lærerne udarbejder didaktiske rammedesign, hvor eleverne arbejder selvstændigt inden for dette rammedesign, og hvor mål og...... procesevaluering stilladserer elevernes faglige proces. I digitale produktionsprocesser arbejder eleverne iterativt, de udvikler ejerskab til produktionen og fastholder selv deres læreprocesser. It’s multimodalitet, elevernes kollaborative tilgange, videndeling mellem eleverne og elevernes uformelle lege- og...... elevernes digitale produktion er lærernes didaktiske rammesætning og stilladserende tilgange. Her lægger lærerne op til, at eleverne som didaktiske designere i relation til rammesætningen skal organisere og planlægge deres læreprocesser, inddrages i målsætning, evaluering og valg af digitale ressourcer...
I al vores iver efter at få presset nogle flere digitale dimser ind i skolen, er vi i fare for at glemme hvad det er vi skal med disse dimser. Der er store forventninger til at de kan gøre det lettere at være lærer (og dermed billigere), og det kan det måske. Men der er jo også et dannelsesspørgs......I al vores iver efter at få presset nogle flere digitale dimser ind i skolen, er vi i fare for at glemme hvad det er vi skal med disse dimser. Der er store forventninger til at de kan gøre det lettere at være lærer (og dermed billigere), og det kan det måske. Men der er jo også et...... dannelsesspørgsmål knyttet til it. Hvad er egentlig digital dannelse? Og hvad betyder det for danskfaget?...
Marshall, Angus McKenzie
The vast majority of modern criminal investigations involve some element of digital evidence, from mobile phones, computers, CCTV and other devices. Digital Forensics: Digital Evidence in Criminal Investigations provides the reader with a better understanding of how digital evidence complements "traditional" scientific evidence and examines how it can be used more effectively and efficiently in a range of investigations. Taking a new approach to the topic, this book presents digital evidence as an adjunct to other types of evidence and discusses how it can be deployed effectively in s
Gerald V Denis
Full Text Available Obesity-driven Type 2 diabetes (T2D is a systemic inflammatory condition associated with cardiovascular disease. However, plasma cytokines and tissue inflammation that discriminate T2D risk in African American women with obese phenotypes are not well understood. We analyzed 64 circulating cytokines and chemokines in plasma of 120 African American women enrolled in the Black Women's Health Study. We used regression analysis to identify cytokines and chemokines associated with obesity, co-morbid T2D and hypertension, and compared results to obese women without these co-morbidities, as well as to lean women without the co-morbidities. We then used hierarchical clustering to generate inflammation signatures by combining the effects of identified cytokines and chemokines and summarized the signatures using an inflammation score. The analyses revealed six distinct signatures of sixteen cytokines/chemokines (P = 0.05 that differed significantly by prevalence of T2D (P = 0.004, obesity (P = 0.0231 and overall inflammation score (P < E-12. Signatures were validated in two independent cohorts of African American women with obesity: thirty nine subjects with no metabolic complications or with T2D and hypertension; and thirteen breast reduction surgical patients. The signatures in the validation cohorts closely resembled the distributions in the discovery cohort. We find that blood-based cytokine profiles usefully associate inflammation with T2D risks in vulnerable subjects, and should be combined with metabolism and obesity counselling for personalized risk assessment.
Full Text Available Electronic voting systems can make the voting process much more convenient. However, in such systems, if a server signs blank votes before users vote, it may cause undue multivoting. Furthermore, if users vote before the signing of the server, voting information will be leaked to the server and may be compromised. Blind signatures could be used to prevent leaking voting information from the server; however, malicious users could produce noncandidate signatures for illegal usage at that time or in the future. To overcome these problems, this paper proposes a novel oblivious signature scheme with a proxy signature function to satisfy security requirements such as information protection, personal privacy, and message verification and to ensure that no one can cheat other users (including the server. We propose an electronic voting system based on the proposed oblivious and proxy signature scheme and implement this scheme in a smartphone application to allow users to vote securely and conveniently. Security analyses and performance comparisons are provided to show the capability and efficiency of the proposed scheme.
Hossain, Mokter; Lassen, Astrid Heidemann
transformation is crucial. This study aims at exploring how organizations are driven towards transformation in various ways to embrace digital platforms for ideas, technologies, and knowledge. It shows the opportunities and challenges digital platforms bring in organizations. It also highlights underlying......Digital platforms offer new ways for organizations to collaborate with the external environment for ideas, technologies, and knowledge. They provide new possibilities and competence but they also bring new challenges for organizations. Understanding the role of these platforms in digital...... mechanisms and potential outcomes of various digital platforms. The contribution of the submission is valuable for scholars to understand and further explore this area. It provides insight for practitioners to capture value through digital platforms and accelerate the pace of organizations’ digital...
Full Text Available Certificateless signatures (CLS are noticeable because they may resolve the key escrow problem in ID-based signatures and break away the management problem regarding certificate in conventional signatures. However, the security of the mostly previous CLS schemes relies on the difficulty of solving discrete logarithm or large integer factorization problems. These two problems would be solved by quantum computers in the future so that the signature schemes based on them will also become insecure. For post-quantum cryptography, lattice-based cryptography is significant due to its efficiency and security. However, no study on addressing the revocation problem in the existing lattice-based CLS schemes is presented. In this paper, we focus on the revocation issue and present the first revocable CLS (RCLS scheme over lattices. Based on the short integer solution (SIS assumption over lattices, the proposed lattice-based RCLS scheme is shown to be existential unforgeability against adaptive chosen message attacks. By performance analysis and comparisons, the proposed lattice-based RCLS scheme is better than the previously proposed lattice-based CLS scheme, in terms of private key size, signature length and the revocation mechanism.
Valentine, T.E.; Mihalczo, J.T.; Koehler, P.E.
Nuclear Weapons Identification System (NWIS) signatures have been calculated using a Monte Carlo transport code for measurement configurations of a 252 Cf source, detectors, and a uranium metal casting. NWIS signatures consist of a wide variety of time-and frequency-analysis signatures such as the time distribution of neutrons after californium fission, the time distribution of counts in a detector after a previous count, the number of times n pulses occur in a time interval, and various frequency-analysis signatures, such as auto-power and cross-power spectral densities, coherences, and a ratio of spectral densities. This ratio is independent of detection efficiency. The analysis presented here, using the MCNP-DSP code, evaluates the applicability of this method for measurement of the 235 U content of 19-kg castings of depleted uranium and uranium with enrichments of 20, 40, 60, 80, 90, and 93.2 wt % 235 U. The dependence of the wide variety of NWIS signatures on 235 U content and possible configurations of a measurement system are presented. These preliminary calculations indicate short measurement times. Additional calculations are being performed to optimize the source-detector-moderator-casting configuration for the shortest measurement time. Although the NWIS method was developed for nuclear weapons identification, the development of a small processor now allows it to be also applied in a practical way to subcriticality measurements, nuclear fuel process monitoring and qualitative nondestructive assay of special nuclear material
Climent i Martí, Jordi
Proyecto Fin de Grado leído en la Universidad Rey Juan Carlos en el curso académico 2013/2014. Director: Cristina Ayala del Pino Con este Trabajo Fin de Grado he querido aproximar el concepto del Personal Branding y de marca personal como la herramienta para diferenciarse en el entorno profesional. Partiendo con la definición del concepto, su construcción, el panorama actual, compaginar empleo con marca personal y acabando con la visión personal de un gurú de la Marca Person...
As we move further into the 21st century, the digital native/digital immigrant paradigm created by Marc Prensky in 2001 is becoming less relevant. In this article, Prensky suggests that we should focus instead on the development of what he calls "digital wisdom." Arguing that digital technology can make us not just smarter but truly wiser, Prensky…
A vidicon waveform digitizer which can simultaneously digitize two independent signals has been developed. Either transient or repetitive waveforms can be digitized with this system. A dual beam oscilloscope is used as the signal input device. The light from the oscilloscope traces is optically coupled to a television camera, where the signals are temporarily stored prior to digitizing
Tone Dyrdal Solbrekke
Full Text Available Professional certification or registration is a designation earned by an individual. It is an authorization materialized as a document bearing the signature of a person given the authority to “sign off” professionals. A signed document also signals the “professionalism” of the profession by indicating the capacities that are expected of a professional and the competencies that are required for the successful exercise of an occupation—the desirable components of professional practice. However, the implications and logics of a signing process vary according to different factors, such as status, jurisdiction and societal legitimacy. Drawing on a case from Sweden, this paper investigates and critically discusses the logics of the recent reform of certification of Swedish school teachers. Applying a theoretical distinction between the logics of professional “responsibility” and “accountability,” we indicate embedded consequences for the signing process and teacher professionalism.
Ryberg, Thomas; Georgsen, Marianne
There are some tensions between high-level policy definitions of “digital literacy” and actual teaching practice. We need to find workable definitions of digital literacy; obtain a better understanding of what digital literacy might look like in practice; and identify pedagogical approaches, which...... support teachers in designing digital literacy learning. We suggest that frameworks such as Problem Based Learning (PBL) are approaches that enable digital literacy learning because they provide good settings for engaging with digital literacy. We illustrate this through analysis of a case. Furthermore......, these operate on a meso-level mediating between high-level concepts of digital literacy and classroom practice....
Because of its practical aspect digital radiography is more and more used in the industrial sector. There are 2 kinds of digital radiography. First, the 'computed radiography' that uses a photon-stimulated screen, and after radiation exposure this screen must be read by an analyser to get a digit image. The second type is the 'direct radiography' that allows one to get a digit radiograph of the object directly. Digital radiography uses the same radioactive nuclides as radiography with silver films: cobalt, iridium or selenium. The spatial resolution of digital radiography is less good than with classical silver film radiography but digital radiography offers a better visual contrast. (A.C.)
Gallagher, Marie E; Moffatt, Christie
This demonstration shows the Profiles in Science ® digital library. Profiles in Science contains digitized selections from the personal manuscript collections of prominent biomedical researchers, medical practitioners, and those fostering science and health. The Profiles in Science Web site is the delivery mechanism for content derived from the digital library system. The system is designed according to our basic principles for digital library development . The digital library includes the rules and software used for digitizing items, creating and editing database records and performing quality control as well as serving the digital content to the public. Among the types of data managed by the digital library are detailed item-level, collection-level and cross-collection metadata, digitized photographs, papers, audio clips, movies, born-digital electronic files, optical character recognized (OCR) text, and annotations (see Figure 1). The digital library also tracks the status of each item, including digitization quality, sensitivity of content, and copyright. Only items satisfying all required criteria are released to the public through the World Wide Web. External factors have influenced all aspects of the digital library's infrastructure.
Klasky, Marc Louis [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Wilcox, Trevor [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Bathke, Charles G. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); James, Michael R. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)
A rigorous formalism is presented for calculating radiation signatures from both Special Nuclear Material (SNM) as well as radiological sources. The use of MCNP6 in conjunction with CINDER/ORIGEN is described to allow for the determination of both neutron and photon leakages from objects of interest. In addition, a description of the use of MCNP6 to properly model the background neutron and photon sources is also presented. Examinations of the physics issues encountered in the modeling are investigated so as to allow for guidance in the user discerning the relevant physics to incorporate into general radiation signature calculations. Furthermore, examples are provided to assist in delineating the pertinent physics that must be accounted for. Finally, examples of detector modeling utilizing MCNP are provided along with a discussion on the generation of Receiver Operating Curves, which are the suggested means by which to determine detectability radiation signatures emanating from objects.
Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan
As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.
Valli De Re
Full Text Available Hepatitis C virus (HCV is a positive, single-stranded RNA virus, which has been associated to different subtypes of B-cell non-Hodgkin lymphoma (B-NHL. Cumulative evidence suggests an HCV-related antigen driven process in the B-NHL development. The underlying molecular signature associated to HCV-related B-NHL has to date remained obscure. In this review, we discuss the recent developments in this field with a special mention to different sets of genes whose expression is associated with BCR coupled to Blys signaling which in turn was found to be linked to B-cell maturation stages and NF-κb transcription factor. Even if recent progress on HCV-B-NHL signature has been made, the precise relationship between HCV and lymphoma development and phenotype signature remain to be clarified.
Fariello, Maria-Ines; Servin, Bertrand; Tosser-Klopp, Gwenola; Rupp, Rachel; Moreno, Carole; San Cristobal, Magali; Boitard, Simon
The diversity of populations in domestic species offers great opportunities to study genome response to selection. The recently published Sheep HapMap dataset is a great example of characterization of the world wide genetic diversity in sheep. In this study, we re-analyzed the Sheep HapMap dataset to identify selection signatures in worldwide sheep populations. Compared to previous analyses, we made use of statistical methods that (i) take account of the hierarchical structure of sheep populations, (ii) make use of linkage disequilibrium information and (iii) focus specifically on either recent or older selection signatures. We show that this allows pinpointing several new selection signatures in the sheep genome and distinguishing those related to modern breeding objectives and to earlier post-domestication constraints. The newly identified regions, together with the ones previously identified, reveal the extensive genome response to selection on morphology, color and adaptation to new environments.
Vyas, Saurabh; Banerjee, Amit; Burlina, Philippe
We describe an approach for estimating human skin parameters, such as melanosome concentration, collagen concentration, oxygen saturation, and blood volume, using hyperspectral radiometric measurements (signatures) obtained from in vivo skin. We use a computational model based on Kubelka-Munk theory and the Fresnel equations. This model forward maps the skin parameters to a corresponding multiband reflectance spectra. Machine-learning-based regression is used to generate the inverse map, and hence estimate skin parameters from hyperspectral signatures. We test our methods using synthetic and in vivo skin signatures obtained in the visible through the short wave infrared domains from 24 patients of both genders and Caucasian, Asian, and African American ethnicities. Performance validation shows promising results: good agreement with the ground truth and well-established physiological precepts. These methods have potential use in the characterization of skin abnormalities and in minimally-invasive prescreening of malignant skin cancers.
Doeven-Eggens, Lilian; De Fruyt, Filip; Hendriks, A. A. Jolijn; Bosker, Roel J.; Van der Werf, Margaretha P. C.
The association between personality and personal relationships is mostly studied within dyadic relationships. We examined these variables within the context of personal network types. We used Latent Class Analysis to identify groups Of Students with similar role relationships with three focal
—constitutes one of the main areas of interest, dividing cultures into either contact or low-contact cultures. Examples of proxetics—human spatial behavior studied in terms of universal spacing patterns and cultural similarities—are presented. Finally, future directions for the study of PS in the digital age...... functions. The integrity zone has no fixed size but varies according to variables such as age, gender, personality, relation, and culture. The key theoretical traditions and models are presented and the field's methodological techniques and measurements are discussed. Proxemics—cultural differences...
Heather G LaBreche
Full Text Available BACKGROUND: Current evidence indicates that even low-level lead (Pb exposure can have detrimental effects, especially in children. We tested the hypothesis that Pb exposure alters gene expression patterns in peripheral blood cells and that these changes reflect dose-specific alterations in the activity of particular pathways. METHODOLOGY/PRINCIPAL FINDING: Using Affymetrix Mouse Genome 430 2.0 arrays, we examined gene expression changes in the peripheral blood of female Balb/c mice following exposure to per os lead acetate trihydrate or plain drinking water for two weeks and after a two-week recovery period. Data sets were RMA-normalized and dose-specific signatures were generated using established methods of supervised classification and binary regression. Pathway activity was analyzed using the ScoreSignatures module from GenePattern. CONCLUSIONS/SIGNIFICANCE: The low-level Pb signature was 93% sensitive and 100% specific in classifying samples a leave-one-out crossvalidation. The high-level Pb signature demonstrated 100% sensitivity and specificity in the leave-one-out crossvalidation. These two signatures exhibited dose-specificity in their ability to predict Pb exposure and had little overlap in terms of constituent genes. The signatures also seemed to reflect current levels of Pb exposure rather than past exposure. Finally, the two doses showed differential activation of cellular pathways. Low-level Pb exposure increased activity of the interferon-gamma pathway, whereas high-level Pb exposure increased activity of the E2F1 pathway.
Ted Quinn; Jerry Mauck; Richard Bockhorst; Ken Thomas
The nuclear industry has been slow to incorporate digital sensor technology into nuclear plant designs due to concerns with digital qualification issues. However, the benefits of digital sensor technology for nuclear plant instrumentation are substantial in terms of accuracy, reliability, availability, and maintainability. This report demonstrates these benefits in direct comparisons of digital and analog sensor applications. It also addresses the qualification issues that must be addressed in the application of digital sensor technology.
""Digital Preservation for Heritages: Technologies and Applications"" provides a comprehensive and up-to-date coverage of digital technologies in the area of cultural heritage preservation, including digitalization, research aiding, conservation aiding, digital exhibition, and digital utilization. Processes, technical frameworks, key technologies, as well as typical systems and applications are discussed in the book. It is intended for researchers and students in the fields of computer science and technology, museology, and archaeology. Dr. Dongming Lu is a professor at College of Computer Sci
Full Text Available Scleroderma is a clinically heterogeneous disease with a complex phenotype. The disease is characterized by vascular dysfunction, tissue fibrosis, internal organ dysfunction, and immune dysfunction resulting in autoantibody production.We analyzed the genome-wide patterns of gene expression with DNA microarrays in skin biopsies from distinct scleroderma subsets including 17 patients with systemic sclerosis (SSc with diffuse scleroderma (dSSc, 7 patients with SSc with limited scleroderma (lSSc, 3 patients with morphea, and 6 healthy controls. 61 skin biopsies were analyzed in a total of 75 microarray hybridizations. Analysis by hierarchical clustering demonstrates nearly identical patterns of gene expression in 17 out of 22 of the forearm and back skin pairs of SSc patients. Using this property of the gene expression, we selected a set of 'intrinsic' genes and analyzed the inherent data-driven groupings. Distinct patterns of gene expression separate patients with dSSc from those with lSSc and both are easily distinguished from normal controls. Our data show three distinct patient groups among the patients with dSSc and two groups among patients with lSSc. Each group can be distinguished by unique gene expression signatures indicative of proliferating cells, immune infiltrates and a fibrotic program. The intrinsic groups are statistically significant (p<0.001 and each has been mapped to clinical covariates of modified Rodnan skin score, interstitial lung disease, gastrointestinal involvement, digital ulcers, Raynaud's phenomenon and disease duration. We report a 177-gene signature that is associated with severity of skin disease in dSSc.Genome-wide gene expression profiling of skin biopsies demonstrates that the heterogeneity in scleroderma can be measured quantitatively with DNA microarrays. The diversity in gene expression demonstrates multiple distinct gene expression programs in the skin of patients with scleroderma.
Full Text Available Doppler radar observations have revealed a class of atmospheric vortices (tropical cyclones, tornadoes, dust devils that possess elliptical radar reflectivity signatures. One famous example is Typhoon Herb (1996 that maintained its elliptical reflectivity structure over a 40-hour period. Theoretical work and dual-Doppler analyses of observed tropical cyclones have suggested two physical mechanisms that can explain the formation of two types of elliptical vortices observed in nature, namely, the combination of a circular vortex with either a wavenumber two vortex Rossby wave or a deformation field. The characteristics of these two types of elliptical vortices and their corresponding Doppler velocity signatures have not been previously examined.
Perotti, Jose M.
This slide presentation reviews the development and uses of the Smart Current Signature Sensor (SCSS), also known as the Valve Health Monitor (VHM) system. SCSS provides a way to not only monitor real-time the valve's operation in a non invasive manner, but also to monitor its health (Fault Detection and Isolation) and identify potential faults and/or degradation in the near future (Prediction/Prognosis). This technology approach is not only applicable for solenoid valves, and it could be extrapolated to other electrical components with repeatable electrical current signatures such as motors.
Choi, Jeong Woon; Chang, Ku-Young; Hong, Dowon
Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.
Lucek, E.A.; Horbury, T.S.; Balogh, A.; McComas, D.J.
A class of small scale structures, with a near-radial magnetic field and a drop in magnetic field fluctuation power, have recently been identified in the polar solar wind. An earlier study of 24 events, each lasting for 6 hours or more, identified no clear plasma signature. In an extension of that work, radial intervals lasting for 4 hours or more (89 in total), have been used to search for a statistically significant plasma signature. It was found that, despite considerable variations between intervals, there was a small but significant drop, on average, in plasma temperature, density and β during these events
Yang, Tian-Zhi; Su, Yishu; Xu, Weikai; Yang, Xiao-Dong
Thermal metamaterials have been proposed to manipulate heat flux as a new way to cloak or camouflage objects in the infrared world. To date, however, thermal metamaterials only operate in the steady-state and exhibit detectable, transient heat signatures. In this letter, the theoretical basis for a thermal camouflaging technique with controlled transient diffusion is presented. This technique renders an object invisible in real time. More importantly, the thermal camouflaging device instantaneously generates a pre-designed heat signature and behaves as a perfect thermal illusion device. A metamaterial coating with homogeneous and isotropic thermal conductivity, density, and volumetric heat capacity was fabricated and very good camouflaging performance was achieved.
Choi, Jeong Woon [Emerging Technology R and D Center, SK Telecom, Kyunggi 463-784 (Korea, Republic of); Chang, Ku-Young; Hong, Dowon [Cryptography Research Team, Electronics and Telecommunications Research Institute, Daejeon 305-700 (Korea, Republic of)
Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.
Digital libraries are well known for sharing resources all over the world. Several ... The person with more information will guide a group or society and he ..... librarians should work out among themselves a co-operative means of tracking the.
Full Text Available Brian Ondiege, Malcolm Clarke Department of Computer Science, College of Engineering, Design and Physical Sciences, Brunel University London, UK Abstract: With the rapid advances in the capabilities of telehealth devices and their increasing connection to the Internet, security is becoming an issue of major concern. Therefore, the perceptions of the health care professionals regarding security are of interest, as the patients trust them to make informed decisions on issues concerning their privacy, data, and health. Eight health care professionals were interviewed to determine their perceptions and knowledge of security in health care. The research further examines one specific aspect of security which is considered of significant concern: the authenticity of a device being from the actual manufacturer and not a counterfeit. This research proposes device registration together with digital signatures and one-time passwords to address the issue of counterfeit remote patient-monitoring devices and identify and authenticate the user of the device. Keywords: telehealth security, health care professionals’ perception, personal health device, authentication
Huang, Jen-Fa; Meng, Sheng-Hui; Lin, Ying-Chen
The optical code-division multiple-access (OCDMA) technique is considered a good candidate for providing optical layer security. An enhanced OCDMA network security mechanism with a pseudonoise (PN) random digital signals type of maximal-length sequence (M-sequence) code switching to protect against eavesdropping is presented. Signature codes unique to individual OCDMA-network users are reconfigured according to the register state of the controlling electrical shift registers. Examples of signature reconfiguration following state switching of the controlling shift register for both the network user and the eavesdropper are numerically illustrated. Dynamically changing the PN state of the shift register to reconfigure the user signature sequence is shown; this hinders eavesdroppers' efforts to decode correct data sequences. The proposed scheme increases the probability of eavesdroppers committing errors in decoding and thereby substantially enhances the degree of an OCDMA network's confidentiality.
Mignani, A. G.; Ciaccheri, L.; Mencaglia, A. A.; Diaz-Herrera, N.; Garcia-Allende, P. B.; Ottevaere, H.; Thienpont, H.; Attilio, C.; Cimato, A.; Francalanci, S.; Paccagnini, A.; Pavone, F. S.
Absorption spectroscopy in the wide 200-1700 nm spectral range is carried out by means of optical fiber instrumentation to achieve a digital mapping of liquids for the prediction of important quality parameters. Extra virgin olive oils from Italy and lubricant oils from turbines with different degrees of degradation were considered as "case studies". The spectral data were processed by means of multivariate analysis so as to obtain a correlation to quality parameters. In practice, the wide range absorption spectra were considered as an optical signature of the liquids from which to extract product quality information. The optical signatures of extra virgin olive oils were used to predict the content of the most important fatty acids. The optical signatures of lubricant oils were used to predict the concentration of the most important parameters for indicating the oil's degree of degradation, such as TAN, JOAP anti-wear index, and water content.
New digital tools and technologies create an opportunity for history museums to personalize visitor experiences, reach new audiences, and increase their relevancy by including visitors' historical narratives in museum content and programming. By adapting to the shift in social narrative prompted by digital media advancements, museums are…
As a process for engaging marginalised voices in the social/cultural economy of the media, digital storytelling has garnered much attention from media artists, community organisers and scholars since the early 1990s. The practice of digital storytelling, or the making and sharing of personal narratives through recorded voice-overs, digital…
Digital channels and information technology are changing the way that companies communicate and maintain relationships with their customers. The Internet, email, mobile phones, digital TV, and other evolving channels offer opportunities for frequent, costeffective, personalized, and interactive communication between the company and their customers. In addition to traditional offers and persuasion, customers can be provided with relational communication like newsletters, usage tips, maintenanc...
Van Galen, Jane
In October 2011, 200 state school officers and legislators gathered at a hotel in San Francisco to learn how to "revolutionize" learning by "personalizing" instruction. The occasion was former Florida Gov. Jeb Bush's second annual National Summit on Education Reform. The topic was digital learning. The vision of digitally managed curriculum and…
Nehad Hameed Hussein
Full Text Available Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they are less sensitive to the Human Visual System (HVS and preserve high image fidelity. MD-5 and RSA algorithms are used for generating the digital signature from the watermark data that is also embedded in the medical image. We apply the algorithm on number of medical images. The Electronic Patient Record (EPR is used as watermark data. Experiments demonstrate the effectiveness of our algorithm in terms of robustness, invisibility, and fragility. Watermark and digital signature can be extracted without the need to the original image.
Tidball, Brian E
.... This study examined whether people perceive personality in static digital faces that portray expressions of emotion, and if the digital faces would influence human performance on a simple human...
A computer-implemented method of processing a query vector and a data vector), comprising: generating a set of masks and a first set of multiple signatures and a second set of multiple signatures by applying the set of masks to the query vector and the data vector, respectively, and generating...... candidate pairs, of a first signature and a second signature, by identifying matches of a first signature and a second signature. The set of masks comprises a configuration of the elements that is a Hadamard code; a permutation of a Hadamard code; or a code that deviates from a Hadamard code...
Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu
In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.
Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu, E-mail: email@example.com [Information Countermeasure Technique Research Institute, Harbin Institute of Technology, Harbin 150001 (China)
In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.
Full Text Available Personality is the integration of characteristics acquired or brought by birth which separate the individual from others. Personality involves aspects of the individual's mental, emotional, social, and physical features in continuum. Several theories were suggested to explain developmental processes of personality. Each theory concentrates on one feature of human development as the focal point, then integrates with other areas of development in general. Most theories assume that childhood, especially up to 5-6 years, has essential influence on development of personality. The interaction between genetic and environmental factors reveals a unique personality along growth and developmental process. It could be said that individual who does not have any conflict between his/her basic needs and society's, has well-developed and psychologically healthy personality.
Since the 1980s, digital materialism has received increasing interest in the field of media studies. Materialism as a theoretical paradigm assumes that all things in the world are tied to physical processes and matter. Yet within digital media studies, the understanding of what should be the core object of a materialist analysis is debated. This paper proposes to untangle some of the principal theoretical propositions that compose the field of digital materialism. It outlines six frameworks t...
Greve, Kevin W.; Springer, Steven; Bianchini, Kevin J.; Black, F. William; Heinly, Matthew T.; Love, Jeffrey M.; Swift, Douglas A.; Ciota, Megan A.
This study examined the sensitivity and false-positive error rate of reliable digit span (RDS) and the WAIS-III Digit Span (DS) scaled score in persons alleging toxic exposure and determined whether error rates differed from published rates in traumatic brain injury (TBI) and chronic pain (CP). Data were obtained from the files of 123 persons…
Barbero G, J. Fernando; Villasenor, Eduardo J.S.
We show that the families of effective actions considered by Jacobson et al. to study Lorentz invariance violations contain a class of models that represent pure general relativity with a Euclidean signature. We also point out that some members of this family of actions preserve Lorentz invariance in a generalized sense
.... Results for an M1A1 and T72 are discussed. By analyzing the simulated seismic signature data in conjunction with the spectral features associated with the vibrations of specific vehicle sprung and un-sprung components we are able to make...
Jenkins, Daniel M.
This research explores the instructional strategies most frequently used by leadership educators who teach academic credit-bearing undergraduate leadership studies courses through a national survey and identifies signature pedagogies within the leadership discipline. Findings from this study suggest that class discussion--whether in the form of…
Lee, Hwayean; Hong, Changho; Kim, Hyunsang; Lim, Jongin; Yang, Hyung Jin
Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed. One scheme uses a public board and the other does not. However both schemes provide confidentiality of the message and a higher efficiency in transmission
Vyas, Saurabh; Banerjee, Amit; Garza, Luis; Kang, Sewon; Burlina, Philippe
The temporal analysis of changes in biological skin parameters, including melanosome concentration, collagen concentration and blood oxygenation, may serve as a valuable tool in diagnosing the progression of malignant skin cancers and in understanding the pathophysiology of cancerous tumors. Quantitative knowledge of these parameters can also be useful in applications such as wound assessment, and point-of-care diagnostics, amongst others. We propose an approach to estimate in vivo skin parameters using a forward computational model based on Kubelka-Munk theory and the Fresnel Equations. We use this model to map the skin parameters to their corresponding hyperspectral signature. We then use machine learning based regression to develop an inverse map from hyperspectral signatures to skin parameters. In particular, we employ support vector machine based regression to estimate the in vivo skin parameters given their corresponding hyperspectral signature. We build on our work from SPIE 2012, and validate our methodology on an in vivo dataset. This dataset consists of 241 signatures collected from in vivo hyperspectral imaging of patients of both genders and Caucasian, Asian and African American ethnicities. In addition, we also extend our methodology past the visible region and through the short-wave infrared region of the electromagnetic spectrum. We find promising results when comparing the estimated skin parameters to the ground truth, demonstrating good agreement with well-established physiological precepts. This methodology can have potential use in non-invasive skin anomaly detection and for developing minimally invasive pre-screening tools.
We report on a plan to establish a `Dictionary of LHC Signatures', an initiative that started at the WHEPP-X workshop in Chennai, January 2008. This study aims at the strategy of distinguishing 3 classes of dark matter motivated scenarios such as -parity conserved supersymmetry, little Higgs models with -parity ...
Alexandrov, L.B.; Nik-Zainal, S.; Wedge, D.C.; Aparicio, S.A.; Behjati, S.; Biankin, A.V.; Bignell, G.R.; Bolli, N.; Borg, A.; Borresen-Dale, A.L.; Boyault, S.; Burkhardt, B.; Butler, A.P.; Caldas, C.; Davies, H.R.; Desmedt, C.; Eils, R.; Eyfjord, J.E.; Foekens, J.A.; Greaves, M.; Hosoda, F.; Hutter, B.; Ilicic, T.; Imbeaud, S.; Imielinsk, M.; Jager, N.; Jones, D.T.; Knappskog, S.; Kool, M.; Lakhani, S.R.; Lopez-Otin, C.; Martin, S.; Munshi, N.C.; Nakamura, H.; Northcott, P.A.; Pajic, M.; Papaemmanuil, E.; Paradiso, A.; Pearson, J.V.; Puente, X.S.; Raine, K.; Ramakrishna, M.; Richardson, A.L.; Richter, J.; Rosenstiel, P.; Schlesner, M.; Schumacher, T.N.; Span, P.N.; Teague, J.W.; Totoki, Y.; Tutt, A.N.; Valdes-Mas, R.; Buuren, M.M. van; Veer, L. van 't; Vincent-Salomon, A.; Waddell, N.; Yates, L.R.; Zucman-Rossi, J.; Futreal, P.A.; McDermott, U.; Lichter, P.; Meyerson, M.; Grimmond, S.M.; Siebert, R.; Campo, E.; Shibata, T.; Pfister, S.M.; Campbell, P.J.; Stratton, M.R.; Schlooz-Vries, M.S.; Tol, J.J. van; Laarhoven, H.W. van; Sweep, F.C.; Bult, P.; et al.,
All cancers are caused by somatic mutations; however, understanding of the biological processes generating these mutations is limited. The catalogue of somatic mutations from a cancer genome bears the signatures of the mutational processes that have been operative. Here we analysed 4,938,362
The interaction signatures of UHE protons propagating through CMB are discussed. Much attention is given to ankle, which starting from 1963 is usually interpreted as a feature of transition from galactic to extragalactic cosmic rays. We argue here that this interpretation is now excluded. It gives more credit to alternative explanation of the ankle as an intrinsic part of the pair-production dip.
Jordal, Peter Lüttge; Dyrlund, Thomas F.; Winge, Kristian
Aim: To investigate if idiopathic Parkinson's disease (IPD) is associated with distinct proteolytic signatures relative to non-neurodegenerative controls (NND) and patients with multiple system atrophy (MSA). Materials & methods: A subtiligase-based N-terminomics screening method was exploited...
Full Text Available This paper investigates the creative engagement with digital 3D models of museum artefacts and gives insight into new uses of museum collections enabled by digital scanning, editing and 3D printing technologies. Digital 3D models of museum artefacts are malleable and increasingly easy to use. Additionally, freely available 3D software has made 3D scanning, editing and manufacturing possible for non-specialists. These technologies allow users to create new artworks through the creation and transformation of digital replicas of museum artefacts. Examples of creative works, taken from two case studies that involve the creative use of digital reproductions of museum artefacts are presented in this paper. These projects are illustrative of a larger trend: the digital ‘poaching’ of heritage artefacts. This paper examines how digital 3D technologies can foster creative forms of museum engagement, democratise access to museum collections and engage users with personal forms of museum experience.
Sabin, James E; Harland, Jonathan Clark
Internet and social media use continue to expand rapidly. Many patients and psychiatrists are bringing digital technologies into the treatment process, but relatively little attention has been paid to the ethical challenges in doing this. This review presents ethical guidelines for psychiatry in the digital age. Surveys demonstrate that patients are eager to make digital technologies part of their treatment. Substantial numbers search for professional and personal information about their therapists. Attitudes among psychiatrists about using digital technologies with patients range from dread to enthusiastic adoption. Digital technologies create four major ethical challenges for psychiatry: managing clinical boundaries; maintaining privacy and confidentiality; establishing realistic expectations regarding digital communications; and upholding professional ideals. Traditional ethical expectations are valid for the evolving digital arena, but guidance must be adapted for actual application in practice.
Ursu, M. P.; Condruz, D. A.
Modern miniature trains are now driven by means of the DCC (Digital Command and Control) system, which allows the human operator or a personal computer to launch commands to each individual train or even to control different features of the same train. The digital command station encodes these commands and sends them to the trains by means of electrical pulses via the rails of the railway network. Due to the development of the miniature railway network, it may happen that the power requirement of the increasing number of digital locomotives, carriages and accessories exceeds the nominal output power of the digital command station. This digital intelligent booster relieves the digital command station from powering the entire railway network all by itself, and it automatically handles the multiple powered sections of the network. This electronic device is also able to detect and process short-circuits and overload conditions, without the intervention of the digital command station.
Digital forensics and multimedia forensics are rapidly growing disciplines whereby electronic information is extracted and interpreted for use in a court of law. These two fields are finding increasing importance in law enforcement and the investigation of cybercrime as the ubiquity of personal computing and the internet becomes ever-more apparent. Digital forensics involves investigating computer systems and digital artefacts in general, while multimedia forensics is a sub-topic of digital forensics focusing on evidence extracted from both normal computer systems and special multimedia devices, such as digital cameras. This book focuses on the interface between digital forensics and multimedia forensics, bringing two closely related fields of forensic expertise together to identify and understand the current state-of-the-art in digital forensic investigation. Both fields are expertly attended to by contributions from researchers and forensic practitioners specializ ng in diverse topics such as forensic aut...
Hildebrandt, Mario; Kiltz, Stefan; Dittmann, Jana
The digitization of physical traces from crime scenes in forensic investigations in effect creates a digital chain-of-custody and entrains the challenge of creating a link between the two or more representations of the same trace. In order to be forensically sound, especially the two security aspects of integrity and authenticity need to be maintained at all times. Especially the adherence to the authenticity using technical means proves to be a challenge at the boundary between the physical object and its digital representations. In this article we propose a new method of linking physical objects with its digital counterparts using two-dimensional bar codes and additional meta-data accompanying the acquired data for integration in the conventional documentation of collection of items of evidence (bagging and tagging process). Using the exemplary chosen QR-code as particular implementation of a bar code and a model of the forensic process, we also supply a means to integrate our suggested approach into forensically sound proceedings as described by Holder et al.1 We use the example of the digital dactyloscopy as a forensic discipline, where currently progress is being made by digitizing some of the processing steps. We show an exemplary demonstrator of the suggested approach using a smartphone as a mobile device for the verification of the physical trace to extend the chain-of-custody from the physical to the digital domain. Our evaluation of the demonstrator is performed towards the readability and the verification of its contents. We can read the bar code despite its limited size of 42 x 42 mm and rather large amount of embedded data using various devices. Furthermore, the QR-code's error correction features help to recover contents of damaged codes. Subsequently, our appended digital signature allows for detecting malicious manipulations of the embedded data.
Dueber, C.; Klose, K.J.; Thelen, M.
With digital multilayer tomography a sequence of projection images is recorded by an image intensifier television system and stored as digital data during a linear run of a layer sequence. Using this data record, tomograms of the examined body region can be computed for any layer thickness by shifts and superimposition of the single projections later at a digital workstation. The qualities of digital and conventional tomograms are basically comparable. A drawback of digital tomography is its lower local resolution (512 x 512 image matrix), advantages are a lower radiation exposure, a shorter patient examination time, and the facilities of digital image processing (later processing, archive setup, transmission). (orig.) [de
G. P. Korzhenkova
Full Text Available The use of digital techniques in mammography has become a last step for completing the process of digitization in diagnostic imaging. It is assumed that such a spatial decision will be required for digital mammography, as well as for high-resolution intensifying screen-film systems used in conventional mammography and that the digital techniques will be limited by the digitizer pixel size on detecting minor structures, such as microcalcifications. The introduction of digital technologies in mammography involves a tight control over an image and assures its high quality.
Building a foundational understanding of the digital, Logic of the Digital reveals a unique digital ontology. Beginning from formal and technical characteristics, especially the binary code at the core of all digital technologies, Aden Evens traces the pathways along which the digital domain of abstract logic encounters the material, human world. How does a code using only 0s and 1s give rise to the vast range of applications and information that constitutes a great and growing portion of our world? Evens' analysis shows how any encounter between the actual and the digital must cross an ontolo
Cueva, Melany; Kuhnley, Regina; Revels, Laura J; Cueva, Katie; Dignan, Mark; Lanier, Anne P
The purpose of this project was to learn how Community Health Workers (CHWs) in Alaska perceived digital storytelling as a component of the "Path to Understanding Cancer" curriculum and as a culturally respectful tool for sharing cancer-related health messages. A pre-course written application, end-of-course written evaluation, and internet survey informed this project. Digital storytelling was included in seven 5-day cancer education courses (May 2009-2012) in which 67 CHWs each created a personal 2-3 minute cancer-related digital story. Participant-chosen digital story topics included tobacco cessation, the importance of recommended cancer screening exams, cancer survivorship, loss, grief and end-of-life comfort care, and self-care as patient care providers. All participants completed an end-of-course written evaluation. In July 2012, contact information was available for 48 participants, of whom 24 completed an internet survey. All 67 participants successfully completed a digital story which they shared and discussed with course members. On the written post-course evaluation, all participants reported that combining digital storytelling with cancer education supported their learning and was a culturally respectful way to provide health messages. Additionally, 62 of 67 CHWs reported that the course increased their confidence to share cancer information with their communities. Up to 3 years post-course, all 24 CHW survey respondents reported they had shown their digital story. Of note, 23 of 24 CHWs also reported change in their own behavior as a result of the experience. All CHWs, regardless of computer skills, successfully created a digital story as part of the cancer education course. CHWs reported that digital stories enhanced their learning and were a culturally respectful way to share cancer-related information. Digital storytelling gave the power of the media into the hands of CHWs to increase their cancer knowledge, facilitate patient and community cancer
Full Text Available Objective. The purpose of this project was to learn how Community Health Workers (CHWs in Alaska perceived digital storytelling as a component of the “Path to Understanding Cancer” curriculum and as a culturally respectful tool for sharing cancer-related health messages. Design. A pre-course written application, end-of-course written evaluation, and internet survey informed this project. Methods. Digital storytelling was included in seven 5-day cancer education courses (May 2009–2012 in which 67 CHWs each created a personal 2–3 minute cancer-related digital story. Participant-chosen digital story topics included tobacco cessation, the importance of recommended cancer screening exams, cancer survivorship, loss, grief and end-of-life comfort care, and self-care as patient care providers. All participants completed an end-of-course written evaluation. In July 2012, contact information was available for 48 participants, of whom 24 completed an internet survey. Results. All 67 participants successfully completed a digital story which they shared and discussed with course members. On the written post-course evaluation, all participants reported that combining digital storytelling with cancer education supported their learning and was a culturally respectful way to provide health messages. Additionally, 62 of 67 CHWs reported that the course increased their confidence to share cancer information with their communities. Up to 3 years post-course, all 24 CHW survey respondents reported they had shown their digital story. Of note, 23 of 24 CHWs also reported change in their own behaviour as a result of the experience. Conclusions. All CHWs, regardless of computer skills, successfully created a digital story as part of the cancer education course. CHWs reported that digital stories enhanced their learning and were a culturally respectful way to share cancer-related information. Digital storytelling gave the power of the media into the hands of CHWs
Lee, Hsiao Ping; Sheu, Tzu-Fang
Signatures are short sequences that are unique and not similar to any other sequence in a database that can be used as the basis to identify different species. Even though several signature discovery algorithms have been proposed in the past, these algorithms require the entirety of databases to be loaded in the memory, thus restricting the amount of data that they can process. It makes those algorithms unable to process databases with large amounts of data. Also, those algorithms use sequential models and have slower discovery speeds, meaning that the efficiency can be improved. In this research, we are debuting the utilization of a divide-and-conquer strategy in signature discovery and have proposed a parallel signature discovery algorithm on a computer cluster. The algorithm applies the divide-and-conquer strategy to solve the problem posed to the existing algorithms where they are unable to process large databases and uses a parallel computing mechanism to effectively improve the efficiency of signature discovery. Even when run with just the memory of regular personal computers, the algorithm can still process large databases such as the human whole-genome EST database which were previously unable to be processed by the existing algorithms. The algorithm proposed in this research is not limited by the amount of usable memory and can rapidly find signatures in large databases, making it useful in applications such as Next Generation Sequencing and other large database analysis and processing. The implementation of the proposed algorithm is available at http://www.cs.pu.edu.tw/~fang/DDCSDPrograms/DDCSD.htm.
Full Text Available Extensive epidemiological data have demonstrated an exponential rise in the incidence of non-Hodgkin lymphoma (NHL that is associated with increasing age. The molecular etiology of this remains largely unknown, which impacts the effectiveness of treatment for patients. We proposed that age-dependent circulating microRNA (miRNA signatures in the host influence diffuse large B cell lymphoma (DLBCL development. Our objective was to examine tumor development in an age-based DLBCL system using an inventive systems biology approach. We harnessed a novel murine model of spontaneous DLBCL initiation (Smurf2-deficient at two age groups: 3 and 15 months old. All Smurf2-deficient mice develop visible DLBCL tumor starting at 15 months of age. Total miRNA was isolated from serum, bone marrow and spleen and were collected for all age groups for Smurf2-deficient mice and age-matched wild-type C57BL/6 mice. Using systems biology techniques, we identified a list of 10 circulating miRNAs being regulated in both the spleen and bone marrow that were present in DLBCL forming mice starting at 3 months of age that were not present in the control mice. Furthermore, this miRNA signature was found to occur circulating in the blood and it strongly impacted JUN and MYC oncogenic signaling. In addition, quantification of the miRNA signature was performed via Droplet Digital PCR technology. It was discovered that a key miRNA signature circulates throughout a host prior to the formation of a tumor starting at 3 months old, which becomes further modulated by age and yielded calculation of a 'carcinogenic risk score'. This novel age-based circulating miRNA signature may potentially be leveraged as a DLBCL risk profile at a young age to predict future lymphoma development or disease progression as well as for potential innovative miRNA-based targeted therapeutic strategies in lymphoma.
Britton, Richard; Jackson, Mark J.; Davies, Ashley V.
A method for quantifying gamma coincidence signatures has been developed, and tested in conjunction with a high-efficiency multi-detector system to quickly identify trace amounts of radioactive material. The γ–γ system utilises fully digital electronics and list-mode acquisition to time–stamp each event, allowing coincidence matrices to be easily produced alongside typical ‘singles’ spectra. To quantify the coincidence signatures a software package has been developed to calculate efficiency and cascade summing corrected branching ratios. This utilises ENSDF records as an input, and can be fully automated, allowing the user to quickly and easily create/update a coincidence library that contains all possible γ and conversion electron cascades, associated cascade emission probabilities, and true-coincidence summing corrected γ cascade detection probabilities. It is also fully searchable by energy, nuclide, coincidence pair, γ multiplicity, cascade probability and half-life of the cascade. The probabilities calculated were tested using measurements performed on the γ–γ system, and found to provide accurate results for the nuclides investigated. Given the flexibility of the method, (it only relies on evaluated nuclear data, and accurate efficiency characterisations), the software can now be utilised for a variety of systems, quickly and easily calculating coincidence signature probabilities. - Highlights: • Monte-Carlo based software developed to easily create/update a coincidence signal library for environmental radionuclides. • Coincidence library utilised to accurately quantify gamma coincidence signatures. • All coincidence signature probabilities are corrected for cascade summing, conversion electron emission and pair production. • Key CTBTO relevant radionuclides have been tested to verify the calculated correction factors. • Accurately quantifying coincidence signals during routine analysis will allow dramatically improved detection
Home; Journals; Resonance – Journal of Science Education. Personal Reflections. Articles in Resonance – Journal of Science Education. Volume 6 Issue 3 March 2001 pp 90-93 Personal Reflections. Why did I opt for Career in Science? Jayant V Narlikar · More Details Fulltext PDF. Volume 9 Issue 8 August 2004 pp 89-89 ...
Picard, R. H; Dewan, E. M; Winick, J. R; O'Neil, R. R
This report describes work carried out under the Air Force Research Laboratory's basic research task in optical remote-sensing signatures, entitled Optical / Infrared Signatures for Space-Based Remote Sensing...
Diaz, Aaron A [Richland, WA; Samuel, Todd J [Pasco, WA; Valencia, Juan D [Kennewick, WA; Gervais, Kevin L [Richland, WA; Tucker, Brian J [Pasco, WA; Kirihara, Leslie J [Richland, WA; Skorpik, James R [Kennewick, WA; Reid, Larry D [Benton City, WA; Munley, John T [Benton City, WA; Pappas, Richard A [Richland, WA; Wright, Bob W [West Richland, WA; Panetta, Paul D [Richland, WA; Thompson, Jason S [Richland, WA
A multiparameter acoustic signature inspection device and method are described for non-invasive inspection of containers. Dual acoustic signatures discriminate between various fluids and materials for identification of the same.
Gebus, Lisa M; Sanders, Jeffrey S
... (IR), and radar signatures of threat systems. To address this need, a program was initiated by TMO to augment an existing full-scale, vacuum-formed plastic target with sufficient signature fidelity to adequately stress U.S...
Full Text Available Since the inception of Seminar.net the phenomenon of Digital Storytelling has often been suggested as a promising genre for teaching and learning in a variety of areas. Academically, the genre has attracted interest from scholars in media studies, political science, social work, health and education. In this issue we have sought attention from a huge number of academically inclined persons who either use the genre to teach with media, for teaching and learning about media, or studying how this specific way of working with media offers new possibilities for the articulation of the voice of the common people.When we invited authors for this special issue we did so expecting – and hoping for – contributions from a wide field of interests. We have landed 11 different manuscripts and have organised them according to a tentative order of themes they address: “Teaching and learning with Digital Storytelling”, “Community building”, “Genres of communication” and “Practical papers”. Being a journal for lifelong learning, the educational use has gained the most interest. But also emerging new areas of use related to health, leisure, recreation, activism, community building, planning, professional communication, and reflection are reflected in the papers. We think the contributions together support our efforts for building the knowledge about digital storytelling as a genre and its potential in the media society. Scholarly publications in this field are generally mediated on paper. And there has been no shortage of superb exemplars of scholarly work these last couple of years: Story Circle: Digital Storytelling around the World, edited by John Hartley and Kelly McWilliams and Digital Storytelling, Mediatized Stories: Self-representations in New Media, edited by Knut Lundby, as well as a conference report, “Storytelling – Reflections in the Age of Digitalization” edited by Yvonne Gächter, Heike Ortner, Claudia Scwartz, Andreas
Full Text Available Digital natives account for a substantial portion of the total enrollment in higher education. This calls for significant educational reforms because traditional education systems do not cater to the needs and interests of digital natives. The most effective way that both students and instructors can benefit from this paradigm shift is to integrate technology that is appropriate to the cognitive learning patterns of the digital natives into the curriculum. This paper builds upon previous research in technology/personality theory and specifically attempts to provide examples of technology that will address the instructional needs of digital natives. Further this paper provides empirical evidence of the impact of technology integration on the learning outcomes of digital natives. In this study, the authors explored the impact of targeted technology on academic performance in three businesses courses. Three functional technologies were used by the authors to build engaging course content, efficiently manage course content, and to interact with digital native students. This study found that these technologies can assist digital natives in the learning process and lead to better academic performance.
Yoon, Chun Seok; Kang, Min Sung; Lim, Jong In; Yang, Hyung Jin
We present a quantum signature scheme based on a two-qubit quantum search algorithm. For secure transmission of signatures, we use a quantum search algorithm that has not been used in previous quantum signature schemes. A two-step protocol secures the quantum channel, and a trusted center guarantees non-repudiation that is similar to other quantum signature schemes. We discuss the security of our protocol. (paper)
Francisco Rodríguez-Santos; Guillermo Delgado-Gutierréz; Leonardo Palacios-Luengas; Rubén Vázquez Medina
This work presents a forensics analysis methodology implemented to detect modifications in JPEG digital images by analyzing the image’s metadata, thumbnail, camera traces and compression signatures. Best practices related with digital evidence and forensics analysis are considered to determine if the technical attributes and the qualities of an image are consistent with each other. This methodology is defined according to the recommendations of the Good Practice Guide for Computer-Based Elect...
Bai, Y X
Three-dimensional(3D)digital technology has been widely used in the field of orthodontics in clinical examination, diagnosis, treatment and curative effect evaluation. 3D digital technology greatly improves the accuracy of diagnosis and treatment, and provides effective means for personalized orthodontic treatment. This review focuses on the application of 3D digital technology in the field of orthodontics.
Andrawis, Alfred S.
This report covers a visibility study of utilizing present KSC broadband communications data system (BCDS) for digital video services. Digital video services include compressed digital TV delivery and video-on-demand. Furthermore, the study examines the possibility of providing interactive video on demand to desktop personal computers via KSC computer network.
National Oceanic and Atmospheric Administration, Department of Commerce — This digital ortho-imagery dataset is a survey of coastal California. The project area consists of approximately 3774 square miles. The project design of the digital...