WorldWideScience

Sample records for possess key information

  1. SIMPL Systems, or: Can We Design Cryptographic Hardware without Secret Key Information?

    Science.gov (United States)

    Rührmair, Ulrich

    This paper discusses a new cryptographic primitive termed SIMPL system. Roughly speaking, a SIMPL system is a special type of Physical Unclonable Function (PUF) which possesses a binary description that allows its (slow) public simulation and prediction. Besides this public key like functionality, SIMPL systems have another advantage: No secret information is, or needs to be, contained in SIMPL systems in order to enable cryptographic protocols - neither in the form of a standard binary key, nor as secret information hidden in random, analog features, as it is the case for PUFs. The cryptographic security of SIMPLs instead rests on (i) a physical assumption on their unclonability, and (ii) a computational assumption regarding the complexity of simulating their output. This novel property makes SIMPL systems potentially immune against many known hardware and software attacks, including malware, side channel, invasive, or modeling attacks.

  2. [Key informers. When and How?].

    Science.gov (United States)

    Martín González, R

    2009-03-01

    When information obtained through duly designed and developed studies is not available, the solution to certain problems that affect the population or that respond to certain questions may be approached by using the information and experience provided by the so-called key informer. The key informer is defined as a person who is in contact with the community or with the problem to be studied, who is considered to have good knowledge of the situation and therefore who is considered an expert. The search for consensus is the basis to obtain information through the key informers. The techniques used have different characteristics based on whether the experts chosen meet together or not, whether they are guided or not, whether they interact with each other or not. These techniques include the survey, the Delphi technique, the nominal group technique, brainwriting, brainstorming, the Phillips 66 technique, the 6-3-5 technique, the community forum and the community impressions technique. Information provided by key informers through the search for consensus is relevant when this is not available or cannot be obtained by other methods. It has permitted the analysis of the existing neurological care model, elaboration of recommendations on visit times for the out-patient neurological care, and the elaboration of guidelines and recommendations for the management of prevalent neurological problems.

  3. Renyi information gain on quantum key

    International Nuclear Information System (INIS)

    Brandt, Howard E

    2007-01-01

    The concept of maximum Renyi information gain from quantum key is important in eavesdropping and security analyses of quantum key distribution. It is particularly useful in the design optimization of eavesdropping probes. The present work reviews the quantitative measure of Renyi information gain, its optimization, and application to the design of eavesdropping probes in which single-photon probe states become optimally entangled with the signal states on their way between the legitimate transmitter and receiver

  4. Key management schemes using routing information frames in secure wireless sensor networks

    Science.gov (United States)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The article considers the problems and objectives of key management for data encryption in wireless sensor networks (WSN) of SCADA systems. The structure of the key information in the ZigBee network and methods of keys obtaining are discussed. The use of a hybrid key management schemes is most suitable for WSN. The session symmetric key is used to encrypt the sensor data, asymmetric keys are used to encrypt the session key transmitted from the routing information. Three algorithms of hybrid key management using routing information frames determined by routing methods and the WSN topology are presented.

  5. Symmetric Blind Information Reconciliation for Quantum Key Distribution

    International Nuclear Information System (INIS)

    Kiktenko, Evgeniy O.

    2017-01-01

    Quantum key distribution (QKD) is a quantum-proof key-exchange scheme which is fast approaching the communication industry. An essential component in QKD is the information reconciliation step, which is used for correcting the quantum-channel noise errors. The recently suggested blind-reconciliation technique, based on low-density parity-check codes, offers remarkable prospectives for efficient information reconciliation without an a priori quantum bit error rate estimation. We suggest an improvement of the blind-information-reconciliation protocol promoting a significant increase in the efficiency of the procedure and reducing its interactivity. Finally, the proposed technique is based on introducing symmetry in operations of parties, and the consideration of results of unsuccessful belief-propagation decodings.

  6. Securing information using optically generated biometric keys

    Science.gov (United States)

    Verma, Gaurav; Sinha, Aloka

    2016-11-01

    In this paper, we present a new technique to obtain biometric keys by using the fingerprint of a person for an optical image encryption system. The key generation scheme uses the fingerprint biometric information in terms of the amplitude mask (AM) and the phase mask (PM) of the reconstructed fingerprint image that is implemented using the digital holographic technique. Statistical tests have been conducted to check the randomness of the fingerprint PM key that enables its usage as an image encryption key. To explore the utility of the generated biometric keys, an optical image encryption system has been further demonstrated based on the phase retrieval algorithm and the double random phase encoding scheme in which keys for the encryption are used as the AM and the PM key. The advantage associated with the proposed scheme is that the biometric keys’ retrieval requires the simultaneous presence of the fingerprint hologram and the correct knowledge of the reconstruction parameters at the decryption stage, which not only verifies the authenticity of the person but also protects the valuable fingerprint biometric features of the keys. Numerical results are carried out to prove the feasibility and the effectiveness of the proposed encryption system.

  7. Possession divestment by sales in later life.

    Science.gov (United States)

    Ekerdt, David J; Addington, Aislinn

    2015-08-01

    Residential relocation in later life is almost always a downsizing, with many possessions to be divested in a short period of time. This article examines older movers' capacities for selling things, and ways that selling attenuates people's ties to those things, thus accomplishing the human dis-possession of the material convoy. In qualitative interviews in 79 households in the Midwestern United States, older adults reported their experience with possession sales associated with residential relocation. Among this group, three-quarters of the households downsized by selling some belongings. Informal sales seemed the least fraught of all strategies, estate sales had mixed reviews, and garage sales were recalled as laborious. Sellers' efforts were eased by social relations and social networks as helpers and buyers came forward. As selling proceeded, sentiment about possessions waned as their materiality and economic value came to the fore, easing their detachment from the household. Possession selling is challenging because older adults are limited in the knowledge, skills, and efforts that they can apply to the recommodification of their belongings. Selling can nonetheless be encouraged as a divestment strategy as long as the frustrations and drawbacks are transparent, and the goal of ridding is kept in view. Copyright © 2015 Elsevier Inc. All rights reserved.

  8. A Public-key based Information Management Model for Mobile Agents

    OpenAIRE

    Rodriguez, Diego; Sobrado, Igor

    2000-01-01

    Mobile code based computing requires development of protection schemes that allow digital signature and encryption of data collected by the agents in untrusted hosts. These algorithms could not rely on carrying encryption keys if these keys could be stolen or used to counterfeit data by hostile hosts and agents. As a consequence, both information and keys must be protected in a way that only authorized hosts, that is the host that provides information and the server that has sent the mobile a...

  9. Architectural Building A Public Key Infrastructure Integrated Information Space

    Directory of Open Access Journals (Sweden)

    Vadim Ivanovich Korolev

    2015-10-01

    Full Text Available The article keeps under consideration the mattersto apply the cryptographic system having a public key to provide information security and to implya digital signature. It performs the analysis of trust models at the formation of certificates and their use. The article describes the relationships between the trust model and the architecture public key infrastructure. It contains conclusions in respect of the options for building the public key infrastructure for integrated informationspace.

  10. The qualified possession turn into ownership

    Directory of Open Access Journals (Sweden)

    Popov Danica

    2011-01-01

    Full Text Available Possession is prima facie evidence of ownership. Possession is ninetents of the law, means that possession is good against all other, except the true owner. The possession ripens into ownership if it is qualified and by effluxion of time. In Serbian law there are two kinds of adverse possession ripens into ownership. The first one is named ordinary and second one extraordinary adverse possession. Ordinary possession need to be legal, conscientious and genuine. Extraordinary possession is only conscientious, but in a wide sense. Adverse possession destroys the title of the owner and vests it in possessor. An occupation of land inconsistent with the right of the true owner: the possession of those against whom a right action has accured to the true owner. It is actual possession in the absence of possession by the rightful owner and without lawful title. If the adverse possession continues, the effect at the expiration of the prescribed period is that not only the remedy but the title of former owner is extinguished. The person in adverse possession gains a new possessory title which cannot, normally exceed in extent of duration the interest of the former owner.

  11. The Secret Prover : Proving Possession of Arbitrary Files While not Giving Them Away

    NARCIS (Netherlands)

    Teepe, Wouter

    2005-01-01

    The Secret Prover is a Java application which allows a user (A) to prove to another user (B), that A possesses a file. If B also possesses this file B will get convinced, and if B does not possess this file B will gain no information on (the contents of) this file. This is the first implementation

  12. POSSESSION VERSUS POSITION: STRATEGIC EVALUATION IN AFL

    Directory of Open Access Journals (Sweden)

    Darren M. O'Shaughnessy

    2006-12-01

    Full Text Available In sports like Australian Rules football and soccer, teams must battle to achieve possession of the ball in sufficient space to make optimal use of it. Ultimately the teams need to score, and to do that the ball must be brought into the area in front of goal - the place where the defence usually concentrates on shutting down space and opportunity time. Coaches would like to quantify the trade-offs between contested play in good positions and uncontested play in less promising positions, in order to inform their decision-making about where to put their players, and when to gamble on sending the ball to a contest rather than simply maintain possession. To evaluate football strategies, Champion Data has collected the on-ground locations of all 350,000 possessions and stoppages in the past two seasons of AFL (2004, 2005. By following each chain of play through to the next score, we can now reliably estimate the scoreboard "equity" of possessing the ball at any location, and measure the effect of having sufficient time to dispose of it effectively. As expected, winning the ball under physical pressure (through a "hard ball get" is far more difficult to convert into a score than winning it via a mark. We also analyse some equity gradients to show how getting the ball 20 metres closer to goal is much more important in certain areas of the ground than in others. We conclude by looking at the choices faced by players in possession wanting to maximise their likelihood of success

  13. The goalkeeper influence on ball possession effectiveness in futsal

    Directory of Open Access Journals (Sweden)

    Vicente-Vila Pedro

    2016-06-01

    Full Text Available The aim of this study was to identify which variables were the best predictors of success in futsal ball possession when controlling for space and task related indicators, situational variables and the participation of the goalkeeper as a regular field player or not (5 vs. 4 or 4 vs. 4. The sample consisted of 326 situations of ball possession corresponding to 31 matches played by a team from the Spanish Futsal League during the 2010–2011, 2011–2012 and 2012–2013 seasons. Multidimensional qualitative data obtained from 10 ordered categorical variables were used. Data were analysed using chi-square analysis and multiple logistic regression analysis. Overall, the highest ball possession effectiveness was achieved when the goalkeeper participated as a regular field player (p<0.01, the duration of the ball possession was less than 10 s (p<0.01, the ball possession ended in the penalty area (p<0.01 and the defensive pressure was low (p<0.01. The information obtained on the relative effectiveness of offensive playing tactics can be used to improve team’s goal-scoring and goal preventing abilities.

  14. Key diagnostic information for the oncologist

    International Nuclear Information System (INIS)

    Zlatareva, D.

    2012-01-01

    Full text: The radiologists use many modalities for imaging of oncologic patients. In order to get the most out of these imaging studies oncologist have to provide with precise information: what is the working diagnosis, what treatment the patients has had and what is the clinical question should be answered by imaging study. The main indications for imaging are confirmation of diagnosis, evaluation of the patient for surgery or assessment of response to the therapy. These will influence the choice of the test, the protocol and interpretation of the results. Imaging plays a vital role in the management of patients with cancer. It is important not only for diagnosis, indicating sites of abnormality, and guiding biopsies, but it is also crucial in assessing disease extent and thereby determining treatment. The stage of cancer at the time of diagnosis is a key factor to define prognosis and is important element in determining appropriate treatment. The most clinically used cancer staging system is tumor node metastasis (TNM). Stage is determined from information on the tumor, regional nodes, and metastases and by grouping cases with similar prognosis. The criteria for defining anatomic extent of disease are specific for tumors at different anatomic sites and of different histologic types. Therefore, the criteria for T, N and M are defined separately for each tumor and histologic type. For Hodgkin and other lymphomas, a different system for the extent of disease and prognosis is used. It is mandatory for the radiologist to learn TNM system to provide the oncologist with key diagnostic information. Learning objectives: To understand TNM staging system for the most common malignancies To review the changes from the sixth to the seven edition of the American Joint committee on cancer staging manual To describe diagnostic information provided by CT and MRI in preoperative planning and after therapy To discuss the role of PET/CT imaging in oncology

  15. Cost Comparison Among Provable Data Possession Schemes

    Science.gov (United States)

    2016-03-01

    of Acronyms and Abbreviations AE authenticated encryption AWS Amazon Web Services CIO Chief Information Officer DISA Defense Information Systems Agency...the number of possible challenges, H be a cryptographic hash function, AE be an authenticated encryption scheme, f be a keyed pseudo-random function...key kenc R←− Kenc for symmetric encryption scheme Enc, and a random HMAC key kmac R←− Kmac. The secret key is sk = 〈kenc, kmac〉 and public key is pk

  16. Patron Banning in the Nightlife Entertainment Districts: A Key Informant Perspective.

    Science.gov (United States)

    Miller, Peter; Curtis, Ashlee; Palmer, Darren; Warren, Ian; McFarlane, Emma

    2016-07-01

    Alcohol-related harm in and around licensed venues is associated with substantial costs. Many interventions have been introduced in an effort to combat these harms, and one such intervention is known as patron banning. Patron banning involves prohibiting patrons who have been violent or disorderly in a licensed venue in an attempt to reduce alcohol-related harm. It can be implemented by the venue, by members of police, or by liquor accords. This study aimed to obtain key informant perspectives on the benefits of patron banning as well as on the effectiveness of patron banning in reducing alcohol-related harm. Thirty-six key informants provided perspectives on patron banning through in-depth interviews that were part of a larger study. Key informants were supportive of patron banning for reducing alcohol-related harm, noting that it had many benefits including increased venue safety, general risk management, and deterrence of antisocial behavior. Although processes for banning were not always consistent, identification scanners were generally recognized as a way to ensure that patron banning was enforced. Key informants viewed patron banning as an effective measure for increasing patron safety and reducing alcohol-related harms.

  17. The expected value of possession in professional rugby league match-play.

    Science.gov (United States)

    Kempton, Thomas; Kennedy, Nicholas; Coutts, Aaron J

    2016-01-01

    This study estimated the expected point value for starting possessions in different field locations during rugby league match-play and calculated the mean expected points for each subsequent play during the possession. It also examined the origin of tries scored according to the method of gaining possession. Play-by-play data were taken from all 768 regular-season National Rugby League (NRL) matches during 2010-2013. A probabilistic model estimated the expected point outcome based on the net difference in points scored by a team in possession in a given situation. An iterative method was used to approximate the value of each situation based on actual scoring outcomes. Possessions commencing close to the opposition's goal-line had the highest expected point equity, which decreased as the location of the possession moved towards the team's own goal-line. Possessions following an opposition error, penalty or goal-line dropout had the highest likelihood of a try being scored on the set subsequent to their occurrence. In contrast, possessions that follow an opposition completed set or a restart were least likely to result in a try. The expected point values framework from our model has applications for informing playing strategy and assessing individual and team performance in professional rugby league.

  18. World Key Information Service System Designed For EPCOT Center

    Science.gov (United States)

    Kelsey, J. A.

    1984-03-01

    An advanced Bell Laboratories and Western Electric designed electronic information retrieval system utilizing the latest Information Age technologies, and a fiber optic transmission system is featured at the Walt Disney World Resort's newest theme park - The Experimental Prototype Community of Tomorrow (EPCOT Center). The project is an interactive audio, video and text information system that is deployed at key locations within the park. The touch sensitive terminals utilizing the ARIEL (Automatic Retrieval of Information Electronically) System is interconnected by a Western Electric designed and manufactured lightwave transmission system.

  19. Taxation of petroleum companies possessing private information

    International Nuclear Information System (INIS)

    Osmundsen, P.

    1995-01-01

    For countries having petroleum resources, a common objective of the Ministry of Energy is to maximise the net total government take from the petroleum industry. Most models of petroleum taxation, assuming symmetric information, recommended neutral taxation. A royalty is not optimal in this case as it gives disincentives for extraction, causing too much of the reservoir to remain unexploited. Through the operating activities, however, the companies obtain private information about the costs. A low cost company may conceal its information by imitating a high cost company, and must therefore be given an economic compensation (information rent) to be induced to reveal its true costs. An optimal regulatory response to asymmetric information may involve royalties, as these enable the government to capture a larger fraction of the economic rent. 17 refs., 2 figs

  20. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System.

    Science.gov (United States)

    Jung, Jaewook; Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.

  1. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System.

    Directory of Open Access Journals (Sweden)

    Jaewook Jung

    Full Text Available Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.

  2. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System

    Science.gov (United States)

    Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency. PMID:28046075

  3. Multi-party quantum key agreement with five-qubit brown states

    Science.gov (United States)

    Cai, Tao; Jiang, Min; Cao, Gang

    2018-05-01

    In this paper, we propose a multi-party quantum key agreement protocol with five-qubit brown states and single-qubit measurements. Our multi-party protocol ensures each participant to contribute equally to the agreement key. Each party performs three single-qubit unitary operations on three qubits of each brown state. Finally, by measuring brown states and decoding the measurement results, all participants can negotiate a shared secret key without classical bits exchange between them. With the analysis of security, our protocol demonstrates that it can resist against both outsider and participant attacks. Compared with other schemes, it also possesses a higher information efficiency. In terms of physical operation, it requires single-qubit measurements only which weakens the hardware requirements of participant and has a better operating flexibility.

  4. Simple group password-based authenticated key agreements for the integrated EPR information system.

    Science.gov (United States)

    Lee, Tian-Fu; Chang, I-Pin; Wang, Ching-Cheng

    2013-04-01

    The security and privacy are important issues for electronic patient records (EPRs). The goal of EPRs is sharing the patients' medical histories such as the diagnosis records, reports and diagnosis image files among hospitals by the Internet. So the security issue for the integrated EPR information system is essential. That is, to ensure the information during transmission through by the Internet is secure and private. The group password-based authenticated key agreement (GPAKE) allows a group of users like doctors, nurses and patients to establish a common session key by using password authentication. Then the group of users can securely communicate by using this session key. Many approaches about GAPKE employ the public key infrastructure (PKI) in order to have higher security. However, it not only increases users' overheads and requires keeping an extra equipment for storing long-term secret keys, but also requires maintaining the public key system. This investigation presents a simple group password-based authenticated key agreement (SGPAKE) protocol for the integrated EPR information system. The proposed SGPAKE protocol does not require using the server or users' public keys. Each user only remembers his weak password shared with a trusted server, and then can obtain a common session key. Then all users can securely communicate by using this session key. The proposed SGPAKE protocol not only provides users with convince, but also has higher security.

  5. A Symmetric Key Cryptographic Technique Through Swapping Bits in Binary Field Using p-Box Matrix

    OpenAIRE

    Subhranil Som; Soumasree Banerjee

    2014-01-01

    In this paper a symmetric key cryptographic algorithm named as “A Symmetric Key Cryptographic Technique Through Swapping Bits in Binary Field Using p-box Matrix“ is proposed. Secret sharing is a technique by which any information can be break down into small pieces. The secret can be reconstructed only when a sufficient number of pieces of shares are combined together; individual shares are of no use on their own. Traditional secret sharing scheme possesses high computational ...

  6. Information Security Governanceas as Key Performance Indicator for Financial Institutions

    OpenAIRE

    Krjukovs, D; Strauss, R

    2009-01-01

    Due to their nature financial institutions and their performance are in constant focus of attention from different stakeholder groups. These groups according to their functions and interests are implementing different sets of key performance indicators for financial institution performance assessment. In the proposed paper authors present a hypothesis of information security governance being a financial institution key performance indicator. Authors provide high level overview of ...

  7. Information security system based on virtual-optics imaging methodology and public key infrastructure

    Science.gov (United States)

    Peng, Xiang; Zhang, Peng; Cai, Lilong

    In this paper, we present a virtual-optical based information security system model with the aid of public-key-infrastructure (PKI) techniques. The proposed model employs a hybrid architecture in which our previously published encryption algorithm based on virtual-optics imaging methodology (VOIM) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). For an asymmetric system, given an encryption key, it is computationally infeasible to determine the decryption key and vice versa. The whole information security model is run under the framework of PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOIM security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network.

  8. Key Health Information Technologies and Related Issues for Iran: A Qualitative Study.

    Science.gov (United States)

    Hemmat, Morteza; Ayatollahi, Haleh; Maleki, Mohammadreza; Saghafi, Fatemeh

    2018-01-01

    Planning for the future of Health Information Technology (HIT) requires applying a systematic approach when conducting foresight studies. The aim of this study was to identify key health information technologies and related issues for Iran until 2025. This was a qualitative study and the participants included experts and policy makers in the field of health information technology. In-depth semi-structured interviews were conducted and data were analyzed by using framework analysis and MAXQDA software. The findings revealed that the development of national health information network, electronic health records, patient health records, a cloud-based service center, interoperability standards, patient monitoring technologies, telehealth, mhealth, clinical decision support systems, health information technology and mhealth infrastructure were found to be the key technologies for the future. These technologies could influence the economic, organizational and individual levels. To achieve them, the economic and organizational obstacles need to be overcome. In this study, a number of key technologies and related issues were identified. This approach can help to focus on the most important technologies in the future and to priorities these technologies for better resource allocation and policy making.

  9. Building Successful Information Systems – a Key for Successful Organization

    Directory of Open Access Journals (Sweden)

    Doina ROSCA

    2010-12-01

    Full Text Available Building Successful Information Systems – a Key for Successful OrganizationAbstract: An Information System (IS can have a major impact on corporate strategy and organizational success. The involvement of managers and decision makers in all aspects of information systems is a major factor for organizational success, including higher profits and lower costs. Some of the benefits business organization seek to achieve through information systems include: better safety, competitive advantage, fewer errors, greater accuracy, higher quality products, improved communications, increased efficiency and productivity, more efficient administration, superior financial and managerial decision making.

  10. From distress to disease: a critique of the medicalisation of possession in DSM-5.

    Science.gov (United States)

    Padmanabhan, Divya

    2017-12-01

    This paper critiques the category of possession-form dissociative identity disorder as defined in the Diagnostic and Statistical Manual of Mental Disorders 5 (DSM-5) published in 2013 by the American Psychiatric Association (APA). The DSM as an index of psychiatry pathologises possession by categorising it as a form of dissociative identity disorder. Drawing upon ethnographic fieldwork, this paper argues that such a pathologisation medicalises possession, which is understood as a non-pathological condition in other contexts such as by those individuals who manifest possession at a temple in Kerala, South India. Through medicalising and further by creating distinctions between acceptable and pathological possession, the DSM converts a form of distress into a disease. This has both conceptual and pragmatic implications. The temple therefore becomes reduced to a culturally acceptable site for the manifestation of a mental illness in a form that is culturally available and possession is explained solely through a biomedical framework, denying alternative conceptualisations and theories which inform possession. By focussing on the DSM-5 classification of possession and the limitations of such a classification, this paper seeks to posit an alternative conceptualisation of possession by engaging with three primary areas which are significant in the DSM categorisation of possession: the DSM's conceptualisation of self in the singular, the distinction between pathological and non-pathological forms of possession, and the limitations of the DSM's equation of the condition of possession with the manifestation of possession. Finally, the paper briefly highlights alternative conceptualisations of possession, which emerged from the perspective of those seeking to heal possession at the Chottanikkara temple.

  11. Efficient biometric authenticated key agreements based on extended chaotic maps for telecare medicine information systems.

    Science.gov (United States)

    Lou, Der-Chyuan; Lee, Tian-Fu; Lin, Tsung-Hung

    2015-05-01

    Authenticated key agreements for telecare medicine information systems provide patients, doctors, nurses and health visitors with accessing medical information systems and getting remote services efficiently and conveniently through an open network. In order to have higher security, many authenticated key agreement schemes appended biometric keys to realize identification except for using passwords and smartcards. Due to too many transmissions and computational costs, these authenticated key agreement schemes are inefficient in communication and computation. This investigation develops two secure and efficient authenticated key agreement schemes for telecare medicine information systems by using biometric key and extended chaotic maps. One scheme is synchronization-based, while the other nonce-based. Compared to related approaches, the proposed schemes not only retain the same security properties with previous schemes, but also provide users with privacy protection and have fewer transmissions and lower computational cost.

  12. E-Skill Information Acquisition Software: A Key to Poverty Alleviation ...

    African Journals Online (AJOL)

    E-Skill Information Acquisition Software: A Key to Poverty Alleviation Or Self Reliance. ... has not helped matters. This project is about developing an e-skill transfer using software. ... Full Text: EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT

  13. Predicative possession in Medieval Slavic Bible translations Predicative Possession in Early Biblical Slavic

    Directory of Open Access Journals (Sweden)

    Julia McAnallen

    2011-08-01

    Full Text Available Late Proto-Slavic (LPS had an inventory of three constructions for expressing predicative possession. Using the earliest Slavic Bible translations from Old Church Slavic (OCS, and to a lesser degree Old Czech, a number of conclusions can be drawn about the status of predicative possession for LPS. The verb iměti ‘have’ was the most frequent and least syntactically and semantically restricted predicative possessive construction (PPC. Existential PPCs with a dative possessor appear primarily with kinship relations, abstract possessums, and in a number of other fixed construction types; existential PPCs with the possessor in an u + genitive prepositional phrase primarily appear with concrete and countable possessums. Both existential PPCs call for an animate, most often pronominal, possessor. The u + genitive was the rarest type of PPC in LPS, though it had undoubtedly grammaticalized as a PPC.

  14. Virtual-optical information security system based on public key infrastructure

    Science.gov (United States)

    Peng, Xiang; Zhang, Peng; Cai, Lilong; Niu, Hanben

    2005-01-01

    A virtual-optical based encryption model with the aid of public key infrastructure (PKI) is presented in this paper. The proposed model employs a hybrid architecture in which our previously published encryption method based on virtual-optics scheme (VOS) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). The whole information security model is run under the framework of international standard ITU-T X.509 PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOS security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network. Numerical experiments prove the effectiveness of the method. The security of proposed model is briefly analyzed by examining some possible attacks from the viewpoint of a cryptanalysis.

  15. The protection of possession

    Directory of Open Access Journals (Sweden)

    Popov Danica

    2011-01-01

    Full Text Available Protection in disputes for the protection of possession can be attained through the following actions a for dispossession (interdictum recuperande possessionis and b with an action for the disturbance of possession (interdictum retinendae possessionis. The general feature of these disputes is that there is only discussion on the facts and not a legal matters. Subject matter jurisdiction for the resolution of such disputes belongs to the court of general jurisdiction, while the dispute itself is a litigation. The special rule of proceedings of action for disturbance are: provisionality of the protection of possession; urgency in proceedings; initiation of the proceedings; limiting of objection; prescribing temporary measures; rendering a ruling in the form of order; appeals which may be filed within a short deadline and which does not have suspensive effect (do not delay the execution of the order; revision is not allowed etc.

  16. Business intelligence key to success in the information age

    Directory of Open Access Journals (Sweden)

    Helmer Muñoz-Hernández

    2017-02-01

    Full Text Available This article aims to describe and classify in a more concrete way information systems, which are framed in what is properly called as "business intelligence". It begins analyzing each of the basic concepts and theoretical aspects and then detail in shaping transactional systems and the most important strategic systems including their benefits, their modes of use, and its disadvantages; It reflects on some cases actually exposed business globally, and the impact it has had the adoption of information systems in its corporate strategy as a key competitive advantages achieving considerable success. Finally, it concludes by describing the importance that has had the implementation of at least some of these information systems in strategic planning of organizations, especially in Colombia and Latin America.

  17. Investigating the Impact of Possession-Way of a Smartphone on Action Recognition

    Directory of Open Access Journals (Sweden)

    Zae Myung Kim

    2016-06-01

    Full Text Available For the past few decades, action recognition has been attracting many researchers due to its wide use in a variety of applications. Especially with the increasing number of smartphone users, many studies have been conducted using sensors within a smartphone. However, a lot of these studies assume that the users carry the device in specific ways such as by hand, in a pocket, in a bag, etc. This paper investigates the impact of providing an action recognition system with the information of the possession-way of a smartphone, and vice versa. The experimental dataset consists of five possession-ways (hand, backpack, upper-pocket, lower-pocket, and shoulder-bag and two actions (walking and running gathered by seven users separately. Various machine learning models including recurrent neural network architectures are employed to explore the relationship between the action recognition and the possession-way recognition. The experimental results show that the assumption of possession-ways of smartphones do affect the performance of action recognition, and vice versa. The results also reveal that a good performance is achieved when both actions and possession-ways are recognized simultaneously.

  18. POSSESSION, REVIEW FROM CULTURAL AND PSYCHIATRY

    Directory of Open Access Journals (Sweden)

    Ni Ketut Sri Diniari

    2013-03-01

    Full Text Available Possession is a culture related syndrome, commonly found in Indonesia including Bali. We can see this event in religion and cultural ceremony and at other times at school, home, and in society. This syndrome consist of temporary loss of self identification and environment awareness; in several events a person acts as if he/she was controlled by other being, magic force, spirit or ‘other forces’. There are still several different opinions about trance-possession, whether it is related to certain culture or is a part of mental disorder. DSM-IV-TR and PPDGJ-III defined trance-possession as mental disorder (dissociative for involuntary possession, if it is not a common activity, and if it is not a part of religion or cultural event. (MEDICINA 2012;43:37-40.

  19. Cooperative Secret Sharing Using QR Codes and Symmetric Keys

    Directory of Open Access Journals (Sweden)

    Yang-Wai Chow

    2018-04-01

    Full Text Available Secret sharing is an information security technique where a dealer divides a secret into a collection of shares and distributes these to members of a group. The secret will only be revealed when a predefined number of group members cooperate to recover the secret. The purpose of this study is to investigate a method of distributing shares by embedding them into cover Quick Response (QR codes in a secure manner using cryptographic keys. The advantage of this approach is that the shares can be disseminated over public channels, as anyone who scans the QR codes will only obtain public information. Only authorized individuals who are in possession of the required keys will be able to recover the shares. This also means that when group members cooperate to recover a secret, the group can determine the presence of an illegitimate participant if the person does not produce a valid share. This study proposes a protocol for accomplishing this and discusses the underlying security of the protocol.

  20. Information hiding based on double random-phase encoding and public-key cryptography.

    Science.gov (United States)

    Sheng, Yuan; Xin, Zhou; Alam, Mohammed S; Xi, Lu; Xiao-Feng, Li

    2009-03-02

    A novel information hiding method based on double random-phase encoding (DRPE) and Rivest-Shamir-Adleman (RSA) public-key cryptosystem is proposed. In the proposed technique, the inherent diffusion property of DRPE is cleverly utilized to make up the diffusion insufficiency of RSA public-key cryptography, while the RSA cryptosystem is utilized for simultaneous transmission of the cipher text and the two phase-masks, which is not possible under the DRPE technique. This technique combines the complementary advantages of the DPRE and RSA encryption techniques and brings security and convenience for efficient information transmission. Extensive numerical simulation results are presented to verify the performance of the proposed technique.

  1. Individual ball possession in soccer.

    Directory of Open Access Journals (Sweden)

    Daniel Link

    Full Text Available This paper describes models for detecting individual and team ball possession in soccer based on position data. The types of ball possession are classified as Individual Ball Possession (IBC, Individual Ball Action (IBA, Individual Ball Control (IBC, Team Ball Possession (TBP, Team Ball Control (TBC und Team Playmaking (TPM according to different starting points and endpoints and the type of ball control involved. The machine learning approach used is able to determine how long the ball spends in the sphere of influence of a player based on the distance between the players and the ball together with their direction of motion, speed and the acceleration of the ball. The degree of ball control exhibited during this phase is classified based on the spatio-temporal configuration of the player controlling the ball, the ball itself and opposing players using a Bayesian network. The evaluation and application of this approach uses data from 60 matches in the German Bundesliga season of 2013/14, including 69,667 IBA intervals. The identification rate was F = .88 for IBA and F = .83 for IBP, and the classification rate for IBC was κ = .67. Match analysis showed the following mean values per match: TBP 56:04 ± 5:12 min, TPM 50:01 ± 7:05 min and TBC 17:49 ± 8:13 min. There were 836 ± 424 IBC intervals per match and their number was significantly reduced by -5.1% from the 1st to 2nd half. The analysis of ball possession at the player level indicates shortest accumulated IBC times for the central forwards (0:49 ± 0:43 min and the longest for goalkeepers (1:38 ± 0:58 min, central defenders (1:38 ± 1:09 min and central midfielders (1:27 ± 1:08 min. The results could improve performance analysis in soccer, help to detect match events automatically, and allow discernment of higher value tactical structures, which is based on individual ball possession.

  2. 50 CFR 20.38 - Possession of live birds.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 6 2010-10-01 2010-10-01 false Possession of live birds. 20.38 Section 20... WILDLIFE AND PLANTS (CONTINUED) MIGRATORY BIRD HUNTING Possession § 20.38 Possession of live birds. Every migratory game bird wounded by hunting and reduced to possession by the hunter shall be immediately killed...

  3. Characteristics of evolving models of care for arthritis: A key informant study

    Directory of Open Access Journals (Sweden)

    Veinot Paula

    2008-07-01

    Full Text Available Abstract Background The burden of arthritis is increasing in the face of diminishing health human resources to deliver care. In response, innovative models of care delivery are developing to facilitate access to quality care. Most models have developed in response to local needs with limited evaluation. The primary objective of this study is to a examine the range of models of care that deliver specialist services using a medical/surgical specialist and at least one other health care provider and b document the strengths and challenges of the identified models. A secondary objective is to identify key elements of best practice models of care for arthritis. Methods Semi-structured interviews were conducted with a sample of key informants with expertise in arthritis from jurisdictions with primarily publicly-funded health care systems. Qualitative data were analyzed using a constant comparative approach to identify common types of models of care, strengths and challenges of models, and key components of arthritis care. Results Seventy-four key informants were interviewed from six countries. Five main types of models of care emerged. 1 Specialized arthritis programs deliver comprehensive, multidisciplinary team care for arthritis. Two models were identified using health care providers (e.g. nurses or physiotherapists in expanded clinical roles: 2 triage of patients with musculoskeletal conditions to the appropriate services including specialists; and 3 ongoing management in collaboration with a specialist. Two models promoting rural access were 4 rural consultation support and 5 telemedicine. Key informants described important components of models of care including knowledgeable health professionals and patients. Conclusion A range of models of care for arthritis have been developed. This classification can be used as a framework for discussing care delivery. Areas for development include integration of care across the continuum, including primary

  4. Information Systems Management: an Australian view of the key issues

    Directory of Open Access Journals (Sweden)

    Graham Pervan

    1994-05-01

    Full Text Available Studies investigating the key issues in IS management serve to better understand the concerns of IS managers and help to guide IS researchers in choosing IS management problems worthy of investigation. This paper presents results from a study of the key issues facing the IS managers of Australia's largest 300 organisations which is part of a three-yearly longitudinal study. In order to gain consensus on the relative importance of the key issues, a three-round Delphi method was applied. The results reveal that IS strategic planning continues to be the paramount issue in our industry, as are many issues associated with IS strategic planning, including responsiveness of the IT infrastructure, effective use of the data resource, IS for competitive advantage, and a comprehensive information architecture. A greater emphasis on quality is also revealed in highly rated issues such as effective use of the data resource, data integrity and quality assurance, and the quality of software development

  5. 50 CFR 648.164 - Possession restrictions.

    Science.gov (United States)

    2010-10-01

    ... Atlantic Bluefish Fishery § 648.164 Possession restrictions. (a) No person shall possess more than 15 bluefish in, or harvested from, the EEZ unless that person is the owner or operator of a fishing vessel issued a bluefish commercial permit or is issued a bluefish dealer permit. Persons aboard a vessel that...

  6. An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems.

    Science.gov (United States)

    Lee, Tian-Fu

    2013-12-01

    A smartcard-based authentication and key agreement scheme for telecare medicine information systems enables patients, doctors, nurses and health visitors to use smartcards for secure login to medical information systems. Authorized users can then efficiently access remote services provided by the medicine information systems through public networks. Guo and Chang recently improved the efficiency of a smartcard authentication and key agreement scheme by using chaotic maps. Later, Hao et al. reported that the scheme developed by Guo and Chang had two weaknesses: inability to provide anonymity and inefficient double secrets. Therefore, Hao et al. proposed an authentication scheme for telecare medicine information systems that solved these weaknesses and improved performance. However, a limitation in both schemes is their violation of the contributory property of key agreements. This investigation discusses these weaknesses and proposes a new smartcard-based authentication and key agreement scheme that uses chaotic maps for telecare medicine information systems. Compared to conventional schemes, the proposed scheme provides fewer weaknesses, better security, and more efficiency.

  7. Possession States: Approaches to Clinical Evaluation and Classification

    Directory of Open Access Journals (Sweden)

    S. McCormick

    1992-01-01

    Full Text Available The fields of anthropology and sociology have produced a large quantity of literature on possession states, physicians however rarely report on such phenomena. As a result clinical description of possession states has suffered, even though these states may be more common and less deviant than supposed. Both ICD-10 and DSM-IV may include specific criteria for possession disorders. The authors briefly review Western notions about possession and kindred states and present guidelines for evaluation and classification.

  8. AIS as key component in modern vessel traffic management and information systems

    Energy Technology Data Exchange (ETDEWEB)

    Lamers, W. [DaimlerChrysler Aerospace AG (DASA), Ulm (Germany)

    1999-07-01

    The objective of this paper is to provide information in respect to universal shipborne identification system (UAIS) as main sensor in various vessel traffic applications. The presented paper will give general information concerning AIS functionality and the standardisation process. Based on experience from recent projects and various IALA working group activities, a typical future VTMIS architectures is also presented being based on AIS as key sensor. The required key performance of AIS associated with the HW components will be described. The results from European technology study Indris are presented and discussed. Finally, a summary and conclusion from the presented material will complete the technical paper. The elaboration of this presentation has been carried out as a joint task between Mr. Andre van Berg, MDS Suedafrika und Mr. Walter Lamers, DASA Ulm. (orig.)

  9. Information-theoretic security proof for quantum-key-distribution protocols

    International Nuclear Information System (INIS)

    Renner, Renato; Gisin, Nicolas; Kraus, Barbara

    2005-01-01

    We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement purification scheme can be found. Using this technique, we investigate a general class of QKD protocols with one-way classical post-processing. We show that, in order to analyze the full security of these protocols, it suffices to consider collective attacks. Indeed, we give new lower and upper bounds on the secret-key rate which only involve entropies of two-qubit density operators and which are thus easy to compute. As an illustration of our results, we analyze the Bennett-Brassard 1984, the six-state, and the Bennett 1992 protocols with one-way error correction and privacy amplification. Surprisingly, the performance of these protocols is increased if one of the parties adds noise to the measurement data before the error correction. In particular, this additional noise makes the protocols more robust against noise in the quantum channel

  10. Information-theoretic security proof for quantum-key-distribution protocols

    Science.gov (United States)

    Renner, Renato; Gisin, Nicolas; Kraus, Barbara

    2005-07-01

    We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement purification scheme can be found. Using this technique, we investigate a general class of QKD protocols with one-way classical post-processing. We show that, in order to analyze the full security of these protocols, it suffices to consider collective attacks. Indeed, we give new lower and upper bounds on the secret-key rate which only involve entropies of two-qubit density operators and which are thus easy to compute. As an illustration of our results, we analyze the Bennett-Brassard 1984, the six-state, and the Bennett 1992 protocols with one-way error correction and privacy amplification. Surprisingly, the performance of these protocols is increased if one of the parties adds noise to the measurement data before the error correction. In particular, this additional noise makes the protocols more robust against noise in the quantum channel.

  11. The core business web a guide to key information resources

    CERN Document Server

    White, Gary W

    2013-01-01

    The best Business Web sites at your fingertips—24/7! The Core Business Web: A Guide to Key Information Resources is an essential resource that saves you from spending hours searching through thousands of Web sites for the business information you need. A distinguished panel of authors, all active in business librarianship, explores Web sites in their subject areas, selecting the very best from 25 functional areas of business. Each site was chosen based on the timeliness, relevance and reliability of its content, the site's ease of navigation and use, and the authority of the site's author or publisher. The rapid growth of the Internet has resulted in an ever-increasing number of Web sites offering potentially useful business information. The Core Business Web identifies, evaluates, and summarizes the most significant sites, including gateways or portals, directories, and meta-sites, to organize online resources into easy-to-follow links that allow you to access information quickly. Sites are categorized and ...

  12. Predicting Key Events in the Popularity Evolution of Online Information.

    Science.gov (United States)

    Hu, Ying; Hu, Changjun; Fu, Shushen; Fang, Mingzhe; Xu, Wenwen

    2017-01-01

    The popularity of online information generally experiences a rising and falling evolution. This paper considers the "burst", "peak", and "fade" key events together as a representative summary of popularity evolution. We propose a novel prediction task-predicting when popularity undergoes these key events. It is of great importance to know when these three key events occur, because doing so helps recommendation systems, online marketing, and containment of rumors. However, it is very challenging to solve this new prediction task due to two issues. First, popularity evolution has high variation and can follow various patterns, so how can we identify "burst", "peak", and "fade" in different patterns of popularity evolution? Second, these events usually occur in a very short time, so how can we accurately yet promptly predict them? In this paper we address these two issues. To handle the first one, we use a simple moving average to smooth variation, and then a universal method is presented for different patterns to identify the key events in popularity evolution. To deal with the second one, we extract different types of features that may have an impact on the key events, and then a correlation analysis is conducted in the feature selection step to remove irrelevant and redundant features. The remaining features are used to train a machine learning model. The feature selection step improves prediction accuracy, and in order to emphasize prediction promptness, we design a new evaluation metric which considers both accuracy and promptness to evaluate our prediction task. Experimental and comparative results show the superiority of our prediction solution.

  13. Predicting Key Events in the Popularity Evolution of Online Information.

    Directory of Open Access Journals (Sweden)

    Ying Hu

    Full Text Available The popularity of online information generally experiences a rising and falling evolution. This paper considers the "burst", "peak", and "fade" key events together as a representative summary of popularity evolution. We propose a novel prediction task-predicting when popularity undergoes these key events. It is of great importance to know when these three key events occur, because doing so helps recommendation systems, online marketing, and containment of rumors. However, it is very challenging to solve this new prediction task due to two issues. First, popularity evolution has high variation and can follow various patterns, so how can we identify "burst", "peak", and "fade" in different patterns of popularity evolution? Second, these events usually occur in a very short time, so how can we accurately yet promptly predict them? In this paper we address these two issues. To handle the first one, we use a simple moving average to smooth variation, and then a universal method is presented for different patterns to identify the key events in popularity evolution. To deal with the second one, we extract different types of features that may have an impact on the key events, and then a correlation analysis is conducted in the feature selection step to remove irrelevant and redundant features. The remaining features are used to train a machine learning model. The feature selection step improves prediction accuracy, and in order to emphasize prediction promptness, we design a new evaluation metric which considers both accuracy and promptness to evaluate our prediction task. Experimental and comparative results show the superiority of our prediction solution.

  14. COST ACCOUNTING AS THE KEY INFORMATION CORE OF THE COMPANY MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Radmila Jablan STEFANOVIĆ

    2010-12-01

    Full Text Available The management is expected to lead the company towards the achievement of set objectives which, in the contemporary settings of marked external and internal complexity, inevitably requires sophisticated expert knowledge and skills, as well as quality information support. Cost accounting generates cost and performance information with the goal of qualitatively meeting information needs of, above all, internal users. It represents the essential part of the company’s accounting information system as a whole and it is often stressed as the key information core and a reliable information support for the company’s management in performing their managerial activities. The contemporary business environment inevitably requires the restructuring of cost accounting and new approaches to costing and cost management, in the attempt to improve the quality of cost information that has always been the object of particular interest. Moreover, only a flexibly designed cost accounting information system can qualitatively respond to the increasingly numerous and various information requirements. In this paper we discuss the role cost accounting has in offering adequate information support to managers at all managerial levels. We emphasize some of the new tools, techniques, concepts and approaches to costing and cost management

  15. The construction of a public key infrastructure for healthcare information networks in Japan.

    Science.gov (United States)

    Sakamoto, N

    2001-01-01

    The digital signature is a key technology in the forthcoming Internet society for electronic healthcare as well as for electronic commerce. Efficient exchanges of authorized information with a digital signature in healthcare information networks require a construction of a public key infrastructure (PKI). In order to introduce a PKI to healthcare information networks in Japan, we proposed a development of a user authentication system based on a PKI for user management, user authentication and privilege management of healthcare information systems. In this paper, we describe the design of the user authentication system and its implementation. The user authentication system provides a certification authority service and a privilege management service while it is comprised of a user authentication client and user authentication serves. It is designed on a basis of an X.509 PKI and is implemented with using OpenSSL and OpenLDAP. It was incorporated into the financial information management system for the national university hospitals and has been successfully working for about one year. The hospitals plan to use it as a user authentication method for their whole healthcare information systems. One implementation of the system is free to the national university hospitals with permission of the Japanese Ministry of Education, Culture, Sports, Science and Technology. Another implementation is open to the other healthcare institutes by support of the Medical Information System Development Center (MEDIS-DC). We are moving forward to a nation-wide construction of a PKI for healthcare information networks based on it.

  16. Towards optimised information about clinical trials; identification and validation of key issues in collaboration with cancer patient advocates

    DEFF Research Database (Denmark)

    Dellson, P; Nilbert, M; Bendahl, P-O

    2011-01-01

    for improvements, 21 key issues were defined and validated through a questionnaire in an independent group of breast cancer patient advocates. Clear messages, emotionally neutral expressions, careful descriptions of side effects, clear comparisons between different treatment alternatives and information about......Clinical trials are crucial to improve cancer treatment but recruitment is difficult. Optimised patient information has been recognised as a key issue. In line with the increasing focus on patients' perspectives in health care, we aimed to study patients' opinions about the written information used...... the possibility to discontinue treatment were perceived as the most important issues. Patients' views of the information in clinical trials provide new insights and identify key issues to consider in optimising future written information and may improve recruitment to clinical cancer trials....

  17. Some Key Technologies of Geospatial Information System for China Water Census

    Directory of Open Access Journals (Sweden)

    CAI Yang

    2015-05-01

    Full Text Available We have pioneered research on geospatial information system for national water census and its application. Aiming to the main issues such as information obtaining, data management, quality control, and project organization, the overall thought is given. It is based on taking fundamental data as supporting and data model as precursor, and viewing intelligent tool as protective role, and combing the management theory with technical methods. The key techniques developed include the digital basin extraction, data modeling orienting to the object of water resources, data acquisition and processing within certain rules and the application of multidimensional theme.

  18. Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho

    2017-03-21

    At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al's method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration.

  19. Public Key Encryption Supporting Plaintext Equality Test and User-Specified Authorization

    NARCIS (Netherlands)

    Tang, Qiang

    2011-01-01

    In this paper we investigate a category of public key encryption schemes which supports plaintext equality test and user-specified authorization. With this new primitive, two users, who possess their own public/private key pairs, can issue token(s) to a proxy to authorize it to perform plaintext

  20. Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems.

    Science.gov (United States)

    Mishra, Dheerendra

    2015-03-01

    Smart card based authentication and key agreement schemes for telecare medicine information systems (TMIS) enable doctors, nurses, patients and health visitors to use smart cards for secure login to medical information systems. In recent years, several authentication and key agreement schemes have been proposed to present secure and efficient solution for TMIS. Most of the existing authentication schemes for TMIS have either higher computation overhead or are vulnerable to attacks. To reduce the computational overhead and enhance the security, Lee recently proposed an authentication and key agreement scheme using chaotic maps for TMIS. Xu et al. also proposed a password based authentication and key agreement scheme for TMIS using elliptic curve cryptography. Both the schemes provide better efficiency from the conventional public key cryptography based schemes. These schemes are important as they present an efficient solution for TMIS. We analyze the security of both Lee's scheme and Xu et al.'s schemes. Unfortunately, we identify that both the schemes are vulnerable to denial of service attack. To understand the security failures of these cryptographic schemes which are the key of patching existing schemes and designing future schemes, we demonstrate the security loopholes of Lee's scheme and Xu et al.'s scheme in this paper.

  1. 22 CFR 72.14 - Nominal possession; property not normally taken into physical possession.

    Science.gov (United States)

    2010-04-01

    ... possession. (a) When a consular officer take articles of a decedent's personal property from a foreign... Department discharging the consular officer of any responsibility for the articles transferred. (b) A... effects; (2) Motor vehicles, airplanes or watercraft; (3) Toiletries, such as toothpaste or razors; (4...

  2. Possessive Pronouns in European Portuguese and Old French

    Directory of Open Access Journals (Sweden)

    Matilde Miguel

    2002-12-01

    Full Text Available The aim of this paper is to bring European Portuguese (EP data into light, showing that, in spite of the lack of morphological evidence, the syntactic behaviour of possessives, across EP dialects, shows evidences for a tripartite possessive system (Cardinaletti, 1998; Cardinaletti & Starke, 1999. It will be argued that the syntactic position of possessives parallels the positions assumed for EP sentential subjects in non interrogative contexts: [Spec, AgrsP], [Spec, TP] and [Spec, VP]. As a matter of fact, depending on their syntactic properties and assuming, as null hypothesis, that the nominal head moves to Numb'º', possessives may occur in [Spec, AgrsNP], [Spec, NumbP] and [Spec, NP]. Furthermore, would it be so, this dialectal variation would be useful in order to understand the changes that have occurred in other romance languages in previous stages. It might be the case that the loss of weak possessive forms (“mien” in French parallels, among other things, the lack of sentential subjects in [Spec, TP].

  3. Information analysis of iris biometrics for the needs of cryptology key extraction

    Directory of Open Access Journals (Sweden)

    Adamović Saša

    2013-01-01

    Full Text Available The paper presents a rigorous analysis of iris biometric information for the synthesis of an optimized system for the extraction of a high quality cryptology key. Estimations of local entropy and mutual information were identified as segments of the iris most suitable for this purpose. In order to optimize parameters, corresponding wavelets were transformed, in order to obtain the highest possible entropy and mutual information lower in the transformation domain, which set frameworks for the synthesis of systems for the extraction of truly random sequences of iris biometrics, without compromising authentication properties. [Projekat Ministarstva nauke Republike Srbije, br. TR32054 i br. III44006

  4. LEGAL SIGNIFICANCE AND PROTECTION OF POSSESSION IN THE REPUBLIC OF MACEDONIA

    Directory of Open Access Journals (Sweden)

    Vojo Belovski

    2015-04-01

    Full Text Available In this paper it will be discussed the legal significance and protection of possession in the Republic of Macedonia. Below it will be listed the kinds of possession, and finally the rules for possession termination will be explained. The possession is an indicator that the person who rules one item is also a right holder of that item. The possession itself occurs in two types specially authorized by a law and pure factual power behind which stands no right. The possession enjoys legal protection. Below in the paper it is processed the judicial protection of the possession which is given based on complaint for disturbance of possession and action to recover the possession. The important thing at the judicial protection is that the rulers’ protection is given to the last actual possession of the item, but it is not disputed the right of possession. Further in this paper it is included the protection of indirect possession where a complaint can be made by the indirect holder of the item, the judicial protection of possessory, possession protection of the heirs and permitted self – help for unauthorized harassment and revoking of the possession. With respect to the termination of the actual power of the item, listed and processed are the ways when the item failed, when the item was lost, when it is obvious that it won’t be returned, when the ruler had freely left it and when the item is not taken from him and the ruler hasn’t realized the right to possession.

  5. The epistemological significance of possession entering the DSM.

    Science.gov (United States)

    Stephenson, Craig

    2015-09-01

    The discourse of the American Psychiatric Association's DSM reflects the inherently dialogic or contradictory nature of its stated mandate to demonstrate both 'nosological completeness' and cultural 'inclusiveness'. Psychiatry employs the dialogic discourse of the DSM in a one-sided, positivistic manner by identifying what it considers universal mental disease entities stripped of their cultural context. In 1992 the editors of the Diagnostic and Statistical Manual of Mental Disorders proposed to introduce possession into their revisions. A survey of the discussions about introducing 'possession' as a dissociative disorder to be listed in the DSM-IV indicates a missed epistemological break. Subsequently the editors of the DSM-5 politically 'recuperated' possession into its official discourse, without acknowledging the anarchic challenges that possession presents to psychiatry as a cultural practice. © The Author(s) 2015.

  6. Stakeholder engagement: a key component of integrating genomic information into electronic health records.

    Science.gov (United States)

    Hartzler, Andrea; McCarty, Catherine A; Rasmussen, Luke V; Williams, Marc S; Brilliant, Murray; Bowton, Erica A; Clayton, Ellen Wright; Faucett, William A; Ferryman, Kadija; Field, Julie R; Fullerton, Stephanie M; Horowitz, Carol R; Koenig, Barbara A; McCormick, Jennifer B; Ralston, James D; Sanderson, Saskia C; Smith, Maureen E; Trinidad, Susan Brown

    2013-10-01

    Integrating genomic information into clinical care and the electronic health record can facilitate personalized medicine through genetically guided clinical decision support. Stakeholder involvement is critical to the success of these implementation efforts. Prior work on implementation of clinical information systems provides broad guidance to inform effective engagement strategies. We add to this evidence-based recommendations that are specific to issues at the intersection of genomics and the electronic health record. We describe stakeholder engagement strategies employed by the Electronic Medical Records and Genomics Network, a national consortium of US research institutions funded by the National Human Genome Research Institute to develop, disseminate, and apply approaches that combine genomic and electronic health record data. Through select examples drawn from sites of the Electronic Medical Records and Genomics Network, we illustrate a continuum of engagement strategies to inform genomic integration into commercial and homegrown electronic health records across a range of health-care settings. We frame engagement as activities to consult, involve, and partner with key stakeholder groups throughout specific phases of health information technology implementation. Our aim is to provide insights into engagement strategies to guide genomic integration based on our unique network experiences and lessons learned within the broader context of implementation research in biomedical informatics. On the basis of our collective experience, we describe key stakeholder practices, challenges, and considerations for successful genomic integration to support personalized medicine.

  7. Subself theory and reincarnation/possession.

    Science.gov (United States)

    Lester, David

    2004-12-01

    A subself model of the mind is used to account for multiple personality, possession, the spirit controls of mediums, reincarnation, and the auditory hallucinations of schizophrenics, with suggestions for empirical research.

  8. Effect of playing tactics on achieving score-box possessions in a random series of team possessions from Norwegian professional soccer matches.

    Science.gov (United States)

    Tenga, Albin; Holme, Ingar; Ronglan, Lars Tore; Bahr, Roald

    2010-02-01

    Methods of analysis that include an assessment of opponent interactions are thought to provide a more valid means of team match performance. The purpose of this study was to examine the effect of playing tactics on achieving score-box possession by assessing opponent interactions in Norwegian elite soccer matches. We analysed a random series of 1703 team possessions from 163 of 182 (90%) matches played in the professional men's league during the 2004 season. Multidimensional qualitative data obtained from ten ordered categorical variables were used. Offensive tactics were more effective in producing score-box possessions when playing against an imbalanced defence (28.5%) than against a balanced defence (6.5%) (P tactics on producing score-box possessions, and improves the validity of team match-performance analysis in soccer.

  9. Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization

    NARCIS (Netherlands)

    Tang, Qiang

    2011-01-01

    In this paper we investigate a new category of public key encryption schemes which supports equality test between ciphertexts. With this new primitive, two users, who possess their own public/private key pairs, can issue token(s) to a proxy to authorize it to perform equality test between their

  10. Possession experiences in dissociative identity disorder: a preliminary study.

    Science.gov (United States)

    Ross, Colin A

    2011-01-01

    Dissociative trance disorder, which includes possession experiences, was introduced as a provisional diagnosis requiring further study in the Diagnostic and Statistical Manual of Mental Disorders (4th ed.). Consideration is now being given to including possession experiences within dissociative identity disorder (DID) in the Diagnostic and Statistical Manual of Mental Disorders (5th ed.), which is due to be published in 2013. In order to provide empirical data relevant to the relationship between DID and possession states, I analyzed data on the prevalence of trance, possession states, sleepwalking, and paranormal experiences in 3 large samples: patients with DID from North America; psychiatric outpatients from Shanghai, China; and a general population sample from Winnipeg, Canada. Trance, sleepwalking, paranormal, and possession experiences were much more common in the DID patients than in the 2 comparison samples. The study is preliminary and exploratory in nature because the samples were not matched in any way.

  11. The Failed Image and the Possessed

    DEFF Research Database (Denmark)

    Suhr, Christian

    2015-01-01

    This article asks if the recurrent queries regarding the value of images in visual anthropology could find new answers by exploring responses to visual media in neo-orthodox Islam. It proposes that the visual display of the photographic image shares a curious resemblance to the bodies of people...... possessed by invisible spirits called jinn. The image as a failed example or model of reality works like the possessed body as an amplifier of invisibility pointing towards that which cannot be seen, depicted visually, or represented in writing. This suggests a negative epistemology in which images obtain...

  12. Strategies for Supporting Physician-Scientists in Faculty Roles: A Narrative Review With Key Informant Consultations.

    Science.gov (United States)

    Lingard, Lorelei; Zhang, Peter; Strong, Michael; Steele, Margaret; Yoo, John; Lewis, James

    2017-10-01

    Physician-scientists are a population in decline globally. Solutions to reverse this decline often have focused on the training pipeline. Less attention has been paid to reducing attrition post training, when physician-scientists take up faculty roles. However, this period is a known time of vulnerability because of the pressures of clinical duties and the long timeline to securing independent research funding. This narrative review explored existing knowledge regarding how best to support physician-scientists for success in their faculty roles. The authors searched the Medline, Embase, ERIC, and Cochrane Library databases for articles published from 2000 to 2016 on this topic and interviewed key informants in 2015 to solicit their input on the review results. The authors reviewed 78 articles and interviewed 16 key informants. From the literature, they developed a framework of organizational (facilitate mentorship, foster community, value the physician-scientist role, minimize financial barriers) and individual (develop professional and research skills) strategies for supporting physician-scientists. They also outlined key knowledge gaps representing topics either rarely or never addressed in the reviewed articles (percent research time, structural hypocrisy, objective assessment, group metrics, professional identity). The key informants confirmed the identified strategies and discussed how the gaps were particularly important and impactful. This framework offers a basis for assessing an organization's existing support strategies, identifying outstanding needs, and developing targeted programming. The identified gaps require attention, as they threaten to undermine the benefits of existing support strategies.

  13. Perspectives on impacts of water quality on agriculture and community well-being-a key informant study from Sri Lanka.

    Science.gov (United States)

    Thoradeniya, Bhadranie; Pinto, Uthpala; Maheshwari, Basant

    2017-11-04

    Integrated management of water quality is critical for sustaining food production and achieving overall well-being of a community. Further, understanding people's perceptions and engagement can play an important role in achieving water and food security. The main aim of this study was to investigate the perspectives of community and other stakeholders as to how water quality impacts on agriculture, livelihood and community well-being within rural farming communities of two dry zone districts of Sri Lanka. The study adopted 'key informant interviews' as the methodology to investigate community and other stakeholder perspectives to collect primary data over a period of four months. The interview contents were then examined using a frequency matrix and graphed using an Excel graphing tool. The raw text was also analysed to understand the broader patterns in the text. A fuzzy logic cognitive map (FCM) was developed using the relationships between various concepts and linkages provided by the key informants. All key informants were concerned with the quality of drinking water they consume and the water used for their food preparation. Key informants representing the farming community indicated that the use of poor quality groundwater with higher levels of hardness has made growing crops difficult in the region. The key informants also identified extensive and ongoing use of agro-chemicals and fertilisers as a major source of pollution in water bodies in both spatio-temporal scale. Based on key informant interviews, possible initiatives that can help improve surface water and groundwater qualities for both drinking and agricultural use in the dry zone of Sri Lanka can be categorised into four broader themes, viz., provision of filtering/treatment systems, reduction in the use of agro-chemical and fertilisers, education of community stakeholders and support of alternative options for portable water supplies. The study indicates that in the key informants' view of

  14. Aerosol typing - key information from aerosol studies

    Science.gov (United States)

    Mona, Lucia; Kahn, Ralph; Papagiannopoulos, Nikolaos; Holzer-Popp, Thomas; Pappalardo, Gelsomina

    2016-04-01

    Aerosol typing is a key source of aerosol information from ground-based and satellite-borne instruments. Depending on the specific measurement technique, aerosol typing can be used as input for retrievals or represents an output for other applications. Typically aerosol retrievals require some a priori or external aerosol type information. The accuracy of the derived aerosol products strongly depends on the reliability of these assumptions. Different sensors can make use of different aerosol type inputs. A critical review and harmonization of these procedures could significantly reduce related uncertainties. On the other hand, satellite measurements in recent years are providing valuable information about the global distribution of aerosol types, showing for example the main source regions and typical transport paths. Climatological studies of aerosol load at global and regional scales often rely on inferred aerosol type. There is still a high degree of inhomogeneity among satellite aerosol typing schemes, which makes the use different sensor datasets in a consistent way difficult. Knowledge of the 4d aerosol type distribution at these scales is essential for understanding the impact of different aerosol sources on climate, precipitation and air quality. All this information is needed for planning upcoming aerosol emissions policies. The exchange of expertise and the communication among satellite and ground-based measurement communities is fundamental for improving long-term dataset consistency, and for reducing aerosol type distribution uncertainties. Aerosol typing has been recognized as one of its high-priority activities of the AEROSAT (International Satellite Aerosol Science Network, http://aero-sat.org/) initiative. In the AEROSAT framework, a first critical review of aerosol typing procedures has been carried out. The review underlines the high heterogeneity in many aspects: approach, nomenclature, assumed number of components and parameters used for the

  15. Towards optimised information about clinical trials; identification and validation of key issues in collaboration with cancer patient advocates.

    Science.gov (United States)

    Dellson, P; Nilbert, M; Bendahl, P-O; Malmström, P; Carlsson, C

    2011-07-01

    Clinical trials are crucial to improve cancer treatment but recruitment is difficult. Optimised patient information has been recognised as a key issue. In line with the increasing focus on patients' perspectives in health care, we aimed to study patients' opinions about the written information used in three clinical trials for breast cancer. Primary data collection was done in focus group interviews with breast cancer patient advocates. Content analysis identified three major themes: comprehensibility, emotions and associations, and decision making. Based on the advocates' suggestions for improvements, 21 key issues were defined and validated through a questionnaire in an independent group of breast cancer patient advocates. Clear messages, emotionally neutral expressions, careful descriptions of side effects, clear comparisons between different treatment alternatives and information about the possibility to discontinue treatment were perceived as the most important issues. Patients' views of the information in clinical trials provide new insights and identify key issues to consider in optimising future written information and may improve recruitment to clinical cancer trials. © 2010 Blackwell Publishing Ltd.

  16. The Impact of Banning Juvenile Gun Possession.

    OpenAIRE

    Marvell, Thomas B

    2001-01-01

    A 1994 federal law bans possession of handguns by persons under 18 years of age. Also in 1994, 11 states passed their own juvenile gun possession bans. Eighteen states had previously passed bans, 15 of them between 1975 and 1993. These laws were intended to reduce homicides, but arguments can be made that they have no effect on or that they even increase the homicide rate. This paper estimates the laws' impacts on various crime measures, primarily juvenile gun homicide victimizations and suic...

  17. A secure effective dynamic group password-based authenticated key agreement scheme for the integrated EPR information system

    Directory of Open Access Journals (Sweden)

    Vanga Odelu

    2016-01-01

    Full Text Available With the rapid growth of the Internet, a lot of electronic patient records (EPRs have been developed for e-medicine systems. The security and privacy issues of EPRs are important for the patients in order to understand how the hospitals control the use of their personal information, such as name, address, e-mail, medical records, etc. of a particular patient. Recently, Lee et al. proposed a simple group password-based authenticated key agreement protocol for the integrated EPR information system (SGPAKE. However, in this paper, we show that Lee et al.’s protocol is vulnerable to the off-line weak password guessing attack and as a result, their scheme does not provide users’ privacy. To withstand this security weakness found in Lee et al.’s scheme, we aim to propose an effective dynamic group password-based authenticated key exchange scheme for the integrated EPR information system, which retains the original merits of Lee et al.’s scheme. Through the informal and formal security analysis, we show that our scheme provides users’ privacy, perfect forward security and known-key security, and also protects online and offline password guessing attacks. Furthermore, our scheme efficiently supports the dynamic group password-based authenticated key agreement for the integrated EPR information system. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications tool and show that our scheme is secure against passive and active attacks.

  18. ASSESSMENT OF THE VOLUNTEERED GEOGRAPHIC INFORMATION FEEDBACK SYSTEM FOR THE DUTCH TOPOGRAPHICAL KEY REGISTER

    Directory of Open Access Journals (Sweden)

    M. Grus

    2015-08-01

    Full Text Available Since Topographical Key Register has become an open data the amount of users increased enormously. The highest grow was in the private users group. The increasing number of users and their growing demand for high actuality of the topographic data sets motivates the Dutch Kadaster to innovate and improve the Topographical Key Register (BRT. One of the initiatives was to provide a voluntary geographical information project aiming at providing a user-friendly feedback system adjusted to all kinds of user groups. The feedback system is a compulsory element of the Topographical Key Register in the Netherlands. The Dutch Kadaster is obliged to deliver a feedback system and the key-users are obliged to use it. The aim of the feedback system is to improve the quality and stimulate the usage of the data. The results of the pilot shows that the user-friendly and open to everyone feedback system contributes enormously to improve the quality of the topographic dataset.

  19. Three-factor anonymous authentication and key agreement scheme for Telecare Medicine Information Systems.

    Science.gov (United States)

    Arshad, Hamed; Nikooghadam, Morteza

    2014-12-01

    Nowadays, with comprehensive employment of the internet, healthcare delivery services is provided remotely by telecare medicine information systems (TMISs). A secure mechanism for authentication and key agreement is one of the most important security requirements for TMISs. Recently, Tan proposed a user anonymity preserving three-factor authentication scheme for TMIS. The present paper shows that Tan's scheme is vulnerable to replay attacks and Denial-of-Service attacks. In order to overcome these security flaws, a new and efficient three-factor anonymous authentication and key agreement scheme for TMIS is proposed. Security and performance analysis shows superiority of the proposed scheme in comparison with previously proposed schemes that are related to security of TMISs.

  20. Understanding Price Elasticities to Inform Public Health Research and Intervention Studies: Key Issues

    Science.gov (United States)

    Nghiem, Nhung; Genç, Murat; Blakely, Tony

    2013-01-01

    Pricing policies such as taxes and subsidies are important tools in preventing and controlling a range of threats to public health. This is particularly so in tobacco and alcohol control efforts and efforts to change dietary patterns and physical activity levels as a means of addressing increases in noncommunicable diseases. To understand the potential impact of pricing policies, it is critical to understand the nature of price elasticities for consumer products. For example, price elasticities are key parameters in models of any food tax or subsidy that aims to quantify health impacts and cost-effectiveness. We detail relevant terms and discuss key issues surrounding price elasticities to inform public health research and intervention studies. PMID:24028228

  1. Understanding price elasticities to inform public health research and intervention studies: key issues.

    Science.gov (United States)

    Nghiem, Nhung; Wilson, Nick; Genç, Murat; Blakely, Tony

    2013-11-01

    Pricing policies such as taxes and subsidies are important tools in preventing and controlling a range of threats to public health. This is particularly so in tobacco and alcohol control efforts and efforts to change dietary patterns and physical activity levels as a means of addressing increases in noncommunicable diseases. To understand the potential impact of pricing policies, it is critical to understand the nature of price elasticities for consumer products. For example, price elasticities are key parameters in models of any food tax or subsidy that aims to quantify health impacts and cost-effectiveness. We detail relevant terms and discuss key issues surrounding price elasticities to inform public health research and intervention studies.

  2. Pathological spirit possession as a cultural interpretation of trauma-related symptoms.

    Science.gov (United States)

    Hecker, Tobias; Barnewitz, Eva; Stenmark, Hakon; Iversen, Valentina

    2016-07-01

    Spirit possession is a phenomenon frequently occurring in war-torn countries. It has been shown to be an idiom of distress entailing dissociative symptoms. However, its association with trauma exposure and trauma-related disorders remains unclear. This study aimed to explore subjective disease models and the relationship between pathological spirit possession and trauma-related disorders in the Eastern Democratic Republic of the Congo. Seventy-three (formerly) possessed persons (74% female, mean age = 34 years), referred by traditional and spiritual healers, were interviewed about their experiences of pathological spirit possession, trauma exposure, posttraumatic stress disorder (PTSD) symptoms, depressive symptoms, shame and guilt, psychotic symptoms, somatic complaints, and the impairment of psychosocial functioning. The most common disease model for pathological spirit possession was another person having sent the spirit, mostly a family member or a neighbor, out of jealousy or conflict over resources. Significant correlations were found between spirit possession over lifetime and PTSD symptom severity, feelings of shame and guilt, depressive symptoms, somatic complaints, and psychotic symptoms. Spirit possession during the preceding 4 weeks was associated with PTSD symptom severity, impairment of psychosocial functioning, and psychotic symptom severity. The results of this study indicate that pathological spirit possession is a broad explanatory framework for various subjectively unexplainable mental and physical health problems, including but not limited to trauma-related disorders. Understanding pathological spirit possession as a subjective disease model for various mental and physical health problems may help researchers and clinicians to develop culturally sensitive treatment approaches for affected individuals. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  3. Information processing in bacteria: memory, computation, and statistical physics: a key issues review

    International Nuclear Information System (INIS)

    Lan, Ganhui; Tu, Yuhai

    2016-01-01

    Living systems have to constantly sense their external environment and adjust their internal state in order to survive and reproduce. Biological systems, from as complex as the brain to a single E. coli cell, have to process these data in order to make appropriate decisions. How do biological systems sense external signals? How do they process the information? How do they respond to signals? Through years of intense study by biologists, many key molecular players and their interactions have been identified in different biological machineries that carry out these signaling functions. However, an integrated, quantitative understanding of the whole system is still lacking for most cellular signaling pathways, not to say the more complicated neural circuits. To study signaling processes in biology, the key thing to measure is the input-output relationship. The input is the signal itself, such as chemical concentration, external temperature, light (intensity and frequency), and more complex signals such as the face of a cat. The output can be protein conformational changes and covalent modifications (phosphorylation, methylation, etc), gene expression, cell growth and motility, as well as more complex output such as neuron firing patterns and behaviors of higher animals. Due to the inherent noise in biological systems, the measured input-output dependence is often noisy. These noisy data can be analysed by using powerful tools and concepts from information theory such as mutual information, channel capacity, and the maximum entropy hypothesis. This information theory approach has been successfully used to reveal the underlying correlations between key components of biological networks, to set bounds for network performance, and to understand possible network architecture in generating observed correlations. Although the information theory approach provides a general tool in analysing noisy biological data and may be used to suggest possible network architectures in

  4. An improved authenticated key agreement protocol for telecare medicine information system.

    Science.gov (United States)

    Liu, Wenhao; Xie, Qi; Wang, Shengbao; Hu, Bin

    2016-01-01

    In telecare medicine information systems (TMIS), identity authentication of patients plays an important role and has been widely studied in the research field. Generally, it is realized by an authenticated key agreement protocol, and many such protocols were proposed in the literature. Recently, Zhang et al. pointed out that Islam et al.'s protocol suffers from the following security weaknesses: (1) Any legal but malicious patient can reveal other user's identity; (2) An attacker can launch off-line password guessing attack and the impersonation attack if the patient's identity is compromised. Zhang et al. also proposed an improved authenticated key agreement scheme with privacy protection for TMIS. However, in this paper, we point out that Zhang et al.'s scheme cannot resist off-line password guessing attack, and it fails to provide the revocation of lost/stolen smartcard. In order to overcome these weaknesses, we propose an improved protocol, the security and authentication of which can be proven using applied pi calculus based formal verification tool ProVerif.

  5. Mental illness complicated by the santeria belief in spirit possession.

    Science.gov (United States)

    Alonso, L; Jeffrey, W D

    1988-11-01

    Santeria, a religious system that blends African and Catholic beliefs, is practiced by many Cuban Americans. One aspect of this system is the belief in spirit possession. Basic santeria beliefs and rituals, including the fiesta santera (a gathering at which some participants may become possessed), are briefly described, and four cases in which the patients' belief in possession played a role in their mental illness are presented. The belief in possession can complicate the diagnosis and treatment of mental illness, but it should not be considered a culture-bound syndrome. Rather, it may be a nonspecific symptom of a variety of mental illnesses and should be evaluated in the context of the patient's overall belief system and ability to carry out usual activities.

  6. Loss of possession: concussions, informed consent, and autonomy.

    Science.gov (United States)

    Robeson, Richard; King, Nancy M P

    2014-01-01

    The recent explosion of publicity about the dangers of concussion in contact sports - particularly in football - represents the unraveling of a disinformation campaign by the NFL amid growing public and professional concern about the game's long-term risks of harm. The persistence of controversy and denial reflects a cultural view of football players as serving the needs of the team, a resulting evidentiary skepticism, and resistance to rule changes as excessive or unenforceable. This article considers the cultural context of informed decision making by parents of youth football players and suggests that policy changes designed to lower (although they cannot eliminate) risks of brain injury have the potential to change both the culture of football and the way the benefits and harms of the game are regarded for its players, without loss of its essential excitement and appeal. © 2014 American Society of Law, Medicine & Ethics, Inc.

  7. Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure

    Directory of Open Access Journals (Sweden)

    Woong Go

    2014-01-01

    Full Text Available A smart grid provides two-way communication by using the information and communication technology. In order to establish two-way communication, the advanced metering infrastructure (AMI is used in the smart grid as the core infrastructure. This infrastructure consists of smart meters, data collection units, maintenance data management systems, and so on. However, potential security problems of the AMI increase owing to the application of the public network. This is because the transmitted information is electricity consumption data for charging. Thus, in order to establish a secure connection to transmit electricity consumption data, encryption is necessary, for which key distribution is required. Further, a group key is more efficient than a pairwise key in the hierarchical structure of the AMI. Therefore, we propose a group key distribution scheme using a two-dimensional key table through the analysis result of the sensor network group key distribution scheme. The proposed scheme has three phases: group key predistribution, selection of group key generation element, and generation of group key.

  8. Dynamics of the spirit possession phenomenon in Eastern Tanzania

    Directory of Open Access Journals (Sweden)

    Marja-Liisa Swantz

    1976-01-01

    Full Text Available The discussion on the spirit possession phenomenon is related in this study to the more general question of the role of religious institutions as part in the development process of a people living in a limited geographical area of a wider national society. It is assumed that religion, like culture in general, has its specific institutional forms as result of the historical development of a society, but at the same time religion is a force shaping that history. People's cultural resources influence their social and economic development and form a potential creative element in it'. Some of the questions to be asked are: "How are specific religious practices related to the dynamics of change in the societies in question? What is the social and religious context in which the spirit possession phenomenon occurs in them? What social and economic relations get their expression in them? To what extent is spirit possession in this case a means of exerting values and creatively overcoming a crisis or conflict which the changing social and economic relations impose on the people? The established spirit possession cults are here seen as the institutional forms of religious experience. At the same time it becomes evident that there is institutionalization in process as well as deinstitutionalization of spirit possession where it occurs outside established institutional forms. Institution is taken as a socially shared form of behaviour the significance of which is commonly recognized by those who share it. By the term spirit possession cult is meant a ritual form of spirit possession of a group which is loosely organized and without strict membership. The context of the study is four ethnic groups in Eastern Tanzania, near the coast of the Indian Ocean. The general theme of the project is The Role of Culture in the Restructuring of Tanzanian Rural Areas. The restructuring refers to a villagisation programme carried out in the whole country. People are being

  9. Emotional regulation, attachment to possessions and hoarding symptoms.

    Science.gov (United States)

    Phung, Philip J; Moulding, Richard; Taylor, Jasmine K; Nedeljkovic, Maja

    2015-10-01

    This study aimed to test which particular facets of emotion regulation (ER) are most linked to symptoms of hoarding disorder, and whether beliefs about emotional attachment to possessions (EA) mediate this relationship. A non-clinical sample of 150 participants (108 females) completed questionnaires of emotional tolerance (distress tolerance, anxiety sensitivity, negative urgency - impulsivity when experiencing negative emotions), depressed mood, hoarding, and beliefs about emotional attachment to possessions. While all emotional tolerance measures related to hoarding, when considered together and controlling for depression and age, anxiety sensitivity and urgency were the significant predictors. Anxiety sensitivity was fully mediated, and urgency partially mediated, via beliefs regarding emotional attachment to possessions. These findings provide further support for (1) the importance of anxiety sensitivity and negative urgency for hoarding symptoms, and (2) the view that individuals with HD symptoms may rely on items for emotion regulation, leading to stronger beliefs that items are integral to emotional wellbeing. © 2015 Scandinavian Psychological Associations and John Wiley & Sons Ltd.

  10. Implementation of eMental Health care: viewpoints from key informants from organizations and agencies with eHealth mandates.

    Science.gov (United States)

    Wozney, Lori; Newton, Amanda S; Gehring, Nicole D; Bennett, Kathryn; Huguet, Anna; Hartling, Lisa; Dyson, Michele P; McGrath, Patrick

    2017-06-02

    The use of technology such as computers, tablets, and smartphones to improve access to and the delivery of mental health care (eMental Health care) is growing worldwide. However, despite the rapidly expanding evidence base demonstrating the efficacy of eMental Health care, its implementation in clinical practice and health care systems remains fragmented. To date, no peer-reviewed, key-informant studies have reported on the perspectives of decision-makers concerned with whether and how to implement eMental Health care. From September to November 2015, we conducted 31 interviews with key informants responsible for leadership, policy, research, and/ or information technology in organizations influential in the adoption of technology for eMental Health care. Deductive and inductive thematic analyses of transcripts were conducted using the Behavior Change Wheel as an organizing framework. Frequency and intensity effect sizes were calculated for emerging themes to further explore patterns within the data. Key informant responses (n = 31) representing 6 developed countries and multiple organizations showed consensus on common factors impacting implementation: individual and organizational capacities (e.g., computer literacy skills [patients and providers], knowledge gaps about cyber security, limited knowledge of available services); motivational drivers of technology-based care (e.g., extending care, data analytics); and opportunities for health systems to advance eMental Health care implementation (e.g., intersectoral research, rapid testing cycles, sustainable funding). Frequency effect sizes showed strong associations between implementation and credibility, knowledge, workflow, patient empowerment, electronic medical record (EMR) integration, sustained funding and intersectoral networks. Intensity effect sizes showed the highest concentration of statements (>10% of all comments) related to funding, credibility, knowledge gaps, and patient empowerment. This study

  11. Taking Possession: Rituals, Space and Authority

    Directory of Open Access Journals (Sweden)

    Jennifer Mara DeSilva

    2016-12-01

    Full Text Available In early modern Europe authority over communities, both people and spaces, was visualized through ritual gestures and processions. Communities gathered to witness ceremonial entries that drew on accepted forms of gestures and speech identifying individuals and articulating their place in the urban power relationship. Ceremonial entries by rulers, ambassadors, bishops, and other office-holders drew on ritual acts projecting messages of possession in order to establish reputations of prestige and authority. This introductory essay draws on cultural anthropology and recent historiography to build a framework for understanding rituals of possession that went beyond the tradition triumphal entry to incorporate substitutes, new modes of prestigious display, and attend to conflicts. By “taking possession” of communities, offices, and spaces using accepted ritual forms, early moderns initiated conversations about authority and power that were far more flexible in their scope, practice, and participants than expected.

  12. Key concepts in MR spectroscopy and practical approaches to gaining biochemical information in children

    Energy Technology Data Exchange (ETDEWEB)

    Astrakas, Loukas G. [University of Ioannina, Medical Physics, Medical School, P.O. Box 1186, Ioannina (Greece); Argyropoulou, Maria I. [University of Ioannina, Radiology, Medical School, Ioannina (Greece)

    2016-06-15

    Magnetic resonance spectroscopy (MRS) provides independent biochemical information and has become an invaluable adjunct to MRI and other imaging modalities. This review introduces key concepts and presents basic methodological steps regarding the acquisition and the interpretation of proton MRS. We review major brain metabolites and discuss MRS dependence on age, location, echo time and field strength. (orig.)

  13. Key technologies book

    International Nuclear Information System (INIS)

    1997-01-01

    In this book can be found all the useful information on the French industry key technologies of the years 2000-2005. 136 technologies at the junction of the science advances and of the markets expectations are divided into 9 sectors. Among them, only 4 are interesting here: the environment, the transports, the materials and the energy. In 1995, the secretary's office of State for industry has published a first synthesis book on these key technologies. This 1997 new key technologies book extends and completes the initial study. For each key technology, an encyclopedic sheet is given. Each sheet combines thus some exact and practical information on: advance state of the technology, market characteristics, development forecasts, occupation and involved sectors, technology acquisition cost, research programs but also contacts of the main concerned efficiency poles. (O.M.)

  14. Common Criteria for Information Technology Security Evaluation: Department of Defense Public Key Infrastructure and Key Management Infrastructure Token Protection Profile (Medium Robustness)

    Science.gov (United States)

    2002-03-22

    may be derived from detailed inspection of the IC itself or from illicit appropriation of design information. Counterfeit smart cards can be mass...Infrastructure (PKI) as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair...interference devices (SQDIS), electrical testing, and electron beam testing. • Other attacks, such as UV or X-rays or high temperatures, could cause erasure

  15. Traumatic Experience and Somatoform Dissociation Among Spirit Possession Practitioners in the Dominican Republic.

    Science.gov (United States)

    Schaffler, Yvonne; Cardeña, Etzel; Reijman, Sophie; Haluza, Daniela

    2016-03-01

    Recent studies in African contexts have revealed a strong association between spirit possession and severe trauma, with inclusion into a possession cult serving at times a therapeutic function. Research on spirit possession in the Dominican Republic has so far not included quantitative studies of trauma and dissociation. This study evaluated demographic variables, somatoform dissociative symptoms, and potentially traumatizing events in the Dominican Republic with a group of Vodou practitioners that either do or do not experience spirit possession. Inter-group comparisons revealed that in contrast to non-possessed participants (n = 38), those experiencing spirit possession (n = 47) reported greater somatoform dissociation, more problems with sleep, and previous exposure to mortal danger such as assaults, accidents, or diseases. The two groups did not differ significantly in other types of trauma. The best predictor variable for group classification was somatoform dissociation, although those items could also reflect the experience of followers during a possession episode. A factor analysis across variables resulted in three factors: having to take responsibility early on in life and taking on a professional spiritual role; traumatic events and pain; and distress/dissociation. In comparison with the non-possessed individuals, the possessed ones did not seem to overall have a remarkably more severe story of trauma and seemed to derive economic gains from possession practice.

  16. The investigation of crimes refering to forgery of documents and possession of forged documents

    OpenAIRE

    Kotovienė, Danutė

    2011-01-01

    THE INVESTIGATION OF CRIMES REFERING TO FORGERY OF DOCUMENTS AND POSSESSION OF FORGED DOCUMENTS Constantly improving informational technologies more and more get into our daily routine: nowadays it is widely spread internet payments, purchases, signing on-line agreements using electronic signatures. However, paper documents or other made of appropriate materials, which have material evidence, still have a very significant impact on our life. Its convey different aspects of states’ public work...

  17. Graduate Curriculum for Biological Information Specialists: A Key to Integration of Scale in Biology

    Directory of Open Access Journals (Sweden)

    Carole L. Palmer

    2007-12-01

    Full Text Available Scientific data problems do not stand in isolation. They are part of a larger set of challenges associated with the escalation of scientific information and changes in scholarly communication in the digital environment. Biologists in particular are generating enormous sets of data at a high rate, and new discoveries in the biological sciences will increasingly depend on the integration of data across multiple scales. This work will require new kinds of information expertise in key areas. To build this professional capacity we have developed two complementary educational programs: a Biological Information Specialist (BIS masters degree and a concentration in Data Curation (DC. We believe that BISs will be central in the development of cyberinfrastructure and information services needed to facilitate interdisciplinary and multi-scale science. Here we present three sample cases from our current research projects to illustrate areas in which we expect information specialists to make important contributions to biological research practice.

  18. Childhood disability in Malawi: a population based assessment using the key informant method.

    Science.gov (United States)

    Tataryn, Myroslava; Polack, Sarah; Chokotho, Linda; Mulwafu, Wakisa; Kayange, Petros; Banks, Lena Morgon; Noe, Christiane; Lavy, Chris; Kuper, Hannah

    2017-11-28

    Epidemiological data on childhood disability are lacking in Low and Middle Income countries (LMICs) such as Malawi, hampering effective service planning and advocacy. The Key Informant Method (KIM) is an innovative, cost-effective method for generating population data on the prevalence and causes of impairment in children. The aim of this study was to use the Key Informant Method to estimate the prevalence of moderate/severe, hearing, vision and physical impairments, intellectual impairments and epilepsy in children in two districts in Malawi and to estimate the associated need for rehabilitation and other services. Five hundred key informants (KIs) were trained to identify children in their communities who may have the impairment types included in this study. Identified children were invited to attend a screening camp where they underwent assessment by medical professionals for moderate/severe hearing, vision and physical impairments, intellectual impairments and epilepsy. Approximately 15,000 children were identified by KIs as potentially having an impairment of whom 7220 (48%) attended a screening camp. The estimated prevalence of impairments/epilepsy was 17.3/1000 children (95% CI: 16.9-17.7). Physical impairment (39%) was the commonest impairment type followed by hearing impairment (27%), intellectual impairment (26%), epilepsy (22%) and vision impairment (4%). Approximately 2100 children per million population could benefit from physiotherapy and occupational therapy and 300 per million are in need of a wheelchair. An estimated 1800 children per million population have hearing impairment caused by conditions that could be prevented or treated through basic primary ear care. Corneal opacity was the leading cause of vision impairment. Only 50% of children with suspected epilepsy were receiving medication. The majority (73%) of children were attending school, but attendance varied by impairment type and was lowest among children with multiple impairments (38

  19. 50 CFR 92.6 - Use and possession of migratory birds.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 6 2010-10-01 2010-10-01 false Use and possession of migratory birds. 92... INTERIOR (CONTINUED) MISCELLANEOUS PROVISIONS MIGRATORY BIRD SUBSISTENCE HARVEST IN ALASKA General Provisions § 92.6 Use and possession of migratory birds. You may not sell, offer for sale, purchase, or offer...

  20. Key team physical and technical performance indicators indicative of team quality in the soccer Chinese super league.

    Science.gov (United States)

    Yang, Gai; Leicht, Anthony S; Lago, Carlos; Gómez, Miguel-Ángel

    2018-01-01

    The aim of this study was to identify the key physical and technical performance variables related to team quality in the Chinese Super League (CSL). Teams' performance variables were collected from 240 matches and analysed via analysis of variance between end-of-season-ranked groups and multinomial logistic regression. Significant physical performance differences between groups were identified for sprinting (top-ranked group vs. upper-middle-ranked group) and total distance covered without possession (upper and upper-middle-ranked groups and lower-ranked group). For technical performance, teams in the top-ranked group exhibited a significantly greater amount of possession in opponent's half, number of entry passes in the final 1/3 of the field and the Penalty Area, and 50-50 challenges than lower-ranked teams. Finally, time of possession increased the probability of a win compared with a draw. The current study identified key performance indicators that differentiated end-season team quality within the CSL.

  1. Co-possession of phosphodiesterase type-5 inhibitors (PDE5-I) with nitrates.

    Science.gov (United States)

    Chang, Li-Ling; Ma, Mark; Allmen, Heather von; Henderson, Scott C; Harper, Kristine; Hornbuckle, Kenneth

    2010-06-01

    Estimate the proportion of phosphodiesterase type-5 inhibitor (PDE5-I) patients who co-possess nitrates and compare the proportion of tadalafil patients dispensed nitrates to a matched control group. Secondarily, examine the percentage of co-possession of PDE5-Is and nitrates where the products were dispensed on the same day or written by the same prescriber. Male patients aged 18+ years filling PDE5-I prescriptions between December 2003 and March 2006 were identified using a U.S. longitudinal prescription database (IMS Health LRx). Similar patients not dispensed a PDE5-I during this period were matched to the tadalafil-dispensed cohort using a propensity score approach. Co-possession, as a proxy for concurrent use, was defined as an overlap in time on therapy for a PDE5-I and nitrate and was compared for the three PDE5-Is and for tadalafil to the matched control group. Among 601,063 tadalafil patients, 3.31% were dispensed a nitrate during the study period, compared to 6.18% in control patients (n = 601,063). When co-possessed prescriptions were defined by overlapping exposure periods, the proportion of PDE5-I patients with co-possessed nitrates ranged from 1.44% (tadalafil) to 1.72% (vardenafil) and 2.13% (sildenafil). Co-possession percentages of PDE5-I prescriptions were 0.83% for tadalafil and 1.07% for sildenafil and vardenafil. The majority (54.29%) of co-possessed PDE5-I and nitrate prescriptions had the nitrate dispensed prior to the PDE5-I prescription identified in the study cohort. Keeping in mind the limitations of observational studies, these results suggest that co-dispensing of nitrates and PDE5-Is is low. Compared to control patients, the proportion of nitrate co-possession was lowest for patients filling tadalafil. Tadalafil patients also had the lowest co-possessed proportion among the three PDE5-I cohorts. While the majority of co-possessed drug pairs were prescribed by different providers, the highest percentage of co-prescribing from the same

  2. Possession Zone as a Performance Indicator in Football. The Game of the Best Teams

    Directory of Open Access Journals (Sweden)

    Claudio A. Casal

    2017-07-01

    Full Text Available Possession time in football has been widely discussed in research but few studies have analyzed the importance of the field area in which possession occurs. The objective of this study was to identify the existence of significant differences in the field zone of ball possession between successful and unsuccessful teams and to acknowledge if the match status modulates the possession model. To this end, 2,284 attacks were analyzed corresponding to the matches in the final phase of the UEFA Euro 2016 France, recording possession time and field zone in which possession occurred. Video recordings of matches were analyzed and coded post-event using notational analysis. We have found that successful offensive game patterns are different from unsuccessful ones. Specifically, field zone in which major possession occurs changes significantly between successful and unsuccessful teams (x2 = 15.72, p < 0.05 and through Welch’s T significant differences were detected in possession time between successful and unsuccessful teams (H = 24.289, p < 0.001. The former are characterized by longer possession times, preferably in the middle offensive zone, on the other hand, unsuccessful teams have shorter possession times and preferably on the middle defensive zone. Logistic regression also allowed us to identify that greater possession in the middle offensive zone is a good indicator of success in the offensive game, allowing us to predict a greater chance of victory in the match. Specifically, every time the teams achieve possession in the middle offensive zone, the chance of winning the match will increase 1.72 times and, the probability of winning the match making longer possessions in the middle offensive zone is 44.25%. Applying the Kruskal–Wallis test we have also been able to verify how match status modulates the teams possession time, specifically, when teams are winning they have longer possessions x2 = 92.628, p = 0.011. Results obtained are expected to

  3. Participation rate or informed choice? Rethinking the European key performance indicators for mammography screening.

    Science.gov (United States)

    Strech, Daniel

    2014-03-01

    Despite the intensive controversies about the likelihood of benefits and harms of mammography screening almost all experts conclude that the choice to screen or not to screen needs to be made by the individual patient who is adequately informed. However, the "European guideline for quality assurance in breast cancer screening and diagnosis" specifies a participation rate of 70% as the key performance indicator for mammography screening. This paper argues that neither the existing evidence on benefits and harms, nor survey research with women, nor compliance rates in clinical trials, nor cost-effectiveness ratios justify participation rates as a reasonable performance indicator for preference-sensitive condition such as mammography screening. In contrast, an informed choice rate would be more reasonable. Further research needs to address the practical challenges in assessing informed choice rates. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  4. High-level radioactive waste disposal: Key geochemical issues and information needs for site characterization

    International Nuclear Information System (INIS)

    Brooks, D.J.; Bembia, P.J.; Bradbury, J.W.; Jackson, K.C.; Kelly, W.R.; Kovach, L.A.; Mo, T.; Tesoriero, J.A.

    1986-01-01

    Geochemistry plays a key role in determining the potential of a high-level radioactive waste disposal site for long-term radionuclide containment and isolation. The Nuclear Regulatory Commission (NRC) has developed a set of issues and information needs important for characterizing geochemistry at the potential sites being investigated by the Department of Energy Basalt Waste Isolation Project, Nevada Nuclear Waste Storage Investigations project, and Salt Repository Project. The NRC site issues and information needs consider (1) the geochemical environment of the repository, (2) changes to the initial geochemical environment caused by construction and waste emplacement, and (3) interactions that affect the transport of waste radionuclides to the accessible environment. The development of these issues and information needs supports the ongoing effort of the NRC to identify and address areas of geochemical data uncertainty during prelicensing interactions

  5. Information processing in bacteria: memory, computation, and statistical physics: a key issues review

    Science.gov (United States)

    Lan, Ganhui; Tu, Yuhai

    2016-05-01

    Living systems have to constantly sense their external environment and adjust their internal state in order to survive and reproduce. Biological systems, from as complex as the brain to a single E. coli cell, have to process these data in order to make appropriate decisions. How do biological systems sense external signals? How do they process the information? How do they respond to signals? Through years of intense study by biologists, many key molecular players and their interactions have been identified in different biological machineries that carry out these signaling functions. However, an integrated, quantitative understanding of the whole system is still lacking for most cellular signaling pathways, not to say the more complicated neural circuits. To study signaling processes in biology, the key thing to measure is the input-output relationship. The input is the signal itself, such as chemical concentration, external temperature, light (intensity and frequency), and more complex signals such as the face of a cat. The output can be protein conformational changes and covalent modifications (phosphorylation, methylation, etc), gene expression, cell growth and motility, as well as more complex output such as neuron firing patterns and behaviors of higher animals. Due to the inherent noise in biological systems, the measured input-output dependence is often noisy. These noisy data can be analysed by using powerful tools and concepts from information theory such as mutual information, channel capacity, and the maximum entropy hypothesis. This information theory approach has been successfully used to reveal the underlying correlations between key components of biological networks, to set bounds for network performance, and to understand possible network architecture in generating observed correlations. Although the information theory approach provides a general tool in analysing noisy biological data and may be used to suggest possible network architectures in

  6. Information processing in bacteria: memory, computation, and statistical physics: a key issues review.

    Science.gov (United States)

    Lan, Ganhui; Tu, Yuhai

    2016-05-01

    Living systems have to constantly sense their external environment and adjust their internal state in order to survive and reproduce. Biological systems, from as complex as the brain to a single E. coli cell, have to process these data in order to make appropriate decisions. How do biological systems sense external signals? How do they process the information? How do they respond to signals? Through years of intense study by biologists, many key molecular players and their interactions have been identified in different biological machineries that carry out these signaling functions. However, an integrated, quantitative understanding of the whole system is still lacking for most cellular signaling pathways, not to say the more complicated neural circuits. To study signaling processes in biology, the key thing to measure is the input-output relationship. The input is the signal itself, such as chemical concentration, external temperature, light (intensity and frequency), and more complex signals such as the face of a cat. The output can be protein conformational changes and covalent modifications (phosphorylation, methylation, etc), gene expression, cell growth and motility, as well as more complex output such as neuron firing patterns and behaviors of higher animals. Due to the inherent noise in biological systems, the measured input-output dependence is often noisy. These noisy data can be analysed by using powerful tools and concepts from information theory such as mutual information, channel capacity, and the maximum entropy hypothesis. This information theory approach has been successfully used to reveal the underlying correlations between key components of biological networks, to set bounds for network performance, and to understand possible network architecture in generating observed correlations. Although the information theory approach provides a general tool in analysing noisy biological data and may be used to suggest possible network architectures in

  7. What competencies should directors possess? Malaysia perspective

    Directory of Open Access Journals (Sweden)

    Wan Fauziah Wan Yusoff

    2011-07-01

    Full Text Available Directors’ competencies are seeing to be of importance to corporate governance. As this issue has not yet being studied extensively in Malaysia, this study determines the key competencies of Malaysian company’s directors using qualitative approach involving two stages of Delphi Technique. In the first stage all information pertaining to directors’ competences in the literature had been reviewed. In the second stage, the key competencies identified in stage one were the criteria for developing a semi structured questionnaire. Participants were asked to rank the competencies in term of their importance for directors’ performance. Based on personel interviews with 41 participants eight types of competencies were found to be essential for Malaysian companies’ directors. Financial competencies received the highest responses, followed by corporate planning, business forecasting, legal, risk management, marketing, human resource and international business. This paper provides important evidence to support the conclusions drawn from the study about the importance of relevant directors’ competencies for board and corporate effectiveness.

  8. Resolution No. 96/03 About possession of ionic smoke detectors

    International Nuclear Information System (INIS)

    2004-01-01

    The resolution states that: first: all the entities of the country having Ionic smoke detectors in use are to be communicated to the National Center for Nuclear safety in correspondence with the format that is shown in the annex to the present. This formation must be updated every three years. Second: Entities possessing Ionic smoke detectors in use, must be corresponding management as radioactive waste of such detectors in the term of one year from the entry into force of this resolution with the center of protection and of radiation hygiene purposes ensure safe and proper management as radioactive material into disuse. Third: Importing entities, distributors, and that made the Assembly of ionic smoke detectors, continue to be governed by the provisions of the resolution No.. 25/98 of this Ministry, R ules for the authorization of practices associated the employment of las radiation ionizing . Fourth: Entities in which ionic smoke detectors are installed must complete information according to the annex to the present format and send it to the National Center for Nuclear safety within a period of 30 days from the installation of such detectors. Fifth: Entities that possess Ionic smoke detectors and decide to continue using them should not be the evacuation of the same with the center of protection and hygiene of radiation, for the purpose of ensuring a safe and proper management as radioactive material in disuse, notifying this Act to the National Center for Nuclear safety.

  9. On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems.

    Science.gov (United States)

    Arshad, Hamed; Teymoori, Vahid; Nikooghadam, Morteza; Abbassi, Hassan

    2015-08-01

    Telecare medicine information systems (TMISs) aim to deliver appropriate healthcare services in an efficient and secure manner to patients. A secure mechanism for authentication and key agreement is required to provide proper security in these systems. Recently, Bin Muhaya demonstrated some security weaknesses of Zhu's authentication and key agreement scheme and proposed a security enhanced authentication and key agreement scheme for TMISs. However, we show that Bin Muhaya's scheme is vulnerable to off-line password guessing attacks and does not provide perfect forward secrecy. Furthermore, in order to overcome the mentioned weaknesses, we propose a new two-factor anonymous authentication and key agreement scheme using the elliptic curve cryptosystem. Security and performance analyses demonstrate that the proposed scheme not only overcomes the weaknesses of Bin Muhaya's scheme, but also is about 2.73 times faster than Bin Muhaya's scheme.

  10. The Regulation of the Possession of Weapons at Gatherings

    Directory of Open Access Journals (Sweden)

    Pieter du Toit

    2013-12-01

    Full Text Available The Dangerous Weapons Act 15 of 2013 provides for certain prohibitions and restrictions in respect of the possession of a dangerous weapon and it repeals the Dangerous Weapons Act 71 of 1968 as well as the different Dangerous Weapons Acts in operation in the erstwhile TBVC States. The Act also amends the Regulation of Gatherings Act 205 of 1993 to prohibit the possession of any dangerous weapon at a gathering or demonstration. The Dangerous Weapons Act provides for a uniform system of law governing the use of dangerous weapons for the whole of South Africa and it furthermore no longer places the onus on the individual charged with the offence of the possession of a dangerous weapon to show that he or she did not have any intention of using the firearm for an unlawful purpose. The Act also defines the meaning of a dangerous weapon. According to our court’s interpretation of the Dangerous Weapons Act 71 of 1968 a dangerous weapon was regarded as an object used or intended to be used as a weapon even if it had not been designed for use as a weapon. The Act, however, requires the object to be capable of causing death or inflicting serious bodily harm if it were used for an unlawful purpose. The possession of a dangerous weapon, in circumstances which may raise a reasonable suspicion that the person intends to use it for an unlawful purpose, attracts criminal liability. The Act also provides a useful set of guidelines to assist courts to determine if a person charged with the offence of the possession of a dangerous weapon had indeed intended to use the weapon for an unlawful purpose. It seems, however, that the Act prohibits the possession of a dangerous weapon at gatherings, even if the person carrying the weapon does not intend to use it for an unlawful purpose. The state will, however, have to prove that the accused had the necessary control over the object and the intention to exercise such control, as well as that the object is capable of

  11. Digital possessions after a romantic break up

    NARCIS (Netherlands)

    Herron, Daniel; Moncur, Wendy; van den Hoven, Elise

    2016-01-01

    With technology becoming more pervasive in everyday life, it is common for individuals to use digital media to support the enactment and maintenance of romantic relationships. Partners in a relationship may create digital possessions frequently. However, after a relationship ends, individuals

  12. Are symptoms of spirit possessed patients covered by the DSM-IV or DSM-5 criteria for possession trance disorder? A mixed-method explorative study in Uganda

    NARCIS (Netherlands)

    van Duijl, M.; Kleyn, W.; de Jong, J.

    2013-01-01

    Introduction and aims As in many cultures, spirit possession is a common idiom of distress in Uganda. The DSM-IV contains experimental research criteria for dissociative and possession trance disorder (DTD and PTD), which are under review for the DSM-5. In the current proposed categories of the

  13. Information Theoretic Secret Key Generation: Structured Codes and Tree Packing

    Science.gov (United States)

    Nitinawarat, Sirin

    2010-01-01

    This dissertation deals with a multiterminal source model for secret key generation by multiple network terminals with prior and privileged access to a set of correlated signals complemented by public discussion among themselves. Emphasis is placed on a characterization of secret key capacity, i.e., the largest rate of an achievable secret key,…

  14. Key performance indicators to benchmark hospital information systems - a delphi study.

    Science.gov (United States)

    Hübner-Bloder, G; Ammenwerth, E

    2009-01-01

    To identify the key performance indicators for hospital information systems (HIS) that can be used for HIS benchmarking. A Delphi survey with one qualitative and two quantitative rounds. Forty-four HIS experts from health care IT practice and academia participated in all three rounds. Seventy-seven performance indicators were identified and organized into eight categories: technical quality, software quality, architecture and interface quality, IT vendor quality, IT support and IT department quality, workflow support quality, IT outcome quality, and IT costs. The highest ranked indicators are related to clinical workflow support and user satisfaction. Isolated technical indicators or cost indicators were not seen as useful. The experts favored an interdisciplinary group of all the stakeholders, led by hospital management, to conduct the HIS benchmarking. They proposed benchmarking activities both in regular (annual) intervals as well as at defined events (for example after IT introduction). Most of the experts stated that in their institutions no HIS benchmarking activities are being performed at the moment. In the context of IT governance, IT benchmarking is gaining importance in the healthcare area. The found indicators reflect the view of health care IT professionals and researchers. Research is needed to further validate and operationalize key performance indicators, to provide an IT benchmarking framework, and to provide open repositories for a comparison of the HIS benchmarks of different hospitals.

  15. "Satan has afflicted me!" Jinn-possession and mental illness in the Qur'an.

    Science.gov (United States)

    Islam, F; Campbell, R A

    2014-02-01

    Mental health stigma in Muslim communities may be partly due to a commonly held belief among some Muslims about the supernatural causes of mental illness (i.e. jinn-possession brought on by one's sinful life). A thematic analysis was carried out on four English translations and the Arabic text of the Qur'an to explore whether the connection between jinn-possession and insanity exists within the Muslim holy book. No connection between spirit-possession and madness or mental illness was found. Pagans taunted and labelled people as jinn-possessed only to ostracize and scapegoat. Linking the labelling of people as jinn-possession to a pagan practice may be used to educate Muslims, so they can reassess their community's stigma towards the mentally ill.

  16. Multiple Information Fusion Face Recognition Using Key Feature Points

    Directory of Open Access Journals (Sweden)

    LIN Kezheng

    2017-06-01

    Full Text Available After years of face recognition research,due to the effect of illumination,noise and other conditions have led to the recognition rate is relatively low,2 d face recognition technology has couldn’t keep up with the pace of The Times the forefront,Although 3 d face recognition technology is developing step by step,but it has a higher complexity. In order to solve this problem,based on the traditional depth information positioning method and local characteristic analysis methods LFA,puts forward an improved 3 d face key feature points localization algorithm, and on the basis of the trained sample which obtained by complete cluster,further put forward the global and local feature extraction algorithm of weighted fusion. Through FRGC and BU-3DFE experiment data comparison and analysis of the two face library,the method in terms of 3 d face recognition effect has a higher robustness.

  17. Robust Public Key Cryptography — A New Cryptosystem Surviving Private Key Compromise

    Science.gov (United States)

    Shaik, Cheman

    A weakness of the present-day public key cryptosystems is that these cryptosystems do not survive private-key compromise attacks resulting from an internal breach of trust. In a competitive business environment, private key compromise is a common incident that voids the strength of public key cryptosystems such as RSA and ECC. Bribing corporate employees to disclose their secret keys and inadvertently disclosing secret information are among a plethora of practical attacks that occur at the implementation level. Once a breach of trust takes place and subsequently the private key is revealed, any public key cryptosystem fails to secure electronic data in Internet communications. The revealed key may be used by an attacker to decipher the intercepted data at an intermediary router. This weakness of public key cryptography calls for an additional security measure that enables encryptions to survive private key compromise attacks.

  18. Are symptoms of spirit possessed patients covered by the DSM-IV or DSM-5 criteria for possession trance disorder? A mixed-method explorative study in Uganda.

    Science.gov (United States)

    van Duijl, Marjolein; Kleijn, Wim; de Jong, Joop

    2013-09-01

    As in many cultures, spirit possession is a common idiom of distress in Uganda. The DSM-IV contains experimental research criteria for dissociative and possession trance disorder (DTD and PTD), which are under review for the DSM-5. In the current proposed categories of the DSM-5, PTD is subsumed under dissociative identity disorder (DID) and DTD under dissociative disorders not elsewhere classified. Evaluation of these criteria is currently urgently required. This study explores the match between local symptoms of spirit possession in Uganda and experimental research criteria for PTD in the DSM-IV and proposed criteria for DID in the DSM-5. A mixed-method approach was used combining qualitative and quantitative research methods. Local symptoms were explored of 119 spirit possessed patients, using illness narratives and a cultural dissociative symptoms' checklist. Possible meaningful clusters of symptoms were inventoried through multiple correspondence analysis. Finally, local symptoms were compared with experimental criteria for PTD in the DSM-IV and proposed criteria for DID in the DSM-5. Illness narratives revealed different phases of spirit possession, with passive-influence experiences preceding the actual possession states. Multiple correspondence analysis of symptoms revealed two dimensions: 'passive' and 'active' symptoms. Local symptoms, such as changes in consciousness, shaking movements, and talking in a voice attributed to spirits, match with DSM-IV-PTD and DSM-5-DID criteria. Passive-influence experiences, such as feeling influenced or held by powers from outside, strange dreams, and hearing voices, deserve to be more explicitly described in the proposed criteria for DID in the DSM-5. The suggested incorporation of PTD in DID in the DSM-5 and the envisioned separation of DTD and PTD in two distinctive categories have disputable aspects.

  19. The Regulation of the Possession of Weapons at Gatherings | du Toit

    African Journals Online (AJOL)

    The Act also amends the Regulation of Gatherings Act 205 of 1993 to prohibit the possession of any dangerous weapon at a gathering or demonstration. ... (b) possession of dangerous weapons during the participation in any religious or cultural activities or lawful sport, recreation or entertainment or (c) legitimate collection, ...

  20. Feature interpretability and the positions of 2nd person possessives in Brazilian Portuguese

    Directory of Open Access Journals (Sweden)

    Bruna Karla Pereira

    2016-12-01

    Full Text Available Interpretability and valuation of φ-features (Chomsky, 2001; Pesetsky and Torrego, 2007 have played a central role in the investigation of language universals. With regard to that, in standard Brazilian Portuguese (BP, as well as in other Romance languages, possessives have uninterpretable number features, which are valued via nominal agreement. However, dialects of BP, especially the one spoken in Minas Gerais, have shown that 2nd person possessives, in postnominal position, do not have number agreement with the noun. In order to account for these facts, I will argue that, in this grammar, number features on 2nd person possessives are reanalyzed as being: (i associated with the person (rather than the noun and (ii interpretable. From the first postulation, ‘seu’ is expected to be the possessive for 2nd person singular, and ‘seus’ for 2nd person plural. From the second postulation, no number concord is expected to be triggered on the possessive. In addition, based on Danon (2011 and Norris (2014, I will argue that cardinals divide BP DPs into two domains in that phrases located above NumP are marked with the plural morpheme, while phrases below it are unmarked. In this sense, because prenominal possessives precede cardinals (NumP, they must be marked with the plural morpheme for nominal agreement; whereas postnominal possessives, which follow NumP, must be unmarked. Free from the plural marking associated with nominal agreement, postnominal 2nd person possessives favor the reanalysis of the morpheme ‘-s’ as indicating the number associated with person features.

  1. Information verification cryptosystem using one-time keys based on double random phase encoding and public-key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2016-08-01

    A novel image encryption system based on double random phase encoding (DRPE) and RSA public-key algorithm is proposed. The main characteristic of the system is that each encryption process produces a new decryption key (even for the same plaintext), thus the encryption system conforms to the feature of the one-time pad (OTP) cryptography. The other characteristic of the system is the use of fingerprint key. Only with the rightful authorization will the true decryption be obtained, otherwise the decryption will result in noisy images. So the proposed system can be used to determine whether the ciphertext is falsified by attackers. In addition, the system conforms to the basic agreement of asymmetric cryptosystem (ACS) due to the combination with the RSA public-key algorithm. The simulation results show that the encryption scheme has high robustness against the existing attacks.

  2. Information Literacy for Health Professionals: Teaching Essential Information Skills with the Big6 Information Literacy Model

    Science.gov (United States)

    Santana Arroyo, Sonia

    2013-01-01

    Health professionals frequently do not possess the necessary information-seeking abilities to conduct an effective search in databases and Internet sources. Reference librarians may teach health professionals these information and technology skills through the Big6 information literacy model (Big6). This article aims to address this issue. It also…

  3. Sealed Radioactive Sources. Information, Resources, and Advice for Key Groups about Preventing the Loss of Control over Sealed Radioactive Sources

    International Nuclear Information System (INIS)

    2013-10-01

    Among its many activities to improve the safety and security of sealed sources, the IAEA has been investigating the root causes of major accidents and incidents since the 1980's and publishes findings so that others can learn from them. There are growing concerns today about the possibility that an improperly stored source could be stolen and used for malicious purposes. To improve both safety and security, information needs to be in the hands of those whose actions and decisions can prevent a source from being lost or stolen in the first place. The IAEA developed this booklet to help improve communication with key groups about hazards that may result from the loss of control over sealed radioactive sources and measures that should be implemented to prevent such loss of control. Many people may benefit from the information contained in this booklet, particularly those working with sources and those likely to be involved if control over a source is lost; especially: officials in government agencies, first responders, medical users, industrial users and the metal recycling industry. The general public may also benefit from an understanding of the fundamentals of radiation safety. This booklet is comprised of several stand-alone chapters intended to communicate with these key groups. Various accidents that are described and information that is provided are relevant to more than one key group and therefore, some information is repeated throughout the booklet. This booklet seeks to raise awareness of the importance of the safety and security of sealed radioactive sources. However, it is not intended to be a comprehensive 'how to' guide for implementing safety and security measures for sealed radioactive sources. For more information on these measures, readers are encouraged to consult the key IAEA safety and security-related publications identified in this booklet

  4. Criminalization of 'Possession of Unexplained Property' and the ...

    African Journals Online (AJOL)

    Worku_Y

    government operating costs, increases government spending for wages and ... revenues by plundering revenue generating agencies such as tax collection, ..... a) the assets under the ownership or possession of himself and his family; and.

  5. Constitutional Law: Right of Privacy--Possession of Marijuana

    Science.gov (United States)

    Rohrer, David E.

    1976-01-01

    The Alaska Supreme Court in Ravin v. State accepted the defendant's contention that the prohibition of possession of marihuana infringed on his constitutional right to privacy. The significance of the case is discussed. (LBH)

  6. Information and Informality

    DEFF Research Database (Denmark)

    Larsson, Magnus; Segerstéen, Solveig; Svensson, Cathrin

    2011-01-01

    leaders on the basis of their possession of reliable knowledge in technical as well as organizational domains. The informal leaders engaged in interpretation and brokering of information and knowledge, as well as in mediating strategic values and priorities on both formal and informal arenas. Informal...... leaders were thus seen to function on the level of the organization as a whole, and in cooperation with formal leaders. Drawing on existing theory of leadership in creative and professional contexts, this cooperation can be specified to concern task structuring. The informal leaders in our study...... contributed to task structuring through sensemaking activities, while formal leaders focused on aspects such as clarifying output expectations, providing feedback, project structure, and diversity....

  7. Keyed shear joints

    DEFF Research Database (Denmark)

    Hansen, Klaus

    This report gives a summary of the present information on the behaviour of vertical keyed shear joints in large panel structures. An attemp is made to outline the implications which this information might have on the analysis and design of a complete wall. The publications also gives a short...

  8. A CEO View of Key Issues in Australian Information Systems Management - 1997

    Directory of Open Access Journals (Sweden)

    Graham Pervan

    1998-05-01

    Full Text Available As part of a research programme on key information systems management issues, a survey of Australasia's largest 500 organisations was conducted to identify which issues were perceived by their chief executive officers (CEOs as being important, problematic and critical over the next three to five years. The results reported are based on a relatively low response rate (though perhaps reasonable for the target group so should be regarded as only exploratory. The most critical issues were revealed to be a mix of technology management issues (IT infrastructure, disaster recovery, strategic management issues (BPR, competitive advantage, information architecture, people management issues (organisational learning, systems development and data management issues (effective use of the data resource, effectiveness/productivity of IS, effectiveness of software development, and their own support systems (EIS/DSS. This reflects their interest in a wide range of issues, but all with an organisation-wide focus. Non-critical issues were mostly related to the individual technologies and the place and role of IS in the organisation. While the CEOs showed some agreement with their chief information officers (CIOs on issues such as the IT infrastructure, competitive advantage, and organisational learning some distinct differences exist, particularly in relation to the quality and effectiveness of systems and processes and also how CEOs and CIOs perceive each other.

  9. Key Design Properties for Shipping Information Pipeline

    DEFF Research Database (Denmark)

    Jensen, Thomas; Tan, Yao-Hua

    2015-01-01

    on paper, e-mail, phone and text message, and far too costly. This paper explores the design properties for a shared information infrastructure to exchange information between all parties in the supply chain, commercial parties as well as authorities, which is called a Shipping Information Pipeline...

  10. O olhar dos psiquiatras brasileiros sobre os fenômenos de transe e possessão Brazilian psychiatrists’ approaches on trance and possession phenomena

    Directory of Open Access Journals (Sweden)

    Angélica A. Silva de Almeida

    2007-01-01

    Full Text Available CONTEXTO: Os fenômenos de transe e possessão despertaram o interesse da comunidade psiquiátrica brasileira, gerando posturas diversificadas. OBJETIVOS: Descrever e analisar como os fenômenos de transe e possessão foram tratados pelos psiquiatras brasileiros: seu impacto na teoria, na pesquisa e na prática clínica entre 1900 e 1950. MÉTODO: Análise de artigos científicos e leigos, teses e livros sobre transes e possessões produzidos pelos psiquiatras brasileiros entre 1900 e 1950. RESULTADOS: Identificam-se duas correntes de pensamento entre os psiquiatras. A primeira, vinculada às Faculdades de Medicina do Rio de Janeiro e São Paulo, sob forte influência de autores franceses, deteve-se mais na periculosidade do espiritismo para a saúde mental. Defendia a adoção de medidas repressivas com o poder público. O segundo grupo de psiquiatras, ligado às Faculdades de Medicina da Bahia e Pernambuco, embora não desconsiderasse o caráter patológico ou "primitivo" dos fenômenos de transe e possessão, apresentou uma visão mais antropológica e culturalista. Considerando tais fenômenos como manifestações étnicas ou culturais, alguns defenderam o controle médico e a educação do povo para o abandono dessas práticas "primitivas". Outros não consideravam os fenômenos mediúnicos como desencadeadores da loucura, mas manifestações não-patológicas de um universo cultural, além de não vinculá-los ao atraso cultural da população. CONCLUSÕES: As religiões mediúnicas foram objeto de estudo por longo período, resultando hipóteses e práticas diferenciadas por parte da comunidade psiquiátrica brasileira, constituindo-se oportunidade privilegiada para o estudo do impacto dos fatores socioculturais na atividade psiquiátrica.BACKGROUND: Trance and possession experiences have raised interest among Brazilian psychiatrists resulting in a variety of approaches. OBJECTIVES: To describe and analyze how Brazilian psychiatrists

  11. Phase-encoded measurement device independent quantum key distribution without a shared reference frame

    Science.gov (United States)

    Zhuo-Dan, Zhu; Shang-Hong, Zhao; Chen, Dong; Ying, Sun

    2018-07-01

    In this paper, a phase-encoded measurement device independent quantum key distribution (MDI-QKD) protocol without a shared reference frame is presented, which can generate secure keys between two parties while the quantum channel or interferometer introduces an unknown and slowly time-varying phase. The corresponding secret key rate and single photons bit error rate is analysed, respectively, with single photons source (SPS) and weak coherent source (WCS), taking finite-key analysis into account. The numerical simulations show that the modified phase-encoded MDI-QKD protocol has apparent superiority both in maximal secure transmission distance and key generation rate while possessing the improved robustness and practical security in the high-speed case. Moreover, the rejection of the frame-calibrating part will intrinsically reduce the consumption of resources as well as the potential security flaws of practical MDI-QKD systems.

  12. Key Technologies and Applications of Satellite and Sensor Web-coupled Real-time Dynamic Web Geographic Information System

    Directory of Open Access Journals (Sweden)

    CHEN Nengcheng

    2017-10-01

    Full Text Available The geo-spatial information service has failed to reflect the live status of spot and meet the needs of integrated monitoring and real-time information for a long time. To tackle the problems in observation sharing and integrated management of space-borne, air-borne, and ground-based platforms and efficient service of spatio-temporal information, an observation sharing model was proposed. The key technologies in real-time dynamic geographical information system (GIS including maximum spatio-temporal coverage-based optimal layout of earth-observation sensor Web, task-driven and feedback-based control, real-time access of streaming observations, dynamic simulation, warning and decision support were detailed. An real-time dynamic Web geographical information system (WebGIS named GeoSensor and its applications in sensing and management of spatio-temporal information of Yangtze River basin including navigation, flood prevention, and power generation were also introduced.

  13. Key Informant Perspectives on Federal Research Agency Policy and Systems and Scientific Workforce Diversity Development: A Companion Study

    Science.gov (United States)

    Moore, Corey L.; Wang, Ningning; Davis, Dytisha; Aref, Fariborz; Manyibe, Edward O.; Washington, Andre L.; Johnson, Jean; Eugene-Cross, Kenyotta; Muhammad, Atashia; Jennings-Jones, Desiree

    2017-01-01

    Purpose: In the previous analysis of key informant perspectives on minority research leaders' career development factors, we identified individual and sociocultural, institutional, and federal research agency (i.e., National Institute on Disability, Independent Living, and Rehabilitation Research; National Institutes of Health; Agency for…

  14. Information Systems Management: an Australasian view of key issues - 1996

    Directory of Open Access Journals (Sweden)

    Graham Pervan

    1997-11-01

    Full Text Available As part of a longitudinal study of key information systems management issues, a survey of Australasia's largest 500 organisations was conducted to identify which issues were perceived by the IS executives as being important, problematic and critical over the next three to five years. The most critical issues were revealed to be a mix of technology management issues (IT infrastructure, communications, disaster recovery, strategic management issues (competitive advantage, IS planning, aligning the IS organisation, people management issues (organisational learning, educating senior management in IT, systems development and data management issues (effective use of the data resource, and end-user computing. This reflects the need for a balance of business, technical, and people skills in an IS executive. Non-critical issues were mostly related to systems development and the individual technologies which must be integrated and managed to ensure a responsive IT infrastructure. The study also reveals that some issues are much more important than problematic (disaster recovery, competitive advantage, information architecture, and IS alignment while others are much more problematic than important (end-user computing, IS role and contribution, and BPR. The former reflects a growing level of knowledge in handling these issues, while the latter reflects a continuing problem with them. The differences between this study and similar studies conducted in 1988 and 1992 show that there is a growing confidence in the IS executive's ability to manage the strategic issues, a continuing concern about providing a responsive IT infrastructure (especially communications, and a continuing concern with educating all 'customers' in the organisation in the effective use of IT, including senior management.

  15. Stability properties of solutions to nonlinear models possessing a sign-undefined metric

    International Nuclear Information System (INIS)

    Barashenkov, I.V.

    1983-01-01

    Multicomponent field systems possessing a sign-undefined internal space metric, in particular models with a noncompact global invariance group are investigated. It is shown that the energy cannot have even a conditional relative minimum. It is demonstrated, nevertheless, that the corresponding nonlinear equations of motion are permitted to possess stable particle-like solutions

  16. Themes in Spirit Possession in Ugandan Christianity | James ...

    African Journals Online (AJOL)

    . This paper discerns a number of common themes that run through many of these experiences. In particular, sex as a motif for deviance and evil is noted as a common feature of many of the possession stories and all contact with spirits is seen ...

  17. 20 CFR 404.1093 - Possession of the United States.

    Science.gov (United States)

    2010-04-01

    ... DISABILITY INSURANCE (1950- ) Employment, Wages, Self-Employment, and Self-Employment Income Self-Employment... figuring your net earnings from self-employment, the term possession of the United States shall be deemed...

  18. The Efficacy of Key Performance Indicators in Ontario Universities as Perceived by Key Informants

    Science.gov (United States)

    Chan, Vivian

    2015-01-01

    The Ontario Ministry of Education and Training's Task Force on University Accountability first proposed key performance indicators (KPIs) for colleges and universities in Ontario in the early 1990s. The three main KPIs for Ontario universities are the rates of (1) graduation, (2) employment, and (3) Ontario Student Assistance Program loan default.…

  19. Stability properties of solutions to nonlinear models possessing a sign-undefined metric

    International Nuclear Information System (INIS)

    Barashenkov, I.V.

    1983-01-01

    Multicomponent field systems possessing a sign-undefined internal space metric, in particular models with a noncompact global invariance group, are investigated. It is shown that the energy cannot have even a conditional relative minimum. It is demonstrated, nevertheless, that the corresponding nonlinear equations of motion are permitted to possess stable particle-like solutions. (Auth.)

  20. Facing the Maze: Young Cancer Survivors' Return to Education and Work-A Professional Expert Key Informant Study.

    Science.gov (United States)

    Pedersen, Kaspar Jessen; Boisen, Kirsten Arntz; Midtgaard, Julie; Elsbernd, Abbey; Larsen, Hanne Baekgaard

    2018-03-13

    An insufficient transition to normal life after cancer treatment in adolescent and young adults (AYAs) may lead to decreased occupational and educational opportunities throughout a survivor's lifespan. Key informant interviews were used to access unique knowledge of the healthcare, educational, and social systems. We used key informant interviews with professionals representing disciplines from healthcare, educational, and social systems (n = 15). Informants were recruited through purposive sampling and snowball sampling. Interviews were analyzed thematically using Malterud's Systematic Text Condensation and verified by member checking. We found four major themes: the impact of late effects, navigating the system, social reintegration, and the drive of youth. Although legal frameworks are often in place to assist AYA cancer survivors, navigating the public, educational, and social systems is a complex task and many AYAs do not have the required skill set or energy. Furthermore, AYA survivors often feel different from their peers and misunderstood by their surroundings, which may hinder reintegration into normal social life. In Scandinavia, healthcare and education are free of charge with equal access for all, primarily funded by government taxes. Therefore, insurance status and tuition fees should not constitute barriers for returning to education and work. However, this study finds that the public and educational systems are complex to navigate, and that AYAs face trouble mobilizing the energy to receive needed support.

  1. A secure smart-card based authentication and key agreement scheme for telecare medicine information systems.

    Science.gov (United States)

    Lee, Tian-Fu; Liu, Chuan-Ming

    2013-06-01

    A smart-card based authentication scheme for telecare medicine information systems enables patients, doctors, nurses, health visitors and the medicine information systems to establish a secure communication platform through public networks. Zhu recently presented an improved authentication scheme in order to solve the weakness of the authentication scheme of Wei et al., where the off-line password guessing attacks cannot be resisted. This investigation indicates that the improved scheme of Zhu has some faults such that the authentication scheme cannot execute correctly and is vulnerable to the attack of parallel sessions. Additionally, an enhanced authentication scheme based on the scheme of Zhu is proposed. The enhanced scheme not only avoids the weakness in the original scheme, but also provides users' anonymity and authenticated key agreements for secure data communications.

  2. Key influences in the design and implementation of mental health information systems in Ghana and South Africa.

    Science.gov (United States)

    Ahuja, S; Mirzoev, T; Lund, C; Ofori-Atta, A; Skeen, S; Kufuor, A

    2016-01-01

    Strengthening of mental health information systems (MHIS) is essential to monitor and evaluate mental health services in low and middle-income countries. While research exists assessing wider health management information systems, there is limited published evidence exploring the design and implementation of MHIS in these settings. This paper aims to identify and assess the key factors affecting the design and implementation of MHIS, as perceived by the key stakeholders in Ghana and South Africa. We report findings from the Mental Health and Poverty Project, a 5-year research programme implemented within four African countries. The MHIS strengthening in South Africa and Ghana included two related components: intervention and research. The intervention component aimed to strengthen MHIS in the two countries, and the research component aimed to document interventions in each country, including the key influences. Data were collected using semi structured interviews with key stakeholders and reviews of key documents and secondary data from the improved MHIS. We analyzed the qualitative data using a framework approach. Key components of the MHIS intervention involved the introduction of a redesigned patient registration form, entry into computers for analysis every 2 months by clinical managerial staff, and utilization of data in hospital management meetings in three psychiatric hospitals in Ghana; and the introduction of a new set of mental health indicators and related forms and tally sheets at primary care clinics and district hospitals in five districts in the KwaZulu-Natal and Northern Cape provinces in South Africa. Overall, the key stakeholders perceived the MHIS strengthening as an effective intervention in both countries with an enhanced set of indicators in South Africa and introduction of a computerized system in Ghana. Influences on the design and implementation of MHIS interventions in Ghana and South Africa relate to resources, working approaches

  3. Environmental Influences on Physical Activity among Rural Adults in Montana, United States: Views from Built Environment Audits, Resident Focus Groups, and Key Informant Interviews.

    Science.gov (United States)

    Lo, Brian K; Morgan, Emily H; Folta, Sara C; Graham, Meredith L; Paul, Lynn C; Nelson, Miriam E; Jew, Nicolette V; Moffat, Laurel F; Seguin, Rebecca A

    2017-10-04

    Rural populations in the United States have lower physical activity levels and are at a higher risk of being overweight and suffering from obesity than their urban counterparts. This paper aimed to understand the environmental factors that influence physical activity among rural adults in Montana. Eight built environment audits, 15 resident focus groups, and 24 key informant interviews were conducted between August and December 2014. Themes were triangulated and summarized into five categories of environmental factors: built, social, organizational, policy, and natural environments. Although the existence of active living features was documented by environmental audits, residents and key informants agreed that additional indoor recreation facilities and more well-maintained and conveniently located options were needed. Residents and key informants also agreed on the importance of age-specific, well-promoted, and structured physical activity programs, offered in socially supportive environments, as facilitators to physical activity. Key informants, however, noted that funding constraints and limited political will were barriers to developing these opportunities. Since building new recreational facilities and structures to support active transportation pose resource challenges, especially for rural communities, our results suggest that enhancing existing features, making small improvements, and involving stakeholders in the city planning process would be more fruitful to build momentum towards larger changes.

  4. Environmental Influences on Physical Activity among Rural Adults in Montana, United States: Views from Built Environment Audits, Resident Focus Groups, and Key Informant Interviews

    Directory of Open Access Journals (Sweden)

    Brian K. Lo

    2017-10-01

    Full Text Available Rural populations in the United States have lower physical activity levels and are at a higher risk of being overweight and suffering from obesity than their urban counterparts. This paper aimed to understand the environmental factors that influence physical activity among rural adults in Montana. Eight built environment audits, 15 resident focus groups, and 24 key informant interviews were conducted between August and December 2014. Themes were triangulated and summarized into five categories of environmental factors: built, social, organizational, policy, and natural environments. Although the existence of active living features was documented by environmental audits, residents and key informants agreed that additional indoor recreation facilities and more well-maintained and conveniently located options were needed. Residents and key informants also agreed on the importance of age-specific, well-promoted, and structured physical activity programs, offered in socially supportive environments, as facilitators to physical activity. Key informants, however, noted that funding constraints and limited political will were barriers to developing these opportunities. Since building new recreational facilities and structures to support active transportation pose resource challenges, especially for rural communities, our results suggest that enhancing existing features, making small improvements, and involving stakeholders in the city planning process would be more fruitful to build momentum towards larger changes.

  5. Possibilities and Expectations for mHealth in the Pacific Islands: Insights From Key Informants.

    Science.gov (United States)

    Umali, Elaine; McCool, Judith; Whittaker, Robyn

    2016-01-20

    The increase in mobile phone use across the globe is creating mounting interest for its application in addressing health system constraints. Although still limited, there is growing evidence of success in using mobile phones for health (mHealth) in low- and middle- income countries. The promise of mHealth to address key health system issues presents a huge potential for the Pacific Island countries where mobile use has radically increased. Current projections indicate an improved information and communications technology (ICT) environment to support greater access to mobile and digital devices in the Pacific region. The objective of the study was to explore key stakeholder perspectives on the potential for mHealth in the Pacific region. A series of in-depth interviews were conducted either face-to-face, via Skype or by email, with a series of key informants from the Pacific Rim region. Interviews were audio-recorded and later transcribed for detailed thematic analysis. We found widespread support for the potential to use mobile phones as a mechanism to facilitate improved health service delivery in the region. Essential elements for the successful development and implementation of mHealth were identified by these stakeholders. These included: developing an understanding of the local context and the problems that may be usefully addressed by the addition of mHealth to existing strategies and services; consideration of local infrastructure, capability, policy, mobile literacy and engagement; learning from others, particularly other low- and middle-income countries (LMICs); the importance of building supportive environments and of evaluation to provide evidence of impact and total cost. The rapid growth of mobile phone use in the region presents a unique juxtaposition of opportunity and promise. Though the region lags behind other LMICs in the adoption of mHealth technologies, this offers the convenience of learning from past mHealth interventions and applying these

  6. Quantum key distribution via quantum encryption

    CERN Document Server

    Yong Sheng Zhang; Guang Can Guo

    2001-01-01

    A quantum key distribution protocol based on quantum encryption is presented in this Brief Report. In this protocol, the previously shared Einstein-Podolsky-Rosen pairs act as the quantum key to encode and decode the classical cryptography key. The quantum key is reusable and the eavesdropper cannot elicit any information from the particle Alice sends to Bob. The concept of quantum encryption is also discussed. (21 refs).

  7. Information as a key-element for the development and dissemination of bioenergy in Austria

    International Nuclear Information System (INIS)

    Schmidt, J.

    1999-01-01

    As one of the renewable energy sources which have to be developed to replace of CO 2 -intensive energy technologies the utilization of bio-energy has a lot of advantages: it is CO 2 - neutral; it is not dependent on imports and improves security of supply; has enormous potential of job creation for rural areas, in small and medium size enterprises; has an enormous market potential; biomass is a by-product in many industrial processes and its using would solve also the waste problem; biomass is an infinite energy source. Predominant market of the biomass for Europe is that for low temperature heating. Being underestimated this market is not attractive for high tech development and research perhaps because of the difficulties for collecting statistical data. Technologies vary from low efficient logwood boilers to sophisticated district heating plants. The strategy of the European Commission, referring to the White Paper, proposes to install 1mill sophisticated biomass heating systems in Europe till 2003. The low temperature heating market will be the most important for future information programmes and projects. For launching of biomass technologies onto a market it is necessary to inform the customer about it and the way to get it. The distribution systems have to rely on multipurpose equipment i.g. for different kind of bio-fuel. The information has to target the advantages of bio-energy fuels compared to the competing carriers like natural gas and oil. These advantages define the market niche. The information strategies include establishing of national and international networks and collaboration with other renewable energy sources associations and with the agricultural sector. The information related projects of the Austrian Biomass Association include: issuing a magazine, information campaigns, conferences, issuing of teaching materials for schools, information brochures and training programmes for plumbers so to be key-agents in the dissemination of small

  8. Descending with Angels: Jinn Possession, Islamic Exorcism, and Psychiatry

    DEFF Research Database (Denmark)

    Suhr, Christian

    What is it like to be a Muslim possessed by a jinn spirit? How do you find refuge from madness and evil in a place like Denmark? In this book I explore some of the ways in which Muslims in the West have sought to protect themselves. Over several years I followed Muslim patients being treated.......” In the book I analyze how these broader social and political issues are paralleled in the invisible dynamics of jinn possession and psychosis, proposing new theoretical perspectives on religious and psychiatric healing as ritual practices for dealing with the invisible in human life....... hypervisible in public discourse through intensive state monitoring, surveillance, and media coverage. Yet their religion of Islam remains poorly understood and is frequently identified by politicians, commentators, and even healthcare specialists as the underlying invisible cause of “integration problems...

  9. Key rate of quantum key distribution with hashed two-way classical communication

    International Nuclear Information System (INIS)

    Watanabe, Shun; Matsumoto, Ryutaroh; Uyematsu, Tomohiko; Kawano, Yasuhito

    2007-01-01

    We propose an information reconciliation protocol that uses two-way classical communication. The key rates of quantum key distribution (QKD) protocols that use our protocol are higher than those using previously known protocols for a wide range of error rates for the Bennett-Brassard 1984 and six-state protocols. We also clarify the relation between the proposed and known QKD protocols, and the relation between the proposed protocol and entanglement distillation protocols

  10. Zār Spirit Possession in Iran and African Countries: Group Distress, Culture-Bound Syndrome or Cultural Concept of Distress?

    Directory of Open Access Journals (Sweden)

    Fahimeh Mianji

    2015-12-01

    Full Text Available Zār is the term used to describe a form of spirit possession common in northern African, eastern African, and some Middle-Eastern societies. Although these regions share some cultural similarities arising from their history of slavery, in these places, zār varies in prevalence, clinical characteristics, and social context. Based on a selective review of the literature, this paper looks at the place of zār spirit possession in both DSM-IV and DSM-V; it also examines how zār is manifested in Iran and in African countries including Sudan, Ethiopia, and Egypt; and it aims to provide practical information to mental health clinicians so that they can better understand how this cultural concept is practiced by Iranians and Middle Eastern and African immigrants living near the Persian Gulf coast.

  11. Gun Possession among Massachusetts Batterer Intervention Program Enrollees

    Science.gov (United States)

    Rothman, Emily F.; Johnson, Renee M.; Hemenway, David

    2006-01-01

    Batterers with access to firearms present a serious lethal threat to their partners. The purpose of this exploratory study is to estimate the prevalence of and risk markers for gun possession among Massachusetts men enrolled in batterer intervention programs. The authors found that 1.8% of the men reported having a gun in or around their home.…

  12. Fast and secure key distribution using mesoscopic coherent states of light

    International Nuclear Information System (INIS)

    Barbosa, Geraldo A.

    2003-01-01

    This work shows how two parties A and B can securely share unlimited sequences of random bits at optical speeds. A and B possess true-random physical sources and exchange random bits by using a random sequence received to cipher the following one to be sent. A starting shared secret key is used and the method can be described as a one-time-pad unlimited extender. It is demonstrated that the minimum probability of error in signal determination by the eavesdropper can be set arbitrarily close to the pure guessing level. Being based on the M-ry encryption protocol this method also allows for optical amplification without security degradation, offering practical advantages over the Bennett-Brassard 1984 protocol for key distribution

  13. ADDRESSING VIEWS OF KEY INFORMANTS WHO ARE WORKING FOR WOMEN RIGHTS REGARDING INTIMATE PARTNER VIOLENCE

    Directory of Open Access Journals (Sweden)

    Nan Kyi Pyar Si

    2017-10-01

    Full Text Available Some married women are experiencing different types of intimate partner violence by their current or former husband. However, the awareness and services for those women are still needed. This study explored the key informants’ perspectives to provide more comprehensive services to those women. Qualitative feminist method was used and five participants were purposefully selected to interview in depth. Key informants reflected upon intimate partner violence as causes of intimate partner violence, why intimate partner violence cases were underreported, why didn’t women leave their violent partner, what they actually felt for intimate partner violence, gaps with intervention for survivors and planning for better outcome. It was found that awareness among women who experiencing violence and the people around them needed to be raised. And services provided for them also needed to be more concise and updated. Therefore, it is essentially important to extend education session to all people regarding violence against women. Collaboration and cooperation of government and non-governmental organizations is also helpful to decrease various kinds of violence committed to women.

  14. Understanding Barriers and Facilitators to Breast and Cervical Cancer Screening among Muslim Women in New York City: Perspectives from Key Informants.

    Science.gov (United States)

    Islam, Nadia; Patel, Shilpa; Brooks-Griffin, Quanza; Kemp, Patrice; Raveis, Victoria; Riley, Lindsey; Gummi, Sindhura; Nur, Potrirankamanis Queano; Ravenell, Joseph; Cole, Helen; Kwon, Simona

    2017-01-01

    Muslims are one of the fastest growing religious groups in the US. However, little is known about their health disparities, and how their unique cultural, religious, and social beliefs and practices affect health behaviors and outcomes. Studies demonstrate Muslim women may have lower rates of breast and cervical cancer screening compared to the overall population. The purpose of this study was to: 1) conduct key-informant interviews with Muslim community leaders in New York City (NYC), to understand contextual factors that impact Muslim women's beliefs and practices regarding breast and cervical cancer screening; and 2) inform the development and implementation of a research study on breast and cervical cancer screening among Muslims. Twelve key-informant interviews were conducted. The sample included imams, female religious leaders, physicians, community-based organization leaders, and social service representatives. The interview guide assessed: 1) unique healthcare barriers faced by Muslim women; 2) cultural and social considerations in conducting research; 3) potential strategies for increasing screening in this population; and 4) content and venues for culturally tailored programming and messaging. Key informants noted structure and culture as barriers and religion as a facilitator to breast and cervical cancer screening. Themes regarding the development of targeted health campaigns to increase screening included the importance of educational and in-language materials and messaging, and engaging mosques and religious leaders for dissemination. Although Muslim women face a number of barriers to screening, religious beliefs and support structures can be leveraged to facilitate screening and enhance the dissemination and promotion of screening.

  15. A novel authentication scheme using self-certified public keys for telecare medical information systems.

    Science.gov (United States)

    Guo, Dianli; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping

    2015-06-01

    Telecare medical information systems (TMIS), with the explosive growth of communication technology and physiological monitoring devices, are applied increasingly to enable and support healthcare delivery services. In order to safeguard patients' privacy and tackle the illegal access, authentication schemes for TMIS have been investigated and designed by many researchers. Many of them are promising for adoption in practice, nevertheless, they still have security flaws. In this paper, we propose a novel remote authentication scheme for TMIS using self-certified public keys, which is formally secure in the ID-mBJM model. Besides, the proposed scheme has better computational efficiency. Compared to the related schemes, our protocol is more practical for telemedicine system.

  16. Licenses for possessing and applying radioactive sources, materials, etc

    International Nuclear Information System (INIS)

    Anon.

    1977-01-01

    Commercial and governmental institutions have been licensed by Dutch authorities to possess and apply radioactive sources, materials, etc. A summary is given and the list is subdivided into a number of sections such as radioactive sources, radioactive materials, X-ray equipment and technetium-generators

  17. 46 CFR 308.504 - Definition of territories and possessions.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 8 2010-10-01 2010-10-01 false Definition of territories and possessions. 308.504 Section 308.504 Shipping MARITIME ADMINISTRATION, DEPARTMENT OF TRANSPORTATION EMERGENCY OPERATIONS WAR RISK INSURANCE War Risk Cargo Insurance I-Introduction § 308.504 Definition of territories and...

  18. Selected essential oils inhibit key physiological enzymes and possess intracellular and extracellular antimelanogenic properties in vitro

    Directory of Open Access Journals (Sweden)

    Zaahira Aumeeruddy-Elalfi

    2018-01-01

    Full Text Available Essential oils (EOs extracted from six medicinal herbs and food plants [Cinnamomum zeylanicum (CZ, Psiadia arguta (PA, Psiadia terebinthina (PT, Citrus grandis (CGp, Citrus hystrix (CH, and Citrus reticulata (CR] were studied for any inhibitory potential against key physiological enzymes involved in diabetes (α-glucosidase, skin aging (collagenase and elastase, and neurodegenerative disorders (acetylcholinesterase. Kinetic studies of the active EOs on the aforementioned enzymes were determined using Lineweaver–Burk plots. The intracellular and extracellular antimelanogenic potential of the EOs were evaluated on B16F10 mouse melanocytes. CH and CR were found to significantly inhibit (2.476 ± 0.13 μg/mL and 3.636 ± 0.10 μg/mL, respectively acetylcholinesterase, compared with galantamine (3.989 ± 0.16 μg/mL. CH inhibited collagenase (50% inhibitory concentration 28.71 ± 0.16 μg/mL compared with the control (24.45 ± 0.19 μg/mL. The percentage inhibition in the elastase assay of CH was 63.21% compared to the positive control (75.09%. In addition, CH, CR, CGp, CZ, and PT were found to significantly inhibit α-glucosidase (276.70 ± 0.73 μg/mL, 169.90 ± 0.58 μg/mL, 240.60 ± 6.50 μg/mL, 64.52 ± 0.69 μg/mL, and 313.0 ± 5.0 μg/mL, respectively, compared to acarbose (448.80 ± 0.81 μg/mL. Active EOs showed both uncompetitive and competitive types of inhibition. The EOs also inhibited intracellular (50% inhibitory concentration 15.92 ± 1.06 μg/mL, 23.75 ± 4.47 μg/mL, and 28.99 ± 5.70 μg/mL for CH, CR, and CGp, respectively and extracellular (< 15.625 μg/mL for CH, CR, CGp, and PT melanin production when tested against B16F10 mouse melanocytes. Results from the present study tend to show that EOs extracted from these medicinal plants can inhibit key enzymes and may be potential candidates for cosmetic and pharmaceutical industries.

  19. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  20. INFORMATIONKEY FACTOR FOR CONSUMER SATISFACTION?

    Directory of Open Access Journals (Sweden)

    Maria-Lavinia POPESCU

    2010-12-01

    Full Text Available Starting with the XIX century, we assist at one growth of information importance as following of development of government forms more complexes, of concurrence intensification and of development of communications systems. This process has been increased in the lasts years by the development of telecommunications and of computers systems, by the globalization process and by the intensification of concurrence by educational market, by the exchange and circulation liberalization, by the growth of complexity education institutions. Jim Knight affirms that „the exchange is a present reality in the framework of this the educational institutions must to learn to operate or they assume the failure risk”21. The requests of higher education reform impose by the transition at Bologna system, impose at universities and faculties remarkable efforts by adaptation. With all the reform elements applied, the current educational marketing informational system used in Romania presents big deficiencies especial regarding the quality of information provide at managers and at of institution externs.

  1. Circulating Endothelial Microparticles: A Key Hallmark of Atherosclerosis Progression

    Directory of Open Access Journals (Sweden)

    Keshav Raj Paudel

    2016-01-01

    Full Text Available The levels of circulating microparticles (MPs are raised in various cardiovascular diseases. Their increased level in plasma is regarded as a biomarker of alteration in vascular function. The prominent MPs present in blood are endothelial microparticles (EMPs described as complex submicron (0.1 to 1.0 μm vesicles like structure, released in response to endothelium cell activation or apoptosis. EMPs possess both physiological and pathological effects and may promote oxidative stress and vascular inflammation. EMPs release is triggered by inducer like angiotensin II, lipopolysaccharide, and hydrogen peroxide leading to the progression of atherosclerosis. However, there are multiple physiological pathways for EMPs generation like NADPH oxidase derived endothelial ROS formation, Rho kinase pathway, and mitogen-activated protein kinases. Endothelial dysfunction is a key initiating event in atherosclerotic plaque formation. Atheroemboli, resulting from ruptured carotid plaques, is a major cause of stroke. Increasing evidence suggests that EMPs play an important role in the pathogenesis of cardiovascular disease, acting as a marker of damage, either exacerbating disease progression or triggering a repair response. In this regard, it has been suggested that EMPs have the potential to act as biomarkers of disease status. This review aims to provide updated information of EMPs in relation to atherosclerosis pathogenesis.

  2. INFORMATION TECHNOLOGY, INTERNET, AND MARKETING

    OpenAIRE

    Mihane Berisha-Namani

    2013-01-01

    Information technology developed very fast, and today's marketing activities are not possible without the help of information technology. Furthermore, it is difficult to think of a policy domain not affected by usage of information technology. Information technology is making possible and creating connections between businesses and organizations. The implications of information technology usage in marketing activities are profound too. Using information technology, companies possess the poten...

  3. Whose name is it anyway? Varying patterns of possessive usage in eponymous neurodegenerative diseases

    Directory of Open Access Journals (Sweden)

    Michael R. MacAskill

    2013-04-01

    Full Text Available There has been long-standing debate over whether use of the possessive form of the names of eponymous neurological disorders should be abandoned. Which view has actually predominated in practice? We empirically assessed current and historical usage in the scientific literature. The PubMed database was queried for the percentage of titles published each year from 1960–2012 which contained the possessive form of Parkinson’s (PD, Alzheimer’s (AD, Huntington’s (HD, Wilson’s (WD, and Gaucher’s (GD diseases (e.g. Huntington’s disease or chorea vs Huntington disease or chorea. Down syndrome (DS, well known for its changes in terminology, was used as a reference. The possessive form was nearly universal in all conditions from 1960 until the early 1970s. In both DS and GD it then declined at an approximately constant rate of 2 percentage points per year to drop below 15%. The possessive forms of both PD and AD began to decline at the same time but stabilised and have since remained above 80%, with a similar but more volatile pattern in HD. WD, meanwhile, is intermediate between the DS/GD and PD/AD/HD patterns, with a slower decline to its current value of approximately 60%. Declining possessive form usage in GD and DS papers has been remarkably uniform over time and has nearly reached completion. PD and AD appear stable in remaining predominantly possessive. The larger volume of papers published in those fields and their possibly greater public recognition and involvement may make that unlikely to change in the short-term. In a secondary analysis restricted to PD, we found that practices have switched dramatically several times in each of three US-published general neurology journals. Meanwhile, in two UK-published journals, and in the specialist title “Movement Disorders”, the possessive form has been maintained consistently. The use of eponyms in neurology shows systematic variation across time, disorders, and journals.

  4. Gun possession among American youth: a discovery-based approach to understand gun violence.

    Science.gov (United States)

    Ruggles, Kelly V; Rajan, Sonali

    2014-01-01

    To apply discovery-based computational methods to nationally representative data from the Centers for Disease Control and Preventions' Youth Risk Behavior Surveillance System to better understand and visualize the behavioral factors associated with gun possession among adolescent youth. Our study uncovered the multidimensional nature of gun possession across nearly five million unique data points over a ten year period (2001-2011). Specifically, we automated odds ratio calculations for 55 risk behaviors to assemble a comprehensive table of associations for every behavior combination. Downstream analyses included the hierarchical clustering of risk behaviors based on their association "fingerprint" to 1) visualize and assess which behaviors frequently co-occur and 2) evaluate which risk behaviors are consistently found to be associated with gun possession. From these analyses, we identified more than 40 behavioral factors, including heroin use, using snuff on school property, having been injured in a fight, and having been a victim of sexual violence, that have and continue to be strongly associated with gun possession. Additionally, we identified six behavioral clusters based on association similarities: 1) physical activity and nutrition; 2) disordered eating, suicide and sexual violence; 3) weapon carrying and physical safety; 4) alcohol, marijuana and cigarette use; 5) drug use on school property and 6) overall drug use. Use of computational methodologies identified multiple risk behaviors, beyond more commonly discussed indicators of poor mental health, that are associated with gun possession among youth. Implications for prevention efforts and future interdisciplinary work applying computational methods to behavioral science data are described.

  5. Gun possession among American youth: a discovery-based approach to understand gun violence.

    Directory of Open Access Journals (Sweden)

    Kelly V Ruggles

    Full Text Available OBJECTIVE: To apply discovery-based computational methods to nationally representative data from the Centers for Disease Control and Preventions' Youth Risk Behavior Surveillance System to better understand and visualize the behavioral factors associated with gun possession among adolescent youth. RESULTS: Our study uncovered the multidimensional nature of gun possession across nearly five million unique data points over a ten year period (2001-2011. Specifically, we automated odds ratio calculations for 55 risk behaviors to assemble a comprehensive table of associations for every behavior combination. Downstream analyses included the hierarchical clustering of risk behaviors based on their association "fingerprint" to 1 visualize and assess which behaviors frequently co-occur and 2 evaluate which risk behaviors are consistently found to be associated with gun possession. From these analyses, we identified more than 40 behavioral factors, including heroin use, using snuff on school property, having been injured in a fight, and having been a victim of sexual violence, that have and continue to be strongly associated with gun possession. Additionally, we identified six behavioral clusters based on association similarities: 1 physical activity and nutrition; 2 disordered eating, suicide and sexual violence; 3 weapon carrying and physical safety; 4 alcohol, marijuana and cigarette use; 5 drug use on school property and 6 overall drug use. CONCLUSIONS: Use of computational methodologies identified multiple risk behaviors, beyond more commonly discussed indicators of poor mental health, that are associated with gun possession among youth. Implications for prevention efforts and future interdisciplinary work applying computational methods to behavioral science data are described.

  6. The effect of playing tactics and situational variables on achieving score-box possessions in a professional soccer team.

    Science.gov (United States)

    Lago-Ballesteros, Joaquin; Lago-Peñas, Carlos; Rey, Ezequiel

    2012-01-01

    The aim of this study was to analyse the influence of playing tactics, opponent interaction and situational variables on achieving score-box possessions in professional soccer. The sample was constituted by 908 possessions obtained by a team from the Spanish soccer league in 12 matches played during the 2009-2010 season. Multidimensional qualitative data obtained from 12 ordered categorical variables were used. Sampled matches were registered by the AMISCO PRO system. Data were analysed using chi-square analysis and multiple logistic regression analysis. Of 908 possessions, 303 (33.4%) produced score-box possessions, 477 (52.5%) achieved progression and 128 (14.1%) failed to reach any sort of progression. Multiple logistic regression showed that, for the main variable "team possession type", direct attacks and counterattacks were three times more effective than elaborate attacks for producing a score-box possession (P tactics on producing score-box possessions.

  7. 10 CFR 70.20a - General license to possess special nuclear material for transport.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false General license to possess special nuclear material for transport. 70.20a Section 70.20a Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) DOMESTIC LICENSING OF... transport. (a) A general license is issued to any person to possess formula quantities of strategic special...

  8. Post-quantum attacks on key distribution schemes in the presence of weakly stochastic sources

    International Nuclear Information System (INIS)

    Al–Safi, S W; Wilmott, C M

    2015-01-01

    It has been established that the security of quantum key distribution protocols can be severely compromised were one to permit an eavesdropper to possess a very limited knowledge of the random sources used between the communicating parties. While such knowledge should always be expected in realistic experimental conditions, the result itself opened a new line of research to fully account for real-world weak randomness threats to quantum cryptography. Here we expand of this novel idea by describing a key distribution scheme that is provably secure against general attacks by a post-quantum adversary. We then discuss possible security consequences for such schemes under the assumption of weak randomness. (paper)

  9. 19 CFR 7.2 - Insular possessions of the United States other than Puerto Rico.

    Science.gov (United States)

    2010-04-01

    ... than Puerto Rico. 7.2 Section 7.2 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF... NAVAL STATION § 7.2 Insular possessions of the United States other than Puerto Rico. (a) Insular possessions of the United States other than Puerto Rico are also American territory but, because those insular...

  10. 50 CFR 600.1204 - Shark finning; possession at sea and landing of shark fins.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Shark finning; possession at sea and landing of shark fins. 600.1204 Section 600.1204 Wildlife and Fisheries FISHERY CONSERVATION AND... PROVISIONS Shark Finning § 600.1204 Shark finning; possession at sea and landing of shark fins. (a)(1) No...

  11. Schizophrenia-The spirit possessed 23 year old male from rural ...

    African Journals Online (AJOL)

    A case of a twenty-three year old rural Ghanaian male suffering from schizophrenia and presenting as “possessed by spirits” is reported. Treatment, and outcome by physical means with chlorpromazine; and implications for further research are discussed.

  12. Relationship between length of A-bomb survivor's health handbook possession and mortality risk

    International Nuclear Information System (INIS)

    Otani, Keiko; Ohtaki, Megu; Satoh, Kenichi; Tonda, Tetsuji

    2012-01-01

    The title handbook was first issued to support the health of A-bomb survivors by Japan MHLW in 1957, and about 220 thousands possess it in 2010. Its major supports contain free medicare, 2 periodic and 2 optional medical examinations/year and other various benefits. This study was performed to elucidate the relationship in the title for evaluation of its life prolonging effect on Hiroshima survivors. The length of handbook possession was defined the period from acquiring it to death. The cohort was 17,335 (7,607 men) registered survivors who had had the handbook for 1 year or more, and before Nov. 1965 or later, until Dec. 2010. Causes of death event were classified to be the cerebrovascular, cardiac and cancerous disease, and others were censored. The objective variable was mortality risk, and predictors were the exposed dose, age at the exposure, chronological age and length of handbook possession. Risk of cerebrovascular or cardiac death was estimated by the model of exponential function, and of cancer death, of power function based on multi-stage theory of carcinogenesis. Results revealed that the cerebrovascular mortality of women and men was 8.1 and 7.2%, respectively; cardiac, 8.7 and 7.2%; and cancerous, 10.1 and 14.9%. Significant reduction of relative risk of cerebrovascular death, about 4% per 1 year handbook possession, was observed in men alone; negative correlations of period effect were seen in cerebrovascular and cardiac death of women; and positive correlation between cancer death and exposed dose was observed. The prophylaxis and continuous treatment of cerebrovascular disease due to the handbook possession were thought effective in men. (T.T.)

  13. Key distillation in quantum cryptography

    Science.gov (United States)

    Slutsky, Boris Aron

    1998-11-01

    Quantum cryptography is a technique which permits two parties to communicate over an open channel and establish a shared sequence of bits known only to themselves. This task, provably impossible in classical cryptography, is accomplished by encoding the data on quantum particles and harnessing their unique properties. It is believed that no eavesdropping attack consistent with the laws of quantum theory can compromise the secret data unknowingly to the legitimate users of the channel. Any attempt by a hostile actor to monitor the data carrying particles while in transit reveals itself through transmission errors it must inevitably introduce. Unfortunately, in practice a communication is not free of errors even when no eavesdropping is present. Key distillation is a technique that permits the parties to overcome this difficulty and establish a secret key despite channel defects, under the assumption that every particle is handled independently from other particles by the enemy. In the present work, key distillation is described and its various aspects are studied. A relationship is derived between the average error rate resulting from an eavesdropping attack and the amount of information obtained by the attacker. Formal definition is developed of the security of the final key. The net throughput of secret bits in a quantum cryptosystem employing key distillation is assessed. An overview of quantum cryptographic protocols and related information theoretical results is also given.

  14. Demonic possessions and mental illness: discussion of selected cases in late medieval hagiographical literature.

    Science.gov (United States)

    Espí Forcén, Carlos; Espí Forcén, Fernando

    2014-01-01

    During the Middle Ages, demonic possession constituted an explanation for an erratic behavior in society. Exorcism was the treatment generally applied to demoniacs and seems to have caused some alleviation in the suffering of mentally distressed people. We have selected and analyzed some cases of demonic possession from thirteenth-century hagiographical literature. In the description of demoniacs we have been able to find traits of psychotic, mood, neurotic, personality disorders and epilepsy. The exorcisms analyzed in our article are the result of literary invention more than the description of a contemporary event. Nevertheless, the writers were witnesses of their time, transferred their knowledge about exorcism and possession in their narrative and presumably incorporated their actual experience with demoniacs.

  15. A mental health needs assessment of children and adolescents in post-conflict Liberia: results from a quantitative key-informant survey

    Science.gov (United States)

    Borba, Christina P.C.; Ng, Lauren C.; Stevenson, Anne; Vesga-Lopez, Oriana; Harris, Benjamin L.; Parnarouskis, Lindsey; Gray, Deborah A.; Carney, Julia R.; Domínguez, Silvia; Wang, Edward K.S.; Boxill, Ryan; Song, Suzan J.; Henderson, David C.

    2016-01-01

    Between 1989 and 2004, Liberia experienced a devastating civil war that resulted in widespread trauma with almost no mental health infrastructure to help citizens cope. In 2009, the Liberian Ministry of Health and Social Welfare collaborated with researchers from Massachusetts General Hospital to conduct a rapid needs assessment survey in Liberia with local key informants (n = 171) to examine the impact of war and post-war events on emotional and behavioral problems of, functional limitations of, and appropriate treatment settings for Liberian youth aged 5–22. War exposure and post-conflict sexual violence, poverty, infectious disease and parental death negatively impacted youth mental health. Key informants perceived that youth displayed internalizing and externalizing symptoms and mental health-related functional impairment at home, school, work and in relationships. Medical clinics were identified as the most appropriate setting for mental health services. Youth in Liberia continue to endure the harsh social, economic and material conditions of everyday life in a protracted post-conflict state, and have significant mental health needs. Their observed functional impairment due to mental health issues further limited their access to protective factors such as education, employment and positive social relationships. Results from this study informed Liberia's first post-conflict mental health policy. PMID:26807147

  16. The Use of Key Informant Method for Identifying Children with Blindness and Severe Visual Impairment in Developing Countries.

    Science.gov (United States)

    du Toit, Rènée; Courtright, Paul; Lewallen, Susan

    2017-06-01

    An estimated 19 million children are visually impaired; of these, 1.4 million are irreversibly blind. A key challenge is to identify them early in life to benefit maximally from visual rehabilitation, and/or treatment. This aggregative review and structured literature analysis summarizes evidence of what it is about the key informant (KI) approach that works to identify children with blindness or severe visual impairment (B/SVI) in the community (for whom, to what extent, in what circumstances, in what respect, how and why). Peer-reviewed (PubMed, hand search) and grey literature (Google, World Health Organization website, academic theses, direct requests) were included, and methods and criteria used for identification, productivity (number of children referred per KI), accuracy of referrals (positive predictive value, PPV), age of children with B/SVI, KI definition, sex, information about cost and comparisons aggregated. We included 31 documents describing 22 unique KI programs. Mostly KIs identified children with B/SVI in 1-3 weeks, i.e. "campaign mode." In 60%, KIs were community volunteers, others formal health sector workers (FHSW). Around 0.02-1.56 children per KI (median = 0.25) were successfully recruited. PPV ranged from 12 to 66%. In two studies comparing FHSWs and community KIs, the latter were 8 and 10 times more productive. KIs working in campaign mode may provide an effective approach to identifying children with B/SVI in communities. Including identification of ocular problems and/or other impairments has been recommended. Research on factors that influence effectiveness and on whether KIs continue to contribute could inform programs.

  17. Information Secrecy And Public-Key Cryptography | Mekuria | Zede ...

    African Journals Online (AJOL)

    The subject and need of information secrecy with emphasis to the choice of fully using an already established public channel is to be discussed. Related histories and current achievements made in the area of information hiding, notable persons who changed the course of its progress from ancient times to this last ...

  18. Progress on the Studies of the Key Enzymes of Ginsenoside Biosynthesis

    Directory of Open Access Journals (Sweden)

    Jin-Ling Yang

    2018-03-01

    Full Text Available As the main bioactive constituents of Panax species, ginsenosides possess a wide range of notable medicinal effects such as anti-cancer, anti-oxidative, antiaging, anti-inflammatory, anti-apoptotic and neuroprotective activities. However, the increasing medical demand for ginsenosides cannot be met due to the limited resource of Panax species and the low contents of ginsenosides. In recent years, biotechnological approaches have been utilized to increase the production of ginsenosides by regulating the key enzymes of ginsenoside biosynthesis, while synthetic biology strategies have been adopted to produce ginsenosides by introducing these genes into yeast. This review summarizes the latest research progress on cloning and functional characterization of key genes dedicated to the production of ginsenosides, which not only lays the foundation for their application in plant engineering, but also provides the building blocks for the production of ginsenosides by synthetic biology.

  19. Key drivers for informal project coordination among sub-contractors

    DEFF Research Database (Denmark)

    Aagaard, Annabeth; Eskerod, Pernille; Madsen, Erik Skov

    2015-01-01

    understandings. Still though, many sub-contractors choose not to coordinate informally. The purpose of this paper is to identify drivers that enhance or inhibits informal coordination in projects. A qualitative, explorative case study approach was applied. Fifteen SME sub-contractors within the offshore wind...... are massive. Six drivers which enhance informal coordination and three drivers which inhibit informal coordination among sub-contractors in projects were identified. The findings imply that management in project-oriented organizations can enhance informal coordination across project sub-contractors...... and by facilitating trust building, by emphasizing previous collaboration successes with the sub-contractors and the possibility of future common projects, by being explicit about expectations on informal coordination, and by developing sub-contractor contracts that are not as tight in economic terms, but instead...

  20. New families of conservative systems on $S^2$ possessing an integral of fourth degree in momenta

    OpenAIRE

    Selivanova, Elena N.

    1997-01-01

    There is a well-known example of integrable conservative system on $S^2$, the case of Kovalevskaya in the dynamics of a rigid body, possessing an integral of fourth degree in momenta. Goryachev proposed a one-parameter family of examples of conservative systems on $S^2$ possessing an integral of fourth degree in momenta which includes the case of Kovalevskaya. In this paper we proposed new examples of conservative systems on $S^2$ possessing an integral of fourth degree in momenta.

  1. Prevalence and causes of severe visual impairment and blindness among children in the lorestan province of iran, using the key informant method.

    Science.gov (United States)

    Razavi, Hessom; Kuper, Hannah; Rezvan, Farhad; Amelie, Khatere; Mahboobi-Pur, Hassan; Oladi, Mohammad Reza; Muhit, Mohammad; Hashemi, Hassan

    2010-03-01

    To estimate the prevalence and causes of severe visual impairment and blindness among children in Lorestan province of Iran, and to assess the feasibility of the Key Informant Method in this setting. Potential cases were identified using the Key Informant Method, in 3 counties of Lorestan province during June through August 2008, and referred for examination. Causes of severe visual impairment/blindness were determined and categorized using standard World Health Organization methods. Of 123 children referred for examination, 27 children were confirmed to have severe visual impairment/blindness or blindness. The median age was11 years (interquartile range 6-13), and 59% were girls. After adjusting for non-attenders, the estimated prevalence of severe visual impairment/blindness was 0.04% (0.03-0.05). The main site of abnormality was retina (44%), followed by disorders of the whole eye (33%). The majority of causes had a hereditary etiology (70%), which was associated with a family history of blindness (P = 0.002). Potentially avoidable causes of severe visual impairment/blindness were found in 14 children (52%). Almost all children with severe visual impairment/blindness had a history of parental consanguinity (93%). Our findings suggest a moderate prevalence of childhood blindness in the Lorestan province of Iran, a high proportion of which may be avoidable, given improved access to ophthalmic and genetic counselling services in rural areas. The Key Informant Method is feasible in Iran; future research is discussed.

  2. Scientific information and the Tongass land management plan: key findings derived from the scientific literature, species assessments, resource analyses, workshops, and risk assessment panels.

    Science.gov (United States)

    Douglas N. Swanston; Charles G. Shaw; Winston P. Smith; Kent R. Julin; Guy A. Cellier; Fred H. Everest

    1996-01-01

    This document highlights key items of information obtained from the published literature and from specific assessments, workshops, resource analyses, and various risk assessment panels conducted as part of the Tongass land management planning process. None of this information dictates any particular decision; however, it is important to consider during decisionmaking...

  3. Prepositions in Use: Prepositions of Standard, Prepositions of Possession and Prepositions of Accompaniment

    Directory of Open Access Journals (Sweden)

    Naji Masned AlQbailat

    2016-08-01

    Full Text Available The current research paper attempted at investigating the use of prepositions of standard, prepositions of possession and prepositions of accompaniment by some Jordanian learners of English. A total of 53 Jordanian English Majors participated in the study from the department of English language at Princess Alia University College. In collecting the needed data for the purpose of the study, the researchers employed fifteen items of a multiple choice test. The results of the study showed that Jordanian learners of English encountered moderate difficulty in learning the three aforesaid usages of prepositions. This difficulty is ascribed mainly to first language interference more than intralingual interference. It was also found that prepositions of standard are the most difficult to learn by the participants, followed by prepositions of accompaniment and prepositions of possession respectively.       Keywords: First language Interference, Intralingual Interference, Prepositions of Standard, Prepositions of Accompaniment, Prepositions of Possession

  4. Extracting key information from historical data to quantify the transmission dynamics of smallpox

    Directory of Open Access Journals (Sweden)

    Brockmann Stefan O

    2008-08-01

    Full Text Available Abstract Background Quantification of the transmission dynamics of smallpox is crucial for optimizing intervention strategies in the event of a bioterrorist attack. This article reviews basic methods and findings in mathematical and statistical studies of smallpox which estimate key transmission parameters from historical data. Main findings First, critically important aspects in extracting key information from historical data are briefly summarized. We mention different sources of heterogeneity and potential pitfalls in utilizing historical records. Second, we discuss how smallpox spreads in the absence of interventions and how the optimal timing of quarantine and isolation measures can be determined. Case studies demonstrate the following. (1 The upper confidence limit of the 99th percentile of the incubation period is 22.2 days, suggesting that quarantine should last 23 days. (2 The highest frequency (61.8% of secondary transmissions occurs 3–5 days after onset of fever so that infected individuals should be isolated before the appearance of rash. (3 The U-shaped age-specific case fatality implies a vulnerability of infants and elderly among non-immune individuals. Estimates of the transmission potential are subsequently reviewed, followed by an assessment of vaccination effects and of the expected effectiveness of interventions. Conclusion Current debates on bio-terrorism preparedness indicate that public health decision making must account for the complex interplay and balance between vaccination strategies and other public health measures (e.g. case isolation and contact tracing taking into account the frequency of adverse events to vaccination. In this review, we summarize what has already been clarified and point out needs to analyze previous smallpox outbreaks systematically.

  5. Association between socio-economic status and childhood undernutrition in Bangladesh; a comparison of possession score and poverty index.

    Science.gov (United States)

    Mohsena, Masuda; Mascie-Taylor, C G Nicholas; Goto, Rie

    2010-10-01

    To determine how much of the variation in nutritional status of Bangladeshi children under 5 years old can be attributed to the socio-economic status of the family. Nutritional status used reference Z-scores of weight-for-age (WAZ), height-for-age (HAZ) and weight-for-height (WHZ). A 'possession score' was generated based on ownership of a radio, television, bicycle, motorcycle and telephone, and the availability of electricity, with categories of 0 to 4+ possessions. A five-point (quintile) 'poverty index' was created using principal component analysis. The Bangladesh Demographic and Health Survey 2004 was the source of data. A sample of 4891 children aged <5 years was obtained. Some 57.8 % of the sample was either stunted, wasted or underweight (7.7 % were stunted, wasted and underweight). Of those stunted (48.4 %), 25.7 % were also underweight. Underweight and wasting prevalences were 40.7 % and 14.3 %, respectively. Mean WAZ, HAZ and WHZ did not differ by sex. Children of mothers with no education or no possessions were, on average, about 1 sd more underweight and stunted than those with higher educated mothers or with 4+ possessions. The possession score provided much greater discrimination of undernutrition than the poverty index. Nearly 50 % of children from households with no possessions were stunted, wasted or underweight (only 27 % in the poorest quintile), compared with only 3-6 % of children from households with 4+ possessions (over 13 % in the richest quintile). Maternal education and possession score were the main predictors of a child's nutritional status. Possession score was a much better indicator of undernutrition than the poverty index.

  6. A Novel Method for Generating Encryption Keys

    Directory of Open Access Journals (Sweden)

    Dascalescu Ana Cristina

    2009-12-01

    Full Text Available The development of the informational society, which has led to an impressive growth of the information volume circulating in the computer networks, has accelerated the evolution and especially the use of modern cryptography instruments. Today, the commercial products use standard cryptographic libraries that implement certified and tested cryptographic algorithms. Instead, the fragility ofencryption algorithms is given by compositional operations like key handling or key generation. In this sense, the article proposes an innovative method to generate pseudorandom numbers which can be used for the construction of secure stream encryption keys. The proposed method is based on the mathematical complements based on the algebra of the finite fields and uses a particularized structure of the linear feedback shift registers.

  7. 27 CFR 479.105 - Transfer and possession of machine guns.

    Science.gov (United States)

    2010-04-01

    ... a department, agency, or political subdivision thereof; or any lawful transfer or lawful possession... distribution to any department or agency of the United States or any State or political subdivision thereof, or... entities expressing a need for a particular model or interest in seeing a demonstration of a particular...

  8. Network Information Management: The Key To Providing High WAN Availability.

    Science.gov (United States)

    Tysdal, Craig

    1996-01-01

    Discusses problems associated with increasing corporate network complexity as a result of the proliferation of client/server applications at remote locations, and suggests the key to providing high WAN (wide area network) availability is relational databases used in an integrated management approach. (LRW)

  9. High-Rate Field Demonstration of Large-Alphabet Quantum Key Distribution

    Science.gov (United States)

    2016-10-12

    count rate of Bob’s detectors. In this detector-limited regime , it is advantageous to increase M to encode as much information as possible in each...High- rate field demonstration of large-alphabet quantum key distribution Catherine Lee,1, 2 Darius Bunandar,1 Zheshen Zhang,1 Gregory R. Steinbrecher...October 12, 2016) 2 Quantum key distribution (QKD) enables secure symmetric key exchange for information-theoretically secure com- munication via one-time

  10. 7 CFR 1210.607 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential information. 1210.607 Section 1210.607 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... contents and all other information or reports furnished to, compiled by, or in possession of, the...

  11. Rulings in Argentinean and Colombian courts decriminalize possession of small amounts of narcotics.

    Science.gov (United States)

    Cozac, David

    2009-12-01

    Two recent court decisions in South America have reflected a growing backlash in the region against the so-called, U.S.-led "war on drugs". In Argentina, the Supreme Court of Justice ruled unanimously on 25 August 2009 that the second paragraph of Article 14 of the country's drug control legislation, which punishes the possession of drugs for personal consumption, was unconstitutional. In Colombia, the Supreme Court of Justice ruled on 8 July 2009 that the possession of illegal drugs for personal use was not a criminal offence.

  12. 50 CFR 648.322 - Skate allocation, possession, and landing provisions.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Skate allocation, possession, and landing provisions. 648.322 Section 648.322 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE FISHERIES OF THE NORTHEASTERN UNITED STATES Management Measures for the NE Skate...

  13. Key to marine arthropod larvae

    Directory of Open Access Journals (Sweden)

    John A. Fornshell

    2012-03-01

    Full Text Available The scope of this key is restricted to the larvae of marine arthropods. The key is based solely on their morphology, patterns of body segmentation, numbers of appendages, and mode of locomotion. An effort has been made to treat all traditionally named larval forms, both planktonic and benthic. It is intended that this key be useful for a researcher working with archived museum specimens and therefore, does not include habitat information as a identifying trait, even though this information is usually available in the archived records. Within the phylum Arthropoda there are two sub-phyla and eleven classes having larval stages in the marineenvironment. Where feasible the original names of the various larval types have been used. Because this nomenclature is less commonly used today compared to the past, the more recent taxonomic affinities are included in parentheses after the original larval name. The key includes the following thirty-four larvae: Branchhiopoda nauplii; Cephalocarida nauplii; Mystacocarida nauplii; trilobite larva; protonymphon; hexapod larvae; Remipedia nauplii; nauplius - Y larvae; Cirripedia nauplii; Ascothoracida nauplii; Ostracoda nauplii; Euphausiacea nauplii; Penaeidea nauplii; Cyclopoida nauplii; Calanoida nauplii; Harpacticoida nauplii;Polyarthra nauplii; cypris larva; eryonecius larva; cypris-Y larva; elapthocaris larvae; mysis larvae; lucifer zoea; acetes zoea; acanthosoma larva; phyllosoma; antizoea larva; anomuran zoea; brachyuran zoea; calyptopis larvae; furcilia larva; crytopia larva; puerulus larva; alima larva.

  14. Adducin family proteins possess different nuclear export potentials.

    Science.gov (United States)

    Liu, Chia-Mei; Hsu, Wen-Hsin; Lin, Wan-Yi; Chen, Hong-Chen

    2017-05-10

    The adducin (ADD) family proteins, namely ADD1, ADD2, and ADD3, are actin-binding proteins that play important roles in the stabilization of membrane cytoskeleton and cell-cell junctions. All the ADD proteins contain a highly conserved bipartite nuclear localization signal (NLS) at the carboxyl termini, but only ADD1 can localize to the nucleus. The reason for this discrepancy is not clear. To avoid the potential effect of cell-cell junctions on the distribution of ADD proteins, HA epitope-tagged ADD proteins and mutants were transiently expressed in NIH3T3 fibroblasts and their distribution in the cytoplasm and nucleus was examined by immunofluorescence staining. Several nuclear proteins were identified to interact with ADD1 by mass spectrometry, which were further verified by co-immunoprecipitation. In this study, we found that ADD1 was detectable both in the cytoplasm and nucleus, whereas ADD2 and ADD3 were detected only in the cytoplasm. However, ADD2 and ADD3 were partially (~40%) sequestered in the nucleus by leptomycin B, a CRM1/exportin1 inhibitor. Upon the removal of leptomycin B, ADD2 and ADD3 re-distributed to the cytoplasm. These results indicate that ADD2 and ADD3 possess functional NLS and are quickly transported to the cytoplasm upon entering the nucleus. Indeed, we found that ADD2 and ADD3 possess much higher potential to counteract the activity of the NLS derived from Simian virus 40 large T-antigen than ADD1. All the ADD proteins appear to contain multiple nuclear export signals mainly in their head and neck domains. However, except for the leucine-rich motif ( 377 FEALMRMLDWLGYRT 391 ) in the neck domain of ADD1, no other classic nuclear export signal was identified in the ADD proteins. In addition, the nuclear retention of ADD1 facilitates its interaction with RNA polymerase II and zinc-finger protein 331. Our results suggest that ADD2 and ADD3 possess functional NLS and shuttle between the cytoplasm and nucleus. The discrepancy in the

  15. Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems.

    Science.gov (United States)

    Sutrala, Anil Kumar; Das, Ashok Kumar; Odelu, Vanga; Wazid, Mohammad; Kumari, Saru

    2016-10-01

    Information and communication and technology (ICT) has changed the entire paradigm of society. ICT facilitates people to use medical services over the Internet, thereby reducing the travel cost, hospitalization cost and time to a greater extent. Recent advancements in Telecare Medicine Information System (TMIS) facilitate users/patients to access medical services over the Internet by gaining health monitoring facilities at home. Amin and Biswas recently proposed a RSA-based user authentication and session key agreement protocol usable for TMIS, which is an improvement over Giri et al.'s RSA-based user authentication scheme for TMIS. In this paper, we show that though Amin-Biswas's scheme considerably improves the security drawbacks of Giri et al.'s scheme, their scheme has security weaknesses as it suffers from attacks such as privileged insider attack, user impersonation attack, replay attack and also offline password guessing attack. A new RSA-based user authentication scheme for TMIS is proposed, which overcomes the security pitfalls of Amin-Biswas's scheme and also preserves user anonymity property. The careful formal security analysis using the two widely accepted Burrows-Abadi-Needham (BAN) logic and the random oracle models is done. Moreover, the informal security analysis of the scheme is also done. These security analyses show the robustness of our new scheme against the various known attacks as well as attacks found in Amin-Biswas's scheme. The simulation of the proposed scheme using the widely accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool is also done. We present a new user authentication and session key agreement scheme for TMIS, which fixes the mentioned security pitfalls found in Amin-Biswas's scheme, and we also show that the proposed scheme provides better security than other existing schemes through the rigorous security analysis and verification tool. Furthermore, we present the formal security

  16. Locks and Keys Service

    CERN Multimedia

    Claude Ducastel

    The GS-LS-SEM section is pleased to inform you that as from Monday 30 November 2009, the opening hours of the Locks and Keys service will be the following: 08h30 - 12h30 / 13h30 - 16:30, Mondays to Fridays. GS-SEM-LS 73333

  17. Information Society and Knowledge Economy - Essence and Key Relationships

    Directory of Open Access Journals (Sweden)

    Rafał Żelazny

    2015-04-01

    Full Text Available This paper focuses on essence and relationships between information society (IS and knowledge economy (KE concepts. The aim of this article is twofold. The first objective is to denominate the conceptual framework and relationships between IS and KE conceptions. The second is to present dependencies between the indexes of IS and KE development level in selected countries. Firstly, based on the notional relations between information and knowledge, there are characterized the relationships between concepts of information society, knowledge economy and knowledge society (KS. Secondly, using popular composite indexes evaluating the degree of IS and KE development i.e. Networked Readiness Index (NRI, ICT Development Index (IDI, Knowledge Economy Index (KEI and Summary Innovation Index (SII, there were studied corelations between information society and knowledge economy in 34 selected countries in 2012. The paper concludes by stating limits and implications for further research. This work contributes to systematization and integration of knowledge about the mutually permeable conceptions of information society and knowledge economy

  18. 48 CFR 52.236-11 - Use and Possession Prior to Completion.

    Science.gov (United States)

    2010-10-01

    ... possession or use shall not be deemed an acceptance of any work under the contract. (b) While the Government... adjustment shall be made in the contract price or the time of completion, and the contract shall be modified...

  19. Utilizing Information Technology to Facilitate Rapid Acquisition

    Science.gov (United States)

    2006-06-01

    PAGES 109 14. SUBJECT TERMS Rapid Acquisition, eCommerce , eProcurement, Information Technology, Contracting, Global Information Network...Agency. 5 eCommerce and eProcurement, and possess an adequate knowledge of information technology. D. RESEARCH QUESTIONS 1. Primary Research... eCommerce , Information Technology, and eProcurement knowledge, and government and private industry reports utilizing numerous library and Internet

  20. Vector correlation analysis for inelastic and reactive collisions between partners possessing spin and orbital angular momentum.

    Science.gov (United States)

    Balint-Kurti, Gabriel G; Vasyutinskii, Oleg S

    2009-12-31

    A general reactive collision of the type A + B --> C + D is considered where both the collision partners (A and B) or the products (C and D) may possess internal, i.e., spin, orbital or rotational, angular momenta. Compact expressions are derived using a rigorous quantum mechanical analysis for the angular momentum anisotropy of either of the products (C or D) arising from an initially polarized distribution of the reactant angular momentum. The angular momentum distribution of the product is expressed in terms of canonical spherical tensors multiplied by anisotropy-transforming coefficients c(K(i)q(k))(K)(K(r),L). These coefficients act as transformation coefficients between the angular momentum anisotropy of the reactants and that of the product. They are independent of scattering angle but depend on the details of the scattering dynamics. The relationship between the coefficients c(K(i)q(k))(K)(K(r),L) and the body-fixed scattering S matrix is given and the methodology for the quantum mechanical calculation of the anisotropy-transforming coefficients is clearly laid out. The anisotropy-transforming coefficients are amenable to direct experimental measurement in a similar manner to vector correlation and alignment parameters in photodissociation processes. A key aspect of the theory is the use of projections of both reactant and product angular momenta onto the product recoil vector direction. An important new conservation rule is revealed through the analysis, namely that if the state multipole for reactant angular momentum distribution has a projection q(k) onto the product recoil vector the state multipoles for the product angular momentum distribution all have this same projection. Expressions are also presented for the distribution of the product angular momentum when its components are evaluated relative to the space-fixed Z-axis. Notes with detailed derivations of all the formulas are available as Supporting Information.

  1. NAGRADATA. Code key. Geology

    International Nuclear Information System (INIS)

    Mueller, W.H.; Schneider, B.; Staeuble, J.

    1984-01-01

    This reference manual provides users of the NAGRADATA system with comprehensive keys to the coding/decoding of geological and technical information to be stored in or retreaved from the databank. Emphasis has been placed on input data coding. When data is retreaved the translation into plain language of stored coded information is done automatically by computer. Three keys each, list the complete set of currently defined codes for the NAGRADATA system, namely codes with appropriate definitions, arranged: 1. according to subject matter (thematically) 2. the codes listed alphabetically and 3. the definitions listed alphabetically. Additional explanation is provided for the proper application of the codes and the logic behind the creation of new codes to be used within the NAGRADATA system. NAGRADATA makes use of codes instead of plain language for data storage; this offers the following advantages: speed of data processing, mainly data retrieval, economies of storage memory requirements, the standardisation of terminology. The nature of this thesaurian type 'key to codes' makes it impossible to either establish a final form or to cover the entire spectrum of requirements. Therefore, this first issue of codes to NAGRADATA must be considered to represent the current state of progress of a living system and future editions will be issued in a loose leave ringbook system which can be updated by an organised (updating) service. (author)

  2. Global mental health and trauma exposure: the current evidence for the relationship between traumatic experiences and spirit possession.

    Science.gov (United States)

    Hecker, Tobias; Braitmayer, Lars; van Duijl, Marjolein

    2015-01-01

    We present a literature review on trauma exposure and spirit possession in low- and middle-income countries (LMICs). Despite the World Health Organization's objective of culturally appropriate mental health care in the Mental Health Action Plan 2013-2020, and the recommendations of the Inter-Agency Standing Committee to consider local idioms of distress and to collaborate with local resources, this topic still receives very little attention. Pathological spirit possession is commonly defined as involuntary, uncontrollable, and occurring outside of ritual settings. It is often associated with stigmatization, suffering, and dysfunctional behavior. While spirit possession has been discussed as an idiom of distress in anthropological literature, recent quantitative studies have presented support for a strong relationship between traumatic experiences and pathological possession states. The aim of this review was to investigate this relationship systematically in LMICs, in view of the debate on how to address the mental health gap in LMICs. Twenty-one articles, published in peer-reviewed English-language journals between 1994 and 2013, were identified and analyzed with regard to prevalence of possessive trance disorders, patients' sociodemographic characteristics, and its relation to traumatic experiences. The review and analysis of 917 patients with symptoms of possessive trance disorders from 14 LMICs indicated that it is a phenomenon occurring worldwide and with global relevance. This literature review suggests a strong relationship between trauma exposure and spirit possession with high prevalence rates found especially in postwar areas in African countries. More attention for possessive trance disorders in mental health and psychosocial intervention programs in humanitarian emergency settings as well as in societies in transition in LMICs is needed and justified by the results of this systematic literature review.

  3. The effect of touch-key size on the usability of In-Vehicle Information Systems and driving safety during simulated driving.

    Science.gov (United States)

    Kim, Heejin; Kwon, Sunghyuk; Heo, Jiyoon; Lee, Hojin; Chung, Min K

    2014-05-01

    Investigating the effect of touch-key size on usability of In-Vehicle Information Systems (IVISs) is one of the most important research issues since it is closely related to safety issues besides its usability. This study investigated the effects of the touch-key size of IVISs with respect to safety issues (the standard deviation of lane position, the speed variation, the total glance time, the mean glance time, the mean time between glances, and the mean number of glances) and the usability of IVISs (the task completion time, error rate, subjective preference, and NASA-TLX) through a driving simulation. A total of 30 drivers participated in the task of entering 5-digit numbers with various touch-key sizes while performing simulated driving. The size of the touch-key was 7.5 mm, 12.5 mm, 17.5 mm, 22.5 mm and 27.5 mm, and the speed of driving was set to 0 km/h (stationary state), 50 km/h and 100 km/h. As a result, both the driving safety and the usability of the IVISs increased as the touch-key size increased up to a certain size (17.5 mm in this study), at which they reached asymptotes. We performed Fitts' law analysis of our data, and this revealed that the data from the dual task experiment did not follow Fitts' law. Copyright © 2013 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  4. Lean Information Management: Criteria For Selecting Key Performance Indicators At Shop Floor

    Science.gov (United States)

    Iuga, Maria Virginia; Kifor, Claudiu Vasile; Rosca, Liviu-Ion

    2015-07-01

    Most successful organizations worldwide use key performance indicators as an important part of their corporate strategy in order to forecast, measure and plan their businesses. Performance metrics vary in their purpose, definition and content. Therefore, the way organizations select what they think are the optimal indicators for their businesses varies from company to company, sometimes even from department to department. This study aims to answer the question of what is the most suitable way to define and select key performance indicators. More than that, it identifies the right criteria to select key performance indicators at shop floor level. This paper contributes to prior research by analysing and comparing previously researched selection criteria and proposes an original six-criteria-model, which caters towards choosing the most adequate KPIs. Furthermore, the authors take the research a step further by further steps to closed research gaps within this field of study.

  5. 31 CFR 601.5 - Penalty for unauthorized control or possession.

    Science.gov (United States)

    2010-07-01

    ... CURRENCY AND OTHER SECURITIES § 601.5 Penalty for unauthorized control or possession. The Secretary of the... heretofore adopted for the printing of paper currency or other obligations or securities of the United States, is and will be subject to the provisions of 18 U.S.C. 474A which provides, in part, that it is...

  6. The politics of agenda setting at the global level: key informant interviews regarding the International Labour Organization Decent Work Agenda.

    Science.gov (United States)

    Di Ruggiero, Erica; Cohen, Joanna E; Cole, Donald C

    2014-07-01

    Global labour markets continue to undergo significant transformations resulting from socio-political instability combined with rises in structural inequality, employment insecurity, and poor working conditions. Confronted by these challenges, global institutions are providing policy guidance to protect and promote the health and well-being of workers. This article provides an account of how the International Labour Organization's Decent Work Agenda contributes to the work policy agendas of the World Health Organization and the World Bank. This qualitative study involved semi-structured interviews with representatives from three global institutions--the International Labour Organization (ILO), the World Health Organization and the World Bank. Of the 25 key informants invited to participate, 16 took part in the study. Analysis for key themes was followed by interpretation using selected agenda setting theories. Interviews indicated that through the Decent Work Agenda, the International Labour Organization is shaping the global policy narrative about work among UN agencies, and that the pursuit of decent work and the Agenda were perceived as important goals with the potential to promote just policies. The Agenda was closely linked to the World Health Organization's conception of health as a human right. However, decent work was consistently identified by World Bank informants as ILO terminology in contrast to terms such as job creation and job access. The limited evidence base and its conceptual nature were offered as partial explanations for why the Agenda has yet to fully influence other global institutions. Catalytic events such as the economic crisis were identified as creating the enabling conditions to influence global work policy agendas. Our evidence aids our understanding of how an issue like decent work enters and stays on the policy agendas of global institutions, using the Decent Work Agenda as an illustrative example. Catalytic events and policy

  7. The politics of agenda setting at the global level: key informant interviews regarding the International Labour Organization Decent Work Agenda

    Science.gov (United States)

    2014-01-01

    Background Global labour markets continue to undergo significant transformations resulting from socio-political instability combined with rises in structural inequality, employment insecurity, and poor working conditions. Confronted by these challenges, global institutions are providing policy guidance to protect and promote the health and well-being of workers. This article provides an account of how the International Labour Organization’s Decent Work Agenda contributes to the work policy agendas of the World Health Organization and the World Bank. Methods This qualitative study involved semi-structured interviews with representatives from three global institutions – the International Labour Organization (ILO), the World Health Organization and the World Bank. Of the 25 key informants invited to participate, 16 took part in the study. Analysis for key themes was followed by interpretation using selected agenda setting theories. Results Interviews indicated that through the Decent Work Agenda, the International Labour Organization is shaping the global policy narrative about work among UN agencies, and that the pursuit of decent work and the Agenda were perceived as important goals with the potential to promote just policies. The Agenda was closely linked to the World Health Organization’s conception of health as a human right. However, decent work was consistently identified by World Bank informants as ILO terminology in contrast to terms such as job creation and job access. The limited evidence base and its conceptual nature were offered as partial explanations for why the Agenda has yet to fully influence other global institutions. Catalytic events such as the economic crisis were identified as creating the enabling conditions to influence global work policy agendas. Conclusions Our evidence aids our understanding of how an issue like decent work enters and stays on the policy agendas of global institutions, using the Decent Work Agenda as an illustrative

  8. Bit-Oriented Quantum Public-Key Cryptosystem Based on Bell States

    Science.gov (United States)

    Wu, WanQing; Cai, QingYu; Zhang, HuanGuo; Liang, XiaoYan

    2018-06-01

    Quantum public key encryption system provides information confidentiality using quantum mechanics. This paper presents a quantum public key cryptosystem ( Q P K C) based on the Bell states. By H o l e v o' s theorem, the presented scheme provides the security of the secret key using one-wayness during the QPKC. While the QPKC scheme is information theoretic security under chosen plaintext attack ( C P A). Finally some important features of presented QPKC scheme can be compared with other QPKC scheme.

  9. Global mental health and trauma exposure: the current evidence for the relationship between traumatic experiences and spirit possession

    Science.gov (United States)

    Hecker, Tobias; Braitmayer, Lars; van Duijl, Marjolein

    2015-01-01

    Background We present a literature review on trauma exposure and spirit possession in low- and middle-income countries (LMICs). Despite the World Health Organization's objective of culturally appropriate mental health care in the Mental Health Action Plan 2013–2020, and the recommendations of the Inter-Agency Standing Committee to consider local idioms of distress and to collaborate with local resources, this topic still receives very little attention. Pathological spirit possession is commonly defined as involuntary, uncontrollable, and occurring outside of ritual settings. It is often associated with stigmatization, suffering, and dysfunctional behavior. While spirit possession has been discussed as an idiom of distress in anthropological literature, recent quantitative studies have presented support for a strong relationship between traumatic experiences and pathological possession states. Objective The aim of this review was to investigate this relationship systematically in LMICs, in view of the debate on how to address the mental health gap in LMICs. Methods Twenty-one articles, published in peer-reviewed English-language journals between 1994 and 2013, were identified and analyzed with regard to prevalence of possessive trance disorders, patients’ sociodemographic characteristics, and its relation to traumatic experiences. Results The review and analysis of 917 patients with symptoms of possessive trance disorders from 14 LMICs indicated that it is a phenomenon occurring worldwide and with global relevance. This literature review suggests a strong relationship between trauma exposure and spirit possession with high prevalence rates found especially in postwar areas in African countries. Conclusions More attention for possessive trance disorders in mental health and psychosocial intervention programs in humanitarian emergency settings as well as in societies in transition in LMICs is needed and justified by the results of this systematic literature review

  10. Global mental health and trauma exposure: the current evidence for the relationship between traumatic experiences and spirit possession

    Directory of Open Access Journals (Sweden)

    Tobias Hecker

    2015-11-01

    Full Text Available Background: We present a literature review on trauma exposure and spirit possession in low- and middle-income countries (LMICs. Despite the World Health Organization's objective of culturally appropriate mental health care in the Mental Health Action Plan 2013–2020, and the recommendations of the Inter-Agency Standing Committee to consider local idioms of distress and to collaborate with local resources, this topic still receives very little attention. Pathological spirit possession is commonly defined as involuntary, uncontrollable, and occurring outside of ritual settings. It is often associated with stigmatization, suffering, and dysfunctional behavior. While spirit possession has been discussed as an idiom of distress in anthropological literature, recent quantitative studies have presented support for a strong relationship between traumatic experiences and pathological possession states. Objective: The aim of this review was to investigate this relationship systematically in LMICs, in view of the debate on how to address the mental health gap in LMICs. Methods: Twenty-one articles, published in peer-reviewed English-language journals between 1994 and 2013, were identified and analyzed with regard to prevalence of possessive trance disorders, patients’ sociodemographic characteristics, and its relation to traumatic experiences. Results: The review and analysis of 917 patients with symptoms of possessive trance disorders from 14 LMICs indicated that it is a phenomenon occurring worldwide and with global relevance. This literature review suggests a strong relationship between trauma exposure and spirit possession with high prevalence rates found especially in postwar areas in African countries. Conclusions: More attention for possessive trance disorders in mental health and psychosocial intervention programs in humanitarian emergency settings as well as in societies in transition in LMICs is needed and justified by the results of this

  11. Male homosexuality and spirit possession in Brazil.

    Science.gov (United States)

    Fry, P

    1985-01-01

    This paper examines the relationship between male homosexuality and the Afro-Brazilian possession cults in Belém do Parà. After a discussion of the literature follows a description of the cults' beliefs, rites and social organization. Male sex roles are then discussed and the two categories, bicha and man, analyzed. It is noted that there is no term which is equivalent to the western category of "homosexual" in this taxonomic system. After putting forward folk explanations for the presence of many bichas in the cults, an analysis is put forward of the social rewards available to bichas within these cults, and the structural relationship between homosexuality and these regions in terms of their congruent marginality vis-à-vis "normal society."

  12. Using Key Informant Method to Determine the Prevalence and Causes of Childhood Blindness in South-Eastern Nigeria.

    Science.gov (United States)

    Aghaji, Ada E; Ezegwui, Ifeoma R; Shiweobi, Jude O; Mamah, Cyril C; Okoloagu, Mary N; Onwasigwe, Ernest N

    2017-12-01

    To determine the prevalence and causes of childhood blindness in an underserved community in south-eastern Nigeria using the key informant method. This was a descriptive cross-sectional study. Key informants (KI) appointed by their respective communities received 1-day training on identification of blind children in their communities. Two weeks later, the research team visited the agreed sites within the community and examined the identified children. The World Health Organization eye examination record for blind children was used for data collection. Data entry and analysis were done with the Statistical Package for Social Sciences (SPSS) version 17.0. Fifteen blind or severely visually impaired children (age range 3 months to 15 years) were identified in this community; nine of these were brought by the KIs. The prevalence of childhood blindness/severe visual impairment (BL/SVI) was 0.12 per 1000 children. By anatomical classification, operable cataract in 6 (40.0%) was the leading cause of BL/SVI in the series; followed by optic nerve lesions (atrophy/hypoplasia) in 3 (20.0%). The etiology of BL/SVI is unknown for the majority of the children (66.7%). It was presumed hereditary in four children (26.7%). Sixty percent of the blindness was judged avoidable. Only three children (20.0%) were enrolled in the Special Education Centre for the Blind. The prevalence of childhood BL/SVI in our study population is low but over half of the blindness is avoidable. There may be a significant backlog of operable childhood cataract in south-eastern Nigeria. The KI method is a practical method for case finding of blind children in rural communities.

  13. Privacy amplification for quantum key distribution

    International Nuclear Information System (INIS)

    Watanabe, Yodai

    2007-01-01

    This paper examines classical privacy amplification using a universal family of hash functions. In quantum key distribution, the adversary's measurement can wait until the choice of hash functions is announced, and so the adversary's information may depend on the choice. Therefore the existing result on classical privacy amplification, which assumes the independence of the choice from the other random variables, is not applicable to this case. This paper provides a security proof of privacy amplification which is valid even when the adversary's information may depend on the choice of hash functions. The compression rate of the proposed privacy amplification can be taken to be the same as that of the existing one with an exponentially small loss in secrecy of a final key. (fast track communication)

  14. Measuring Sexual Behavior Stigma to Inform Effective HIV Prevention and Treatment Programs for Key Populations

    Science.gov (United States)

    Hargreaves, James R; Sprague, Laurel; Stangl, Anne L; Baral, Stefan D

    2017-01-01

    Background The levels of coverage of human immunodeficiency virus (HIV) treatment and prevention services needed to change the trajectory of the HIV epidemic among key populations, including gay men and other men who have sex with men (MSM) and sex workers, have consistently been shown to be limited by stigma. Objective The aim of this study was to propose an agenda for the goals and approaches of a sexual behavior stigma surveillance effort for key populations, with a focus on collecting surveillance data from 4 groups: (1) members of key population groups themselves (regardless of HIV status), (2) people living with HIV (PLHIV) who are also members of key populations, (3) members of nonkey populations, and (4) health workers. Methods We discuss strengths and weaknesses of measuring multiple different types of stigma including perceived, anticipated, experienced, perpetrated, internalized, and intersecting stigma as measured among key populations themselves, as well as attitudes or beliefs about key populations as measured among other groups. Results With the increasing recognition of the importance of stigma, consistent and validated stigma metrics for key populations are needed to monitor trends and guide immediate action. Evidence-based stigma interventions may ultimately be the key to overcoming the barriers to coverage and retention in life-saving antiretroviral-based HIV prevention and treatment programs for key populations. Conclusions Moving forward necessitates the integration of validated stigma scales in routine HIV surveillance efforts, as well as HIV epidemiologic and intervention studies focused on key populations, as a means of tracking progress toward a more efficient and impactful HIV response. PMID:28446420

  15. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  16. O PARAÍSO KEY WEST – UMA VISÃO DE SEGMENTAÇÃO DE MERCADO

    Directory of Open Access Journals (Sweden)

    Myriam de Andrade Caminha Costa

    2007-12-01

    Full Text Available Society each time more, needs mechanisms to surpass problems and limitations. One understands that the world-wide tourism if characterizes for possessing great capacity of adaptation and segmentation of markets, on the basis of the dynamic of estruturação of new products and also in new consuming markets. The Tourism constitutes a economic activity that promotes one of the biggest factors of development. Key West it is the last Florida island Keys - joint of islands to the south of the Flowery one - Been Joined. The natural beauty of these islands forms a great tourist polar region. Key West had its economy shaken for the weakness of the commerce of the cigar, the sponges and the withdrawal of the Armed Forces; the tourism redirected its economy. Tourism Single it is a segmentation of market of the tourism that encloses some interfaces, such as: ecological tourism, of adventure, GLBT, cultural, among others. Key West for its ample gamma of performance, can be seen as a lesson of integration between cultures, social tolerance, ambient conscience and sustentabilidade.

  17. Dissociative trance disorder: clinical and Rorschach findings in ten persons reporting demon possession and treated by exorcism.

    Science.gov (United States)

    Ferracuti, S; Sacco, R; Lazzari, R

    1996-06-01

    Although dissociative trance disorders, especially possession disorder, are probably more common than is usually though, precise clinical data are lacking. Ten persons undergoing exorcisms for devil trance possession state were studied with the Dissociative Disorders Diagnostic Schedule and the Rorschach test. These persons had many traits in common with dissociative identity disorder patients. They were overwhelmed by paranormal experiences. Despite claiming possession by a demon, most of them managed to maintain normal social functioning. Rorschach findings showed that these persons had a complex personality organization: Some of them displayed a tendency to oversimplify stimulus perception whereas others seemed more committed to psychological complexity. Most had severe impairment of reality testing, and 6 of the participants had an extratensive coping stile. In this group of persons reporting demon possession, dissociative trance disorder seems to be a distinct clinical manifestation of a dissociative continuum, sharing some features with dissociative identity disorder.

  18. Fundamental quantitative security in quantum key generation

    International Nuclear Information System (INIS)

    Yuen, Horace P.

    2010-01-01

    We analyze the fundamental security significance of the quantitative criteria on the final generated key K in quantum key generation including the quantum criterion d, the attacker's mutual information on K, and the statistical distance between her distribution on K and the uniform distribution. For operational significance a criterion has to produce a guarantee on the attacker's probability of correctly estimating some portions of K from her measurement, in particular her maximum probability of identifying the whole K. We distinguish between the raw security of K when the attacker just gets at K before it is used in a cryptographic context and its composition security when the attacker may gain further information during its actual use to help get at K. We compare both of these securities of K to those obtainable from conventional key expansion with a symmetric key cipher. It is pointed out that a common belief in the superior security of a quantum generated K is based on an incorrect interpretation of d which cannot be true, and the security significance of d is uncertain. Generally, the quantum key distribution key K has no composition security guarantee and its raw security guarantee from concrete protocols is worse than that of conventional ciphers. Furthermore, for both raw and composition security there is an exponential catch-up problem that would make it difficult to quantitatively improve the security of K in a realistic protocol. Some possible ways to deal with the situation are suggested.

  19. Securing Metering Infrastructure of Smart Grid: A Machine Learning and Localization Based Key Management Approach

    Directory of Open Access Journals (Sweden)

    Imtiaz Parvez

    2016-08-01

    Full Text Available In smart cities, advanced metering infrastructure (AMI of the smart grid facilitates automated metering, control and monitoring of power distribution by employing a wireless network. Due to this wireless nature of communication, there exist potential threats to the data privacy in AMI. Decoding the energy consumption reading, injecting false data/command signals and jamming the networks are some hazardous measures against this technology. Since a smart meter possesses limited memory and computational capability, AMI demands a light, but robust security scheme. In this paper, we propose a localization-based key management system for meter data encryption. Data are encrypted by the key associated with the coordinate of the meter and a random key index. The encryption keys are managed and distributed by a trusted third party (TTP. Localization of the meter is proposed by a method based on received signal strength (RSS using the maximum likelihood estimator (MLE. The received packets are decrypted at the control center with the key mapped with the key index and the meter’s coordinates. Additionally, we propose the k-nearest neighbors (kNN algorithm for node/meter authentication, capitalizing further on data transmission security. Finally, we evaluate the security strength of a data packet numerically for our method.

  20. Se soigner ou soigner les autres  ? Dimensions thérapeutiques d’un culte de possession vietnamien Healing Myself, Healing Others : Therapeutic Skills of a Vietnamese Possession Cult

    Directory of Open Access Journals (Sweden)

    Claire Chauvet

    2012-10-01

    Full Text Available Les médiums des esprits des Quatre Palais, en articulation avec d’autres spécialistes religieux, participent à l’espace thérapeutique vietnamien. Ils contribuent de longue date, et ce malgré les aléas de l’histoire, à prendre en charge les maladies par le biais de la pratique rituelle et, plus généralement, par le biais des interventions des esprits. Si ces dimensions thérapeutiques ne constituent qu’un aspect du culte, à côté des enjeux religieux, politiques et territoriaux, les requêtes de guérison sont parmi les principales requêtes formulées aux esprits. Cet article examine les dimensions thérapeutiques de la pratique du culte qui s’articulent autour de deux pôles : pratiquer la possession pour soigner les autres ou pour se soigner soi-même. C’est, en effet, la santé, avec l’harmonie au sein de la vie familiale, la réussite dans le commerce ou les études, que les disciples viennent chercher auprès des esprits et de leurs intermédiaires. Par ailleurs, comme pour de nombreux cultes de possession, la maladie est très souvent à l’origine du processus qui mène à la pratique médiumnique. Certains médiums, ainsi que quelques esprits, ont à cet effet des pouvoirs spécialisés dans la guérison. Enfin, l’article envisage certaines transformations du rôle social des médiums.Spirits mediums of the Four Palaces have been taking part for a long time, along with other religious specialists, in the Vietnamese therapeutic area. They have helped, and still do despite historical upheavals, taking care of different kind of illnesses through rituals and, more generally, through spirits’ interventions. If healing is only one side of the worship, beside religious, political and territorial issues, it is one of the main issues addressed to the spirits. This paper investigates healing dimensions of the worship which are of two kinds : performing spirit possession in order to cure others or in order to cure

  1. Perceived and actual key success factors: A study of the yoghurt market in Denmark, Germany and the United Kingdom

    DEFF Research Database (Denmark)

    Grunert, Klaus G.; Sørensen, Elin

    on their markets. 3. When aggregated, 16 potential key success factors were derived: High product quality, attractive packaging, high quality of raw material, possession of advanced technology and know-how, competent management and competent staff, wide product range, extensive product development activities......, three direct determinants lead to high perceived value: attractive packaging, high product quality, and extensive marketing activities. High product quality is in turn determined by high raw material quality, possession of advanced technology and know-how, and competent management and indicating....../high degree of innovativeness, extensive marketing activities, (abundant) financial resources, s production, good logistics management, good product portfolio management, non-complex organisation, low retail prices, good relations with trade, extensive market knowledge. 4. According to managers' perceptions...

  2. Pocket radar guide key facts, equations, and data

    CERN Document Server

    Curry, G Richard

    2010-01-01

    ThePocket Radar Guideis a concise collection of key radar facts and important radar data that provides you with necessary radar information when you are away from your office or references. It includes statements and comments on radar design, operation, and performance; equations describing the characteristics and performance of radar systems and their components; and tables with data on radar characteristics and key performance issues.It is intended to supplement other radar information sources by providing a pocket companion to refresh memory and provide details whenever you need them such a

  3. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    Directory of Open Access Journals (Sweden)

    Magdalena Daniela DINU

    2014-06-01

    Full Text Available This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of both Supply Chain’ s components, procedures, workflow, processes and the importance of Supply Chain Management into maximizing company's value. SCORE model able to provide solid information about measuring performance and identifying priorities within Supply Chain Management will help us to understand the key factors by analyzing its elements: Plan, Source, Make, Deliver,Return, Enable. These elements covers all the challenging areas from first to third tier of Supply Chain Management.

  4. Design of a Secure Authentication and Key Agreement Scheme Preserving User Privacy Usable in Telecare Medicine Information Systems.

    Science.gov (United States)

    Arshad, Hamed; Rasoolzadegan, Abbas

    2016-11-01

    Authentication and key agreement schemes play a very important role in enhancing the level of security of telecare medicine information systems (TMISs). Recently, Amin and Biswas demonstrated that the authentication scheme proposed by Giri et al. is vulnerable to off-line password guessing attacks and privileged insider attacks and also does not provide user anonymity. They also proposed an improved authentication scheme, claiming that it resists various security attacks. However, this paper demonstrates that Amin and Biswas's scheme is defenseless against off-line password guessing attacks and replay attacks and also does not provide perfect forward secrecy. This paper also shows that Giri et al.'s scheme not only suffers from the weaknesses pointed out by Amin and Biswas, but it also is vulnerable to replay attacks and does not provide perfect forward secrecy. Moreover, this paper proposes a novel authentication and key agreement scheme to overcome the mentioned weaknesses. Security and performance analyses show that the proposed scheme not only overcomes the mentioned security weaknesses, but also is more efficient than the previous schemes.

  5. Finite-key analysis for quantum key distribution with weak coherent pulses based on Bernoulli sampling

    Science.gov (United States)

    Kawakami, Shun; Sasaki, Toshihiko; Koashi, Masato

    2017-07-01

    An essential step in quantum key distribution is the estimation of parameters related to the leaked amount of information, which is usually done by sampling of the communication data. When the data size is finite, the final key rate depends on how the estimation process handles statistical fluctuations. Many of the present security analyses are based on the method with simple random sampling, where hypergeometric distribution or its known bounds are used for the estimation. Here we propose a concise method based on Bernoulli sampling, which is related to binomial distribution. Our method is suitable for the Bennett-Brassard 1984 (BB84) protocol with weak coherent pulses [C. H. Bennett and G. Brassard, Proceedings of the IEEE Conference on Computers, Systems and Signal Processing (IEEE, New York, 1984), Vol. 175], reducing the number of estimated parameters to achieve a higher key generation rate compared to the method with simple random sampling. We also apply the method to prove the security of the differential-quadrature-phase-shift (DQPS) protocol in the finite-key regime. The result indicates that the advantage of the DQPS protocol over the phase-encoding BB84 protocol in terms of the key rate, which was previously confirmed in the asymptotic regime, persists in the finite-key regime.

  6. Social value of online information in the hotel industry

    Directory of Open Access Journals (Sweden)

    Moraru Remus Christian

    2017-07-01

    Full Text Available Studies show that public information can create social value, which reflects on the purpose of this paper in identifying information on the online environment of the hotel industry which can directly or indirectly create social value and ultimately a competitive edge. Privately owned, small and mid-sized hotels in Romania find themselves in competitive online environment and, as such, many of them cannot compete or don’t possess the know-how to compete within the online environment. With identifying the information shared on the hotels online environment and the capability of the information in creating social value, hotels can reevaluate their online strategies. The immediate objective of this paper is to analyze the websites of a sample of 99 small and mid-sized hotels in Romania and to identify critical information that can directly or indirectly create social value. Part of the objective is to draw a conclusion of the main differences on the information shared on the hotels website, which in terms will show where small and mid-sized hotels can improve their online content strategy with socially valuable information. Key findings reflect that Romanian hotels have a clear pattern across the country when it come to their online environment. However, there are serious deficiencies that can influence both economical results and the possibility of creating socially valuable information online. This work increases our understanding of the information shared on the hotels websites in Romania and comes with suggestions that hoteliers can apply in the future to increase the competitiveness and the social value of their online environment.

  7. 76 FR 43879 - Business Affiliate Marketing and Disposal of Consumer Information Rules

    Science.gov (United States)

    2011-07-22

    ... implementing section 628 of the FCRA require CFTC-regulated entities that possess or maintain consumer report... the ability of consumers to combat identity theft, to increase the accuracy of consumer reports, to... possess or maintain consumer report information in connection with their business activities to properly...

  8. Review: Lisa Mackenrodt, Swahili Spirit Possession and Islamic Healing in Contemporary Tanzania: The Jinn Fly on Friday (2011 Buchbesprechung: Lisa Mackenrodt, Swahili Spirit Possession and Islamic Healing in Contemporary Tanzania: The Jinn Fly on Friday (2011

    Directory of Open Access Journals (Sweden)

    Jigal Beez

    2013-01-01

    Full Text Available Review of the monograph:Lisa Mackenrodt, Swahili Spirit Possession and Islamic Healing in Contemporary Tanzania: The Jinn Fly on Friday, Hamburg: Verlag Dr. Kovač, 2011, ISBN 978-3-8300-5806-9, 216 pagesBesprechung der Monographie:Lisa Mackenrodt, Swahili Spirit Possession and Islamic Healing in Contemporary Tanzania: The Jinn Fly on Friday, Hamburg: Verlag Dr. Kovač, 2011, ISBN 978-3-8300-5806-9, 216 Seiten

  9. Authenticated multi-user quantum key distribution with single particles

    Science.gov (United States)

    Lin, Song; Wang, Hui; Guo, Gong-De; Ye, Guo-Hua; Du, Hong-Zhen; Liu, Xiao-Fen

    2016-03-01

    Quantum key distribution (QKD) has been growing rapidly in recent years and becomes one of the hottest issues in quantum information science. During the implementation of QKD on a network, identity authentication has been one main problem. In this paper, an efficient authenticated multi-user quantum key distribution (MQKD) protocol with single particles is proposed. In this protocol, any two users on a quantum network can perform mutual authentication and share a secure session key with the assistance of a semi-honest center. Meanwhile, the particles, which are used as quantum information carriers, are not required to be stored, therefore the proposed protocol is feasible with current technology. Finally, security analysis shows that this protocol is secure in theory.

  10. 32 CFR 552.122 - Personnel not authorized to possess or retain personal weapons.

    Science.gov (United States)

    2010-07-01

    ... THE ARMY MILITARY RESERVATIONS AND NATIONAL CEMETERIES REGULATIONS AFFECTING MILITARY RESERVATIONS... person who has been convicted in any court of the possession, use, or sale of marijuana, dangerous or...

  11. Practical round-robin differential-phase-shift quantum key distribution

    International Nuclear Information System (INIS)

    Zhang, Zhen; Yuan, Xiao; Cao, Zhu; Ma, Xiongfeng

    2017-01-01

    The security of quantum key distribution (QKD) relies on the Heisenberg uncertainty principle, with which legitimate users are able to estimate information leakage by monitoring the disturbance of the transmitted quantum signals. Normally, the disturbance is reflected as bit flip errors in the sifted key; thus, privacy amplification, which removes any leaked information from the key, generally depends on the bit error rate. Recently, a round-robin differential-phase-shift QKD protocol for which privacy amplification does not rely on the bit error rate (Sasaki et al 2014 Nature 509 475) was proposed. The amount of leaked information can be bounded by the sender during the state-preparation stage and hence, is independent of the behavior of the unreliable quantum channel. In our work, we apply the tagging technique to the protocol and present a tight bound on the key rate and employ a decoy-state method. The effects of background noise and misalignment are taken into account under practical conditions. Our simulation results show that the protocol can tolerate channel error rates close to 50% within a typical experiment setting. That is, there is a negligible restriction on the error rate in practice. (paper)

  12. Does possession of assets increase women's participation in reproductive decision-making? Perceptions of Nigerian women.

    Science.gov (United States)

    Omeje, Joachim C; Oshi, Sarah N; Oshi, Daniel C

    2011-01-01

    This study is based on a population-based, descriptive questionnaire survey, the objective of which was to elicit the perceptions of women in south-eastern Nigeria on whether possession of economic/household assets by women enhanced their capacity to negotiate reproductive issues with their husbands. The findings show that the respondents believed that possession of economic/household assets by women in their communities might not necessarily increase their negotiation power in their reproductive decision-making. Other factors tend to attenuate the effects of women's possession of economic/household assets on their reproductive bargaining power. Notable among these may be social norms that implicitly arrogate control of the assets owned by the conjugal couple to the man, even when they are bought by the women. Planners of reproductive health intervention projects, policy-makers and researchers need to be aware of such sociocultural specific phenomena, which do not fit with widely held international beliefs.

  13. Hierarchical remote data possession checking method based on massive cloud files

    Directory of Open Access Journals (Sweden)

    Ma Haifeng

    2017-06-01

    Full Text Available Cloud storage service enables users to migrate their data and applications to the cloud, which saves the local data maintenance and brings great convenience to the users. But in cloud storage, the storage servers may not be fully trustworthy. How to verify the integrity of cloud data with lower overhead for users has become an increasingly concerned problem. Many remote data integrity protection methods have been proposed, but these methods authenticated cloud files one by one when verifying multiple files. Therefore, the computation and communication overhead are still high. Aiming at this problem, a hierarchical remote data possession checking (hierarchical-remote data possession checking (H-RDPC method is proposed, which can provide efficient and secure remote data integrity protection and can support dynamic data operations. This paper gives the algorithm descriptions, security, and false negative rate analysis of H-RDPC. The security analysis and experimental performance evaluation results show that the proposed H-RDPC is efficient and reliable in verifying massive cloud files, and it has 32–81% improvement in performance compared with RDPC.

  14. Key Working for Families with Young Disabled Children

    Directory of Open Access Journals (Sweden)

    Bernie Carter

    2011-01-01

    Full Text Available For families with a disabled child, the usual challenges of family life can be further complicated by the need to access a wide range of services provided by a plethora of professionals and agencies. Key working aims to support children and their families in navigating these complexities ensuring easy access to relevant, high quality, and coordinated care. The aim of this paper is to explore the key worker role in relation to “being a key worker” and “having a key worker”. The data within this paper draw on a larger evaluation study of the Blackpool Early Support Pilot Programme. The qualitative study used an appreciative and narrative approach and utilised mixed methods (interviews, surveys and a nominal group workshop. Data were collected from 43 participants (parents, key workers, and other stakeholders. All stakeholders who had been involved with the service were invited to participate. In the paper we present and discuss the ways in which key working made a difference to the lives of children and their families. We also consider how key working transformed the perspectives of the key workers creating a deeper and richer understanding of family lives and the ways in which other disciplines and agencies worked. Key working contributed to the shift to a much more family-centred approach, and enhanced communication and information sharing between professionals and agencies improved. This resulted in families feeling more informed. Key workers acted in an entrepreneurial fashion, forging new relationships with families and between families and other stakeholders. Parents of young disabled children and their service providers benefited from key working. Much of the benefit accrued came from strong, relational, and social-professional networking which facilitated the embedding of new ways of working into everyday practice. Using an appreciative inquiry approach provided an effective and relevant way of engaging with parents, professionals

  15. Model of key success factors for Business Intelligence implementation

    Directory of Open Access Journals (Sweden)

    Peter Mesaros

    2016-07-01

    Full Text Available New progressive technologies recorded growth in every area. Information-communication technologies facilitate the exchange of information and it facilitates management of everyday activities in enterprises. Specific modules (such as Business Intelligence facilitate decision-making. Several studies have demonstrated the positive impact of Business Intelligence to decision-making. The first step is to put in place the enterprise. The implementation process is influenced by many factors. This article discusses the issue of key success factors affecting to successful implementation of Business Intelligence. The article describes the key success factors for successful implementation and use of Business Intelligence based on multiple studies. The main objective of this study is to verify the effects and dependence of selected factors and proposes a model of key success factors for successful implementation of Business Intelligence. Key success factors and the proposed model are studied in Slovak enterprises.

  16. [Application of laboratory information system in the management of the key indicators of quality inspection].

    Science.gov (United States)

    Guo, Ye; Chen, Qian; Wu, Wei; Cui, Wei

    2015-03-31

    To establish a system of monitoring the key indicator of quality for inspection (KIQI) on a laboratory information system (LIS), and to have a better management of KIQI. Clinical sample made in PUMCH were collected during the whole of 2014. Next, interactive input program were designed to accomplish data collecting of the disqualification rate of samples, the mistake rate of samples and the occasions of losing samples, etc. Then, a series moment of sample collection, laboratory sample arrived, sample test, sample check, response to critical value, namely, trajectory information left on LIS were recorded and the qualification rate of TAT, the notification rate of endangering result were calculated. Finally, the information about quality control were collected to build an internal quality control database and the KIQI, such as the out-of-control rate of quality control and the total error of test items were monitored. The inspection of the sample management shows the disqualification rates in 2014 were all below the target, but the rates in January and February were a little high and the rates of four wards were above 2%. The mistake rates of samples was 0.47 cases/10 000 cases, attaining the target (laboratory reports shows the qualification rates of TAT was within the acceptable range (> 95%), however the rates of blood routine in November (94.75%) was out of range. We have solved the problem by optimizing the processes. The notification rate of endangering result attained the target (≥ 98%), while the rate of timely notification is needed to improve. Quality inspection shows the CV of APTT in August (5.02%) was rising significantly, beyond the accepted CV (5.0%). We have solved the problem by changing the reagent. The CV of TT in 2014 were all below the allowable CV, thus the allowable CV of the next year lower to 10%. It is an objective and effective method to manage KIQI with the powerful management mode of database and information process capability on LIS.

  17. 27 CFR 478.40 - Manufacture, transfer, and possession of semiautomatic assault weapons.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Manufacture, transfer, and... COMMERCE IN FIREARMS AND AMMUNITION Administrative and Miscellaneous Provisions § 478.40 Manufacture, transfer, and possession of semiautomatic assault weapons. (a) Prohibition. No person shall manufacture...

  18. Phase II Practice-based Evidence in Nutrition (PEN) evaluation: interviews with key informants.

    Science.gov (United States)

    Bowden, Fran Martin; Lordly, Daphne; Thirsk, Jayne; Corby, Lynda

    2012-01-01

    Dietitians of Canada has collaborated with experts in knowledge translation and transfer, technology, and dietetic practice to develop and implement an innovative online decision-support system called Practice-based Evidence in Nutrition (PEN). A study was conducted to evaluate the perceived facilitators and barriers that enable dietitians to use or prevent them from using PEN. As part of the overall evaluation framework of PEN, a qualitative descriptive research design was used to address the research purpose. Individual, semi-structured telephone interviews with 17 key informants were completed, and the interview transcripts underwent qualitative content analysis. Respondents identified several facilitators of and barriers to PEN use. Facilitators included specificity to dietetics, rigorous/expert review, easy accessibility, current content, credible/secure material, well-organized/easy-to-use material, material that is valuable to practice, and good value for money. Barriers included perceived high cost, fee structuring/cost to students, certain organizational aspects, and a perceived lack of training for pathway contributors. This formative evaluation has indicated areas in which PEN could be improved and strategies to make PEN the standard for dietetic education and practice. Ensuring that PEN is meeting users' knowledge needs is of the utmost importance if dietitians are to remain on the cutting edge of scientific inquiry.

  19. Behavior of temperature dependent SRAM-PUFs, and consequences for secret-key capacity

    NARCIS (Netherlands)

    Kusters, C.J.; Ignatenko, T.; Willems, F.M.J.

    2017-01-01

    Physical Unclonable Functions (PUFs) are a resource for generating and sharing secret keys. The mutual information between two respective observations of the same PUF gives an upper bound for the achievable secret-key rate of a secret-sharing scheme that relies on this PUF. This mutual information

  20. Optimal attacks on qubit-based Quantum Key Recycling

    Science.gov (United States)

    Leermakers, Daan; Škorić, Boris

    2018-03-01

    Quantum Key Recycling (QKR) is a quantum cryptographic primitive that allows one to reuse keys in an unconditionally secure way. By removing the need to repeatedly generate new keys, it improves communication efficiency. Škorić and de Vries recently proposed a QKR scheme based on 8-state encoding (four bases). It does not require quantum computers for encryption/decryption but only single-qubit operations. We provide a missing ingredient in the security analysis of this scheme in the case of noisy channels: accurate upper bounds on the required amount of privacy amplification. We determine optimal attacks against the message and against the key, for 8-state encoding as well as 4-state and 6-state conjugate coding. We provide results in terms of min-entropy loss as well as accessible (Shannon) information. We show that the Shannon entropy analysis for 8-state encoding reduces to the analysis of quantum key distribution, whereas 4-state and 6-state suffer from additional leaks that make them less effective. From the optimal attacks we compute the required amount of privacy amplification and hence the achievable communication rate (useful information per qubit) of qubit-based QKR. Overall, 8-state encoding yields the highest communication rates.

  1. Number Theory and Public-Key Cryptography.

    Science.gov (United States)

    Lefton, Phyllis

    1991-01-01

    Described are activities in the study of techniques used to conceal the meanings of messages and data. Some background information and two BASIC programs that illustrate the algorithms used in a new cryptographic system called "public-key cryptography" are included. (CW)

  2. Assessment of Accounting Competencies Possessed by Postgraduate University Business Education Students to Handle Entrepreneurship Business Challenges in Nigeria

    Science.gov (United States)

    Okoro, James

    2014-01-01

    University Business Education graduates, by the nature of their programme, ought to possess relevant accounting competencies for successful entrepreneurship but casual observation and empirical reports indicate that they are not doing well in this aspect. Therefore, this study assessed the accounting competencies possessed by university…

  3. On the co-variation between form and function of adnominal possessive modifiers in Dutch and English

    DEFF Research Database (Denmark)

    Rijkhoff, Jan

    2009-01-01

    in the noun phrase (section 3); a tentative explanation is given in section 4. The more general point this paper wants to make is that functional modifier categories like CLASSIFYING MODIFIER or QUALIFYING MODIFIER can be characterized in grammatical terms and, furthermore, that important grammatical...... that the remarkable variation in the grammatical properties of this possessive construction directly correlates with the kind of modifier function it has in the noun phrase. It is first shown that lexical possessive modifiers with van ‘of’ (“adnominal possessives” for short) are used to express most of the modifier...... functions recognized in a semantic, five-layered model of the noun phrase (section 2). I will then argue that the values for certain grammatical parameters (here subsumed under the labels MODIFICATION, PREDICATION, REFERENCE) correlate with the kind of modifier function the adnominal possessive has...

  4. Quantum-locked key distribution at nearly the classical capacity rate.

    Science.gov (United States)

    Lupo, Cosmo; Lloyd, Seth

    2014-10-17

    Quantum data locking is a protocol that allows for a small secret key to (un)lock an exponentially larger amount of information, hence yielding the strongest violation of the classical one-time pad encryption in the quantum setting. This violation mirrors a large gap existing between two security criteria for quantum cryptography quantified by two entropic quantities: the Holevo information and the accessible information. We show that the latter becomes a sensible security criterion if an upper bound on the coherence time of the eavesdropper's quantum memory is known. Under this condition, we introduce a protocol for secret key generation through a memoryless qudit channel. For channels with enough symmetry, such as the d-dimensional erasure and depolarizing channels, this protocol allows secret key generation at an asymptotic rate as high as the classical capacity minus one bit.

  5. Corporate Governance: Insider Information, the Bane of Financial ...

    African Journals Online (AJOL)

    The finding is that the insider information possessed by the manager informed the manipulation of firms, securities, risky business, terms, prices, etc, for their benefit to the detriment of investors and therefore caused the financial melt-down. Finally, the major recommendation is that corporate governance needs reforms for ...

  6. Assessment of Management Competencies Possessed by Postgraduate University Business Education Students to Handle Entrepreneurship Business Challenges in Nigeria

    Science.gov (United States)

    Okoro, James

    2015-01-01

    University Business Education graduates, by the nature of their programme, ought to possess relevant management competencies for successful entrepreneurship but casual observation and empirical reports indicate that they are not doing well in this aspect. Therefore, this study assessed the management competencies possessed by the university…

  7. Exosomes carring gag/env of ALV-J possess negative effect on immunocytes.

    Science.gov (United States)

    Wang, Guihua; Wang, Zhenzhen; Zhuang, Pingping; Zhao, Xiaomin; Cheng, Ziqiang

    2017-11-01

    J subgroup avian leukosis virus (ALV-J) is an exogenous retrovirus of avian. A key feature of ALV-J infection is leading to severe immunosuppressive characteristic of diseases. Viral components of retrovirus were reported closely associated with immunosuppression, and several similarities between exosomes and retrovirus preparations have lead to the hypotheses of retrovirus hijacker exosomes pathway. In this study, we purified exosomes from DF-1 cells infected and uninfected by ALV-J. Electron microscopy and mass spectrometry (MS) analysis showed that ALV-J not only increased the production of exosomes from ALV-J infected DF-1 cells (Exo-J) but also stimulated some proteins expression, especially ALV-J components secreted in exosomes. Immunosuppressive domain peptide (ISD) of envelope subunit transmembrane (TM) and gag of ALV-J were secreted in Exo-J. It has been reported that HIV gag was budded from endosome-like domains of the T cell plasma membrane. But env protein was first detected in exosomes from retrovirus infected cells. We found that Exo-J caused negative effects on splenocytes in a dose-dependant manner by flow cytometric analysis. And low dose of Exo-J activated immune activity of splenocytes, while high dose possessed immunosuppressive properties. Interestingly, Exo-J has no significant effects on the immunosuppression induced by ALV-J, and the immunosuppressive effects induced by Exo-J lower than that by ALV-J. Taken together, our data indicated that Exo-J supplied a microenvironment for the replication and transformation of ALV-J. Copyright © 2017. Published by Elsevier Ltd.

  8. Can the DSM-5 differentiate between nonpathological possession and dissociative identity disorder? A case study from an Afro-Brazilian religion.

    Science.gov (United States)

    Delmonte, Romara; Lucchetti, Giancarlo; Moreira-Almeida, Alexander; Farias, Miguel

    2016-01-01

    The aim of this article is to examine whether the diagnostic criteria of the Diagnostic and Statistical Manual of Mental Disorders, Fifth Edition (DSM-5), are able to differentiate between nonpathological religious possession and dissociative identity disorder (DID). We use the case study of an individual who leads an Afro-Brazilian religious group (Umbanda), focusing on her personal development and possession experiences from early childhood to the present, spanning a period of more than 40 years, and examine these data following DSM-5 criteria for DID (300.14). Her experiences of possession can be broken into 2 distinct stages. In the 1st stage (childhood and early adulthood), she displayed intrusive thoughts and a lack of control over possession states, which were associated with a heightened state of anxiety, loneliness, amnesia, and family conflict (meeting all 5 criteria for DID). In the 2nd stage (late 20s up to the present), she regularly experienced possession states but felt in control of their onset and found them religiously meaningful. In this 2nd stage, she only fulfilled 3 criteria for DID. We question the accuracy of diagnosing this individual with DID in her earlier life and suggest that the DSM-5 criteria fail to address the ambiguity of affect surrounding possession experiences (positive at the individual level, negative at the interpersonal level) and lack a clearer acknowledgment of the prevalence of possession and other unusual experiences in general populations.

  9. CHRISTIAN SYMBOLISM IN FYODOR DOSTOEVSKY'S NOVEL "THE POSSESSED" ("DEMONS"

    Directory of Open Access Journals (Sweden)

    Sergei Leonidovich Sharakov

    2013-11-01

    Full Text Available The article raises a question of Christian symbolism in Fyodor Dostoevsky’s novel The Possessed (Demons. The introductory part identifies the purpose of a symbol in Christian poetics through the parallel with ancient symbolism. The author makes a conclusion that the functional role of a symbol in the ancient world and Christian tradition is different. Therefore, the ancient symbol involves a number of interrelated categories, such as fate, intuition or conjecture, inspiration, and predictions. Christian symbolism is based on the idea of redemption and moral innocence. Methodologically, the article is based on a cultural and historical approach, as well as on the comparative academic tradition. The overview of Dostoyevsky’s pre-materials for The Possessed (Demons enables us to suggest the use of Christian symbolism in this novel. Hence, the objective of the study is to investigate a composition of images and symbols in this piece of writing, with a special focus on the image of a chronicler since the storyline of the novel is developed through his perception. We make a supposition that there are several levels of Gospel perception in the artistic vision or consciousness of the chronicler, that form the basis of the symbolical composition of the novel. The article sequentially examines the examples of Christian symbolism, including the connection of ideas, characters and storylines of the novel with the Gospel. Then it gives evidence and reasons for the thesis that the Gospel gives the characters of the novel the grounds for shaping their destiny.

  10. Water dynamics clue to key residues in protein folding

    International Nuclear Information System (INIS)

    Gao, Meng; Zhu, Huaiqiu; Yao, Xin-Qiu; She, Zhen-Su

    2010-01-01

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  11. Protection of unclassified safeguards information; criteria and guidance

    International Nuclear Information System (INIS)

    Kasun, D.J.

    1981-10-01

    The document was prepared to assist licensees and other persons who possess unclassified safeguards information in establishing an information protection system that satisfies the requirements of 10 CFR 73.21. Section 73.21 was issued by the Nuclear Regulatory Commission in response to the provisions of a new Section 147 of the Atomic Energy Act of 1954, as amended, titled Safeguards Information

  12. Information privacy fundamentals for librarians and information professionals

    CERN Document Server

    Givens, Cherie L

    2014-01-01

    This book introduces library and information professionals to information privacy, provides an overview of information privacy in the library and information science context, U.S. privacy laws by sector, information privacy policy, and key considerations when planning and creating a privacy program.

  13. Three key affordances for serendipity

    DEFF Research Database (Denmark)

    Björneborn, Lennart

    2017-01-01

    Purpose Serendipity is an interesting phenomenon to study in information science as it plays a fundamental – but perhaps underestimated – role in how we discover, explore, and learn in all fields of life. The purpose of this paper is to operationalize the concept of serendipity by providing termi...... terminological “building blocks” for understanding connections between environmental and personal factors in serendipitous encounters. Understanding these connections is essential when designing affordances in physical and digital environments that can facilitate serendipity. Design....../methodology/approach In this paper, serendipity is defined as what happens when we, in unplanned ways, encounter resources (information, things, people, etc.) that we find interesting. In the outlined framework, serendipity is understood as an affordance, i.e., a usage potential when environmental and personal factors correspond...... the three key affordances and three key personal serendipity factors: curiosity, mobility, and sensitivity. Ten sub-affordances for serendipity and ten coupled personal sub-factors are also briefly outlined. Related research is compared with and mapped into the framework aiming at a theoretical validation...

  14. Possessão e inversão da subalternidade: com a palavra, Pombagira das Rosas

    Directory of Open Access Journals (Sweden)

    Sônia Regina Corrêa Lages

    2012-01-01

    Full Text Available Este artigo é decorrente de uma pesquisa de campo que analisou a possessão na religião afro-brasileira da Umbanda no terreiro de Umbanda Caboclo Pena Branca, na cidade de Juiz de Fora, MG. No presente recorte é apresentada a narrativa da Pombagira das Rosas, com o propósito de observar a relação de alteridade que se estabelece entre a médium e a entidade. A partir de um quadro conceitual definido por Michael De Certeau, as narrativas são analisadas buscando compreender de que forma a possessão se articula com a realidade histórica das mulheres no Brasil e com a trajetória pessoal da mulher médium que incorpora o referido espírito, redefinindo seu cotidiano. A intenção é focalizar na voz subalterna da entidade as dinâmicas individuais e coletivas que, fazendo uso do imaginário nacional sobre a entidade, possibilitam compreender a possessão como significando solidariedade social.

  15. 12 CFR 717.83 - Disposal of consumer information.

    Science.gov (United States)

    2010-01-01

    ... FAIR CREDIT REPORTING Duties of Users of Consumer Reports Regarding Address Discrepancies and Records... consumer report or is derived from a consumer report and that is maintained or otherwise possessed by or on... information includes: (A) A consumer report that you obtain; (B) Information from a consumer report that you...

  16. Triple symmetric key cryptosystem for data security

    Science.gov (United States)

    Fuzail, C. Md; Norman, Jasmine; Mangayarkarasi, R.

    2017-11-01

    As the technology is getting spreads in the macro seconds of speed and in which the trend changing era from human to robotics the security issue is also getting increased. By means of using machine attacks it is very easy to break the cryptosystems in very less amount of time. Cryptosystem is a process which provides the security in all sorts of processes, communications and transactions to be done securely with the help of electronical mechanisms. Data is one such thing with the expanded implication and possible scraps over the collection of data to secure predominance and achievement, Information Security is the process where the information is protected from invalid and unverified accessibilities and data from mishandling. So the idea of Information Security has risen. Symmetric key which is also known as private key.Whereas the private key is mostly used to attain the confidentiality of data. It is a dynamic topic which can be implemented over different applications like android, wireless censor networks, etc. In this paper, a new mathematical manipulation algorithm along with Tea cryptosystem has been implemented and it can be used for the purpose of cryptography. The algorithm which we proposed is straightforward and more powerful and it will authenticate in harder way and also it will be very difficult to break by someone without knowing in depth about its internal mechanisms.

  17. Developing geographic information infrastructure : The role of information policies

    NARCIS (Netherlands)

    Van Loenen, B.

    2006-01-01

    Within information societies, information availability is a key issue affecting societyâs well being. The infrastructure underlying the foundation of the information society may be referred to as the information infrastructure. A geographic information infrastructure (GII) supports the information

  18. The possession game? A comparative analysis of ball retention and team success in European and international football, 2007-2010.

    Science.gov (United States)

    Collet, Christian

    2013-01-01

    Possession is thought of as central to success in modern football, but questions remain about its impact on positive team outcomes (Bate, 1988; Hughes & Franks, 2005; Pollard & Reep, 1997; Stanhope, 2001). Recent studies (e.g. Bloomfield, Polman, & O'Donoghue, 2005; Carling, Williams, & Reilly, 2005; James, Mellallieu, & Holley, 2002; Jones, James, & Mellalieu, 2004; Lago, 2009; Lago & Martin, 2007; Lago-Peñas & Dellal, 2010; Lago-Peñas, Lago-Ballesteros, Dellal, & Gómez, 2010; Taylor, Mellalieu, & James, 2005; Tucker, Mellalieu, James, & Taylor, 2005) that have examined these questions have often been constrained by an exclusive focus on English or Spanish domestic play. Using data from five European leagues, UEFA and FIFA tournaments, the study found that while possession time and passing predicted aggregated team success in domestic league play, both variables were poor predictors at the individual match level once team quality and home advantage were accounted for. In league play, the effect of greater possession was consistently negative; in the Champions League, it had virtually no impact. In national team tournaments, possession failed to reach significance when offensive factors were accounted for. Much of the success behind the 'possession game' was thus a function of elite teams confined in geographic and competitive space. That ball hegemony was not consistently tied to success suggests that a nuanced approach to possession is needed to account for variant strategic environments (e.g. James et al., 2002) and compels match analysts to re-examine the metric's overall value.

  19. A Key Establishment Protocol for RFID User in IPTV Environment

    Science.gov (United States)

    Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho

    In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.

  20. Roles and responsibilities of pharmacists with respect to natural health products: key informant interviews.

    Science.gov (United States)

    Olatunde, Shade; Boon, Heather; Hirschkorn, Kristine; Welsh, Sandy; Bajcar, Jana

    2010-03-01

    Although many pharmacies sell natural health products (NHPs), there is no clear definition as to the roles and responsibilities (if any) of pharmacists with respect to these products. The purpose of this study was to explore pharmacy and stakeholder leaders' perceptions of pharmacists' professional NHP roles and responsibilities. Semi-structured key informant interviews were conducted with pharmacy leaders (n=17) and stakeholder (n=18) leaders representing consumers, complementary and alternative medicine practitioners, conventional health care practitioners, and industry across Canada. All participants believed a main NHP responsibility for pharmacists was in safety monitoring, although a one challenge identified in the interviews was pharmacists' general lack of NHP knowledge; however, stakeholder leaders did not expect pharmacists to be experts, but should have a basic level of knowledge about NHPs. Participants described pharmacists' professional roles and responsibilities for NHPs as similar to those for over-the-counter drugs; more awareness of existing NHP-related pharmacy policies is needed, and pharmacy owners/managers should provide additional training to ensure front-line pharmacists have appropriate knowledge of NHPs sold in the pharmacy. Copyright 2010 Elsevier Inc. All rights reserved.

  1. Agricultural informational flow in informal communication networks ...

    African Journals Online (AJOL)

    Agricultural informational flow in informal communication networks of farmers in Ghana. ... should identify such farmers who can serve as intermediaries between actors to help disseminate information in rural communities. Keywords: key communicators, farmers, rural communities, social networks, extension agents ...

  2. Informing the educators: one of the keys to public acceptance

    International Nuclear Information System (INIS)

    Mattox, G.C.; Reynolds, A.B.; Brenizer, J.S.

    1986-01-01

    One of the most difficult barriers to overcome in the task of gaining greater public acceptance of nuclear power is the widespread lack of correct information about the true risks and benefits of nuclear energy. The news media are the most prevalent sources of information for the public but they are highly constrained by the limits of space, time, and reader/viewer interest span in being able to cover this complex subject with any degree of completeness, much less with any degree of accuracy. Another source of information for the general public is the educational system, and while it also has its limitations, they are somewhat different from those faced by the media, and the educational system is generally considered to be a more credible information source than the media. This paper report on three programs undertaken in 1985 and 1986 by the Virginia Section of the American Nuclear Society (ANS) in conjunction with the University of Virginia (UVA), the Virginia State Department of Education, and various nuclear industry participants. Each program had its unique features, successes, an failures. All-in-all, these programs have been reported as being quite successful in helping to reach the public through informing the educators

  3. Experimental aspects of deterministic secure quantum key distribution

    Energy Technology Data Exchange (ETDEWEB)

    Walenta, Nino; Korn, Dietmar; Puhlmann, Dirk; Felbinger, Timo; Hoffmann, Holger; Ostermeyer, Martin [Universitaet Potsdam (Germany). Institut fuer Physik; Bostroem, Kim [Universitaet Muenster (Germany)

    2008-07-01

    Most common protocols for quantum key distribution (QKD) use non-deterministic algorithms to establish a shared key. But deterministic implementations can allow for higher net key transfer rates and eavesdropping detection rates. The Ping-Pong coding scheme by Bostroem and Felbinger[1] employs deterministic information encoding in entangled states with its characteristic quantum channel from Bob to Alice and back to Bob. Based on a table-top implementation of this protocol with polarization-entangled photons fundamental advantages as well as practical issues like transmission losses, photon storage and requirements for progress towards longer transmission distances are discussed and compared to non-deterministic protocols. Modifications of common protocols towards a deterministic quantum key distribution are addressed.

  4. Knowledge, skills, and abilities for key radiation protection positions at DOE facilities

    International Nuclear Information System (INIS)

    1997-01-01

    This document provides detailed qualification criteria for contractor key radiation protection personnel. Although federal key radiation protection positions are also identified, qualification standards for federal positions are provided in DOE O 360.1 and the DOE Technical Qualifications Program. Appendices B and D provide detailed listings for knowledge, skills, and abilities for contractor and DOE federal key radiation protection positions. This information may be used in developing position descriptions and individual development plans. Information provided in Appendix C may be useful in developing performance measures and assessing an individual's performance in his or her specific position. Additionally, Federal personnel may use this information to augment their Office/facility qualification standards under the Technical Qualifications Program

  5. LBTool: A stochastic toolkit for leave-based key updates

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2012-01-01

    Quantitative techniques have been successfully employed in verification of information and communication systems. However, the use of such techniques are still rare in the area of security. In this paper, we present a toolkit that implements transient analysis on a key update method for wireless...... sensor networks. The analysis aims to find out the probability of a network key being compromised at a specific time point, which result in fluctuations over time for a specific key update method called Leave-based key update. For such a problem, the use of current tools is limited in many ways...

  6. 75 FR 58993 - Migratory Bird Hunting; Late Seasons and Bag and Possession Limits for Certain Migratory Game Birds

    Science.gov (United States)

    2010-09-24

    ... Part V Department of the Interior Fish and Wildlife Service 50 CFR Part 20 Migratory Bird Hunting; Late Seasons and Bag and Possession Limits for Certain Migratory Game Birds; Final Rule #0;#0;Federal...-1231-9BPP-L2] RIN 1018-AX06 Migratory Bird Hunting; Late Seasons and Bag and Possession Limits for...

  7. Experiences of possession and paranormal phenomena among women in the general population: are they related to traumatic stress and dissociation?

    Science.gov (United States)

    Sar, Vedat; Alioğlu, Firdevs; Akyüz, Gamze

    2014-01-01

    This study sought to determine the prevalence of experiences of possession and paranormal phenomena (PNP) in the general population and their possible relations to each other and to traumatic stress and dissociation. The study was conducted on a representative female sample recruited from a town in central eastern Turkey. The Dissociative Disorders Interview Schedule, the posttraumatic stress disorder (PTSD) and borderline personality disorder sections of the Structured Clinical Interviews for DSM-IV Axis-I and Personality Disorders, and the Childhood Abuse and Neglect Questionnaire were administered to 628 women. Of these, 127 (20.2%) women reported at least 1 type of PNP and 13 (2.1%) women reported possession. Women with a dissociative disorder reported all types of possession and PNP (except telepathy) more frequently than those without. Whereas women with a trauma history in childhood and adulthood or PTSD reported possession more frequently than those without, PNP were associated with childhood trauma only. Factor analysis yielded 4 dimensions: possession by and/or contact with nonhuman entities, extrasensory communications, possession by a human entity, and precognition. These factors correlated with number of secondary features of dissociative identity disorder and Schneiderian symptoms. Latent class analysis identified 3 groups. The most traumatized group, with predominantly dissociative and trauma-related disorders, had the highest scores on all factors. Notwithstanding their presence in healthy individuals, possession and PNP were associated with trauma and dissociation in a subgroup of affected participants. Both types of experience seem to be normal human capacities of experiencing that may be involved in response to traumatic stress. Given the small numbers, this study should be considered preliminary.

  8. Immobilized cells of Candida rugosa possessing fumarase activity

    Energy Technology Data Exchange (ETDEWEB)

    Yang, L.; Zhone, L.

    1980-01-01

    Immobilized cells of C. rugosa that possessed fumarase activity were prepared by different methods; the most active immobilized cells were entrapped in polyacrylamide gels. The effects of pH temperature, and divalent cations on the fumarase activity of both immobilized and native cells were the same. Mn/sup 2 +/, Mg/sup 2 +/, Ca/sup 2 +/, and Fe/sup 2 +/ did not protect the immobilized enzyme against thermal inactivation. The activity of immobilized fumarase remained constant during 91 days of storage of 4-6 degrees. The immobilized cell column was used for the continuous production of L-malic acid from 1M fumarate at 30 degrees and pH 8.5. The immobilized column operated steadily for 2 months. Half life of the immobilized fumarase at 30 degrees was 95 days.

  9. Health-care users, key community informants and primary health care workers' views on health, health promotion, health assets and deficits: qualitative study in seven Spanish regions.

    Science.gov (United States)

    Pons-Vigués, Mariona; Berenguera, Anna; Coma-Auli, Núria; Pombo-Ramos, Haizea; March, Sebastià; Asensio-Martínez, Angela; Moreno-Peral, Patricia; Mora-Simón, Sara; Martínez-Andrés, Maria; Pujol-Ribera, Enriqueta

    2017-06-13

    Although some articles have analysed the definitions of health and health promotion from the perspective of health-care users and health care professionals, no published studies include the simultaneous participation of health-care users, primary health care professionals and key community informants. Understanding the perception of health and health promotion amongst these different stakeholders is crucial for the design and implementation of successful, equitable and sustainable measures that improve the health and wellbeing of populations. Furthermore, the identification of different health assets and deficits by the different informants will generate new evidence to promote healthy behaviours, improve community health and wellbeing and reduce preventable inequalities. The objective of this study is to explore the concept of health and health promotion and to compare health assets and deficits as identified by health-care users, key community informants and primary health care workers with the ultimate purpose to collect the necessary data for the design and implementation of a successful health promotion intervention. A descriptive-interpretive qualitative research was conducted with 276 participants from 14 primary care centres of 7 Spanish regions. Theoretical sampling was used for selection. We organized 11 discussion groups and 2 triangular groups with health-care users; 30 semi-structured interviews with key community informants; and 14 discussion groups with primary health care workers. A thematic content analysis was carried out. Health-care users and key community informants agree that health is a complex, broad, multifactorial concept that encompasses several interrelated dimensions (physical, psychological-emotional, social, occupational, intellectual, spiritual and environmental). The three participants' profiles consider health promotion indispensable despite defining it as complex and vague. In fact, most health-care users admit to having

  10. Competences possessed and required by European graduates. REFLEX Report to HEFCE No 4

    OpenAIRE

    Little, Brenda; Braun, Edith; Tang, Win-Yee

    2008-01-01

    The report is based on the results of a major international study of graduate employment some five years after graduation. It presents an analysis of graduates' perceptions of what competences they need to do their current jobs and whether they possess these competences.

  11. 48 CFR 1852.237-72 - Access to Sensitive Information.

    Science.gov (United States)

    2010-10-01

    ... position in another procurement. (2) Safeguard sensitive information coming into its possession from... relating to ethics, conflicts of interest, corruption, and other criminal or civil matters relating to the...

  12. 78 FR 39957 - Availability of Non-Public Information

    Science.gov (United States)

    2013-07-03

    ... the Office of Finance for its own business purposes that is in its possession; (2) The information is... for regulated entity or Office of Finance business purposes, a regulated entity, the Office of Finance...

  13. Workplace wellness programs in Canada: an exploration of key issues.

    Science.gov (United States)

    Morrison, Erin; MacKinnon, Neil J

    2008-01-01

    Faced with the reality of rising health costs, Canadian employers are thinking beyond traditional notions of responsibility for employee health and have begun to embrace Workplace Wellness Programs (WWPs). This article investigates the critical issues of WWPs in the Canadian context from the perspective of key stakeholders. Using a combination of literature and key informant interviews, seven key themes are presented along with recommendations for wider implementation of WWPs in Canada.

  14. Unravelling the spirits’ message: a study of help-seeking steps and explanatory models among patients suffering from spirit possession in Uganda

    Science.gov (United States)

    2014-01-01

    As in many cultures, also in Uganda spirit possession is a common idiom of distress associated with traumatic experiences. In the DSM-IV and -5, possession trance disorders can be classified as dissociative disorders. Dissociation in Western countries is associated with complicated, time-consuming and costly therapies. Patients with spirit possession in SW Uganda, however, often report partial or full recovery after treatment by traditional healers. The aim of this study is to explore how the development of symptoms concomitant help-seeking steps, and explanatory models (EM) eventually contributed to healing of patients with spirit possession in SW Uganda. Illness narratives of 119 patients with spirit possession referred by traditional healers were analysed using a mixed-method approach. Treatments of two-thirds of the patients were unsuccessful when first seeking help in the medical sector. Their initially physical symptoms subsequently developed into dissociative possession symptoms. After an average of two help-seeking steps, patients reached a healing place where 99% of them found satisfactory EM and effective healing. During healing sessions, possessing agents were summoned to identify themselves and underlying problems were addressed. Often-mentioned explanations were the following: neglect of rituals and of responsibilities towards relatives and inheritance, the call to become a healer, witchcraft, grief, and land conflicts. The results demonstrate that traditional healing processes of spirit possession can play a role in restoring connections with the supra-, inter-, intra-, and extra-human worlds. It does not always seem necessary to address individual traumatic experiences per se, which is in line with other research in this field. The study leads to additional perspectives on treatment of trauma-related dissociation in Western countries and on developing effective mental health services in low -and middle-income countries. PMID:24940355

  15. Unravelling the spirits' message: a study of help-seeking steps and explanatory models among patients suffering from spirit possession in Uganda.

    Science.gov (United States)

    van Duijl, Marjolein; Kleijn, Wim; de Jong, Joop

    2014-01-01

    As in many cultures, also in Uganda spirit possession is a common idiom of distress associated with traumatic experiences. In the DSM-IV and -5, possession trance disorders can be classified as dissociative disorders. Dissociation in Western countries is associated with complicated, time-consuming and costly therapies. Patients with spirit possession in SW Uganda, however, often report partial or full recovery after treatment by traditional healers. The aim of this study is to explore how the development of symptoms concomitant help-seeking steps, and explanatory models (EM) eventually contributed to healing of patients with spirit possession in SW Uganda. Illness narratives of 119 patients with spirit possession referred by traditional healers were analysed using a mixed-method approach. Treatments of two-thirds of the patients were unsuccessful when first seeking help in the medical sector. Their initially physical symptoms subsequently developed into dissociative possession symptoms. After an average of two help-seeking steps, patients reached a healing place where 99% of them found satisfactory EM and effective healing. During healing sessions, possessing agents were summoned to identify themselves and underlying problems were addressed. Often-mentioned explanations were the following: neglect of rituals and of responsibilities towards relatives and inheritance, the call to become a healer, witchcraft, grief, and land conflicts. The results demonstrate that traditional healing processes of spirit possession can play a role in restoring connections with the supra-, inter-, intra-, and extra-human worlds. It does not always seem necessary to address individual traumatic experiences per se, which is in line with other research in this field. The study leads to additional perspectives on treatment of trauma-related dissociation in Western countries and on developing effective mental health services in low -and middle-income countries.

  16. Key-value store with internal key-value storage interface

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Ting, Dennis P. J.; Tzelnic, Percy; Gupta, Uday; Grider, Gary; Bonnie, David J.

    2018-01-16

    A key-value store is provided having one or more key-value storage interfaces. A key-value store on at least one compute node comprises a memory for storing a plurality of key-value pairs; and an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device providing a key-value interface for persistent storage of one or more of the plurality of key-value pairs, wherein the software interface module provides the one or more key-value pairs to the at least one persistent storage device in a key-value format. The abstract storage interface optionally processes one or more batch operations on the plurality of key-value pairs. A distributed embodiment for a partitioned key-value store is also provided.

  17. Logarithmic residues of analytic Banach algebra valued functions possessing a simply meromorphic inverse

    NARCIS (Netherlands)

    H. Bart (Harm); T. Ehrhardt; B. Silbermann

    2001-01-01

    textabstractA logarithmic residue is a contour integral of a logarithmic derivative (left or right) of an analytic Banach algebra valued function. For functions possessing a meromorphic inverse with simple poles only, the logarithmic residues are identified as the sums of idempotents. With the help

  18. Key Management Strategies for Safeguards Authentication and Encryption

    International Nuclear Information System (INIS)

    Coram, M.; Hymel, R.; McDaniel, M.; Brotz, J.

    2015-01-01

    Management of cryptographic keys for the authentication and encryption of safeguards data can be the critical weak link in the practical implementation of information security. Within the safeguards community, there is the need to validate that data has not been modified at any point since generation and that it was generated by the monitoring node and not an imposter. In addition, there is the need for that data to be transmitted securely between the monitoring node and the monitoring party such that it cannot be intercepted and read while in transit. Encryption and digital signatures support the required confidentiality and authenticity but challenges exist in managing the cryptographic keys they require. Technologies developed at Sandia National Laboratories have evolved in their use of an associated key management strategy. The first generation system utilized a shared secret key for digital signatures. While fast and efficient, it required that a list of keys be maintained and protected. If control of the key was lost, fraudulent data could be made to look authentic. The second generation changed to support public key / private key cryptography. The key pair is generated by the system, the public key shared, and the private key held internally. This approach eliminated the need to maintain the list of keys. It also allows the public key to be provided to anyone needing to authenticate the data without allowing them to spoof data. A third generation system, currently under development, improves upon the public key / private key approach to address a potential man-in-the-middle attack related to the sharing of the public key. In a planned fourth generation system, secure key exchange protocols will distribute session keys for encryption, eliminating another fixed set of keys utilized by the technology and allowing for periodic renegotiation of keys for enhanced security. (author)

  19. Fisher Information, Entropy, and the Second and Third Laws of Thermodynamics

    Science.gov (United States)

    We propose Fisher Information as a new calculable thermodynamic property that can be shown to follow the Second and the Third Laws of Thermodynamics. Fisher Information is, however, qualitatively different from entropy and potentially possessing a great deal more structure. Hence...

  20. 19 CFR 7.3 - Duty-free treatment of goods imported from insular possessions of the United States other than...

    Science.gov (United States)

    2010-04-01

    ... INSULAR POSSESSIONS AND GUANTANAMO BAY NAVAL STATION § 7.3 Duty-free treatment of goods imported from...) The goods became a new and different article of commerce as a result of production or manufacture... possession or the United States results from the original commercial transaction between the importer and the...

  1. NASA/DOD Aerospace Knowledge Diffusion Research Project. Paper 51: Workplace communications skills and the value of communications and information-use skills instruction: Engineering students' perspectives

    Science.gov (United States)

    Pinelli, Thomas E.; Barclay, Rebecca O.; Kennedy, John M.

    1995-01-01

    Studies indicate that communications and information-related activities take up a substantial portion of an engineer's work week; therefore, effective communications and information use skills are one of the key engineering competencies that recent graduates of engineering programs are expected to possess. Feedback from industry rates communications and information use skills of entry-level engineers low. Missing from current discussions of communications and information use skills and competencies for engineering students is a clear explanation from the professional engineering community about what constitutes 'acceptable and desirable communications and information norms' within that community. To gather adequate and generalizable data about communications and information skills instruction and to provide a student perspective on the communications skills of engineers, we undertook a national study of aerospace engineering students in March 1993. The study included questions about the importance of certain communications and information skills to professional success, the instruction students had received in these skills, and perceived helpfulness of the instruction. Selected results from the study study are reported in this paper.

  2. Skeletal muscle myoblasts possess a stretch-responsive local angiotensin signalling system.

    Science.gov (United States)

    Johnston, Adam P W; Baker, Jeff; De Lisio, Michael; Parise, Gianni

    2011-06-01

    A paucity of information exists regarding the presence of local renin-angiotensin systems (RASs) in skeletal muscle and associated muscle stem cells. Skeletal muscle and muscle stem cells were isolated from C57BL/6 mice and examined for the presence of a local RAS using quantitative reverse transcriptase polymerase chain reaction (qRT-PCR), immunohistochemistry (IHC), Western blotting and liquid chromatography-mass spectrometry (LC-MS). Furthermore, the effect of mechanical stimulation on RAS member gene expression was analysed. Whole skeletal muscle, primary myoblasts and C2C12 derived myoblasts and myotubes differentially expressed members of the RAS including angiotensinogen, angiotensin-converting enzyme (ACE), angiotensin II (Ang II) type 1 (AT(1)) and type 2 (AT(2)). Renin transcripts were never detected, however, mRNA for the 'renin-like' enzyme cathepsin D was observed and Ang I and Ang II were identified in cell culture supernatants from proliferating myoblasts. AT(1) appeared to co-localise with polymerised actin filaments in proliferating myoblasts and was primarily found in the nucleus of terminally differentiated myotubes. Furthermore, mechanical stretch of proliferating and differentiating C2C12 cells differentially induced mRNA expression of angiotensinogen, AT(1) and AT(2). Proliferating and differentiated muscle stem cells possess a local stress-responsive RAS in vitro. The precise function of a local RAS in myoblasts remains unknown. However, evidence presented here suggests that Ang II may be a regulator of skeletal muscle myoblasts.

  3. Effects of Offense, Defense, and Ball Possession on Mobility Performance in Wheelchair Basketball

    NARCIS (Netherlands)

    de Witte, Annemarie M. H.; Berger, Monique A. M.; Hoozemans, Marco J. M.; Veeger, Dirkjan H. E. J.; van der Woude, Lucas H. V.

    2017-01-01

    The aim of this study was to determine to what extent mobility performance is influenced by offensive or defensive situations and ball possession and to what extent these actions are different for the field positions. From video analysis, the relative duration of the various wheelchair movements

  4. Effects of offense, defense, and ball possession on mobility performance in wheelchair basketball

    NARCIS (Netherlands)

    De Witte, Annemarie M.H.; Berger, Monique A.M.; Hoozemans, Marco J.M.; Veeger, H.E.J.; van der Woude, Lucas H.V.

    2017-01-01

    The aim of this study was to determine to what extent mobility performance is influenced by offensive or defensive situations and ball possession and to what extent these actions are different for the field positions. From video analysis, the relative duration of the various wheelchair movements

  5. Quantum deterministic key distribution protocols based on the authenticated entanglement channel

    International Nuclear Information System (INIS)

    Zhou Nanrun; Wang Lijun; Ding Jie; Gong Lihua

    2010-01-01

    Based on the quantum entanglement channel, two secure quantum deterministic key distribution (QDKD) protocols are proposed. Unlike quantum random key distribution (QRKD) protocols, the proposed QDKD protocols can distribute the deterministic key securely, which is of significant importance in the field of key management. The security of the proposed QDKD protocols is analyzed in detail using information theory. It is shown that the proposed QDKD protocols can safely and effectively hand over the deterministic key to the specific receiver and their physical implementation is feasible with current technology.

  6. Quantum deterministic key distribution protocols based on the authenticated entanglement channel

    Energy Technology Data Exchange (ETDEWEB)

    Zhou Nanrun; Wang Lijun; Ding Jie; Gong Lihua [Department of Electronic Information Engineering, Nanchang University, Nanchang 330031 (China)], E-mail: znr21@163.com, E-mail: znr21@hotmail.com

    2010-04-15

    Based on the quantum entanglement channel, two secure quantum deterministic key distribution (QDKD) protocols are proposed. Unlike quantum random key distribution (QRKD) protocols, the proposed QDKD protocols can distribute the deterministic key securely, which is of significant importance in the field of key management. The security of the proposed QDKD protocols is analyzed in detail using information theory. It is shown that the proposed QDKD protocols can safely and effectively hand over the deterministic key to the specific receiver and their physical implementation is feasible with current technology.

  7. 75 FR 66018 - Business Affiliate Marketing and Disposal of Consumer Information Rules

    Science.gov (United States)

    2010-10-27

    ... reports, to allow consumers to exercise greater control regarding the type and amount of solicitations... possess or maintain consumer report information in connection with their business activities to properly... information'' means any information that would be a consumer report if the exclusions from the definition of...

  8. A mosaic adenovirus possessing serotype Ad5 and serotype Ad3 knobs exhibits expanded tropism

    International Nuclear Information System (INIS)

    Takayama, Koichi; Reynolds, Paul N.; Short, Joshua J.; Kawakami, Yosuke; Adachi, Yasuo; Glasgow, Joel N.; Rots, Marianne G.; Krasnykh, Victor; Douglas, Joanne T.; Curiel, David T.

    2003-01-01

    The efficiency of cancer gene therapy with recombinant adenoviruses based on serotype 5 (Ad5) has been limited partly because of variable, and often low, expression by human primary cancer cells of the primary cellular-receptor which recognizes the knob domain of the fiber protein, the coxsackie and adenovirus receptor (CAR). As a means of circumventing CAR deficiency, Ad vectors have been retargeted by utilizing chimeric fibers possessing knob domains of alternate Ad serotypes. We have reported that ovarian cancer cells possess a primary receptor for Ad3 to which the Ad3 knob binds independently of the CAR-Ad5 knob interaction. Furthermore, an Ad5-based chimeric vector, designated Ad5/3, containing a chimeric fiber proteins possessing the Ad3 knob, demonstrates CAR-independent tropism by virtue of targeting the Ad3 receptor. Based on these findings, we hypothesized that a mosaic virus possessing both the Ad5 knob and the Ad3 knob on the same virion could utilize either primary receptor, resulting in expanded tropism. In this study, we generated a dual-knob mosaic virus by coinfection of 293 cells with Ad5-based and Ad5/3-based vectors. Characterization of the resultant virions confirmed the incorporation of both Ad5 and Ad3 knobs in the same particle. Furthermore, this mosaic virus was able to utilize either receptor, CAR and the Ad3 receptor, for virus attachment to cells. Enhanced Ad infectivity with the mosaic virus was shown in a panel of cell lines, with receptor profiles ranging from CAR-dominant to Ad3 receptor-dominant. Thus, this mosaic virus strategy may offer the potential to improve Ad-based gene therapy approaches by infectivity enhancement and tropism expansion

  9. Authenticated group Diffie-Hellman key exchange: theory and practice

    Energy Technology Data Exchange (ETDEWEB)

    Chevassut, Olivier [Catholic Univ. of Louvain, Louvain-la-Neuve (Belgium)

    2002-10-01

    Authenticated two-party Diffie-Hellman key exchange allows two principals A and B, communicating over a public network, and each holding a pair of matching public/private keys to agree on a session key. Protocols designed to deal with this problem ensure A (B resp.)that no other principals aside from B (A resp.) can learn any information about this value. These protocols additionally often ensure A and B that their respective partner has actually computed the shared secret value. A natural extension to the above cryptographic protocol problem is to consider a pool of principals agreeing on a session key. Over the years several papers have extended the two-party Diffie-Hellman key exchange to the multi-party setting but no formal treatments were carried out till recently. In light of recent developments in the formalization of the authenticated two-party Diffie-Hellman key exchange we have in this thesis laid out the authenticated group Diffie-Hellman key exchange on firmer foundations.

  10. Radiation protective agents possessing anti-oxidative properties

    Energy Technology Data Exchange (ETDEWEB)

    Anzai, Kazunori; Ueno, Emi; Yoshida, Akira; Furuse, Masako; Ikota, Nobuo [National Inst. of Radiological Sciences, Research Center for Radiation Safety, Chiba, Chiba (Japan)

    2005-11-15

    The purpose of studies is to see mechanisms of radiation protection of agents possessing anti-oxidative properties because the initial step resulting in radiation hazard is the formation of radicals by water radiolysis. Agents were commercially available or synthesized proxyl derivatives (spin prove agents), commercially available spin-trapping agents, edaravone and TMG (a tocopherol glycoside). Mice and cultured cells were X-irradiated by Shimadzu Pantak HF-320 or 320S. Survivals of cells were determined by colony assay and of mice, to which the agents were given intraperitoneally before or after X-irradiation, within 30 days post irradiation. Plasma and marrow concentrations of proxyls were estimated by electron spin resonance (ESR) spectrometry. Mechanisms of their radiation protective effects were shown different from agent to agent. TMG was found effective even post irradiation, which suggests a possibility for a new drug development. Some (spin trapping agents and TMG), virtually ineffective at the cell level, were found effective in the whole body, suggesting the necessity of studies on their disposition and metabolism. (S.I.)

  11. Radiation protective agents possessing anti-oxidative properties

    International Nuclear Information System (INIS)

    Anzai, Kazunori; Ueno, Emi; Yoshida, Akira; Furuse, Masako; Ikota, Nobuo

    2005-01-01

    The purpose of studies is to see mechanisms of radiation protection of agents possessing anti-oxidative properties because the initial step resulting in radiation hazard is the formation of radicals by water radiolysis. Agents were commercially available or synthesized proxyl derivatives (spin prove agents), commercially available spin-trapping agents, edaravone and TMG (a tocopherol glycoside). Mice and cultured cells were X-irradiated by Shimadzu Pantak HF-320 or 320S. Survivals of cells were determined by colony assay and of mice, to which the agents were given intraperitoneally before or after X-irradiation, within 30 days post irradiation. Plasma and marrow concentrations of proxyls were estimated by electron spin resonance (ESR) spectrometry. Mechanisms of their radiation protective effects were shown different from agent to agent. TMG was found effective even post irradiation, which suggests a possibility for a new drug development. Some (spin trapping agents and TMG), virtually ineffective at the cell level, were found effective in the whole body, suggesting the necessity of studies on their disposition and metabolism. (S.I.)

  12. Inspection report of unauthorized possession and use of unsealed americium-241 and subsequent confiscation, J.C. Haynes Company, Newark, Ohio

    International Nuclear Information System (INIS)

    1985-11-01

    This US Nuclear Regulatory Commission report documents the circumstances surrounding the March 26, 1985, confiscation and subsequent decontamination activities related to the use of unauthorized quantities of americium-241 at the John C. Haynes Company (licensee) of Newark, Ohio. It focuses on the period from early February to July 26, 1985. The incident started when NRC Region III recieved information that John C. Haynes possessed unauthorized quantities of americium-241 and was conducting unauthorized activities (diamond irradiation). By July 26, 1985, the decontamination activities at the licensee's laboratory were concluded. The licensee's actions with diamond irradiation resulted in contamination in restricted and unrestricted areas of the facility. The confiscation and decontamination activities required the combined efforts of NRC, Federal Bureau of Investigation, US Department of Energy, Oak Ridge Associated Universities, the State of Ohio, and the US Environmental Protection Agency. The report describes the factual information and significant findings associated with the confiscation and decontamination activities

  13. Information retrieval, critical appraisal and knowledge of evidence-based dentistry among Finnish dental students.

    Science.gov (United States)

    Nieminen, P; Virtanen, J I

    2017-11-01

    One of the core skills of competent dentist is the ability to search and analyse high-quality evidence. Problems in understanding the basic aspects of knowledge-based information may impede its implementation into clinical practice. We examined how Finnish dental students acquire scientific information and how familiar they are with methods for evaluating scientific evidence related to clinical questions. All fifth-year dental students (n = 120) at the three universities in Finland received a self-administered questionnaire. The three most commonly used sources of information were colleagues, the commercial Health Gate Portal for dental practitioners and personal lecture notes. Although students rarely read scientific journals, they did find that they possess at least passable or even good skills in literature retrieval. Three questions related to the appraisal of evidence in dentistry revealed that students' knowledge of evidence-based dentistry was inadequate to critically evaluate clinical research findings. Most students seem to lack knowledge of key methodological evidence-based terms. The present curricula in dental schools fail to encourage the students to search and acquire knowledge wider than their patients themselves do. Universities have the responsibility to teach dentists various methods of critical appraisal to cope with scientific information. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  14. Information management

    Science.gov (United States)

    Ricks, Wendell; Corker, Kevin

    1990-01-01

    Primary Flight Display (PFD) information management and cockpit display of information management research is presented in viewgraph form. The information management problem in the cockpit, information management burdens, the key characteristics of an information manager, the interface management system handling the flow of information and the dialogs between the system and the pilot, and overall system architecture are covered.

  15. What does it mean to be possessed by a spirit or demon? Some ...

    African Journals Online (AJOL)

    The visible growth in possession and exorcism in Southern Africa can, amongst others, be attributed to the general impression in Christianity that, since Jesus was a successful exorcist, his followers should follow his example. Historical Jesus research generally endorses a view of Jesus as exorcist, which probably also ...

  16. Impact of Information Technology and Internet in Businesses

    OpenAIRE

    Afërdita Berisha-Shaqiri

    2015-01-01

    In the past few decades there has been a revolution in computing and communications, and all indications are that technological progress and use of information technology will continue. The revolution in information and communication technology has changed not only our lives but also the way how people do business. Using information technology, companies possess the potential to reach more customers, introduce new products and services quickly, and collaborate with suppliers and business part...

  17. Provable Data Possession of Resource-constrained Mobile Devices in Cloud Computing

    OpenAIRE

    Jian Yang; Haihang Wang; Jian Wang; Chengxiang Tan; Dingguo Yu

    2011-01-01

    Benefited from cloud storage services, users can save their cost of buying expensive storage and application servers, as well as deploying and maintaining applications. Meanwhile they lost the physical control of their data. So effective methods are needed to verify the correctness of the data stored at cloud servers, which are the research issues the Provable Data Possession (PDP) faced. The most important features in PDP are: 1) supporting for public, unlimited numbers of times of verificat...

  18. Osmosis--Does It Work for the Development of Information Literacy?

    Science.gov (United States)

    Weetman, Jacqui

    2005-01-01

    This article looks at the perceptions of faculty academic staff on information literacy and the skills that it involves. The research was undertaken at De Montfort University (Leicester, UK) in 2004 where staff were surveyed on the information skills that students should possess by the time that they graduate.

  19. Verifier-based three-party authentication schemes using extended chaotic maps for data exchange in telecare medicine information systems.

    Science.gov (United States)

    Lee, Tian-Fu

    2014-12-01

    Telecare medicine information systems provide a communicating platform for accessing remote medical resources through public networks, and help health care workers and medical personnel to rapidly making correct clinical decisions and treatments. An authentication scheme for data exchange in telecare medicine information systems enables legal users in hospitals and medical institutes to establish a secure channel and exchange electronic medical records or electronic health records securely and efficiently. This investigation develops an efficient and secure verified-based three-party authentication scheme by using extended chaotic maps for data exchange in telecare medicine information systems. The proposed scheme does not require server's public keys and avoids time-consuming modular exponential computations and scalar multiplications on elliptic curve used in previous related approaches. Additionally, the proposed scheme is proven secure in the random oracle model, and realizes the lower bounds of messages and rounds in communications. Compared to related verified-based approaches, the proposed scheme not only possesses higher security, but also has lower computational cost and fewer transmissions. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  20. 26 CFR 1.937-3 - Income effectively connected with the conduct of a trade or business in a possession.

    Science.gov (United States)

    2010-04-01

    ... operates an active financing business from offices in, Possession I. Interests in G are owned by D, a bona... of a trade or business in a possession. 1.937-3 Section 1.937-3 Internal Revenue INTERNAL REVENUE... United States § 1.937-3 Income effectively connected with the conduct of a trade or business in a...

  1. Comment on ''Semiquantum-key distribution using less than four quantum states''

    International Nuclear Information System (INIS)

    Boyer, Michel; Mor, Tal

    2011-01-01

    For several decades it was believed that information-secure key distribution requires both the sender and receiver to have the ability to generate and/or manipulate quantum states. Earlier, we showed that quantum key distribution in which one party is classical is possible [Boyer, Kenigsberg, and Mor, Phys. Rev. Lett. 99, 140501 (2007)]. A surprising and very nice extension of that result was suggested by Zou, Qiu, Li, Wu, and Li [Phys. Rev. A 79, 052312 (2009)]. Their paper suggests that it is sufficient for the originator of the states (the person holding the quantum technology) to generate just one state. The resulting semiquantum key distribution, which we call here 'quantum key distribution with classical Alice' is indeed completely robust against eavesdropping. However, their proof (that no eavesdropper can get information without being possibly detected) is faulty. We provide here a fully detailed and direct proof of their very important result.

  2. Key Distribution and Changing Key Cryptosystem Based on Phase Retrieval Algorithm and RSA Public-Key Algorithm

    Directory of Open Access Journals (Sweden)

    Tieyu Zhao

    2015-01-01

    Full Text Available The optical image encryption has attracted more and more researchers’ attention, and the various encryption schemes have been proposed. In existing optical cryptosystem, the phase functions or images are usually used as the encryption keys, and it is difficult that the traditional public-key algorithm (such as RSA, ECC, etc. is used to complete large numerical key transfer. In this paper, we propose a key distribution scheme based on the phase retrieval algorithm and the RSA public-key algorithm, which solves the problem for the key distribution in optical image encryption system. Furthermore, we also propose a novel image encryption system based on the key distribution principle. In the system, the different keys can be used in every encryption process, which greatly improves the security of the system.

  3. Iterative key-residues interrogation of a phytase with thermostability increasing substitutions identified in directed evolution.

    Science.gov (United States)

    Shivange, Amol V; Roccatano, Danilo; Schwaneberg, Ulrich

    2016-01-01

    Bacterial phytases have attracted industrial interest as animal feed supplement due to their high activity and sufficient thermostability (required for feed pelleting). We devised an approach named KeySIDE,  an iterative Key-residues interrogation of the wild type with Substitutions Identified in Directed Evolution for improving Yersinia mollaretii phytase (Ymphytase) thermostability by combining key beneficial substitutions and elucidating their individual roles. Directed evolution yielded in a discovery of nine positions in Ymphytase and combined iteratively to identify key positions. The "best" combination (M6: T77K, Q154H, G187S, and K289Q) resulted in significantly improved thermal resistance; the residual activity improved from 35 % (wild type) to 89 % (M6) at 58 °C and 20-min incubation. Melting temperature increased by 3 °C in M6 without a loss of specific activity. Molecular dynamics simulation studies revealed reduced flexibility in the loops located next to helices (B, F, and K) which possess substitutions (Helix-B: T77K, Helix-F: G187S, and Helix-K: K289E/Q). Reduced flexibility in the loops might be caused by strengthened hydrogen bonding network (e.g., G187S and K289E/K289Q) and a salt bridge (T77K). Our results demonstrate a promising approach to design phytases in food research, and we hope that the KeySIDE might become an attractive approach for understanding of structure-function relationships of enzymes.

  4. Key Elasticities in Job Search Theory : International Evidence

    OpenAIRE

    Addison, John T.; Centeno, Mário; Portugal, Pedro

    2004-01-01

    This paper exploits the informational value of search theory, after Lancaster and Chesher (1983), in conjunction with survey data on the unemployed to calculate key reservation wage and duration elasticities for most EU-15 nations.

  5. Exploring Representativeness and Informativeness for Active Learning.

    Science.gov (United States)

    Du, Bo; Wang, Zengmao; Zhang, Lefei; Zhang, Liangpei; Liu, Wei; Shen, Jialie; Tao, Dacheng

    2017-01-01

    How can we find a general way to choose the most suitable samples for training a classifier? Even with very limited prior information? Active learning, which can be regarded as an iterative optimization procedure, plays a key role to construct a refined training set to improve the classification performance in a variety of applications, such as text analysis, image recognition, social network modeling, etc. Although combining representativeness and informativeness of samples has been proven promising for active sampling, state-of-the-art methods perform well under certain data structures. Then can we find a way to fuse the two active sampling criteria without any assumption on data? This paper proposes a general active learning framework that effectively fuses the two criteria. Inspired by a two-sample discrepancy problem, triple measures are elaborately designed to guarantee that the query samples not only possess the representativeness of the unlabeled data but also reveal the diversity of the labeled data. Any appropriate similarity measure can be employed to construct the triple measures. Meanwhile, an uncertain measure is leveraged to generate the informativeness criterion, which can be carried out in different ways. Rooted in this framework, a practical active learning algorithm is proposed, which exploits a radial basis function together with the estimated probabilities to construct the triple measures and a modified best-versus-second-best strategy to construct the uncertain measure, respectively. Experimental results on benchmark datasets demonstrate that our algorithm consistently achieves superior performance over the state-of-the-art active learning algorithms.

  6. Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS

    Directory of Open Access Journals (Sweden)

    Kefei Mao

    2016-01-01

    Full Text Available Wireless Health Monitoring Systems (WHMS have potential to change the way of health care and bring numbers of benefits to patients, physicians, hospitals, and society. However, there are crucial barriers not only to transmit the biometric information but also to protect the privacy and security of the patients’ information. The key agreement between two entities is an essential cryptography operation to clear the barriers. In particular, the noninteractive hierarchical key agreement scheme becomes an attractive direction in WHMS because each sensor node or gateway has limited resources and power. Recently, a noninteractive hierarchical key agreement scheme has been proposed by Kim for WHMS. However, we show that Kim’s cryptographic scheme is vulnerable to the collusion attack if the physicians can be corrupted. Obviously, it is a more practical security condition. Therefore, we proposed an improved key agreement scheme against the attack. Security proof, security analysis, and experimental results demonstrate that our proposed scheme gains enhanced security and more efficiency than Kim’s previous scheme while inheriting its qualities of one-round communication and security properties.

  7. What does it mean to be possessed by a spirit or demon? Some ...

    African Journals Online (AJOL)

    2015-07-08

    Jul 8, 2015 ... Commons Attribution. License. .... Klass (2003:3) I therefore want to ask the question: 'What is actually .... help to categorise possession in terms of possible causal ... control of life. .... a social structure, the complex formed by all his [her] social ... a way to cope with stressful experiences and, together with.

  8. 7 CFR 330.300 - Soil from foreign countries or Territories or possessions. 1

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 5 2010-01-01 2010-01-01 false Soil from foreign countries or Territories or possessions. 1 330.300 Section 330.300 Agriculture Regulations of the Department of Agriculture (Continued) ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE FEDERAL PLANT PEST REGULATIONS; GENERAL; PLANT PESTS; SOIL, STONE, AND QUARRY...

  9. Stereotypes possess heterogeneous directionality: a theoretical and empirical exploration of stereotype structure and content.

    Science.gov (United States)

    Cox, William T L; Devine, Patricia G

    2015-01-01

    We advance a theory-driven approach to stereotype structure, informed by connectionist theories of cognition. Whereas traditional models define or tacitly assume that stereotypes possess inherently Group → Attribute activation directionality (e.g., Black activates criminal), our model predicts heterogeneous stereotype directionality. Alongside the classically studied Group → Attribute stereotypes, some stereotypes should be bidirectional (i.e., Group ⇄ Attribute) and others should have Attribute → Group unidirectionality (e.g., fashionable activates gay). We tested this prediction in several large-scale studies with human participants (NCombined = 4,817), assessing stereotypic inferences among various groups and attributes. Supporting predictions, we found heterogeneous directionality both among the stereotype links related to a given social group and also between the links of different social groups. These efforts yield rich datasets that map the networks of stereotype links related to several social groups. We make these datasets publicly available, enabling other researchers to explore a number of questions related to stereotypes and stereotyping. Stereotype directionality is an understudied feature of stereotypes and stereotyping with widespread implications for the development, measurement, maintenance, expression, and change of stereotypes, stereotyping, prejudice, and discrimination.

  10. Keys to the success of the CB Conquero

    Directory of Open Access Journals (Sweden)

    C. Fernández-Espínola

    2016-12-01

    Full Text Available When a team gets sport successes to level profesional, generates the topics that will be investigated such as the key factors of the succes. The main aim of this study is to analyze the influencie of different factors like the sports context, the social context and training aspects in the success of the Club Baloncesto Conquero through direct perception of thirteen informants associated with the team and the basketball in Huelva. An interview was carried out, related with those factors and the keys to success. The results revealed that workforce planning along the great work of coaching staff, medical staff and physical trainer have been key to the team gets sport successes.

  11. Semiquantum-key distribution using less than four quantum states

    International Nuclear Information System (INIS)

    Zou Xiangfu; Qiu Daowen; Li Lvzhou; Wu Lihua; Li Lvjun

    2009-01-01

    Recently Boyer et al. [Phys. Rev. Lett. 99, 140501 (2007)] suggested the idea of semiquantum key distribution (SQKD) in which Bob is classical and they also proposed a semiquantum key distribution protocol (BKM2007). To discuss the security of the BKM2007 protocol, they proved that their protocol is completely robust. This means that nonzero information acquired by Eve on the information string implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. The BKM2007 protocol uses four quantum states to distribute a secret key. In this paper, we simplify their protocol by using less than four quantum states. In detail, we present five different SQKD protocols in which Alice sends three quantum states, two quantum states, and one quantum state, respectively. Also, we prove that all the five protocols are completely robust. In particular, we invent two completely robust SQKD protocols in which Alice sends only one quantum state. Alice uses a register in one SQKD protocol, but she does not use any register in the other. The information bit proportion of the SQKD protocol in which Alice sends only one quantum state but uses a register is the double as that in the BKM2007 protocol. Furthermore, the information bit rate of the SQKD protocol in which Alice sends only one quantum state and does not use any register is not lower than that of the BKM2007 protocol.

  12. Academic Primer Series: Eight Key Papers about Education Theory.

    Science.gov (United States)

    Gottlieb, Michael; Boysen-Osborn, Megan; Chan, Teresa M; Krzyzaniak, Sara M; Pineda, Nicolas; Spector, Jordan; Sherbino, Jonathan

    2017-02-01

    Many teachers adopt instructional methods based on assumptions of best practices without attention to or knowledge of supporting education theory. Familiarity with a variety of theories informs education that is efficient, strategic, and evidence-based. As part of the Academic Life in Emergency Medicine Faculty Incubator Program, a list of key education theories for junior faculty was developed. A list of key papers on theories relevant to medical education was generated using an expert panel, a virtual community of practice synthetic discussion, and a social media call for resources. A three-round, Delphi-informed voting methodology including novice and expert educators produced a rank order of the top papers. These educators identified 34 unique papers. Eleven papers described the general use of education theory, while 23 papers focused on a specific theory. The top three papers on general education theories and top five papers on specific education theory were selected and summarized. The relevance of each paper for junior faculty and faculty developers is also presented. This paper presents a reading list of key papers for junior faculty in medical education roles. Three papers about general education theories and five papers about specific educational theories are identified and annotated. These papers may help provide foundational knowledge in education theory to inform junior faculty teaching practice.

  13. Informal information for web-based engineering catalogues

    Science.gov (United States)

    Allen, Richard D.; Culley, Stephen J.; Hicks, Ben J.

    2001-10-01

    Success is highly dependent on the ability of a company to efficiently produce optimal designs. In order to achieve this companies must minimize time to market and possess the ability to make fully informed decisions at the early phase of the design process. Such decisions may include the choice of component and suppliers, as well as cost and maintenance considerations. Computer modeling and electronic catalogues are becoming the preferred medium for the selection and design of mechanical components. In utilizing these techniques, the designer demands the capability to identify, evaluate and select mechanical components both quantitatively and qualitatively. Quantitative decisions generally encompass performance data included in the formal catalogue representation. It is in the area of qualitative decisions that the use of what the authors call 'Informal Information' is of crucial importance. Thus, 'Informal Information' must often be incorporated into the selection process and selection systems. This would enable more informed decisions to be made quicker, without the need for information retrieval via discussion with colleagues in the design environment. This paper provides an overview of the use of electronic information in the design of mechanical systems, including a discussion of limitations of current technology. The importance of Informal Information is discussed and the requirements for association with web based electronic catalogues are developed. This system is based on a flexible XML schema and enables the storage, classification and recall of Informal Information packets. Furthermore, a strategy for the inclusion of Informal Information is proposed, and an example case is used to illustrate the benefits.

  14. Economic and Physical Linkages of the Information and Communication Technology (ICT) Service Industry to Key Industries of the Economy: An Ad Hoc Report

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, David M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Hoffman, Michael G. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Niemeyer, Jackie M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Samuel, Todd J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2017-01-04

    This report examines the information and communications technology (ICT) services industry in response to an inquiry by the Department of Energy’s (DOE’s) Office of Energy Policy and Systems Analysis. The report answers several key questions: •How has the reliance on ICT services evolved in recent years for key infrastructure services such as air travel, freight transport, electricity and natural gas distribution, financial services, and critical health care, and for the household sector? •What ICT industry trends explain continued strong linkage to and reliance upon ICT? •What is the ICT industry’s reliance on grid-supplied power, uninterruptible power supplies, emergency generators and back-up energy storage technologies? •What are the observed direct effects of ICT disruptions induced by electrical system failures in recent history and how resilient are the components of the ICT industry?

  15. Mycobacterium tuberculosis UvrB Is a Robust DNA-Stimulated ATPase That Also Possesses Structure-Specific ATP-Dependent DNA Helicase Activity.

    Science.gov (United States)

    Thakur, Manoj; Kumar, Mohan B J; Muniyappa, K

    2016-10-18

    Much is known about the Escherichia coli nucleotide excision repair (NER) pathway; however, very little is understood about the proteins involved and the molecular mechanism of NER in mycobacteria. In this study, we show that Mycobacterium tuberculosis UvrB (MtUvrB), which exists in solution as a monomer, binds to DNA in a structure-dependent manner. A systematic examination of MtUvrB substrate specificity reveals that it associates preferentially with single-stranded DNA, duplexes with 3' or 5' overhangs, and linear duplex DNA with splayed arms. Whereas E. coli UvrB (EcUvrB) binds weakly to undamaged DNA and has no ATPase activity, MtUvrB possesses intrinsic ATPase activity that is greatly stimulated by both single- and double-stranded DNA. Strikingly, we found that MtUvrB, but not EcUvrB, possesses the DNA unwinding activity characteristic of an ATP-dependent DNA helicase. The helicase activity of MtUvrB proceeds in the 3' to 5' direction and is strongly modulated by a nontranslocating 5' single-stranded tail, indicating that in addition to the translocating strand it also interacts with the 5' end of the substrate. The fraction of DNA unwound by MtUvrB decreases significantly as the length of the duplex increases: it fails to unwind duplexes longer than 70 bp. These results, on one hand, reveal significant mechanistic differences between MtUvrB and EcUvrB and, on the other, support an alternative role for UvrB in the processing of key DNA replication intermediates. Altogether, our findings provide insights into the catalytic functions of UvrB and lay the foundation for further understanding of the NER pathway in M. tuberculosis.

  16. Key stakeholder perceptions about consent to participate in acute illness research: a rapid, systematic review to inform epi/pandemic research preparedness.

    Science.gov (United States)

    Gobat, Nina H; Gal, Micaela; Francis, Nick A; Hood, Kerenza; Watkins, Angela; Turner, Jill; Moore, Ronald; Webb, Steve A R; Butler, Christopher C; Nichol, Alistair

    2015-12-29

    A rigorous research response is required to inform clinical and public health decision-making during an epi/pandemic. However, the ethical conduct of such research, which often involves critically ill patients, may be complicated by the diminished capacity to consent and an imperative to initiate trial therapies within short time frames. Alternative approaches to taking prospective informed consent may therefore be used. We aimed to rapidly review evidence on key stakeholder (patients, their proxy decision-makers, clinicians and regulators) views concerning the acceptability of various approaches for obtaining consent relevant to pandemic-related acute illness research. We conducted a rapid evidence review, using the Internet, database and hand-searching for English language empirical publications from 1996 to 2014 on stakeholder opinions of consent models (prospective informed, third-party, deferred, or waived) used in acute illness research. We excluded research on consent to treatment, screening, or other such procedures, non-emergency research and secondary studies. Papers were categorised, and data summarised using narrative synthesis. We screened 689 citations, reviewed 104 full-text articles and included 52. Just one paper related specifically to pandemic research. In other emergency research contexts potential research participants, clinicians and research staff found third-party, deferred, and waived consent to be acceptable as a means to feasibly conduct such research. Acceptability to potential participants was motivated by altruism, trust in the medical community, and perceived value in medical research and decreased as the perceived risks associated with participation increased. Discrepancies were observed in the acceptability of the concept and application or experience of alternative consent models. Patients accepted clinicians acting as proxy-decision makers, with preference for two decision makers as invasiveness of interventions increased

  17. Secure Clustering and Symmetric Key Establishment in Heterogeneous Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Azarderskhsh Reza

    2011-01-01

    Full Text Available Information security in infrastructureless wireless sensor networks (WSNs is one of the most important research challenges. In these networks, sensor nodes are typically sprinkled liberally in the field in order to monitor, gather, disseminate, and provide the sensed data to the command node. Various studies have focused on key establishment schemes in homogeneous WSNs. However, recent research has shown that achieving survivability in WSNs requires a hierarchy and heterogeneous infrastructure. In this paper, to address security issues in the heterogeneous WSNs, we propose a secure clustering scheme along with a deterministic pairwise key management scheme based on public key cryptography. The proposed security mechanism guarantees that any two sensor nodes located in the same cluster and routing path can directly establish a pairwise key without disclosing any information to other nodes. Through security performance evaluation, it is shown that the proposed scheme guarantees node-to-node authentication, high resiliency against node capture, and minimum memory space requirement.

  18. Specificity determinants for autoproteolysis of LexA, a key regulator of bacterial SOS mutagenesis.

    Science.gov (United States)

    Mo, Charlie Y; Birdwell, L Dillon; Kohli, Rahul M

    2014-05-20

    Bacteria utilize the tightly regulated stress response (SOS) pathway to respond to a variety of genotoxic agents, including antimicrobials. Activation of the SOS response is regulated by a key repressor-protease, LexA, which undergoes autoproteolysis in the setting of stress, resulting in derepression of SOS genes. Remarkably, genetic inactivation of LexA's self-cleavage activity significantly decreases acquired antibiotic resistance in infection models and renders bacteria hypersensitive to traditional antibiotics, suggesting that a mechanistic study of LexA could help inform its viability as a novel target for combating acquired drug resistance. Despite structural insights into LexA, a detailed knowledge of the enzyme's protease specificity is lacking. Here, we employ saturation and positional scanning mutagenesis on LexA's internal cleavage region to analyze >140 mutants and generate a comprehensive specificity profile of LexA from the human pathogen Pseudomonas aeruginosa (LexAPa). We find that the LexAPa active site possesses a unique mode of substrate recognition. Positions P1-P3 prefer small hydrophobic residues that suggest specific contacts with the active site, while positions P5 and P1' show a preference for flexible glycine residues that may facilitate the conformational change that permits autoproteolysis. We further show that stabilizing the β-turn within the cleavage region enhances LexA autoproteolytic activity. Finally, we identify permissive positions flanking the scissile bond (P4 and P2') that are tolerant to extensive mutagenesis. Our studies shed light on the active site architecture of the LexA autoprotease and provide insights that may inform the design of probes of the SOS pathway.

  19. Information on the Schacht Asse II. Key aspect concentration

    International Nuclear Information System (INIS)

    2016-01-01

    The information brochure on the Schacht Asse II covers the following issues: without the main mine fan the operation of Asse II would not be possible; the site selection for a final repository as a democratic challenge; the final radioactive waste disposal management in Germany, Asse, Morsleben and Konrad are rather close.

  20. How Risky Is Marijuana Possession? Considering the Role of Age, Race, and Gender

    Science.gov (United States)

    Nguyen, Holly; Reuter, Peter

    2012-01-01

    Arrest rates per capita for possession of marijuana have increased threefold over the last 20 years and now constitute the largest single arrest offense category. Despite the increase in arrest numbers, rates of use have remained stable during much of the same period. This article presents the first estimates of the arrest probabilities for…

  1. Two-dimensional distributed-phase-reference protocol for quantum key distribution

    DEFF Research Database (Denmark)

    Bacco, Davide; Christensen, Jesper Bjerge; Usuga Castaneda, Mario A.

    2016-01-01

    10 years, long-distance fiber-based DPR systems have been successfully demonstrated, although fundamental obstacles such as intrinsic channel losses limit their performance. Here, we introduce the first two-dimensional DPR-QKD protocol in which information is encoded in the time and phase of weak......Quantum key distribution (QKD) and quantum communication enable the secure exchange of information between remote parties. Currently, the distributed-phase-reference (DPR) protocols, which are based on weak coherent pulses, are among the most practical solutions for long-range QKD. During the last...... coherent pulses. The ability of extracting two bits of information per detection event, enables a higher secret key rate in specific realistic network scenarios. Moreover, despite the use of more dimensions, the proposed protocol remains simple, practical, and fully integrable....

  2. Two-dimensional distributed-phase-reference protocol for quantum key distribution

    Science.gov (United States)

    Bacco, Davide; Christensen, Jesper Bjerge; Castaneda, Mario A. Usuga; Ding, Yunhong; Forchhammer, Søren; Rottwitt, Karsten; Oxenløwe, Leif Katsuo

    2016-12-01

    Quantum key distribution (QKD) and quantum communication enable the secure exchange of information between remote parties. Currently, the distributed-phase-reference (DPR) protocols, which are based on weak coherent pulses, are among the most practical solutions for long-range QKD. During the last 10 years, long-distance fiber-based DPR systems have been successfully demonstrated, although fundamental obstacles such as intrinsic channel losses limit their performance. Here, we introduce the first two-dimensional DPR-QKD protocol in which information is encoded in the time and phase of weak coherent pulses. The ability of extracting two bits of information per detection event, enables a higher secret key rate in specific realistic network scenarios. Moreover, despite the use of more dimensions, the proposed protocol remains simple, practical, and fully integrable.

  3. INFORMATION, KEY ELEMENT OF ACCOUNTING AND AUDIT IN THE KNOWLEDGE SOCIETY

    Directory of Open Access Journals (Sweden)

    NELUTA MITEA

    2011-04-01

    Full Text Available In a knowledge society, the advantage of nations will not result from their natural resources, nor to the cheap labor, but from their ability to valorize the intellectual potential and to use efficiently the information. The knowledge based economy represents a new step in the development of human civilization that promises us a better future. The knowledge transfer between people and generations in order to facilitate human society’s evolution is the basic function of information science. This paper aims to examine how, in Romania, accounting and audit use and create information in current conditions of economic development. The purpose of this study consists in offering perspectives of improving the information quality. An information is high quality when, by its form and content, it corresponds integrally to all the needs, the exigencies and expectations of its user, without sacrificing the reality. A number of errors made by the accounting profession have been identified along this paper. These errors led to the decrease of information’s credibility. But the study proposes some changes in order to restore the image of this profession: the changes are sustained by the advantages of Knowledge Economy and Information Society. The research method consists in studying a rich background material, including reference items, such as works of applied and fundamental research. The originality of this work is given by the identification of knowledge society’s challenge which could be used as a lever of revival for accounting and audit in Romania.

  4. Power, slavery, and spirit possession in East Africa: A few reflections

    Directory of Open Access Journals (Sweden)

    Beatrice Nicolini

    2014-02-01

    Full Text Available Spirit possession and its relationship with power aims to offer here a better understanding not only of East African societies, but, most of all, of their historical role in numerous political and military conflicts and also within peace-building processes that represent a continuation of a topic of longstanding concern in East African history. The relationships between religions, local cultures and institutional powers throughout contemporary East African history will be re-read through regional and transnational, as well as international dynamics.

  5. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae).

    Science.gov (United States)

    Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G

    2016-04-01

    Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.

  6. THE RELATIONSHIP BETWEEN RESEARCH AND TEACHING: THE CHART OF POSSESSIVE PRONOUNS IN PORTUGUESE

    Directory of Open Access Journals (Sweden)

    Leonardo Lennertz Marcotulio

    2016-01-01

    Full Text Available The aim of this article is to investigate the relationship between research and teaching, concerning the rearrangements operated in the chart of possessive pronouns,  observing in which way sociolinguistic studies have been applied to the teaching of Portuguese through the didactic material prepared for High School and the courses of Portuguese as a Foreign Language.

  7. Illicit Drug Users in the Tanzanian Hinterland: Population Size Estimation Through Key Informant-Driven Hot Spot Mapping.

    Science.gov (United States)

    Ndayongeje, Joel; Msami, Amani; Laurent, Yovin Ivo; Mwankemwa, Syangu; Makumbuli, Moza; Ngonyani, Alois M; Tiberio, Jenny; Welty, Susie; Said, Christen; Morris, Meghan D; McFarland, Willi

    2018-02-12

    We mapped hot spots and estimated the numbers of people who use drugs (PWUD) and who inject drugs (PWID) in 12 regions of Tanzania. Primary (ie, current and past PWUD) and secondary (eg, police, service providers) key informants identified potential hot spots, which we visited to verify and count the number of PWUD and PWID present. Adjustments to counts and extrapolation to regional estimates were done by local experts through iterative rounds of discussion. Drug use, specifically cocaine and heroin, occurred in all regions. Tanga had the largest numbers of PWUD and PWID (5190 and 540, respectively), followed by Mwanza (3300 and 300, respectively). Findings highlight the need to strengthen awareness of drug use and develop prevention and harm reduction programs with broader reach in Tanzania. This exercise provides a foundation for understanding the extent and locations of drug use, a baseline for future size estimations, and a sampling frame for future research.

  8. Finite key analysis in quantum cryptography

    International Nuclear Information System (INIS)

    Meyer, T.

    2007-01-01

    finite number of input signals, without making any approximations. As an application, we investigate the so-called ''Tomographic Protocol'', which is based on the Six-State Protocol and where Alice and Bob can obtain the additional information which quantum state they share after the distribution step of the protocol. We calculate the obtainable secret key rate under the assumption that the eavesdropper only conducts collective attacks and give a detailed analysis of the dependence of the key rate on various parameters: The number of input signals (the block size), the error rate in the sifted key (the QBER), and the security parameter. Furthermore, we study the influence of multi-photon events which naturally occur in a realistic implementation (orig.)

  9. Finite key analysis in quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Meyer, T.

    2007-10-31

    the obtainable key rate for any finite number of input signals, without making any approximations. As an application, we investigate the so-called ''Tomographic Protocol'', which is based on the Six-State Protocol and where Alice and Bob can obtain the additional information which quantum state they share after the distribution step of the protocol. We calculate the obtainable secret key rate under the assumption that the eavesdropper only conducts collective attacks and give a detailed analysis of the dependence of the key rate on various parameters: The number of input signals (the block size), the error rate in the sifted key (the QBER), and the security parameter. Furthermore, we study the influence of multi-photon events which naturally occur in a realistic implementation (orig.)

  10. A key design to prolong lifetime of wireless sensor network

    International Nuclear Information System (INIS)

    Qiu, Bo; Chen, XiQiu; Wu, Qi

    2016-01-01

    In order to solve the contradiction between the connectivity of the wireless sensor network and the key storage consumption, under the premise of reducing network storage consumption, the key pre-distribution management scheme with higher connectivity rate is proposed using the hexagonal network deployment information, which adopts the idea of the matrix space for the square deployment information strategy to reduce the burden of the network storage. Ability against the capture attack is improved obviously. The results show that contradiction between the network connectivity rate and the energy consumption has a better solution, and the proposed algorithm is suitable for the wireless sensor networks of energy limited.

  11. Key Topics in Sports Medicine

    OpenAIRE

    2006-01-01

    Key Topics in Sports Medicine is a single quick reference source for sports and exercise medicine. It presents the essential information from across relevant topic areas, and includes both the core and emerging issues in this rapidly developing field. It covers: 1) Sports injuries, rehabilitation and injury prevention, 2) Exercise physiology, fitness testing and training, 3) Drugs in sport, 4) Exercise and health promotion, 5) Sport and exercise for special and clinical populations, 6) The ps...

  12. How market information is transformed into marketing knowledge?

    OpenAIRE

    T. Keszey

    2011-01-01

    In the future, competitors will have more and more opportunities to buy the same information; therefore the companies’ competitiveness will not primarily depend on how much information they possess, but rather on how they can “translate” it to their own language. This study aims to examine those factors that have the most significant impact on the degree to which market studies are utilised by companies. Most of the work in this area has studied the use of information in strategic decisions a...

  13. Social forces for team coordination in ball possession game

    Science.gov (United States)

    Yokoyama, Keiko; Shima, Hiroyuki; Fujii, Keisuke; Tabuchi, Noriyuki; Yamamoto, Yuji

    2018-02-01

    Team coordination is a basic human behavioral trait observed in many real-life communities. To promote teamwork, it is important to cultivate social skills that elicit team coordination. In the present work, we consider which social skills are indispensable for individuals performing a ball possession game in soccer. We develop a simple social force model that describes the synchronized motion of offensive players. Comparing the simulation results with experimental observations, we uncovered that the cooperative social force, a measure of perception skill, has the most important role in reproducing the harmonized collective motion of experienced players in the task. We further developed an experimental tool that facilitates real players' perceptions of interpersonal distance, revealing that the tool improves novice players' motions as if the cooperative social force were imposed.

  14. Unravelling the spirits' message: a study of help-seeking steps and explanatory models among patients suffering from spirit possession in Uganda

    NARCIS (Netherlands)

    van Duijl, M.; Kleijn, W.; de Jong, J.

    2014-01-01

    As in many cultures, also in Uganda spirit possession is a common idiom of distress associated with traumatic experiences. In the DSM-IV and -5, possession trance disorders can be classified as dissociative disorders. Dissociation in Western countries is associated with complicated, time-consuming

  15. Manet key management via Mobile Ficlke Key protocol (MFK ...

    African Journals Online (AJOL)

    Manet key management via Mobile Ficlke Key protocol (MFK) ... Journal of Fundamental and Applied Sciences. Journal Home · ABOUT THIS JOURNAL ... No Abstract. Keywords: MANET; key management scheme; simulation environment ...

  16. Love and Art Strike Back: A.S. Byatt’s Possession: A Romance

    DEFF Research Database (Denmark)

    Mogensen, Tine Engel

    2004-01-01

    Possession can be seen as an enactment of the conflicts between a number of powerful - and quite classic - extremes (anatomy-romance, intellectual experience-sensuous experience, theory-art, reason-love, irony-pathos), which, in the aesthetic experience of the reader, it overcomes and transcends....

  17. Tourette's syndrome: from demonic possession and psychoanalysis to the discovery of gene

    Directory of Open Access Journals (Sweden)

    Francisco M.B. Germiniani

    2012-07-01

    Full Text Available In this paper we make a brief historical review of the hypothesis concerning the etiology of Tourette's syndrome (TS, focusing on varying trends over time: at first, its presumed relation to witchcraft and demonic possessions, followed by the psychoanalytical theory, which attributed TS to a masturbatory equivalent. Then, progressing to modern time, to the immunological theory and finally the advent of genetics and their role in the etiology of TS.

  18. The Diversity-Multiplexing Tradeoff of Secret-Key Agreement over Multiple-Antenna Channels

    KAUST Repository

    Zorgui, Marwen; Rezki, Zouheir; Alomair, Basel; Alouini, Mohamed-Slim

    2015-01-01

    We study the problem of secret-key agreement between two legitimate parties, Alice and Bob, in presence an of eavesdropper Eve. There is a public channel with unlimited capacity that is available to the legitimate parties and is also observed by Eve. Our focus is on Rayleigh fading quasi-static channels. The legitimate receiver and the eavesdropper are assumed to have perfect channel knowledge of their channels. We study the system in the high-power regime. First, we define the secret-key diversity gain and the secret-key multiplexing gain. Second, we establish the secret-key diversity multiplexing tradeoff (DMT) under no channel state information (CSI) at the transmitter (CSI-T). The eavesdropper is shown to “steal” only transmit antennas. We show that, likewise the DMT without secrecy constraint, the secret-key DMT is the same either with or without full channel state information at the transmitter. This insensitivity of secret-key DMT toward CSI-T features a fundamental difference between secret-key agreement and the wiretap channel, in which secret DMT depends heavily on CSI-T. Finally, we present several secret-key DMT-achieving schemes in case of full CSI-T. We argue that secret DMT-achieving schemes are also key DMT-achieving. Moreover, we show formally that artificial noise (AN), likewise zero-forcing (ZF), is DMT-achieving. We also show that the public feedback channel improves the outage performance without having any effect on the DMT.

  19. The Diversity-Multiplexing Tradeoff of Secret-Key Agreement over Multiple-Antenna Channels

    KAUST Repository

    Zorgui, Marwen

    2015-10-26

    We study the problem of secret-key agreement between two legitimate parties, Alice and Bob, in presence an of eavesdropper Eve. There is a public channel with unlimited capacity that is available to the legitimate parties and is also observed by Eve. Our focus is on Rayleigh fading quasi-static channels. The legitimate receiver and the eavesdropper are assumed to have perfect channel knowledge of their channels. We study the system in the high-power regime. First, we define the secret-key diversity gain and the secret-key multiplexing gain. Second, we establish the secret-key diversity multiplexing tradeoff (DMT) under no channel state information (CSI) at the transmitter (CSI-T). The eavesdropper is shown to “steal” only transmit antennas. We show that, likewise the DMT without secrecy constraint, the secret-key DMT is the same either with or without full channel state information at the transmitter. This insensitivity of secret-key DMT toward CSI-T features a fundamental difference between secret-key agreement and the wiretap channel, in which secret DMT depends heavily on CSI-T. Finally, we present several secret-key DMT-achieving schemes in case of full CSI-T. We argue that secret DMT-achieving schemes are also key DMT-achieving. Moreover, we show formally that artificial noise (AN), likewise zero-forcing (ZF), is DMT-achieving. We also show that the public feedback channel improves the outage performance without having any effect on the DMT.

  20. A Comparison of Self-reported Medication Adherence to Concordance Between Part D Claims and Medication Possession.

    Science.gov (United States)

    Savitz, Samuel T; Stearns, Sally C; Zhou, Lei; Thudium, Emily; Alburikan, Khalid A; Tran, Richard; Rodgers, Jo E

    2017-05-01

    Medicare Part D claims indicate medication purchased, but people who are not fully adherent may extend prescription use beyond the interval prescribed. This study assessed concordance between Part D claims and medication possession at a study visit in relation to self-reported medication adherence. We matched Part D claims for 6 common medications to medications brought to a study visit in 2011-2013 for the Atherosclerosis Risk in Communities study. The combined data consisted of 3027 medication events (claims, medications possessed, or both) for 2099 Atherosclerosis Risk in Communities study participants. Multinomial logistic regression estimated the association of concordance (visit only, Part D only, or both) with self-reported medication adherence while controlling for sociodemographic characteristics, veteran status, and availability under Generic Drug Discount Programs. Relative to participants with high adherence, medication events for participants with low adherence were approximately 25 percentage points less likely to match and more likely to be visit only (PDiscount Programs were 3 percentage points more likely to be visit only. Part D claims were substantially less likely to be concordant with medications possessed at study visit for participants with low self-reported adherence. This result supports the construction of adherence proxies such as proportion days covered using Part D claims.

  1. Quantum-key-distribution protocol with pseudorandom bases

    Science.gov (United States)

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  2. Security of a single-state semi-quantum key distribution protocol

    Science.gov (United States)

    Zhang, Wei; Qiu, Daowen; Mateus, Paulo

    2018-06-01

    Semi-quantum key distribution protocols are allowed to set up a secure secret key between two users. Compared with their full quantum counterparts, one of the two users is restricted to perform some "classical" or "semi-quantum" operations, which potentially makes them easily realizable by using less quantum resource. However, the semi-quantum key distribution protocols mainly rely on a two-way quantum channel. The eavesdropper has two opportunities to intercept the quantum states transmitted in the quantum communication stage. It may allow the eavesdropper to get more information and make the security analysis more complicated. In the past ten years, many semi-quantum key distribution protocols have been proposed and proved to be robust. However, there are few works concerning their unconditional security. It is doubted that how secure the semi-quantum ones are and how much noise they can tolerate to establish a secure secret key. In this paper, we prove the unconditional security of a single-state semi-quantum key distribution protocol proposed by Zou et al. (Phys Rev A 79:052312, 2009). We present a complete proof from information theory aspect by deriving a lower bound of the protocol's key rate in the asymptotic scenario. Using this bound, we figure out an error threshold value such that for all error rates that are less than this threshold value, the secure secret key can be established between the legitimate users definitely. Otherwise, the users should abort the protocol. We make an illustration of the protocol under the circumstance that the reverse quantum channel is a depolarizing one with parameter q. Additionally, we compare the error threshold value with some full quantum protocols and several existing semi-quantum ones whose unconditional security proofs have been provided recently.

  3. Antibiotic distribution channels in Thailand: results of key-informant interviews, reviews of drug regulations and database searches.

    Science.gov (United States)

    Sommanustweechai, Angkana; Chanvatik, Sunicha; Sermsinsiri, Varavoot; Sivilaikul, Somsajee; Patcharanarumol, Walaiporn; Yeung, Shunmay; Tangcharoensathien, Viroj

    2018-02-01

    To analyse how antibiotics are imported, manufactured, distributed and regulated in Thailand. We gathered information, on antibiotic distribution in Thailand, in in-depth interviews - with 43 key informants from farms, health facilities, pharmaceutical and animal feed industries, private pharmacies and regulators- and in database and literature searches. In 2016-2017, licensed antibiotic distribution in Thailand involves over 700 importers and about 24 000 distributors - e.g. retail pharmacies and wholesalers. Thailand imports antibiotics and active pharmaceutical ingredients. There is no system for monitoring the distribution of active ingredients, some of which are used directly on farms, without being processed. Most antibiotics can be bought from pharmacies, for home or farm use, without a prescription. Although the 1987 Drug Act classified most antibiotics as "dangerous drugs", it only classified a few of them as prescription-only medicines and placed no restrictions on the quantities of antibiotics that could be sold to any individual. Pharmacists working in pharmacies are covered by some of the Act's regulations, but the quality of their dispensing and prescribing appears to be largely reliant on their competences. In Thailand, most antibiotics are easily and widely available from retail pharmacies, without a prescription. If the inappropriate use of active pharmaceutical ingredients and antibiotics is to be reduced, we need to reclassify and restrict access to certain antibiotics and to develop systems to audit the dispensing of antibiotics in the retail sector and track the movements of active ingredients.

  4. Access to Opportunities for Bilingualism for Individuals with Developmental Disabilities: Key Informant Interviews.

    Science.gov (United States)

    de Valenzuela, Julia Scherba; Bird, Elizabeth Kay-Raining; Parkington, Karisa; Mirenda, Pat; Cain, Kate; MacLeod, Andrea A N; Segers, Eliane

    The purpose of this article is to describe the results of a thematic analysis of 79 semi-structured interviews collected at six research sites in four countries in relation to the inclusion and exclusion of students with developmental disabilities (DD) in and from special education and bilingual opportunities. The participants were individuals with expertise either in special needs and/or language education to support bilingualism (e.g., second language (L2) instruction), who served as key informants about service delivery and/or policy in these areas. Six themes emerged as salient during the analysis: we include all kids, special needs drives it, time/scheduling conflicts, IEP/IPP/statement drives it, it's up to the parents, and service availability. The results suggested that access to language programs and services is limited for children with DD, even though participants at all sites reported adherence to a philosophy of inclusion. A priority on special education services over language services was identified, as well as barriers to providing children with DD access to programs and services to support bilingual development. Some of these barriers included time and scheduling conflicts and limited service availability. Additionally, the role of parents in decision making was affirmed, although, in contrast to special education services, decision-making about participation or exemption from language programs was typically left up to the parents. Overall, the results suggest a need for greater attention to providing supports for both first (L1) and L2 language development for bilingual children with DD and greater access to available language programs. Copyright © 2016 Elsevier Inc. All rights reserved.

  5. Key Techniques for Dynamic Updating of National Fundamental Geographic Information Database

    Directory of Open Access Journals (Sweden)

    WANG Donghua

    2015-07-01

    Full Text Available One of the most important missions of fundamental surveying and mapping work is to keep the fundamental geographic information fresh. In this respect, National Administration of Surveying, Mapping and Geoinformation has launched the project of dynamic updating of national fundamental geographic information database since 2012, which aims to update 1:50 000, 1:250 000 and 1:1 000 000 national fundamental geographic information database continuously and quickly, by updating and publishing once a year. This paper introduces the general technical thinking of dynamic updating, states main technical methods, such as dynamic updating of fundamental database, linkage updating of derived databases, and multi-tense database management and service and so on, and finally introduces main technical characteristics and engineering applications.

  6. Deaf Adolescents’ Learning of Cardiovascular Health Information: Sources and Access Challenges

    Science.gov (United States)

    Smith, Scott R.; Kushalnagar, Poorna; Hauser, Peter C.

    2015-01-01

    Deaf individuals have more cardiovascular risks than the general population that are believed to be related to their cardiovascular health knowledge disparities. This phenomenological study describes where 20 deaf sign language-using adolescents from Rochester, New York, many who possess many positive characteristics to support their health literacy, learn cardiovascular health information and their lived experiences accessing health information. The goal is to ultimately use this information to improve the delivery of cardiovascular health education to this population and other deaf adolescents at a higher risk for weak health literacy. Deaf bilingual researchers interviewed deaf adolescents, transcribed and coded the data, and described the findings. Five major sources of cardiovascular health information were identified including family, health education teachers, healthcare providers, printed materials, and informal sources. Despite possessing advantageous characteristics contributing to stronger health literacy, study participants described significant challenges with accessing health information from each source. They also demonstrated inconsistencies in their cardiovascular health knowledge, especially regarding heart attack, stroke, and cholesterol. These findings suggest a great need for additional public funding to research deaf adolescents’ informal health-related learning, develop accessible and culturally appropriate health surveys and health education programming, improve interpreter education, and disseminate information through social media. PMID:26048900

  7. A Study on Group Key Agreement in Sensor Network Environments Using Two-Dimensional Arrays

    Science.gov (United States)

    Jang, Seung-Jae; Lee, Young-Gu; Lee, Kwang-Hyung; Kim, Tai-Hoon; Jun, Moon-Seog

    2011-01-01

    These days, with the emergence of the concept of ubiquitous computing, sensor networks that collect, analyze and process all the information through the sensors have become of huge interest. However, sensor network technology fundamentally has wireless communication infrastructure as its foundation and thus has security weakness and limitations such as low computing capacity, power supply limitations and price. In this paper, and considering the characteristics of the sensor network environment, we propose a group key agreement method using a keyset pre-distribution of two-dimension arrays that should minimize the exposure of key and personal information. The key collision problems are resolved by utilizing a polygonal shape’s center of gravity. The method shows that calculating a polygonal shape’s center of gravity only requires a very small amount of calculations from the users. The simple calculation not only increases the group key generation efficiency, but also enhances the sense of security by protecting information between nodes. PMID:22164072

  8. A Study on Group Key Agreement in Sensor Network Environments Using Two-Dimensional Arrays

    Directory of Open Access Journals (Sweden)

    Moon-Seog Jun

    2011-08-01

    Full Text Available These days, with the emergence of the concept of ubiquitous computing, sensor networks that collect, analyze and process all the information through the sensors have become of huge interest. However, sensor network technology fundamentally has wireless communication infrastructure as its foundation and thus has security weakness and limitations such as low computing capacity, power supply limitations and price. In this paper, and considering the characteristics of the sensor network environment, we propose a group key agreement method using a keyset pre-distribution of two-dimension arrays that should minimize the exposure of key and personal information. The key collision problems are resolved by utilizing a polygonal shape’s center of gravity. The method shows that calculating a polygonal shape’s center of gravity only requires a very small amount of calculations from the users. The simple calculation not only increases the group key generation efficiency, but also enhances the sense of security by protecting information between nodes.

  9. Practical private database queries based on a quantum-key-distribution protocol

    International Nuclear Information System (INIS)

    Jakobi, Markus; Simon, Christoph; Gisin, Nicolas; Bancal, Jean-Daniel; Branciard, Cyril; Walenta, Nino; Zbinden, Hugo

    2011-01-01

    Private queries allow a user, Alice, to learn an element of a database held by a provider, Bob, without revealing which element she is interested in, while limiting her information about the other elements. We propose to implement private queries based on a quantum-key-distribution protocol, with changes only in the classical postprocessing of the key. This approach makes our scheme both easy to implement and loss tolerant. While unconditionally secure private queries are known to be impossible, we argue that an interesting degree of security can be achieved by relying on fundamental physical principles instead of unverifiable security assumptions in order to protect both the user and the database. We think that the scope exists for such practical private queries to become another remarkable application of quantum information in the footsteps of quantum key distribution.

  10. Impact of Preparers of Accounting Information on Quality of Financial Reporting in Malaysia(*)

    OpenAIRE

    Dandago, Prof. Dr.Kabiru Isa; Edem, Akpan; Tsafe, Dr. Bashir Mande

    2014-01-01

    The primary objective of accounting is to provide information that is useful for decision making purposes. Accounting information that makes information provided useful to users in making economic decisions must possess the following qualities: relevance, reliability, comparability, understandability, neutrality, timeliness and materiality. This paper investigates the factors influencing preparers’ decision to prepare accounting information following the financial reporting rules and regulati...

  11. Comment on ``Semiquantum-key distribution using less than four quantum states''

    Science.gov (United States)

    Boyer, Michel; Mor, Tal

    2011-04-01

    For several decades it was believed that information-secure key distribution requires both the sender and receiver to have the ability to generate and/or manipulate quantum states. Earlier, we showed that quantum key distribution in which one party is classical is possible [Boyer, Kenigsberg, and Mor, Phys. Rev. Lett.PRLTAO0031-900710.1103/PhysRevLett.99.140501 99, 140501 (2007)]. A surprising and very nice extension of that result was suggested by Zou, Qiu, Li, Wu, and Li [Phys. Rev. APLRAAN1050-294710.1103/PhysRevA.79.052312 79, 052312 (2009)]. Their paper suggests that it is sufficient for the originator of the states (the person holding the quantum technology) to generate just one state. The resulting semiquantum key distribution, which we call here “quantum key distribution with classical Alice” is indeed completely robust against eavesdropping. However, their proof (that no eavesdropper can get information without being possibly detected) is faulty. We provide here a fully detailed and direct proof of their very important result.

  12. Report: Improvements Needed in Key EPA Information System Security Practices

    Science.gov (United States)

    Report #10-P-0146, June 15, 2010. Williams Adley found that EPA program offices lacked evidence that they planned and executed tests of information system security controls as required by federal requirements.

  13. Information is “In” again

    Directory of Open Access Journals (Sweden)

    Franjo Maletić

    2014-09-01

    Full Text Available Information is now becoming the key word in most languages. It does not circulate only in the sphere of “culture” as unconscious ideology, it is deeply connected with the material practices of technological, economic and scientific formation. It marks and shapes some social formations and phenomena, such as the information society, information technology, information revolution, information literacy. By becoming a key word today and the self-definition of our reality in scientific disciplines, unlike its original Latin meaning it metaphorically means the procedure, or the flow and becomes a core substrate emergence of modern social relations which we call the information society. The definition of information in the media is not semantic in nature, it is an ongoing process, a process that shapes. The media is a key issue as information becomes the main concept of media content. While private companies created using the information knowledge becomes private, on the other hand, in the media, there is an effort that the knowledge-based information is a public good. Expansion and development of the information society based on information technologies have contributed to the enormous increase economic activity through increased production and distribution of information. On the way to the knowledge society information is not only the transferor messages or symbolic representation, it is all the more indispensable dialogue, bridge which the individual comes to knowledge. In this study indicated that the incidence of some information tracked from its first appearance in the West. In the middle 20th century the installation of industrial capitalism “intelligence” in machine tools, the collection of intelligence information, the development of modern science, information lead to the pedestal of - key word.

  14. BRIDGING THE DIGITAL DIVIDE Information is key to success in ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2010-10-25

    Oct 25, 2010 ... Information and communication technologies can increase productivity, ... role in bringing much-needed services such as education and health care to remote areas. ... Using technology to deliver quality education in Asia.

  15. The impact of possession on legality of mortgage registered on a building under construction: With case law

    Directory of Open Access Journals (Sweden)

    Vicković Tanja

    2016-01-01

    Full Text Available The expansion of the subject of a mortgage to buildings under construction is a considerable step forward in regulating mortgages. It is not possible to register ownership rights on buildings under construction. A person acquiring ownership does not have the possibility to protect his rights. Acquiring ownership rights to a building under construction is tied to possession. This is detrimental to the principle of publicity which in turn erodes the principle of reliance. Validity of the mortgage is tied to the possession over the mortgaged real estate at the time of its registration. Such position of the courts challenges the very essence of mortgage.

  16. Application of quantum key distribution for mutual identification - experimental realization

    International Nuclear Information System (INIS)

    Dusek, M.; Haderka, O.; Hendrych, M.

    1998-01-01

    A secure quantum identification system combining a classical identification procedure and quantum key distribution is proposed. Each identification sequence is always used just once and new sequences are 're fuelled' from a shared secret key transferred over a quantum channel. The question of authentication of information sent over a public channel is discussed. An apparatus using two unbalanced Mach-Zehnder interferometers has been built, and quantum key distribution and 'quantum identification' have been successfully tested through a single-mode optical fibre at 830 nm, employing low intensity coherent states (below 0,1 photons per pulse). (author)

  17. Quantum key management

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  18. Haunted by ghosts: prevalence, predictors and outcomes of spirit possession experiences among former child soldiers and war-affected civilians in Northern Uganda.

    Science.gov (United States)

    Neuner, Frank; Pfeiffer, Anett; Schauer-Kaiser, Elisabeth; Odenwald, Michael; Elbert, Thomas; Ertl, Verena

    2012-08-01

    Phenomena of spirit possession have been documented in many cultures. Some authors have argued that spirit possession is a type of psychopathology, and should be included as a category in diagnostic manuals of mental disorders. However, there are hardly any quantitative studies that report the prevalence of spirit possession on a population level and that provide evidence for its validity as a psychopathological entity. In an epidemiological study that was carried out in 2007 and 2008 with N = 1113 youths and young adults aged between 12 and 25 years in war-affected regions of Northern Uganda we examined the prevalence, predictors and outcomes of cen, a local variant of spirit possession. Randomly selected participants were interviewed using a scale of cen, measures of psychopathology (PTSD and depression) as well as indicators of functional outcome on different levels, including suicide risk, daily activities, perceived discrimination, physical complaints and aggression. We found that cen was more common among former child soldiers then among subjects without a history of abduction. Cen was related to extreme levels of traumatic events and uniquely predicted functional outcome even when the effects of PTSD and depression were controlled for. Our findings show that a long-lasting war that is accompanied by the proliferation of spiritual and magical beliefs and propaganda can lead to high levels of harmful spirit possession. In addition, we provide evidence for the incremental validity of spirit possession as a trauma-related psychological disorder in this context. Copyright © 2012 Elsevier Ltd. All rights reserved.

  19. Reaction of Non-Symmetric Schiff Base Metallo-Ligand Complexes Possessing an Oxime Function with Ln Ions

    Directory of Open Access Journals (Sweden)

    Jean-Pierre Costes

    2018-03-01

    Full Text Available The preparation of non-symmetric Schiff base ligands possessing one oxime function that is associated to a second function such as pyrrole or phenol function is first described. These ligands, which possess inner N4 or N3O coordination sites, allow formation of cationic or neutral non-symmetric CuII or NiII metallo-ligand complexes under their mono- or di-deprotonated forms. In presence of Lanthanide ions the neutral complexes do not coordinate to the LnIII ions, the oxygen atom of the oxime function being only hydrogen-bonded to a water molecule that is linked to the LnIII ion. This surprising behavior allows for the isolation of LnIII ions by non-interacting metal complexes. Reaction of cationic NiII complexes possessing a protonated oxime function with LnIII ions leads to the formation of original and dianionic (Gd(NO352− entities that are well separated from each other. This work highlights the preparation of well isolated mononuclear LnIII entities into a matrix of diamagnetic metal complexes. These new complexes complete our previous work dealing with the complexing ability of the oxime function toward Lanthanide ions. It could open the way to the synthesis of new entities with interesting properties, such as single-ion magnets for example.

  20. 76 FR 52698 - Agency Information Collection Activities: Proposed Collection; Comment Request

    Science.gov (United States)

    2011-08-23

    ... administration of the byproduct material or the radiation there from to human beings or animals. Possession of... collection techniques or other forms of information technology? The public may examine and have copied for a...

  1. McArthur River project - the future of Key Lake

    International Nuclear Information System (INIS)

    Spross, J.

    1994-01-01

    The Key Lake mill has operated since the fall of 1983. The ore from both Key Lake open pits will be depleted by 1997. It is planned to use this mill, located about 60 km southwest of McArthur, to process the McArthur River ore. While the geological data collected so far on the McArthur deposit are encouraging, more information of the deposit is needed before any detailed mine planning can begin. The surface drilling program identified the orebody and provided information on the geomechanical and hydrological properties of the overlying sandstone. It was proposed to conduct an underground exploration program to further delineate the orebody. This was approved following a public hearing and review process. This program involves the sinking of a 630 metre deep shaft and the driving of one or two drifts along a portion of the orebody. From these drifts, exploration drilling every 10 m to 15 m through the orebody will provide the information required for the preparation of a feasibility study and an Environmental Impact Statement (EIS). (author). 4 refs., 8 figs

  2. 42 CFR 61.14 - Separate consideration of information concerning moral character or loyalty.

    Science.gov (United States)

    2010-10-01

    ... moral character or loyalty. 61.14 Section 61.14 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF... Separate consideration of information concerning moral character or loyalty. No information in the records or possession of the Public Health Service concerning the moral character or loyalty of a fellow will...

  3. Energy-efficient key distribution using electrocardiograph biometric set for secure communications in wireless body healthcare networks.

    Science.gov (United States)

    Shi, Jinyang; Lam, Kwok-Yan; Gu, Ming; Li, Mingze; Chung, Siu-Leung

    2011-10-01

    Wireless body sensor network (WBSN) has gained significant interests as an important infrastructure for real-time biomedical healthcare systems, while the security of the sensitive health information becomes one of the main challenges. Due to the constraints of limited power, traditional cryptographic key distribution schemes are not suitable for WBSN. This paper proposes a novel energy-efficient approach, BodyKey, which can distribute the keys using the electrocardiograph biometrics. BodyKey represents the biometric features as ordered set, and deals with the biometric variations using set reconciliation. In this way, only limited necessary information needs to be communicated for key agreement, and the total energy consumption for key distribution can thus be reduced. Experiments on the PhysioBank Database show that BodyKey can perform an energy consumption rate of 0.01 mJ/bit with an equal accuracy rate of 97.28%, allowing the system to be used as an energy-efficient key distribution scheme for secure communications in WBSN.

  4. On the diversity-multiplexing tradeoff of secret-key agreement over multiple-antenna channels

    KAUST Repository

    Zorgui, Marwen

    2014-09-01

    We consider secret-key agreement with public discussion over Rayleigh fading quasi-static channels. First, the secret-key diversity gain and the secret-key multiplexing gain are defined. Then, the secret-key diversity multiplexing tradeoff (DMT) is established. The eavesdropper is shown to \\'steal\\' only transmit antennas. We show that likewise the DMT without secrecy constraint, the secret-key DMT is the same either with or without full channel state information (CSI) at the transmitter (CSI-T). This insensitivity of secret-key DMT toward CSI-T highlights a fundamental difference between secret-key agreement and the wiretap channel whose secret DMT depends crucially on CSI-T. Several secret-key DMT-achieving schemes are presented in case of full CSI-T.

  5. On the diversity-multiplexing tradeoff of secret-key agreement over multiple-antenna channels

    KAUST Repository

    Zorgui, Marwen; Rezki, Zouheir; Alomair, Basel; Alouini, Mohamed-Slim

    2014-01-01

    We consider secret-key agreement with public discussion over Rayleigh fading quasi-static channels. First, the secret-key diversity gain and the secret-key multiplexing gain are defined. Then, the secret-key diversity multiplexing tradeoff (DMT) is established. The eavesdropper is shown to 'steal' only transmit antennas. We show that likewise the DMT without secrecy constraint, the secret-key DMT is the same either with or without full channel state information (CSI) at the transmitter (CSI-T). This insensitivity of secret-key DMT toward CSI-T highlights a fundamental difference between secret-key agreement and the wiretap channel whose secret DMT depends crucially on CSI-T. Several secret-key DMT-achieving schemes are presented in case of full CSI-T.

  6. [A nosology for supernatural phenomena and the construction of the 'possessed' brain in the nineteenth century].

    Science.gov (United States)

    Goncalves, Valeria Portugal; Ortega, Francisco

    2013-06-01

    At the end of the twentieth century, supernatural phenomena such as so called trances and possession by spirits received a scientific classification, which includes the numerous diagnoses of the dominant psychiatry. At the end of the nineteenth century we can observe a process of scientific categorization of phenomena considered to have originated in superstition or popular imagination. In this work we show how trances and spiritual possession were studied by Franz Anton Mesmer and his followers when developing the concept of magnetism; by James Braid during the creation of his theory of hypnosis; and by Jean Martin Charcot, which marked the entry of hysteria into nosological classification. Despite the differences between these schools, we identify the use of the brain and cerebral metaphors as the foundation of theories of the mind.

  7. Public information. Key issue paper no. 5

    International Nuclear Information System (INIS)

    Kyd, D.

    2000-01-01

    Nuclear power was welcomed from the outset because it promised highly economic and convenient energy, especially electricity. Even today, nuclear projects espoused by developing nations can stimulate enthusiasm and national pride. However, public unease concerning nuclear power safety was magnified by the accidents at Three Mile Island in 1979 and Chernobyl in 1986. The perceived problem of transport and long term storage of nuclear waste has added to public concerns, as has the risk of the possible proliferation of nuclear weapons. Public information strategies must recognize and seek to address these fears by pointing to the many cumulative years of trouble-free nuclear operations and by stressing the strict rules and oversight designed to protect workers and the public from accidents and radioactive releases. It is against this background that the following material has been compiled. It comes from a variety of sources and reflects the experience mainly of industrialized countries that have national nuclear programs. It is important to underline that it is descriptive rather than prescriptive in nature for two reasons: first, the IAEA is essentially a forum for pooling collective knowledge in this as in other fields; and secondly, the IAEA would not presume to offer a universal formula, since national circumstances vary according to specific political, demographic, social and other factors. Hence only certain parts of this paper may be of direct relevance to any given national situation. (author)

  8. A continuous variable quantum deterministic key distribution based on two-mode squeezed states

    International Nuclear Information System (INIS)

    Gong, Li-Hua; Song, Han-Chong; Liu, Ye; Zhou, Nan-Run; He, Chao-Sheng

    2014-01-01

    The distribution of deterministic keys is of significance in personal communications, but the existing continuous variable quantum key distribution protocols can only generate random keys. By exploiting the entanglement properties of two-mode squeezed states, a continuous variable quantum deterministic key distribution (CVQDKD) scheme is presented for handing over the pre-determined key to the intended receiver. The security of the CVQDKD scheme is analyzed in detail from the perspective of information theory. It shows that the scheme can securely and effectively transfer pre-determined keys under ideal conditions. The proposed scheme can resist both the entanglement and beam splitter attacks under a relatively high channel transmission efficiency. (paper)

  9. Designing key-dependent chaotic S-box with larger key space

    International Nuclear Information System (INIS)

    Yin Ruming; Yuan Jian; Wang Jian; Shan Xiuming; Wang Xiqin

    2009-01-01

    The construction of cryptographically strong substitution boxes (S-boxes) is an important concern in designing secure cryptosystems. The key-dependent S-boxes designed using chaotic maps have received increasing attention in recent years. However, the key space of such S-boxes does not seem to be sufficiently large due to the limited parameter range of discretized chaotic maps. In this paper, we propose a new key-dependent S-box based on the iteration of continuous chaotic maps. We explore the continuous-valued state space of chaotic systems, and devise the discrete mapping between the input and the output of the S-box. A key-dependent S-box is constructed with the logistic map in this paper. We show that its key space could be much larger than the current key-dependent chaotic S-boxes.

  10. RAISING INFORMATION AND COMMUNICATION TECHNOLOGIES COMPETENCE OF SCIENTIFIC AND PEDAGOGICAL EMPLOYEES - A KEY REQUIREMENT OF THE QUALITY OF EDUCATIONAL PROCESS

    Directory of Open Access Journals (Sweden)

    Nataliia V. Morze

    2017-06-01

    Full Text Available In the article it was analyzed one of the basic conditions of providing the quality of higher education according to the system of internal quality assurance standards ESG (European quality assurance standards and guidelines to increase the ICT competence of scientific-pedagogical staff of the University. It was described the modular system of training for scientific and pedagogical staff of the Borys Grinchenko Kyiv University. Special attention is paid to the description of the system of raising the level of formation the ICT competence as one of the key competences of the modern teacher. The system of professional development, which is based on creating mixed studying and technology of "flipped classroom", formative assessment, innovative educational and ICT technologies according to the specially designed informative module "Informational and communication technologies", which allows scientific-pedagogical staff to use modern ICT and educational technologies effectively for their further applying in the provision of educational services and the development of quality of open educational content and open educational e-environment available to the student at any convenient time, which will significantly improve the quality of the educational process.

  11. The educational needs of health information managers in an electronic environment: what information technology and health informatics skills and knowledge are required?

    Science.gov (United States)

    Robertson, Merryn; Callen, Joanne

    The profile of health information managers (HIMs) employed within one metropolitan area health service in New South Wales (NSW) was identified, together with which information technology and health informatics knowledge and skills they possess, and which ones they require in their workplace. The subjects worked in a variety of roles: 26% were employed in the area's Information Systems Division developing and implementing point-of-care clinical systems. Health information managers perceived they needed further continuing and formal education in point-of-care clinical systems, decision support systems, the electronic health record, privacy and security, health data collections, and database applications.

  12. Deaf Adolescents' Learning of Cardiovascular Health Information: Sources and Access Challenges.

    Science.gov (United States)

    Smith, Scott R; Kushalnagar, Poorna; Hauser, Peter C

    2015-10-01

    Deaf individuals have more cardiovascular risks than the general population that are believed to be related to their cardiovascular health knowledge disparities. This phenomenological study describes where 20 deaf sign language-using adolescents from Rochester, New York, many who possess many positive characteristics to support their health literacy, learn cardiovascular health information and their lived experiences accessing health information. The goal is to ultimately use this information to improve the delivery of cardiovascular health education to this population and other deaf adolescents at a higher risk for weak health literacy. Deaf bilingual researchers interviewed deaf adolescents, transcribed and coded the data, and described the findings. Five major sources of cardiovascular health information were identified including family, health education teachers, healthcare providers, printed materials, and informal sources. Despite possessing advantageous characteristics contributing to stronger health literacy, study participants described significant challenges with accessing health information from each source. They also demonstrated inconsistencies in their cardiovascular health knowledge, especially regarding heart attack, stroke, and cholesterol. These findings suggest a great need for additional public funding to research deaf adolescents' informal health-related learning, develop accessible and culturally appropriate health surveys and health education programming, improve interpreter education, and disseminate information through social media. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  13. A New Three Dimensional Based Key Generation Technique in AVK

    Science.gov (United States)

    Banerjee, Subhasish; Dutta, Manash Pratim; Bhunia, Chandan Tilak

    2017-08-01

    In modern era, ensuring high order security becomes one and only objective of computer networks. From the last few decades, many researchers have given their contributions to achieve the secrecy over the communication channel. In achieving perfect security, Shannon had done the pioneer work on perfect secret theorem and illustrated that secrecy of the shared information can be maintained if the key becomes variable in nature instead of static one. In this regard, a key generation technique has been proposed where the key can be changed every time whenever a new block of data needs to be exchanged. In our scheme, the keys not only vary in bit sequences but also in size. The experimental study is also included in this article to prove the correctness and effectiveness of our proposed technique.

  14. Group key management

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  15. Quantum cryptography using coherent states: Randomized encryption and key generation

    Science.gov (United States)

    Corndorf, Eric

    With the advent of the global optical-telecommunications infrastructure, an increasing number of individuals, companies, and agencies communicate information with one another over public networks or physically-insecure private networks. While the majority of the traffic flowing through these networks requires little or no assurance of secrecy, the same cannot be said for certain communications between banks, between government agencies, within the military, and between corporations. In these arenas, the need to specify some level of secrecy in communications is a high priority. While the current approaches to securing sensitive information (namely the public-key-cryptography infrastructure and deterministic private-key ciphers like AES and 3DES) seem to be cryptographically strong based on empirical evidence, there exist no mathematical proofs of secrecy for any widely deployed cryptosystem. As an example, the ubiquitous public-key cryptosystems infer all of their secrecy from the assumption that factoring of the product of two large primes is necessarily time consuming---something which has not, and perhaps cannot, be proven. Since the 1980s, the possibility of using quantum-mechanical features of light as a physical mechanism for satisfying particular cryptographic objectives has been explored. This research has been fueled by the hopes that cryptosystems based on quantum systems may provide provable levels of secrecy which are at least as valid as quantum mechanics itself. Unfortunately, the most widely considered quantum-cryptographic protocols (BB84 and the Ekert protocol) have serious implementation problems. Specifically, they require quantum-mechanical states which are not readily available, and they rely on unproven relations between intrusion-level detection and the information available to an attacker. As a result, the secrecy level provided by these experimental implementations is entirely unspecified. In an effort to provably satisfy the cryptographic

  16. Logarithmic residues of analytic Banach algebra valued functions possessing a simply meromorphic inverse

    OpenAIRE

    Bart, Harm; Ehrhardt, T.; Silbermann, B.

    2001-01-01

    textabstractA logarithmic residue is a contour integral of a logarithmic derivative (left or right) of an analytic Banach algebra valued function. For functions possessing a meromorphic inverse with simple poles only, the logarithmic residues are identified as the sums of idempotents. With the help of this observation, the issue of left versus right logarithmic residues is investigated, both for connected and nonconnected underlying Cauchy domains. Examples are given to elucidate the subject ...

  17. Signcryption-Based Key Management for MANETs Applications in Mobile Commerce

    Institute of Scientific and Technical Information of China (English)

    LI Jingfeng; ZHU Yuefei; ZHANG Yajuan; PAN Heng

    2006-01-01

    Mobile commerce uses wireless device and wireless link to result in the transfer of values in exchange of information, services or goods. Wireless mobile ad hoc networks (MANETs) will bring a revolution to the business model of mobile commerce if such networks are used as the underlying network technology for mobile commerce. Mobile commerce will remain in a niche market until the security issue is properly addressed. Hence, security is also very important for MANET applications in mobile commerce. Robust key management is one of the most crucial technologies for security of MANETs. In this paper, a new solution for key management is proposed using identity-based (ID-based) signcryption and threshold secret sharing. It enables flexible and efficient key management while respecting the constraints of MANETs. In our solution, each mobile host uses its globally unique identity as its public key. It greatly decreases the computation and storage costs of mobile hosts, as well as communication cost for system key management.

  18. Informization Implementation for Chinese Retailers

    Institute of Scientific and Technical Information of China (English)

    ZHU Yan; LI Yan; QIAN Yu; CHEN Jianfeng; CHEN Jian

    2008-01-01

    Retailing is an important component of every country's economic system. The current status and developments in the informization of Chinese retail industry were investigated by using questionnaires and interviews to survey 139 retailers throughout China. The investigation shows that Chinese retailers are in the initial informization stage, and can be classified into different types with corresponding informization characteristics. In addition, the survey identified the key problems faced by retailers in the initial stage. Developments in the information technology field were analyzed to identify the key technologies that Chinese retailers should focus on during the informization process. The investigation also shows that the retailers have not arrived at a consensus about information technology adoption, and thus hesitate to use new information technologies, such as the radio frequency identification.

  19. The concept of key success factors: Theory and method

    DEFF Research Database (Denmark)

    Grunert, Klaus G.; Ellegaard, Charlotte

    1992-01-01

    Executive summary: 1. The term key success factors can be used in four different ways: a) as a necessary ingre-dient in a management information system, b) as a unique characteristic of a company, c) as a heuristic tool for managers to sharpen their thinking, d) as a description of the major skills...... and resources required to be successful in a given market. We adopt the last view. 2. The actual key success factors on a market, and those key success factors perceived by decision-makers in companies operating in the market, will be different. A number of psychological mechanisms result in misperceptions...... or resource that a business can i in, which, on the market the business is operating on, explains a major part of the observable differences in perceived value and/or relative costs. 4. Key success factors differ from core skills and resources, which are prerequisites for being on a market, but do not explain...

  20. 77 FR 44669 - 60-Day Notice of Intention To Request Clearance of Collection of Information; Opportunity for...

    Science.gov (United States)

    2012-07-30

    ... Process'' in the subject line. FOR FURTHER INFORMATION CONTACT: Patricia Henry, Historian, National... because they possess exceptional value or quality in illustrating or interpreting the heritage of the... this collection of information; Ways to enhance the quality, utility, and clarity of the information to...

  1. Multi-user quantum key distribution based on Bell states with mutual authentication

    International Nuclear Information System (INIS)

    Lin Song; Huang Chuan; Liu Xiaofen

    2013-01-01

    A new multi-user quantum key distribution protocol with mutual authentication is proposed on a star network. Here, two arbitrary users are able to perform key distribution with the assistance of a semi-trusted center. Bell states are used as information carriers and transmitted in a quantum channel between the center and one user. A keyed hash function is utilized to ensure the identities of three parties. Finally, the security of this protocol with respect to various kinds of attacks is discussed. (paper)

  2. Research on College English Teachers' Information Literacy in Information Environment

    Science.gov (United States)

    Du, Yan-xia

    2017-01-01

    The new technology revolution based on Internet, information and communication technology has triggered an upsurge of educational information in the world, including English learning and teaching. The improvement of teacher's information literacy is the key to the success of the current educational informatization reform. From the perspectives of…

  3. Quantum key distribution session with 16-dimensional photonic states

    Science.gov (United States)

    Etcheverry, S.; Cañas, G.; Gómez, E. S.; Nogueira, W. A. T.; Saavedra, C.; Xavier, G. B.; Lima, G.

    2013-01-01

    The secure transfer of information is an important problem in modern telecommunications. Quantum key distribution (QKD) provides a solution to this problem by using individual quantum systems to generate correlated bits between remote parties, that can be used to extract a secret key. QKD with D-dimensional quantum channels provides security advantages that grow with increasing D. However, the vast majority of QKD implementations has been restricted to two dimensions. Here we demonstrate the feasibility of using higher dimensions for real-world quantum cryptography by performing, for the first time, a fully automated QKD session based on the BB84 protocol with 16-dimensional quantum states. Information is encoded in the single-photon transverse momentum and the required states are dynamically generated with programmable spatial light modulators. Our setup paves the way for future developments in the field of experimental high-dimensional QKD. PMID:23897033

  4. Quantum key distribution without sending a quantum signal

    International Nuclear Information System (INIS)

    Ralph, T C; Walk, N

    2015-01-01

    Quantum Key Distribution is a quantum communication technique in which random numbers are encoded on quantum systems, usually photons, and sent from one party, Alice, to another, Bob. Using the data sent via the quantum signals, supplemented by classical communication, it is possible for Alice and Bob to share an unconditionally secure secret key. This is not possible if only classical signals are sent. While this last statement is a long standing result from quantum information theory it turns out only to be true in a non-relativistic setting. If relativistic quantum field theory is considered we show it is possible to distribute an unconditionally secure secret key without sending a quantum signal, instead harnessing the intrinsic entanglement between different regions of space–time. The protocol is practical in free space given horizon technology and might be testable in principle in the near term using microwave technology. (paper)

  5. Provably-Secure Authenticated Group Diffie-Hellman KeyExchange

    Energy Technology Data Exchange (ETDEWEB)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2007-01-01

    Authenticated key exchange protocols allow two participantsA and B, communicating over a public network and each holding anauthentication means, to exchange a shared secret value. Methods designedto deal with this cryptographic problem ensure A (resp. B) that no otherparticipants aside from B (resp. A) can learn any information about theagreed value, and often also ensure A and B that their respective partnerhas actually computed this value. A natural extension to thiscryptographic method is to consider a pool of participants exchanging ashared secret value and to provide a formal treatment for it. Startingfrom the famous 2-party Diffie-Hellman (DH) key exchange protocol, andfrom its authenticated variants, security experts have extended it to themulti-party setting for over a decade and completed a formal analysis inthe framework of modern cryptography in the past few years. The presentpaper synthesizes this body of work on the provably-secure authenticatedgroup DH key exchange.

  6. 77 FR 39469 - Proposed Information Collection; Comment Request; Drivers' Awareness of and Response to...

    Science.gov (United States)

    2012-07-03

    ... response (i.e., change travel times, modes, etc.). With a sufficient level of behavior change, it should be... drivers possessed prior to and during a storm, including knowledge of observed and forecast weather... information provided. Analyses of the information gathered will focus on driver knowledge, perceptions, and...

  7. The possession law suit, caused by forbidden immissions

    Directory of Open Access Journals (Sweden)

    Popov Danica D.

    2015-01-01

    Full Text Available In the Serbian Law and in most of jurisdictions, there are limits on exercising the right of property. The real estate owner must refrain from activities by which the use of other real estate is being impoded through the immission of execive gasses, vapors, smoke, heat noise, tremors etc. The property ownership whose is affected by immission exceeding the set limits, has the right to request a stop of immisions which exceeded the allowed volume of immissions. In article author describes various kinds of immissions. The general feature of this law suit is that there is only discussion on the facts and not for a legal matters. Subject matter jurisdiction for the resolution of such disputes belongs to the court of general jurisdiction, while the disputes itself is a litigation. The special rule of proceedings of action of disturbance are: provisionality of the protection of possession; urgency in proceedings; initiation of proceedings; limiting of objection; prescribing temporary measures; rendering a ruling in the form of order; appeals which may be filed within a short deadline and which does not have suspensive effect (do not delay the execution of the order; revision is not allowed etc.

  8. A Recommended Set of Key Arctic Indicators

    Science.gov (United States)

    Stanitski, D.; Druckenmiller, M.; Fetterer, F. M.; Gerst, M.; Intrieri, J. M.; Kenney, M. A.; Meier, W.; Overland, J. E.; Stroeve, J.; Trainor, S.

    2017-12-01

    The Arctic is an interconnected and environmentally sensitive system of ice, ocean, land, atmosphere, ecosystems, and people. From local to pan-Arctic scales, the area has already undergone major changes in physical and societal systems and will continue at a pace that is greater than twice the global average. Key Arctic indicators can quantify these changes. Indicators serve as the bridge between complex information and policy makers, stakeholders, and the general public, revealing trends and information people need to make important socioeconomic decisions. This presentation evaluates and compiles more than 70 physical, biological, societal and economic indicators into an approachable summary that defines the changing Arctic. We divided indicators into "existing," "in development," "possible," and "aspirational". In preparing a paper on Arctic Indicators for a special issue of the journal Climatic Change, our group established a set of selection criteria to identify indicators to specifically guide decision-makers in their responses to climate change. A goal of the analysis is to select a manageable composite list of recommended indicators based on sustained, reliable data sources with known user communities. The selected list is also based on the development of a conceptual model that identifies components and processes critical to our understanding of the Arctic region. This list of key indicators is designed to inform the plans and priorities of multiple groups such as the U.S. Global Change Research Program (USGCRP), Interagency Arctic Research Policy Committee (IARPC), and the Arctic Council.

  9. DNA based random key generation and management for OTP encryption.

    Science.gov (United States)

    Zhang, Yunpeng; Liu, Xin; Sun, Manhui

    2017-09-01

    One-time pad (OTP) is a principle of key generation applied to the stream ciphering method which offers total privacy. The OTP encryption scheme has proved to be unbreakable in theory, but difficult to realize in practical applications. Because OTP encryption specially requires the absolute randomness of the key, its development has suffered from dense constraints. DNA cryptography is a new and promising technology in the field of information security. DNA chromosomes storing capabilities can be used as one-time pad structures with pseudo-random number generation and indexing in order to encrypt the plaintext messages. In this paper, we present a feasible solution to the OTP symmetric key generation and transmission problem with DNA at the molecular level. Through recombinant DNA technology, by using only sender-receiver known restriction enzymes to combine the secure key represented by DNA sequence and the T vector, we generate the DNA bio-hiding secure key and then place the recombinant plasmid in implanted bacteria for secure key transmission. The designed bio experiments and simulation results show that the security of the transmission of the key is further improved and the environmental requirements of key transmission are reduced. Analysis has demonstrated that the proposed DNA-based random key generation and management solutions are marked by high security and usability. Published by Elsevier B.V.

  10. Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.

    Science.gov (United States)

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-03-31

    A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  11. Leader in Digital Transformation: Director, Information Management ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    As the Deputy Chief Information Officer, the Director is also accountable for developing ... operations and maintenance of key business systems (financial applications, ... Plays a key role in the control of access to personal information in e-mail ...

  12. Noncoherent capacity of secret-key agreement with public discussion

    KAUST Repository

    Agrawal, Anurag

    2011-09-01

    We study the noncoherent capacity of secret-key agreement with public discussion over independent identically distributed (i.i.d.) Rayleigh fading wireless channels, where neither the sender nor the receivers have access to instantaneous channel state information (CSI). We present two results. At high signal-to-noise ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number of antennas at each terminal. Second, for a system with a single antenna at both the legitimate and the eavesdropper terminals and an arbitrary number of transmit antennas, the secret-key capacity-achieving input distribution is discrete, with a finite number of mass points. Numerically we observe that at low SNR, the capacity achieving distribution has two mass points with one of them at the origin. © 2011 IEEE.

  13. Noncoherent capacity of secret-key agreement with public discussion

    KAUST Repository

    Agrawal, Anurag; Rezki, Zouheir; Khisti, Ashish J.; Alouini, Mohamed-Slim

    2011-01-01

    We study the noncoherent capacity of secret-key agreement with public discussion over independent identically distributed (i.i.d.) Rayleigh fading wireless channels, where neither the sender nor the receivers have access to instantaneous channel state information (CSI). We present two results. At high signal-to-noise ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number of antennas at each terminal. Second, for a system with a single antenna at both the legitimate and the eavesdropper terminals and an arbitrary number of transmit antennas, the secret-key capacity-achieving input distribution is discrete, with a finite number of mass points. Numerically we observe that at low SNR, the capacity achieving distribution has two mass points with one of them at the origin. © 2011 IEEE.

  14. Prepositions in Use: Prepositions of Standard, Prepositions of Possession and Prepositions of Accompaniment

    OpenAIRE

    Naji Masned AlQbailat; Islam M. Al-Momani; Yazan Shaker Almahameed

    2016-01-01

    The current research paper attempted at investigating the use of prepositions of standard, prepositions of possession and prepositions of accompaniment by some Jordanian learners of English. A total of 53 Jordanian English Majors participated in the study from the department of English language at Princess Alia University College. In collecting the needed data for the purpose of the study, the researchers employed fifteen items of a multiple choice test. The results of the study showed that J...

  15. George's secret key to the universe

    CERN Document Server

    Hawking, Lucy; Galfard, Christophe; Parsons, Gary

    2007-01-01

    In their bestselling book for young readers, noted physicist Stephen Hawking and his daughter, Lucy, provide a grand and funny adventure that explains fascinating information about our universe, including Dr. Hawking's latest ideas about black holes. It's the story of George, who's taken through the vastness of space by a scientist, his daughter, and their super-computer named Cosmos. George's Secret Key to the Universe was a New York Times bestseller and a selection of Al's Book Club on the Today show.

  16. Characterization Of Dissolved Organic Mattter In The Florida Keys Ecosystem

    Science.gov (United States)

    Adams, D. G.; Shank, G. C.

    2009-12-01

    sources. Information generated by our study will provide a valuable data set for better understanding DOM bio-geochemical dynamics along the Florida Keys ecosystem and information for future studies linking DOM and the coral community.

  17. Supporting parents following childhood traumatic brain injury: a qualitative study to examine information and emotional support needs across key care transitions.

    Science.gov (United States)

    Kirk, S; Fallon, D; Fraser, C; Robinson, G; Vassallo, G

    2015-03-01

    Traumatic brain injury (TBI) is the leading cause of death and acquired disability in childhood. Research has demonstrated that TBI can lead to long-term physical, cognitive, emotional and behavioural difficulties for children and parental stress. Less is known about how parents experience a childhood brain injury and their information and support needs. This study aimed to examine parents' experiences and support needs following a childhood TBI from the time of the accident to their child's discharge home. Qualitative semi-structured interviews were conducted with 29 parents/carers of children who had experienced a severe TBI. Participants were recruited from one children's tertiary centre in the UK. Data were analysed using the Framework approach. Parents had unmet information and emotional support needs across the care trajectory from the time of the accident to their child's return home. Information needs related to the impact of the TBI on their child; current and future treatment/rehabilitation plans; helping their child and managing their behaviour; accessing services/support. They lacked information and support for care transitions. In different settings parents faced particular barriers to having their information needs met. Parents' felt they needed emotional support in coming to terms with witnessing the accident and the loss of their former child. Lack of community support related not only to service availability but to a general lack of understanding of the impact of TBI on children, particularly when this was invisible. Overall parents felt unsupported in coping with children's behavioural and psychological difficulties. Taking a holistic approach to examining parents' experiences and support needs has enabled their changing needs to be highlighted across key care transitions within hospital and community settings and the service implications identified. Improvements in care co-ordination across care transitions are needed to ensure continuity of care

  18. Providing long-acting reversible contraception services in Seattle school-based health centers: key themes for facilitating implementation.

    Science.gov (United States)

    Gilmore, Kelly; Hoopes, Andrea J; Cady, Janet; Amies Oelschlager, Anne-Marie; Prager, Sarah; Vander Stoep, Ann

    2015-06-01

    The purpose of this study was to describe the implementation of a program that provides long-acting reversible contraception (LARC) services within school-based health centers (SBHCs) and to identify barriers and facilitators to implementation as reported by SBHC clinicians and administrators, public health officials, and community partners. We conducted 14 semistructured interviews with key informants involved in the implementation of LARC services. Key informants included SBHC clinicians and administrators, public health officials, and community partners. We used a content analysis approach to analyze interview transcripts for themes. We explored barriers to and facilitators of LARC service delivery across and within key informant groups. The most cited barriers across key informant groups were as follows: perceived lack of provider procedural skills and bias and negative attitudes about LARC methods. The most common facilitators identified across groups were as follows: clear communication strategies, contraceptive counseling practice changes, provider trainings, and stakeholder engagement. Two additional barriers emerged in specific key informant groups. Technical and logistical barriers to LARC service delivery were cited heavily by SBHC administrative staff, community partners, and public health officials. Expense and billing was a major barrier to SBHC administrative staff. LARC counseling and procedural services can be implemented in an SBHC setting to promote access to effective contraceptive options for adolescent women. Copyright © 2015 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  19. Private information retrieval

    CERN Document Server

    Yi, Xun; Bertino, Elisa

    2013-01-01

    This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the server which element is retrieved. PIR has been widely applied to protect the privacy of the user in querying a service provider on the Internet. For example, by PIR, one can query a location-based service provider about the nearest car park without revealing his location to the server.The first PIR approach was introduced by Chor, Goldreich, Kushilevitz and Sudan in 1995 in a multi-server setting, where the user retriev

  20. KEY PERFORMANCE INDICATORS DISCLOSURES BY THE INTEGRATED REPORTING

    Directory of Open Access Journals (Sweden)

    BOBITAN ROXANA-IOANA

    2016-02-01

    Full Text Available We are in a new era of corporate reporting where the corporate reporting landscape was changed. Institutional and small investors, financial analysts and other key stakeholders are demanding more information about long-term strategies and profitability of companies. Also, the increasing complexity of business models, growing awareness of climate change and resource scarcity and communication are expectations of the role of business in the 21st century and which the key of performance indicators (KPIs is. The companies must change the way these KPIs are being incorporated throughout the annual report and how these are linked to the company’s strategy and business model, their risks and risk mitigation, and their incentive schemes. Regarding this, integrated reporting, continue to gain momentum, the spotlight on the depth, breadth and quality of KPIs being reported will only strengthen. The aim of this discussion paper is to describe which are the most important key performance indicators in sprit of integrating reporting. A good and very known example for the integrated reporting is Philips Electronics, the Dutch healthcare and lighting company, a pioneer that embrace this concept, and the paper make an analysis of the most important key performance indicators.

  1. Zero-leakage multiple key-binding scenarios for SRAM-PUF systems based on the XOR-method

    NARCIS (Netherlands)

    Kusters, C.J.; Ignatenko, T.; Willems, F.M.J.

    2016-01-01

    We show that the XOR-method based on linear error-correcting codes can be applied to achieve the secret-key capacity of binary-symmetric SRAM-PUFs. Then we focus on multiple key-bindings. We prove that no information is leaked by all the helper data about a single secret key both in the case where

  2. Zero-leakage multiple key-binding scenarios for SRAM-PUF systems based on the XOR-Method

    NARCIS (Netherlands)

    Kusters, C.J.; Ignatenko, T.; Willems, F.M.J.

    2016-01-01

    We show that the XOR-method based on linear error-correcting codes can be applied to achieve the secret-key capacity of binary-symmetric SRAM-PUFs. Then we focus on multiple key-bindings. We prove that no information is leaked by all the helper data about a single secret key both in the case where

  3. Spherical reconciliation for a continuous-variable quantum key distribution

    International Nuclear Information System (INIS)

    Lu Zhao; Shi Jian-Hong; Li Feng-Guang

    2017-01-01

    Information reconciliation is a significant step for a continuous-variable quantum key distribution (CV-QKD) system. We propose a reconciliation method that allows two authorized parties to extract a consistent and secure binary key in a CV-QKD protocol, which is based on Gaussian-modulated coherent states and homodyne detection. This method named spherical reconciliation is based on spherical quantization and non-binary low-density parity-check (LDPC) codes. With the suitable signal-to-noise ratio (SNR) and code rate of non-binary LDPC codes, spherical reconciliation algorithm has a high efficiency and can extend the transmission distance of CV-QKD. (paper)

  4. The Humanitarian Bailment of Foreign Possessed Territories: A Proactive Method of Legal Analysis

    Science.gov (United States)

    1996-04-01

    entrusts an employee with the employer’s lawn mower to mow the employer’s lawn .220 This is analogous to the permissive entry situation where a host...accompanying text. 82 If an employee feloniously takes the lawn mower from the employer’s place of business to the employee’s house the servant has...committed larceny because the employee never had 230possession of the mower, only custody. If the employee picked up the lawn mower from the repair

  5. Summary of Key Operating Statistics: Data Collected from the 2009 Annual Institutional Report

    Science.gov (United States)

    Accrediting Council for Independent Colleges and Schools, 2010

    2010-01-01

    The Accrediting Council for Independent Colleges and Schools (ACICS) provides the Summary of Key Operating Statistics (KOS) as an annual review of the performance and key measurements of the more than 800 private post-secondary institutions we accredit. This edition of the KOS contains information based on the 2009 Annual Institutional Reports…

  6. Some Properties of a Measure of Information Discrepancy

    Institute of Scientific and Technical Information of China (English)

    FANG Shun-lan; FANG Wei-wu

    2002-01-01

    Based on a group of axioms, a measure of information discrepancyamong multiple information sources has been introduced in [7,8, 10] and it possesses some peculiar properties compared with other measures of information discrepancy, so it can be used in some areas, where the traditional measures are not valid or not efficient, for example, in the study of DNA sequence comparison, prediction of protein structure class, evidence analysis, questionnaire analysis, and so on. In this paper, using the optimization techniques,we prove that it is a distance function and show that it is also an approximation of x2 function. These two properties will stimulate further applications of the measure to information processing and system analysis.

  7. To DNA, all information is equal

    DEFF Research Database (Denmark)

    Sennels, Lau; Bentin, Thomas

    2012-01-01

    Information storage capabilities are key in most aspects of society and the requirement for storage space is rapidly expanding. In principle, DNA could be a high-density medium for information storage. Church and coworkers recently demonstrated how binary data can be encoded, stored in, and retri......Information storage capabilities are key in most aspects of society and the requirement for storage space is rapidly expanding. In principle, DNA could be a high-density medium for information storage. Church and coworkers recently demonstrated how binary data can be encoded, stored in...

  8. Institutional Data Management in Higher Education. ECAR Key Findings

    Science.gov (United States)

    Yanosky, Ronald

    2009-01-01

    This document presents the key findings from the 2009 ECAR (EDUCAUSE Center for Applied Research) study of institutional data management, which examines the policies and practices by which higher education institutions effectively collect, protect, and use digital information assets to meet academic and business needs. Importantly, it also…

  9. Possession, Transportation, and Use of Firearms by Older Youth in 4-H Shooting Sports Programs

    Science.gov (United States)

    White, David J.; Williver, S. Todd

    2014-01-01

    Thirty years ago we would think nothing of driving to school with a jackknife in our pocket or rifle in the gun rack. Since then, the practices of possessing, transporting, and using firearms have been limited by laws, rules, and public perception. Despite restrictions on youth, the Youth Handgun Safety Act does afford 4-H shooting sports members…

  10. Key management of the double random-phase-encoding method using public-key encryption

    Science.gov (United States)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  11. Two-party quantum key agreement with five-particle entangled states

    Science.gov (United States)

    He, Ye-Feng; Ma, Wen-Ping

    A two-party quantum key agreement protocol is proposed with five-particle entangled states and the delayed measurement technique. According to the measurement correlation property of five-particle entangled states, two participants can deduce the measurement results of each other’s initial quantum states. As a result, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. Thus, a shared key is fairly established. Since each particle is transmitted only once in quantum channel, the protocol is congenitally free from the Trojan horse attacks. It is shown that the protocol not only is secure against both participant and outsider attacks but also has no information leakage problem. Moreover, it has high qubit efficiency.

  12. Non-coherent capacity of secret-key agreement with public discussion

    KAUST Repository

    Agrawal, Anurag

    2011-06-01

    We study the Rayleigh fading non-coherent capacity of secret-key agreement with public discussion, where neither the sender nor the receivers have access to instantaneous channel state information (CSI) of any channel. We present two results. At high Signal-to-Noise Ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number of antennas at each terminal. Second, for a system with a single antenna at both the legitimate and the eavesdropper terminals and an arbitrary number of transmit antennas, the secret-key capacity-achieving input distribution is discrete, with a finite number of mass points. Numerically we observe that at low-SNR, the capacity achieving distribution has two mass points with one of them at the origin. © 2011 IEEE.

  13. Non-coherent capacity of secret-key agreement with public discussion

    KAUST Repository

    Agrawal, Anurag; Rezki, Zouheir; Khisti, Ashish J.; Alouini, Mohamed-Slim

    2011-01-01

    We study the Rayleigh fading non-coherent capacity of secret-key agreement with public discussion, where neither the sender nor the receivers have access to instantaneous channel state information (CSI) of any channel. We present two results. At high Signal-to-Noise Ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number of antennas at each terminal. Second, for a system with a single antenna at both the legitimate and the eavesdropper terminals and an arbitrary number of transmit antennas, the secret-key capacity-achieving input distribution is discrete, with a finite number of mass points. Numerically we observe that at low-SNR, the capacity achieving distribution has two mass points with one of them at the origin. © 2011 IEEE.

  14. RULES FOR SELECTING AND USING KEY PERFORMANCE INDICATORS FOR THE SERVICE INDUSTRY

    Directory of Open Access Journals (Sweden)

    Alexandra - Elena RUSĂNEANU

    2014-06-01

    Full Text Available There is no question that performance is the desired result of every activity or action. In order to correctly measure an organization’s performance it is necessary to select key performance indicators (KPIs that will deliver long-term value to the company. KPIs are presenting performance information for all levels of the organization and they are reflecting the progress made so far to achieve strategic objectives. The selection of the key performance indicators must be made according to the organization’s industry and activity. The company must truly understand its business and its mission. Also, KPIs must be closely linked to the strategic objectives. The focus of this research is to present effective rules for defining key performance indicators for the Service industry. This sector of economy consists in generating intangible goods like experience, expertise and information. Therefore, monitoring this type of services requires a different approach when defining performance indicators compared to the manufacturing industry.

  15. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    Directory of Open Access Journals (Sweden)

    Alexandra Rivero-García

    2017-03-01

    Full Text Available A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  16. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    Science.gov (United States)

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-01-01

    A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed. PMID:28362328

  17. Information theoretically secure, enhanced Johnson noise based key distribution over the smart grid with switched filters.

    Science.gov (United States)

    Gonzalez, Elias; Kish, Laszlo B; Balog, Robert S; Enjeti, Prasad

    2013-01-01

    We introduce a protocol with a reconfigurable filter system to create non-overlapping single loops in the smart power grid for the realization of the Kirchhoff-Law-Johnson-(like)-Noise secure key distribution system. The protocol is valid for one-dimensional radial networks (chain-like power line) which are typical of the electricity distribution network between the utility and the customer. The speed of the protocol (the number of steps needed) versus grid size is analyzed. When properly generalized, such a system has the potential to achieve unconditionally secure key distribution over the smart power grid of arbitrary geometrical dimensions.

  18. Proof-of-principle test of coherent-state continuous variable quantum key distribution through turbulent atmosphere (Conference Presentation)

    Science.gov (United States)

    Derkach, Ivan D.; Peuntinger, Christian; Ruppert, László; Heim, Bettina; Gunthner, Kevin; Usenko, Vladyslav C.; Elser, Dominique; Marquardt, Christoph; Filip, Radim; Leuchs, Gerd

    2016-10-01

    Continuous-variable quantum key distribution is a practical application of quantum information theory that is aimed at generation of secret cryptographic key between two remote trusted parties and that uses multi-photon quantum states as carriers of key bits. Remote parties share the secret key via a quantum channel, that presumably is under control of of an eavesdropper, and which properties must be taken into account in the security analysis. Well-studied fiber-optical quantum channels commonly possess stable transmittance and low noise levels, while free-space channels represent a simpler, less demanding and more flexible alternative, but suffer from atmospheric effects such as turbulence that in particular causes a non-uniform transmittance distribution referred to as fading. Nonetheless free-space channels, providing an unobstructed line-of-sight, are more apt for short, mid-range and potentially long-range (using satellites) communication and will play an important role in the future development and implementation of QKD networks. It was previously theoretically shown that coherent-state CV QKD should be in principle possible to implement over a free-space fading channel, but strong transmittance fluctuations result in the significant modulation-dependent channel excess noise. In this regime the post-selection of highly transmitting sub-channels may be needed, which can even restore the security of the protocol in the strongly turbulent channels. We now report the first proof-of-principle experimental test of coherent state CV QKD protocol using different levels Gaussian modulation over a mid-range (1.6-kilometer long) free-space atmospheric quantum channel. The transmittance of the link was characterized using intensity measurements for the reference but channel estimation using the modulated coherent states was also studied. We consider security against Gaussian collective attacks, that were shown to be optimal against CV QKD protocols . We assumed a

  19. 77 FR 56845 - Multi-Agency Informational Meeting Concerning Compliance With the Federal Select Agent Program...

    Science.gov (United States)

    2012-09-14

    ... regulatory guidance and information on standards concerning biosafety, biosecurity and incident response... Laboratory Registration for Possession, Use, and Transfer of Select Agents and Toxins (APHIS/CDC Form 1...

  20. Key word placing in Web page body text to increase visibility to search engines

    Directory of Open Access Journals (Sweden)

    W. T. Kritzinger

    2007-11-01

    Full Text Available The growth of the World Wide Web has spawned a wide variety of new information sources, which has also left users with the daunting task of determining which sources are valid. Many users rely on the Web as an information source because of the low cost of information retrieval. It is also claimed that the Web has evolved into a powerful business tool. Examples include highly popular business services such as Amazon.com and Kalahari.net. It is estimated that around 80% of users utilize search engines to locate information on the Internet. This, by implication, places emphasis on the underlying importance of Web pages being listed on search engines indices. Empirical evidence that the placement of key words in certain areas of the body text will have an influence on the Web sites' visibility to search engines could not be found in the literature. The result of two experiments indicated that key words should be concentrated towards the top, and diluted towards the bottom of a Web page to increase visibility. However, care should be taken in terms of key word density, to prevent search engine algorithms from raising the spam alarm.

  1. Robustness bounds and practical limitations of quantum key distribution

    International Nuclear Information System (INIS)

    Khalique, Aeysha

    2008-01-01

    Quantum information theory is a modern branch of theoretical physics. One of its main goals is to interpret concepts of quantum physics. This leads to a deeper understanding of quantum theory. The most common examples of practical applications of basic quantum theory are quantum computation and quantum cryptography. Quantum cryptography provides secure communication between legitimate users even in the presence of an adversary by making possible the distribution of a secret key. It then allows error correction and privacy amplification, which is elimination of adversary information, through classical communication. In this thesis two important aspects of quantum key distribution are covered, namely robustness bounds with respect to provable entanglement for ideal protocols and practical quantum key distribution using two-way classical communication. In part one of the thesis, ideal quantum key distribution protocols and their robustness in terms of provable entanglement are discussed. The robustness bounds are proved for most general coherent attacks. These bounds for provable entanglement are already known to be 25% for the four-state protocol and 33% for the six-state protocol. We anticipate to provide a region in which the legitimate users share entanglement. This region is large for the four-state protocol and is reduced to a smaller region for the six-state protocol because of additional constraint on it. We also investigate the information cost which the adversary has to pay in order to reach these bounds. In part two we adopt a more practical approach. We investigate the limitation on distance of secure communication because of practical restrictions. In particular we investigate the restrictions due to the lack of single photon sources, the lossy channel and faulty detectors. These practical limitations have already been observed using one-way classical communication between legitimate users. It has been observed that it is actually the dark count rate that

  2. Key Concepts in Microbial Oceanography

    Science.gov (United States)

    Bruno, B. C.; Achilles, K.; Walker, G.; Weersing, K.; Team, A

    2008-12-01

    The Center for Microbial Oceanography: Research and Education (C-MORE) is a multi-institution Science and Technology Center, established by the National Science Foundation in 2006. C-MORE's research mission is to facilitate a more comprehensive understanding of the diverse assemblages of microorganisms in the sea, ranging from the genetic basis of marine microbial biogeochemistry including the metabolic regulation and environmental controls of gene expression, to the processes that underpin the fluxes of carbon, related bioelements, and energy in the marine environment. The C-MORE education and outreach program is focused on increasing scientific literacy in microbial oceanography among students, educators, and the general public. A first step toward this goal is defining the key concepts that constitute microbial oceanography. After lengthy discussions with scientists and educators, both within and outside C-MORE, we have arrived at six key concepts: 1) Marine microbes are very small and have been around for a long time; 2) Life on Earth could not exist without microbes; 3) Most marine microbes are beneficial; 4) Microbes are everywhere: they are extremely abundant and diverse; 5) Microbes significantly impact our global climate; and 6) There are new discoveries every day in the field of microbial oceanography. A C-MORE-produced brochure on these six key concepts will be distributed at the meeting. Advanced copies may be requested by email or downloaded from the C-MORE web site(http://cmore.soest.hawaii.edu/downloads/MO_key_concepts_hi-res.pdf). This brochure also includes information on career pathways in microbial oceanography, with the aim of broadening participation in the field. C-MORE is eager to work in partnership to incorporate these key concepts into other science literacy publications, particularly those involving ocean and climate literacy. We thank the following contributors and reviewers: P Chisholm, A Dolberry, and A Thompson (MIT); N Lawrence

  3. The problem of intermixing of metals possessing no mutual solubility upon explosion welding (Cu–Ta, Fe–Ag, Al–Ta)

    International Nuclear Information System (INIS)

    Greenberg, B.A.; Ivanov, M.A.; Rybin, V.V.; Elkina, O.A.; Antonova, O.V.; Patselov, A.M.; Inozemtsev, A.V.; Plotnikov, A.V.; Volkova, A.Yu.; Besshaposhnikov, Yu.P.

    2013-01-01

    On the basis of the results obtained for joints of dissimilar metals such as copper–tantalum and iron–silver, the reason of immiscible suspensions mixing upon explosion welding has been cleared out. It has been found that the interface (plain or wavy) is not smooth and contains inhomogeneities, namely, cusps and local melting zones. The role of granulating fragmentation providing partitioning of initial materials as a main channel of input energy dissipation has been revealed. It has been shown that in joints of metals possessing normal solubility the local melting zones are true solutions, but if metals possess no mutual solubility the local melting zones are colloidal solutions. Realization of either emulsion or suspension variant takes place. The results can be used in the development of new joints of metals possessing no mutual solubility. - Highlights: ► Immiscible pairs Ta/Cu and Fe/Ag are welded successfully by explosive welding. ► Fragmentation provides for partitioning as the main energy dissipation channel. ► Immiscible metals form colloidal solid solutions during solidification. ► Melting and boiling temperatures ratio determines the colloidal solution type. ► Local melting zones being in suspension form enhance welds hardening.

  4. Security of differential-phase-shift quantum key distribution against individual attacks

    International Nuclear Information System (INIS)

    Waks, Edo; Takesue, Hiroki; Yamamoto, Yoshihisa

    2006-01-01

    We derive a proof of security for the differential-phase-shift quantum key distribution protocol under the assumption that Eve is restricted to individual attacks. The security proof is derived by bounding the average collision probability, which leads directly to a bound on Eve's mutual information on the final key. The security proof applies to realistic sources based on pulsed coherent light. We then compare individual attacks to sequential attacks and show that individual attacks are more powerful

  5. Distributed Information and Group Decision-Making: Effects of Diversity and Affect

    NARCIS (Netherlands)

    J.M. Kooij-de Bode (Hanneke)

    2007-01-01

    textabstractOrganizations tend to rely on small groups rather than individuals when important decision have to be made, based on the assumption that groups possess a broader range of informational resources and more diversity of insights than individuals. However, research on group decision-making

  6. Distributed information and group decision-making : Effects of diversity and affect

    NARCIS (Netherlands)

    Kooij-de Bode, H.

    2007-01-01

    Organizations tend to rely on small groups rather than individuals when important decision have to be made, based on the assumption that groups possess a broader range of informational resources and more diversity of insights than individuals. However, research on group decision-making shows that

  7. Breaking chaotic shift key communication via adaptive key identification

    International Nuclear Information System (INIS)

    Ren Haipeng; Han Chongzhao; Liu Ding

    2008-01-01

    This paper proposes an adaptive parameter identification method for breaking chaotic shift key communication from the transmitted signal in public channel. The sensitive dependence property of chaos on parameter mismatch is used for chaos adaptive synchronization and parameter identification. An index function about the synchronization error is defined and conjugate gradient method is used to minimize the index function and to search the transmitter's parameter (key). By using proposed method, secure key is recovered from transmitted signal generated by low dimensional chaos and hyper chaos switching communication. Multi-parameters can also be identified from the transmitted signal with noise

  8. Safeguards-relevant information collection from small holders – experiences and challenges

    International Nuclear Information System (INIS)

    Sundén, Erika; Dufva, Martina; Dahlberg, Joakim

    2015-01-01

    A number of universities, research institutions, hospitals, and other businesses are in possession of relatively small amounts of nuclear material. In some cases the material is in activities related to the nuclear fuel cycle, but there is also a wide variety of other applications. Regardless of application, material accountancy must be reported to the European Commission (EC) and, in Sweden, to the Swedish Radiation Safety Authority (SSM). However, checking the completeness and correctness of the reports from operators with very small amounts of nuclear material can easily be forgotten or viewed as being less important. Starting in the beginning of 2013 SSM increased its effort in this area and began working more actively gathering information and checking its correctness. Informing the operators in possession of nuclear material of the rules and regulations is a major part of this work, as it has been noted that the knowledge level of safeguarding nuclear material in many locations is very low. This paper will give a description of the work being performed by SSM to ensure that information related to the possession of nuclear material are gathered and correctly declared. It will give an overview of the different procedures that are applied to different categories of small holders in Sweden (where the differences are mostly due to historical reasons). It will also entail some of the challenges met along the way; such as explaining to radiographers that for nuclear non-proliferation purposes it is the shielding uranium container which is of interest, not the isotope emitting the radiation. What we have experienced being the major differences between collecting information from small holders as compared to larger nuclear facilities will also be outlined. The paper ends with an outline for future work.

  9. GIS environmental information analysis of the Darro River basin as the key for the management and hydrological forest restoration.

    Science.gov (United States)

    Fernandez, Paz; Delgado, Expectación; Lopez-Alonso, Mónica; Poyatos, José Manuel

    2018-02-01

    This article presents analyses of soil and environmental information for the Darro River basin (Granada-Spain) preliminary to its hydrological and forestry restoration. These analyses were carried out using a geographical information system (GIS) and employing a new procedure that adapts hydrological forest-restoration methods. The complete analysis encompasses morphological conditions, soil and climate characteristics as well as vegetation and land use. The study investigates soil erosion in the basin by using Universal Soil Loss Equation (USLE) and by mapping erosion fragility units. The results are presented in a set of maps and their analysis, providing the starting point for river basin management and the hydrological and forestry-restoration project that was approved at the end of 2015. The presence of soft substrates (e.g. gravel and sand) indicates that the area is susceptible to erosion, particularly the areas that are dominated by human activity and have little soil protection. Finally, land use and vegetation cover were identified as key factors in the soil erosion in the basin. According to the results, river authorities have included several measures in the restoration project aimed at reducing the erosion and helping to recover the environmental value of this river basin and to include it in recreation possibilities for the community of Granada. The presented analytical approach, designed by the authors, would be useful as a tool for environmental restoration in other small Mediterranean river basins. Copyright © 2017 Elsevier B.V. All rights reserved.

  10. The SECOQC quantum key distribution network in Vienna

    International Nuclear Information System (INIS)

    Peev, M; Pacher, C; Boxleitner, W; Happe, A; Hasani, Y; Alleaume, R; Diamanti, E; Barreiro, C; Fasel, S; Gautier, J-D; Gisin, N; Bouda, J; Debuisschert, T; Fossier, S; Dianati, M; Dynes, J F; Fuerst, M; Gay, O; Grangier, P; Hentschel, M

    2009-01-01

    , and realizes end-to-end secure transport of key material between these destinations. The paper also illustrates the operation of the network in a number of typical exploitation regimes and gives an initial estimate of the network transmission capacity, defined as the maximum amount of key that can be exchanged, or alternatively the amount of information that can be transmitted with information theoretic security, between two arbitrary nodes.

  11. Public key cryptography from weaker assumptions

    DEFF Research Database (Denmark)

    Zottarel, Angela

    This dissertation is focused on the construction of public key cryptographic primitives and on the relative security analysis in a meaningful theoretic model. This work takes two orthogonal directions. In the first part, we study cryptographic constructions preserving their security properties also...... in the case the adversary is granted access to partial information about the secret state of the primitive. To do so, we work in an extension of the standard black-box model, a new framework where possible leakage from the secret state is taken into account. In particular, we give the first construction...

  12. Information section of evolution of new technology

    Directory of Open Access Journals (Sweden)

    Straka Martin

    2001-12-01

    Full Text Available When the new technology is developed, the large amount of information is needed, at the beginning, also through development and there is large amount of data, information at the output, which create a manual, design procedure of the new technology. Evolution the new technology goes out from one primary original idea, or by the help of sectional or piecemeal solution come near into the bargain what we want to achieve research. Attempts and collection of information get in possession to results not only after information section, but also after technical - technological section. Another important of information source is quantity data receives from books, magazines, old planning documentation and nowadays also from Internet. This article contains the information gaining and the sources, which we have in disposal and which are necessary for developing the new technology from primary data at the beginning to data, which are gathered through development.

  13. Smooth Phase Interpolated Keying

    Science.gov (United States)

    Borah, Deva K.

    2007-01-01

    Smooth phase interpolated keying (SPIK) is an improved method of computing smooth phase-modulation waveforms for radio communication systems that convey digital information. SPIK is applicable to a variety of phase-shift-keying (PSK) modulation schemes, including quaternary PSK (QPSK), octonary PSK (8PSK), and 16PSK. In comparison with a related prior method, SPIK offers advantages of better performance and less complexity of implementation. In a PSK scheme, the underlying information waveform that one seeks to convey consists of discrete rectangular steps, but the spectral width of such a waveform is excessive for practical radio communication. Therefore, the problem is to smooth the step phase waveform in such a manner as to maintain power and bandwidth efficiency without incurring an unacceptably large error rate and without introducing undesired variations in the amplitude of the affected radio signal. Although the ideal constellation of PSK phasor points does not cause amplitude variations, filtering of the modulation waveform (in which, typically, a rectangular pulse is converted to a square-root raised cosine pulse) causes amplitude fluctuations. If a power-efficient nonlinear amplifier is used in the radio communication system, the fluctuating-amplitude signal can undergo significant spectral regrowth, thus compromising the bandwidth efficiency of the system. In the related prior method, one seeks to solve the problem in a procedure that comprises two major steps: phase-value generation and phase interpolation. SPIK follows the two-step approach of the related prior method, but the details of the steps are different. In the phase-value-generation step, the phase values of symbols in the PSK constellation are determined by a phase function that is said to be maximally smooth and that is chosen to minimize the spectral spread of the modulated signal. In this step, the constellation is divided into two groups by assigning, to information symbols, phase values

  14. Modular Connector Keying Concept

    Science.gov (United States)

    Ishman, Scott; Dukes, Scott; Warnica, Gary; Conrad, Guy; Senigla, Steven

    2013-01-01

    For panel-mount-type connectors, keying is usually "built-in" to the connector body, necessitating different part numbers for each key arrangement. This is costly for jobs that require small quantities. This invention was driven to provide a cost savings and to reduce documentation of individual parts. The keys are removable and configurable in up to 16 combinations. Since the key parts are separate from the connector body, a common design can be used for the plug, receptacle, and key parts. The keying can then be set at the next higher assembly.

  15. An Attribute Involved Public Key Cryptosystem Based on P-Sylow Subgroups and Randomization

    Directory of Open Access Journals (Sweden)

    Sumalatha GUNNALA

    2018-04-01

    Full Text Available The Asymmetric Key Cryptosystem (AKC or Public Key Encryption (PKE is a mechanism used to encrypt the messages by using public key and decrypt the enciphered messages by using private key. Of late, the Attribute-Based Encryption (ABE is an expansion of asymmetric key encryption scheme that allows users to encrypt and decrypt the plaintext messages using the key based on the user’s credentials, called attributes, like social security number, PAN (Permanent Account Number, email ids or Aadhar number etc. Most of the existing ABE schemes rely on the multiple attributes from which the access control policies are derived. These policies define the users’ private keys, required for the decryption process and access to the confidential information. In this paper, we proposed a new attribute based asymmetric cryptosystem that uses the features of both the schemes: PKE and ABE. Here, we used a value of an attribute, personal to the user, for the encryption and the decryption process. This scheme assures that the receiver will only be able to access the secret data if recipient is shared with the valid attribute value. The asymmetric nature is this scheme is based on the concept of p-sylow sub-group assumption. In addition, the randomization factor is used in the encipherment process to strengthen the cipher further. The development of this cryptosystem is an embodiment where the merits of randomized asymmetric encryption technique and the attribute based encryption are integrated to achieve the authentication on top of confidentiality to secure the information transmission over the public networks.

  16. Canadian Government Electronic Information Policy.

    Science.gov (United States)

    Nilsen, Kirsti

    1993-01-01

    Examines development and evolution of Canadian government information policy in response to issues of preservation of data, information industry involvement in government data development and marketing, role of Crown copyright, and public access to government information in electronic formats. Six key information policy instruments are also…

  17. Online Sources for Competitor Information.

    Science.gov (United States)

    Weiss, Arthur

    Competitor information gathering is a key aspect of business planning. Information can be collected from either published or unpublished sources. Unpublished information will often be verified based on material from published sources. Published information is more likely to be factual and includes financial, stockmarket, press, market and…

  18. Wind as a utility-grade supply resource: A planning framework for the Pacific Northwest

    International Nuclear Information System (INIS)

    Johnson, M.S.; Litchfield, J.

    1993-12-01

    Many areas throughout the United States possess favorable wind resources that, as yet, remain undeveloped. This paper provides valuable information on the type of information developers can provide, utility interpretation of the information in regard to electric energy and capacity attributes, and wind resource characteristics of interest to utilities. The paper also reviews key utility planning contexts within which prospective wind resources may be evaluated

  19. Parallel Key Frame Extraction for Surveillance Video Service in a Smart City.

    Science.gov (United States)

    Zheng, Ran; Yao, Chuanwei; Jin, Hai; Zhu, Lei; Zhang, Qin; Deng, Wei

    2015-01-01

    Surveillance video service (SVS) is one of the most important services provided in a smart city. It is very important for the utilization of SVS to provide design efficient surveillance video analysis techniques. Key frame extraction is a simple yet effective technique to achieve this goal. In surveillance video applications, key frames are typically used to summarize important video content. It is very important and essential to extract key frames accurately and efficiently. A novel approach is proposed to extract key frames from traffic surveillance videos based on GPU (graphics processing units) to ensure high efficiency and accuracy. For the determination of key frames, motion is a more salient feature in presenting actions or events, especially in surveillance videos. The motion feature is extracted in GPU to reduce running time. It is also smoothed to reduce noise, and the frames with local maxima of motion information are selected as the final key frames. The experimental results show that this approach can extract key frames more accurately and efficiently compared with several other methods.

  20. Parallel Key Frame Extraction for Surveillance Video Service in a Smart City.

    Directory of Open Access Journals (Sweden)

    Ran Zheng

    Full Text Available Surveillance video service (SVS is one of the most important services provided in a smart city. It is very important for the utilization of SVS to provide design efficient surveillance video analysis techniques. Key frame extraction is a simple yet effective technique to achieve this goal. In surveillance video applications, key frames are typically used to summarize important video content. It is very important and essential to extract key frames accurately and efficiently. A novel approach is proposed to extract key frames from traffic surveillance videos based on GPU (graphics processing units to ensure high efficiency and accuracy. For the determination of key frames, motion is a more salient feature in presenting actions or events, especially in surveillance videos. The motion feature is extracted in GPU to reduce running time. It is also smoothed to reduce noise, and the frames with local maxima of motion information are selected as the final key frames. The experimental results show that this approach can extract key frames more accurately and efficiently compared with several other methods.

  1. Demonstration Of The Violation Of Bell Inequality In Quantum Key Distribution

    International Nuclear Information System (INIS)

    Dermez, R.

    2010-01-01

    Today, the data privacy has become very important. Quantum Key Distribution (QKD) system is developed in this area. QKD, coding technique with single-use method of encoding used keys (information and messages) security guarantees. The system is based on Quantum Mechanics (The Certainty Principle). However, in some cases for quantum communication, QKD are limited. In determining this limit Bell Inequality (CHSH Inequality, 1969) is used. Bell inequality shows a violation of Quantum Key Distribution. In this study, using the program of Matematica 6, QKD through bilateral quantum system (system with two qubits) has been investigating the leak case and the violations. We showed leakage and violations in these figures via the calculations results in Matematica program.

  2. Understanding mobile information needs

    OpenAIRE

    Church, Karen; Smyth, Barry

    2008-01-01

    In this paper we describe the results of a four-week diary study of mobile information needs, focusing on the intent behind mobile needs and the importance on context on such needs. We identified three key intents among diary entries: informational, geographical and personal information management (PIM). Furthermore, we found many of these information needs have high temporal and location dependencies.

  3. Flow hydrodynamics near inlet key of Piano Key Weir (PKW)

    Indian Academy of Sciences (India)

    Department of Water Resources Development and Management, Indian Institute ... on the hydrodynamic performance near inlet key of Piano Key Weir (PKW). ... nature of flows is clearly understood with the help of advanced instrumentation.

  4. Reactive, anxious and possessive forms of jealousy and their relation to relationship quality among heterosexuals and homosexuals

    NARCIS (Netherlands)

    Barelds, Dick P. H.; Dijkstra, Pieternel

    2006-01-01

    The present study examined the relationship between relational quality and three different types of jealousy-reactive, anxious and possessive jealousy. The sample consisted of 76 gay men, 79 lesbians, 70 heterosexual women and 70 heterosexual men. Findings show that different types of jealousy

  5. Short Review on Quantum Key Distribution Protocols.

    Science.gov (United States)

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  6. Research on the Architecture of a Basic Reconfigurable Information Communication Network

    Directory of Open Access Journals (Sweden)

    Ruimin Wang

    2013-01-01

    Full Text Available The current information network cannot fundamentally meet some urgent requirements, such as providing ubiquitous information services and various types of heterogeneous network, supporting diverse and comprehensive network services, possessing high quality communication effects, ensuring the security and credibility of information interaction, and implementing effective supervisory control. This paper provides the theory system for the basic reconfigurable information communication network based on the analysis of present problems on the Internet and summarizes the root of these problems. It also provides an in-depth discussion about the related technologies and the prime components of the architecture.

  7. Key to good fit: body measurement problems specific to key ...

    African Journals Online (AJOL)

    Key to good fit: body measurement problems specific to key dimensions. ... to explore and describe the problems that the South African Clothing Industry currently ... A postal survey was conducted among South African apparel and footwear ...

  8. Key factors in the successful implementation of enterprise resource planning system

    Directory of Open Access Journals (Sweden)

    Farajollah Rahnavard

    2014-04-01

    Full Text Available Enterprise Resource Planning Systems (ERP are considered as the newest and most effective tools of enterprise resource planning and include an interconnected information, management and engineering system that meets all the needs of an organization. ERP implementation is costly and time-consuming and makes fundamental change in the process, if not implemented correctly it will cause challenges in most parts of the organization and will certainly fail. Therefore, the identification of key success factors in implementing ERP helps organizations avoid the loss of the project. This research aims to identify key success factors for ERP by examining 185 managers, professionals, experts of the Information and Communication Technology Institute associated with the Ministry of Communications and Information Technology of Iran. A questionnaire was used to collect data. Findings from exploratory factor analysis indicate that five factors: 1 user friendliness, flexible and consistency 2 establishment of project management; 3 alignment with user needs; 4 Management of organizational changes, and 5 observing the principles of successful implementation of ERP affect the institute and the corresponding suggestions are proposed consistent with these findings.

  9. The problem of intermixing of metals possessing no mutual solubility upon explosion welding (Cu-Ta, Fe-Ag, Al-Ta)

    Energy Technology Data Exchange (ETDEWEB)

    Greenberg, B.A., E-mail: bella@imp.uran.ru [Institute of Metal Physics, Ural Branch, Russian Academy of Sciences, S. Kovalevskoi str. 18, Ekaterinburg, 620990 (Russian Federation); Ivanov, M.A. [Kurdyumov Institute of Metal Physics, National Academy of Sciences of Ukraine, Vernadskogo blvd. 36, Kiev, 03680 (Ukraine); Rybin, V.V. [State Polytechnical University, Politekhnicheskaya str. 29, St. Petersburg, 195251 (Russian Federation); Elkina, O.A.; Antonova, O.V.; Patselov, A.M.; Inozemtsev, A.V.; Plotnikov, A.V.; Volkova, A.Yu. [Institute of Metal Physics, Ural Branch, Russian Academy of Sciences, S. Kovalevskoi str. 18, Ekaterinburg, 620990 (Russian Federation); Besshaposhnikov, Yu.P. [OJSC Ural Chemical Machine Building Plant, Khibinogorskii Lane 33, Ekaterinburg, 620010 (Russian Federation)

    2013-01-15

    On the basis of the results obtained for joints of dissimilar metals such as copper-tantalum and iron-silver, the reason of immiscible suspensions mixing upon explosion welding has been cleared out. It has been found that the interface (plain or wavy) is not smooth and contains inhomogeneities, namely, cusps and local melting zones. The role of granulating fragmentation providing partitioning of initial materials as a main channel of input energy dissipation has been revealed. It has been shown that in joints of metals possessing normal solubility the local melting zones are true solutions, but if metals possess no mutual solubility the local melting zones are colloidal solutions. Realization of either emulsion or suspension variant takes place. The results can be used in the development of new joints of metals possessing no mutual solubility. - Highlights: Black-Right-Pointing-Pointer Immiscible pairs Ta/Cu and Fe/Ag are welded successfully by explosive welding. Black-Right-Pointing-Pointer Fragmentation provides for partitioning as the main energy dissipation channel. Black-Right-Pointing-Pointer Immiscible metals form colloidal solid solutions during solidification. Black-Right-Pointing-Pointer Melting and boiling temperatures ratio determines the colloidal solution type. Black-Right-Pointing-Pointer Local melting zones being in suspension form enhance welds hardening.

  10. Prospective study on human fecal carriage of Enterobacteriaceae possessing mcr-1 and mcr-2 genes in a regional hospital in Hong Kong.

    Science.gov (United States)

    Chan, Wai-Sing; Au, Chun-Hang; Ho, Dona N; Chan, Tsun-Leung; Ma, Edmond Shiu-Kwan; Tang, Bone Siu-Fai

    2018-02-13

    Human fecal carriage of Enterobacteriaceae possessing mobilized colistin resistance genes (mcr-1 and mcr-2) remains obscure in Hong Kong. As part of routine surveillance on emerging antibiotic resistance, we conducted a prospective study on this topic in a regional hospital in Hong Kong. From October 31 to November 25, 2016, all fecal specimens submitted for routine analysis were included in this surveillance study. These comprised 672 consecutive routine fecal specimens collected from 616 individuals. Fecal specimens were screened for colistin-resistant Enterobacteriaceae by culture-based method, and the presence of mcr-1 and mcr-2 genes in resistant isolates was identified by polymerase chain reaction and Sanger sequencing. Whole genome sequencing (WGS) of mcr-1-possessing Escherichia coli strains was facilitated using Illumina® MiSeq® followed by sequence analysis with appropriate bioinformatics tools. Fourteen mcr-1-positive E. coli strains were isolated from 14 separate individuals (2.08% of total fecal specimens), with 9 of them being asymptomatic, healthy clients coming for health assessment. No mcr-2-possessing Enterobacteriaceae was identified. Colistin minimum inhibitory concentrations of these mcr-1-positive isolates ranged from 2 to 4 μg/mL. All these isolates were susceptible to carbapenems with 2 being extended spectrum β-lactamase producers. WGS data revealed that these isolates belonged to at least 12 different sequence types (STs) and possessed diversified plasmid replicons, virulence and acquired antibiotic resistance genes. Further study on an E. coli ST201 strain (Pasteur scheme) revealed coexistence of 47,818-bp IncP-1 and 33,309-bp IncX4 types of mcr-1 plasmids, which was a combination of stability and high transmissibility. To the best of our knowledge, this is the first study on human fecal carriage of Enterobacteriaceae possessing mcr-1 and mcr-2 genes in Hong Kong. Our data further revealed asymptomatic carriage of mcr-1-possessing

  11. The ultimate security bounds of quantum key distribution protocols

    International Nuclear Information System (INIS)

    Nikolopoulos, G.M.; Alber, G.

    2005-01-01

    Full text: Quantum key distribution (QKD) protocols exploit quantum correlations in order to establish a secure key between two legitimate users. Recent work on QKD has revealed a remarkable link between quantum and secret correlations. In this talk we report on recent results concerning the ultimate upper security bounds of various QKD schemes (i.e., the maximal disturbance up to which the two legitimate users share quantum correlations) under the assumption of general coherent attacks. In particular, we derive an analytic expression for the ultimate upper security bound of QKD schemes that use two mutually unbiased bases. As long as the two legitimate users focus on the sifted key and treat each pair of data independently during the post processing, our results are valid for arbitrary dimensions of the information carriers. The bound we have derived is well below the predictions of optimal cloning machines. The possibility of extraction of a secret key beyond entanglement distillation is also discussed. In the case of qutrits we argue that any eavesdropping strategy is equivalent to a symmetric one. For higher dimensions, however, such equivalence is generally no longer valid. (author)

  12. Proof-of-concept of real-world quantum key distribution with quantum frames

    International Nuclear Information System (INIS)

    Lucio-Martinez, I; Mo, X; Tittel, W; Chan, P; Hosier, S

    2009-01-01

    We propose a fibre-based quantum key distribution system, which employs polarization qubits encoded into faint laser pulses. As a novel feature, it allows sending of classical framing information via sequences of strong laser pulses that precede the quantum data. This allows synchronization, sender and receiver identification and compensation of time-varying birefringence in the communication channel. In addition, this method also provides a platform to communicate implementation specific information such as encoding and protocol in view of future optical quantum networks. We demonstrate in a long-term (37 h) proof-of-principle study that polarization information encoded in the classical control frames can indeed be used to stabilize unwanted qubit transformation in the quantum channel. All optical elements in our setup can be operated at Gbps rates, which is a first requirement for a future system delivering secret keys at Mbps. In order to remove another bottleneck towards a high rate system, we investigate forward error correction based on low-density parity-check codes.

  13. Key Concept Identification: A Comprehensive Analysis of Frequency and Topical Graph-Based Approaches

    Directory of Open Access Journals (Sweden)

    Muhammad Aman

    2018-05-01

    Full Text Available Automatic key concept extraction from text is the main challenging task in information extraction, information retrieval and digital libraries, ontology learning, and text analysis. The statistical frequency and topical graph-based ranking are the two kinds of potentially powerful and leading unsupervised approaches in this area, devised to address the problem. To utilize the potential of these approaches and improve key concept identification, a comprehensive performance analysis of these approaches on datasets from different domains is needed. The objective of the study presented in this paper is to perform a comprehensive empirical analysis of selected frequency and topical graph-based algorithms for key concept extraction on three different datasets, to identify the major sources of error in these approaches. For experimental analysis, we have selected TF-IDF, KP-Miner and TopicRank. Three major sources of error, i.e., frequency errors, syntactical errors and semantical errors, and the factors that contribute to these errors are identified. Analysis of the results reveals that performance of the selected approaches is significantly degraded by these errors. These findings can help us develop an intelligent solution for key concept extraction in the future.

  14. Long distance free-space quantum key distribution

    International Nuclear Information System (INIS)

    Schmitt-Manderbach, T.

    2007-01-01

    The aim of the presented experiment was to investigate the feasibility of satellite-based global quantum key distribution. In this context, a free-space quantum key distribution experiment over a real distance of 144 km was performed. The transmitter and the receiver were situated in 2500 m altitude on the Canary Islands of La Palma and Tenerife, respectively. The small and compact transmitter unit generated attenuated laser pulses, that were sent to the receiver via a 15-cm optical telescope. The receiver unit for polarisation analysis and detection of the sent pulses was integrated into an existing mirror telescope designed for classical optical satellite communications. To ensure the required stability and efficiency of the optical link in the presence of atmospheric turbulence, the two telescopes were equipped with a bi-directional automatic tracking system. Still, due to stray light and high optical attenuation, secure key exchange would not be possible using attenuated pulses in connection with the standard BB84 protocol. The photon number statistics of attenuated pulses follows a Poissonian distribution. Hence, by removing a photon from all pulses containing two or more photons, an eavesdropper could measure its polarisation without disturbing the polarisation state of the remaining pulse. In this way, he can gain information about the key without introducing detectable errors. To protect against such attacks, the presented experiment employed the recently developed method of using additional ''decoy'' states, i.e., the the intensity of the pulses created by the transmitter were varied in a random manner. By analysing the detection probabilities of the different pulses individually, a photon-number-splitting attack can be detected. Thanks to the decoy-state analysis, the secrecy of the resulting quantum key could be ensured despite the Poissonian nature of the emitted pulses. For a channel attenuation as high as 35 dB, a secret key rate of up to 250 bit

  15. Long distance free-space quantum key distribution

    Energy Technology Data Exchange (ETDEWEB)

    Schmitt-Manderbach, T.

    2007-10-16

    The aim of the presented experiment was to investigate the feasibility of satellite-based global quantum key distribution. In this context, a free-space quantum key distribution experiment over a real distance of 144 km was performed. The transmitter and the receiver were situated in 2500 m altitude on the Canary Islands of La Palma and Tenerife, respectively. The small and compact transmitter unit generated attenuated laser pulses, that were sent to the receiver via a 15-cm optical telescope. The receiver unit for polarisation analysis and detection of the sent pulses was integrated into an existing mirror telescope designed for classical optical satellite communications. To ensure the required stability and efficiency of the optical link in the presence of atmospheric turbulence, the two telescopes were equipped with a bi-directional automatic tracking system. Still, due to stray light and high optical attenuation, secure key exchange would not be possible using attenuated pulses in connection with the standard BB84 protocol. The photon number statistics of attenuated pulses follows a Poissonian distribution. Hence, by removing a photon from all pulses containing two or more photons, an eavesdropper could measure its polarisation without disturbing the polarisation state of the remaining pulse. In this way, he can gain information about the key without introducing detectable errors. To protect against such attacks, the presented experiment employed the recently developed method of using additional 'decoy' states, i.e., the the intensity of the pulses created by the transmitter were varied in a random manner. By analysing the detection probabilities of the different pulses individually, a photon-number-splitting attack can be detected. Thanks to the decoy-state analysis, the secrecy of the resulting quantum key could be ensured despite the Poissonian nature of the emitted pulses. For a channel attenuation as high as 35 dB, a secret key rate of up to 250

  16. Security of Color Image Data Designed by Public-Key Cryptosystem Associated with 2D-DWT

    Science.gov (United States)

    Mishra, D. C.; Sharma, R. K.; Kumar, Manish; Kumar, Kuldeep

    2014-08-01

    In present times the security of image data is a major issue. So, we have proposed a novel technique for security of color image data by public-key cryptosystem or asymmetric cryptosystem. In this technique, we have developed security of color image data using RSA (Rivest-Shamir-Adleman) cryptosystem with two-dimensional discrete wavelet transform (2D-DWT). Earlier proposed schemes for security of color images designed on the basis of keys, but this approach provides security of color images with the help of keys and correct arrangement of RSA parameters. If the attacker knows about exact keys, but has no information of exact arrangement of RSA parameters, then the original information cannot be recovered from the encrypted data. Computer simulation based on standard example is critically examining the behavior of the proposed technique. Security analysis and a detailed comparison between earlier developed schemes for security of color images and proposed technique are also mentioned for the robustness of the cryptosystem.

  17. Key Informant Views of a Free Delivery and Caesarean Policy in ...

    African Journals Online (AJOL)

    Erah

    The policy was introduced in 2005 in five more deprived regions ... informants who had technical and administrative or political responsibility for the policy at .... the first year of leadership from the ..... rhetoric of free services and the reality of .... augmented to include the materials to ..... mothers and children in Bolivia.

  18. Key Questions in Building Defect Prediction Models in Practice

    Science.gov (United States)

    Ramler, Rudolf; Wolfmaier, Klaus; Stauder, Erwin; Kossak, Felix; Natschläger, Thomas

    The information about which modules of a future version of a software system are defect-prone is a valuable planning aid for quality managers and testers. Defect prediction promises to indicate these defect-prone modules. However, constructing effective defect prediction models in an industrial setting involves a number of key questions. In this paper we discuss ten key questions identified in context of establishing defect prediction in a large software development project. Seven consecutive versions of the software system have been used to construct and validate defect prediction models for system test planning. Furthermore, the paper presents initial empirical results from the studied project and, by this means, contributes answers to the identified questions.

  19. Cytotoxic protein from the mushroom Coprinus comatus possesses a unique mode for glycan binding and specificity.

    Science.gov (United States)

    Zhang, Peilan; Li, Kunhua; Yang, Guang; Xia, Changqing; Polston, Jane E; Li, Gengnan; Li, Shiwu; Lin, Zhao; Yang, Li-Jun; Bruner, Steven D; Ding, Yousong

    2017-08-22

    Glycans possess significant chemical diversity; glycan binding proteins (GBPs) recognize specific glycans to translate their structures to functions in various physiological and pathological processes. Therefore, the discovery and characterization of novel GBPs and characterization of glycan-GBP interactions are significant to provide potential targets for therapeutic intervention of many diseases. Here, we report the biochemical, functional, and structural characterization of a 130-amino-acid protein, Y3, from the mushroom Coprinus comatus Biochemical studies of recombinant Y3 from a yeast expression system demonstrated the protein is a unique GBP. Additionally, we show that Y3 exhibits selective and potent cytotoxicity toward human T-cell leukemia Jurkat cells compared with a panel of cancer cell lines via inducing caspase-dependent apoptosis. Screening of a glycan array demonstrated GalNAcβ1-4(Fucα1-3)GlcNAc (LDNF) as a specific Y3-binding ligand. To provide a structural basis for function, the crystal structure was solved to a resolution of 1.2 Å, revealing a single-domain αβα-sandwich motif. Two monomers were dimerized to form a large 10-stranded, antiparallel β-sheet flanked by α-helices on each side, representing a unique oligomerization mode among GBPs. A large glycan binding pocket extends into the dimeric interface, and docking of LDNF identified key residues for glycan interactions. Disruption of residues predicted to be involved in LDNF/Y3 interactions resulted in the significant loss of binding to Jurkat T-cells and severely impaired their cytotoxicity. Collectively, these results demonstrate Y3 to be a GBP with selective cytotoxicity toward human T-cell leukemia cells and indicate its potential use in cancer diagnosis and treatment.

  20. Key Management Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides a secure environment to research and develop advanced electronic key management and networked key distribution technologies for the Navy and DoD....

  1. LOCKS AND KEYS SERVICE

    CERN Multimedia

    Locks and Keys Service

    2002-01-01

    The Locks and Keys service (ST/FM) will move from building 55 to building 570 from the 2nd August to the 9th August 2002 included. During this period the service will be closed. Only in case of extreme urgency please call the 164550. Starting from Monday, 12th August, the Locks and Keys Service will continue to follow the activities related to office keys (keys and locks) and will provide the keys for furniture. The service is open from 8h30 to 12h00 and from 13h00 to 17h30. We remind you that your divisional correspondents can help you in the execution of the procedures. We thank you for your comprehension and we remain at your service to help you in solving all the matters related to keys for offices and furniture. Locks and Keys Service - ST Division - FM Group

  2. Defining information need in health - assimilating complex theories derived from information science.

    Science.gov (United States)

    Ormandy, Paula

    2011-03-01

    Key policy drivers worldwide include optimizing patients' roles in managing their care; focusing services around patients' needs and preferences; and providing information to support patients' contributions and choices. The term information need penetrates many policy documents. Information need is espoused as the foundation from which to develop patient-centred or patient-led services. Yet there is no clear definition as to what the term means or how patients' information needs inform and shape information provision and patient care. The assimilation of complex theories originating from information science has much to offer considerations of patient information need within the context of health care. Health-related research often focuses on the content of information patients prefer, not why they need information. This paper extends and applies knowledge of information behaviour to considerations of information need in health, exposing a working definition for patient information need that reiterates the importance of considering the patient's goals and understanding the patient's context/situation. A patient information need is defined as 'recognition that their knowledge is inadequate to satisfy a goal, within the context/situation that they find themselves at a specific point in the time'. This typifies the key concepts of national/international health policy, the centrality and importance of the patient. The proposed definition of patient information need provides a conceptual framework to guide health-care practitioners on what to consider and why when meeting the information needs of patients in practice. This creates a solid foundation from which to inform future research. © 2010 The Author. Health Expectations © 2010 Blackwell Publishing Ltd.

  3. 76 FR 54657 - Migratory Bird Hunting; Early Seasons and Bag and Possession Limits for Certain Migratory Game...

    Science.gov (United States)

    2011-09-01

    ... Migratory Game Birds in the Contiguous United States, Alaska, Hawaii, Puerto Rico, and the Virgin Islands... Bag and Possession Limits for Certain Migratory Game Birds in the Contiguous United States, Alaska...; migratory game birds in Alaska, Hawaii, Puerto Rico, and the Virgin Islands; and some extended falconry...

  4. Information Science and the Martial Arts: Perspectives on Online Searching.

    Science.gov (United States)

    Raitt, David I.

    The relatively new discipline of information science has its origins in the West, while the ancient martial arts have their origins in the East. Despite these differences in age and hemisphere, the two disciplines can be shown to possess many conceptual as well as technical similarities which have evolved quite independently of each other. This…

  5. Exploring dementia management attitudes in primary care: a key informant survey to primary care physicians in 25 European countries.

    Science.gov (United States)

    Petrazzuoli, Ferdinando; Vinker, Shlomo; Koskela, Tuomas H; Frese, Thomas; Buono, Nicola; Soler, Jean Karl; Ahrensberg, Jette; Asenova, Radost; Foguet Boreu, Quintí; Ceyhun Peker, Gülsen; Collins, Claire; Hanževački, Miro; Hoffmann, Kathryn; Iftode, Claudia; Kurpas, Donata; Le Reste, Jean Yves; Lichtwarck, Bjørn; Petek, Davorina; Pinto, Daniel; Schrans, Diego; Streit, Sven; Tang, Eugene Yee Hing; Tatsioni, Athina; Torzsa, Péter; Unalan, Pemra C; van Marwijk, Harm; Thulesius, Hans

    2017-09-01

    Strategies for the involvement of primary care in the management of patients with presumed or diagnosed dementia are heterogeneous across Europe. We wanted to explore attitudes of primary care physicians (PCPs) when managing dementia: (i) the most popular cognitive tests, (ii) who had the right to initiate or continue cholinesterase inhibitor or memantine treatment, and (iii) the relationship between the permissiveness of these rules/guidelines and PCP's approach in the dementia investigations and assessment. Key informant survey. Primary care practices across 25 European countries. Four hundred forty-five PCPs responded to a self-administered questionnaire. Two-step cluster analysis was performed using characteristics of the informants and the responses to the survey. Two by two contingency tables with odds ratios and 95% confidence intervals were used to assess the association between categorical variables. A multinomial logistic regression model was used to assess the association of multiple variables (age class, gender, and perceived prescription rules) with the PCPs' attitude of "trying to establish a diagnosis of dementia on their own." Discrepancies between rules/guidelines and attitudes to dementia management was found in many countries. There was a strong association between the authorization to prescribe dementia drugs and pursuing dementia diagnostic work-up (odds ratio, 3.45; 95% CI 2.28-5.23). Differing regulations about who does what in dementia management seemed to affect PCP's engagement in dementia investigations and assessment. PCPs who were allowed to prescribe dementia drugs also claimed higher engagement in dementia work-up than PCPs who were not allowed to prescribe.

  6. [Essential procedure and key methods for survey of traditional knowledge related to Chinese materia medica resources].

    Science.gov (United States)

    Cheng, Gong; Huang, Lu-qi; Xue, Da-yuan; Zhang, Xiao-bo

    2014-12-01

    The survey of traditional knowledge related to Chinese materia medica resources is the important component and one of the innovative aspects of the fourth national survey of the Chinese materia medica resources. China has rich traditional knowledge of traditional Chinese medicine (TCM) and the comprehensive investigation of TCM traditional knowledge aims to promote conservation and sustainable use of Chinese materia medica resources. Building upon the field work of pilot investigations, this paper introduces the essential procedures and key methods for conducting the survey of traditional knowledge related to Chinese materia medica resources. The essential procedures are as follows. First is the preparation phrase. It is important to review all relevant literature and provide training to the survey teams so that they have clear understanding of the concept of traditional knowledge and master key survey methods. Second is the field investigation phrase. When conducting field investigations, survey teams should identify the traditional knowledge holders by using the 'snowball method', record the traditional knowledge after obtaining prior informed concerned from the traditional knowledge holders. Researchers should fill out the survey forms provided by the Technical Specification of the Fourth National Survey of Chinese Materia Medica Resources. Researchers should pay particular attention to the scope of traditional knowledge and the method of inheriting the knowledge, which are the key information for traditional knowledge holders and potential users to reach mutual agreed terms to achieve benefit sharing. Third is the data compilation and analysis phrase. Researchers should try to compile and edit the TCM traditional knowledge in accordance with intellectual property rights requirements so that the information collected through the national survey can serve as the basic data for the TCM traditional knowledge database. The key methods of the survey include regional

  7. The Key Lake project

    International Nuclear Information System (INIS)

    1991-01-01

    Key Lake is located in the Athabasca sand stone basin, 640 kilometers north of Saskatoon, Saskatchewan, Canada. The three sources of ore at Key Lake contain 70 100 tonnes of uranium. Features of the Key Lake Project were described under the key headings: work force, mining, mill process, tailings storage, permanent camp, environmental features, worker health and safety, and economic benefits. Appendices covering the historical background, construction projects, comparisons of western world mines, mining statistics, Northern Saskatchewan surface lease, and Key Lake development and regulatory agencies were included

  8. High-dimensional quantum key distribution with the entangled single-photon-added coherent state

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Yang [Zhengzhou Information Science and Technology Institute, Zhengzhou, 450001 (China); Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026 (China); Bao, Wan-Su, E-mail: 2010thzz@sina.com [Zhengzhou Information Science and Technology Institute, Zhengzhou, 450001 (China); Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026 (China); Bao, Hai-Ze; Zhou, Chun; Jiang, Mu-Sheng; Li, Hong-Wei [Zhengzhou Information Science and Technology Institute, Zhengzhou, 450001 (China); Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026 (China)

    2017-04-25

    High-dimensional quantum key distribution (HD-QKD) can generate more secure bits for one detection event so that it can achieve long distance key distribution with a high secret key capacity. In this Letter, we present a decoy state HD-QKD scheme with the entangled single-photon-added coherent state (ESPACS) source. We present two tight formulas to estimate the single-photon fraction of postselected events and Eve's Holevo information and derive lower bounds on the secret key capacity and the secret key rate of our protocol. We also present finite-key analysis for our protocol by using the Chernoff bound. Our numerical results show that our protocol using one decoy state can perform better than that of previous HD-QKD protocol with the spontaneous parametric down conversion (SPDC) using two decoy states. Moreover, when considering finite resources, the advantage is more obvious. - Highlights: • Implement the single-photon-added coherent state source into the high-dimensional quantum key distribution. • Enhance both the secret key capacity and the secret key rate compared with previous schemes. • Show an excellent performance in view of statistical fluctuations.

  9. High-dimensional quantum key distribution with the entangled single-photon-added coherent state

    International Nuclear Information System (INIS)

    Wang, Yang; Bao, Wan-Su; Bao, Hai-Ze; Zhou, Chun; Jiang, Mu-Sheng; Li, Hong-Wei

    2017-01-01

    High-dimensional quantum key distribution (HD-QKD) can generate more secure bits for one detection event so that it can achieve long distance key distribution with a high secret key capacity. In this Letter, we present a decoy state HD-QKD scheme with the entangled single-photon-added coherent state (ESPACS) source. We present two tight formulas to estimate the single-photon fraction of postselected events and Eve's Holevo information and derive lower bounds on the secret key capacity and the secret key rate of our protocol. We also present finite-key analysis for our protocol by using the Chernoff bound. Our numerical results show that our protocol using one decoy state can perform better than that of previous HD-QKD protocol with the spontaneous parametric down conversion (SPDC) using two decoy states. Moreover, when considering finite resources, the advantage is more obvious. - Highlights: • Implement the single-photon-added coherent state source into the high-dimensional quantum key distribution. • Enhance both the secret key capacity and the secret key rate compared with previous schemes. • Show an excellent performance in view of statistical fluctuations.

  10. FTA real-time transit information assessment : white paper on literature review of real-time transit information systems.

    Science.gov (United States)

    Real-time transit information systems are key technology applications within the transit industry designed to provide better customer service by disseminating timely and accurate information. Riders use this information to make various decisions abou...

  11. Information Impact: Journal of Information and Knowledge ...

    African Journals Online (AJOL)

    Information Impact: Journal of Information and Knowledge management

    Five (5) research questions guided the study and three hypotheses were tested at 0.05 level of ... key factor of knowledge management is knowledge sharing. ... difference has been recorded in terms of skills acquisition, information literacy, classroom ... However, little is known about knowledge-sharing strategies and their ...

  12. Core information sets for informed consent to surgical interventions: baseline information of importance to patients and clinicians.

    Science.gov (United States)

    Main, Barry G; McNair, Angus G K; Huxtable, Richard; Donovan, Jenny L; Thomas, Steven J; Kinnersley, Paul; Blazeby, Jane M

    2017-04-26

    Consent remains a crucial, yet challenging, cornerstone of clinical practice. The ethical, legal and professional understandings of this construct have evolved away from a doctor-centred act to a patient-centred process that encompasses the patient's values, beliefs and goals. This alignment of consent with the philosophy of shared decision-making was affirmed in a recent high-profile Supreme Court ruling in England. The communication of information is central to this model of health care delivery but it can be difficult for doctors to gauge the information needs of the individual patient. The aim of this paper is to describe 'core information sets' which are defined as a minimum set of consensus-derived information about a given procedure to be discussed with all patients. Importantly, they are intended to catalyse discussion of subjective importance to individuals. The model described in this paper applies health services research and Delphi consensus-building methods to an idea orginally proposed 30 years ago. The hypothesis is that, first, large amounts of potentially-important information are distilled down to discrete information domains. These are then, secondly, rated by key stakeholders in multiple iterations, so that core information of agreed importance can be defined. We argue that this scientific approach is key to identifying information important to all stakeholders, which may otherwise be communicated poorly or omitted from discussions entirely. Our methods apply systematic review, qualitative, survey and consensus-building techniques to define this 'core information'. We propose that such information addresses the 'reasonable patient' standard for information disclosure but, more importantly, can serve as a spring board for high-value discussion of importance to the individual patient. The application of established research methods can define information of core importance to informed consent. Further work will establish how best to incorporate

  13. 78 FR 53199 - Migratory Bird Hunting; Early Seasons and Bag and Possession Limits for Certain Migratory Game...

    Science.gov (United States)

    2013-08-28

    ... Migratory Game Birds in the Contiguous United States, Alaska, Hawaii, Puerto Rico, and the Virgin Islands... Seasons and Bag and Possession Limits for Certain Migratory Game Birds in the Contiguous United States... seasons; migratory game birds in Alaska, Hawaii, Puerto Rico, and the Virgin Islands; youth waterfowl day...

  14. 77 FR 53751 - Migratory Bird Hunting; Early Seasons and Bag and Possession Limits for Certain Migratory Game...

    Science.gov (United States)

    2012-08-31

    ... Migratory Game Birds in the Contiguous United States, Alaska, Hawaii, Puerto Rico, and the Virgin Islands... Seasons and Bag and Possession Limits for Certain Migratory Game Birds in the Contiguous United States... seasons; migratory game birds in Alaska, Hawaii, Puerto Rico, and the Virgin Islands; youth waterfowl day...

  15. Distributed Data Networks That Support Public Health Information Needs.

    Science.gov (United States)

    Tabano, David C; Cole, Elizabeth; Holve, Erin; Davidson, Arthur J

    Data networks, consisting of pooled electronic health data assets from health care providers serving different patient populations, promote data sharing, population and disease monitoring, and methods to assess interventions. Better understanding of data networks, and their capacity to support public health objectives, will help foster partnerships, expand resources, and grow learning health systems. We conducted semistructured interviews with 16 key informants across the United States, identified as network stakeholders based on their respective experience in advancing health information technology and network functionality. Key informants were asked about their experience with and infrastructure used to develop data networks, including each network's utility to identify and characterize populations, usage, and sustainability. Among 11 identified data networks representing hundreds of thousands of patients, key informants described aggregated health care clinical data contributing to population health measures. Key informant interview responses were thematically grouped to illustrate how networks support public health, including (1) infrastructure and information sharing; (2) population health measures; and (3) network sustainability. Collaboration between clinical data networks and public health entities presents an opportunity to leverage infrastructure investments to support public health. Data networks can provide resources to enhance population health information and infrastructure.

  16. Implications of Key Performance Indicator Issues in Ontario Universities Explored

    Science.gov (United States)

    Chan, Vivian

    2015-01-01

    Since 1998, the Ministry of Training, Colleges and Universities in Ontario, Canada, has required that data on specific key performance indicators (KPIs) be made public by its publicly funded universities. The information is intended to be used by universities to demonstrate their achievements, to improve their programmes and services, and to…

  17. A Critique of the Key Legislative Framework Guiding Civil Liberties ...

    African Journals Online (AJOL)

    Key legislative framework presented in this paper is within the areas of media and access to information, individual rights and freedoms, as well as legislation pertaining to the conduct of elections. In some cases, colonial legislation that politicians claimed to have repealed was reincarnated, as the post-colonial dispensation ...

  18. The SECOQC quantum key distribution network in Vienna

    Science.gov (United States)

    Peev, M.; Pacher, C.; Alléaume, R.; Barreiro, C.; Bouda, J.; Boxleitner, W.; Debuisschert, T.; Diamanti, E.; Dianati, M.; Dynes, J. F.; Fasel, S.; Fossier, S.; Fürst, M.; Gautier, J.-D.; Gay, O.; Gisin, N.; Grangier, P.; Happe, A.; Hasani, Y.; Hentschel, M.; Hübel, H.; Humer, G.; Länger, T.; Legré, M.; Lieger, R.; Lodewyck, J.; Lorünser, T.; Lütkenhaus, N.; Marhold, A.; Matyus, T.; Maurhart, O.; Monat, L.; Nauerth, S.; Page, J.-B.; Poppe, A.; Querasser, E.; Ribordy, G.; Robyr, S.; Salvail, L.; Sharpe, A. W.; Shields, A. J.; Stucki, D.; Suda, M.; Tamas, C.; Themel, T.; Thew, R. T.; Thoma, Y.; Treiber, A.; Trinkler, P.; Tualle-Brouri, R.; Vannel, F.; Walenta, N.; Weier, H.; Weinfurter, H.; Wimberger, I.; Yuan, Z. L.; Zbinden, H.; Zeilinger, A.

    2009-07-01

    classical communication required for key distillation, manages the generated key material, determines a communication path between any destinations in the network, and realizes end-to-end secure transport of key material between these destinations. The paper also illustrates the operation of the network in a number of typical exploitation regimes and gives an initial estimate of the network transmission capacity, defined as the maximum amount of key that can be exchanged, or alternatively the amount of information that can be transmitted with information theoretic security, between two arbitrary nodes.

  19. Efficient Anonymous Authenticated Key Agreement Scheme for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Tong Li

    2017-01-01

    Full Text Available Wireless body area networks (WBANs are widely used in telemedicine, which can be utilized for real-time patients monitoring and home health-care. The sensor nodes in WBANs collect the client’s physiological data and transmit it to the medical center. However, the clients’ personal information is sensitive and there are many security threats in the extra-body communication. Therefore, the security and privacy of client’s physiological data need to be ensured. Many authentication protocols for WBANs have been proposed in recent years. However, the existing protocols fail to consider the key update phase. In this paper, we propose an efficient authenticated key agreement scheme for WBANs and add the key update phase to enhance the security of the proposed scheme. In addition, session keys are generated during the registration phase and kept secretly, thus reducing computation cost in the authentication phase. The performance analysis demonstrates that our scheme is more efficient than the currently popular related schemes.

  20. A Study on the Key Management Strategy for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hoon KO

    2015-05-01

    Full Text Available Many users who are in a cyber-space usually want to join the social group to have or to share their information. Now, there are two ways to join the group, the group manager invites them, and the users who want to join ask the owner. These days the group polices usually follow this way. But, it can be faced a security problem when the manager send group messages in near future because they don’t have any securities. Therefore, the security modules to join groups will be needed when they join the group or when they read the group messages. To set the security, we have to think how to keep the key such as a generation /an update/an arrangement, because all users need the key to join the groups or to read the group messages by decrypting. The key are going to be used to joining the group when it dynamically changes such as frequent group joining and leaving. If it applies or uses the existing methods in the smart cities which consider the users who will move globally, it could easily assume that the overhead/the cost of CPU will be increased and it follows capacity down because of lots of the key updates. So, to let them down, we suggest three key strategies, a group key, a subgroup key and a session key in this paper.

  1. Key Value Considerations for Consultant Pharmacists.

    Science.gov (United States)

    Meyer, Lee; Perry, Ronald G; Rhodus, Susan M; Stearns, Wendy

    2016-07-01

    Managing the efficiency and costs of residents' drug regimens outside the acute-care hospital and through transitions of care requires a toolbox filled with cost-control tools and careful collaboration among the pharmacy provider(s), facility staff, and the consultant/senior care pharmacist. This article will provide the reader with key long-term care business strategies that affect the profitability of the pharmacy provider in various care settings while, at the same time, ensuring optimal therapy for residents as they transition across levels of care. Readers can take away ideas on how to access critical information, what they can do with this information, and how they can improve the overall care process. Four experts in various aspects of pharmacy management share their insights on pharmacy practice issues including formulary management, performance metrics, short-cycle dispensing challenges/solutions, cost-control measures, facility surveys, billing practices, medication reconciliation, prospective medication reviews, and transitions of care.

  2. Draft Genome Sequence of Methyloferula stellata AR4, an Obligate Methanotroph Possessing Only a Soluble Methane Monooxygenase

    OpenAIRE

    Dedysh, Svetlana N.; Naumoff, Daniil G.; Vorobev, Alexey V.; Kyrpides, Nikos; Woyke, Tanja; Shapiro, Nicole; Crombie, Andrew T.; Murrell, J. Colin; Kalyuzhnaya, Marina G.; Smirnova, Angela V.; Dunfield, Peter F.

    2015-01-01

    Methyloferula stellata AR4 is an aerobic acidophilic methanotroph, which, in contrast to most known methanotrophs but similar to Methylocella spp., possesses only a soluble methane monooxygenase. However, it differs from Methylocella spp. by its inability to grow on multicarbon substrates. Here, we report the draft genome sequence of this bacterium.

  3. Hacking on decoy-state quantum key distribution system with partial phase randomization

    Science.gov (United States)

    Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2014-04-01

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  4. Hacking on decoy-state quantum key distribution system with partial phase randomization.

    Science.gov (United States)

    Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2014-04-23

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  5. Two-party quantum key agreement protocols under collective noise channel

    Science.gov (United States)

    Gao, Hao; Chen, Xiao-Guang; Qian, Song-Rong

    2018-06-01

    Recently, quantum communication has become a very popular research field. The quantum key agreement (QKA) plays an important role in the field of quantum communication, based on its unconditional security in terms of theory. Among all kinds of QKA protocols, QKA protocols resisting collective noise are widely being studied. In this paper, we propose improved two-party QKA protocols resisting collective noise and present a feasible plan for information reconciliation. Our protocols' qubit efficiency has achieved 26.67%, which is the best among all the two-party QKA protocols against collective noise, thus showing that our protocol can improve the transmission efficiency of quantum key agreement.

  6. Transmission access and retail wheeling. The key questions

    International Nuclear Information System (INIS)

    Casazza, J.A.

    1996-01-01

    The key questions involving transmission access and retail wheeling are discussed, distinguishing between opposing views regarding the effect on system costs and the environment, particularly on optimal planning involving matching capacity and demand, generation use, demand side management, and economic operations. Also discussed are contrasting views regarding the effect of cost control pressures, regulatory advantages and disadvantages, the impact on system reliability, and the stranding of investment. The author's key concern is the effect of retail wheeling upon optimal planning and operation i.e., will competitors be willing to provide one another with the cost and technical information required for coordination? In his worst scenario, retail wheeling may lead to substantial production cost increases, lessened reliability, and unfair cost-shifting between customer classes. More optimistically, production costs and reliability may be unaffected and the cost-shifting could be salubrious. 7 figs., 11 refs

  7. Distributed public key schemes secure against continual leakage

    DEFF Research Database (Denmark)

    Akavia, Adi; Goldwasser, Shafi; Hazay, Carmit

    2012-01-01

    -secure against continual memory leakage. Our DPKE scheme also implies a secure storage system on leaky devices, where a value s can be secretely stored on devices that continually leak information about their internal state to an external attacker. The devices go through a periodic refresh protocol......In this work we study distributed public key schemes secure against continual memory leakage. The secret key will be shared among two computing devices communicating over a public channel, and the decryption operation will be computed by a simple 2-party protocol between the devices. Similarly...... against continual memory leakage, under the Bilinear Decisional Diffie-Hellman and $2$-linear assumptions. Our schemes have the following properties: 1. Our DPKE and DIBE schemes tolerate leakage at all times, including during refresh. During refresh the tolerated leakage is a (1/2-o (1),1)-fraction...

  8. Public Key Cryptography.

    Science.gov (United States)

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  9. Key Financial Metrics on Australia's Higher Education Sector--December 2016

    Science.gov (United States)

    Australian Government Tertiary Education Quality and Standards Agency, 2016

    2016-01-01

    This report is the second release of financial information held by Tertiary Education Quality and Standards Agency (TEQSA). It provides a snapshot of selected key financial metrics across the Australian higher education sector. Data in this report has been sourced from TEQSA's 2015 data collection and relates to financial years ended 31 December…

  10. FOSS4G AS A KEY BUILDING BLOCK FOR CASE-BASED LEARNING IN GEOGRAPHIC INFORMATION EDUCATION

    Directory of Open Access Journals (Sweden)

    M. Minghini

    2017-07-01

    Full Text Available In the sector of Geographic Information (GI there is a gap between the education and training currently being offered by European universities and the knowledge and skills required by enterprises and public authorities. New forms of collaboration based on innovative methods are needed to cope with the challenges derived from the fast technological developments in the geospatial and ICT field. This paper presents the approach and the first findings of the EU Erasmus+ project giCASES – Creating a University-Enterprise Alliance for a Spatially Enabled Society (2016–2018 which addresses this challenge by introducing new methods for case-based and collaborative learning, and for the co-creation, management and sharing of knowledge between universities and enterprises. The aim of the project is to develop new training material and create innovative, multi-disciplinary learning processes based on real-world case studies (case-based learning. The paper focuses on the methodological approach developed during the first half of the project, and presents the 6 case studies where this approach will be tested during the second half. Despite the diversity of application domains (indoor mapping, environmental hazards, e-Government, utility networks, energy saving policies, and forestry, the case studies are all relevant to open source software and FOSS4G technologies will play a key role in their implementation, thus demonstrating their matureness and flexibility not only as GI teaching tools at the universities, but also as powerful means to develop innovative new services at the companies.

  11. Quantum information and coherence

    CERN Document Server

    Öhberg, Patrik

    2014-01-01

    This book offers an introduction to ten key topics in quantum information science and quantum coherent phenomena, aimed at graduate-student level. The chapters cover some of the most recent developments in this dynamic research field where theoretical and experimental physics, combined with computer science, provide a fascinating arena for groundbreaking new concepts in information processing. The book addresses both the theoretical and experimental aspects of the subject, and clearly demonstrates how progress in experimental techniques has stimulated a great deal of theoretical effort and vice versa. Experiments are shifting from simply preparing and measuring quantum states to controlling and manipulating them, and the book outlines how the first real applications, notably quantum key distribution for secure communication, are starting to emerge. The chapters cover quantum retrodiction, ultracold quantum gases in optical lattices, optomechanics, quantum algorithms, quantum key distribution, quantum cont...

  12. Information society studies

    CERN Document Server

    Duff, Alistair S

    2013-01-01

    We are often told that we are ""living in an information society"" or that we are ""information workers."" But what exactly do these claims mean, and how might they be verified? In this important methodological study, Alistair S. Duff cuts through the rhetoric to get to the bottom of the ""information society thesis."" Wide-ranging in coverage, this study will be of interest to scholars in information science, communication and media studies and social theory. It is a key text for the newly-unified specialism of information society studies, and an indispensable guide to the future of this disc

  13. Freshness-Preserving Non-Interactive Hierarchical Key Agreement Protocol over WHMS

    Directory of Open Access Journals (Sweden)

    Hyunsung Kim

    2014-12-01

    Full Text Available The digitization of patient health information (PHI for wireless health monitoring systems (WHMSs has brought many benefits and challenges for both patients and physicians. However, security, privacy and robustness have remained important challenges for WHMSs. Since the patient’s PHI is sensitive and the communication channel, i.e., the Internet, is insecure, it is important to protect them against unauthorized entities, i.e., attackers. Otherwise, failure to do so will not only lead to the compromise of a patient’s privacy, but will also put his/her life at risk. This paper proposes a freshness-preserving non-interactive hierarchical key agreement protocol (FNKAP for WHMSs. The FNKAP is based on the concept of the non-interactive identity-based key agreement for communication efficiency. It achieves patient anonymity between a patient and physician, session key secrecy and resistance against various security attacks, especially including replay attacks.

  14. Quantum key distribution over multicore fiber based on silicon photonics

    DEFF Research Database (Denmark)

    Ding, Yunhong; Bacco, Davide; Dalgaard, Kjeld

    on quantum physics. In order to exchange secure information between users, quantum key distribution (QKD), a branch of Quantum Communications (QCs), provides good prospects for ultimate security based on the laws of quantum mechanics [2–7]. Most of QKD systems are implemented in a point-to-point link using...... generations, to HD-entanglement distribution. Furthermore, MCFs are expected as a good candidate for overcoming the capacity limit of a current optical communication system, as example the record capacity of 661 Tbits/s was obtained last year with a 30-cores fiber [8]. Proof of concept experiment has already...... requirements in terms of key generation are needed. A solution may be represented by new technologies applied to quantum world. In particular multicore fiber (MCF) open a new scenario for quantum communications, from high-dimensional (HD) spatial entanglement generation, to HD QKD and multi-user key...

  15. Freshness-Preserving Non-Interactive Hierarchical Key Agreement Protocol over WHMS

    Science.gov (United States)

    Kim, Hyunsung

    2014-01-01

    The digitization of patient health information (PHI) for wireless health monitoring systems (WHMSs) has brought many benefits and challenges for both patients and physicians. However, security, privacy and robustness have remained important challenges for WHMSs. Since the patient's PHI is sensitive and the communication channel, i.e., the Internet, is insecure, it is important to protect them against unauthorized entities, i.e., attackers. Otherwise, failure to do so will not only lead to the compromise of a patient's privacy, but will also put his/her life at risk. This paper proposes a freshness-preserving non-interactive hierarchical key agreement protocol (FNKAP) for WHMSs. The FNKAP is based on the concept of the non-interactive identity-based key agreement for communication efficiency. It achieves patient anonymity between a patient and physician, session key secrecy and resistance against various security attacks, especially including replay attacks. PMID:25513824

  16. Enrichment of antioxidants from soy sauce using macroporous resin and identification of 4-ethylguaiacol, catechol, daidzein, and 4-ethylphenol as key small molecule antioxidants in soy sauce.

    Science.gov (United States)

    Li, Huipin; Lin, Lianzhu; Feng, Yunzi; Zhao, Mouming; Li, Xiuting; Zhu, Qiyuan; Xiao, Zuobing

    2018-02-01

    The adsorption and desorption characteristics of seven macroporous resins on the antioxidants in soy sauce were investigated. SP-207 and SP-825 resins possessing good adsorption and desorption capacities were studied further. The pseudo-second-order kinetics and Langmuir isotherm models were demonstrated to be appropriate to describe the whole exothermic and physical adsorption processes of antioxidants onto resins. The 60% ethanol eluted fraction from soy sauce purified by SP-825 resin column possessed the strongest antioxidant activity. The antioxidant activities and contents of typical soy isoflavones, furanones, pyranones, and phenolic acids in soy sauce were determined. These compounds contributed to 50.02% of the total antioxidant activity of the SP-60% fraction. The key small molecule antioxidant compounds in soy sauce were identified as 4-ethylguaiacol, catechol, daidzein, and 4-ethylphenol by the antioxidants omission experiments. Additionally, the purified active fraction with high contents of antioxidants from soy sauce could be applied as bioactive ingredient in food industry. Copyright © 2017 Elsevier Ltd. All rights reserved.

  17. Drug packaging. A key factor to be taken into account when choosing a treatment.

    Science.gov (United States)

    2011-10-01

    A drug's packaging contributes to its harm-benefit balance. Highlighting the key practical information and identifying potential sources of error or mix-ups is part and parcel of the correct use of medicines. Select labelling that clearly and prominently displays the important information, including the international nonproprietary name (INN).

  18. Information Quality of a Nursing Information System depends on the nurses: A combined quantitative and qualitative evaluation

    NARCIS (Netherlands)

    Michel-Verkerke, M.B.

    2012-01-01

    Purpose Providing access to patient information is the key factor in nurses’ adoption of a Nursing Information System (NIS). In this study the requirements for information quality and the perceived quality of information are investigated. A teaching hospital in the Netherlands has developed a NIS as

  19. Attachment and the processing of social information across the life span: theory and evidence.

    Science.gov (United States)

    Dykas, Matthew J; Cassidy, Jude

    2011-01-01

    Researchers have used J. Bowlby's (1969/1982, 1973, 1980, 1988) attachment theory frequently as a basis for examining whether experiences in close personal relationships relate to the processing of social information across childhood, adolescence, and adulthood. We present an integrative life-span-encompassing theoretical model to explain the patterns of results that have emerged from these studies. The central proposition is that individuals who possess secure experience-based internal working models of attachment will process--in a relatively open manner--a broad range of positive and negative attachment-relevant social information. Moreover, secure individuals will draw on their positive attachment-related knowledge to process this information in a positively biased schematic way. In contrast, individuals who possess insecure internal working models of attachment will process attachment-relevant social information in one of two ways, depending on whether the information could cause the individual psychological pain. If processing the information is likely to lead to psychological pain, insecure individuals will defensively exclude this information from further processing. If, however, the information is unlikely to lead to psychological pain, then insecure individuals will process this information in a negatively biased schematic fashion that is congruent with their negative attachment-related experiences. In a comprehensive literature review, we describe studies that illustrate these patterns of attachment-related information processing from childhood to adulthood. This review focuses on studies that have examined specific components (e.g., attention and memory) and broader aspects (e.g., attributions) of social information processing. We also provide general conclusions and suggestions for future research.

  20. Financial Key Ratios

    OpenAIRE

    Tănase Alin-Eliodor

    2014-01-01

    This article focuses on computing techniques starting from trial balance data regarding financial key ratios. There are presented activity, liquidity, solvency and profitability financial key ratios. It is presented a computing methodology in three steps based on a trial balance.