WorldWideScience

Sample records for proxy blind signature

  1. An Efficient Identity-Based Proxy Blind Signature for Semioffline Services

    Directory of Open Access Journals (Sweden)

    Hongfei Zhu

    2018-01-01

    Full Text Available Fog computing extends the cloud computing to the network edge and allows deploying a new type of semioffline services, which can provide real-time transactions between two entities, while the central cloud server is offline and network edge devices are online. For an e-payment system and e-voting with such feature, proxy blind signature is a cornerstone to protect users’ privacy. However, the signature based on number theorem, such as hard mathematical problems on factoring problem, discrete logarithm problem, and bilinear pairings, cannot defeat quantum computers attack. Meanwhile, these schemes need to depend on complex public key infrastructure. Thus, we construct an identity-based proxy blind signature scheme based on number theorem research unit lattice, which can defeat quantum computers attack and does not need to depend on public key infrastructure. The security of the proposed scheme is dependent on Ring-Small Integer Solution problem over number theorem research unit lattice. The proposed scheme meets the properties of blind signature and proxy signature. Then we compare the proposed scheme with other existing proxy blind signature schemes; the result shows that the proposed scheme outperforms ZM scheme except in proxy signer’s signature size and can be more secure than TA scheme and MMHP scheme.

  2. A Lattice-Based Identity-Based Proxy Blind Signature Scheme in the Standard Model

    Directory of Open Access Journals (Sweden)

    Lili Zhang

    2014-01-01

    Full Text Available A proxy blind signature scheme is a special form of blind signature which allowed a designated person called proxy signer to sign on behalf of original signers without knowing the content of the message. It combines the advantages of proxy signature and blind signature. Up to date, most proxy blind signature schemes rely on hard number theory problems, discrete logarithm, and bilinear pairings. Unfortunately, the above underlying number theory problems will be solvable in the postquantum era. Lattice-based cryptography is enjoying great interest these days, due to implementation simplicity and provable security reductions. Moreover, lattice-based cryptography is believed to be hard even for quantum computers. In this paper, we present a new identity-based proxy blind signature scheme from lattices without random oracles. The new scheme is proven to be strongly unforgeable under the standard hardness assumption of the short integer solution problem (SIS and the inhomogeneous small integer solution problem (ISIS. Furthermore, the secret key size and the signature length of our scheme are invariant and much shorter than those of the previous lattice-based proxy blind signature schemes. To the best of our knowledge, our construction is the first short lattice-based identity-based proxy blind signature scheme in the standard model.

  3. Improvement of a Quantum Proxy Blind Signature Scheme

    Science.gov (United States)

    Zhang, Jia-Lei; Zhang, Jian-Zhong; Xie, Shu-Cui

    2018-06-01

    Improvement of a quantum proxy blind signature scheme is proposed in this paper. Six-qubit entangled state functions as quantum channel. In our scheme, a trust party Trent is introduced so as to avoid David's dishonest behavior. The receiver David verifies the signature with the help of Trent in our scheme. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, delegation, signature and verification. Security analysis proves that our scheme has the properties of undeniability, unforgeability, anonymity and can resist some common attacks.

  4. A Quantum Proxy Weak Blind Signature Scheme Based on Controlled Quantum Teleportation

    Science.gov (United States)

    Cao, Hai-Jing; Yu, Yao-Feng; Song, Qin; Gao, Lan-Xiang

    2015-04-01

    Proxy blind signature is applied to the electronic paying system, electronic voting system, mobile agent system, security of internet, etc. A quantum proxy weak blind signature scheme is proposed in this paper. It is based on controlled quantum teleportation. Five-qubit entangled state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, so it could guarantee not only the unconditional security of the scheme but also the anonymity of the messages owner.

  5. A Quantum Multi-Proxy Weak Blind Signature Scheme Based on Entanglement Swapping

    Science.gov (United States)

    Yan, LiLi; Chang, Yan; Zhang, ShiBin; Han, GuiHua; Sheng, ZhiWei

    2017-02-01

    In this paper, we present a multi-proxy weak blind signature scheme based on quantum entanglement swapping of Bell states. In the scheme, proxy signers can finish the signature instead of original singer with his/her authority. It can be applied to the electronic voting system, electronic paying system, etc. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. It could guarantee not only the unconditionally security but also the anonymity of the message owner. The security analysis shows the scheme satisfies the security features of multi-proxy weak signature, singers cannot disavowal his/her signature while the signature cannot be forged by others, and the message owner can be traced.

  6. Some Proxy Signature and Designated verifier Signature Schemes over Braid Groups

    OpenAIRE

    Lal, Sunder; Verma, Vandani

    2009-01-01

    Braids groups provide an alternative to number theoretic public cryptography and can be implemented quite efficiently. The paper proposes five signature schemes: Proxy Signature, Designated Verifier, Bi-Designated Verifier, Designated Verifier Proxy Signature And Bi-Designated Verifier Proxy Signature scheme based on braid groups. We also discuss the security aspects of each of the proposed schemes.

  7. Secure Mobile Agent from Leakage-Resilient Proxy Signatures

    Directory of Open Access Journals (Sweden)

    Fei Tang

    2015-01-01

    Full Text Available A mobile agent can sign a message in a remote server on behalf of a customer without exposing its secret key; it can be used not only to search for special products or services, but also to make a contract with a remote server. Hence a mobile agent system can be used for electronic commerce as an important key technology. In order to realize such a system, Lee et al. showed that a secure mobile agent can be constructed using proxy signatures. Intuitively, a proxy signature permits an entity (delegator to delegate its signing right to another entity (proxy to sign some specified messages on behalf of the delegator. However, the proxy signatures are often used in scenarios where the signing is done in an insecure environment, for example, the remote server of a mobile agent system. In such setting, an adversary could launch side-channel attacks to exploit some leakage information about the proxy key or even other secret states. The proxy signatures which are secure in the traditional security models obviously cannot provide such security. Based on this consideration, in this paper, we design a leakage-resilient proxy signature scheme for the secure mobile agent systems.

  8. Fair quantum blind signatures

    International Nuclear Information System (INIS)

    Tian-Yin, Wang; Qiao-Yan, Wen

    2010-01-01

    We present a new fair blind signature scheme based on the fundamental properties of quantum mechanics. In addition, we analyse the security of this scheme, and show that it is not possible to forge valid blind signatures. Moreover, comparisons between this scheme and public key blind signature schemes are also discussed. (general)

  9. Blind Quantum Signature with Blind Quantum Computation

    Science.gov (United States)

    Li, Wei; Shi, Ronghua; Guo, Ying

    2017-04-01

    Blind quantum computation allows a client without quantum abilities to interact with a quantum server to perform a unconditional secure computing protocol, while protecting client's privacy. Motivated by confidentiality of blind quantum computation, a blind quantum signature scheme is designed with laconic structure. Different from the traditional signature schemes, the signing and verifying operations are performed through measurement-based quantum computation. Inputs of blind quantum computation are securely controlled with multi-qubit entangled states. The unique signature of the transmitted message is generated by the signer without leaking information in imperfect channels. Whereas, the receiver can verify the validity of the signature using the quantum matching algorithm. The security is guaranteed by entanglement of quantum system for blind quantum computation. It provides a potential practical application for e-commerce in the cloud computing and first-generation quantum computation.

  10. Design and Implementation of a Mobile Voting System Using a Novel Oblivious and Proxy Signature

    Directory of Open Access Journals (Sweden)

    Shin-Yan Chiou

    2017-01-01

    Full Text Available Electronic voting systems can make the voting process much more convenient. However, in such systems, if a server signs blank votes before users vote, it may cause undue multivoting. Furthermore, if users vote before the signing of the server, voting information will be leaked to the server and may be compromised. Blind signatures could be used to prevent leaking voting information from the server; however, malicious users could produce noncandidate signatures for illegal usage at that time or in the future. To overcome these problems, this paper proposes a novel oblivious signature scheme with a proxy signature function to satisfy security requirements such as information protection, personal privacy, and message verification and to ensure that no one can cheat other users (including the server. We propose an electronic voting system based on the proposed oblivious and proxy signature scheme and implement this scheme in a smartphone application to allow users to vote securely and conveniently. Security analyses and performance comparisons are provided to show the capability and efficiency of the proposed scheme.

  11. Blinding for unanticipated signatures

    NARCIS (Netherlands)

    D. Chaum (David)

    1987-01-01

    textabstractPreviously known blind signature systems require an amount of computation at least proportional to the number of signature types, and also that the number of such types be fixed in advance. These requirements are not practical in some applications. Here, a new blind signature technique

  12. Revocable identity-based proxy re-signature against signing key exposure.

    Science.gov (United States)

    Yang, Xiaodong; Chen, Chunlin; Ma, Tingchun; Wang, Jinli; Wang, Caifen

    2018-01-01

    Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key. Due to this transformation function, IDPRS is very useful in constructing privacy-preserving schemes for various information systems. Key revocation functionality is important in practical IDPRS for managing users dynamically; however, the existing IDPRS schemes do not provide revocation mechanisms that allow the removal of misbehaving or compromised users from the system. In this paper, we first introduce a notion called revocable identity-based proxy re-signature (RIDPRS) to achieve the revocation functionality. We provide a formal definition of RIDPRS as well as its security model. Then, we present a concrete RIDPRS scheme that can resist signing key exposure and prove that the proposed scheme is existentially unforgeable against adaptive chosen identity and message attacks in the standard model. To further improve the performance of signature verification in RIDPRS, we introduce a notion called server-aided revocable identity-based proxy re-signature (SA-RIDPRS). Moreover, we extend the proposed RIDPRS scheme to the SA-RIDPRS scheme and prove that this extended scheme is secure against adaptive chosen message and collusion attacks. The analysis results show that our two schemes remain efficient in terms of computational complexity when implementing user revocation procedures. In particular, in the SA-RIDPRS scheme, the verifier needs to perform only a bilinear pairing and four exponentiation operations to verify the validity of the signature. Compared with other IDPRS schemes in the standard model, our SA-RIDPRS scheme greatly reduces the computation overhead of verification.

  13. Restrictive partially blind signature for resource-constrained information systems

    NARCIS (Netherlands)

    Qiu, Weidong; Gong, Zheng; Liu, Bozhong; Long, Yu; Chen, Kefei

    2010-01-01

    Restrictive partially blind signature, which is designed for privacy oriented information systems, allows a user to obtain a blind signature from a signer whilst the blind message must obey some certain rules. In order to reduce storage and communication costs, several public-key cryptosystems are

  14. Quantum blind dual-signature scheme without arbitrator

    International Nuclear Information System (INIS)

    Li, Wei; Shi, Ronghua; Huang, Dazu; Shi, Jinjing; Guo, Ying

    2016-01-01

    Motivated by the elegant features of a bind signature, we suggest the design of a quantum blind dual-signature scheme with three phases, i.e., initial phase, signing phase and verification phase. Different from conventional schemes, legal messages are signed not only by the blind signatory but also by the sender in the signing phase. It does not rely much on an arbitrator in the verification phase as the previous quantum signature schemes usually do. The security is guaranteed by entanglement in quantum information processing. Security analysis demonstrates that the signature can be neither forged nor disavowed by illegal participants or attacker. It provides a potential application for e-commerce or e-payment systems with the current technology. (paper)

  15. Quantum blind dual-signature scheme without arbitrator

    Science.gov (United States)

    Li, Wei; Shi, Ronghua; Huang, Dazu; Shi, Jinjing; Guo, Ying

    2016-03-01

    Motivated by the elegant features of a bind signature, we suggest the design of a quantum blind dual-signature scheme with three phases, i.e., initial phase, signing phase and verification phase. Different from conventional schemes, legal messages are signed not only by the blind signatory but also by the sender in the signing phase. It does not rely much on an arbitrator in the verification phase as the previous quantum signature schemes usually do. The security is guaranteed by entanglement in quantum information processing. Security analysis demonstrates that the signature can be neither forged nor disavowed by illegal participants or attacker. It provides a potential application for e-commerce or e-payment systems with the current technology.

  16. A Weak Quantum Blind Signature with Entanglement Permutation

    Science.gov (United States)

    Lou, Xiaoping; Chen, Zhigang; Guo, Ying

    2015-09-01

    Motivated by the permutation encryption algorithm, a weak quantum blind signature (QBS) scheme is proposed. It involves three participants, including the sender Alice, the signatory Bob and the trusted entity Charlie, in four phases, i.e., initializing phase, blinding phase, signing phase and verifying phase. In a small-scale quantum computation network, Alice blinds the message based on a quantum entanglement permutation encryption algorithm that embraces the chaotic position string. Bob signs the blinded message with private parameters shared beforehand while Charlie verifies the signature's validity and recovers the original message. Analysis shows that the proposed scheme achieves the secure blindness for the signer and traceability for the message owner with the aid of the authentic arbitrator who plays a crucial role when a dispute arises. In addition, the signature can neither be forged nor disavowed by the malicious attackers. It has a wide application to E-voting and E-payment system, etc.

  17. Re-examining the security of blind quantum signature protocols

    International Nuclear Information System (INIS)

    Wang Mingming; Chen Xiubo; Niu Xinxin; Yang Yixian

    2012-01-01

    Recently, blind quantum signature (BQS) protocols have been proposed with the help of a third-party verifier. However, our research shows that some of the BQS protocols are unable to complete the blind signature task fairly if the verifier is dishonest. Indeed, these protocols can be viewed as variants of the classical digital signature scheme of symmetric-key cryptography. If nobody is trusted in such protocols, digital signature cannot be implemented since disagreements cannot be solved fairly.

  18. Method of Anti-Virus Protection Based on (n, t Threshold Proxy Signature with an Arbitrator

    Directory of Open Access Journals (Sweden)

    E. A. Tolyupa

    2014-01-01

    Full Text Available The article suggests the method of anti-virus protection of mobile devices based on the usage of proxy digital signatures and an (n;t-threshold proxy signature scheme with an arbitrator. The unique feature of the suggested method is in the absence of necessity to install anti-virus software in a mobile device. It will be enough only to have the software verifying digital signatures and the Internet. The method is used on the base of public keys infrastructure /PKI/, thus minimizing implementation expenses.

  19. An Anonymous Access Authentication Scheme Based on Proxy Ring Signature for CPS-WMNs

    Directory of Open Access Journals (Sweden)

    Tianhan Gao

    2017-01-01

    Full Text Available Access security and privacy have become a bottleneck for the popularization of future Cyber-Physical System (CPS networks. Furthermore, users’ need for privacy-preserved access during movement procedure is more urgent. To address the anonymous access authentication issue for CPS Wireless Mesh Network (CPS-WMN, a novel anonymous access authentication scheme based on proxy ring signature is proposed. A hierarchical authentication architecture is presented first. The scheme is then achieved from the aspect of intergroup and intragroup anonymous mutual authentication through proxy ring signature mechanism and certificateless signature mechanism, respectively. We present a formal security proof of the proposed protocol with SVO logic. The simulation and performance analysis demonstrate that the proposed scheme owns higher efficiency and adaptability than the typical one.

  20. The effects of extrinsic motivation on signature authorship opinions in forensic signature blind trials.

    Science.gov (United States)

    Dewhurst, Tahnee N; Found, Bryan; Ballantyne, Kaye N; Rogers, Doug

    2014-03-01

    Expertise studies in forensic handwriting examination involve comparisons of Forensic Handwriting Examiners' (FHEs) opinions with lay-persons on blind tests. All published studies of this type have reported real and demonstrable skill differences between the specialist and lay groups. However, critics have proposed that any difference shown may be indicative of a lack of motivation on the part of lay participants, rather than a real difference in skill. It has been suggested that qualified FHEs would be inherently more motivated to succeed in blinded validation trials, as their professional reputations could be at risk, should they perform poorly on the task provided. Furthermore, critics suggest that lay-persons would be unlikely to be highly motivated to succeed, as they would have no fear of negative consequences should they perform badly. In an effort to investigate this concern, a blind signature trial was designed and administered to forty lay-persons. Participants were required to compare known (exemplar) signatures of an individual to questioned signatures and asked to express an opinion regarding whether the writer of the known signatures wrote each of the questioned signatures. The questioned signatures comprised a mixture of genuine, disguised and simulated signatures. The forty participants were divided into two separate groupings. Group 'A' were requested to complete the trial as directed and were advised that for each correct answer they would be financially rewarded, for each incorrect answer they would be financially penalized, and for each inconclusive opinion they would receive neither penalty nor reward. Group 'B' was requested to complete the trial as directed, with no mention of financial recompense or penalty. The results of this study do not support the proposition that motivation rather than skill difference is the source of the statistical difference in opinions between individuals' results in blinded signature proficiency trials. Crown

  1. An ID-based Blind Signature Scheme from Bilinear Pairings

    OpenAIRE

    B.Umaprasada Rao; K.A.Ajmath

    2010-01-01

    Blind signatures, introduced by Chaum, allow a user to obtain a signature on a message without revealing any thing about the message to the signer. Blind signatures play on important role in plenty of applications such as e-voting, e-cash system where anonymity is of great concern. Identity based(ID-based) public key cryptography can be a good alternative for certified based public key setting, especially when efficient key management and moderate security are required. In this paper, we prop...

  2. A sessional blind signature based on quantum cryptography

    Science.gov (United States)

    Khodambashi, Siavash; Zakerolhosseini, Ali

    2014-01-01

    In this paper, we present a sessional blind signature protocol whose security is guaranteed by fundamental principles of quantum physics. It allows a message owner to get his message signed by an authorized signatory. However, the signatory is not capable of reading the message contents and everyone can verify authenticity of the message. For this purpose, we took advantage of a sessional signature as well as quantum entangled pairs which are generated with respect to it in our proposed protocol. We describe our proposed blind signature through an example and briefly discuss about its unconditional security. Due to the feasibility of the protocol, it can be widely employed for e-payment, e-government, e-business and etc.

  3. Arbitrated Quantum Signature with Hamiltonian Algorithm Based on Blind Quantum Computation

    Science.gov (United States)

    Shi, Ronghua; Ding, Wanting; Shi, Jinjing

    2018-03-01

    A novel arbitrated quantum signature (AQS) scheme is proposed motivated by the Hamiltonian algorithm (HA) and blind quantum computation (BQC). The generation and verification of signature algorithm is designed based on HA, which enables the scheme to rely less on computational complexity. It is unnecessary to recover original messages when verifying signatures since the blind quantum computation is applied, which can improve the simplicity and operability of our scheme. It is proved that the scheme can be deployed securely, and the extended AQS has some extensive applications in E-payment system, E-government, E-business, etc.

  4. A New Quantum Proxy Multi-signature Scheme Using Maximally Entangled Seven-Qubit States

    Science.gov (United States)

    Cao, Hai-Jing; Zhang, Jia-Fu; Liu, Jian; Li, Zeng-You

    2016-02-01

    In this paper, we propose a new secure quantum proxy multi-signature scheme using seven-qubit entangled quantum state as quantum channels, which may have applications in e-payment system, e-government, e-business, etc. This scheme is based on controlled quantum teleportation. The scheme uses the physical characteristics of quantum mechanics to guarantee its anonymity, verifiability, traceability, unforgetability and undeniability.

  5. A Third-Party E-Payment Protocol Based on Quantum Group Blind Signature

    Science.gov (United States)

    Zhang, Jian-Zhong; Yang, Yuan-Yuan; Xie, Shu-Cui

    2017-09-01

    A third-party E-payment protocol based on quantum group blind signature is proposed in this paper. Our E-payment protocol could protect user's anonymity as the traditional E-payment systems do, and also have unconditional security which the classical E-payment systems can not provide. To achieve that, quantum key distribution, one-time pad and quantum group blind signature are adopted in our scheme. Furthermore, if there were a dispute, the manager Trent can identify who tells a lie.

  6. Blind Quantum Signature with Controlled Four-Particle Cluster States

    Science.gov (United States)

    Li, Wei; Shi, Jinjing; Shi, Ronghua; Guo, Ying

    2017-08-01

    A novel blind quantum signature scheme based on cluster states is introduced. Cluster states are a type of multi-qubit entangled states and it is more immune to decoherence than other entangled states. The controlled four-particle cluster states are created by acting controlled-Z gate on particles of four-particle cluster states. The presented scheme utilizes the above entangled states and simplifies the measurement basis to generate and verify the signature. Security analysis demonstrates that the scheme is unconditional secure. It can be employed to E-commerce systems in quantum scenario.

  7. Supervised Multi-Authority Scheme with Blind Signature for IoT with Attribute Based Encryption

    Science.gov (United States)

    Nissenbaum, O. V.; Ponomarov, K. Y.; Zaharov, A. A.

    2018-04-01

    This article proposes a three-side cryptographic scheme for verifying device attributes with a Supervisor and a Certification Authority (CA) for attribute-based encryption. Two options are suggested: using a message authentication code and using a digital signature. The first version is suitable for networks with one CA, and the second one for networks with several CAs, including dynamic systems. Also, the addition of this scheme with a blind signature is proposed to preserve the confidentiality of the device attributes from the CA. The introduction gives a definition and a brief historical overview of attribute-based encryption (ABE), addresses the use of ABE in the Internet of Things.

  8. Arctic and Antarctic Oscillation signatures in tropical coral proxies over the South China Sea

    Directory of Open Access Journals (Sweden)

    D.-Y. Gong

    2009-05-01

    Full Text Available Arctic Oscillation (AO and Antarctic Oscillation (AAO are the leading modes of atmospheric circulation in mid-high latitudes. Previous studies have revealed that the climatic influences of the two modes are dominant in extra-tropical regions. This study finds that AO and AAO signals are also well recorded in coral proxies in the tropical South China Sea. There are significant interannual signals of AO and AAO in the strontium (Sr content, which represents the sea surface temperature (SST. Among all the seasons, the most significant correlation occurs during winter in both hemispheres: the strongest AO-Sr and AAO-Sr coral correlations occur in January and August, respectively. This study also determined that the Sr content lags behind AO and AAO by 1–3 months. Large-scale anomalies in sea level pressure and horizontal wind at 850 hPa level support the strength of AO/AAO-coral teleconnections. In addition, a comparison with oxygen isotope records from two coral sites in neighboring oceans yields significant AO and AAO signatures with similar time lags. These results help to better understand monsoon climates and their teleconnection to high-latitude climate changes.

  9. Digital Signature Schemes with Complementary Functionality and Applications

    OpenAIRE

    S. N. Kyazhin

    2012-01-01

    Digital signature schemes with additional functionality (an undeniable signature, a signature of the designated confirmee, a signature blind, a group signature, a signature of the additional protection) and examples of their application are considered. These schemes are more practical, effective and useful than schemes of ordinary digital signature.

  10. Cryptanalytic Performance Appraisal of Improved CCH2 Proxy Multisignature Scheme

    Directory of Open Access Journals (Sweden)

    Raman Kumar

    2014-01-01

    Full Text Available Many of the signature schemes are proposed in which the t out of n threshold schemes are deployed, but they still lack the property of security. In this paper, we have discussed implementation of improved CCH1 and improved CCH2 proxy multisignature scheme based on elliptic curve cryptosystem. We have represented time complexity, space complexity, and computational overhead of improved CCH1 and CCH2 proxy multisignature schemes. We have presented cryptanalysis of improved CCH2 proxy multisignature scheme and showed that improved CCH2 scheme suffered from various attacks, that is, forgery attack and framing attack.

  11. Perancangan Aplikasi Undeniable Digital Signature Dengan Algoritma Chaum’s Blind Signature

    OpenAIRE

    Simanjuntak, Martin Dennain

    2012-01-01

    Desperaty need a securiry system in the exchange of information via computer media, so that information can not be accessed by unauthorized parties. One of the security system is to use a system of digital signatures as a means of authenticating the authenticity of digital document that are exchanged. By using a digital a digital signature system is undeniable, the security system can be generated digital document exchange, where the system is free from the from of rejection...

  12. A Robust Blind Quantum Copyright Protection Method for Colored Images Based on Owner's Signature

    Science.gov (United States)

    Heidari, Shahrokh; Gheibi, Reza; Houshmand, Monireh; Nagata, Koji

    2017-08-01

    Watermarking is the imperceptible embedding of watermark bits into multimedia data in order to use for different applications. Among all its applications, copyright protection is the most prominent usage which conceals information about the owner in the carrier, so as to prohibit others from assertion copyright. This application requires high level of robustness. In this paper, a new blind quantum copyright protection method based on owners's signature in RGB images is proposed. The method utilizes one of the RGB channels as indicator and two remained channels are used for embedding information about the owner. In our contribution the owner's signature is considered as a text. Therefore, in order to embed in colored image as watermark, a new quantum representation of text based on ASCII character set is offered. Experimental results which are analyzed in MATLAB environment, exhibit that the presented scheme shows good performance against attacks and can be used to find out who the real owner is. Finally, the discussed quantum copyright protection method is compared with a related work that our analysis confirm that the presented scheme is more secure and applicable than the previous ones currently found in the literature.

  13. Climate proxy data as groundwater tracers in regional flow systems

    Science.gov (United States)

    Clark, J. F.; Morrissey, S. K.; Stute, M.

    2008-05-01

    The isotopic and chemical signatures of groundwater reflect local climate conditions. By systematically analyzing groundwater and determining their hydrologic setting, records of past climates can be constructed. Because of their chemistries and relatively uncomplicated source functions, dissolved noble gases have yielded reliable records of continental temperatures for the last 30,000 to 50,000 years. Variations in the stable isotope compositions of groundwater due to long term climate changes have also been documented over these time scales. Because glacial - interglacial climate changes are relatively well known, these climate proxies can be used as "stratigraphic" markers within flow systems and used to distinguish groundwaters that have recharged during the Holocene from those recharged during the last glacial period, important time scales for distinguishing regional and local flow systems in many aquifers. In southern Georgia, the climate proxy tracers were able to identify leakage from surface aquifers into the Upper Floridan aquifer in areas previously thought to be confined. In south Florida, the transition between Holocene and glacial signatures in the Upper Floridan aquifer occurs mid-way between the recharge area and Lake Okeechobee. Down gradient of the lake, the proxies are uniform, indicating recharge during the last glacial period. Furthermore, there is no evidence for leakage from the shallow aquifers into the Upper Floridan. In the Lower Floridan, the climate proxies indicate that the saline water entered the aquifer after sea level rose to its present level.

  14. A group signature scheme based on quantum teleportation

    International Nuclear Information System (INIS)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu

    2010-01-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  15. A group signature scheme based on quantum teleportation

    Energy Technology Data Exchange (ETDEWEB)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu, E-mail: wxjun36@gmail.co [Information Countermeasure Technique Research Institute, Harbin Institute of Technology, Harbin 150001 (China)

    2010-05-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  16. Inferring climate variability from skewed proxy records

    Science.gov (United States)

    Emile-Geay, J.; Tingley, M.

    2013-12-01

    compared to other proxy records. (2) a multiproxy reconstruction of temperature over the Common Era (Mann et al., 2009), where we find that about one third of the records display significant departures from normality. Accordingly, accounting for skewness in proxy predictors has a notable influence on both reconstructed global mean and spatial patterns of temperature change. Inferring climate variability from skewed proxy records thus requires cares, but can be done with relatively simple tools. References - Mann, M. E., Z. Zhang, S. Rutherford, R. S. Bradley, M. K. Hughes, D. Shindell, C. Ammann, G. Faluvegi, and F. Ni (2009), Global signatures and dynamical origins of the little ice age and medieval climate anomaly, Science, 326(5957), 1256-1260, doi:10.1126/science.1177303. - Moy, C., G. Seltzer, D. Rodbell, and D. Anderson (2002), Variability of El Niño/Southern Oscillation activ- ity at millennial timescales during the Holocene epoch, Nature, 420(6912), 162-165.

  17. Sea ice and primary production proxies in surface sediments from a High Arctic Greenland fjord

    DEFF Research Database (Denmark)

    Ribeiro, Sofia; Sejr, Mikael K; Limoges, Audrey

    2017-01-01

    Monitoring Programme. Clear spatial gradients in organic carbon and biogenic silica contents reflected marine influence, nutrient availability and river-induced turbidity, in good agreement with in situ measurements. The sea ice proxy IP25 was detected at all sites but at low concentrations, indicating...... that IP25 records from fjords need to be carefully considered and not directly compared to marine settings. The sea ice-associated biomarker HBI III revealed an open-water signature, with highest concentrations near the mid-July ice edge. This proxy evaluation is an important step towards reliable......In order to establish a baseline for proxy-based reconstructions for the Young Sound–Tyrolerfjord system (Northeast Greenland), we analysed the spatial distribution of primary production and sea ice proxies in surface sediments from the fjord, against monitoring data from the Greenland Ecosystem...

  18. Performance Analysis of Blind Subspace-Based Signature Estimation Algorithms for DS-CDMA Systems with Unknown Correlated Noise

    Science.gov (United States)

    Zarifi, Keyvan; Gershman, Alex B.

    2006-12-01

    We analyze the performance of two popular blind subspace-based signature waveform estimation techniques proposed by Wang and Poor and Buzzi and Poor for direct-sequence code division multiple-access (DS-CDMA) systems with unknown correlated noise. Using the first-order perturbation theory, analytical expressions for the mean-square error (MSE) of these algorithms are derived. We also obtain simple high SNR approximations of the MSE expressions which explicitly clarify how the performance of these techniques depends on the environmental parameters and how it is related to that of the conventional techniques that are based on the standard white noise assumption. Numerical examples further verify the consistency of the obtained analytical results with simulation results.

  19. An Economic Analysis of Color-Blind Affirmative Action

    OpenAIRE

    Tolga Yuret

    2008-01-01

    This article offers an economic analysis of color-blind alternatives to conventional affirmative action policies in higher education, focusing on efficiency issues. When the distribution of applicants' traits is fixed (i.e., in the short-run) color blindness leads colleges to shift weight from academic traits that predict performance to social traits that proxy for race. Using data on matriculates at several selective colleges and universities, we estimate that the short-run efficiency cost o...

  20. Motif signatures of transcribed enhancers

    KAUST Repository

    Kleftogiannis, Dimitrios

    2017-09-14

    In mammalian cells, transcribed enhancers (TrEn) play important roles in the initiation of gene expression and maintenance of gene expression levels in spatiotemporal manner. One of the most challenging questions in biology today is how the genomic characteristics of enhancers relate to enhancer activities. This is particularly critical, as several recent studies have linked enhancer sequence motifs to specific functional roles. To date, only a limited number of enhancer sequence characteristics have been investigated, leaving space for exploring the enhancers genomic code in a more systematic way. To address this problem, we developed a novel computational method, TELS, aimed at identifying predictive cell type/tissue specific motif signatures. We used TELS to compile a comprehensive catalog of motif signatures for all known TrEn identified by the FANTOM5 consortium across 112 human primary cells and tissues. Our results confirm that distinct cell type/tissue specific motif signatures characterize TrEn. These signatures allow discriminating successfully a) TrEn from random controls, proxy of non-enhancer activity, and b) cell type/tissue specific TrEn from enhancers expressed and transcribed in different cell types/tissues. TELS codes and datasets are publicly available at http://www.cbrc.kaust.edu.sa/TELS.

  1. An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks.

    Science.gov (United States)

    Zhu, Hongfei; Tan, Yu-An; Zhu, Liehuang; Wang, Xianmin; Zhang, Quanxin; Li, Yuanzhang

    2018-05-22

    With the development of wireless sensor networks, IoT devices are crucial for the Smart City; these devices change people's lives such as e-payment and e-voting systems. However, in these two systems, the state-of-art authentication protocols based on traditional number theory cannot defeat a quantum computer attack. In order to protect user privacy and guarantee trustworthy of big data, we propose a new identity-based blind signature scheme based on number theorem research unit lattice, this scheme mainly uses a rejection sampling theorem instead of constructing a trapdoor. Meanwhile, this scheme does not depend on complex public key infrastructure and can resist quantum computer attack. Then we design an e-payment protocol using the proposed scheme. Furthermore, we prove our scheme is secure in the random oracle, and satisfies confidentiality, integrity, and non-repudiation. Finally, we demonstrate that the proposed scheme outperforms the other traditional existing identity-based blind signature schemes in signing speed and verification speed, outperforms the other lattice-based blind signature in signing speed, verification speed, and signing secret key size.

  2. An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hongfei Zhu

    2018-05-01

    Full Text Available With the development of wireless sensor networks, IoT devices are crucial for the Smart City; these devices change people’s lives such as e-payment and e-voting systems. However, in these two systems, the state-of-art authentication protocols based on traditional number theory cannot defeat a quantum computer attack. In order to protect user privacy and guarantee trustworthy of big data, we propose a new identity-based blind signature scheme based on number theorem research unit lattice, this scheme mainly uses a rejection sampling theorem instead of constructing a trapdoor. Meanwhile, this scheme does not depend on complex public key infrastructure and can resist quantum computer attack. Then we design an e-payment protocol using the proposed scheme. Furthermore, we prove our scheme is secure in the random oracle, and satisfies confidentiality, integrity, and non-repudiation. Finally, we demonstrate that the proposed scheme outperforms the other traditional existing identity-based blind signature schemes in signing speed and verification speed, outperforms the other lattice-based blind signature in signing speed, verification speed, and signing secret key size.

  3. Water Isotope Proxy-Proxy and Proxy-Model Convergence for Late Pleistocene East Asian Monsoon Rainfall Reconstructions

    Science.gov (United States)

    Clemens, S. C.; Holbourn, A.; Kubota, Y.; Lee, K. E.; Liu, Z.; Chen, G.

    2017-12-01

    Confidence in reconstruction of East Asian paleomonsoon rainfall using precipitation isotope proxies is a matter of considerable debate, largely due to the lack of correlation between precipitation amount and isotopic composition in the present climate. We present four new, very highly resolved records spanning the past 300,000 years ( 200 year sample spacing) from IODP Site U1429 in the East China Sea. We demonstrate that all the orbital- and millennial-scale variance in the onshore Yangtze River Valley speleothem δ18O record1 is also embedded in the offshore Site U1429 seawater δ18O record (derived from the planktonic foraminifer Globigerinoides ruber and sea surface temperature reconstructions). Signal replication in these two independent terrestrial and marine archives, both controlled by the same monsoon system, uniquely identifies δ18O of precipitation as the primary driver of the precession-band variance in both records. This proxy-proxy convergence also eliminates a wide array of other drivers that have been called upon as potential contaminants to the precipitation δ18O signal recorded by these proxies. We compare East Asian precipitation isotope proxy records to precipitation amount from a CCSM3 transient climate model simulation of the past 300,000 years using realistic insolation, ice volume, greenhouse gasses, and sea level boundary conditions. This model-proxy comparison suggests that both Yangtze River Valley precipitation isotope proxies (seawater and speleothem δ18O) track changes in summer-monsoon rainfall amount at orbital time scales, as do precipitation isotope records from the Pearl River Valley2 (leaf wax δ2H) and Borneo3 (speleothem δ18O). Notably, these proxy records all have significantly different spectral structure indicating strongly regional rainfall patterns that are also consistent with model results. Transient, isotope-enabled model simulations will be necessary to more thoroughly evaluate these promising results, and to

  4. The Last Millennium Reanalysis: Improvements to proxies and proxy modeling

    Science.gov (United States)

    Tardif, R.; Hakim, G. J.; Emile-Geay, J.; Noone, D.; Anderson, D. M.

    2017-12-01

    The Last Millennium Reanalysis (LMR) employs a paleoclimate data assimilation (PDA) approach to produce climate field reconstructions (CFRs). Here, we focus on two key factors in PDA generated CFRs: the set of assimilated proxy records and forward models (FMs) used to estimate proxies from climate model output. In the initial configuration of the LMR [Hakim et al., 2016], the proxy dataset of [PAGES2k Consortium, 2013] was used, along with univariate linear FMs calibrated against annually-averaged 20th century temperature datasets. In an updated configuration, proxy records from the recent dataset [PAGES2k Consortium, 2017] are used, while a hierarchy of statistical FMs are tested: (1) univariate calibrated on annual temperature as in the initial configuration, (2) univariate against temperature as in (1) but calibration performed using expert-derived seasonality for individual proxy records, (3) as in (2) but expert proxy seasonality replaced by seasonal averaging determined objectively as part of the calibration process, (4) linear objective seasonal FMs as in (3) but objectively selecting relationships calibrated either on temperature or precipitation, and (5) bivariate linear models calibrated on temperature and precipitation with objectively-derived seasonality. (4) and (5) specifically aim at better representing the physical drivers of tree ring width proxies. Reconstructions generated using the CCSM4 Last Millennium simulation as an uninformed prior are evaluated against various 20th century data products. Results show the benefits of using the new proxy collection, particularly on the detrended global mean temperature and spatial patterns. The positive impact of using proper seasonality and temperature/moisture sensitivities for tree ring width records is also notable. This updated configuration will be used for the first generation of LMR-generated CFRs to be publicly released. These also provide a benchmark for future efforts aimed at evaluating the

  5. Comparing proxy and model estimates of hydroclimate variability and change over the Common Era

    Science.gov (United States)

    Hydro2k Consortium, Pages

    2017-12-01

    Water availability is fundamental to societies and ecosystems, but our understanding of variations in hydroclimate (including extreme events, flooding, and decadal periods of drought) is limited because of a paucity of modern instrumental observations that are distributed unevenly across the globe and only span parts of the 20th and 21st centuries. Such data coverage is insufficient for characterizing hydroclimate and its associated dynamics because of its multidecadal to centennial variability and highly regionalized spatial signature. High-resolution (seasonal to decadal) hydroclimatic proxies that span all or parts of the Common Era (CE) and paleoclimate simulations from climate models are therefore important tools for augmenting our understanding of hydroclimate variability. In particular, the comparison of the two sources of information is critical for addressing the uncertainties and limitations of both while enriching each of their interpretations. We review the principal proxy data available for hydroclimatic reconstructions over the CE and highlight the contemporary understanding of how these proxies are interpreted as hydroclimate indicators. We also review the available last-millennium simulations from fully coupled climate models and discuss several outstanding challenges associated with simulating hydroclimate variability and change over the CE. A specific review of simulated hydroclimatic changes forced by volcanic events is provided, as is a discussion of expected improvements in estimated radiative forcings, models, and their implementation in the future. Our review of hydroclimatic proxies and last-millennium model simulations is used as the basis for articulating a variety of considerations and best practices for how to perform proxy-model comparisons of CE hydroclimate. This discussion provides a framework for how best to evaluate hydroclimate variability and its associated dynamics using these comparisons and how they can better inform

  6. Multi-proxy studies in palaeolimnology

    OpenAIRE

    Birks, Hilary H.; Birks, Harry John Betteley

    2006-01-01

    Multi-proxy studies are becoming increasingly common in palaeolimnology. Eight basic requirements and challenges for a multi-proxy study are outlined in this essay – definition of research questions, leadership, site selection and coring, data storage, chronology, presentation of results, numerical tools, and data interpretation. The nature of proxy data is discussed in terms of physical proxies and biotic proxies. Loss-on-ignition changes and the use of transfer functions are reviewed as exa...

  7. Here be web proxies

    DEFF Research Database (Denmark)

    Weaver, Nicholas; Kreibich, Christian; Dam, Martin

    2014-01-01

    ,000 clients that include a novel proxy location technique based on traceroutes of the responses to TCP connection establishment requests, which provides additional clues regarding the purpose of the identified web proxies. Overall, we see 14% of Netalyzr-analyzed clients with results that suggest the presence...... of web proxies....

  8. Jemen - the Proxy War

    Directory of Open Access Journals (Sweden)

    Magdalena El Ghamari

    2015-12-01

    Full Text Available The military operation in Yemen is significant departure from Saudi Arabia's foreign policy tradition and customs. Riyadh has always relied on three strategies to pursue its interests abroad: wealth, establish a global network and muslim education and diplomacy and meadiation. The term "proxy war" has experienced a new popularity in stories on the Middle East. A proxy war is two opposing countries avoiding direct war, and instead supporting combatants that serve their interests. In some occasions, one country is a direct combatant whilst the other supporting its enemy. Various news sources began using the term to describe the conflict in Yemen immediately, as if on cue, after Saudi Arabia launched its bombing campaign against Houthi targets in Yemen on 25 March 2015. This is the reason, why author try to answer for following questions: Is the Yemen Conflict Devolves into Proxy War? and Who's fighting whom in Yemen's proxy war?" Research area includes the problem of proxy war in the Middle East. For sure, the real problem of proxy war must begin with the fact that the United States and its NATO allies opened the floodgates for regional proxy wars by the two major wars for regime change: in Iraq and Libya. Those two destabilising wars provided opportunities and motives for Sunni states across the Middle East to pursue their own sectarian and political power objectives through "proxy war".

  9. A New Proxy Electronic Voting Scheme Achieved by Six-Particle Entangled States

    Science.gov (United States)

    Cao, Hai-Jing; Ding, Li-Yuan; Jiang, Xiu-Li; Li, Peng-Fei

    2018-03-01

    In this paper, we use quantum proxy signature to construct a new secret electronic voting scheme. In our scheme, six particles entangled states function as quantum channels. The voter Alice, the Vote Management Center Bob, the scrutineer Charlie only perform two particles measurements on the Bell bases to realize the electronic voting process. So the scheme reduces the technical difficulty and increases operation efficiency. We use quantum key distribution and one-time pad to guarantee its unconditional security. The significant advantage of our scheme is that transmitted information capacity is twice as much as the capacity of other schemes.

  10. Blind detection of isolated astrophysical pulses in the spatial Fourier transform domain

    Science.gov (United States)

    Schmid, Natalia A.; Prestage, Richard M.

    2018-04-01

    We present a novel approach for the detection of isolated transients in pulsar surveys and fast radio transient observations. Rather than the conventional approach of performing a computationally expensive blind DM search, we take the spatial Fourier transform (SFT) of short (˜ few seconds) sections of data. A transient will have a characteristic signature in the SFT domain, and we present a blind statistic which may be used to detect this signature at an empirical zero False Alarm Rate (FAR). The method has been evaluated using simulations, and also applied to two fast radio burst observations. In addition to its use for current observations, we expect this method will be extremely beneficial for future multi-beam observations made by telescopes equipped with phased array feeds.

  11. Validity of proxies and correction for proxy use when evaluating social determinants of health in stroke patients.

    Science.gov (United States)

    Skolarus, Lesli E; Sánchez, Brisa N; Morgenstern, Lewis B; Garcia, Nelda M; Smith, Melinda A; Brown, Devin L; Lisabeth, Lynda D

    2010-03-01

    The purpose of this study was to evaluate stroke patient-proxy agreement with respect to social determinants of health, including depression, optimism, and spirituality, and to explore approaches to minimize proxy-introduced bias. Stroke patient-proxy pairs from the Brain Attack Surveillance in Corpus Christi Project were interviewed (n=34). Evaluation of agreement between patient-proxy pairs included calculation of intraclass correlation coefficients, linear regression models (ProxyResponse=alpha(0)+alpha(1)PatientResponse+delta, where alpha(0)=0 and alpha(1)=1 denotes no bias) and kappa statistics. Bias introduced by proxies was quantified with simulation studies. In the simulated data, we applied 4 approaches to estimate regression coefficients of stroke outcome social determinants of health associations when only proxy data were available for some patients: (1) substituting proxy responses in place of patient responses; (2) including an indicator variable for proxy use; (3) using regression calibration with external validation; and (4) internal validation. Agreement was fair for depression (intraclass correlation coefficient, 0.41) and optimism (intraclass correlation coefficient, 0.48) and moderate for spirituality (kappa, 0.48 to 0.53). Responses of proxies were a biased measure of the patients' responses for depression, with alpha(0)=4.88 (CI, 2.24 to 7.52) and alpha(1)=0.39 (CI, 0.09 to 0.69), and for optimism, with alpha(0)=3.82 (CI, -1.04 to 8.69) and alpha(1)=0.81 (CI, 0.41 to 1.22). Regression calibration with internal validation was the most accurate method to correct for proxy-induced bias. Fair/moderate patient-proxy agreement was observed for social determinants of health. Stroke researchers who plan to study social determinants of health may consider performing validation studies so corrections for proxy use can be made.

  12. 12 CFR 569.4 - Proxy soliciting material.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Proxy soliciting material. 569.4 Section 569.4 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PROXIES § 569.4 Proxy soliciting material. No solicitation of a proxy shall be made by means of any statement, form of proxy...

  13. 12 CFR 569.2 - Form of proxies.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Form of proxies. 569.2 Section 569.2 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PROXIES § 569.2 Form of proxies. Every form of proxy shall conform to the following requirements: (a) The proxy shall be revocable at will by...

  14. Shareholder Activism through the Proxy Process

    NARCIS (Netherlands)

    Renneboog, L.D.R.; Szilagyi, P.G.

    2009-01-01

    This paper provides evidence on the corporate governance role of shareholderinitiated proxy proposals. Previous studies debate over whether activists use proxy proposals to discipline firms or to simply advance their self-serving agendas, and whether proxy proposals are effective at all in

  15. Shareholder Activism Through the Proxy Process

    NARCIS (Netherlands)

    Renneboog, L.D.R.; Szilagyi, P.G.

    2009-01-01

    This paper provides evidence on the corporate governance role of shareholder-initiated proxy proposals. Previous studies debate over whether activists use proxy proposals to discipline firms or to simply advance their self-serving agendas, and whether proxy proposals are effective at all in

  16. BSEA: A Blind Sealed-Bid E-Auction Scheme for E-Commerce Applications

    Directory of Open Access Journals (Sweden)

    Rohit Kumar Das

    2016-12-01

    Full Text Available Due to an increase in the number of internet users, electronic commerce has grown significantly during the last decade. Electronic auction (e-auction is one of the famous e-commerce applications. Even so, security and robustness of e-auction schemes still remain a challenge. Requirements like anonymity and privacy of the b i d value are under threat from the attackers. Any auction protocol must not leak the anonymity and the privacy of the b i d value of an honest Bidder. Keeping these requirements in mind, we have firstly proposed a controlled traceable blind signature scheme (CTBSS because e-auction schemes should be able to trace the Bidders. Using CTBSS, a blind sealed-bid electronic auction scheme is proposed (BSEA. We have incorporated the notion of blind signature to e-auction schemes. Moreover, both the schemes are based upon elliptic curve cryptography (ECC, which provides a similar level of security with a comparatively smaller key size than the discrete logarithm problem (DLP based e-auction protocols. The analysis shows that BSEA fulfills all the requirements of e-auction protocol, and the total computation overhead is lower than the existing schemes.

  17. Impact of prehistoric cooking practices on paleoenvironmental proxies in shell midden constituents

    Science.gov (United States)

    Müller, Peter; Staudigel, Philip; Murray, Sean T.; Westphal, Hildegard; Swart, Peter K.

    2016-04-01

    Paleoenvironmental proxy records such as oxygen isotopes of calcareous skeletal structures like fish otoliths or mollusk shells provide highest-resolution information about environmental conditions experienced by the organism. Accumulations of such skeletal structures by ancient coastal populations in so called "shell midden" deposits provide us with sub-seasonally resolved paleoclimate records covering time spans up to several millennia. Given their high temporal resolution, these deposits are increasingly used for paleoclimate reconstructions and complement our understanding of ancient climate changes. However, gathered as comestibles, most of these skeletal remains were subject to prehistoric cooking methods prior to deposition. The associated alteration of the chemical proxy signatures as well as the subsequent error for paleoenvironmental reconstructions remained almost entirely neglected so far. Here, we present clumped isotope, conventional oxygen and carbon isotopes as well as element:Ca ratios measured in modern bivalve shells after exposing them to different prehistoric cooking methods. Our data show that most cooking methods considerably alter commonly used paleoclimate proxy systems which can lead to substantial misinterpretations of ancient climate conditions. Since the magnitude of chemical alteration is not distinguishable from natural temperature variability in most coastal settings, the alteration of shell midden constituents by prehistoric cooking remains likely unnoticed in most cases. Thus, depending on the cooking method, pre-depositional heating might have introduced considerable errors into previous paleoclimate studies. However, our data also show that clumped isotope thermometry represents a suitable diagnostic tool to detect such pre-depositional cooking events and also allows differentiating between the most commonly applied prehistoric cooking methods.

  18. 12 CFR 569.3 - Holders of proxies.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Holders of proxies. 569.3 Section 569.3 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PROXIES § 569.3 Holders of proxies. No proxy of a mutual savings association with a term greater than eleven months or solicited at...

  19. A Multi-Proxy Paradigm in the Pursuit of Ocean Paleoredox

    Science.gov (United States)

    Anbar, A. D.; Duan, Y.; Kendall, B.; Reinhard, C.; Severmann, S.; Lyons, T. W.

    2011-12-01

    Mo isotope systematics from such sources. By considering sedimentary Fe enrichments together with Fe isotopes, we find that the Mo enrichment correlates with the telltale signature of a shelf-to-basin Fe redox "shuttle". Uranium isotopes also exhibit variations indicative of redox transformations. This multi-proxy dataset therefore paints a robust picture of trace metal redox cycling consistent with the "whiff" interpretation.

  20. ERP signatures of conscious and unconscious word and letter perception in an inattentional blindness paradigm.

    Science.gov (United States)

    Schelonka, Kathryn; Graulty, Christian; Canseco-Gonzalez, Enriqueta; Pitts, Michael A

    2017-09-01

    A three-phase inattentional blindness paradigm was combined with ERPs. While participants performed a distracter task, line segments in the background formed words or consonant-strings. Nearly half of the participants failed to notice these word-forms and were deemed inattentionally blind. All participants noticed the word-forms in phase 2 of the experiment while they performed the same distracter task. In the final phase, participants performed a task on the word-forms. In all phases, including during inattentional blindness, word-forms elicited distinct ERPs during early latencies (∼200-280ms) suggesting unconscious orthographic processing. A subsequent ERP (∼320-380ms) similar to the visual awareness negativity appeared only when subjects were aware of the word-forms, regardless of the task. Finally, word-forms elicited a P3b (∼400-550ms) only when these stimuli were task-relevant. These results are consistent with previous inattentional blindness studies and help distinguish brain activity associated with pre- and post-perceptual processing from correlates of conscious perception. Copyright © 2017 Elsevier Inc. All rights reserved.

  1. Witnessing entanglement by proxy

    International Nuclear Information System (INIS)

    Bäuml, Stefan; Bruß, Dagmar; Kampermann, Hermann; Huber, Marcus; Winter, Andreas

    2016-01-01

    Entanglement is a ubiquitous feature of low temperature systems and believed to be highly relevant for the dynamics of condensed matter properties and quantum computation even at higher temperatures. The experimental certification of this paradigmatic quantum effect in macroscopic high temperature systems is constrained by the limited access to the quantum state of the system. In this paper we show how macroscopic observables beyond the mean energy of the system can be exploited as proxy witnesses for entanglement detection. Using linear and semi-definite relaxations we show that all previous approaches to this problem can be outperformed by our proxies, i.e. entanglement can be certified at higher temperatures without access to any local observable. For an efficient computation of proxy witnesses one can resort to a generalised grand canonical ensemble, enabling entanglement certification even in complex systems with macroscopic particle numbers. (paper)

  2. Application and Network-Cognizant Proxies - Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Antonio Ortega; Daniel C. Lee

    2003-03-24

    OAK B264 Application and Network-Cognizant Proxies - Final Report. Current networks show increasing heterogeneity both in terms of their bandwidths/delays and the applications they are required to support. This is a trend that is likely to intensify in the future, as real-time services, such as video, become more widely available and networking access over wireless links becomes more widespread. For this reason they propose that application-specific proxies, intermediate network nodes that broker the interactions between server and client, will become an increasingly important network element. These proxies will allow adaptation to changes in network characteristics without requiring a direct intervention of either server or client. Moreover, it will be possible to locate these proxies strategically at those points where a mismatch occurs between subdomains (for example, a proxy could be placed so as to act as a bridge between a reliable network domain and an unreliable one). This design philosophy favors scalability in the sense that the basic network infrastructure can remain unchanged while new functionality can be added to proxies, as required by the applications. While proxies can perform numerous generic functions, such as caching or security, they concentrate here on media-specific, and in particular video-specific, tasks. The goal of this project was to demonstrate that application- and network-specific knowledge at a proxy can improve overall performance especially under changing network conditions. They summarize below the work performed to address these issues. Particular effort was spent in studying caching techniques and on video classification to enable DiffServ delivery. other work included analysis of traffic characteristics, optimized media scheduling, coding techniques based on multiple description coding, and use of proxies to reduce computation costs. This work covered much of what was originally proposed but with a necessarily reduced scope.

  3. Web proxy auto discovery for the WLCG

    CERN Document Server

    Dykstra, D; Blumenfeld, B; De Salvo, A; Dewhurst, A; Verguilov, V

    2017-01-01

    All four of the LHC experiments depend on web proxies (that is, squids) at each grid site to support software distribution by the CernVM FileSystem (CVMFS). CMS and ATLAS also use web proxies for conditions data distributed through the Frontier Distributed Database caching system. ATLAS & CMS each have their own methods for their grid jobs to find out which web proxies to use for Frontier at each site, and CVMFS has a third method. Those diverse methods limit usability and flexibility, particularly for opportunistic use cases, where an experiment’s jobs are run at sites that do not primarily support that experiment. This paper describes a new Worldwide LHC Computing Grid (WLCG) system for discovering the addresses of web proxies. The system is based on an internet standard called Web Proxy Auto Discovery (WPAD). WPAD is in turn based on another standard called Proxy Auto Configuration (PAC). Both the Frontier and CVMFS clients support this standard. The input into the WLCG system comes from squids regis...

  4. Asian Eocene monsoons as revealed by leaf architectural signatures

    Science.gov (United States)

    Spicer, Robert A.; Yang, Jian; Herman, Alexei B.; Kodrul, Tatiana; Maslova, Natalia; Spicer, Teresa E. V.; Aleksandrova, Galina; Jin, Jianhua

    2016-09-01

    The onset and development of the Asian monsoon systems is a topic that has attracted considerable research effort but proxy data limitations, coupled with a diversity of definitions and metrics characterizing monsoon phenomena, have generated much debate. Failure of geological proxies to yield metrics capable of distinguishing between rainfall seasonality induced by migrations of the Inter-tropical Convergence Zone (ITCZ) from that attributable to topographically modified seasonal pressure reversals has frustrated attempts to understand mechanisms underpinning monsoon development and dynamics. Here we circumvent the use of such single climate parameter metrics in favor of detecting directly the distinctive attributes of different monsoon regimes encoded in leaf fossils. Leaf form adapts to the prevailing climate, particularly under the extreme seasonal stresses imposed by monsoons, so it is likely that fossil leaves carry a unique signature of past monsoon regimes. Leaf form trait spectra obtained from fossils from Eocene basins in southern China were compared with those seen in modern leaves growing under known climate regimes. The fossil leaf trait spectra, including those derived from previously published fossil floras from northwestern India, were most similar to those found in vegetation exposed to the modern Indonesia-Australia Monsoon (I-AM), which is largely a product of seasonal migrations of the ITCZ. The presence of this distinctive leaf physiognomic signature suggests that although a monsoon climate existed in Eocene time across southern Asia the characteristics of the modern topographically-enhanced South Asia Monsoon had yet to develop. By the Eocene leaves in South Asia had become well adapted to an I-AM type regime across many taxa and points to the existence of a pervasive monsoon climate prior to the Eocene. No fossil trait spectra typical of exposure to the modern East Asia monsoon were seen, suggesting the effects of this system in southern

  5. Evaluation of pre-jamming indication parameter during blind backfilling technique

    Directory of Open Access Journals (Sweden)

    Susmita Panda

    2016-01-01

    Full Text Available Hydraulic blind backfilling is used to reduce subsidence problems above old underground water-logged coal mines. This paper describes experimental research on a fully transparent model of a straight underground mine gallery. An automatic data acquisition system was installed in the model to continuously record the sand and water flowrates along with the inlet pressure of the slurry near the model's inlet. Pressure signature graphs and pressure loss curves with bed advancement under different flow conditions are examined. Pressure signature analyses for various flowrates and sand slurry concentrations are conducted to evaluate a pre-jamming indication parameter, which could be used to indicate the arrival of the final stage of filling.

  6. Development of six PROMIS pediatrics proxy-report item banks.

    Science.gov (United States)

    Irwin, Debra E; Gross, Heather E; Stucky, Brian D; Thissen, David; DeWitt, Esi Morgan; Lai, Jin Shei; Amtmann, Dagmar; Khastou, Leyla; Varni, James W; DeWalt, Darren A

    2012-02-22

    Pediatric self-report should be considered the standard for measuring patient reported outcomes (PRO) among children. However, circumstances exist when the child is too young, cognitively impaired, or too ill to complete a PRO instrument and a proxy-report is needed. This paper describes the development process including the proxy cognitive interviews and large-field-test survey methods and sample characteristics employed to produce item parameters for the Patient Reported Outcomes Measurement Information System (PROMIS) pediatric proxy-report item banks. The PROMIS pediatric self-report items were converted into proxy-report items before undergoing cognitive interviews. These items covered six domains (physical function, emotional distress, social peer relationships, fatigue, pain interference, and asthma impact). Caregivers (n = 25) of children ages of 5 and 17 years provided qualitative feedback on proxy-report items to assess any major issues with these items. From May 2008 to March 2009, the large-scale survey enrolled children ages 8-17 years to complete the self-report version and caregivers to complete the proxy-report version of the survey (n = 1548 dyads). Caregivers of children ages 5 to 7 years completed the proxy report survey (n = 432). In addition, caregivers completed other proxy instruments, PedsQL™ 4.0 Generic Core Scales Parent Proxy-Report version, PedsQL™ Asthma Module Parent Proxy-Report version, and KIDSCREEN Parent-Proxy-52. Item content was well understood by proxies and did not require item revisions but some proxies clearly noted that determining an answer on behalf of their child was difficult for some items. Dyads and caregivers of children ages 5-17 years old were enrolled in the large-scale testing. The majority were female (85%), married (70%), Caucasian (64%) and had at least a high school education (94%). Approximately 50% had children with a chronic health condition, primarily asthma, which was diagnosed or treated within 6

  7. Pseudo-proxy evaluation of climate field reconstruction methods of North Atlantic climate based on an annually resolved marine proxy network

    Directory of Open Access Journals (Sweden)

    M. Pyrina

    2017-10-01

    Full Text Available Two statistical methods are tested to reconstruct the interannual variations in past sea surface temperatures (SSTs of the North Atlantic (NA Ocean over the past millennium based on annually resolved and absolutely dated marine proxy records of the bivalve mollusk Arctica islandica. The methods are tested in a pseudo-proxy experiment (PPE setup using state-of-the-art climate models (CMIP5 Earth system models and reanalysis data from the COBE2 SST data set. The methods were applied in the virtual reality provided by global climate simulations and reanalysis data to reconstruct the past NA SSTs using pseudo-proxy records that mimic the statistical characteristics and network of Arctica islandica. The multivariate linear regression methods evaluated here are principal component regression and canonical correlation analysis. Differences in the skill of the climate field reconstruction (CFR are assessed according to different calibration periods and different proxy locations within the NA basin. The choice of the climate model used as a surrogate reality in the PPE has a more profound effect on the CFR skill than the calibration period and the statistical reconstruction method. The differences between the two methods are clearer for the MPI-ESM model due to its higher spatial resolution in the NA basin. The pseudo-proxy results of the CCSM4 model are closer to the pseudo-proxy results based on the reanalysis data set COBE2. Conducting PPEs using noise-contaminated pseudo-proxies instead of noise-free pseudo-proxies is important for the evaluation of the methods, as more spatial differences in the reconstruction skill are revealed. Both methods are appropriate for the reconstruction of the temporal evolution of the NA SSTs, even though they lead to a great loss of variance away from the proxy sites. Under reasonable assumptions about the characteristics of the non-climate noise in the proxy records, our results show that the marine network of Arctica

  8. The role of proxy information in missing data analysis.

    Science.gov (United States)

    Huang, Rong; Liang, Yuanyuan; Carrière, K C

    2005-10-01

    This article investigates the role of proxy data in dealing with the common problem of missing data in clinical trials using repeated measures designs. In an effort to avoid the missing data situation, some proxy information can be gathered. The question is how to treat proxy information, that is, is it always better to utilize proxy information when there are missing data? A model for repeated measures data with missing values is considered and a strategy for utilizing proxy information is developed. Then, simulations are used to compare the power of a test using proxy to simply utilizing all available data. It is concluded that using proxy information can be a useful alternative when such information is available. The implications for various clinical designs are also considered and a data collection strategy for efficiently estimating parameters is suggested.

  9. Transparent Proxy for Secure E-Mail

    Science.gov (United States)

    Michalák, Juraj; Hudec, Ladislav

    2010-05-01

    The paper deals with the security of e-mail messages and e-mail server implementation by means of a transparent SMTP proxy. The security features include encryption and signing of transported messages. The goal is to design and implement a software proxy for secure e-mail including its monitoring, administration, encryption and signing keys administration. In particular, we focus on automatic public key on-the-fly encryption and signing of e-mail messages according to S/MIME standard by means of an embedded computer system whose function can be briefly described as a brouter with transparent SMTP proxy.

  10. Proxy comparisons for Paleogene sea water temperature reconstructions

    Science.gov (United States)

    de Bar, Marijke; de Nooijer, Lennart; Schouten, Stefan; Ziegler, Martin; Sluijs, Appy; Reichart, Gert-Jan

    2017-04-01

    Several studies have reconstructed Paleogene seawater temperatures, using single- or multi-proxy approaches (e.g. Hollis et al., 2012 and references therein), particularly comparing TEX86 with foraminiferal δ18O and Mg/Ca. Whereas trends often agree relatively well, absolute temperatures can differ significantly between proxies, possibly because they are often applied to (extreme) climate events/transitions (e.g. Sluijs et al., 2011), where certain assumptions underlying the temperature proxies may not hold true. A more general long-term multi-proxy temperature reconstruction, is therefore necessary to validate the different proxies and underlying presumed boundary conditions. Here we apply a multi-proxy approach using foraminiferal calcite and organic proxies to generate a low-resolution, long term (80 Myr) paleotemperature record for the Bass River core (New Jersey, North Atlantic). Oxygen (δ18O), clumped isotopes (Δ47) and Mg/Ca of benthic foraminifera, as well as the organic proxies MBT'-CBT, TEX86H, U37K' index and the LDI were determined on the same sediments. The youngest samples of Miocene age are characterized by a high BIT index (>0.8) and fractional abundance of the C32 1,15-diol (>0.6; de Bar et al., 2016) and the absence of foraminifera, all suggesting high continental input and shallow depths. The older sediment layers (˜30 to 90 Ma) display BIT values and C32 1,15-diol fractional abundances 28 ˚ C. In contrast, LDI temperatures were considerably lower and varied only between 21 and 19 ˚ C. MBT'-CBT derived mean annual temperatures for the ages of 9 and 20 Ma align well with the TEX86H SSTs. Overall, the agreement of the paleotemperature proxies in terms of main tendencies, and the covariation with the global benthic oxygen isotope compilation suggests that temperatures in this region varied in concert with global climate variability. The fact that offsets between the different proxies used here remain fairly constant down to 90 Ma ago

  11. Proxy Graph: Visual Quality Metrics of Big Graph Sampling.

    Science.gov (United States)

    Nguyen, Quan Hoang; Hong, Seok-Hee; Eades, Peter; Meidiana, Amyra

    2017-06-01

    Data sampling has been extensively studied for large scale graph mining. Many analyses and tasks become more efficient when performed on graph samples of much smaller size. The use of proxy objects is common in software engineering for analysis and interaction with heavy objects or systems. In this paper, we coin the term 'proxy graph' and empirically investigate how well a proxy graph visualization can represent a big graph. Our investigation focuses on proxy graphs obtained by sampling; this is one of the most common proxy approaches. Despite the plethora of data sampling studies, this is the first evaluation of sampling in the context of graph visualization. For an objective evaluation, we propose a new family of quality metrics for visual quality of proxy graphs. Our experiments cover popular sampling techniques. Our experimental results lead to guidelines for using sampling-based proxy graphs in visualization.

  12. Development of six PROMIS pediatrics proxy-report item banks

    Directory of Open Access Journals (Sweden)

    Irwin Debra E

    2012-02-01

    Full Text Available Abstract Background Pediatric self-report should be considered the standard for measuring patient reported outcomes (PRO among children. However, circumstances exist when the child is too young, cognitively impaired, or too ill to complete a PRO instrument and a proxy-report is needed. This paper describes the development process including the proxy cognitive interviews and large-field-test survey methods and sample characteristics employed to produce item parameters for the Patient Reported Outcomes Measurement Information System (PROMIS pediatric proxy-report item banks. Methods The PROMIS pediatric self-report items were converted into proxy-report items before undergoing cognitive interviews. These items covered six domains (physical function, emotional distress, social peer relationships, fatigue, pain interference, and asthma impact. Caregivers (n = 25 of children ages of 5 and 17 years provided qualitative feedback on proxy-report items to assess any major issues with these items. From May 2008 to March 2009, the large-scale survey enrolled children ages 8-17 years to complete the self-report version and caregivers to complete the proxy-report version of the survey (n = 1548 dyads. Caregivers of children ages 5 to 7 years completed the proxy report survey (n = 432. In addition, caregivers completed other proxy instruments, PedsQL™ 4.0 Generic Core Scales Parent Proxy-Report version, PedsQL™ Asthma Module Parent Proxy-Report version, and KIDSCREEN Parent-Proxy-52. Results Item content was well understood by proxies and did not require item revisions but some proxies clearly noted that determining an answer on behalf of their child was difficult for some items. Dyads and caregivers of children ages 5-17 years old were enrolled in the large-scale testing. The majority were female (85%, married (70%, Caucasian (64% and had at least a high school education (94%. Approximately 50% had children with a chronic health condition, primarily

  13. Time-and-ID-Based Proxy Reencryption Scheme

    Directory of Open Access Journals (Sweden)

    Kambombo Mtonga

    2014-01-01

    Full Text Available Time- and ID-based proxy reencryption scheme is proposed in this paper in which a type-based proxy reencryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. However, in some applications, the time within which the data was sampled or collected is very critical. In such applications, for example, healthcare and criminal investigations, the delegatee may be interested in only some of the messages with some types sampled within some time bound instead of the entire subset. Hence, in order to carter for such situations, in this paper, we propose a time-and-identity-based proxy reencryption scheme that takes into account the time within which the data was collected as a factor to consider when categorizing data in addition to its type. Our scheme is based on Boneh and Boyen identity-based scheme (BB-IBE and Matsuo’s proxy reencryption scheme for identity-based encryption (IBE to IBE. We prove that our scheme is semantically secure in the standard model.

  14. Time-and-ID-Based Proxy Reencryption Scheme

    OpenAIRE

    Mtonga, Kambombo; Paul, Anand; Rho, Seungmin

    2014-01-01

    Time- and ID-based proxy reencryption scheme is proposed in this paper in which a type-based proxy reencryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. However, in some applications, the time within which the data was sampled or collected is very critical. In such applications, for example, healthcare and criminal investigations, the delegatee may be interested in only some of the messages with some types sampled wi...

  15. Web Proxy Auto Discovery for the WLCG

    Science.gov (United States)

    Dykstra, D.; Blomer, J.; Blumenfeld, B.; De Salvo, A.; Dewhurst, A.; Verguilov, V.

    2017-10-01

    All four of the LHC experiments depend on web proxies (that is, squids) at each grid site to support software distribution by the CernVM FileSystem (CVMFS). CMS and ATLAS also use web proxies for conditions data distributed through the Frontier Distributed Database caching system. ATLAS & CMS each have their own methods for their grid jobs to find out which web proxies to use for Frontier at each site, and CVMFS has a third method. Those diverse methods limit usability and flexibility, particularly for opportunistic use cases, where an experiment’s jobs are run at sites that do not primarily support that experiment. This paper describes a new Worldwide LHC Computing Grid (WLCG) system for discovering the addresses of web proxies. The system is based on an internet standard called Web Proxy Auto Discovery (WPAD). WPAD is in turn based on another standard called Proxy Auto Configuration (PAC). Both the Frontier and CVMFS clients support this standard. The input into the WLCG system comes from squids registered in the ATLAS Grid Information System (AGIS) and CMS SITECONF files, cross-checked with squids registered by sites in the Grid Configuration Database (GOCDB) and the OSG Information Management (OIM) system, and combined with some exceptions manually configured by people from ATLAS and CMS who operate WLCG Squid monitoring. WPAD servers at CERN respond to http requests from grid nodes all over the world with a PAC file that lists available web proxies, based on IP addresses matched from a database that contains the IP address ranges registered to organizations. Large grid sites are encouraged to supply their own WPAD web servers for more flexibility, to avoid being affected by short term long distance network outages, and to offload the WLCG WPAD servers at CERN. The CERN WPAD servers additionally support requests from jobs running at non-grid sites (particularly for LHC@Home) which they direct to the nearest publicly accessible web proxy servers. The responses

  16. Cretaceous honeycomb oysters (Pycnodonte vesicularis) as palaeoseasonality records: A multi-proxy study

    Science.gov (United States)

    de Winter, Niels J.; Vellekoop, Johan; Vorsselmans, Robin; Golreihan, Asefeh; Petersen, Sierra V.; Meyer, Kyle W.; Speijer, Robert P.; Claeys, Philippe

    2017-04-01

    Pycnodonte or "honeycomb-oysters" (Bivalvia: Gryphaeidea) is an extinct genus of calcite-producing bivalves which is found in abundance in Cretaceous to Pleistocene fossil beds worldwide. As such, Pycnodonte shells could be ideal tracers of palaeoclimate through time, with the capability to reconstruct sea water conditions and palaeotemperatures in a range of palaeoenvironmental settings. Only few studies have attempted to reconstruct palaeoclimate based on Pycnodonte shells and with variable degrees of success (e.g. Videt, 2003; Huyge et al., 2015). Our study investigates the shell growth, structure and chemical characteristics of Maastrichtian Pycnodonte vesicularis from Bajada de Jaguel in Argentina and aims to rigorously test the application of multiple palaeoenvironmental proxies on the shells of several Maastrichtian Pycnodonte oysters for palaeoclimate reconstruction. The preservation state of four calcite shells was assessed by fluorescence microscopy, cathodoluminescence and micro X-Ray Fluorescence (XRF) mapping. Their shell structure was investigated using a combination of XRF mapping, high-resolution color scanning and microCT scanning. Long integration time point-by-point XRF line scanning yielded high-resolution trace element profiles through the hinge of all shells. Microdrilled samples from the same locations on the shell were analyzed for trace element composition by ICP-MS and for stable carbon and oxygen isotopes by IRMS. Preservation of the calcite microstructure was found to be of sufficient quality to allow discussion of original shell porosity, annual growth increments and pristine chemical signatures of the bivalves. The combination of fluorescence and cathodoluminescence microscopy with XRF mapping and microCT scanning sheds light on the characteristic internal "honeycomb" structure of these extinct bivalves and allows comparison with that of the related extant Neopycnodonte bivalves (Wisshak et al., 2009). Furthermore, high resolution

  17. The Proxy Challenge: Why bespoke proxy indicators can help solve the anti-corruption measurement problem

    OpenAIRE

    Johnsøn, Jesper; Mason, Phil

    2013-01-01

    Practitioners working in anti-corruption face perennial challenges in measuring changes in corruption levels and evaluating whether anti-corruption efforts are successful. These two challenges are linked but not inseparable. To make progress on the latter front, that is, evaluating whether anti-corruption efforts are having an impact, the U4 Anti-Corruption Resource Centre and the UK Department for International Development are launching an exploration into the use of proxy indicators. Proxy ...

  18. The signature of undetected change: an exploratory electrotomographic investigation of gradual change blindness.

    Science.gov (United States)

    Kiat, John E; Dodd, Michael D; Belli, Robert F; Cheadle, Jacob E

    2018-05-01

    Neuroimaging-based investigations of change blindness, a phenomenon in which seemingly obvious changes in visual scenes fail to be detected, have significantly advanced our understanding of visual awareness. The vast majority of prior investigations, however, utilize paradigms involving visual disruptions (e.g., intervening blank screens, saccadic movements, "mudsplashes"), making it difficult to isolate neural responses toward visual changes cleanly. To address this issue in this present study, high-density EEG data (256 channel) were collected from 25 participants using a paradigm in which visual changes were progressively introduced into detailed real-world scenes without the use of visual disruption. Oscillatory activity associated with undetected changes was contrasted with activity linked to their absence using standardized low-resolution brain electromagnetic tomography (sLORETA). Although an insufficient number of detections were present to allow for analysis of actual change detection, increased beta-2 activity in the right inferior parietal lobule (rIPL), a region repeatedly associated with change blindness in disruption paradigms, followed by increased theta activity in the right superior temporal gyrus (rSTG) was noted in undetected visual change responses relative to the absence of change. We propose the rIPL beta-2 activity to be associated with orienting attention toward visual changes, with the subsequent rise in rSTG theta activity being potentially linked with updating preconscious perceptual memory representations. NEW & NOTEWORTHY This study represents the first neuroimaging-based investigation of gradual change blindness, a visual phenomenon that has significant potential to shed light on the processes underlying visual detection and conscious perception. The use of gradual change materials is reflective of real-world visual phenomena and allows for cleaner isolation of signals associated with the neural registration of change relative to the

  19. Congenital blindness is associated with large-scale reorganization of anatomical networks.

    Science.gov (United States)

    Hasson, Uri; Andric, Michael; Atilgan, Hicret; Collignon, Olivier

    2016-03-01

    Blindness is a unique model for understanding the role of experience in the development of the brain's functional and anatomical architecture. Documenting changes in the structure of anatomical networks for this population would substantiate the notion that the brain's core network-level organization may undergo neuroplasticity as a result of life-long experience. To examine this issue, we compared whole-brain networks of regional cortical-thickness covariance in early blind and matched sighted individuals. This covariance is thought to reflect signatures of integration between systems involved in similar perceptual/cognitive functions. Using graph-theoretic metrics, we identified a unique mode of anatomical reorganization in the blind that differed from that found for sighted. This was seen in that network partition structures derived from subgroups of blind were more similar to each other than they were to partitions derived from sighted. Notably, after deriving network partitions, we found that language and visual regions tended to reside within separate modules in sighted but showed a pattern of merging into shared modules in the blind. Our study demonstrates that early visual deprivation triggers a systematic large-scale reorganization of whole-brain cortical-thickness networks, suggesting changes in how occipital regions interface with other functional networks in the congenitally blind. Copyright © 2015 The Authors. Published by Elsevier Inc. All rights reserved.

  20. Blind Separation of Nonstationary Sources Based on Spatial Time-Frequency Distributions

    Directory of Open Access Journals (Sweden)

    Zhang Yimin

    2006-01-01

    Full Text Available Blind source separation (BSS based on spatial time-frequency distributions (STFDs provides improved performance over blind source separation methods based on second-order statistics, when dealing with signals that are localized in the time-frequency (t-f domain. In this paper, we propose the use of STFD matrices for both whitening and recovery of the mixing matrix, which are two stages commonly required in many BSS methods, to provide robust BSS performance to noise. In addition, a simple method is proposed to select the auto- and cross-term regions of time-frequency distribution (TFD. To further improve the BSS performance, t-f grouping techniques are introduced to reduce the number of signals under consideration, and to allow the receiver array to separate more sources than the number of array sensors, provided that the sources have disjoint t-f signatures. With the use of one or more techniques proposed in this paper, improved performance of blind separation of nonstationary signals can be achieved.

  1. Magnetic signature of daily sampled urban atmospheric particles

    Science.gov (United States)

    Muxworthy, Adrian R.; Matzka, Jürgen; Davila, Alfonso Fernández; Petersen, Nikolai

    The magnetic signature of two sets of daily sampled particulate matter (PM) collected in Munich, Germany, were examined and compared to variations in other pollution data and meteorological data using principal component analysis. The magnetic signature arising from the magnetic minerals in the PM was examined using a fast and highly sensitive magnetic remanence measurement. The longest data set studied was 160 days, significantly longer than that of similar magnetic PM studies improving the statistical robustness. It was found that the variations in the mass-dependent magnetic parameters displayed a complicated relationship governed by both the meteorological conditions and the PM loading rate, whereas mineralogy/grain-size-dependent magnetic parameters displayed little variation. A six-fold increase in the number of vehicles passing the sampling locations only doubled the magnetic remanence of the samples, suggesting that the measured magnetic signature is in addition strongly influenced by dispersion rates. At both localities the saturation isothermal remanent magnetisation (SIRM) was found to be strongly correlated with the PM mass, and it is suggested that measuring SIRM as a proxy for PM monitoring is a viable alternative to magnetic susceptibility when the samples are magnetically too weak. The signal was found to be dominated by magnetite-like grains less than 100 nm in diameter which is thought to be derived primarily from vehicles. Such small grains are known to be particularly dangerous to humans. There was also evidence to suggest from magnetic stability parameters that the magnetite-like grains were covered with an oxidised rim. The concentration of magnetic PM was in the range of 0.3-0.5% by mass.

  2. Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security

    NARCIS (Netherlands)

    Weng, Jiang; Yang, Yanjiang; Tang, Qiang; Deng, Robert H.; Bao, Feng

    Recently, a variant of proxy re-encryption, named conditional proxy re-encryption (C-PRE), has been introduced. Compared with traditional proxy re-encryption, C-PRE enables the delegator to implement fine-grained delegation of decryption rights, and thus is more useful in many applications. In this

  3. Optimizing TCP Performance over UMTS with Split TCP Proxy

    DEFF Research Database (Denmark)

    Hu, Liang; Dittmann, Lars

    2009-01-01

    . To cope with large delay bandwidth product, we propose a novel concept of split TCP proxy which is placed at GGSN between UNITS network and Internet. The split proxy divides the bandwidth delay product into two parts, resulting in two TCP connections with smaller bandwidth delay products which can...... be pipelined and thus operating at higher speeds. Simulation results show, the split TCP proxy can significantly improve the TCP performance in terms of RLC throughput under high bit rate DCH channel scenario (e.g.256 kbps). On the other hand, it only brings small performance improvement under low bit rate DCH...... scenario (e.g.64 kbps). Besides, the split TCP proxy brings more performance gain for downloading large files than downloading small ones. To the end, for the configuration of the split proxy, an aggressive initial TCP congestion window size (e.g. 10 MSS) at proxy is particularly useful for radio links...

  4. Family factors in end-of-life decision-making: family conflict and proxy relationship.

    Science.gov (United States)

    Parks, Susan Mockus; Winter, Laraine; Santana, Abbie J; Parker, Barbara; Diamond, James J; Rose, Molly; Myers, Ronald E

    2011-02-01

    Few studies have examined proxy decision-making regarding end-of-life treatment decisions. Proxy accuracy is defined as whether proxy treatment choices are consistent with the expressed wishes of their index elder. The purpose of this study was to examine proxy accuracy in relation to two family factors that may influence proxy accuracy: perceived family conflict and type of elder-proxy relationship. Telephone interviews with 202 community-dwelling elders and their proxy decision makers were conducted including the Life-Support Preferences Questionnaire (LSPQ), and a measure of family conflict, and sociodemographic characteristics, including type of relationship. Elder-proxy accuracy was associated with the type of elder-proxy relationship. Adult children demonstrated the lowest elder-proxy accuracy and spousal proxies the highest elder-proxy accuracy. Elder-proxy accuracy was associated with family conflict. Proxies reporting higher family conflict had lower elder-proxy accuracy. No interaction between family conflict and relationship type was revealed. Spousal proxies were more accurate in their substituted judgment than adult children, and proxies who perceive higher degree of family conflict tended to be less accurate than those with lower family conflict. Health care providers should be aware of these family factors when discussing advance care planning.

  5. Perbandingan proxy pada linux dan windows untuk mempercepat browsing website

    Directory of Open Access Journals (Sweden)

    Dafwen Toresa

    2017-05-01

    Full Text Available AbstrakPada saat ini sangat banyak organisasi, baik pendidikan, pemerintahan,  maupun perusahaan swasta berusaha membatasi akses para pengguna ke internet dengan alasan bandwidth yang dimiliki mulai terasa lambat ketika para penggunanya mulai banyak yang melakukan browsing ke internet. Mempercepat akses browsing menjadi perhatian utama dengan memanfaatkan teknologi Proxy server. Penggunaan proxy server perlu mempertimbangkan sistem operasi pada server dan tool yang digunakan belum diketahui performansi terbaiknya pada sistem operasi apa.  Untuk itu dirasa perlu untuk menganalisis performan Proxy server pada sistem operasi berbeda yaitu Sistem Operasi Linux dengan tools Squid  dan Sistem Operasi Windows dengan tool Winroute. Kajian ini dilakukan untuk mengetahui perbandingan kecepatan browsing dari komputer pengguna (client. Browser yang digunakan di komputer pengguna adalah Mozilla Firefox. Penelitian ini menggunakan 2 komputer klien dengan pengujian masing-masingnya 5 kali pengujian pengaksesan/browsing web yang dituju melalui proxy server. Dari hasil pengujian yang dilakukan, diperoleh kesimpulan bahwa penerapan proxy server di sistem operasi linux dengan tools squid lebih cepat browsing dari klien menggunakan web browser yang sama dan komputer klien yang berbeda dari pada proxy server sistem operasi windows dengan tools winroute.  Kata kunci: Proxy, Bandwidth, Browsing, Squid, Winroute AbstractAt this time very many organizations, both education, government, and private companies try to limit the access of users to the internet on the grounds that the bandwidth owned began to feel slow when the users began to do a lot of browsing to the internet. Speed up browsing access is a major concern by utilizing Proxy server technology. The use of proxy servers need to consider the operating system on the server and the tool used is not yet known the best performance on what operating system. For that it is necessary to analyze Performance Proxy

  6. Signature-based User Authentication

    OpenAIRE

    Hámorník, Juraj

    2015-01-01

    This work aims on missing handwritten signature authentication in Windows. Result of this work is standalone software that allow users to log into Windows by writing signature. We focus on security of signature authentification and best overall user experience. We implemented signature authentification service that accept signature and return user access token if signature is genuine. Signature authentification is done by comparing given signature to signature patterns by their similarity. Si...

  7. Estimation of sedimentary proxy records together with associated uncertainty

    OpenAIRE

    Goswami, B.; Heitzig, J.; Rehfeld, K.; Marwan, N.; Anoop, A.; Prasad, S.; Kurths, J.

    2014-01-01

    Sedimentary proxy records constitute a significant portion of the recorded evidence that allows us to investigate paleoclimatic conditions and variability. However, uncertainties in the dating of proxy archives limit our ability to fix the timing of past events and interpret proxy record intercomparisons. While there are various age-modeling approaches to improve the estimation of the age–depth relations of archives, relatively little focus has been placed on the propagation...

  8. Analisis Algoritma Pergantian Cache Pada Proxy Web Server Internet Dengan Simulasi

    OpenAIRE

    Nurwarsito, Heru

    2007-01-01

    Pertumbuhan jumlah client internet dari waktu ke waktu terus bertambah, maka respon akses internet menjadi semakin lambat. Untuk membantu kecepatan akses tersebut maka diperlukan cache pada Proxy Server. Penelitian ini bertujuan untuk menganalisis performansi Proxy Server pada Jaringan Internet terhadap penggunaan algoritma pergantian cache-nya.Analisis Algoritma Pergantian Cache Pada Proxy Server didesain dengan metoda pemodelan simulasi jaringan internet yang terdiri dari Web server, Proxy ...

  9. Real Traceable Signatures

    Science.gov (United States)

    Chow, Sherman S. M.

    Traceable signature scheme extends a group signature scheme with an enhanced anonymity management mechanism. The group manager can compute a tracing trapdoor which enables anyone to test if a signature is signed by a given misbehaving user, while the only way to do so for group signatures requires revealing the signer of all signatures. Nevertheless, it is not tracing in a strict sense. For all existing schemes, T tracing agents need to recollect all N' signatures ever produced and perform RN' “checks” for R revoked users. This involves a high volume of transfer and computations. Increasing T increases the degree of parallelism for tracing but also the probability of “missing” some signatures in case some of the agents are dishonest.

  10. Gradient-based model calibration with proxy-model assistance

    Science.gov (United States)

    Burrows, Wesley; Doherty, John

    2016-02-01

    Use of a proxy model in gradient-based calibration and uncertainty analysis of a complex groundwater model with large run times and problematic numerical behaviour is described. The methodology is general, and can be used with models of all types. The proxy model is based on a series of analytical functions that link all model outputs used in the calibration process to all parameters requiring estimation. In enforcing history-matching constraints during the calibration and post-calibration uncertainty analysis processes, the proxy model is run for the purposes of populating the Jacobian matrix, while the original model is run when testing parameter upgrades; the latter process is readily parallelized. Use of a proxy model in this fashion dramatically reduces the computational burden of complex model calibration and uncertainty analysis. At the same time, the effect of model numerical misbehaviour on calculation of local gradients is mitigated, this allowing access to the benefits of gradient-based analysis where lack of integrity in finite-difference derivatives calculation would otherwise have impeded such access. Construction of a proxy model, and its subsequent use in calibration of a complex model, and in analysing the uncertainties of predictions made by that model, is implemented in the PEST suite.

  11. Signature Balancing

    NARCIS (Netherlands)

    Noordkamp, H.W.; Brink, M. van den

    2006-01-01

    Signatures are an important part of the design of a ship. In an ideal situation, signatures must be as low as possible. However, due to budget constraints it is most unlikely to reach this ideal situation. The arising question is which levels of signatures are optimal given the different scenarios

  12. Developing a proxy version of the Adult social care outcome toolkit (ASCOT).

    Science.gov (United States)

    Rand, Stacey; Caiels, James; Collins, Grace; Forder, Julien

    2017-05-19

    Social care-related quality of life is a key outcome indicator used in the evaluation of social care interventions and policy. It is not, however, always possible to collect quality of life data by self-report even with adaptations for people with cognitive or communication impairments. A new proxy-report version of the Adult Social Care Outcomes Toolkit (ASCOT) measure of social care-related quality of life was developed to address the issues of wider inclusion of people with cognitive or communication difficulties who may otherwise be systematically excluded. The development of the proxy-report ASCOT questionnaire was informed by literature review and earlier work that identified the key issues and challenges associated with proxy-reported outcomes. To evaluate the acceptability and content validity of the ASCOT-Proxy, qualitative cognitive interviews were conducted with unpaid carers or care workers of people with cognitive or communication impairments. The proxy respondents were invited to 'think aloud' while completing the questionnaire. Follow-up probes were asked to elicit further detail of the respondent's comprehension of the format, layout and content of each item and also how they weighed up the options to formulate a response. A total of 25 unpaid carers and care workers participated in three iterative rounds of cognitive interviews. The findings indicate that the items were well-understood and the concepts were consistent with the item definitions for the standard self-completion version of ASCOT with minor modifications to the draft ASCOT-Proxy. The ASCOT-Proxy allows respondents to rate the proxy-proxy and proxy-patient perspectives, which improved the acceptability of proxy report. A new proxy-report version of ASCOT was developed with evidence of its qualitative content validity and acceptability. The ASCOT-Proxy is ready for empirical testing of its suitability for data collection as a self-completion and/or interview questionnaire, and also

  13. Proxy-cryptocurrency payment system%基于代理的密码货币支付系统

    Institute of Scientific and Technical Information of China (English)

    傅晓彤; 陈思; 张宁

    2017-01-01

    The decentralized cryptocurrency which was based on block chain has been thought the most successful one in history. In the system, public keys were used as the users' accounts which guaranteed the anonymity in real transactions. However, all the transaction information was recorded in the block chain, it was a potential threat for users' privacy which might leak the payment information. Moreover, to avoid double-spending, it was agreed that the transaction on the target block was valid only if anotherk blocks were generated after the target one. The long waiting time reduced the ef-ficiency of the payment system. A model of payment system based on a proxy-cryptocurrency was proposed, and a solu-tion based on blind signature techniques was proposed. The scheme introduced a proxy in the payment phase, by which transaction confirmation time could be reduced and the transaction efficiency could be improved. Meanwhile, the system implements better anonymity, namely as the privacy protection function.%利用区块链技术实现的去中心化的密码货币被誉为有史以来最成功的密码货币.用户以公钥作为账户地址,使交易具备匿名性,即隐私的可保护性.然而区块链上记录的交易信息,会给用户隐私带来潜在的泄露威胁;此外,为了防止重复花费,系统约定只有在目标区块之后又有k个后续区块产生才能确认该目标区块上的交易是有效的,这段等待后续区块生成的时间较长,大大降低了交易效率.针对以上问题,提出一种基于代理的密码货币支付系统模型,并给出了基于盲签名算法的实现方案,通过在支付阶段引入代理,缩短了交易确认时间,提高了交易效率,同时,更好地实现了用户的匿名性即隐私保护功能.

  14. Munchausen by Proxy Syndrome

    Science.gov (United States)

    ... the Child Getting Help for the Parent or Caregiver Print Munchausen by proxy syndrome (MBPS) is a relatively rare form of child abuse that involves the exaggeration or fabrication of illnesses or symptoms by a primary caretaker. Also known as "medical child abuse," MBPS ...

  15. Reliability and validity of a self-administration version of DEMQOL-Proxy.

    Science.gov (United States)

    Hendriks, A A Jolijn; Smith, Sarah C; Chrysanthaki, Theopisti; Black, Nick

    2017-07-01

    This study aimed to investigate the reliability and validity of a self-administered version of DEMQOL-Proxy, a disease-specific instrument that measures health-related quality of life in people with dementia. The sample consisted of 173 informal carers of people with dementia, aged 29 to 89 years old. Carers were mostly female, White/White British and closely related to the patient. They completed DEMQOL-Proxy (self-administered), EQ-5D-3L (proxy reported about the person with dementia), EQ-5D-3L (self-reported about their own health) and the Zarit Burden Interview. Using well-established methods from classical test theory, we evaluated scale level acceptability, reliability and convergent, discriminant and known-groups validity of DEMQOL-Proxy. DEMQOL-Proxy (self-administered) showed high acceptability (3.5% missing data and 0% scores at floor or ceiling), high internal consistency reliability (α = 0.93) and good convergent and discriminant validity. Amongst others, we found a moderately high correlation with EQ-5D-3L proxy reported (r = 0.52) and low to essentially zero correlations with EQ-5D-3L self-reported (r = 0.20) and carer and patient background variables (r ≤ 0.20). As predicted, DEMQOL-Proxy (self-administered) showed a modest correlation with DEMQOL (r = 0.32). Known-groups differences on health-related quality of life (comparing people with versus people without cognitive impairment) were of moderate effect size (d = 0.38) and in the expected direction. DEMQOL-Proxy (self-administered) has comparable acceptability, reliability and validity with DEMQOL-Proxy (interviewer administered). DEMQOL-Proxy (self-administered) can be used in a wider variety of contexts than its interviewer-administered version, including routine use in busy clinics. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  16. Validation and application of a death proxy in adult cancer patients.

    Science.gov (United States)

    Mealing, Nicole M; Dobbins, Timothy A; Pearson, Sallie-Anne

    2012-07-01

    PURPOSE: Fact of death is not always available on data sets used for pharmacoepidemiological research. Proxies may be an appropriate substitute in the absence of death data. The purposes of this study were to validate a proxy for death in adult cancer patients and to assess its performance when estimating survival in two cohorts of cancer patients. METHODS: We evaluated 30-, 60-, 90- and 180-day proxies overall and by cancer type using data from 12 394 Australian veterans with lung, colorectal, breast or prostate cancer. The proxy indicated death if the difference between the last dispensing record and the end of the observational period exceeded the proxy cutoff. We then compared actual survival to 90-day proxy estimates in a subset of 4090 veterans with 'full entitlements' for pharmaceutical items and in 3704 Australian women receiving trastuzumab for HER2+ metastatic breast cancer. RESULTS: The 90-day proxy was optimal with an overall sensitivity of 99.3% (95%CI: 98.4-99.7) and a specificity of 97.6% (95%CI: 91.8-99.4). These measures remained high when evaluated by cancer type and spread of disease. The application of the proxy using the most conservative date of death estimate (date of last dispensing) generally underestimated survival, with estimates up to 3 months shorter than survival based on fact of death. CONCLUSIONS: A 90-day death proxy is a robust substitute to identify death in a chronic population when fact of death is not available. The proxy is likely to be valid across a range of chronic diseases as it relies on the presence of 'regular' dispensing records for individual patients. Copyright © 2011 John Wiley & Sons, Ltd. Copyright © 2011 John Wiley & Sons, Ltd.

  17. The blind leading the blind: use and misuse of blinding in randomized controlled trials.

    Science.gov (United States)

    Miller, Larry E; Stewart, Morgan E

    2011-03-01

    The use of blinding strengthens the credibility of randomized controlled trials (RCTs) by minimizing bias. However, there is confusion surrounding the definition of blinding as well as the terms single, double, and triple blind. It has been suggested that these terms should be discontinued due to their broad misinterpretation. We recommend that, instead of abandoning the use of these terms, explicit definitions of blinding should be adopted. We address herein the concept of blinding, propose standard definitions for the consistent use of these terms, and detail when different types of blinding should be utilized. Standardizing the definition of blinding and utilizing proper blinding methods will improve the quality and clarity of reporting in RCTs. Copyright © 2010 Elsevier Inc. All rights reserved.

  18. Microbiota-based Signature of Gingivitis Treatments: A Randomized Study.

    Science.gov (United States)

    Huang, Shi; Li, Zhen; He, Tao; Bo, Cunpei; Chang, Jinlan; Li, Lin; He, Yanyan; Liu, Jiquan; Charbonneau, Duane; Li, Rui; Xu, Jian

    2016-04-20

    Plaque-induced gingivitis can be alleviated by various treatment regimens. To probe the impacts of various anti-gingivitis treatments on plaque microflora, here a double blinded, randomized controlled trial of 91 adults with moderate gingivitis was designed with two anti-gingivitis regimens: the brush-alone treatment and the brush-plus-rinse treatment. In the later group, more reduction in both Plaque Index (TMQHI) and Gingival Index (mean MGI) at Day 3, Day 11 and Day 27 was evident, and more dramatic changes were found between baseline and other time points for both supragingival plaque microbiota structure and salivary metabonomic profiles. A comparison of plaque microbiota changes was also performed between these two treatments and a third dataset where 50 subjects received regimen of dental scaling. Only Actinobaculum, TM7 and Leptotrichia were consistently reduced by all the three treatments, whereas the different microbial signatures of the three treatments during gingivitis relieve indicate distinct mechanisms of action. Our study suggests that microbiota based signatures can serve as a valuable approach for understanding and potentially comparing the modes of action for clinical treatments and oral-care products in the future.

  19. Fighting terrorism in Africa by proxy

    DEFF Research Database (Denmark)

    Olsen, Gorm Rye

    2014-01-01

    The French intervention in Mali in early 2013 emphasizes that the decision-makers in Paris, Brussels, and Washington considered the establishment of the radical Islamist regime in Northern Mali a threat to their security interests. The widespread instability including the rise of radical Islamist...... groups in Somalia was perceived as a threat to western interests. It is the core argument of the paper if western powers decide to provide security in Africa, they will be inclined to use proxy instead of deploying own troops. Security provision by proxy in African means that African troops are doing...

  20. Applicability of a cognitive questionnaire in the elderly and proxy

    Directory of Open Access Journals (Sweden)

    Renata Areza Fegyveres

    Full Text Available Abstract The Informant Questionnaire on Cognitive Decline in the Elderly with the Proxy (IQCODE was developed as a screening tool for cognition alterations. Objectives: 1 To verify the applicability of IQCODE in the elderly with limited schooling, 2 To verify the reliability of the responses supplied by the aged and their proxies. Methods: Individuals of a Community Group were evaluated using the Mini-Mental State Examination (MMSE, IQCODE and Geriatric Depression Scale (GDS. The IQCODE was applied to informants and proxies. Results: We analyzed 44 individuals, aged between 58-82 years (M=66.8, SD=5.97 with mean elderly-schooling level of 3.75, SD=2.82 and 44 proxies aged 44.5 (SD=13.3, with mean schooling level of 8.25 (SD=4.3. The mean GDS was 8.22, SD=4.90 and 13 participants presented a score suggestive of depressive symptoms. The mean elderly IQCODE score was 3.26, SD=0.69 and 3.21, SD=0.65, for proxy responses. There was no statistical difference between these means. On the MMSE, the mean score was 24.20, SD=4.14 and 18 participants presented scores below the cut-off. The IQCODE answers by the elderly in this latter group were more congruent with MMSE than the answers of proxies. Conclusions: The applicability of the IQCODE in a population with little schooling was verified in that the proxy-report was similar to the elderly report. We can affirm that the elderly answers were more accurate than the proxies, as they were closer to MMSE score. The inclusion of a greater number of participants from community-dwelling settings is necessary to confirm the results obtained in this study.

  1. A MUSIC-Based Algorithm for Blind User Identification in Multiuser DS-CDMA

    Directory of Open Access Journals (Sweden)

    M. Reza Soleymani

    2005-04-01

    Full Text Available A blind scheme based on multiple-signal classification (MUSIC algorithm for user identification in a synchronous multiuser code-division multiple-access (CDMA system is suggested. The scheme is blind in the sense that it does not require prior knowledge of the spreading codes. Spreading codes and users' power are acquired by the scheme. Eigenvalue decomposition (EVD is performed on the received signal, and then all the valid possible signature sequences are projected onto the subspaces. However, as a result of this process, some false solutions are also produced and the ambiguity seems unresolvable. Our approach is to apply a transformation derived from the results of the subspace decomposition on the received signal and then to inspect their statistics. It is shown that the second-order statistics of the transformed signal provides a reliable means for removing the false solutions.

  2. Munchausen syndrome by proxy

    Directory of Open Access Journals (Sweden)

    Jovanović Aleksandar A.

    2005-01-01

    Full Text Available This review deals with bibliography on Munchausen syndrome by proxy (MSbP. The name of this disorder was introduced by English psychiatrist Roy Meadow who pointed to diagnostic difficulties as well as to serious medical and legal connotations of MSbP. MSbP was classified in DSM-IV among criteria sets provided for further study as "factitious disorder by proxy", while in ICD-10, though not explicitly cited, MSbP might be classified as "factitious disorders" F68.1. MSbP is a special form of abuse where the perpetrator induces somatic or mental symptoms of illness in the victim under his/her care and then persistently presents the victims for medical examinations and care. The victim is usually a preschool child and the perpetrator is the child's mother. Motivation for such pathological behavior of perpetrator is considered to be unconscious need to assume sick role by proxy while external incentives such as economic gain are absent. Conceptualization of MSbP development is still in the domain of psychodynamic speculation, its course is chronic and the prognosis is poor considering lack of consistent, efficient and specific treatment. The authors also present the case report of thirty-three year-old mother who had been abusing her nine year-old son both emotionally and physically over the last several years forcing him to, together with her, report to the police, medical and educational institutions that he had been the victim of rape, poisoning and beating by various individuals, especially teaching and medical staff. Mother manifested psychosis and her child presented with impaired cognitive development, emotional problems and conduct disorder.

  3. Evaluation of patient and proxy responses on the activity measure for postacute care.

    Science.gov (United States)

    Jette, Alan M; Ni, Pengsheng; Rasch, Elizabeth K; Appelman, Jed; Sandel, M Elizabeth; Terdiman, Joseph; Chan, Leighton

    2012-03-01

    Our objective was to examine the agreement between adult patients with stroke and family member or clinician proxies in activity measure for postacute care (AM-PAC) summary scores for daily activity, basic mobility, and applied cognitive function. This study involved 67 patients with stroke admitted to a hospital within the Kaiser Permanente of Northern California system and were participants in a parent study on stroke outcomes. Each participant and proxy respondent completed the AM-PAC by personal or telephone interview at the point of hospital discharge or during ≥1 transitions to different postacute care settings. The results suggest that for patients with a stroke proxy, AM-PAC data are robust for family or clinician proxy assessment of basic mobility function and clinician proxy assessment of daily activity function, but less robust for family proxy assessment of daily activity function and for all proxy groups' assessments of applied cognitive function. The pattern of disagreement between patient and proxy was, on average, relatively small and random. There was little evidence of systematic bias between proxy and patient reports of their functional status. The degree of concordance between patient and proxy was similar for those with moderate to severe strokes compared with mild strokes. Patient and proxy ratings on the AM-PAC achieved adequate agreement for use in stroke research when using proxy respondents could reduce sample selection bias. The AM-PAC data can be implemented across institutional as well as community care settings while achieving precision and reducing respondent burden.

  4. Proxy-rated quality of life in Alzheimer's disease

    DEFF Research Database (Denmark)

    Vogel, Asmus; Bhattacharya, Suvosree; Waldorff, Frans Boch

    2012-01-01

    The study investigated the change in proxy rated quality of life (QoL) of a large cohort of home living patients with Alzheimer's disease (AD) over a period of 36 months.......The study investigated the change in proxy rated quality of life (QoL) of a large cohort of home living patients with Alzheimer's disease (AD) over a period of 36 months....

  5. SIGNATURE: A workbench for gene expression signature analysis

    Directory of Open Access Journals (Sweden)

    Chang Jeffrey T

    2011-11-01

    Full Text Available Abstract Background The biological phenotype of a cell, such as a characteristic visual image or behavior, reflects activities derived from the expression of collections of genes. As such, an ability to measure the expression of these genes provides an opportunity to develop more precise and varied sets of phenotypes. However, to use this approach requires computational methods that are difficult to implement and apply, and thus there is a critical need for intelligent software tools that can reduce the technical burden of the analysis. Tools for gene expression analyses are unusually difficult to implement in a user-friendly way because their application requires a combination of biological data curation, statistical computational methods, and database expertise. Results We have developed SIGNATURE, a web-based resource that simplifies gene expression signature analysis by providing software, data, and protocols to perform the analysis successfully. This resource uses Bayesian methods for processing gene expression data coupled with a curated database of gene expression signatures, all carried out within a GenePattern web interface for easy use and access. Conclusions SIGNATURE is available for public use at http://genepattern.genome.duke.edu/signature/.

  6. Longitudinal proxy measurements in multiple sclerosis: patient-proxy agreement on the impact of MS on daily life over a period of two years

    Directory of Open Access Journals (Sweden)

    Thompson Alan J

    2008-02-01

    Full Text Available Abstract Background The use of self-report measurements in clinical settings is increasing. However, in patients with limitations that interfere with reliable self-assessment such as cognitive impairment or mood disturbances, as may be the case in multiple sclerosis (MS, data collection might be problematic. In these situations, information obtained from proxy respondents (e.g. partners may replace self-ratings. The aim of this study was to examine the value of proxy ratings at separate points in time and to assess patient-proxy agreement on possible changes in disease impact of MS. Methods Fifty-six MS patients and their partners completed the Multiple Sclerosis Impact Scale (MSIS-29 at baseline and follow-up, two years later. Patient-proxy agreement was assessed at both time points by calculating intraclass correlation coefficients (ICCs, exact and global agreement and the mean directional differences between groups. Agreement of change over time was assessed by calculating ICCs between change scores. In parallel, global ratings of both patients and proxy respondents of the extent to which the patient had improved or deteriorated over the past two years were collected to validate possible changes on the MSIS-29. Results At both time points, agreement on the physical scale was higher than agreement on the psychological scale (ICCs at baseline were 0.81 for the physical scale and 0.72 for the psychological scale; at follow-up, the ICC values were 0.86 and 0.65 respectively. At follow-up, statistically significant mean differences between patients and proxies were noted for the physical scale (-4.8 ± 12.7, p = 0.006 and the psychological scale (-8.9 ± 18.8, p = 0.001. Agreement between change scores on the MSIS-29 was fair (ICC Conclusion Proxy respondents could act as a reliable source of information in cross-sectional studies. Moreover, results suggested that agreement on change over time might be better for proxy respondents compared to

  7. The design and implementation about the project of optimizing proxy servers

    International Nuclear Information System (INIS)

    Wu Ling; Liu Baoxu

    2006-01-01

    Proxy server is an important facility in the network of an organization, which play an important role in security and access control and accelerating access of Internet. This article introduces the action of proxy servers, and expounds the resolutions to optimize proxy servers at IHEP: integration, dynamic domain name resolves and data synchronization. (authors)

  8. Pattern-mixture models for analyzing normal outcome data with proxy respondents.

    Science.gov (United States)

    Shardell, Michelle; Hicks, Gregory E; Miller, Ram R; Langenberg, Patricia; Magaziner, Jay

    2010-06-30

    Studies of older adults often involve interview questions regarding subjective constructs such as perceived disability. In some studies, when subjects are unable (e.g. due to cognitive impairment) or unwilling to respond to these questions, proxies (e.g. relatives or other care givers) are recruited to provide responses in place of the subject. Proxies are usually not approached to respond on behalf of subjects who respond for themselves; thus, for each subject, data from only one of the subject or proxy are available. Typically, proxy responses are simply substituted for missing subject responses, and standard complete-data analyses are performed. However, this approach may introduce measurement error and produce biased parameter estimates. In this paper, we propose using pattern-mixture models that relate non-identifiable parameters to identifiable parameters to analyze data with proxy respondents. We posit three interpretable pattern-mixture restrictions to be used with proxy data, and we propose estimation procedures using maximum likelihood and multiple imputation. The methods are applied to a cohort of elderly hip-fracture patients. (c) 2010 John Wiley & Sons, Ltd.

  9. Reliability of proxy respondents for patients with stroke: a systematic review.

    Science.gov (United States)

    Oczkowski, Colin; O'Donnell, Martin

    2010-01-01

    Proxy respondents are an important aspect of stroke medicine and research. We performed a systematic review of studies evaluating the reliability of proxy respondents for stroke patients. Studies were identified by searches of MEDLINE, Google, and the Cochrane Library between January 1969 and June 2008. All were prospective or cross-sectional studies reporting the reliability of proxy respondents for patients with a history of previous stroke or transient ischemic attack. One author abstracted data. For each study, intraclass correlation (ICC) or the k-statistic was categorized as poor (0.80). Thirteen studies, with a total of 2618 participants, met our inclusion criteria. Most studies recruited patients >3 months after their stroke. Of these studies, 5 (360 participants; 5 scales) evaluated reliability of proxy respondents for activities of daily living (ADL), and 9 (2334 participants; 9 scales) evaluated reliability of proxy respondents for quality of life (QoL). One study evaluated both. In studies, the ICC/k for scales ranged from 0.61 to 0.91 for ADL and from 0.41 to 0.8 for QoL. Most studies reported that proxy respondents overestimated impairments compared with patient self-reports. Stroke severity and objective nature of questions were the most consistent determinants of disagreement between stroke patient and proxy respondent. Our data indicate that beyond the acute stroke period, the reliability of proxy respondents for validated scales of ADL was substantial to excellent, while that of scales for QoL was moderate to substantial. Copyright (c) 2010 National Stroke Association. Published by Elsevier Inc. All rights reserved.

  10. Proxy-produced ethnographic work: what are the problems, issues, and dilemmas arising from proxy ethnography?

    DEFF Research Database (Denmark)

    Martinussen, Marie Louise; Højbjerg, Karin; Tamborg, Andreas Lindenskov

    2018-01-01

    This article addresses the implications of research-student cooperation in the production of empirical material. For the student to replace the experienced researcher and work under the researcher’s supervision, we call such work proxy-produced ethnographic work. The specific relations...... and positions arising from such a setup between the teacher/researcher and the proxy ethnographer/student are found to have implications for the ethnographies produced. This article’s main focus is to show how these relations and positions have not distorted the ethnographic work and the ethnographies but......, rather, have oriented it in certain ways. It is shown how the participating researchers – both senior and junior - have distinctive, incorporated dispositions with which they pre-consciously participate in an implicit and subtle relation that can make it very easy to overlook distortions during...

  11. Analyzing differences between patient and proxy on Patient Reported Outcomes in multiple sclerosis.

    Science.gov (United States)

    Sonder, Judith M; Holman, Rebecca; Knol, Dirk L; Bosma, Libertje V A E; Polman, Chris H; Uitdehaag, Bernard M J

    2013-11-15

    Proxy respondents, partners of multiple sclerosis (MS) patients, can provide valuable information on the MS patients' disease. In an earlier publication we found relatively good agreement on patient reported outcomes (PROs) measuring physical impact and functioning, but we found large differences on (neuro)psychological scales. We aim to identify patient and proxy related variables explaining differences between patients' and proxies' ratings on five PROs. We report on data from 175 MS patients and proxy respondents. Regression analyses were performed, using as dependent variable the mean differences on five scales: Physical and Psychological scale of the Multiple Sclerosis Impact Scale (MSIS-29), the Multiple Sclerosis Walking Scale (MSWS), Guy's Neurological Disability Scale (GNDS) and the Multiple Sclerosis Neuropsychological Screening Questionnaire (MSNQ). The independent variables were patient, proxy and disease related variables. Caregiver strain was significantly related to differences between patient and proxy scores for all five PROs. A higher level of patient anxiety on the HADS was linked to larger differences on all PROs except the GNDS. In addition, cognitive functioning, proxy depression, walking ability, proxy gender and MS related disability were contributing to the discrepancies. We found several patient and proxy factors that may contribute to discrepancies between patient and proxy scores on MS PROs. The most important factor is caregiver burden. © 2013 Elsevier B.V. All rights reserved.

  12. The Difference Between Using Proxy Server and VPN

    Directory of Open Access Journals (Sweden)

    David Dwiputra Kurniadi

    2015-11-01

    For example, looking for software, game through internet. But sometimes, there are some websites that cannot be opened as they have Internet Positive notificatio. To solve that problem, hacker found the solution by creating Proxy Server or VPN. In this time internet is very modern and very easy to access and there are a lot of Proxy Server and VPN that can be easly used.

  13. Heterogeneity of Cr in Mytilus edulis: Implications for the Cr isotope system as a paleo-redox proxy

    Science.gov (United States)

    Bruggmann, Sylvie; Klaebe, Robert; Frei, Robert

    2017-04-01

    's Cr isotopic composition [3]. A detailed understanding of the processes causing the observed heterogeneity of [Cr] and δ53Cr in modern carbonate shells is crucial for the use of the Cr isotope system as a potential paleo-redox proxy. [1] Bonnand, P., James, R. H., Parkinson, I. J., Connelly, D. P., and Fairchild, I. J. (2013). The chromium isotopic composition of seawater and marine carbonates. Earth and Planetary Science Letters, 382:10-20. [2] Holmden, C., Jacobsen, A. D., Sageman, B. B., Hurgten, M. T. (2016). Response of the Cr isotope proxy to Cretaceous Ocean Anoxic Event 2 in a pelagic carbonate succession from the Western Interior Seaway. Geochimica et Cosmochimica Acta, 186:227-295. [3] Paulukat, C., Gilleaudeau, G. J., Chernyavskiy, P., Frei, R. (2016). The Cr-isotope signature of surface seawater -A global perspective. Chemical Geology, 444:101-109. [4] Pereira, N. S., Voegelin, A. R., Paulukat, C., Sial, A. N., Ferreira, V. P., and Frei, R. (2015). Chromium-isotope signatures in scleractinian corals from the Rocas Atoll, Tropical South Atlantic. Geobiology 1-14.

  14. The Intra-Industry Effects of Proxy Contests

    OpenAIRE

    Fang Chen; Jian Huang; Han Yu

    2018-01-01

    This paper is the first study on the intra-industry effects of proxy contests. Using a sample of proxy contests from January 1988 through December 2008, we identify a striking cross-sectional difference in market reaction to the target companies. As much as 61% of the target firms have a significant positive cumulative abnormal return (CARs) in the period (‒10, +10) around the announcement day, while 39% of the target firms have the negative CARs in the same event window. Moreover, we find th...

  15. Architecture of a bi-directional Bluetooth-UPnP proxy

    NARCIS (Netherlands)

    Delphinanto, A.; Lukkien, J.J.; Koonen, A.M.J.; Hartog, F.T.H. den; Madureira, A.J.P.S.; Niemegeers, I.G.M.M.; Selgert, F.

    2007-01-01

    The current service- and device discovery protocols are not platform- and network independent Therefore, proxy servers will be needed to extend the range of IP-based discovery protocols to non-IP domains. We developed an architecture of a proxy that enables UPnP devices and services to be discovered

  16. Isotopic signatures of eelgrass (Zostera marina L.) as bioindicator of anthropogenic nutrient input in the western Baltic Sea

    International Nuclear Information System (INIS)

    Schubert, Philipp R.; Karez, Rolf; Reusch, Thorsten B.H.; Dierking, Jan

    2013-01-01

    Highlights: • Anthropogenic nitrogen (N) inputs are a global problem, but difficult to quantify. • We tested the use of eelgrass δ 15 N as proxy of such inputs in the Baltic Sea. • The method revealed distinct spatial patterns in sewage N across a eutrophic bay. • Traditional eutrophication measures corroborated the results from δ 15 N values. • Eelgrass δ 15 N ratios have high potential as proxy of sewage-derived N in the Baltic. -- Abstract: Eutrophication is a global environmental problem. Better management of this threat requires more accurate assessments of anthropogenic nitrogen (N) inputs to coastal systems than can be obtained with traditional measures. Recently, primary producer N isotopic signatures have emerged as useful proxy of such inputs. Here, we demonstrated for the first time the applicability of this method using the widespread eelgrass (Zostera marina) in the highly eutrophic Baltic Sea. Spatial availability of sewage N across a bay with one major sewage outflow predicted by eelgrass δ 15 N was high near and downstream of the outflow compared to upstream, but returned to upstream levels within 4 km downstream from the outfall. General conclusions were corroborated by traditional eutrophication measures, but in contrast to these measures were fully quantitative. Eelgrass N isotope ratios therefore show high potential for coastal screens of eutrophication in the Baltic Sea, and in other areas with eelgrass meadows

  17. Distribution of biologic, anthropogenic, and volcanic constituents as a proxy for sediment transport in the San Francisco Bay Coastal System

    Science.gov (United States)

    McGann, Mary; Erikson, Li H.; Wan, Elmira; Powell, Charles; Maddocks, Rosalie F.; Barnard, P.L.; Jaffee, B.E.; Schoellhamer, D.H.

    2013-01-01

    Although conventional sediment parameters (mean grain size, sorting, and skewness) and provenance have typically been used to infer sediment transport pathways, most freshwater, brackish, and marine environments are also characterized by abundant sediment constituents of biological, and possibly anthropogenic and volcanic, origin that can provide additional insight into local sedimentary processes. The biota will be spatially distributed according to its response to environmental parameters such as water temperature, salinity, dissolved oxygen, organic carbon content, grain size, and intensity of currents and tidal flow, whereas the presence of anthropogenic and volcanic constituents will reflect proximity to source areas and whether they are fluvially- or aerially-transported. Because each of these constituents have a unique environmental signature, they are a more precise proxy for that source area than the conventional sedimentary process indicators. This San Francisco Bay Coastal System study demonstrates that by applying a multi-proxy approach, the primary sites of sediment transport can be identified. Many of these sites are far from where the constituents originated, showing that sediment transport is widespread in the region. Although not often used, identifying and interpreting the distribution of naturally-occurring and allochthonous biologic, anthropogenic, and volcanic sediment constituents is a powerful tool to aid in the investigation of sediment transport pathways in other coastal systems.

  18. Slices: A shape-proxy based on planar sections

    KAUST Repository

    McCrae, James

    2011-12-01

    Minimalist object representations or shape-proxies that spark and inspire human perception of shape remain an incompletely understood, yet powerful aspect of visual communication. We explore the use of planar sections, i.e., the contours of intersection of planes with a 3D object, for creating shape abstractions, motivated by their popularity in art and engineering. We first perform a user study to show that humans do define consistent and similar planar section proxies for common objects. Interestingly, we observe a strong correlation between user-defined planes and geometric features of objects. Further we show that the problem of finding the minimum set of planes that capture a set of 3D geometric shape features is both NP-hard and not always the proxy a user would pick. Guided by the principles inferred from our user study, we present an algorithm that progressively selects planes to maximize feature coverage, which in turn influence the selection of subsequent planes. The algorithmic framework easily incorporates various shape features, while their relative importance values are computed and validated from the user study data. We use our algorithm to compute planar slices for various objects, validate their utility towards object abstraction using a second user study, and conclude showing the potential applications of the extracted planar slice shape proxies.

  19. Differences between Proxy and Patient Assessments of Cancer Care Experiences and Quality Ratings.

    Science.gov (United States)

    Roydhouse, Jessica K; Gutman, Roee; Keating, Nancy L; Mor, Vincent; Wilson, Ira B

    2018-04-01

    To assess the impact of proxy survey responses on cancer care experience reports and quality ratings. Secondary analysis of data from Cancer Care Outcomes Research and Surveillance (CanCORS). Recruitment occurred from 2003 to 2005. The study was a cross-sectional observational study. The respondents were patients with incident colorectal or lung cancer or their proxies. Analyses used linear regression models with an independent variable for proxy versus patient responses as well as study site and clinical covariates. The outcomes were experiences with medical care, nursing care, care coordination, and care quality rating. Multiple imputation was used for missing data. Among 6,471 respondents, 1,011 (16 percent) were proxies. The proportion of proxy respondents varied from 6 percent to 28 percent across study sites. Adjusted proxy scores were modestly higher for medical care experiences (+1.28 points [95 percent CI:+ 0.05 to +2.51]), but lower for nursing care (-2.81 [95 percent CI: -4.11 to -1.50]) and care coordination experiences (-2.98 [95 percent CI: -4.15 to -1.81]). There were no significant differences between adjusted patient and proxy ratings of quality. Proxy responses have small but statistically significant differences from patient responses. However, if ratings of care are used for financial incentives, such differences could be exaggerated across practices or areas if proxy use varies. © Health Research and Educational Trust.

  20. Qualitative and Quantitative Sentiment Proxies

    DEFF Research Database (Denmark)

    Zhao, Zeyan; Ahmad, Khurshid

    2015-01-01

    Sentiment analysis is a content-analytic investigative framework for researchers, traders and the general public involved in financial markets. This analysis is based on carefully sourced and elaborately constructed proxies for market sentiment and has emerged as a basis for analysing movements...

  1. Host, family and community proxies for infections potentially associated with leukaemia

    International Nuclear Information System (INIS)

    Law, G. R.

    2008-01-01

    Three hypotheses have proposed the involvement of infections in the aetiology of childhood leukaemia, suggesting either a specific leukemogenic infection or a series of common infections that lead to a dys-regulation of the immune system. Much of the evidence for the link with infections has been based on epidemiological observations, often using proxy measures of infection. Proxy measures include population mixing, parental occupation, age distribution of incidence, spatial and space-time clustering of cases, birth order and day care during infancy. This paper discusses the proxies used and examines to what extent a commonly used proxy measure, birth order, is a fair representation of either specific infections or general infectious load. It is clear that although leukaemia, and other diseases, may be linked with infections, one needs to (1) measure specific and general infections with more accuracy and (2) understand how proxy measures relate to real infections in the population. (authors)

  2. Web proxy cache replacement strategies simulation, implementation, and performance evaluation

    CERN Document Server

    ElAarag, Hala; Cobb, Jake

    2013-01-01

    This work presents a study of cache replacement strategies designed for static web content. Proxy servers can improve performance by caching static web content such as cascading style sheets, java script source files, and large files such as images. This topic is particularly important in wireless ad hoc networks, in which mobile devices act as proxy servers for a group of other mobile devices. Opening chapters present an introduction to web requests and the characteristics of web objects, web proxy servers and Squid, and artificial neural networks. This is followed by a comprehensive review o

  3. Targeted Metabolomics Reveals Early Dominant Optic Atrophy Signature in Optic Nerves of Opa1delTTAG/+ Mice.

    Science.gov (United States)

    Chao de la Barca, Juan Manuel; Simard, Gilles; Sarzi, Emmanuelle; Chaumette, Tanguy; Rousseau, Guillaume; Chupin, Stéphanie; Gadras, Cédric; Tessier, Lydie; Ferré, Marc; Chevrollier, Arnaud; Desquiret-Dumas, Valérie; Gueguen, Naïg; Leruez, Stéphanie; Verny, Christophe; Miléa, Dan; Bonneau, Dominique; Amati-Bonneau, Patrizia; Procaccio, Vincent; Hamel, Christian; Lenaers, Guy; Reynier, Pascal; Prunier-Mirebeau, Delphine

    2017-02-01

    Dominant optic atrophy (MIM No. 165500) is a blinding condition related to mutations in OPA1, a gene encoding a large GTPase involved in mitochondrial inner membrane dynamics. Although several mouse models mimicking the disease have been developed, the pathophysiological mechanisms responsible for retinal ganglion cell degeneration remain poorly understood. Using a targeted metabolomic approach, we measured the concentrations of 188 metabolites in nine tissues, that is, brain, three types of skeletal muscle, heart, liver, retina, optic nerve, and plasma in symptomatic 11-month-old Opa1delTTAG/+ mice. Significant metabolic signatures were found only in the optic nerve and plasma of female mice. The optic nerve signature was characterized by altered concentrations of phospholipids, amino acids, acylcarnitines, and carnosine, whereas the plasma signature showed decreased concentrations of amino acids and sarcosine associated with increased concentrations of several phospholipids. In contrast, the investigation of 3-month-old presymptomatic Opa1delTTAG/+ mice showed no specific plasma signature but revealed a significant optic nerve signature in both sexes, although with a sex effect. The Opa1delTTAG/+ versus wild-type optic nerve signature was characterized by the decreased concentrations of 10 sphingomyelins and 10 lysophosphatidylcholines, suggestive of myelin sheath alteration, and by alteration in the concentrations of metabolites involved in neuroprotection, such as dimethylarginine, carnitine, spermine, spermidine, carnosine, and glutamate, suggesting a concomitant axonal metabolic dysfunction. Our comprehensive metabolomic investigations revealed in symptomatic as well as in presymptomatic Opa1delTTAG/+ mice, a specific sensitiveness of the optic nerve to Opa1 insufficiency, opening new routes for protective therapeutic strategies.

  4. Forecasting Lightning Threat Using WRF Proxy Fields

    Science.gov (United States)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  5. Analysis of Quality of Proxy Questions in Health Surveys by Behavior Coding

    NARCIS (Netherlands)

    Benitez, I.; Padilla, J.L.; Ongena, Yfke

    2012-01-01

    The aim of this study is to show how to analyze the quality of questions for proxy informants by means of behavior coding. Proxy questions can undermine survey data quality because of the fact that proxies respond to questions on behalf of other people. Behavior coding can improve questions by

  6. Oxygen Isotopes Archived in Subfossil Chironomids: Advancing a Promising Proxy for Lake Water Isotopes

    Science.gov (United States)

    Lasher, G. E.; Axford, Y.; Blair, N. E.

    2017-12-01

    Oxygen isotopes measured in subfossil chironomid head capsules (aquatic insect remains) in lake sediments are beginning to offer paleoclimate insights from previously under-studied areas of the world. Since the first published pilot study demonstrated the potential of chironomid δ18O to record lake water δ18O (Wooller et al., 2004), subsequent work has refined our understanding of this proxy: confirming via lab cultures that growth water controls head capsule δ18O (Wang et al., 2009), refining laboratory pretreatment protocols, and further validating the method by demonstrating strong agreement between carbonate and chironomid-derived paleo-isotope records (Verbruggen et al., 2009, 2010, 2011). However, outstanding questions remain, including the seasonality of chironomid growth, possible species-dependent vital effects, and diagenetic effects on the protein-chitin complex that comprise chironomid cuticles. To address some of these questions, we summarize available data from paired modern chironomid-lake water δ18O values from around the world and discuss climatic and environmental factors affecting chironomid isotopic signatures. We also present new data on the resistance of these subfossils to diagenesis and degradation throughout the late Quaternary using Fourier Transform Infrared Spectroscopy (FT-IR) and Pyrolysis Gas Chromatography Mass Spectrometry (Py-GC/MS) of chironomid remains up to >100,000 years old. As chironomids are nearly ubiquitous in lakes globally and, we argue, molecularly stable through glacial and interglacial cycles, this proxy has the potential to greatly expand the spatial and temporal resolution of Quaternary paleo-isotopes and thus climate records. In addition to reviewing and presenting new methodological advances, we also present applications of chironomid δ18O from millennial- to centennial-scale Holocene Greenland lake records.

  7. Unconditionally Secure Quantum Signatures

    Directory of Open Access Journals (Sweden)

    Ryan Amiri

    2015-08-01

    Full Text Available Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols—signatures based on the Rivest–Adleman–Shamir (RSA algorithm, the digital signature algorithm (DSA, and the elliptic curve digital signature algorithm (ECDSA—are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally securesecure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  8. Statistical framework for evaluation of climate model simulations by use of climate proxy data from the last millennium – Part 2: A pseudo-proxy study addressing the amplitude of solar forcing

    Directory of Open Access Journals (Sweden)

    A. Hind

    2012-08-01

    Full Text Available The statistical framework of Part 1 (Sundberg et al., 2012, for comparing ensemble simulation surface temperature output with temperature proxy and instrumental records, is implemented in a pseudo-proxy experiment. A set of previously published millennial forced simulations (Max Planck Institute – COSMOS, including both "low" and "high" solar radiative forcing histories together with other important forcings, was used to define "true" target temperatures as well as pseudo-proxy and pseudo-instrumental series. In a global land-only experiment, using annual mean temperatures at a 30-yr time resolution with realistic proxy noise levels, it was found that the low and high solar full-forcing simulations could be distinguished. In an additional experiment, where pseudo-proxies were created to reflect a current set of proxy locations and noise levels, the low and high solar forcing simulations could only be distinguished when the latter served as targets. To improve detectability of the low solar simulations, increasing the signal-to-noise ratio in local temperature proxies was more efficient than increasing the spatial coverage of the proxy network. The experiences gained here will be of guidance when these methods are applied to real proxy and instrumental data, for example when the aim is to distinguish which of the alternative solar forcing histories is most compatible with the observed/reconstructed climate.

  9. Robotic Vehicle Proxy Simulation, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Energid Technologies proposes the development of a digital simulation that can replace robotic vehicles in field studies. This proxy simulation will model the...

  10. System Identification Based Proxy Model of a Reservoir under Water Injection

    Directory of Open Access Journals (Sweden)

    Berihun M. Negash

    2017-01-01

    Full Text Available Simulation of numerical reservoir models with thousands and millions of grid blocks may consume a significant amount of time and effort, even when high performance processors are used. In cases where the simulation runs are required for sensitivity analysis, dynamic control, and optimization, the act needs to be repeated several times by continuously changing parameters. This makes it even more time-consuming. Currently, proxy models that are based on response surface are being used to lessen the time required for running simulations during sensitivity analysis and optimization. Proxy models are lighter mathematical models that run faster and perform in place of heavier models that require large computations. Nevertheless, to acquire data for modeling and validation and develop the proxy model itself, hundreds of simulation runs are required. In this paper, a system identification based proxy model that requires only a single simulation run and a properly designed excitation signal was proposed and evaluated using a benchmark case study. The results show that, with proper design of excitation signal and proper selection of model structure, system identification based proxy models are found to be practical and efficient alternatives for mimicking the performance of numerical reservoir models. The resulting proxy models have potential applications for dynamic well control and optimization.

  11. Comparative assessment of predictions in ungauged basins – Part 3: Runoff signatures in Austria

    Directory of Open Access Journals (Sweden)

    A. Viglione

    2013-06-01

    Full Text Available This is the third of a three-part paper series through which we assess the performance of runoff predictions in ungauged basins in a comparative way. Whereas the two previous papers by Parajka et al. (2013 and Salinas et al. (2013 assess the regionalisation performance of hydrographs and hydrological extremes on the basis of a comprehensive literature review of thousands of case studies around the world, in this paper we jointly assess prediction performance of a range of runoff signatures for a consistent and rich dataset. Daily runoff time series are predicted for 213 catchments in Austria by a regionalised rainfall–runoff model and by Top-kriging, a geostatistical estimation method that accounts for the river network hierarchy. From the runoff time-series, six runoff signatures are extracted: annual runoff, seasonal runoff, flow duration curves, low flows, high flows and runoff hydrographs. The predictive performance is assessed in terms of the bias, error spread and proportion of unexplained spatial variance of statistical measures of these signatures in cross-validation (blind testing mode. Results of the comparative assessment show that, in Austria, the predictive performance increases with catchment area for both methods and for most signatures, it tends to increase with elevation for the regionalised rainfall–runoff model, while the dependence on climate characteristics is weaker. Annual and seasonal runoff can be predicted more accurately than all other signatures. The spatial variability of high flows in ungauged basins is the most difficult to estimate followed by the low flows. It also turns out that in this data-rich study in Austria, the geostatistical approach (Top-kriging generally outperforms the regionalised rainfall–runoff model.

  12. Limiting exercise options: depending on a proxy may inhibit exercise self-management.

    Science.gov (United States)

    Shields, Christopher A; Brawley, Lawrence R

    2007-07-01

    We examined the influence of proxy-assistance on exercisers' social cognitions and behavior. Fifty-six fitness class participants reported preference for proxy-assistance and reacted to exercising in different contexts. A 2 (proxy-led vs self-managed exercise context) by 2 (preferred assistance) MANOVA revealed significant assistance by context interactions for self-regulatory efficacy (SRE) and difficulty. Regarding self-managed exercise, high-assistance individuals expressed lower SRE and higher difficulty. Chi-square analysis revealed that significantly fewer high-assistance participants chose self-managed exercise. A one-way MANOVA on preferred assistance indicated that high-assistance participants were less confident, satisfied and perceived their self-managed exercise as more difficult. Results support Bandura's theorizing that use of a proxy can limit SRE of those preferring the proxy's control of their behavior.

  13. [Validity and reliability of the spanish EQ-5D-Y proxy version].

    Science.gov (United States)

    Gusi, N; Perez-Sousa, M A; Gozalo-Delgado, M; Olivares, P R

    2014-10-01

    A proxy version of the EQ-5D-Y, a questionnaire to evaluate the Health Related Quality of Life (HRQoL) in children and adolescents, has recently been developed. There are currently no data on the validity and reliability of this tool. The objective of this study was to analyze the validity and reliability of the EQ-5D-Y proxy version. A core set of self-report tools, including the Spanish version of the EQ-5D-Y were administered to a group of Spanish children and adolescents drawn from the general population. A similar core set of internationally standardized proxy tools, including the EQ-5D-Y proxy version were administered to their parents. Test-retest reliability was determined, and correlations with other generic measurements of HRQoL were calculated. Additionally, known group validity was examined by comparing groups with a priori expected differences in HRQoL. The agreement between the self-report and proxy version responses was also calculated. A total of 477 children and adolescents and their parents participated in the study. One week later, 158 participants completed the EQ-5D-Y/EQ-5D-Y proxy to facilitate reliability analysis. Agreement between the test-retest scores was higher than 88% for EQ-5D-Y self-report, and proxy version. Correlations with other health measurements showed similar convergent validity to that observed in the international EQ-5D-Y. Agreement between the self-report and proxy versions ranged from 72.9% to 97.1%. The results provide preliminary evidence of the reliability and validity of the EQ-5D-Y proxy version. Copyright © 2013 Asociación Española de Pediatría. Published by Elsevier Espana. All rights reserved.

  14. Testing the timing of radiocarbon-dated events between proxy archives

    NARCIS (Netherlands)

    Christen, J. A.; Mauquoy, D.; van der Plicht, J.; Bennett, K. D.; Blaauw, Maarten

    For interpreting past changes on a regional or global scale, the timings of proxy-inferred events are usually aligned with data from other locations. However, too often chronological uncertainties are ignored in proxy diagrams and multisite comparisons, making it possible for researchers to fall

  15. Blind estimation of blur in hyperspectral images

    Science.gov (United States)

    Zhang, Mo; Vozel, Benoit; Chehdi, Kacem; Uss, Mykhail; Abramov, Sergey; Lukin, Vladimir

    2017-10-01

    Hyperspectral images acquired by remote sensing systems are generally degraded by noise and can be sometimes more severely degraded by blur. When no knowledge is available about the degradations present on the original image, blind restoration methods can only be considered. By blind, we mean absolutely no knowledge neither of the blur point spread function (PSF) nor the original latent channel and the noise level. In this study, we address the blind restoration of the degraded channels component-wise, according to a sequential scheme. For each degraded channel, the sequential scheme estimates the blur point spread function (PSF) in a first stage and deconvolves the degraded channel in a second and final stage by means of using the PSF previously estimated. We propose a new component-wise blind method for estimating effectively and accurately the blur point spread function. This method follows recent approaches suggesting the detection, selection and use of sufficiently salient edges in the current processed channel for supporting the regularized blur PSF estimation. Several modifications are beneficially introduced in our work. A new selection of salient edges through thresholding adequately the cumulative distribution of their corresponding gradient magnitudes is introduced. Besides, quasi-automatic and spatially adaptive tuning of the involved regularization parameters is considered. To prove applicability and higher efficiency of the proposed method, we compare it against the method it originates from and four representative edge-sparsifying regularized methods of the literature already assessed in a previous work. Our attention is mainly paid to the objective analysis (via ݈l1-norm) of the blur PSF error estimation accuracy. The tests are performed on a synthetic hyperspectral image. This synthetic hyperspectral image has been built from various samples from classified areas of a real-life hyperspectral image, in order to benefit from realistic spatial

  16. Radiation signatures

    International Nuclear Information System (INIS)

    McGlynn, S.P.; Varma, M.N.

    1992-01-01

    A new concept for modelling radiation risk is proposed. This concept is based on the proposal that the spectrum of molecular lesions, which we dub ''the radiation signature'', can be used to identify the quality of the causal radiation. If the proposal concerning radiation signatures can be established then, in principle, both prospective and retrospective risk determination can be assessed on an individual basis. A major goal of biophysical modelling is to relate physical events such as ionization, excitation, etc. to the production of radiation carcinogenesis. A description of the physical events is provided by track structure. The track structure is determined by radiation quality, and it can be considered to be the ''physical signature'' of the radiation. Unfortunately, the uniqueness characteristics of this signature are dissipated in biological systems in ∼10 -9 s. Nonetheless, it is our contention that this physical disturbance of the biological system eventuates later, at ∼10 0 s, in molecular lesion spectra which also characterize the causal radiation. (author)

  17. Proxy and patient reports of health-related quality of life in a national cancer survey.

    Science.gov (United States)

    Roydhouse, Jessica K; Gutman, Roee; Keating, Nancy L; Mor, Vincent; Wilson, Ira B

    2018-01-05

    Proxy respondents are frequently used in surveys, including those assessing health-related quality of life (HRQOL). In cancer, most research involving proxies has been undertaken with paired proxy-patient populations, where proxy responses are compared to patient responses for the same individual. In these populations, proxy-patient differences are small and suggest proxy underestimation of patient HRQOL. In practice, however, proxy responses will only be used when patient responses are not available. The difference between proxy and patient reports of patient HRQOL where patients are not able to report for themselves in cancer is not known. The objective of this study was to evaluate the difference between patient and proxy reports of patient HRQOL in a large national cancer survey, and determine if this difference could be mitigated by adjusting for clinical and sociodemographic information about patients. Data were from the Cancer Care Outcomes Research and Surveillance (CanCORS) study. Patients or their proxies were recruited within 3-6 months of diagnosis with lung or colorectal cancer. HRQOL was measured using the SF-12 mental and physical composite scales. Differences of ½ SD (=5 points) were considered clinically significant. The primary independent variable was proxy status. Linear regression models were used to adjust for patient sociodemographic and clinical covariates, including cancer stage, patient age and education, and patient co-morbidities. Of 6471 respondents, 1011 (16%) were proxies. Before adjustment, average proxy-reported scores were lower for both physical (-6.7 points, 95% CI -7.4 to -5.9) and mental (-6 points, 95% CI -6.7 to -5.2) health. Proxy-reported scores remained lower after adjustment (physical: -5.8 points, -6.6 to -5; mental: -5.8 points, -6.6 to 5). Proxy-patient score differences remained clinically and statistically significant, even after adjustment for sociodemographic and clinical variables. Proxy-reported outcome scores

  18. 47 CFR 51.513 - Proxies for forward-looking economic cost.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Proxies for forward-looking economic cost. 51... SERVICES (CONTINUED) INTERCONNECTION Pricing of Elements § 51.513 Proxies for forward-looking economic cost... a cost study that complies with the forward-looking economic cost based pricing methodology...

  19. Error characterization for asynchronous computations: Proxy equation approach

    Science.gov (United States)

    Sallai, Gabriella; Mittal, Ankita; Girimaji, Sharath

    2017-11-01

    Numerical techniques for asynchronous fluid flow simulations are currently under development to enable efficient utilization of massively parallel computers. These numerical approaches attempt to accurately solve time evolution of transport equations using spatial information at different time levels. The truncation error of asynchronous methods can be divided into two parts: delay dependent (EA) or asynchronous error and delay independent (ES) or synchronous error. The focus of this study is a specific asynchronous error mitigation technique called proxy-equation approach. The aim of this study is to examine these errors as a function of the characteristic wavelength of the solution. Mitigation of asynchronous effects requires that the asynchronous error be smaller than synchronous truncation error. For a simple convection-diffusion equation, proxy-equation error analysis identifies critical initial wave-number, λc. At smaller wave numbers, synchronous error are larger than asynchronous errors. We examine various approaches to increase the value of λc in order to improve the range of applicability of proxy-equation approach.

  20. Satellite Altimeters and Gravimeters as Proxy of the Indonesian Throughflow

    Science.gov (United States)

    Susanto, R. D.; Song, Y. T.

    2014-12-01

    The Indonesian Throughflow (ITF), the only pathway for interocean exchange between the Pacific to the Indian Ocean, plays an important role in global ocean circulation and climate. Yet, continuous ITF measurement is difficult and expensive. We demonstrate a plausible approach to derive the ITF transport proxy using satellite altimetry sea surface height (SSH), gravimetry ocean bottom pressure (OBP) data, in situ measurements from the Makassar Strait from 1996-1998 and 2004-2009, and a theoretical formulation. We first identified the optimal locations in the Pacific and Indian Ocean based on the optimal correlation between the ITF transport through the Makassar Strait and the pressure gradients, represented by the SSH and OBP differences between the Pacific and Indian Oceans at a 1° x 1° horizontal resolution. These geographical locations (centred at off-equatorial in the western Pacific Ocean and centred at along the equator in the eastern Indian Ocean) that control the strength and variability of the ITF transport in the Makassar Strait differ from early studies. The proxy time series follow the observation time series quite well, resolving the intraseasonal, monsoonal, and interannual signals with the 1993-2011 annual mean proxy transport of 11.6 ± 3.2 Sv. Our formulation provides a continuous approach to derive the ITF proxy as long as the satellite data are available. Such a continuous record would be difficult to achieve by in situ measurements alone due to logistical and financial challenges. Ideally, the proxy can be used to complement or fill in the gaps of the observations for a continuous ITF proxy for better understanding the ocean climate and validating ocean circulation models.

  1. Proxy-Produced Ethnographic Work: What Are the Problems, Issues, and Dilemmas Arising from Proxy-Ethnography?

    Science.gov (United States)

    Martinussen, Marie; Højbjerg, Karin; Tamborg, Andreas Lindenskov

    2018-01-01

    This article addresses the implications of researcher-student cooperation in the production of empirical material. For the student to replace the experienced researcher and work under the researcher's supervision, we call such work proxy-produced ethnographic work. Although there are clear advantages, the specific relations and positions arising…

  2. Pyrite as a proxy for the identification of former coastal lagoons in semiarid NE Brazil

    Science.gov (United States)

    Ferreira, Tiago O.; Nóbrega, Gabriel N.; Albuquerque, Antonia G. B. M.; Sartor, Lucas R.; Gomes, Irlene S.; Artur, Adriana G.; Otero, Xosé L.

    2015-10-01

    This work aimed to test the suitability of pyrite (FeS2) as a proxy for reconstructing past marine environmental conditions along the semiarid coast of Brazil. Morphological description combined with physicochemical analyses including Fe partitioning were conducted for soil depth profiles (30 and 60 cm depths) at three sites in two contrasting lagoons of the state of Ceará: a suspected former lagoon that would have been transformed into a freshwater "lake" at a site vegetated by Juncus effusus (site P1), and another lagoon with connection to the sea at sites vegetated by J. effusus (site P2) or Portulaca oleracea (site P3). Soil samples were collected in September 2010. Site P3 had more reducing conditions, reaching Eh values of -132 mV in the surface layer (0-10 cm), whereas minimum values for the P1 and P2 sites were +219 and +85 mV, respectively. Lower pyritic Fe values were found at site P1, with a degree of pyritization (DOP) ranging from 10 to 13%. At sites P2 and P3, DOP ranged from 9 to 67% and from 55 to 72%, respectively. These results are consistent with an interruption of tidal channels by eolian dune migration inducing strong changes in the hydrodynamics and physicochemical characteristics (lower salinity, oxidizing conditions) of these sites, causing the dieback of suspected former mangroves and a succession to freshwater marshes with an intermediate salt marsh stage. Together with other physicochemical signatures, pyrite can evidently serve as a useful proxy in tracking environmental changes in such ecotones, with implications for coastal management.

  3. Electronic Signature Policy

    Science.gov (United States)

    Establishes the United States Environmental Protection Agency's approach to adopting electronic signature technology and best practices to ensure electronic signatures applied to official Agency documents are legally valid and enforceable

  4. Foraminifera Models to Interrogate Ostensible Proxy-Model Discrepancies During Late Pliocene

    Science.gov (United States)

    Jacobs, P.; Dowsett, H. J.; de Mutsert, K.

    2017-12-01

    Planktic foraminifera faunal assemblages have been used in the reconstruction of past oceanic states (e.g. the Last Glacial Maximum, the mid-Piacenzian Warm Period). However these reconstruction efforts have typically relied on inverse modeling using transfer functions or the modern analog technique, which by design seek to translate foraminifera into one or two target oceanic variables, primarily sea surface temperature (SST). These reconstructed SST data have then been used to test the performance of climate models, and discrepancies have been attributed to shortcomings in climate model processes and/or boundary conditions. More recently forward proxy models or proxy system models have been used to leverage the multivariate nature of proxy relationships to their environment, and to "bring models into proxy space". Here we construct ecological models of key planktic foraminifera taxa, calibrated and validated with World Ocean Atlas (WO13) oceanographic data. Multiple modeling methods (e.g. multilayer perceptron neural networks, Mahalanobis distance, logistic regression, and maximum entropy) are investigated to ensure robust results. The resulting models are then driven by a Late Pliocene climate model simulation with biogeochemical as well as temperature variables. Similarities and differences with previous model-proxy comparisons (e.g. PlioMIP) are discussed.

  5. 1 CFR 18.7 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 1 General Provisions 1 2010-01-01 2010-01-01 false Signature. 18.7 Section 18.7 General Provisions... PREPARATION AND TRANSMITTAL OF DOCUMENTS GENERALLY § 18.7 Signature. The original and each duplicate original... stamped beneath the signature. Initialed or impressed signatures will not be accepted. Documents submitted...

  6. Attribute-Based Digital Signature System

    NARCIS (Netherlands)

    Ibraimi, L.; Asim, Muhammad; Petkovic, M.

    2011-01-01

    An attribute-based digital signature system comprises a signature generation unit (1) for signing a message (m) by generating a signature (s) based on a user secret key (SK) associated with a set of user attributes, wherein the signature generation unit (1) is arranged for combining the user secret

  7. POSTERIOR SEGMENT CAUSES OF BLINDNESS AMONG CHILDREN IN BLIND SCHOOLS

    Directory of Open Access Journals (Sweden)

    Sandhya

    2015-09-01

    Full Text Available BACKGROUND: It is estimated that there are 1.4 million irreversibly blind children in the world out of which 1 million are in Asia alone. India has the highest number of blind children than any other country. Nearly 70% of the childhood blindness is avoidable. There i s paucity of data available on the causes of childhood blindness. This study focuses on the posterior segment causes of blindness among children attending blind schools in 3 adjacent districts of Andhra Pradesh. MATERIAL & METHODS: This is a cross sectiona l study conducted among 204 blind children aged 6 - 16 years age. Detailed eye examination was done by the same investigator to avoid bias. Posterior segment examination was done using a direct and/or indirect ophthalmoscope after dilating pupil wherever nec essary. The standard WHO/PBL for blindness and low vision examination protocol was used to categorize the causes of blindness. A major anatomical site and underlying cause was selected for each child. The study was carried out during July 2014 to June 2015 . The results were analyzed using MS excel software and Epi - info 7 software version statistical software. RESULTS: Majority of the children was found to be aged 13 - 16 years (45.1% and males (63.7%. Family history of blindness was noted in 26.0% and consa nguinity was reported in 29.9% cases. A majority of them were belonged to fulfill WHO grade of blindness (73.0% and in majority of the cases, the onset of blindness was since birth (83.7%. The etiology of blindness was unknown in majority of cases (57.4% while hereditary causes constituted 25.4% cases. Posterior segment causes were responsible in 33.3% cases with retina being the most commonly involved anatomical site (19.1% followed by optic nerve (14.2%. CONCLUSIONS: There is a need for mandatory oph thalmic evaluation, refraction and assessment of low vision prior to admission into blind schools with periodic evaluation every 2 - 3 years

  8. Perception of blindness and blinding eye conditions in rural communities.

    Science.gov (United States)

    Ashaye, Adeyinka; Ajuwon, Ademola Johnson; Adeoti, Caroline

    2006-01-01

    PURPOSE: The purpose of this qualitative study was to explore the causes and management of blindness and blinding eye conditions as perceived by rural dwellers of two Yoruba communities in Oyo State, Nigeria. METHODS: Four focus group discussions were conducted among residents of Iddo and Isale Oyo, two rural Yoruba communities in Oyo State, Nigeria. Participants consisted of sighted, those who were partially or totally blind and community leaders. Ten patent medicine sellers and 12 traditional healers were also interviewed on their perception of the causes and management of blindness in their communities. FINDINGS: Blindness was perceived as an increasing problem among the communities. Multiple factors were perceived to cause blindness, including germs, onchocerciasis and supernatural forces. Traditional healers believed that blindness could be cured, with many claiming that they had previously cured blindness in the past. However, all agreed that patience was an important requirement for the cure of blindness. The patent medicine sellers' reports were similar to those of the traditional healers. The barriers to use of orthodox medicine were mainly fear, misconception and perceived high costs of care. There was a consensus of opinion among group discussants and informants that there are severe social and economic consequences of blindness, including not been able to see and assess the quality of what the sufferer eats, perpetual sadness, loss of sleep and dependence on other persons for daily activities. CONCLUSION: Local beliefs associated with causation, symptoms and management of blindness and blinding eye conditions among rural Yoruba communities identified have provided a bridge for understanding local perspectives and basis for implementing appropriate primary eye care programs. PMID:16775910

  9. Proxy indicators as measure of local economic dispositions in South ...

    African Journals Online (AJOL)

    in international markets. The proxy is a coincidental and pro-cyclic indicator, with a correlation of 0.86. Key similarities exist between the economy and the profitability of hardware stores, although the proxy is not as accurate as the volume of sales in hardware stores. The correlation is measured at 0.85. The profitability of the ...

  10. The status of childhood blindness and functional low vision in the Eastern Mediterranean region in 2012.

    Science.gov (United States)

    Khandekar, Rajiv; Kishore, H; Mansu, Rabiu M; Awan, Haroon

    2014-01-01

    Childhood blindness and visual impairment (CBVI) are major disabilities that compromise the normal development of children. Health resources and practices to prevent CBVI are suboptimal in most countries in the Eastern Mediterranean Region (EMR). We reviewed the magnitude and the etiologies of childhood visual disabilities based on the estimates using socioeconomic proxy indicators such as gross domestic product (GDP) per capita and blindness (defined as  Best corrected visual acuity(BCVA)) less than 3/60 in the better eye or a visual field of 10° surrounding central fixation) and functional low vision (FLV) (visual impairment for which no treatment or refractive correction can improve the vision up to >6/18 in a better eye) in children blindness and FLV rates to high, middle- and low-income countries from the global literature to the population of children blindness (rate 1.2/1,000) in the region. In addition, there could be approximately 417,725 children with FLV (rate of 2.1/1,000) in the region. The causes of visual disability in the three groups are also discussed based on the available data. As our estimates are based on hospital and blind school studies in the past, they could have serious limitations for projecting the present magnitude and causes of visual disabilities in children of EMR. An effective approach to eye health care and screening for children within primary health care and with the available resources are discussed. The objectives, strategies, and operating procedures for child eye-care are presented. Variables impacting proper screening are discussed. To reach the targets, we recommend urgent implementation of new approaches to low vision and rehabilitation of children.

  11. Proxy-Reports in the Ascertainment of Disability Prevalence with American Community Survey Data.

    Science.gov (United States)

    Siordia, C

    2014-01-01

    Population estimates on disability prevalence inform policy makers and public health professionals. Understanding how factors capable of affecting measurement (e.g., proxy-report) vary in the population is important for establishing level of confidence in sample-derived population estimates. To establish how use of proxy-reports varies by six disability types stratified by sex, race-ethnicity, and age group. Specific aim is achieved by investigating the number of proxy-reports used amongst the disable population. Cross-sectional study using American Community Survey (ACS) Public Use Microdata Sample (PUMS) 3-year file collected during 2009-2011 survey period. Community-dwelling population in continental United States (US). The unweighted count of 6,003,183 individuals in the microdata are said to represent about 193,277,485 individuals in the continental US population. Stratified disability period estimates are computed. Amongst the disable: the number of proxy-reports; allocations; and Person Inflation Ratios (PRIs) are presented by disability type. Half of all the reported disabilities are derived through the use of proxy-report. In addition, high rates of item-allocation and PRIs are generally found in race-ethnic minorities. Proxy-report use and PRIs are lower for those aged > 65-but not allocation rates. Although use of proxy report in the ascertainment of disability varies in complex ways, data suggest prevalence of proxy reports is lowest amongst Non-Latino-Black females ages 21 to 64. Efforts toward providing clinicians with high quality descriptive epidemiology should continue as a reliable thermometer for measuring disability in the population is needed.

  12. Evaluating and Optimizing Online Advertising: Forget the Click, but There Are Good Proxies.

    Science.gov (United States)

    Dalessandro, Brian; Hook, Rod; Perlich, Claudia; Provost, Foster

    2015-06-01

    Online systems promise to improve advertisement targeting via the massive and detailed data available. However, there often is too few data on exactly the outcome of interest, such as purchases, for accurate campaign evaluation and optimization (due to low conversion rates, cold start periods, lack of instrumentation of offline purchases, and long purchase cycles). This paper presents a detailed treatment of proxy modeling, which is based on the identification of a suitable alternative (proxy) target variable when data on the true objective is in short supply (or even completely nonexistent). The paper has a two-fold contribution. First, the potential of proxy modeling is demonstrated clearly, based on a massive-scale experiment across 58 real online advertising campaigns. Second, we assess the value of different specific proxies for evaluating and optimizing online display advertising, showing striking results. The results include bad news and good news. The most commonly cited and used proxy is a click on an ad. The bad news is that across a large number of campaigns, clicks are not good proxies for evaluation or for optimization: clickers do not resemble buyers. The good news is that an alternative sort of proxy performs remarkably well: observed visits to the brand's website. Specifically, predictive models built based on brand site visits-which are much more common than purchases-do a remarkably good job of predicting which browsers will make a purchase. The practical bottom line: evaluating and optimizing campaigns using clicks seems wrongheaded; however, there is an easy and attractive alternative-use a well-chosen site-visit proxy instead.

  13. Five Guidelines for Selecting Hydrological Signatures

    Science.gov (United States)

    McMillan, H. K.; Westerberg, I.; Branger, F.

    2017-12-01

    Hydrological signatures are index values derived from observed or modeled series of hydrological data such as rainfall, flow or soil moisture. They are designed to extract relevant information about hydrological behavior, such as to identify dominant processes, and to determine the strength, speed and spatiotemporal variability of the rainfall-runoff response. Hydrological signatures play an important role in model evaluation. They allow us to test whether particular model structures or parameter sets accurately reproduce the runoff generation processes within the watershed of interest. Most modeling studies use a selection of different signatures to capture different aspects of the catchment response, for example evaluating overall flow distribution as well as high and low flow extremes and flow timing. Such studies often choose their own set of signatures, or may borrow subsets of signatures used in multiple other works. The link between signature values and hydrological processes is not always straightforward, leading to uncertainty and variability in hydrologists' signature choices. In this presentation, we aim to encourage a more rigorous approach to hydrological signature selection, which considers the ability of signatures to represent hydrological behavior and underlying processes for the catchment and application in question. To this end, we propose a set of guidelines for selecting hydrological signatures. We describe five criteria that any hydrological signature should conform to: Identifiability, Robustness, Consistency, Representativeness, and Discriminatory Power. We describe an example of the design process for a signature, assessing possible signature designs against the guidelines above. Due to their ubiquity, we chose a signature related to the Flow Duration Curve, selecting the FDC mid-section slope as a proposed signature to quantify catchment overall behavior and flashiness. We demonstrate how assessment against each guideline could be used to

  14. What is Color Blindness?

    Science.gov (United States)

    ... Color Blindness? Who Is at Risk for Color Blindness? Color Blindness Causes Color Blindness Diagnosis and Treatment How Color Blindness Is Tested What Is Color Blindness? Leer en Español: ¿Qué es el daltonismo? Written ...

  15. Sincronización de estadísticas entre servidores y proxies

    OpenAIRE

    Catullo, María José

    1999-01-01

    Un caching proxy server colecciona todas las páginas que pasan a través de él, así cuando un usuario pregunta por una página, el proxy server, si la tiene, la retoma de su cache, sin necesidad de acceder al servidor real. De ésta manera se ahorra ancho de banda y se agilizan las respuestas. Cada requerimiento que arriba a un proxy ó a un servidor, se almacena en archivos de logs. Existen varios tipos de archivos de logs, que se utilizan para auditoría del rendimiento, monitoreo, control de...

  16. Quantum messages with signatures forgeable in arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Kim, Taewan; Choi, Jeong Woon; Jho, Nam-Su; Lee, Soojoon

    2015-01-01

    Even though a method to perfectly sign quantum messages has not been known, the arbitrated quantum signature scheme has been considered as one of the good candidates. However, its forgery problem has been an obstacle to the scheme becoming a successful method. In this paper, we consider one situation, which is slightly different from the forgery problem, that we use to check whether at least one quantum message with signature can be forged in a given scheme, although all the messages cannot be forged. If there are only a finite number of forgeable quantum messages in the scheme, then the scheme can be secured against the forgery attack by not sending forgeable quantum messages, and so our situation does not directly imply that we check whether the scheme is secure against the attack. However, if users run a given scheme without any consideration of forgeable quantum messages, then a sender might transmit such forgeable messages to a receiver and in such a case an attacker can forge the messages if the attacker knows them. Thus it is important and necessary to look into forgeable quantum messages. We show here that there always exists such a forgeable quantum message-signature pair for every known scheme with quantum encryption and rotation, and numerically show that there are no forgeable quantum message-signature pairs that exist in an arbitrated quantum signature scheme. (paper)

  17. Genetic signatures in the envelope glycoproteins of HIV-1 that associate with broadly neutralizing antibodies.

    Directory of Open Access Journals (Sweden)

    S Gnanakaran

    Full Text Available A steady increase in knowledge of the molecular and antigenic structure of the gp120 and gp41 HIV-1 envelope glycoproteins (Env is yielding important new insights for vaccine design, but it has been difficult to translate this information to an immunogen that elicits broadly neutralizing antibodies. To help bridge this gap, we used phylogenetically corrected statistical methods to identify amino acid signature patterns in Envs derived from people who have made potently neutralizing antibodies, with the hypothesis that these Envs may share common features that would be useful for incorporation in a vaccine immunogen. Before attempting this, essentially as a control, we explored the utility of our computational methods for defining signatures of complex neutralization phenotypes by analyzing Env sequences from 251 clonal viruses that were differentially sensitive to neutralization by the well-characterized gp120-specific monoclonal antibody, b12. We identified ten b12-neutralization signatures, including seven either in the b12-binding surface of gp120 or in the V2 region of gp120 that have been previously shown to impact b12 sensitivity. A simple algorithm based on the b12 signature pattern was predictive of b12 sensitivity/resistance in an additional blinded panel of 57 viruses. Upon obtaining these reassuring outcomes, we went on to apply these same computational methods to define signature patterns in Env from HIV-1 infected individuals who had potent, broadly neutralizing responses. We analyzed a checkerboard-style neutralization dataset with sera from 69 HIV-1-infected individuals tested against a panel of 25 different Envs. Distinct clusters of sera with high and low neutralization potencies were identified. Six signature positions in Env sequences obtained from the 69 samples were found to be strongly associated with either the high or low potency responses. Five sites were in the CD4-induced coreceptor binding site of gp120, suggesting an

  18. Uncertainty in hydrological signatures

    Science.gov (United States)

    McMillan, Hilary; Westerberg, Ida

    2015-04-01

    Information that summarises the hydrological behaviour or flow regime of a catchment is essential for comparing responses of different catchments to understand catchment organisation and similarity, and for many other modelling and water-management applications. Such information types derived as an index value from observed data are known as hydrological signatures, and can include descriptors of high flows (e.g. mean annual flood), low flows (e.g. mean annual low flow, recession shape), the flow variability, flow duration curve, and runoff ratio. Because the hydrological signatures are calculated from observed data such as rainfall and flow records, they are affected by uncertainty in those data. Subjective choices in the method used to calculate the signatures create a further source of uncertainty. Uncertainties in the signatures may affect our ability to compare different locations, to detect changes, or to compare future water resource management scenarios. The aim of this study was to contribute to the hydrological community's awareness and knowledge of data uncertainty in hydrological signatures, including typical sources, magnitude and methods for its assessment. We proposed a generally applicable method to calculate these uncertainties based on Monte Carlo sampling and demonstrated it for a variety of commonly used signatures. The study was made for two data rich catchments, the 50 km2 Mahurangi catchment in New Zealand and the 135 km2 Brue catchment in the UK. For rainfall data the uncertainty sources included point measurement uncertainty, the number of gauges used in calculation of the catchment spatial average, and uncertainties relating to lack of quality control. For flow data the uncertainty sources included uncertainties in stage/discharge measurement and in the approximation of the true stage-discharge relation by a rating curve. The resulting uncertainties were compared across the different signatures and catchments, to quantify uncertainty

  19. Causes of blindness in blind unit of the school for the handicapped ...

    African Journals Online (AJOL)

    To describe the causes of blindness in pupils and staff in the blind unit of the School for the Handicapped in Kwara State. 2. To identify problems in the blind school and initiate intervention. All the blind or visually challenged people in the blind unit of the school for the handicapped were interviewed and examined using a ...

  20. Legal requirements governing proxy voting in Denmark

    DEFF Research Database (Denmark)

    Werlauff, Erik

    2008-01-01

    The requirements in Danish company law concerning proxy voting in companies whose shares have been accepted for listing on a regulated market have been successively tightened in recent years, and corporate governance principles have also led to the introduction of several requirements concerning...... proxy holders. A thorough knowledge of these requirements is important not only for the listed companies but also for their advisers and investors in Denmark and abroad. This article considers these requirements as well as the additional requirements which will derive from Directive 2007....../36 on the exercise of shareholders' rights in listed companies, which must be implemented by 3 August 2009. It is pointed out that companies may provide with advantage in their articles of association for both the existing and the forthcoming requirements at this early stage....

  1. Representing vision and blindness.

    Science.gov (United States)

    Ray, Patrick L; Cox, Alexander P; Jensen, Mark; Allen, Travis; Duncan, William; Diehl, Alexander D

    2016-01-01

    There have been relatively few attempts to represent vision or blindness ontologically. This is unsurprising as the related phenomena of sight and blindness are difficult to represent ontologically for a variety of reasons. Blindness has escaped ontological capture at least in part because: blindness or the employment of the term 'blindness' seems to vary from context to context, blindness can present in a myriad of types and degrees, and there is no precedent for representing complex phenomena such as blindness. We explore current attempts to represent vision or blindness, and show how these attempts fail at representing subtypes of blindness (viz., color blindness, flash blindness, and inattentional blindness). We examine the results found through a review of current attempts and identify where they have failed. By analyzing our test cases of different types of blindness along with the strengths and weaknesses of previous attempts, we have identified the general features of blindness and vision. We propose an ontological solution to represent vision and blindness, which capitalizes on resources afforded to one who utilizes the Basic Formal Ontology as an upper-level ontology. The solution we propose here involves specifying the trigger conditions of a disposition as well as the processes that realize that disposition. Once these are specified we can characterize vision as a function that is realized by certain (in this case) biological processes under a range of triggering conditions. When the range of conditions under which the processes can be realized are reduced beyond a certain threshold, we are able to say that blindness is present. We characterize vision as a function that is realized as a seeing process and blindness as a reduction in the conditions under which the sight function is realized. This solution is desirable because it leverages current features of a major upper-level ontology, accurately captures the phenomenon of blindness, and can be

  2. 76 FR 30542 - Adult Signature Services

    Science.gov (United States)

    2011-05-26

    ... POSTAL SERVICE 39 CFR Part 111 Adult Signature Services AGENCY: Postal Service\\TM\\. ACTION: Final..., Domestic Mail Manual (DMM[supreg]) 503.8, to add a new extra service called Adult Signature. This new service has two available options: Adult Signature Required and Adult Signature Restricted Delivery. DATES...

  3. Middleware Proxy: A Request-Driven Messaging Broker For High Volume Data Distribution

    CERN Document Server

    Sliwinski, W; Dworak, A

    2014-01-01

    Nowadays, all major infrastructures and data centres (commercial and scientific) make an extensive use of the publish-subscribe messaging paradigm, which helps to decouple the message sender (publisher) from the message receiver (consumer). This paradigm is also heavily used in the CERN Accelerator Control system, in Proxy broker - critical part of the Controls Middleware (CMW) project. Proxy provides the aforementioned publish-subscribe facility and also supports execution of synchronous read and write operations. Moreover, it enables service scalability and dramatically reduces the network resources and overhead (CPU and memory) on publisher machine, required to serve all subscriptions. Proxy was developed in modern C++, using state of the art programming techniques (e.g. Boost) and following recommended software patterns for achieving low-latency and high concurrency. The outstanding performance of the Proxy infrastructure was confirmed during the last 3 years by delivering the high volume of LHC equipment...

  4. Photospheric activity of the Sun with VIRGO and GOLF. Comparison with standard activity proxies

    Science.gov (United States)

    Salabert, D.; García, R. A.; Jiménez, A.; Bertello, L.; Corsaro, E.; Pallé, P. L.

    2017-12-01

    We study the variability of solar activity using new photospheric proxies originally developed for the analysis of stellar magnetism with the CoRoT and Kepler photometric observations. These proxies were obtained by tracking the temporal modulations in the observations associated with the spots and magnetic features as the Sun rotates. We analyzed 21 yr of observations, spanning solar cycles 23 and 24, collected by the space-based photometric VIRGO and radial velocity GOLF instruments on board the SoHO satellite. We then calculated the photospheric activity proxy Sph is for each of the three VIRGO photometers and the associated Svel proxy from the radial velocity GOLF observations. Comparisons with several standard solar activity proxies sensitive to different layers of the Sun demonstrate that these new activity proxies, Sph and Svel, provide a new manner to monitor solar activity. We show that both the long- and short-term magnetic variabilities respectively associated with the 11-yr cycle and the quasi-biennial oscillation are well monitored, and that the magnetic field interaction between the subsurface, photosphere, and chromosphere of the Sun was modified between Cycle 24 and Cycle 23. Furthermore, the photometric proxies show a wavelength dependence of the response function of the solar photosphere among the three channels of the VIRGO photometers, providing inputs for the study of the stellar magnetism of Sun-like stars.

  5. Navigation Problems in Blind-to-Blind Pedestrians Tele-assistance Navigation

    OpenAIRE

    Balata , Jan; Mikovec , Zdenek; Maly , Ivo

    2015-01-01

    International audience; We raise a question whether it is possible to build a large-scale navigation system for blind pedestrians where a blind person navigates another blind person remotely by mobile phone. We have conducted an experiment, in which we observed blind people navigating each other in a city center in 19 sessions. We focused on problems in the navigator’s attempts to direct the traveler to the destination. We observed 96 problems in total, classified them on the basis of the typ...

  6. Mixtures of Gaussians for uncertainty description in bivariate latent heat flux proxies

    NARCIS (Netherlands)

    Wójcik, R.; Troch, P.A.A.; Stricker, J.N.M.; Torfs, P.J.J.F.

    2006-01-01

    This paper proposes a new probabilistic approach for describing uncertainty in the ensembles of latent heat flux proxies. The proxies are obtained from hourly Bowen ratio and satellite-derived measurements, respectively, at several locations in the southern Great Plains region in the United States.

  7. Detecting instabilities in tree-ring proxy calibration

    Directory of Open Access Journals (Sweden)

    H. Visser

    2010-06-01

    Full Text Available Evidence has been found for reduced sensitivity of tree growth to temperature in a number of forests at high northern latitudes and alpine locations. Furthermore, at some of these sites, emergent subpopulations of trees show negative growth trends with rising temperature. These findings are typically referred to as the "Divergence Problem" (DP. Given the high relevance of paleoclimatic reconstructions for policy-related studies, it is important for dendrochronologists to address this issue of potential model uncertainties associated with the DP. Here we address this issue by proposing a calibration technique, termed "stochastic response function" (SRF, which allows the presence or absence of any instabilities in growth response of trees (or any other climate proxy to their calibration target to be visualized and detected. Since this framework estimates confidence limits and subsequently provides statistical significance tests, the approach is also very well suited for proxy screening prior to the generation of a climate-reconstruction network.

    Two examples of tree growth/climate relationships are provided, one from the North American Arctic treeline and the other from the upper treeline in the European Alps. Instabilities were found to be present where stabilities were reported in the literature, and vice versa, stabilities were found where instabilities were reported. We advise to apply SRFs in future proxy-screening schemes, next to the use of correlations and RE/CE statistics. It will improve the strength of reconstruction hindcasts.

  8. Mobile Multicast in Hierarchical Proxy Mobile IPV6

    Science.gov (United States)

    Hafizah Mohd Aman, Azana; Hashim, Aisha Hassan A.; Mustafa, Amin; Abdullah, Khaizuran

    2013-12-01

    Mobile Internet Protocol Version 6 (MIPv6) environments have been developing very rapidly. Many challenges arise with the fast progress of MIPv6 technologies and its environment. Therefore the importance of improving the existing architecture and operations increases. One of the many challenges which need to be addressed is the need for performance improvement to support mobile multicast. Numerous approaches have been proposed to improve mobile multicast performance. This includes Context Transfer Protocol (CXTP), Hierarchical Mobile IPv6 (HMIPv6), Fast Mobile IPv6 (FMIPv6) and Proxy Mobile IPv6 (PMIPv6). This document describes multicast context transfer in hierarchical proxy mobile IPv6 (H-PMIPv6) to provide better multicasting performance in PMIPv6 domain.

  9. Lesson 6: Signature Validation

    Science.gov (United States)

    Checklist items 13 through 17 are grouped under the Signature Validation Process, and represent CROMERR requirements that the system must satisfy as part of ensuring that electronic signatures it receives are valid.

  10. 21 CFR 11.50 - Signature manifestations.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Signature manifestations. 11.50 Section 11.50 Food... RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.50 Signature manifestations. (a) Signed electronic...: (1) The printed name of the signer; (2) The date and time when the signature was executed; and (3...

  11. Human rights of children with intellectual disabilities: comparing self-ratings and proxy ratings.

    Science.gov (United States)

    Huus, K; Granlund, M; Bornman, J; Lygnegård, F

    2015-11-01

    A child rights-based approach to research articulates well with Article 12 of the United Nations Convention on the Rights of the Child (CRC) and highlights the importance and value of including children's own views about aspects that concern them. The aim of this study is to compare children with intellectual disability's own ratings (as self-raters) to those of their primary caregivers (as proxy raters) regarding human rights of children. The study also aims to establish whether there is an inter-rater agreement between the self-raters and proxy raters concerning Maslow's hierarchy of needs. This study is nested in a larger study examining the human rights of children with intellectual disability in South Africa. In total, 162 children with intellectual disability from 11 schools across three provinces and their primary caregivers participated by answering parts of a Children's Rights Questionnaire (CRQ) developed by the researchers based on the United Nation's CRC. We compared the answers for six questions in the questionnaire that were addressed to self-raters (children) and proxy raters (primary caregivers) in the same way. Questions regarding basic needs, such as access to clean water or whether the child had food to eat at home, were answered similarly by self-raters and proxy raters. Larger differences were found when self-raters and proxy raters were asked about whether the child had things or friends to play with at home. Socio-economic variables seemed to affect whether self-raters and proxy raters answered similarly. The results underscore the importance of promoting children's rights to express themselves by considering the opinions of both the children as self-raters and their primary caregivers as proxy raters - not only the latter. The results indicate that it is especially important to include children's own voices when more complex needs are surveyed. Agreement between self- and proxy ratings could be affected by socio-economic circumstances.

  12. The relationship between proxy reported health-related quality of life and parental distress: gender differences.

    Science.gov (United States)

    Davis, E; Davies, B; Waters, E; Priest, N

    2008-11-01

    Although primary caregiver proxy reports of health-related quality of life (HRQOL) are often used for healthcare decision making when child self-reports are unable to be collected (because of a variety of reasons such as child illness, disability or age), we have little understanding of the correlates of parent-proxy reports. The aim of this study was to examine the relationship between parental depression and parent-proxy reported QOL for primary caregivers (mothers and fathers), using a multidimensional HRQOL instrument. It was hypothesized that maternal depression would be negatively correlated with maternal reported HRQOL, but that paternal depression would not be correlated with paternal reported HRQOL. Data were from parents of children aged 4-5 years (n = 4983) involved in the Longitudinal Study of Australian Children. A questionnaire assessing parental depression (Kessler-6) and proxy reported HRQOL (Pediatric Quality of Life Inventory) was completed by the primary caregiver. For maternal primary caregivers, maternal depression was negatively correlated with all domains of maternal proxy reports of HRQOL (r = -0.24 to r = -0.36). For paternal primary caregivers, there was no relationship between paternal depression and paternal proxy reports of HRQOL. Multiple regression analyses demonstrated that maternal depression was a significant predictor of total HRQOL, accounting for 12% of the variance. For paternal mental health, depression did not predict parent-proxy reported total HRQOL. These results highlight the importance of assessing maternal mental health when measuring proxy reported QOL. Further research is needed in this area to examine the relationship between parental depression and proxy reported HRQOL (including both mothers and fathers, where possible), as well as child self-reported HRQOL.

  13. 21 CFR 11.70 - Signature/record linking.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Signature/record linking. 11.70 Section 11.70 Food... RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.70 Signature/record linking. Electronic signatures and handwritten signatures executed to electronic records shall be linked to their respective...

  14. Comparing children's GPS tracks with geospatial proxies for exposure to junk food.

    Science.gov (United States)

    Sadler, Richard C; Gilliland, Jason A

    2015-01-01

    Various geospatial techniques have been employed to estimate children's exposure to environmental cardiometabolic risk factors, including junk food. But many studies uncritically rely on exposure proxies which differ greatly from actual exposure. Misrepresentation of exposure by researchers could lead to poor decisions and ineffective policymaking. This study conducts a GIS-based analysis of GPS tracks--'activity spaces'--and 21 proxies for activity spaces (e.g. buffers, container approaches) for a sample of 526 children (ages 9-14) in London, Ontario, Canada. These measures are combined with a validated food environment database (including fast food and convenience stores) to create a series of junk food exposure estimates and quantify the errors resulting from use of different proxy methods. Results indicate that exposure proxies consistently underestimate exposure to junk foods by as much as 68%. This underestimation is important to policy development because children are exposed to more junk food than estimated using typical methods. Copyright © 2015 Elsevier Ltd. All rights reserved.

  15. On the Use of Human Mobility Proxies for Modeling Epidemics

    Science.gov (United States)

    Tizzoni, Michele; Bajardi, Paolo; Decuyper, Adeline; Kon Kam King, Guillaume; Schneider, Christian M.; Blondel, Vincent; Smoreda, Zbigniew; González, Marta C.; Colizza, Vittoria

    2014-01-01

    Human mobility is a key component of large-scale spatial-transmission models of infectious diseases. Correctly modeling and quantifying human mobility is critical for improving epidemic control, but may be hindered by data incompleteness or unavailability. Here we explore the opportunity of using proxies for individual mobility to describe commuting flows and predict the diffusion of an influenza-like-illness epidemic. We consider three European countries and the corresponding commuting networks at different resolution scales, obtained from (i) official census surveys, (ii) proxy mobility data extracted from mobile phone call records, and (iii) the radiation model calibrated with census data. Metapopulation models defined on these countries and integrating the different mobility layers are compared in terms of epidemic observables. We show that commuting networks from mobile phone data capture the empirical commuting patterns well, accounting for more than 87% of the total fluxes. The distributions of commuting fluxes per link from mobile phones and census sources are similar and highly correlated, however a systematic overestimation of commuting traffic in the mobile phone data is observed. This leads to epidemics that spread faster than on census commuting networks, once the mobile phone commuting network is considered in the epidemic model, however preserving to a high degree the order of infection of newly affected locations. Proxies' calibration affects the arrival times' agreement across different models, and the observed topological and traffic discrepancies among mobility sources alter the resulting epidemic invasion patterns. Results also suggest that proxies perform differently in approximating commuting patterns for disease spread at different resolution scales, with the radiation model showing higher accuracy than mobile phone data when the seed is central in the network, the opposite being observed for peripheral locations. Proxies should therefore be

  16. Expressiveness considerations of XML signatures

    DEFF Research Database (Denmark)

    Jensen, Meiko; Meyer, Christopher

    2011-01-01

    XML Signatures are used to protect XML-based Web Service communication against a broad range of attacks related to man-in-the-middle scenarios. However, due to the complexity of the Web Services specification landscape, the task of applying XML Signatures in a robust and reliable manner becomes...... more and more challenging. In this paper, we investigate this issue, describing how an attacker can still interfere with Web Services communication even in the presence of XML Signatures. Additionally, we discuss the interrelation of XML Signatures and XML Encryption, focussing on their security...

  17. 17 CFR 12.12 - Signature.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Signature. 12.12 Section 12.12... General Information and Preliminary Consideration of Pleadings § 12.12 Signature. (a) By whom. All... document on behalf of another person. (b) Effect. The signature on any document of any person acting either...

  18. High-speed high-security signatures

    NARCIS (Netherlands)

    Bernstein, D.J.; Duif, N.; Lange, T.; Schwabe, P.; Yang, B.Y.

    2011-01-01

    This paper shows that a $390 mass-market quad-core 2.4GHz Intel Westmere (Xeon E5620) CPU can create 108000 signatures per second and verify 71000 signatures per second on an elliptic curve at a 2128 security level. Public keys are 32 bytes, and signatures are 64 bytes. These performance figures

  19. Calcium isotopic composition of high-latitude proxy carrier Neogloboquadrina pachyderma (sin.

    Directory of Open Access Journals (Sweden)

    A. Eisenhauer

    2009-01-01

    Full Text Available The accurate reconstruction of sea surface temperature (SST history in climate-sensitive regions (e.g. tropical and polar oceans became a challenging task in palaeoceanographic research. Biogenic shell carbonate SST proxies successfully developed for tropical regions often fail in cool water environments. Their major regional shortcomings and the cryptic diversity now found within the major high latitude proxy carrier Neogloboquadrina pachyderma (sin. highlight an urgent need to explore complementary SST proxies for these cool-water regions. Here we incorporate the genetic component into a calibration study of a new SST proxy for the high latitudes. We found that the calcium isotopic composition (δ44/40Ca of calcite from genotyped net catches and core-top samples of the planktonic foraminifera Neogloboquadrina pachyderma (sin. is related to temperature and unaffected by genetic variations. The temperature sensitivity has been found to be 0.17 (±0.02‰ per 1°C, highlighting its potential for downcore applications in open marine cool-water environments. Our results further indicate that in extreme polar environments, below a critical threshold temperature of 2.0 (±0.5°C associated with salinities below 33.0 (±0.5‰, a prominent shift in biomineralization affects the δ44/40Ca of genotyped and core-top N. pachyderma (sin., becoming insensitive to temperature. These findings highlight the need of more systematic calibration studies on single planktonic foraminiferal species in order to unravel species-specific factors influencing the temperature sensitivity of Ca isotope fractionation and to validate the proxies' applicability.

  20. 78 FR 70987 - Proxy Advisory Firm Roundtable

    Science.gov (United States)

    2013-11-27

    ... Firm Roundtable AGENCY: Securities and Exchange Commission. ACTION: Notice of roundtable discussion... advisory firms. The panel will be asked to discuss topics including the current state of proxy advisory firm use by investment advisers and institutional investors and potential changes that have been...

  1. Evaluation of the sea ice proxy IP against observational and diatom proxy data in the SW Labrador Sea

    DEFF Research Database (Denmark)

    Weckström, K.; Andersen, M.L.; Kuijpers, A.

    2013-01-01

    The recent rapid decline in Arctic sea ice cover has increased the need to improve the accuracy of the sea ice component in climate models and to provide detailed long-term sea ice concentration records, which are only available via proxy data. Recently, the highly branched isoprenoid IP25...

  2. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  3. Exotic signatures from supersymmetry

    International Nuclear Information System (INIS)

    Hall, L.J.

    1989-08-01

    Minor changes to the standard supersymmetric model, such as soft flavor violation and R parity violation, cause large changes in the signatures. The origin of these changes and the resulting signatures are discussed. 15 refs., 7 figs., 2 tabs

  4. Research on a New Signature Scheme on Blockchain

    Directory of Open Access Journals (Sweden)

    Chao Yuan

    2017-01-01

    Full Text Available With the rise of Bitcoin, blockchain which is the core technology of Bitcoin has received increasing attention. Privacy preserving and performance on blockchain are two research points in academia and business, but there are still some unresolved issues in both respects. An aggregate signature scheme is a digital signature that supports making signatures on many different messages generated by many different users. Using aggregate signature, the size of the signature could be shortened by compressing multiple signatures into a single signature. In this paper, a new signature scheme for transactions on blockchain based on the aggregate signature was proposed. It was worth noting that elliptic curve discrete logarithm problem and bilinear maps played major roles in our signature scheme. And the security properties of our signature scheme were proved. In our signature scheme, the amount will be hidden especially in the transactions which contain multiple inputs and outputs. Additionally, the size of the signature on transaction is constant regardless of the number of inputs and outputs that the transaction contains, which can improve the performance of signature. Finally, we gave an application scenario for our signature scheme which aims to achieve the transactions of big data on blockchain.

  5. Quantum multi-signature protocol based on teleportation

    International Nuclear Information System (INIS)

    Wen Xiao-jun; Liu Yun; Sun Yu

    2007-01-01

    In this paper, a protocol which can be used in multi-user quantum signature is proposed. The scheme of signature and verification is based on the correlation of Greenberger-Horne-Zeilinger (GHZ) states and the controlled quantum teleportation. Different from the digital signatures, which are based on computational complexity, the proposed protocol has perfect security in the noiseless quantum channels. Compared to previous quantum signature schemes, this protocol can verify the signature independent of an arbitrator as well as realize multi-user signature together. (orig.)

  6. Comparing Apples to Apples: Paleoclimate Model-Data comparison via Proxy System Modeling

    Science.gov (United States)

    Dee, Sylvia; Emile-Geay, Julien; Evans, Michael; Noone, David

    2014-05-01

    The wealth of paleodata spanning the last millennium (hereinafter LM) provides an invaluable testbed for CMIP5-class GCMs. However, comparing GCM output to paleodata is non-trivial. High-resolution paleoclimate proxies generally contain a multivariate and non-linear response to regional climate forcing. Disentangling the multivariate environmental influences on proxies like corals, speleothems, and trees can be complex due to spatiotemporal climate variability, non-stationarity, and threshold dependence. Given these and other complications, many paleodata-GCM comparisons take a leap of faith, relating climate fields (e.g. precipitation, temperature) to geochemical signals in proxy data (e.g. δ18O in coral aragonite or ice cores) (e.g. Braconnot et al., 2012). Isotope-enabled GCMs are a step in the right direction, with water isotopes providing a connector point between GCMs and paleodata. However, such studies are still rare, and isotope fields are not archived as part of LM PMIP3 simulations. More importantly, much of the complexity in how proxy systems record and transduce environmental signals remains unaccounted for. In this study we use proxy system models (PSMs, Evans et al., 2013) to bridge this conceptual gap. A PSM mathematically encodes the mechanistic understanding of the physical, geochemical and, sometimes biological influences on each proxy. To translate GCM output to proxy space, we have synthesized a comprehensive, consistently formatted package of published PSMs, including δ18O in corals, tree ring cellulose, speleothems, and ice cores. Each PSM is comprised of three sub-models: sensor, archive, and observation. For the first time, these different components are coupled together for four major proxy types, allowing uncertainties due to both dating and signal interpretation to be treated within a self-consistent framework. The output of this process is an ensemble of many (say N = 1,000) realizations of the proxy network, all equally plausible

  7. A Directed Signature Scheme and its Applications

    OpenAIRE

    Lal, Sunder; Kumar, Manoj

    2004-01-01

    This paper presents a directed signature scheme with the property that the signature can be verified only with the help of signer or signature receiver. We also propose its applications to share verification of signatures and to threshold cryptosystems.

  8. Childhood blindness at a school for the blind in Riyadh, Saudi Arabia.

    Science.gov (United States)

    Kotb, Amgad A; Hammouda, Ehab F; Tabbara, Khalid F

    2006-02-01

    To determine the major causes of eye diseases leading to visual loss and blindness among children attending a school for the blind in Riyadh, Saudi Arabia. A total of 217 school children with visual disabilities attending a school for the blind in Riyadh were included. All children were brought to The Eye Center, Riyadh, and had complete ophthalmologic examinations including visual acuity testing, biomicroscopy, ophthalmoscopy, tonometry and laboratory investigations. In addition, some patients were subjected to electroretinography (ERG), electrooculography (EOG), measurement of visual evoked potentials (VEP), and laboratory work-up for congenital disorders. There were 117 male students with an age range of 6-19 years and a mean age of 16 years. In addition, there were 100 females with an age range of 6-18 years and a mean age of 12 years. Of the 217 children, 194 (89%) were blind from genetically determined diseases or congenital disorders and 23 (11%) were blind from acquired diseases. The major causes of bilateral blindness in children were retinal degeneration, congenital glaucoma, and optic atrophy. The most common acquired causes of childhood blindness were infections and trauma. The etiological pattern of childhood blindness in Saudi Arabia has changed from microbial keratitis to genetically determined diseases of the retina and optic nerve. Currently, the most common causes of childhood blindness are genetically determined causes. Consanguineous marriages may account for the autosomal recessive disorders. Public education programs should include information for the prevention of trauma and genetic counseling. Eye examinations for preschool and school children are mandatory for the prevention and cure of blinding disorders.

  9. On reliable discovery of molecular signatures

    Directory of Open Access Journals (Sweden)

    Björkegren Johan

    2009-01-01

    Full Text Available Abstract Background Molecular signatures are sets of genes, proteins, genetic variants or other variables that can be used as markers for a particular phenotype. Reliable signature discovery methods could yield valuable insight into cell biology and mechanisms of human disease. However, it is currently not clear how to control error rates such as the false discovery rate (FDR in signature discovery. Moreover, signatures for cancer gene expression have been shown to be unstable, that is, difficult to replicate in independent studies, casting doubts on their reliability. Results We demonstrate that with modern prediction methods, signatures that yield accurate predictions may still have a high FDR. Further, we show that even signatures with low FDR may fail to replicate in independent studies due to limited statistical power. Thus, neither stability nor predictive accuracy are relevant when FDR control is the primary goal. We therefore develop a general statistical hypothesis testing framework that for the first time provides FDR control for signature discovery. Our method is demonstrated to be correct in simulation studies. When applied to five cancer data sets, the method was able to discover molecular signatures with 5% FDR in three cases, while two data sets yielded no significant findings. Conclusion Our approach enables reliable discovery of molecular signatures from genome-wide data with current sample sizes. The statistical framework developed herein is potentially applicable to a wide range of prediction problems in bioinformatics.

  10. Expert versus proxy rating of verbal communicative ability of people with aphasia after stroke.

    Science.gov (United States)

    de Jong-Hagelstein, Marjolein; Kros, Lieke; Lingsma, Hester F; Dippel, Diederik W J; Koudstaal, Peter J; Visch-Brink, Evy G

    2012-11-01

    In randomized clinical trials of aphasia treatment, a functional outcome measure like the Amsterdam-Nijmegen Everyday Language Test (ANELT), administered by speech-language therapists, is often used. However, the agreement between this expert rating and the judgment of the proxy about the quality of the daily life communication of the person with aphasia is largely unknown. We examined the association between ANELT scores by speech-language therapists and proxy judgments on the Partner Communication Questionnaire both at 3 and 6 months in 39 people with aphasia after stroke. We also determined which factors affected the level of agreement between expert and proxy judgment of the communicative ability at 6 months in 53 people with aphasia. We found moderate agreement (at 3 months r = .662; p = aphasia, measured with the Aphasia Severity Rating Scale, was associated with better agreement. In conclusion, although proxies were slightly more positive than experts, we found moderate agreement between expert and proxy rating of verbal communicative ability of people with aphasia after stroke, especially in milder cases.

  11. Evaluation of proxy-based millennial reconstruction methods

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Terry C.K.; Tsao, Min [University of Victoria, Department of Mathematics and Statistics, Victoria, BC (Canada); Zwiers, Francis W. [Environment Canada, Climate Research Division, Toronto, ON (Canada)

    2008-08-15

    A range of existing statistical approaches for reconstructing historical temperature variations from proxy data are compared using both climate model data and real-world paleoclimate proxy data. We also propose a new method for reconstruction that is based on a state-space time series model and Kalman filter algorithm. The state-space modelling approach and the recently developed RegEM method generally perform better than their competitors when reconstructing interannual variations in Northern Hemispheric mean surface air temperature. On the other hand, a variety of methods are seen to perform well when reconstructing surface air temperature variability on decadal time scales. An advantage of the new method is that it can incorporate additional, non-temperature, information into the reconstruction, such as the estimated response to external forcing, thereby permitting a simultaneous reconstruction and detection analysis as well as future projection. An application of these extensions is also demonstrated in the paper. (orig.)

  12. An ethical analysis of proxy and waiver of consent in critical care research

    DEFF Research Database (Denmark)

    Berg, Ronan M G; Møller, Kirsten; Rossel, Peter J. Hancke

    2013-01-01

    It is a central principle in medical ethics that vulnerable patients are entitled to a degree of protection that reflects their vulnerability. In critical care research, this protection is often established by means of so-called proxy consent. Proxy consent for research participation constitutes...

  13. Usable Authentication with an Offline Trusted Device Proxy Architecture (long version)

    OpenAIRE

    Johansen, Christian; Jøsang, Audun; Migdal, Denis

    2016-01-01

    Client platform infection poses a significant threat to secure user authentication. Com- bining vulnerable client platforms with special security devices, as often the case in e- banking, can increase significantly the security. This paper describes a new architecture where a security proxy on the client platform communicates with both a trusted security device and the server application. The proxy switches between two TLS channels, one from the client and another from the trusted device. The...

  14. Validating a proxy for disease progression in metastatic cancer patients using prescribing and dispensing data.

    Science.gov (United States)

    Joshi, Vikram; Adelstein, Barbara-Ann; Schaffer, Andrea; Srasuebkul, Preeyaporn; Dobbins, Timothy; Pearson, Sallie-Anne

    2017-10-01

    Routine data collections are used increasingly to examine outcomes of real-world cancer drug use. These datasets lack clinical details about important endpoints such as disease progression. To validate a proxy for disease progression in metastatic cancer patients using prescribing and dispensing claims. We used data from a cohort study of patients undergoing chemotherapy who provided informed consent to the collection of cancer-treatment data from medical records and linkage to pharmaceutical claims. We derived proxy decision rules based on changes to drug treatment in prescription histories (n = 36 patients) and validated the proxy in prescribing data (n = 62 patients). We adapted the decision rules and validated the proxy in dispensing data (n = 109). Our gold standard was disease progression ascertained in patient medical records. Individual progression episodes were the unit of analysis for sensitivity and Positive Predictive Value (PPV) calculations and specificity and Negative Predictive Value (NPV) were calculated at the patient level. The sensitivity of our proxy in prescribing data was 74.3% (95% Confidence Interval (CI), 55.6-86.6%) and PPV 61.2% (95% CI, 45.0-75.3%); specificity and NPV were 87.8% (95% CI, 73.8-95.9%) and 100% (95% CI, 90.3-100%), respectively. In dispensing data, the sensitivity of our proxy was 64% (95% CI, 55.0-77.0%) and PPV 56.0% (95% CI, 43.0-69.0%); specificity and NPV were 81% (95% CI, 70.05-89.0%) and 91.0% (95% CI, 82.0-97.0%), respectively. Our proxy overestimated episodes of disease progression. The proxy's performance is likely to improve if the date of prescribing is used instead of date of dispensing in claims data and by incorporating medical service claims (such as imaging prior to drug changes) in the algorithm. Our proxy is not sufficiently robust for use in real world comparative effectiveness research for cancer medicines. © 2016 John Wiley & Sons Australia, Ltd.

  15. Rapid Assessment of Avoidable Blindness in Western Rwanda: Blindness in a Postconflict Setting

    OpenAIRE

    Mathenge, Wanjiku; Nkurikiye, John; Limburg, Hans; Kuper, Hannah

    2007-01-01

    Editors' Summary Background. VISION 2020, a global initiative that aims to eliminate avoidable blindness, has estimated that 75% of blindness worldwide is treatable or preventable. The WHO estimates that in Africa, around 9% of adults aged over 50 are blind. Some data suggest that people living in regions affected by violent conflict are more likely to be blind than those living in unaffected regions. Currently no data exist on the likely prevalence of blindness in Rwanda, a central African c...

  16. Global data on blindness.

    Science.gov (United States)

    Thylefors, B.; Négrel, A. D.; Pararajasegaram, R.; Dadzie, K. Y.

    1995-01-01

    Globally, it is estimated that there are 38 million persons who are blind. Moreover, a further 110 million people have low vision and are at great risk of becoming blind. The main causes of blindness and low vision are cataract, trachoma, glaucoma, onchocerciasis, and xerophthalmia; however, insufficient data on blindness from causes such as diabetic retinopathy and age-related macular degeneration preclude specific estimations of their global prevalence. The age-specific prevalences of the major causes of blindness that are related to age indicate that the trend will be for an increase in such blindness over the decades to come, unless energetic efforts are made to tackle these problems. More data collected through standardized methodologies, using internationally accepted (ICD-10) definitions, are needed. Data on the incidence of blindness due to common causes would be useful for calculating future trends more precisely. PMID:7704921

  17. Munchausen Syndrome by Proxy: A Family Affair.

    Science.gov (United States)

    Mehl, Albert L.; And Others

    1990-01-01

    The article reports on a case of Munchausen syndrome by proxy in which chronic illicit insulin was administered to a one-year-old child by her mother. Factitious illnesses continued despite psychiatric intervention. Retrospective review of medical records suggested 30 previous episodes of factitious illness within the family. (DB)

  18. Real time gamma-ray signature identifier

    Science.gov (United States)

    Rowland, Mark [Alamo, CA; Gosnell, Tom B [Moraga, CA; Ham, Cheryl [Livermore, CA; Perkins, Dwight [Livermore, CA; Wong, James [Dublin, CA

    2012-05-15

    A real time gamma-ray signature/source identification method and system using principal components analysis (PCA) for transforming and substantially reducing one or more comprehensive spectral libraries of nuclear materials types and configurations into a corresponding concise representation/signature(s) representing and indexing each individual predetermined spectrum in principal component (PC) space, wherein an unknown gamma-ray signature may be compared against the representative signature to find a match or at least characterize the unknown signature from among all the entries in the library with a single regression or simple projection into the PC space, so as to substantially reduce processing time and computing resources and enable real-time characterization and/or identification.

  19. Evaluation of Organic Proxies for Quantifying Past Primary Productivity

    Science.gov (United States)

    Raja, M.; Rosell-Melé, A.; Galbraith, E.

    2017-12-01

    Ocean primary productivity is a key element of the marine carbon cycle. However, its quantitative reconstruction in the past relies on the use of biogeochemical models as the available proxy approaches are qualitative at best. Here, we present an approach that evaluates the use of phytoplanktonic biomarkers (i.e. chlorins and alkenones) as quantitative proxies to reconstruct past changes in marine productivity. We compare biomarkers contents in a global suite of core-top sediments to sea-surface chlorophyll-a abundance estimated by satellites over the last 20 years, and the results are compared to total organic carbon (TOC). We also assess satellite data and detect satellite limitations and biases due to the complexity of optical properties and the actual defined algorithms. Our findings show that sedimentary chlorins can be used to track total sea-surface chlorophyll-a abundance as an indicator for past primary productivity. However, degradation processes restrict the application of this proxy to concentrations below a threshold value (1µg/g). Below this threshold, chlorins are a useful tool to identify reducing conditions when used as part of a multiproxy approach to assess redox sedimentary conditions (e.g. using Re, U). This is based on the link between anoxic/disoxic conditions and the flux of organic matter from the sea-surface to the sediments. We also show that TOC is less accurate than chlorins for estimating sea-surface chlorophyll-a due to the contribution of terrigenous organic matter, and the different degradation pathways of all organic compounds that TOC includes. Alkenones concentration also relates to primary productivity, but they are constrained by different processes in different regions. In conclusion, as lons as specific constraints are taken into account, our study evaluates the use of chlorins and alkenones as quantitative proxies of past primary productivity, with more accuracy than by using TOC.

  20. Elemental signature of terrigenous sediment runoff as recorded in coastal salt ponds: US Virgin Islands

    International Nuclear Information System (INIS)

    Larson, Rebekka A.; Brooks, Gregg R.; Devine, Barry; Schwing, Patrick T.; Holmes, Charles W.; Jilbert, Tom; Reichart, Gert-Jan

    2015-01-01

    A high-resolution, multi-proxy approach is utilized on mm- to cm-scale laminated coastal salt pond sediments from St. John, U.S. Virgin Islands, to determine: (1) the sedimentological signature of depositional events/processes, (2) link this sedimentological signature with known depositional events/processes in the historical (past ∼100 years) record; and, (3) project back into the recent geologic past (past ∼1400 years) to investigate the natural variability of depositional events/processes. High-resolution, short-lived radioisotope geochronology ("2"1"0Pb, "1"3"7Cs, "7Be) combined with high-resolution elemental scanning techniques (scanning XRF and scanning LA-ICP-MS) allows for the direct comparison of well-preserved salt pond deposits to historical records of depositional events (e.g., runoff/rainfall, tropical cyclones, tsunamis) to identify the sedimentary signature of each type of event. There is a robust sedimentary record of terrigenous sediment runoff linked to the frequency of rainfall events that exceed a threshold of ∼12 mm/day (minimum to mobilize and transport sediment) for study sites. This is manifested in the sedimentary record as increases in terrigenous indicator elements (%Al, %Fe, %Ti, %Si), which agree well with rainfall records over the past ∼50 years. Variability in the sedimentary record over the past ∼100 years reflects decadal-scale fluctuations between periods of increased frequency of rainfall events, and decreased frequency of rainfall events. Dm-scale variability in terrigenous indicator elements over the past ∼1400 years represents the natural system variability on a decadal–centennial scale, and provides a high-resolution, long-term baseline of natural variability of rainfall/runoff events. A period of increased terrigenous sediment delivery during the 1700s and 1800s likely indicates increased erosion in response to anthropogenic activities associated with the island’s plantation era, and perhaps increased

  1. Fine-grained policy control in U.S. Army Research Laboratory (ARL) multimodal signatures database

    Science.gov (United States)

    Bennett, Kelly; Grueneberg, Keith; Wood, David; Calo, Seraphin

    2014-06-01

    The U.S. Army Research Laboratory (ARL) Multimodal Signatures Database (MMSDB) consists of a number of colocated relational databases representing a collection of data from various sensors. Role-based access to this data is granted to external organizations such as DoD contractors and other government agencies through a client Web portal. In the current MMSDB system, access control is only at the database and firewall level. In order to offer finer grained security, changes to existing user profile schemas and authentication mechanisms are usually needed. In this paper, we describe a software middleware architecture and implementation that allows fine-grained access control to the MMSDB at a dataset, table, and row level. Result sets from MMSDB queries issued in the client portal are filtered with the use of a policy enforcement proxy, with minimal changes to the existing client software and database. Before resulting data is returned to the client, policies are evaluated to determine if the user or role is authorized to access the data. Policies can be authored to filter data at the row, table or column level of a result set. The system uses various technologies developed in the International Technology Alliance in Network and Information Science (ITA) for policy-controlled information sharing and dissemination1. Use of the Policy Management Library provides a mechanism for the management and evaluation of policies to support finer grained access to the data in the MMSDB system. The GaianDB is a policy-enabled, federated database that acts as a proxy between the client application and the MMSDB system.

  2. Contracts, covenants and advance care planning: an empirical study of the moral obligations of patient and proxy.

    Science.gov (United States)

    Fins, Joseph J; Maltby, Barbara S; Friedmann, Erika; Greene, Michele G; Norris, Kaye; Adelman, Ronald; Byock, Ira

    2005-01-01

    Previously we had speculated that the patient-proxy relationship existed on a contractual to covenantal continuum. In order to assess this hypothesis, and to better understand the moral obligations of the patient-proxy relationship, we surveyed 50 patient-proxy pairs as well as 52 individuals who had acted as proxies for someone who had died. Using structured vignettes representative of three distinct disease trajectories (cancer, acute stroke, and congestive heart failure), we assessed whether respondents believed that proxies should follow explicit instructions regarding life-sustaining therapy and act contractually or whether more discretionary or covenantal judgments were ethically permissible. Additional variables included the valence of initial patient instructions--for example, "to do nothing" or "to do everything"--as well as the quality of information available to the proxy. Responses were graded on a contractual to covenantal continuum using a modified Likert scale employing a prospectively scored survey instrument. Our data indicate that the patient-proxy relationship exists on a contractual to covenantal continuum and that variables such as disease trajectory, the clarity of prognosis, instructional valence, and the quality of patient instructions result in statistically significant differences in response. The use of interpretative or covenantal judgment was desired by patients and proxies when the prognosis was grim, even if initial instructions were to pursue more aggressive care. Nonetheless, there was a valence effect: patients and proxies intended that negative instructions to be left alone be heeded. These data suggest that the delegation of patient self-determination is morally complex. Advance care planning should take into account both the exercise of autonomy and the interpretative burdens assumed by the proxy. Patients and proxies think inductively and contextually. Neither group viewed deviation from patient instructions as a violation of

  3. Validity of proxy data obtained by different psychological autopsy information reconstruction techniques.

    Science.gov (United States)

    Fang, L; Zhang, J

    2010-01-01

    Two informants were interviewed for each of 416 living controls (individuals sampled from the normal population) interviewed in a Chinese case-control psychological autopsy study. The validity of proxy data, obtained using seven psychological autopsy information reconstruction techniques (types 1, 2 and A - E), was evaluated, with living controls' self reports used as the gold-standard. Proxy data for reconstruction technique types 1, 2 and D on the Impulsivity Inventory Scale (total impulsivity score) were no different from the living controls' self report gold standard, whereas data for types A and E were smaller than data from living controls. On the 'acceptance or resignation' sub-scale of the avoidance coping dimension of the Moos Coping Response Inventory, information obtained by reconstruction technique types 1 and D was not significantly different from the living controls' self reports, whereas proxy data from types 2, A and E were smaller than those from the living controls. No statistically significant differences were identified for other proxy data obtained by reconstruction technique types 1, 2, A, D and E. These results indicate that using a second informant does not significantly enhance information reconstruction for the target.

  4. Deuterium values from volcanic glass: A paleoelevation proxy for Oregon's Cascade Range

    Science.gov (United States)

    Carlson, T. B.; Bershaw, J. T.

    2016-12-01

    Hydrated volcanic glass has been used as a proxy to constrain Cenozoic paleoclimate across many of the world's mountain ranges. However, there are concerns that volcanic glass may not preserve the isotopic composition of syndepositional meteoric water. The Cascades are an excellent location to study the validity of hydrated volcanic glass as a paleoenvironmental proxy for several reasons. Moisture is derived from a single oceanic source and falls as orographic precipitation in the Cascades, leading to a characteristic altitude effect, or inverse relationship between elevation and the isotopic composition of meteoric water (δD). In addition, past studies have inferred uplift of the Cascades and an increase in the rain shadow effect since the Eocene through independent methods such as changing fossil assemblages, and other isotopic proxies including carbonates and fossil teeth. In this study, δD values of two hydrated tuff samples are compared: one prior to ( 29 Ma) and one following ( 5 Ma) the onset of High Cascade volcanism. The isotopic composition of these samples are interpreted in the context of modern water across the range to understand the potential of volcanic glass as a proxy for paleoelevation in the Pacific Northwest.

  5. 42 CFR 424.36 - Signature requirements.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Signature requirements. 424.36 Section 424.36... (CONTINUED) MEDICARE PROGRAM CONDITIONS FOR MEDICARE PAYMENT Claims for Payment § 424.36 Signature requirements. (a) General rule. The beneficiary's own signature is required on the claim unless the beneficiary...

  6. Unsupervised signature extraction from forensic logs

    NARCIS (Netherlands)

    Thaler, S.M.; Menkovski, V.; Petkovic, M.; Altun, Y.; Das, K.; Mielikäinen, T.; Malerba, D.; Stefanowski, J.; Read, J.; Žitnik, M.; Ceci, M.

    2017-01-01

    Signature extraction is a key part of forensic log analysis. It involves recognizing patterns in log lines such that log lines that originated from the same line of code are grouped together. A log signature consists of immutable parts and mutable parts. The immutable parts define the signature, and

  7. How to integrate proxy data from two informants in life event assessment in psychological autopsy.

    Science.gov (United States)

    Zhang, Jie; Wang, Youqing; Fang, Le

    2018-04-27

    Life event assessment is an important part in psychological autopsy, and how to integrate its proxy data from two informants is a major methodological issue which needs solving. Totally 416 living subjects and their two informants were interviewed by psychological autopsy, and life events were assessed with Paykel's Interview for Recent Life Events. Validities of integrated proxy data using six psychological autopsy information reconstruction methods were evaluated, with living subjects' self-reports used as gold-standard criteria. For all the life events, average value of Youden Indexes for proxy data by type C information reconstruction method (choosing positive value from two informants) was larger than other five methods'. For family life related events, proxy data by type 1st information reconstruction method were not significantly different from living subjects' self-reports (P = 0.828). For all other life events, proxy data by type C information reconstruction method were not significantly different from the gold-standard. Choosing positive value is a relatively better method for integrating dichotomous (positive vs. negative) proxy data from two informants in life event assessment in psychological autopsy, except for family life related events. In that case, using information provided by 1st informants (mainly family member) is recommended.

  8. Retail applications of signature verification

    Science.gov (United States)

    Zimmerman, Thomas G.; Russell, Gregory F.; Heilper, Andre; Smith, Barton A.; Hu, Jianying; Markman, Dmitry; Graham, Jon E.; Drews, Clemens

    2004-08-01

    The dramatic rise in identity theft, the ever pressing need to provide convenience in checkout services to attract and retain loyal customers, and the growing use of multi-function signature captures devices in the retail sector provides favorable conditions for the deployment of dynamic signature verification (DSV) in retail settings. We report on the development of a DSV system to meet the needs of the retail sector. We currently have a database of approximately 10,000 signatures collected from 600 subjects and forgers. Previous work at IBM on DSV has been merged and extended to achieve robust performance on pen position data available from commercial point of sale hardware, achieving equal error rates on skilled forgeries and authentic signatures of 1.5% to 4%.

  9. Are fixed grain size ratios useful proxies for loess sedimentation dynamics? Experiences from Remizovka, Kazakhstan

    Science.gov (United States)

    Schulte, Philipp; Sprafke, Tobias; Rodrigues, Leonor; Fitzsimmons, Kathryn E.

    2018-04-01

    Loess-paleosol sequences (LPS) are sensitive terrestrial archives of past aeolian dynamics and paleoclimatic changes within the Quaternary. Grain size (GS) analysis is commonly used to interpret aeolian dynamics and climate influences on LPS, based on granulometric parameters such as specific GS classes, ratios of GS classes and statistical manipulation of GS data. However, the GS distribution of a loess sample is not solely a function of aeolian dynamics; rather complex polygenetic depositional and post-depositional processes must be taken into account. This study assesses the reliability of fixed GS ratios as proxies for past sedimentation dynamics using the case study of Remizovka in southeast Kazakhstan. Continuous sampling of the upper 8 m of the profile, which shows extremely weak pedogenic alteration and is therefore dominated by primary aeolian activity, indicates that fixed GS ratios do not adequately serve as proxies for loess sedimentation dynamics. We find through the calculation of single value parameters, that "true" variations within sensitive GS classes are masked by relative changes of the more frequent classes. Heatmap signatures provide the visualization of GS variability within LPS without significant data loss within the measured classes of a sample, or across all measured samples. We also examine the effect of two different commonly used laser diffraction devices on GS ratio calculation by duplicate measurements, the Beckman Coulter (LS13320) and a Malvern Mastersizer Hydro (MM2000), as well as the applicability and significance of the so-called "twin peak ratio" previously developed on samples from the same section. The LS13320 provides higher resolution results than the MM2000, nevertheless the GS ratios related to variations in the silt-sized fraction were comparable. However, we could not detect a twin peak within the coarse silt as detected in the original study using the same device. Our GS measurements differ from previous works at

  10. Quantum signature scheme for known quantum messages

    International Nuclear Information System (INIS)

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  11. Quick, “Imputation-free” meta-analysis with proxy-SNPs

    Directory of Open Access Journals (Sweden)

    Meesters Christian

    2012-09-01

    Full Text Available Abstract Background Meta-analysis (MA is widely used to pool genome-wide association studies (GWASes in order to a increase the power to detect strong or weak genotype effects or b as a result verification method. As a consequence of differing SNP panels among genotyping chips, imputation is the method of choice within GWAS consortia to avoid losing too many SNPs in a MA. YAMAS (Yet Another Meta Analysis Software, however, enables cross-GWAS conclusions prior to finished and polished imputation runs, which eventually are time-consuming. Results Here we present a fast method to avoid forfeiting SNPs present in only a subset of studies, without relying on imputation. This is accomplished by using reference linkage disequilibrium data from 1,000 Genomes/HapMap projects to find proxy-SNPs together with in-phase alleles for SNPs missing in at least one study. MA is conducted by combining association effect estimates of a SNP and those of its proxy-SNPs. Our algorithm is implemented in the MA software YAMAS. Association results from GWAS analysis applications can be used as input files for MA, tremendously speeding up MA compared to the conventional imputation approach. We show that our proxy algorithm is well-powered and yields valuable ad hoc results, possibly providing an incentive for follow-up studies. We propose our method as a quick screening step prior to imputation-based MA, as well as an additional main approach for studies without available reference data matching the ethnicities of study participants. As a proof of principle, we analyzed six dbGaP Type II Diabetes GWAS and found that the proxy algorithm clearly outperforms naïve MA on the p-value level: for 17 out of 23 we observe an improvement on the p-value level by a factor of more than two, and a maximum improvement by a factor of 2127. Conclusions YAMAS is an efficient and fast meta-analysis program which offers various methods, including conventional MA as well as inserting proxy

  12. 7 CFR 718.9 - Signature requirements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Signature requirements. 718.9 Section 718.9... MULTIPLE PROGRAMS General Provisions § 718.9 Signature requirements. (a) When a program authorized by this chapter or Chapter XIV of this title requires the signature of a producer; landowner; landlord; or tenant...

  13. 27 CFR 17.6 - Signature authority.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Signature authority. 17.6... PRODUCTS General Provisions § 17.6 Signature authority. No claim, bond, tax return, or other required... other proper notification of signature authority has been filed with the TTB office where the required...

  14. Multiscale combination of climate model simulations and proxy records over the last millennium

    Science.gov (United States)

    Chen, Xin; Xing, Pei; Luo, Yong; Nie, Suping; Zhao, Zongci; Huang, Jianbin; Tian, Qinhua

    2018-05-01

    To highlight the compatibility of climate model simulation and proxy reconstruction at different timescales, a timescale separation merging method combining proxy records and climate model simulations is presented. Annual mean surface temperature anomalies for the last millennium (851-2005 AD) at various scales over the land of the Northern Hemisphere were reconstructed with 2° × 2° spatial resolution, using an optimal interpolation (OI) algorithm. All target series were decomposed using an ensemble empirical mode decomposition method followed by power spectral analysis. Four typical components were obtained at inter-annual, decadal, multidecadal, and centennial timescales. A total of 323 temperature-sensitive proxy chronologies were incorporated after screening for each component. By scaling the proxy components using variance matching and applying a localized OI algorithm to all four components point by point, we obtained merged surface temperatures. Independent validation indicates that the most significant improvement was for components at the inter-annual scale, but this became less evident with increasing timescales. In mid-latitude land areas, 10-30% of grids were significantly corrected at the inter-annual scale. By assimilating the proxy records, the merged results reduced the gap in response to volcanic forcing between a pure reconstruction and simulation. Difficulty remained in verifying the centennial information and quantifying corresponding uncertainties, so additional effort should be devoted to this aspect in future research.

  15. Health anxiety by proxy in women with severe health anxiety

    DEFF Research Database (Denmark)

    Thorgaard, Mette Viller; Frostholm, Lisbeth; Walker, Lynn

    2017-01-01

    Health anxiety (HA) refers to excessive worries and anxiety about harbouring serious illness based on misinterpretation of bodily sensations or changes as signs of serious illness. Severe HA is associated with disability and high health care costs. However, the impact of parental HA on excessive...... concern with their children's health (health anxiety by proxy) is scantly investigated. The aim of this study is to investigate HA by proxy in mothers with severe HA. Fifty mothers with severe HA and two control groups were included, i.e. mothers with rheumatoid arthritis (N = 49) and healthy mothers (N...

  16. Performance of Solar Proxy Options of IRI-Plas Model for Equinox Seasons

    Science.gov (United States)

    Sezen, Umut; Gulyaeva, Tamara L.; Arikan, Feza

    2018-02-01

    International Reference Ionosphere (IRI) is the most acclaimed climatic model of the ionosphere. Since 2009, the range of the IRI model has been extended to the Global Positioning System (GPS) orbital height of 20,000 km in the plasmasphere. The new model, which is called IRI extended to Plasmasphere (IRI-Plas), can input not only the ionosonde foF2 and hmF2 but also the GPS-total electron content (TEC). IRI-Plas has been provided at www.ionolab.org, where online computation of ionospheric parameters is accomplished through a user-friendly interface. The solar proxies that are available in IRI-Plas can be listed as sunspot number (SSN1), SSN2, F10.7, global electron content (GEC), TEC, IG, Mg II, Lyman-α, and GEC_RZ. In this study, ionosonde foF2 data are compared with IRI-Plas foF2 values with the Consultative Committee International Radio (CCIR) and International Union of Radio Science (URSI) model choices for each solar proxy, with or without the GPS-TEC input for the equinox months of October 2011 and March 2015. It has been observed that the best fitting model choices in Root Mean Square (RMS) and Normalized RMS (NRMS) sense are the Jet Propulsion Laboratory global ionospheric maps-TEC input with Lyman-α solar proxy option for both months. The input of TEC definitely lowers the difference between the model and ionosonde foF2 values. The IG and Mg II solar proxies produce similar model foF2 values, and they usually are the second and third best fits to the ionosonde foF2 for the midlatitude ionosphere. In high-latitude regions, Jet Propulsion Laboratory global ionospheric map-TEC inputs to IRI-Plas with Lyman-α, GEC_RZ, and TEC solar proxies are the best choices. In equatorial region, the best fitting solar proxies are IG, Lyman-α, and Mg II.

  17. Online Signature Verification on MOBISIG Finger-Drawn Signature Corpus

    Directory of Open Access Journals (Sweden)

    Margit Antal

    2018-01-01

    Full Text Available We present MOBISIG, a pseudosignature dataset containing finger-drawn signatures from 83 users captured with a capacitive touchscreen-based mobile device. The database was captured in three sessions resulting in 45 genuine signatures and 20 skilled forgeries for each user. The database was evaluated by two state-of-the-art methods: a function-based system using local features and a feature-based system using global features. Two types of equal error rate computations are performed: one using a global threshold and the other using user-specific thresholds. The lowest equal error rate was 0.01% against random forgeries and 5.81% against skilled forgeries using user-specific thresholds that were computed a posteriori. However, these equal error rates were significantly raised to 1.68% (random forgeries case and 14.31% (skilled forgeries case using global thresholds. The same evaluation protocol was performed on the DooDB publicly available dataset. Besides verification performance evaluations conducted on the two finger-drawn datasets, we evaluated the quality of the samples and the users of the two datasets using basic quality measures. The results show that finger-drawn signatures can be used by biometric systems with reasonable accuracy.

  18. Blindness and severe visual impairment in pupils at schools for the blind in Burundi.

    Science.gov (United States)

    Ruhagaze, Patrick; Njuguna, Kahaki Kimani Margaret; Kandeke, Lévi; Courtright, Paul

    2013-01-01

    To determine the causes of childhood blindness and severe visual impairment in pupils attending schools for the blind in Burundi in order to assist planning for services in the country. All pupils attending three schools for the blind in Burundi were examined. A modified WHO/PBL eye examination record form for children with blindness and low vision was used to record the findings. Data was analyzed for those who became blind or severely visually impaired before the age of 16 years. Overall, 117 pupils who became visually impaired before 16 years of age were examined. Of these, 109 (93.2%) were blind or severely visually impaired. The major anatomical cause of blindness or severe visual impairment was cornea pathology/phthisis (23.9%), followed by lens pathology (18.3%), uveal lesions (14.7%) and optic nerve lesions (11.9%). In the majority of pupils with blindness or severe visual impairment, the underlying etiology of visual loss was unknown (74.3%). More than half of the pupils with lens related blindness had not had surgery; among those who had surgery, outcomes were generally poor. The causes identified indicate the importance of continuing preventive public health strategies, as well as the development of specialist pediatric ophthalmic services in the management of childhood blindness in Burundi. The geographic distribution of pupils at the schools for the blind indicates a need for community-based programs to identify and refer children in need of services.

  19. 48 CFR 804.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... signature. 804.101 Section 804.101 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS GENERAL ADMINISTRATIVE MATTERS Contract Execution 804.101 Contracting officer's signature. (a) If a... signature. ...

  20. Multiple imputation using linked proxy outcome data resulted in important bias reduction and efficiency gains: a simulation study.

    Science.gov (United States)

    Cornish, R P; Macleod, J; Carpenter, J R; Tilling, K

    2017-01-01

    When an outcome variable is missing not at random (MNAR: probability of missingness depends on outcome values), estimates of the effect of an exposure on this outcome are often biased. We investigated the extent of this bias and examined whether the bias can be reduced through incorporating proxy outcomes obtained through linkage to administrative data as auxiliary variables in multiple imputation (MI). Using data from the Avon Longitudinal Study of Parents and Children (ALSPAC) we estimated the association between breastfeeding and IQ (continuous outcome), incorporating linked attainment data (proxies for IQ) as auxiliary variables in MI models. Simulation studies explored the impact of varying the proportion of missing data (from 20 to 80%), the correlation between the outcome and its proxy (0.1-0.9), the strength of the missing data mechanism, and having a proxy variable that was incomplete. Incorporating a linked proxy for the missing outcome as an auxiliary variable reduced bias and increased efficiency in all scenarios, even when 80% of the outcome was missing. Using an incomplete proxy was similarly beneficial. High correlations (> 0.5) between the outcome and its proxy substantially reduced the missing information. Consistent with this, ALSPAC analysis showed inclusion of a proxy reduced bias and improved efficiency. Gains with additional proxies were modest. In longitudinal studies with loss to follow-up, incorporating proxies for this study outcome obtained via linkage to external sources of data as auxiliary variables in MI models can give practically important bias reduction and efficiency gains when the study outcome is MNAR.

  1. Blind Analysis in Particle Physics

    International Nuclear Information System (INIS)

    Roodman, A

    2003-01-01

    A review of the blind analysis technique, as used in particle physics measurements, is presented. The history of blind analyses in physics is briefly discussed. Next the dangers of and the advantages of a blind analysis are described. Three distinct kinds of blind analysis in particle physics are presented in detail. Finally, the BABAR collaboration's experience with the blind analysis technique is discussed

  2. The Sokoto blind beggars: causes of blindness and barriers to rehabilitation services.

    Science.gov (United States)

    Balarabe, Aliyu Hamza; Mahmoud, Abdulraheem O; Ayanniyi, Abdulkabir Ayansiji

    2014-01-01

    To determine the causes of blindness and the barriers to accessing rehabilitation services (RS) among blind street beggars (bsb) in Sokoto, Nigeria. A cross-sectional survey of 202 bsb (VA blindness were diagnosed by clinical ophthalmic examination. There were 107 (53%) males and 95 (47%) females with a mean age of 49 years (SD 12.2). Most bsb 191 (94.6%) had non-formal education. Of 190 (94.1%) irreversibly bsb, 180/190 (94.7%) had no light perception (NPL) bilaterally. The major causes of blindness were non-trachomatous corneal opacity (60.8%) and trachoma corneal opacity (12.8%). There were 166 (82%) blind from avoidable causes and 190 (94.1%) were irreversibly blind with 76.1% due to avoidable causes. The available sub-standard RS were educational, vocational and financial support. The barriers to RS in the past included non-availability 151 (87.8%), inability to afford 2 (1.2%), unfelt need 4 (2.3%), family refusal 1 (0.6), ignorance 6 (3.5%) and being not linked 8 (4.7%). The barriers to RS during the study period included inability of 72 subjects (35.6%) to access RS and 59 (81.9%) were due to lack of linkage to the existing services. Corneal opacification was the major cause of blindness among bsb. The main challenges to RS include the inadequate services available, societal and users factors. Renewed efforts are warranted toward the prevention of avoidable causes of blindness especially corneal opacities. The quality of life of the blind street beggar should be improved through available, accessible and affordable well-maintained and sustained rehabilitation services.

  3. Role of Advance Care Planning in Proxy Decision Making Among Individuals With Dementia and Their Family Caregivers.

    Science.gov (United States)

    Kwak, Jung; De Larwelle, Jessica A; Valuch, Katharine O'Connell; Kesler, Toni

    2016-01-01

    Health care proxies make important end-of-life decisions for individuals with dementia. A cross-sectional survey was conducted to examine the role of advance care planning in proxy decision making for 141 individuals with cognitive impairment, Alzheimer's disease, or other types of dementia. Proxies who did not know the preferences of individuals with dementia for life support treatments reported greater understanding of their values. Proxies of individuals with dementia who did not want life support treatments anticipated receiving less support and were more uncertain in decision making. The greater knowledge proxies had about dementia trajectory, family support, and trust of physicians, the more informed, clearer, and less uncertain they were in decision making. In addition to advance care planning, multiple factors influence proxy decision making, which should be considered in developing interventions and future research to support informed decision making for individuals with dementia and their families. Copyright 2016, SLACK Incorporated.

  4. Practical quantum digital signature

    Science.gov (United States)

    Yin, Hua-Lei; Fu, Yao; Chen, Zeng-Bing

    2016-03-01

    Guaranteeing nonrepudiation, unforgeability as well as transferability of a signature is one of the most vital safeguards in today's e-commerce era. Based on fundamental laws of quantum physics, quantum digital signature (QDS) aims to provide information-theoretic security for this cryptographic task. However, up to date, the previously proposed QDS protocols are impractical due to various challenging problems and most importantly, the requirement of authenticated (secure) quantum channels between participants. Here, we present the first quantum digital signature protocol that removes the assumption of authenticated quantum channels while remaining secure against the collective attacks. Besides, our QDS protocol can be practically implemented over more than 100 km under current mature technology as used in quantum key distribution.

  5. 25 CFR 213.10 - Lessor's signature.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Lessor's signature. 213.10 Section 213.10 Indians BUREAU... MEMBERS OF FIVE CIVILIZED TRIBES, OKLAHOMA, FOR MINING How to Acquire Leases § 213.10 Lessor's signature... thumbprint which shall be designated as “right” or “left” thumbmark. Such signatures must be witnessed by two...

  6. Initial Semantics for Strengthened Signatures

    Directory of Open Access Journals (Sweden)

    André Hirschowitz

    2012-02-01

    Full Text Available We give a new general definition of arity, yielding the companion notions of signature and associated syntax. This setting is modular in the sense requested by Ghani and Uustalu: merging two extensions of syntax corresponds to building an amalgamated sum. These signatures are too general in the sense that we are not able to prove the existence of an associated syntax in this general context. So we have to select arities and signatures for which there exists the desired initial monad. For this, we follow a track opened by Matthes and Uustalu: we introduce a notion of strengthened arity and prove that the corresponding signatures have initial semantics (i.e. associated syntax. Our strengthened arities admit colimits, which allows the treatment of the λ-calculus with explicit substitution.

  7. Spectral signature selection for mapping unvegetated soils

    Science.gov (United States)

    May, G. A.; Petersen, G. W.

    1975-01-01

    Airborne multispectral scanner data covering the wavelength interval from 0.40-2.60 microns were collected at an altitude of 1000 m above the terrain in southeastern Pennsylvania. Uniform training areas were selected within three sites from this flightline. Soil samples were collected from each site and a procedure developed to allow assignment of scan line and element number from the multispectral scanner data to each sampling location. These soil samples were analyzed on a spectrophotometer and laboratory spectral signatures were derived. After correcting for solar radiation and atmospheric attenuation, the laboratory signatures were compared to the spectral signatures derived from these same soils using multispectral scanner data. Both signatures were used in supervised and unsupervised classification routines. Computer-generated maps using the laboratory and multispectral scanner derived signatures resulted in maps that were similar to maps resulting from field surveys. Approximately 90% agreement was obtained between classification maps produced using multispectral scanner derived signatures and laboratory derived signatures.

  8. Time Series Based for Online Signature Verification

    Directory of Open Access Journals (Sweden)

    I Ketut Gede Darma Putra

    2013-11-01

    Full Text Available Signature verification system is to match the tested signature with a claimed signature. This paper proposes time series based for feature extraction method and dynamic time warping for match method. The system made by process of testing 900 signatures belong to 50 participants, 3 signatures for reference and 5 signatures from original user, simple imposters and trained imposters for signatures test. The final result system was tested with 50 participants with 3 references. This test obtained that system accuracy without imposters is 90,44897959% at threshold 44 with rejection errors (FNMR is 5,2% and acceptance errors (FMR is 4,35102%, when with imposters system accuracy is 80,1361% at threshold 27 with error rejection (FNMR is 15,6% and acceptance errors (average FMR is 4,263946%, with details as follows: acceptance errors is 0,391837%, acceptance errors simple imposters is 3,2% and acceptance errors trained imposters is 9,2%.

  9. Genome signature analysis of thermal virus metagenomes reveals Archaea and thermophilic signatures.

    Science.gov (United States)

    Pride, David T; Schoenfeld, Thomas

    2008-09-17

    Metagenomic analysis provides a rich source of biological information for otherwise intractable viral communities. However, study of viral metagenomes has been hampered by its nearly complete reliance on BLAST algorithms for identification of DNA sequences. We sought to develop algorithms for examination of viral metagenomes to identify the origin of sequences independent of BLAST algorithms. We chose viral metagenomes obtained from two hot springs, Bear Paw and Octopus, in Yellowstone National Park, as they represent simple microbial populations where comparatively large contigs were obtained. Thermal spring metagenomes have high proportions of sequences without significant Genbank homology, which has hampered identification of viruses and their linkage with hosts. To analyze each metagenome, we developed a method to classify DNA fragments using genome signature-based phylogenetic classification (GSPC), where metagenomic fragments are compared to a database of oligonucleotide signatures for all previously sequenced Bacteria, Archaea, and viruses. From both Bear Paw and Octopus hot springs, each assembled contig had more similarity to other metagenome contigs than to any sequenced microbial genome based on GSPC analysis, suggesting a genome signature common to each of these extreme environments. While viral metagenomes from Bear Paw and Octopus share some similarity, the genome signatures from each locale are largely unique. GSPC using a microbial database predicts most of the Octopus metagenome has archaeal signatures, while bacterial signatures predominate in Bear Paw; a finding consistent with those of Genbank BLAST. When using a viral database, the majority of the Octopus metagenome is predicted to belong to archaeal virus Families Globuloviridae and Fuselloviridae, while none of the Bear Paw metagenome is predicted to belong to archaeal viruses. As expected, when microbial and viral databases are combined, each of the Octopus and Bear Paw metagenomic contigs

  10. Signatures de l'invisible

    CERN Multimedia

    CERN Press Office. Geneva

    2000-01-01

    "Signatures of the Invisible" is an unique collaboration between contemporary artists and contemporary physicists which has the potential to help redefine the relationship between science and art. "Signatures of the Invisible" is jointly organised by the London Institute - the world's largest college of art and design and CERN*, the world's leading particle physics laboratory. 12 leading visual artists:

  11. Measuring SIP proxy server performance

    CERN Document Server

    Subramanian, Sureshkumar V

    2013-01-01

    Internet Protocol (IP) telephony is an alternative to the traditional Public Switched Telephone Networks (PSTN), and the Session Initiation Protocol (SIP) is quickly becoming a popular signaling protocol for VoIP-based applications. SIP is a peer-to-peer multimedia signaling protocol standardized by the Internet Engineering Task Force (IETF), and it plays a vital role in providing IP telephony services through its use of the SIP Proxy Server (SPS), a software application that provides call routing services by parsing and forwarding all the incoming SIP packets in an IP telephony network.SIP Pr

  12. Graphite-(Mo,W)S2 intergrowth as a palaeoenvironmental proxy in metasedimentary rocks

    Science.gov (United States)

    Cabral, Alexandre Raphael; Zeh, Armin; da Silva Viana, Nívea Cristina; Schirmer, Thomas; Lehmann, Bernd

    2017-12-01

    Molybdenum enrichment in pristine organic-C-rich sedimentary rocks forms the basis for inferring the presence of dissolved oxygen in seawater. Organic matter removes dissolved hexavalent Mo from seawater where anoxic and euxinic conditions are attained. However, it is unknown whether this Mo-based proxy is retained under metamorphic conditions where organic C is no longer preserved. Here, we describe aggregates of graphite and molybdenite (MoS2) containing up to 21 mass per cent of W as tungstenite (WS2) in solid solution. These aggregates are disseminated in a sulfide-rich Mn-silicate-carbonate rock (queluzite), metamorphosed under amphibolite-facies conditions within the Archaean Barbacena greenstone belt in Minas Gerais, Brazil. Our finding indicates that: (i) W is, like Mo, a palaeoenvironmental proxy; (ii) the W proxy is sensitive to high fS2/fO2 environments; (iii) both Mo and W proxies survive amphibolite-facies overprint as (Mo,W)S2 intergrown with graphite. Archaean greenstones are potential candidates for storing palaeoenvironmental information as (Mo,W)S2-graphite intergrowths.

  13. Servidor proxy caché: comprensión y asimilación tecnológica

    Directory of Open Access Journals (Sweden)

    Carlos E. Gómez

    2012-01-01

    Full Text Available Los proveedores de acceso a Internet usualmente incluyen el concepto de aceleradores de Internet para reducir el tiempo promedio que tarda un navegador en obtener los archivos solicitados. Para los administradores del sistema es difícil elegir la configuración del servidor proxy caché, ya que es necesario decidir los valores que se deben usar en diferentes variables. En este artículo se presenta la forma como se abordó el proceso de comprensión y asimilación tecnológica del servicio de proxy caché, un servicio de alto impacto organizacional. Además, este artículo es producto del proyecto de investigación “Análisis de configuraciones de servidores proxy caché”, en el cual se estudiaron aspectos relevantes del rendimiento de Squid como servidor proxy caché.

  14. Slices: A shape-proxy based on planar sections

    KAUST Repository

    McCrae, James; Singh, Karan S.; Mitra, Niloy J.

    2011-01-01

    of intersection of planes with a 3D object, for creating shape abstractions, motivated by their popularity in art and engineering. We first perform a user study to show that humans do define consistent and similar planar section proxies for common objects

  15. Technical Note: Probabilistically constraining proxy age–depth models within a Bayesian hierarchical reconstruction model

    Directory of Open Access Journals (Sweden)

    J. P. Werner

    2015-03-01

    Full Text Available Reconstructions of the late-Holocene climate rely heavily upon proxies that are assumed to be accurately dated by layer counting, such as measurements of tree rings, ice cores, and varved lake sediments. Considerable advances could be achieved if time-uncertain proxies were able to be included within these multiproxy reconstructions, and if time uncertainties were recognized and correctly modeled for proxies commonly treated as free of age model errors. Current approaches for accounting for time uncertainty are generally limited to repeating the reconstruction using each one of an ensemble of age models, thereby inflating the final estimated uncertainty – in effect, each possible age model is given equal weighting. Uncertainties can be reduced by exploiting the inferred space–time covariance structure of the climate to re-weight the possible age models. Here, we demonstrate how Bayesian hierarchical climate reconstruction models can be augmented to account for time-uncertain proxies. Critically, although a priori all age models are given equal probability of being correct, the probabilities associated with the age models are formally updated within the Bayesian framework, thereby reducing uncertainties. Numerical experiments show that updating the age model probabilities decreases uncertainty in the resulting reconstructions, as compared with the current de facto standard of sampling over all age models, provided there is sufficient information from other data sources in the spatial region of the time-uncertain proxy. This approach can readily be generalized to non-layer-counted proxies, such as those derived from marine sediments.

  16. Assessing the quality of life of children with sickle cell anaemia using self-, parent-proxy, and health care professional-proxy reports.

    Science.gov (United States)

    Constantinou, Christina; Payne, Nicola; Inusa, Baba

    2015-05-01

    The quality of life (QoL) of children with sickle cell anaemia (SCA) in the United Kingdom has not been examined, and a discrepancy measure based on Gap theory has rarely been used. This study investigated whether (1) child self-reports of QoL using a discrepancy measure (the Generic Children's QoL Measure; GCQ) are lower than those from healthy children, (2) proxy reports from parents and health care professionals are lower than child self-reports, and (3) demographic and disease severity indicators are related to QoL. An interdependent groups, cross-sectional design was implemented. Seventy-four children with SCA, their parent, and members of their health care team completed the GCQ. Demographic and disease severity indicators were recorded. GCQ data from healthy children were obtained from the UK Data Archive. Contrary to past research, when examining generic discrepancy QoL, children with SCA did not report a lower QoL than healthy children, and parent- and health care professional-proxy reports were not lower than child self-reports. Few of the demographic and disease severity indicators were related to QoL. Proxy reports may be used to gain a more complete picture of QoL, but should not be a substitute for self-reports. The explanation for the relatively high levels of QoL reported is not clear, but children with SCA may have realistic expectations about their ideal-self, place greater emphasis on aspects other than health in shaping their QoL, and define achievements within the limits of their illness. Future research should focus on psychological factors in explaining QoL. Statement of contribution What is already known on this subject? Children with sickle cell disease (SCD) generally have a reduced QoL compared with healthy children, but there appears to be no research measuring QoL in paediatric SCD in the United Kingdom. Proxy QoL reports from parents are often lower than child self-reports, but there is less research examining proxy reports from health

  17. Postural control in blind subjects.

    Science.gov (United States)

    Soares, Antonio Vinicius; Oliveira, Cláudia Silva Remor de; Knabben, Rodrigo José; Domenech, Susana Cristina; Borges Junior, Noe Gomes

    2011-12-01

    To analyze postural control in acquired and congenitally blind adults. A total of 40 visually impaired adults participated in the research, divided into 2 groups, 20 with acquired blindness and 20 with congenital blindness - 21 males and 19 females, mean age 35.8 ± 10.8. The Brazilian version of Berg Balance Scale and the motor domain of functional independence measure were utilized. On Berg Balance Scale the mean for acquired blindness was 54.0 ± 2.4 and 54.4 ± 2.5 for congenitally blind subjects; on functional independence measure the mean for acquired blind group was 87.1 ± 4.8 and 87.3 ± 2.3 for congenitally blind group. Based upon the scale used the results suggest the ability to control posture can be developed by compensatory mechanisms and it is not affected by visual loss in congenitally and acquired blindness.

  18. Maximizing biomarker discovery by minimizing gene signatures

    Directory of Open Access Journals (Sweden)

    Chang Chang

    2011-12-01

    Full Text Available Abstract Background The use of gene signatures can potentially be of considerable value in the field of clinical diagnosis. However, gene signatures defined with different methods can be quite various even when applied the same disease and the same endpoint. Previous studies have shown that the correct selection of subsets of genes from microarray data is key for the accurate classification of disease phenotypes, and a number of methods have been proposed for the purpose. However, these methods refine the subsets by only considering each single feature, and they do not confirm the association between the genes identified in each gene signature and the phenotype of the disease. We proposed an innovative new method termed Minimize Feature's Size (MFS based on multiple level similarity analyses and association between the genes and disease for breast cancer endpoints by comparing classifier models generated from the second phase of MicroArray Quality Control (MAQC-II, trying to develop effective meta-analysis strategies to transform the MAQC-II signatures into a robust and reliable set of biomarker for clinical applications. Results We analyzed the similarity of the multiple gene signatures in an endpoint and between the two endpoints of breast cancer at probe and gene levels, the results indicate that disease-related genes can be preferably selected as the components of gene signature, and that the gene signatures for the two endpoints could be interchangeable. The minimized signatures were built at probe level by using MFS for each endpoint. By applying the approach, we generated a much smaller set of gene signature with the similar predictive power compared with those gene signatures from MAQC-II. Conclusions Our results indicate that gene signatures of both large and small sizes could perform equally well in clinical applications. Besides, consistency and biological significances can be detected among different gene signatures, reflecting the

  19. Munchausen syndrome by proxy: a family anthology.

    Science.gov (United States)

    Pickford, E; Buchanan, N; McLaughlan, S

    1988-06-20

    While the Munchausen-by-proxy syndrome is well recognized, the story of one family has been related to describe some remarkable features. These include the psychopathology of the mother, the involvement of both children in the family, the great difficulty in obtaining proof of child abuse and, finally, the prosecution of the mother in the criminal court.

  20. Understanding the Cognitive and Affective Mechanisms that Underlie Proxy Risk Perceptions among Caregivers of Asthmatic Children.

    Science.gov (United States)

    Shepperd, James A; Lipsey, Nikolette P; Pachur, Thorsten; Waters, Erika A

    2018-07-01

    Medical decisions made on behalf of another person-particularly those made by adult caregivers for their minor children-are often informed by the decision maker's beliefs about the treatment's risks and benefits. However, we know little about the cognitive and affective mechanisms influencing such "proxy" risk perceptions and about how proxy risk perceptions are related to prominent judgment phenomena. Adult caregivers of minor children with asthma ( N = 132) completed an online, cross-sectional survey assessing 1) cognitions and affects that form the basis of the availability, representativeness, and affect heuristics; 2) endorsement of the absent-exempt and the better-than-average effect; and 3) proxy perceived risk and unrealistic comparative optimism of an asthma exacerbation. We used the Pediatric Asthma Control and Communication Instrument (PACCI) to assess asthma severity. Respondents with higher scores on availability, representativeness, and negative affect indicated higher proxy risk perceptions and (for representativeness only) lower unrealistic optimism, irrespective of asthma severity. Conversely, respondents who showed a stronger display of the better-than-average effect indicated lower proxy risk perceptions but did not differ in unrealistic optimism. The absent-exempt effect was unrelated to proxy risk perceptions and unrealistic optimism. Heuristic judgment processes appear to contribute to caregivers' proxy risk perceptions of their child's asthma exacerbation risk. Moreover, the display of other, possibly erroneous, judgment phenomena is associated with lower caregiver risk perceptions. Designing interventions that target these mechanisms may help caregivers work with their children to reduce exacerbation risk.

  1. Lattice-Based Revocable Certificateless Signature

    Directory of Open Access Journals (Sweden)

    Ying-Hao Hung

    2017-10-01

    Full Text Available Certificateless signatures (CLS are noticeable because they may resolve the key escrow problem in ID-based signatures and break away the management problem regarding certificate in conventional signatures. However, the security of the mostly previous CLS schemes relies on the difficulty of solving discrete logarithm or large integer factorization problems. These two problems would be solved by quantum computers in the future so that the signature schemes based on them will also become insecure. For post-quantum cryptography, lattice-based cryptography is significant due to its efficiency and security. However, no study on addressing the revocation problem in the existing lattice-based CLS schemes is presented. In this paper, we focus on the revocation issue and present the first revocable CLS (RCLS scheme over lattices. Based on the short integer solution (SIS assumption over lattices, the proposed lattice-based RCLS scheme is shown to be existential unforgeability against adaptive chosen message attacks. By performance analysis and comparisons, the proposed lattice-based RCLS scheme is better than the previously proposed lattice-based CLS scheme, in terms of private key size, signature length and the revocation mechanism.

  2. Postural control in blind subjects

    Directory of Open Access Journals (Sweden)

    Antonio Vinicius Soares

    2011-12-01

    Full Text Available Objective: To analyze postural control in acquired and congenitally blind adults. Methods: A total of 40 visually impaired adults participated in the research, divided into 2 groups, 20 with acquired blindness and 20 with congenital blindness - 21 males and 19 females, mean age 35.8 ± 10.8. The Brazilian version of Berg Balance Scale and the motor domain of functional independence measure were utilized. Results: On Berg Balance Scale the mean for acquired blindness was 54.0 ± 2.4 and 54.4 ± 2.5 for congenitally blind subjects; on functional independence measure the mean for acquired blind group was 87.1 ± 4.8 and 87.3 ± 2.3 for congenitally blind group. Conclusion: Based upon the scale used the results suggest the ability to control posture can be developed by compensatory mechanisms and it is not affected by visual loss in congenitally and acquired blindness.

  3. Short-term indicators. Intensities as a proxy for savings

    Energy Technology Data Exchange (ETDEWEB)

    Boonekamp, P.G.M.; Gerdes, J. [ECN Policy Studies, Petten (Netherlands); Faberi, S. [Institute of Studies for the Integration of Systems ISIS, Rome (Italy)

    2013-12-15

    The ODYSSEE database on energy efficiency indicators (www.odyssee-indicators.org) has been set up to enable the monitoring and evaluation of realised energy efficiency improvements and related energy savings. The database covers the 27 EU countries as well as Norway and Croatia and data are available from 1990 on. This work contributes to the growing need for quantitative monitoring and evaluation of the impacts of energy policies and measures, both at the EU and national level, e.g. due to the Energy Services Directive and the proposed Energy Efficiency Directive. Because the underlying data become available only after some time, the savings figures are not always timely available. This is especially true for the ODEX efficiency indices per sector that rely on a number of indicators. Therefore, there is a need for so-called short-term indicators that become available shortly after the year has passed for which data are needed. The short term indicators do not replace the savings indicators but function as a proxy for the savings in the most recent year. This proxy value is faster available, but will be less accurate than the saving indicators themselves. The short term indicators have to be checked regularly with the ODEX indicators in order to see whether they can function still as a proxy.

  4. General Conversion for Obtaining Strongly Existentially Unforgeable Signatures

    Science.gov (United States)

    Teranishi, Isamu; Oyama, Takuro; Ogata, Wakaha

    We say that a signature scheme is strongly existentially unforgeable (SEU) if no adversary, given message/signature pairs adaptively, can generate a signature on a new message or a new signature on a previously signed message. We propose a general and efficient conversion in the standard model that transforms a secure signature scheme to SEU signature scheme. In order to construct that conversion, we use a chameleon commitment scheme. Here a chameleon commitment scheme is a variant of commitment scheme such that one can change the committed value after publishing the commitment if one knows the secret key. We define the chosen message security notion for the chameleon commitment scheme, and show that the signature scheme transformed by our proposed conversion satisfies the SEU property if the chameleon commitment scheme is chosen message secure. By modifying the proposed conversion, we also give a general and efficient conversion in the random oracle model, that transforms a secure signature scheme into a SEU signature scheme. This second conversion also uses a chameleon commitment scheme but only requires the key only attack security for it.

  5. Proxy support for service discovery using mDNS/DNS-SD in low power networks

    NARCIS (Netherlands)

    Stolikj, M.; Verhoeven, R.; Cuijpers, P.J.L.; Lukkien, J.J.

    2014-01-01

    We present a solution for service discovery of resource constrained devices based on mDNS/DNS-SD. We extend the mDNS/DNS-SD service discovery protocol with support for proxy servers. Proxy servers temporarily store information about services offered on resource constrained devices and respond on

  6. Spatial linkages between coral proxies of terrestrial runoff across a large embayment in Madagascar

    Directory of Open Access Journals (Sweden)

    C. A. Grove

    2012-08-01

    Full Text Available Coral cores provide vital climate reconstructions for site-specific temporal variability in river flow and sediment load. Yet, their ability to record spatial differences across multiple catchments is relatively unknown. Here, we investigate spatial linkages between four coral proxies of terrestrial runoff and their relationships between sites. Coral cores were drilled in and around Antongil Bay, the largest bay in Madagascar, and individually analysed for fifteen years of continuous luminescence (G / B, Ba / Ca, δ18Osw and δ13C data. Each coral core was drilled close to individual river mouths (≥ 7 km, and proxy data were compared to modelled river discharge and sediment runoff data for the three corresponding catchments. A reasonable agreement between terrestrial runoff proxies with modelled river discharge and sediment yield was observed. Some inconsistencies between proxy and modelled data are likely linked to proxy behaviour, watershed size and local environmental physiochemical parameters. In general, the further a coral resided from its river source, the weaker the proxy relationship was with modelled data and other corals, due to mixing gradients and currents. Nevertheless, we demonstrate that two coral Ba / Ca and luminescence (G / B records influenced by the same watershed are reproducible. Furthermore, a strong Ba / Ca relationship was observed between two cores from distant watersheds, with baseline averages in agreement with modelled sediment runoff data. As humic acids behave conservatively in the water column, luminescence (G / B data gave the highest regional correlations between cores, and showed the most consistent relationship with site specific modelled discharge. No statistical relationship was observed between cores in terms of interannual δ18Osw and δ13C, meaning corals were recording a localised signal at their respective sites, confounded by vital

  7. Radar micro-doppler signatures processing and applications

    CERN Document Server

    Chen, Victor C; Miceli, William J

    2014-01-01

    Radar Micro-Doppler Signatures: Processing and applications concentrates on the processing and application of radar micro-Doppler signatures in real world situations, providing readers with a good working knowledge on a variety of applications of radar micro-Doppler signatures.

  8. Causes and emerging trends of childhood blindness: findings from schools for the blind in Southeast Nigeria.

    Science.gov (United States)

    Aghaji, Ada; Okoye, Obiekwe; Bowman, Richard

    2015-06-01

    To ascertain the causes severe visual impairment and blindness (SVI/BL) in schools for the blind in southeast Nigeria and to evaluate temporal trends. All children who developed blindness at schools for the blind in southeast Nigeria were examined. All the data were recorded on a WHO/Prevention of Blindness (WHO/PBL) form entered into a Microsoft Access database and transferred to STATA V.12.1 for analysis. To estimate temporal trends in causes of blindness, older (>15 years) children were compared with younger (≤15 years) children. 124 children were identified with SVI/BL. The most common anatomical site of blindness was the lens (33.9%). Overall, avoidable blindness accounted for 73.4% of all blindness. Exploring trends in SVI/BL between children ≤15 years of age and those >15 years old, this study shows a reduction in avoidable blindness but an increase in cortical visual impairment in the younger age group. The results from this study show a statistically significant decrease in avoidable blindness in children ≤15 years old. Corneal blindness appears to be decreasing but cortical visual impairment seems to be emerging in the younger age group. Appropriate strategies for the prevention of avoidable childhood blindness in Nigeria need to be developed and implemented. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  9. Testing New Proxies for Photosymbiosis in the Fossil Record

    Science.gov (United States)

    Tornabene, C.; Martindale, R. C.; Schaller, M. F.

    2015-12-01

    Photosymbiosis is a mutualistic relationship that many corals have developed with dinoflagellates called zooxanthellae. The dinoflagellates, of the genus Symbiodinium, photosynthesize and provide corals with most of their energy, while in turn coral hosts live in waters where zooxanthellae have optimal exposure to sunlight. Thanks to this relationship, symbiotic corals calcify faster than non-symbiotic corals. Photosymbiosis is therefore considered the evolutionary innovation that allowed corals to become major reef-builders through geological time.This relationship is extremely difficult to study. Zooxanthellae, which are housed in the coral tissue, are not preserved in fossil coral skeletons, thus determining whether corals had symbionts requires a robust proxy. In order to address this critical question, the goal of this research is to test new proxies for ancient photosymbiosis. Currently the project is focused on assessing the nitrogen (δ15N) isotopes of corals' organic matrices, sensu Muscatine et al. (2005), as well as carbon and oxygen (δ13C, δ18O) isotopes of fossil coral skeletons. Samples from Modern, Pleistocene, Oligocene and Triassic coral skeletons were analyzed to test the validity of these proxies. Coral samples comprise both (interpreted) symbiotic and non-symbiotic fossil corals from the Oligocene and Triassic as well as symbiotic fossil corals from the Modern and Pleistocene to corroborate our findings with the results of Muscatine et al. (2005). Samples were tested for diagenesis through petrographic and scanning electron microscope (SEM) analyses to avoid contamination. Additionally, a novel technique that has not yet been applied to the fossil record was tested. The technique aims to recognize dinosterol, a dinoflagellate biomarker, in both modern and fossil coral samples. The premise of this proxy is that symbiotic corals should contain the dinoflagellate biomarker, whereas those lacking symbionts should lack dinosterol. Results from this

  10. Shareholder Activism through Proxy Proposals : The European Perspective

    NARCIS (Netherlands)

    Cziraki, P.; Renneboog, L.D.R.; Szilagyi, P.G.

    2009-01-01

    This paper is the first to investigate the corporate governance role of shareholderinitiated proxy proposals in European firms. While proposals in the US are nonbinding even if they pass the shareholder vote, they are legally binding in the UK and most of Continental Europe. Nonetheless, submissions

  11. Physics Signatures at CLIC

    CERN Document Server

    Battaglia, Marco

    2001-01-01

    A set of signatures for physics processes of potential interests for the CLIC programme at = 1 - 5 TeV are discussed. These signatures, that may correspond to the manifestation of different scenarios of new physics as well as to Standard Model precision tests, are proposed as benchmarks for the optimisation of the CLIC accelerator parameters and for a first definition of the required detector response.

  12. Validation of a proxy for estrogen receptor status in breast cancer patients using dispensing data.

    Science.gov (United States)

    Srasuebkul, Preeyaporn; Dobbins, Timothy A; Pearson, Sallie-Anne

    2014-06-01

    To assess the performance of a proxy for estrogen receptor (ER) status in breast cancer patients using dispensing data. We derived our proxy using 167 patients. ER+ patients had evidence of at least one dispensing record for hormone therapy during the lookback period, irrespective of diagnosis date and ER- had no dispensing records for hormone therapy during the period. We validated the proxy against our gold standard, ER status from pathology reports or medical records. We assessed the proxy's performance using three lookback periods: 4.5 years, 2 years, 1 year. More than half of our cohort (62%) were >50 years, 54% had stage III/IV breast cancer at recruitment, (46%) were diagnosed with breast cancer in 2009 and 23% were diagnosed before 2006. Sensitivity and specificity were high for the 4.5 year lookback period (93%, 95% CI: 86-96%; and 95%: 83-99%), respectively) and remained high for the 2-year lookback period (91%: 84-95%; and 95%: 83-99%). Sensitivity decreased (83%: 75.2-89%) but specificity remained high (95%: 83-99%) using the 1-year lookback period and the period is long enough to allow sufficient time for hormone therapy to be dispensed. Our proxy accurately infers ER status in studies of breast cancer treatment based on secondary health data. The proxy is most robust with a minimum lookback period of 2 years. © 2012 Wiley Publishing Asia Pty Ltd.

  13. Harvard Law School Proxy Access Roundtable

    OpenAIRE

    Bebchuk, Lucian Arye; Hirst, Scott

    2010-01-01

    This paper contains the proceedings of the Proxy Access Roundtable that was held by the Harvard Law School Program on Corporate Governance on October 7, 2009. The Roundtable brought together prominent participants in the debate - representing a range of perspectives and experiences - for a day of discussion on the subject. The day’s first two sessions focused on the question of whether the Securities and Exchange Commission should provide an access regime, or whether it should leave the adopt...

  14. [Visual impairment and blindness in children in a Malawian school for the blind].

    Science.gov (United States)

    Schulze Schwering, M; Nyrenda, M; Spitzer, M S; Kalua, K

    2013-08-01

    The aim of this study was to determine the anatomic sites of severe visual impairment and blindness in children in an integrated school for the blind in Malawi, and to compare the results with those of previous Malawian blind school studies. Children attending an integrated school for the blind in Malawi were examined in September 2011 using the standard WHO/PBL eye examination record for children with blindness and low vision. Visual acuity [VA] of the better eye was classified using the standardised WHO reporting form. Fifty-five pupils aged 6 to 19 years were examined, 39 (71 %) males, and 16 (29 %) females. Thirty eight (69%) were blind [BL], 8 (15 %) were severely visually impaired [SVI], 8 (15 %) visually impaired [VI], and 1 (1.8 %) was not visually impaired [NVI]. The major anatomic sites of visual loss were optic nerve (16 %) and retina (16 %), followed by lens/cataract (15 %), cornea (11 %) and lesions of the whole globe (11 %), uveal pathologies (6 %) and cortical blindness (2 %). The exact aetiology of VI or BL could not be determined in most children. Albinism accounted for 13 % (7/55) of the visual impairments. 24 % of the cases were considered to be potentially avoidable: refractive amblyopia among pseudophakic patients and corneal scaring. Optic atrophy, retinal diseases (mostly albinism) and cataracts were the major causes of severe visual impairment and blindness in children in an integrated school for the blind in Malawi. Corneal scarring was now the fourth cause of visual impairment, compared to being the commonest cause 35 years ago. Congenital cataract and its postoperative outcome were the commonest remedial causes of visual impairment. Georg Thieme Verlag KG Stuttgart · New York.

  15. Proxy decision making and dementia: Using Construal Level Theory to analyse the thoughts of decision makers.

    Science.gov (United States)

    Convey, Helen; Holt, Janet; Summers, Barbara

    2018-03-08

    This study explored the feasibility of using Construal Level Theory to analyse proxy decision maker thinking about a hypothetical ethical dilemma, relating to a person who has dementia. Proxy decision makers make decisions on behalf of individuals who are living with dementia when dementia affects that individual's decision making ability. Ethical dilemmas arise because there is a need to balance the individual's past and contemporary values and views. Understanding of how proxy decision makers respond is incomplete. Construal Level Theory contends that individuals imagine reactions and make predications about the future by crossing psychological distance. This involves abstract thinking, giving meaning to decisions. There is no empirical evidence of Construal Level Theory being used to analyse proxy decision maker thinking. Exploring the feasibility of using Construal Level Theory to understand dementia carer thinking regarding proxy decisions may provide insights which inform the support given. Descriptive qualitative research with semi-structured interviews. Seven participants were interviewed using a hypothetical dementia care scenario in February 2016. Interview transcripts were analysed for themes. Construal Level Theory was applied to analyse participant responses within themes using the Linguistic Category Model. Participants travelled across psychological distance, using abstract thinking to clarify goals and provide a basis for decisions. When thinking concretely participants established boundaries regarding the ethical dilemma. Construal Level Theory gives insight into proxy decision maker thinking and the levels of abstraction used. Understanding what dementia carers think about when making proxy decisions may help nurses to understand their perspectives and to provide appropriate support. © 2018 John Wiley & Sons Ltd.

  16. Follow up of a robust meta-signature to identify Zika virus infection in Aedes aegypti: another brick in the wall

    Directory of Open Access Journals (Sweden)

    Eduardo Fukutani

    2018-05-01

    Full Text Available The mosquito Aedes aegypti is the main vector of several arthropod-borne diseases that have global impacts. In a previous meta-analysis, our group identified a vector gene set containing 110 genes strongly associated with infections of dengue, West Nile and yellow fever viruses. Of these 110 genes, four genes allowed a highly accurate classification of infected status. More recently, a new study of Ae. aegypti infected with Zika virus (ZIKV was published, providing new data to investigate whether this “infection” gene set is also altered during a ZIKV infection. Our hypothesis is that the infection-associated signature may also serve as a proxy to classify the ZIKV infection in the vector. Raw data associated with the NCBI/BioProject were downloaded and re-analysed. A total of 18 paired-end replicates corresponding to three ZIKV-infected samples and three controls were included in this study. The nMDS technique with a logistic regression was used to obtain the probabilities of belonging to a given class. Thus, to compare both gene sets, we used the area under the curve and performed a comparison using the bootstrap method. Our meta-signature was able to separate the infected mosquitoes from the controls with good predictive power to classify the Zika-infected mosquitoes.

  17. Follow up of a robust meta-signature to identify Zika virus infection in Aedes aegypti: another brick in the wall.

    Science.gov (United States)

    Fukutani, Eduardo; Rodrigues, Moreno; Kasprzykowski, José Irahe; Araujo, Cintia Figueiredo de; Paschoal, Alexandre Rossi; Ramos, Pablo Ivan Pereira; Fukutani, Kiyoshi Ferreira; Queiroz, Artur Trancoso Lopo de

    2018-01-01

    The mosquito Aedes aegypti is the main vector of several arthropod-borne diseases that have global impacts. In a previous meta-analysis, our group identified a vector gene set containing 110 genes strongly associated with infections of dengue, West Nile and yellow fever viruses. Of these 110 genes, four genes allowed a highly accurate classification of infected status. More recently, a new study of Ae. aegypti infected with Zika virus (ZIKV) was published, providing new data to investigate whether this "infection" gene set is also altered during a ZIKV infection. Our hypothesis is that the infection-associated signature may also serve as a proxy to classify the ZIKV infection in the vector. Raw data associated with the NCBI/BioProject were downloaded and re-analysed. A total of 18 paired-end replicates corresponding to three ZIKV-infected samples and three controls were included in this study. The nMDS technique with a logistic regression was used to obtain the probabilities of belonging to a given class. Thus, to compare both gene sets, we used the area under the curve and performed a comparison using the bootstrap method. Our meta-signature was able to separate the infected mosquitoes from the controls with good predictive power to classify the Zika-infected mosquitoes.

  18. Genome signature analysis of thermal virus metagenomes reveals Archaea and thermophilic signatures

    Directory of Open Access Journals (Sweden)

    Pride David T

    2008-09-01

    Full Text Available Abstract Background Metagenomic analysis provides a rich source of biological information for otherwise intractable viral communities. However, study of viral metagenomes has been hampered by its nearly complete reliance on BLAST algorithms for identification of DNA sequences. We sought to develop algorithms for examination of viral metagenomes to identify the origin of sequences independent of BLAST algorithms. We chose viral metagenomes obtained from two hot springs, Bear Paw and Octopus, in Yellowstone National Park, as they represent simple microbial populations where comparatively large contigs were obtained. Thermal spring metagenomes have high proportions of sequences without significant Genbank homology, which has hampered identification of viruses and their linkage with hosts. To analyze each metagenome, we developed a method to classify DNA fragments using genome signature-based phylogenetic classification (GSPC, where metagenomic fragments are compared to a database of oligonucleotide signatures for all previously sequenced Bacteria, Archaea, and viruses. Results From both Bear Paw and Octopus hot springs, each assembled contig had more similarity to other metagenome contigs than to any sequenced microbial genome based on GSPC analysis, suggesting a genome signature common to each of these extreme environments. While viral metagenomes from Bear Paw and Octopus share some similarity, the genome signatures from each locale are largely unique. GSPC using a microbial database predicts most of the Octopus metagenome has archaeal signatures, while bacterial signatures predominate in Bear Paw; a finding consistent with those of Genbank BLAST. When using a viral database, the majority of the Octopus metagenome is predicted to belong to archaeal virus Families Globuloviridae and Fuselloviridae, while none of the Bear Paw metagenome is predicted to belong to archaeal viruses. As expected, when microbial and viral databases are combined, each of

  19. 48 CFR 204.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Contracting officer's signature. 204.101 Section 204.101 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS... officer's signature. Follow the procedures at PGI 204.101 for signature of contract documents. [71 FR 9268...

  20. Definition of blindness under National Programme for Control of Blindness: Do we need to revise it?

    Science.gov (United States)

    Vashist, Praveen; Senjam, Suraj Singh; Gupta, Vivek; Gupta, Noopur; Kumar, Atul

    2017-02-01

    A review appropriateness of the current definition of blindness under National Programme for Control of Blindness (NPCB), Government of India. Online search of peer-reviewed scientific published literature and guidelines using PubMed, the World Health Organization (WHO) IRIS, and Google Scholar with keywords, namely blindness and visual impairment, along with offline examination of reports of national and international organizations, as well as their cross-references was done until December 2016, to identify relevant documents on the definition of blindness. The evidence for the historical and currently adopted definition of blindness under the NPCB, the WHO, and other countries was reviewed. Differences in the NPCB and WHO definitions were analyzed to assess the impact on the epidemiological status of blindness and visual impairment in India. The differences in the criteria for blindness under the NPCB and the WHO definitions cause an overestimation of the prevalence of blindness in India. These variations are also associated with an over-representation of refractive errors as a cause of blindness and an under-representation of other causes under the NPCB definition. The targets for achieving elimination of blindness also become much more difficult to achieve under the NPCB definition. Ignoring differences in definitions when comparing the global and Indian prevalence of blindness will cause erroneous interpretations. We recommend that the appropriate modifications should be made in the NPCB definition of blindness to make it consistent with the WHO definition.

  1. Definition of blindness under National Programme for Control of Blindness: Do we need to revise it?

    Directory of Open Access Journals (Sweden)

    Praveen Vashist

    2017-01-01

    Full Text Available A review appropriateness of the current definition of blindness under National Programme for Control of Blindness (NPCB, Government of India. Online search of peer-reviewed scientific published literature and guidelines using PubMed, the World Health Organization (WHO IRIS, and Google Scholar with keywords, namely blindness and visual impairment, along with offline examination of reports of national and international organizations, as well as their cross-references was done until December 2016, to identify relevant documents on the definition of blindness. The evidence for the historical and currently adopted definition of blindness under the NPCB, the WHO, and other countries was reviewed. Differences in the NPCB and WHO definitions were analyzed to assess the impact on the epidemiological status of blindness and visual impairment in India. The differences in the criteria for blindness under the NPCB and the WHO definitions cause an overestimation of the prevalence of blindness in India. These variations are also associated with an over-representation of refractive errors as a cause of blindness and an under-representation of other causes under the NPCB definition. The targets for achieving elimination of blindness also become much more difficult to achieve under the NPCB definition. Ignoring differences in definitions when comparing the global and Indian prevalence of blindness will cause erroneous interpretations. We recommend that the appropriate modifications should be made in the NPCB definition of blindness to make it consistent with the WHO definition.

  2. Extreme flood event reconstruction spanning the last century in the El Bibane Lagoon (southeastern Tunisia: a multi-proxy approach

    Directory of Open Access Journals (Sweden)

    A. Affouri

    2017-06-01

    Full Text Available Climate models project that rising atmospheric carbon dioxide concentrations will increase the frequency and the severity of some extreme weather events. The flood events represent a major risk for populations and infrastructures settled on coastal lowlands. Recent studies of lagoon sediments have enhanced our knowledge on extreme hydrological events such as palaeo-storms and on their relation with climate change over the last millennium. However, few studies have been undertaken to reconstruct past flood events from lagoon sediments. Here, the past flood activity was investigated using a multi-proxy approach combining sedimentological and geochemical analysis of surfaces sediments from a southeastern Tunisian catchment in order to trace the origin of sediment deposits in the El Bibane Lagoon. Three sediment sources were identified: marine, fluvial and aeolian. When applying this multi-proxy approach on core BL12-10, recovered from the El Bibane Lagoon, we can see that finer material, a high content of the clay and silt, and a high content of the elemental ratios (Fe ∕ Ca and Ti ∕ Ca characterise the sedimentological signature of the palaeo-flood levels identified in the lagoonal sequence. For the last century, which is the period covered by the BL12-10 short core, three palaeo-flood events were identified. The age of these flood events have been determined by 210Pb and 137Cs chronology and give ages of AD 1995 ± 6, 1970 ± 9 and 1945 ± 9. These results show a good temporal correlation with historical flood events recorded in southern Tunisia in the last century (AD 1932, 1969, 1979 and 1995. Our finding suggests that reconstruction of the history of the hydrological extreme events during the upper Holocene is possible in this location through the use of the sedimentary archives.

  3. Can specific transcriptional regulators assemble a universal cancer signature?

    Science.gov (United States)

    Roy, Janine; Isik, Zerrin; Pilarsky, Christian; Schroeder, Michael

    2013-10-01

    Recently, there is a lot of interest in using biomarker signatures derived from gene expression data to predict cancer progression. We assembled signatures of 25 published datasets covering 13 types of cancers. How do these signatures compare with each other? On one hand signatures answering the same biological question should overlap, whereas signatures predicting different cancer types should differ. On the other hand, there could also be a Universal Cancer Signature that is predictive independently of the cancer type. Initially, we generate signatures for all datasets using classical approaches such as t-test and fold change and then, we explore signatures resulting from a network-based method, that applies the random surfer model of Google's PageRank algorithm. We show that the signatures as published by the authors and the signatures generated with classical methods do not overlap - not even for the same cancer type - whereas the network-based signatures strongly overlap. Selecting 10 out of 37 universal cancer genes gives the optimal prediction for all cancers thus taking a first step towards a Universal Cancer Signature. We furthermore analyze and discuss the involved genes in terms of the Hallmarks of cancer and in particular single out SP1, JUN/FOS and NFKB1 and examine their specific role in cancer progression.

  4. 36 CFR 1150.22 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Signature of documents. 1150.22 Section 1150.22 Parks, Forests, and Public Property ARCHITECTURAL AND TRANSPORTATION BARRIERS... Documents for Proceedings on Citations § 1150.22 Signature of documents. The signature of a party...

  5. BlindSense: An Accessibility-inclusive Universal User Interface for Blind People

    Directory of Open Access Journals (Sweden)

    A. Khan

    2018-04-01

    Full Text Available A large number of blind people use smartphone-based assistive technology to perform their common activities. In order to provide a better user experience the existing user interface paradigm needs to be revisited. A new user interface model has been proposed in this paper. A simplified, semantically consistent, and blind-friendly adaptive user interface is provided. The proposed solution is evaluated through an empirical study on 63 blind people leveraging an improved user experience in performing common activities on a smartphone.

  6. A New Proxy Measurement Algorithm with Application to the Estimation of Vertical Ground Reaction Forces Using Wearable Sensors.

    Science.gov (United States)

    Guo, Yuzhu; Storm, Fabio; Zhao, Yifan; Billings, Stephen A; Pavic, Aleksandar; Mazzà, Claudia; Guo, Ling-Zhong

    2017-09-22

    Measurement of the ground reaction forces (GRF) during walking is typically limited to laboratory settings, and only short observations using wearable pressure insoles have been reported so far. In this study, a new proxy measurement method is proposed to estimate the vertical component of the GRF (vGRF) from wearable accelerometer signals. The accelerations are used as the proxy variable. An orthogonal forward regression algorithm (OFR) is employed to identify the dynamic relationships between the proxy variables and the measured vGRF using pressure-sensing insoles. The obtained model, which represents the connection between the proxy variable and the vGRF, is then used to predict the latter. The results have been validated using pressure insoles data collected from nine healthy individuals under two outdoor walking tasks in non-laboratory settings. The results show that the vGRFs can be reconstructed with high accuracy (with an average prediction error of less than 5.0%) using only one wearable sensor mounted at the waist (L5, fifth lumbar vertebra). Proxy measures with different sensor positions are also discussed. Results show that the waist acceleration-based proxy measurement is more stable with less inter-task and inter-subject variability than the proxy measures based on forehead level accelerations. The proposed proxy measure provides a promising low-cost method for monitoring ground reaction forces in real-life settings and introduces a novel generic approach for replacing the direct determination of difficult to measure variables in many applications.

  7. A New Proxy Measurement Algorithm with Application to the Estimation of Vertical Ground Reaction Forces Using Wearable Sensors

    Directory of Open Access Journals (Sweden)

    Yuzhu Guo

    2017-09-01

    Full Text Available Measurement of the ground reaction forces (GRF during walking is typically limited to laboratory settings, and only short observations using wearable pressure insoles have been reported so far. In this study, a new proxy measurement method is proposed to estimate the vertical component of the GRF (vGRF from wearable accelerometer signals. The accelerations are used as the proxy variable. An orthogonal forward regression algorithm (OFR is employed to identify the dynamic relationships between the proxy variables and the measured vGRF using pressure-sensing insoles. The obtained model, which represents the connection between the proxy variable and the vGRF, is then used to predict the latter. The results have been validated using pressure insoles data collected from nine healthy individuals under two outdoor walking tasks in non-laboratory settings. The results show that the vGRFs can be reconstructed with high accuracy (with an average prediction error of less than 5.0% using only one wearable sensor mounted at the waist (L5, fifth lumbar vertebra. Proxy measures with different sensor positions are also discussed. Results show that the waist acceleration-based proxy measurement is more stable with less inter-task and inter-subject variability than the proxy measures based on forehead level accelerations. The proposed proxy measure provides a promising low-cost method for monitoring ground reaction forces in real-life settings and introduces a novel generic approach for replacing the direct determination of difficult to measure variables in many applications.

  8. Heinrich event 4 characterized by terrestrial proxies in southwestern Europe

    Directory of Open Access Journals (Sweden)

    J. M. López-García

    2013-05-01

    Full Text Available Heinrich event 4 (H4 is well documented in the North Atlantic Ocean as a cooling event that occurred between 39 and 40 Ka. Deep-sea cores around the Iberian Peninsula coastline have been analysed to characterize the H4 event, but there are no data on the terrestrial response to this event. Here we present for the first time an analysis of terrestrial proxies for characterizing the H4 event, using the small-vertebrate assemblage (comprising small mammals, squamates and amphibians from Terrassa Riera dels Canyars, an archaeo-palaeontological deposit located on the seaboard of the northeastern Iberian Peninsula. This assemblage shows that the H4 event is characterized in northeastern Iberia by harsher and drier terrestrial conditions than today. Our results were compared with other proxies such as pollen, charcoal, phytolith, avifauna and large-mammal data available for this site, as well as with the general H4 event fluctuations and with other sites where H4 and the previous and subsequent Heinrich events (H5 and H3 have been detected in the Mediterranean and Atlantic regions of the Iberian Peninsula. We conclude that the terrestrial proxies follow the same patterns as the climatic and environmental conditions detected by the deep-sea cores at the Iberian margins.

  9. MUNCHAUSEN SYNDROME BY PROXY IN PEDIATRIC DENTISTRY: MYTH OR REALITY?

    Directory of Open Access Journals (Sweden)

    Veronica PINTILICIUC-ŞERBAN

    2017-06-01

    Full Text Available Background and aims: Munchausen syndrome by proxy is a condition traditionally comprising physical and mental abuse and medical neglect as a form of psychogenic maltreatment of the child, secondary to fabrication of a pediatric illness by the parent or guardian. The aim of our paper is to assess whether such condition occurs in current pediatric dental practice and to evidence certain situations in which the pediatric dentist should suspect this form of child abuse. Problem statement: Munchausen syndrome by proxy in pediatric dentistry may lead to serious chronic disabilities of the abused or neglected child, being one of the causes of treatment failure. Discussion: Prompt detection of such condition should be regarded as one of the duties of the practitioner who should be trained to report the suspected cases to the governmental child protective agencies. This should be regarded as a form of child abuse and neglect, and the responsible caregiver could be held liable when such wrongful actions cause harm or endanger child’s welfare. Conclusion: Munchausen syndrome by proxy should be regarded as a reality in current pediatric dental practice and dental teams should be trained to properly recognize, assess and manage such complex situations.

  10. Causes of blindness and career choice among pupils in a blind ...

    African Journals Online (AJOL)

    available eye care services Furthermore there is need for career talk in schools for the blind to ... career where their potential can be fully maximized. .... tropicamide 1% eye drops. .... Foster A, Gilbert C. Epidemiology of childhood blindness.

  11. PROXY-BASED PATCHING STREAM TRANSMISSION STRATEGY IN MOBILE STREAMING MEDIA SYSTEM

    Institute of Scientific and Technical Information of China (English)

    Liao Jianxin; Lei Zhengxiong; Ma Xutao; Zhu Xiaomin

    2006-01-01

    A mobile transmission strategy, PMPatching (Proxy-based Mobile Patching) transmission strategy is proposed, it applies to the proxy-based mobile streaming media system in Wideband Code Division Multiple Access (WCDMA) network. Performance of the whole system can be improved by using patching stream to transmit anterior part of the suffix that had been played back, and by batching all the demands for the suffix arrived in prefix period and patching stream transmission threshold period. Experimental results show that this strategy can efficiently reduce average network transmission cost and number of channels consumed in central streaming media server.

  12. 17 CFR 201.65 - Identity and signature.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Identity and signature. 201.65... of 1934 § 201.65 Identity and signature. Applications pursuant to this subpart may omit the identity, mailing address, and signature of the applicant; provided, that such identity, mailing address and...

  13. 15 CFR 908.16 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Signature. 908.16 Section 908.16 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) NATIONAL OCEANIC... SUBMITTING REPORTS ON WEATHER MODIFICATION ACTIVITIES § 908.16 Signature. All reports filed with the National...

  14. Data Cleaning Methods for Client and Proxy Logs

    NARCIS (Netherlands)

    Weinreich, H.; Obendorf, H.; Herder, E.; Edmonds, A.; Hawkey, K.; Kellar, M.; Turnbull, D.

    2006-01-01

    In this paper we present our experiences with the cleaning of Web client and proxy usage logs, based on a long-term browsing study with 25 participants. A detailed clickstream log, recorded using a Web intermediary, was combined with a second log of user interface actions, which was captured by a

  15. Munchausen Syndrome by Proxy (MSBP): An Intergenerational Perspective.

    Science.gov (United States)

    Rappaport, Sol R.; Hochstadt, Neil J.

    1993-01-01

    Presents new information about Munchausen Syndrome by Proxy (MSBP), factitious disorder in which caretaker may induce or exaggerate medical illness in his or her child that may lead to illness and even death. Provides psychosocial history of caregiver using intergenerational model. Presents case of MSBP involving three siblings and information…

  16. Methodological Considerations in Couples' Fertility Intentions: Missing Men and the Viability of Women's Proxy Reports.

    Science.gov (United States)

    Stykes, J Bart

    2018-02-19

    Introduction Recent efforts show potential to advance research on unintended childbearing by taking a couple-level approach. However, this work has neither adequately addressed methodological concerns stemming from the challenges associated with male fertility data nor considered the viability of women's proxy reports of fathers intentions. Methods Data from the Early Childhood Longitudinal Study, Birth Cohort (ECLS-B) were used to assess the implications of low response rates among men on couples' unintended childbearing. Then, the accuracy of women's proxy reports of fathers intentions was assessed. Weighted logistic regression analyses were conducted to determine how women's characteristics were associated with men's survey participation whereas weighted multinomial logistic regression analyses were applied to determine how women's characteristics were linked with the accuracy of her proxy report. Results Almost half (46%) of women cannot be matched with data from the child's father, and this discrepancy is most problematic for women who are black, foreign-born, less educated, and unmarried at birth. Women's proxy reports appear viable as 75% of women's reports are consistent with men's responses. Yet, proxy reports underestimate disagreement in couples' intentions as mothers who intended the birth are at an increased risk of "inaccurately" reporting that fathers share their intentions. Discussion Direct approaches to couples' intentions yield privileged samples and systematically omit women at the greatest risk of an unintended birth. However, proxies underestimate disagreement in couples' intentions-a key contribution to the couple approach. Accordingly each approach has its own merits which must be considered in light of specified research questions.

  17. 34 CFR 101.32 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Signature of documents. 101.32 Section 101.32 Education Regulations of the Offices of the Department of Education OFFICE FOR CIVIL RIGHTS, DEPARTMENT OF EDUCATION... Documents § 101.32 Signature of documents. The signature of a party, authorized officer, employee or...

  18. 29 CFR 102.116 - Signature of orders.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 2 2010-07-01 2010-07-01 false Signature of orders. 102.116 Section 102.116 Labor Regulations Relating to Labor NATIONAL LABOR RELATIONS BOARD RULES AND REGULATIONS, SERIES 8 Certification and Signature of Documents § 102.116 Signature of orders. The executive secretary or the associate executive...

  19. On signature change in p-adic space-times

    International Nuclear Information System (INIS)

    Dragovic, B.G.

    1991-01-01

    Change of signature by linear coordinate transformations in p-adic space-times is considered. In this paper it is shown that there exists arbitrary change of trivial signature in Q p n for all n ≥ 1 if p ≡ 1 (mod 4). In other cases it is possible to change only even number of the signs of the signature. The authors suggest new concept of signature with respect to distinct quadratic extensions, of Q p . If space-time dimension is restricted to four there is no signature change

  20. Munchausen Syndrome by Proxy: Unusual Manifestations and Disturbing Sequelae.

    Science.gov (United States)

    Porter, Gerald E.; And Others

    1994-01-01

    This study documents previously unreported findings in cases of Munchausen Syndrome by Proxy (in which a mother fabricates an illness in her child). In the reported case, esophageal perforation, retrograde intussusception, tooth loss, and bradycardia were found. (Author/DB)

  1. Signature Curves Statistics of DNA Supercoils

    OpenAIRE

    Shakiban, Cheri; Lloyd, Peter

    2004-01-01

    In this paper we describe the Euclidean signature curves for two dimensional closed curves in the plane and their generalization to closed space curves. The focus will be on discrete numerical methods for approximating such curves. Further we will apply these numerical methods to plot the signature curves related to three-dimensional simulated DNA supercoils. Our primary focus will be on statistical analysis of the data generated for the signature curves of the supercoils. We will try to esta...

  2. Shifty: A Weight-Shifting Dynamic Passive Haptic Proxy to Enhance Object Perception in Virtual Reality.

    Science.gov (United States)

    Zenner, Andre; Kruger, Antonio

    2017-04-01

    We define the concept of Dynamic Passive Haptic Feedback (DPHF) for virtual reality by introducing the weight-shifting physical DPHF proxy object Shifty. This concept combines actuators known from active haptics and physical proxies known from passive haptics to construct proxies that automatically adapt their passive haptic feedback. We describe the concept behind our ungrounded weight-shifting DPHF proxy Shifty and the implementation of our prototype. We then investigate how Shifty can, by automatically changing its internal weight distribution, enhance the user's perception of virtual objects interacted with in two experiments. In a first experiment, we show that Shifty can enhance the perception of virtual objects changing in shape, especially in length and thickness. Here, Shifty was shown to increase the user's fun and perceived realism significantly, compared to an equivalent passive haptic proxy. In a second experiment, Shifty is used to pick up virtual objects of different virtual weights. The results show that Shifty enhances the perception of weight and thus the perceived realism by adapting its kinesthetic feedback to the picked-up virtual object. In the same experiment, we additionally show that specific combinations of haptic, visual and auditory feedback during the pick-up interaction help to compensate for visual-haptic mismatch perceived during the shifting process.

  3. Evaluation of the convergence between "self-reporters" and "proxies" in a disability questionnaire by means of behaviour coding method

    NARCIS (Netherlands)

    Benitez Baena, Isabel; Padilla Garcia, Jose Luis; Ongena, Yfke

    Household surveys often require including proxy reporters to obtain information about other household members who cannot be interviewed. The participation of proxies can undermine survey data quality due to the fact that proxies must respond to questions thinking about other people. The objectives

  4. Parent proxy-reported quality of life for children with cerebral palsy: is it related to parental psychosocial distress?

    Science.gov (United States)

    Davis, E; Mackinnon, A; Waters, E

    2012-07-01

    Parent-proxy reports of quality of life (QOL) are often used to guide decisions about children with cerebral palsy (CP), although little is known about the factors that influence parent-proxy reports. The aim of this study was to examine (i) the relationship between parental psychosocial distress and parent proxy-reported QOL; and (ii) whether parental psychosocial distress mediates the relationship between child impairment and proxy-reported QOL. A sample of 201 primary caregivers of children aged 4-12 years with CP completed the Cerebral Palsy Quality of Life Questionnaire for Children, a condition-specific QOL instrument, and a measure of psychosocial distress, the Kessler 10. The children, evenly distributed by gender (56% male) were sampled across Gross Motor Function Classification System levels (Level I = 18%, II = 28%, III = 14%, IV = 11%, V = 27%). Consistent with the hypotheses, parental distress was negatively correlated with all domains of parent proxy-reported QOL (r = -0.18 to r = -0.55). The relationship between impairment and proxy-reported QOL was mediated by parental distress for five of the seven domains of QOL (social well-being and acceptance, feelings about functioning, participation and physical health, emotional well-being and self-esteem, and pain and impact of disability). Child impairment did not predict access to services or family health. This is the first study that assesses the relationship between parental distress and proxy-reported QOL for children with CP. Although the cross-sectional nature of the available data precludes any statements of causality, the results suggest that, when using parent proxy, the parents' psychological state should also be measured. This is particularly important when, as is often the case for child disability research, proxy-reported QOL are the only available data. © 2011 Blackwell Publishing Ltd.

  5. 45 CFR 81.32 - Signature of documents.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Signature of documents. 81.32 Section 81.32 Public... UNDER PART 80 OF THIS TITLE Form, Execution, Service and Filing of Documents § 81.32 Signature of documents. The signature of a party, authorized officer, employee or attorney constitutes a certificate that...

  6. Models for the blind

    DEFF Research Database (Denmark)

    Olsén, Jan-Eric

    2014-01-01

    person to touch them in their historical context. And yet these objects are all about touch, from the concrete act of touching something to the norms that assigned touch a specific pedagogical role in nineteenth-century blind schools. The aim of this article is twofold. First, I provide a historical......When displayed in museum cabinets, tactile objects that were once used in the education of blind and visually impaired people, appear to us, sighted visitors, as anything but tactile. We cannot touch them due to museum policies and we can hardly imagine what it would have been like for a blind...... background to the tactile objects of the blind. When did they appear as a specific category of pedagogical aid and how did they help determine the relation between blindness, vision, and touch? Second, I address the tactile objects from the point of view of empirical sources and historical evidence. Material...

  7. Modeling the lexical morphology of Western handwritten signatures.

    Directory of Open Access Journals (Sweden)

    Moises Diaz-Cabrera

    Full Text Available A handwritten signature is the final response to a complex cognitive and neuromuscular process which is the result of the learning process. Because of the many factors involved in signing, it is possible to study the signature from many points of view: graphologists, forensic experts, neurologists and computer vision experts have all examined them. Researchers study written signatures for psychiatric, penal, health and automatic verification purposes. As a potentially useful, multi-purpose study, this paper is focused on the lexical morphology of handwritten signatures. This we understand to mean the identification, analysis, and description of the signature structures of a given signer. In this work we analyze different public datasets involving 1533 signers from different Western geographical areas. Some relevant characteristics of signature lexical morphology have been selected, examined in terms of their probability distribution functions and modeled through a General Extreme Value distribution. This study suggests some useful models for multi-disciplinary sciences which depend on handwriting signatures.

  8. Simple proxies for estimating the concentrations of monoterpenes and their oxidation products at a boreal forest site

    Directory of Open Access Journals (Sweden)

    J. Kontkanen

    2016-10-01

    Full Text Available The oxidation products of monoterpenes likely have a crucial role in the formation and growth of aerosol particles in boreal forests. However, the continuous measurements of monoterpene concentrations are usually not available on decadal timescales, and the direct measurements of the concentrations of monoterpene oxidation product have so far been scarce. In this study we developed proxies for the concentrations of monoterpenes and their oxidation products at a boreal forest site in Hyytiälä, southern Finland. For deriving the proxies we used the monoterpene concentration measured with a proton transfer reaction mass spectrometer (PTR-MS during 2006–2013. Our proxies for the monoterpene concentration take into account the temperature-controlled emissions from the forest ecosystem, the dilution caused by the mixing within the boundary layer and different oxidation processes. All the versions of our proxies captured the seasonal variation of the monoterpene concentration, the typical proxy-to-measurements ratios being between 0.8 and 1.3 in summer and between 0.6 and 2.6 in winter. In addition, the proxies were able to describe the diurnal variation of the monoterpene concentration rather well, especially in summer months. By utilizing one of the proxies, we calculated the concentration of oxidation products of monoterpenes by considering their production in the oxidation and their loss due to condensation on aerosol particles. The concentration of oxidation products was found to have a clear seasonal cycle, with a maximum in summer and a minimum in winter. The concentration of oxidation products was lowest in the morning or around noon and highest in the evening. In the future, our proxies for the monoterpene concentration and their oxidation products can be used, for example, in the analysis of new particle formation and growth in boreal environments.

  9. Munchausen Syndrome by Proxy: A Study of Psychopathology.

    Science.gov (United States)

    Bools, Christopher; And Others

    1994-01-01

    This study evaluated 100 mothers with Munchausen Syndrome by Proxy (the fabrication of illness by a mother in her child). Approximately half of the mothers had either smothered or poisoned their child as part of their fabrications. Lifetime psychiatric histories were reported for 47 of the mothers. The most notable psychopathology was personality…

  10. Ocean currents generate large footprints in marine palaeoclimate proxies

    NARCIS (Netherlands)

    van Sebille, E.; Scussolini, P.; Durgadoo, J.V.; Peeters, F.J.C.; Biastoch, A.; Weijer, W.; Turney, C.; Paris, C.B.; Zahn, R.

    2015-01-01

    Fossils of marine microorganisms such as planktic foraminifera are among the cornerstones of palaeoclimatological studies. It is often assumed that the proxies derived from their shells represent ocean conditions above the location where they were deposited. Planktic foraminifera, however, are

  11. Deuterium Values from Hydrated Volcanic Glass: A Paleoelevation Proxy for Oregon's Cascade Range

    Science.gov (United States)

    Carlson, T. B.; Bershaw, J. T.; Cassel, E. J.

    2017-12-01

    Deuterium ratios (δD) of hydrated volcanic glass have been used to reconstruct Cenozoic paleoenvironments. However, the reliability and proper sample preparation protocol have been debated. The Cascades are an excellent location to study the validity of hydrated volcanic glass as a paleoelevation proxy for several reasons. Moisture is largely derived from a single oceanic source and falls as orographic precipitation in the Cascades, leading to a characteristic altitude effect, or inverse relationship between elevation and the isotopic composition of meteoric water (δD). Additionally, past studies have inferred uplift of the Cascades since the Miocene based on changing fossil assemblages, tectonic models, and other isotopic proxies including soil carbonates and fossil teeth. In this study, hydrated volcanic ash samples from the lee of the Cascades were rinsed with hydrochloric acid and sonicated before glass shards were hand-selected and analyzed for δD and wt. % water. These preliminary results exhibited δD values becoming enriched with time, a trend opposite of other paleowater proxy studies in the area. A possible explanation for this trend is contamination due to inadequate removal of materials adhered to shard surfaces that can readily exchange with environmental water. Recent research asserts that hydrofluoric acid (HF) etching during sample preparation is necessary to accurately measure δD values of syndepositional water. Volcanic ash samples were reanalyzed after preparation using HF abrasion and heavy liquid separation. The data from these two subsets are interpreted in the context of modern water across the range, as well as other paleowater proxy and geologic studies to determine the implications of volcanic glass as a paleoelevation proxy in the Pacific Northwest.

  12. Signature molecular descriptor : advanced applications.

    Energy Technology Data Exchange (ETDEWEB)

    Visco, Donald Patrick, Jr. (Tennessee Technological University, Cookeville, TN)

    2010-04-01

    In this work we report on the development of the Signature Molecular Descriptor (or Signature) for use in the solution of inverse design problems as well as in highthroughput screening applications. The ultimate goal of using Signature is to identify novel and non-intuitive chemical structures with optimal predicted properties for a given application. We demonstrate this in three studies: green solvent design, glucocorticoid receptor ligand design and the design of inhibitors for Factor XIa. In many areas of engineering, compounds are designed and/or modified in incremental ways which rely upon heuristics or institutional knowledge. Often multiple experiments are performed and the optimal compound is identified in this brute-force fashion. Perhaps a traditional chemical scaffold is identified and movement of a substituent group around a ring constitutes the whole of the design process. Also notably, a chemical being evaluated in one area might demonstrate properties very attractive in another area and serendipity was the mechanism for solution. In contrast to such approaches, computer-aided molecular design (CAMD) looks to encompass both experimental and heuristic-based knowledge into a strategy that will design a molecule on a computer to meet a given target. Depending on the algorithm employed, the molecule which is designed might be quite novel (re: no CAS registration number) and/or non-intuitive relative to what is known about the problem at hand. While CAMD is a fairly recent strategy (dating to the early 1980s), it contains a variety of bottlenecks and limitations which have prevented the technique from garnering more attention in the academic, governmental and industrial institutions. A main reason for this is how the molecules are described in the computer. This step can control how models are developed for the properties of interest on a given problem as well as how to go from an output of the algorithm to an actual chemical structure. This report

  13. DOUBLE DYNAMO SIGNATURES IN A GLOBAL MHD SIMULATION AND MEAN-FIELD DYNAMOS

    Energy Technology Data Exchange (ETDEWEB)

    Beaudoin, Patrice; Simard, Corinne; Cossette, Jean-François; Charbonneau, Paul [Département de Physique, Université de Montréal, C.P. 6128, Succ. Centre-Ville, Montréal, Québec, H3C 3J7 (Canada)

    2016-08-01

    The 11 year solar activity cycle is the most prominent periodic manifestation of the magnetohydrodynamical (MHD) large-scale dynamo operating in the solar interior, yet longer and shorter (quasi-) periodicities are also present. The so-called “quasi-biennial” signal appearing in many proxies of solar activity has been gaining increasing attention since its detection in p -mode frequency shifts, which suggests a subphotospheric origin. A number of candidate mechanisms have been proposed, including beating between co-existing global dynamo modes, dual dynamos operating in spatially separated regions of the solar interior, and Rossby waves driving short-period oscillations in the large-scale solar magnetic field produced by the 11 year activity cycle. In this article, we analyze a global MHD simulation of solar convection producing regular large-scale magnetic cycles, and detect and characterize shorter periodicities developing therein. By constructing kinematic mean-field α {sup 2}Ω dynamo models incorporating the turbulent electromotive force (emf) extracted from that same simulation, we find that dual-dynamo behavior materializes in fairly wide regions of the model’s parameters space. This suggests that the origin of the similar behavior detected in the MHD simulation lies with the joint complexity of the turbulent emf and differential rotation profile, rather that with dynamical interactions such as those mediated by Rossby waves. Analysis of the simulation also reveals that the dual dynamo operating therein leaves a double-period signature in the temperature field, consistent with a dual-period helioseismic signature. Order-of-magnitude estimates for the magnitude of the expected frequency shifts are commensurate with helioseismic measurements. Taken together, our results support the hypothesis that the solar quasi-biennial oscillations are associated with a secondary dynamo process operating in the outer reaches of the solar convection zone.

  14. Ship Signature Management System : Functionality

    NARCIS (Netherlands)

    Arciszewski, H.F.R.; Lier, L. van; Meijer, Y.G.S.; Noordkamp, H.W.; Wassenaar, A.S.

    2010-01-01

    A signature of a platform is the manner in which the platform manifests itself to a certain type of sensor and how observable it is when such a sensor is used to detect the platform. Because many military platforms use sensors in different media, it is the total of its different signatures that

  15. From perception to metacognition: Auditory and olfactory functions in early blind, late blind, and sighted individuals

    Directory of Open Access Journals (Sweden)

    Stina Cornell Kärnekull

    2016-09-01

    Full Text Available Although evidence is mixed, studies have shown that blind individuals perform better than sighted at specific auditory, tactile, and chemosensory tasks. However, few studies have assessed blind and sighted individuals across different sensory modalities in the same study. We tested early blind (n = 15, late blind (n = 15, and sighted (n = 30 participants with analogous olfactory and auditory tests in absolute threshold, discrimination, identification, episodic recognition, and metacognitive ability. Although the multivariate analysis of variance (MANOVA showed no overall effect of blindness and no interaction with modality, follow-up between-group contrasts indicated a blind-over-sighted advantage in auditory episodic recognition, that was most pronounced in early blind individuals. In contrast to the auditory modality, there was no empirical support for compensatory effects in any of the olfactory tasks. There was no conclusive evidence for group differences in metacognitive ability to predict episodic recognition performance. Taken together, the results showed no evidence of an overall superior performance in blind relative sighted individuals across olfactory and auditory functions, although early blind individuals exceled in episodic auditory recognition memory. This observation may be related to an experience-induced increase in auditory attentional capacity.

  16. Quercus macrocarpa annual, early- and latewood widths as hydroclimatic proxies, southeastern Saskatchewan, Canada

    International Nuclear Information System (INIS)

    Vanstone, Jessica R; Sauchyn, David J

    2010-01-01

    Fluctuations in size of annual ring-widths of Quercus species suggest that environmental factors influence the size and density of vessels within the ring, either by acting as a limiting factor for growth or through fine tuning of the wood structure to environmental factors. The purpose of this study is to assess the potential of Q. macrocarpa to provide multiple dendroclimatic proxies for the Canadian Prairies, by investigating growth responses of annual, early- and latewood widths to regional climate variability. Results indicate that ring width chronologies, from southeastern Saskatchewan capture regional signals related to moisture and drought conditions. Correlations suggest that late-wood widths are more representative of annual ring-widths, than are early-wood widths, and are the best proxy of seasonal fluctuations in climate. Thus regression models that include latewood widths were able to account for more variance in the Palmer Drought Severity Index (PDSI) than when annual ring-widths are used as the only proxy. This study demonstrates that Q. macrocarpa can provide multiple dendroclimatic proxies for investigating large scale climatic fluctuations at annual and sub-annual time scales. It is novel in terms of sub-annual analysis of tree-rings in a region that previously lacked dendrochronological research.

  17. [Analysis of prevalence of self-reported hearing loss and associated factors: primary versus proxy informant].

    Science.gov (United States)

    Quevedo, André Luis Alves de; Leotti, Vanessa Bielefeldt; Goulart, Bárbara Niegia Garcia de

    2017-07-03

    The objective was to evaluate differences between prevalence rates for self-reported hearing loss and associated factors, obtained from responses by primary and proxy informants in a Population-Based Study on Human Communication Disorders (DCH-POP in Portuguese). This was a study on epidemiological methods using data from a cross-sectional household survey with a sample of 1,253 individuals from Southern Brazil. To verify differences between prevalence rates comparing primary informants and proxy informants, we used the chi-square or Fisher's exact test for categorical variables and Mann-Whitney for continuous variables. The log-binomial model was adjusted for hearing loss as the dependent variable, considering three datasets: the entire sample, only primary informants, and only proxy informants, estimating association by prevalence ratios. In the final models, only the independent variables age and dizziness were associated with hearing loss, independently of the dataset that was used. Proxy informants generally underestimated the prevalence rates for the target outcomes, when compared to primary informants.

  18. Blinded trials taken to the test

    DEFF Research Database (Denmark)

    Hróbjartsson, A; Forfang, E; Haahr, M T

    2007-01-01

    Blinding can reduce bias in randomized clinical trials, but blinding procedures may be unsuccessful. Our aim was to assess how often randomized clinical trials test the success of blinding, the methods involved and how often blinding is reported as being successful....

  19. Optical Proxies for Terrestrial Dissolved Organic Matter in Estuaries and Coastal Waters

    Directory of Open Access Journals (Sweden)

    Christopher L. Osburn

    2016-01-01

    Full Text Available Optical proxies, especially DOM fluorescence, were used to track terrestrial DOM fluxes through estuaries and coastal waters by comparing models developed for several coastal ecosystems. Key to using optical properties is validating and calibrating them with chemical measurements, such as lignin-derived phenols - a proxy to quantify terrestrial DOM. Utilizing parallel factor analysis (PARAFAC, and comparing models statistically using the OpenFluor database (http://www.openfluor.org we have found common, ubiquitous fluorescing components which correlate most strongly with lignin phenol concentrations in several estuarine and coastal environments. Optical proxies for lignin were computed for the following regions: Mackenzie River Estuary, Atchafalaya River Estuary, Charleston Harbor, Chesapeake Bay, and Neuse River Estuary. The slope of linear regression models relating CDOM absorption at 350 nm (a350 to DOC and to lignin, varied 5 to 10 fold among systems. Where seasonal observations were available from a region, there were distinct seasonal differences in equation parameters for these optical proxies. Despite variability, overall models using single linear regression were developed that related dissolved organic carbon (DOC concentration to CDOM (DOC = 40×a350+138; R2 = 0.77; N = 130 and lignin (Σ8 to CDOM (Σ8 = 2.03×a350-0.5; R2 = 0.87; N = 130. This wide variability suggested that local or regional optical models should be developed for predicting terrestrial DOM flux into coastal oceans and taken into account when upscaling to remote sensing observations and calibrations.

  20. Cell short circuit, preshort signature

    Science.gov (United States)

    Lurie, C.

    1980-01-01

    Short-circuit events observed in ground test simulations of DSCS-3 battery in-orbit operations are analyzed. Voltage signatures appearing in the data preceding the short-circuit event are evaluated. The ground test simulation is briefly described along with performance during reconditioning discharges. Results suggest that a characteristic signature develops prior to a shorting event.

  1. Opportunities and limitations related to the application of plant-derived lipid molecular proxies in soil science

    Directory of Open Access Journals (Sweden)

    B. Jansen

    2017-11-01

    Full Text Available The application of lipids in soils as molecular proxies, also often referred to as biomarkers, has dramatically increased in the last decades. Applications range from inferring changes in past vegetation composition, climate, and/or human presence to unraveling the input and turnover of soil organic matter (SOM. The molecules used are extractable and non-extractable lipids, including ester-bound lipids. In addition, the carbon or hydrogen isotopic composition of such molecules is used. While holding great promise, the application of soil lipids as molecular proxies comes with several constraining factors, the most important of which are (i variability in the molecular composition of plant-derived organic matter both internally and between individual plants, (ii variability in (the relative contribution of input pathways into the soil, and (iii the transformation and/or (selective degradation of (some of the molecules once present in the soil. Unfortunately, the information about such constraining factors and their impact on the applicability of molecular proxies is fragmented and scattered. The purpose of this study is to provide a critical review of the current state of knowledge with respect to the applicability of molecular proxies in soil science, specifically focusing on the factors constraining such applicability. Variability in genetic, ontogenetic, and environmental factors influences plant n-alkane patterns in such a way that no unique compounds or specific molecular proxies pointing to, for example, plant community differences or environmental influences, exist. Other components, such as n-alcohols, n-fatty acids, and cutin- and suberin-derived monomers, have received far less attention in this respect. Furthermore, there is a high diversity of input pathways offering both opportunities and limitations for the use of molecular proxies at the same time. New modeling approaches might offer a possibility to unravel such mixed input

  2. Postictal blindness in adults.

    OpenAIRE

    Sadeh, M; Goldhammer, Y; Kuritsky, A

    1983-01-01

    Cortical blindness following grand mal seizures occurred in five adult patients. The causes of seizures included idiopathic epilepsy, vascular accident, brain cyst, acute encephalitis and chronic encephalitis. Blindness was permanent in one patients, but the others recovered within several days. Since most of the patients were either unaware of or denied their blindness, it is possible that this event often goes unrecognised. Cerebral hypoxia is considered the most likely mechanism.

  3. INTRODUCTION Childhood blindness is increasingly becoming a ...

    African Journals Online (AJOL)

    number of blind years resulting from blindness in children is also equal to the number of blind years due to age related cataract.10 The burden of disability in terms of blind years in these children represents a major. CAUSES OF BLINDNESS AND VISUAL IMPAIRMENT AT THE SCHOOL FOR THE. BLIND OWO, NIGERIA.

  4. Munchausen syndrome and Munchausen syndrome by proxy in dermatology.

    Science.gov (United States)

    Boyd, Alan S; Ritchie, Coleman; Likhari, Sunaina

    2014-08-01

    Patients with Munchausen syndrome purposefully injure themselves, often with the injection of foreign materials, to gain hospital admission and the attention associated with having a difficult-to-identify condition. Munchausen syndrome by proxy occurs when a child's caregiver, typically the mother, injures the child for the same reasons. Cases of Munchausen syndrome and Munchausen syndrome by proxy with primary cutaneous involvement appear to be rarely described in the literature suggesting either that diagnosis is not made readily or that it is, in fact, an uncommon disorder. At the center of both conditions is significant psychological pathology and treatment is difficult as many patients with Munchausen syndrome when confronted with these diagnostic possibilities simply leave the hospital. Little is known about the long-term outcome or prognosis of these patients. Copyright © 2014 American Academy of Dermatology, Inc. Published by Mosby, Inc. All rights reserved.

  5. The electronic identification, signature and security of information systems

    Directory of Open Access Journals (Sweden)

    Horovèák Pavel

    2002-12-01

    Full Text Available The contribution deals with the actual methods and technologies of information and communication systems security. It introduces the overview of electronic identification elements such as static password, dynamic password and single sign-on. Into this category belong also biometric and dynamic characteristics of verified person. Widespread is authentication based on identification elements ownership, such as various cards and authentication calculators. In the next part is specified a definition and characterization of electronic signature, its basic functions and certificate categories. Practical utilization of electronic signature consists of electronic signature acquirement, signature of outgoing email message, receiving of electronic signature and verification of electronic signature. The use of electronic signature is continuously growing and in connection with legislation development it exercises in all resorts.

  6. Linking Concurrent Self-Reports and Retrospective Proxy Reports About the Last Year of Life: A Prevailing Picture of Life Satisfaction Decline

    Science.gov (United States)

    Gerstorf, Denis; Ram, Nilam; Schupp, Jürgen; Sprangers, Mirjam A. G.; Wagner, Gert G.

    2014-01-01

    Objective. We examined the extent to which retrospective proxy reports of well-being mirror participant self-reports at 12–24 months before death and how proxy reports of well-being change over the last year of life. We also explored the role of sociodemographic, cognitive, and health factors of both participants and proxies in moderating such associations. Method. We used retrospective proxy ratings obtained in the German Socio-Economic Panel Study (N = 164; age at death = 19–99 years). Results. Results revealed moderate agreement between self- and proxy reports (r = .42), but proxies, on average, overestimated participants’ life satisfaction by two thirds of a scale point on a 0–10 scale (or 0.4 SD). Discrepancies were particularly pronounced when proxies themselves reported low life satisfaction. Over the last year of life, participants were viewed to have experienced declines in life satisfaction (−0.54 SD). Declines were stronger for ill participants and proxies who reported low life satisfaction. Discussion. Results qualify theoretical expectations and empirical results based on self-report data that are typically available 1 or 2 years before death. We discuss that retrospective proxy reports in panel surveys can be used as a hypothesis-generating tool to gather insights into late life. PMID:23766436

  7. COMPUTER-IMPLEMENTED METHOD OF PERFORMING A SEARCH USING SIGNATURES

    DEFF Research Database (Denmark)

    2017-01-01

    A computer-implemented method of processing a query vector and a data vector), comprising: generating a set of masks and a first set of multiple signatures and a second set of multiple signatures by applying the set of masks to the query vector and the data vector, respectively, and generating...... candidate pairs, of a first signature and a second signature, by identifying matches of a first signature and a second signature. The set of masks comprises a configuration of the elements that is a Hadamard code; a permutation of a Hadamard code; or a code that deviates from a Hadamard code...

  8. Marine proxy evidence linking decadal North Pacific and Atlantic climate

    Energy Technology Data Exchange (ETDEWEB)

    Hetzinger, S. [University of Toronto Mississauga, CPS-Department, Mississauga, ON (Canada); Leibniz Institute of Marine Sciences, IFM-GEOMAR, Kiel (Germany); Halfar, J. [University of Toronto Mississauga, CPS-Department, Mississauga, ON (Canada); Mecking, J.V.; Keenlyside, N.S. [Leibniz Institute of Marine Sciences, IFM-GEOMAR, Kiel (Germany); University of Bergen, Geophysical Institute and Bjerknes Centre for Climate Research, Bergen (Norway); Kronz, A. [University of Goettingen, Geowissenschaftliches Zentrum, Goettingen (Germany); Steneck, R.S. [University of Maine, Darling Marine Center, Walpole, ME (United States); Adey, W.H. [Smithsonian Institution, Department of Botany, Washington, DC (United States); Lebednik, P.A. [ARCADIS U.S. Inc., Walnut Creek, CA (United States)

    2012-09-15

    Decadal- to multidecadal variability in the extra-tropical North Pacific is evident in 20th century instrumental records and has significant impacts on Northern Hemisphere climate and marine ecosystems. Several studies have discussed a potential linkage between North Pacific and Atlantic climate on various time scales. On decadal time scales no relationship could be confirmed, potentially due to sparse instrumental observations before 1950. Proxy data are limited and no multi-centennial high-resolution marine geochemical proxy records are available from the subarctic North Pacific. Here we present an annually-resolved record (1818-1967) of Mg/Ca variations from a North Pacific/Bering Sea coralline alga that extends our knowledge in this region beyond available data. It shows for the first time a statistically significant link between decadal fluctuations in sea-level pressure in the North Pacific and North Atlantic. The record is a lagged proxy for decadal-scale variations of the Aleutian Low. It is significantly related to regional sea surface temperature and the North Atlantic Oscillation (NAO) index in late boreal winter on these time scales. Our data show that on decadal time scales a weaker Aleutian Low precedes a negative NAO by several years. This atmospheric link can explain the coherence of decadal North Pacific and Atlantic Multidecadal Variability, as suggested by earlier studies using climate models and limited instrumental data. (orig.)

  9. Diffie-Hellman Key Based Authentication in Proxy Mobile IPv6

    Directory of Open Access Journals (Sweden)

    HyunGon Kim

    2010-01-01

    Full Text Available Wireless communication service providers have been showing strong interest in Proxy Mobile IPv6 for providing network-based IP mobility management. This could be a prominent way to support IP mobility to mobile nodes, because Proxy Mobile IPv6 requires minimal functionalities on the mobile node. While several extensions for Proxy Mobile IPv6 are being developed in the Internet Engineering Task Force, there has been little attentions paid to developing efficient authentication mechanisms. An authentication scheme for a mobility protocol must protect signaling messages against various security threats, e.g., session stealing attack, intercept attack by redirection, replay attack, and key exposure, while minimizing authentication latency. In this paper, we propose a Diffie-Hellman key based authentication scheme that utilizes the low layer signaling to exchange Diffie-Hellman variables and allows mobility service provisioning entities to exchange mobile node's profile and ongoing sessions securely. By utilizing the low layer signaling and context transfer between relevant nodes, the proposed authentication scheme minimizes authentication latency when the mobile node moves across different networks. In addition, thanks to the use of the Diffie-Hellman key agreement, pre-established security associations between mobility service provisioning entities are not required in the proposed authentication scheme so that network scalability in an operationally efficient manner is ensured. To ascertain its feasibility, security analysis and performance analysis are presented.

  10. Signature effects in 2-qp rotational bands

    International Nuclear Information System (INIS)

    Jain, A.K.; Goel, A.

    1992-01-01

    The authors briefly review the progress in understanding the 2-qp rotational bands in odd-odd nuclei. Signature effects and the phenomenon of signature inversion are discussed. The Coriolis coupling appears to have all the ingredients to explain the inversion. Some recent work on signature dependence in 2-qp bands of even-even nuclei is also discussed; interesting features are pointed out

  11. Time-dependent delayed signatures from energetic photon interrogations

    International Nuclear Information System (INIS)

    Norman, Daren R.; Jones, James L.; Blackburn, Brandon W.; Haskell, Kevin J.; Johnson, James T.; Watson, Scott M.; Hunt, Alan W.; Spaulding, Randy; Harmon, Frank

    2007-01-01

    Pulsed photonuclear interrogation environments generated by 8-24 MeV electron linac are rich with time-dependent, material-specific, radiation signatures. Nitrogen-based explosives and nuclear materials can be detected by exploiting these signatures in different delayed-time regions. Numerical and experimental results presented in this paper show the unique time and energy dependence of these signatures. It is shown that appropriate delayed-time windows are essential to acquire material-specific signatures in pulsed photonuclear assessment environments. These developments demonstrate that pulsed, high-energy, photon-inspection environments can be exploited for time-dependent, material-specific signatures through the proper operation of specialized detectors and detection methods

  12. Peripheral blood signatures of lead exposure.

    Directory of Open Access Journals (Sweden)

    Heather G LaBreche

    Full Text Available BACKGROUND: Current evidence indicates that even low-level lead (Pb exposure can have detrimental effects, especially in children. We tested the hypothesis that Pb exposure alters gene expression patterns in peripheral blood cells and that these changes reflect dose-specific alterations in the activity of particular pathways. METHODOLOGY/PRINCIPAL FINDING: Using Affymetrix Mouse Genome 430 2.0 arrays, we examined gene expression changes in the peripheral blood of female Balb/c mice following exposure to per os lead acetate trihydrate or plain drinking water for two weeks and after a two-week recovery period. Data sets were RMA-normalized and dose-specific signatures were generated using established methods of supervised classification and binary regression. Pathway activity was analyzed using the ScoreSignatures module from GenePattern. CONCLUSIONS/SIGNIFICANCE: The low-level Pb signature was 93% sensitive and 100% specific in classifying samples a leave-one-out crossvalidation. The high-level Pb signature demonstrated 100% sensitivity and specificity in the leave-one-out crossvalidation. These two signatures exhibited dose-specificity in their ability to predict Pb exposure and had little overlap in terms of constituent genes. The signatures also seemed to reflect current levels of Pb exposure rather than past exposure. Finally, the two doses showed differential activation of cellular pathways. Low-level Pb exposure increased activity of the interferon-gamma pathway, whereas high-level Pb exposure increased activity of the E2F1 pathway.

  13. Childhood Fears among Children Who Are Blind: The Perspective of Teachers Who Are Blind

    Science.gov (United States)

    Al-Zboon, Eman

    2017-01-01

    The aim of this study was to investigate childhood fears in children who are blind from the perspective of teachers who are blind. The study was conducted in Jordan. Forty-six teachers were interviewed. Results revealed that the main fear content in children who are blind includes fear of the unknown; environment-, transportation- and…

  14. Magnetic signature surveillance of nuclear fuel

    International Nuclear Information System (INIS)

    Bernatowicz, H.; Schoenig, F.C.

    1981-01-01

    Typical nuclear fuel material contains tramp ferromagnetic particles of random size and distribution. Also, selected amounts of paramagnetic or ferromagnetic material can be added at random or at known positions in the fuel material. The fuel material in its non-magnetic container is scanned along its length by magnetic susceptibility detecting apparatus whereby susceptibility changes along its length are obtained and provide a unique signal waveform of the container of fuel material as a signature thereof. The output signature is stored. At subsequent times in its life the container is again scanned and respective signatures obtained which are compared with the initially obtained signature, any differences indicating alteration or tampering with the fuel material. If the fuel material includes a paramagnetic additive by taking two measurements along the container the effects thereof can be cancelled out. (author)

  15. Blind MuseumTourer: A System for Self-Guided Tours in Museums and Blind Indoor Navigation

    OpenAIRE

    Apostolos Meliones; Demetrios Sampson

    2018-01-01

    Notably valuable efforts have focused on helping people with special needs. In this work, we build upon the experience from the BlindHelper smartphone outdoor pedestrian navigation app and present Blind MuseumTourer, a system for indoor interactive autonomous navigation for blind and visually impaired persons and groups (e.g., pupils), which has primarily addressed blind or visually impaired (BVI) accessibility and self-guided tours in museums. A pilot prototype has been developed and is curr...

  16. An Arbitrated Quantum Signature Scheme without Entanglement*

    International Nuclear Information System (INIS)

    Li Hui-Ran; Luo Ming-Xing; Peng Dai-Yuan; Wang Xiao-Jun

    2017-01-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks . (paper)

  17. Causes of blindness and career choice among pupils in a blind school; South Western Nigeria.

    Science.gov (United States)

    Fadamiro, Christianah Olufunmilayo

    2014-01-01

    The causes of Blindness vary from place to place with about 80% of it been avoidable. Furthermore Blind people face a lot of challenges in career choice thus limiting their economic potential and full integration into the society. This study aims at identifying the causes of blindness and career choice among pupils in a school for the blind in South -Western Nigeria. This is a descriptive study of causes of blindness and career choice among 38 pupils residing in a school for the blind at Ikere -Ekiti, South Western Nigeria. Thirty eight pupils comprising of 25 males (65.8%) and 13 females (34.2%) with age range from 6-39 years were seen for the study, The commonest cause of blindness was cataract with 14 cases (36.84%) while congenital glaucoma and infection had an equal proportion of 5 cases each (13.16%). Avoidable causes constituted the greatest proportion of the causes 27 (71.05%) while unavoidable causes accounted for 11 (28.9%). The law career was the most desired profession by the pupils 11 (33.3%) followed by Teaching 9 (27.3%), other desired profession includes engineering, journalism and farming. The greatest proportion of causes of blindness identified in this study is avoidable. There is the need to create public awareness on some of the notable causes particularly cataract and motivate the community to utilize available eye care services Furthermore there is need for career talk in schools for the blind to enable them choose career where their potential can be fully maximized.

  18. A survey of visual impairment and blindness in children attending seven schools for the blind in Myanmar.

    Science.gov (United States)

    Muecke, James; Hammerton, Michael; Aung, Yee Yee; Warrier, Sunil; Kong, Aimee; Morse, Anna; Holmes, Martin; Yapp, Michael; Hamilton, Carolyn; Selva, Dinesh

    2009-01-01

    To determine the causes of visual impairment and blindness amongst children in schools for the blind in Myanmar; to identify the avoidable causes of visual impairment and blindness; and to provide spectacles, low vision aids, orientation and mobility training and ophthalmic treatment where indicated. Two hundred and eight children under 16 years of age from all 7 schools for the blind in Myanmar were examined and the data entered into the World Health Organization Prevention of Blindness Examination Record for Childhood Blindness (WHO/PBL ERCB). One hundred and ninety nine children (95.7%) were blind (BL = Visual Acuity [VA] schools for the blind in Myanmar had potentially avoidable causes of SVI/BL. With measles being both the commonest identifiable and commonest avoidable cause, the data supports the need for a measles immunization campaign. There is also a need for a dedicated pediatric eye care center with regular ophthalmology visits to the schools, and improved optometric, low vision and orientation and mobility services in Myanmar.

  19. Signature-based store checking buffer

    Science.gov (United States)

    Sridharan, Vilas; Gurumurthi, Sudhanva

    2015-06-02

    A system and method for optimizing redundant output verification, are provided. A hardware-based store fingerprint buffer receives multiple instances of output from multiple instances of computation. The store fingerprint buffer generates a signature from the content included in the multiple instances of output. When a barrier is reached, the store fingerprint buffer uses the signature to verify the content is error-free.

  20. Neutral signature Walker-VSI metrics

    International Nuclear Information System (INIS)

    Coley, A; McNutt, D; Musoke, N; Brooks, D; Hervik, S

    2014-01-01

    We will construct explicit examples of four-dimensional neutral signature Walker (but not necessarily degenerate Kundt) spaces for which all of the polynomial scalar curvature invariants vanish. We then investigate the properties of some particular subclasses of Ricci flat spaces. We also briefly describe some four-dimensional neutral signature Einstein spaces for which all of the polynomial scalar curvature invariants are constant. (paper)

  1. An interpretation of signature inversion

    International Nuclear Information System (INIS)

    Onishi, Naoki; Tajima, Naoki

    1988-01-01

    An interpretation in terms of the cranking model is presented to explain why signature inversion occurs for positive γ of the axially asymmetric deformation parameter and emerges into specific orbitals. By introducing a continuous variable, the eigenvalue equation can be reduced to a one dimensional Schroedinger equation by means of which one can easily understand the cause of signature inversion. (author)

  2. Acoustic Signature Monitoring and Management of Naval Platforms

    NARCIS (Netherlands)

    Basten, T.G.H.; Jong, C.A.F. de; Graafland, F.; Hof, J. van 't

    2015-01-01

    Acoustic signatures make naval platforms susceptible to detection by threat sensors. The variable operational conditions and lifespan of a platform cause variations in the acoustic signature. To deal with these variations, a real time signature monitoring capability is being developed, with advisory

  3. Level of agreement between patient and proxy responses to the EQ-5D health questionnaire 12 months after injury.

    Science.gov (United States)

    Gabbe, Belinda J; Lyons, Ronan A; Sutherland, Ann M; Hart, Melissa J; Cameron, Peter A

    2012-04-01

    Health-related quality of life represents a patient's experiences and expectations and should be collected from the patient. In trauma, collection of information from the patient can be challenging, particularly for subgroups where cognitive impairment is prevalent, increasing reliance on proxy reporting. This study assessed the agreement between patient and proxy reporting of health-related quality of life 12 months after injury. The Victorian State Trauma Registry and Victorian Orthopaedic Trauma Outcomes Registry collect EQ-5D data at 12 months after injury. Cases where data were collected from the patient and proxy were extracted. Agreement between patient and proxy responses was compared using kappa (K) coefficients for the individual EQ-5D items, and Bland-Altman plots and Wilcoxon signed-rank tests for the EQ-5D summary score and visual analog scale (VAS). Agreement between patient and proxy respondents was substantial for the mobility (K = 0.61) and personal care items (K = 0.67) and moderate for the usual activities (K = 0.50), pain/discomfort (K = 0.42), and anxiety/depression items (K = 0.47). The mean difference between proxy and patient-reported scores for the VAS (0.74, 95% confidence interval: -2.73, 4.21) and the EQ-5D summary score (-0.02, 95% confidence interval: -0.07, 0.03) was small, but the limits of agreement were wide (-34.22 to 35.71 for VAS and -0.55 to 0.51 for summary score), suggesting no systematic bias. Although proxy and patient responses for the EQ-5D VAS may differ, the differences show random variability rather than systematic bias. Group comparisons using proxy responses are unlikely to be biased, but proxy responses should be used with caution when assessing individual patient recovery.

  4. A new proxy measure for state-level gun ownership in studies of firearm injury prevention.

    Science.gov (United States)

    Siegel, Michael; Ross, Craig S; King, Charles

    2014-06-01

    Since many states are considering gun control laws, researchers need reliable data on rates of gun ownership at the state level. Survey measures of gun ownership in all 50 states, however, are only available for 3 years, and no state-level data have been collected since 2004. Consequently, the National Research Council has declared the development of a valid proxy that can be constructed from accessible, annual, state-level data to be a priority. While such a proxy does exist (the proportion of suicides in a state committed using a gun (FS/S), its correlation with state estimates of gun ownership in recent years is only 0.80. Using state-level data for the years 2001, 2002 and 2004, we developed an improved proxy for state-level gun ownership that uses FS/S (firearm suicides divided by all suicides) and also the per capita number of hunting licenses. We validated this measure using data from surveys of gun ownership conducted in 48 states during 1996 and 1999, and in 21 states during 1995-1998. Adding per capita hunting licenses to the proxy increased its correlation with survey-measured gun ownership from 0.80 to 0.95. The correlations of the new proxy with gun ownership in the two validation studies were 0.95 and 0.97. We conclude that the combination of FS/S and per capita hunting licenses improves substantially upon FS/S alone. This new proxy is easily computed from data that are available annually by state and may be useful for investigating the effect of gun prevalence on firearm-related morbidity and mortality. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  5. He said, she said: The gender wage gap according to self and proxy reports in the Current Population Survey.

    Science.gov (United States)

    Reynolds, Jeremy; Wenger, Jeffrey B

    2012-03-01

    Roughly half the labor force data in the Current Population Survey (CPS) are provided by proxy respondents, and since 1979, men's reliance on proxies has dropped dramatically while women's reliance on proxies has increased. Few authors, however, have examined how combining these first-hand and second-hand reports may influence our understanding of long-term economic trends. We exploit the outgoing rotation group structure of the CPS by matching individual records one year apart, and we find that self-reported wages are higher than proxy-reported wages even after controlling for all time invariant characteristics. Furthermore, we find that changes in the use of proxy respondents by men and women since 1979 have made current estimates of the gender wage gap larger than they would have been without changes in reporting status. This suggests that the gender wage gap has closed more than previously estimated. We recommend that researchers combine self and proxy responses with great care, especially when analyzing time trends or making gender comparisons. Copyright © 2011 Elsevier Inc. All rights reserved.

  6. A comparison of proxy performance in coral biodiversity monitoring

    Science.gov (United States)

    Richards, Zoe T.

    2013-03-01

    The productivity and health of coral reef habitat is diminishing worldwide; however, the effect that habitat declines have on coral reef biodiversity is not known. Logistical and financial constraints mean that surveys of hard coral communities rarely collect data at the species level; hence it is important to know if there are proxy metrics that can reliably predict biodiversity. Here, the performances of six proxy metrics are compared using regression analyses on survey data from a location in the northern Great Barrier Reef. Results suggest generic richness is a strong explanatory variable for spatial patterns in species richness (explaining 82 % of the variation when measured on a belt transect). The most commonly used metric of reef health, percentage live coral cover, is not positively or linearly related to hard coral species richness. This result raises doubt as to whether management actions based on such reefscape information will be effective for the conservation of coral biodiversity.

  7. 48 CFR 4.102 - Contractor's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Contractor's signature. 4.102 Section 4.102 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Contract Execution 4.102 Contractor's signature. (a) Individuals. A contract with an...

  8. Blindness and visual impairment in opera.

    Science.gov (United States)

    Aydin, Pinar; Ritch, Robert; O'Dwyer, John

    2018-01-01

    The performing arts mirror the human condition. This study sought to analyze the reasons for inclusion of visually impaired characters in opera, the cause of the blindness or near blindness, and the dramatic purpose of the blindness in the storyline. We reviewed operas from the 18 th century to 2010 and included all characters with ocular problems. We classified the cause of each character's ocular problem (organic, nonorganic, and other) in relation to the thematic setting of the opera: biblical and mythical, blind beggars or blind musicians, historical (real or fictional characters), and contemporary or futuristic. Cases of blindness in 55 characters (2 as a choir) from 38 operas were detected over 3 centuries of repertoire: 11 had trauma-related visual impairment, 5 had congenital blindness, 18 had visual impairment of unknown cause, 9 had psychogenic or malingering blindness, and 12 were symbolic or miracle-related. One opera featured an ophthalmologist curing a patient. The research illustrates that visual impairment was frequently used as an artistic device to enhance the intent and situate an opera in its time.

  9. DIGITAL SIGNATURE IN THE WAY OF LAW

    Directory of Open Access Journals (Sweden)

    Ruya Samlı

    2013-01-01

    Full Text Available Signature can be defined as a person’s name or special signs that he/she writes when he/she wants to indicate he/she wrote or confirm that writing. A person signs many times in his/her life. A person’s signature that is used for thousands of times for many things from formal documents to exams has importance for that person. Especially, signing in legal operations is an operation that can build important results. If a person’s signature is imitated by another person, he/she can become beholden, donate his/her whole wealth, commits offences or do some judicial operations. Today, because many operations can be done with digital environments and internet, signature operation that provides identity validation must also be carried to digital environment. In this paper digital signature concept that is approved for this reason and its situation in international areas and Turkish laws are investigated.

  10. Signature change events: a challenge for quantum gravity?

    International Nuclear Information System (INIS)

    White, Angela; Weinfurtner, Silke; Visser, Matt

    2010-01-01

    Within the framework of either Euclidean (functional integral) quantum gravity or canonical general relativity the signature of the manifold is a priori unconstrained. Furthermore, recent developments in the emergent spacetime programme have led to a physically feasible implementation of (analogue) signature change events. This suggests that it is time to revisit the sometimes controversial topic of signature change in general relativity. Specifically, we shall focus on the behaviour of a quantum field defined on a manifold containing regions of different signature. We emphasize that regardless of the underlying classical theory, there are severe problems associated with any quantum field theory residing on a signature-changing background. (Such as the production of what is naively an infinite number of particles, with an infinite energy density.) We show how the problem of quantum fields exposed to finite regions of Euclidean-signature (Riemannian) geometry has similarities with the quantum barrier penetration problem. Finally we raise the question as to whether signature change transitions could be fully understood and dynamically generated within (modified) classical general relativity, or whether they require the knowledge of a theory of quantum gravity.

  11. Starry messages: Searching for signatures of interstellar archaeology

    Energy Technology Data Exchange (ETDEWEB)

    Carrigan, Richard A., Jr.; /Fermilab

    2009-12-01

    Searching for signatures of cosmic-scale archaeological artifacts such as Dyson spheres or Kardashev civilizations is an interesting alternative to conventional SETI. Uncovering such an artifact does not require the intentional transmission of a signal on the part of the original civilization. This type of search is called interstellar archaeology or sometimes cosmic archaeology. The detection of intelligence elsewhere in the Universe with interstellar archaeology or SETI would have broad implications for science. For example, the constraints of the anthropic principle would have to be loosened if a different type of intelligence was discovered elsewhere. A variety of interstellar archaeology signatures are discussed including non-natural planetary atmospheric constituents, stellar doping with isotopes of nuclear wastes, Dyson spheres, as well as signatures of stellar and galactic-scale engineering. The concept of a Fermi bubble due to interstellar migration is introduced in the discussion of galactic signatures. These potential interstellar archaeological signatures are classified using the Kardashev scale. A modified Drake equation is used to evaluate the relative challenges of finding various sources. With few exceptions interstellar archaeological signatures are clouded and beyond current technological capabilities. However SETI for so-called cultural transmissions and planetary atmosphere signatures are within reach.

  12. Completeness and utility of interview data from proxy respondents in prenatal care research in rural China.

    Science.gov (United States)

    Nwaru, Bright I; Klemetti, Reija; Yuan, Shen; Kun, Huang; Wang, Yang; Hemminki, Elina

    2012-05-01

    In household surveys, the use of data provided by relatives can increase response rates and generalisability of research findings. This study assessed the quality of data from relatives and the impact of the data source on the association between the use of prenatal care and pregnancy outcomes. Data for 3,673 new mothers and 293 proxy respondents were available from a house-hold survey in 2008-2009 in rural China. Analyses were performed using chi-square test, ANOVA, Kruskal-Wallis test, and logistic regression models. Differences in the studied variables were small, but proxy respondents were slightly more likely to have missing data than the new mothers. Differences and missing data were more common for the use of prenatal care and outcome variables (mode of delivery, place of delivery, birth weight, use of postnatal care, and gestational age at birth) than for the background characteristics of the participants. Husbands' reports were closer to the index reports than that of the other proxies. The associations between the exposures and outcomes were mostly similar between the proxy and index respondents. Relatives can be interviewed instead of women to study prenatal care without a substantial negative impact on study results. Studies using proxy respondents should stratify the analysis by type of respondents.

  13. "Color-Blind" Racism.

    Science.gov (United States)

    Carr, Leslie G.

    Examining race relations in the United States from a historical perspective, this book explains how the constitution is racist and how color blindness is actually a racist ideology. It is argued that Justice Harlan, in his dissenting opinion in Plessy v. Ferguson, meant that the constitution and the law must remain blind to the existence of race…

  14. Signature Pedagogies in Support of Teachers' Professional Learning

    Science.gov (United States)

    Parker, Melissa; Patton, Kevin; O'Sullivan, Mary

    2016-01-01

    Signature pedagogies [Shulman, L. 2005. "Signature pedagogies in the professions." "Daedalus" 134 (3): 52--59.] are a focus of teacher educators seeking to improve teaching and teacher education. The purpose of this paper is to present a preliminary common language of signature pedagogies for teacher professional development…

  15. Characteristics and Validation Techniques for PCA-Based Gene-Expression Signatures

    Directory of Open Access Journals (Sweden)

    Anders E. Berglund

    2017-01-01

    Full Text Available Background. Many gene-expression signatures exist for describing the biological state of profiled tumors. Principal Component Analysis (PCA can be used to summarize a gene signature into a single score. Our hypothesis is that gene signatures can be validated when applied to new datasets, using inherent properties of PCA. Results. This validation is based on four key concepts. Coherence: elements of a gene signature should be correlated beyond chance. Uniqueness: the general direction of the data being examined can drive most of the observed signal. Robustness: if a gene signature is designed to measure a single biological effect, then this signal should be sufficiently strong and distinct compared to other signals within the signature. Transferability: the derived PCA gene signature score should describe the same biology in the target dataset as it does in the training dataset. Conclusions. The proposed validation procedure ensures that PCA-based gene signatures perform as expected when applied to datasets other than those that the signatures were trained upon. Complex signatures, describing multiple independent biological components, are also easily identified.

  16. 42 CFR 436.531 - Determination of blindness.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Determination of blindness. 436.531 Section 436.531... Requirements for Medicaid Eligibility Blindness § 436.531 Determination of blindness. In determining blindness... determine on behalf of the agency— (1) Whether the individual meets the definition of blindness; and (2...

  17. Is love blind? Sexual behavior and psychological adjustment of adolescents with blindness

    NARCIS (Netherlands)

    Kef, S.; Bos, H.

    2006-01-01

    In the present study, we examined sexual knowledge, sexual behavior, and psychological adjustment of adolescents with blindness. The sample included 36 Dutch adolescents who are blind, 16 males and 20 females. Results of the interviews revealed no problems regarding sexual knowledge or psychological

  18. Infrared ship signature analysis and optimisation

    NARCIS (Netherlands)

    Neele, F.P.

    2005-01-01

    The last decade has seen an increase in the awareness of the infrared signature of naval ships. New ship designs show that infrared signature reduction measures are being incorporated, such as exhaust gas cooling systems, relocation of the exhausts and surface cooling systems. Hull and

  19. Cellulose and Lignin Carbon Isotope Signatures in Sphagnum Moss Reveal Complementary Environmental Properties

    Science.gov (United States)

    Loisel, J.; Nichols, J. E.; Kaiser, K.; Beilman, D. W.; Yu, Z.

    2016-12-01

    The carbon isotope signature (δ13C) of Sphagnum moss is increasingly used as a proxy for past surface wetness in peatlands. However, conflicting interpretations of these carbon isotope records have recently been published. While the water film hypothesis suggests that the presence of a thick (thin) water film around hollow (hummock) mosses leads to less (more) negative δ13C values, the carbon source hypothesis poses that a significant (insignificant) amount of CH4 assimilation by hollow (hummock) mosses leads to more (less) negative δ13C values. To evaluate these competing mechanisms and their impact on moss δ13C, we gathered 30 moss samples from 6 peatlands in southern Patagonia. Samples were collected along a strong hydrological gradient, from very dry hummocks (80 cm above water table depth) to submerged hollows (5 cm below water surface). These peat bogs have the advantage of being colonized by a single cosmopolitan moss species, Sphagnum magellanicum, limiting potential biases introduced by species-specific carbon discrimination. We measured δ13C from stem cellulose and leaf waxes on the same samples to quantify compound-specific carbon signatures. We found that stem cellulose and leaf-wax lipids were both strongly negatively correlated with moss water content, suggesting a primary role of water film thickness on carbon assimilation. In addition, isotopic fractionation during wax synthesis was greater than for cellulose. This offset decreases as conditions get drier, due to (i) a more effective carbon assimilation, or (ii) CH4 uptake through symbiosis with methanotrophic bacteria within the leaves of wet mosses. Biochemical analysis (carbohydrates, amino acids, hydrophenols, cutin acids) of surface moss are currently being conducted to characterize moss carbon allocation under different hydrological conditions. Overall, this modern calibration work should be of use for interpreting carbon isotope records from peatlands.

  20. Comparison of independent proxies in the reconstruction of deep ...

    African Journals Online (AJOL)

    Independent proxies were assessed in two Late Quaternary sediment cores from the eastern South Atlantic to compare deep-water changes during the last 400 kyr. ... is exclusively observed during interglacials, with maximum factor loadings in ... only slightly without a significant glacial-interglacial pattern, as measured in a ...

  1. Poverty and Blindness in Nigeria: Results from the National Survey of Blindness and Visual Impairment.

    Science.gov (United States)

    Tafida, A; Kyari, F; Abdull, M M; Sivasubramaniam, S; Murthy, G V S; Kana, I; Gilbert, Clare E

    2015-01-01

    Poverty can be a cause and consequence of blindness. Some causes only affect the poorest communities (e.g. trachoma), and poor individuals are less likely to access services. In low income countries, cataract blind adults have been shown to be less economically active, indicating that blindness can exacerbate poverty. This study aims to explore associations between poverty and blindness using national survey data from Nigeria. Participants ≥40 years were examined in 305 clusters (2005-2007). Sociodemographic information, including literacy and occupation, was obtained by interview. Presenting visual acuity (PVA) was assessed using a reduced tumbling E LogMAR chart. Full ocular examination was undertaken by experienced ophthalmologists on all with PVA blind (PVA blindness were 8.5% (95% CI 7.7-9.5%), 2.5% (95% CI 2.0-3.1%), and 1.5% (95% CI 1.2-2.0%) in poorest, medium and affluent households, respectively (p = 0.001). Cause-specific prevalences of blindness from cataract, glaucoma, uncorrected aphakia and corneal opacities were significantly higher in poorer households. Cataract surgical coverage was low (37.2%), being lowest in females in poor households (25.3%). Spectacle coverage was 3 times lower in poor than affluent households (2.4% vs. 7.5%). In Nigeria, blindness is associated with poverty, in part reflecting lower access to services. Reducing avoidable causes will not be achieved unless access to services improves, particularly for the poor and women.

  2. Fine-Grained Forward-Secure Signature Schemes without Random Oracles

    DEFF Research Database (Denmark)

    Camenisch, Jan; Koprowski, Maciej

    2006-01-01

    We propose the concept of fine-grained forward-secure signature schemes. Such signature schemes not only provide nonrepudiation w.r.t. past time periods the way ordinary forward-secure signature schemes do but, in addition, allow the signer to specify which signatures of the current time period...... remain valid when revoking the public key. This is an important advantage if the signer produces many signatures per time period as otherwise the signer would have to re-issue those signatures (and possibly re-negotiate the respective messages) with a new key.Apart from a formal model for fine......-grained forward-secure signature schemes, we present practical schemes and prove them secure under the strong RSA assumption only, i.e., we do not resort to the random oracle model to prove security. As a side-result, we provide an ordinary forward-secure scheme whose key-update time is significantly smaller than...

  3. A Signature Comparing Android Mobile Application Utilizing Feature Extracting Algorithms

    Directory of Open Access Journals (Sweden)

    Paul Grafilon

    2017-08-01

    Full Text Available The paper presented one of the application that can be done using smartphones camera. Nowadays forgery is one of the most undetected crimes. With the forensic technology used today it is still difficult for authorities to compare and define what a real signature is and what a forged signature is. A signature is a legal representation of a person. All transactions are based on a signature. Forgers may use a signature to sign illegal contracts and withdraw from bank accounts undetected. A signature can also be forged during election periods for repeated voting. Addressing the issues a signature should always be secure. Signature verification is a reduced problem that still poses a real challenge for researchers. The literature on signature verification is quite extensive and shows two main areas of research off-line and on-line systems. Off-line systems deal with a static image of the signature i.e. the result of the action of signing while on-line systems work on the dynamic process of generating the signature i.e. the action of signing itself. The researchers have found a way to resolve the concerns. A mobile application that integrates the camera to take a picture of a signature analyzes it and compares it to other signatures for verification. It will exist to help citizens to be more cautious and aware with issues regarding the signatures. This might also be relevant to help organizations and institutions such as banks and insurance companies in verifying signatures that may avoid unwanted transactions and identity theft. Furthermore this might help the authorities in the never ending battle against crime especially against forgers and thieves. The project aimed to design and develop a mobile application that integrates the smartphone camera for verifying and comparing signatures for security using the best algorithm possible. As the result of the development the said smartphone camera application is functional and reliable.

  4. Novel proxies for reconstructing paleohydrology from ombrotrophic peatlands: biomarker and compound-specific H and C stable isotope ratios

    Science.gov (United States)

    Wang, J.; Nichols, J. E.; Huang, Y.

    2008-12-01

    Ombrotrophic peatlands are excellent archives for paleohydrologic information because they are hydrologically isolated from their surroundings. However, quantitative proxies for deciphering peatland archives are lacking. Here, we present development and application of novel organic geochemical methods for quantitative reconstruction of paleohydrology from the ombrotrophic sediments, and comparison of organic geochemical data with conventional paleoecological proxies. Application of these methods to the sediments of several North American and European peatlands has revealed significant changes in the hydroclimate throughout the Holocene. The plant assemblage living at the surface of the peatland is tightly controlled by surface moisture. Under wet conditions, Sphagnum mosses, with no active mechanism for drawing water from below the surface of the peatland, are dominant. During dry conditions, vascular plants are more productive relative to Sphagnum. A ratio of the abundance of two biomarkers representing Sphagnum and vascular plants sensitively records changes in hydrologic balance (Nichols et al., 2006, Org. Geochem. 37, 1505-1513). We have further developed stable isotope models to compute climate parameters from compound-specific H and C isotope ratios of biomarkers to create a more comprehensive climate reconstruction. Vascular plant leaf waxes carry the D/H ratio signature of precipitation that is little affected by evaporation, whereas the Sphagnum biomarker records isotopic ratios of the water at the peatland surface, which is strongly enriched by evaporation. Evaporation amount can be calculated using the differences between D/H ratios of the two types of biomarkers. C isotope ratios of Sphagnum biomarkers can also be used to quantify surface wetness. Methanotrophic bacteria live symbiotically with Sphagnum, providing isotopically light carbon for photosynthesis. These bacteria are more active when the Sphagnum is wet, thus providing more 13C-depleted CO2

  5. Munchausen syndrome by proxy and child's rights

    International Nuclear Information System (INIS)

    Al-Haidar, Fatima A.

    2008-01-01

    Munchausen syndrome by proxy (MSBP) is an extreme form of child abuse in which perpetrators induce life-threatening conditions in their children. A case of MSBP is described in detail. Difficulties in diagnosis and management in this part of the world are presented. Until now, no national legal guidelines exist in the Kingdom of Saudi Arabia (KSA) to child abuse in general and MSBP in particular. Urgent guidelines, policies and legal system are required in the KSA. (author)

  6. 21 CFR 1309.32 - Application forms; contents; signature.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Application forms; contents; signature. 1309.32... Application forms; contents; signature. (a) Any person who is required to be registered pursuant to § 1309.21... this paragraph and shall contain the signature of the individual being authorized to sign the...

  7. 38 CFR 18b.21 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Signature of documents. 18b.21 Section 18b.21 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS... Documents § 18b.21 Signature of documents. The signature of a party, authorized officer, employee, or...

  8. Detection of chemical explosives using multiple photon signatures

    International Nuclear Information System (INIS)

    Loschke, K.W.; Dunn, W.L.

    2008-01-01

    Full text: A template-matching procedure to aid in rapid detection of improvised explosive devices (IEDs) is being investigated. Multiple photon-scattered and photon-induced positron annihilation radiation responses are being used as part of a photon-neutron signature-based radiation scanning (SBRS) approach (see companion reference for description of the neutron component), in an attempt to detect chemical explosives at safe standoff distances. Many past and present photon interrogation methods are based on imaging. Imaging techniques seek to determine at high special resolution the internal structure of a target of interest. Our technique simply seeks to determine if an unknown target contains a detectable amount of chemical explosives by comparing multiple responses (signatures) that depend on both density and composition of portions of a target. In the photon component, beams of photons are used to create back-streaming signatures, which are dependent on the density and composition of part of the target being interrogated. These signatures are compared to templates, which are collections of the same signatures if the interrogated volume contained a significant amount of explosives. The signature analysis produces a figure-of-merit and a standard deviation of the figure-of-merit. These two metrics are used to filter safe from dangerous targets. Experiments have been conducted that show that explosive surrogates (fertilizers) can be distinguished from several inert materials using these photon signatures, demonstrating that these signatures can be used effectively to help IEDs

  9. A case report of Factitious Disorder (Munchausen Syndrome by proxy

    Directory of Open Access Journals (Sweden)

    Mehdi Shirzadifar

    2014-09-01

    Full Text Available Background: In Factitious Disorder by proxy, one person (perpetrator induces the disease in another person, thereby seeking emotional needs during the treatment process Diagnosis of this disorder is very difficult and there is not much consensus over it among experts. Lack of timely diagnosis of this disorder may lead to serious harms in patients. Case presentation: We will introduce a 19 year-old boy with mental retardation and history of multiple admissions to psychiatric, internal, urology and surgery wards. He has a 12 year-old sister and a 4 year-old brother, both with history of multiple admissions to pediatrics and internal wards. The father of family was 48 years old with chronic mental disorder, drug dependency and history of multiple admissions to medical, psychiatry and neurology wards. The mother of this family was diagnosed with munchausen syndrome by proxy.

  10. Starspot variability as an X-ray radiation proxy

    Science.gov (United States)

    Arkhypov, Oleksiy V.; Khodachenko, Maxim L.; Lammer, Helmut; Güdel, Manuel; Lüftinger, Teresa; Johnstone, Colin P.

    2018-05-01

    Stellar X-ray emission plays an important role in the study of exoplanets as a proxy for stellar winds and as a basis for the prediction of extreme ultraviolet (EUV) flux, unavailable for direct measurements, which in their turn are important factors for the mass-loss of planetary atmospheres. Unfortunately, the detection thresholds limit the number of stars with the directly measured X-ray fluxes. At the same time, the known connection between the sunspots and X-ray sources allows using of the starspot variability as an accessible proxy for the stellar X-ray emission. To realize this approach, we analysed the light curves of 1729 main-sequence stars with rotation periods 0.5 X-ray to bolometric luminosity ratio Rx. As a result, the regressions for stellar X-ray luminosity Lx(P, Teff) and its related EUV analogue LEUV were obtained for the main-sequence stars. It was shown that these regressions allow prediction of average (over the considered stars) values of log (Lx) and log (LEUV) with typical errors of 0.26 and 0.22 dex, respectively. This, however, does not include the activity variations in particular stars related to their individual magnetic activity cycles.

  11. The sensory construction of dreams and nightmare frequency in congenitally blind and late blind individuals

    DEFF Research Database (Denmark)

    Meaidi, Amani; Jennum, Poul; Ptito, Maurice

    2014-01-01

    and anxiety levels. RESULTS: All blind participants had fewer visual dream impressions compared to SC participants. In LB participants, duration of blindness was negatively correlated with duration, clarity, and color content of visual dream impressions. CB participants reported more auditory, tactile......OBJECTIVES: We aimed to assess dream content in groups of congenitally blind (CB), late blind (LB), and age- and sex-matched sighted control (SC) participants. METHODS: We conducted an observational study of 11 CB, 14 LB, and 25 SC participants and collected dream reports over a 4-week period......, gustatory, and olfactory dream components compared to SC participants. In contrast, LB participants only reported more tactile dream impressions. Blind and SC participants did not differ with respect to emotional and thematic dream content. However, CB participants reported more aggressive interactions...

  12. Enhanced arbitrated quantum signature scheme using Bell states

    International Nuclear Information System (INIS)

    Wang Chao; Liu Jian-Wei; Shang Tao

    2014-01-01

    We investigate the existing arbitrated quantum signature schemes as well as their cryptanalysis, including intercept-resend attack and denial-of-service attack. By exploring the loopholes of these schemes, a malicious signatory may successfully disavow signed messages, or the receiver may actively negate the signature from the signatory without being detected. By modifying the existing schemes, we develop counter-measures to these attacks using Bell states. The newly proposed scheme puts forward the security of arbitrated quantum signature. Furthermore, several valuable topics are also presented for further research of the quantum signature scheme

  13. Blind Cat

    Directory of Open Access Journals (Sweden)

    Arka Chattopadhyay

    2015-08-01

    There’s no way to know whether he was blind from birth or blindness was something he had picked up from his fights with other cats. He wasn’t an urban cat. He lived in a little village, soaked in the smell of fish with a river running right beside it. Cats like these have stories of a different kind. The two-storied hotel where he lived had a wooden floor. It stood right on the riverbank and had more than a tilt towards the river, as if deliberately leaning on the water.

  14. On the construction of a time base and the elimination of averaging errors in proxy records

    Science.gov (United States)

    Beelaerts, V.; De Ridder, F.; Bauwens, M.; Schmitz, N.; Pintelon, R.

    2009-04-01

    Proxies are sources of climate information which are stored in natural archives (e.g. ice-cores, sediment layers on ocean floors and animals with calcareous marine skeletons). Measuring these proxies produces very short records and mostly involves sampling solid substrates, which is subject to the following two problems: Problem 1: Natural archives are equidistantly sampled at a distance grid along their accretion axis. Starting from these distance series, a time series needs to be constructed, as comparison of different data records is only meaningful on a time grid. The time series will be non-equidistant, as the accretion rate is non-constant. Problem 2: A typical example of sampling solid substrates is drilling. Because of the dimensions of the drill, the holes drilled will not be infinitesimally small. Consequently, samples are not taken at a point in distance, but rather over a volume in distance. This holds for most sampling methods in solid substrates. As a consequence, when the continuous proxy signal is sampled, it will be averaged over the volume of the sample, resulting in an underestimation of the amplitude. Whether this averaging effect is significant, depends on the volume of the sample and the variations of interest of the proxy signal. Starting from the measured signal, the continuous signal needs to be reconstructed in order eliminate these averaging errors. The aim is to provide an efficient identification algorithm to identify the non-linearities in the distance-time relationship, called time base distortions, and to correct for the averaging effects. Because this is a parametric method, an assumption about the proxy signal needs to be made: the proxy record on a time base is assumed to be harmonic, this is an obvious assumption because natural archives often exhibit a seasonal cycle. In a first approach the averaging effects are assumed to be in one direction only, i.e. the direction of the axis on which the measurements were performed. The

  15. FIR signature verification system characterizing dynamics of handwriting features

    Science.gov (United States)

    Thumwarin, Pitak; Pernwong, Jitawat; Matsuura, Takenobu

    2013-12-01

    This paper proposes an online signature verification method based on the finite impulse response (FIR) system characterizing time-frequency characteristics of dynamic handwriting features. First, the barycenter determined from both the center point of signature and two adjacent pen-point positions in the signing process, instead of one pen-point position, is used to reduce the fluctuation of handwriting motion. In this paper, among the available dynamic handwriting features, motion pressure and area pressure are employed to investigate handwriting behavior. Thus, the stable dynamic handwriting features can be described by the relation of the time-frequency characteristics of the dynamic handwriting features. In this study, the aforesaid relation can be represented by the FIR system with the wavelet coefficients of the dynamic handwriting features as both input and output of the system. The impulse response of the FIR system is used as the individual feature for a particular signature. In short, the signature can be verified by evaluating the difference between the impulse responses of the FIR systems for a reference signature and the signature to be verified. The signature verification experiments in this paper were conducted using the SUBCORPUS MCYT-100 signature database consisting of 5,000 signatures from 100 signers. The proposed method yielded equal error rate (EER) of 3.21% on skilled forgeries.

  16. The blind hens’ challenge

    DEFF Research Database (Denmark)

    Sandøe, Peter; Hocking, Paul M.; Forkman, Björn

    2014-01-01

    about breeding blind hens. But we also argue that alternative views, which (for example) claim that it is important to respect the telos or rights of an animal, do not offer a more convincing solution to questions raised by the possibility of disenhancing animals for their own benefit.......Animal ethicists have recently debated the ethical questions raised by disenhancing animals to improve their welfare. Here, we focus on the particular case of breeding blind hens for commercial egg-laying systems, in order to benefit their welfare. Many people find breeding blind hens intuitively...

  17. Benefits of applying a proxy eligibility period when using electronic health records for outcomes research: a simulation study.

    Science.gov (United States)

    Yu, Tzy-Chyi; Zhou, Huanxue

    2015-06-09

    Electronic health records (EHRs) can provide valuable data for outcomes research. However, unlike administrative claims databases, EHRs lack eligibility tables or a standard way to define the benefit coverage period, which could lead to underreporting of healthcare utilization or outcomes, and could result in surveillance bias. We tested the effect of using a proxy eligibility period (eligibility proxy) when estimating a range of health resource utilization and outcomes parameters under varying degrees of missing encounter data. We applied an eligibility proxy to create a benchmark cohort of chronic obstructive pulmonary disease (COPD) patients with 12 months of follow-up, with the assumption of no missing encounter data. The benchmark cohort provided parameter estimates for comparison with 9,000 simulated datasets representing 10-90% of COPD patients (by 10th percentiles) with between 1 and 11 months of continuous missing data. Two analyses, one for datasets using an eligibility proxy and one for those without an eligibility proxy, were performed on the 9,000 datasets to assess estimator performance under increasing levels of missing data. Estimates for each study variable were compared with those from the benchmark dataset, and performance was evaluated using bias, percentage change, and root-mean-square error. The benchmark dataset contained 6,717 COPD patients, whereas the simulated datasets where the eligibility proxy was applied had between 671 and 6,045 patients depending on the percentage of missing data. Parameter estimates had better performance when an eligibility proxy based on the first and last month of observed activity was applied. This finding was consistent across a range of variables representing patient comorbidities, symptoms, outcomes, health resource utilization, and medications, regardless of the measures of performance used. Without the eligibility proxy, all evaluated parameters were consistently underestimated. In a large COPD patient

  18. Quantum signature scheme based on a quantum search algorithm

    International Nuclear Information System (INIS)

    Yoon, Chun Seok; Kang, Min Sung; Lim, Jong In; Yang, Hyung Jin

    2015-01-01

    We present a quantum signature scheme based on a two-qubit quantum search algorithm. For secure transmission of signatures, we use a quantum search algorithm that has not been used in previous quantum signature schemes. A two-step protocol secures the quantum channel, and a trusted center guarantees non-repudiation that is similar to other quantum signature schemes. We discuss the security of our protocol. (paper)

  19. Molecular signatures of thyroid follicular neoplasia

    DEFF Research Database (Denmark)

    Borup, R.; Rossing, M.; Henao, Ricardo

    2010-01-01

    The molecular pathways leading to thyroid follicular neoplasia are incompletely understood, and the diagnosis of follicular tumors is a clinical challenge. To provide leads to the pathogenesis and diagnosis of the tumors, we examined the global transcriptome signatures of follicular thyroid...... a mechanism for cancer progression, which is why we exploited the results in order to generate a molecular classifier that could identify 95% of all carcinomas. Validation employing public domain and cross-platform data demonstrated that the signature was robust and could diagnose follicular nodules...... and robust genetic signature for the diagnosis of FA and FC. Endocrine-Related Cancer (2010) 17 691-708...

  20. On imitation among young and blind children

    Directory of Open Access Journals (Sweden)

    Maria Rita Campello Rodrigues

    2016-07-01

    Full Text Available This article investigates the imitation among young and blind children. The survey was conducted as a mosaic in the time since the field considerations were taken from two areas: a professional experience with early stimulation of blind babies and a workshop with blind and low vision young between 13-18 years. By statingthe situated trace of knowledge, theresearch indicates that imitation among blind young people can be one of the ways of creating a common world among young blind and sighted people. Imitation among blind young is a multi-sensory process that requires a body experience, including both blind and people who see. The paper concludes with an indication of the unique character of imitation and at the same time, with the affirmation of its relevance to the development and inclusion process of both the child and the young blind.

  1. High-Resolution Mg/Ca Ratios in a Coralline Red Alga as a Proxy for Bering Sea Temperature Variations and Teleconnections

    Science.gov (United States)

    Halfar, J.; Steffen, H.; Kronz, A.; Steneck, R. S.; Adey, W.; Lebednik, P. A.

    2009-05-01

    We present the first continuous high-resolution record of Mg/Ca variations within an encrusting coralline red alga of the species Clathromorphum nereostratum from Amchitka Island, Aleutian Islands. Mg/Ca ratios of individual growth increments were analyzed by measuring a single point electron microprobe transect yielding a resolution of 15 samples/year on average, generating a continuous record from 1830 to 1967 of algal Mg/Ca variations. Results show that Mg/Ca ratios in the high-Mg calcite skeleton display pronounced annual cyclicity and archive late spring to late fall sea surface temperature (SST) corresponding to the main season of algal growth. Mg/Ca values correlate well to local SST (ERSSTJun-Nov, 1902-1967; r = 0.73 for 5-year mean), as well as to an air temperature record from the same region. Our data correlate well to a shorter Mg/Ca record from a second site, corroborating the ability of the alga to reliably record regional environmental signals. In addition, Mg/Ca ratios relate well to a 29-year stable oxygen isotope time series measured on the same sample, which provides additional support for the use of Mg as a paleotemperature proxy in coralline red algae, that is, unlike stable oxygen isotopes, not influenced by salinity fluctuations. High spatial correlation to large-scale SST variability in the North Pacific is observed, with patterns of strongest correlation following the direction of major oceanographic features (i.e., the signature of the Alaska Current and the Alaskan Stream), which play a key role in the exchange of water masses between the North Pacific and the Bering Sea through Aleutian Island passages. The time series further displays significant teleconnections with the signature of the Pacific Decadal Oscillation in the northeast Pacific and the Atlantic Multidecadal Oscillation.

  2. A nonlinear multi-proxy model based on manifold learning to reconstruct water temperature from high resolution trace element profiles in biogenic carbonates

    Directory of Open Access Journals (Sweden)

    M. Bauwens

    2010-11-01

    Full Text Available A long standing problem in paleoceanography concerns the reconstruction of water temperature from δ18O carbonate. It is problematic in the case of freshwater influenced environments because the δ18O isotopic composition of the ambient water (related to salinity needs to be known. In this paper we argue for the use of a nonlinear multi-proxy method called Weight Determination by Manifold Regularization (WDMR to develop a temperature reconstruction model that is less sensitive to salinity variations. The motivation for using this type of model is twofold: firstly, observed nonlinear relations between specific proxies and water temperature motivate the use of nonlinear models. Secondly, the use of multi-proxy models enables salinity related variations of a given temperature proxy to be explained by salinity-related information carried by a separate proxy. Our findings confirm that Mg/Ca is a powerful paleothermometer and highlight that reconstruction performance based on this proxy is improved significantly by combining its information with the information for other trace elements in multi-proxy models. Although the models presented here are black-box models that do not use any prior knowledge about the proxies, the comparison of model reconstruction performances based on different proxy combinations do yield useful information about proxy characteristics. Using Mg/Ca, Sr/Ca, Ba/Ca and Pb/Ca the WDMR model enables a temperature reconstruction with a root mean squared error of ± 2.19 °C for a salinity range between 15 and 32.

  3. Blind MuseumTourer: A System for Self-Guided Tours in Museums and Blind Indoor Navigation

    Directory of Open Access Journals (Sweden)

    Apostolos Meliones

    2018-01-01

    Full Text Available Notably valuable efforts have focused on helping people with special needs. In this work, we build upon the experience from the BlindHelper smartphone outdoor pedestrian navigation app and present Blind MuseumTourer, a system for indoor interactive autonomous navigation for blind and visually impaired persons and groups (e.g., pupils, which has primarily addressed blind or visually impaired (BVI accessibility and self-guided tours in museums. A pilot prototype has been developed and is currently under evaluation at the Tactual Museum with the collaboration of the Lighthouse for the Blind of Greece. This paper describes the functionality of the application and evaluates candidate indoor location determination technologies, such as wireless local area network (WLAN and surface-mounted assistive tactile route indications combined with Bluetooth low energy (BLE beacons and inertial dead-reckoning functionality, to come up with a reliable and highly accurate indoor positioning system adopting the latter solution. The developed concepts, including map matching, a key concept for indoor navigation, apply in a similar way to other indoor guidance use cases involving complex indoor places, such as in hospitals, shopping malls, airports, train stations, public and municipality buildings, office buildings, university buildings, hotel resorts, passenger ships, etc. The presented Android application is effectively a Blind IndoorGuide system for accurate and reliable blind indoor navigation.

  4. gLExec and MyProxy integration in the ATLAS/OSG PanDA workload management system

    International Nuclear Information System (INIS)

    Caballero, J; Hover, J; Maeno, T; Potekhin, M; Wenaus, T; Zhao, X; Litmaath, M; Nilsson, P

    2010-01-01

    Worker nodes on the grid exhibit great diversity, making it difficult to offer uniform processing resources. A pilot job architecture, which probes the environment on the remote worker node before pulling down a payload job, can help. Pilot jobs become smart wrappers, preparing an appropriate environment for job execution and providing logging and monitoring capabilities. PanDA (Production and Distributed Analysis), an ATLAS and OSG workload management system, follows this design. However, in the simplest (and most efficient) pilot submission approach of identical pilots carrying the same identifying grid proxy, end-user accounting by the site can only be done with application-level information (PanDA maintains its own end-user accounting), and end-user jobs run with the identity and privileges of the proxy carried by the pilots, which may be seen as a security risk. To address these issues, we have enabled PanDA to use gLExec, a tool provided by EGEE which runs payload jobs under an end-user's identity. End-user proxies are pre-staged in a credential caching service, MyProxy, and the information needed by the pilots to access them is stored in the PanDA DB. gLExec then extracts from the user's proxy the proper identity under which to run. We describe the deployment, installation, and configuration of gLExec, and how PanDA components have been augmented to use it. We describe how difficulties were overcome, and how security risks have been mitigated. Results are presented from OSG and EGEE Grid environments performing ATLAS analysis using PanDA and gLExec.

  5. 350 Year Cloud Reconstruction Deduced from Northeast Caribbean Coral Proxies

    Science.gov (United States)

    Winter, A.; Sammarco, P. W.; Mikolajewicz, U.; Jury, M.; Zanchettin, D.

    2014-12-01

    Clouds are a major factor influencing the global climate and its response to external forcing through their implications for the global hydrological cycle, and hence for the planetary radiative budget. Clouds also contribute to regional climates and their variability through, e.g., the changes they induce in regional precipitation patterns. There have been very few studies of decadal and longer-term changes in cloud cover in the tropics and sub-tropics, both over land and the ocean. In the tropics, there is great uncertainty regarding how global warming will affect cloud cover. Observational satellite data are too short to unambiguously discern any temporal trends in cloud cover. Corals generally live in well-mixed coastal regions and can often record environmental conditions of large areas of the upper ocean. This is particularly the case at low latitudes. Scleractinian corals are sessile, epibenthic fauna, and the type of environmental information recorded at the location where the coral has been living is dependent upon the species of coral considered and proxy index of interest. Skeletons of scleractinian corals are considered to provide among the best records of high-resolution (sub-annual) environmental variability in the tropical and sub-tropical oceans. Zooxanthellate hermatypic corals in tropical and sub-tropical seas precipitate CaCO3 skeletons as they grow. This growth is made possible through the manufacture of CaCO3crystals, facilitated by the zooxanthellae. During the process of crystallization, the holobiont binds carbon of different isotopes into the crystals. Stable carbon isotope concentrations vary with a variety of environmental conditions. In the Caribbean, d13C in corals of the species Montastraea faveolata can be used as a proxy for changes in cloud cover. In this contribution, we will demonstrate that the stable isotope 13C varies concomitantly with cloud cover for the northeastern Caribbean region. Using this proxy we have been able to

  6. Adaptive proxy map server for efficient vector spatial data rendering

    Science.gov (United States)

    Sayar, Ahmet

    2013-01-01

    The rapid transmission of vector map data over the Internet is becoming a bottleneck of spatial data delivery and visualization in web-based environment because of increasing data amount and limited network bandwidth. In order to improve both the transmission and rendering performances of vector spatial data over the Internet, we propose a proxy map server enabling parallel vector data fetching as well as caching to improve the performance of web-based map servers in a dynamic environment. Proxy map server is placed seamlessly anywhere between the client and the final services, intercepting users' requests. It employs an efficient parallelization technique based on spatial proximity and data density in case distributed replica exists for the same spatial data. The effectiveness of the proposed technique is proved at the end of the article by the application of creating map images enriched with earthquake seismic data records.

  7. Accuracy of Caregiver Proxy Reports of Home Care Service Use.

    Science.gov (United States)

    Chappell, Neena L; Kadlec, Helena

    2016-12-01

    Although much of the research on service use by older adults with dementia relies on proxy reports by informal caregivers, little research assesses the accuracy of these reports, and that which does exist, does not focus on home care services. This brief report compares proxy reports by family caregivers to those with dementia with provincial Ministry of Health records collected for payment and monitoring. The four home care services examined include home nursing care, adult day care, home support, and respite care. Data come from a province-wide study of caregivers in British Columbia, Canada. Caregiver reports are largely consistent with Ministry records, ranging from 81.0% agreement for home support to 96.6% for respite care. Spouses living with the care recipient (the vast majority of the sample) are the most accurate. Others, whether living with the care recipient or not, have only a 50-50 chance of being correct.

  8. Assessment of the Coral Temperature Proxies for Orbicella faveolata in the Southwestern Gulf of Mexico

    Science.gov (United States)

    Vara, M. A.; DeLong, K. L.; Herrmann, A. D.; Ouellette, G., Jr.; Richey, J. N.

    2017-12-01

    Coral Sr/Ca is a robust proxy of sea surface temperature (SST); however, discrepancies in the Sr/Ca-SST relationship among colonies of the same species may reduce confidence in absolute temperature reconstructions. Furthermore, terrestrial carbonate weathering can provide local sources of Sr and/or Ca to coastal waters that may disrupt the temperature-based coral Sr/Ca signal. Thus other trace metal SST proxies have been suggested to circumvent these issues (Li/Ca, Li/Mg, and Sr-U). Coral Ba/Ca has been used as a proxy for runoff and coastal upwelling, and therefore may be used to identify intervals when these processes overprint the Sr/Ca-SST signal. This study tests multiple coral SST proxies using reproducibility assessments to determine the best performing SST proxy. We conduct these assessments with cores recovered in 1991 by the U.S. Geological Survey from five Orbicella faveolata colonies from three reefs offshore of Veracruz, Mexico (19.06°N, 96.93°W) in water depths varying from 3 to 12 m. Previous studies found micromilling the complex skeletal structure of O. faveolata challenging and that monthly resolution may not recover full seasonal cycles. We use a laser ablation inductively coupled plasma mass spectrometer to simultaneously sample this coral's structure at weekly intervals spanning 8 years for Li/Ca, Li/Mg, Sr-U, Sr/Ca, and Ba/Ca. Here we found coral Li/Ca means and seasonal variations are similar among colonies thus this proxy may capture absolute temperature and SST variability. Similar to previous research with Porites corals, Li/Ca in these O. faveolata corals decreases with increases in SST with similar slopes and intercepts. During the last 10 years of these corals' lives, coral Sr/Ca analysis reveals a mean shift among colonies suggesting an external source could have disrupted the Sr/Ca signal, possibly seasonal runoff and/or winter upwelling common to Veracruz waters. Coral Ba/Ca analyses reveals elevated values in winters that coincide

  9. Sound lateralization test in adolescent blind individuals.

    Science.gov (United States)

    Yabe, Takao; Kaga, Kimitaka

    2005-06-21

    Blind individuals require to compensate for the lack of visual information by other sensory inputs. In particular, auditory inputs are crucial to such individuals. To investigate whether blind individuals localize sound in space better than sighted individuals, we tested the auditory ability of adolescent blind individuals using a sound lateralization method. The interaural time difference discrimination thresholds of blind individuals were statistically significantly shorter than those of blind individuals with residual vision and controls. These findings suggest that blind individuals have better auditory spatial ability than individuals with visual cues; therefore, some perceptual compensation occurred in the former.

  10. 12 CFR 269b.731 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Signature. 269b.731 Section 269b.731 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM CHARGES OF UNFAIR LABOR PRACTICES General Rules § 269b.731 Signature. The original of each document filed shall be...

  11. Reduction of a Ship's Magnetic Field Signatures

    CERN Document Server

    Holmes, John

    2008-01-01

    Decreasing the magnetic field signature of a naval vessel will reduce its susceptibility to detonating naval influence mines and the probability of a submarine being detected by underwater barriers and maritime patrol aircraft. Both passive and active techniques for reducing the magnetic signatures produced by a vessel's ferromagnetism, roll-induced eddy currents, corrosion-related sources, and stray fields are presented. Mathematical models of simple hull shapes are used to predict the levels of signature reduction that might be achieved through the use of alternate construction materials. Al

  12. Proxy records of Holocene storm events in coastal barrier systems: Storm-wave induced markers

    Science.gov (United States)

    Goslin, Jérôme; Clemmensen, Lars B.

    2017-10-01

    Extreme storm events in the coastal zone are one of the main forcing agents of short-term coastal system behavior. As such, storms represent a major threat to human activities concentrated along the coasts worldwide. In order to better understand the frequency of extreme events like storms, climate science must rely on longer-time records than the century-scale records of instrumental weather data. Proxy records of storm-wave or storm-wind induced activity in coastal barrier systems deposits have been widely used worldwide in recent years to document past storm events during the last millennia. This review provides a detailed state-of-the-art compilation of the proxies available from coastal barrier systems to reconstruct Holocene storm chronologies (paleotempestology). The present paper aims (I) to describe the erosional and depositional processes caused by storm-wave action in barrier and back-barrier systems (i.e. beach ridges, storm scarps and washover deposits), (ii) to understand how storm records can be extracted from barrier and back-barrier sedimentary bodies using stratigraphical, sedimentological, micro-paleontological and geochemical proxies and (iii) to show how to obtain chronological control on past storm events recorded in the sedimentary successions. The challenges that paleotempestology studies still face in the reconstruction of representative and reliable storm-chronologies using these various proxies are discussed, and future research prospects are outlined.

  13. Quantitative use of Palaeo-Proxy Data in Global Circulation Models

    Science.gov (United States)

    Collins, M.

    2003-04-01

    It is arguably one of the ultimate aims of palaeo-modelling science to somehow "get the palaeo-proxy data into the model" i.e. to constrain the climate of the model the trajectory of the real climate recorded in the palaeo data. The traditional way of interfacing data with models is to use data assimilation. This presents a number of problems in the palaeo context as the data are more often representative of seasonal to annual or decadal climate and models have time steps of order minutes, hence the model increments are likely to be vanishingly small. Also, variational data assimilation schemes would require the adjoint of the coupled ocean-atmosphere model and the adjoint of the functions which translate model variables such as temperature and precipitation into the palaeo-proxies, both of which are hard to determine because of the high degree of non-linearity in the system and the wide range of space and time scales. An alternative is to add forward models of proxies to the model and run "many years" of simulation until an analog state is found which matches the palaeo data for each season, year, decade etc. Clearly "many years" might range from a few thousand years to almost infinity and depends on the number of degrees of freedom in the climate system and on the error characteristics of the palaeo data. The length of simulation required is probably beyond the supercomputer capacity of a single institution and hence an alternative is to use idle capacity of home and business personal computers - the climateprediction.net project.

  14. Psychologica and social adjustment to blindness: Understanding ...

    African Journals Online (AJOL)

    Psychologica and social adjustment to blindness: Understanding from two groups of blind people in Ilorin, Nigeria. ... Background: Blindness can cause psychosocial distress leading to maladjustment if not mitigated. Maladjustment is a secondary burden that further reduces quality of life of the blind. Adjustment is often ...

  15. Planktonic Foraminifera Proxies Calibration Off the NW Iberian Margin: Nutrients Approach

    Science.gov (United States)

    Salgueiro, E.; Castro, C. G.; Zuniga, D.; Martin, P. A.; Groeneveld, J.; de la Granda, F.; Villaceiros-Robineau, N.; Alonso-Perez, F.; Alberto, A.; Rodrigues, T.; Rufino, M. M.; Abrantes, F. F. G.; Voelker, A. H. L.

    2014-12-01

    Planktonic foraminifera (PF) shells preserved in marine sediments are a useful tool to reconstruct productivity conditions at different geological timescales. However, the accuracy of these paleoreconstructions depends on the data set and calibration quality. Several calibration works have been defining and improving the use of proxies for productivity and nutrient cycling parameters. Our contribution is centred on a multi-proxy calibration at a regional coastal upwelling system. To minimize the existing uncertainties affecting the use of trace elements and C stable isotopes as productivity proxy in the high productivity upwelling areas, we investigate the content and distribution of Ba/Ca and δ13C in the water column, its transference into the planktonic foraminifera shells, and, how the living planktonic foraminifera Ba/Ca and δ13C signal is related to the same planktonic foraminiferal species preserved in the sediment record. This study is based on a large data set from two stations (RAIA - 75m water depth, and CALIBERIA - 350m water depth) located off the NW Iberian margin (41.5-42.5ºN; 9-10ºW), and includes: i) two year monthly water column data (temperature, salinity, nutrients, chlorophyll a, Ba/Ca, and δ13C-DIC); ii) seasonal Ba/Ca, δ13C in several living PF species at both stations; and iii) Ba/Ca and δ13C in several PF species from a large set of core-top sediment samples in the study region. Additionally, total organic carbon and total alkenones were also measured in the sediment. Our results showed the link between productivity proxies in the surface sediment foraminifera assemblage and the processes regulating the actual phytoplankton dynamics in an upwelling area. The understanding of this relationship has special relevance since it gives fundamental information related to the past oceanic biogeochemistry and/or climate and improves the prevision of future changes against possible climate variability due to anthropogenic forcing.

  16. New Proxies for Climate change parameters: Foram Culturing and Pteropod Potentials

    Science.gov (United States)

    Keul, N.; Schneider, R. R.; Langer, G.; Bijma, J.; Peijnenburg, K. T.

    2017-12-01

    Global climate change is one of the most pressing challenges our society is currently facing and strong efforts are made to simulate future climate conditions. To better validate models that aim at predicting global temperature rise as a consequence of anthropogenic CO2 emissions, accurate atmospheric paleo-CO2 estimates in combination with temperature reconstructions are necessary. Consequently there is a strong need for reliable proxies, allowing reconstruction of climate change. With respect to foraminifera a combination of laboratory experiments and modeling is presented, to show the isolated impact of the different parameters of the carbonate system on trace element composition of their shells. We focus on U/Ca and Sr/Ca ratios, which have recently been established as new proxies reflecting changes in the carbonate system of seawater. While U/Ca correlates with carbonate ion concentration, Sr/Ca is primarily influenced by DIC. The latter is particularly promising since the impact of additional parameters is relatively well constrained and hence, Sr/Ca ratios may allow higher accuracy in carbonate system parameter reconstructions. Furthermore, our results will be discussed on how to advance our knowledge about foraminiferal biomineralization. Pteropods, among the first responders to ocean acidification and warming, are explored as carriers of marine paleoenvironmental signals. In order to characterize the stable isotopic composition of aragonitic pteropod shells and their variation in response to climate change parameters, pteropod shells were collected along a latitudinal transect in the Atlantic Ocean. By comparing shell oxygen isotopic composition to depth changes of the calculated aragonite equilibrium oxygen isotope values, we infer shallow calcification depths for Heliconoides inflatus (75 m), rendering this species a good potential proxy carrier for past variations in surface ocean properties. Furthermore, we demonstrate that indeed, pteropod shells are

  17. Testing the benthic foraminiferal B/Ca proxy in a hydrothermal vent environment to determine its validity under extreme conditions

    Science.gov (United States)

    Clementi, V.; Haynes, L.; Hoenisch, B.; Costa, K.; McManus, J. F.

    2016-12-01

    The boron to calcium ratio (B/Ca) and boron isotopic composition of the benthic foraminifer C. wuellerstorfi have become frequently used proxies for reconstructing carbonate chemistry in ocean bottom waters. However, elevated boron isotope data from a site proximal to the Clipperton Fracture Zone on the East Pacific Rise have led to the hypothesis that boron derived from hydrothermal fluids may be incorporated into benthic foraminifer shells (1). To date there is no comparable evidence for B/Ca at sites adjacent to hydrothermal vent systems, but hydrothermal vent fluid at the Juan de Fuca Ridge in the northeast Pacific Ocean can have boron concentrations nearly twice as high as ambient seawater (2), and other studies have documented increased levels of trace element incorporation in foraminifers living near hydrothermal vents (3). If the same effect holds true for B/Ca, the proxy may be compromised in sediments near hydrothermal vent sites. Here we present C. wuellerstorfi B/Ca data from a sediment core 5 km west of the Juan de Fuca Ridge, North Cleft Segment, to study the influence of vent fluid chemistry and partial shell dissolution on B/Ca and other trace element ratios. Our results do not show a strong hydrothermal signature on B/Ca despite the elevated boron concentrations of modern vent fluids and close proximity to the ridge. However, partial shell dissolution appears to have a significant impact on B/Ca ratios, calling for careful sample selection in future reconstructions from the region. Analysis of B/Ca and other trace element ratios across a ridge transect at a time of documented high hydrothermal activity—as indicated by high sediment hydrothermal Fe fluxes—may determine whether the hydrothermal signal is recorded further downstream from the vent fluid source. (1) Raitzsch, M. and Hönisch, B. (2010). Geology 40(5). (2) Seyfried Jr., W.E. et al. (2003). Journal of Geophys. Res.:Solid Earth 108(B9). (3) Munsel, D. et al. (2010). Biogeosci. 7.7.

  18. Does Twitter trigger bursts in signature collections?

    Science.gov (United States)

    Yamaguchi, Rui; Imoto, Seiya; Kami, Masahiro; Watanabe, Kenji; Miyano, Satoru; Yuji, Koichiro

    2013-01-01

    The quantification of social media impacts on societal and political events is a difficult undertaking. The Japanese Society of Oriental Medicine started a signature-collecting campaign to oppose a medical policy of the Government Revitalization Unit to exclude a traditional Japanese medicine, "Kampo," from the public insurance system. The signature count showed a series of aberrant bursts from November 26 to 29, 2009. In the same interval, the number of messages on Twitter including the keywords "Signature" and "Kampo," increased abruptly. Moreover, the number of messages on an Internet forum that discussed the policy and called for signatures showed a train of spikes. In order to estimate the contributions of social media, we developed a statistical model with state-space modeling framework that distinguishes the contributions of multiple social media in time-series of collected public opinions. We applied the model to the time-series of signature counts of the campaign and quantified contributions of two social media, i.e., Twitter and an Internet forum, by the estimation. We found that a considerable portion (78%) of the signatures was affected from either of the social media throughout the campaign and the Twitter effect (26%) was smaller than the Forum effect (52%) in total, although Twitter probably triggered the initial two bursts of signatures. Comparisons of the estimated profiles of the both effects suggested distinctions between the social media in terms of sustainable impact of messages or tweets. Twitter shows messages on various topics on a time-line; newer messages push out older ones. Twitter may diminish the impact of messages that are tweeted intermittently. The quantification of social media impacts is beneficial to better understand people's tendency and may promote developing strategies to engage public opinions effectively. Our proposed method is a promising tool to explore information hidden in social phenomena.

  19. Does Twitter trigger bursts in signature collections?

    Directory of Open Access Journals (Sweden)

    Rui Yamaguchi

    Full Text Available INTRODUCTION: The quantification of social media impacts on societal and political events is a difficult undertaking. The Japanese Society of Oriental Medicine started a signature-collecting campaign to oppose a medical policy of the Government Revitalization Unit to exclude a traditional Japanese medicine, "Kampo," from the public insurance system. The signature count showed a series of aberrant bursts from November 26 to 29, 2009. In the same interval, the number of messages on Twitter including the keywords "Signature" and "Kampo," increased abruptly. Moreover, the number of messages on an Internet forum that discussed the policy and called for signatures showed a train of spikes. METHODS AND FINDINGS: In order to estimate the contributions of social media, we developed a statistical model with state-space modeling framework that distinguishes the contributions of multiple social media in time-series of collected public opinions. We applied the model to the time-series of signature counts of the campaign and quantified contributions of two social media, i.e., Twitter and an Internet forum, by the estimation. We found that a considerable portion (78% of the signatures was affected from either of the social media throughout the campaign and the Twitter effect (26% was smaller than the Forum effect (52% in total, although Twitter probably triggered the initial two bursts of signatures. Comparisons of the estimated profiles of the both effects suggested distinctions between the social media in terms of sustainable impact of messages or tweets. Twitter shows messages on various topics on a time-line; newer messages push out older ones. Twitter may diminish the impact of messages that are tweeted intermittently. CONCLUSIONS: The quantification of social media impacts is beneficial to better understand people's tendency and may promote developing strategies to engage public opinions effectively. Our proposed method is a promising tool to explore

  20. The sensory construction of dreams and nightmare frequency in congenitally blind and late blind individuals.

    Science.gov (United States)

    Meaidi, Amani; Jennum, Poul; Ptito, Maurice; Kupers, Ron

    2014-05-01

    We aimed to assess dream content in groups of congenitally blind (CB), late blind (LB), and age- and sex-matched sighted control (SC) participants. We conducted an observational study of 11 CB, 14 LB, and 25 SC participants and collected dream reports over a 4-week period. Every morning participants filled in a questionnaire related to the sensory construction of the dream, its emotional and thematic content, and the possible occurrence of nightmares. We also assessed participants' ability of visual imagery during waking cognition, sleep quality, and depression and anxiety levels. All blind participants had fewer visual dream impressions compared to SC participants. In LB participants, duration of blindness was negatively correlated with duration, clarity, and color content of visual dream impressions. CB participants reported more auditory, tactile, gustatory, and olfactory dream components compared to SC participants. In contrast, LB participants only reported more tactile dream impressions. Blind and SC participants did not differ with respect to emotional and thematic dream content. However, CB participants reported more aggressive interactions and more nightmares compared to the other two groups. Our data show that blindness considerably alters the sensory composition of dreams and that onset and duration of blindness plays an important role. The increased occurrence of nightmares in CB participants may be related to a higher number of threatening experiences in daily life in this group. Copyright © 2014 Elsevier B.V. All rights reserved.

  1. Poor-to-moderate agreement between self and proxy interviews of mobile phone use.

    Science.gov (United States)

    Hutter, Hans-Peter; Ehrenhöfer, Lisa; Freuis, Edith; Hartl, Patrik; Kundi, Michael

    2012-10-01

    In epidemiological studies, cases cannot always be interviewed due to them being too ill or already deceased. Under these circumstances, proxy interviews are often conducted; however, the veridicality of information about mobile phone use gained by proxy interviews has been doubted. The issue is undecided due to the lack of empirical data. We conducted a study of 119 heterosexual couples. Both partners answered two questionnaires about mobile phone use, one about their own use and one about their partner's use. Overall agreement assessed using Cohen's kappa, Passing and Bablok regression, and concordance coefficients between self and proxy data was poor to moderate (e.g., concordance coefficients of 0.55 for duration of use). The only item with good agreement was whether or not a prepaid phone was used (Cohen's kappa 0.78 and 0.63 for male and female estimates, respectively), and to a lesser degree, the onset of mobile phone use (concordance coefficients of 0.66 and 0.61). Poorest agreement was obtained for the side of the head the mobile phone was held during calls (kappa coefficients of 0.20 and 0.24 for female and male estimates, respectively). We conclude that the assessment of mobile phone use by proxy data cannot be relied on except for information about onset of mobile phone use, use of prepaid or contract phones, and, to a lesser degree, duration of daily use. Agreement concerning the important information about side of the head the mobile phone is held during calls was poorest and only slightly better than chance. Copyright © 2012 Wiley Periodicals, Inc.

  2. Modeling ground vehicle acoustic signatures for analysis and synthesis

    International Nuclear Information System (INIS)

    Haschke, G.; Stanfield, R.

    1995-01-01

    Security and weapon systems use acoustic sensor signals to classify and identify moving ground vehicles. Developing robust signal processing algorithms for this is expensive, particularly in presence of acoustic clutter or countermeasures. This paper proposes a parametric ground vehicle acoustic signature model to aid the system designer in understanding which signature features are important, developing corresponding feature extraction algorithms and generating low-cost, high-fidelity synthetic signatures for testing. The authors have proposed computer-generated acoustic signatures of armored, tracked ground vehicles to deceive acoustic-sensored smart munitions. They have developed quantitative measures of how accurately a synthetic acoustic signature matches those produced by actual vehicles. This paper describes parameters of the model used to generate these synthetic signatures and suggests methods for extracting these parameters from signatures of valid vehicle encounters. The model incorporates wide-bandwidth and narrow- bandwidth components that are modulated in a pseudo-random fashion to mimic the time dynamics of valid vehicle signatures. Narrow- bandwidth feature extraction techniques estimate frequency, amplitude and phase information contained in a single set of narrow frequency- band harmonics. Wide-bandwidth feature extraction techniques estimate parameters of a correlated-noise-floor model. Finally, the authors propose a method of modeling the time dynamics of the harmonic amplitudes as a means adding necessary time-varying features to the narrow-bandwidth signal components. The authors present results of applying this modeling technique to acoustic signatures recorded during encounters with one armored, tracked vehicle. Similar modeling techniques can be applied to security systems

  3. 42 CFR 435.530 - Definition of blindness.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Definition of blindness. 435.530 Section 435.530... ISLANDS, AND AMERICAN SAMOA Categorical Requirements for Eligibility Blindness § 435.530 Definition of blindness. (a) Definition. The agency must use the same definition of blindness as used under SSI, except...

  4. DIGITAL SIGNATURE IN THE WAY OF LAW

    OpenAIRE

    Ruya Samlı

    2013-01-01

    Signature can be defined as a person’s name or special signs that he/she writes when he/she wants to indicate he/she wrote or confirm that writing. A person signs many times in his/her life. A person’s signature that is used for thousands of times for many things from formal documents to exams has importance for that person. Especially, signing in legal operations is an operation that can build important results. If a person’s signature is imitated by another person, he/she can be...

  5. "VisionTouch Phone" for the Blind.

    Science.gov (United States)

    Yong, Robest

    2013-10-01

    Our objective is to enable the blind to use smartphones with touchscreens to make calls and to send text messages (sms) with ease, speed, and accuracy. We believe that with our proposed platform, which enables the blind to locate the position of the keypads, new games and education, and safety applications will be increasingly developed for the blind. This innovative idea can also be implemented on tablets for the blind, allowing them to use information websites such as Wikipedia and newspaper portals.

  6. An Efficient Homomorphic Aggregate Signature Scheme Based on Lattice

    Directory of Open Access Journals (Sweden)

    Zhengjun Jing

    2014-01-01

    Full Text Available Homomorphic aggregate signature (HAS is a linearly homomorphic signature (LHS for multiple users, which can be applied for a variety of purposes, such as multi-source network coding and sensor data aggregation. In order to design an efficient postquantum secure HAS scheme, we borrow the idea of the lattice-based LHS scheme over binary field in the single-user case, and develop it into a new lattice-based HAS scheme in this paper. The security of the proposed scheme is proved by showing a reduction to the single-user case and the signature length remains invariant. Compared with the existing lattice-based homomorphic aggregate signature scheme, our new scheme enjoys shorter signature length and high efficiency.

  7. A Digital Signature Scheme Based on MST3 Cryptosystems

    Directory of Open Access Journals (Sweden)

    Haibo Hong

    2014-01-01

    Full Text Available As special types of factorization of finite groups, logarithmic signature and cover have been used as the main components of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2, and MST3. Recently, Svaba et. al proposed a revised MST3 encryption scheme with greater security. Meanwhile, they put forward an idea of constructing signature schemes on the basis of logarithmic signatures and random covers. In this paper, we firstly design a secure digital signature scheme based on logarithmic signatures and random covers. In order to complete the task, we devise a new encryption scheme based on MST3 cryptosystems.

  8. Motor development of blind toddler

    OpenAIRE

    Likar, Petra

    2013-01-01

    For blind toddlers, development of motor skills enables possibilities for learning and exploring the environment. The purpose of this graduation thesis is to systematically mark the milestones in development of motor skills in blind toddlers, to establish different factors which affect this development, and to discover different ways for teachers for visually impaired and parents to encourage development of motor skills. It is typical of blind toddlers that they do not experience a wide varie...

  9. Attribute-based proxy re-encryption with keyword search.

    Science.gov (United States)

    Shi, Yanfeng; Liu, Jiqiang; Han, Zhen; Zheng, Qingji; Zhang, Rui; Qiu, Shuo

    2014-01-01

    Keyword search on encrypted data allows one to issue the search token and conduct search operations on encrypted data while still preserving keyword privacy. In the present paper, we consider the keyword search problem further and introduce a novel notion called attribute-based proxy re-encryption with keyword search (ABRKS), which introduces a promising feature: In addition to supporting keyword search on encrypted data, it enables data owners to delegate the keyword search capability to some other data users complying with the specific access control policy. To be specific, ABRKS allows (i) the data owner to outsource his encrypted data to the cloud and then ask the cloud to conduct keyword search on outsourced encrypted data with the given search token, and (ii) the data owner to delegate other data users keyword search capability in the fine-grained access control manner through allowing the cloud to re-encrypted stored encrypted data with a re-encrypted data (embedding with some form of access control policy). We formalize the syntax and security definitions for ABRKS, and propose two concrete constructions for ABRKS: key-policy ABRKS and ciphertext-policy ABRKS. In the nutshell, our constructions can be treated as the integration of technologies in the fields of attribute-based cryptography and proxy re-encryption cryptography.

  10. Attribute-Based Proxy Re-Encryption with Keyword Search

    Science.gov (United States)

    Shi, Yanfeng; Liu, Jiqiang; Han, Zhen; Zheng, Qingji; Zhang, Rui; Qiu, Shuo

    2014-01-01

    Keyword search on encrypted data allows one to issue the search token and conduct search operations on encrypted data while still preserving keyword privacy. In the present paper, we consider the keyword search problem further and introduce a novel notion called attribute-based proxy re-encryption with keyword search (), which introduces a promising feature: In addition to supporting keyword search on encrypted data, it enables data owners to delegate the keyword search capability to some other data users complying with the specific access control policy. To be specific, allows (i) the data owner to outsource his encrypted data to the cloud and then ask the cloud to conduct keyword search on outsourced encrypted data with the given search token, and (ii) the data owner to delegate other data users keyword search capability in the fine-grained access control manner through allowing the cloud to re-encrypted stored encrypted data with a re-encrypted data (embedding with some form of access control policy). We formalize the syntax and security definitions for , and propose two concrete constructions for : key-policy and ciphertext-policy . In the nutshell, our constructions can be treated as the integration of technologies in the fields of attribute-based cryptography and proxy re-encryption cryptography. PMID:25549257

  11. Causes of Severe Visual Impairment and Blindness: Comparative Data From Bhutanese and Laotian Schools for the Blind.

    Science.gov (United States)

    Farmer, Lachlan David Mailey; Ng, Soo Khai; Rudkin, Adam; Craig, Jamie; Wangmo, Dechen; Tsang, Hughie; Southisombath, Khamphoua; Griffiths, Andrew; Muecke, James

    2015-01-01

    To determine and compare the major causes of childhood blindness and severe visual impairment in Bhutan and Laos. Independent cross-sectional surveys. This survey consists of 2 cross-sectional observational studies. The Bhutanese component was undertaken at the National Institute for Vision Impairment, the only dedicated school for the blind in Bhutan. The Laotian study was conducted at the National Ophthalmology Centre and Vientiane School for the Blind. Children younger than age 16 were invited to participate. A detailed history and examination were performed consistent with the World Health Organization Prevention of Blindness Eye Examination Record. Of the 53 children examined in both studies, 30 were from Bhutan and 23 were from Laos. Forty percent of Bhutanese and 87.1% of Laotian children assessed were blind, with 26.7% and 4.3%, respectively, being severely visually impaired. Congenital causes of blindness were the most common, representing 45% and 43.5% of the Bhutanese and Laotian children, respectively. Anatomically, the primary site of blinding pathology differed between the cohorts. In Bhutan, the lens comprised 25%, with whole globe at 20% and retina at 15%, but in Laos, whole globe and cornea equally contributed at 30.4%, followed by retina at 17.4%. There was an observable difference in the rates of blindness/severe visual impairment due to measles, with no cases observed in the Bhutanese children but 20.7% of the total pathologies in the Laotian children attributable to congenital measles infection. Consistent with other studies, there is a high rate of blinding disease, which may be prevented, treated, or ameliorated.

  12. Signature detection and matching for document image retrieval.

    Science.gov (United States)

    Zhu, Guangyu; Zheng, Yefeng; Doermann, David; Jaeger, Stefan

    2009-11-01

    As one of the most pervasive methods of individual identification and document authentication, signatures present convincing evidence and provide an important form of indexing for effective document image processing and retrieval in a broad range of applications. However, detection and segmentation of free-form objects such as signatures from clustered background is currently an open document analysis problem. In this paper, we focus on two fundamental problems in signature-based document image retrieval. First, we propose a novel multiscale approach to jointly detecting and segmenting signatures from document images. Rather than focusing on local features that typically have large variations, our approach captures the structural saliency using a signature production model and computes the dynamic curvature of 2D contour fragments over multiple scales. This detection framework is general and computationally tractable. Second, we treat the problem of signature retrieval in the unconstrained setting of translation, scale, and rotation invariant nonrigid shape matching. We propose two novel measures of shape dissimilarity based on anisotropic scaling and registration residual error and present a supervised learning framework for combining complementary shape information from different dissimilarity metrics using LDA. We quantitatively study state-of-the-art shape representations, shape matching algorithms, measures of dissimilarity, and the use of multiple instances as query in document image retrieval. We further demonstrate our matching techniques in offline signature verification. Extensive experiments using large real-world collections of English and Arabic machine-printed and handwritten documents demonstrate the excellent performance of our approaches.

  13. Server-Aided Verification Signature with Privacy for Mobile Computing

    Directory of Open Access Journals (Sweden)

    Lingling Xu

    2015-01-01

    Full Text Available With the development of wireless technology, much data communication and processing has been conducted in mobile devices with wireless connection. As we know that the mobile devices will always be resource-poor relative to static ones though they will improve in absolute ability, therefore, they cannot process some expensive computational tasks due to the constrained computational resources. According to this problem, server-aided computing has been studied in which the power-constrained mobile devices can outsource some expensive computation to a server with powerful resources in order to reduce their computational load. However, in existing server-aided verification signature schemes, the server can learn some information about the message-signature pair to be verified, which is undesirable especially when the message includes some secret information. In this paper, we mainly study the server-aided verification signatures with privacy in which the message-signature pair to be verified can be protected from the server. Two definitions of privacy for server-aided verification signatures are presented under collusion attacks between the server and the signer. Then based on existing signatures, two concrete server-aided verification signature schemes with privacy are proposed which are both proved secure.

  14. Light is an active contributor to the vital effects of coral skeleton proxies

    Science.gov (United States)

    Juillet-Leclerc, Anne; Reynaud, Stéphanie; Dissard, Delphine; Tisserand, Guillaume; Ferrier-Pagès, Christine

    2014-09-01

    Symbiotic colonies of the coral Acropora sp. were cultured in a factorial design of three temperatures (21, 25 and 28 °C) and two light intensities (200 and 400 μmol photon m-2 s-1), under constant conditions. A temperature of 25 °C and a light intensity of 200 μmol photon m-2 s-1 was the starting culture condition. Metabolic (photosynthesis, respiration, calcification and surface expansion rate) and geochemical measurements (δ18O, δ13C, Sr/Ca and Mg/Ca) were conducted on 6 colonies for each experimental condition. Metabolic measurements confirmed that respiration, photosynthesis, calcification and surface expansion rate responded to the combined effect of temperature and light. Under each light intensity, mean calcification rate was linearly correlated with mean photosynthetic activity. Geochemical measurements were also influenced by temperature and, to a lesser degree, by light. All geochemical proxies measured on 6 nubbins showed a wide scattering of values, regardless of the environmental condition. Compared to the other proxies, δ18O exhibited a different behavior. It was the only proxy exhibiting temperature tracer behavior. However, while mean values of Sr/Ca, Mg/Ca and δ13C were well correlated, the correlation between the later and mean δ18O differed with light level. This suggests that both skeleton deposition and temperature oxygen fractionation differs according to light intensity. Overall, the effect of light on geochemical values seems to compromise the use of proxy calibrations solely based on temperature influence. Under high light conditions, the great amplitude shown by individual net photosynthesis is directly proportional to the highly variable zooxanthellae density. As light is affecting all of the proxies, we thus assume that the strong geochemical variability observed could be explained by various algae densities, each nubbin responding according to its zooxanthellae amount. Accordingly, we suggest that each symbiosome (the

  15. Proxying UPnP service discovery and access to a non-IP Bluetooth network on a mobile phone

    NARCIS (Netherlands)

    Delphinanto, A.; Koonen, A.M.J.; Hartog, den F.T.H.; Peeters, M.E.

    2007-01-01

    The current service-and device discovery protocols are not platform-and network independent. Therefore, proxy servers will be needed to extend the range of IP-based discovery protocols to non-IP domains. We developed an architecture of a proxy that enables Universal Plug and Play (UPnP) devices and

  16. 20 CFR 416.983 - How we evaluate statutory blindness.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false How we evaluate statutory blindness. 416.983... AGED, BLIND, AND DISABLED Determining Disability and Blindness Blindness § 416.983 How we evaluate statutory blindness. We will find that you are blind if you are statutorily blind within the meaning of...

  17. Causes of severe visual impairment and blindness in students in schools for the blind in Northwest Ethiopia.

    Science.gov (United States)

    Asferaw, Mulusew; Woodruff, Geoffrey; Gilbert, Clare

    2017-01-01

    To determine the causes of severe visual impairment and blindness (SVI/BL) among students in schools for the blind in Northwest Ethiopia and to identify preventable and treatable causes. Students attending nine schools for the blind in Northwest Ethiopia were examined and causes assigned using the standard WHO record form for children with blindness and low vision in May and June 2015. 383 students were examined, 357 (93%) of whom were severely visually impaired or blind (blind and four were SVI, total 104. The major anatomical site of visual loss among those 0-15 years was cornea/phthisis (47.1%), usually due to measles and vitamin A deficiency, followed by whole globe (22.1%), lens (9.6%) and uvea (8.7%). Among students aged 16 years and above, corneal/phthisis (76.3%) was the major anatomical cause, followed by lens (6.3%), whole globe (4.7%), uvea (3.6%) and optic nerve (3.2%). The leading underlying aetiology among students aged blindness, mainly as the result of measles and vitamin A deficiency, is still a public health problem in Northwest Ethiopia, and this has not changed as observed in other low-income countries. More than three-fourth of causes of SVI/BL in students in schools for the blind are potentially avoidable, with measles/vitamin A deficiency and cataract being the leading causes.

  18. TEX86 paleothermometry : proxy validation and application in marine sediments

    NARCIS (Netherlands)

    Huguet, C.

    2007-01-01

    Determination of past sea surface temperature (SST) is of primary importance for the reconstruction of natural climatic changes, modelling of climate and reconstruction of ocean circulation. Recently, a new SST proxy was introduced, the TetraEther indeX of lipids with 86 carbons (TEX86), which is

  19. TEX₈₆ paleothermometry : proxy validation and application in marine sediments

    NARCIS (Netherlands)

    Huguet, Carme

    2007-01-01

    Determination of past sea surface temperature (SST) is of primary importance for the reconstruction of natural climatic changes, modelling of climate and reconstruction of ocean circulation. Recently, a new SST proxy was introduced, the TetraEther indeX of lipids with 86 carbons (TEX₈₆), which is

  20. 20 CFR 416.982 - Blindness under a State plan.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Blindness under a State plan. 416.982 Section..., BLIND, AND DISABLED Determining Disability and Blindness Blindness § 416.982 Blindness under a State... plan because of your blindness for the month of December 1973; and (c) You continue to be blind as...

  1. Constraining Lipid Biomarker Paleoclimate Proxies in a Small Arctic Watershed

    Science.gov (United States)

    Dion-Kirschner, H.; McFarlin, J. M.; Axford, Y.; Osburn, M. R.

    2017-12-01

    Arctic amplification of climate change renders high-latitude environments unusually sensitive to changes in climatic conditions (Serreze and Barry, 2011). Lipid biomarkers, and their hydrogen and carbon isotopic compositions, can yield valuable paleoclimatic and paleoecological information. However, many variables affect the production and preservation of lipids and their constituent isotopes, including precipitation, plant growth conditions, biosynthesis mechanisms, and sediment depositional processes (Sachse et al., 2012). These variables are particularly poorly constrained for high-latitude environments, where trees are sparse or not present, and plants grow under continuous summer light and cool temperatures during a short growing season. Here we present a source-to-sink study of a single watershed from the Kangerlussuaq region of southwest Greenland. Our analytes from in and around `Little Sugarloaf Lake' (LSL) include terrestrial and aquatic plants, plankton, modern lake water, surface sediments, and a sediment core. This diverse sample set allows us to fulfill three goals: 1) We evaluate the production of lipids and isotopic signatures in the modern watershed in comparison to modern climate. Our data exhibit genus-level trends in leaf wax production and isotopic composition, and help clarify the difference between terrestrial and aquatic signals. 2) We evaluate the surface sediment of LSL to determine how lipid biomarkers from the watershed are incorporated into sediments. We constrain the relative contributions of terrestrial plants, aquatic plants, and other aquatic organisms to the sediment in this watershed. 3) We apply this modern source-to-sink calibration to the analysis of a 65 cm sediment core record. Our core is organic-rich, and relatively high deposition rates allow us to reconstruct paleoenvironmental changes with high resolution. Our work will help determine the veracity of these common paleoclimate proxies, specifically for research in

  2. Blindness and Insight in King Lear

    Institute of Scientific and Technical Information of China (English)

    岳元玉

    2008-01-01

    This paper intends to explore how William Shakespeare illustrates the theme of blindness and insight in his great tragedy "King Lear".Four characters’ deeds and their fate are used as a case study to examine what blindness is,what insight is,and the relationship between the two.The writer finds that by depicting the characters’ deeds and their fate in a double plot,Shakespeare renders the folly of blindness,the transition from blindness to insight,and the use of reason and thought to understand the truth.

  3. 42 CFR 436.530 - Definition of blindness.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Definition of blindness. 436.530 Section 436.530... Requirements for Medicaid Eligibility Blindness § 436.530 Definition of blindness. (a) Definition. The agency must use the definition of blindness that is used in the State plan for AB or AABD. (b) State plan...

  4. Preserved sleep microstructure in blind individuals

    DEFF Research Database (Denmark)

    Aubin, Sébrina; Christensen, Julie A.E.; Jennum, Poul

    2018-01-01

    , as light is the primary zeitgeber of the master biological clock found in the suprachiasmatic nucleus of the hypothalamus. In addition, a greater number of sleep disturbances is often reported in blind individuals. Here, we examined various electroencephalographic microstructural components of sleep, both...... during rapid-eye-movement (REM) sleep and non-REM (NREM) sleep, between blind individuals, including both of early and late onset, and normal-sighted controls. During wakefulness, occipital alpha oscillations were lower, or absent in blind individuals. During sleep, differences were observed across...... electrode derivations between the early and late blind samples, which may reflect altered cortical networking in early blindness. Despite these differences in power spectra density, the electroencephalography microstructure of sleep, including sleep spindles, slow wave activity, and sawtooth waves, remained...

  5. POLAR NETWORK INDEX AS A MAGNETIC PROXY FOR THE SOLAR CYCLE STUDIES

    International Nuclear Information System (INIS)

    Priyal, Muthu; Banerjee, Dipankar; Ravindra, B.; Singh, Jagdev; Karak, Bidya Binay; Muñoz-Jaramillo, Andrés; Choudhuri, Arnab Rai

    2014-01-01

    The Sun has a polar magnetic field which oscillates with the 11 yr sunspot cycle. This polar magnetic field is an important component of the dynamo process which operates in the solar convection zone and produces the sunspot cycle. We have direct systematic measurements of the Sun's polar magnetic field only from about the mid-1970s. There are, however, indirect proxies which give us information about this field at earlier times. The Ca-K spectroheliograms taken at the Kodaikanal Solar Observatory during 1904-2007 have now been digitized with 4k × 4k CCD and have higher resolution (∼0.86 arcsec) than the other available historical data sets. From these Ca-K spectroheliograms, we have developed a completely new proxy (polar network index, hereafter PNI) for the Sun's polar magnetic field. We calculate PNI from the digitized images using an automated algorithm and calibrate our measured PNI against the polar field as measured by the Wilcox Solar Observatory for the period 1976-1990. This calibration allows us to estimate the polar fields for the earlier period up to 1904. The dynamo calculations performed with this proxy as input data reproduce reasonably well the Sun's magnetic behavior for the past century

  6. POLAR NETWORK INDEX AS A MAGNETIC PROXY FOR THE SOLAR CYCLE STUDIES

    Energy Technology Data Exchange (ETDEWEB)

    Priyal, Muthu; Banerjee, Dipankar; Ravindra, B.; Singh, Jagdev [Indian Institute of Astrophysics,Koramangala, Bengaluru 560034 (India); Karak, Bidya Binay [Nordita, KTH Royal Institute of Technology and Stockholm University (Sweden); Muñoz-Jaramillo, Andrés [Montana State University, Bozeman, MT 59717 (United States); Choudhuri, Arnab Rai, E-mail: mpriya@iiap.res.in, E-mail: dipu@iiap.res.in [Indian Institute of Science, Bangalore (India)

    2014-09-20

    The Sun has a polar magnetic field which oscillates with the 11 yr sunspot cycle. This polar magnetic field is an important component of the dynamo process which operates in the solar convection zone and produces the sunspot cycle. We have direct systematic measurements of the Sun's polar magnetic field only from about the mid-1970s. There are, however, indirect proxies which give us information about this field at earlier times. The Ca-K spectroheliograms taken at the Kodaikanal Solar Observatory during 1904-2007 have now been digitized with 4k × 4k CCD and have higher resolution (∼0.86 arcsec) than the other available historical data sets. From these Ca-K spectroheliograms, we have developed a completely new proxy (polar network index, hereafter PNI) for the Sun's polar magnetic field. We calculate PNI from the digitized images using an automated algorithm and calibrate our measured PNI against the polar field as measured by the Wilcox Solar Observatory for the period 1976-1990. This calibration allows us to estimate the polar fields for the earlier period up to 1904. The dynamo calculations performed with this proxy as input data reproduce reasonably well the Sun's magnetic behavior for the past century.

  7. Blindness and the age of enlightenment: Diderot's letter on the blind.

    Science.gov (United States)

    Margo, Curtis E; Harman, Lynn E; Smith, Don B

    2013-01-01

    Several months after anonymously publishing an essay in 1749 with the title "Letter on the Blind for the Use of Those Who Can See," the chief editor of the French Encyclopédie was arrested and taken to the prison fortress of Vincennes just east of Paris, France. The correctly assumed author, Denis Diderot, was 35 years old and had not yet left his imprint on the Age of Enlightenment. His letter, which recounted the life of Nicolas Saunderson, a blind mathematician, was intended to advance secular empiricism and disparage the religiously tinged rationalism put forward by Rene Descartes. The letter's discussion of sensory perception in men born blind dismissed the supposed primacy of visual imagery in abstract thinking. The essay did little to resolve any philosophical controversy, but it marked a turning point in Western attitudes toward visual disability.

  8. 48 CFR 4.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Contracting officer's signature. 4.101 Section 4.101 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Contract Execution 4.101 Contracting officer's signature. Only contracting officers shall...

  9. Assessing 5 years of GOSAT Proxy XCH4 data and associated uncertainties

    Directory of Open Access Journals (Sweden)

    R. J. Parker

    2015-11-01

    Full Text Available We present 5 years of GOSAT XCH4 retrieved using the "proxy" approach. The Proxy XCH4 data are validated against ground-based TCCON observations and are found to be of high quality with a small bias of 4.8 ppb (∼ 0.27 % and a single-sounding precision of 13.4 ppb (∼ 0.74 %. The station-to-station bias (ameasure of the relative accuracy is found to be 4.2 ppb. For the first time the XCH4 / XCO2 ratio component of the Proxy retrieval is validated (bias of 0.014 ppb ppm−1 (∼ 0.30 %, single-sounding precision of 0.033 ppb ppm−1 (∼ 0.72 %. The uncertainty relating to the model XCO2 component of the Proxy XCH4 is assessed through the use of an ensemble of XCO2 models. While each individual XCO2 model is found to agree well with the TCCON validation data (r = 0.94–0.97, it is not possible to select one model as the best from our comparisons. The median XCO2 value of the ensemble has a smaller scatter against TCCON (a standard deviation of 0.92 ppm than any of the individual models whilst maintaining a small bias (0.15 ppm. This model median XCO2 is used to calculate the Proxy XCH4 with the maximum deviation of the ensemble from the median used as an estimate of the uncertainty. We compare this uncertainty to the a posteriori retrieval error (which is assumed to reduce with sqrt(N and find typically that the model XCO2 uncertainty becomes significant during summer months when the a posteriori error is at its lowest due to the increase in signal related to increased summertime reflected sunlight. We assess the significance of these model and retrieval uncertainties on flux inversion by comparing the GOSAT XCH4 against modelled XCH4 from TM5-4DVAR constrained by NOAA surface observations (MACC reanalysis scenario S1-NOAA. We find that for the majority of regions the differences are much larger than the estimated uncertainties. Our findings show that useful information will be provided to the inversions for the majority of regions in addition

  10. 37 CFR 2.74 - Form and signature of amendment.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Form and signature of... signature of amendment. (a) Form of Amendment. Amendments should be set forth clearly and completely... record. (b) Signature. A request for amendment of an application must be signed by the applicant, someone...

  11. 21 CFR 11.200 - Electronic signature components and controls.

    Science.gov (United States)

    2010-04-01

    ... signature components and controls. (a) Electronic signatures that are not based upon biometrics shall: (1) Employ at least two distinct identification components such as an identification code and password. (i... signatures based upon biometrics shall be designed to ensure that they cannot be used by anyone other than...

  12. Signature Schemes Secure against Hard-to-Invert Leakage

    DEFF Research Database (Denmark)

    Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus

    2012-01-01

    of the secret key. As a second contribution, we construct a signature scheme that achieves security for random messages assuming that the adversary is given a polynomial-time hard to invert function. Here, polynomial-hardness is required even when given the entire public-key – so called weak auxiliary input......-theoretically reveal the entire secret key. In this work, we propose the first constructions of digital signature schemes that are secure in the auxiliary input model. Our main contribution is a digital signature scheme that is secure against chosen message attacks when given an exponentially hard-to-invert function...... security. We show that such signature schemes readily give us auxiliary input secure identification schemes...

  13. THE ELECTRONIC SIGNATURE

    Directory of Open Access Journals (Sweden)

    Voiculescu Madalina Irena

    2009-05-01

    Full Text Available Article refers to significance and the digital signature in electronic commerce. Internet and electronic commerce open up many new opportunities for the consumer, yet, the security (or perceived lack of security of exchanging personal and financial data

  14. Blinded trials taken to the test: an analysis of randomized clinical trials that report tests for the success of blinding

    DEFF Research Database (Denmark)

    Hróbjartsson, A; Forfang, E; Haahr, M T

    2007-01-01

    Blinding can reduce bias in randomized clinical trials, but blinding procedures may be unsuccessful. Our aim was to assess how often randomized clinical trials test the success of blinding, the methods involved and how often blinding is reported as being successful....

  15. Staggering in signature partners of A∼190 mass region of superdeformed rotational bands

    International Nuclear Information System (INIS)

    Uma, V.S.; Goel, Alpana; Yadav, Archana

    2014-01-01

    This paper discuss about ΔI=1 signature splitting in signature partner pairs of A∼190 mass region. Around twenty signature partner pairs (usually called as two bands, each with a fixed signature) have been reported in this mass region. For these signature pairs, band head moment of inertia (J 0 ) and intrinsic structure of each pair of signature partners have been found as almost identical. Also, these signature partner pairs showed large amplitude signature splitting. As each of the two signature partner forms a regular spin sequence and signature bands are not equivalent in terms of energies. This difference in energies results in signature splitting

  16. 22 CFR 92.28 - Signature of affiant on affidavit.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Signature of affiant on affidavit. 92.28 Section 92.28 Foreign Relations DEPARTMENT OF STATE LEGAL AND RELATED SERVICES NOTARIAL AND RELATED SERVICES Specific Notarial Acts § 92.28 Signature of affiant on affidavit. The signature of the affiant is...

  17. Prevalence and causes of low vision and blindness in the blind population supported by the Yazd Welfare Organization

    Directory of Open Access Journals (Sweden)

    F Ezoddini - Ardakani

    2006-01-01

    Full Text Available Introduction: In 1995, the World Health Organization (WHO estimated that there were 37.1 million blind people worldwide. It has subsequently been reported that 110 million people have severely impaired vision, hence are at great risk of becoming blind. Watkins predicted an annual increase of about two million blind worldwide. This study was designed to investigate the causes of blindness and low vision in the blind population supported by the welfare organization of Yazd, Iran. Methods: This clinical descriptive cross-sectional study was done from January to September, 2003. In total, 109 blind patients supported by the welfare organization were included in this study. All data was collected by standard methods using questionnaire, interview and specific examination. The data included; demographic characteristics, clinical states, ophthalmic examination, family history and the available prenatal information. The data were analyzed by SPSS software and chi square test. Results: Of total patients, 73 cases were male (67% and 36 were female (33%. The median age was 24.6 years (range one month to 60 years. More than half of the cases (53.2% could be diagnosed in children less than one year of age. In total, 79 patients (88.1% were legally blind of which 23 cases (29.1% had no light perception (NLP. The most common causes of blindness were retinitis pigmentosa (32.1% followed by ocular dysgenesis (16.5%. Conclusion: Our data showed that more than half of the blindness cases occur during the first year of life. The most common cause of blindness was retinitis pigmentosa followed by ocular dysgenesis, cataract and glaucoma, respectively.

  18. Induced Temporal Signatures for Point-Source Detection

    International Nuclear Information System (INIS)

    Stephens, Daniel L.; Runkle, Robert C.; Carlson, Deborah K.; Peurrung, Anthony J.; Seifert, Allen; Wyatt, Cory R.

    2005-01-01

    Detection of radioactive point-sized sources is inherently divided into two regimes encompassing stationary and moving detectors. The two cases differ in their treatment of background radiation and its influence on detection sensitivity. In the stationary detector case the statistical fluctuation of the background determines the minimum detectable quantity. In the moving detector case the detector may be subjected to widely and irregularly varying background radiation, as a result of geographical and environmental variation. This significant systematic variation, in conjunction with the statistical variation of the background, requires a conservative threshold to be selected to yield the same false-positive rate as the stationary detection case. This results in lost detection sensitivity for real sources. This work focuses on a simple and practical modification of the detector geometry that increase point-source recognition via a distinctive temporal signature. A key part of this effort is the integrated development of both detector geometries that induce a highly distinctive signature for point sources and the development of statistical algorithms able to optimize detection of this signature amidst varying background. The identification of temporal signatures for point sources has been demonstrated and compared with the canonical method showing good results. This work demonstrates that temporal signatures are efficient at increasing point-source discrimination in a moving detector system

  19. A survey of severe visual impairment and blindness in children attending thirteen schools for the blind in sri lanka.

    Science.gov (United States)

    Gao, Zoe; Muecke, James; Edussuriya, Kapila; Dayawansa, Ranasiri; Hammerton, Michael; Kong, Aimee; Sennanayake, Saman; Senaratne, Tissa; Marasinghe, Nirosha; Selva, Dinesh

    2011-02-01

    To identify the causes of blindness and severe visual impairment (BL/SVI) in children attending schools for the blind in Sri Lanka, and to provide optical devices and ophthalmic treatment where indicated. Two hundred and six children under 16 years from 13 schools for the blind in Sri Lanka were examined by a team of ophthalmologists and optometrists. Data were entered in the World Health Organization Prevention of Blindness Eye Examination Record for Childhood Blindness (WHO/PBL ERCB). Of the 206 children, 83.5% were blind (BL = Visual acuity [VA] schools for the blind in Sri Lanka had potentially avoidable causes of BL/SVI. Vision could also be improved in a third of children. The data support the need to develop specialized pediatric ophthalmic services, particularly in the face of advancing neonatal life support in Sri Lanka, and the need for increased provision of optical support.

  20. Optical/Infrared Signatures for Space-Based Remote Sensing

    National Research Council Canada - National Science Library

    Picard, R. H; Dewan, E. M; Winick, J. R; O'Neil, R. R

    2007-01-01

    This report describes work carried out under the Air Force Research Laboratory's basic research task in optical remote-sensing signatures, entitled Optical / Infrared Signatures for Space-Based Remote Sensing...

  1. Signature scheme based on bilinear pairs

    Science.gov (United States)

    Tong, Rui Y.; Geng, Yong J.

    2013-03-01

    An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.

  2. Health-related quality of life in children and adolescents: Current normative data, determinants and reliability on proxy-report.

    Science.gov (United States)

    Meyer, Michael; Oberhoffer, Renate; Hock, Julia; Giegerich, Tobias; Müller, Jan

    2016-06-01

    Health-related quality of life (HrQoL) is a multidimensional concept including self-reported measures of physical and mental health. Throughout the last decades, HrQoL has become a more and more important outcome measure not only in clinical conditions. This study evaluates current HrQoL of healthy children and adolescents, determinants of HrQoL, and the agreement between self- and proxy-report. From April 2012 to July 2013, we prospectively examined 530 healthy children (13.2 ± 2.1 years, 236 girls) and their parents on their childrens HrQoL using the KINDL-R self-report questionnaire and the parent's proxy-report. Data was compared to the established reference value from 2007 and the agreement of self- and parent's proxy-report was assessed by calculation of intraclass correlation coefficient (ICC). In general, the HrQoL improved compared to references in both children's (104.5 ± 12.6 % of predicted reference value, P proxy-report (104.3 ± 12.3 % of predicted reference value, P proxy-report (ICC: .774). Only in the domains 'self-esteem' (ICC: .558) and 'Emotional well-being' (ICC: .612) the agreements were moderate. HrQoL perception has increased throughout the past 10 years and worsens with increasing age. Moreover, the parent's proxy-report of the KINDL-R questionnaire is a good supplementary method to provide additional information regarding to children's HrQoL. © 2016 Paediatrics and Child Health Division (The Royal Australasian College of Physicians).

  3. Prevalence and causes of corneal blindness.

    Science.gov (United States)

    Wang, Haijing; Zhang, Yaoguang; Li, Zhijian; Wang, Tiebin; Liu, Ping

    2014-04-01

    The study aimed to assess the prevalence and causes of corneal blindness in a rural northern Chinese population. Cross-sectional study. The cluster random sampling method was used to select the sample. This population-based study included 11 787 participants of all ages in rural Heilongjiang Province, China. These participants underwent a detailed interview and eye examination that included the measurement of visual acuity, slit-lamp biomicroscopy and direct ophthalmoscopy. An eye was considered to have corneal blindness if the visual acuity was blindness and low vision. Among the 10 384 people enrolled in the study, the prevalence of corneal blindness is 0.3% (95% confidence interval 0.2-0.4%). The leading cause was keratitis in childhood (40.0%), followed by ocular trauma (33.3%) and keratitis in adulthood (20.0%). Age and illiteracy were found to be associated with an increased prevalence of corneal blindness. Blindness because of corneal diseases in rural areas of Northern China is a significant public health problem that needs to be given more attention. © 2013 Royal Australian and New Zealand College of Ophthalmologists.

  4. Analysis of signature wrapping attacks and countermeasures

    DEFF Research Database (Denmark)

    Gajek, Sebastian; Jensen, Meiko; Liao, Lijun

    2009-01-01

    In recent research it turned out that Boolean verification, of digital signatures in the context of WSSecurity, is likely to fail: If parts of a SOAP message, are signed and the signature verification applied to, the whole document returns true, then nevertheless the, document may have been...

  5. Memory for environmental sounds in sighted, congenitally blind and late blind adults: evidence for cross-modal compensation.

    Science.gov (United States)

    Röder, Brigitte; Rösler, Frank

    2003-10-01

    Several recent reports suggest compensatory performance changes in blind individuals. It has, however, been argued that the lack of visual input leads to impoverished semantic networks resulting in the use of data-driven rather than conceptual encoding strategies on memory tasks. To test this hypothesis, congenitally blind and sighted participants encoded environmental sounds either physically or semantically. In the recognition phase, both conceptually as well as physically distinct and physically distinct but conceptually highly related lures were intermixed with the environmental sounds encountered during study. Participants indicated whether or not they had heard a sound in the study phase. Congenitally blind adults showed elevated memory both after physical and semantic encoding. After physical encoding blind participants had lower false memory rates than sighted participants, whereas the false memory rates of sighted and blind participants did not differ after semantic encoding. In order to address the question if compensatory changes in memory skills are restricted to critical periods during early childhood, late blind adults were tested with the same paradigm. When matched for age, they showed similarly high memory scores as the congenitally blind. These results demonstrate compensatory performance changes in long-term memory functions due to the loss of a sensory system and provide evidence for high adaptive capabilities of the human cognitive system.

  6. Persistent solar signatures in cloud cover: spatial and temporal analysis

    International Nuclear Information System (INIS)

    Voiculescu, M; Usoskin, I

    2012-01-01

    A consensus regarding the impact of solar variability on cloud cover is far from being reached. Moreover, the impact of cloud cover on climate is among the least understood of all climate components. This motivated us to analyze the persistence of solar signals in cloud cover for the time interval 1984–2009, covering two full solar cycles. A spatial and temporal investigation of the response of low, middle and high cloud data to cosmic ray induced ionization (CRII) and UV irradiance (UVI) is performed in terms of coherence analysis of the two signals. For some key geographical regions the response of clouds to UVI and CRII is persistent over the entire time interval indicating a real link. In other regions, however, the relation is not consistent, being intermittent or out of phase, suggesting that some correlations are spurious. The constant in phase or anti-phase relationship between clouds and solar proxies over some regions, especially for low clouds with UVI and CRII, middle clouds with UVI and high clouds with CRII, definitely requires more study. Our results show that solar signatures in cloud cover persist in some key climate-defining regions for the entire time period and supports the idea that, if existing, solar effects are not visible at the global level and any analysis of solar effects on cloud cover (and, consequently, on climate) should be done at the regional level. (letter)

  7. Statistical framework for evaluation of climate model simulations by use of climate proxy data from the last millennium - Part 1: Theory

    Science.gov (United States)

    Sundberg, R.; Moberg, A.; Hind, A.

    2012-08-01

    A statistical framework for comparing the output of ensemble simulations from global climate models with networks of climate proxy and instrumental records has been developed, focusing on near-surface temperatures for the last millennium. This framework includes the formulation of a joint statistical model for proxy data, instrumental data and simulation data, which is used to optimize a quadratic distance measure for ranking climate model simulations. An essential underlying assumption is that the simulations and the proxy/instrumental series have a shared component of variability that is due to temporal changes in external forcing, such as volcanic aerosol load, solar irradiance or greenhouse gas concentrations. Two statistical tests have been formulated. Firstly, a preliminary test establishes whether a significant temporal correlation exists between instrumental/proxy and simulation data. Secondly, the distance measure is expressed in the form of a test statistic of whether a forced simulation is closer to the instrumental/proxy series than unforced simulations. The proposed framework allows any number of proxy locations to be used jointly, with different seasons, record lengths and statistical precision. The goal is to objectively rank several competing climate model simulations (e.g. with alternative model parameterizations or alternative forcing histories) by means of their goodness of fit to the unobservable true past climate variations, as estimated from noisy proxy data and instrumental observations.

  8. Implication of biomarkers signatures of the Ulleung Basin, East Sea, during the Pleistocene

    Science.gov (United States)

    Choi, Jiyoung; Lee, Kyung Eun; Kim, Ji-Hoon; Bahk, Jang-Jun; Yoo, Dong-Geun

    2014-05-01

    In this study, the molecular distribution of the n-alkanes, alkenone and C/N ratio and δ13C of bulk sediment were used to assess changes in organic matter (OM) source and transport which could be related with paleoclimate change. The proxy records corresponding to the Pleistocene have been obtained from the well-studied the Ulleung Basin Gas Hydrate Expedition 2 (UBGH2) site 11 in the Ulleung Basin, East Sea. The distribution of carbon preference index (CPI) of n-alkane encountered in this study confirmed the importance of terrestrial OM in the marine sediment. Alkenone has been widely applied for sea surface temperature (SST) reconstruction. The data results show that CPI values generally increase with decreasing paleo-SST. Plot of C/N ratio versus δ13C shows a predominance of marine algae origin in the study area. It may indicate that the minimum CPI in warm period is related with the contribution of probably enhanced biodegradation, while the maximum CPI value in cold period result from restrain of OM input associated with sea level lowering. It is likely that the vertical variations of the biomarkers signature reflect the shifts in sedimentary environment and transportation related with change of ocean currents and sea level during the Pleistocene period.

  9. Molecular Signature in HCV-Positive Lymphomas

    Directory of Open Access Journals (Sweden)

    Valli De Re

    2012-01-01

    Full Text Available Hepatitis C virus (HCV is a positive, single-stranded RNA virus, which has been associated to different subtypes of B-cell non-Hodgkin lymphoma (B-NHL. Cumulative evidence suggests an HCV-related antigen driven process in the B-NHL development. The underlying molecular signature associated to HCV-related B-NHL has to date remained obscure. In this review, we discuss the recent developments in this field with a special mention to different sets of genes whose expression is associated with BCR coupled to Blys signaling which in turn was found to be linked to B-cell maturation stages and NF-κb transcription factor. Even if recent progress on HCV-B-NHL signature has been made, the precise relationship between HCV and lymphoma development and phenotype signature remain to be clarified.

  10. 32 CFR 842.6 - Signature on the claim form.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Signature on the claim form. 842.6 Section 842.6... ADMINISTRATIVE CLAIMS General Information § 842.6 Signature on the claim form. The claimant or authorized agent... authorized agent signing for a claimant shows, after the signature, the title or capacity and attaches...

  11. Causes of blindness in a special education school.

    Science.gov (United States)

    Onakpoya, O H; Adegbehingbe, B O; Omotoye, O J; Adeoye, A O

    2011-01-01

    Blind children and young adults have to overcome a lifetime of emotional, social and economic difficulties. They employ non-vision dependent methods for education. To assess the causes of blindness in a special school in southwestern Nigeria to aid the development of efficient blindness prevention programmes. A cross-sectional survey of the Ekiti State Special Education School, Nigeria was conducted in May-June 2008 after approval from the Ministry of Education. All students in the blind section were examined for visual acuity, pen-torch eye examination and dilated fundoscopy in addition to taking biodata and history. Thirty blind students with mean age of 18±7.3 years and male: female ratio of 1.7:1 were examined. Blindness resulted commonly from cataract eight (26.7%), glaucoma six (20%) retinitis pigmentosa four (16.7%) and posttraumatic phthysis bulbi two (6.7%). Blindness was avoidable in 18 (61%) of cases. Glaucoma blindness was associated with redness, pain, lacrimation and photophobia in 15 (50%) and hyphaema in 16.7% of students; none of these students were on any medication at the time of study. The causes of blindness in rehabilitation school for the blind are largely avoidable and glaucoma-blind pupils face additional painful eye related morbidity during rehabilitation. While preventive measures and early intervention are needful against childhood cataract and glaucoma, regular ophthalmic consultations and medications are needed especially for glaucoma blind pupils.

  12. Tactile Sensitivity and Braille Reading in People with Early Blindness and Late Blindness

    Science.gov (United States)

    Oshima, Kensuke; Arai, Tetsuya; Ichihara, Shigeru; Nakano, Yasushi

    2014-01-01

    Introduction: The inability to read quickly can be a disadvantage throughout life. This study focused on the associations of braille reading fluency and individual factors, such as the age at onset of blindness and number of years reading braille, and the tactile sensitivity of people with early and late blindness. The relationship between reading…

  13. Thermal signature measurements for ammonium nitrate/fuel mixtures by laser heating

    International Nuclear Information System (INIS)

    Nazarian, Ashot; Presser, Cary

    2016-01-01

    Highlights: • LDTR is a useful diagnostic for characterizing AN/fuel mixture thermochemical behavior. • Each AN/fuel mixture thermal signature was different. • AN/fuel mixture signature features were defined by the individual constituents. • Baseline signatures changed after an experiment. - Abstract: Measurements were carried out to obtain thermal signatures of several ammonium nitrate/fuel (ANF) mixtures, using a laser-heating technique referred to as the laser-driven thermal reactor (LDTR). The mixtures were ammonium nitrate (AN)/kerosene, AN/ethylene glycol, AN/paraffin wax, AN/petroleum jelly, AN/confectioner's sugar, AN/cellulose (tissue paper), nitromethane/cellulose, nitrobenzene/cellulose, AN/cellulose/nitromethane, AN/cellulose/nitrobenzene. These mixtures were also compared with AN/nitromethane and AN/diesel fuel oil, obtained from an earlier investigation. Thermograms for the mixtures, as well as individual constituents, were compared to better understand how sample thermal signature changes with mixture composition. This is the first step in development of a thermal-signature database, to be used along with other signature databases, to improve identification of energetic substances of unknown composition. The results indicated that each individual thermal signature was associated unambiguously with a particular mixture composition. The signature features of a particular mixture were shaped by the individual constituent signatures. It was also uncovered that the baseline signature was modified after an experiment due to coating of unreacted residue on the substrate surface and a change in the reactor sphere oxide layer. Thus, care was required to pre-oxidize the sphere prior to an experiment. A minimum sample mass (which was dependent on composition) was required to detect the signature characteristics. Increased laser power served to magnify signal strength while preserving the signature features. For the mixtures examined, the thermal

  14. Cubic Bezier Curve Approach for Automated Offline Signature Verification with Intrusion Identification

    Directory of Open Access Journals (Sweden)

    Arun Vijayaragavan

    2014-01-01

    Full Text Available Authentication is a process of identifying person’s rights over a system. Many authentication types are used in various systems, wherein biometrics authentication systems are of a special concern. Signature verification is a basic biometric authentication technique used widely. The signature matching algorithm uses image correlation and graph matching technique which provides false rejection or acceptance. We proposed a model to compare knowledge from signature. Intrusion in the signature repository system results in copy of the signature that leads to false acceptance. Our approach uses a Bezier curve algorithm to identify the curve points and uses the behaviors of the signature for verification. An analyzing mobile agent is used to identify the input signature parameters and compare them with reference signature repository. It identifies duplication of signature over intrusion and rejects it. Experiments are conducted on a database with thousands of signature images from various sources and the results are favorable.

  15. 27 CFR 70.52 - Signature presumed authentic.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false Signature presumed authentic. 70.52 Section 70.52 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE... Collection of Excise and Special (Occupational) Tax Collection-General Provisions § 70.52 Signature presumed...

  16. 13 CFR 134.209 - Requirement of signature.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Requirement of signature. 134.209 Section 134.209 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION RULES OF PROCEDURE GOVERNING... of signature. Every written submission to OHA, other than evidence, must be signed by the party...

  17. Electronic Signature (eSig)

    Data.gov (United States)

    Department of Veterans Affairs — Beginning with the Government Paperwork Elimination Act of 1998 (GPEA), the Federal government has encouraged the use of electronic / digital signatures to enable...

  18. Radar Signature Calculation Facility

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: The calculation, analysis, and visualization of the spatially extended radar signatures of complex objects such as ships in a sea multipath environment and...

  19. Blindness and cataract in children in developing countries

    Directory of Open Access Journals (Sweden)

    Parikshit Gogate

    2009-03-01

    Full Text Available Blindness in children is considered a priority area for VISION 2020, as visually impaired children have a lifetime of blindness ahead of them. Various studies across the globe show that one-third to half of childhood blindness is either preventable or treatable1 and that cataract is the leading treatable cause of blindness in children.The 8th General Assembly of the International Agency for the Prevention of Blindness (IAPB provided an opportunity to be acquainted with recent research and programme development work in the prevention of childhood blindness.

  20. The brain signature of paracetamol in healthy volunteers: a double-blind randomized trial

    Directory of Open Access Journals (Sweden)

    Pickering G

    2015-07-01

    Full Text Available Gisèle Pickering,1–3 Adrian Kastler,4 Nicolas Macian,1,2 Bruno Pereira,5 Romain Valabrègue,6 Stéphane Lehericy,6 Louis Boyer,4,7 Claude Dubray,1–3 Betty Jean4 1CHU Clermont-Ferrand, Centre de Pharmacologie Clinique, 2Centre d’Investigation Clinique – Inserm 1405, 3Clermont Université, Laboratoire de Pharmacologie, Faculté de médecine, 4CHU Gabriel Montpied, Clermont-Ferrand, Service d’Imagerie Ostéo-articulaire thoracique et neurologique, 5CHU Clermont-Ferrand, Délégation Recherche Clinique et à l’Innovation, Clermont-Ferrand, France; 6Institut du Cerveau et de la Moelle epiniere – ICM, Centre de NeuroImagerie de Recherche CENIR, Inserm U1127, CNRS UMR 7225, Sorbonne Universités, UPMC University Paris, Paris, France, Department of Neuroradiology, Groupe Hospitalier Pitié-Salpêtrière, Paris, France; 7UMR CNRS UdA 6284, Clemont-Ferrand, France Background: Paracetamol’s (APAP mechanism of action suggests the implication of supraspinal structures but no neuroimaging study has been performed in humans.Methods and results: This randomized, double-blind, crossover, placebo-controlled trial in 17 healthy volunteers (NCT01562704 aimed to evaluate how APAP modulates pain-evoked functional magnetic resonance imaging signals. We used behavioral measures and functional magnetic resonance imaging to investigate the response to experimental thermal stimuli with APAP or placebo administration. Region-of-interest analysis revealed that activity in response to noxious stimulation diminished with APAP compared to placebo in prefrontal cortices, insula, thalami, anterior cingulate cortex, and periaqueductal gray matter.Conclusion: These findings suggest an inhibitory effect of APAP on spinothalamic tracts leading to a decreased activation of higher structures, and a top-down influence on descending inhibition. Further binding and connectivity studies are needed to evaluate how APAP modulates pain, especially in the context of repeated

  1. In blind pursuit of racial equality?

    Science.gov (United States)

    Apfelbaum, Evan P; Pauker, Kristin; Sommers, Samuel R; Ambady, Nalini

    2010-11-01

    Despite receiving little empirical assessment, the color-blind approach to managing diversity has become a leading institutional strategy for promoting racial equality, across domains and scales of practice. We gauged the utility of color blindness as a means to eliminating future racial inequity--its central objective--by assessing its impact on a sample of elementary-school students. Results demonstrated that students exposed to a color-blind mind-set, as opposed to a value-diversity mind-set, were actually less likely both to detect overt instances of racial discrimination and to describe such events in a manner that would prompt intervention by certified teachers. Institutional messages of color blindness may therefore artificially depress formal reporting of racial injustice. Color-blind messages may thus appear to function effectively on the surface even as they allow explicit forms of bias to persist.

  2. Visual impairment and blindness among the students of blind schools in Allahabad and its vicinity: A causal assessment.

    Science.gov (United States)

    Bhalerao, Sushank Ashok; Tandon, Mahesh; Singh, Satyaprakash; Dwivedi, Shraddha; Kumar, Santosh; Rana, Jagriti

    2015-03-01

    Information on eye diseases in blind school children in Allahabad is rare and sketchy. A cross-sectional study was performed to identify causes of blindness (BL) in blind school children with an aim to gather information on ocular morbidity in the blind schools in Allahabad and in its vicinity. A cross-sectional study was carried out in all the four blind schools in Allahabad and its vicinity. The students in the blind schools visited were included in the study and informed consents from parents were obtained. Relevant ocular history and basic ocular examinations were carried out on the students of the blind schools. A total of 90 students were examined in four schools of the blind in Allahabad and in the vicinity. The main causes of severe visual impairment and BL in the better eye of students were microphthalmos (34.44%), corneal scar (22.23%), anophthalmos (14.45%), pseudophakia (6.67%), optic nerve atrophy (6.67%), buphthalmos/glaucoma (3.33%), cryptophthalmos (2.22%), staphyloma (2.22%), cataract (2.22%), retinal dystrophy (2.22%), aphakia (1.11%), coloboma (1.11%), retinal detachment (1.11%), etc. Of these, 22 (24.44%) students had preventable causes of BL and another 12 (13.33%) students had treatable causes of BL. It was found that hereditary diseases, corneal scar, glaucoma and cataract were the prominent causes of BL among the students of blind schools. Almost 38% of the students had preventable or treatable causes, indicating the need of genetical counseling and focused intervention.

  3. Visual impairment and blindness among the students of blind schools in Allahabad and its vicinity: A causal assessment

    Directory of Open Access Journals (Sweden)

    Sushank Ashok Bhalerao

    2015-01-01

    Full Text Available Background/Aims: Information on eye diseases in blind school children in Allahabad is rare and sketchy. A cross-sectional study was performed to identify causes of blindness (BL in blind school children with an aim to gather information on ocular morbidity in the blind schools in Allahabad and in its vicinity. Study Design and Setting: A cross-sectional study was carried out in all the four blind schools in Allahabad and its vicinity. Materials and Methods: The students in the blind schools visited were included in the study and informed consents from parents were obtained. Relevant ocular history and basic ocular examinations were carried out on the students of the blind schools. Results: A total of 90 students were examined in four schools of the blind in Allahabad and in the vicinity. The main causes of severe visual impairment and BL in the better eye of students were microphthalmos (34.44%, corneal scar (22.23%, anophthalmos (14.45%, pseudophakia (6.67%, optic nerve atrophy (6.67%, buphthalmos/glaucoma (3.33%, cryptophthalmos (2.22%, staphyloma (2.22%, cataract (2.22%, retinal dystrophy (2.22%, aphakia (1.11%, coloboma (1.11%, retinal detachment (1.11%, etc. Of these, 22 (24.44% students had preventable causes of BL and another 12 (13.33% students had treatable causes of BL. Conclusion: It was found that hereditary diseases, corneal scar, glaucoma and cataract were the prominent causes of BL among the students of blind schools. Almost 38% of the students had preventable or treatable causes, indicating the need of genetical counseling and focused intervention.

  4. Uncertainty in hydrological signatures for gauged and ungauged catchments

    Science.gov (United States)

    Westerberg, Ida K.; Wagener, Thorsten; Coxon, Gemma; McMillan, Hilary K.; Castellarin, Attilio; Montanari, Alberto; Freer, Jim

    2016-03-01

    Reliable information about hydrological behavior is needed for water-resource management and scientific investigations. Hydrological signatures quantify catchment behavior as index values, and can be predicted for ungauged catchments using a regionalization procedure. The prediction reliability is affected by data uncertainties for the gauged catchments used in prediction and by uncertainties in the regionalization procedure. We quantified signature uncertainty stemming from discharge data uncertainty for 43 UK catchments and propagated these uncertainties in signature regionalization, while accounting for regionalization uncertainty with a weighted-pooling-group approach. Discharge uncertainty was estimated using Monte Carlo sampling of multiple feasible rating curves. For each sampled rating curve, a discharge time series was calculated and used in deriving the gauged signature uncertainty distribution. We found that the gauged uncertainty varied with signature type, local measurement conditions and catchment behavior, with the highest uncertainties (median relative uncertainty ±30-40% across all catchments) for signatures measuring high- and low-flow magnitude and dynamics. Our regionalization method allowed assessing the role and relative magnitudes of the gauged and regionalized uncertainty sources in shaping the signature uncertainty distributions predicted for catchments treated as ungauged. We found that (1) if the gauged uncertainties were neglected there was a clear risk of overconditioning the regionalization inference, e.g., by attributing catchment differences resulting from gauged uncertainty to differences in catchment behavior, and (2) uncertainty in the regionalization results was lower for signatures measuring flow distribution (e.g., mean flow) than flow dynamics (e.g., autocorrelation), and for average flows (and then high flows) compared to low flows.

  5. ADAGE signature analysis: differential expression analysis with data-defined gene sets.

    Science.gov (United States)

    Tan, Jie; Huyck, Matthew; Hu, Dongbo; Zelaya, René A; Hogan, Deborah A; Greene, Casey S

    2017-11-22

    Gene set enrichment analysis and overrepresentation analyses are commonly used methods to determine the biological processes affected by a differential expression experiment. This approach requires biologically relevant gene sets, which are currently curated manually, limiting their availability and accuracy in many organisms without extensively curated resources. New feature learning approaches can now be paired with existing data collections to directly extract functional gene sets from big data. Here we introduce a method to identify perturbed processes. In contrast with methods that use curated gene sets, this approach uses signatures extracted from public expression data. We first extract expression signatures from public data using ADAGE, a neural network-based feature extraction approach. We next identify signatures that are differentially active under a given treatment. Our results demonstrate that these signatures represent biological processes that are perturbed by the experiment. Because these signatures are directly learned from data without supervision, they can identify uncurated or novel biological processes. We implemented ADAGE signature analysis for the bacterial pathogen Pseudomonas aeruginosa. For the convenience of different user groups, we implemented both an R package (ADAGEpath) and a web server ( http://adage.greenelab.com ) to run these analyses. Both are open-source to allow easy expansion to other organisms or signature generation methods. We applied ADAGE signature analysis to an example dataset in which wild-type and ∆anr mutant cells were grown as biofilms on the Cystic Fibrosis genotype bronchial epithelial cells. We mapped active signatures in the dataset to KEGG pathways and compared with pathways identified using GSEA. The two approaches generally return consistent results; however, ADAGE signature analysis also identified a signature that revealed the molecularly supported link between the MexT regulon and Anr. We designed

  6. A security and privacy preserving e-prescription system based on smart cards.

    Science.gov (United States)

    Hsu, Chien-Lung; Lu, Chung-Fu

    2012-12-01

    In 2002, Ateniese and Medeiros proposed an e-prescription system, in which the patient can store e-prescription and related information using smart card. Latter, Yang et al. proposed a novel smart-card based e-prescription system based on Ateniese and Medeiros's system in 2004. Yang et al. considered the privacy issues of prescription data and adopted the concept of a group signature to provide patient's privacy protection. To make the e-prescription system more realistic, they further applied a proxy signature to allow a patient to delegate his signing capability to other people. This paper proposed a novel security and privacy preserving e-prescription system model based on smart cards. A new role, chemist, is included in the system model for settling the medicine dispute. We further presented a concrete identity-based (ID-based) group signature scheme and an ID-based proxy signature scheme to realize the proposed model. Main property of an ID-based system is that public key is simple user's identity and can be verified without extra public key certificates. Our ID-based group signature scheme can allow doctors to sign e-prescription anonymously. In a case of a medical dispute, identities of the doctors can be identified. The proposed ID-based proxy signature scheme can improve signing delegation and allows a delegation chain. The proposed e-prescription system based on our proposed two cryptographic schemes is more practical and efficient than Yang et al.'s system in terms of security, communication overheads, computational costs, practical considerations.

  7. Future trends in global blindness

    Directory of Open Access Journals (Sweden)

    Serge Resnikoff

    2012-01-01

    Full Text Available The objective of this review is to discuss the available data on the prevalence and causes of global blindness, and some of the associated trends and limitations seen. A literature search was conducted using the terms "global AND blindness" and "global AND vision AND impairment", resulting in seven appropriate articles for this review. Since 1990 the estimate of global prevalence of blindness has gradually decreased when considering the best corrected visual acuity definition: 0.71% in 1990, 0.59% in 2002, and 0.55% in 2010, corresponding to a 0.73% reduction per year over the 2002-2010 period. Significant limitations were found in the comparability between the global estimates in prevalence or causes of blindness or visual impairment. These limitations arise from various factors such as uncertainties about the true cause of the impairment, the use of different definitions and methods, and the absence of data from a number of geographical areas, leading to various extrapolation methods, which in turn seriously limit comparability. Seminal to this discussion on limitations in the comparability of studies and data, is that blindness has historically been defined using best corrected visual acuity.

  8. Advanced Missile Signature Center

    Data.gov (United States)

    Federal Laboratory Consortium — The Advanced Missile Signature Center (AMSC) is a national facility supporting the Missile Defense Agency (MDA) and other DoD programs and customers with analysis,...

  9. Understanding the milk-to-feed price ratio as a proxy for dairy farm profitability.

    Science.gov (United States)

    Wolf, C A

    2010-10-01

    This research examines the definition, historical pattern, and utility of the milk-to-feed price ratio (MF) as a measure of dairy farm profitability. The MF was generally an acceptable proxy of profitability in an annual sense from 1985 to 2006. The MF was steady at an average of 2.8 from 1985 to 2006 even as average annual milk price in nominal terms increased from $12 to $14/hundredweight. An alternative proxy for profitability is income over feed costs, which is measured in dollars per hundredweight. Comparison with an actual profit measure, rate of return on assets, is used to examine the appropriateness of the proxies. The volatility from 2007 to 2009 resulted in MF being a poor measure of profitability over that period. The implication is that MF is not the preferred measure of profitability when a significant change in the pattern of one or both price series occurs. Income over feed cost is a better measure of profitability in periods of volatility. Copyright © 2010 American Dairy Science Association. Published by Elsevier Inc. All rights reserved.

  10. 25 CFR 117.33 - Signature of illiterates.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Signature of illiterates. 117.33 Section 117.33 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR FINANCIAL ACTIVITIES DEPOSIT AND EXPENDITURE OF... Signature of illiterates. An Indian who cannot write shall be required to endorse checks payable to his...

  11. 12 CFR 350.6 - Signature and attestation.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Signature and attestation. 350.6 Section 350.6 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY DISCLOSURE OF FINANCIAL AND OTHER INFORMATION BY FDIC-INSURED STATE NONMEMBER BANKS § 350.6 Signature and...

  12. Quantum dual signature scheme based on coherent states with entanglement swapping

    International Nuclear Information System (INIS)

    Liu Jia-Li; Shi Rong-Hua; Shi Jin-Jing; Lv Ge-Li; Guo Ying

    2016-01-01

    A novel quantum dual signature scheme, which combines two signed messages expected to be sent to two diverse receivers Bob and Charlie, is designed by applying entanglement swapping with coherent states. The signatory Alice signs two different messages with unitary operations (corresponding to the secret keys) and applies entanglement swapping to generate a quantum dual signature. The dual signature is firstly sent to the verifier Bob who extracts and verifies the signature of one message and transmits the rest of the dual signature to the verifier Charlie who verifies the signature of the other message. The transmission of the dual signature is realized with quantum teleportation of coherent states. The analysis shows that the security of secret keys and the security criteria of the signature protocol can be greatly guaranteed. An extensional multi-party quantum dual signature scheme which considers the case with more than three participants is also proposed in this paper and this scheme can remain secure. The proposed schemes are completely suited for the quantum communication network including multiple participants and can be applied to the e-commerce system which requires a secure payment among the customer, business and bank. (paper)

  13. Real-Time Capable Micro-Doppler Signature Decomposition of Walking Human Limbs

    OpenAIRE

    Abdulatif, Sherif; Aziz, Fady; Kleiner, Bernhard; Schneider, Urs

    2017-01-01

    Unique micro-Doppler signature ($\\boldsymbol{\\mu}$-D) of a human body motion can be analyzed as the superposition of different body parts $\\boldsymbol{\\mu}$-D signatures. Extraction of human limbs $\\boldsymbol{\\mu}$-D signatures in real-time can be used to detect, classify and track human motion especially for safety application. In this paper, two methods are combined to simulate $\\boldsymbol{\\mu}$-D signatures of a walking human. Furthermore, a novel limbs $\\mu$-D signature time independent...

  14. Research on Signature Verification Method Based on Discrete Fréchet Distance

    Science.gov (United States)

    Fang, J. L.; Wu, W.

    2018-05-01

    This paper proposes a multi-feature signature template based on discrete Fréchet distance, which breaks through the limitation of traditional signature authentication using a single signature feature. It solves the online handwritten signature authentication signature global feature template extraction calculation workload, signature feature selection unreasonable problem. In this experiment, the false recognition rate (FAR) and false rejection rate (FRR) of the statistical signature are calculated and the average equal error rate (AEER) is calculated. The feasibility of the combined template scheme is verified by comparing the average equal error rate of the combination template and the original template.

  15. 17 CFR 201.153 - Filing of papers: Signature requirement and effect.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Filing of papers: Signature... COMMISSION RULES OF PRACTICE Rules of Practice General Rules § 201.153 Filing of papers: Signature... telephone number on every filing. (b) Effect of signature. (1) The signature of a counsel or party shall...

  16. A Secure and Efficient Certificateless Short Signature Scheme

    Directory of Open Access Journals (Sweden)

    Lin Cheng

    2013-07-01

    Full Text Available Certificateless public key cryptography combines advantage of traditional public key cryptography and identity-based public key cryptography as it avoids usage of certificates and resolves the key escrow problem. In 2007, Huang et al. classified adversaries against certificateless signatures according to their attack power into normal, strong and super adversaries (ordered by their attack power. In this paper, we propose a new certificateless short signature scheme and prove that it is secure against both of the super type I and the super type II adversaries. Our new scheme not only achieves the strongest security level but also has the shortest signature length (one group element. Compared with the other short certificateless signature schemes which have a similar security level, our new scheme has less operation cost.

  17. Causes of visual impairment and blindness in children at Instituto Benjamin Constant Blind School, Rio de Janeiro

    Directory of Open Access Journals (Sweden)

    Daniela da Silva Verzoni

    Full Text Available Abstract Objective: To determine the main causes of visual impairment and blindness in children enrolled at Instituto Benjamin Constant blind school (IBC in 2013, to aid in planning for the prevention and management of avoidable causes of blindness. Methods: Study design: cross-sectional observational study. Data was collected from medical records of students attending IBC in 2013. Causes of blindness were classified according to WHO/PBL examination record. Data were analyzed for those children aged less than 16 years using Stata 9 program. Results: Among 355 students attending IBC in 2013, 253 (73% were included in this study. Of these children, 190 (75% were blind and 63 (25% visually impaired. The major anatomical site of visual loss was retina (42%, followed by lesions of the globe (22%, optic nerve lesions (13.8%, central nervous system (8.8% and cataract/pseudophakia/aphakia (8.8%. The etiology was unknown in 41.9% and neonatal factors accounted for 30,9% of cases. Forty-eight percent of cases were potentially avoidable. Retinopathy of prematurity (ROP was the main cause of blindness and with microphthalmia, optic nerve atrophy, cataract and glaucoma accounted for more than 50% of cases. Conclusion: Provision and improvement of ROP, cataract and glaucoma screening and treatment and programs could prevent avoidable visual impairment and blindness.

  18. Investigating the consistency between proxy-based reconstructions and climate models using data assimilation: a mid-Holocene case study

    NARCIS (Netherlands)

    A. Mairesse; H. Goosse; P. Mathiot; H. Wanner; S. Dubinkina (Svetlana)

    2013-01-01

    htmlabstractThe mid-Holocene (6 kyr BP; thousand years before present) is a key period to study the consistency between model results and proxy-based reconstruction data as it corresponds to a standard test for models and a reasonable number of proxy-based records is available. Taking advantage of

  19. Using paleoclimate proxy-data to select an optimal realisation in an ensemble of simulations of the past millennium.

    NARCIS (Netherlands)

    Goosse, H.; Renssen, H.; Timmermann, A.; Bradley, R.S.; Mann, M.E.

    2006-01-01

    We present and describe in detail the advantages and limitations of a technique that combines in an optimal way model results and proxy-data time series in order to obtain states of the climate system consistent with model physics, reconstruction of past radiative forcing and proxy records. To

  20. Choice blindness in financial decision making

    Directory of Open Access Journals (Sweden)

    Owen McLaughlin

    2013-09-01

    Full Text Available Choice Blindness is an experimental paradigm that examines the interplay between individuals' preferences, decisions, and expectations by manipulating the relationship between intention and choice. This paper expands upon the existing Choice Blindness framework by investigating the presence of the effect in an economically significant decision context, specifically that of pension choice. In addition, it investigates a number of secondary factors hypothesized to modulate Choice Blindness, including reaction time, risk preference, and decision complexity, as well as analysing the verbal reports of non-detecting participants. The experiment was administered to 100 participants of mixed age and educational attainment. The principal finding was that no more than 37.2% of manipulated trials were detected over all conditions, a result consistent with previous Choice Blindness research. Analysis of secondary factors found that reaction time, financial sophistication and decision complexity were significant predictors of Choice Blindness detection, while content analysis of non-detecting participant responses found that 20% implied significant preference changes and 62% adhered to initial preferences. Implications of the Choice Blindness effect in the context of behavioural economics are discussed, and an agenda for further investigation of the paradigm in this context is outlined.

  1. Sad Facial Expressions Increase Choice Blindness.

    Science.gov (United States)

    Wang, Yajie; Zhao, Song; Zhang, Zhijie; Feng, Wenfeng

    2017-01-01

    Previous studies have discovered a fascinating phenomenon known as choice blindness-individuals fail to detect mismatches between the face they choose and the face replaced by the experimenter. Although previous studies have reported a couple of factors that can modulate the magnitude of choice blindness, the potential effect of facial expression on choice blindness has not yet been explored. Using faces with sad and neutral expressions (Experiment 1) and faces with happy and neutral expressions (Experiment 2) in the classic choice blindness paradigm, the present study investigated the effects of facial expressions on choice blindness. The results showed that the detection rate was significantly lower on sad faces than neutral faces, whereas no significant difference was observed between happy faces and neutral faces. The exploratory analysis of verbal reports found that participants who reported less facial features for sad (as compared to neutral) expressions also tended to show a lower detection rate of sad (as compared to neutral) faces. These findings indicated that sad facial expressions increased choice blindness, which might have resulted from inhibition of further processing of the detailed facial features by the less attractive sad expressions (as compared to neutral expressions).

  2. Testing Children for Color Blindness

    Science.gov (United States)

    ... Stories Español Eye Health / News Testing Children for Color Blindness Leer en Español: Pruebas para Detectar Daltonismo en ... study shows that kids can be tested for color blindness as soon as age 4, finds Caucasian boys ...

  3. Blind Braille readers mislocate tactile stimuli.

    Science.gov (United States)

    Sterr, Annette; Green, Lisa; Elbert, Thomas

    2003-05-01

    In a previous experiment, we observed that blind Braille readers produce errors when asked to identify on which finger of one hand a light tactile stimulus had occurred. With the present study, we aimed to specify the characteristics of this perceptual error in blind and sighted participants. The experiment confirmed that blind Braille readers mislocalised tactile stimuli more often than sighted controls, and that the localisation errors occurred significantly more often at the right reading hand than at the non-reading hand. Most importantly, we discovered that the reading fingers showed the smallest error frequency, but the highest rate of stimulus attribution. The dissociation of perceiving and locating tactile stimuli in the blind suggests altered tactile information processing. Neuroplasticity, changes in tactile attention mechanisms as well as the idea that blind persons may employ different strategies for tactile exploration and object localisation are discussed as possible explanations for the results obtained.

  4. User-centered Technologies For Blind Children

    Directory of Open Access Journals (Sweden)

    Jaime Sánchez

    2008-01-01

    Full Text Available The purpose of this paper is to review, summarize, and illustrate research work involving four audio-based games created within a user-centered design methodology through successive usability tasks and evaluations. These games were designed by considering the mental model of blind children and their styles of interaction to perceive and process data and information. The goal of these games was to enhance the cognitive development of spatial structures, memory, haptic perception, mathematical skills, navigation and orientation, and problem solving of blind children. Findings indicate significant improvements in learning and cognition from using audio-based tools specially tailored for the blind. That is, technologies for blind children, carefully tailored through user-centered design approaches, can make a significant contribution to cognitive development of these children. This paper contributes new insight into the design and implementation of audio-based virtual environments to facilitate learning and cognition in blind children.

  5. ANALYSIS OF DIGITAL SIGNATURE RULE IN THE ELECTRONIC COMMERCE LAW OF INDONESIA

    Directory of Open Access Journals (Sweden)

    Irna Nurhayati

    2015-02-01

    Full Text Available The Indonesian legislature has enacted the Information and Electronic Transaction Bill (the Bill in 2003, in which digital signature as a technology specific electronic (e commerce has been promoted. The promotion of digital signature is still problematic, since there is an uncertainty whether Indonesia can develop well a required viable technology of digital signature. Moreover, there is a gap between the actual use of digital signature and the projections of future utilization of digital signature by interested parties on e-commerce. This paper will discuss the reason of the Indonesian legislature promotes digital signature. It will then analyse the gap between the actual use of digital signature and the projections of future utilization of digital signature by interested parties on e-commerce. This paper will finally argue whether the promotion of digital signature of the Bill is useful for the growth of e-commerce in Indonesia.

  6. 12 CFR 18.6 - Signature and attestation.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Signature and attestation. 18.6 Section 18.6 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY DISCLOSURE OF FINANCIAL AND OTHER INFORMATION BY NATIONAL BANKS § 18.6 Signature and attestation. A duly authorized officer of the...

  7. Does Social Work Have a Signature Pedagogy?

    Science.gov (United States)

    Earls Larrison, Tara; Korr, Wynne S.

    2013-01-01

    This article contributes to discourse on signature pedagogy by reconceptualizing how our pedagogies are understood and defined for social work education. We critique the view that field education is social work's signature pedagogy and consider what pedagogies are distinct about the teaching and learning of social work. Using Shulman's…

  8. What It's Like to Be Color Blind

    Science.gov (United States)

    ... a green leaf might look tan or gray. Color Blindness Is Passed Down Color blindness is almost always an inherited (say: in-HER- ... Eye doctors (and some school nurses) test for color blindness by showing a picture made up of different ...

  9. Linking coral river runoff proxies with climate variability, hydrology and land-use in Madagascar catchments.

    Science.gov (United States)

    Maina, Joseph; de Moel, Hans; Vermaat, Jan E; Bruggemann, J Henrich; Guillaume, Mireille M M; Grove, Craig A; Madin, Joshua S; Mertz-Kraus, Regina; Zinke, Jens

    2012-10-01

    Understanding the linkages between coastal watersheds and adjacent coral reefs is expected to lead to better coral reef conservation strategies. Our study aims to examine the main predictors of environmental proxies recorded in near shore corals and therefore how linked near shore reefs are to the catchment physical processes. To achieve these, we developed models to simulate hydrology of two watersheds in Madagascar. We examined relationships between environmental proxies derived from massive Porites spp. coral cores (spectral luminescence and barium/calcium ratios), and corresponding time-series (1950-2006) data of hydrology, climate, land use and human population growth. Results suggest regional differences in the main environmental drivers of reef sedimentation: on annual time-scales, precipitation, river flow and sediment load explained the variability in coral proxies of river discharge for the northeast region, while El Niño-Southern Oscillation (ENSO) and temperature (air and sea surface) were the best predictors in the southwest region. Copyright © 2012 Elsevier Ltd. All rights reserved.

  10. Tracking variable sedimentation rates in orbitally forced paleoclimate proxy series

    Science.gov (United States)

    Li, M.; Kump, L. R.; Hinnov, L.

    2017-12-01

    This study addresses two fundamental issues in cyclostratigraphy: quantitative testing of orbital forcing in cyclic sedimentary sequences and tracking variable sedimentation rates. The methodology proposed here addresses these issues as an inverse problem, and estimates the product-moment correlation coefficient between the frequency spectra of orbital solutions and paleoclimate proxy series over a range of "test" sedimentation rates. It is inspired by the ASM method (1). The number of orbital parameters involved in the estimation is also considered. The method relies on the hypothesis that orbital forcing had a significant impact on the paleoclimate proxy variations, and thus is also tested. The null hypothesis of no astronomical forcing is evaluated using the Beta distribution, for which the shape parameters are estimated using a Monte Carlo simulation approach. We introduce a metric to estimate the most likely sedimentation rate using the product-moment correlation coefficient, H0 significance level, and the number of contributing orbital parameters, i.e., the CHO value. The CHO metric is applied with a sliding window to track variable sedimentation rates along the paleoclimate proxy series. Two forward models with uniform and variable sedimentation rates are evaluated to demonstrate the robustness of the method. The CHO method is applied to the classical Late Triassic Newark depth rank series; the estimated sedimentation rates match closely with previously published sedimentation rates and provide a more highly time-resolved estimate (2,3). References: (1) Meyers, S.R., Sageman, B.B., Amer. J. Sci., 307, 773-792, 2007; (2) Kent, D.V., Olsen, P.E., Muttoni, G., Earth-Sci. Rev.166, 153-180, 2017; (3) Li, M., Zhang, Y., Huang, C., Ogg, J., Hinnov, L., Wang, Y., Zou, Z., Li, L., 2017. Earth Plant. Sc. Lett. doi:10.1016/j.epsl.2017.07.015

  11. What do colour-blind people really see?

    NARCIS (Netherlands)

    Hogervorst, M.A.; Alferdinck, J.W.A.M.

    2008-01-01

    Problem: colour perception of dichromats (colour-blind persons) Background: Various models have been proposed (e. g. Walraven & Alferdinck, 1997; Brettel et al. , 1997) to model reduced colour vision of colour-blind people. It is clear that colour-blind people cannot distinguish certain object

  12. PROXiMATE: a database of mutant protein-protein complex thermodynamics and kinetics.

    Science.gov (United States)

    Jemimah, Sherlyn; Yugandhar, K; Michael Gromiha, M

    2017-09-01

    We have developed PROXiMATE, a database of thermodynamic data for more than 6000 missense mutations in 174 heterodimeric protein-protein complexes, supplemented with interaction network data from STRING database, solvent accessibility, sequence, structural and functional information, experimental conditions and literature information. Additional features include complex structure visualization, search and display options, download options and a provision for users to upload their data. The database is freely available at http://www.iitm.ac.in/bioinfo/PROXiMATE/ . The website is implemented in Python, and supports recent versions of major browsers such as IE10, Firefox, Chrome and Opera. gromiha@iitm.ac.in. Supplementary data are available at Bioinformatics online. © The Author (2017). Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  13. The Pedagogic Signature of the Teaching Profession

    Science.gov (United States)

    Kiel, Ewald; Lerche, Thomas; Kollmannsberger, Markus; Oubaid, Viktor; Weiss, Sabine

    2016-01-01

    Lee S. Shulman deplores that the field of education as a profession does not have a pedagogic signature, which he characterizes as a synthesis of cognitive, practical and moral apprenticeship. In this context, the following study has three goals: 1) In the first theoretical part, the basic problems of constructing a pedagogic signature are…

  14. Causes of childhood blindness in Ghana: results from a blind school survey in Upper West Region, Ghana, and review of the literature.

    Science.gov (United States)

    Huh, Grace J; Simon, Judith; Grace Prakalapakorn, S

    2017-06-13

    Data on childhood blindness in Ghana are limited. The objectives of this study were to determine the major causes of childhood blindness and severe visual impairment (SVI) at Wa Methodist School for the Blind in Northern Ghana, and to compare our results to those published from other studies conducted in Ghana. In this retrospective study, data from an eye screening at Wa Methodist School in November 2014 were coded according to the World Health Organization/Prevention of Blindness standardized reporting methodology. Causes of blindness/SVI were categorized anatomically and etiologically, and were compared to previously published studies. Of 190 students screened, the major anatomical causes of blindness/SVI were corneal scar/phthisis bulbi (CS/PB) (n = 28, 15%) and optic atrophy (n = 23, 12%). The major etiological causes of blindness/SVI were unknown (n = 114, 60%). Eighty-three (44%) students became blind before age one year. Of four published blind school surveys conducted in Ghana, CS/PB was the most common anatomical cause of childhood blindness. Over time, the prevalence of CS/PB within blind schools decreased in the north and increased in the south. Measles-associated visual loss decreased from 52% in 1987 to 10% in 2014 at Wa Methodist School. In a blind school in northern Ghana, CS/PB was the major anatomical cause of childhood blindness/SVI. While CS/PB has been the most common anatomical cause of childhood blindness reported in Ghana, there may be regional changes in its prevalence over time. Being able to identify regional differences may guide future public health strategies to target specific causes.

  15. Efficient Fair Exchange from Identity-Based Signature

    Science.gov (United States)

    Yum, Dae Hyun; Lee, Pil Joong

    A fair exchange scheme is a protocol by which two parties Alice and Bob exchange items or services without allowing either party to gain advantages by quitting prematurely or otherwise misbehaving. To this end, modern cryptographic solutions use a semi-trusted arbitrator who involves only in cases where one party attempts to cheat or simply crashes. We call such a fair exchange scheme optimistic. When no registration is required between the signer and the arbitrator, we say that the fair exchange scheme is setup free. To date, the setup-free optimist fair exchange scheme under the standard RSA assumption was only possible from the generic construction of [12], which uses ring signatures. In this paper, we introduce a new setup-free optimistic fair exchange scheme under the standard RSA assumption. Our scheme uses the GQ identity-based signature and is more efficient than [12]. The construction can also be generalized by using various identity-based signature schemes. Our main technique is to allow each user to choose his (or her) own “random” public key in the identitybased signature scheme.

  16. Analysis of Non-contact Acousto Thermal Signature Data (Postprint)

    Science.gov (United States)

    2016-02-01

    AFRL-RX-WP-JA-2016-0321 ANALYSIS OF NON-CONTACT ACOUSTO-THERMAL SIGNATURE DATA (POSTPRINT) Amanda K. Criner AFRL/RX...October 2014 – 16 September 2015 4. TITLE AND SUBTITLE ANALYSIS OF NON-CONTACT ACOUSTO-THERMAL SIGNATURE DATA (POSTPRINT) 5a. CONTRACT NUMBER...words) The non-contact acousto-thermal signature (NCATS) is a nondestructive evaluation technique with potential to detect fatigue in materials such as

  17. Automated defect spatial signature analysis for semiconductor manufacturing process

    Science.gov (United States)

    Tobin, Jr., Kenneth W.; Gleason, Shaun S.; Karnowski, Thomas P.; Sari-Sarraf, Hamed

    1999-01-01

    An apparatus and method for performing automated defect spatial signature alysis on a data set representing defect coordinates and wafer processing information includes categorizing data from the data set into a plurality of high level categories, classifying the categorized data contained in each high level category into user-labeled signature events, and correlating the categorized, classified signature events to a present or incipient anomalous process condition.

  18. Bridging the spectral divide: a case study with PAGES2k, the CESM Last Millennium Ensemble and proxy system models

    Science.gov (United States)

    Zhu, F.; Emile-Geay, J.; Ault, T.; McKay, N.; Dee, S.

    2017-12-01

    A grand challenge for paleoclimatology is to constrain climate model behavior on timescales longer than the instrumental record. Of particular interest is the spectrum of temperature as sensed by climate proxies. The "continuum" of climate variability [Huybers & Curry, Nature 2006] is often characterized by its scaling exponent β , where the spectral density S and the frequency f satisfy the power law S ∝ f-β . Recent studies have voiced concern that climate models underestimate scaling behavior compared to proxies [Laepple & Huybers, PNAS 2014]. Part of this discrepancy is known to lie in the complex processes whereby proxies transform climate signals [Dee et al, EPSL in press], yet many questions remain open. Here we leverage a recent multiproxy compilation [PAGES 2k Consortium, Sci Data 2017] to characterize scaling behavior over the Common Era using an interpolation-free method [Kirchner & Neal, PNAS 2013]. Proxy spectra are compared to spectra derived from the CESM Last Millennium Ensemble [Otto-Bliesner et al, BAMS 2016], using: (a) a naive model where proxies are assumed linearly related to annual temperature vs (b) proxy system models [Evans et al, QSR 2013] of varying complexity. Scaling behavior varies considerably by archive: on average the strongest centennial slopes are observed for lake sediments (β =1.2), while the smallest are observed for glacier ice (β =0.24). Results confirm that the CESM Last Millennium simulation (LM) exhibits decadal-centennial scaling closer to proxy spectra than the pre-industrial control run (PI): the latter shows a "blue" spectrum (β 0), suggesting that forcings are essential to reduce the spectral divide. Yet, even with forcings, LM spectra are flatter than the proxy spectra. Subsequent work will investigate the roles of seasonal sensitivity (trees, foraminifera, alkenones), multivariate influences (corals, trees), detrending (trees) and post-depositional processes (ice cores, lake & marine sediments) on spectral

  19. Blindness causes analysis of 1854 hospitalized patients in Xinjiang

    Directory of Open Access Journals (Sweden)

    Tian-Zuo Wang

    2015-01-01

    Full Text Available AIM: To analyze the blindness causes of 1854 cases in our hospital hospitalized patients, and explore the strategy and direction of blindness prevention according to the different treatment efficacy.METHODS: Cluster sampling was used to select from September 2010 to August 2013 in our hospital department of ophthalmology patients 5 473 cases, in which total of 1 854 cases of blind patients, accounting for 33.88% of hospitalized patients. According to the WHO's criteria of blindness. The BCVA enacted RESULTS: In 1 854 cases of blind patients, including 728 people right-eye blinding, 767 people left-eyes blinding, 359 people total blinding, adding up to 2 213 eyes, aged from 60~80 years old were in the majority. The top three diseases resulting blindness were cataract, diabetic retinopathy and glaucoma. In 2 213 blind eyes, the eyes treated were 2 172, of which 1 762 eyes(81.12%were succeeded, 410 eyes(18.88%failed. In the failed cases, the first three diseases were diabetic retinopathy, glaucoma and retinal detachment. CONCLUSION: In recent years, disease etiology of blinding eye has changed, but cataracts, diabetic retinopathy and glaucoma are still high incidence of blindness due, so the treatment of diabetic retinopathy, glaucoma and retinal detachment should be the emphasis for blindness prevention and treatment in the future.

  20. Tactile spatial resolution in blind braille readers.

    Science.gov (United States)

    Van Boven, R W; Hamilton, R H; Kauffman, T; Keenan, J P; Pascual-Leone, A

    2000-06-27

    To determine if blind people have heightened tactile spatial acuity. Recently, studies using magnetic source imaging and somatosensory evoked potentials have shown that the cortical representation of the reading fingers of blind Braille readers is expanded compared to that of fingers of sighted subjects. Furthermore, the visual cortex is activated during certain tactile tasks in blind subjects but not sighted subjects. The authors hypothesized that the expanded cortical representation of fingers used in Braille reading may reflect an enhanced fidelity in the neural transmission of spatial details of a stimulus. If so, the quantitative limit of spatial acuity would be superior in blind people. The authors employed a grating orientation discrimination task in which threshold performance is accounted for by the spatial resolution limits of the neural image evoked by a stimulus. The authors quantified the psychophysical limits of spatial acuity at the middle and index fingers of 15 blind Braille readers and 15 sighted control subjects. The mean grating orientation threshold was significantly (p = 0.03) lower in the blind group (1.04 mm) compared to the sighted group (1.46 mm). The self-reported dominant reading finger in blind subjects had a mean grating orientation threshold of 0.80 mm, which was significantly better than other fingers tested. Thresholds at non-Braille reading fingers in blind subjects averaged 1.12 mm, which were also superior to sighted subjects' performances. Superior tactile spatial acuity in blind Braille readers may represent an adaptive, behavioral correlate of cortical plasticity.

  1. Epidemiology of blindness in children.

    Science.gov (United States)

    Solebo, Ameenat Lola; Teoh, Lucinda; Rahi, Jugnoo

    2017-09-01

    An estimated 14 million of the world's children are blind. A blind child is more likely to live in socioeconomic deprivation, to be more frequently hospitalised during childhood and to die in childhood than a child not living with blindness. This update of a previous review on childhood visual impairment focuses on emerging therapies for children with severe visual disability (severe visual impairment and blindness or SVI/BL).For children in higher income countries, cerebral visual impairment and optic nerve anomalies remain the most common causes of SVI/BL, while retinopathy of prematurity (ROP) and cataract are now the most common avoidable causes. The constellation of causes of childhood blindness in lower income settings is shifting from infective and nutritional corneal opacities and congenital anomalies to more resemble the patterns seen in higher income settings. Improvements in maternal and neonatal health and investment in and maintenance of national ophthalmic care infrastructure are the key to reducing the burden of avoidable blindness. New therapeutic targets are emerging for childhood visual disorders, although the safety and efficacy of novel therapies for diseases such as ROP or retinal dystrophies are not yet clear. Population-based epidemiological research, particularly on cerebral visual impairment and optic nerve hypoplasia, is needed in order to improve understanding of risk factors and to inform and support the development of novel therapies for disorders currently considered 'untreatable'. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  2. Blind topological measurement-based quantum computation.

    Science.gov (United States)

    Morimae, Tomoyuki; Fujii, Keisuke

    2012-01-01

    Blind quantum computation is a novel secure quantum-computing protocol that enables Alice, who does not have sufficient quantum technology at her disposal, to delegate her quantum computation to Bob, who has a fully fledged quantum computer, in such a way that Bob cannot learn anything about Alice's input, output and algorithm. A recent proof-of-principle experiment demonstrating blind quantum computation in an optical system has raised new challenges regarding the scalability of blind quantum computation in realistic noisy conditions. Here we show that fault-tolerant blind quantum computation is possible in a topologically protected manner using the Raussendorf-Harrington-Goyal scheme. The error threshold of our scheme is 4.3 × 10(-3), which is comparable to that (7.5 × 10(-3)) of non-blind topological quantum computation. As the error per gate of the order 10(-3) was already achieved in some experimental systems, our result implies that secure cloud quantum computation is within reach.

  3. [Frequency and causes of blindness and visual impairment in schools for the blind in Yaoundé (Cameroon)].

    Science.gov (United States)

    Noche, Christelle Domngang; Bella, Assumpta Lucienne

    2010-01-01

    To determine the causes of blindness and visual impairment in students attending schools for the blind in Yaounde (Cameroon) and to estimate their frequencies. This study examined all 56 students at three schools for the blind in Yaoundé from September 15 through October 15, 2006. We collected data about their age, sex, medical and surgical history. Visual acuity was measured to determine their vision status according to the World Health Organization categories for blindness and visual impairment. All subjects underwent an ocular examination. Epi Info 3.5.1. was used for the statistical analysis of age, sex, visual acuity, causes of blindness and visual impairment, and etiologies. Fifty six people were examined: 37 men (66.1%) and 19 women (33.9%). Their mean age was 21.57 ± 10.53 years (min-max: 5-49), and 48.2% were in the 10-19 years age group (n = 27). In all, 87.5% were blind, 7.14% severely visually impaired, and 1.78% moderately visually impaired. The main causes of blindness and visual impairment in our sample were corneal disease (32.14%), optic nerve lesions (26.78%), cataract and its surgical complications (19.64%), retinal disorders (10.71%), glaucoma (8.92%, and malformations of the eyeball (1.78%). Their etiologies included congenital cataracts (19.64%), meningitis/fever (8.92%), glaucoma (7.14%), measles (5.35%), ocular trauma (5.35%), albinism (3.57%), Lyell syndrome (1.8%), and alcohol ingestion (1.8%). Etiology was unknown in 46.42%. Fifty per cent of these causes of blindness and visual impairment were treatable and/or preventable. Corneal lesions were the main cause of blindness and visual impairment in our sample. Fifty per cent of the causes found were treatable and/or preventable. Thus, substantial efforts are required to ensure access to better quality specialist ocular care. Furthermore, local authorities should create more centers specialised in the rehabilitation of the visual handicapped.

  4. Blind Signal Classification via Spare Coding

    Science.gov (United States)

    2016-04-10

    Blind Signal Classification via Sparse Coding Youngjune Gwon MIT Lincoln Laboratory gyj@ll.mit.edu Siamak Dastangoo MIT Lincoln Laboratory sia...achieve blind signal classification with no prior knowledge about signals (e.g., MCS, pulse shaping) in an arbitrary RF channel. Since modulated RF...classification method. Our results indicate that we can separate different classes of digitally modulated signals from blind sampling with 70.3% recall and 24.6

  5. Environment and Blindness Situation in Iran

    Directory of Open Access Journals (Sweden)

    Soraya Askari

    2010-04-01

    Full Text Available Objectives: The purpose of this study is to describe the experiences of adults with acquired blindness while performing the daily activities of normal life and to investigated the role of environmental factors in this process. Methods: A qualitative phenomenological method has been designed for this study. A sample of 22 adults with acquired blindness who were blind for more than 5 years of life were purposefully selected and semi-structured in-depth interviews were conducted with them. The interviews were transcribed verbatim, coded and analyzed using van Manen’s method. Results: The five clustered themes that emerged from the interviews included: 1 Products and technology-discusses the benefits and drawbacks of using advanced technology to promote independence, 2 Physical environment-“The streets are like an obstacle course”, 3 Support and relationships-refers to the assistance that blind people receive from family, friends, and society, 4 Attitudes-includes family and social attitudes toward blind people, 5 Services and policies-social security, supportive acts, economic factors, educational problems and providing services. Discusion: Findings identify how the daily living activities of blind people are affected by environmental factors and what those factors are. The results will enable occupational therapists and other health care professionals who are involved with blind people to become more competent during assessment, counseling, teaching, giving support, or other interventions as needed to assist blind people. Recommendations for further research include more studies of this population to identify other challenges over time. This would facilitate long-term goals in the care. Studies that include more diversity in demographic characteristics would provide greater generalization. Some characteristics such as adolescent age group, married and single, ethnicity, and socioeconomic status are particularly important to target.

  6. Rare earth element composition of Paleogene vertebrate fossils from Toadstool Geologic Park, Nebraska, USA

    Energy Technology Data Exchange (ETDEWEB)

    Grandstaff, D.E., E-mail: grand@temple.edu [Department of Earth and Environmental Science, Temple University, Philadelphia, PA 19122 (United States); Terry, D.O. [Department of Earth and Environmental Science, Temple University, Philadelphia, PA 19122 (United States)

    2009-04-15

    Fossil bones and teeth from terrestrial environments encode unique rare earth and trace element (REE and TE) signatures as a function of redox conditions, pH, concentrations of complexing ligands, and water-colloid interactions. This signature is set early in the fossilization process and serves as a paleoenvironmental and paleoclimatic proxy. These signatures can also be used to interpret temporal and spatial averaging within vertebrate accumulations, and can help relocate displaced fossil bones back into stratigraphic context. Rare earth elements in vertebrate fossils from upper Eocene and Oligocene strata of Toadstool Geologic Park, northwestern Nebraska, record mixing and evolution of Paleogene vadose or groundwaters and variations in paleoenvironments. REE signatures indicate that HREE-enriched alkaline groundwater reacted with LREE- and MREE-enriched sediments to produce 3-component mixtures. REE signatures become increasingly LREE- and MREE-enriched toward the top of the studied section as the paleoenvironment became cooler and drier, suggesting that REE signatures may be climate proxies. Time series analysis suggests that REE ratios are influenced by cycles of ca. 1050, 800, 570, 440, and 225 ka, similar to some previously determined Milankovitch astronomical and climate periodicities.

  7. 37 CFR 1.4 - Nature of correspondence and signature requirements.

    Science.gov (United States)

    2010-07-01

    ... signature requirements. 1.4 Section 1.4 Patents, Trademarks, and Copyrights UNITED STATES PATENT AND... General Information and Correspondence § 1.4 Nature of correspondence and signature requirements. (a...) Handwritten signature. Each piece of correspondence, except as provided in paragraphs (d)(2), (d)(3), (e) and...

  8. Objective spatiotemporal proxy-model comparisons of the Asian monsoon for the last millennium

    Science.gov (United States)

    Anchukaitis, K. J.; Cook, E. R.; Ammann, C. M.; Buckley, B. M.; D'Arrigo, R. D.; Jacoby, G.; Wright, W. E.; Davi, N.; Li, J.

    2008-12-01

    The Asian monsoon system can be studied using a complementary proxy/simulation approach which evaluates climate models using estimates of past precipitation and temperature, and which subsequently applies the best understanding of the physics of the climate system as captured in general circulation models to evaluate the broad-scale dynamics behind regional paleoclimate reconstructions. Here, we use a millennial-length climate field reconstruction of monsoon season summer (JJA) drought, developed from tree- ring proxies, with coupled climate simulations from NCAR CSM1.4 and CCSM3 to evaluate the cause of large- scale persistent droughts over the last one thousand years. Direct comparisons are made between the external forced response within the climate model and the spatiotemporal field reconstruction. In order to identify patterns of drought associated with internal variability in the climate system, we use a model/proxy analog technique which objectively selects epochs in the model that most closely reproduce those observed in the reconstructions. The concomitant ocean-atmosphere dynamics are then interpreted in order to identify and understand the internal climate system forcing of low frequency monsoon variability. We examine specific periods of extensive or intensive regional drought in the 15th, 17th, and 18th centuries, many of which are coincident with major cultural changes in the region.

  9. Searches with long-lived or unusual signatures

    CERN Document Server

    Haug, S; The ATLAS collaboration

    2013-01-01

    We present recent ATLAS and CMS results from searches with long-lived and unusual signatures. They are based on analysis of LHC proton-proton collisions at center of mass energies at 7 and 8 TeV. Long-lived and heavy particles may cause peculiar signatures in the detectors, but are in several Standard Model extensions well motivated.

  10. The Prevention of Blindness-Past, Present and Future

    Institute of Scientific and Technical Information of China (English)

    Akira; Nakajima

    1992-01-01

    Prevention of blindness is the most important aim of ophthalmology. Prevention of blindness is related to many factors. It is related to many factors, such as science and technology, economy and social behavior. There are worldwide activities by WHO, NGOs and other functions to promote the prevention of blindness in the world. More than 90% of blind population lives in developing world. Cataract is the top causes of blindness which is curable. Onchocerciasis is an endemic disease in west Africa and cent...

  11. The Prospective and Retrospective Memory Questionnaire (PRMQ): latent structure, normative data and discrepancy analysis for proxy-ratings.

    Science.gov (United States)

    Crawford, John R; Henry, Julie D; Ward, Aileen L; Blake, John

    2006-03-01

    To evaluate the proxy-rating version of the Prospective and Retrospective Memory Questionnaire (PRMQ) and provide norms and methods for score interpretation. Cross-sectional and correlational. The PRMQ was administered to a large sample drawn from the general adult population (N=570). Confirmatory factor analysis (CFA) was used to test competing models of its latent structure. Various psychometric methods were applied to provide clinicians with tools for score interpretation. The CFA model with optimal fit specified a general memory factor together with additional prospective and retrospective factors. The reliabilities of the PRMQ were acceptable (.83 to .92), and demographic variables did not influence ratings. Tables are presented for conversion of raw scores on the Total scale and Prospective and Retrospective scales to T scores. In addition, tables are provided to allow users to assess the reliability and abnormality of differences between proxy ratings on the Prospective and Retrospective scales. Finally, tables are also provided to compare proxy-ratings with self-ratings (using data from the present sample and self-rating data from a previous study). The proxy-rating version of the PRMQ provides a useful measure of everyday memory for use in clinical research and practice.

  12. Comparison of 2010 Census Nonresponse Follow-Up Proxy Responses with Administrative Records Using Census Coverage Measurement Results

    Directory of Open Access Journals (Sweden)

    Mulry Mary H.

    2017-06-01

    Full Text Available The U.S. Census Bureau is currently conducting research on ways to use administrative records to reduce the cost and improve the quality of the 2020 Census Nonresponse Followup (NRFU at addresses that do not self-respond electronically or by mail. Previously, when a NRFU enumerator was unable to contact residents at an address, he/she found a knowledgeable person, such as a neighbor or apartment manager, who could provide the census information for the residents. This was called a proxy response. The Census Bureau’s recent advances in merging federal and third-party databases raise the question: Are proxy responses for NRFU addresses more accurate than the administrative records available for the housing unit? Our study attempts to answer this question by comparing the quality of proxy responses and the administrative records for those housing units in the same timeframe using the results of 2010 Census Coverage Measurement (CCM Program. The assessment of the quality of the proxy responses and the administrative records in the CCM sample of block clusters takes advantage of the extensive fieldwork, processing, and clerical matching conducted for the CCM.

  13. A Methodology for Calculating Radiation Signatures

    Energy Technology Data Exchange (ETDEWEB)

    Klasky, Marc Louis [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Wilcox, Trevor [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Bathke, Charles G. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); James, Michael R. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-05-01

    A rigorous formalism is presented for calculating radiation signatures from both Special Nuclear Material (SNM) as well as radiological sources. The use of MCNP6 in conjunction with CINDER/ORIGEN is described to allow for the determination of both neutron and photon leakages from objects of interest. In addition, a description of the use of MCNP6 to properly model the background neutron and photon sources is also presented. Examinations of the physics issues encountered in the modeling are investigated so as to allow for guidance in the user discerning the relevant physics to incorporate into general radiation signature calculations. Furthermore, examples are provided to assist in delineating the pertinent physics that must be accounted for. Finally, examples of detector modeling utilizing MCNP are provided along with a discussion on the generation of Receiver Operating Curves, which are the suggested means by which to determine detectability radiation signatures emanating from objects.

  14. Selection signatures in worldwide sheep populations.

    Science.gov (United States)

    Fariello, Maria-Ines; Servin, Bertrand; Tosser-Klopp, Gwenola; Rupp, Rachel; Moreno, Carole; San Cristobal, Magali; Boitard, Simon

    2014-01-01

    The diversity of populations in domestic species offers great opportunities to study genome response to selection. The recently published Sheep HapMap dataset is a great example of characterization of the world wide genetic diversity in sheep. In this study, we re-analyzed the Sheep HapMap dataset to identify selection signatures in worldwide sheep populations. Compared to previous analyses, we made use of statistical methods that (i) take account of the hierarchical structure of sheep populations, (ii) make use of linkage disequilibrium information and (iii) focus specifically on either recent or older selection signatures. We show that this allows pinpointing several new selection signatures in the sheep genome and distinguishing those related to modern breeding objectives and to earlier post-domestication constraints. The newly identified regions, together with the ones previously identified, reveal the extensive genome response to selection on morphology, color and adaptation to new environments.

  15. Unblinding the dark matter blind spots

    International Nuclear Information System (INIS)

    Han, Tao; Kling, Felix

    2017-01-01

    The dark matter (DM) blind spots in the Minimal Supersymmetric Standard Model (MSSM) refer to the parameter regions where the couplings of the DM particles to the Z-boson or the Higgs boson are almost zero, leading to vanishingly small signals for the DM direct detections. In this paper, we carry out comprehensive analyses for the DM searches under the blind-spot scenarios in MSSM. Guided by the requirement of acceptable DM relic abundance, we explore the complementary coverage for the theory parameters at the LHC, the projection for the future underground DM direct searches, and the indirect searches from the relic DM annihilation into photons and neutrinos. We find that (i) the spin-independent (SI) blind spots may be rescued by the spin-dependent (SD) direct detection in the future underground experiments, and possibly by the indirect DM detections from IceCube and SuperK neutrino experiments; (ii) the detection of gamma rays from Fermi-LAT may not reach the desirable sensitivity for searching for the DM blind-spot regions; (iii) the SUSY searches at the LHC will substantially extend the discovery region for the blind-spot parameters. As a result, the dark matter blind spots thus may be unblinded with the collective efforts in future DM searches.

  16. Treatment-independent miRNA signature in blood of wilms tumor patients

    Directory of Open Access Journals (Sweden)

    Schmitt Jana

    2012-08-01

    Full Text Available Abstract Background Blood-born miRNA signatures have recently been reported for various tumor diseases. Here, we compared the miRNA signature in Wilms tumor patients prior and after preoperative chemotherapy according to SIOP protocol 2001. Results We did not find a significant difference between miRNA signature of both groups. However both, Wilms tumor patients prior and after chemotherapy showed a miRNA signature different from healthy controls. The signature of Wilms tumor patients prior to chemotherapy showed an accuracy of 97.5% and of patients after chemotherapy an accuracy of 97.0%, each as compared to healthy controls. Conclusion Our results provide evidence for a blood-born Wilms tumor miRNA signature largely independent of four weeks preoperative chemotherapy treatment.

  17. Calculated NWIS signatures for enriched uranium metal

    International Nuclear Information System (INIS)

    Valentine, T.E.; Mihalczo, J.T.; Koehler, P.E.

    1995-01-01

    Nuclear Weapons Identification System (NWIS) signatures have been calculated using a Monte Carlo transport code for measurement configurations of a 252 Cf source, detectors, and a uranium metal casting. NWIS signatures consist of a wide variety of time-and frequency-analysis signatures such as the time distribution of neutrons after californium fission, the time distribution of counts in a detector after a previous count, the number of times n pulses occur in a time interval, and various frequency-analysis signatures, such as auto-power and cross-power spectral densities, coherences, and a ratio of spectral densities. This ratio is independent of detection efficiency. The analysis presented here, using the MCNP-DSP code, evaluates the applicability of this method for measurement of the 235 U content of 19-kg castings of depleted uranium and uranium with enrichments of 20, 40, 60, 80, 90, and 93.2 wt % 235 U. The dependence of the wide variety of NWIS signatures on 235 U content and possible configurations of a measurement system are presented. These preliminary calculations indicate short measurement times. Additional calculations are being performed to optimize the source-detector-moderator-casting configuration for the shortest measurement time. Although the NWIS method was developed for nuclear weapons identification, the development of a small processor now allows it to be also applied in a practical way to subcriticality measurements, nuclear fuel process monitoring and qualitative nondestructive assay of special nuclear material

  18. 46 CFR 2.01-30 - Delegation of OCMI signature authority.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Delegation of OCMI signature authority. 2.01-30 Section... VESSEL INSPECTIONS Inspecting and Certificating of Vessels § 2.01-30 Delegation of OCMI signature authority. The Officer in Charge, Marine Inspection, may redelegate signature authority for documents issued...

  19. Deaf-Blind Perspectives, 2000-2001.

    Science.gov (United States)

    Malloy, Peggy, Ed.

    2001-01-01

    These three issues of "Deaf-Blind Perspectives" feature the following articles: (1) "A Group for Students with Usher Syndrome in South Louisiana" (Faye Melancon); (2) "Simply Emily," which discusses a budding friendship between a girl with deaf-blindness and a peer; (3) "Intervener Update" (Peggy Malloy and…

  20. Comparison of measurement- and proxy-based Vs30 values in California

    Science.gov (United States)

    Yong, Alan K.

    2016-01-01

    This study was prompted by the recent availability of a significant amount of openly accessible measured VS30 values and the desire to investigate the trend of using proxy-based models to predict VS30 in the absence of measurements. Comparisons between measured and model-based values were performed. The measured data included 503 VS30 values collected from various projects for 482 seismographic station sites in California. Six proxy-based models—employing geologic mapping, topographic slope, and terrain classification—were also considered. Included was a new terrain class model based on the Yong et al. (2012) approach but recalibrated with updated measured VS30 values. Using the measured VS30 data as the metric for performance, the predictive capabilities of the six models were determined to be statistically indistinguishable. This study also found three models that tend to underpredict VS30 at lower velocities (NEHRP Site Classes D–E) and overpredict at higher velocities (Site Classes B–C).