WorldWideScience

Sample records for proxy blind signature

  1. A Quantum Proxy Blind Signature Scheme Based on Genuine Five-Qubit Entangled State

    Science.gov (United States)

    Zeng, Chuan; Zhang, Jian-Zhong; Xie, Shu-Cui

    2017-06-01

    In this paper, a quantum proxy blind signature scheme based on controlled quantum teleportation is proposed. This scheme uses a genuine five-qubit entangled state as quantum channel and adopts the classical Vernam algorithm to blind message. We use the physical characteristics of quantum mechanics to implement delegation, signature and verification. Security analysis shows that our scheme is valid and satisfy the properties of a proxy blind signature, such as blindness, verifiability, unforgeability, undeniability.

  2. A Lattice-Based Identity-Based Proxy Blind Signature Scheme in the Standard Model

    Directory of Open Access Journals (Sweden)

    Lili Zhang

    2014-01-01

    Full Text Available A proxy blind signature scheme is a special form of blind signature which allowed a designated person called proxy signer to sign on behalf of original signers without knowing the content of the message. It combines the advantages of proxy signature and blind signature. Up to date, most proxy blind signature schemes rely on hard number theory problems, discrete logarithm, and bilinear pairings. Unfortunately, the above underlying number theory problems will be solvable in the postquantum era. Lattice-based cryptography is enjoying great interest these days, due to implementation simplicity and provable security reductions. Moreover, lattice-based cryptography is believed to be hard even for quantum computers. In this paper, we present a new identity-based proxy blind signature scheme from lattices without random oracles. The new scheme is proven to be strongly unforgeable under the standard hardness assumption of the short integer solution problem (SIS and the inhomogeneous small integer solution problem (ISIS. Furthermore, the secret key size and the signature length of our scheme are invariant and much shorter than those of the previous lattice-based proxy blind signature schemes. To the best of our knowledge, our construction is the first short lattice-based identity-based proxy blind signature scheme in the standard model.

  3. A Quantum Proxy Weak Blind Signature Scheme Based on Controlled Quantum Teleportation

    Science.gov (United States)

    Cao, Hai-Jing; Yu, Yao-Feng; Song, Qin; Gao, Lan-Xiang

    2015-04-01

    Proxy blind signature is applied to the electronic paying system, electronic voting system, mobile agent system, security of internet, etc. A quantum proxy weak blind signature scheme is proposed in this paper. It is based on controlled quantum teleportation. Five-qubit entangled state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, so it could guarantee not only the unconditional security of the scheme but also the anonymity of the messages owner.

  4. An Improved Quantum Proxy Blind Signature Scheme Based on Genuine Seven-Qubit Entangled State

    Science.gov (United States)

    Yang, Yuan-Yuan; Xie, Shu-Cui; Zhang, Jian-Zhong

    2017-07-01

    An improved quantum proxy blind signature scheme based on controlled teleportation is proposed in this paper. Genuine seven-qubit entangled state functions as quantum channel. We use the physical characteristics of quantum mechanics to implement delegation, signature and verification. Security analysis shows that our scheme is unforgeability, undeniability, blind and unconditionally secure. Meanwhile, we propose a trust party to provide higher security, the trust party is costless.

  5. A Quantum Multi-Proxy Weak Blind Signature Scheme Based on Entanglement Swapping

    Science.gov (United States)

    Yan, LiLi; Chang, Yan; Zhang, ShiBin; Han, GuiHua; Sheng, ZhiWei

    2017-02-01

    In this paper, we present a multi-proxy weak blind signature scheme based on quantum entanglement swapping of Bell states. In the scheme, proxy signers can finish the signature instead of original singer with his/her authority. It can be applied to the electronic voting system, electronic paying system, etc. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. It could guarantee not only the unconditionally security but also the anonymity of the message owner. The security analysis shows the scheme satisfies the security features of multi-proxy weak signature, singers cannot disavowal his/her signature while the signature cannot be forged by others, and the message owner can be traced.

  6. An inter-bank E-payment protocol based on quantum proxy blind signature

    Science.gov (United States)

    Wen, Xiaojun; Chen, Yongzhi; Fang, Junbin

    2013-01-01

    Security and anonymity are essential to E-payment systems. However, with the increasing computing power, existing E-payment systems will gradually become insecure. In this paper, we propose an inter-bank E-payment system which is based on quantum proxy blind signature. Adopting the techniques of quantum key distribution, one-time pad and quantum proxy blind signature, our quantum E-payment system could protect user's anonymity as the traditional E-payment systems do, and also have unconditional security which the classical E-payment systems cannot provide. Furthermore, compared with the existing quantum E-payment systems, the proposed system could support inter-bank transactions.

  7. An E-payment Protocol Based on Quantum Multi-proxy Blind Signature

    Science.gov (United States)

    Shao, Ai-Xia; Zhang, Jian-Zhong; Xie, Shu-Cui

    2017-04-01

    Based on quantum multi-proxy blind signature, a new E-payment protocol is proposed in this paper. Adopting the techniques of quantum key distribution, one-time pad and quantum proxy blind signature, our E-payment protocol could protect user's anonymity as the traditional E-payment systems do, and also have unconditional security which the classical E-payment systems cannot provide. Additionally, the quantum operation can be transmitted successfully with the probability 1, which can make the protocol reliable and practical.

  8. Cryptanalysis of an inter-bank E-payment protocol based on quantum proxy blind signature

    Science.gov (United States)

    Cai, Xiao-Qiu; Wei, Chun-Yan

    2013-04-01

    We analyze the security of an inter-bank E-payment protocol based on quantum proxy blind signature, and find that there is a security leak in the quantum channels of this protocol, which gives a chance for an outside opponent to launch a special denial-of-service attack. Furthermore, we show that the dishonest merchant can succeed to change the purchase information of the customer in this protocol.

  9. Blind Collective Signature Protocol

    Directory of Open Access Journals (Sweden)

    Nikolay A. Moldovyan

    2011-06-01

    Full Text Available Using the digital signature (DS scheme specified by Belarusian DS standard there are designed the collective and blind collective DS protocols. Signature formation is performed simultaneously by all of the assigned signers, therefore the proposed protocols can be used also as protocols for simultaneous signing a contract. The proposed blind collective DS protocol represents a particular implementation of the blind multisignature schemes that is a novel type of the signature schemes. The proposed protocols are the first implementations of the multisignature schemes based on Belarusian signature standard.

  10. Novel Quantum Proxy Signature without Entanglement

    Science.gov (United States)

    Xu, Guang-bao

    2015-08-01

    Proxy signature is an important research topic in classic cryptography since it has many application occasions in our real life. But only a few quantum proxy signature schemes have been proposed up to now. In this paper, we propose a quantum proxy signature scheme, which is designed based on quantum one-time pad. Our scheme can be realized easily since it only uses single-particle states. Security analysis shows that it is secure and meets all the properties of a proxy signature, such as verifiability, distinguishability, unforgeability and undeniability.

  11. Blind Quantum Signature with Blind Quantum Computation

    Science.gov (United States)

    Li, Wei; Shi, Ronghua; Guo, Ying

    2017-04-01

    Blind quantum computation allows a client without quantum abilities to interact with a quantum server to perform a unconditional secure computing protocol, while protecting client's privacy. Motivated by confidentiality of blind quantum computation, a blind quantum signature scheme is designed with laconic structure. Different from the traditional signature schemes, the signing and verifying operations are performed through measurement-based quantum computation. Inputs of blind quantum computation are securely controlled with multi-qubit entangled states. The unique signature of the transmitted message is generated by the signer without leaking information in imperfect channels. Whereas, the receiver can verify the validity of the signature using the quantum matching algorithm. The security is guaranteed by entanglement of quantum system for blind quantum computation. It provides a potential practical application for e-commerce in the cloud computing and first-generation quantum computation.

  12. Attacks on One Designated Verifier Proxy Signature Scheme

    Directory of Open Access Journals (Sweden)

    Baoyuan Kang

    2012-01-01

    Full Text Available In a designated verifier proxy signature scheme, there are three participants, namely, the original signer, the proxy signer, and the designated verifier. The original signer delegates his or her signing right to the proxy signer, then the proxy signer can generate valid signature on behalf of the original signer. But only the designated verifier can verify the proxy signature. Several designated verifier proxy signature schemes have been proposed. However, most of them were proven secure in the random oracle model, which has received a lot of criticism since the security proofs in the random oracle model are not sound with respect to the standard model. Recently, by employing Water's hashing technique, Yu et al. proposed a new construction of designated verifier proxy signature. They claimed that the new construction is the first designated verifier proxy signature, whose security does not rely on the random oracles. But, in this paper, we will show some attacks on Yu et al.'s scheme. So, their scheme is not secure.

  13. Secure Mobile Agent from Leakage-Resilient Proxy Signatures

    Directory of Open Access Journals (Sweden)

    Fei Tang

    2015-01-01

    Full Text Available A mobile agent can sign a message in a remote server on behalf of a customer without exposing its secret key; it can be used not only to search for special products or services, but also to make a contract with a remote server. Hence a mobile agent system can be used for electronic commerce as an important key technology. In order to realize such a system, Lee et al. showed that a secure mobile agent can be constructed using proxy signatures. Intuitively, a proxy signature permits an entity (delegator to delegate its signing right to another entity (proxy to sign some specified messages on behalf of the delegator. However, the proxy signatures are often used in scenarios where the signing is done in an insecure environment, for example, the remote server of a mobile agent system. In such setting, an adversary could launch side-channel attacks to exploit some leakage information about the proxy key or even other secret states. The proxy signatures which are secure in the traditional security models obviously cannot provide such security. Based on this consideration, in this paper, we design a leakage-resilient proxy signature scheme for the secure mobile agent systems.

  14. Design and Implementation of a Mobile Voting System Using a Novel Oblivious and Proxy Signature

    Directory of Open Access Journals (Sweden)

    Shin-Yan Chiou

    2017-01-01

    Full Text Available Electronic voting systems can make the voting process much more convenient. However, in such systems, if a server signs blank votes before users vote, it may cause undue multivoting. Furthermore, if users vote before the signing of the server, voting information will be leaked to the server and may be compromised. Blind signatures could be used to prevent leaking voting information from the server; however, malicious users could produce noncandidate signatures for illegal usage at that time or in the future. To overcome these problems, this paper proposes a novel oblivious signature scheme with a proxy signature function to satisfy security requirements such as information protection, personal privacy, and message verification and to ensure that no one can cheat other users (including the server. We propose an electronic voting system based on the proposed oblivious and proxy signature scheme and implement this scheme in a smartphone application to allow users to vote securely and conveniently. Security analyses and performance comparisons are provided to show the capability and efficiency of the proposed scheme.

  15. Quantum blind signature with an offline repository

    Science.gov (United States)

    Ribeiro, J.; Souto, A.; Mateus, P.

    2015-04-01

    We propose a quantum blind signature scheme that achieves perfect security under the assumption of an honest offline repository. The security of the protocol also relies on perfect private quantum channels, which are achievable using quantum one-time pads with keys shared via a quantum key distribution (QKD) protocol. The proposed approach ensures that signatures cannot be copied and that the sender must compromise to a single message, which are important advantages over classical protocols for certain applications.

  16. Analysis of Forgery Attack on One-Time Proxy Signature and the Improvement

    Science.gov (United States)

    Wang, Tian-Yin; Wei, Zong-Li

    2016-02-01

    In a recent paper, Yang et al. (Quant. Inf. Process. 13(9), 2007-2016, 2014) analyzed the security of one-time proxy signature scheme Wang and Wei (Quant. Inf. Process. 11(2), 455-463, 2012) and pointed out that it cannot satisfy the security requirements of unforgeability and undeniability because an eavesdropper Eve can forge a valid proxy signature on a message chosen by herself. However, we find that the so-called proxy message-signature pair forged by Eve is issued by the proxy signer in fact, and anybody can obtain it as a requester, which means that the forgery attack is not considered as a successful attack. Therefore, the conclusion that this scheme cannot satisfy the security requirements of proxy signature against forging and denying is not appropriate in this sense. Finally, we study the reason for the misunderstanding and clarify the security requirements for proxy signatures.

  17. Restrictive partially blind signature for resource-constrained information systems

    NARCIS (Netherlands)

    Qiu, Weidong; Gong, Zheng; Liu, Bozhong; Long, Yu; Chen, Kefei

    2010-01-01

    Restrictive partially blind signature, which is designed for privacy oriented information systems, allows a user to obtain a blind signature from a signer whilst the blind message must obey some certain rules. In order to reduce storage and communication costs, several public-key cryptosystems are

  18. A weak blind signature scheme based on quantum cryptography

    Science.gov (United States)

    Wen, Xiaojun; Niu, Xiamu; Ji, Liping; Tian, Yuan

    2009-02-01

    In this paper, we present a weak blind signature scheme based on the correlation of EPR (Einstein-Padolsky-Rosen) pairs. Different from classical blind signature schemes and current quantum signature schemes, our quantum blind signature scheme could guarantee not only the unconditionally security but also the anonymity of the message owner. To achieve that, quantum key distribution and one-time pad are adopted in our scheme. Experimental analysis proved that our scheme have the characteristics of non-counterfeit, non-disavowal, blindness and traceability. It has a wide application to E-payment system, E-government, E-business, and etc.

  19. Cryptanalysis of a sessional blind signature based on quantum cryptography

    Science.gov (United States)

    Su, Qi; Li, Wen-Min

    2014-09-01

    A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. A blind signature is a form of digital signature in which the content of a message is disguised (blinded) before it is signed to protect the privacy of the message from the signatory. For signing quantum messages, some quantum blind signature protocols have been proposed. Recently, Khodambashi et al. (Quantum Inf Process 13:121, 2014) proposed a sessional blind signature based on quantum cryptography. It was claimed that these protocol could guarantee unconditional security. However, after our analysis, we find that the signature protocol will cause the key information leakage in the view of information theory. Taking advantage of loophole, the message sender can succeed in forging the signature without the knowledge of the whole exact key between the verifier and him. To conquer this shortcoming, we construct an improved protocol based on it and the new protocol can resist the key information leakage attacks.

  20. Cryptanalysis and Performance Evaluation of Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers

    Directory of Open Access Journals (Sweden)

    Raman Kumar

    2013-01-01

    Full Text Available In these days there are plenty of signature schemes such as the threshold proxy signature scheme (Kumar and Verma 2010. The network is a shared medium so that the weakness security attacks such as eavesdropping, replay attack, and modification attack. Thus, we have to establish a common key for encrypting/decrypting our communications over an insecure network. In this scheme, a threshold proxy signature scheme based on RSA, any or more proxy signers can cooperatively generate a proxy signature while or fewer of them cannot do it. The threshold proxy signature scheme uses the RSA cryptosystem to generate the private and the public key of the signers (Rivest et al., 1978. Comparison is done on the basis of time complexity, space complexity, and communication overhead. We compare the performance of four schemes (Hwang et al. (2003, Kuo and Chen (2005, Yong-Jun et al. (2007, and Li et al. (2007, with the performance of a scheme that has been proposed earlier by the authors of this paper. In the proposed scheme, both the combiner and the secret share holder can verify the correctness of the information that they are receiving from each other. Therefore, the enhanced threshold proxy signature scheme is secure and efficient against notorious conspiracy attacks.

  1. Method of Anti-Virus Protection Based on (n, t Threshold Proxy Signature with an Arbitrator

    Directory of Open Access Journals (Sweden)

    E. A. Tolyupa

    2014-01-01

    Full Text Available The article suggests the method of anti-virus protection of mobile devices based on the usage of proxy digital signatures and an (n;t-threshold proxy signature scheme with an arbitrator. The unique feature of the suggested method is in the absence of necessity to install anti-virus software in a mobile device. It will be enough only to have the software verifying digital signatures and the Internet. The method is used on the base of public keys infrastructure /PKI/, thus minimizing implementation expenses.

  2. Forgery attack on one-time proxy signature and the improvement

    Science.gov (United States)

    Yang, Chun-Wei; Luo, Yi-Ping; Hwang, Tzonelih

    2014-09-01

    This paper points out that in Wang and Wei's scheme (Quantum Inf Process 11:455-463, 2012), an eavesdropper, Eve, can replace the original message of a proxy signature with a forged one of her choice without being detected by the verifier. Accordingly, one of the security requirements of a quantum signature, i.e., unforgeability, may not be satisfied in their scheme. An improvement is given to avoid this attack, and the comparisons with the existing quantum proxy signature are also demonstrated.

  3. A Weak Quantum Blind Signature with Entanglement Permutation

    Science.gov (United States)

    Lou, Xiaoping; Chen, Zhigang; Guo, Ying

    2015-09-01

    Motivated by the permutation encryption algorithm, a weak quantum blind signature (QBS) scheme is proposed. It involves three participants, including the sender Alice, the signatory Bob and the trusted entity Charlie, in four phases, i.e., initializing phase, blinding phase, signing phase and verifying phase. In a small-scale quantum computation network, Alice blinds the message based on a quantum entanglement permutation encryption algorithm that embraces the chaotic position string. Bob signs the blinded message with private parameters shared beforehand while Charlie verifies the signature's validity and recovers the original message. Analysis shows that the proposed scheme achieves the secure blindness for the signer and traceability for the message owner with the aid of the authentic arbitrator who plays a crucial role when a dispute arises. In addition, the signature can neither be forged nor disavowed by the malicious attackers. It has a wide application to E-voting and E-payment system, etc.

  4. A quantum proxy group signature scheme based on an entangled five-qubit state

    Science.gov (United States)

    Wang, Meiling; Ma, Wenping; Wang, Lili; Yin, Xunru

    2015-09-01

    A quantum proxy group signature (QPGS) scheme based on controlled teleportation is presented, by using the entangled five-qubit quantum state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. The security of the scheme is guaranteed by the entanglement correlations of the entangled five-qubit state, the secret keys based on the quantum key distribution (QKD) and the one-time pad algorithm, all of which have been proven to be unconditionally secure and the signature anonymity.

  5. An Anonymous Access Authentication Scheme Based on Proxy Ring Signature for CPS-WMNs

    Directory of Open Access Journals (Sweden)

    Tianhan Gao

    2017-01-01

    Full Text Available Access security and privacy have become a bottleneck for the popularization of future Cyber-Physical System (CPS networks. Furthermore, users’ need for privacy-preserved access during movement procedure is more urgent. To address the anonymous access authentication issue for CPS Wireless Mesh Network (CPS-WMN, a novel anonymous access authentication scheme based on proxy ring signature is proposed. A hierarchical authentication architecture is presented first. The scheme is then achieved from the aspect of intergroup and intragroup anonymous mutual authentication through proxy ring signature mechanism and certificateless signature mechanism, respectively. We present a formal security proof of the proposed protocol with SVO logic. The simulation and performance analysis demonstrate that the proposed scheme owns higher efficiency and adaptability than the typical one.

  6. A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings

    Directory of Open Access Journals (Sweden)

    SK Hafizul Islam

    2014-01-01

    Full Text Available The proxy signature, a variant of the ordinary digital signature, has been an active research topic in recent years; it has many useful applications, including distributed systems and grid computing. Although many identity-based proxy signature schemes have been proposed in the literature, only a few proposals for identity-based strong designated verifier proxy signature (ID-SDVPS schemes are available. However, it has been found that most of the ID-SDVPS schemes that have been proposed to date are not efficient in terms of computation and security, and a computationally efficient and secured ID-SDVPS scheme using elliptic curve bilinear pairing has been proposed in this paper. The security of the scheme is mainly based on the hardness assumption of CDH and GBDH problems in the random oracle model, which is existentially unforgeable against different types of adversaries. Furthermore, the security of our scheme is simulated in the AVISPA (Automated Validation of Internet Security Protocols and Applications software, a widely used automated internet protocol validation tool, and the simulation results confirm strong security against both active and passive attacks. In addition, because of a high processing capability and supporting additional security features, the scheme is suitable for the environments in which less computational cost with strong security is required.

  7. Quantum blind dual-signature scheme without arbitrator

    Science.gov (United States)

    Li, Wei; Shi, Ronghua; Huang, Dazu; Shi, Jinjing; Guo, Ying

    2016-03-01

    Motivated by the elegant features of a bind signature, we suggest the design of a quantum blind dual-signature scheme with three phases, i.e., initial phase, signing phase and verification phase. Different from conventional schemes, legal messages are signed not only by the blind signatory but also by the sender in the signing phase. It does not rely much on an arbitrator in the verification phase as the previous quantum signature schemes usually do. The security is guaranteed by entanglement in quantum information processing. Security analysis demonstrates that the signature can be neither forged nor disavowed by illegal participants or attacker. It provides a potential application for e-commerce or e-payment systems with the current technology.

  8. A New Quantum Proxy Multi-signature Scheme Using Maximally Entangled Seven-Qubit States

    Science.gov (United States)

    Cao, Hai-Jing; Zhang, Jia-Fu; Liu, Jian; Li, Zeng-You

    2016-02-01

    In this paper, we propose a new secure quantum proxy multi-signature scheme using seven-qubit entangled quantum state as quantum channels, which may have applications in e-payment system, e-government, e-business, etc. This scheme is based on controlled quantum teleportation. The scheme uses the physical characteristics of quantum mechanics to guarantee its anonymity, verifiability, traceability, unforgetability and undeniability.

  9. A sessional blind signature based on quantum cryptography

    Science.gov (United States)

    Khodambashi, Siavash; Zakerolhosseini, Ali

    2014-01-01

    In this paper, we present a sessional blind signature protocol whose security is guaranteed by fundamental principles of quantum physics. It allows a message owner to get his message signed by an authorized signatory. However, the signatory is not capable of reading the message contents and everyone can verify authenticity of the message. For this purpose, we took advantage of a sessional signature as well as quantum entangled pairs which are generated with respect to it in our proposed protocol. We describe our proposed blind signature through an example and briefly discuss about its unconditional security. Due to the feasibility of the protocol, it can be widely employed for e-payment, e-government, e-business and etc.

  10. A blind digital signature scheme using elliptic curve digital signature algorithm

    OpenAIRE

    BÜTÜN, İsmail; DEMİRER, Mehmet

    2014-01-01

    In this study, we propose a blind digital signature (BDS) scheme based on the elliptic curve digital signature algorithm that increases the performance significantly. The security of our scheme is based on the difficulty of the elliptic curve discrete algorithm problem. Therefore, it offers much smaller key lengths for the desired security levels, along with much faster cryptographic processes, leading to fewer hardware and software requirements. According to our simulation results, ...

  11. The effects of extrinsic motivation on signature authorship opinions in forensic signature blind trials.

    Science.gov (United States)

    Dewhurst, Tahnee N; Found, Bryan; Ballantyne, Kaye N; Rogers, Doug

    2014-03-01

    Expertise studies in forensic handwriting examination involve comparisons of Forensic Handwriting Examiners' (FHEs) opinions with lay-persons on blind tests. All published studies of this type have reported real and demonstrable skill differences between the specialist and lay groups. However, critics have proposed that any difference shown may be indicative of a lack of motivation on the part of lay participants, rather than a real difference in skill. It has been suggested that qualified FHEs would be inherently more motivated to succeed in blinded validation trials, as their professional reputations could be at risk, should they perform poorly on the task provided. Furthermore, critics suggest that lay-persons would be unlikely to be highly motivated to succeed, as they would have no fear of negative consequences should they perform badly. In an effort to investigate this concern, a blind signature trial was designed and administered to forty lay-persons. Participants were required to compare known (exemplar) signatures of an individual to questioned signatures and asked to express an opinion regarding whether the writer of the known signatures wrote each of the questioned signatures. The questioned signatures comprised a mixture of genuine, disguised and simulated signatures. The forty participants were divided into two separate groupings. Group 'A' were requested to complete the trial as directed and were advised that for each correct answer they would be financially rewarded, for each incorrect answer they would be financially penalized, and for each inconclusive opinion they would receive neither penalty nor reward. Group 'B' was requested to complete the trial as directed, with no mention of financial recompense or penalty. The results of this study do not support the proposition that motivation rather than skill difference is the source of the statistical difference in opinions between individuals' results in blinded signature proficiency trials. Crown

  12. Blind Quantum Signature with Controlled Four-Particle Cluster States

    Science.gov (United States)

    Li, Wei; Shi, Jinjing; Shi, Ronghua; Guo, Ying

    2017-08-01

    A novel blind quantum signature scheme based on cluster states is introduced. Cluster states are a type of multi-qubit entangled states and it is more immune to decoherence than other entangled states. The controlled four-particle cluster states are created by acting controlled-Z gate on particles of four-particle cluster states. The presented scheme utilizes the above entangled states and simplifies the measurement basis to generate and verify the signature. Security analysis demonstrates that the scheme is unconditional secure. It can be employed to E-commerce systems in quantum scenario.

  13. Quantum blind signature based on Two-State Vector Formalism

    Science.gov (United States)

    Qi, Su; Zheng, Huang; Qiaoyan, Wen; Wenmin, Li

    2010-11-01

    Two-State Vector Formalism (TSVF) including pre- and postselected states is a complete description of a system between two measurements. Consequently TSVF gives a perfect solution to the Mean King problem. In this paper, utilizing the dramatic correlation in the verification, we propose a quantum blind signature scheme based on TSVF. Compared with Wen's scheme, our scheme has 100% efficiency. Our scheme guarantees the unconditional security. Moreover, the proposed scheme, which is easy to implement, can be applied to E-payment system.

  14. Arctic and Antarctic Oscillation signatures in tropical coral proxies over the South China Sea

    Energy Technology Data Exchange (ETDEWEB)

    Gong, D.Y. [Beijing Normal Univ. (China). State Key Lab. of Earth Surface Processes and Resource Ecology; Kim, S.J. [Korea Polar Research Inst., Incheon (Korea); Ho, C.H. [Seoul National Univ. (Korea). School of Earth and Environmental Sciences

    2009-07-01

    Arctic Oscillation (AO) and Antarctic Oscillation (AAO) are the leading modes of atmospheric circulation in mid-high latitudes. Previous studies have revealed that the climatic influences of the two modes are dominant in extra-tropical regions. This study finds that AO and AAO signals are also well recorded in coral proxies in the tropical South China Sea. There are significant interannual signals of AO and AAO in the strontium (Sr) content, which represents the sea surface temperature (SST). Among all the seasons, the most significant correlation occurs during winter in both hemispheres: the strongest AO-Sr and AAO-Sr coral correlations occur in January and August, respectively. This study also determined that the Sr content lags behind AO and AAO by 1-3 months. Large-scale anomalies in sea level pressure and horizontal wind at 850 hPa level support the strength of AO/AAO-coral teleconnections. In addition, a comparison with oxygen isotope records from two coral sites in neighboring oceans yields significant AO and AAO signatures with similar time lags. These results help to better understand monsoon climates and their teleconnection to high-latitude climate changes. (orig.)

  15. Arctic and Antarctic Oscillation signatures in tropical coral proxies over the South China Sea

    Directory of Open Access Journals (Sweden)

    D.-Y. Gong

    2009-05-01

    Full Text Available Arctic Oscillation (AO and Antarctic Oscillation (AAO are the leading modes of atmospheric circulation in mid-high latitudes. Previous studies have revealed that the climatic influences of the two modes are dominant in extra-tropical regions. This study finds that AO and AAO signals are also well recorded in coral proxies in the tropical South China Sea. There are significant interannual signals of AO and AAO in the strontium (Sr content, which represents the sea surface temperature (SST. Among all the seasons, the most significant correlation occurs during winter in both hemispheres: the strongest AO-Sr and AAO-Sr coral correlations occur in January and August, respectively. This study also determined that the Sr content lags behind AO and AAO by 1–3 months. Large-scale anomalies in sea level pressure and horizontal wind at 850 hPa level support the strength of AO/AAO-coral teleconnections. In addition, a comparison with oxygen isotope records from two coral sites in neighboring oceans yields significant AO and AAO signatures with similar time lags. These results help to better understand monsoon climates and their teleconnection to high-latitude climate changes.

  16. A Novel Quantum Blind Signature Scheme with Four-particle GHZ States

    Science.gov (United States)

    Fan, Ling; Zhang, Ke-Jia; Qin, Su-Juan; Guo, Fen-Zhuo

    2016-02-01

    In an arbitrated quantum signature scheme, the signer signs the message and the receiver verifies the signature's validity with the assistance of the arbitrator. We present an arbitrated quantum blind signature scheme by using four-particle entangled Greenberger-Horne-Zeilinger (GHZ) states. By using the special relationship of four-particle GHZ states, we cannot only support the security of quantum signature, but also guarantee the anonymity of the message owner. It has a wide application to E-payment system, E-government, E-business, and etc.

  17. A Novel Quantum Blind Signature Scheme with Four-Particle Cluster States

    Science.gov (United States)

    Fan, Ling

    2016-03-01

    In an arbitrated quantum signature scheme, the signer signs the message and the receiver verifies the signature's validity with the assistance of the arbitrator. We present an arbitrated quantum blind signature scheme by measuring four-particle cluster states and coding. By using the special relationship of four-particle cluster states, we cannot only support the security of quantum signature, but also guarantee the anonymity of the message owner. It has a wide application to E-payment system, E-government, E-business, and etc.

  18. A Third-Party E-Payment Protocol Based on Quantum Group Blind Signature

    Science.gov (United States)

    Zhang, Jian-Zhong; Yang, Yuan-Yuan; Xie, Shu-Cui

    2017-09-01

    A third-party E-payment protocol based on quantum group blind signature is proposed in this paper. Our E-payment protocol could protect user's anonymity as the traditional E-payment systems do, and also have unconditional security which the classical E-payment systems can not provide. To achieve that, quantum key distribution, one-time pad and quantum group blind signature are adopted in our scheme. Furthermore, if there were a dispute, the manager Trent can identify who tells a lie.

  19. A Robust Blind Quantum Copyright Protection Method for Colored Images Based on Owner's Signature

    Science.gov (United States)

    Heidari, Shahrokh; Gheibi, Reza; Houshmand, Monireh; Nagata, Koji

    2017-08-01

    Watermarking is the imperceptible embedding of watermark bits into multimedia data in order to use for different applications. Among all its applications, copyright protection is the most prominent usage which conceals information about the owner in the carrier, so as to prohibit others from assertion copyright. This application requires high level of robustness. In this paper, a new blind quantum copyright protection method based on owners's signature in RGB images is proposed. The method utilizes one of the RGB channels as indicator and two remained channels are used for embedding information about the owner. In our contribution the owner's signature is considered as a text. Therefore, in order to embed in colored image as watermark, a new quantum representation of text based on ASCII character set is offered. Experimental results which are analyzed in MATLAB environment, exhibit that the presented scheme shows good performance against attacks and can be used to find out who the real owner is. Finally, the discussed quantum copyright protection method is compared with a related work that our analysis confirm that the presented scheme is more secure and applicable than the previous ones currently found in the literature.

  20. Proxy Smart Card Systems

    OpenAIRE

    Cattaneo, Giuseppe; Faruolo, Pompeo; Palazzo, Vincenzo; Visconti, Ivan

    2010-01-01

    International audience; The established legal value of digital signatures and the growing availability of identity-based digital services are progressively extending the use of smart cards to all citizens, opening new challenging scenarios. Among them, motivated by concrete applications, secure and practical delegation of digital signatures is becoming more and more critical. Unfortunately, secure delegation systems proposed so far (e.g., proxy signatures) include various drawbacks for any pr...

  1. Relinkable Ring Signature

    Science.gov (United States)

    Suzuki, Koutarou; Hoshino, Fumitaka; Kobayashi, Tetsutaro

    In this paper, we propose the concept of a relinkable ring signature, which is a ring signature with ring reformation function, i.e., a signer can delegate ring reformation ability separately from signing ability to his/her proxy. The relinkable ring signature can be applicable to proxy ring reformation, anonymization of past-generated signature, or ring signature for dynamic group. We also propose a concrete relinkable ring signature scheme that uses pairing in the random oracle model.

  2. Evaluating Carbon Isotope Signature of Bulk Organic Matter and Plant Wax Derived n-alkanes from Lacustrine Sediments as Climate Proxies along the Western Side of the Andes

    Science.gov (United States)

    Contreras, S.; Werne, J. P.; Araneda, A.; Conejero, C. A.

    2015-12-01

    Sedimentary carbon isotope values (δ13C) of bulk organic matter and long chain (C25 to C35) n-alkanes are among the most long-lived and widely utilized proxies of organic matter and vegetation source. The carbon distribution (e.g. average carbon chain length, ACL) and isotope signature from long chain n-alkanes had been intensively used on paleoclimate studies because they are less influenced by diagenesis, differential preservation of compound classes, and changes in the sources of organic matter than bulk δ13C values. Recently, studies of modern plant n-alkanes have challenged the use of carbon distribution and carbon isotope signature from sedimentary n-alkanes as reliable indicators of vegetation and climate change. The climate in central-south western South America (SA) is projected to become significantly warmer and drier over the next several decades to centuries in response to anthropogenically driven warming. Paleolimnological studies along western SA are critical to obtain more realistic and reliable regional reconstructions of past climate and environments, including vegetation and water budget variability. Here we discuss bulk δ13C, distribution and δ13C in long chain n-alkanes from a suite of ~40 lake surface sediment (core-top) samples spanning the transition from a Mediterranean climate with a patchwork of cultivated vegetation, pastureland, conifers in central Chile to a rainy temperate climate dominated by broadleaf deciduous and evergreen forest. Data are compared to the latitudinal and orographic climatic trends of the Andes based on the climatology (e.g. precipitation and temperature) of the locations of all lakes involved in this study, using monthly gridded reanalysis products of the Climate Forecast System Reanalysis (CFSR), based on the NCEP global forecast model and meteorological stations available in the region, from January 1979 to December 2010 with a 0.5° horizontal resolution.

  3. Blindness

    Science.gov (United States)

    ... Clinical Director Laboratories, Sections and Units Division of Epidemiology and Clinical Applications eyeGENE Research Directors Office Office ... Blindness Defined Blindness as defined by the U.S. definition is the best-corrected visual acuity of 6/ ...

  4. Neural Signatures of Conscious Face Perception in an Inattentional Blindness Paradigm.

    Science.gov (United States)

    Shafto, Juliet P; Pitts, Michael A

    2015-08-05

    Previous studies suggest that early stages of face-specific processing are performed preattentively and unconsciously, whereas conscious perception emerges with late-stage (>300 ms) neuronal activity. A conflicting view, however, posits that attention is necessary for face-specific processing and that early-to-mid latency neural responses (∼ 100-300 ms) correspond more closely with perceptual awareness. The current study capitalized on a recently developed method for manipulating attention and conscious perception during EEG recording (modified inattentional blindness paradigm) and used face stimuli that elicit a well known marker of early face processing, the N170 event-related potential (ERP). In Phase 1 of the experiment, subjects performed a demanding distracter task while line drawings of faces and matched control stimuli were presented in the center of their view. When queried, half of the subjects reported no awareness of the faces and were deemed inattentionally blind. In Phase 2, subjects performed the same distracter task, but now consciously perceived the face stimuli due to the intervening questioning. In Phase 3, subjects performed a discrimination task on the faces. Two primary contrasts were made: aware versus unaware (equally task irrelevant) and task-relevant versus task-irrelevant (equally aware). The N170 and a subsequent ERP component, the visual awareness negativity (∼ 260-300 ms), were absent during inattentional blindness and present in the aware conditions. The P3b (> 300 ms) was absent for task-irrelevant faces, even when consciously perceived, and present only when the faces were task relevant. These results inform contemporary theories of conscious face perception in particular and visual attention and perceptual awareness in general. Copyright © 2015 the authors 0270-6474/15/3510940-09$15.00/0.

  5. The brain signature of paracetamol in healthy volunteers: a double-blind randomized trial

    Directory of Open Access Journals (Sweden)

    Pickering G

    2015-07-01

    Full Text Available Gisèle Pickering,1–3 Adrian Kastler,4 Nicolas Macian,1,2 Bruno Pereira,5 Romain Valabrègue,6 Stéphane Lehericy,6 Louis Boyer,4,7 Claude Dubray,1–3 Betty Jean4 1CHU Clermont-Ferrand, Centre de Pharmacologie Clinique, 2Centre d’Investigation Clinique – Inserm 1405, 3Clermont Université, Laboratoire de Pharmacologie, Faculté de médecine, 4CHU Gabriel Montpied, Clermont-Ferrand, Service d’Imagerie Ostéo-articulaire thoracique et neurologique, 5CHU Clermont-Ferrand, Délégation Recherche Clinique et à l’Innovation, Clermont-Ferrand, France; 6Institut du Cerveau et de la Moelle epiniere – ICM, Centre de NeuroImagerie de Recherche CENIR, Inserm U1127, CNRS UMR 7225, Sorbonne Universités, UPMC University Paris, Paris, France, Department of Neuroradiology, Groupe Hospitalier Pitié-Salpêtrière, Paris, France; 7UMR CNRS UdA 6284, Clemont-Ferrand, France Background: Paracetamol’s (APAP mechanism of action suggests the implication of supraspinal structures but no neuroimaging study has been performed in humans.Methods and results: This randomized, double-blind, crossover, placebo-controlled trial in 17 healthy volunteers (NCT01562704 aimed to evaluate how APAP modulates pain-evoked functional magnetic resonance imaging signals. We used behavioral measures and functional magnetic resonance imaging to investigate the response to experimental thermal stimuli with APAP or placebo administration. Region-of-interest analysis revealed that activity in response to noxious stimulation diminished with APAP compared to placebo in prefrontal cortices, insula, thalami, anterior cingulate cortex, and periaqueductal gray matter.Conclusion: These findings suggest an inhibitory effect of APAP on spinothalamic tracts leading to a decreased activation of higher structures, and a top-down influence on descending inhibition. Further binding and connectivity studies are needed to evaluate how APAP modulates pain, especially in the context of repeated

  6. Blindness

    Science.gov (United States)

    ... or should we say a paw? — from a guide dog. These helper dogs are trained to be a blind person's eyes. That means the dog learns to be very alert to surroundings so he or she can be a good guide for the person. Not only are these dogs ...

  7. SIGNCRYPTION BASED ON DIFFERENT DIGITAL SIGNATURE SCHEMES

    OpenAIRE

    Adrian Atanasiu; Laura Savu

    2012-01-01

    This article presents two new signcryption schemes. The first one is based on Schnorr digital signature algorithm and the second one is using Proxy Signature scheme introduced by Mambo. Schnorr Signcryption has been implemented in a program and here are provided the steps of the algorithm, the results and some examples. The Mambo’s Proxy Signature is adapted for Shortened Digital Signature Standard, being part of a new Proxy Signcryption scheme.

  8. Munchausen syndrome by proxy

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/article/001555.htm Munchausen syndrome by proxy To use the sharing features on this page, please enable JavaScript. Munchausen syndrome by proxy is a mental illness and ...

  9. Here be web proxies

    DEFF Research Database (Denmark)

    Weaver, Nicholas; Kreibich, Christian; Dam, Martin

    2014-01-01

    HTTP proxies serve numerous roles, from performance enhancement to access control to network censorship, but often operate stealthily without explicitly indicating their presence to the communicating endpoints. In this paper we present an analysis of the evidence of proxying manifest in executions...... of the ICSI Netalyzr spanning 646,000 distinct IP addresses ("clients"). To identify proxies we employ a range of detectors at the transport and application layer, and report in detail on the extent to which they allow us to fingerprint and map proxies to their likely intended uses. We also analyze 17...

  10. Jemen - the Proxy War

    Directory of Open Access Journals (Sweden)

    Magdalena El Ghamari

    2015-12-01

    Full Text Available The military operation in Yemen is significant departure from Saudi Arabia's foreign policy tradition and customs. Riyadh has always relied on three strategies to pursue its interests abroad: wealth, establish a global network and muslim education and diplomacy and meadiation. The term "proxy war" has experienced a new popularity in stories on the Middle East. A proxy war is two opposing countries avoiding direct war, and instead supporting combatants that serve their interests. In some occasions, one country is a direct combatant whilst the other supporting its enemy. Various news sources began using the term to describe the conflict in Yemen immediately, as if on cue, after Saudi Arabia launched its bombing campaign against Houthi targets in Yemen on 25 March 2015. This is the reason, why author try to answer for following questions: Is the Yemen Conflict Devolves into Proxy War? and Who's fighting whom in Yemen's proxy war?" Research area includes the problem of proxy war in the Middle East. For sure, the real problem of proxy war must begin with the fact that the United States and its NATO allies opened the floodgates for regional proxy wars by the two major wars for regime change: in Iraq and Libya. Those two destabilising wars provided opportunities and motives for Sunni states across the Middle East to pursue their own sectarian and political power objectives through "proxy war".

  11. Jemen - the Proxy War

    OpenAIRE

    Magdalena El Ghamari

    2015-01-01

    The military operation in Yemen is significant departure from Saudi Arabia's foreign policy tradition and customs. Riyadh has always relied on three strategies to pursue its interests abroad: wealth, establish a global network and muslim education and diplomacy and meadiation. The term "proxy war" has experienced a new popularity in stories on the Middle East. A proxy war is two opposing countries avoiding direct war, and instead supporting combatants that serve their interests. In some occas...

  12. Cryptanalytic Performance Appraisal of Improved CCH2 Proxy Multisignature Scheme

    Directory of Open Access Journals (Sweden)

    Raman Kumar

    2014-01-01

    Full Text Available Many of the signature schemes are proposed in which the t out of n threshold schemes are deployed, but they still lack the property of security. In this paper, we have discussed implementation of improved CCH1 and improved CCH2 proxy multisignature scheme based on elliptic curve cryptosystem. We have represented time complexity, space complexity, and computational overhead of improved CCH1 and CCH2 proxy multisignature schemes. We have presented cryptanalysis of improved CCH2 proxy multisignature scheme and showed that improved CCH2 scheme suffered from various attacks, that is, forgery attack and framing attack.

  13. Molecular proxies for paleoclimatology

    Science.gov (United States)

    Eglinton, Timothy I.; Eglinton, Geoffrey

    2008-10-01

    We summarize the applications of molecular proxies in paleoclimatology. Marine molecular records especially are proving to be of value but certain environmentally persistent compounds can also be measured in lake sediments, loess deposits and ice cores. The fundamentals of this approach are the molecular parameters, the compound abundances and carbon, hydrogen, nitrogen and oxygen isotopic contents which can be derived by the analysis of sediment extracts. These afford proxy measures which can be interpreted in terms of the conditions which control climate and also reflect its operation. We discuss two types of proxy; those of terrigenous and those of aquatic origin, and exemplify their application in the study of marine sediments through the medium of ten case studies based in the Atlantic, Mediterranean and Pacific Oceans, and in Antarctica. The studies are mainly for periods in the present, the Holocene and particularly the last glacial/interglacial, but they also include one study from the Cretaceous. The terrigenous proxies, which are measures of continental vegetation, are based on higher plant leaf wax compounds, i.e. long-chain (circa C 30) hydrocarbons, alcohols and acids. They register the relative contributions of C 3 vs. C 4 type plants to the vegetation in the source areas. The two marine proxies are measures of sea surface temperatures (SST). The longer established one, (U 37K') is based on the relative abundances of C 37 alkenones photosynthesized by unicellular algae, members of the Haptophyta. The newest proxy (TEX 86) is based on C 86 glycerol tetraethers (GDGTs) synthesized in the water column by some of the archaeal microbiota, the Crenarchaeota.

  14. Inferring climate variability from skewed proxy records

    Science.gov (United States)

    Emile-Geay, J.; Tingley, M.

    2013-12-01

    compared to other proxy records. (2) a multiproxy reconstruction of temperature over the Common Era (Mann et al., 2009), where we find that about one third of the records display significant departures from normality. Accordingly, accounting for skewness in proxy predictors has a notable influence on both reconstructed global mean and spatial patterns of temperature change. Inferring climate variability from skewed proxy records thus requires cares, but can be done with relatively simple tools. References - Mann, M. E., Z. Zhang, S. Rutherford, R. S. Bradley, M. K. Hughes, D. Shindell, C. Ammann, G. Faluvegi, and F. Ni (2009), Global signatures and dynamical origins of the little ice age and medieval climate anomaly, Science, 326(5957), 1256-1260, doi:10.1126/science.1177303. - Moy, C., G. Seltzer, D. Rodbell, and D. Anderson (2002), Variability of El Niño/Southern Oscillation activ- ity at millennial timescales during the Holocene epoch, Nature, 420(6912), 162-165.

  15. ELECTRONIC SIGNATURES

    African Journals Online (AJOL)

    10332324

    'electronic signature' means data attached to, incorporated in, or logically associated with other data and which is intended by the user to serve as a signature;. The suggested new definition for an electronic signature reads as follows: 'electronic signature' means a sound, symbol or process that is (i) uniquely linked to the ...

  16. Channel planform geometry and slopes from freely available high-spatial resolution imagery and DEM fusion: Implications for channel width scalings, erosion proxies, and fluvial signatures in tectonically active landscapes

    Science.gov (United States)

    Fisher, G. Burch; Bookhagen, Bodo; Amos, Colin B.

    2013-07-01

    The rapid expansion of high-spatial resolution optical sensors and imagery over the last decade presents exceptional opportunities for quantifying visible attributes of geomorphic systems. In this study, we detail a simple, robust methodology (ChanGeom) to extract continuous channel width and centerline datasets for single-thread channels using freely available high-spatial resolution imagery currently available in Google Earth and Bing Maps. Comparisons with a global dataset of field and lidar-derived channel widths indicate minimal errors associated with the imagery and ChanGeom methodology (digital elevation models (DEMs), removes along-profile shortening and coincident increases in reach-scale channel slope. Lastly, comparisons of ASTER GDEM V2, SRTM V4.1, and lidar channel profiles extracted in moderate to high-relief regions demonstrate the inferiority of the ASTER GDEM for channel slope calculations, despite the apparent spatial resolution advantages (9 ×). The methodology presented here will facilitate new discoveries in the fluvial environment that have historically been difficult due to access and imagery resolution issues, and provide greater perspective on channel signatures and responses to a host of landscape forcings, especially in tectonically active bedrock and lower order drainage systems.

  17. A comparison of Solar proxy-magnetometry diagnostics

    NARCIS (Netherlands)

    Leenaarts, J.|info:eu-repo/dai/nl/304837946; Rutten, R.J.|info:eu-repo/dai/nl/074143662; Carlsson, M.; Uitenbroek, H.

    2006-01-01

    Aims. We test various proxy-magnetometry diagnostics, i.e., brightness signatures of small-scale magnetic elements, for studying magnetic field structures in the solar photosphere. Methods. Images are numerically synthesized from a 3D solar magneto-convection simulation for, respectively, the G band

  18. Munchausen syndrome by proxy

    Directory of Open Access Journals (Sweden)

    Jovanović Aleksandar A.

    2005-01-01

    Full Text Available This review deals with bibliography on Munchausen syndrome by proxy (MSbP. The name of this disorder was introduced by English psychiatrist Roy Meadow who pointed to diagnostic difficulties as well as to serious medical and legal connotations of MSbP. MSbP was classified in DSM-IV among criteria sets provided for further study as "factitious disorder by proxy", while in ICD-10, though not explicitly cited, MSbP might be classified as "factitious disorders" F68.1. MSbP is a special form of abuse where the perpetrator induces somatic or mental symptoms of illness in the victim under his/her care and then persistently presents the victims for medical examinations and care. The victim is usually a preschool child and the perpetrator is the child's mother. Motivation for such pathological behavior of perpetrator is considered to be unconscious need to assume sick role by proxy while external incentives such as economic gain are absent. Conceptualization of MSbP development is still in the domain of psychodynamic speculation, its course is chronic and the prognosis is poor considering lack of consistent, efficient and specific treatment. The authors also present the case report of thirty-three year-old mother who had been abusing her nine year-old son both emotionally and physically over the last several years forcing him to, together with her, report to the police, medical and educational institutions that he had been the victim of rape, poisoning and beating by various individuals, especially teaching and medical staff. Mother manifested psychosis and her child presented with impaired cognitive development, emotional problems and conduct disorder.

  19. [Munchausen by proxy syndrome].

    Science.gov (United States)

    Depauw, A; Loas, G; Delhaye, M

    2015-01-01

    The Munchausen syndrome by proxy (MSBP) was first described in 1977 by the English paediatrician Roy Meadow. The MSBP is an extremely complicated diagnosis because of the difficulty in finding the incriminating evidence of its existence and because of the ethical issue it raises for caregivers. Its implications from a medical, psychological and legal point of view raise difficult questions for any professional confronted to it. In this article we will first present the case of a 16-year-old teenager who had been bedridden in hospital for a year, before an atypical form of MSBP was finally diagnosed, after a stay in a child and adolescent psychiatry unit. We will then discuss this case in light of a literature review on the MSBP.

  20. Proxy consent: moral authority misconceived.

    Science.gov (United States)

    Wrigley, A

    2007-09-01

    The Mental Capacity Act 2005 has provided unified scope in the British medical system for proxy consent with regard to medical decisions, in the form of a lasting power of attorney. While the intentions are to increase the autonomous decision making powers of those unable to consent, the author of this paper argues that the whole notion of proxy consent collapses into a paternalistic judgement regarding the other person's best interests and that the new legislation introduces only an advisor, not a proxy with the moral authority to make treatment decisions on behalf of another. The criticism is threefold. First, there is good empirical evidence that people are poor proxy decision makers as regards accurately representing other people's desires and wishes, and this is therefore a pragmatically inadequate method of gaining consent. Second, philosophical theory explaining how we represent other people's thought processes indicates that we are unlikely ever to achieve accurate simulations of others' wishes in making a proxy decision. Third, even if we could accurately simulate other people's beliefs and wishes, the current construction of proxy consent in the Mental Capacity Act means that it has no significant ethical authority to match that of autonomous decision making. Instead, it is governed by a professional, paternalistic, best-interests judgement that undermines the intended role of a proxy decision maker. The author argues in favour of clearly adopting the paternalistic best-interests option and viewing the proxy as solely an advisor to the professional medical team in helping make best-interests judgements.

  1. Private Computing with Untrustworthy Proxies

    NARCIS (Netherlands)

    Gedrojc, B.

    2011-01-01

    The objective of this thesis is to preserve privacy for the user while untrustworthy proxies are involved in the communication and computation i.e. private computing. A basic example of private computing is an access control system (proxy) which grants access (or not) to users based on fingerprints.

  2. Robotic Vehicle Proxy Simulation Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Energid Technologies proposes the development of a digital simulation that can replace robotic vehicles in field studies. This proxy simulation will model the...

  3. A group signature scheme based on quantum teleportation

    Science.gov (United States)

    Wen, Xiaojun; Tian, Yuan; Ji, Liping; Niu, Xiamu

    2010-05-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  4. Qualitative and Quantitative Sentiment Proxies

    DEFF Research Database (Denmark)

    Zhao, Zeyan; Ahmad, Khurshid

    2015-01-01

    Sentiment analysis is a content-analytic investigative framework for researchers, traders and the general public involved in financial markets. This analysis is based on carefully sourced and elaborately constructed proxies for market sentiment and has emerged as a basis for analysing movements...... and trading volumes. The case study we use is a small market index (Danish Stock Exchange Index, OMXC 20, together with prevailing sentiment in Denmark, to evaluate the impact of sentiment on OMXC 20. Furthermore, we introduce a rather novel and quantitative sentiment proxy, that is the use of the index...

  5. Motif signatures of transcribed enhancers

    KAUST Repository

    Kleftogiannis, Dimitrios

    2017-09-14

    In mammalian cells, transcribed enhancers (TrEn) play important roles in the initiation of gene expression and maintenance of gene expression levels in spatiotemporal manner. One of the most challenging questions in biology today is how the genomic characteristics of enhancers relate to enhancer activities. This is particularly critical, as several recent studies have linked enhancer sequence motifs to specific functional roles. To date, only a limited number of enhancer sequence characteristics have been investigated, leaving space for exploring the enhancers genomic code in a more systematic way. To address this problem, we developed a novel computational method, TELS, aimed at identifying predictive cell type/tissue specific motif signatures. We used TELS to compile a comprehensive catalog of motif signatures for all known TrEn identified by the FANTOM5 consortium across 112 human primary cells and tissues. Our results confirm that distinct cell type/tissue specific motif signatures characterize TrEn. These signatures allow discriminating successfully a) TrEn from random controls, proxy of non-enhancer activity, and b) cell type/tissue specific TrEn from enhancers expressed and transcribed in different cell types/tissues. TELS codes and datasets are publicly available at http://www.cbrc.kaust.edu.sa/TELS.

  6. Munchausen syndrome by proxy: a case report.

    Science.gov (United States)

    Lieder, Holly S; Irving, Sharon Y; Mauricio, Rizalina; Graf, Jeanine M

    2005-01-01

    Munchausen syndrome by proxy is difficult to diagnose unless healthcare providers are astute to its clinical features and management. A case is presented to educate nurses and advanced practice nurses, of the nursing, medical, legal, and social complexities associated with Munchausen syndrome by proxy. This article also provides a brief review of the definition of Munchausen syndrome by proxy, its epidemiology, common features of the perpetrator, implications for healthcare personnel, and the legal and international ramifications of Munchausen syndrome by proxy.

  7. Shareholder Activism Through the Proxy Process

    NARCIS (Netherlands)

    Renneboog, L.D.R.; Szilagyi, P.G.

    2009-01-01

    This paper provides evidence on the corporate governance role of shareholder-initiated proxy proposals. Previous studies debate over whether activists use proxy proposals to discipline firms or to simply advance their self-serving agendas, and whether proxy proposals are effective at all in

  8. Shareholder Activism through the Proxy Process

    NARCIS (Netherlands)

    Renneboog, L.D.R.; Szilagyi, P.G.

    2009-01-01

    This paper provides evidence on the corporate governance role of shareholderinitiated proxy proposals. Previous studies debate over whether activists use proxy proposals to discipline firms or to simply advance their self-serving agendas, and whether proxy proposals are effective at all in

  9. Blind Astronomers

    Science.gov (United States)

    Hockey, Thomas A.

    2011-01-01

    The phrase "blind astronomer” is used as an allegorical oxymoron. However, there were and are blind astronomers. What of famous blind astronomers? First, it must be stated that these astronomers were not martyrs to their craft. It is a myth that astronomers blind themselves by observing the Sun. As early as France's William of Saint-Cloud (circa 1290) astronomers knew that staring at the Sun was ill-advised and avoided it. Galileo Galilei did not invent the astronomical telescope and then proceed to blind himself with one. Galileo observed the Sun near sunrise and sunset or through projection. More than two decades later he became blind, as many septuagenarians do, unrelated to their profession. Even Isaac Newton temporarily blinded himself, staring at the reflection of the Sun when he was a twentysomething. But permanent Sun-induced blindness? No, it did not happen. For instance, it was a stroke that left Scotland's James Gregory (1638-1675) blind. (You will remember the Gregorian telescope.) However, he died days later. Thus, blindness little interfered with his occupation. English Abbot Richard of Wallingford (circa 1291 - circa 1335) wrote astronomical works and designed astronomical instruments. He was also blind in one eye. Yet as he further suffered from leprosy, his blindness seems the lesser of Richard's maladies. Perhaps the most famous professionally active, blind astronomer (or almost blind astronomer) is Dominique-Francois Arago (1786-1853), director until his death of the powerful nineteenth-century Paris Observatory. I will share other _ some poignant _ examples such as: William Campbell, whose blindness drove him to suicide; Leonhard Euler, astronomy's Beethoven, who did nearly half of his life's work while almost totally blind; and Edwin Frost, who "observed” a total solar eclipse while completely sightless.

  10. Shell architecture: a novel proxy for paleotemperature reconstructions?

    Science.gov (United States)

    Milano, Stefania; Nehrke, Gernot; Wanamaker, Alan D., Jr.; Witbaard, Rob; Schöne, Bernd R.

    2017-04-01

    Mollusk shells are unique high-resolution paleoenvironmental archives. Their geochemical properties, such as oxygen isotope composition (δ18Oshell) and element-to-calcium ratios, are routinely used to estimate past environmental conditions. However, the existing proxies have certain drawbacks that can affect paleoreconstruction robustness. For instance, the estimation of water temperature of brackish and near-shore environments can be biased by the interdependency of δ18Oshell from multiple environmental variables (water temperature and δ18Owater). Likely, the environmental signature can be masked by physiological processes responsible for the incorporation of trace elements into the shell. The present study evaluated the use of shell structural properties as alternative environmental proxies. The sensitivity of shell architecture at µm and nm-scale to the environment was tested. In particular, the relationship between water temperature and microstructure formation was investigated. To enable the detection of potential structural changes, the shells of the marine bivalves Cerastoderma edule and Arctica islandica were analyzed with Scanning Electron Microscopy (SEM), nanoindentation and Confocal Raman Microscopy (CRM). These techniques allow a quantitative approach to the microstructural analysis. Our results show that water temperature induces a clear response in shell microstructure. A significant alteration in the morphometric characteristics and crystallographic orientation of the structural units was observed. Our pilot study suggests that shell architecture records environmental information and it has potential to be used as novel temperature proxy in near-shore and open ocean habitats.

  11. Measuring SIP proxy server performance

    CERN Document Server

    Subramanian, Sureshkumar V

    2013-01-01

    Internet Protocol (IP) telephony is an alternative to the traditional Public Switched Telephone Networks (PSTN), and the Session Initiation Protocol (SIP) is quickly becoming a popular signaling protocol for VoIP-based applications. SIP is a peer-to-peer multimedia signaling protocol standardized by the Internet Engineering Task Force (IETF), and it plays a vital role in providing IP telephony services through its use of the SIP Proxy Server (SPS), a software application that provides call routing services by parsing and forwarding all the incoming SIP packets in an IP telephony network.SIP Pr

  12. Hereditary family signature of facial expression.

    Science.gov (United States)

    Peleg, Gili; Katzir, Gadi; Peleg, Ofer; Kamara, Michal; Brodsky, Leonid; Hel-Or, Hagit; Keren, Daniel; Nevo, Eviatar

    2006-10-24

    Although facial expressions of emotion are universal, individual differences create a facial expression "signature" for each person; but, is there a unique family facial expression signature? Only a few family studies on the heredity of facial expressions have been performed, none of which compared the gestalt of movements in various emotional states; they compared only a few movements in one or two emotional states. No studies, to our knowledge, have compared movements of congenitally blind subjects with their relatives to our knowledge. Using two types of analyses, we show a correlation between movements of congenitally blind subjects with those of their relatives in think-concentrate, sadness, anger, disgust, joy, and surprise and provide evidence for a unique family facial expression signature. In the analysis "in-out family test," a particular movement was compared each time across subjects. Results show that the frequency of occurrence of a movement of a congenitally blind subject in his family is significantly higher than that outside of his family in think-concentrate, sadness, and anger. In the analysis "the classification test," in which congenitally blind subjects were classified to their families according to the gestalt of movements, results show 80% correct classification over the entire interview and 75% in anger. Analysis of the movements' frequencies in anger revealed a correlation between the movements' frequencies of congenitally blind individuals and those of their relatives. This study anticipates discovering genes that influence facial expressions, understanding their evolutionary significance, and elucidating repair mechanisms for syndromes lacking facial expression, such as autism.

  13. Elemental signature of terrigenous sediment runoff as recorded in coastal salt ponds: US Virgin Islands

    NARCIS (Netherlands)

    Larson, R.A.; Brooks, G.R.; Devine, B.; Schwing, P.T.; Holmes, C.W.; Jilbert, T.; Reichart, G.J.

    2015-01-01

    A high-resolution, multi-proxy approach is utilized on mm- to cm-scale laminated coastal salt pond sediments from St. John, U.S. Virgin Islands, to determine: (1) the sedimentological signature of depositional events/processes, (2) link this sedimentological signature with known depositional

  14. Elemental signature of terrigenous sediment runoff as recorded in coastal salt ponds : US Virgin Islands

    NARCIS (Netherlands)

    Larson, Rebekka A.; Brooks, Gregg R.; Devine, Barry; Schwing, Patrick T.; Holmes, Charles W.; Jilbert, Tom; Reichart, Gert Jan

    2015-01-01

    A high-resolution, multi-proxy approach is utilized on mm- to cm-scale laminated coastal salt pond sediments from St. John, U.S. Virgin Islands, to determine: (1) the sedimentological signature of depositional events/processes, (2) link this sedimentological signature with known depositional

  15. [Cortical blindness].

    Science.gov (United States)

    Chokron, S

    2014-02-01

    Cortical blindness refers to a visual loss induced by a bilateral occipital lesion. The very strong cooperation between psychophysics, cognitive psychology, neurophysiology and neuropsychology these latter twenty years as well as recent progress in cerebral imagery have led to a better understanding of neurovisual deficits, such as cortical blindness. It thus becomes possible now to propose an earlier diagnosis of cortical blindness as well as new perspectives for rehabilitation in children as well as in adults. On the other hand, studying complex neurovisual deficits, such as cortical blindness is a way to infer normal functioning of the visual system. Copyright © 2013 Elsevier Masson SAS. All rights reserved.

  16. Developing composite signatures

    Science.gov (United States)

    Hawley, Chadwick T.; Carpenter, Tom; Cappelaere, Patrice G.; Frye, Stu; Lemoigne-Stewart, Jacqueline J.; Mandle, Dan; Montgomery, Sarah; Williams-Bess, Autumn

    2011-06-01

    A composite signature is a group of signatures that are related in such a way to more completely or further define a target or operational endeavor at a higher fidelity. This paper explores the merits of using composite signatures, in lieu of waiting for opportunities for the more elusive diagnostic signatures, to satisfy key essential elements of information Keywords: signature, composite signature, civil disaster (EEI) associated with civil disaster-related problems. It discusses efforts to refine composite signature development methodology and quantify the relative value of composite vs. diagnostic signatures. The objectives are to: 1) investigate and develop innovative composite signatures associated with civil disasters, including physical, chemical and pattern/behavioral; 2) explore the feasibility of collecting representative composite signatures using current and emerging intelligence, surveillance, and reconnaissance (ISR) collection architectures leveraging civilian and commercial architectures; and 3) collaborate extensively with scientists and engineers from U.S. government organizations and laboratories, the defense industry, and academic institutions.

  17. Munchausen Syndrome by Proxy: Identification and Intervention

    Science.gov (United States)

    Walk, Alexandra; Davies, Susan C.

    2010-01-01

    This article discusses the Munchausen syndrome by proxy (MSBP), also known as "factitious disorder by proxy" (FDBP) and fabricated and/or induced illness, which is a mental illness in which a person lies about the physical or mental well-being of a person he/she is responsible for. Most often the dynamic transpires between a mother and her child.…

  18. New proxy replacement algorithm for multimedia streaming

    Science.gov (United States)

    Wong, Hau Ling; Lo, Kwok-Tung

    2001-11-01

    Proxy servers play an important role in between servers and clients in various multimedia systems on the Internet. Since proxy servers do not have an infinite-capacity cache for keeping all the continuous media data, the challenge for the replacement policy is to determine which streams should be cached or removed from the proxy server. In this paper, a new proxy replacement algorithm, named the Least Popular Used (LPU) caching algorithm, is proposed for layered encoded multimedia streams in the Internet. The LPU method takes both the short-term and long-term popularity of the video into account in determining the replacement policy. Simulation evaluation shows that our proposed scheme achieves better results than some existing methods in term of the cache efficiency and replacement frequency under both static and dynamic access environments.

  19. 78 FR 70987 - Proxy Advisory Firm Roundtable

    Science.gov (United States)

    2013-11-27

    ... of proxy advisory firm use by investment advisers and institutional investors and potential changes... Special Counsel, Division of Investment Management, at 202-551-6700, or Raymond Be, Special Counsel...

  20. A serial Munchausen syndrome by proxy

    National Research Council Canada - National Science Library

    Esra Unal; Volkan Unal; Ali Gul; Mustafa Celtek; Behzat Diken; Ibrahim Balcioglu

    2017-01-01

    Munchausen syndrome by proxy (MSBP) is a form of child abuse that describes children whose parents or caregivers invent illness stories and substantiate the stories by fabricating false physical signs...

  1. Seizures and Munchausen Syndrome by Proxy

    Directory of Open Access Journals (Sweden)

    J Gordon Millichap

    2002-05-01

    Full Text Available The prevalence, morbidity and mortality, diagnosis and management of cases of fabricated seizures and child abuse (Munchausen syndrome by proxy (MSbp are assessed by pediatricians at the University of Wales College of Medicine, Cardiff, UK.

  2. Munchausen Syndrome by Proxy: A Clinical Vignette

    Science.gov (United States)

    Zylstra, Robert G.; Miller, Karl E.; Stephens, Walter E.

    2000-01-01

    Munchausen syndrome by proxy is the act of one person fabricating or inducing an illness in another to meet his or her own emotional needs through the treatment process. The diagnosis is poorly understood and controversial. We report here the case of a 6-year-old boy who presented with possible pneumonia, nausea, vomiting, and diarrhea and whose mother was suspected of Munchausen syndrome by proxy. PMID:15014581

  3. PENGELOLAAN JARINGAN INTERNET DENGAN PROXY WINGATE

    Directory of Open Access Journals (Sweden)

    Titin Winarti

    2005-01-01

    Full Text Available Proxy adalah bagian dari protokol yang berfungsi sebagai link untuk host tunggal atau sebagai link untuk beberapa host antarajaringan dan jaringan lain. Proxy wingate adalah software yang digunakan untuk berbagi koneksi internet melalui satu alamat IPyang terintegrasi ke internet.

  4. Web proxy auto discovery for the WLCG

    CERN Document Server

    Dykstra, D; Blumenfeld, B; De Salvo, A; Dewhurst, A; Verguilov, V

    2017-01-01

    All four of the LHC experiments depend on web proxies (that is, squids) at each grid site to support software distribution by the CernVM FileSystem (CVMFS). CMS and ATLAS also use web proxies for conditions data distributed through the Frontier Distributed Database caching system. ATLAS & CMS each have their own methods for their grid jobs to find out which web proxies to use for Frontier at each site, and CVMFS has a third method. Those diverse methods limit usability and flexibility, particularly for opportunistic use cases, where an experiment’s jobs are run at sites that do not primarily support that experiment. This paper describes a new Worldwide LHC Computing Grid (WLCG) system for discovering the addresses of web proxies. The system is based on an internet standard called Web Proxy Auto Discovery (WPAD). WPAD is in turn based on another standard called Proxy Auto Configuration (PAC). Both the Frontier and CVMFS clients support this standard. The input into the WLCG system comes from squids regis...

  5. Cooperative Proxy Caching for Wireless Base Stations

    Directory of Open Access Journals (Sweden)

    James Z. Wang

    2007-01-01

    Full Text Available This paper proposes a mobile cache model to facilitate the cooperative proxy caching in wireless base stations. This mobile cache model uses a network cache line to record the caching state information about a web document for effective data search and cache space management. Based on the proposed mobile cache model, a P2P cooperative proxy caching scheme is proposed to use a self-configured and self-managed virtual proxy graph (VPG, independent of the underlying wireless network structure and adaptive to the network and geographic environment changes, to achieve efficient data search, data cache and date replication. Based on demand, the aggregate effect of data caching, searching and replicating actions by individual proxy servers automatically migrates the cached web documents closer to the interested clients. In addition, a cache line migration (CLM strategy is proposed to flow and replicate the heads of network cache lines of web documents associated with a moving mobile host to the new base station during the mobile host handoff. These replicated cache line heads provide direct links to the cached web documents accessed by the moving mobile hosts in the previous base station, thus improving the mobile web caching performance. Performance studies have shown that the proposed P2P cooperative proxy caching schemes significantly outperform existing caching schemes.

  6. Biomarker Proxy Calibration Along the AMT Transect: Alkenone Uk37' and δD

    Science.gov (United States)

    Gould, J.; Kienast, M.; Dowd, M.; Schefuß, E.

    2016-12-01

    This study analyzes 60 suspended particulate organic matter (SPOM) samples from an Atlantic Meridional Transect (AMT20), spanning approximately 105° latitude (Southampton to Punta Arenas), for key biomarker proxy signatures: alkenone unsaturation (Uk37') and hydrogen isotopic (δD) composition. The wide range in surface ocean characteristics along the transect offers a unique opportunity to refine our understanding of these proxies. Initial alkenone δD values correlate - to a first order - with water column δD signatures, which in turn parallel salinity values along the AMT20 transect. Other factors that have been shown to influence δD will be discussed as well. The Uk37' data presented are in good agreement with previously published SPOM data, though we offer an alternative regression model to relate Uk37' to sea surface temperatures (SST); the Richards curve (Richards, 1959). This non-linear regression model uniquely accounts for both the fact that the Uk37' index is a proportion, and so must lie between 0 and 1, as well as for an apparent reduction in slope at temperature extremes. The inverse of this relationship allows estimation of SST from a measured Uk37' value with quantitative estimates of uncertainty. Further, we have identified a pronounced seasonal sampling bias in the SPOM dataset analyzed in this and prior studies (e.g. Conte et al. 2006), which may be contributing to a reported offset between surface particulate and core-top Uk37'- SST calibrations for this proxy.

  7. A statistical proxy for sulphuric acid concentration

    Directory of Open Access Journals (Sweden)

    S. Mikkonen

    2011-11-01

    Full Text Available Gaseous sulphuric acid is a key precursor for new particle formation in the atmosphere. Previous experimental studies have confirmed a strong correlation between the number concentrations of freshly formed particles and the ambient concentrations of sulphuric acid. This study evaluates a body of experimental gas phase sulphuric acid concentrations, as measured by Chemical Ionization Mass Spectrometry (CIMS during six intensive measurement campaigns and one long-term observational period. The campaign datasets were measured in Hyytiälä, Finland, in 2003 and 2007, in San Pietro Capofiume, Italy, in 2009, in Melpitz, Germany, in 2008, in Atlanta, Georgia, USA, in 2002, and in Niwot Ridge, Colorado, USA, in 2007. The long term data were obtained in Hohenpeissenberg, Germany, during 1998 to 2000. The measured time series were used to construct proximity measures ("proxies" for sulphuric acid concentration by using statistical analysis methods. The objective of this study is to find a proxy for sulfuric acid that is valid in as many different atmospheric environments as possible. Our most accurate and universal formulation of the sulphuric acid concentration proxy uses global solar radiation, SO2 concentration, condensation sink and relative humidity as predictor variables, yielding a correlation measure (R of 0.87 between observed concentration and the proxy predictions. Interestingly, the role of the condensation sink in the proxy was only minor, since similarly accurate proxies could be constructed with global solar radiation and SO2 concentration alone. This could be attributed to SO2 being an indicator for anthropogenic pollution, including particulate and gaseous emissions which represent sinks for the OH radical that, in turn, is needed for the formation of sulphuric acid.

  8. Radar Signature Calculation Facility

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: The calculation, analysis, and visualization of the spatially extended radar signatures of complex objects such as ships in a sea multipath environment and...

  9. Unconditionally Secure Quantum Signatures

    Directory of Open Access Journals (Sweden)

    Ryan Amiri

    2015-08-01

    Full Text Available Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols—signatures based on the Rivest–Adleman–Shamir (RSA algorithm, the digital signature algorithm (DSA, and the elliptic curve digital signature algorithm (ECDSA—are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally securesecure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  10. Web Proxy Auto Discovery for the WLCG

    Science.gov (United States)

    Dykstra, D.; Blomer, J.; Blumenfeld, B.; De Salvo, A.; Dewhurst, A.; Verguilov, V.

    2017-10-01

    All four of the LHC experiments depend on web proxies (that is, squids) at each grid site to support software distribution by the CernVM FileSystem (CVMFS). CMS and ATLAS also use web proxies for conditions data distributed through the Frontier Distributed Database caching system. ATLAS & CMS each have their own methods for their grid jobs to find out which web proxies to use for Frontier at each site, and CVMFS has a third method. Those diverse methods limit usability and flexibility, particularly for opportunistic use cases, where an experiment’s jobs are run at sites that do not primarily support that experiment. This paper describes a new Worldwide LHC Computing Grid (WLCG) system for discovering the addresses of web proxies. The system is based on an internet standard called Web Proxy Auto Discovery (WPAD). WPAD is in turn based on another standard called Proxy Auto Configuration (PAC). Both the Frontier and CVMFS clients support this standard. The input into the WLCG system comes from squids registered in the ATLAS Grid Information System (AGIS) and CMS SITECONF files, cross-checked with squids registered by sites in the Grid Configuration Database (GOCDB) and the OSG Information Management (OIM) system, and combined with some exceptions manually configured by people from ATLAS and CMS who operate WLCG Squid monitoring. WPAD servers at CERN respond to http requests from grid nodes all over the world with a PAC file that lists available web proxies, based on IP addresses matched from a database that contains the IP address ranges registered to organizations. Large grid sites are encouraged to supply their own WPAD web servers for more flexibility, to avoid being affected by short term long distance network outages, and to offload the WLCG WPAD servers at CERN. The CERN WPAD servers additionally support requests from jobs running at non-grid sites (particularly for LHC@Home) which they direct to the nearest publicly accessible web proxy servers. The responses

  11. Digital Signature Management.

    Science.gov (United States)

    Hassler, Vesna; Biely, Helmut

    1999-01-01

    Describes the Digital Signature Project that was developed in Austria to establish an infrastructure for applying smart card-based digital signatures in banking and electronic-commerce applications. Discusses the need to conform to international standards, an international certification infrastructure, and security features for a public directory…

  12. Munchausen Syndrome by Proxy: Medical Diagnostic Criteria.

    Science.gov (United States)

    Rosenberg, Donna Andrea

    2003-01-01

    Medical diagnostic criteria for Munchausen Syndrome by Proxy (a persistent fabrication by one individual of illness in another) are presented. Since the strength of the known facts may vary from case to case, diagnostic criteria are given for a definitive diagnosis, a possible diagnosis, an inconclusive determination, and the definitely excluded…

  13. Munchausen Syndrome by Proxy: Evaluation and Treatment.

    Science.gov (United States)

    Parnell, Teresa F.; Day, Deborah O.

    Munchausen Syndrome by Proxy (MSBP) is characterized by a significant caretaker, usually a mother, deliberately inducing and/or falsely reporting illness in a child. The potentially fatal outcome of undetected MSBP makes the understanding of this syndrome gravely important. Early detection and effective intervention can be accomplished through the…

  14. Munchausen Syndrome by Proxy: Social Work's Role.

    Science.gov (United States)

    Mercer, Susan O.; Perdue, Jeanette D.

    1993-01-01

    Describes Munchausen syndrome by proxy, diagnosis used to describe variation of child abuse whereby parent or adult caregiver fabricates medical history or induces symptoms in child, or both, resulting in unnecessary examinations, treatments, hospitalizations, and even death. Reviews assessment procedures, provides case studies, and describes…

  15. Munchausen Syndrome by Proxy: A Family Affair.

    Science.gov (United States)

    Mehl, Albert L.; And Others

    1990-01-01

    The article reports on a case of Munchausen syndrome by proxy in which chronic illicit insulin was administered to a one-year-old child by her mother. Factitious illnesses continued despite psychiatric intervention. Retrospective review of medical records suggested 30 previous episodes of factitious illness within the family. (DB)

  16. The Syndrome of Munchausen by Proxy.

    Science.gov (United States)

    Jones, David P. H.

    1994-01-01

    This editorial introduces two articles on Munchausen by Proxy syndrome (the induction of an appearance or state of physical ill health in a child, by the caretaker, and the child's subsequent presentation to health professionals for diagnosis and/or treatment). The severity of the caretaker's psychological disturbance and the serious effects on…

  17. Improving Internet Archive Service through Proxy Cache.

    Science.gov (United States)

    Yu, Hsiang-Fu; Chen, Yi-Ming; Wang, Shih-Yong; Tseng, Li-Ming

    2003-01-01

    Discusses file transfer protocol (FTP) servers for downloading archives (files with particular file extensions), and the change to HTTP (Hypertext transfer protocol) with increased Web use. Topics include the Archie server; proxy cache servers; and how to improve the hit rate of archives by a combination of caching and better searching mechanisms.…

  18. Source-specific diatom lipid biomarkers as proxies for Arctic and Antarctic sea ice

    Science.gov (United States)

    Belt, Simon

    2016-04-01

    Sea ice plays a key role in controlling global climate due its influence over heat and gas exchange between the oceans and the atmosphere. In addition, sea ice exerts a strong influence over the absorption of incoming radiation at the ocean surface as a result of its high reflectivity or albedo. Driven, in part, by the recent dramatic changes to sea ice cover in both the Arctic and the Antarctic, the development of proxies for sea ice has received growing attention over the last 10 years or so. Amongst these, some so-called highly branched isoprenoid (HBI) lipid biomarkers have attracted considerable interest, not least, because they are derived from certain diatoms that reside and bloom within the sea ice matrix itself, thus providing a more direct indication of sea ice presence compared with some other proxies. The signature HBI sea proxies are a mono-unsaturated HBI (IP25) for the Arctic and a di-unsaturated HBI (C25:2) for the Antarctic, with different source organisms for each. Although the variability in sedimentary abundances of IP25 and C25:2 in Arctic and Antarctic sediments generally reflect the corresponding changes in sea ice conditions, a more complete picture of reconstructing sea ice conditions likely requires a multi-proxy approach involving, for example, other lipid biomarkers that serve as proxy measures of nearby open water conditions or sea surface temperature. By adoption of such an approach, a research strategy aimed at improving estimates of sea ice concentrations or better definitions of sea ice conditions (e.g. marginal ice zone, polynyas, permanent ice cover) represents the next stage in lipid-based sea ice proxy development. This presentation will focus on recent developments and future plans that involve a multi-proxy approach to improving sea ice reconstruction. An understanding of sources, ecology and environmental fate of various HBIs and other diatom lipids will likely be key in shaping the future direction of lipid-based sea ice

  19. Comparing proxy and model estimates of hydroclimate variability and change over the Common Era

    Science.gov (United States)

    Hydro2k Consortium, Pages

    2017-12-01

    Water availability is fundamental to societies and ecosystems, but our understanding of variations in hydroclimate (including extreme events, flooding, and decadal periods of drought) is limited because of a paucity of modern instrumental observations that are distributed unevenly across the globe and only span parts of the 20th and 21st centuries. Such data coverage is insufficient for characterizing hydroclimate and its associated dynamics because of its multidecadal to centennial variability and highly regionalized spatial signature. High-resolution (seasonal to decadal) hydroclimatic proxies that span all or parts of the Common Era (CE) and paleoclimate simulations from climate models are therefore important tools for augmenting our understanding of hydroclimate variability. In particular, the comparison of the two sources of information is critical for addressing the uncertainties and limitations of both while enriching each of their interpretations. We review the principal proxy data available for hydroclimatic reconstructions over the CE and highlight the contemporary understanding of how these proxies are interpreted as hydroclimate indicators. We also review the available last-millennium simulations from fully coupled climate models and discuss several outstanding challenges associated with simulating hydroclimate variability and change over the CE. A specific review of simulated hydroclimatic changes forced by volcanic events is provided, as is a discussion of expected improvements in estimated radiative forcings, models, and their implementation in the future. Our review of hydroclimatic proxies and last-millennium model simulations is used as the basis for articulating a variety of considerations and best practices for how to perform proxy-model comparisons of CE hydroclimate. This discussion provides a framework for how best to evaluate hydroclimate variability and its associated dynamics using these comparisons and how they can better inform

  20. A New Proxy Electronic Voting Scheme Achieved by Six-Particle Entangled States

    Science.gov (United States)

    Cao, Hai-Jing; Ding, Li-Yuan; Jiang, Xiu-Li; Li, Peng-Fei

    2017-12-01

    In this paper, we use quantum proxy signature to construct a new secret electronic voting scheme. In our scheme, six particles entangled states function as quantum channels. The voter Alice, the Vote Management Center Bob, the scrutineer Charlie only perform two particles measurements on the Bell bases to realize the electronic voting process. So the scheme reduces the technical difficulty and increases operation efficiency. We use quantum key distribution and one-time pad to guarantee its unconditional security. The significant advantage of our scheme is that transmitted information capacity is twice as much as the capacity of other schemes.

  1. UV Signature Mutations †

    Science.gov (United States)

    2014-01-01

    Sequencing complete tumor genomes and exomes has sparked the cancer field's interest in mutation signatures for identifying the tumor's carcinogen. This review and meta-analysis discusses signatures and their proper use. We first distinguish between a mutagen's canonical mutations – deviations from a random distribution of base changes to create a pattern typical of that mutagen – and the subset of signature mutations, which are unique to that mutagen and permit inference backward from mutations to mutagen. To verify UV signature mutations, we assembled literature datasets on cells exposed to UVC, UVB, UVA, or solar simulator light (SSL) and tested canonical UV mutation features as criteria for clustering datasets. A confirmed UV signature was: ≥60% of mutations are C→T at a dipyrimidine site, with ≥5% CC→TT. Other canonical features such as a bias for mutations on the non-transcribed strand or at the 3' pyrimidine had limited application. The most robust classifier combined these features with criteria for the rarity of non-UV canonical mutations. In addition, several signatures proposed for specific UV wavelengths were limited to specific genes or species; non-signature mutations induced by UV may cause melanoma BRAF mutations; and the mutagen for sunlight-related skin neoplasms may vary between continents. PMID:25354245

  2. Legal requirements governing proxy voting in Denmark

    DEFF Research Database (Denmark)

    Werlauff, Erik

    2008-01-01

    The requirements in Danish company law concerning proxy voting in companies whose shares have been accepted for listing on a regulated market have been successively tightened in recent years, and corporate governance principles have also led to the introduction of several requirements concerning...... proxy holders. A thorough knowledge of these requirements is important not only for the listed companies but also for their advisers and investors in Denmark and abroad. This article considers these requirements as well as the additional requirements which will derive from Directive 2007....../36 on the exercise of shareholders' rights in listed companies, which must be implemented by 3 August 2009. It is pointed out that companies may provide with advantage in their articles of association for both the existing and the forthcoming requirements at this early stage....

  3. Observable Proxies For 26 Al Enhancement

    Energy Technology Data Exchange (ETDEWEB)

    Fryer, Christopher L [Los Alamos National Laboratory; Young, Patrick A [Los Alamos National Laboratory; Ellinger, Carola I [ASU; Arnett, William D [UNIV ARIZONA

    2008-01-01

    We consider the cospatial production of elements in supernova explosions to find observationally detectable proxies for enhancement of {sup 26}Al in supernova ejecta and stellar systems. Using four progenitors we explore a range of 1D explosions at different energies and an asymmetric 3D explosion. We find that the most reliable indicator of the presence of {sup 26}Al in unmixed ejecta is a very low S/Si ratio ({approx} 0.05). Production of N in O/S/Si-rich regions is also indicative. The biologically important element P is produced at its highest abundance in the same regions. Proxies should be detectable in supernova ejecta with high spatial resolution multi wavelength observations, but the small absolute abundance of material injected into a proto-planetary disk makes detection unlikely in existing or forming stellar/planetary systems.

  4. Non-destructive foraminiferal paleoclimatic proxies: A brief insight

    Digital Repository Service at National Institute of Oceanography (India)

    Saraswat, R.

    Non-Destructive Foraminiferal Paleoclimatic Proxies: A Brief Insight The knowledge of past climate can help us to understand imminent climatic changes. Oceans are the vast archives of past climate. Various indirect techniques termed as proxies...

  5. Advanced Missile Signature Center

    Data.gov (United States)

    Federal Laboratory Consortium — The Advanced Missile Signature Center (AMSC) is a national facility supporting the Missile Defense Agency (MDA) and other DoD programs and customers with analysis,...

  6. THE ELECTRONIC SIGNATURE

    Directory of Open Access Journals (Sweden)

    Voiculescu Madalina Irena

    2009-05-01

    Full Text Available Article refers to significance and the digital signature in electronic commerce. Internet and electronic commerce open up many new opportunities for the consumer, yet, the security (or perceived lack of security of exchanging personal and financial data

  7. Digital signature feasibility study

    Science.gov (United States)

    2008-06-01

    The purpose of this study was to assess the advantages and disadvantages of using digital signatures to assist the Arizona Department of Transportation in conducting business. The Department is evaluating the potential of performing more electronic t...

  8. Are there molecular signatures?

    Energy Technology Data Exchange (ETDEWEB)

    Bennett, W.P.

    1995-10-01

    This report describes molecular signatures and mutational spectrum analysis. The mutation spectrum is defined as the type and location of DNA base change. There are currently about five well documented cases. Mutations and radon-associated tumors are discussed.

  9. Geochemical Proxies for Enhanced Process Control of Underground Coal Gasification

    Science.gov (United States)

    Kronimus, A.; Koenen, M.; David, P.; Veld, H.; van Dijk, A.; van Bergen, F.

    2009-04-01

    Underground coal gasification (UCG) represents a strategy targeting at syngas production for fuel or power generation from in-situ coal seams. It is a promising technique for exploiting coal deposits as an energy source at locations not allowing conventional mining under economic conditions. Although the underlying concept has already been suggested in 1868 and has been later on implemented in a number of field trials and even at a commercial scale, UCG is still facing technological barriers, impeding its widespread application. Field UCG operations rely on injection wells enabling the ignition of the target seam and the supply with oxidants (air, O2) inducing combustion (oxidative conditions). The combustion process delivers the enthalpy required for endothermic hydrogen production under reduction prone conditions in some distance to the injection point. The produced hydrogen - usually accompanied by organic and inorganic carbon species, e.g. CH4, CO, and CO2 - can then be retrieved through a production well. In contrast to gasification of mined coal in furnaces, it is difficult to measure the combustion temperature directly during UCG operations. It is already known that geochemical parameters such as the relative production gas composition as well as its stable isotope signature are related to the combustion temperature and, consequently, can be used as temperature proxies. However, so far the general applicability of such relations has not been proven. In order to get corresponding insights with respect to coals of significantly different rank and origin, four powdered coal samples covering maturities ranging from Ro= 0.43% (lignite) to Ro= 3.39% (anthracite) have been gasified in laboratory experiments. The combustion temperature has been varied between 350 and 900 ˚ C, respectively. During gasification, the generated gas has been captured in a cryo-trap, dried and the carbon containing gas components have been catalytically oxidized to CO2. Thereafter, the

  10. Implementasi Proxy Server Dengan Linux Clear OS 5.2

    OpenAIRE

    Setiadi, Aprian

    2013-01-01

    Tugas Akhir ini membahas mengenai cara untuk membangun sebuah proxy server dalam jaringan LAN. Jaringan LAN yang dibangun menggunakan arsitektur topologi star dengan menjadikan komputer server sebagai Gateway Server dan Proxy Server, sehingga tidak membutuhkan perangkat tambahan Router yang berfungsi sebagai Gateway Server. Proxy Server yang yang dibangun menggunakan metode Transparent Mode, sehingga pada komputer klien tidak perlu mengkonfigurasi port proxy server pada Web Browser. Hasil ya...

  11. Technology of Electronic Signatur

    Directory of Open Access Journals (Sweden)

    Jaroslav Sadovsky

    2004-01-01

    Full Text Available An electronic signature uses a hash of message and an asymetrical algorithm of encryption for its generation. During verification of message on receiver side the hash of original message must be identical with the hash of received message. Electronic message is secured autentization of author and integrity of transmission date. By electronic signature it is possible to sign everything what is in digital form.

  12. Meteor signature interpretation

    Energy Technology Data Exchange (ETDEWEB)

    Canavan, G.H.

    1997-01-01

    Meteor signatures contain information about the constituents of space debris and present potential false alarms to early warnings systems. Better models could both extract the maximum scientific information possible and reduce their danger. Accurate predictions can be produced by models of modest complexity, which can be inverted to predict the sizes, compositions, and trajectories of object from their signatures for most objects of interest and concern.

  13. Deciphering Signatures of Mutational Processes Operative in Human Cancer

    Science.gov (United States)

    Alexandrov, Ludmil B.; Nik-Zainal, Serena; Wedge, David C.; Campbell, Peter J.; Stratton, Michael R.

    2013-01-01

    Summary The genome of a cancer cell carries somatic mutations that are the cumulative consequences of the DNA damage and repair processes operative during the cellular lineage between the fertilized egg and the cancer cell. Remarkably, these mutational processes are poorly characterized. Global sequencing initiatives are yielding catalogs of somatic mutations from thousands of cancers, thus providing the unique opportunity to decipher the signatures of mutational processes operative in human cancer. However, until now there have been no theoretical models describing the signatures of mutational processes operative in cancer genomes and no systematic computational approaches are available to decipher these mutational signatures. Here, by modeling mutational processes as a blind source separation problem, we introduce a computational framework that effectively addresses these questions. Our approach provides a basis for characterizing mutational signatures from cancer-derived somatic mutational catalogs, paving the way to insights into the pathogenetic mechanism underlying all cancers. PMID:23318258

  14. 12 CFR 7.2002 - Director or attorney as proxy.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Director or attorney as proxy. 7.2002 Section 7... OPERATIONS Corporate Practices § 7.2002 Director or attorney as proxy. Any person or group of persons, except the bank's officers, clerks, tellers, or bookkeepers, may be designated to act as proxy. The bank's...

  15. Physicians' Involvement with the New York State Health Care Proxy

    Science.gov (United States)

    Heyman, Janna C.; Sealy, Yvette M.

    2011-01-01

    This study examined physicians' attitude, involvement, and perceived barriers with the health care proxy. A cross sectional, correlational design was used to survey practicing physicians (N = 70). Physicians had positive attitudes toward the health care proxy and indicated that the most significant barriers to health care proxy completion were…

  16. Magnitude and Temporal Trends in Avoidable Blindness in Children (ABC) in India.

    Science.gov (United States)

    Gudlavalleti, Venkata S Murthy

    2017-12-01

    The World Health Organization estimates that 19 million children are visually impaired, among whom, 1.4 million are blind. Childhood blindness is an excellent indicator of the state of child health and primary care services in a country. Childhood blindness is important not just due to the number of children blind but also because the number of years that the surviving child has to live with blindness (blind years lived). Childhood blindness is next only to adult cataract in terms of the number of blind person years lived. Under-five mortality rates have been used as a proxy measure to compute the prevalence of childhood blindness in low and middle income countries due to limitations of other methods of data collection. In India, it is estimated that there are 0.8 blind for 1000 children. Whole globe lesions, corneal scarring, retinal pathology and afflictions of the lens are important anatomical sites in children. Causes operating in childhood and hereditary causes are important in etiology of childhood blindness. In 38.2%-68.4% cases across the region, a specific cause of blindness could not be identified in South Asia. The proportion of blindness that can be prevented or treated (avoidable) in children is less than 50%. Therefore a comprehensive eye care system needs to be in place to cater to the needs of children with avoidable and those with incurable blindness. Early detection and prompt management are critical for success of programs targeting avoidable blindness in children.

  17. Signature verification: A comprehensive study of the hidden signature method

    Directory of Open Access Journals (Sweden)

    Putz-Leszczyńska Joanna

    2015-09-01

    Full Text Available Many handwritten signature verification algorithms have been developed in order to distinguish between genuine signatures and forgeries. An important group of these methods is based on dynamic time warping (DTW. Traditional use of DTW for signature verification consists in forming a misalignment score between the verified signature and a set of template signatures. The right selection of template signatures has a big impact on that verification. In this article, we describe our proposition for replacing the template signatures with the hidden signature-an artificial signature which is created by minimizing the mean misalignment between itself and the signatures from the enrollment set. We present a few hidden signature estimation methods together with their comprehensive comparison. The hidden signature opens a number of new possibilities for signature analysis. We apply statistical properties of the hidden signature to normalize the error signal of the verified signature and to use the misalignment on the normalized errors as a verification basis. A result, we achieve satisfying error rates that allow creating an on-line system, ready for operating in a real-world environment

  18. Proxy Graph: Visual Quality Metrics of Big Graph Sampling.

    Science.gov (United States)

    Nguyen, Quan Hoang; Hong, Seok-Hee; Eades, Peter; Meidiana, Amyra

    2017-06-01

    Data sampling has been extensively studied for large scale graph mining. Many analyses and tasks become more efficient when performed on graph samples of much smaller size. The use of proxy objects is common in software engineering for analysis and interaction with heavy objects or systems. In this paper, we coin the term 'proxy graph' and empirically investigate how well a proxy graph visualization can represent a big graph. Our investigation focuses on proxy graphs obtained by sampling; this is one of the most common proxy approaches. Despite the plethora of data sampling studies, this is the first evaluation of sampling in the context of graph visualization. For an objective evaluation, we propose a new family of quality metrics for visual quality of proxy graphs. Our experiments cover popular sampling techniques. Our experimental results lead to guidelines for using sampling-based proxy graphs in visualization.

  19. Adaptability in CORBA: The Mobile Proxy Approach

    DEFF Research Database (Denmark)

    Aziz, B.; Jensen, Christian D.

    2000-01-01

    are inherently open, heterogeneous, and dynamic environments integrating a wide range of platforms, operating systems and applications from a number of different sources. In this paper, we propose to use mobile proxies to provide adaptability in distributed applications integrated using the CORBA technology......Adaptability is one of the most important challenges in modern distributed systems. It may be defined as the ease with which a software application satisfies the different system constraints and the requirements of users and other applications. Adaptability is needed because distributed systems...

  20. Practical quantum digital signature

    Science.gov (United States)

    Yin, Hua-Lei; Fu, Yao; Chen, Zeng-Bing

    2016-03-01

    Guaranteeing nonrepudiation, unforgeability as well as transferability of a signature is one of the most vital safeguards in today's e-commerce era. Based on fundamental laws of quantum physics, quantum digital signature (QDS) aims to provide information-theoretic security for this cryptographic task. However, up to date, the previously proposed QDS protocols are impractical due to various challenging problems and most importantly, the requirement of authenticated (secure) quantum channels between participants. Here, we present the first quantum digital signature protocol that removes the assumption of authenticated quantum channels while remaining secure against the collective attacks. Besides, our QDS protocol can be practically implemented over more than 100 km under current mature technology as used in quantum key distribution.

  1. Factor models for cancer signatures

    Science.gov (United States)

    Kakushadze, Zura; Yu, Willie

    2016-11-01

    We present a novel method for extracting cancer signatures by applying statistical risk models (http://ssrn.com/abstract=2732453) from quantitative finance to cancer genome data. Using 1389 whole genome sequenced samples from 14 cancers, we identify an ;overall; mode of somatic mutational noise. We give a prescription for factoring out this noise and source code for fixing the number of signatures. We apply nonnegative matrix factorization (NMF) to genome data aggregated by cancer subtype and filtered using our method. The resultant signatures have substantially lower variability than those from unfiltered data. Also, the computational cost of signature extraction is cut by about a factor of 10. We find 3 novel cancer signatures, including a liver cancer dominant signature (96% contribution) and a renal cell carcinoma signature (70% contribution). Our method accelerates finding new cancer signatures and improves their overall stability. Reciprocally, the methods for extracting cancer signatures could have interesting applications in quantitative finance.

  2. Current signature sensor

    Science.gov (United States)

    Perotti, Jose M. (Inventor); Lucena, Angel (Inventor); Ihlefeld, Curtis (Inventor); Burns, Bradley (Inventor); Bassignani, Karin E. (Inventor)

    2005-01-01

    A solenoid health monitoring system uses a signal conditioner and controller assembly in one embodiment that includes analog circuitry and a DSP controller. The analog circuitry provides signal conditioning to the low-level raw signal coming from a signal acquisition assembly. Software running in a DSP analyzes the incoming data (recorded current signature) and determines the state of the solenoid whether it is energized, de-energized, or in a transitioning state. In one embodiment, the software identifies key features in the current signature during the transition phase and is able to determine the health of the solenoid.

  3. Munchausen syndrome by proxy: ongoing clinical challenges.

    Science.gov (United States)

    Squires, Janet E; Squires, Robert H

    2010-09-01

    In 1977, Roy Meadow, a pediatric nephrologist, first described a condition he subsequently coined Munchausen syndrome by proxy. The classic form involves a parent or other caregiver who inflicts injury or induces illness in a child, deceive the treating physician with fictitious or exaggerated information, and perpetrate the trick for months or years. A related form of pathology is more insidious and more common but also damaging. It involves parents who fabricate or exaggerate symptoms of illness in children, causing overly aggressive medical evaluations and interventions. The common thread is that the treating physician plays a role in inflicting the abuse upon the child. Failure to recognize the problem is common because the condition is often not included in the differential diagnosis of challenging or confusing clinical problems. We believe that a heightened "self-awareness" of the physician's role in Munchausen syndrome by proxy will prevent or reduce the morbidity and mortality associated with this diagnosis. In addition, we believe contemporary developments within the modern health care system likely facilitate this condition.

  4. Development and Applications of Thallium isotopes: a new proxy tracking the extent of manganese oxide burial

    Science.gov (United States)

    Owens, J. D.; Nielsen, S.; Ostrander, C.; Peterson, L. C.; Anbar, A. D.

    2015-12-01

    Thallium (Tl) isotopes are a new and potential powerful paleoredox proxy with the possibility to track bottom water oxygen conditions based on the burial flux of manganese oxides. Thallium has a residence time of ~20 thousand years, which is long enough to render modern oxic seawater conservative with respect to concentration and isotopes. The isotopic signature of Tl in the global ocean is driven mainly by two outputs (1) adsorption onto manganese oxides and (2) low temperature oceanic crust alteration. Importantly, the isotopic inputs of Tl are all nearly the same value; thus, the isotopic composition and flux of the outputs almost exclusively set the seawater signature. For relatively short term redox events it is reasonable to assume that the dominant isotope fractionation process is associated with manganese oxide precipitation because low temperature alteration is controlled by long-term average ocean crust production rates. We present a broad range of modern samples that span several open ocean profiles combined with water column and sediment profiles from the permanently anoxic basins of the Black Sea and Cariaco Basins. The open ocean shows no variation in depth profiles that encompass most of the major water masses in the Atlantic and Southern Oceans. The anoxic basins, however, reveal Tl isotope signatures closer to their inputs, which is likely due to basinal restriction. The authigenic fraction of organic-rich sediments from the Black Sea and Cariaco Basin capture the Tl isotope value of the overlying water column, which shows that Tl isotopes could be applied as a faithful deep time redox proxy. For the first time, we will present new data showing that Tl isotopes is tracking bottom water ocean oxygenation. We are applying this isotope system to ancient samples, testing the spatial and temporal variability of ocean oxygenation coinciding with major biogeochemical events.

  5. Statistical clumped isotope signatures

    NARCIS (Netherlands)

    Röckmann, T.; Popa, M.E.; Krol, M.C.; Hofmann, M.E.G.

    2016-01-01

    High precision measurements of molecules containing more than one heavy isotope may provide novel constraints on element cycles in nature. These so-called clumped isotope signatures are reported relative to the random (stochastic) distribution of heavy isotopes over all available isotopocules of

  6. Statistical clumped isotope signatures

    NARCIS (Netherlands)

    Röckmann, T.|info:eu-repo/dai/nl/304838233; Popa, M. E.|info:eu-repo/dai/nl/375806407; Krol, M. C.|info:eu-repo/dai/nl/078760410; Hofmann, M. E. G.|info:eu-repo/dai/nl/374642907

    2016-01-01

    High precision measurements of molecules containing more than one heavy isotope may provide novel constraints on element cycles in nature. These so-called clumped isotope signatures are reported relative to the random (stochastic) distribution of heavy isotopes over all available isotopocules of a

  7. Signatures of the Invisible

    CERN Multimedia

    Strom, D

    2003-01-01

    On the Net it is possible to take a look at art from afar via Virtual Museums. One such exhibition was recently in the New York Museum of Modern Art's branch, PS1. Entitled 'Signatures of the Invisible' it was a collaborative effort between artists and physicists (1/2 page).

  8. Representing vision and blindness.

    Science.gov (United States)

    Ray, Patrick L; Cox, Alexander P; Jensen, Mark; Allen, Travis; Duncan, William; Diehl, Alexander D

    2016-01-01

    There have been relatively few attempts to represent vision or blindness ontologically. This is unsurprising as the related phenomena of sight and blindness are difficult to represent ontologically for a variety of reasons. Blindness has escaped ontological capture at least in part because: blindness or the employment of the term 'blindness' seems to vary from context to context, blindness can present in a myriad of types and degrees, and there is no precedent for representing complex phenomena such as blindness. We explore current attempts to represent vision or blindness, and show how these attempts fail at representing subtypes of blindness (viz., color blindness, flash blindness, and inattentional blindness). We examine the results found through a review of current attempts and identify where they have failed. By analyzing our test cases of different types of blindness along with the strengths and weaknesses of previous attempts, we have identified the general features of blindness and vision. We propose an ontological solution to represent vision and blindness, which capitalizes on resources afforded to one who utilizes the Basic Formal Ontology as an upper-level ontology. The solution we propose here involves specifying the trigger conditions of a disposition as well as the processes that realize that disposition. Once these are specified we can characterize vision as a function that is realized by certain (in this case) biological processes under a range of triggering conditions. When the range of conditions under which the processes can be realized are reduced beyond a certain threshold, we are able to say that blindness is present. We characterize vision as a function that is realized as a seeing process and blindness as a reduction in the conditions under which the sight function is realized. This solution is desirable because it leverages current features of a major upper-level ontology, accurately captures the phenomenon of blindness, and can be

  9. Communication and Computation Skills for Blind Students Attending Public Schools.

    Science.gov (United States)

    Suffolk County Board of Cooperative Educational Services 3, Dix Hills, NY.

    Outlined are evaluative and instructional procedures used by itinerant teachers of blind children in public schools to teach readiness for braille reading and writing, as well as braille reading and writing, signature writing, and the Nemeth Code of braille mathematics and scientific notation. Readiness for braille reading and writing is…

  10. Workflows for intelligent monitoring using proxy services.

    Science.gov (United States)

    Rüping, Stefan; Wegener, Dennis; Sfakianakis, Stelios; Sengstag, Thierry

    2009-01-01

    Grid technologies have proven to be very successful in the area of eScience, and in particular in healthcare applications. But while the applicability of workflow enacting tools for biomedical research has long since been proven, the practical adoption into regular clinical research has some additional challenges in grid context. In this paper, we investigate the case of data monitoring, and how to seamlessly implement the step between a one-time proof-of-concept workflow and high-performance on-line monitoring of data streams, as exemplified by the case of long-running clinical trials. We will present an approach based on proxy services that allows executing single-run workflows repeatedly with little overhead.

  11. Salmon: Robust Proxy Distribution for Censorship Circumvention

    Directory of Open Access Journals (Sweden)

    Douglas Frederick

    2016-10-01

    Full Text Available Many governments block their citizens’ access to much of the Internet. Simple workarounds are unreliable; censors quickly discover and patch them. Previously proposed robust approaches either have non-trivial obstacles to deployment, or rely on low-performance covert channels that cannot support typical Internet usage such as streaming video. We present Salmon, an incrementally deployable system designed to resist a censor with the resources of the “Great Firewall” of China. Salmon relies on a network of volunteers in uncensored countries to run proxy servers. Although any member of the public can become a user, Salmon protects the bulk of its servers from being discovered and blocked by the censor via an algorithm for quickly identifying malicious users. The algorithm entails identifying some users as especially trustworthy or suspicious, based on their actions. We impede Sybil attacks by requiring either an unobtrusive check of a social network account, or a referral from a trustworthy user.

  12. Development of six PROMIS pediatrics proxy-report item banks

    Directory of Open Access Journals (Sweden)

    Irwin Debra E

    2012-02-01

    Full Text Available Abstract Background Pediatric self-report should be considered the standard for measuring patient reported outcomes (PRO among children. However, circumstances exist when the child is too young, cognitively impaired, or too ill to complete a PRO instrument and a proxy-report is needed. This paper describes the development process including the proxy cognitive interviews and large-field-test survey methods and sample characteristics employed to produce item parameters for the Patient Reported Outcomes Measurement Information System (PROMIS pediatric proxy-report item banks. Methods The PROMIS pediatric self-report items were converted into proxy-report items before undergoing cognitive interviews. These items covered six domains (physical function, emotional distress, social peer relationships, fatigue, pain interference, and asthma impact. Caregivers (n = 25 of children ages of 5 and 17 years provided qualitative feedback on proxy-report items to assess any major issues with these items. From May 2008 to March 2009, the large-scale survey enrolled children ages 8-17 years to complete the self-report version and caregivers to complete the proxy-report version of the survey (n = 1548 dyads. Caregivers of children ages 5 to 7 years completed the proxy report survey (n = 432. In addition, caregivers completed other proxy instruments, PedsQL™ 4.0 Generic Core Scales Parent Proxy-Report version, PedsQL™ Asthma Module Parent Proxy-Report version, and KIDSCREEN Parent-Proxy-52. Results Item content was well understood by proxies and did not require item revisions but some proxies clearly noted that determining an answer on behalf of their child was difficult for some items. Dyads and caregivers of children ages 5-17 years old were enrolled in the large-scale testing. The majority were female (85%, married (70%, Caucasian (64% and had at least a high school education (94%. Approximately 50% had children with a chronic health condition, primarily

  13. Vision - night blindness

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/article/003039.htm Vision - night blindness To use the sharing features on ... page, please enable JavaScript. Night blindness is poor vision at night or in dim light. Considerations Night ...

  14. An ECC-Based Blind Signcryption Scheme for Multiple Digital Documents

    Directory of Open Access Journals (Sweden)

    Chien-Hua Tsai

    2017-01-01

    Full Text Available The popularity of the Internet has comprehensively altered the traditional way of communication and interaction patterns, such as e-contract negotiations, e-payment services, or digital credential processes. In the field of e-form systems, a number of studies investigate the ability of the blind signature to fulfill the basic properties of blindness and untraceability. However, most literatures exploring the blind signature mechanisms only address research and technology pertaining to single blind signature issues. Further, most of the topics only deal with signing rather than encryption. Thus, we propose a new blind signature scheme for multiple digital documents based on elliptic curve cryptography (ECC. Our scheme incorporates the design of signcryption paradigm into the blind signature scheme to strengthen high levels of security. This innovative method also enhances computational efficiency during processing multiple electronic documents since the ECC provides a shorter key length and higher processing speed than other public-key cryptosystems on equivalent secrecy. The analysis results show that the present scheme achieves better performance at low communication overheads as well as with higher level of security. By helping the design of the intrinsic properties, the proposed cryptosystem can be applied to many areas to protect sensitive data in ubiquitous computing environments.

  15. Proxy-produced ethnographic work: what are the problems, issues, and dilemmas arising from proxy ethnography?

    DEFF Research Database (Denmark)

    Martinussen, Marie Louise; Højbjerg, Karin; Tamborg, Andreas Lindenskov

    2018-01-01

    and positions arising from such a setup between the teacher/researcher and the proxy ethnographer/student are found to have implications for the ethnographies produced. This article’s main focus is to show how these relations and positions have not distorted the ethnographic work and the ethnographies but......This article addresses the implications of research-student cooperation in the production of empirical material. For the student to replace the experienced researcher and work under the researcher’s supervision, we call such work proxy-produced ethnographic work. The specific relations...... the research process. These ethnographic distortions will be generated and described within a framework drawn primarily on the work of sociologist Pierre Bourdieu....

  16. Blind Loop Syndrome

    Science.gov (United States)

    ... breeding ground for bacteria. The bacteria may produce toxins as well as block the absorption of nutrients. The greater the length of small bowel involved in the blind loop, the greater the chance of bacterial overgrowth. What triggers blind loop syndrome? Blind loop ...

  17. Overview on Deaf-Blindness

    Science.gov (United States)

    ... Topics About Deaf-Blindness > What is Deaf-Blindness Definitions of Deaf-Blindness Causes of Deaf-Blindness National Child Count & Demographics Communication > Communication Overview Early Communication Prelinguistic Communication Object Communication ...

  18. Factitious Disorder by Proxy in Educational Settings: A Review

    Science.gov (United States)

    Frye, Ellen M.; Feldman, Marc D.

    2012-01-01

    Factitious disorder by proxy (FDP), historically known as Munchausen syndrome by proxy, is a diagnosis applied to parents and other caregivers who intentionally feign, exaggerate, and/or induce illness or injury in a child to get attention from health professionals and others. A review of the recent literature and our experience as consultants…

  19. Perbandingan proxy pada linux dan windows untuk mempercepat browsing website

    Directory of Open Access Journals (Sweden)

    Dafwen Toresa

    2017-05-01

    Full Text Available AbstrakPada saat ini sangat banyak organisasi, baik pendidikan, pemerintahan,  maupun perusahaan swasta berusaha membatasi akses para pengguna ke internet dengan alasan bandwidth yang dimiliki mulai terasa lambat ketika para penggunanya mulai banyak yang melakukan browsing ke internet. Mempercepat akses browsing menjadi perhatian utama dengan memanfaatkan teknologi Proxy server. Penggunaan proxy server perlu mempertimbangkan sistem operasi pada server dan tool yang digunakan belum diketahui performansi terbaiknya pada sistem operasi apa.  Untuk itu dirasa perlu untuk menganalisis performan Proxy server pada sistem operasi berbeda yaitu Sistem Operasi Linux dengan tools Squid  dan Sistem Operasi Windows dengan tool Winroute. Kajian ini dilakukan untuk mengetahui perbandingan kecepatan browsing dari komputer pengguna (client. Browser yang digunakan di komputer pengguna adalah Mozilla Firefox. Penelitian ini menggunakan 2 komputer klien dengan pengujian masing-masingnya 5 kali pengujian pengaksesan/browsing web yang dituju melalui proxy server. Dari hasil pengujian yang dilakukan, diperoleh kesimpulan bahwa penerapan proxy server di sistem operasi linux dengan tools squid lebih cepat browsing dari klien menggunakan web browser yang sama dan komputer klien yang berbeda dari pada proxy server sistem operasi windows dengan tools winroute.  Kata kunci: Proxy, Bandwidth, Browsing, Squid, Winroute AbstractAt this time very many organizations, both education, government, and private companies try to limit the access of users to the internet on the grounds that the bandwidth owned began to feel slow when the users began to do a lot of browsing to the internet. Speed up browsing access is a major concern by utilizing Proxy server technology. The use of proxy servers need to consider the operating system on the server and the tool used is not yet known the best performance on what operating system. For that it is necessary to analyze Performance Proxy

  20. Proxy SDN Controller for Wireless Networks

    Directory of Open Access Journals (Sweden)

    Won-Suk Kim

    2016-01-01

    Full Text Available Management of wireless networks as well as wired networks by using software-defined networking (SDN has been highlighted continually. However, control features of a wireless network differ from those of a wired network in several aspects. In this study, we identify the various inefficient points when controlling and managing wireless networks by using SDN and propose SDN-based control architecture called Proxcon to resolve these problems. Proxcon introduces the concept of a proxy SDN controller (PSC for the wireless network control, and the PSC entrusted with the role of a main controller performs control operations and provides the latest network state for a network administrator. To address the control inefficiency, Proxcon supports offloaded SDN operations for controlling wireless networks by utilizing the PSC, such as local control by each PSC, hybrid control utilizing the PSC and the main controller, and locally cooperative control utilizing the PSCs. The proposed architecture and the newly supported control operations can enhance scalability and response time when the logically centralized control plane responds to the various wireless network events. Through actual experiments, we verified that the proposed architecture could address the various control issues such as scalability, response time, and control overhead.

  1. Lithium in Brachiopods - proxy for seawater evolution?

    Science.gov (United States)

    Gaspers, Natalie; Magna, Tomas; Tomasovych, Adam; Henkel, Daniela

    2017-04-01

    Marine biogenic carbonates have the potential to serve as a proxy for evolution of seawater chemistry. In order to compile a record of the past and recent δ7Li in the oceans, foraminifera shells, scleractinian corals and belemnites have been used. However, only a foraminifera-based record appears to more accurately reflect the Li isotope composition of ocean water. At present, this record is available for the Cenozoic with implications for major events during this period of time, including K/T event [1]. A record for the entire Phanerozoic has not yet been obtained. In order to extend this record to the more distant past, Li elemental/isotope systematics of brachiopods were investigated because these marine animals were already present in Early Cambrian oceans and because they are less sensitive to diagenesis-induced modifications due to their shell mineralogy (low-Mg calcite). The preliminary data indicates a species-, temperature- and salinity-independent behavior of Li isotopes in brachiopod shells. Also, no vital effects have been observed for different shell parts. The consistent offset of -4‰ relative to modern seawater is in accordance with experimental data [2]. Further data are now being collected for Cenozoic specimens to more rigorously test brachiopods as possible archives of past seawater in comparison to the existing foraminiferal records. [1] Misra & Froelich (2012) Science 335, 818-823 [2] Marriott et al. (2004) Chem Geol 212, 5-15

  2. Deciphering dynamical proxy responses from lake sediments

    Science.gov (United States)

    Ramisch, Arne; Tjallingii, Rik; Hartmann, Kai; Brauer, Achim; Diekmann, Bernhard; Haberzettl, Torsten; Kasper, Thomas; Ahlborn, Marieke

    2017-04-01

    Lakes form a reliable archive of paleoenvironmental change in the terrestrial realm. Non-destructive XRF scans provide high-resolution records of element concentrations that are commonly related to past environmental change. However, XRF records of lake sediments enclose paleoenvironmental information that originates from multiple lake external and internal forcing. The variety of environmental forcing factors can complicate a direct identification of single mechanisms like climatic change from XRF or other proxy records. Here we present XRF records from several Asian lake archives, which indicate asynchronous variations of similar geochemical records since the late glacial/early Holocene. All XRF time series are characterized by damped harmonic oscillations of relative element concentrations through time. The asynchronous variations can be expressed by the frequency and the rate of damping of theses oscillations that differ between the lakes. We argue that the oscillatory behavior is a result of a feedback between the physical removal and dissolution of mineral phases in catchment soils and their subsequent enrichment and deposition within the lake. We present a numerical model, which accurately simulates major Holocene variations in the element concentration of lake records and discuss implications for the reconstruction of environmental signals from lake sediments.

  3. Signatures of topological superconductivity

    Energy Technology Data Exchange (ETDEWEB)

    Peng, Yang

    2017-07-19

    The prediction and experimental discovery of topological insulators brought the importance of topology in condensed matter physics into the limelight. Topology hence acts as a new dimension along which more and more new states of matter start to emerge. One of these topological states of matter, namely topological superconductors, comes into the focus because of their gapless excitations. These gapless excitations, especially in one dimensional topological superconductors, are Majorana zero modes localized at the ends of the superconductor and exhibit exotic nonabelian statistics, which can be potentially applied to fault-tolerant quantum computation. Given their highly interesting physical properties and potential applications to quantum computation, both theorists and experimentalists spend great efforts to realize topological supercondoctors and to detect Majoranas. In two projects within this thesis, we investigate the properties of Majorana zero modes in realistic materials which are absent in simple theoretical models. We find that the superconducting proximity effect, an essential ingredient in all existing platforms for topological superconductors, plays a significant role in determining the localization property of the Majoranas. Strong proximity coupling between the normal system and the superconducting substrate can lead to strongly localized Majoranas, which can explain the observation in a recent experiment. Motivated by experiments in Molenkamp's group, we also look at realistic quantum spin Hall Josephson junctions, in which charge puddles acting as magnetic impurities are coupled to the helical edge states. We find that with this setup, the junction generically realizes an exotic 8π periodic Josephson effect, which is absent in a pristine Josephson junction. In another two projects, we propose more pronounced signatures of Majoranas that are accessible with current experimental techniques. The first one is a transport measurement, which uses

  4. Evolution of Microbial Carbonates During Early Burial: A Multi-Proxy Approach

    Science.gov (United States)

    Pederson, Chelsea; Klaus, James; Swart, Peter; McNeill, Donald

    2017-04-01

    down organic material through sulfate reduction, leading to a more negative organic δ13C signature. Early diagenesis of Holocene (muds has altered both the texture, as well as geochemical signatures of the microbial carbonates and their associated organic material. The TOC generally decreases with depth, correlating with more negative organic δ13C values as a result of the degradation of labile material, including EPS. This study implies that microbial signatures of freshwater carbonates are dependent upon the environment in which they were formed and buried. Variation in salinity, as well as vegetation type within the environment alter the original depositional signature, which is also not well preserved. Deviation from modern geochemical signals implies that meteoric and marine diagenesis affects even these dense LMC mudstones and their associated organic matter, and has implications for the use of palustrine carbonates proxies.

  5. Impact of prehistoric cooking practices on paleoenvironmental proxies in shell midden constituents

    Science.gov (United States)

    Müller, Peter; Staudigel, Philip; Murray, Sean T.; Westphal, Hildegard; Swart, Peter K.

    2016-04-01

    Paleoenvironmental proxy records such as oxygen isotopes of calcareous skeletal structures like fish otoliths or mollusk shells provide highest-resolution information about environmental conditions experienced by the organism. Accumulations of such skeletal structures by ancient coastal populations in so called "shell midden" deposits provide us with sub-seasonally resolved paleoclimate records covering time spans up to several millennia. Given their high temporal resolution, these deposits are increasingly used for paleoclimate reconstructions and complement our understanding of ancient climate changes. However, gathered as comestibles, most of these skeletal remains were subject to prehistoric cooking methods prior to deposition. The associated alteration of the chemical proxy signatures as well as the subsequent error for paleoenvironmental reconstructions remained almost entirely neglected so far. Here, we present clumped isotope, conventional oxygen and carbon isotopes as well as element:Ca ratios measured in modern bivalve shells after exposing them to different prehistoric cooking methods. Our data show that most cooking methods considerably alter commonly used paleoclimate proxy systems which can lead to substantial misinterpretations of ancient climate conditions. Since the magnitude of chemical alteration is not distinguishable from natural temperature variability in most coastal settings, the alteration of shell midden constituents by prehistoric cooking remains likely unnoticed in most cases. Thus, depending on the cooking method, pre-depositional heating might have introduced considerable errors into previous paleoclimate studies. However, our data also show that clumped isotope thermometry represents a suitable diagnostic tool to detect such pre-depositional cooking events and also allows differentiating between the most commonly applied prehistoric cooking methods.

  6. Planktonic foraminiferal rare earth elements as a potential new aeolian dust proxy

    Science.gov (United States)

    Chou, C.; Liu, Y.; Lo, L.; Wei, K.; Shen, C.

    2012-12-01

    Characteristics of rare earth elements (REEs) have widely been used as important tracers in many fields of earth sciences, including lithosphere research, environmental change, ocean circulation and other natural carbonate materials. Foraminiferal test REE signatures have been suggested to reflect ambient seawater conditions and serve as valuable proxies in the fields of paleoceanography and paleoclimate. Here we present a 60-kyr planktonic foraminifera Globigerinoides ruber (white, 250-300 μm) REE record of a sediment core MD05-2925 (9°20.61'S, 151°27.61'E, water depth 1660 m) from the Solomon Sea. The REE diagram shows two dominant sources of local seawater and nearby terrestrial input. The variability of foraminiferal REE/Ca time series is different from Mg/Ca-inferred sea surface temperature and δ18O records during the past 60-kyr. This inconsistency suggests that planktonic foraminiferal REE content cannot result only from changes in ice volume and temperature. Synchroneity between high planktonic foraminiferal REE content and Antarctic ice core dust amount record implies the same dust sources, probably from Australia or mainland China. Our results suggest that foraminiferal REE can potentially be as a new dust proxy and record dry/humid conditions at the source area.

  7. Novel Oncogene Induced Metastatic Prostate Cancer Cell Lines Define Human Prostate Cancer Progression Signatures

    Science.gov (United States)

    Ju, Xiaoming; Ertel, Adam; Casimiro, Mathew; Yu, Zuoren; Meng, Hui; McCue, Peter A.; Walters, Rhonda; Fortina, Paolo; Lisanti, Michael P.; Pestell, Richard G.

    2013-01-01

    Herein, murine prostate cancer cell lines, generated via selective transduction with a single oncogene (c-Myc, Ha-Ras, and v-Src), demonstrated oncogene-specific prostate cancer molecular signatures that were recapitulated in human prostate cancer, and developed lung metastasis in immune competent mice. Interrogation of two independent retrospective cohorts of patient samples using the oncogene signature demonstrated an ability to distinguish tumor from normal prostate with a predictive value for prostate cancer of 98 – 99%. In a blinded study, the signature algorithm demonstrated independent substratification of reduced recurrence free survival by Kaplan-Meier analysis. The generation of new oncogene-specific prostate cancer cell lines that recapitulate human prostate cancer gene expression, that metastasize in immune-competent mice, are a valuable new resource for testing targeted therapy while the molecular signatures identified herein provides further value over current gene signature markers of prediction and outcome. PMID:23204233

  8. Proxies and consent discussions for dementia research.

    Science.gov (United States)

    Sugarman, Jeremy; Roter, Debra; Cain, Carole; Wallace, Roberta; Schmechel, Don; Welsh-Bohmer, Kathleen A

    2007-04-01

    To better understand the nature of informed consent encounters for research involving patients with dementia that requires proxy consent. Audiotaping of informed-consent encounters for a study of genetic markers for sporadic Alzheimer's disease. Outpatients at an Alzheimer's disease research center. Patients with dementia and their companions. Audiotapes were analyzed to characterize communication style and coverage of the standard elements of informed consent and, using the Roter Interaction Analysis System, to capture the dynamics of three-way interaction between the patient, their companion, and the physician investigator. Of 26 informed consent encounters, all involved a patient, a companion, and a physician. Patients had a mean Mini-Mental State Examination (MMSE) score of 21.8. For patients, 49% of their interactions involved agreement and approval (positive statements), 16% psychosocial information, 7% biomedical information, 7% asking questions, and 7% expressing emotion. Companion interactions involved 37% positive statements and 19% biomedical information. Physician interactions involved emotional expressiveness (30%) and positive statements (19%). Discussion length was positively related to MMSE score (Spearman rho=0.45; Pinformed consent was fairly comprehensive and had no relationship to patients' MMSE scores. These data should inform policies regarding the ethically appropriate ways of conducting research with cognitively impaired adults. For example, patients in this study were more silent than their companions and the physician, but when patients spoke, they primarily agreed with what was said. Although this might first seem to signal assent, such an interpretation should be made with caution for persons with dementia. In addition, previous work on informed consent has focused on its cognitive aspects, but these data reveal that the emotional and social dimensions warrant attention.

  9. Clustering signatures classify directed networks

    Science.gov (United States)

    Ahnert, S. E.; Fink, T. M. A.

    2008-09-01

    We use a clustering signature, based on a recently introduced generalization of the clustering coefficient to directed networks, to analyze 16 directed real-world networks of five different types: social networks, genetic transcription networks, word adjacency networks, food webs, and electric circuits. We show that these five classes of networks are cleanly separated in the space of clustering signatures due to the statistical properties of their local neighborhoods, demonstrating the usefulness of clustering signatures as a classifier of directed networks.

  10. Application and Network-Cognizant Proxies - Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Antonio Ortega; Daniel C. Lee

    2003-03-24

    OAK B264 Application and Network-Cognizant Proxies - Final Report. Current networks show increasing heterogeneity both in terms of their bandwidths/delays and the applications they are required to support. This is a trend that is likely to intensify in the future, as real-time services, such as video, become more widely available and networking access over wireless links becomes more widespread. For this reason they propose that application-specific proxies, intermediate network nodes that broker the interactions between server and client, will become an increasingly important network element. These proxies will allow adaptation to changes in network characteristics without requiring a direct intervention of either server or client. Moreover, it will be possible to locate these proxies strategically at those points where a mismatch occurs between subdomains (for example, a proxy could be placed so as to act as a bridge between a reliable network domain and an unreliable one). This design philosophy favors scalability in the sense that the basic network infrastructure can remain unchanged while new functionality can be added to proxies, as required by the applications. While proxies can perform numerous generic functions, such as caching or security, they concentrate here on media-specific, and in particular video-specific, tasks. The goal of this project was to demonstrate that application- and network-specific knowledge at a proxy can improve overall performance especially under changing network conditions. They summarize below the work performed to address these issues. Particular effort was spent in studying caching techniques and on video classification to enable DiffServ delivery. other work included analysis of traffic characteristics, optimized media scheduling, coding techniques based on multiple description coding, and use of proxies to reduce computation costs. This work covered much of what was originally proposed but with a necessarily reduced scope.

  11. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  12. Expressiveness considerations of XML signatures

    DEFF Research Database (Denmark)

    Jensen, Meiko; Meyer, Christopher

    2011-01-01

    XML Signatures are used to protect XML-based Web Service communication against a broad range of attacks related to man-in-the-middle scenarios. However, due to the complexity of the Web Services specification landscape, the task of applying XML Signatures in a robust and reliable manner becomes...... more and more challenging. In this paper, we investigate this issue, describing how an attacker can still interfere with Web Services communication even in the presence of XML Signatures. Additionally, we discuss the interrelation of XML Signatures and XML Encryption, focussing on their security...

  13. Optimizing TCP Performance over UMTS with Split TCP Proxy

    DEFF Research Database (Denmark)

    Hu, Liang; Dittmann, Lars

    2009-01-01

    Abstract: The TCP performance over UMTS network is challenged by the large delay bandwidth product. Large delay bandwidth product is mainly caused by the latency from the link layer ARQ retransmissions and diversity technique at physical layer which are used to cope with radio transmission errors...... scenario (e.g.64 kbps). Besides, the split TCP proxy brings more performance gain for downloading large files than downloading small ones. To the end, for the configuration of the split proxy, an aggressive initial TCP congestion window size (e.g. 10 MSS) at proxy is particularly useful for radio links...

  14. Web proxy cache replacement strategies simulation, implementation, and performance evaluation

    CERN Document Server

    ElAarag, Hala; Cobb, Jake

    2013-01-01

    This work presents a study of cache replacement strategies designed for static web content. Proxy servers can improve performance by caching static web content such as cascading style sheets, java script source files, and large files such as images. This topic is particularly important in wireless ad hoc networks, in which mobile devices act as proxy servers for a group of other mobile devices. Opening chapters present an introduction to web requests and the characteristics of web objects, web proxy servers and Squid, and artificial neural networks. This is followed by a comprehensive review o

  15. Blindness and initiating communication

    OpenAIRE

    Goharrizi, Zahra Etebari

    2010-01-01

    This qualitative case study focuses on how congenital blind interactants initiate communication with strangers. It explores the strategies that the blind use to overcome the problems and feelings hich are caused by the lack of visual information, and how they seek to reduce uncertainty in different social situations; when seeking information or help on the one hand, or in making friendship situations on the other hand. The aspect of how sighted people react when approached by a blind person w...

  16. Munchausen syndrome by proxy presenting as hearing loss.

    Science.gov (United States)

    Ashraf, N; Thevasagayam, M S

    2014-06-01

    To review the diagnosis of Munchausen syndrome by proxy, a factitious disorder, in which symptoms are induced or feigned, usually in a child, by the caregiver. The involved caregiver seeks to gain attention or sympathy and often has a psychological need to maintain the sick role. We highlight the diagnostic difficulties and factors that may help with diagnosis in an otolaryngology setting. We present the case of Munchausen syndrome by proxy presenting with hearing loss in a five-year old boy, who was diagnosed eight years after his initial presentation. A literature review of Munchausen syndrome by proxy cases presenting with ENT symptoms is provided. Munchausen syndrome by proxy is a diagnosis that otolaryngologists should be aware of, particularly where recurrent or persistent illnesses in children, especially those involving otological symptoms, are refractory to the usual treatments.

  17. Munchausen Syndrome by Proxy: Unusual Manifestations and Disturbing Sequelae.

    Science.gov (United States)

    Porter, Gerald E.; And Others

    1994-01-01

    This study documents previously unreported findings in cases of Munchausen Syndrome by Proxy (in which a mother fabricates an illness in her child). In the reported case, esophageal perforation, retrograde intussusception, tooth loss, and bradycardia were found. (Author/DB)

  18. Signatures de l'invisible

    CERN Multimedia

    CERN Press Office. Geneva

    2000-01-01

    "Signatures of the Invisible" is an unique collaboration between contemporary artists and contemporary physicists which has the potential to help redefine the relationship between science and art. "Signatures of the Invisible" is jointly organised by the London Institute - the world's largest college of art and design and CERN*, the world's leading particle physics laboratory. 12 leading visual artists:

  19. Ship Signature Management System : Functionality

    NARCIS (Netherlands)

    Arciszewski, H.F.R.; Lier, L. van; Meijer, Y.G.S.; Noordkamp, H.W.; Wassenaar, A.S.

    2010-01-01

    A signature of a platform is the manner in which the platform manifests itself to a certain type of sensor and how observable it is when such a sensor is used to detect the platform. Because many military platforms use sensors in different media, it is the total of its different signatures that

  20. Applicability of a cognitive questionnaire in the elderly and proxy

    Directory of Open Access Journals (Sweden)

    Renata Areza Fegyveres

    Full Text Available Abstract The Informant Questionnaire on Cognitive Decline in the Elderly with the Proxy (IQCODE was developed as a screening tool for cognition alterations. Objectives: 1 To verify the applicability of IQCODE in the elderly with limited schooling, 2 To verify the reliability of the responses supplied by the aged and their proxies. Methods: Individuals of a Community Group were evaluated using the Mini-Mental State Examination (MMSE, IQCODE and Geriatric Depression Scale (GDS. The IQCODE was applied to informants and proxies. Results: We analyzed 44 individuals, aged between 58-82 years (M=66.8, SD=5.97 with mean elderly-schooling level of 3.75, SD=2.82 and 44 proxies aged 44.5 (SD=13.3, with mean schooling level of 8.25 (SD=4.3. The mean GDS was 8.22, SD=4.90 and 13 participants presented a score suggestive of depressive symptoms. The mean elderly IQCODE score was 3.26, SD=0.69 and 3.21, SD=0.65, for proxy responses. There was no statistical difference between these means. On the MMSE, the mean score was 24.20, SD=4.14 and 18 participants presented scores below the cut-off. The IQCODE answers by the elderly in this latter group were more congruent with MMSE than the answers of proxies. Conclusions: The applicability of the IQCODE in a population with little schooling was verified in that the proxy-report was similar to the elderly report. We can affirm that the elderly answers were more accurate than the proxies, as they were closer to MMSE score. The inclusion of a greater number of participants from community-dwelling settings is necessary to confirm the results obtained in this study.

  1. Proxy-rated quality of life in Alzheimer's disease

    DEFF Research Database (Denmark)

    Vogel, Asmus; Bhattacharya, Suvosree; Waldorff, Frans Boch

    2012-01-01

    The study investigated the change in proxy rated quality of life (QoL) of a large cohort of home living patients with Alzheimer's disease (AD) over a period of 36 months.......The study investigated the change in proxy rated quality of life (QoL) of a large cohort of home living patients with Alzheimer's disease (AD) over a period of 36 months....

  2. "Color-Blind" Racism.

    Science.gov (United States)

    Carr, Leslie G.

    Examining race relations in the United States from a historical perspective, this book explains how the constitution is racist and how color blindness is actually a racist ideology. It is argued that Justice Harlan, in his dissenting opinion in Plessy v. Ferguson, meant that the constitution and the law must remain blind to the existence of race…

  3. Models for the blind

    DEFF Research Database (Denmark)

    Olsén, Jan-Eric

    2014-01-01

    person to touch them in their historical context. And yet these objects are all about touch, from the concrete act of touching something to the norms that assigned touch a specific pedagogical role in nineteenth-century blind schools. The aim of this article is twofold. First, I provide a historical......When displayed in museum cabinets, tactile objects that were once used in the education of blind and visually impaired people, appear to us, sighted visitors, as anything but tactile. We cannot touch them due to museum policies and we can hardly imagine what it would have been like for a blind...... background to the tactile objects of the blind. When did they appear as a specific category of pedagogical aid and how did they help determine the relation between blindness, vision, and touch? Second, I address the tactile objects from the point of view of empirical sources and historical evidence. Material...

  4. Blinded by Irrelevance: Pure Irrelevance Induced "Blindness"

    Science.gov (United States)

    Eitam, Baruch; Yeshurun, Yaffa; Hassan, Kinneret

    2013-01-01

    To what degree does our representation of the immediate world depend solely on its relevance to what we are currently doing? We examined whether relevance per se can cause "blindness," even when there is no resource limitation. In a novel paradigm, people looked at a colored circle surrounded by a differently colored ring--the task relevance of…

  5. On the signature of LINCOS

    Science.gov (United States)

    Ollongren, Alexander

    2010-12-01

    Suppose the international SETI effort yields the discovery of some signal of evidently non-natural origin. Could it contain linguistic information formulated in some kind of Lingua Cosmica? One way to get insight into this matter is to consider what specific (bio) linguistic signature( s) could be attached to a cosmic language for interstellar communication—designed by humans or an alien society having reached a level of intelligence (and technology) comparable to or surpassing ours. For this purpose, we consider in the present paper the logico-linguistic system LINCOS for ( A)CETI, developed during a number of years by the author in several papers and a monograph [1]. The system has a two-fold signature, which distinguishes it significantly from natural languages. In fact abstract and concrete signatures can be distinguished. That an abstract kind occurs is due to the manner in which abstractions of reality are represented in LINCOS-texts. They can take compound forms because the system is multi-expressive—partly due to the availability of inductive (recursive) entities. On the other hand, the concrete signature of LINCOS is related to the distribution of delimiters and predefined tokens in texts. Assigning measures to concrete signatures will be discussed elsewhere. The present contribution concentrates on the abstract signature of the language. At the same time, it is realized that an alien Lingua Cosmica might, but not necessarily needs to have this kind of signatures.

  6. Statistical clumped isotope signatures

    Science.gov (United States)

    Röckmann, T.; Popa, M. E.; Krol, M. C.; Hofmann, M. E. G.

    2016-01-01

    High precision measurements of molecules containing more than one heavy isotope may provide novel constraints on element cycles in nature. These so-called clumped isotope signatures are reported relative to the random (stochastic) distribution of heavy isotopes over all available isotopocules of a molecule, which is the conventional reference. When multiple indistinguishable atoms of the same element are present in a molecule, this reference is calculated from the bulk (≈average) isotopic composition of the involved atoms. We show here that this referencing convention leads to apparent negative clumped isotope anomalies (anti-clumping) when the indistinguishable atoms originate from isotopically different populations. Such statistical clumped isotope anomalies must occur in any system where two or more indistinguishable atoms of the same element, but with different isotopic composition, combine in a molecule. The size of the anti-clumping signal is closely related to the difference of the initial isotope ratios of the indistinguishable atoms that have combined. Therefore, a measured statistical clumped isotope anomaly, relative to an expected (e.g. thermodynamical) clumped isotope composition, may allow assessment of the heterogeneity of the isotopic pools of atoms that are the substrate for formation of molecules. PMID:27535168

  7. The blind hens’ challenge

    DEFF Research Database (Denmark)

    Sandøe, Peter; Hocking, Paul M.; Forkman, Björn

    2014-01-01

    Animal ethicists have recently debated the ethical questions raised by disenhancing animals to improve their welfare. Here, we focus on the particular case of breeding blind hens for commercial egg-laying systems, in order to benefit their welfare. Many people find breeding blind hens intuitively...... about breeding blind hens. But we also argue that alternative views, which (for example) claim that it is important to respect the telos or rights of an animal, do not offer a more convincing solution to questions raised by the possibility of disenhancing animals for their own benefit....

  8. Static analysis for blinding

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde; Nielson, Hanne Riis

    2006-01-01

    operation blinding. In this paper we study the theoretical foundations for one of the successful approaches to validating cryptographic protocols and we extend it to handle the blinding primitive. Our static analysis approach is based on Flow Logic; this gives us a clean separation between the specification...... of the analysis and its realisation in an automatic tool. We concentrate on the former in the present paper and provide the semantic foundation for our analysis of protocols using blinding - also in the presence of malicious attackers....

  9. Proxy comparisons for Paleogene sea water temperature reconstructions

    Science.gov (United States)

    de Bar, Marijke; de Nooijer, Lennart; Schouten, Stefan; Ziegler, Martin; Sluijs, Appy; Reichart, Gert-Jan

    2017-04-01

    Several studies have reconstructed Paleogene seawater temperatures, using single- or multi-proxy approaches (e.g. Hollis et al., 2012 and references therein), particularly comparing TEX86 with foraminiferal δ18O and Mg/Ca. Whereas trends often agree relatively well, absolute temperatures can differ significantly between proxies, possibly because they are often applied to (extreme) climate events/transitions (e.g. Sluijs et al., 2011), where certain assumptions underlying the temperature proxies may not hold true. A more general long-term multi-proxy temperature reconstruction, is therefore necessary to validate the different proxies and underlying presumed boundary conditions. Here we apply a multi-proxy approach using foraminiferal calcite and organic proxies to generate a low-resolution, long term (80 Myr) paleotemperature record for the Bass River core (New Jersey, North Atlantic). Oxygen (δ18O), clumped isotopes (Δ47) and Mg/Ca of benthic foraminifera, as well as the organic proxies MBT'-CBT, TEX86H, U37K' index and the LDI were determined on the same sediments. The youngest samples of Miocene age are characterized by a high BIT index (>0.8) and fractional abundance of the C32 1,15-diol (>0.6; de Bar et al., 2016) and the absence of foraminifera, all suggesting high continental input and shallow depths. The older sediment layers (˜30 to 90 Ma) display BIT values and C32 1,15-diol fractional abundances global transition from the Cretaceous to Eocene greenhouse world into the icehouse climate. The TEX86H sea surface temperature (SST) record shows a gradual cooling over time of ˜35 to 20 ˚ C, whereas the δ18O-derived bottom water temperatures (BWTs) decrease from ˜20 to 10 ˚ C, and the Mg/Ca and Δ47-derived BWTs decrease from ˜25 to 15 ˚ C. The absolute temperature difference between the δ18O and Δ47, might be explained by local variations in seawater δ18O composition. Similarly, the difference in Mg/Ca- and δ18O-derived BWTs is likely caused by

  10. Time-and-ID-Based Proxy Reencryption Scheme

    Directory of Open Access Journals (Sweden)

    Kambombo Mtonga

    2014-01-01

    Full Text Available Time- and ID-based proxy reencryption scheme is proposed in this paper in which a type-based proxy reencryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. However, in some applications, the time within which the data was sampled or collected is very critical. In such applications, for example, healthcare and criminal investigations, the delegatee may be interested in only some of the messages with some types sampled within some time bound instead of the entire subset. Hence, in order to carter for such situations, in this paper, we propose a time-and-identity-based proxy reencryption scheme that takes into account the time within which the data was collected as a factor to consider when categorizing data in addition to its type. Our scheme is based on Boneh and Boyen identity-based scheme (BB-IBE and Matsuo’s proxy reencryption scheme for identity-based encryption (IBE to IBE. We prove that our scheme is semantically secure in the standard model.

  11. Password-based digital signatures

    OpenAIRE

    Sivagnanasuntharam, Sangeepan

    2013-01-01

    This thesis is about implementing a digital signature scheme proposed by associate professor Kristian Gjøsteen and Oystein Thuen.The thesis explains the implementation, the challenges met and a security assessment of the implementation.

  12. Intrusion detection using secure signatures

    Science.gov (United States)

    Nelson, Trent Darnel; Haile, Jedediah

    2014-09-30

    A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

  13. Epigenetic Signatures of Cigarette Smoking

    National Research Council Canada - National Science Library

    Joehanes, Roby; Just, A.C; Marioni, Riccardo; Pilling, Luke; Reynolds, Lindsay; Mandaviya, P.R; Guan, Weihua; Xu, T; Elks, Cathy; Aslibekyan, S; Moreno-Macías, Hortensia; Smith, Jennifer A; Brody, Jennifer; Dhingra, R; Yousefi, Paul; Pankow, James; Kunze, S; Shah, S.H; McRae, Allan F; Lohman, Kurt; Sha, J; Absher, Devin; Ferrucci, Luigi; Zhao, W; Demerath, Ellen; Bressler, Jan; Grove, Megan; Huan, Tianxiao; Liu, Chunyu; Mendelson, M.M; Yao, Chen; Kiel, Douglas P; Peters, Annette; Wang-Sattler, Rui; Visscher, Peter; Wray, Naomi; Starr, John; Ding, J; Roiguez, C.J; Wareham, Nick; Irvin, M.R; Zhi, D; Barrdahl, Myrto; Vineis, Paolo; Ambatipudi, S; Uitterlinden, Ané; Hofman, Albert; Schwartz, J; Colicino, E; Hou, L; Vokonas, P.S; Hernandez, Dena; Singleton, Anew; Bandinelli, Stefania; Turner, Stephen; Ware, Erin B; Smith, A.K; Klengel, Torsten; Binder, Elisabeth B; Psaty, Bruce; Taylor, Kent; Gharib, Sina; Swenson, B.R; Liang, L; Demeo, Dawn L; O'Connor, George; Herceg, Zdenko; Ressler, K.J; Conneely, Karen N; Sotoodehnia, Nona; Kardia, S.L.R; Melzer, David; Baccarelli, Anea A; Meurs, Joyce; Romieu, Isabelle; Arnett, Donna; Ong, K.K; Liu, Yongmei; Waldenberger, Melanie; Deary, Ian J; Fornage, Myriam; Levy, Daniel; London, Stephanie J

    2016-01-01

    textabstractBackground-DNA methylation leaves a long-term signature of smoking exposure and is one potential mechanism by which tobacco exposure predisposes to adverse health outcomes, such as cancers...

  14. Initial Semantics for Strengthened Signatures

    Directory of Open Access Journals (Sweden)

    André Hirschowitz

    2012-02-01

    Full Text Available We give a new general definition of arity, yielding the companion notions of signature and associated syntax. This setting is modular in the sense requested by Ghani and Uustalu: merging two extensions of syntax corresponds to building an amalgamated sum. These signatures are too general in the sense that we are not able to prove the existence of an associated syntax in this general context. So we have to select arities and signatures for which there exists the desired initial monad. For this, we follow a track opened by Matthes and Uustalu: we introduce a notion of strengthened arity and prove that the corresponding signatures have initial semantics (i.e. associated syntax. Our strengthened arities admit colimits, which allows the treatment of the λ-calculus with explicit substitution.

  15. Visual Impairment, Including Blindness

    Science.gov (United States)

    ... Who Knows What? (log-in required) Select Page Visual Impairment, Including Blindness Mar 31, 2017 Links updated, ... doesn’t wear his glasses. Back to top Visual Impairments in Children Vision is one of our ...

  16. What is Color Blindness?

    Science.gov (United States)

    ... these three color cone cells to determine our color perception. Color blindness can occur when one or more ... condition. Anyone who experiences a significant change in color perception should see an ophthalmologist (Eye M.D.). Next ...

  17. Blind Loop Syndrome

    Science.gov (United States)

    ... of tissue that protrude through the intestinal wall (diverticulosis) Certain medical conditions, including Crohn's disease, radiation enteritis, ... History of radiation therapy to the abdomen Diabetes Diverticulosis of the small intestine A blind loop can ...

  18. Issues in Traumatic Blindness.

    Science.gov (United States)

    Dale, B.

    1992-01-01

    This article discusses factors related to individuals with sudden blindness, focusing on the visually impaired client's readiness for rehabilitation, the reactions of family members and friends, and personality variables. Two cases illustrate the adjustment process and eventual rehabilitation. (DB)

  19. A new way to proxy levels of infrastructure development

    Directory of Open Access Journals (Sweden)

    Steve Pickering

    2017-01-01

    Full Text Available Researchers in many fields have needed to develop a measure of infrastructure, and many proxies have been used toward this end, such as night light data and the Digital Chart of the World. Yet there are issues in using these methods. This paper presents a new way of proxying infrastructure: analysing the file sizes of map images on the Bing, Google, OpenStreetMap and Sina websites. The paper also demonstrates four ways in which this can be achieved. This approach is by no means perfect and does not solve all of the difficulties presented by other methods. Nevertheless, it does provide a simple and functional alternative proxy for level of infrastructure development.

  20. Munchausen Syndrome By Proxy Admitting with Bloody Urine and Stool

    Directory of Open Access Journals (Sweden)

    Tugba Koca

    2014-02-01

    Full Text Available Munchausen syndrome by Proxy is a severe form of child abuse. Disease symptoms and signs are fabricated or imitated by parents or caregivers The child is usually presented to doctors, persistently. A delay in diagnosis may cause severe negative impact on spiritual, physical, mental and social development of the cases and even death. Symptoms usually disappear in the absence of the perpetrators. The diagnosis is extremely difficult. A 21-month-old boy who had applied to many centers due to bleeding from various parts of the body for last six months, and whose symptoms could not be explained with any physical reason after tests were conducted. Finally he was admitted to our center with bloody urine and stools, and diagnosed Munchausen syndrome by proxy. In cases with recurrent hospital admission in whom no apparent disease is diagnosed, Munchausen syndrome by Proxy should be among the differential diagnosis.

  1. Research on implementation of proxy Arp in IP DSLAM

    Science.gov (United States)

    Cheng, Chuanqing; Wang, Li; Huang, Qiugen

    2005-02-01

    While the ethernet is applied more and more in public network environment and xdsl service become the most common access mode ,IP kenel DSLAM undertakes some functions such as service distribution and convergence ,security management and customer management.Facing the contradiction of the need of port isolation and the shortage of ip address,VLAN aggregation technology is applied in DSLAM.How to implement the communicatio between the two vlan but share the same ip subnet,proxy arp does this. This paper introduces how to implement proxy arp in the DSLAM. TCP/IP communication detail procedure betweent two host ,the relation of VLAN and network segment are discussed. The proxy arp model and its implementation in IP DSLAM is also expatiated in this paper and a conformance tesing is given.

  2. POSTERIOR SEGMENT CAUSES OF BLINDNESS AMONG CHILDREN IN BLIND SCHOOLS

    OpenAIRE

    Sandhya; Chalapathi Reddy; Anitha; Ravi Prabhu

    2015-01-01

    BACKGROUND: It is estimated that there are 1.4 million irreversibly blind children in the world out of which 1 million are in Asia alone. India has the highest number of blind children than any other country. Nearly 70% of the childhood blindness is avoidable. There i s paucity of data available on the causes of childhood blindness. This study focuses on the posterior segment causes of blindness among children attendin...

  3. Epigenetic signature of birth weight discordance in adult twins

    DEFF Research Database (Denmark)

    Tan, Qihua; Nielsen, Morten Frost Munk; Heijmans, Bastiaan T

    2014-01-01

    Background: A low birth weight has been extensively related to poor adult health outcomes. Birth weight can be seen as a proxy for environmental conditions during prenatal development. Identical twin pairs discordant for birth weight provide an extraordinary model for investigating the association...... between birth weight and adult life health while controlling for not only genetics but also postnatal rearing environment. We performed an epigenome-wide profiling on blood samples from 150 pairs of adult monozygotic twins discordant for birth weight to look for molecular evidence of epigenetic signatures...... pairs, no significant site was found except for 3 CpGs that displayed age-dependent intra-pair differential methylation with FDRs 0.014 (cg26856578, p = 3.42e-08), 0.0256 (cg15122603, p = 1.25e-07) and 0.0258 (cg16636641, p = 2.05e-07). Among the three sites, intra-pair differential methylation...

  4. Attribute-Based Digital Signature System

    NARCIS (Netherlands)

    Ibraimi, L.; Asim, Muhammad; Petkovic, M.

    2011-01-01

    An attribute-based digital signature system comprises a signature generation unit (1) for signing a message (m) by generating a signature (s) based on a user secret key (SK) associated with a set of user attributes, wherein the signature generation unit (1) is arranged for combining the user secret

  5. Practical Certificateless Aggregate Signatures From Bilinear Maps

    NARCIS (Netherlands)

    Gong, Zheng; Long, Y.; Hong, X.; Chen, Kefei

    2010-01-01

    Aggregate signature is a digital signature with a striking property that anyone can aggregate n individual signatures on n different messages which are signed by n distinct signers, into a single compact signature to reduce computational and storage costs. In this work, two practical certificateless

  6. Health anxiety by proxy in women with severe health anxiety

    DEFF Research Database (Denmark)

    Thorgaard, Mette Viller; Frostholm, Lisbeth; Walker, Lynn

    2017-01-01

    Health anxiety (HA) refers to excessive worries and anxiety about harbouring serious illness based on misinterpretation of bodily sensations or changes as signs of serious illness. Severe HA is associated with disability and high health care costs. However, the impact of parental HA on excessive...... concern with their children's health (health anxiety by proxy) is scantly investigated. The aim of this study is to investigate HA by proxy in mothers with severe HA. Fifty mothers with severe HA and two control groups were included, i.e. mothers with rheumatoid arthritis (N = 49) and healthy mothers (N...

  7. Simulating realistic predator signatures in quantitative fatty acid signature analysis

    Science.gov (United States)

    Bromaghin, Jeffrey F.

    2015-01-01

    Diet estimation is an important field within quantitative ecology, providing critical insights into many aspects of ecology and community dynamics. Quantitative fatty acid signature analysis (QFASA) is a prominent method of diet estimation, particularly for marine mammal and bird species. Investigators using QFASA commonly use computer simulation to evaluate statistical characteristics of diet estimators for the populations they study. Similar computer simulations have been used to explore and compare the performance of different variations of the original QFASA diet estimator. In both cases, computer simulations involve bootstrap sampling prey signature data to construct pseudo-predator signatures with known properties. However, bootstrap sample sizes have been selected arbitrarily and pseudo-predator signatures therefore may not have realistic properties. I develop an algorithm to objectively establish bootstrap sample sizes that generates pseudo-predator signatures with realistic properties, thereby enhancing the utility of computer simulation for assessing QFASA estimator performance. The algorithm also appears to be computationally efficient, resulting in bootstrap sample sizes that are smaller than those commonly used. I illustrate the algorithm with an example using data from Chukchi Sea polar bears (Ursus maritimus) and their marine mammal prey. The concepts underlying the approach may have value in other areas of quantitative ecology in which bootstrap samples are post-processed prior to their use.

  8. SIGNATURE: A workbench for gene expression signature analysis

    Directory of Open Access Journals (Sweden)

    Chang Jeffrey T

    2011-11-01

    Full Text Available Abstract Background The biological phenotype of a cell, such as a characteristic visual image or behavior, reflects activities derived from the expression of collections of genes. As such, an ability to measure the expression of these genes provides an opportunity to develop more precise and varied sets of phenotypes. However, to use this approach requires computational methods that are difficult to implement and apply, and thus there is a critical need for intelligent software tools that can reduce the technical burden of the analysis. Tools for gene expression analyses are unusually difficult to implement in a user-friendly way because their application requires a combination of biological data curation, statistical computational methods, and database expertise. Results We have developed SIGNATURE, a web-based resource that simplifies gene expression signature analysis by providing software, data, and protocols to perform the analysis successfully. This resource uses Bayesian methods for processing gene expression data coupled with a curated database of gene expression signatures, all carried out within a GenePattern web interface for easy use and access. Conclusions SIGNATURE is available for public use at http://genepattern.genome.duke.edu/signature/.

  9. Modeling Profiles and Signatures of Enrichments

    Science.gov (United States)

    Ali, A.; Qualls, C.; Lucas, S. G.; Lombari, G.; Appenzeller, O.

    2014-12-01

    Anthropogenic and geochemical enrichment of soils and living matter have been well documented 1, 2, 3.Here we report on geochemical, anthropogenic and biological enrichments with heavy metals in Modern Peru and compared this to Modern and ancient data from New Mexico, USA. We established a signature derived from the quantities of 25 metals in various biological, fossil and soil materials. We also speculate that human adaptation to mercury toxicity may occur in remarkably short time spans during the Holocene. We found mercury concentrations in Modern pigeon feathers and llama wool from free foraging birds and animals in Albuquerque, NM, ranging from 0.006 to 0.019 mg/Kg of tissue. The values for Modern Peru ranged from 22.0 to 556 mg/Kg for the same tissues. We discovered, in 64 million-year-old fossilized plants from New Mexico (Paleocene Nacimiento Formation, San Juan Basin), a mercury concentration of 1.11 mg/Kg of fossil, whereas Modern plant material from the Rio Grande Basin in New Mexico contained no mercury. Profiling of metal content of these samples suggests that mercury is a proxy for anthropogenic rather than geochemical enrichment in the localities we examined. We found no overt signs of mercury toxicity in contemporaneous inhabitants of Huancavelica4, Peru; one of the ten most mercury-polluted places in the world and the mercury concentration in their hair is well below modern admissible levels. However, assessment of their annual scalp hair growth-rate showed marked reduction in growth (~ 5cm/yr) versus ~ 16cm/year for normal scalp hair from other continents4. This is consistent with a toxic effect of heavy metals on human metabolism and especially autonomic nervous system function in Huancavelica, Peru. Contemporaneous anthropogenic activities are known to increase heavy metal content in the biosphere with potentially toxic effects on humans. However, signs of human evolutionary adaptation to such toxins might already be evident in Peru4.

  10. Significance analysis of prognostic signatures.

    Directory of Open Access Journals (Sweden)

    Andrew H Beck

    Full Text Available A major goal in translational cancer research is to identify biological signatures driving cancer progression and metastasis. A common technique applied in genomics research is to cluster patients using gene expression data from a candidate prognostic gene set, and if the resulting clusters show statistically significant outcome stratification, to associate the gene set with prognosis, suggesting its biological and clinical importance. Recent work has questioned the validity of this approach by showing in several breast cancer data sets that "random" gene sets tend to cluster patients into prognostically variable subgroups. This work suggests that new rigorous statistical methods are needed to identify biologically informative prognostic gene sets. To address this problem, we developed Significance Analysis of Prognostic Signatures (SAPS which integrates standard prognostic tests with a new prognostic significance test based on stratifying patients into prognostic subtypes with random gene sets. SAPS ensures that a significant gene set is not only able to stratify patients into prognostically variable groups, but is also enriched for genes showing strong univariate associations with patient prognosis, and performs significantly better than random gene sets. We use SAPS to perform a large meta-analysis (the largest completed to date of prognostic pathways in breast and ovarian cancer and their molecular subtypes. Our analyses show that only a small subset of the gene sets found statistically significant using standard measures achieve significance by SAPS. We identify new prognostic signatures in breast and ovarian cancer and their corresponding molecular subtypes, and we show that prognostic signatures in ER negative breast cancer are more similar to prognostic signatures in ovarian cancer than to prognostic signatures in ER positive breast cancer. SAPS is a powerful new method for deriving robust prognostic biological signatures from clinically

  11. Signature molecular descriptor : advanced applications.

    Energy Technology Data Exchange (ETDEWEB)

    Visco, Donald Patrick, Jr. (Tennessee Technological University, Cookeville, TN)

    2010-04-01

    In this work we report on the development of the Signature Molecular Descriptor (or Signature) for use in the solution of inverse design problems as well as in highthroughput screening applications. The ultimate goal of using Signature is to identify novel and non-intuitive chemical structures with optimal predicted properties for a given application. We demonstrate this in three studies: green solvent design, glucocorticoid receptor ligand design and the design of inhibitors for Factor XIa. In many areas of engineering, compounds are designed and/or modified in incremental ways which rely upon heuristics or institutional knowledge. Often multiple experiments are performed and the optimal compound is identified in this brute-force fashion. Perhaps a traditional chemical scaffold is identified and movement of a substituent group around a ring constitutes the whole of the design process. Also notably, a chemical being evaluated in one area might demonstrate properties very attractive in another area and serendipity was the mechanism for solution. In contrast to such approaches, computer-aided molecular design (CAMD) looks to encompass both experimental and heuristic-based knowledge into a strategy that will design a molecule on a computer to meet a given target. Depending on the algorithm employed, the molecule which is designed might be quite novel (re: no CAS registration number) and/or non-intuitive relative to what is known about the problem at hand. While CAMD is a fairly recent strategy (dating to the early 1980s), it contains a variety of bottlenecks and limitations which have prevented the technique from garnering more attention in the academic, governmental and industrial institutions. A main reason for this is how the molecules are described in the computer. This step can control how models are developed for the properties of interest on a given problem as well as how to go from an output of the algorithm to an actual chemical structure. This report

  12. Molecular signatures in breast cancer.

    Science.gov (United States)

    Lal, Samir; McCart Reed, Amy E; de Luca, Xavier M; Simpson, Peter T

    2017-12-01

    The use of molecular signatures to add value to standard clinical and pathological parameters has impacted clinical practice in many cancer types, but perhaps most notably in the breast cancer field. This is, in part, due to the considerable complexity of the disease at the clinical, morphological and molecular levels. The adoption of molecular profiling of DNA, RNA and protein continues to reveal important differences in the intrinsic biology between molecular subtypes and has begun to impact the way patients are managed. Several bioinformatic tools have been developed using DNA or RNA-based signatures to stratify the disease into biologically and/or clinically meaningful subgroups. Here, we review the approaches that have been used to develop gene expression signatures into currently available diagnostic assays (e.g., OncotypeDX® and Mammaprint®), plus we describe the latest work on genome sequencing, the methodologies used in the discovery process of mutational signatures, and the potential of these signatures to impact the clinic. Copyright © 2017 Elsevier Inc. All rights reserved.

  13. Slices: A shape-proxy based on planar sections

    KAUST Repository

    McCrae, James

    2011-12-01

    Minimalist object representations or shape-proxies that spark and inspire human perception of shape remain an incompletely understood, yet powerful aspect of visual communication. We explore the use of planar sections, i.e., the contours of intersection of planes with a 3D object, for creating shape abstractions, motivated by their popularity in art and engineering. We first perform a user study to show that humans do define consistent and similar planar section proxies for common objects. Interestingly, we observe a strong correlation between user-defined planes and geometric features of objects. Further we show that the problem of finding the minimum set of planes that capture a set of 3D geometric shape features is both NP-hard and not always the proxy a user would pick. Guided by the principles inferred from our user study, we present an algorithm that progressively selects planes to maximize feature coverage, which in turn influence the selection of subsequent planes. The algorithmic framework easily incorporates various shape features, while their relative importance values are computed and validated from the user study data. We use our algorithm to compute planar slices for various objects, validate their utility towards object abstraction using a second user study, and conclude showing the potential applications of the extracted planar slice shape proxies.

  14. Proxy indicators as measure of local economic dispositions in South ...

    African Journals Online (AJOL)

    Even though South Africa is in a more fortunate position with regard to the availability of such data, it also has data gaps, notably with regard to informal economic activities in the rural areas of the country. This exploratory article engages the use of proxy indicators to provide cues as to the state of a local economy.

  15. Proxy indicators as measure of local economic dispositions in South ...

    African Journals Online (AJOL)

    The growth of spare-part sales mirrors the behaviour of the national economy more accurately than used and new vehicles. BER: Retail Survey. (2005-2010). Used vehicles. 0.53. Spare Parts. 0.80. Banking-related proxy indicators. 13. House bonds. 0.43. Although some similarities exist between the national economy and ...

  16. Munchausen Syndrome by Proxy: A Study of Psychopathology.

    Science.gov (United States)

    Bools, Christopher; And Others

    1994-01-01

    This study evaluated 100 mothers with Munchausen Syndrome by Proxy (the fabrication of illness by a mother in her child). Approximately half of the mothers had either smothered or poisoned their child as part of their fabrications. Lifetime psychiatric histories were reported for 47 of the mothers. The most notable psychopathology was personality…

  17. Munchausen Syndrome by Proxy: Mother Fabricates Infant's Hearing Impairment.

    Science.gov (United States)

    Kahn, Gerri; Goldman, Ellen

    1991-01-01

    Case study reports a case of Munchausen Syndrome by Proxy, a form of child abuse in which the mother presents a child for treatment for a condition she herself has invented or created. This case study describes the ways in which a mother obtained a diagnosis of sensorineural hearing loss as well as amplification for her normally hearing infant.…

  18. Munchausen syndrome by adult proxy: a review of the literature.

    Science.gov (United States)

    Burton, M Caroline; Warren, Mark B; Lapid, Maria I; Bostwick, J Michael

    2015-01-01

    Munchausen syndrome by proxy (MSBP), more formally known as factitious disorder imposed on another, is a form of abuse in which a caregiver deliberately produces or feigns illness in a person under his or her care so that the proxy will receive medical care that gratifies the caregiver. Although well documented in the pediatric literature, few cases of MSBP with adult proxies (MSB-AP) have been reported. This study reviews existing literature on MSB-AP to provide a framework for clinicians to recognize this disorder. We searched Ovid MEDLINE, Ovid EMBASE, PubMed, Web of Knowledge, and PsychINFO, supplemented by bibliographic examination. We identified 13 cases of MSB-AP. Perpetrators were caregivers, most (62%) were women, and many worked in healthcare. The age range of the victims was 21 to 82 years. Most were unaware of the abuse, although in 2 cases the victim may have colluded with the perpetrator. Disease fabrication most often resulted from poisoning. MSB-AP should be included in the differential diagnosis of patients presenting with a complex constellation of symptoms without a unifying etiology and an overly involved caregiver with suspected psychological gain. Early identification is necessary so that healthcare providers do not unknowingly perpetuate harm through treatments that satisfy the perpetrator's psychological needs at the proxy's expense. © 2014 Society of Hospital Medicine.

  19. Identifying and Responding to Munchausen Syndrome by Proxy.

    Science.gov (United States)

    Pearl, Peggy T.

    1995-01-01

    Defines Munchausen Syndrome by Proxy in children up to eight years, in which the mother falsifies illness in her child by simulating or producing illness, bringing about frequent hospitalizations, painful tests, potentially harmful treatment, and in extreme cases, death. Describes symptoms and suggested professional actions. (DR)

  20. Munchausen by Proxy Victims in Adulthood: A First Look.

    Science.gov (United States)

    Libow, Judith A.

    1995-01-01

    Childhood experiences and long-term psychological outcomes were investigated with 10 adults, ages 33 through 71, who were self-identified victims of illness fabrication by a parent (Munchausen by Proxy). During childhood they felt unloved and unsafe and had emotional and physical problems. As adults, problems included insecurity, reality-testing…

  1. Munchausen Syndrome by Proxy (MSBP): An Intergenerational Perspective.

    Science.gov (United States)

    Rappaport, Sol R.; Hochstadt, Neil J.

    1993-01-01

    Presents new information about Munchausen Syndrome by Proxy (MSBP), factitious disorder in which caretaker may induce or exaggerate medical illness in his or her child that may lead to illness and even death. Provides psychosocial history of caregiver using intergenerational model. Presents case of MSBP involving three siblings and information…

  2. Shareholder Activism through Proxy Proposals : The European Perspective

    NARCIS (Netherlands)

    Cziraki, P.; Renneboog, L.D.R.; Szilagyi, P.G.

    2009-01-01

    This paper is the first to investigate the corporate governance role of shareholderinitiated proxy proposals in European firms. While proposals in the US are nonbinding even if they pass the shareholder vote, they are legally binding in the UK and most of Continental Europe. Nonetheless, submissions

  3. Munchausen by Proxy (MBP) Maltreatment: An International Educational Challenge.

    Science.gov (United States)

    Lasher, Louisa J.

    2003-01-01

    This article is an introduction to a special section on Munchausen Syndrome by Proxy (MSBP) as a form of child maltreatment. In MSBP the perpetrator has deliberately induced, fabricated, or exaggerated a physical and/or psychological-behavioral-mental health problem in another. The article stresses the importance of obtaining an MSBP finding of…

  4. SINOMA - a better tool for proxy based reconstructions?

    Science.gov (United States)

    Buras, Allan; Thees, Barnim; Czymzik, Markus; Dräger, Nadine; Kienel, Ulrike; Neugebauer, Ina; Ott, Florian; Scharnweber, Tobias; Simard, Sonia; Slowinski, Michal; Slowinski, Sandra; Tecklenburg, Christina; Zawiska, Izabela; Wilmking, Martin

    2014-05-01

    Our knowledge on past environmental conditions largely relies on reconstructions that are based on linear regressions between proxy variables (e.g. tree-rings, lake sediments, ice cores) covering a comparably long period (centuries to millennia) and environmental parameters (e.g. climate data) of which only rather short measurement series exist (mostly decades). In general, the corresponding measurements are prone to errors. For instance, air temperature records that are to be prolonged by reconstruction from tree-rings are normally not measured in situ, i.e. where the trees used for reconstructions are growing. In contrast, the variation of tree-ring properties which are used as proxies does not only depend on temperature variations but also on other environmental variables and biological effects. However, if regressions are based on noisy data, knowledge on the noise intensity of both predictor and predictand is needed and model parameter estimates (slope and intercept) will be erroneous if information on the noise is not included in their estimation (Kutzbach et al., 2011). Here, we investigate the performance of the new Sequential Iterative Noise Matching Algorithm (SINOMA; Thees et al., 2009; and Thees et al., submitted) on a variety of typical proxy-data of differing temporal resolution (i.e. hourly (dendrometers, piezometers), seasonally (tree-rings), and annually (tree rings and varved lake sediments)). For each of the investigated proxies a number of pseudo-proxy datasets is generated. I.e. to each proxy variable two different noises are added, resulting in two noisy variables that originate from a common signal (the proxy) and of which the respective error noises and the true model parameters (slope and intercept) between both are known. SINOMA is applied to each of these pseudo-proxy datasets and its performance is evaluated against traditional regression techniques. The herewith submitted contribution thus focuses on the applicability of SINOMA rather

  5. On the use of human mobility proxies for modeling epidemics.

    Directory of Open Access Journals (Sweden)

    Michele Tizzoni

    2014-07-01

    Full Text Available Human mobility is a key component of large-scale spatial-transmission models of infectious diseases. Correctly modeling and quantifying human mobility is critical for improving epidemic control, but may be hindered by data incompleteness or unavailability. Here we explore the opportunity of using proxies for individual mobility to describe commuting flows and predict the diffusion of an influenza-like-illness epidemic. We consider three European countries and the corresponding commuting networks at different resolution scales, obtained from (i official census surveys, (ii proxy mobility data extracted from mobile phone call records, and (iii the radiation model calibrated with census data. Metapopulation models defined on these countries and integrating the different mobility layers are compared in terms of epidemic observables. We show that commuting networks from mobile phone data capture the empirical commuting patterns well, accounting for more than 87% of the total fluxes. The distributions of commuting fluxes per link from mobile phones and census sources are similar and highly correlated, however a systematic overestimation of commuting traffic in the mobile phone data is observed. This leads to epidemics that spread faster than on census commuting networks, once the mobile phone commuting network is considered in the epidemic model, however preserving to a high degree the order of infection of newly affected locations. Proxies' calibration affects the arrival times' agreement across different models, and the observed topological and traffic discrepancies among mobility sources alter the resulting epidemic invasion patterns. Results also suggest that proxies perform differently in approximating commuting patterns for disease spread at different resolution scales, with the radiation model showing higher accuracy than mobile phone data when the seed is central in the network, the opposite being observed for peripheral locations. Proxies

  6. On the use of human mobility proxies for modeling epidemics.

    Science.gov (United States)

    Tizzoni, Michele; Bajardi, Paolo; Decuyper, Adeline; Kon Kam King, Guillaume; Schneider, Christian M; Blondel, Vincent; Smoreda, Zbigniew; González, Marta C; Colizza, Vittoria

    2014-07-01

    Human mobility is a key component of large-scale spatial-transmission models of infectious diseases. Correctly modeling and quantifying human mobility is critical for improving epidemic control, but may be hindered by data incompleteness or unavailability. Here we explore the opportunity of using proxies for individual mobility to describe commuting flows and predict the diffusion of an influenza-like-illness epidemic. We consider three European countries and the corresponding commuting networks at different resolution scales, obtained from (i) official census surveys, (ii) proxy mobility data extracted from mobile phone call records, and (iii) the radiation model calibrated with census data. Metapopulation models defined on these countries and integrating the different mobility layers are compared in terms of epidemic observables. We show that commuting networks from mobile phone data capture the empirical commuting patterns well, accounting for more than 87% of the total fluxes. The distributions of commuting fluxes per link from mobile phones and census sources are similar and highly correlated, however a systematic overestimation of commuting traffic in the mobile phone data is observed. This leads to epidemics that spread faster than on census commuting networks, once the mobile phone commuting network is considered in the epidemic model, however preserving to a high degree the order of infection of newly affected locations. Proxies' calibration affects the arrival times' agreement across different models, and the observed topological and traffic discrepancies among mobility sources alter the resulting epidemic invasion patterns. Results also suggest that proxies perform differently in approximating commuting patterns for disease spread at different resolution scales, with the radiation model showing higher accuracy than mobile phone data when the seed is central in the network, the opposite being observed for peripheral locations. Proxies should therefore be

  7. Signature Visualization of Software Binaries

    Energy Technology Data Exchange (ETDEWEB)

    Panas, T

    2008-07-01

    In this paper we present work on the visualization of software binaries. In particular, we utilize ROSE, an open source compiler infrastructure, to pre-process software binaries, and we apply a landscape metaphor to visualize the signature of each binary (malware). We define the signature of a binary as a metric-based layout of the functions contained in the binary. In our initial experiment, we visualize the signatures of a series of computer worms that all originate from the same line. These visualizations are useful for a number of reasons. First, the images reveal how the archetype has evolved over a series of versions of one worm. Second, one can see the distinct changes between version. This allows the viewer to form conclusions about the development cycle of a particular worm.

  8. Optimal blind quantum computation.

    Science.gov (United States)

    Mantri, Atul; Pérez-Delgado, Carlos A; Fitzsimons, Joseph F

    2013-12-06

    Blind quantum computation allows a client with limited quantum capabilities to interact with a remote quantum computer to perform an arbitrary quantum computation, while keeping the description of that computation hidden from the remote quantum computer. While a number of protocols have been proposed in recent years, little is currently understood about the resources necessary to accomplish the task. Here, we present general techniques for upper and lower bounding the quantum communication necessary to perform blind quantum computation, and use these techniques to establish concrete bounds for common choices of the client's quantum capabilities. Our results show that the universal blind quantum computation protocol of Broadbent, Fitzsimons, and Kashefi, comes within a factor of 8/3 of optimal when the client is restricted to preparing single qubits. However, we describe a generalization of this protocol which requires exponentially less quantum communication when the client has a more sophisticated device.

  9. Signatures of the Toba super-volcano eruption in Borneo stalagmite geochemistry: a multi-proxy approach

    Science.gov (United States)

    Cobb, K. M.; Chambers, L. R.; Longo, A.; Ingall, E. D.; Moerman, J. W.; Carolin, S. A.; Meckler, A. N.; Adkins, J. F.; Finney, L.; Lejau, S.; Malang, J.; Tuen, A.; Pritchard, A.; Smith, V.; Vogt, S.

    2014-12-01

    Instrumental climate data, paleoclimate data, and climate models show that large volcanic eruptions cause significant global cooling by injecting reflective aerosols into the upper atmosphere, increasing planetary albedo (see Robock et al., 2000 and references therein). As such, these eruptions provide an empirical constraint on the relationship between radiative forcing and climatic response - a key uncertainty in numerical simulations of future climate change. However, the overall magnitude of a large eruption's climatic effects, and their regional expression, remain highly uncertain, and are the subject of heated debate in the peer-reviewed literature (Robock et al., 2005; Timmreck et al., 2009; Mann et al., 2012a, 2012b, 2013; Anchukaitis et al., 2012). As the largest eruption of the last 2 million years, the Toba eruption ~74 thousand years before present (kybp) on Sumatra presents an opportunity to probe the climatic responses associated with a massive perturbation to the Earth's radiative balance. Here we present trace metal as well as isotopic data from U/Th-dated stalagmites from Gunung Mulu National Park, in northern Borneo, across the Toba depth horizon. Previously published timeseries of stalagmite oxygen isotopes (Carolin et al., 2013) document a significant positive anomaly contemporaneous with the Toba super-eruption (interpreted as dry conditions at the site), but the degree to which Toba contributed to this anomaly has remained uncertain. We present new synchrotron-based micro x-ray fluorescence data showing the presence of distinct horizons in the Toba time interval with elevated concentrations of Fe, Mn, and Co, possibly indicating the presence of Toba ash in the samples. Working with an array of trace elements, we compare the stalagmite geochemistry in these horizons to the geochemistry of 1) distal ash samples from the Younger Toba Tuff (Smith et al., 2011), 2) clays isolated from the Gunung Mulu caves, and 3) depth horizons marked by brown layers and/or known hiatuses. We illustrate the promise of synchrotron-based fluorescence for identifying trace volcanic ash in stalagmites, with potentially broad applications in paleoclimate.

  10. The proton pressure tensor as a new proxy of the proton decoupling region in collisionless magnetic reconnection

    Directory of Open Access Journals (Sweden)

    N. Aunai

    2011-09-01

    Full Text Available Cluster data is analyzed to test the proton pressure tensor variations as a proxy of the proton decoupling region in collisionless magnetic reconnection. The Hall electric potential well created in the proton decoupling region results in bounce trajectories of the protons which appears as a characteristic variation of one of the in-plane off-diagonal components of the proton pressure tensor in this region. The event studied in this paper is found to be consistent with classical Hall field signatures with a possible 20% guide field. Moreover, correlations between this pressure tensor component, magnetic field and bulk flow are proposed and validated, together with the expected counterstreaming proton distribution functions.

  11. Silicon isotopes in allophane as a proxy for mineral formation in volcanic soils

    Energy Technology Data Exchange (ETDEWEB)

    Opfergelt, S., E-mail: sophie.opfergelt@uclouvain.be [Department of Earth Sciences, University of Oxford, South Parks Road, Oxford OX1 3AN (United Kingdom)] [Earth and Life Institute, Universite catholique de Louvain, Croix du Sud 2/10, 1348 Louvain-la-Neuve (Belgium); Georg, R.B. [Trent University, Worsfold Water Quality Centre, 1600 West Bank Dr., Peterborough, Ontario (Canada); Burton, K.W. [Department of Earth Sciences, University of Oxford, South Parks Road, Oxford OX1 3AN (United Kingdom); Guicharnaud, R. [Agricultural University of Iceland, Keldnaholt 112, Reykjavik (Iceland); Siebert, C. [Department of Earth Sciences, University of Oxford, South Parks Road, Oxford OX1 3AN (United Kingdom); Gislason, S.R. [Institute of Earth Sciences, University of Iceland, Sturlugata 7, 101 Reykjavik (Iceland); Halliday, A.N. [Department of Earth Sciences, University of Oxford, South Parks Road, Oxford OX1 3AN (United Kingdom)

    2011-06-15

    Highlights: > The fate of dissolved Si in volcanic soils strongly depends on Al availability. > Lighter {delta}{sup 30}Si ratios in allophane relative to the basalt reflect weathering processes. > Heavier {delta}{sup 30}Si ratios in allophane indicate Si precipitation as Al is humus-complexed. > Allophane {delta}{sup 30}Si ratios could be useful in paleo-environmental reconstruction. - Abstract: Weathering of basaltic ash in volcanic areas produces andosols, rich in allophane and ferrihydrite. Since the rate of mineral formation is very useful in climate and geochemical modelling, this study investigates Si isotope compositions of allophane as a proxy for mineral formation. Allophane formed in contrasting conditions in five Icelandic soil profiles displays silicon isotope signatures lighter than the basalt in less weathered soils (-0.64 {+-} 0.15 per mille), and heavier in more weathered organic-rich soils (+0.23 {+-} 0.10 per mille). The fate of the dissolved Si in those volcanic soils strongly depends on Al availability. In organic-rich soils, most of Al is humus-complexed, and the results support that Si precipitates as opaline silica by super-saturation, leaving an isotopically heavier dissolved Si pool to form allophane with uncomplexed Al. This study highlights that Si isotopes can be useful to record successive soil processes involved in mineral formation, which is potentially useful in environmental paleo-reconstruction.

  12. Low Frequency Extensions of the Saturn Kilometric Radiation as a Proxy for Magnetospheric Dynamics.

    Science.gov (United States)

    Reed, J.; Jackman, C. M.; Whiter, D. K.; Kurth, W. S.; Lamy, L.

    2016-12-01

    Saturn Kilometric Radiation (SKR) is a radio emission formed via the cyclotron maser instability on field aligned currents near the auroral regions of Saturn. The SKR has been found to respond to both internal and external driving, and to be linked to both solar wind compressions and magnetotail reconnection events. The radio emission is remotely sensed quasi-continuously and therefore offers the potential to be used as a proxy for magnetospheric activity when the spacecraft is not in an ideal viewing region for observing signatures of reconnection. In this work we use data taken by the Cassini magnetometer and radio and plasma wave sensor while Cassini was executing its deepest tail orbits in 2006. We characterise the behaviour of the SKR over this period and develop an automatic method for finding low frequency extensions (LFE), where the SKR emission extends down to lower frequencies below the main band. LFEs have been shown to occur in response to reconnection at Saturn (Jackman et al, 2009) and their appearance in Earth's analogous Auroral Kilometric Radiation (AKR) has been shown to coincide with substorm onset (e.g. Morioka et al, 2007). Using a new catalogue of LFEs we discuss their correlation with known tail reconnection events and solar wind shocks (as inferred from the use of propagated solar wind models). We also look at their properties such as length and recurrence rate, as well as their relationship to the planetary periodicities.

  13. FLIPPS for the Blind

    DEFF Research Database (Denmark)

    Bothe, Hans-Heinrich; Al-Hamdani, Sermed

    2010-01-01

    (blind person) receives the reflected light from the objects and, based on brain plasticity principles, can interactively learn to construct a mental image of the objects and of the scenery. The FLIPPS idea is based on sensory substitution theory; here, substituting visual inputs by haptic vibrations....

  14. Facts About Color Blindness

    Science.gov (United States)

    ... percent of men and 0.5 percent of women with Northern European ancestry have the common form of red-green color blindness. Men are much more likely to be colorblind than women because the genes responsible for the most common, ...

  15. Oplysningens blinde vinkler

    DEFF Research Database (Denmark)

    Hendricks, Vincent Fella; Hansen, Pelle Guldborg

    manipulation og fordrejning, til at påvirke menneskers overvejelser, beslutninger og handlinger, både individuelt og kollektivt, hvilket i sidste ende kan få betydning for de demokratiske processer. Oplysningens blinde vinkler gennemgår en række informationsfænomener, som optræder i vores dagligdag, og den...

  16. Galaxy interactions : The HI signature

    NARCIS (Netherlands)

    Sancisi, R; Barnes, JE; Sanders, DB

    1999-01-01

    HI observations are an excellent tool for investigating tidal interactions. Ongoing major and minor interactions which can lead to traumatic mergers or to accretion and the triggering of star formation, show distinct HI signatures. Interactions and mergers in the recent past can also be recognized

  17. Signature simulation of mixed materials

    Science.gov (United States)

    Carson, Tyler D.; Salvaggio, Carl

    2015-05-01

    Soil target signatures vary due to geometry, chemical composition, and scene radiometry. Although radiative transfer models and function-fit physical models may describe certain targets in limited depth, the ability to incorporate all three signature variables is difficult. This work describes a method to simulate the transient signatures of soil by first considering scene geometry synthetically created using 3D physics engines. Through the assignment of spectral data from the Nonconventional Exploitation Factors Data System (NEFDS), the synthetic scene is represented as a physical mixture of particles. Finally, first principles radiometry is modeled using the Digital Imaging and Remote Sensing Image Generation (DIRSIG) model. With DIRSIG, radiometric and sensing conditions were systematically manipulated to produce and record goniometric signatures. The implementation of this virtual goniometer allows users to examine how a target bidirectional reflectance distribution function (BRDF) will change with geometry, composition, and illumination direction. By using 3D computer graphics models, this process does not require geometric assumptions that are native to many radiative transfer models. It delivers a discrete method to circumnavigate the significant cost of time and treasure associated with hardware-based goniometric data collections.

  18. Epigenetic Signatures of Cigarette Smoking

    NARCIS (Netherlands)

    R. Joehanes (Roby); Just, A.C. (Allan C.); R.E. Marioni (Riccardo); L.C. Pilling (Luke); L.M. Reynolds (Lindsay); Mandaviya, P.R. (Pooja R.); W. Guan (Weihua); Xu, T. (Tao); C.E. Elks (Cathy); Aslibekyan, S. (Stella); H. Moreno-Macías (Hortensia); J.A. Smith (Jennifer A); J. Brody (Jennifer); Dhingra, R. (Radhika); P. Yousefi (Paul); J.S. Pankow (James); Kunze, S. (Sonja); Shah, S.H. (Sonia H.); A.F. McRae (Allan F.); K. Lohman (Kurt); Sha, J. (Jin); D. Absher (Devin); L. Ferrucci (Luigi); Zhao, W. (Wei); E.W. Demerath (Ellen); J. Bressler (Jan); M.L. Grove (Megan); T. Huan (Tianxiao); C. Liu (Chunyu); Mendelson, M.M. (Michael M.); C. Yao (Chen); D.P. Kiel (Douglas P.); A. Peters (Annette); R. Wang-Sattler (Rui); P.M. Visscher (Peter); N.R. Wray (Naomi); J.M. Starr (John); Ding, J. (Jingzhong); Rodriguez, C.J. (Carlos J.); N.J. Wareham (Nick); Irvin, M.R. (Marguerite R.); Zhi, D. (Degui); M. Barrdahl (Myrto); P. Vineis (Paolo); Ambatipudi, S. (Srikant); A.G. Uitterlinden (André); A. Hofman (Albert); Schwartz, J. (Joel); Colicino, E. (Elena); Hou, L. (Lifang); Vokonas, P.S. (Pantel S.); D.G. Hernandez (Dena); A. Singleton (Andrew); S. Bandinelli (Stefania); S.T. Turner (Stephen); E.B. Ware (Erin B.); Smith, A.K. (Alicia K.); T. Klengel (Torsten); E.B. Binder (Elisabeth B.); B.M. Psaty (Bruce); K.D. Taylor (Kent); S.A. Gharib (Sina); Swenson, B.R. (Brenton R.); Liang, L. (Liming); D.L. Demeo (Dawn L.); G.T. O'Connor (George); Z. Herceg (Zdenko); Ressler, K.J. (Kerry J.); K.N. Conneely (Karen N.); N. Sotoodehnia (Nona); Kardia, S.L.R. (Sharon L. R.); D. Melzer (David); A.A. Baccarelli (Andrea A.); J.B.J. van Meurs (Joyce); I. Romieu (Isabelle); D.K. Arnett (Donna); Ong, K.K. (Ken K.); Y. Liu (Yongmei); M. Waldenberger (Melanie); I.J. Deary (Ian J.); M. Fornage (Myriam); D. Levy (Daniel); S.J. London (Stephanie J.)

    2016-01-01

    textabstractBackground-DNA methylation leaves a long-term signature of smoking exposure and is one potential mechanism by which tobacco exposure predisposes to adverse health outcomes, such as cancers, osteoporosis, lung, and cardiovascular disorders. Methods and Results-To comprehensively determine

  19. Disaster relief through composite signatures

    Science.gov (United States)

    Hawley, Chadwick T.; Hyde, Brian; Carpenter, Tom; Nichols, Steve

    2012-06-01

    A composite signature is a group of signatures that are related in such a way to more completely or further define a target or operational endeavor at a higher fidelity. This paper builds on previous work developing innovative composite signatures associated with civil disasters, including physical, chemical and pattern/behavioral. For the composite signature approach to be successful it requires effective data fusion and visualization. This plays a key role in both preparedness and the response and recovery which are critical to saving lives. Visualization tools enhance the overall understanding of the crisis by pulling together and analyzing the data, and providing a clear and complete analysis of the information to the organizations/agencies dependant on it for a successful operation. An example of this, Freedom Web, is an easy-to-use data visualization and collaboration solution for use in homeland security, emergency preparedness, situational awareness, and event management. The solution provides a nationwide common operating picture for all levels of government through a web based, map interface. The tool was designed to be utilized by non-geospatial experts and is easily tailored to the specific needs of the users. Consisting of standard COTS and open source databases and a web server, users can view, edit, share, and highlight information easily and quickly through a standard internet browser.

  20. Postural control in blind subjects

    Directory of Open Access Journals (Sweden)

    Antonio Vinicius Soares

    2011-12-01

    Full Text Available Objective: To analyze postural control in acquired and congenitally blind adults. Methods: A total of 40 visually impaired adults participated in the research, divided into 2 groups, 20 with acquired blindness and 20 with congenital blindness - 21 males and 19 females, mean age 35.8 ± 10.8. The Brazilian version of Berg Balance Scale and the motor domain of functional independence measure were utilized. Results: On Berg Balance Scale the mean for acquired blindness was 54.0 ± 2.4 and 54.4 ± 2.5 for congenitally blind subjects; on functional independence measure the mean for acquired blind group was 87.1 ± 4.8 and 87.3 ± 2.3 for congenitally blind group. Conclusion: Based upon the scale used the results suggest the ability to control posture can be developed by compensatory mechanisms and it is not affected by visual loss in congenitally and acquired blindness.

  1. CORNEAL BLINDNESS AND XENOTRANSPLANTATION

    Science.gov (United States)

    Lamm, Vladimir; Hara, Hidetaka; Mammen, Alex; Dhaliwal, Deepinder; Cooper, David K.C.

    2014-01-01

    Approximately 39 million people are blind worldwide, with an estimated 285 million visually impaired. The developing world shoulders 90% of the world’s blindness, with 80% of causative diseases being preventable or treatable. Blindness has a major detrimental impact on the patient, community, and healthcare spending. Corneal diseases are significant causes of blindness, affecting at least 4 million people worldwide. The prevalence of corneal disease varies among parts of the world. Trachoma, for instance, is the second leading cause of blindness in Africa, after cataracts, but is rarely found today in developed nations. When preventive strategies have failed, corneal transplantation is the most effective treatment for advanced corneal disease. The major surgical techniques for corneal transplantation include penetrating keratoplasty (PK), anterior lamellar keratoplasty (ALK), and endothelial keratoplasty (EK). Indications for corneal transplantation vary among countries, with Fuchs’ dystrophy being the leading indication in the U.S. and keratoconus in Australia. With the exception of the US, where EK will soon overtake PK as the most common surgical procedure, PK is the overwhelming procedure of choice. Success using corneal grafts in developing nations, such as Nepal, demonstrates the feasibility of corneal transplantation on a global scale. The number of suitable corneas from deceased human donors that becomes available will never be sufficient, and so research into various alternatives, e.g., stem cells, amniotic membrane transplantation, synthetic and biosynthetic corneas, and xenotransplantation, is progressing. While each of these has potential, we suggest that xenotransplantation holds the greatest potential for a corneal replacement. With the increasing availability of genetically-engineered pigs, pig corneas may alleviate the global shortage of corneas in the near future. PMID:25268248

  2. Stable isotope and trace element proxy data from aragonite cements of stressed reef environments (early Messinian, Mediterranean Region)

    Science.gov (United States)

    Brachert, Thomas; Bosellini, Francesca R.; Reuter, Markus; Mertz-Kraus, Regina; Vescogni, Alessandro

    2010-05-01

    Early Messinian coral reefs of the Mediterranean area are among the classical examples of Neogene reefs in the world and, according to the ecology of their biota, do not exhibit compelling evidence for significant salinity stress prior to the Messinian Salinity Crisis (MSC). Because of excellent outcrop conditions and preservation, these reefs have become prototypes of Neogene reefs worldwide. Here we present stable oxygen isotope (IRMS) and trace element data (LA-ICP-MS) from marine aragonite cement in biogenic frameworks of some Mediterranean reefs. The reworking of the cements by intraformational breccias clearly supports petrographic evidence of "syndepositional" precipitation. Reported values of 18O/16O translate into peak sea surface salinity of 50 to 60 permil, which is a lethal value for most members of the reef community. Therefore, additional proxies have been evaluated to constrain the environment in which the cements formed. 13C/12C signatures are fully within the range of marine cement, however, systematic excursions exist on outcrop-scaple over the geological sections which may suggest episodic influx of terrestrial organic matter brought in by rivers or episodic upwelling of deep water masses with CO2 enriched in 12C. Intra-cement 13C/12C, Sr/Ca and Mg/Ca measured along transects exhibits co-variant changes which are incompatible with temperature effects and more plausibly document the mixing of different fluids, or the evolution of the pore fluids upon continuing precipitation. Although the final cause underlying the discrepant aspect of biological and various inorganic proxy data remains not yet fully understood, this study shows that evaluation of one single proxy may lead to more misleading than helpful concepts of palaeoenvironments and environment change.

  3. Mobile Multicast in Hierarchical Proxy Mobile IPV6

    Science.gov (United States)

    Hafizah Mohd Aman, Azana; Hashim, Aisha Hassan A.; Mustafa, Amin; Abdullah, Khaizuran

    2013-12-01

    Mobile Internet Protocol Version 6 (MIPv6) environments have been developing very rapidly. Many challenges arise with the fast progress of MIPv6 technologies and its environment. Therefore the importance of improving the existing architecture and operations increases. One of the many challenges which need to be addressed is the need for performance improvement to support mobile multicast. Numerous approaches have been proposed to improve mobile multicast performance. This includes Context Transfer Protocol (CXTP), Hierarchical Mobile IPv6 (HMIPv6), Fast Mobile IPv6 (FMIPv6) and Proxy Mobile IPv6 (PMIPv6). This document describes multicast context transfer in hierarchical proxy mobile IPv6 (H-PMIPv6) to provide better multicasting performance in PMIPv6 domain.

  4. How different proxies record precipitation variability over southeastern South America

    Energy Technology Data Exchange (ETDEWEB)

    Chiessi, Cristiano M; Mulitza, Stefan; Paetzold, Juergen; Wefer, Gerold, E-mail: chiessi@uni-bremen.d [MARUM-Center for Marine Environmental Sciences, University of Bremen, Leobener Strasse, 28359 Bremen (Germany)

    2010-03-15

    Detrending natural and anthropogenic components of climate variability is arguably an issue of utmost importance to society. To accomplish this issue, one must rely on a comprehensive understanding of the natural variability of the climate system on a regional level. Here we explore how different proxies (e.g., stalagmite oxygen isotopic composition, pollen percentages, bulk sediment elemental ratios) record Holocene precipitation variability over southeastern South America. We found a general good agreement between the different records both on orbital and centennial time-scales. Dry mid Holocene, and wet late Holocene, Younger Dryas and a period between {approx}9.4 and 8.12 cal kyr BP seem to be pervasive features. Moreover, we show that proxy-specific sensitivity can greatly improve past precipitation reconstructions.

  5. A comparison of proxy performance in coral biodiversity monitoring

    Science.gov (United States)

    Richards, Zoe T.

    2013-03-01

    The productivity and health of coral reef habitat is diminishing worldwide; however, the effect that habitat declines have on coral reef biodiversity is not known. Logistical and financial constraints mean that surveys of hard coral communities rarely collect data at the species level; hence it is important to know if there are proxy metrics that can reliably predict biodiversity. Here, the performances of six proxy metrics are compared using regression analyses on survey data from a location in the northern Great Barrier Reef. Results suggest generic richness is a strong explanatory variable for spatial patterns in species richness (explaining 82 % of the variation when measured on a belt transect). The most commonly used metric of reef health, percentage live coral cover, is not positively or linearly related to hard coral species richness. This result raises doubt as to whether management actions based on such reefscape information will be effective for the conservation of coral biodiversity.

  6. False allegations of abuse and Munchausen syndrome by proxy.

    Science.gov (United States)

    Meadow, R

    1993-01-01

    Fourteen children from seven families are reported for whom false allegations of abuse were made by the mother. Twelve children were alleged to have incurred sexual abuse, one both sexual and physical abuse, and one physical abuse alone. Thirteen of the children had incurred, or were currently victims of, factitious illness abuse invented by the mother. The one child with no history of factitious illness abuse had a sibling who had incurred definite factitious illness abuse. The false allegations of abuse did not occur in the context of parental separation, divorce, or custody disputes concerning the children. They occurred in the context of Munchausen syndrome by proxy abuse. The age of the children, 3 to 9 years, was older than the usual age for Munchausen syndrome by proxy abuse. The mother was the source of the false allegations and was the person who encouraged or taught six of the children to substantiate allegations of sexual abuse. PMID:8503664

  7. Munchausen syndrome and Munchausen syndrome by proxy in dermatology.

    Science.gov (United States)

    Boyd, Alan S; Ritchie, Coleman; Likhari, Sunaina

    2014-08-01

    Patients with Munchausen syndrome purposefully injure themselves, often with the injection of foreign materials, to gain hospital admission and the attention associated with having a difficult-to-identify condition. Munchausen syndrome by proxy occurs when a child's caregiver, typically the mother, injures the child for the same reasons. Cases of Munchausen syndrome and Munchausen syndrome by proxy with primary cutaneous involvement appear to be rarely described in the literature suggesting either that diagnosis is not made readily or that it is, in fact, an uncommon disorder. At the center of both conditions is significant psychological pathology and treatment is difficult as many patients with Munchausen syndrome when confronted with these diagnostic possibilities simply leave the hospital. Little is known about the long-term outcome or prognosis of these patients. Copyright © 2014 American Academy of Dermatology, Inc. Published by Mosby, Inc. All rights reserved.

  8. A case report of Factitious Disorder (Munchausen Syndrome by proxy

    Directory of Open Access Journals (Sweden)

    Mehdi Shirzadifar

    2014-09-01

    Full Text Available Background: In Factitious Disorder by proxy, one person (perpetrator induces the disease in another person, thereby seeking emotional needs during the treatment process Diagnosis of this disorder is very difficult and there is not much consensus over it among experts. Lack of timely diagnosis of this disorder may lead to serious harms in patients. Case presentation: We will introduce a 19 year-old boy with mental retardation and history of multiple admissions to psychiatric, internal, urology and surgery wards. He has a 12 year-old sister and a 4 year-old brother, both with history of multiple admissions to pediatrics and internal wards. The father of family was 48 years old with chronic mental disorder, drug dependency and history of multiple admissions to medical, psychiatry and neurology wards. The mother of this family was diagnosed with munchausen syndrome by proxy.

  9. Munchausen syndrome by proxy: an alarming face of child abuse.

    Science.gov (United States)

    Gehlawat, Pratibha; Gehlawat, Virender Kumar; Singh, Priti; Gupta, Rajiv

    2015-01-01

    Munchausen syndrome by proxy (MSBP) is emerging as a serious form of child abuse. It is an intentional production of illness in another, usually children by mothers, to assume sick role by proxy. It is poorly understood and a controversial diagnosis. Treatment is very difficult. We present a case of 9-year-old boy brought to Pt. B. D. Sharma, PGIMS, Rohtak, a tertiary care hospital in northern India by his father and paternal uncle with complaints of hematemesis since July 2012. He underwent many invasive procedures until the diagnosis of MSBP was finally considered. The examination of the blood sample confirmed the diagnosis. The child was placed under custody of his mother. The case was reported to social services, which incorporated whole family in the management.

  10. Proxy-SU(3) symmetry in heavy deformed nuclei

    Science.gov (United States)

    Bonatsos, Dennis; Assimakis, I. E.; Minkov, N.; Martinou, Andriana; Cakirli, R. B.; Casten, R. F.; Blaum, K.

    2017-06-01

    Background: Microscopic calculations of heavy nuclei face considerable difficulties due to the sizes of the matrices that need to be solved. Various approximation schemes have been invoked, for example by truncating the spaces, imposing seniority limits, or appealing to various symmetry schemes such as pseudo-SU(3). This paper proposes a new symmetry scheme also based on SU(3). This proxy-SU(3) can be applied to well-deformed nuclei, is simple to use, and can yield analytic predictions. Purpose: To present the new scheme and its microscopic motivation, and to test it using a Nilsson model calculation with the original shell model orbits and with the new proxy set. Method: We invoke an approximate, analytic, treatment of the Nilsson model, that allows the above vetting and yet is also transparent in understanding the approximations involved in the new proxy-SU(3). Results: It is found that the new scheme yields a Nilsson diagram for well-deformed nuclei that is very close to the original Nilsson diagram. The specific levels of approximation in the new scheme are also shown, for each major shell. Conclusions: The new proxy-SU(3) scheme is a good approximation to the full set of orbits in a major shell. Being able to replace a complex shell model calculation with a symmetry-based description now opens up the possibility to predict many properties of nuclei analytically and often in a parameter-free way. The new scheme works best for heavier nuclei, precisely where full microscopic calculations are most challenged. Some cases in which the new scheme can be used, often analytically, to make specific predictions, are shown in a subsequent paper.

  11. Law Enforcement Proxies Matter for the Law and Finance Nexus

    OpenAIRE

    Valentin Toci; Iraj Hashi

    2013-01-01

    The paper employs various measures of law enforcement to provide new evidence on the importance of legal institutions for different dimensions of financial development in transition economies. It offers a critical assessment of law enforcement measures employed in recent studies by showing that some proxies for law enforcement in the credit market may not be appropriate. Hence, care should be taken in how the quality of institutions is measured and the context which it represents. An original...

  12. Fingerprinting Reverse Proxies Using Timing Analysis of TCP Flows

    Science.gov (United States)

    2013-09-01

    Address Translation NPS Naval Postgraduate School OTT One-way Transit Time PET Privacy Enhancing Technology PHP Hypertext Preprocessor P2P ] Peer-to...of timing information that can translate into usable intelligence for detecting the use of reverse proxies by a network domain. 1.1 Problem Statement...websites (i.e., Sky News Arabia, Kemalist Gazete, Detroit News), and entertainment industry sites (i.e., HBO GO, LeoVegas Online Casino , FreeRide Games

  13. Housing Discrimination toward Blind Persons.

    Science.gov (United States)

    Smith, Tom E. C.; And Others

    1980-01-01

    The study involving 68 persons who had advertised apartments for rent was designed to determine if housing discrimination exists toward blind persons. Results indicated that housing discrimination toward blind persons does exist, as nearly 40 percent of the Ss refused to rent the apartment to the blind second caller. (Author/SBH)

  14. Reversible blindness in fulminating preeclampsia

    African Journals Online (AJOL)

    blindness can be due to involvement of the occipital cortex or the retina. Although very alarming, this type of blindness is usually reversible following appropriate management of such patients. Here we present the case of a woman in whom fulminating preeclampsia was complicated by blindness. Fundoscopic findings were ...

  15. Marine proxy evidence linking decadal North Pacific and Atlantic climate

    Energy Technology Data Exchange (ETDEWEB)

    Hetzinger, S. [University of Toronto Mississauga, CPS-Department, Mississauga, ON (Canada); Leibniz Institute of Marine Sciences, IFM-GEOMAR, Kiel (Germany); Halfar, J. [University of Toronto Mississauga, CPS-Department, Mississauga, ON (Canada); Mecking, J.V.; Keenlyside, N.S. [Leibniz Institute of Marine Sciences, IFM-GEOMAR, Kiel (Germany); University of Bergen, Geophysical Institute and Bjerknes Centre for Climate Research, Bergen (Norway); Kronz, A. [University of Goettingen, Geowissenschaftliches Zentrum, Goettingen (Germany); Steneck, R.S. [University of Maine, Darling Marine Center, Walpole, ME (United States); Adey, W.H. [Smithsonian Institution, Department of Botany, Washington, DC (United States); Lebednik, P.A. [ARCADIS U.S. Inc., Walnut Creek, CA (United States)

    2012-09-15

    Decadal- to multidecadal variability in the extra-tropical North Pacific is evident in 20th century instrumental records and has significant impacts on Northern Hemisphere climate and marine ecosystems. Several studies have discussed a potential linkage between North Pacific and Atlantic climate on various time scales. On decadal time scales no relationship could be confirmed, potentially due to sparse instrumental observations before 1950. Proxy data are limited and no multi-centennial high-resolution marine geochemical proxy records are available from the subarctic North Pacific. Here we present an annually-resolved record (1818-1967) of Mg/Ca variations from a North Pacific/Bering Sea coralline alga that extends our knowledge in this region beyond available data. It shows for the first time a statistically significant link between decadal fluctuations in sea-level pressure in the North Pacific and North Atlantic. The record is a lagged proxy for decadal-scale variations of the Aleutian Low. It is significantly related to regional sea surface temperature and the North Atlantic Oscillation (NAO) index in late boreal winter on these time scales. Our data show that on decadal time scales a weaker Aleutian Low precedes a negative NAO by several years. This atmospheric link can explain the coherence of decadal North Pacific and Atlantic Multidecadal Variability, as suggested by earlier studies using climate models and limited instrumental data. (orig.)

  16. MUNCHAUSEN SYNDROME BY PROXY IN PEDIATRIC DENTISTRY: MYTH OR REALITY?

    Directory of Open Access Journals (Sweden)

    Veronica PINTILICIUC-ŞERBAN

    2017-06-01

    Full Text Available Background and aims: Munchausen syndrome by proxy is a condition traditionally comprising physical and mental abuse and medical neglect as a form of psychogenic maltreatment of the child, secondary to fabrication of a pediatric illness by the parent or guardian. The aim of our paper is to assess whether such condition occurs in current pediatric dental practice and to evidence certain situations in which the pediatric dentist should suspect this form of child abuse. Problem statement: Munchausen syndrome by proxy in pediatric dentistry may lead to serious chronic disabilities of the abused or neglected child, being one of the causes of treatment failure. Discussion: Prompt detection of such condition should be regarded as one of the duties of the practitioner who should be trained to report the suspected cases to the governmental child protective agencies. This should be regarded as a form of child abuse and neglect, and the responsible caregiver could be held liable when such wrongful actions cause harm or endanger child’s welfare. Conclusion: Munchausen syndrome by proxy should be regarded as a reality in current pediatric dental practice and dental teams should be trained to properly recognize, assess and manage such complex situations.

  17. Short-term indicators. Intensities as a proxy for savings

    Energy Technology Data Exchange (ETDEWEB)

    Boonekamp, P.G.M.; Gerdes, J. [ECN Policy Studies, Petten (Netherlands); Faberi, S. [Institute of Studies for the Integration of Systems ISIS, Rome (Italy)

    2013-12-15

    The ODYSSEE database on energy efficiency indicators (www.odyssee-indicators.org) has been set up to enable the monitoring and evaluation of realised energy efficiency improvements and related energy savings. The database covers the 27 EU countries as well as Norway and Croatia and data are available from 1990 on. This work contributes to the growing need for quantitative monitoring and evaluation of the impacts of energy policies and measures, both at the EU and national level, e.g. due to the Energy Services Directive and the proposed Energy Efficiency Directive. Because the underlying data become available only after some time, the savings figures are not always timely available. This is especially true for the ODEX efficiency indices per sector that rely on a number of indicators. Therefore, there is a need for so-called short-term indicators that become available shortly after the year has passed for which data are needed. The short term indicators do not replace the savings indicators but function as a proxy for the savings in the most recent year. This proxy value is faster available, but will be less accurate than the saving indicators themselves. The short term indicators have to be checked regularly with the ODEX indicators in order to see whether they can function still as a proxy.

  18. A unified proxy for ENSO and PDO variability since 1650

    Directory of Open Access Journals (Sweden)

    S. McGregor

    2010-01-01

    Full Text Available In this manuscript we have attempted to consolidate the common signal in previously defined proxy reconstructions of the El Niño-Southern Oscillation into one individual proxy titled the Unified ENSO Proxy (UEP. While correlating well with the majority of input reconstructions, the UEP provides better representation of observed indices of ENSO, discrete ENSO events and documented historical chronologies of ENSO than any of these input ENSO reconstructions. Further to this, the UEP also provides a means to reconstruct the PDO/IPO multi-decadal variability of the Pacific Ocean as the low-pass filtered UEP displays multi-decadal variability that is consistent with the 20th century variability of the PDO and IPO. The UEP is then used to describe changes in ENSO variability which have occurred since 1650 focusing on changes in ENSOs variance, multi-year ENSO events, PDO-like multi-decadal variability and the effects of volcanic and solar forcing on ENSO. We find that multi-year El Niño events similar to the 1990–1995 event have occurred several times over the last 3 1/2 centuries. Consistent with earlier studies we find that volcanic forcing can induce a statistically significant change in the mean state of ENSO in the year of the eruption and a doubling of the probability of an El Niño (La Niña event occurring in the year of (three years after the eruption.

  19. Evaluating Ground-based Proxies for Solar Irradiance Variation

    Science.gov (United States)

    Oegerle, William (Technical Monitor); Jordan, Stuart

    2003-01-01

    In order to determine what ground-based proxies are best for evaluating solar irradiance variation before the advent of space observations, it is necessary to test these proxies against space observations. We have tested sunspot number, total sunspot area, and sunspot umbral area against the Nimbus-7 measurements of total solar irradiance variation cover the eleven year period 1980-1990. The umbral area yields the best correlation and the total sunspot area yields the poorest. Reasons for expecting the umbral area to yield the best correlation are given, the statistical procedure followed to obtain the results is described, and the value of determining the best proxy is discussed. The latter is based upon the availability of an excellent database from the Greenwich Observatory obtained over the period 1876-1976, which can be used to estimate the total solar irradiance variation before sensitive space observations were available. The ground-based observations used were obtained at the Coimbra Solar Observatory. The analysis was done at Goddard using these data and data from the Nimbus-7 satellite.

  20. Heinrich event 4 characterized by terrestrial proxies in southwestern Europe

    Directory of Open Access Journals (Sweden)

    J. M. López-García

    2013-05-01

    Full Text Available Heinrich event 4 (H4 is well documented in the North Atlantic Ocean as a cooling event that occurred between 39 and 40 Ka. Deep-sea cores around the Iberian Peninsula coastline have been analysed to characterize the H4 event, but there are no data on the terrestrial response to this event. Here we present for the first time an analysis of terrestrial proxies for characterizing the H4 event, using the small-vertebrate assemblage (comprising small mammals, squamates and amphibians from Terrassa Riera dels Canyars, an archaeo-palaeontological deposit located on the seaboard of the northeastern Iberian Peninsula. This assemblage shows that the H4 event is characterized in northeastern Iberia by harsher and drier terrestrial conditions than today. Our results were compared with other proxies such as pollen, charcoal, phytolith, avifauna and large-mammal data available for this site, as well as with the general H4 event fluctuations and with other sites where H4 and the previous and subsequent Heinrich events (H5 and H3 have been detected in the Mediterranean and Atlantic regions of the Iberian Peninsula. We conclude that the terrestrial proxies follow the same patterns as the climatic and environmental conditions detected by the deep-sea cores at the Iberian margins.

  1. Error characterization for asynchronous computations: Proxy equation approach

    Science.gov (United States)

    Sallai, Gabriella; Mittal, Ankita; Girimaji, Sharath

    2017-11-01

    Numerical techniques for asynchronous fluid flow simulations are currently under development to enable efficient utilization of massively parallel computers. These numerical approaches attempt to accurately solve time evolution of transport equations using spatial information at different time levels. The truncation error of asynchronous methods can be divided into two parts: delay dependent (EA) or asynchronous error and delay independent (ES) or synchronous error. The focus of this study is a specific asynchronous error mitigation technique called proxy-equation approach. The aim of this study is to examine these errors as a function of the characteristic wavelength of the solution. Mitigation of asynchronous effects requires that the asynchronous error be smaller than synchronous truncation error. For a simple convection-diffusion equation, proxy-equation error analysis identifies critical initial wave-number, λc. At smaller wave numbers, synchronous error are larger than asynchronous errors. We examine various approaches to increase the value of λc in order to improve the range of applicability of proxy-equation approach.

  2. Electronic Signatures in Law: 4th Edition

    OpenAIRE

    Mason, Stephen

    2016-01-01

    Stephen Mason is a leading authority on electronic signatures and electronic evidence, having advised global corporations and governments on these topics. He is also the founder and editor of the international open source journal the Digital Evidence and Electronic Signature Law Review. Stephen is an Associate Research Fellow at the IALS.\\ud \\ud This fourth edition of the well-established practitioner text sets out what constitutes an electronic signature; the form an electronic signature can...

  3. Polygraph: Automatically Generating Signatures for Polymorphic Worms

    OpenAIRE

    Newsome, J.; Karp, B.; Song, D.

    2005-01-01

    It is widely believed that content-signature-based intrusion detection systems (IDSes) are easily evaded by polymorphic worms, which vary their payload on every infection attempt. In this paper, we present Polygraph, a signature generation system that successfully produces signatures that match polymorphic worms. Polygraph generates signatures that consist of multiple disjoint content substrings. In doing so, Polygraph leverages our insight that for a real-world exploit to function properly, ...

  4. Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security

    NARCIS (Netherlands)

    Weng, Jiang; Yang, Yanjiang; Tang, Qiang; Deng, Robert H.; Bao, Feng

    Recently, a variant of proxy re-encryption, named conditional proxy re-encryption (C-PRE), has been introduced. Compared with traditional proxy re-encryption, C-PRE enables the delegator to implement fine-grained delegation of decryption rights, and thus is more useful in many applications. In this

  5. 17 CFR 240.14a-16 - Internet availability of proxy materials.

    Science.gov (United States)

    2010-04-01

    ... holder to access and review the proxy materials before voting; (3) The Internet Web site address where... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Internet availability of proxy... Under the Securities Exchange Act of 1934 Regulation 14a: Solicitation of Proxies § 240.14a-16 Internet...

  6. Remote Patron Validation: Posting a Proxy Server at the Digital Doorway.

    Science.gov (United States)

    Webster, Peter

    2002-01-01

    Discussion of remote access to library services focuses on proxy servers as a method for remote access, based on experiences at Saint Mary's University (Halifax). Topics include Internet protocol user validation; browser-directed proxies; server software proxies; vendor alternatives for validating remote users; and Internet security issues. (LRW)

  7. A novel salinity proxy based on Na incorporation into foraminiferal calcite

    NARCIS (Netherlands)

    Wit, J.C.; de Nooijer, L.J.; Wolthers, M.; Reichart, G.J.

    2013-01-01

    Salinity and temperature determine seawater density, and differences in both thereby control global thermohaline circulation. Whereas numerous proxies have been calibrated and applied to reconstruct temperature, a direct and independent proxy for salinity is still missing. Ideally, a new proxy for

  8. A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare

    NARCIS (Netherlands)

    Ibraimi, L.; Tang, Qiang; Hartel, Pieter H.; Jonker, Willem

    2008-01-01

    Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). In a proxy re-encryption scheme, the delegator assigns a key to a proxy to re-encrypt all messages encrypted with his public key such that the

  9. 1 CFR 18.7 - Signature.

    Science.gov (United States)

    2010-01-01

    ... under § 18.4(c) may be authenticated as original documents by digital signatures. ... 1 General Provisions 1 2010-01-01 2010-01-01 false Signature. 18.7 Section 18.7 General Provisions... PREPARATION AND TRANSMITTAL OF DOCUMENTS GENERALLY § 18.7 Signature. The original and each duplicate original...

  10. Signature Size: A Key to Status Awareness

    Science.gov (United States)

    Zweigenhaft, Richard L.

    1970-01-01

    Hypothesizing that signature size is related to status, signatures of undergraduates, blue collar workers, and professors were compared and found to be ranked in the above order. Further, case studies of professors revealed a 50 percent increase in size of signature from several months prior to attainment of the Ph. D. to four years afterward. (DB)

  11. [The blindness in the literature-Jose Saramago: blindness and Albert Bang: the blind witness].

    Science.gov (United States)

    Permin, H; Norn, M

    2001-01-01

    Two novels with different aspects of blindness seen through the doctors eyes. The Portuguese Nobel-prize winner José Saramago's story of a city struck by an epidemic of "white blindness", where the truth is what we cannot bear to see. The Danish author and unskilled labourer Albert Bang's (synonym with Karl E. Rasmussen) crime novel describes a blind or pretend to be blind butcher, who is a witness to a murder. Both novels are lyric, thought-provoking and insightful.

  12. Blind spot crashes.

    OpenAIRE

    2009-01-01

    Crashes involving lorries turning right and cyclists going straight ahead usually have very serious consequences for the cyclist. The cyclist, who has right of way, is often overlooked by the lorry driver. For his part, the cyclist is often unaware that the lorry driver has not seen him or that the driver wants to turn right. Despite a variety of measures, this type of blind spot crashes continues to occur. Each year they still cause approximately ten fatalities. This number could be reduced ...

  13. Signatures of a shadow biosphere.

    Science.gov (United States)

    Davies, Paul C W; Benner, Steven A; Cleland, Carol E; Lineweaver, Charles H; McKay, Christopher P; Wolfe-Simon, Felisa

    2009-03-01

    Astrobiologists are aware that extraterrestrial life might differ from known life, and considerable thought has been given to possible signatures associated with weird forms of life on other planets. So far, however, very little attention has been paid to the possibility that our own planet might also host communities of weird life. If life arises readily in Earth-like conditions, as many astrobiologists contend, then it may well have formed many times on Earth itself, which raises the question whether one or more shadow biospheres have existed in the past or still exist today. In this paper, we discuss possible signatures of weird life and outline some simple strategies for seeking evidence of a shadow biosphere.

  14. Stochastic Blind Motion Deblurring

    KAUST Repository

    Xiao, Lei

    2015-05-13

    Blind motion deblurring from a single image is a highly under-constrained problem with many degenerate solutions. A good approximation of the intrinsic image can therefore only be obtained with the help of prior information in the form of (often non-convex) regularization terms for both the intrinsic image and the kernel. While the best choice of image priors is still a topic of ongoing investigation, this research is made more complicated by the fact that historically each new prior requires the development of a custom optimization method. In this paper, we develop a stochastic optimization method for blind deconvolution. Since this stochastic solver does not require the explicit computation of the gradient of the objective function and uses only efficient local evaluation of the objective, new priors can be implemented and tested very quickly. We demonstrate that this framework, in combination with different image priors produces results with PSNR values that match or exceed the results obtained by much more complex state-of-the-art blind motion deblurring algorithms.

  15. Epigenetic signatures of cigarette smoking

    OpenAIRE

    Deary, Ian; Joehanes, Roby; Just, Allan C.; Marioni, Riccardo

    2016-01-01

    Background—DNA methylation leaves a long-term signature of smoking exposure and is one potential mechanism by which tobacco exposure predisposes to adverse health outcomes, such as cancers, osteoporosis, lung, and cardiovascular disorders. Methods and Results—To comprehensively determine the association between cigarette smoking and DNA methylation, we conducted a meta-analysis of genome-wide DNA methylation assessed using the Illumina BeadChip 450K array on 15 907 blood-derived DNA samples f...

  16. Infrared signature studies of aerospace vehicles

    Science.gov (United States)

    Mahulikar, Shripad P.; Sonawane, Hemant R.; Arvind Rao, G.

    2007-10-01

    Infrared (IR) emissions from aircraft are used to detect, track, and lock-on to the target. MAN Portable Air Defence Systems (MANPADS) have emerged as a major cause of aircraft and helicopter loss. Therefore, IR signature studies are important to counter this threat for survivability enhancement, and are an important aspect of stealth technology. This paper reviews contemporary developments in this discipline, with particular emphasis on IR signature prediction from aerospace vehicles. The role of atmosphere in IR signature analysis, and relation between IR signature level and target susceptibility are illustrated. Also, IR signature suppression systems and countermeasure techniques are discussed, to highlight their effectiveness and implications in terms of penalties.

  17. Time Series Based for Online Signature Verification

    Directory of Open Access Journals (Sweden)

    I Ketut Gede Darma Putra

    2013-11-01

    Full Text Available Signature verification system is to match the tested signature with a claimed signature. This paper proposes time series based for feature extraction method and dynamic time warping for match method. The system made by process of testing 900 signatures belong to 50 participants, 3 signatures for reference and 5 signatures from original user, simple imposters and trained imposters for signatures test. The final result system was tested with 50 participants with 3 references. This test obtained that system accuracy without imposters is 90,44897959% at threshold 44 with rejection errors (FNMR is 5,2% and acceptance errors (FMR is 4,35102%, when with imposters system accuracy is 80,1361% at threshold 27 with error rejection (FNMR is 15,6% and acceptance errors (average FMR is 4,263946%, with details as follows: acceptance errors is 0,391837%, acceptance errors simple imposters is 3,2% and acceptance errors trained imposters is 9,2%.

  18. Improvements of palaeochemotaxonomy as a palaeofloristic proxy using artificial maturation of extant conifers

    Science.gov (United States)

    Lu, Y.; Hautevelle, Y.; Michels, R.

    2012-04-01

    Numerous studies of the molecular composition of terrestrial plants show that many organic compounds have a chemotaxonomic value. This means that these biomolecules are synthesized by a restricted number of taxa and can be used as specific biomarkers. Some of these biomolecules, like terpenoids, are poorly altered and preserved in sediments where they are then transformed into geomolecules. Thus, the distribution of vascular plant biomarkers preserved in sedimentary rocks could serve as proxy for terrestrial palaeoflora assessment. Furthermore, as flora association may reflect climatic conditions, vascular plant biomarkers may also serve as palaeoclimatic proxies. Botanical palaeochemotaxonomy presents some specific attributes compared to palaeobotany and palynology in the reconstruction of palaeofloristic and palaeoclimatic evolutions through geological time : 1) plant biomarkers are more widespread in the stratigraphic record than well preserved plant macrofossils, 2) on the contrary to palynomorphs they can be directly linked to specific plant taxa, 3) biomarkers are readily analyzed by usual organic geochemistry procedures. However, our knowledge in botanical palaeochemotaxonomy, allowing to link geomolecular markers to botanical taxa, is still incomplete. Difficulties are related to 1) extrapolation of information from extant plants to their fossil counterparts, 2) the scarcity of well preserved and identifiable fossils. In order to help fill these gaps, we use an experimental method based on artificial maturation of extant plants by confined pyrolysis (*Hautevelle et al. 2006). This technique allows to simulate conversion of biomolecules into diagenetized compounds. The objective of this study is to clarify the molecular signature of fossil conifer families. 69 species belonging to seven families of extant conifers (Araucariaceae, Cupressaceae, Pinaceae, Podocarpaceae, Sciadopityaceae, Taxaceae and Taxodiaceae) were pyrolyzed. Extractable organic matter is

  19. How to combine sparse proxy data and coupled climate models

    Science.gov (United States)

    Paul, André; Schäfer-Neth, Christian

    2005-04-01

    We address the problem of reconstructing a global field from proxy data with sparse spatial sampling such as the MARGO (multi-proxy approach for the reconstruction of the glacial ocean surface) SST (sea-surface temperature) and δ18O c (oxygen-18/oxygen-16 isotope ratio preserved in fossil carbonate shells of planktic foraminifera) data. To this end, we propose to `assimilate' these data into coupled climate models by adjusting some of their parameters and optimizing the fit. In particular, we suggest to combine a forward model and an objective function that quantifies the misfit to the data. Because of their computational efficiency, earth system models of intermediate complexity are particularly well-suited for this purpose. We used one such model (the University of Victoria Earth System Climate Model) and carried out a series of sensitivity experiments by varying a single model parameter through changing the atmospheric CO2 concentration. The unanalyzed World Ocean Atlas SST and the observed sea-ice concentration served as present-day targets. The sparse data coverage as implied by the locations of 756 ocean sediment cores from the MARGO SST database was indeed sufficient to determine the best fit. As anticipated, it turned out to be the 365 ppm experiment. We also found that the 200 ppm experiment came surprisingly close to what is commonly expected for the Last Glacial Maximum ocean circulation. Our strategy has a number of advantages over more traditional mapping methods, e.g., there is no need to force the results of different proxies into a single map, because they can be compared to the model output one at a time, properly taking into account the different seasons of plankton growth or varying depth habitats. It can be extended to more model parameters and even be automated.

  20. Patient-rated versus proxy-rated cognitive and functional measures in older adults

    Science.gov (United States)

    Howland, Molly; Allan, Kevin C; Carlton, Caitlin E; Tatsuoka, Curtis; Smyth, Kathleen A; Sajatovic, Martha

    2017-01-01

    Objectives Patients with cognitive impairment may have difficulty reporting their functional and cognitive abilities, which are important clinical outcomes. Health care proxies may be able to corroborate patient self-reports. Several studies reported discrepancy between patient and proxy ratings, though the literature is sparse on changes over time of these ratings. Our goals in this 12-month study were to compare patient and proxy reports on functioning, cognition, and everyday executive function, and to further elucidate correlates of patient–proxy discrepancy. Methods This was a prospective cohort study of individuals older than 70 years who ranged from having no cognitive impairment to having moderate dementia who had a proxy available to complete instruments at baseline (N=76). Measurements included Alzheimer’s Disease Cooperative Study–Activities of Daily Living Inventory (ADCS-ADLI), Neuro-QOL Executive Function, PROMIS Applied Cognition (PROMIS-Cog), Mini-Mental State Examination (MMSE), and Geriatric Depression Scale. Results Patient- and proxy-rated ADCS-ADLI were correlated at baseline and at 1-year follow-up. Patient and proxy ratings were discrepant on Neuro-QOL Executive Function and PROMIS-Cog. Greater patient–proxy discrepancy on PROMIS-Cog was associated with younger age and less depression, and greater patient–proxy discrepancy on Neuro-QOL Executive Function was associated with less depression and worse cognitive impairment. Patient–proxy discrepancy increased over time for everyday executive function. Changes in proxy-rated but not patient-rated ADCS-ADLI correlated with MMSE changes. Conclusion Patients and proxies generally agree in reporting on activities of daily living. Patient and proxy reports differ in their respective evaluation of cognitive functioning and everyday executive function. Ratings from both sources may be preferred for these two domains, though studies using gold standard measures are necessary. It is important

  1. Tycho 2: A Proxy Application for Kinetic Transport Sweeps

    Energy Technology Data Exchange (ETDEWEB)

    Garrett, Charles Kristopher [Los Alamos National Lab. (LANL), Los Alamos, NM (United States). Computer, Computational, and Statistical Sciences Division; Warsa, James S. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States). Computer, Computational, and Statistical Sciences Division

    2016-09-14

    Tycho 2 is a proxy application that implements discrete ordinates (SN) kinetic transport sweeps on unstructured, 3D, tetrahedral meshes. It has been designed to be small and require minimal dependencies to make collaboration and experimentation as easy as possible. Tycho 2 has been released as open source software. The software is currently in a beta release with plans for a stable release (version 1.0) before the end of the year. The code is parallelized via MPI across spatial cells and OpenMP across angles. Currently, several parallelization algorithms are implemented.

  2. Nursing interventions in Münchausen syndrome by proxy.

    Science.gov (United States)

    Volz, A G

    1995-09-01

    1. Münchausen syndrome by proxy is a rare but serious and potentially lethal form of child abuse in which a primary care giver induces or reports factitious symptoms in a child. 2. The child suffers from the caregiver's actions and health care providers unknowingly become accomplices when they provide unnecessary testing and therapies. 3. The child's physical and psychological welfare can be protected through the efforts of the forensic nurse specialist coordinating a multidisciplinary health care team's work to detect the syndrome and intervene early on.

  3. Compliance with treatment in asthma and Munchausen syndrome by proxy.

    Science.gov (United States)

    Godding, V; Kruth, M

    1991-01-01

    Among 1648 asthmatic patients, 17 families (1%) were identified as having Munchausen syndrome by proxy. Ten families did not treat their children's, attacks or refused medical care, and seven exaggerated the severity of symptoms to obtain invasive investigations and treatment. All the families had disturbed psychosocial backgrounds. The abuse consisted mainly of neglect, in that necessary treatment was not given. In some cases a more direct form of abuse was observed, when useless and sometimes harmful investigations and treatment were given. We conclude that medical control of the compliance of both parents and children is necessary in the management of childhood asthma. PMID:1929492

  4. Investigating genetic loci that encode plant-derived paleoclimate proxies

    Science.gov (United States)

    Bender, A. L. D.; Suess, M.; Chitwood, D. H.; Bradley, A. S.

    2016-12-01

    Long chain (>C25) n-alkanes in sediments predominantly derive from terrestrial plant waxes. Hydrogen isotope ratios (δD) of leaf wax hydrocarbons correlate with δDH2O of precipitation and are commonly used as paleoclimate proxies. However, biological variability in the isotopic fractionations between water and plant materials also affects the n-alkane δD values. Correct interpretation of this paleoclimate proxy requires that we resolve genetic and environmental effects. Genetic variability underlying differences in leaf wax structure and isotopic composition can be quantitatively determined through the use of model organisms. Interfertile Solanum sect. Lycopersicon (tomato) species provide an ideal model species complex for this approach. We used a set of 76 precisely defined near-isogenic lines (introgression lines [ILs]) in which small genomic regions from the wild tomato relative Solanum pennellii have been introduced into the genome of the domestic tomato, S. lycopersicum. By characterizing quantitative traits of these ILs (leaf wax structure and isotopic composition), we can resolve the degree to which each trait is regulated by genetic versus environmental factors. We present data from two growth experiments conducted with all 76 ILs. In this study, we quantify leaf wax traits, including δD values, δ13C values, and structural metrics including the methylation index (a variable that describes the ratio of iso­- and anteiso- to n-alkanes). Among ILs, δD values vary by up to 35‰ and 60‰ for C31 and C33 n-alkanes, respectively. Many ILs have methylation indices that are discernably different from the parent domesticated tomato (p < 0.001), which suggests that methylation is a highly polygenic trait. This pattern is similar to the genetics that control leaf shape, another trait commonly used as a paleoclimate proxy. Based on our preliminary analysis, we propose candidate genes that control aspects of plant physiology that affect these quantitative

  5. Blind estimation of blur in hyperspectral images

    Science.gov (United States)

    Zhang, Mo; Vozel, Benoit; Chehdi, Kacem; Uss, Mykhail; Abramov, Sergey; Lukin, Vladimir

    2017-10-01

    Hyperspectral images acquired by remote sensing systems are generally degraded by noise and can be sometimes more severely degraded by blur. When no knowledge is available about the degradations present on the original image, blind restoration methods can only be considered. By blind, we mean absolutely no knowledge neither of the blur point spread function (PSF) nor the original latent channel and the noise level. In this study, we address the blind restoration of the degraded channels component-wise, according to a sequential scheme. For each degraded channel, the sequential scheme estimates the blur point spread function (PSF) in a first stage and deconvolves the degraded channel in a second and final stage by means of using the PSF previously estimated. We propose a new component-wise blind method for estimating effectively and accurately the blur point spread function. This method follows recent approaches suggesting the detection, selection and use of sufficiently salient edges in the current processed channel for supporting the regularized blur PSF estimation. Several modifications are beneficially introduced in our work. A new selection of salient edges through thresholding adequately the cumulative distribution of their corresponding gradient magnitudes is introduced. Besides, quasi-automatic and spatially adaptive tuning of the involved regularization parameters is considered. To prove applicability and higher efficiency of the proposed method, we compare it against the method it originates from and four representative edge-sparsifying regularized methods of the literature already assessed in a previous work. Our attention is mainly paid to the objective analysis (via ݈l1-norm) of the blur PSF error estimation accuracy. The tests are performed on a synthetic hyperspectral image. This synthetic hyperspectral image has been built from various samples from classified areas of a real-life hyperspectral image, in order to benefit from realistic spatial

  6. Numbers in the blind's "eye".

    Science.gov (United States)

    Salillas, Elena; Graná, Alessia; El-Yagoubi, Radouane; Semenza, Carlo

    2009-07-23

    Although lacking visual experience with numerosities, recent evidence shows that the blind perform similarly to sighted persons on numerical comparison or parity judgement tasks. In particular, on tasks presented in the auditory modality, the blind surprisingly show the same effect that appears in sighted persons, demonstrating that numbers are represented through a spatial code, i.e. the Spatial-Numerical Association of Response Codes (SNARC) effect. But, if this is the case, how is this numerical spatial representation processed in the brain of the blind? Here we report that, although blind and sighted people have similarly organized numerical representations, the attentional shifts generated by numbers have different electrophysiological correlates (sensorial N100 in the sighted and cognitive P300 in the blind). These results highlight possible differences in the use of spatial representations acquired through modalities other than vision in the blind population.

  7. Numbers in the blind's "eye".

    Directory of Open Access Journals (Sweden)

    Elena Salillas

    Full Text Available BACKGROUND: Although lacking visual experience with numerosities, recent evidence shows that the blind perform similarly to sighted persons on numerical comparison or parity judgement tasks. In particular, on tasks presented in the auditory modality, the blind surprisingly show the same effect that appears in sighted persons, demonstrating that numbers are represented through a spatial code, i.e. the Spatial-Numerical Association of Response Codes (SNARC effect. But, if this is the case, how is this numerical spatial representation processed in the brain of the blind? PRINCIPAL FINDINGS: Here we report that, although blind and sighted people have similarly organized numerical representations, the attentional shifts generated by numbers have different electrophysiological correlates (sensorial N100 in the sighted and cognitive P300 in the blind. CONCLUSIONS: These results highlight possible differences in the use of spatial representations acquired through modalities other than vision in the blind population.

  8. Comfort with proxy consent to research involving decisionally impaired older adults: do type of proxy and risk-benefit profile matter?

    Science.gov (United States)

    Dubois, Marie-France; Bravo, Gina; Graham, Janice; Wildeman, Sheila; Cohen, Carole; Painter, Karen; Bellemare, Suzanne

    2011-11-01

    Dementia research often requires the participation of people with dementia. Obtaining informed consent is problematic when potential participants lack the capacity to provide it. We investigated comfort with proxy consent to research involving older adults deemed incapable of this decision, and examined if comfort varies with the type of proxy and the study's risk-benefit profile. We surveyed random samples of five relevant groups (older adults, informal caregivers, physicians, researchers in aging, and Research Ethics Board members) from four Canadian provinces. Respondents were presented with scenarios involving four types of proxies (non-assigned, designated in a healthcare advance directive with or without instructions specific to research participation, and court-appointed). Given a series of risk-benefit profiles, respondents indicated whether they were comfortable with proxy consent to research for each scenario. Two percent of the respondents felt proxy consent should never be allowed. In all groups, comfort depended far more on the risk-benefit profile associated with the research scenario than with type of proxy. For research involving little or no risk and potential personal benefits, over 90% of the respondents felt comfortable with substitute consent by a designated or court-appointed proxy while 80% were at ease with a non-assigned proxy. For studies involving serious risks with potentially greater personal benefits, older adults and informal caregivers were less comfortable with proxy consent. A large majority of Canadians are comfortable with proxy consent for low-risk research. Further work is needed to establish what kinds of research are considered to be low risk.

  9. Motor development of blind toddler

    OpenAIRE

    Likar, Petra

    2013-01-01

    For blind toddlers, development of motor skills enables possibilities for learning and exploring the environment. The purpose of this graduation thesis is to systematically mark the milestones in development of motor skills in blind toddlers, to establish different factors which affect this development, and to discover different ways for teachers for visually impaired and parents to encourage development of motor skills. It is typical of blind toddlers that they do not experience a wide varie...

  10. Sputum RNA signature in allergic asthmatics following allergen bronchoprovocation test

    Directory of Open Access Journals (Sweden)

    Rob G.J.A. Zuiker

    2016-07-01

    Full Text Available Background: Inhaled allergen challenge is a validated disease model of allergic asthma offering useful pharmacodynamic assessment of pharmacotherapeutic effects in a limited number of subjects. Objectives: To evaluate whether an RNA signature can be identified from induced sputum following an inhaled allergen challenge, whether a RNA signature could be modulated by limited doses of inhaled fluticasone, and whether these gene expression profiles would correlate with the clinical endpoints measured in this study. Methods: Thirteen non-smoking, allergic subjects with mild-to-moderate asthma participated in a randomised, placebo-controlled, 2-period cross-over study following a single-blind placebo run-in period. Each period consisted of three consecutive days, separated by a wash-out period of at least 3 weeks. Subjects randomly received inhaled fluticasone ((FP MDI; 500 mcg BID×5 doses in total or placebo. On day 2, house dust mite extract was inhaled and airway response was measured by FEV1 at predefined time points until 7 h post-allergen. Sputum was induced by NaCl 4.5%, processed and analysed at 24 h pre-allergen and 7 and 24 h post-allergen. RNA was isolated from eligible sputum cell pellets (<80% squamous of 500 cells, amplified according to NuGEN technology, and profiled on Affymetrix arrays. Gene expression changes from baseline and fluticasone treatment effects were evaluated using a mixed effects ANCOVA model at 7 and at 24 h post-allergen challenge. Results: Inhaled allergen-induced statistically significant gene expression changes in sputum, which were effectively blunted by fluticasone (adjusted p<0.025. Forty-seven RNA signatures were selected from these responses for correlation analyses and further validation. This included Th2 mRNA levels for cytokines, chemokines, high-affinity IgE receptor FCER1A, histamine receptor HRH4, and enzymes and receptors in the arachidonic pathway. Individual messengers from the 47 RNA signatures

  11. Thermodynamic Proxies to Compensate for Biases in Drug Discovery Methods.

    Science.gov (United States)

    Ekins, Sean; Litterman, Nadia K; Lipinski, Christopher A; Bunin, Barry A

    2016-01-01

    We propose a framework with simple proxies to dissect the relative energy contributions responsible for standard drug discovery binding activity. We explore a rule of thumb using hydrogen-bond donors, hydrogen-bond acceptors and rotatable bonds as relative proxies for the thermodynamic terms. We apply this methodology to several datasets (e.g., multiple small molecules profiled against kinases, Mycobacterium tuberculosis (Mtb) high throughput screening (HTS) and structure based drug design (SBDD) derived compounds, and FDA approved drugs). We found that Mtb active compounds developed through SBDD methods had statistically significantly larger PEnthalpy values than HTS derived compounds, suggesting these compounds had relatively more hydrogen bond donor and hydrogen bond acceptors compared to rotatable bonds. In recent FDA approved medicines we found that compounds identified via target-based approaches had a more balanced enthalpic relationship between these descriptors compared to compounds identified via phenotypic screens As it is common to experimentally optimize directly for total binding energy, these computational methods provide alternative calculations and approaches useful for compound optimization alongside other common metrics in available software and databases.

  12. Simulation of Wake Vortex Radiometric Detection via Jet Exhaust Proxy

    Science.gov (United States)

    Daniels, Taumi S.

    2015-01-01

    This paper describes an analysis of the potential of an airborne hyperspectral imaging IR instrument to infer wake vortices via turbine jet exhaust as a proxy. The goal was to determine the requirements for an imaging spectrometer or radiometer to effectively detect the exhaust plume, and by inference, the location of the wake vortices. The effort examines the gas spectroscopy of the various major constituents of turbine jet exhaust and their contributions to the modeled detectable radiance. Initially, a theoretical analysis of wake vortex proxy detection by thermal radiation was realized in a series of simulations. The first stage used the SLAB plume model to simulate turbine jet exhaust plume characteristics, including exhaust gas transport dynamics and concentrations. The second stage used these plume characteristics as input to the Line By Line Radiative Transfer Model (LBLRTM) to simulate responses from both an imaging IR hyperspectral spectrometer or radiometer. These numerical simulations generated thermal imagery that was compared with previously reported wake vortex temperature data. This research is a continuation of an effort to specify the requirements for an imaging IR spectrometer or radiometer to make wake vortex measurements. Results of the two-stage simulation will be reported, including instrument specifications for wake vortex thermal detection. These results will be compared with previously reported results for IR imaging spectrometer performance.

  13. Solar spectral irradiance datasets: analysis and comparison with proxies

    Science.gov (United States)

    Kretzschmar, M.; Schoell, M.; Dudok de Wit, T.

    2013-12-01

    Solar spectral irradiance (SSI) measurements have been acquired in space since the late 1960's. These data are of extreme importance to assess the variability of the Sun in the last decades as well as to understand how its magnetic activity affects its radiative output, and therefore to constrain the solar variability further in time. However, these data sometimes disagree between themselves or with our expectations deduced from well known observed proxies, and it is hard to disentangle instrumental effects from possible solar behavior. In the context of the european project SOLID (First European comprehensive SOlar Irradiance Data Exploitation) project, which aims at building an SSI composite with time dependent error-bars over the space age, we will show our first results towards the construction of a carefully assessed homogeneous solar spectral irradiance datasets, focussing on the ultraviolet wavelength range, for which more data are available. We will first present the data used, together with methods for gap-filling and outlier removal. Then we will show some results obtained by comparing a single dataset at different times of the mission, as well as results obtained from the comparison of simultaneous datasets and proxies. Finally, we will discuss how these analyses can help us to estimate errors on the solar variability at a particular wavelength.

  14. Attribute-based proxy re-encryption with keyword search.

    Directory of Open Access Journals (Sweden)

    Yanfeng Shi

    Full Text Available Keyword search on encrypted data allows one to issue the search token and conduct search operations on encrypted data while still preserving keyword privacy. In the present paper, we consider the keyword search problem further and introduce a novel notion called attribute-based proxy re-encryption with keyword search (ABRKS, which introduces a promising feature: In addition to supporting keyword search on encrypted data, it enables data owners to delegate the keyword search capability to some other data users complying with the specific access control policy. To be specific, ABRKS allows (i the data owner to outsource his encrypted data to the cloud and then ask the cloud to conduct keyword search on outsourced encrypted data with the given search token, and (ii the data owner to delegate other data users keyword search capability in the fine-grained access control manner through allowing the cloud to re-encrypted stored encrypted data with a re-encrypted data (embedding with some form of access control policy. We formalize the syntax and security definitions for ABRKS, and propose two concrete constructions for ABRKS: key-policy ABRKS and ciphertext-policy ABRKS. In the nutshell, our constructions can be treated as the integration of technologies in the fields of attribute-based cryptography and proxy re-encryption cryptography.

  15. Education Game to Blind People

    Directory of Open Access Journals (Sweden)

    Lidya Oktorina Kusuma Sakti

    2015-11-01

    Now there are blind people who have their formal and informal education. Even though they cannot see, they can take benefit from another sense, like sense of hearing, palpability, smell, and taste. Their senses can be a modal to study. Developer games have their build game in audio to blind people too. Their game is variation between audio games and online games, so games can be used for blind people as an education tools. In this paper, there will be an explanation about how to facilitate blind people to study with paper

  16. Inattention blindness in surgery.

    Science.gov (United States)

    Hughes-Hallett, Archie; Mayer, Erik K; Marcus, Hani J; Pratt, Philip; Mason, Sam; Darzi, Ara W; Vale, Justin A

    2015-11-01

    Inattention blindness (IB) can be defined as the failure to perceive an unexpected object when attention is focussed on another object or task. The principal aim of this study was to determine the effect of cognitive load and surgical image guidance on operative IB. Using a randomised control study design, participants were allocated to a high or low cognitive load group and subsequently to one of three augmented reality (AR) image guidance groups (no guidance, wireframe overlay and solid overlay). Randomised participants watched a segment of video from a robotic partial nephrectomy. Those in the high cognitive load groups were asked to keep a count of instrument movements, while those in the low cognitive load groups were only asked to watch the video. Two foreign bodies were visible within the operative scene: a swab, within the periphery of vision; and a suture, in the centre of the operative scene. Once the participants had finished watching the video, they were asked to report whether they had observed a swab or suture. The overall level of prompted inattention blindness was 74 and 10 % for the swab and suture, respectively. Significantly higher levels of IB for the swab were seen in the high versus the low cognitive load groups, but not for the suture (8 vs. 47 %, p context of this study. When examining for the effects of AR image guidance and cognitive load on IB, only the latter was found to have significance.

  17. Microbiota-based Signature of Gingivitis Treatments: A Randomized Study.

    Science.gov (United States)

    Huang, Shi; Li, Zhen; He, Tao; Bo, Cunpei; Chang, Jinlan; Li, Lin; He, Yanyan; Liu, Jiquan; Charbonneau, Duane; Li, Rui; Xu, Jian

    2016-04-20

    Plaque-induced gingivitis can be alleviated by various treatment regimens. To probe the impacts of various anti-gingivitis treatments on plaque microflora, here a double blinded, randomized controlled trial of 91 adults with moderate gingivitis was designed with two anti-gingivitis regimens: the brush-alone treatment and the brush-plus-rinse treatment. In the later group, more reduction in both Plaque Index (TMQHI) and Gingival Index (mean MGI) at Day 3, Day 11 and Day 27 was evident, and more dramatic changes were found between baseline and other time points for both supragingival plaque microbiota structure and salivary metabonomic profiles. A comparison of plaque microbiota changes was also performed between these two treatments and a third dataset where 50 subjects received regimen of dental scaling. Only Actinobaculum, TM7 and Leptotrichia were consistently reduced by all the three treatments, whereas the different microbial signatures of the three treatments during gingivitis relieve indicate distinct mechanisms of action. Our study suggests that microbiota based signatures can serve as a valuable approach for understanding and potentially comparing the modes of action for clinical treatments and oral-care products in the future.

  18. Cryptoschemes Based on New Signature Formation Mechanism

    Directory of Open Access Journals (Sweden)

    A.A.Moldovyan

    2006-12-01

    Full Text Available Several variants of new digital signature schemes (DSS based on the discrete logarithm and factorization problems have been proposed. Considered DSS are characterized in that a novel mechanism of the signature generation is used, in which two parameters of the (k,S or (R,S signature are defined after solving a system of two congruences. In the case of composite modulus additional restrictions conditions have been introduced for selection of the public key.

  19. Cryptographic key generation using handwritten signature

    Science.gov (United States)

    Freire-Santos, M.; Fierrez-Aguilar, J.; Ortega-Garcia, J.

    2006-04-01

    Based on recent works showing the feasibility of key generation using biometrics, we study the application of handwritten signature to cryptography. Our signature-based key generation scheme implements the cryptographic construction named fuzzy vault. The use of distinctive signature features suited for the fuzzy vault is discussed and evaluated. Experimental results are reported, including error rates to unlock the secret data by using both random and skilled forgeries from the MCYT database.

  20. Seeking biogeochemical signatures of fish harvesting in the recent sediment record

    Science.gov (United States)

    Kavanagh, L.; Galbraith, E. D.

    2014-12-01

    Fish removal was the earliest major human influence on the marine environment and global fishing effort has increased by orders of magnitude since its ancient origins, depleting predatory fish biomass by as much as 90% (Myers and Worm, 2003). It stands to reason that any impact this may have had on ocean biogeochemistry could have been preserved in existing high-resolution palaeoceanographic records. A severe depletion of upper trophic levels may result in a top-down ecological regime shift, manifesting in the form of trophic cascades and alterations to nutrient cycling and carbon export. Changes of this nature might be recorded in the sedimentary record through proxies such as fish remains, total organic carbon, 15N, and microfossil assemblages. However, these high-resolution proxies are more typically interpreted as reflecting climatic or oceanographic changes. This project searches for sedimentary signals of fish harvesting by compiling existing paleoceanographic data and comparing it to historical and archaeological records of ecosystem exploitation. Hypotheses of potential sedimentary signatures and methods of analysis will be discussed and results from case studies such as the Peruvian Upwelling Zone, North Sea, and Scotian Shelf will be presented. Identifying a sedimentary signature of fish harvesting will clarify interpretations of recent palaeoceanographic proxies and help define the role that fish can play in biogeochemical dynamics. This will aid in parameterizing upper trophic levels in ocean biogeochemical models and establishing pre-human baselines for ecosystem-based fisheries management. References: Myers, R. A., and B. Worm (2003), Rapid worldwide depletion of predatory fish communities., Nature, 423(6937), 280-3, doi:10.1038/nature01610.

  1. Molecular Signatures in Urologic Tumors

    Directory of Open Access Journals (Sweden)

    Spencer Larkin

    2013-09-01

    Full Text Available Urologic tumors continue to represent a huge fraction of cancer cases in the United States, with over 376,310 estimated new diagnoses in 2013. As with many types of tumors, urologic tumors vary greatly in their phenotype, ranging from minimally invasive to malignancies possessing great metastatic potential. The increasing need for more efficient and less invasive methods of cancer detection, as well as the ability to predict severity of the disease phenotype is readily evident—yet reliable methods remain elusive in a clinical setting today. Comprehensive panels of gene clusters are being developed toward the generation of molecular signatures in order to better diagnose urologic malignancies, and identify effective treatment strategies in the emerging era of personalized medicine. In this review, we discuss the current literature on the credibility and biomarker value of such molecular signatures in the context of clinical significance relating to the pathological aggressiveness of urologic tumors (prostate, bladder and renal cancer—also exploiting their predictive potential in the response to treatment.

  2. POSTERIOR SEGMENT CAUSES OF BLINDNESS AMONG CHILDREN IN BLIND SCHOOLS

    Directory of Open Access Journals (Sweden)

    Sandhya

    2015-09-01

    Full Text Available BACKGROUND: It is estimated that there are 1.4 million irreversibly blind children in the world out of which 1 million are in Asia alone. India has the highest number of blind children than any other country. Nearly 70% of the childhood blindness is avoidable. There i s paucity of data available on the causes of childhood blindness. This study focuses on the posterior segment causes of blindness among children attending blind schools in 3 adjacent districts of Andhra Pradesh. MATERIAL & METHODS: This is a cross sectiona l study conducted among 204 blind children aged 6 - 16 years age. Detailed eye examination was done by the same investigator to avoid bias. Posterior segment examination was done using a direct and/or indirect ophthalmoscope after dilating pupil wherever nec essary. The standard WHO/PBL for blindness and low vision examination protocol was used to categorize the causes of blindness. A major anatomical site and underlying cause was selected for each child. The study was carried out during July 2014 to June 2015 . The results were analyzed using MS excel software and Epi - info 7 software version statistical software. RESULTS: Majority of the children was found to be aged 13 - 16 years (45.1% and males (63.7%. Family history of blindness was noted in 26.0% and consa nguinity was reported in 29.9% cases. A majority of them were belonged to fulfill WHO grade of blindness (73.0% and in majority of the cases, the onset of blindness was since birth (83.7%. The etiology of blindness was unknown in majority of cases (57.4% while hereditary causes constituted 25.4% cases. Posterior segment causes were responsible in 33.3% cases with retina being the most commonly involved anatomical site (19.1% followed by optic nerve (14.2%. CONCLUSIONS: There is a need for mandatory oph thalmic evaluation, refraction and assessment of low vision prior to admission into blind schools with periodic evaluation every 2 - 3 years

  3. An Arbitrated Quantum Signature Scheme without Entanglement*

    Science.gov (United States)

    Li, Hui-Ran; Luo, Ming-Xing; Peng, Dai-Yuan; Wang, Xiao-Jun

    2017-09-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks.

  4. On reliable discovery of molecular signatures

    Directory of Open Access Journals (Sweden)

    Björkegren Johan

    2009-01-01

    Full Text Available Abstract Background Molecular signatures are sets of genes, proteins, genetic variants or other variables that can be used as markers for a particular phenotype. Reliable signature discovery methods could yield valuable insight into cell biology and mechanisms of human disease. However, it is currently not clear how to control error rates such as the false discovery rate (FDR in signature discovery. Moreover, signatures for cancer gene expression have been shown to be unstable, that is, difficult to replicate in independent studies, casting doubts on their reliability. Results We demonstrate that with modern prediction methods, signatures that yield accurate predictions may still have a high FDR. Further, we show that even signatures with low FDR may fail to replicate in independent studies due to limited statistical power. Thus, neither stability nor predictive accuracy are relevant when FDR control is the primary goal. We therefore develop a general statistical hypothesis testing framework that for the first time provides FDR control for signature discovery. Our method is demonstrated to be correct in simulation studies. When applied to five cancer data sets, the method was able to discover molecular signatures with 5% FDR in three cases, while two data sets yielded no significant findings. Conclusion Our approach enables reliable discovery of molecular signatures from genome-wide data with current sample sizes. The statistical framework developed herein is potentially applicable to a wide range of prediction problems in bioinformatics.

  5. Institute of Geophysics, Planetary Physics, and Signatures

    Data.gov (United States)

    Federal Laboratory Consortium — The Institute of Geophysics, Planetary Physics, and Signatures at Los Alamos National Laboratory is committed to promoting and supporting high quality, cutting-edge...

  6. Iron content of soils as a precipitation proxy

    Science.gov (United States)

    Dzombak, R.; Sheldon, N. D.

    2016-12-01

    Given that different iron phases form under different precipitation and drainage regimes, soil iron content could be used as a proxy for both volume and seasonality of precipitation. Constraining these factors is important for predicting future precipitation trends, especially for a warmer climate that will likely see more frequent extreme weather events. Specifically, using paleoprecipitation data from periods of higher temperatures and atmospheric CO2 concentrations helps inform models of future `greenhouse' climate. Forty-five modern samples from across the continental United States were analyzed, with MAP ranging from 200 to 1200 mm yr-1 and MAT ranging from 5 to 22°C. Soil types included Alfisols (N=15), Inceptisols (N=8), Mollisols (N=15), and Aridisols (N=7), and ranged from seasonally wet to well-drained. Analytical techniques included combustion-elemental analysis and organic carbon isotope analysis, a sequential iron extraction modified with a sodium hypochlorite step for the extraction of organic matter-bound iron, and the extraction of iron sulfides. The sequential extractions yield five different `pools' of iron found in sediment: crystalline iron oxides (e.g., goethite, hematite), magnetite, carbonate-bound, organic matter-bound, and labile/easily reducible iron minerals (e.g., ferrihydrite). Analysis by ICP-OES yielded a strong relationship between magnetite-bound iron and MAP, and fair relationships between the other iron pools and MAP. Individual soil orders tended to show stronger relationships to the iron pools than all soils analyzed together, potentially indicating the need for separate proxy relationships for each soil order. Pyrite concentrations were well below 1% by weight for these soils, suggesting that none of these soils has a long enough wet season to encourage its formation and that the presence vs. absence of pyrite in paleosols may be a useful proxy for soil moisture state. In contrast to some earlier work, no significant

  7. Carbohydrates and phenols as quantitative molecular vegetation proxies in peats

    Science.gov (United States)

    Kaiser, K.; Benner, R. H.

    2012-12-01

    Vegetation in peatlands is intricately linked to local environmental conditions and climate. Here we use chemical analyses of carbohydrates and phenols to reconstruct paleovegetation in peat cores collected from 56.8°N (SIB04), 58.4°N (SIB06), 63.8°N (G137) and 66.5°N (E113) in the Western Siberian Lowland. Lignin phenols (vanillyl and syringyl phenols) were sensitive biomarkers for vascular plant contributions and provided additional information on the relative contributions of angiosperm and gymnosperm plants. Specific neutral sugar compositions allowed identification of sphagnum mosses, sedges (Cyperaceae) and lichens. Hydroxyphenols released by CuO oxidation were useful tracers of sphagnum moss contributions. The three independent molecular proxies were calibrated with a diverse group of peat-forming plants to yield quantitative estimates (%C) of vascular plant, sphagnum moss and lichen contributions in peat core samples. Correlation analysis indicated the three molecular proxies produced fairly similar results for paleovegetation compositions, generally within the error interval of each approach (≤26%). The lignin-based method generally lead to higher estimates of vascular plant vegetation. Several significant deviations were also observed due to different reactivities of carbohydrate and phenolic polymers during peat decomposition. Rapid vegetation changes on timescales of 50-200 years were observed in the southern cores SIB04 and SIB06 over the last 2000 years. Vanillyl and syringyl phenol ratios indicated these vegetation changes were largely due to varying inputs of angiosperm and gymnosperm plants. The northern permafrost cores G137 and E113 showed a more stable development. Lichens briefly replaced sphagnum mosses and vascular plants in both of these cores. Shifts in vegetation did not correlate well with Northern hemisphere climate variability over the last 2000 years. This suggested that direct climate forcing of peatland dynamics was overridden

  8. Overview on Deaf-Blindness

    Science.gov (United States)

    Miles, Barbara

    2008-01-01

    It may seem that deaf-blindness refers to a total inability to see or hear. However, in reality deaf-blindness is a condition in which the combination of hearing and visual losses in children cause "such severe communication and other develop mental and educational needs that they cannot be accommodated in special education programs solely for…

  9. Testing Children for Color Blindness

    Science.gov (United States)

    ... Ophthalmologist Patient Stories Español Eye Health / News Testing Children for Color Blindness Leer en Español: Pruebas para Detectar Daltonismo en ... between the two colors. According to Dr. Varma, children with color blindness can benefit from different kinds of lesson plans ...

  10. Blind Naso-Endotracheal Intubation

    African Journals Online (AJOL)

    Cincotta FA, Neidorff C. Blind awake nasotracheal intubation. Anesthesia Progress 1977;24:15–7. 21. de Carli D, Correa NS, Silva TCBV, et al. Blind nasotracheal intubation in awaken patient scheduled for hemimandibulectomy. Case report. Revista Brasileira de Anestesiologia;58:55–62. 22. Van Elstraete AC, Mamie JC, ...

  11. Heterogeneity of Cr in Mytilus edulis: Implications for the Cr isotope system as a paleo-redox proxy

    Science.gov (United States)

    Bruggmann, Sylvie; Klaebe, Robert; Frei, Robert

    2017-04-01

    's Cr isotopic composition [3]. A detailed understanding of the processes causing the observed heterogeneity of [Cr] and δ53Cr in modern carbonate shells is crucial for the use of the Cr isotope system as a potential paleo-redox proxy. [1] Bonnand, P., James, R. H., Parkinson, I. J., Connelly, D. P., and Fairchild, I. J. (2013). The chromium isotopic composition of seawater and marine carbonates. Earth and Planetary Science Letters, 382:10-20. [2] Holmden, C., Jacobsen, A. D., Sageman, B. B., Hurgten, M. T. (2016). Response of the Cr isotope proxy to Cretaceous Ocean Anoxic Event 2 in a pelagic carbonate succession from the Western Interior Seaway. Geochimica et Cosmochimica Acta, 186:227-295. [3] Paulukat, C., Gilleaudeau, G. J., Chernyavskiy, P., Frei, R. (2016). The Cr-isotope signature of surface seawater -A global perspective. Chemical Geology, 444:101-109. [4] Pereira, N. S., Voegelin, A. R., Paulukat, C., Sial, A. N., Ferreira, V. P., and Frei, R. (2015). Chromium-isotope signatures in scleractinian corals from the Rocas Atoll, Tropical South Atlantic. Geobiology 1-14.

  12. Law Enforcement Proxies Matter for the Law and Finance Nexus

    Directory of Open Access Journals (Sweden)

    Valentin Toci

    2013-07-01

    Full Text Available The paper employs various measures of law enforcement to provide new evidence on the importance of legal institutions for different dimensions of financial development in transition economies. It offers a critical assessment of law enforcement measures employed in recent studies by showing that some proxies for law enforcement in the credit market may not be appropriate. Hence, care should be taken in how the quality of institutions is measured and the context which it represents. An original approach to measuring law enforcement in the credit market is developed by embodying the legal theory of dispute resolution and assessing this approach by collecting primary data for Kosovo. The findings suggest that Kosovo compares well with countries in the region and other transition economies in terms of the enforcement of creditor rights.

  13. Munchausen Syndrome by proxy: Definition, context, and psychological factors involved

    Directory of Open Access Journals (Sweden)

    Thomas Gomes Gonçalves

    2014-07-01

    Full Text Available The Munchausen syndrome by proxy refers to a pathology characterized by physical and emotional abuse in which the simulation or production of symptoms is directed towards a child, which involves taking him or her to health treatments and unnecessary surgeries. The difficulties in the diagnosis of this form of abuse and the emotional aspects involved highlight the destructive effects in the infancy subjectivity due to the lack of loving capacity protecting and prioritizing the child demands. Psychoanalysis offers a differentiated view, comprehending that the mother attempts to elaborate her own psychic conflicts by the repetition of traumatic experience. There is a necessity of comprehension of the instinct destructivity presented in the maternal unconscious dynamics revealed in the modality of caring which is reflected in violence.

  14. Obesity as a Presentation of Munchausen Syndrome by Proxy.

    Science.gov (United States)

    Nogueira-de-Almeida, Carlos Alberto; de Almeida, Carla Cristina J N; Pereira, Natália Inocêncio; de Souza Filho, Nilton Antonio; de Oliveira, Valmir Aparecido

    2017-04-17

    To describe a case of an obese child whose weight gain was related to the Munchausen Syndrome by proxy (MSP). This is a case report including information regarding the child's clinical history and the mother's behavior. The common features of the syndrome are confronted with the description of the case, seeking to demonstrate the similarities. The description ratifies the diagnosis based on the signs and symptoms presented by the child (<5 years old, frequent contacts with health system, symptoms witnessed only by the mother, confusing findings, not helped by treatments, emotionally distant father) and the attitude of the mother (concerned, interested in procedures, comfortable in the medical setting, higher medical knowledge, hostile when thwarted). The case presented points to a new etiology, the MSP, to be considered within the set of factors currently known to cause and maintain obesity in childhood.

  15. Interactive images: Cuboid proxies for smart image manipulation

    KAUST Repository

    Zheng, Youyi

    2012-07-01

    Images are static and lack important depth information about the underlying 3D scenes. We introduce interactive images in the context of man-made environments wherein objects are simple and regular, share various non-local relations (e.g., coplanarity, parallelism, etc.), and are often repeated. Our interactive framework creates partial scene reconstructions based on cuboid-proxies with minimal user interaction. It subsequently allows a range of intuitive image edits mimicking real-world behavior, which are otherwise difficult to achieve. Effectively, the user simply provides high-level semantic hints, while our system ensures plausible operations by conforming to the extracted non-local relations. We demonstrate our system on a range of real-world images and validate the plausibility of the results using a user study. © 2012 ACM 0730-0301/2012/08-ART99.

  16. Reliability of proxy reports of parental smoking by elementary schoolchildren.

    Science.gov (United States)

    Barnett, T; O'Loughlin, J; Paradis, G; Renaud, L

    1997-08-01

    To investigate the reliability of reports of parental smoking by elementary schoolchildren aged 9-13 years, and to identify the correlates of disagreement between student proxy and parent self-reports. As part of the evaluation of a school-based heart health promotion program, data on parental smoking status were collected from 1240 student-mother pairs and 898 student-father pairs. Agreement for parental smoking status was 93.1% among student-mother pairs and 86.4% among student-father pairs. Among student-mother pairs, reports by students aged 9 years were more likely to disagree with mothers' self-reports than those of older children (odds ratio (OR) = 3.1). Among student-father pairs, the only significant correlate of disagreement was living in a single-parent family headed by the mother (OR = 2.6). Children 10-years or older can provide reliable reports of the smoking status of cohabiting parents.

  17. STRONTIUM DISTRIBUTION IN UPPER DEVONIAN CONODONT ELEMENTS: A PALAEOBIOLOGICAL PROXY

    Directory of Open Access Journals (Sweden)

    ANDREY V. ZHURAVLEV

    2017-04-01

    Full Text Available Conodonts are an extinct group of marine animals possessing debated affinities. The conodont elements are composed of calcium phosphate [apatite (CaF] and collagen-like proteins. Distribution of Sr in the bioapatite of albid, lamellar and paralamellar tissues of some Upper Devonian conodont element crowns from NW Russia was studied by microprobe. The calcium phosphate of the lamellar and paralamellar tissues demonstrates periodical oscillation of Sr contents across the lamellae (0.4-0.5 wt% in the outer part of lamella, and 0.2 wt% in the inner part. The albid tissue contains Sr of less than 0.4 wt%. It is suggested that oscillations of Sr concentrations reflect the periodic growth of the lamellae, and the average Ca/Sr ratio can be a proxy of the growth rate.

  18. One thousand years of fires: Integrating proxy and model data

    Directory of Open Access Journals (Sweden)

    Natalie Marie Kehrwald

    2016-04-01

    Full Text Available The current fires raging across Indonesia are emitting more carbon than the annual fossil fuel emissions of Germany or Japan, and the fires are still consuming vast tracts of rainforest and peatlands. The National Interagency Fire Center (www.nifc.gov notes that 2015 is one worst fire years on record in the U.S., where more than 9 million acres burned -- equivalent to the combined size of Massachusetts and New Jersey. The U.S. and Indonesian fires have already displaced tens of thousands of people, and their impacts on ecosystems are still unclear. In the case of Indonesia, the burning peat is destroying much of the existing soil, with unknown implications for the type of vegetation regrowth. Such large fires result from a combination of fire management practices, increasing anthropogenic land use, and a changing climate. The expected increase in fire activity in the upcoming decades has led to a surge in research trying to understand their causes, the factors that may have influenced similar times of fire activity in the past, and the implications of such fire activity in the future. Multiple types of complementary data provide information on the impacts of current fires and the extent of past fires. The wide array of data encompasses different spatial and temporal resolutions (Figure 1 and includes fire proxy information such as charcoal and tree ring fire scars, observational records, satellite products, modern emissions data, fire models within global land cover and vegetation models, and sociodemographic data for modeling past human land use and ignition frequency. Any single data type is more powerful when combined with another source of information. Merging model and proxy data enables analyses of how fire activity modifies vegetation distribution, air and water quality, and proximity to cities; these analyses in turn support land management decisions relating to conservation and development.

  19. Assessing paleo-biodiversity using low proxy influx.

    Directory of Open Access Journals (Sweden)

    Olivier Blarquez

    Full Text Available We developed an algorithm to improve richness assessment based on paleoecological series, considering sample features such as their temporal resolutions or their volumes. Our new method can be applied to both high- and low-count size proxies, i.e. pollen and plant macroremain records, respectively. While pollen generally abounds in sediments, plant macroremains are generally rare, thus leading to difficulties to compute paleo-biodiversity indices. Our approach uses resampled macroremain influxes that enable the computation of the rarefaction index for the low influx records. The raw counts are resampled to a constant resolution and sample volume by interpolating initial sample ages at a constant time interval using the age∼depth model. Then, the contribution of initial counts and volume to each interpolated sample is determined by calculating a proportion matrix that is in turn used to obtain regularly spaced time series of pollen and macroremain influx. We applied this algorithm to sedimentary data from a subalpine lake situated in the European Alps. The reconstructed total floristic richness at the study site increased gradually when both pollen and macroremain records indicated a decrease in relative abundances of shrubs and an increase in trees from 11,000 to 7,000 cal BP. This points to an ecosystem change that favored trees against shrubs, whereas herb abundance remained stable. Since 6,000 cal BP, local richness decreased based on plant macroremains, while pollen-based richness was stable. The reconstructed richness and evenness are interrelated confirming the difficulty to distinguish these two aspects for the studies in paleo-biodiversity. The present study shows that low-influx bio-proxy records (here macroremains can be used to reconstruct stand diversity and address ecological issues. These developments on macroremain and pollen records may contribute to bridge the gap between paleoecology and biodiversity studies.

  20. Assessing paleo-biodiversity using low proxy influx.

    Science.gov (United States)

    Blarquez, Olivier; Finsinger, Walter; Carcaillet, Christopher

    2013-01-01

    We developed an algorithm to improve richness assessment based on paleoecological series, considering sample features such as their temporal resolutions or their volumes. Our new method can be applied to both high- and low-count size proxies, i.e. pollen and plant macroremain records, respectively. While pollen generally abounds in sediments, plant macroremains are generally rare, thus leading to difficulties to compute paleo-biodiversity indices. Our approach uses resampled macroremain influxes that enable the computation of the rarefaction index for the low influx records. The raw counts are resampled to a constant resolution and sample volume by interpolating initial sample ages at a constant time interval using the age∼depth model. Then, the contribution of initial counts and volume to each interpolated sample is determined by calculating a proportion matrix that is in turn used to obtain regularly spaced time series of pollen and macroremain influx. We applied this algorithm to sedimentary data from a subalpine lake situated in the European Alps. The reconstructed total floristic richness at the study site increased gradually when both pollen and macroremain records indicated a decrease in relative abundances of shrubs and an increase in trees from 11,000 to 7,000 cal BP. This points to an ecosystem change that favored trees against shrubs, whereas herb abundance remained stable. Since 6,000 cal BP, local richness decreased based on plant macroremains, while pollen-based richness was stable. The reconstructed richness and evenness are interrelated confirming the difficulty to distinguish these two aspects for the studies in paleo-biodiversity. The present study shows that low-influx bio-proxy records (here macroremains) can be used to reconstruct stand diversity and address ecological issues. These developments on macroremain and pollen records may contribute to bridge the gap between paleoecology and biodiversity studies.

  1. Intensity modulated neutron radiotherapy optimization by photon proxy.

    Science.gov (United States)

    Snyder, Michael; Hammoud, Ahmad; Bossenberger, Todd; Spink, Robyn; Burmeister, Jay

    2012-08-01

    Introducing intensity modulation into neutron radiotherapy (IMNRT) planning has the potential to mitigate some normal tissue complications seen in past neutron trials. While the hardware to deliver IMNRT plans has been in use for several years, until recently the IMNRT planning process has been cumbersome and of lower fidelity than conventional photon plans. Our in-house planning system used to calculate neutron therapy plans allows beam weight optimization of forward planned segments, but does not provide inverse optimization capabilities. Commercial treatment planning systems provide inverse optimization capabilities, but currently cannot model our neutron beam. We have developed a methodology and software suite to make use of the robust optimization in our commercial planning system while still using our in-house planning system to calculate final neutron dose distributions. Optimized multileaf collimator (MLC) leaf positions for segments designed in the commercial system using a 4 MV photon proxy beam are translated into static neutron ports that can be represented within our in-house treatment planning system. The true neutron dose distribution is calculated in the in-house system and then exported back through the MATLAB software into the commercial treatment planning system for evaluation. The planning process produces optimized IMNRT plans that reduce dose to normal tissue structures as compared to 3D conformal plans using static MLC apertures. The process involves standard planning techniques using a commercially available treatment planning system, and is not significantly more complex than conventional IMRT planning. Using a photon proxy in a commercial optimization algorithm produces IMNRT plans that are more conformal than those previously designed at our center and take much less time to create. The planning process presented here allows for the optimization of IMNRT plans by a commercial treatment planning optimization algorithm, potentially allowing

  2. Ask a Scientist: What is Color Blindness?

    Medline Plus

    Full Text Available ... color blindness, whether it can be treated, and how people become color blind. What do my eyes ... Watch What is color blindness? Click to Watch How do I become a scientist? Click to Watch ...

  3. Proxy-assisted multicasting of video streams over mobile wireless networks

    Science.gov (United States)

    Nguyen, Maggie; Pezeshkmehr, Layla; Moh, Melody

    2005-03-01

    This work addresses the challenge of providing seamless multimedia services to mobile users by proposing a proxy-assisted multicast architecture for delivery of video streams. We propose a hybrid system of streaming proxies, interconnected by an application-layer multicast tree, where each proxy acts as a cluster head to stream out content to its stationary and mobile users. The architecture is based on our previously proposed Enhanced-NICE protocol, which uses an application-layer multicast tree to deliver layered video streams to multiple heterogeneous receivers. We targeted the study on placements of streaming proxies to enable efficient delivery of live and on-demand video, supporting both stationary and mobile users. The simulation results are evaluated and compared with two other baseline scenarios: one with a centralized proxy system serving the entire population and one with mini-proxies each to serve its local users. The simulations are implemented using the J-SIM simulator. The results show that even though proxies in the hybrid scenario experienced a slightly longer delay, they had the lowest drop rate of video content. This finding illustrates the significance of task sharing in multiple proxies. The resulted load balancing among proxies has provided a better video quality delivered to a larger audience.

  4. Analisis Perbandingan Respons Time Squid Proxy Pada Windows Server dan Linux Server

    OpenAIRE

    Sirait, Parulian

    2016-01-01

    In the development of information technology, information is obtained quickly through technology computer network known as the Internet. The use bandwidth for Internet access can be maximized by using a proxy server. One of the proxy server is squid. The use squid as the proxy server need to consider the operating system on the server and have not known its best performance on any operating system yet. For that it is necessary to analyze the performance of squid proxy server on a different op...

  5. Tracking fluctuations in the intensity of the eastern tropical north Pacific oxygen minimum zone using a multi-proxy approach

    Science.gov (United States)

    Tems, C.

    2015-12-01

    Naturally occurring oxygen minimum zones (OMZs) are permanent midwater features that are associated with highly productive regions of the ocean, key microbial mediated biogeochemical cycling, and the deposition of organic rich sediments. The intensity of OMZs varies on glacial to interglacial time scales, indicating a relationship between the climate system and the expanse of OMZs, however, high-resolution studies tracking the fluctuations of OMZs on a near annual basis are lacking. In the Gulf of California (Pescadero Slope), the eastern tropical north Pacific OMZ impinges on basin slopes depositing laminated, hemipelagic sediments that record useful proxies of OMZ fluctuations. In an OMZ, low O2 content promotes water column denitrification, imparting an elevated 15N/14N isotopic signature on the residual nitrate in the water column. The elevated 15NO3- is upwelled and incorporated into particulate organic mater (POM) during primary production. The exported POM δ15Nsed then reflects the intensity of the regional OMZ at the time it was deposited. The Pescadero Slope record shows distinct temporal fluctuations in the δ15Nsed with decadal to multi-decadal and centennial cyclicity over the past 1200 years. The record reveals that the OMZ contracts during warmer climatic periods, including the Medieval Climate Optimum and the Industrial Revolution, and expands during cooler climates, specifically the Little Ice Age. The local mechanisms that are influencing fluctuations in the OMZ are investigated through an analysis of productivity proxies, including weight percent organic carbon and weight percent biogenic silica, and indicate OMZ expansion during periods of high productivity. Local productivity is driven by the intensity in the easterly trade winds in the Pacific, and thus the relationship between regional trade wind intensity and fluctuations in the intensity of the OMZ over the past 160 years will be discussed.

  6. Extreme flood event reconstruction spanning the last century in the El Bibane Lagoon (southeastern Tunisia): a multi-proxy approach

    Science.gov (United States)

    Affouri, Aida; Dezileau, Laurent; Kallel, Nejib

    2017-06-01

    Climate models project that rising atmospheric carbon dioxide concentrations will increase the frequency and the severity of some extreme weather events. The flood events represent a major risk for populations and infrastructures settled on coastal lowlands. Recent studies of lagoon sediments have enhanced our knowledge on extreme hydrological events such as palaeo-storms and on their relation with climate change over the last millennium. However, few studies have been undertaken to reconstruct past flood events from lagoon sediments. Here, the past flood activity was investigated using a multi-proxy approach combining sedimentological and geochemical analysis of surfaces sediments from a southeastern Tunisian catchment in order to trace the origin of sediment deposits in the El Bibane Lagoon. Three sediment sources were identified: marine, fluvial and aeolian. When applying this multi-proxy approach on core BL12-10, recovered from the El Bibane Lagoon, we can see that finer material, a high content of the clay and silt, and a high content of the elemental ratios (Fe / Ca and Ti / Ca) characterise the sedimentological signature of the palaeo-flood levels identified in the lagoonal sequence. For the last century, which is the period covered by the BL12-10 short core, three palaeo-flood events were identified. The age of these flood events have been determined by 210Pb and 137Cs chronology and give ages of AD 1995 ± 6, 1970 ± 9 and 1945 ± 9. These results show a good temporal correlation with historical flood events recorded in southern Tunisia in the last century (AD 1932, 1969, 1979 and 1995). Our finding suggests that reconstruction of the history of the hydrological extreme events during the upper Holocene is possible in this location through the use of the sedimentary archives.

  7. Extreme flood event reconstruction spanning the last century in the El Bibane Lagoon (southeastern Tunisia: a multi-proxy approach

    Directory of Open Access Journals (Sweden)

    A. Affouri

    2017-06-01

    Full Text Available Climate models project that rising atmospheric carbon dioxide concentrations will increase the frequency and the severity of some extreme weather events. The flood events represent a major risk for populations and infrastructures settled on coastal lowlands. Recent studies of lagoon sediments have enhanced our knowledge on extreme hydrological events such as palaeo-storms and on their relation with climate change over the last millennium. However, few studies have been undertaken to reconstruct past flood events from lagoon sediments. Here, the past flood activity was investigated using a multi-proxy approach combining sedimentological and geochemical analysis of surfaces sediments from a southeastern Tunisian catchment in order to trace the origin of sediment deposits in the El Bibane Lagoon. Three sediment sources were identified: marine, fluvial and aeolian. When applying this multi-proxy approach on core BL12-10, recovered from the El Bibane Lagoon, we can see that finer material, a high content of the clay and silt, and a high content of the elemental ratios (Fe ∕ Ca and Ti ∕ Ca characterise the sedimentological signature of the palaeo-flood levels identified in the lagoonal sequence. For the last century, which is the period covered by the BL12-10 short core, three palaeo-flood events were identified. The age of these flood events have been determined by 210Pb and 137Cs chronology and give ages of AD 1995 ± 6, 1970 ± 9 and 1945 ± 9. These results show a good temporal correlation with historical flood events recorded in southern Tunisia in the last century (AD 1932, 1969, 1979 and 1995. Our finding suggests that reconstruction of the history of the hydrological extreme events during the upper Holocene is possible in this location through the use of the sedimentary archives.

  8. They blinded me with science

    CERN Multimedia

    Campbell-Johnston, R

    2001-01-01

    Artists from all over Europe have been invited to spend time at CERN to develop their own responses to the science it studies. The result is an exhibition entitled "Signatures of the Invisible" (1 page).

  9. Analysis of signature wrapping attacks and countermeasures

    DEFF Research Database (Denmark)

    Gajek, Sebastian; Jensen, Meiko; Liao, Lijun

    2009-01-01

    In recent research it turned out that Boolean verification, of digital signatures in the context of WSSecurity, is likely to fail: If parts of a SOAP message, are signed and the signature verification applied to, the whole document returns true, then nevertheless the, document may have been...

  10. Prediction of soil effects on GPR signatures

    NARCIS (Netherlands)

    Rhebergen, J.B.; Lensen, H.A.; Wijk, C.V. van; Hendrickx, J.M.H.; Dam, R. van; Borchers, B.

    2004-01-01

    In previous work we have shown that GPR signatures are affected by soil texture and soil water content. In this contribution we will use a three dimensional electromagnetic model and a hydrological soil model to explore in more detail the relationships between GPR signatures, soil physical

  11. Measuring ship acoustic signatures against mine threat

    NARCIS (Netherlands)

    Jong, C.A.F. de; Quesson, B.A.J.; Ainslie, M.A.; Vermeulen, R.C.N.

    2012-01-01

    The NATO standard ‘AMP-15’ [1] provides procedures for the measurement and reporting of the acoustic signature of ships and for the establishment of acoustic signature goals to counter the naval mine threat. Measurements are carried out at dedicated shallow water acoustic ranges. Measurements

  12. 21 CFR 11.50 - Signature manifestations.

    Science.gov (United States)

    2010-04-01

    ... and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ELECTRONIC RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.50 Signature manifestations. (a) Signed electronic... the same controls as for electronic records and shall be included as part of any human readable form...

  13. Redactable signatures for signed CDA Documents.

    Science.gov (United States)

    Wu, Zhen-Yu; Hsueh, Chih-Wen; Tsai, Cheng-Yu; Lai, Feipei; Lee, Hung-Chang; Chung, Yufang

    2012-06-01

    The Clinical Document Architecture, introduced by Health Level Seven, is a XML-based standard intending to specify the encoding, structure, and semantics of clinical documents for exchange. Since the clinical document is in XML form, its authenticity and integrity could be guaranteed by the use of the XML signature published by W3C. While a clinical document wants to conceal some personal or private information, the document needs to be redacted. It makes the signed signature of the original clinical document not be verified. The redactable signature is thus proposed to enable verification for the redacted document. Only a little research does the implementation of the redactable signature, and there still not exists an appropriate scheme for the clinical document. This paper will investigate the existing web-technologies and find a compact and applicable model to implement a suitable redactable signature for the clinical document viewer.

  14. Real time gamma-ray signature identifier

    Science.gov (United States)

    Rowland, Mark [Alamo, CA; Gosnell, Tom B [Moraga, CA; Ham, Cheryl [Livermore, CA; Perkins, Dwight [Livermore, CA; Wong, James [Dublin, CA

    2012-05-15

    A real time gamma-ray signature/source identification method and system using principal components analysis (PCA) for transforming and substantially reducing one or more comprehensive spectral libraries of nuclear materials types and configurations into a corresponding concise representation/signature(s) representing and indexing each individual predetermined spectrum in principal component (PC) space, wherein an unknown gamma-ray signature may be compared against the representative signature to find a match or at least characterize the unknown signature from among all the entries in the library with a single regression or simple projection into the PC space, so as to substantially reduce processing time and computing resources and enable real-time characterization and/or identification.

  15. Do proxies reflect patients' health concerns about urinary incontinence and gait problems?

    Science.gov (United States)

    Higashi, Takahiro; Hays, Ron D; Brown, Julie A; Kamberg, Caren J; Pham, Chau; Reuben, David B; Shekelle, Paul G; Solomon, David H; Young, Roy T; Roth, Carol P; Chang, John T; MacLean, Catherine H; Wenger, Neil S

    2005-01-01

    Background While falls and urinary incontinence are prevalent among older patients, who sometimes rely on proxies to provide their health information, the validity of proxy reports of concern about falls and urinary incontinence remains unknown. Methods Telephone interviews with 43 consecutive patients with falls or fear of falling and/or bothersome urinary incontinence and their proxies chosen by patients as most knowledgeable about their health. The questionnaire included items derived from the Medical Outcomes Study Short Form 12 (SF-12), a scale assessing concerns about urinary incontinence (UI), and a measure of fear of falling, the Falls Efficacy Scale (FES). Scores were estimated using items asking the proxy perspective (6 items from the SF-12, 10 items from a UI scale, and all 10 FES items). Proxy and patient scores were compared using intraclass correlation coefficients (ICC, one-way model). Variables associated with absolute agreement between patients and proxies were explored. Results Patients had a mean age of 81 years (range 75–93) and 67% were female while proxies had a mean age of 70 (range 42–87) and 49% were female. ICCs were 0.63 for the SF-12, 0.52 for the UI scale, and 0.29 for the FES. Proxies tended to understate patients' general health and incontinence concern, but overstate patients' concern about falling. Proxies who lived with patients and those who more often see patients more closely reflected patient FES scores compared to those who lived apart or those who saw patients less often. Internal consistency reliability of proxy responses was 0.62 for the SF-12, 0.86 for the I-QOL, and 0.93 for the FES. In addition, construct validity of the proxy FES scale was supported by greater proxy-perceived fear of falling for patients who received medical care after a fall during the past 12 months (p < .05). Conclusion Caution should be exercised when using proxies as a source of information about older patients' health perceptions. Questions

  16. Do proxies reflect patients' health concerns about urinary incontinence and gait problems?

    Directory of Open Access Journals (Sweden)

    Solomon David H

    2005-11-01

    Full Text Available Abstract Background While falls and urinary incontinence are prevalent among older patients, who sometimes rely on proxies to provide their health information, the validity of proxy reports of concern about falls and urinary incontinence remains unknown. Methods Telephone interviews with 43 consecutive patients with falls or fear of falling and/or bothersome urinary incontinence and their proxies chosen by patients as most knowledgeable about their health. The questionnaire included items derived from the Medical Outcomes Study Short Form 12 (SF-12, a scale assessing concerns about urinary incontinence (UI, and a measure of fear of falling, the Falls Efficacy Scale (FES. Scores were estimated using items asking the proxy perspective (6 items from the SF-12, 10 items from a UI scale, and all 10 FES items. Proxy and patient scores were compared using intraclass correlation coefficients (ICC, one-way model. Variables associated with absolute agreement between patients and proxies were explored. Results Patients had a mean age of 81 years (range 75–93 and 67% were female while proxies had a mean age of 70 (range 42–87 and 49% were female. ICCs were 0.63 for the SF-12, 0.52 for the UI scale, and 0.29 for the FES. Proxies tended to understate patients' general health and incontinence concern, but overstate patients' concern about falling. Proxies who lived with patients and those who more often see patients more closely reflected patient FES scores compared to those who lived apart or those who saw patients less often. Internal consistency reliability of proxy responses was 0.62 for the SF-12, 0.86 for the I-QOL, and 0.93 for the FES. In addition, construct validity of the proxy FES scale was supported by greater proxy-perceived fear of falling for patients who received medical care after a fall during the past 12 months (p Conclusion Caution should be exercised when using proxies as a source of information about older patients' health perceptions

  17. The willed blindness of humans

    DEFF Research Database (Denmark)

    Gjerris, Mickey

    2012-01-01

    This paper describes how we seem to live in a willed blindness towards the effects that our meat production and consumption have on animals, the environment and the climate. It is a willed blindness that cannot be explained by either lack of knowledge or scientific uncertainty. The blindness...... enables us to see ourselves as moral beings although our lack of reaction to the effects of our actions tells another story. The consequences, especially to animal welfare are outlined and it is briefly discussed whether a solution lies in a new moral vision of our obligations or a new vision of what...

  18. [Borderline blindness, practical blindness and severe visual debility].

    Science.gov (United States)

    Sedivý, A

    1998-04-01

    In the presented paper the author explains assessment aspect of social welfare departments as regard evaluation of complete of practical blindness with reference to generally blinding legal regulations. The author draws attention to another interpretation not consistent with these regulations, in chapter 26 of the Compendium of Ophthalmology (Grada 1997) and recommends ophthalmologists to use a procedure which will prevent imminent difficulties which could arise as a result of the interpretation in chapter 26 of the Compendium.

  19. Maximizing biomarker discovery by minimizing gene signatures

    Directory of Open Access Journals (Sweden)

    Chang Chang

    2011-12-01

    Full Text Available Abstract Background The use of gene signatures can potentially be of considerable value in the field of clinical diagnosis. However, gene signatures defined with different methods can be quite various even when applied the same disease and the same endpoint. Previous studies have shown that the correct selection of subsets of genes from microarray data is key for the accurate classification of disease phenotypes, and a number of methods have been proposed for the purpose. However, these methods refine the subsets by only considering each single feature, and they do not confirm the association between the genes identified in each gene signature and the phenotype of the disease. We proposed an innovative new method termed Minimize Feature's Size (MFS based on multiple level similarity analyses and association between the genes and disease for breast cancer endpoints by comparing classifier models generated from the second phase of MicroArray Quality Control (MAQC-II, trying to develop effective meta-analysis strategies to transform the MAQC-II signatures into a robust and reliable set of biomarker for clinical applications. Results We analyzed the similarity of the multiple gene signatures in an endpoint and between the two endpoints of breast cancer at probe and gene levels, the results indicate that disease-related genes can be preferably selected as the components of gene signature, and that the gene signatures for the two endpoints could be interchangeable. The minimized signatures were built at probe level by using MFS for each endpoint. By applying the approach, we generated a much smaller set of gene signature with the similar predictive power compared with those gene signatures from MAQC-II. Conclusions Our results indicate that gene signatures of both large and small sizes could perform equally well in clinical applications. Besides, consistency and biological significances can be detected among different gene signatures, reflecting the

  20. Carbon and hydrogen isotope composition of plant biomarkers as proxies for precipitation changes across Heinrich Events in the subtropics

    Science.gov (United States)

    Arnold, T. E.; Freeman, K.; Brenner, M.; Diefendorf, A. F.

    2014-12-01

    Lake Tulane is a relatively deep (~23 m) solution lake in south-central Florida. Its depth and location on a structural high, the Lake Wales Ridge, enabled continuous lacustrine sediment accumulation over the past >60,000 years. Pollen in the lake sediments indicate repeated major shifts in the vegetation community, with six peaks in Pinus (pine) abundance that coincide with the most intense cold phases of Dansgaard-Oeschger cycles and the Heinrich events that terminate them. Alternating with Pinus peaks are zones with high relative percentages of Quercus (oak), Ambrosia (ragweed), Lyonia (staggerbush) and Ceratiola (rosemary) pollen, genera that today occupy the most xeric sites on the Florida landscape. This suggests the pollen record indicates the Pinus phases, and therefore Heinrich Events, were wetter than the intervening Quercus phases. To test the connection between Heinrich Events and precipitation in Florida, we analyzed the carbon (δ13C) and hydrogen (δD) isotope signatures of plant biomarkers extracted from the Lake Tulane sediment core as proxies of paleohydrology. The δ13C of plant biomarkers, such as n-alkanes and terpenoids, are determined, in part, by changes in water-use efficiency (WUE = Assimilation/Transpiration) in plant communities, which changes in response to shifts in mean annual precipitation. Plant δ13C values can, therefore, provide a rough indication of precipitation changes when other factors, such as plant community, are relatively stable throughout time. Paleohydrology is also recorded in the δD of plant leaf waxes, which are strongly controlled by precipitation δD. In this region, precipitation δD is negatively correlated with rainfall amount (i.e. the "amount" effect) and positively correlated with aridity. Thus, the δ13C and δD signatures of molecular plant biomarkers provide relative indicators of precipitation change, and when combined, provide a test of our hypothesis that vegetation changes in this region are driven

  1. 75 FR 9073 - Amendments to Rules Requiring Internet Availability of Proxy Materials

    Science.gov (United States)

    2010-02-26

    ... an Internet Web site; it is not intended to serve as a stand-alone basis for making a voting decision... Exchange Commission 17 CFR Parts 230 and 240 Amendments to Rules Requiring Internet Availability of Proxy... Rules Requiring Internet Availability of Proxy Materials AGENCY: Securities and Exchange Commission...

  2. Improving age-depth models using sedimentary proxies for accumulation rates in fluvio-lacustrine deposits

    NARCIS (Netherlands)

    Minderhoud, P.S.J.; Cohen, K.M.|info:eu-repo/dai/nl/185633374; Toonen, W.H.J.|info:eu-repo/dai/nl/317725505; Erkens, G.|info:eu-repo/dai/nl/323349382; Hoek, W.Z.|info:eu-repo/dai/nl/163819394

    2017-01-01

    Lacustrine fills, including those of oxbow lakes in river floodplains, often hold valuable sedimentary and biological proxy records of palaeo-environmental change. Precise dating of accumulated sediments at levels throughout these records is crucial for interpretation and correlation of (proxy) data

  3. 47 CFR 51.513 - Proxies for forward-looking economic cost.

    Science.gov (United States)

    2010-10-01

    ... SERVICES (CONTINUED) INTERCONNECTION Pricing of Elements § 51.513 Proxies for forward-looking economic cost... a cost study that complies with the forward-looking economic cost based pricing methodology... rates that apply in separate geographic areas in a state. (c) Proxies for specific elements—(1) Local...

  4. Diagnostic, Explanatory, and Detection Models of Munchausen by Proxy: Extrapolations from Malingering and Deception

    Science.gov (United States)

    Rogers, Richard

    2004-01-01

    Objective: The overriding objective is a critical examination of Munchausen syndrome by proxy (MSBP) and its closely-related alternative, factitious disorder by proxy (FDBP). Beyond issues of diagnostic validity, assessment methods and potential detection strategies are explored. Methods: A painstaking analysis was conducted of the MSBP and FDBP…

  5. Anxiety and worry when coping with cancer treatment: agreement between patient and proxy responses.

    Science.gov (United States)

    Hermont, Ana Paula; Scarpelli, Ana Carolina; Paiva, Saul M; Auad, Sheyla M; Pordeus, Isabela A

    2015-06-01

    Assess agreement between proxy respondents (caregivers) and children/adolescents related to the impact of cancer on children's/adolescents' health-related quality of life, with respect to anxiety and worry issues. A cross-sectional study was conducted among 83 Brazilian children/adolescents, of both genders, diagnosed with cancer, aged 5-18 years and their proxy respondents. Anxiety and worry were assessed through items of the instrument Pediatric Quality of Life Inventory™ Cancer Module Scale. Participants were recruited from the pediatric hematology/oncology centers at two public hospitals. All individuals were receiving medical care. Descriptive statistics were performed as well as a weighted kappa coefficient, Spearman's correlation coefficient, Wilcoxon signed-rank test and Bland-Altman plots. The magnitude of the difference between the mean scores obtained from children/adolescents and that of their proxy respondents was evaluated through effect size. The proxy respondents underestimated the feelings of worry among children (8-12 years) (p anxiety (p children/adolescents to report increasing feelings of worry as they got older. In the 'treatment anxiety' subscale, there was a tendency for proxy respondents to present higher mean scores, revealing that proxy respondents believed the children's/adolescents' treatment anxiety decreased as they aged. Discrepancies between the reports of children/adolescents and their proxy respondents were observed. Children's/adolescents' reports should not be ignored nor replaced by proxy reports; both reports should be analyzed together.

  6. Patient-rated versus proxy-rated cognitive and functional measures in older adults

    Directory of Open Access Journals (Sweden)

    Howland M

    2017-03-01

    Full Text Available Molly Howland,1 Kevin C Allan,1 Caitlin E Carlton,1 Curtis Tatsuoka,2–4 Kathleen A Smyth,3 Martha Sajatovic1,2,4,5 1Case Western Reserve University School of Medicine, 2Neurological and Behavioral Outcomes Center, University Hospitals Case Medical Center, 3Department of Epidemiology and Biostatistics, 4Department of Neurology, 5Department of Psychiatry, Case Western Reserve University School of Medicine, Cleveland, OH, USA Objectives: Patients with cognitive impairment may have difficulty reporting their functional and cognitive abilities, which are important clinical outcomes. Health care proxies may be able to corroborate patient self-reports. Several studies reported discrepancy between patient and proxy ratings, though the literature is sparse on changes over time of these ratings. Our goals in this 12-month study were to compare patient and proxy reports on functioning, cognition, and everyday executive function, and to further elucidate correlates of patient–proxy discrepancy. Methods: This was a prospective cohort study of individuals older than 70 years who ranged from having no cognitive impairment to having moderate dementia who had a proxy available to complete instruments at baseline (N=76. Measurements included Alzheimer’s Disease Cooperative Study–Activities of Daily Living Inventory (ADCS-ADLI, Neuro-QOL Executive Function, PROMIS Applied Cognition (PROMIS-Cog, Mini-Mental State Examination (MMSE, and Geriatric Depression Scale. Results: Patient- and proxy-rated ADCS-ADLI were correlated at baseline and at 1-year follow-up. Patient and proxy ratings were discrepant on Neuro-QOL Executive Function and PROMIS-Cog. Greater patient–proxy discrepancy on PROMIS-Cog was associated with younger age and less depression, and greater patient–proxy discrepancy on Neuro-QOL Executive Function was associated with less depression and worse cognitive impairment. Patient–proxy discrepancy increased over time for everyday executive

  7. Nutritional blindness in developing countries

    Directory of Open Access Journals (Sweden)

    Elna Gross

    1997-02-01

    Full Text Available Of the world's estimated forty two million blind population ninety percent live in the Southern countries. *Please note: This is a reduced version of the abstract. Please refer to PDF for full text.

  8. Nutritional blindness in developing countries

    OpenAIRE

    Elna Gross

    1997-01-01

    Of the world's estimated forty two million blind population ninety percent live in the Southern countries. *Please note: This is a reduced version of the abstract. Please refer to PDF for full text.

  9. Pseudo-proxy evaluation of climate field reconstruction methods of North Atlantic climate based on an annually resolved marine proxy network

    Science.gov (United States)

    Pyrina, Maria; Wagner, Sebastian; Zorita, Eduardo

    2017-10-01

    Two statistical methods are tested to reconstruct the interannual variations in past sea surface temperatures (SSTs) of the North Atlantic (NA) Ocean over the past millennium based on annually resolved and absolutely dated marine proxy records of the bivalve mollusk Arctica islandica. The methods are tested in a pseudo-proxy experiment (PPE) setup using state-of-the-art climate models (CMIP5 Earth system models) and reanalysis data from the COBE2 SST data set. The methods were applied in the virtual reality provided by global climate simulations and reanalysis data to reconstruct the past NA SSTs using pseudo-proxy records that mimic the statistical characteristics and network of Arctica islandica. The multivariate linear regression methods evaluated here are principal component regression and canonical correlation analysis. Differences in the skill of the climate field reconstruction (CFR) are assessed according to different calibration periods and different proxy locations within the NA basin. The choice of the climate model used as a surrogate reality in the PPE has a more profound effect on the CFR skill than the calibration period and the statistical reconstruction method. The differences between the two methods are clearer for the MPI-ESM model due to its higher spatial resolution in the NA basin. The pseudo-proxy results of the CCSM4 model are closer to the pseudo-proxy results based on the reanalysis data set COBE2. Conducting PPEs using noise-contaminated pseudo-proxies instead of noise-free pseudo-proxies is important for the evaluation of the methods, as more spatial differences in the reconstruction skill are revealed. Both methods are appropriate for the reconstruction of the temporal evolution of the NA SSTs, even though they lead to a great loss of variance away from the proxy sites. Under reasonable assumptions about the characteristics of the non-climate noise in the proxy records, our results show that the marine network of Arctica islandica can

  10. Pseudo-proxy evaluation of climate field reconstruction methods of North Atlantic climate based on an annually resolved marine proxy network

    Directory of Open Access Journals (Sweden)

    M. Pyrina

    2017-10-01

    Full Text Available Two statistical methods are tested to reconstruct the interannual variations in past sea surface temperatures (SSTs of the North Atlantic (NA Ocean over the past millennium based on annually resolved and absolutely dated marine proxy records of the bivalve mollusk Arctica islandica. The methods are tested in a pseudo-proxy experiment (PPE setup using state-of-the-art climate models (CMIP5 Earth system models and reanalysis data from the COBE2 SST data set. The methods were applied in the virtual reality provided by global climate simulations and reanalysis data to reconstruct the past NA SSTs using pseudo-proxy records that mimic the statistical characteristics and network of Arctica islandica. The multivariate linear regression methods evaluated here are principal component regression and canonical correlation analysis. Differences in the skill of the climate field reconstruction (CFR are assessed according to different calibration periods and different proxy locations within the NA basin. The choice of the climate model used as a surrogate reality in the PPE has a more profound effect on the CFR skill than the calibration period and the statistical reconstruction method. The differences between the two methods are clearer for the MPI-ESM model due to its higher spatial resolution in the NA basin. The pseudo-proxy results of the CCSM4 model are closer to the pseudo-proxy results based on the reanalysis data set COBE2. Conducting PPEs using noise-contaminated pseudo-proxies instead of noise-free pseudo-proxies is important for the evaluation of the methods, as more spatial differences in the reconstruction skill are revealed. Both methods are appropriate for the reconstruction of the temporal evolution of the NA SSTs, even though they lead to a great loss of variance away from the proxy sites. Under reasonable assumptions about the characteristics of the non-climate noise in the proxy records, our results show that the marine network of Arctica

  11. Health-related quality of life after stroke: reliability of proxy responses

    DEFF Research Database (Denmark)

    Muus, Ingrid; Petzold, Max; Ringsberg, Karin C

    2009-01-01

    A Danish version of the Stroke-Specific Quality of Life Scale (SSQOL-DK) has been developed for self-reporting; it contains 12 physical and psychosocial domains. The purpose of this study was (a) to assess the reliability of the proxy version of the SSQOL-DK and (b) to evaluate the influence...... of frequency of proxy contact on agreement. In all, 143 patients completed the SSQOL-DK 1 to 5 years post-stroke. A patient chosen proxy completed a proxy version of the same questionnaire. The proxy version showed satisfactory internal consistency (Cronbach's alpha = .85-.95). Agreement was generally high...... of the SSQOL-DK appears to be reliable for use with stroke patients up to a few years following a stroke....

  12. Simple pendulum for blind students

    Science.gov (United States)

    Goncalves, A. M. B.; Cena, C. R.; Alves, D. C. B.; Errobidart, N. C. G.; Jardim, M. I. A.; Queiros, W. P.

    2017-09-01

    Faced with the need to teach physics to the visually impaired, in this paper we propose a way to demonstrate the dependence of distance and time in a pendulum experiment to blind students. The periodic oscillation of the pendulum is translated, by an Arduino and an ultrasonic sensor, in a periodic variation of frequency in a speaker. The main advantage of this proposal is the possibility that a blind student understands the movement without necessity of touching it.

  13. Bilepton signatures at the LHC

    Science.gov (United States)

    Corcella, Gennaro; Corianò, Claudio; Costantini, Antonio; Frampton, Paul H.

    2017-10-01

    We discuss the main signatures of the Bilepton Model at the Large Hadron Collider, focusing on its gauge boson sector. The model is characterised by five additional gauge bosons, four charged and one neutral, beyond those of the Standard Model, plus three exotic quarks. The latter turn into ordinary quarks with the emission of bilepton doublets (Y++ ,Y+) and (Y- ,Y-) of lepton number L = - 2 and L = + 2 respectively, with the doubly-charged bileptons decaying into same-sign lepton pairs. We perform a phenomenological analysis investigating processes with two doubly-charged bileptons and two jets at the LHC and find that, setting suitable cuts on pseudorapidities and transverse momenta of final-states jets and leptons, the model yields a visible signal and the main Standard Model backgrounds can be suppressed. Compared to previous studies, our investigation is based on a full Monte Carlo implementation of the model and accounts for parton showers, hadronization and an actual jet-clustering algorithm for both signal and Standard Model background, thus providing an optimal framework for an actual experimental search.

  14. Epigenetic Signatures of Cigarette Smoking.

    Science.gov (United States)

    Joehanes, Roby; Just, Allan C; Marioni, Riccardo E; Pilling, Luke C; Reynolds, Lindsay M; Mandaviya, Pooja R; Guan, Weihua; Xu, Tao; Elks, Cathy E; Aslibekyan, Stella; Moreno-Macias, Hortensia; Smith, Jennifer A; Brody, Jennifer A; Dhingra, Radhika; Yousefi, Paul; Pankow, James S; Kunze, Sonja; Shah, Sonia H; McRae, Allan F; Lohman, Kurt; Sha, Jin; Absher, Devin M; Ferrucci, Luigi; Zhao, Wei; Demerath, Ellen W; Bressler, Jan; Grove, Megan L; Huan, Tianxiao; Liu, Chunyu; Mendelson, Michael M; Yao, Chen; Kiel, Douglas P; Peters, Annette; Wang-Sattler, Rui; Visscher, Peter M; Wray, Naomi R; Starr, John M; Ding, Jingzhong; Rodriguez, Carlos J; Wareham, Nicholas J; Irvin, Marguerite R; Zhi, Degui; Barrdahl, Myrto; Vineis, Paolo; Ambatipudi, Srikant; Uitterlinden, André G; Hofman, Albert; Schwartz, Joel; Colicino, Elena; Hou, Lifang; Vokonas, Pantel S; Hernandez, Dena G; Singleton, Andrew B; Bandinelli, Stefania; Turner, Stephen T; Ware, Erin B; Smith, Alicia K; Klengel, Torsten; Binder, Elisabeth B; Psaty, Bruce M; Taylor, Kent D; Gharib, Sina A; Swenson, Brenton R; Liang, Liming; DeMeo, Dawn L; O'Connor, George T; Herceg, Zdenko; Ressler, Kerry J; Conneely, Karen N; Sotoodehnia, Nona; Kardia, Sharon L R; Melzer, David; Baccarelli, Andrea A; van Meurs, Joyce B J; Romieu, Isabelle; Arnett, Donna K; Ong, Ken K; Liu, Yongmei; Waldenberger, Melanie; Deary, Ian J; Fornage, Myriam; Levy, Daniel; London, Stephanie J

    2016-10-01

    DNA methylation leaves a long-term signature of smoking exposure and is one potential mechanism by which tobacco exposure predisposes to adverse health outcomes, such as cancers, osteoporosis, lung, and cardiovascular disorders. To comprehensively determine the association between cigarette smoking and DNA methylation, we conducted a meta-analysis of genome-wide DNA methylation assessed using the Illumina BeadChip 450K array on 15 907 blood-derived DNA samples from participants in 16 cohorts (including 2433 current, 6518 former, and 6956 never smokers). Comparing current versus never smokers, 2623 cytosine-phosphate-guanine sites (CpGs), annotated to 1405 genes, were statistically significantly differentially methylated at Bonferroni threshold of Psmoking-related traits in genome-wide studies including pulmonary function, cancers, inflammatory diseases, and heart disease. Comparing former versus never smokers, 185 of the CpGs that differed between current and never smokers were significant Psmoking cessation. Transcriptomic integration identified effects on gene expression at many differentially methylated CpGs. Cigarette smoking has a broad impact on genome-wide methylation that, at many loci, persists many years after smoking cessation. Many of the differentially methylated genes were novel genes with respect to biological effects of smoking and might represent therapeutic targets for prevention or treatment of tobacco-related diseases. Methylation at these sites could also serve as sensitive and stable biomarkers of lifetime exposure to tobacco smoke. © 2016 American Heart Association, Inc.

  15. Metabolomic signature of brain cancer.

    Science.gov (United States)

    Pandey, Renu; Caflisch, Laura; Lodi, Alessia; Brenner, Andrew J; Tiziani, Stefano

    2017-11-01

    Despite advances in surgery and adjuvant therapy, brain tumors represent one of the leading causes of cancer-related mortality and morbidity in both adults and children. Gliomas constitute about 60% of all cerebral tumors, showing varying degrees of malignancy. They are difficult to treat due to dismal prognosis and limited therapeutics. Metabolomics is the untargeted and targeted analyses of endogenous and exogenous small molecules, which charact erizes the phenotype of an individual. This emerging "omics" science provides functional readouts of cellular activity that contribute greatly to the understanding of cancer biology including brain tumor biology. Metabolites are highly informative as a direct signature of biochemical activity; therefore, metabolite profiling has become a promising approach for clinical diagnostics and prognostics. The metabolic alterations are well-recognized as one of the key hallmarks in monitoring disease progression, therapy, and revealing new molecular targets for effective therapeutic intervention. Taking advantage of the latest high-throughput analytical technologies, that is, nuclear magnetic resonance (NMR) spectroscopy and mass spectrometry (MS), metabolomics is now a promising field for precision medicine and drug discovery. In the present report, we review the application of metabolomics and in vivo metabolic profiling in the context of adult gliomas and paediatric brain tumors. Analytical platforms such as high-resolution (HR) NMR, in vivo magnetic resonance spectroscopic imaging and high- and low-resolution MS are discussed. Moreover, the relevance of metabolic studies in the development of new therapeutic strategies for treatment of gliomas are reviewed. © 2017 Wiley Periodicals, Inc.

  16. Magnetic record associated with tree ring density: Possible climate proxy

    Directory of Open Access Journals (Sweden)

    Pruner Petr

    2007-03-01

    Full Text Available Abstract A magnetic signature of tree rings was tested as a potential paleo-climatic indicator. We examined wood from sequoia tree, located in Mountain Home State Forest, California, whose tree ring record spans over the period 600 – 1700 A.D. We measured low and high-field magnetic susceptibility, the natural remanent magnetization (NRM, saturation isothermal remanent magnetization (SIRM, and stability against thermal and alternating field (AF demagnetization. Magnetic investigation of the 200 mm long sequoia material suggests that magnetic efficiency of natural remanence may be a sensitive paleoclimate indicator because it is substantially higher (in average >1% during the Medieval Warm Epoch (700–1300 A.D. than during the Little Ice Age (1300–1850 A.D. where it is

  17. Millennial reconstructions: what can we learn from limited proxy data?

    Science.gov (United States)

    Annan, J. D.; Hargreaves, J. C.

    2011-12-01

    Reconstructions of the past millennium can help us to understand recent and future climate change, by placing the recent anthropogenically-forced changes in the context of natural variability. Proxy data prior to the instrumental era are, however, extremely limited, which raises the question of how well we can truly hope to understand the past. Until recently, temperature reconstructions over the past millennium have primarily used statistical regression-based methods, however approaches using data assimilation methodology (in which observational data are blended with dynamical climate models) have shown great potential and are being increasingly adopted. However, rigorous validation of these methods has been somewhat limited. Here we will present the results of some investigations into the performance, and the potential, of data assimilation approaches to estimate the climate state. We use a massive ensemble of the LOVECLIM model to generate precise results which (through being formally optimal) may be considered an upper bound on the performance of more realistic approaches. We show that the limited precision and volume of data places a severe constraint on our ability to reliably reconstruct past climate variability, especially prior to the middle of the last millennium.

  18. Identification of climatic state with limited proxy data

    Directory of Open Access Journals (Sweden)

    J. D. Annan

    2012-07-01

    Full Text Available We investigate the identifiability of the climate by limited proxy data. We test a data assimilation approach through perfect model pseudoproxy experiments, using a simple likelihood-based weighting based on the particle filtering process. Our experimental set-up enables us to create a massive 10 000-member ensemble at modest computational cost, thus enabling us to generate statistically robust results. We find that the method works well when data are sparse and imprecise, but in this case the reconstruction has a rather low accuracy as indicated by residual RMS errors. Conversely, when data are relatively plentiful and accurate, the estimate tracks the target closely, at least when considering the hemispheric mean. However, in this case, our prior ensemble size of 10 000 appears to be inadequate to correctly represent the true posterior, and the regional performance is poor. Using correlations to assess performance gives a more encouraging picture, with significant correlations ranging from about 0.3 when data are sparse to values over 0.7 when data are plentiful, but the residual RMS errors are substantial in all cases. Our results imply that caution is required in interpreting climate reconstructions, especially when considering the regional scale, as skill on this basis is markedly lower than on the large scale of hemispheric mean temperature.

  19. Medieval horse stable; the results of multi proxy interdisciplinary research.

    Science.gov (United States)

    Dejmal, Miroslav; Lisá, Lenka; Fišáková Nývltová, Miriam; Bajer, Aleš; Petr, Libor; Kočár, Petr; Kočárová, Romana; Nejman, Ladislav; Rybníček, Michal; Sůvová, Zdenka; Culp, Randy; Vavrčík, Hanuš

    2014-01-01

    A multi proxy approach was applied in the reconstruction of the architecture of Medieval horse stable architecture, the maintenance practices associated with that structure as well as horse alimentation at the beginning of 13th century in Central Europe. Finally, an interpretation of the local vegetation structure along Morava River, Czech Republic is presented. The investigated stable experienced two construction phases. The infill was well preserved and its composition reflects maintenance practices. The uppermost part of the infill was composed of fresh stabling, which accumulated within a few months at the end of summer. Horses from different backgrounds were kept in the stable and this is reflected in the results of isotope analyses. Horses were fed meadow grasses as well as woody vegetation, millet, oat, and less commonly hemp, wheat and rye. Three possible explanations of stable usage are suggested. The stable was probably used on a temporary basis for horses of workers employed at the castle, courier horses and horses used in battle.

  20. Music Therapy by Proxy: Using Humanised Images in Song

    Directory of Open Access Journals (Sweden)

    Carol Chambers

    2013-07-01

    Full Text Available Developing awareness, exploration and expression of emotionally sensitive issues can be difficult for some clients in music therapy. They may find it hard to express emotion through improvised music and may turn instead to the perceived security of the repetition of known songs.This paper presents the results from a completed research PhD, a qualitative case study based on naturalistic clinical practice, which examined the song choices of one woman in a medium-secure forensic unit over the three-year course of her music therapy. A descriptive narrative account was subjected to analysis according to a modified form of therapeutic narrative analysis (Aldridge and Aldridge 2002, resulting in the abstraction of a series of generative metaphoric images, framed within a chronological series of events. Crucially, these images were found to be humanised figures, yet they were also emotionally decentred or depersonalised. When approached from the philosophical and methodological perspective of behaviourism, which views these as conditioned responses associating music with life experiences as part of a process of developing self-identity, such images can be seen to provide an unspoken voice for the client’s feelings to be expressed in a manner that is personally revealing, socially acceptable, culturally accessible and therapeutically constructive.I assert that using these third-person characters as a form of proxy facilitates mutual reference and experimentation, and places music firmly at the heart of a socially constructed process of music therapy.

  1. A Rare Reason of Hyperinsulinism: Munchausen Syndrome by Proxy.

    Science.gov (United States)

    Akın, Onur; Yeşilkaya, Ediz; Sari, Erkan; Akar, Çağdaş; Başbozkurt, Gökalp; Macit, Enis; Aydin, Ibrahim; Taşlipinar, Abdullah; Gül, Hüsamettin

    2016-01-01

    Hyperinsulinism, one of the most important causes of hypoglycaemia, can be congenital or acquired. Rarely, drug toxicity can be a reason for hyperinsulinism. In the context of Munchausen syndrome by proxy (MSP), toxicity usually occurs in children due to drug administration by a parent or caregiver. A 7-year-old girl was referred to our department due to a hyperglycaemic period and hypoglycaemic episodes. On admission, gliclazide was initiated due to her hyperglycaemia, which we attributed to maturity onset diabetes of the young. However, during follow-up, hypoglycaemic levels were detected. Despite cessation of gliclazide, hypoglycaemic seizures occurred. Even with the medications administered, hypoglycaemia could not be prevented. During follow-up, the mother's affect, characterized by anxiety and interest in her daughter's medical care, appeared discordant with the situation. Due to our suspicion of MSP, we discovered toxic levels of gliclazide in the blood and urine samples which had been sent to the toxicology laboratory to search for hypoglycaemic agents. The patient was isolated, and all medications were stopped. After isolation, her hypoglycaemia disappeared, and she became hyperglycaemic (250 mg/dl). Physicians should consider the possibility of MSP in hyperinsulinaemic patients with discordant laboratory results and clinical symptoms, even if the child's parents display great concern. © 2016 S. Karger AG, Basel.

  2. Munchausen syndrome by proxy mimicking as Gaucher disease.

    Science.gov (United States)

    Al-Owain, Mohammed; Al-Zaidan, Hamad; Al-Hashem, Amal; Kattan, Hoda; Al-Dowaish, Abdullah

    2010-08-01

    Although rare, Munchausen syndrome by proxy (MBP) is a potentially life-threatening form of child abuse. Here, we report a 19-month-old female infant who presented with hepatosplenomegaly, anemia, thrombocytopenia, and recurrent septicemia. She was initially thought to have myelodysplastic syndrome. Further hematological and immunological investigations revealed no cause. beta-Glucosylceramidase enzyme activity on dried blood spot was suggestive of Gaucher disease. However, the enzyme level on cultured skin fibroblast was not consistent with Gaucher disease. The first hint about MBP was the recurrent sepsis with numerous gram negative rods. Furthermore, the mother's behavior and health history raised our suspicion about MBP. The child showed significant improvement after she was separated from the mother for a week. Finally, the mother confessed that she was spitting in local herbs and injecting it into the central line. This is, to our knowledge, the first report of MBP resembling in its presentation Gaucher disease. This case should alert the general and specialized pediatricians about MBP, as it may mimic metabolic diseases like Gaucher disease.

  3. Severe hypernatremia in a hospitalized child: munchausen by proxy.

    Science.gov (United States)

    Su, Erik; Shoykhet, Michael; Bell, Michael J

    2010-10-01

    An 8-week-old infant presented to a referring institution with profuse diarrhea and infectious enteritis for 1 week. He was initially treated for suspected Salmonella spp. sepsis and meningitis, because the organism was found in the stool, but the child's illness progressed, manifested by paroxysmal profuse diarrhea and increased urine output. After several weeks, he suffered a sagittal venous thrombosis and intracranial hemorrhage. Subsequently the child was transferred to a tertiary center for intestinal evaluation. The patient's diarrhea and excessive diuresis resolved, and his sodium normalized soon after transfer. Four days later, however, after his mother arrived, he immediately developed severe hypernatremia (serum sodium concentration [Na(+)] = 214 mEq/L), with resumption of diarrhea and excessive diuresis. A gastric aspirate during the crisis demonstrated an extremely high sodium content, [Na(+)] = 1416 mEq/L, consistent with salt intoxication. Surveillance of the mother revealed that she manipulated the indwelling nasogastric tube; confronted, she admitted to salt administration. This case describes one of the ways that Munchausen syndrome by proxy can manifest with profound neurologic sequelae, and highlights the need for close observation and swift intervention when sufficient cause is present. Copyright © 2010 Elsevier Inc. All rights reserved.

  4. Cognitive-Behavioral Therapy for Body Dysmorphic Disorder by Proxy.

    Science.gov (United States)

    Greenberg, Jennifer L; Mothi, Suraj Sarvode; Wilhelm, Sabine

    2016-07-01

    Body dysmorphic disorder (BDD) is a distressing or impairing preoccupation with a perceived defect in physical appearance. BDD by proxy (BDDBP) is a significant but understudied variant of BDD in which the primary preoccupation involves perceived imperfections of another person. Like BDD, individuals with BDDBP engage in time-consuming rituals to "fix" the other person's appearance or alleviate distress. Avoidance is common and the impact of BDDBP on social functioning is profound. Cognitive-behavioral therapy (CBT) is the best-studied and most promising psychological treatment for BDD, but no studies have examined its generalizability to the BDDBP variant. We tested feasibility, acceptability, and treatment outcome of CBT modified for BDDBP in a sample of 6 adults with primary BDDBP. Treatment was delivered in weekly individual sessions over 12-20weeks. Mean symptom severity (BDDBP-YBOCS) dropped from the moderately severe range at pretreatment to the subclinical range at posttreatment, t(6)=10.7, p<.001, d=3.3. One hundred percent of treatment completers were responders (≥30% reduction in BDDBP-YBOCS). Insight also improved. Treatment gains were maintained at 3-month follow-up. To our knowledge, this represents the first treatment study for BDDBP. Copyright © 2016. Published by Elsevier Ltd.

  5. Reduction of a Ship's Magnetic Field Signatures

    CERN Document Server

    Holmes, John

    2008-01-01

    Decreasing the magnetic field signature of a naval vessel will reduce its susceptibility to detonating naval influence mines and the probability of a submarine being detected by underwater barriers and maritime patrol aircraft. Both passive and active techniques for reducing the magnetic signatures produced by a vessel's ferromagnetism, roll-induced eddy currents, corrosion-related sources, and stray fields are presented. Mathematical models of simple hull shapes are used to predict the levels of signature reduction that might be achieved through the use of alternate construction materials. Al

  6. A brief intervention for preparing ICU families to be proxies: A phase I study.

    Science.gov (United States)

    Turnbull, Alison E; Chessare, Caroline M; Coffin, Rachel K; Needham, Dale M

    2017-01-01

    Family members of critically ill patients report high levels of conflict with clinicians, have poor understanding of prognosis, struggle to make decisions, and experience substantial symptoms of anxiety, depression, and post-traumatic stress regardless of patient survival status. Efficient interventions are needed to prepare these families to act as patient proxies. To assess a brief "patient activation" intervention designed to set expectations and prepare families of adult intensive care unit (ICU) patients to communicate effectively with the clinical team. Phase I study of acceptability and immediate side effects. 122 healthcare proxies of 111 consecutive patients with a stay of ≥24 hours in the Johns Hopkins Hospital Medical ICU (MICU), in Baltimore, Maryland. Reading aloud to proxies from a booklet (Flesch-Kincard reading grade level 3.8) designed with multidisciplinary input including from former MICU proxies. Enrolled proxies had a median age of 51 years old with 83 (68%) female, and 55 (45%) African-American. MICU mortality was 18%, and 37 patients (33%) died in hospital or were discharged to hospice. Among proxies 98% (95% CI: 94% - 100%) agreed or strongly agreed that the intervention was appropriate, 98% (95% CI: 92% - 99%) agreed or strongly agreed that it is important for families to know the information in the booklet, and 54 (44%, 95% CI 35%- 54%) agreed or strongly agreed that parts of the booklet are upsetting. Upset vs. non-upset proxies were not statistically or substantially different in terms of age, sex, education level, race, relation to the patient, or perceived decision-making authority. This patient activation intervention was acceptable and important to nearly all proxies. Frequently, the intervention was simultaneously rated as both acceptable/important and upsetting. Proxies who rated the intervention as upsetting were not identifiable based on readily available proxy or patient characteristics.

  7. A Multi-Component Proxy for OH Variability Measured from Space: Evaluation and Evolution

    Science.gov (United States)

    Murray, L. T.; Fiore, A. M.; Valin, L. C.

    2014-12-01

    Observed changes in the decay rate of methyl chloroform (MCF; CH3CCl3) have been the traditional top-down constraint for variability in tropospheric abundances of the hydroxyl radical (OH), and thereby the oxidative capacity of the atmosphere. However, as atmospheric MCF concentrations approach detection limits following its ban under the Montréal Protocol, it is necessary to identify new proxies for global OH and its variability. We present here a novel proxy for tropospheric OH using convolved observations of total and tropospheric columns of ozone, water vapor, NO2, and CO, available from the Aura and Aqua satellites in the NASA Earth Observing System constellation. Derived from photochemical steady-state assumptions, the satellite proxy generates spatiotemporally coherent monthly percent anomalies in column OH for Oct. 2004 through Sept. 2012. We demonstrate that the temporal evolution of the globally integrated signal is statistically consistent with changes inferred by the MCF decay rate during this period. The magnitude of interannual variability in the satellite OH proxy is smaller than that from MCF, more consistent with global chemical transport models (CTMs). We evaluate the proxy by comparing to 9-year hind-cast simulations of the GEOS-Chem global CTM driven by MERRA reanalysis meteorology at 2° x 2.5° horizontal resolution, and find that the satellite proxy correlates with the airmass-weighted tropospheric monthly mean OH anomalies (R = 0.6; n = 96 months). The satellite proxy and model simulations indicate regional-scale coherent OH anomalies for many regions and seasons; where discrepancies occur, we highlight possible causes. We present a source attribution of the spatial and temporal patterns in the satellite OH proxy, informed by the individual components of the satellite proxy, a series of zero-emission sensitivity simulations with GEOS-Chem, and independent proxies for major modes of climate variability.

  8. A brief intervention for preparing ICU families to be proxies: A phase I study.

    Directory of Open Access Journals (Sweden)

    Alison E Turnbull

    Full Text Available Family members of critically ill patients report high levels of conflict with clinicians, have poor understanding of prognosis, struggle to make decisions, and experience substantial symptoms of anxiety, depression, and post-traumatic stress regardless of patient survival status. Efficient interventions are needed to prepare these families to act as patient proxies.To assess a brief "patient activation" intervention designed to set expectations and prepare families of adult intensive care unit (ICU patients to communicate effectively with the clinical team.Phase I study of acceptability and immediate side effects.122 healthcare proxies of 111 consecutive patients with a stay of ≥24 hours in the Johns Hopkins Hospital Medical ICU (MICU, in Baltimore, Maryland.Reading aloud to proxies from a booklet (Flesch-Kincard reading grade level 3.8 designed with multidisciplinary input including from former MICU proxies.Enrolled proxies had a median age of 51 years old with 83 (68% female, and 55 (45% African-American. MICU mortality was 18%, and 37 patients (33% died in hospital or were discharged to hospice. Among proxies 98% (95% CI: 94% - 100% agreed or strongly agreed that the intervention was appropriate, 98% (95% CI: 92% - 99% agreed or strongly agreed that it is important for families to know the information in the booklet, and 54 (44%, 95% CI 35%- 54% agreed or strongly agreed that parts of the booklet are upsetting. Upset vs. non-upset proxies were not statistically or substantially different in terms of age, sex, education level, race, relation to the patient, or perceived decision-making authority.This patient activation intervention was acceptable and important to nearly all proxies. Frequently, the intervention was simultaneously rated as both acceptable/important and upsetting. Proxies who rated the intervention as upsetting were not identifiable based on readily available proxy or patient characteristics.

  9. Programs for the Deaf-Blind.

    Science.gov (United States)

    American Annals of the Deaf, 1991

    1991-01-01

    This directory lists contact information for programs for the deaf-blind in the United States in 3 categories: (1) programs for deaf-blind children and youth (29 programs listed); (2) Helen Keller National Center for Deaf-Blind Youth and Adults (1 national and 10 regional offices); and (3) programs for training teachers of the deaf-blind (4…

  10. Sleep disorders in children with blindness.

    Science.gov (United States)

    Leger, D; Prevot, E; Philip, P; Yence, C; Labaye, N; Paillard, M; Guilleminault, C

    1999-10-01

    To evaluate the frequency and type of sleep disorders seen in blind children compared with matched controls, a 42-item questionnaire was used on 156 children (77 blind children) ranging from 3 to 18 years of age. A total of 17.4% of blind children reported sleeping less than 7 hours per night on weekdays compared with 2.6% of controls, with blind children awakening much earlier. Blind children had more sleep complaints, and 13.4% of blind subjects had daily episodes of involuntary sleepiness compared with 1.3% of controls. Blindness has an impact on sleep and alertness that adds to the primary disability.

  11. Blindness in children: a worldwide perspective

    Directory of Open Access Journals (Sweden)

    Clare Gilber

    2007-06-01

    Full Text Available Many of the causes of childhood blindness are avoidable, being either preventable or treatable. Only three per cent of the world's blind population are children. However, because children have a lifetime of blindness ahead of them, the number of ‘blind person years’ resulting from blindness starting in childhood is second only to cataract. Controlling blindness in children is a priority of VISION 20203,4; however, as its causes differ from that of blindness in adults, different strategies, personnel, infrastructure, and equipment are required to combat it. There is also a greater urgency when managing children, as delays in treatment can lead to amblyopia (lazy eye.

  12. Congenital blindness is associated with large-scale reorganization of anatomical networks.

    Science.gov (United States)

    Hasson, Uri; Andric, Michael; Atilgan, Hicret; Collignon, Olivier

    2016-03-01

    Blindness is a unique model for understanding the role of experience in the development of the brain's functional and anatomical architecture. Documenting changes in the structure of anatomical networks for this population would substantiate the notion that the brain's core network-level organization may undergo neuroplasticity as a result of life-long experience. To examine this issue, we compared whole-brain networks of regional cortical-thickness covariance in early blind and matched sighted individuals. This covariance is thought to reflect signatures of integration between systems involved in similar perceptual/cognitive functions. Using graph-theoretic metrics, we identified a unique mode of anatomical reorganization in the blind that differed from that found for sighted. This was seen in that network partition structures derived from subgroups of blind were more similar to each other than they were to partitions derived from sighted. Notably, after deriving network partitions, we found that language and visual regions tended to reside within separate modules in sighted but showed a pattern of merging into shared modules in the blind. Our study demonstrates that early visual deprivation triggers a systematic large-scale reorganization of whole-brain cortical-thickness networks, suggesting changes in how occipital regions interface with other functional networks in the congenitally blind. Copyright © 2015 The Authors. Published by Elsevier Inc. All rights reserved.

  13. Planning to reduce childhood blindness in India

    Directory of Open Access Journals (Sweden)

    Dandona Lalit

    1998-01-01

    Full Text Available Reduction of blindness in children assumes particular significance since a blind child suffers from more blind-years than a blind adult. Estimates of the number of children blind in India and the causes of blindness are relatively crude as there are little reliable epidemiologic data. As a result of this, there is no organised approach to the control of childhood blindness in India. In order to address this issue, a workshop on childhood blindness was held at the L.V. Prasad Eye Institute, Hyderabad in November 1996. The aim of this workshop was to review available data, consider possible strategies, and make recommendations concerning the control of childhood blindness in India. These recommendations along with background information about childhood blindness are presented in this paper.

  14. Causes of blindness in blind unit of the school for the handicapped ...

    African Journals Online (AJOL)

    To describe the causes of blindness in pupils and staff in the blind unit of the School for the Handicapped in Kwara State. 2. To identify problems in the blind school and initiate intervention. All the blind or visually challenged people in the blind unit of the school for the handicapped were interviewed and examined using a ...

  15. Validation of AclarusDx™, a blood-based transcriptomic signature for the diagnosis of Alzheimer's disease.

    Science.gov (United States)

    Fehlbaum-Beurdeley, Pascale; Sol, Olivier; Désiré, Laurent; Touchon, Jacques; Dantoine, Thierry; Vercelletto, Martine; Gabelle, Audrey; Jarrige, Anne-Charlotte; Haddad, Raphaël; Lemarié, Jean Christophe; Zhou, Weiyin; Hampel, Harald; Einstein, Richard; Vellas, Bruno

    2012-01-01

    Biomarkers have gained an increased importance in the past years in helping physicians to diagnose Alzheimer's disease (AD). This study was designed to identify a blood-based, transcriptomic signature that can differentiate AD patients from control subjects. The performance of the signature was then evaluated for robustness in an independent blinded sample population. RNA was extracted from 177 blood samples (90 AD patients and 87 controls) and gene expression profiles were generated using the human Genome-Wide Splice Array™. These profiles were used to establish a signature to differentiate AD patients from controls. Subsequently, prediction results were optimized by establishing grey zone boundaries that discount prediction scores near the disease status threshold. Signature validation was then performed on a blinded independent cohort of 209 individuals (111 AD and 98 controls). The AclarusDx™ signature consists of 170 probesets which map to 136 annotated genes, a significant number of which are associated with inflammatory, gene expression, and cell death pathways. Additional signature genes are known to interact with pathways involved in amyloid and tau metabolism. The validation sample set, after removal of 45 individuals with prediction profile scores within the grey zone, consisted of 164 subjects. The AclarusDx™ performance on this validation cohort had a sensitivity of 81.3% (95% CI: [73.3%; 89.3%]); and a specificity of 67.1% (95% CI: [56.3%; 77.9%]). AclarusDx™ is a non-invasive blood-based transcriptomic test that, in combination with standard assessments, can provide physicians with objective information to support the diagnosis of AD.

  16. On imitation among young and blind children

    OpenAIRE

    Maria Rita Campello Rodrigues; Marcia Oliveira Moraes

    2016-01-01

    This article investigates the imitation among young and blind children. The survey was conducted as a mosaic in the time since the field considerations were taken from two areas: a professional experience with early stimulation of blind babies and a workshop with blind and low vision young between 13-18 years. By statingthe situated trace of knowledge, theresearch indicates that imitation among blind young people can be one of the ways of creating a common world among young blind and sighted ...

  17. Trace Metals, Rare Earths, Carbon and Pb Isotopes as Proxies of Environmental Catastrophe at the Permian - Triassic Boundary in Spiti Himalayas, India

    Science.gov (United States)

    Ghosh, N.; Basu, A. R.; Garzione, C. N.; Ghatak, A.; Bhargava, O. N.; Shukla, U. K.; Ahluwalia, A. D.

    2015-12-01

    Himalayan sediments from Spiti Valley, India preserve geochemical signatures of the Permian - Triassic (P-Tr) mass extinction in the Neo-Tethys Ocean. We integrate new sedimentological and fossil record with high-resolution geochemical-isotopic data from Spiti that reveals an ecological catastrophe of global proportions. Trace elements of U, Th, Nb, Ta, Zr, Hf, the rare earths (REE) and carbon, oxygen and lead isotopes measured across the P-Tr boundary in Spiti are used as proxies for evaluating abrupt changes in this continental shelf environment. δ13Corg excursions of 2.4‰ and 3.1‰ in Atargu and Guling P-Tr sections in Spiti Valley are associated with an abrupt fall of biological productivity while δ13Ccarb and δ18Ocarb record of these sediments shows effects of diagenesis. Here, the P-Tr boundary is compositionally distinct from the underlying Late Permian gray shales, as a partly gypsiferous ferruginous layer that allows additional geochemical-isotopic investigation of sedimentary sources. Conspicuous Ce - Eu anomalies in the light REE-enriched Late Permian shales reflect the source composition of the adjacent Panjal Trap basalts of Kashmir. An abrupt change of this source to continental crust is revealed by Nb - Ta and Zr - Hf anomalies at the P-Tr ferruginous layer and continuing through the overlying Early Triassic carbonate rocks. Pb concentration and isotope ratios of 206Pb/204Pb, 207Pb/204Pb and 208Pb/204Pb identify changes in the sedimentary element flux, distinguishing the Late Permian shales from the distinct siliciclastic continental crustal signature in the Early Triassic carbonates. These geochemical-isotopic constraints on the sedimentary geochemistry of one of the most critical transitions in geological record establish the utility of multi-proxy datasets for paleoenvironmental reconstructions.

  18. Electronic Signatures for Public Procurement across Europe

    Science.gov (United States)

    Ølnes, Jon; Andresen, Anette; Arbia, Stefano; Ernst, Markus; Hagen, Martin; Klein, Stephan; Manca, Giovanni; Rossi, Adriano; Schipplick, Frank; Tatti, Daniele; Wessolowski, Gesa; Windheuser, Jan

    The PEPPOL (Pan-European Public Procurement On-Line) project is a large scale pilot under the CIP programme of the EU, exploring electronic public procurement in a unified European market. An important element is interoperability of electronic signatures across borders, identified today as a major obstacle to cross-border procurement. PEPPOL will address use of signatures in procurement processes, in particular tendering but also post-award processes like orders and invoices. Signature policies, i.e. quality requirements and requirements on information captured in the signing process, will be developed. This as well as technical interoperability of e-signatures across Europe will finally be piloted in demonstrators starting late 2009 or early 2010.

  19. Magnetic Signature of Brushless Electric Motors

    National Research Council Canada - National Science Library

    Clarke, David

    2006-01-01

    Brushless electric motors are used in a number of underwater vehicles. When these underwater vehicles are used for mine clearance operations the magnetic signature of the brushless motors is important...

  20. Exploring the calcium isotope signature of

    NARCIS (Netherlands)

    Hippler, D.; Witbaard, R.; van Aken, H.M.; Buhl, D.; Immenhauser, A.

    2013-01-01

    The calcium-isotope composition (delta Ca-44/40) of the aragonitic bivalve Arctica islandica grown in laboratory and field cultures was investigated in terms of environmental and biological controls to explore its potential as a palaeoceanographic proxy. While we found no significant effect of

  1. The postprocessing of quantum digital signatures

    Science.gov (United States)

    Wang, Tian-Yin; Ma, Jian-Feng; Cai, Xiao-Qiu

    2017-01-01

    Many novel quantum digital signature proposals have been proposed, which can effectively guarantee the information-theoretic security of the signature for a singe bit against forging and denying. Using the current basic building blocks of signing a single bit, we give a new proposal to construct an entire protocol for signing a long message. Compared with the previous work, it can improve at least 33.33% efficiency.

  2. Signature for the shape of the universe

    Energy Technology Data Exchange (ETDEWEB)

    Gomero, G.I.; Reboucas, M.J.; Teixeira, A.F.F. [Centro Brasileiro de Pesquisas Fisicas (CBPF), Rio de Janeiro, RJ (Brazil)]. E-mail: german@cbpf.br; reboucas@cbpf.br; teixeira@cbpf.br

    2001-03-01

    If the universe has a nontrival shape (topology) the sky may show multiple correlated images of cosmic objects. These correlations can be counched in terms of distance correlations. We propose a statistical quantity which can be used to reveal the topological signature of any Roberston-Walker (RW) spacetime with nontrivial topology. We also show through computer-aided simulations how one can extract the topological signatures of flat elliptic and hyperbolic RW universes with nontrivial topology. (author)

  3. Signature-based store checking buffer

    Science.gov (United States)

    Sridharan, Vilas; Gurumurthi, Sudhanva

    2015-06-02

    A system and method for optimizing redundant output verification, are provided. A hardware-based store fingerprint buffer receives multiple instances of output from multiple instances of computation. The store fingerprint buffer generates a signature from the content included in the multiple instances of output. When a barrier is reached, the store fingerprint buffer uses the signature to verify the content is error-free.

  4. Peripheral Blood Signatures of Lead Exposure

    Science.gov (United States)

    LaBreche, Heather G.; Meadows, Sarah K.; Nevins, Joseph R.; Chute, John P.

    2011-01-01

    Background Current evidence indicates that even low-level lead (Pb) exposure can have detrimental effects, especially in children. We tested the hypothesis that Pb exposure alters gene expression patterns in peripheral blood cells and that these changes reflect dose-specific alterations in the activity of particular pathways. Methodology/Principal Finding Using Affymetrix Mouse Genome 430 2.0 arrays, we examined gene expression changes in the peripheral blood of female Balb/c mice following exposure to per os lead acetate trihydrate or plain drinking water for two weeks and after a two-week recovery period. Data sets were RMA-normalized and dose-specific signatures were generated using established methods of supervised classification and binary regression. Pathway activity was analyzed using the ScoreSignatures module from GenePattern. Conclusions/Significance The low-level Pb signature was 93% sensitive and 100% specific in classifying samples a leave-one-out crossvalidation. The high-level Pb signature demonstrated 100% sensitivity and specificity in the leave-one-out crossvalidation. These two signatures exhibited dose-specificity in their ability to predict Pb exposure and had little overlap in terms of constituent genes. The signatures also seemed to reflect current levels of Pb exposure rather than past exposure. Finally, the two doses showed differential activation of cellular pathways. Low-level Pb exposure increased activity of the interferon-gamma pathway, whereas high-level Pb exposure increased activity of the E2F1 pathway. PMID:21829687

  5. A Proxy Outcome Approach for Causal Effect in Observational Studies: A Simulation Study

    Directory of Open Access Journals (Sweden)

    Wenbin Liang

    2014-01-01

    Full Text Available Background. Known and unknown/unmeasured risk factors are the main sources of confounding effects in observational studies and can lead to false observations of elevated protective or hazardous effects. In this study, we investigate an alternative approach of analysis that is operated on field-specific knowledge rather than pure statistical assumptions. Method. The proposed approach introduces a proxy outcome into the estimation system. A proxy outcome possesses the following characteristics: (i the exposure of interest is not a cause for the proxy outcome; (ii causes of the proxy outcome and the study outcome are subsets of a collection of correlated variables. Based on these two conditions, the confounding-effect-driven association between the exposure and proxy outcome can then be measured and used as a proxy estimate for the effects of unknown/unmeasured confounders on the outcome of interest. Performance of this approach is tested by a simulation study, whereby 500 different scenarios are generated, with the causal factors of a proxy outcome and a study outcome being partly overlapped under low-to-moderate correlations. Results. The simulation results demonstrate that the conventional approach only led to a correct conclusion in 21% of the 500 scenarios, as compared to 72.2% for the alternative approach. Conclusion. The proposed method can be applied in observational studies in social science and health research that evaluates the health impact of behaviour and mental health problems.

  6. Simulated airplane headache: a proxy towards identification of underlying mechanisms.

    Science.gov (United States)

    Bui, Sebastian Bao Dinh; Petersen, Torben; Poulsen, Jeppe Nørgaard; Gazerani, Parisa

    2017-12-01

    Airplane Headache (AH) occurs during flights and often appears as an intense, short lasting headache during take-off or landing. Reports are limited on pathological mechanisms underlying the occurrence of this headache. Proper diagnosis and treatments would benefit from identification of potential pathways involved in AH pathogenesis. This study aimed at providing a simulated airplane headache condition as a proxy towards identification of its underlying mechanisms. Fourteen participants including 7 volunteers suffering from AH and 7 healthy matched controls were recruited after meeting the diagnostic and safety criteria based on an approved study protocol. Simulation of AH was achieved by entering a pressure chamber with similar characteristics of an airplane flight. Selected potential biomarkers including salivary prostaglandin E2 (PGE2), cortisol, facial thermo-images, blood pressure, pulse, and saturation pulse oxygen (SPO) were defined and values were collected before, during and after flight simulation in the pressure chamber. Salivary samples were analyzed with ELISA techniques, while data analysis and statistical tests were handled with SPSS version 22.0. All participants in the AH-group experienced a headache attack similar to AH experience during flight. The non-AH-group did not experience any headaches. Our data showed that the values for PGE2, cortisol and SPO were significantly different in the AH-group in comparison with the non-AH-group during the flight simulation in the pressure chamber. The pressure chamber proved useful not only to provoke AH-like attack but also to study potential biomarkers for AH in this study. PGE2, and cortisol levels together with SPO presented dysregulation during the simulated AH-attack in affected individuals compared with healthy controls. Based on these findings we propose to use pressure chamber as a model to induce AH, and thus assess new potential biomarkers for AH in future studies.

  7. Near coast sedimentary stratigraphy as a proxy for climatic instability

    Science.gov (United States)

    McLivenny, J.

    2009-04-01

    Several studies have indicated a link between climatic deterioration and dune stability (Wilson 2002, Issar 2003, Dawson et al 2004). The frequency and magnitude of storms have been cited as a key variable in the stability of large dune systems. For the stratigraphy of dune systems to act as a regional climatic proxy there must be a good regional relationship between known climatic events and regionally correlated stratigraphic changes. Dunnet Bay in Caithness, Northern Scotland was chosen as a study site to look at the relationship between dune stability and climatic change during the late Holocene in Northern Scotland. Dunnet Bay was chosen for its physical attributes which make it an excellent natural sediment trap. Tucked in between headlands which act as barriers to long-shore transport the predominant movement of sediment there is straight onshore, with only minor amounts being lost to the sea. The immediate back-dune stratigraphy, colloquially known as "links", provided evidence of peat formation and dune stability. Stratigraphy was mapped using traditional field techniques and ground penetrating radar. The cores consisted mostly of massive layers of sand interleaved with peat. Sand layers were dated with optically stimulated luminescence (OSL) and interpreted as reflecting high wind energy regimes transporting sand inland. Peat layers were C14 dated and taken as representing climatic stability. Stratigraphy was mapped using hand auguring, percussion coring, and open sections. Ground penetrating radar was also used to look at the continuity of key layers. OSL dating in two open sections showed dates obtained from the first section (1790 AD ±70, 53 BC ± 100, 300 BC ± 100, 400 BC ± 100) mapped to the top of the second section (1800 AD ± 100, 1500 BC ± 200, 2900 BC ± 300) which was consistent with stratigraphy increasing sediment thickness towards the centre of the bay. The results were consistent with acquired C14 dates from selected peat layers. Taken

  8. Using Resin-Based 3D Printing to Build Geometrically Accurate Proxies of Porous Sedimentary Rocks.

    Science.gov (United States)

    Ishutov, Sergey; Hasiuk, Franciszek J; Jobe, Dawn; Agar, Susan

    2017-09-28

    Three-dimensional (3D) printing is capable of transforming intricate digital models into tangible objects, allowing geoscientists to replicate the geometry of 3D pore networks of sedimentary rocks. We provide a refined method for building scalable pore-network models ("proxies") using stereolithography 3D printing that can be used in repeated flow experiments (e.g., core flooding, permeametry, porosimetry). Typically, this workflow involves two steps, model design and 3D printing. In this study, we explore how the addition of post-processing and validation can reduce uncertainty in the 3D-printed proxy accuracy (difference of proxy geometry from the digital model). Post-processing is a multi-step cleaning of porous proxies involving pressurized ethanol flushing and oven drying. Proxies are validated by: (1) helium porosimetry and (2) digital measurements of porosity from thin-section images of 3D-printed proxies. 3D printer resolution was determined by measuring the smallest open channel in 3D-printed "gap test" wafers. This resolution (400 µm) was insufficient to build porosity of Fontainebleau sandstone (∼13%) from computed tomography data at the sample's natural scale, so proxies were printed at 15-, 23-, and 30-fold magnifications to validate the workflow. Helium porosities of the 3D-printed proxies differed from digital calculations by up to 7% points. Results improved after pressurized flushing with ethanol (e.g., porosity difference reduced to ∼1% point), though uncertainties remain regarding the nature of sub-micron "artifact" pores imparted by the 3D printing process. This study shows the benefits of including post-processing and validation in any workflow to produce porous rock proxies. © 2017, National Ground Water Association.

  9. Facial Fracture-Associated Blindness.

    Science.gov (United States)

    Béogo, Rasmané; Coulibaly, Toua Antoine; Dolo, Mariam Traoré; Traoré, Ibraima; Ouattara, Balla; Diallo, Jean Wenceslas

    2018-02-12

    Yet uncommon, blindness is a potential associated injury of facial fractures. Epidemiology, mechanisms, fracture types, and outcome of facial fractures-associated blindness in a 10-year period are retrospectively reviewed. Out of 907 facial fractures patients, 10 had blindness, giving a frequency of 1.1%. There were 9 men and 1 woman whom age range was 6 to 59 years (mean: 31.2 years). Intentional injury patients were significantly the most at risk of blindness (P = 0.02). In all the patients, the fracture involved at least 1 of the orbit walls. Risk of blindness was significantly higher in naso-fronto-orbito-ethmoidal complex fractures (P = 0.03). The vision loss was recorded in 13 eyes (unilateral in 7 patients and bilateral in 3). Its predominant mechanism was a globe rupture or perforation, recorded in 8 eyes. A treatment with intention to improve the vision was attempted in 1 patient only. None of the patients had vision recovery. The findings of this study commend comprehensive ophthalmologic evaluation in any patient with an orbit wall fracture.

  10. Proxies of quality of life in metastatic colorectal cancer: analyses in the RECOURSE trial

    Science.gov (United States)

    Van Cutsem, Eric; Falcone, Alfredo; Garcia-Carbonero, Rocio; Komatsu, Yoshito; Pastorino, Alessandro; Peeters, Marc; Shimada, Yasuhiro; Yamazaki, Kentaro; Yoshino, Takayuki; Zaniboni, Alberto; Amellal, Nadia; Kanehisa, Akira; Winkler, Robert; Makris, Lukas; Mayer, Robert J; Ohtsu, Atsushi; Tabernero, Josep

    2017-01-01

    Background In the pivotal phase III, randomised, double-blind, placebo-controlled RECOURSE study, treatment with trifluridine/tipiracil was well tolerated and associated with prolonged progression-free and overall survival in patients with metastatic colorectal cancer (mCRC). There was no formal analysis of quality of life (QoL) in RECOURSE. The aim of the present analysis was to assess proxies of QoL during the RECOURSE treatment period, in terms of adverse events (AEs) likely to affect QoL and Eastern Cooperative Oncology Group performance status (ECOG PS). Patients and methods Enrolled patients had documented, previously treated (≥2 prior chemotherapy lines) mCRC and an ECOG PS of 0 or 1. Patients received best supportive care plus trifluridine/tipiracil 35 mg/m2 twice daily (n=534) or placebo (n=266) in a 28-day cycle. AEs analysed included nausea, vomiting, diarrhoea, dysgeusia and fatigue/asthenia. ECOG PS was determined at baseline, on day 1 of each treatment cycle, at treatment end and 30 days post-treatment discontinuation. Results AEs that affect QoL were more frequent in patients treated with trifluridine/tipiracil than placebo. Median treatment duration for patients experiencing at least one of these AEs was longer than that observed for the overall RECOURSE population (trifluridine/tipiracil: 12 vs 7 weeks; placebo: 10 vs 6 weeks). Versus placebo, the duration of most AEs was longer in trifluridine/tipiracil recipients; however, all AEs except nausea and vomiting occupied a lower proportion of the total treatment period. Of the patients who had their PS recorded at discontinuation, PS was maintained in 67% and 63% of trifluridine/tipiracil and placebo recipients, and 84% and 81% of the trifluridine/tipiracil and placebo patients remained at a PS of 0 or 1 at discontinuation. Conclusions Analysis of ECOG PS and AEs thought to affect QoL in the RECOURSE patient population suggests that trifluridine/tipiracil treatment does not result in a

  11. Country-specific chemical signatures of persistent environmental compounds in breast milk

    DEFF Research Database (Denmark)

    Krysiak-Baltyn, Konrad; Toppari, J.; Skakkebaek, N.E.

    2010-01-01

    Recent reports have confirmed a worldwide increasing trend of testicular cancer incidence, and a conspicuously high prevalence of this disease and other male reproductive disorders, including cryptorchidism and hypospadias, in Denmark. In contrast, Finland, a similarly industrialized Nordic country......, exhibits much lower incidences of these disorders. The reasons behind the observed trends are unexplained, but environmental endocrine disrupting chemicals (EDCs) that affect foetal testis development are probably involved. Levels of persistent chemicals in breast milk can be considered a proxy...... to compare exposure of mothers to this environmental mixture of EDCs. Using sophisticated, bioinformatic tools in our analysis, we reveal, for the first time, distinct country-specific chemical signatures of EDCs with Danes having generally higher exposure than Finns to persistent bioaccumulative chemicals...

  12. An efficient modified Elliptic Curve Digital Signature Algorithm | Kiros ...

    African Journals Online (AJOL)

    Many digital signatures which are based on Elliptic Curves Cryptography (ECC) have been proposed. Among these digital signatures, the Elliptic Curve Digital Signature Algorithm (ECDSA) is the widely standardized one. However, the verification process of ECDSA is slower than the signature generation process. Hence ...

  13. 21 CFR 11.70 - Signature/record linking.

    Science.gov (United States)

    2010-04-01

    ... and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ELECTRONIC RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.70 Signature/record linking. Electronic signatures and handwritten signatures executed to electronic records shall be linked to their respective...

  14. An ethical analysis of proxy and waiver of consent in critical care research

    DEFF Research Database (Denmark)

    Berg, Ronan M G; Møller, Kirsten; Rossel, Peter J. Hancke

    2013-01-01

    a substituted judgement by a close relative or friend, based on knowledge of patient's values, preferences, and view of life. For the consent to be genuine, the proxy must be informed of and understand three fundamental aspects of research practice: (1) that participation is voluntary and the consent can......It is a central principle in medical ethics that vulnerable patients are entitled to a degree of protection that reflects their vulnerability. In critical care research, this protection is often established by means of so-called proxy consent. Proxy consent for research participation constitutes...

  15. A Bivalve Proxy for Neogene Antarctic Shelf Marine Environments

    Science.gov (United States)

    Clark, N. A.; Williams, M.; Quilty, P. G.; Leng, M. J.; Zalasiewicz, J. A.; Smellie, J.; Dowsett, H. J.

    2012-12-01

    The Neogene shallow-marine successions of the Antarctic Peninsula and of the East Antarctic region preserve rich assemblages of bivalve molluscs. These bivalve molluscs provide a detailed record of palaeoseasonality in the chemical signature and morphology of their shells that can be used to assess sea temperatures and sea ice extent for the Antarctic shelf during the Pliocene. Analyses identify the following. 1) Neogene bivalves from James Ross Island, Antarctic Peninsula, comprise material of late Miocene through to late Pliocene age. Results identify warm (ca. 3-10 °C) early Pliocene sea temperatures, and cooler late Pliocene sea temperatures (ca. 0-4 °C), and flag a cooling trend which is consistent with the evolution of polar climate through this interval. 2) Neogene bivalves from the Larsemann Hills, East Antarctic, identify generally warmer than present sea temperatures (ca. 0-11 °C) in the early Pliocene consistent with data from other fossil groups of this age, including dolphins and silicoflagellates. The new data may provide significant ground truth for climate models assessing the Southern Ocean and Antarctic shelf climate.

  16. New treatments of hereditary blindness

    DEFF Research Database (Denmark)

    Bertelsen, Mette; Rosenberg, Thomas; Larsen, Michael

    2013-01-01

    Ongoing clinical trials are targeting several previously intractable hereditary causes of blindness of congenital, childhood or early adulthood onset, mainly in the optic nerve and retina. The intended stage of initiation of the new therapeutic approaches ranges from neonatal life and a structura......Ongoing clinical trials are targeting several previously intractable hereditary causes of blindness of congenital, childhood or early adulthood onset, mainly in the optic nerve and retina. The intended stage of initiation of the new therapeutic approaches ranges from neonatal life...... and a structurally intact retinal tissue to adult life with a complete loss of photoreceptors. It must be assumed that some of the trials will succeed in producing new therapies and action must be taken to refine and accelerate diagnostics and to preserve therapeutic potential in blind people....

  17. Does Twitter trigger bursts in signature collections?

    Science.gov (United States)

    Yamaguchi, Rui; Imoto, Seiya; Kami, Masahiro; Watanabe, Kenji; Miyano, Satoru; Yuji, Koichiro

    2013-01-01

    The quantification of social media impacts on societal and political events is a difficult undertaking. The Japanese Society of Oriental Medicine started a signature-collecting campaign to oppose a medical policy of the Government Revitalization Unit to exclude a traditional Japanese medicine, "Kampo," from the public insurance system. The signature count showed a series of aberrant bursts from November 26 to 29, 2009. In the same interval, the number of messages on Twitter including the keywords "Signature" and "Kampo," increased abruptly. Moreover, the number of messages on an Internet forum that discussed the policy and called for signatures showed a train of spikes. In order to estimate the contributions of social media, we developed a statistical model with state-space modeling framework that distinguishes the contributions of multiple social media in time-series of collected public opinions. We applied the model to the time-series of signature counts of the campaign and quantified contributions of two social media, i.e., Twitter and an Internet forum, by the estimation. We found that a considerable portion (78%) of the signatures was affected from either of the social media throughout the campaign and the Twitter effect (26%) was smaller than the Forum effect (52%) in total, although Twitter probably triggered the initial two bursts of signatures. Comparisons of the estimated profiles of the both effects suggested distinctions between the social media in terms of sustainable impact of messages or tweets. Twitter shows messages on various topics on a time-line; newer messages push out older ones. Twitter may diminish the impact of messages that are tweeted intermittently. The quantification of social media impacts is beneficial to better understand people's tendency and may promote developing strategies to engage public opinions effectively. Our proposed method is a promising tool to explore information hidden in social phenomena.

  18. Does Twitter trigger bursts in signature collections?

    Directory of Open Access Journals (Sweden)

    Rui Yamaguchi

    Full Text Available INTRODUCTION: The quantification of social media impacts on societal and political events is a difficult undertaking. The Japanese Society of Oriental Medicine started a signature-collecting campaign to oppose a medical policy of the Government Revitalization Unit to exclude a traditional Japanese medicine, "Kampo," from the public insurance system. The signature count showed a series of aberrant bursts from November 26 to 29, 2009. In the same interval, the number of messages on Twitter including the keywords "Signature" and "Kampo," increased abruptly. Moreover, the number of messages on an Internet forum that discussed the policy and called for signatures showed a train of spikes. METHODS AND FINDINGS: In order to estimate the contributions of social media, we developed a statistical model with state-space modeling framework that distinguishes the contributions of multiple social media in time-series of collected public opinions. We applied the model to the time-series of signature counts of the campaign and quantified contributions of two social media, i.e., Twitter and an Internet forum, by the estimation. We found that a considerable portion (78% of the signatures was affected from either of the social media throughout the campaign and the Twitter effect (26% was smaller than the Forum effect (52% in total, although Twitter probably triggered the initial two bursts of signatures. Comparisons of the estimated profiles of the both effects suggested distinctions between the social media in terms of sustainable impact of messages or tweets. Twitter shows messages on various topics on a time-line; newer messages push out older ones. Twitter may diminish the impact of messages that are tweeted intermittently. CONCLUSIONS: The quantification of social media impacts is beneficial to better understand people's tendency and may promote developing strategies to engage public opinions effectively. Our proposed method is a promising tool to explore

  19. Epidemiology of blindness in children.

    Science.gov (United States)

    Solebo, Ameenat Lola; Teoh, Lucinda; Rahi, Jugnoo

    2017-09-01

    An estimated 14 million of the world's children are blind. A blind child is more likely to live in socioeconomic deprivation, to be more frequently hospitalised during childhood and to die in childhood than a child not living with blindness. This update of a previous review on childhood visual impairment focuses on emerging therapies for children with severe visual disability (severe visual impairment and blindness or SVI/BL).For children in higher income countries, cerebral visual impairment and optic nerve anomalies remain the most common causes of SVI/BL, while retinopathy of prematurity (ROP) and cataract are now the most common avoidable causes. The constellation of causes of childhood blindness in lower income settings is shifting from infective and nutritional corneal opacities and congenital anomalies to more resemble the patterns seen in higher income settings. Improvements in maternal and neonatal health and investment in and maintenance of national ophthalmic care infrastructure are the key to reducing the burden of avoidable blindness. New therapeutic targets are emerging for childhood visual disorders, although the safety and efficacy of novel therapies for diseases such as ROP or retinal dystrophies are not yet clear. Population-based epidemiological research, particularly on cerebral visual impairment and optic nerve hypoplasia, is needed in order to improve understanding of risk factors and to inform and support the development of novel therapies for disorders currently considered 'untreatable'. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  20. Comparative assessment of predictions in ungauged basins – Part 3: Runoff signatures in Austria

    Directory of Open Access Journals (Sweden)

    A. Viglione

    2013-06-01

    Full Text Available This is the third of a three-part paper series through which we assess the performance of runoff predictions in ungauged basins in a comparative way. Whereas the two previous papers by Parajka et al. (2013 and Salinas et al. (2013 assess the regionalisation performance of hydrographs and hydrological extremes on the basis of a comprehensive literature review of thousands of case studies around the world, in this paper we jointly assess prediction performance of a range of runoff signatures for a consistent and rich dataset. Daily runoff time series are predicted for 213 catchments in Austria by a regionalised rainfall–runoff model and by Top-kriging, a geostatistical estimation method that accounts for the river network hierarchy. From the runoff time-series, six runoff signatures are extracted: annual runoff, seasonal runoff, flow duration curves, low flows, high flows and runoff hydrographs. The predictive performance is assessed in terms of the bias, error spread and proportion of unexplained spatial variance of statistical measures of these signatures in cross-validation (blind testing mode. Results of the comparative assessment show that, in Austria, the predictive performance increases with catchment area for both methods and for most signatures, it tends to increase with elevation for the regionalised rainfall–runoff model, while the dependence on climate characteristics is weaker. Annual and seasonal runoff can be predicted more accurately than all other signatures. The spatial variability of high flows in ungauged basins is the most difficult to estimate followed by the low flows. It also turns out that in this data-rich study in Austria, the geostatistical approach (Top-kriging generally outperforms the regionalised rainfall–runoff model.

  1. Enhanced Collaboration for Space Situational Awareness via Proxy Agents

    Science.gov (United States)

    Picciano, P.; Schurr, N.

    2012-09-01

    The call for dynamic partnerships demanded in the US. Space Policy confronts two formidable challenges. The first is evident in the lack of the adoption of technical innovations that could substantially enhance collaboration. The second category, and perhaps a greater impediment, involves organizational and social constraints that minimize information sharing. Compounding the technical challenges, the organizational barriers to collaboration present a different problem set. There is a culture in the space domain that predisposes most stakeholders to guard their information. Most owner/operators are reluctant to share asset data, whether experiencing an anomaly or just providing status updates. This is unfortunate, because the owner/operators generally have the most accurate and timely data pertaining to their satellite. Comprehensive Space Situational Awareness (SSA) requires the marshaling of disparate mission critical elements. The mission threads reliant on SSA are complex and often require analysis from a diverse team of experts with sophisticated systems and tools that may be dispersed across multiple entities including military, commercial, and public interests. Two significant trends are likely to further perpetuate this state of affairs: 1) the space environment continues to be more congested, contested, and competitive, and 2) further pressures to increase SSA Sharing with a greater number of stakeholders throughout the world. The challenge of delivering the right information to the right people, while protecting national security and privacy interests, is in need of an innovative solution. Our approach, entitled Space Collaboration via an Agent Network (SCAN), enables proxy software agents to represent stakeholders (as individuals and organizations) to enhance collaboration among various agency producers and consumers of space information The SCAN agent network will facilitate collaboration by identifying opportunities to collaborate, as well as optimize

  2. Apatite: a new redox proxy for silicic magmas?

    Science.gov (United States)

    Miles, Andrew; Graham, Colin; Hawkesworth, Chris; Gillespie, Martin; Bromiley, Geoff; Hinton, Richard

    2015-04-01

    Petrology, 89, 226-38. [2] Miles, A.J., Graham, C.M., Hawkesworth, C.J., Gillespie, M.R., Hinton, R.W., 2014, Mn in apatite: A new redox proxy for silicic magmas?: Geochimica et Cosmochimica Acta v. 132, p. 101-119.

  3. Hygroscopic growth and cloud droplet activation of xanthan gum as a proxy for marine hydrogels

    National Research Council Canada - National Science Library

    Dawson, K. W; Petters, M. D; Meskhidze, N; Petters, S. Suda; Kreidenweis, S. M

    2016-01-01

    .... Here we use xanthan gum (XG)—a bacterial biopolymer—as a proxy for marine hydrogels. Measurements were performed for pure XG particles and mixtures of XG with sodium chloride, calcium nitrate, and calcium carbonate...

  4. Middleware Proxy: A Request-Driven Messaging Broker For High Volume Data Distribution

    CERN Document Server

    Sliwinski, W; Dworak, A

    2014-01-01

    Nowadays, all major infrastructures and data centres (commercial and scientific) make an extensive use of the publish-subscribe messaging paradigm, which helps to decouple the message sender (publisher) from the message receiver (consumer). This paradigm is also heavily used in the CERN Accelerator Control system, in Proxy broker - critical part of the Controls Middleware (CMW) project. Proxy provides the aforementioned publish-subscribe facility and also supports execution of synchronous read and write operations. Moreover, it enables service scalability and dramatically reduces the network resources and overhead (CPU and memory) on publisher machine, required to serve all subscriptions. Proxy was developed in modern C++, using state of the art programming techniques (e.g. Boost) and following recommended software patterns for achieving low-latency and high concurrency. The outstanding performance of the Proxy infrastructure was confirmed during the last 3 years by delivering the high volume of LHC equipment...

  5. Youth proxy efficacy for fruit and vegetable availability varies by gender and socio-economic status.

    Science.gov (United States)

    Geller, Karly S; Dzewaltowski, David A

    2010-06-01

    The current study examined proxy efficacy, which was defined as youth's confidence to influence their parents to provide fruits and vegetables. The overall objective was to examine change in middle-school youth's proxy efficacy over time, and to determine if changes were moderated by gender and socio-economic status. Longitudinal cohort nested within schools. Eight middle schools located in urban, suburban and rural areas of a mid-western US state. Seven hundred and twelve youth followed across their 6th, 7th and 8th grade years. The sample was 51.8 % female, 30.5 % low socio-economic status and 89.5 % Caucasian, non-Hispanic. Males and lower socio-economic status youth were significantly lower in proxy efficacy at each assessment year compared with females and high socio-economic youth, respectively. Proxy efficacy to influence parents to provide fruits and vegetables may be an important construct to target in future interventions.

  6. Multiple water isotope proxy reconstruction of extremely low last glacial temperatures in Eastern Beringia (Western Arctic)

    NARCIS (Netherlands)

    Porter, Trevor J.; Froese, Duane G.; Feakins, Sarah J.; Bindeman, Ilya N.; Mahony, Matthew E.; Pautler, Brent G.; Reichart, Gert-Jan; Sanborn, Paul T.; Simpson, Myrna J.; Weijers, Johan W H

    2016-01-01

    Precipitation isotopes are commonly used for paleothermometry in high latitude regions. Here we present multiple water isotope proxies from the same sedimentary context - perennially frozen loess deposits in the Klondike Goldfields in central Yukon, Canada, representing parts of Marine Isotope

  7. Research on a New Signature Scheme on Blockchain

    Directory of Open Access Journals (Sweden)

    Chao Yuan

    2017-01-01

    Full Text Available With the rise of Bitcoin, blockchain which is the core technology of Bitcoin has received increasing attention. Privacy preserving and performance on blockchain are two research points in academia and business, but there are still some unresolved issues in both respects. An aggregate signature scheme is a digital signature that supports making signatures on many different messages generated by many different users. Using aggregate signature, the size of the signature could be shortened by compressing multiple signatures into a single signature. In this paper, a new signature scheme for transactions on blockchain based on the aggregate signature was proposed. It was worth noting that elliptic curve discrete logarithm problem and bilinear maps played major roles in our signature scheme. And the security properties of our signature scheme were proved. In our signature scheme, the amount will be hidden especially in the transactions which contain multiple inputs and outputs. Additionally, the size of the signature on transaction is constant regardless of the number of inputs and outputs that the transaction contains, which can improve the performance of signature. Finally, we gave an application scenario for our signature scheme which aims to achieve the transactions of big data on blockchain.

  8. Lattice-Based Revocable Certificateless Signature

    Directory of Open Access Journals (Sweden)

    Ying-Hao Hung

    2017-10-01

    Full Text Available Certificateless signatures (CLS are noticeable because they may resolve the key escrow problem in ID-based signatures and break away the management problem regarding certificate in conventional signatures. However, the security of the mostly previous CLS schemes relies on the difficulty of solving discrete logarithm or large integer factorization problems. These two problems would be solved by quantum computers in the future so that the signature schemes based on them will also become insecure. For post-quantum cryptography, lattice-based cryptography is significant due to its efficiency and security. However, no study on addressing the revocation problem in the existing lattice-based CLS schemes is presented. In this paper, we focus on the revocation issue and present the first revocable CLS (RCLS scheme over lattices. Based on the short integer solution (SIS assumption over lattices, the proposed lattice-based RCLS scheme is shown to be existential unforgeability against adaptive chosen message attacks. By performance analysis and comparisons, the proposed lattice-based RCLS scheme is better than the previously proposed lattice-based CLS scheme, in terms of private key size, signature length and the revocation mechanism.

  9. Human rights of children with intellectual disabilities: comparing self-ratings and proxy ratings.

    Science.gov (United States)

    Huus, K; Granlund, M; Bornman, J; Lygnegård, F

    2015-11-01

    A child rights-based approach to research articulates well with Article 12 of the United Nations Convention on the Rights of the Child (CRC) and highlights the importance and value of including children's own views about aspects that concern them. The aim of this study is to compare children with intellectual disability's own ratings (as self-raters) to those of their primary caregivers (as proxy raters) regarding human rights of children. The study also aims to establish whether there is an inter-rater agreement between the self-raters and proxy raters concerning Maslow's hierarchy of needs. This study is nested in a larger study examining the human rights of children with intellectual disability in South Africa. In total, 162 children with intellectual disability from 11 schools across three provinces and their primary caregivers participated by answering parts of a Children's Rights Questionnaire (CRQ) developed by the researchers based on the United Nation's CRC. We compared the answers for six questions in the questionnaire that were addressed to self-raters (children) and proxy raters (primary caregivers) in the same way. Questions regarding basic needs, such as access to clean water or whether the child had food to eat at home, were answered similarly by self-raters and proxy raters. Larger differences were found when self-raters and proxy raters were asked about whether the child had things or friends to play with at home. Socio-economic variables seemed to affect whether self-raters and proxy raters answered similarly. The results underscore the importance of promoting children's rights to express themselves by considering the opinions of both the children as self-raters and their primary caregivers as proxy raters - not only the latter. The results indicate that it is especially important to include children's own voices when more complex needs are surveyed. Agreement between self- and proxy ratings could be affected by socio-economic circumstances.

  10. Design and implementation of Ad-Hoc collaborative proxying scheme for reducing network energy waste

    OpenAIRE

    Rafiullah Khan; Sarmad Ullah Khan

    2017-01-01

    Network devices are equipped with low power states but they are rarely activated due to their inability of maintaining network connectivity. Recently, Network Connectivity Proxy (NCP) concept has been proposed in literature as an effective mechanism to exploit full potential of low power features on network devices by impersonating their virtual presence. However, the NCP concept faces several open issues and challenges especially related to proxying of TCP connections and majority of daily u...

  11. Similarity, agreement, and assumed similarity in proxy end-of-life decision making.

    Science.gov (United States)

    McDade-Montez, Elizabeth; Watson, David; Beer, Andrew

    2013-12-01

    Medical decisions near the end of life are often made by proxies who can be inaccurate in their judgments of patient preferences. Given that accuracy in surrogate decision making is an important goal in end-of-life decision making, and in light of that previously seen levels of accuracy reflect substantial disagreement, error, or both, this study examined both relationship and individual factors that potentially affect surrogate accuracy. Specifically, this study examined similarity, agreement, and assumed similarity-a process whereby raters use their own traits and preferences to rate another person-in spousal ratings of end-of-life treatment. This study expands on previous research by examining the potential influence of relationship factors and assumed similarity on end-of-life decision making among a sample of newlyweds. Newly married couples (n = 197) completed self and spouse measures of hypothetical end-of-life preferences and scales assessing marital satisfaction, personality, and attitudes. Results indicate a moderate level of similarity on husband and wife self-rated end-of-life treatment preferences (rs = .18-.29) and a moderate level of agreement between self and proxy ratings (rs = .17-.41). The largest correlations were seen between self ratings and proxy ratings (e.g., husband self ratings and husband proxy ratings of wife preferences, rs = .46-.69), reflecting strong assumed similarity in proxy ratings. For wives, similarity with husbands on a few attitudinal variables (i.e., spirituality, moral strictness, and conservatism) influenced proxy accuracy. Recognizing the potential impact of personal preferences on proxy ratings, as well as the potential influence of relationship factors, may help improve proxy accuracy and end-of-life care for patients and families.

  12. Contribution in Adaptating Web Interfaces to any Device on the Fly: The HCI Proxy

    Science.gov (United States)

    Lardon, Jérémy; Fayolle, Jacques; Gravier, Christophe; Ates, Mikaël

    2008-11-01

    Lot of work has been done on the adaptation of UIs. In the particular field of Web UI adaptation, many research projects aim at displaying web content designed for PCs on poorer supports. In this paper, we present previous work in the domain and then our proxy architecture, HCI proxy, to test solutions for the problem of adapting Web UIs for mobile phones, PDA and smartphones but also for TVs through browser-embedding STBs, and this on the fly.

  13. The suitability of Mytilus edulis as proxy archive and its response to ocean acidification

    OpenAIRE

    Heinemann, Agnes

    2011-01-01

    Past climate changes can be used as indicators of future scenarios, however past climatic changes can not be directly observed. Therefore, the reconstruction of past abiotic conditions can approximated using chemical or isotopic proxies. These proxies can be measured in natural archives (e.g. bivalve shells and coral skeletons). One aspect of current climate change is the acidification of the oceans, a phenomenon caused by the oceanic uptake of anthropogenic CO2 and a resulting shift in the m...

  14. Proxy-based Video Transmission: Error Resiliency, Resource Allocation, and Dynamic Caching

    OpenAIRE

    Tu, Wei

    2009-01-01

    In this dissertation, several approaches are proposed to improve the quality of video transmission over wired and wireless networks. To improve the robustness of video transmission over error-prone mobile networks, a proxy-based reference picture selection scheme is proposed. In the second part of the dissertation, rate-distortion optimized rate adaptation algorithms are proposed for video applications over congested network nodes. A segment-based proxy caching algorithm for video-on-demand a...

  15. Investigating The Reliability Of Solar Photospheric Eruptivity Proxies.

    Science.gov (United States)

    Guennou, C.; Pariat, E.; Vilmer, N.

    2016-12-01

    Solar flares and coronal mass ejections (CMEs) are among the most energetic events in the solar system, impacting the near-Earth environment and thus our technologies. The European H2020 research project FLARECAST (Flare Likelihood and Region Eruption Forecasting) aims to develop a fully automated solar flare forecasting system with unmatched accuracy compared to existing facilities. FLARECAST will automatically extract magnetic-field parameters of solar active regions from solar magnetogram and white-light images to produce accurate predictions using the state-of-the-art forecasting techniques based on data-mining and machine learning. Flare productivity is empirically known to be correlated with the size and complexity of active regions. Several parameters, based on magnetic-field data from active regions have been tested in recent years. None of these parameters, or combination of thereof, have yet demonstrated an unambiguous eruption criterion. However, the predictability of these parameters has so far only been tested on observational data and never on controlled-cases, e.g., originating from numerical datasets. In the framework of the FLARECAST explorative research component, we use MHD numerical simulations of the formation of stable and unstable magnetic flux ropes (Leake et al. 2013, 2014) to evaluate the predictive potential of different magnetic parameters. Time series of magnetograms are used from parametric simulations of stable and unstable flux emergence, to compute a list of about 111 different parameters. This list includes parameters previously used for forecasting, as well as parameters used for the first time for this purpose. Our results indicate that only parameters measuring the total non-potentiality of active regions, such as Lssm and Lsgm and WLsg and the total length of the inversion line present significant preflare signatures, probably making them successful flare predictors.

  16. Applying a family systems lens to proxy decision making in clinical practice and research.

    Science.gov (United States)

    Rolland, John S; Emanuel, Linda L; Torke, Alexia M

    2017-03-01

    When patients are incapacitated and face serious illness, family members must make medical decisions for the patient. Medical decision sciences give only modest attention to the relationships among patients and their family members, including impact that these relationships have on the decision-making process. A review of the literature reveals little effort to systematically apply a theoretical framework to the role of family interactions in proxy decision making. A family systems perspective can provide a useful lens through which to understand the dynamics of proxy decision making. This article considers the mutual impact of family systems on the processes and outcomes of proxy decision making. The article first reviews medical decision science's evolution and focus on proxy decision making and then reviews a family systems approach, giving particular attention to Rolland's Family Systems Illness Model. A case illustrates how clinical practice and how research would benefit from bringing family systems thinking to proxy decisions. We recommend including a family systems approach in medical decision science research and clinical practices around proxy decisions making. We propose that clinical decisions could be less conflicted and less emotionally troubling for families and clinicians if family systems approaches were included. This perspective opens new directions for research and novel approaches to clinical care. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  17. A method of separating local and large scale climate signals in coral proxies

    Science.gov (United States)

    Timm, O.; Ruprecht, E.; Pfeiffer, M.; Dullo, W.

    2003-04-01

    Coral proxies in the tropical and subtropical Indian Ocean show markedly different imprints of local climate factors. The oxygen isotopic composition (d18o) reflects a combination of SST and seawater properties. Both are the response to local effects and large scale climate variations in the oceans and the atmosphere, mainly due to air-sea fluxes. Consequently, an important step to large scale climate reconstructions from coral proxies is the separation of the individual local signal and the teleconnection with large scale climate modes such as the El Nino/Southern Oscillation (ENSO). The aim of this study is to present a method capable of extracting the large scale climate signal recorded in corals. Using multiple linear regression (MLR) techniques we first analyse the partial effects of local SST and precipitation minus evaporation on the coral d18o proxies. In a second step multivariate statistics are applied to the proxies and climate variables in order to distinguish between local signals and large scale variability in the proxies. Three d18o records from the Indian Ocean (Chagos, La Reunion, Seychelles) and the ENSO signal are used as an example demonstration. The method is also applied to Carribean corals (Guadeloupe). Preliminary results for the variability of these proxies and their relation to the North Atlantic Oscillation are given.

  18. Technical Note: Probabilistically constraining proxy age–depth models within a Bayesian hierarchical reconstruction model

    Directory of Open Access Journals (Sweden)

    J. P. Werner

    2015-03-01

    Full Text Available Reconstructions of the late-Holocene climate rely heavily upon proxies that are assumed to be accurately dated by layer counting, such as measurements of tree rings, ice cores, and varved lake sediments. Considerable advances could be achieved if time-uncertain proxies were able to be included within these multiproxy reconstructions, and if time uncertainties were recognized and correctly modeled for proxies commonly treated as free of age model errors. Current approaches for accounting for time uncertainty are generally limited to repeating the reconstruction using each one of an ensemble of age models, thereby inflating the final estimated uncertainty – in effect, each possible age model is given equal weighting. Uncertainties can be reduced by exploiting the inferred space–time covariance structure of the climate to re-weight the possible age models. Here, we demonstrate how Bayesian hierarchical climate reconstruction models can be augmented to account for time-uncertain proxies. Critically, although a priori all age models are given equal probability of being correct, the probabilities associated with the age models are formally updated within the Bayesian framework, thereby reducing uncertainties. Numerical experiments show that updating the age model probabilities decreases uncertainty in the resulting reconstructions, as compared with the current de facto standard of sampling over all age models, provided there is sufficient information from other data sources in the spatial region of the time-uncertain proxy. This approach can readily be generalized to non-layer-counted proxies, such as those derived from marine sediments.

  19. Convolutive Blind Source Separation Methods

    DEFF Research Database (Denmark)

    Pedersen, Michael Syskind; Larsen, Jan; Kjems, Ulrik

    2008-01-01

    During the past decades, much attention has been given to the separation of mixed sources, in particular for the blind case where both the sources and the mixing process are unknown and only recordings of the mixtures are available. In several situations it is desirable to recover all sources fro...

  20. Quantum mechanical stabilization of Minkowski signature wormholes

    Energy Technology Data Exchange (ETDEWEB)

    Visser, M.

    1989-05-19

    When one attempts to construct classical wormholes in Minkowski signature Lorentzian spacetimes violations of both the weak energy hypothesis and averaged weak energy hypothesis are encountered. Since the weak energy hypothesis is experimentally known to be violated quantum mechanically, this suggests that a quantum mechanical analysis of Minkowski signature wormholes is in order. In this note I perform a minisuperspace analysis of a simple class of Minkowski signature wormholes. By solving the Wheeler-de Witt equation for pure Einstein gravity on this minisuperspace the quantum mechanical wave function of the wormhole is obtained in closed form. The wormhole is shown to be quantum mechanically stabilized with an average radius of order the Planck length. 8 refs.

  1. Digital signature of electronic dental records.

    Science.gov (United States)

    Maruo, Ivan Toshio; Maruo, Hiroshi

    2012-05-01

    The purpose of this article is to examine the feasibility of digital signature technology to guarantee the legal validation of electronic dental records. The possible uses of digital signature technology, the actual use of digital signature technology to authenticate electronic dental records, the authentication of each part of the electronic dental record, the general legal principles involved, how to digitally sign electronic dental record files, and the limitations of this method are discussed. It is possible to obtain electronic dental records that carry the same legal certainty as conventional, nonelectronic records. For this purpose, each part of the electronic dental records should be digitally signed by the author of the document. Copyright © 2012 American Association of Orthodontists. Published by Mosby, Inc. All rights reserved.

  2. A Methodology for Calculating Radiation Signatures

    Energy Technology Data Exchange (ETDEWEB)

    Klasky, Marc Louis [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Wilcox, Trevor [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Bathke, Charles G. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); James, Michael R. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-05-01

    A rigorous formalism is presented for calculating radiation signatures from both Special Nuclear Material (SNM) as well as radiological sources. The use of MCNP6 in conjunction with CINDER/ORIGEN is described to allow for the determination of both neutron and photon leakages from objects of interest. In addition, a description of the use of MCNP6 to properly model the background neutron and photon sources is also presented. Examinations of the physics issues encountered in the modeling are investigated so as to allow for guidance in the user discerning the relevant physics to incorporate into general radiation signature calculations. Furthermore, examples are provided to assist in delineating the pertinent physics that must be accounted for. Finally, examples of detector modeling utilizing MCNP are provided along with a discussion on the generation of Receiver Operating Curves, which are the suggested means by which to determine detectability radiation signatures emanating from objects.

  3. Cryptanalysis of the arbitrated quantum signature protocols

    Energy Technology Data Exchange (ETDEWEB)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2011-08-15

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  4. Low Scale Gravity Signatures in ATLAS

    CERN Document Server

    Karagoz-Unel, M

    2008-01-01

    The ATLAS detector may reveal in the LHC collisions signatures of extra dimensional models which predict quantum gravity at the TeV scale. One of the most dramatic consequences of such models is the copious production of micro blackholes. Micro blackholes can yield distinct signatures with large multiplicity and large energy release in the ATLAS detector. Extra dimensional models also predict the existence of Kaluza-Klein partners of SM gauge bosons, such as the excited graviton and gluon. These particles can be searched for in their two-body decays. The emerging final state particles are highly energetic, thus requiring novel reconstruction techniques, in particular in the heavy quark (t, b) channels. I will summarize the current status of the low scale gravity studies in ATLAS with example signatures.

  5. A possible signature of annihilating dark matter

    Science.gov (United States)

    Chan, Man Ho

    2018-02-01

    In this article, we report a new signature of dark matter annihilation based on the radio continuum data of NGC 1569 galaxy detected in the past few decades. After eliminating the thermal contribution of the radio signal, an abrupt change in the spectral index is shown in the radio spectrum. Previously, this signature was interpreted as an evidence of convective outflow of cosmic ray. However, we show that the cosmic ray contribution is not enough to account for the observed radio flux. We then discover that if dark matter annihilates via the 4-e channel with the thermal relic cross-section, the electrons and positrons produced would emit a strong radio flux which can provide an excellent agreement with the observed signature. The best-fitting dark matter mass is 25 GeV.

  6. Ask a Scientist: What is Color Blindness?

    Medline Plus

    Full Text Available ... Illusions Printables Ask a Scientist Video Series Why can’t you see colors well in the dark? ... Miller answers questions about color blindness, whether it can be treated, and how people become color blind. ...

  7. Psychologica and social adjustment to blindness: Understanding ...

    African Journals Online (AJOL)

    Reporting Questionnaire (SRQ) and a pro forma designed by the authors to assess the psychosocial problems and risk factors in some blind people in Ilorin metropolis. Result: The study revealed that most of the blind people were reasonably ...

  8. Ask a Scientist: What is Color Blindness?

    Medline Plus

    Full Text Available ... to blinding eye diseases, visual disorders, mechanisms of visual function, preservation of sight, and the special health problems and requirements of the blind.” ... Health Information Frequently asked questions ...

  9. Blinding in randomized clinical trials: imposed impartiality

    DEFF Research Database (Denmark)

    Hróbjartsson, A; Boutron, I

    2011-01-01

    Blinding, or "masking," is a crucial method for reducing bias in randomized clinical trials. In this paper, we review important methodological aspects of blinding, emphasizing terminology, reporting, bias mechanisms, empirical evidence, and the risk of unblinding. Theoretical considerations...

  10. Ask a Scientist: What is Color Blindness?

    Medline Plus

    Full Text Available ... video series. Dr. Sheldon Miller answers questions about color blindness, whether it can be treated, and how people ... an optical illusion? Click to Watch What is color blindness? Click to Watch How do I become a ...

  11. Unchartered Course: Mothering the Blind Child.

    Science.gov (United States)

    Barton, Deborah D.

    1984-01-01

    The mother of a blind child describes her initial doubts about her caregiver role, reviews the rewards and difficulties in mainstreaming, and discusses the effects of his blindness on herself and her relations with family, friends, schools, and community. (CL)

  12. Peripheral blood signatures of lead exposure.

    Directory of Open Access Journals (Sweden)

    Heather G LaBreche

    Full Text Available BACKGROUND: Current evidence indicates that even low-level lead (Pb exposure can have detrimental effects, especially in children. We tested the hypothesis that Pb exposure alters gene expression patterns in peripheral blood cells and that these changes reflect dose-specific alterations in the activity of particular pathways. METHODOLOGY/PRINCIPAL FINDING: Using Affymetrix Mouse Genome 430 2.0 arrays, we examined gene expression changes in the peripheral blood of female Balb/c mice following exposure to per os lead acetate trihydrate or plain drinking water for two weeks and after a two-week recovery period. Data sets were RMA-normalized and dose-specific signatures were generated using established methods of supervised classification and binary regression. Pathway activity was analyzed using the ScoreSignatures module from GenePattern. CONCLUSIONS/SIGNIFICANCE: The low-level Pb signature was 93% sensitive and 100% specific in classifying samples a leave-one-out crossvalidation. The high-level Pb signature demonstrated 100% sensitivity and specificity in the leave-one-out crossvalidation. These two signatures exhibited dose-specificity in their ability to predict Pb exposure and had little overlap in terms of constituent genes. The signatures also seemed to reflect current levels of Pb exposure rather than past exposure. Finally, the two doses showed differential activation of cellular pathways. Low-level Pb exposure increased activity of the interferon-gamma pathway, whereas high-level Pb exposure increased activity of the E2F1 pathway.

  13. Poverty and blindness in Africa.

    Science.gov (United States)

    Naidoo, Kovin

    2007-11-01

    Africa carries a disproportionate responsibility in terms of blindness and visual impairment. With approximately 10 per cent of the world's population, Africa has 19 per cent of the world's blindness. It is no surprise that this reality also mirrors the situation in terms of the burden of world poverty. There is an increasing recognition of the need to highlight the link between poverty, development and health care. Blindness, disabling visual impairment and the overall lack of eye-care services are too often the result of social, economic and developmental challenges of the developing world. The state of eye care in Africa stands in alarming contrast to that in the rest of the world. Poor practitioner-to-patient ratios, absence of eye-care personnel, inadequate facilities, poor state funding and a lack of educational programs are the hallmarks of eye care in Africa, with preventable and treatable conditions being the leading cause of blindness. Eye diseases causing preventable blindness are often the result of a combination of factors such as poverty, lack of education and inadequate health-care services. The challenge that Vision 2020 has set itself in Africa is enormous. Africa is not a homogenous entity, the inter- and intra-country differences in economic development, prevalence of disease, delivery infrastructure and human resources amplify the challenges of meeting eye-care needs. The successful implementation of Vision 2020 programs will be hindered without the development of a comprehensive, co-ordinated strategy that is cognisant of the differences that exist and the need for comprehensive solutions that are rooted in the economic and political realities of the continent as well as the individual countries and regions within countries. This strategy should recognise the need for economic growth that results in greater state funded eye-care services that focus on health promotion to ensure the prevention of eye disease, the development of eye clinics in

  14. Tactile maze solving in congenitally blind individuals

    DEFF Research Database (Denmark)

    Gagnon, Léa; Kupers, Ron; Schneider, Fabien C

    2010-01-01

    Vision is undoubtedly important for navigation although not essential as blind individuals outperform their blindfolded seeing counterparts in a variety of navigational tasks. It is believed that the blind's superior performance is because of their efficient use of proprioceptive signals and envi......Vision is undoubtedly important for navigation although not essential as blind individuals outperform their blindfolded seeing counterparts in a variety of navigational tasks. It is believed that the blind's superior performance is because of their efficient use of proprioceptive signals...

  15. Transient thermal camouflage and heat signature control

    Science.gov (United States)

    Yang, Tian-Zhi; Su, Yishu; Xu, Weikai; Yang, Xiao-Dong

    2016-09-01

    Thermal metamaterials have been proposed to manipulate heat flux as a new way to cloak or camouflage objects in the infrared world. To date, however, thermal metamaterials only operate in the steady-state and exhibit detectable, transient heat signatures. In this letter, the theoretical basis for a thermal camouflaging technique with controlled transient diffusion is presented. This technique renders an object invisible in real time. More importantly, the thermal camouflaging device instantaneously generates a pre-designed heat signature and behaves as a perfect thermal illusion device. A metamaterial coating with homogeneous and isotropic thermal conductivity, density, and volumetric heat capacity was fabricated and very good camouflaging performance was achieved.

  16. Experimental quantum digital signature over 102 km

    Science.gov (United States)

    Yin, Hua-Lei; Fu, Yao; Liu, Hui; Tang, Qi-Jie; Wang, Jian; You, Li-Xing; Zhang, Wei-Jun; Chen, Si-Jing; Wang, Zhen; Zhang, Qiang; Chen, Teng-Yun; Chen, Zeng-Bing; Pan, Jian-Wei

    2017-03-01

    Quantum digital signature (QDS) is an approach to guarantee the nonrepudiation, unforgeability, and transferability of a signature with information-theoretical security. Previous experimental realizations of QDS relied on an unrealistic assumption of secure channels and the longest distance is several kilometers. Here, we have experimentally demonstrated a recently proposed QDS protocol without assuming any secure channel. Exploiting the decoy state modulation, we have successfully signed a one-bit message through an up to 102-km optical fiber. Furthermore, we continuously run the system to sign the longer message "USTC" with 32 bits at the distance of 51 km. Our results pave the way towards the practical application of QDS.

  17. State of the Art: Signature Biometrics Verification

    Directory of Open Access Journals (Sweden)

    Nourddine Guersi

    2010-04-01

    Full Text Available This paper presents a comparative analysis of the performance of three estimation algorithms: Expectation Maximization (EM, Greedy EM Algorithm (GEM and Figueiredo-Jain Algorithm (FJ - based on the Gaussian mixture models (GMMs for signature biometrics verification. The simulation results have shown significant performance achievements. The test performance of EER=5.49 % for "EM", EER=5.04 % for "GEM" and EER=5.00 % for "FJ", shows that the behavioral information scheme of signature biometrics is robust and has a discriminating power, which can be explored for identity authentication.

  18. Security problem on arbitrated quantum signature schemes

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Jeong Woon [Emerging Technology R and D Center, SK Telecom, Kyunggi 463-784 (Korea, Republic of); Chang, Ku-Young; Hong, Dowon [Cryptography Research Team, Electronics and Telecommunications Research Institute, Daejeon 305-700 (Korea, Republic of)

    2011-12-15

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  19. Cryptanalysis of the Quantum Group Signature Protocols

    Science.gov (United States)

    Zhang, Ke-Jia; Sun, Ying; Song, Ting-Ting; Zuo, Hui-Juan

    2013-11-01

    Recently, the researches of quantum group signature (QGS) have attracted a lot of attentions and some typical protocols have been designed for e-payment system, e-government, e-business, etc. In this paper, we analyze the security of the quantum group signature with the example of two novel protocols. It can be seen that both of them cannot be implemented securely since the arbitrator cannot solve the disputes fairly. In order to show that, some possible attack strategies, which can be used by the malicious participants, are proposed. Moreover, the further discussions of QGS are presented finally, including some insecurity factors and improved ideas.

  20. Teaching Manual Communication to a Blind Adult.

    Science.gov (United States)

    Orlansky, Michael D.

    1980-01-01

    A three-month project in which a blind hearing adult learned manual communication techniques for the deaf is reported. The instructional methods and reactions of teacher and student are presented. Finger spelling proved more useful than American Sign Language for the blind person as it enabled the blind user to follow English syntax. (PMJ)

  1. Occupant satisfaction with two blind control strategies

    DEFF Research Database (Denmark)

    Karlsen, Line Røseth; Heiselberg, Per Kvols; Bryn, Ida

    2015-01-01

    Highlights •Occupant satisfaction with two blind control strategies has been studied. •Control based on cut-off position of slats was more popular than closed slats. •Results from the study are helpful in development of control strategies for blinds. •The results give indications of how blinds...

  2. Reduced taste sensitivity in congenital blindness

    DEFF Research Database (Denmark)

    Gagnon, Lea; Kupers, Ron; Ptito, Maurice

    2013-01-01

    further indicate that blind subjects more strongly rely on internal hunger and satiety cues, instead of external contextual or emotional cues, to decide when and what to eat. We suggest that the lower taste sensitivity observed in congenitally blind individuals is due to various blindness...

  3. 37 REFRACTIVE ERROR BLINDNESS IN YENAGOA, BAYELSA ...

    African Journals Online (AJOL)

    blindness, while in India 7 with a prevalence of 0.21%, myopia was the commonest cause of blindness. Refractive error blindness has a profound effect on the quality of life of its sufferers leading to poor performance in schools and other career opportunities. It also reduces productivity in the workforce, creating enormous ...

  4. The Preschool Child Who is Blind.

    Science.gov (United States)

    Office of Child Development (DHEW), Washington, DC.

    The pamphlet contains general information and guidelines for parents of a preschool blind child. It is explained that a blind child needs what every child needs: love, good health, attention. Parents are urged to play with their blind child, give him opportunities to explore and grow, and to provide many and varied experiences for him. Although…

  5. Early Interactions with Children Who Are Deaf-Blind

    Science.gov (United States)

    ... Topics About Deaf-Blindness > What is Deaf-Blindness Definitions of Deaf-Blindness Causes of Deaf-Blindness National Child Count & Demographics Communication > Communication Overview Early Communication Prelinguistic Communication Object Communication ...

  6. BSEA: A Blind Sealed-Bid E-Auction Scheme for E-Commerce Applications

    Directory of Open Access Journals (Sweden)

    Rohit Kumar Das

    2016-12-01

    Full Text Available Due to an increase in the number of internet users, electronic commerce has grown significantly during the last decade. Electronic auction (e-auction is one of the famous e-commerce applications. Even so, security and robustness of e-auction schemes still remain a challenge. Requirements like anonymity and privacy of the b i d value are under threat from the attackers. Any auction protocol must not leak the anonymity and the privacy of the b i d value of an honest Bidder. Keeping these requirements in mind, we have firstly proposed a controlled traceable blind signature scheme (CTBSS because e-auction schemes should be able to trace the Bidders. Using CTBSS, a blind sealed-bid electronic auction scheme is proposed (BSEA. We have incorporated the notion of blind signature to e-auction schemes. Moreover, both the schemes are based upon elliptic curve cryptography (ECC, which provides a similar level of security with a comparatively smaller key size than the discrete logarithm problem (DLP based e-auction protocols. The analysis shows that BSEA fulfills all the requirements of e-auction protocol, and the total computation overhead is lower than the existing schemes.

  7. Blindness, cataract surgery and mortality in Ethiopia.

    Science.gov (United States)

    Thomas, Benjamin J; Sanders, David S; Oliva, Matthew S; Orrs, Mark S; Glick, Peter; Ruit, Sanduk; Chen, Wei; Luoto, Jill; Tasfaw, Alemu Kerie; Tabin, Geoffrey C

    2016-09-01

    To examine the relationships between blindness, the intervention of cataract surgery and all-cause mortality in a rural Ethiopian population. Population-based, interventional prospective study. Community-based detection methods identified blind Ethiopian persons from two selected kebeles in Amhara region, Ethiopia. Data from 1201 blind patients were collected-628 cataract-blind and 573 blind from other conditions. Free cataract surgery was provided for consenting, cataract-blind patients. Follow-up surveys were conducted after 12 months (±1 month)-the main outcome measure for this report is all-cause mortality at 1 year. During the follow-up period, 110 persons died from the selected population (mortality 9.2%), which consisted of those cataract-blind patients who received cataract surgery (N=461), cataract-blind patients who did not receive surgery (N=167) and all non-cataract-blind patients (N=573). Of the 461 patients who received cataract surgery, 44 patients died (9.5%). Of the 740 patients who did not receive surgery, 66 died (8.9%)-28 patients from the cohort of cataract-blind patients who did not receive surgery (16.8%) and 38 patients from the cohort of non-cataract blind (6.6%). Subgroup analysis revealed significantly increased odds of mortality for cataract-blind patients over 75 years of age who did not receive surgery and for unmarried patients of all age groups. In this population, mortality risk was significantly elevated for older cataract-blind patients when compared with non-cataract-blind patients-an elevation of risk that was not noted in an age-matched cohort of cataract-blind patients who underwent cataract surgery as early as 1-year follow-up. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  8. Does blindness influence trust? A comparative study on social trust among blind and sighted adults

    OpenAIRE

    Oleszkiewicz, Anna; Pisanski, Katarzyna; Sorokowska, Agnieszka

    2017-01-01

    Although blind individuals must often rely on others to navigate their physical environment, recent studies concerning differences between blind and sighted persons in attributing social traits to others based on nonvisual cues remain inconclusive. Here we examined whether blind and sighted individuals vary in their level of social trust in others. One hundred and twenty-four healthy men and women participated in the study, including 32 congenitally blind, 27 late blind, and 65 sighted adult ...

  9. The acoustic signature for intelligibility test words.

    Science.gov (United States)

    Weismer, G; Kent, R D; Hodge, M; Martin, R

    1988-10-01

    As part of a research program that aims to develop an explicit acoustic basis for a single-word intelligibility test, an initial attempt to characterize the formant trajectories and segment durations of seven test words produced by 30 normal speakers is described. These characterizations are referred to as "acoustic signatures." The data indicate that: (1) formant trajectories show two sex effects, namely, that females are more variable as a group than males and tend to have greater slopes for the transitional segment of the second-formant trajectories and that these effects are consistent across words; (2) Bark transformations of the frequency data do not seem to eliminate the interspeaker differences in formant trajectories, nor do they eliminate either of the sex effects described above; and (3) segment durations have different variabilities depending on the syllabic structure of the word; no sex effect was noted here. The discussion focuses on the appropriate form for the acoustic signatures, as well as factors that should be considered in selecting words for signature development. To demonstrate the potential application of these data, formant trajectory and segment duration data from 18 speakers with amyotrophic lateral sclerosis and varying degrees of dysarthria are compared to the acoustic signature for the word wax.

  10. Detection of proteolytic signatures for Parkinson's disease

    DEFF Research Database (Denmark)

    Jordal, Peter Lüttge; Dyrlund, Thomas F.; Winge, Kristian

    2016-01-01

    Aim: To investigate if idiopathic Parkinson's disease (IPD) is associated with distinct proteolytic signatures relative to non-neurodegenerative controls (NND) and patients with multiple system atrophy (MSA). Materials & methods: A subtiligase-based N-terminomics screening method was exploited...

  11. Molecular signatures of thyroid follicular neoplasia

    DEFF Research Database (Denmark)

    Borup, R.; Rossing, M.; Henao, Ricardo

    2010-01-01

    The molecular pathways leading to thyroid follicular neoplasia are incompletely understood, and the diagnosis of follicular tumors is a clinical challenge. To provide leads to the pathogenesis and diagnosis of the tumors, we examined the global transcriptome signatures of follicular thyroid...

  12. Negative obstacle detection by thermal signature

    Science.gov (United States)

    Matthies, Larry; Rankin, A.

    2003-01-01

    Detecting negative obstacles (ditches, potholes, and other depressions) is one of the most difficult problems in perception for autonomous, off-road navigation. Past work has largely relied on range imagery, because that is based on the geometry of the obstacle, is largely insensitive to illumination variables, and because there have not been other reliable alternatives. However, the visible aspect of negative obstacles shrinks rapidly with range, making them impossible to detect in time to avoid them at high speed. To relive this problem, we show that the interiors of negative obstacles generally remain warmer than the surrounding terrain throughout the night, making thermal signature a stable property for night-time negative obstacle detection. Experimental results to date have achieved detection distances 45% greater by using thermal signature than by using range data alone. Thermal signature is the first known observable with potential to reveal a deep negative obstacle without actually seeing far into it. Modeling solar illumination has potential to extend the usefulness of thermal signature through daylight hours.

  13. Exploring Signature Pedagogies in Undergraduate Leadership Education

    Science.gov (United States)

    Jenkins, Daniel M.

    2012-01-01

    This research explores the instructional strategies most frequently used by leadership educators who teach academic credit-bearing undergraduate leadership studies courses through a national survey and identifies signature pedagogies within the leadership discipline. Findings from this study suggest that class discussion--whether in the form of…

  14. SUSY with ATLAS Leptonic Signatures, Coannihilation Region

    CERN Document Server

    Comune, G

    2004-01-01

    In this work we present an initial study on how leptonic signatures can be used at ATLAS to constrain SUSY particle masses combinations for the first time in the so called "coannihilation region''. The analysis is carried out in the framework of mSUGRA constrained SUSY model using fast detector simulation and reconstruction exploiting an invariant mass endpoint technique.

  15. Practical Certificateless Aggregate Signatures From Bilinear Maps

    NARCIS (Netherlands)

    Gong, Zheng; Long, Yu; Hong, Xuan; Chen, Kefei

    2008-01-01

    In some restrictive environments, such as sensor networks, each sensor submits the newest information to the server, every message must be authenticated to immune forgery and replay attacks. But the regular signatures need to be saved and verified individually, which will heavily add the costs of

  16. BLIND SERBIAN RULERS AND FAMOUS PERSONS

    Directory of Open Access Journals (Sweden)

    Janicijevic Katarina

    2016-12-01

    Full Text Available History and medicine were an integral part of life-being of blind serbian acters. One of the main actors was half-blind serbian ruler, Stefan of Decani and whose name was associated with first ophthalmologic hospital and precursor of the eye`s injuries care. After, national reputation as Stefan Blind Righteous, ruler of the Serbian despot between 1458. and 1459. (member of Brankovic`s dinasty, and he was blinded by eye injuries burns. The famous national was also Filip Visnjic, as blind minstrel and authentic creator of serbian folk traditions, with sequels as a child, by bilateral infective panuveitis.

  17. Color blindness and Rorschach color responsivity.

    Science.gov (United States)

    Corsino, B V

    1985-10-01

    Color vision deficits occur in 10% of the American white male population. Thus, color blindness may invalidate diagnostic hypotheses generated from Rorschach data. The Rorschach protocols of 43 white, college male color-blind subjects were compared to the protocols of normally sighted controls. The color-blind group manifested fewer pure "C" responses. No significant between group differences emerged for any of the other primary Rorschach color variables. Pure "C" responses rarely figure prominently in Rorschach evaluations, and the apparent lowered frequency of these responses by the color-blind is insufficient to warrant modification of current Rorschach practice. The data suggest that color blindness is unlikely to confound Rorschach assessment.

  18. Blinding in randomized clinical trials: imposed impartiality

    DEFF Research Database (Denmark)

    Hróbjartsson, A; Boutron, I

    2011-01-01

    Blinding, or "masking," is a crucial method for reducing bias in randomized clinical trials. In this paper, we review important methodological aspects of blinding, emphasizing terminology, reporting, bias mechanisms, empirical evidence, and the risk of unblinding. Theoretical considerations...... and empirical analyses support the blinding of patients, health-care providers, and outcome assessors as to the trial intervention to which patients have been allocated. We encourage extensive pretrial testing of blinding procedures and explicit reporting of who was in the blinded condition and the methods used...

  19. Comparison of metagenomic samples using sequence signatures

    Directory of Open Access Journals (Sweden)

    Jiang Bai

    2012-12-01

    Full Text Available Abstract Background Sequence signatures, as defined by the frequencies of k-tuples (or k-mers, k-grams, have been used extensively to compare genomic sequences of individual organisms, to identify cis-regulatory modules, and to study the evolution of regulatory sequences. Recently many next-generation sequencing (NGS read data sets of metagenomic samples from a variety of different environments have been generated. The assembly of these reads can be difficult and analysis methods based on mapping reads to genes or pathways are also restricted by the availability and completeness of existing databases. Sequence-signature-based methods, however, do not need the complete genomes or existing databases and thus, can potentially be very useful for the comparison of metagenomic samples using NGS read data. Still, the applications of sequence signature methods for the comparison of metagenomic samples have not been well studied. Results We studied several dissimilarity measures, including d2, d2* and d2S recently developed from our group, a measure (hereinafter noted as Hao used in CVTree developed from Hao’s group (Qi et al., 2004, measures based on relative di-, tri-, and tetra-nucleotide frequencies as in Willner et al. (2009, as well as standard lp measures between the frequency vectors, for the comparison of metagenomic samples using sequence signatures. We compared their performance using a series of extensive simulations and three real next-generation sequencing (NGS metagenomic datasets: 39 fecal samples from 33 mammalian host species, 56 marine samples across the world, and 13 fecal samples from human individuals. Results showed that the dissimilarity measure d2S can achieve superior performance when comparing metagenomic samples by clustering them into different groups as well as recovering environmental gradients affecting microbial samples. New insights into the environmental factors affecting microbial compositions in metagenomic samples

  20. Demonstration of blind quantum computing.

    Science.gov (United States)

    Barz, Stefanie; Kashefi, Elham; Broadbent, Anne; Fitzsimons, Joseph F; Zeilinger, Anton; Walther, Philip

    2012-01-20

    Quantum computers, besides offering substantial computational speedups, are also expected to preserve the privacy of a computation. We present an experimental demonstration of blind quantum computing in which the input, computation, and output all remain unknown to the computer. We exploit the conceptual framework of measurement-based quantum computation that enables a client to delegate a computation to a quantum server. Various blind delegated computations, including one- and two-qubit gates and the Deutsch and Grover quantum algorithms, are demonstrated. The client only needs to be able to prepare and transmit individual photonic qubits. Our demonstration is crucial for unconditionally secure quantum cloud computing and might become a key ingredient for real-life applications, especially when considering the challenges of making powerful quantum computers widely available.

  1. Thallium-isotopic compositions of euxinic sediments as a proxy for global manganese-oxide burial

    Science.gov (United States)

    Owens, Jeremy D.; Nielsen, Sune G.; Horner, Tristan J.; Ostrander, Chadlin M.; Peterson, Larry C.

    2017-09-01

    Thallium (Tl) isotopes are a new and potentially powerful paleoredox proxy that may track bottom water oxygen conditions based on the global burial flux of manganese oxides. Thallium has a residence time of ∼20 thousand years, which is longer than the ocean mixing time, and it has been inferred that modern oxic seawater is conservative with respect to both concentration and isotopes. Marine sources of Tl have nearly identical isotopic values. Therefore, the Tl sinks, adsorption onto manganese oxides and low temperature oceanic crust alteration (the dominant seawater output), are the primary controls of the seawater isotopic composition. For relatively short-term, ∼million years, redox events it is reasonable to assume that the dominant mechanism that alters the Tl isotopic composition of seawater is associated with manganese oxide burial because large variability in low temperature ocean crust alteration is controlled by long-term, multi-million years, average ocean crust production rates. This study presents new Tl isotope data for an open ocean transect in the South Atlantic, and depth transects for two euxinic basins (anoxic and free sulfide in the water column), the Cariaco Basin and Black Sea. The Tl isotopic signature of open ocean seawater in the South Atlantic was found to be homogeneous with ε205Tl = -6.0 ± 0.3 (±2 SD, n = 41) while oxic waters from Cariaco and the Black Sea are -5.6 and -2.2, respectively. Combined with existing data from the Pacific and Arctic Oceans, our Atlantic data establish the conservatism of Tl isotopes in the global ocean. In contrast, partially- and predominantly-restricted basins reveal Tl isotope differences that vary between open-ocean (-6) and continental material (-2) ε205Tl, scaling with the degree of restriction. Regardless of the differences between basins, Tl is quantitatively removed from their euxinic waters below the chemocline. The burial of Tl in euxinic sediments is estimated to be an order of magnitude

  2. Blinded trials taken to the test: an analysis of randomized clinical trials that report tests for the success of blinding

    DEFF Research Database (Denmark)

    Hróbjartsson, A; Forfang, E; Haahr, M T

    2007-01-01

    Blinding can reduce bias in randomized clinical trials, but blinding procedures may be unsuccessful. Our aim was to assess how often randomized clinical trials test the success of blinding, the methods involved and how often blinding is reported as being successful.......Blinding can reduce bias in randomized clinical trials, but blinding procedures may be unsuccessful. Our aim was to assess how often randomized clinical trials test the success of blinding, the methods involved and how often blinding is reported as being successful....

  3. Blind Identification of Graph Filters

    Science.gov (United States)

    Segarra, Santiago; Mateos, Gonzalo; Marques, Antonio G.; Ribeiro, Alejandro

    2017-03-01

    Network processes are often represented as signals defined on the vertices of a graph. To untangle the latent structure of such signals, one can view them as outputs of linear graph filters modeling underlying network dynamics. This paper deals with the problem of joint identification of a graph filter and its input signal, thus broadening the scope of classical blind deconvolution of temporal and spatial signals to the less-structured graph domain. Given a graph signal $\\mathbf{y}$ modeled as the output of a graph filter, the goal is to recover the vector of filter coefficients $\\mathbf{h}$, and the input signal $\\mathbf{x}$ which is assumed to be sparse. While $\\mathbf{y}$ is a bilinear function of $\\mathbf{x}$ and $\\mathbf{h}$, the filtered graph signal is also a linear combination of the entries of the lifted rank-one, row-sparse matrix $\\mathbf{x} \\mathbf{h}^T$. The blind graph-filter identification problem can thus be tackled via rank and sparsity minimization subject to linear constraints, an inverse problem amenable to convex relaxations offering provable recovery guarantees under simplifying assumptions. Numerical tests using both synthetic and real-world networks illustrate the merits of the proposed algorithms, as well as the benefits of leveraging multiple signals to aid the blind identification task.

  4. "Blind" interviewing: Is ignorance bliss?

    Science.gov (United States)

    Rivard, Jillian R; Pena, Michelle M; Schreiber Compo, Nadja

    2016-10-01

    Current investigative interviewing guidelines [e.g., Technical Working Group: Eyewitness evidence. (1999). Eyewitness evidence: A guide for law enforcement. U.S. Department of Justice, Office of Justice Programs, National Institute of Justice. Retrieved from https://www.ncjrs.gov/pdffiles1/nij/178240.pdf ] suggest that interviewers review available case information prior to conducting a witness interview. The present study investigated the effect of interviewers' pre-interview awareness of crime details on eyewitnesses' memory and interviewer behaviour shortly after a mock crime or a week later. Results indicate that blind interviewers with no knowledge about the crime elicited more correct information than those who were correctly informed about the crime. Differences in interviewer behaviour emerged only in the very first question of the interview: Blind interviewers were more likely to begin the interview with a non-suggestive question than the informed interviewers. Blind interviewers also recalled more details than the informed interviewers when asked to generate a report after the witness interview documenting the witness' account.

  5. Justifications shape ethical blind spots.

    Science.gov (United States)

    Pittarello, Andrea; Leib, Margarita; Gordon-Hecker, Tom; Shalvi, Shaul

    2015-06-01

    To some extent, unethical behavior results from people's limited attention to ethical considerations, which results in an ethical blind spot. Here, we focus on the role of ambiguity in shaping people's ethical blind spots, which in turn lead to their ethical failures. We suggest that in ambiguous settings, individuals' attention shifts toward tempting information, which determines the magnitude of their lies. Employing a novel ambiguous-dice paradigm, we asked participants to report the outcome of the die roll appearing closest to the location of a previously presented fixation cross on a computer screen; this outcome would determine their pay. We varied the value of the die second closest to the fixation cross to be either higher (i.e., tempting) or lower (i.e., not tempting) than the die closest to the fixation cross. Results of two experiments revealed that in ambiguous settings, people's incorrect responses were self-serving. Tracking participants' eye movements demonstrated that people's ethical blind spots are shaped by increased attention toward tempting information. © The Author(s) 2015.

  6. Forward secure digital signature for electronic medical records.

    Science.gov (United States)

    Yu, Yao-Chang; Huang, To-Yeh; Hou, Ting-Wei

    2012-04-01

    The Technology Safeguard in Health Insurance Portability and Accountability Act (HIPAA) Title II has addressed a way to maintain the integrity and non-repudiation of Electronic Medical Record (EMR). One of the important cryptographic technologies is mentioned in the ACT is digital signature; however, the ordinary digital signature (e.g. DSA, RSA, GQ...) has an inherent weakness: if the key (certificate) is updated, than all signatures, even the ones generated before the update, are no longer trustworthy. Unfortunately, the current most frequently used digital signature schemes are categorized into the ordinary digital signature scheme; therefore, the objective of this paper is to analyze the shortcoming of using ordinary digital signatures in EMR and to propose a method to use forward secure digital signature to sign EMR to ensure that the past EMR signatures remain trustworthy while the key (certificate) is updated.

  7. The ICDAR 2009 Signature Verification Competition

    NARCIS (Netherlands)

    Blankers, V.L.; Heuvel, C.E. van den; Franke, K.Y.; Vuurpijl, L.G.

    2009-01-01

    Recent results of forgery detection by implementing biometric signature verification methods are promising. At present, forensic signature verification in daily casework is performed through visual examination by trained forensic handwriting experts, without reliance on computerassisted methods.

  8. A Signature Comparing Android Mobile Application Utilizing Feature Extracting Algorithms

    Directory of Open Access Journals (Sweden)

    Paul Grafilon

    2017-08-01

    Full Text Available The paper presented one of the application that can be done using smartphones camera. Nowadays forgery is one of the most undetected crimes. With the forensic technology used today it is still difficult for authorities to compare and define what a real signature is and what a forged signature is. A signature is a legal representation of a person. All transactions are based on a signature. Forgers may use a signature to sign illegal contracts and withdraw from bank accounts undetected. A signature can also be forged during election periods for repeated voting. Addressing the issues a signature should always be secure. Signature verification is a reduced problem that still poses a real challenge for researchers. The literature on signature verification is quite extensive and shows two main areas of research off-line and on-line systems. Off-line systems deal with a static image of the signature i.e. the result of the action of signing while on-line systems work on the dynamic process of generating the signature i.e. the action of signing itself. The researchers have found a way to resolve the concerns. A mobile application that integrates the camera to take a picture of a signature analyzes it and compares it to other signatures for verification. It will exist to help citizens to be more cautious and aware with issues regarding the signatures. This might also be relevant to help organizations and institutions such as banks and insurance companies in verifying signatures that may avoid unwanted transactions and identity theft. Furthermore this might help the authorities in the never ending battle against crime especially against forgers and thieves. The project aimed to design and develop a mobile application that integrates the smartphone camera for verifying and comparing signatures for security using the best algorithm possible. As the result of the development the said smartphone camera application is functional and reliable.

  9. Evaluation of pre-jamming indication parameter during blind backfilling technique

    Directory of Open Access Journals (Sweden)

    Susmita Panda

    2016-01-01

    Full Text Available Hydraulic blind backfilling is used to reduce subsidence problems above old underground water-logged coal mines. This paper describes experimental research on a fully transparent model of a straight underground mine gallery. An automatic data acquisition system was installed in the model to continuously record the sand and water flowrates along with the inlet pressure of the slurry near the model's inlet. Pressure signature graphs and pressure loss curves with bed advancement under different flow conditions are examined. Pressure signature analyses for various flowrates and sand slurry concentrations are conducted to evaluate a pre-jamming indication parameter, which could be used to indicate the arrival of the final stage of filling.

  10. Statistical framework for evaluation of climate model simulations by use of climate proxy data from the last millennium – Part 2: A pseudo-proxy study addressing the amplitude of solar forcing

    Directory of Open Access Journals (Sweden)

    A. Hind

    2012-08-01

    Full Text Available The statistical framework of Part 1 (Sundberg et al., 2012, for comparing ensemble simulation surface temperature output with temperature proxy and instrumental records, is implemented in a pseudo-proxy experiment. A set of previously published millennial forced simulations (Max Planck Institute – COSMOS, including both "low" and "high" solar radiative forcing histories together with other important forcings, was used to define "true" target temperatures as well as pseudo-proxy and pseudo-instrumental series. In a global land-only experiment, using annual mean temperatures at a 30-yr time resolution with realistic proxy noise levels, it was found that the low and high solar full-forcing simulations could be distinguished. In an additional experiment, where pseudo-proxies were created to reflect a current set of proxy locations and noise levels, the low and high solar forcing simulations could only be distinguished when the latter served as targets. To improve detectability of the low solar simulations, increasing the signal-to-noise ratio in local temperature proxies was more efficient than increasing the spatial coverage of the proxy network. The experiences gained here will be of guidance when these methods are applied to real proxy and instrumental data, for example when the aim is to distinguish which of the alternative solar forcing histories is most compatible with the observed/reconstructed climate.

  11. Targeted Metabolomics Reveals Early Dominant Optic Atrophy Signature in Optic Nerves of Opa1delTTAG/+ Mice.

    Science.gov (United States)

    Chao de la Barca, Juan Manuel; Simard, Gilles; Sarzi, Emmanuelle; Chaumette, Tanguy; Rousseau, Guillaume; Chupin, Stéphanie; Gadras, Cédric; Tessier, Lydie; Ferré, Marc; Chevrollier, Arnaud; Desquiret-Dumas, Valérie; Gueguen, Naïg; Leruez, Stéphanie; Verny, Christophe; Miléa, Dan; Bonneau, Dominique; Amati-Bonneau, Patrizia; Procaccio, Vincent; Hamel, Christian; Lenaers, Guy; Reynier, Pascal; Prunier-Mirebeau, Delphine

    2017-02-01

    Dominant optic atrophy (MIM No. 165500) is a blinding condition related to mutations in OPA1, a gene encoding a large GTPase involved in mitochondrial inner membrane dynamics. Although several mouse models mimicking the disease have been developed, the pathophysiological mechanisms responsible for retinal ganglion cell degeneration remain poorly understood. Using a targeted metabolomic approach, we measured the concentrations of 188 metabolites in nine tissues, that is, brain, three types of skeletal muscle, heart, liver, retina, optic nerve, and plasma in symptomatic 11-month-old Opa1delTTAG/+ mice. Significant metabolic signatures were found only in the optic nerve and plasma of female mice. The optic nerve signature was characterized by altered concentrations of phospholipids, amino acids, acylcarnitines, and carnosine, whereas the plasma signature showed decreased concentrations of amino acids and sarcosine associated with increased concentrations of several phospholipids. In contrast, the investigation of 3-month-old presymptomatic Opa1delTTAG/+ mice showed no specific plasma signature but revealed a significant optic nerve signature in both sexes, although with a sex effect. The Opa1delTTAG/+ versus wild-type optic nerve signature was characterized by the decreased concentrations of 10 sphingomyelins and 10 lysophosphatidylcholines, suggestive of myelin sheath alteration, and by alteration in the concentrations of metabolites involved in neuroprotection, such as dimethylarginine, carnitine, spermine, spermidine, carnosine, and glutamate, suggesting a concomitant axonal metabolic dysfunction. Our comprehensive metabolomic investigations revealed in symptomatic as well as in presymptomatic Opa1delTTAG/+ mice, a specific sensitiveness of the optic nerve to Opa1 insufficiency, opening new routes for protective therapeutic strategies.

  12. Acoustic Signature Monitoring and Management of Naval Platforms

    NARCIS (Netherlands)

    Basten, T.G.H.; Jong, C.A.F. de; Graafland, F.; Hof, J. van 't

    2015-01-01

    Acoustic signatures make naval platforms susceptible to detection by threat sensors. The variable operational conditions and lifespan of a platform cause variations in the acoustic signature. To deal with these variations, a real time signature monitoring capability is being developed, with advisory

  13. Radar micro-doppler signatures processing and applications

    CERN Document Server

    Chen, Victor C; Miceli, William J

    2014-01-01

    Radar Micro-Doppler Signatures: Processing and applications concentrates on the processing and application of radar micro-Doppler signatures in real world situations, providing readers with a good working knowledge on a variety of applications of radar micro-Doppler signatures.

  14. 36 CFR 1150.22 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Signature of documents. 1150... Documents for Proceedings on Citations § 1150.22 Signature of documents. The signature of a party, authorized officer, employee or attorney constitutes a certification that he/she has read the document, that...

  15. 21 CFR 11.200 - Electronic signature components and controls.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Electronic signature components and controls. 11.200 Section 11.200 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ELECTRONIC RECORDS; ELECTRONIC SIGNATURES Electronic Signatures § 11.200 Electronic...

  16. Munchausen syndrome by proxy and pediatric nephrology.

    Science.gov (United States)

    Bertulli, Cristina; Cochat, Pierre

    2017-11-01

    Munchausen syndrome by proxy is a persistent fabrication of illness done by a person to another. Renal and urologic forms of this syndrome are not as uncommon as can be thought; a review of all the cases of Munchausen-by-proxy syndrome reveals that 25% of the children had renal or urologic issues. This syndrome can result in a serious diagnostic dilemma for the physicians; knowing this entity can allow early recognition of falsification and limit the physical and psychological damages caused in the victim. In this study, we reviewed the pediatric nephrology cases of Munchausen syndrome by proxy, grouping them through the principal signs of presentation. Copyright © 2017 Société francophone de néphrologie, dialyse et transplantation. Published by Elsevier Masson SAS. All rights reserved.

  17. Toxicological evaluation of two children diagnosed as Munchausen syndrome by proxy.

    Science.gov (United States)

    Türkmen, Zeynep; Ziyalar, Neylan; Tari, Itir; Mercan, Selda; Kayiran, Sinan Mahir; Sener, Dicle; Cengiz, Salih; Akçakaya, Necla

    2012-01-01

    Munchausen syndrome by proxy is a kind of child abuse in which affected children are often hospitalized for long periods and endure repetitive, painful and expensive diagnostic attempts. We present herein two toxicologically confirmed cases of Munchausen syndrome by proxy. Case 1 is a 16-month-old male who had fever, peripheral cyanosis, tremor, and reported cardiac arrest. Symptoms recurred in the hospital when the mother administered fluids. Toxicology detected 3.5 ng/ml mercury (Hg) in the fluid and 9.4 microg Hg/g creatinine in the urine. Case 2 is a 14-year-old female who had irregular blood findings and multiple hospitalizations. Serum analysis detected warfarin. Both mothers were transferred to psychiatric care. Munchausen syndrome by proxy should be suspected when clinical/laboratory findings are negative, illness descriptions are inconsistent, and frequent hospitalization yields no diagnosis. Psychiatric evaluation and toxicological analysis are recommended.

  18. The magnesium isotope (δ26Mg) signature of dolomites

    Science.gov (United States)

    Geske, A.; Goldstein, R. H.; Mavromatis, V.; Richter, D. K.; Buhl, D.; Kluge, T.; John, C. M.; Immenhauser, A.

    2015-01-01

    Dolomite precipitation models and kinetics are debated and complicated due to the complex and temporally fluctuating fluid chemistry and different diagenetic environments. Using well-established isotope systems (δ18O, δ13C, 87Sr/86Sr), fluid inclusions and elemental data, as well as a detailed sedimentological and petrographic data set, we established the precipitation environment and subsequent diagenetic pathways of a series of Proterozoic to Pleistocene syn-depositional marine evaporative (sabkha) dolomites, syn-depositional non-marine evaporative (lacustrine and palustrine) dolomites, altered marine ("mixing zone") dolomites and late diagenetic hydrothermal dolomites. These data form the prerequisite for a systematic investigation of dolomite magnesium isotope ratios (δ26Mgdol). Dolomite δ26Mg ratios documented here range, from -2.49‰ to -0.45‰ (δ26Mgmean = -1.75 ± 1.08‰, n = 42). The isotopically most depleted end member is represented by earliest diagenetic marine evaporative sabkha dolomites (-2.11 ± 0.54‰ 2σ, n = 14). In comparing ancient compositions to modern ones, some of the variation is probably due to alteration. Altered marine (-1.41 ± 0.64‰ 2σ, n = 4), and earliest diagenetic lacustrine and palustrine dolomites (-1.25 ± 0.86‰ 2σ, n = 14) are less negative than sabkha dolomites but not distinct in composition. Various hydrothermal dolomites are characterized by a comparatively wide range of δ26Mg ratios, with values of -1.44 ± 1.33‰ (2σ, n = 10). By using fluid inclusion data and clumped isotope thermometry (Δ47) to represent temperature of precipitation for hydrothermal dolomites, there is no correlation between fluid temperature (∼100 to 180 °C) and dolomite Mg isotope signature (R2 = 0.14); nor is there a correlation between δ26Mgdol and δ18Odol. Magnesium-isotope values of different dolomite types are affected by a complex array of different Mg sources and sinks, dissolution/precipitation and non

  19. The status of childhood blindness and functional low vision in the Eastern Mediterranean region in 2012.

    Science.gov (United States)

    Khandekar, Rajiv; Kishore, H; Mansu, Rabiu M; Awan, Haroon

    2014-01-01

    Childhood blindness and visual impairment (CBVI) are major disabilities that compromise the normal development of children. Health resources and practices to prevent CBVI are suboptimal in most countries in the Eastern Mediterranean Region (EMR). We reviewed the magnitude and the etiologies of childhood visual disabilities based on the estimates using socioeconomic proxy indicators such as gross domestic product (GDP) per capita and blindness (defined as  Best corrected visual acuity(BCVA)) less than 3/60 in the better eye or a visual field of 10° surrounding central fixation) and functional low vision (FLV) (visual impairment for which no treatment or refractive correction can improve the vision up to >6/18 in a better eye) in children blindness and FLV rates to high, middle- and low-income countries from the global literature to the population of children blindness (rate 1.2/1,000) in the region. In addition, there could be approximately 417,725 children with FLV (rate of 2.1/1,000) in the region. The causes of visual disability in the three groups are also discussed based on the available data. As our estimates are based on hospital and blind school studies in the past, they could have serious limitations for projecting the present magnitude and causes of visual disabilities in children of EMR. An effective approach to eye health care and screening for children within primary health care and with the available resources are discussed. The objectives, strategies, and operating procedures for child eye-care are presented. Variables impacting proper screening are discussed. To reach the targets, we recommend urgent implementation of new approaches to low vision and rehabilitation of children.

  20. A new proxy measure for state-level gun ownership in studies of firearm injury prevention.

    Science.gov (United States)

    Siegel, Michael; Ross, Craig S; King, Charles

    2014-06-01

    Since many states are considering gun control laws, researchers need reliable data on rates of gun ownership at the state level. Survey measures of gun ownership in all 50 states, however, are only available for 3 years, and no state-level data have been collected since 2004. Consequently, the National Research Council has declared the development of a valid proxy that can be constructed from accessible, annual, state-level data to be a priority. While such a proxy does exist (the proportion of suicides in a state committed using a gun (FS/S), its correlation with state estimates of gun ownership in recent years is only 0.80. Using state-level data for the years 2001, 2002 and 2004, we developed an improved proxy for state-level gun ownership that uses FS/S (firearm suicides divided by all suicides) and also the per capita number of hunting licenses. We validated this measure using data from surveys of gun ownership conducted in 48 states during 1996 and 1999, and in 21 states during 1995-1998. Adding per capita hunting licenses to the proxy increased its correlation with survey-measured gun ownership from 0.80 to 0.95. The correlations of the new proxy with gun ownership in the two validation studies were 0.95 and 0.97. We conclude that the combination of FS/S and per capita hunting licenses improves substantially upon FS/S alone. This new proxy is easily computed from data that are available annually by state and may be useful for investigating the effect of gun prevalence on firearm-related morbidity and mortality. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  1. Quantifying the magnitude of environmental exposure misclassification when using imprecise address proxies in public health research.

    Science.gov (United States)

    Healy, Martin A; Gilliland, Jason A

    2012-04-01

    In spatial epidemiologic and public health research it is common to use spatially aggregated units such as centroids of postal/zip codes, census tracts, dissemination areas, blocks or block groups as proxies for sample unit locations. Few studies, however, address the potential problems associated with using these units as address proxies. The purpose of this study is to quantify the magnitude of distance errors and accessibility misclassification that result from using several commonly-used address proxies in public health research. The impact of these positional discrepancies for spatial epidemiology is illustrated by examining misclassification of accessibility to several health-related facilities, including hospitals, public recreation spaces, schools, grocery stores, and junk food retailers throughout the City of London and Middlesex County, Ontario, Canada. Positional errors are quantified by multiple neighborhood types, revealing that address proxies are most problematic when used to represent residential locations in small towns and rural areas compared to suburban and urban areas. Findings indicate that the shorter the threshold distance used to measure accessibility between subject population and health-related facility, the greater the proportion of misclassified addresses. Using address proxies based on large aggregated units such as centroids of census tracts or dissemination areas can result in very large positional discrepancies (median errors up to 343 and 2088 m in urban and rural areas, respectively), and therefore should be avoided in spatial epidemiologic research. Even smaller, commonly-used, proxies for residential address such as postal code centroids can have large positional discrepancies (median errors up to 109 and 1363 m in urban and rural areas, respectively), and are prone to misrepresenting accessibility in small towns and rural Canada; therefore, postal codes should only be used with caution in spatial epidemiologic research

  2. Novel methodology for accurate resolution of fluid signatures from multi-dimensional NMR well-logging measurements

    Science.gov (United States)

    Anand, Vivek

    2017-03-01

    A novel methodology for accurate fluid characterization from multi-dimensional nuclear magnetic resonance (NMR) well-logging measurements is introduced. This methodology overcomes a fundamental challenge of poor resolution of features in multi-dimensional NMR distributions due to low signal-to-noise ratio (SNR) of well-logging measurements. Based on an unsupervised machine-learning concept of blind source separation, the methodology resolves fluid responses from simultaneous analysis of large quantities of well-logging data. The multi-dimensional NMR distributions from a well log are arranged in a database matrix that is expressed as the product of two non-negative matrices. The first matrix contains the unique fluid signatures, and the second matrix contains the relative contributions of the signatures for each measurement sample. No a priori information or subjective assumptions about the underlying features in the data are required. Furthermore, the dimensionality of the data is reduced by several orders of magnitude, which greatly simplifies the visualization and interpretation of the fluid signatures. Compared to traditional methods of NMR fluid characterization which only use the information content of a single measurement, the new methodology uses the orders-of-magnitude higher information content of the entire well log. Simulations show that the methodology can resolve accurate fluid responses in challenging SNR conditions. The application of the methodology to well-logging data from a heavy oil reservoir shows that individual fluid signatures of heavy oil, water associated with clays and water in interstitial pores can be accurately obtained.

  3. A MUSIC-Based Algorithm for Blind User Identification in Multiuser DS-CDMA

    Directory of Open Access Journals (Sweden)

    M. Reza Soleymani

    2005-04-01

    Full Text Available A blind scheme based on multiple-signal classification (MUSIC algorithm for user identification in a synchronous multiuser code-division multiple-access (CDMA system is suggested. The scheme is blind in the sense that it does not require prior knowledge of the spreading codes. Spreading codes and users' power are acquired by the scheme. Eigenvalue decomposition (EVD is performed on the received signal, and then all the valid possible signature sequences are projected onto the subspaces. However, as a result of this process, some false solutions are also produced and the ambiguity seems unresolvable. Our approach is to apply a transformation derived from the results of the subspace decomposition on the received signal and then to inspect their statistics. It is shown that the second-order statistics of the transformed signal provides a reliable means for removing the false solutions.

  4. A Case Report of Munchausen Syndrome by Proxy Presenting as Acquired Symptomatic West Syndrome

    Directory of Open Access Journals (Sweden)

    Shridhar Jadhav

    2016-07-01

    Full Text Available Munchausen Syndrome By Proxy (MSBP is an extremely complicated diagnosis because of the difficulty in finding the incriminating evidence of its existence and because of the ethical issue it raises for caregivers. Its implications from a medical, psychological and legal point of view raise difficult questions for any professional confronted to it. We present a case of 8 month female infant who was diagnosed to have Hyperinsulinism causing hypoglycemic brain injury and later developing intractable convulsion with head drops, where EEG was suggestive of West Syndrome, was actually a case of Munchausen syndrome by proxy to start with.

  5. Plant-derived terpenoids as paleovegetation proxies: evaluation of the proxy with Paleocene and Eocene megafloras and plant biomarkers in the Bighorn Basin, USA

    Science.gov (United States)

    Diefendorf, A. F.; Freeman, K. H.; Wing, S. L.

    2012-12-01

    Plant terpenoids (defense compounds synthesized from the 5-carbon building block isoprene) have a long history of use as geochemical plant biomarkers, and potentially can be used to reconstruct changes in the abundances of major land plant groups in rocks and sediments that do not preserve plant megafossils or pollen. Pentacyclic triterpenoids are synthesized almost exclusively by angiosperms whereas conifers produce the tricyclic diterpenoids. Many previous studies have focused on the use of di- to triterpenoid ratios to reconstruct floral changes in the geologic past, however few studies have compared terpenoid-based paleoflora proxies to pollen or megafossils. Prior reconstructions also did not take into account differences in biomarker production between plant functional types, such as deciduous and evergreen plants, which can be quite large. To investigate the use of terpenoids as paleoflora proxies, we examined sediments from the Bighorn Basin (Wyoming, USA) where ancient megafloras have been studied in detail. We analyzed di- and triterpenoid abundances as well as plant leaf waxes (n-alkanes) and other biomarkers in a total of 75 samples from 15 stratigraphic horizons from the late Paleocene (62 Ma) to early Eocene (52.5 Ma). By comparing terpenoid ratios with abundances estimated from plant megafossils, we can evaluate the utility of terpenoids as paleovegetation proxies. In nearly all samples, angiosperm triterpenoids are significantly lower in abundance than conifer diterpenoids. This contrasts with leaf fossil data that indicate paleofloras were dominated by angiosperms in both abundance and diversity. Traditional use of terpenoid paleovegetation proxies would therefore significantly overestimate the abundance of conifers, even when accounting for plant production differences. To determine if this overestimate is related to the loss of angiosperm triterpenoids (rather than enhanced production of diterpenoids in the geologic past), we compared angiosperm

  6. Gene signatures in hepatocellular carcinoma (HCC).

    Science.gov (United States)

    Andrisani, Ourania M; Studach, Leo; Merle, Philippe

    2011-02-01

    Primary hepatocellular carcinoma (HCC) is a significant human cancer globally, with poor prognosis. New and efficacious therapy strategies are needed as well as new biomarkers for early detection of at-risk patients. In this review, we discuss select microarray studies of human HCCs, and propose a gene signature that has promise for clinical/translational application. This gene signature combines the proliferation cluster of genes and the hepatic cancer initiating/stem cell gene cluster for identification of HCCs with poor prognosis. Evidence from cell-based assays identifies the existence of a mechanistic link between these two gene clusters, involving the proliferation cluster gene polo-like kinase 1 (PLK1). We propose that PLK1 is a promising therapy target for HCC. Copyright © 2010 Elsevier Ltd. All rights reserved.

  7. Stochastic monotony signature and biomedical applications.

    Science.gov (United States)

    Demongeot, Jacques; Galli Carminati, Giuliana; Carminati, Federico; Rachdi, Mustapha

    2015-12-01

    We introduce a new concept, the stochastic monotony signature of a function, made of the sequence of the signs that indicate if the function is increasing or constant (sign +), or decreasing (sign -). If the function results from the averaging of successive observations with errors, the monotony sign is a random binary variable, whose density is studied under two hypotheses for the distribution of errors: uniform and Gaussian. Then, we describe a simple statistical test allowing the comparison between the monotony signatures of two functions (e.g., one observed and the other as reference) and we apply the test to four biomedical examples, coming from genetics, psychology, gerontology, and morphogenesis. Copyright © 2015 Académie des sciences. Published by Elsevier SAS. All rights reserved.

  8. Characterizing the psychophysiological signature of boredom.

    Science.gov (United States)

    Merrifield, Colleen; Danckert, James

    2014-02-01

    Research on the experience and expression of boredom is underdeveloped. The purpose of the present study was to explore the psychophysiological signature of the subjective experience of boredom. Healthy undergraduates (n = 72) viewed previously validated and standardized video clips to induce boredom, sadness, and a neutral affective state, while their heart rate (HR), skin conductance levels (SCL), and cortisol levels were measured. Boredom yielded dynamic psychophysiological responses that differed from the other emotional states. Of particular interest, the physiological signature of boredom relative to sadness was characterized by rising HR, decreased SCL, and increased cortisol levels. This pattern of results suggests that boredom may be associated with both increased arousal and difficulties with sustained attention. These findings may help to resolve divergent conceptualizations of boredom in the extant literature and, ultimately, to enhance our understanding and treatment of clinical syndromes in which self-reported boredom is a prominent symptom.

  9. Limits and signatures of relativistic spaceflight

    Science.gov (United States)

    Yurtsever, Ulvi; Wilkinson, Steven

    2018-01-01

    While special relativity imposes an absolute speed limit at the speed of light, our Universe is not empty Minkowski spacetime. The constituents that fill the interstellar/intergalactic vacuum, including the cosmic microwave background photons, impose a lower speed limit on any object travelling at relativistic velocities. Scattering of cosmic microwave photons from an ultra-relativistic object may create radiation with a characteristic signature allowing the detection of such objects at large distances.

  10. Constraining blazar physics with polarization signatures

    Science.gov (United States)

    Zhang, Haocheng; Boettcher, Markus; Li, Hui

    2016-01-01

    Blazars are active galactic nuclei whose jets are directed very close to our line of sight. They emit nonthermal-dominated emission from radio to gamma-rays, with the radio to optical emissions known to be polarized. Both radiation and polarization signatures can be strongly variable. Observations have shown that sometimes strong multiwavelength flares are accompanied by drastic polarization variations, indicating active participation of the magnetic field during flares. We have developed a 3D multi-zone time-dependent polarization-dependent radiation transfer code, which enables us to study the spectral and polarization signatures of blazar flares simultaneously. By combining this code with a Fokker-Planck nonthermal particle evolution scheme, we are able to derive simultaneous fits to time-dependent spectra, multiwavelength light curves, and time-dependent optical polarization signatures of a well-known multiwavelength flare with 180 degree polarization angle swing of the blazar 3C279. Our work shows that with detailed consideration of light travel time effects, the apparently symmetric time-dependent radiation and polarization signatures can be naturally explained by a straight, helically symmetric jet pervaded by a helical magnetic field, without the need of any asymmetric structures. Also our model suggests that the excess in the nonthermal particles during flares can originate from magnetic reconnection events, initiated by a shock propagating through the emission region. Additionally, the magnetic field should generally revert to its initial topology after the flare. We conclude that such shock-initiated magnetic reconnection event in an emission environment with relatively strong magnetic energy can be the driver of multiwavelength flares with polarization angle swings. Future statistics on such observations will constrain general features of such events, while magneto-hydrodynamic simulations will provide physical scenarios for the magnetic field evolution

  11. Digital gene expression signatures for maize development.

    Science.gov (United States)

    Eveland, Andrea L; Satoh-Nagasawa, Namiko; Goldshmidt, Alexander; Meyer, Sandra; Beatty, Mary; Sakai, Hajime; Ware, Doreen; Jackson, David

    2010-11-01

    Genome-wide expression signatures detect specific perturbations in developmental programs and contribute to functional resolution of key regulatory networks. In maize (Zea mays) inflorescences, mutations in the RAMOSA (RA) genes affect the determinacy of axillary meristems and thus alter branching patterns, an important agronomic trait. In this work, we developed and tested a framework for analysis of tag-based, digital gene expression profiles using Illumina's high-throughput sequencing technology and the newly assembled B73 maize reference genome. We also used a mutation in the RA3 gene to identify putative expression signatures specific to stem cell fate in axillary meristem determinacy. The RA3 gene encodes a trehalose-6-phosphate phosphatase and may act at the interface between developmental and metabolic processes. Deep sequencing of digital gene expression libraries, representing three biological replicate ear samples from wild-type and ra3 plants, generated 27 million 20- to 21-nucleotide reads with frequencies spanning 4 orders of magnitude. Unique sequence tags were anchored to 3'-ends of individual transcripts by DpnII and NlaIII digests, which were multiplexed during sequencing. We mapped 86% of nonredundant signature tags to the maize genome, which associated with 37,117 gene models and unannotated regions of expression. In total, 66% of genes were detected by at least nine reads in immature maize ears. We used comparative genomics to leverage existing information from Arabidopsis (Arabidopsis thaliana) and rice (Oryza sativa) in functional analyses of differentially expressed maize genes. Results from this study provide a basis for the analysis of short-read expression data in maize and resolved specific expression signatures that will help define mechanisms of action for the RA3 gene.

  12. Selection signatures in Canchim beef cattle

    OpenAIRE

    URBINATI, I.; STAFUZZA, N. B.; OLIVEIRA, M. T.; CHUD, T. C. S.; HIGA, R. H.; L.C.A. Regitano; M.M. Alencar; Buzanskas, M. E. [UNESP; MUNARI, D. P.

    2016-01-01

    Background Recent technological advances in genomics have allowed the genotyping of cattle through single nucleotide polymorphism (SNP) panels. High-density SNP panels possess greater genome coverage and are useful for the identification of conserved regions of the genome due to selection, known as selection signatures (SS). The SS are detectable by different methods, such as the extended haplotype homozygosity (EHH); and the integrated haplotype score (iHS), which is derived from the EHH. Th...

  13. Identity-Based Verifiably Encrypted Signatures without Random Oracles

    Science.gov (United States)

    Zhang, Lei; Wu, Qianhong; Qin, Bo

    Fair exchange protocol plays an important role in electronic commerce in the case of exchanging digital contracts. Verifiably encrypted signatures provide an optimistic solution to these scenarios with an off-line trusted third party. In this paper, we propose an identity-based verifiably encrypted signature scheme. The scheme is non-interactive to generate verifiably encrypted signatures and the resulting encrypted signature consists of only four group elements. Based on the computational Diffie-Hellman assumption, our scheme is proven secure without using random oracles. To the best of our knowledge, this is the first identity-based verifiably encrypted signature scheme provably secure in the standard model.

  14. A Digital Signature Scheme Based on MST3 Cryptosystems

    Directory of Open Access Journals (Sweden)

    Haibo Hong

    2014-01-01

    Full Text Available As special types of factorization of finite groups, logarithmic signature and cover have been used as the main components of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2, and MST3. Recently, Svaba et. al proposed a revised MST3 encryption scheme with greater security. Meanwhile, they put forward an idea of constructing signature schemes on the basis of logarithmic signatures and random covers. In this paper, we firstly design a secure digital signature scheme based on logarithmic signatures and random covers. In order to complete the task, we devise a new encryption scheme based on MST3 cryptosystems.

  15. Sensory augmentation for the blind

    Directory of Open Access Journals (Sweden)

    Silke Manuela Kärcher

    2012-03-01

    Full Text Available Enacted theories of consciousness conjecture that perception and cognition arise from an active experience of the regular relations that are tying together the sensory stimulation of different modalities and associated motor actions. Previous experiments investigated this concept by employing the technique of sensory substitution. Building on these studies, here we test a set of hypotheses derived from this framework and investigate the utility of sensory augmentation in handicapped people. We provide a late blind subject with a new set of sensorimotor laws: A vibro-tactile belt continually signals the direction of magnetic north. The subject completed a set of behavioral tests before and after an extended training period. The tests were complemented by questionnaires and interviews. This newly supplied information improved performance on different time scales. In a pointing task we demonstrate an instant improvement of performance based on the signal provided by the device. Furthermore, the signal was helpful in relevant daily tasks, often complicated for the blind, such as keeping a direction over longer distances or taking shortcuts in familiar environments. A homing task with an additional attentional load demonstrated a significant improvement after training. The subject found the directional information highly expedient for the adjustment of his inner maps of familiar environments and describes an increase in his feeling of security when exploring unfamiliar environments with the belt. The results give evidence for a firm integration of the newly supplied signals into the behavior of this late blind subject with better navigational performance and more courageous behavior in unfamiliar environments. Most importantly, the complementary information provided by the belt lead to a positive emotional impact with enhanced feeling of security. This experimental approach demonstrates the potential of sensory augmentation devices for the help of

  16. Causes and emerging trends of childhood blindness: findings from schools for the blind in Southeast Nigeria.

    Science.gov (United States)

    Aghaji, Ada; Okoye, Obiekwe; Bowman, Richard

    2015-06-01

    To ascertain the causes severe visual impairment and blindness (SVI/BL) in schools for the blind in southeast Nigeria and to evaluate temporal trends. All children who developed blindness at blind in southeast Nigeria were examined. All the data were recorded on a WHO/Prevention of Blindness (WHO/PBL) form entered into a Microsoft Access database and transferred to STATA V.12.1 for analysis. To estimate temporal trends in causes of blindness, older (>15 years) children were compared with younger (≤15 years) children. 124 children were identified with SVI/BL. The most common anatomical site of blindness was the lens (33.9%). Overall, avoidable blindness accounted for 73.4% of all blindness. Exploring trends in SVI/BL between children ≤15 years of age and those >15 years old, this study shows a reduction in avoidable blindness but an increase in cortical visual impairment in the younger age group. The results from this study show a statistically significant decrease in avoidable blindness in children ≤15 years old. Corneal blindness appears to be decreasing but cortical visual impairment seems to be emerging in the younger age group. Appropriate strategies for the prevention of avoidable childhood blindness in Nigeria need to be developed and implemented. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  17. Measurement-device-independent quantum digital signatures

    Science.gov (United States)

    Puthoor, Ittoop Vergheese; Amiri, Ryan; Wallden, Petros; Curty, Marcos; Andersson, Erika

    2016-08-01

    Digital signatures play an important role in software distribution, modern communication, and financial transactions, where it is important to detect forgery and tampering. Signatures are a cryptographic technique for validating the authenticity and integrity of messages, software, or digital documents. The security of currently used classical schemes relies on computational assumptions. Quantum digital signatures (QDS), on the other hand, provide information-theoretic security based on the laws of quantum physics. Recent work on QDS Amiri et al., Phys. Rev. A 93, 032325 (2016);, 10.1103/PhysRevA.93.032325 Yin, Fu, and Zeng-Bing, Phys. Rev. A 93, 032316 (2016), 10.1103/PhysRevA.93.032316 shows that such schemes do not require trusted quantum channels and are unconditionally secure against general coherent attacks. However, in practical QDS, just as in quantum key distribution (QKD), the detectors can be subjected to side-channel attacks, which can make the actual implementations insecure. Motivated by the idea of measurement-device-independent quantum key distribution (MDI-QKD), we present a measurement-device-independent QDS (MDI-QDS) scheme, which is secure against all detector side-channel attacks. Based on the rapid development of practical MDI-QKD, our MDI-QDS protocol could also be experimentally implemented, since it requires a similar experimental setup.

  18. Online Signature Verification Using Fourier Descriptors

    Directory of Open Access Journals (Sweden)

    Berrin Yanikoglu

    2009-01-01

    Full Text Available We present a novel online signature verification system based on the Fast Fourier Transform. The advantage of using the Fourier domain is the ability to compactly represent an online signature using a fixed number of coefficients. The fixed-length representation leads to fast matching algorithms and is essential in certain applications. The challenge on the other hand is to find the right preprocessing steps and matching algorithm for this representation. We report on the effectiveness of the proposed method, along with the effects of individual preprocessing and normalization steps, based on comprehensive tests over two public signature databases. We also propose to use the pen-up duration information in identifying forgeries. The best results obtained on the SUSIG-Visual subcorpus and the MCYT-100 database are 6.2% and 12.1% error rate on skilled forgeries, respectively. The fusion of the proposed system with our state-of-the-art Dynamic Time Warping (DTW system lowers the error rate of the DTW system by up to about 25%. While the current error rates are higher than state-of-the-art results for these databases, as an approach using global features, the system possesses many advantages. Considering also the suggested improvements, the FFT system shows promise both as a stand-alone system and especially in combination with approaches that are based on local features.

  19. Signature stability in laser Doppler vibrometry

    Science.gov (United States)

    Iverson, Thomas Z.; Watson, Edward A.

    2017-05-01

    Speckle can complicate signal acquisition in coherent laser systems such as Laser Doppler Vibrometry (LDV). Variations in the speckle pattern at the reliever due to fluctuations in the system such as beam pointing can lead to impulsive events in the signature. The beam size at the object has a direct influence on the size of the speckle at the receiving aperture. Increasing the beam spot size reduces the average speckle size, but also decreases the strength of the signal coupled with the local oscillator in the LDV. In this paper, we derive the relationship between scattering spot size at the object and average speckle size at the receiver. Theory is presented on how increasing the beam diameter at the object can reduce the fluctuations of the heterodyned signal coupled with the Local Oscillator (LO). The Antenna theorem is presented to show the tradeoff between angular field of view and capture area. We show experimental results on the effects of speckle size and decreasing signal strength have on the stability of an LDV signature. We use a kurtosis metric previously reported in the literature to assess the stability and quality of the return signature.

  20. On psychoanalytic supervision as signature pedagogy.

    Science.gov (United States)

    Watkins, C Edward

    2014-04-01

    What is signature pedagogy in psychoanalytic education? This paper examines that question, considering why psychoanalytic supervision best deserves that designation. In focusing on supervision as signature pedagogy, I accentuate its role in building psychoanalytic habits of mind, habits of hand, and habits of heart, and transforming theory and self-knowledge into practical product. Other facets of supervision as signature pedagogy addressed in this paper include its features of engagement, uncertainty, formation, and pervasiveness, as well as levels of surface, deep, and implicit structure. Epistemological, ontological, and axiological in nature, psychoanalytic supervision engages trainees in learning to do, think, and value what psychoanalytic practitioners in the field do, think, and value: It is, most fundamentally, professional preparation for competent, "good work." In this paper, effort is made to shine a light on and celebrate the pivotal role of supervision in "making" or developing budding psychoanalysts and psychoanalytic psychotherapists. Now over a century old, psychoanalytic supervision remains unparalleled in (1) connecting and integrating conceptualization and practice, (2) transforming psychoanalytic theory and self-knowledge into an informed analyzing instrument, and (3) teaching, transmitting, and perpetuating the traditions, practice, and culture of psychoanalytic treatment.

  1. SIGNATURES OF LONG-LIVED SPIRAL PATTERNS

    Energy Technology Data Exchange (ETDEWEB)

    Martinez-Garcia, Eric E. [Instituto Nacional de Astrofisica, Optica y Electronica (INAOE), Aptdo. Postal 51 y 216, 72000 Puebla, Pue. (Mexico); Gonzalez-Lopezlira, Rosa A., E-mail: ericmartinez@inaoep.mx, E-mail: martinez@astro.unam.mx, E-mail: r.gonzalez@crya.unam.mx [Centro de Radioastronomia y Astrofisica, UNAM, Campus Morelia, Michoacan, C.P. 58089 (Mexico)

    2013-03-10

    Azimuthal age/color gradients across spiral arms are a signature of long-lived spirals. From a sample of 19 normal (or weakly barred) spirals where we have previously found azimuthal age/color gradient candidates, 13 objects were further selected if a two-armed grand-design pattern survived in a surface density stellar mass map. Mass maps were obtained from optical and near-infrared imaging, by comparison with a Monte Carlo library of stellar population synthesis models that allowed us to obtain the mass-to-light ratio in the J band, (M/L){sub J}, as a function of (g - i) versus (i - J) color. The selected spirals were analyzed with Fourier methods in search of other signatures of long-lived modes related to the gradients, such as the gradient divergence toward corotation, and the behavior of the phase angle of the two-armed spiral in different wavebands, as expected from theory. The results show additional signatures of long-lived spirals in at least 50% of the objects.

  2. The effect of blinds on workplace illuminance

    OpenAIRE

    Vincenec Jiri; Mitas Martin

    2017-01-01

    The paper explores the effect of blinds on the workplace illuminance. The blinds are used to reduce solar load from the sunshine and decrease energy consumption for cooling in the overheated room. With blinds reducing inside illuminance the standards may not be fit and it is necessary add artificial lighting in this cases. It is important to correctly regulate daylight and eventually supplement it with artificial lighting to set the system for minimum energy consumption to meet all standard r...

  3. Modeling the lexical morphology of Western handwritten signatures.

    Science.gov (United States)

    Diaz-Cabrera, Moises; Ferrer, Miguel A; Morales, Aythami

    2015-01-01

    A handwritten signature is the final response to a complex cognitive and neuromuscular process which is the result of the learning process. Because of the many factors involved in signing, it is possible to study the signature from many points of view: graphologists, forensic experts, neurologists and computer vision experts have all examined them. Researchers study written signatures for psychiatric, penal, health and automatic verification purposes. As a potentially useful, multi-purpose study, this paper is focused on the lexical morphology of handwritten signatures. This we understand to mean the identification, analysis, and description of the signature structures of a given signer. In this work we analyze different public datasets involving 1533 signers from different Western geographical areas. Some relevant characteristics of signature lexical morphology have been selected, examined in terms of their probability distribution functions and modeled through a General Extreme Value distribution. This study suggests some useful models for multi-disciplinary sciences which depend on handwriting signatures.

  4. The electronic identification, signature and security of information systems

    Directory of Open Access Journals (Sweden)

    Horovèák Pavel

    2002-12-01

    Full Text Available The contribution deals with the actual methods and technologies of information and communication systems security. It introduces the overview of electronic identification elements such as static password, dynamic password and single sign-on. Into this category belong also biometric and dynamic characteristics of verified person. Widespread is authentication based on identification elements ownership, such as various cards and authentication calculators. In the next part is specified a definition and characterization of electronic signature, its basic functions and certificate categories. Practical utilization of electronic signature consists of electronic signature acquirement, signature of outgoing email message, receiving of electronic signature and verification of electronic signature. The use of electronic signature is continuously growing and in connection with legislation development it exercises in all resorts.

  5. Application of Behavior Modification to Blind Children.

    Science.gov (United States)

    Hayes, Charles S.; Weinhouse, Ellen

    1978-01-01

    Research and application of principles of behavior modification with visually impaired and blind children are reviewed with particular attention to lower functioning multiply impaired children. (Author)

  6. Congenital color blindness in young Turkish men.

    Science.gov (United States)

    Citirik, Mehmet; Acaroglu, Golge; Batman, Cosar; Zilelioglu, Orhan

    2005-04-01

    We investigated a healthy population of men from different regions of Turkey for the presence of congenital red-green color blindness. Using Ishihara pseudoisochromatic plates, 941 healthy men from the Turkish army were tested for congenital red-green color blindness. The prevalence of red-green color blindness was 7.33 +/- 0.98% (5.10% protans and 2.23% deutans). These ratios were higher than other reported samples from Mediterranean Europe. Higher percentages of color blindness were found in regions with a lower education level and more consanguineous marriages.

  7. Along-arc and inter-arc variations in volcanic gas CO2/S signature

    Science.gov (United States)

    Aiuppa, Alessandro; Robidoux, Philippe; Fischer, Tobias

    2015-04-01

    Improving the current estimates of the global volcanic arc CO2 output requires a more accurate knowledge of the volcanic gas CO2/S ratio signature of each individual arc segment. This, when multiplied by sulphur (S) productivity of each arc segment (derived by either studies on melt inclusions or UV-based gas measurements), could in principle yield the individual arc CO2 output and, by summation, the global arc CO2 output. Unfortunately, the process is complicated, among others, by the limited volcanic gas dataset we have available, particularly for poorly explored, but potentially highly productive arc segments (Indonesia, Papua New Guinea, etc). We here review the currently available dataset of CO2/S ratios in the volcanic gas literature, and combine this with novel gas observations (partially obtained using the currently expanding DCO-DECADE Multi-GAS network) to provide experimental evidence for the existence of substantial variations in volcanic gas chemistry along individual arc segments, and from one arc segment to another. In Central America [1], for instance, we identify distinct volcanic gas CO2/S (molar) ratio signatures for magmatic volatiles in Nicaragua (~3), Costa Rica (~0.5-1.0) and El Salvador (~1.0), which we ascribe to variable extents of sedimentary carbon addition to a MORB-type (Costa Rica-like) mantle wedge. Globally, volcanic gas CO2/S ratios are typically found to be low (~1.0) in arc segments (e.g., Japan, Kuril-Kamchatka, Chile) where small amount of limestones enter the slab; whilst larger slab/crustal carbon contributions typically correspond to higher CO2/S ratio signatures for gases of other arcs, such as Indonesia (~4.0) or Italy (6 to 9). We find that CO2/S ratios of arc gases positively correlate with Ba/La and U/Th ratios in the corresponding magmas, these trace-element ratios being thought as petrological proxies for the addition slab-fluids to the magma generation zone. This relation implies a dominant slab-derivation of carbon

  8. Effects of Art Therapy on Distress Levels of Adults with Cancer: A Proxy Pretest Study

    Science.gov (United States)

    Glinzak, Leara

    2016-01-01

    This study identified decreased distress after art therapy in a proxy pretest study with a convenience sample of 73 patients being treated for cancer. Art therapy outcomes from 4 settings (oncology unit, infusion clinic, individual sessions, and open studio) were measured via the self-report Distress Thermometer, which was collected as part of an…

  9. Reducing handover latency in future IP-based wireless networks: Fast Proxy Mobile IPv6

    NARCIS (Netherlands)

    Heijenk, Geert; Bargh, Mortaza S.; Laganier, Julien; Prasad, Anand R.

    2008-01-01

    Current IP-level mobility protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. At the same time they do not give sufficient control to the network to control the handover process. This paper presents an extension to Proxy Mobile IP, which is the

  10. Ethiopia-Eritrea : proxy wars and prospects of peace in the Horn of Africa

    NARCIS (Netherlands)

    Abbink, G.J.

    2003-01-01

    Many inter-State and intra-State conflicts in Africa become more complex by being extended into 'proxy wars', i.e. secondary, often 'low intensity' armed conflicts, pursued in the context of a major power struggle, or outright wars between States carried out by subsidiary or co-opted insurgent

  11. Sources and proxy potential of long chain alkyl diols in lacustrine environments.

    NARCIS (Netherlands)

    Rampen, Sebastiaan W.; Datema, Mariska; Rodrigo-Gámiz, M.; Schouten, Stefan; Reichart, Gert-Jan; Sinninghe Damste, Jaap S.

    2014-01-01

    Long chain 1,13- and 1,15-alkyl diols form the base of a number of recently proposed proxies used for climate reconstruction. However, the sources of these lipids and environmental controls on their distribution are still poorly constrained. We have analyzed the long chain alkyl diol (LCD)

  12. Sources and proxy potential of long chain alkyl diols in lacustrine environments

    NARCIS (Netherlands)

    Rampen, S.; Datema, M.; Rodrigo-Gámiz, M.; Schouten, S.; Reichart, G.-J.; Sinninghe Damsté, J.S.

    2014-01-01

    Long chain 1,13- and 1,15-alkyl diols form the base of a number of recently proposed proxies used for climate reconstruction. However, the sources of these lipids and environmental controls on their distribution are still poorly constrained. We have analyzed the long chain alkyl diol (LCD)

  13. Comparing children's GPS tracks with geospatial proxies for exposure to junk food.

    Science.gov (United States)

    Sadler, Richard C; Gilliland, Jason A

    2015-01-01

    Various geospatial techniques have been employed to estimate children's exposure to environmental cardiometabolic risk factors, including junk food. But many studies uncritically rely on exposure proxies which differ greatly from actual exposure. Misrepresentation of exposure by researchers could lead to poor decisions and ineffective policymaking. This study conducts a GIS-based analysis of GPS tracks--'activity spaces'--and 21 proxies for activity spaces (e.g. buffers, container approaches) for a sample of 526 children (ages 9-14) in London, Ontario, Canada. These measures are combined with a validated food environment database (including fast food and convenience stores) to create a series of junk food exposure estimates and quantify the errors resulting from use of different proxy methods. Results indicate that exposure proxies consistently underestimate exposure to junk foods by as much as 68%. This underestimation is important to policy development because children are exposed to more junk food than estimated using typical methods. Copyright © 2015 Elsevier Ltd. All rights reserved.

  14. Deuterium values from volcanic glass: A paleoelevation proxy for Oregon's Cascade Range

    Science.gov (United States)

    Carlson, T. B.; Bershaw, J. T.

    2016-12-01

    Hydrated volcanic glass has been used as a proxy to constrain Cenozoic paleoclimate across many of the world's mountain ranges. However, there are concerns that volcanic glass may not preserve the isotopic composition of syndepositional meteoric water. The Cascades are an excellent location to study the validity of hydrated volcanic glass as a paleoenvironmental proxy for several reasons. Moisture is derived from a single oceanic source and falls as orographic precipitation in the Cascades, leading to a characteristic altitude effect, or inverse relationship between elevation and the isotopic composition of meteoric water (δD). In addition, past studies have inferred uplift of the Cascades and an increase in the rain shadow effect since the Eocene through independent methods such as changing fossil assemblages, and other isotopic proxies including carbonates and fossil teeth. In this study, δD values of two hydrated tuff samples are compared: one prior to ( 29 Ma) and one following ( 5 Ma) the onset of High Cascade volcanism. The isotopic composition of these samples are interpreted in the context of modern water across the range to understand the potential of volcanic glass as a proxy for paleoelevation in the Pacific Northwest.

  15. Constructing Proxy Variables to Measure Adult Learners' Time Management Strategies in LMS

    Science.gov (United States)

    Jo, Il-Hyun; Kim, Dongho; Yoon, Meehyun

    2015-01-01

    This study describes the process of constructing proxy variables from recorded log data within a Learning Management System (LMS), which represents adult learners' time management strategies in an online course. Based on previous research, three variables of total login time, login frequency, and regularity of login interval were selected as…

  16. Validity of proxy data obtained by different psychological autopsy information reconstruction techniques.

    Science.gov (United States)

    Fang, L; Zhang, J

    2010-01-01

    Two informants were interviewed for each of 416 living controls (individuals sampled from the normal population) interviewed in a Chinese case-control psychological autopsy study. The validity of proxy data, obtained using seven psychological autopsy information reconstruction techniques (types 1, 2 and A - E), was evaluated, with living controls' self reports used as the gold-standard. Proxy data for reconstruction technique types 1, 2 and D on the Impulsivity Inventory Scale (total impulsivity score) were no different from the living controls' self report gold standard, whereas data for types A and E were smaller than data from living controls. On the 'acceptance or resignation' sub-scale of the avoidance coping dimension of the Moos Coping Response Inventory, information obtained by reconstruction technique types 1 and D was not significantly different from the living controls' self reports, whereas proxy data from types 2, A and E were smaller than those from the living controls. No statistically significant differences were identified for other proxy data obtained by reconstruction technique types 1, 2, A, D and E. These results indicate that using a second informant does not significantly enhance information reconstruction for the target.

  17. Optical Proxies for Terrestrial Dissolved Organic Matter in Estuaries and Coastal Waters

    Directory of Open Access Journals (Sweden)

    Christopher L. Osburn

    2016-01-01

    Full Text Available Optical proxies, especially DOM fluorescence, were used to track terrestrial DOM fluxes through estuaries and coastal waters by comparing models developed for several coastal ecosystems. Key to using optical properties is validating and calibrating them with chemical measurements, such as lignin-derived phenols - a proxy to quantify terrestrial DOM. Utilizing parallel factor analysis (PARAFAC, and comparing models statistically using the OpenFluor database (http://www.openfluor.org we have found common, ubiquitous fluorescing components which correlate most strongly with lignin phenol concentrations in several estuarine and coastal environments. Optical proxies for lignin were computed for the following regions: Mackenzie River Estuary, Atchafalaya River Estuary, Charleston Harbor, Chesapeake Bay, and Neuse River Estuary. The slope of linear regression models relating CDOM absorption at 350 nm (a350 to DOC and to lignin, varied 5 to 10 fold among systems. Where seasonal observations were available from a region, there were distinct seasonal differences in equation parameters for these optical proxies. Despite variability, overall models using single linear regression were developed that related dissolved organic carbon (DOC concentration to CDOM (DOC = 40×a350+138; R2 = 0.77; N = 130 and lignin (Σ8 to CDOM (Σ8 = 2.03×a350-0.5; R2 = 0.87; N = 130. This wide variability suggested that local or regional optical models should be developed for predicting terrestrial DOM flux into coastal oceans and taken into account when upscaling to remote sensing observations and calibrations.

  18. 17 CFR 240.14a-4 - Requirements as to proxy.

    Science.gov (United States)

    2010-04-01

    ... persons making the solicitation do not know, a reasonable time before the solicitation, are to be... elected. Provided, however, That nothing in this section 240.14a-4 shall prevent any person soliciting in... authority to vote for nominees named in the registrant's proxy statement, so long as the soliciting party...

  19. The 30 cm radio flux as a solar proxy for thermosphere density modelling

    Directory of Open Access Journals (Sweden)

    Dudok de Wit Thierry

    2017-01-01

    Full Text Available The 10.7 cm radio flux (F10.7 is widely used as a proxy for solar UV forcing of the upper atmosphere. However, radio emissions at other centimetric wavelengths have been routinely monitored since the 1950 s, thereby offering prospects for building proxies that may be better tailored to space weather needs. Here we advocate the 30 cm flux (F30 as a proxy that is more sensitive than F10.7 to longer wavelengths in the UV and show that it improves the response of the thermospheric density to solar forcing, as modelled with DTM (Drag Temperature Model. In particular, the model bias drops on average by 0–20% when replacing F10.7 by F30; it is also more stable (the standard deviation of the bias is 15–40% smaller and the density variation at the the solar rotation period is reproduced with a 35–50% smaller error. We compare F30 to other solar proxies and discuss its assets and limitations.

  20. Proxy documents as a source of measurement error in the Comparative Manifestos Project.

    NARCIS (Netherlands)

    Gemenis, Konstantinos

    2012-01-01

    This paper considers the issue of document type diversity in the Comparative Manifestos Project (CMP). For many years the CMP has been collecting and coding a variety of documents, such as speeches, pamphlets, newspaper articles and leaflets, as manifesto proxies. By using previously unexplored