WorldWideScience

Sample records for proxy signature scheme

  1. Some Proxy Signature and Designated verifier Signature Schemes over Braid Groups

    OpenAIRE

    Lal, Sunder; Verma, Vandani

    2009-01-01

    Braids groups provide an alternative to number theoretic public cryptography and can be implemented quite efficiently. The paper proposes five signature schemes: Proxy Signature, Designated Verifier, Bi-Designated Verifier, Designated Verifier Proxy Signature And Bi-Designated Verifier Proxy Signature scheme based on braid groups. We also discuss the security aspects of each of the proposed schemes.

  2. Improvement of a Quantum Proxy Blind Signature Scheme

    Science.gov (United States)

    Zhang, Jia-Lei; Zhang, Jian-Zhong; Xie, Shu-Cui

    2018-06-01

    Improvement of a quantum proxy blind signature scheme is proposed in this paper. Six-qubit entangled state functions as quantum channel. In our scheme, a trust party Trent is introduced so as to avoid David's dishonest behavior. The receiver David verifies the signature with the help of Trent in our scheme. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, delegation, signature and verification. Security analysis proves that our scheme has the properties of undeniability, unforgeability, anonymity and can resist some common attacks.

  3. A Lattice-Based Identity-Based Proxy Blind Signature Scheme in the Standard Model

    Directory of Open Access Journals (Sweden)

    Lili Zhang

    2014-01-01

    Full Text Available A proxy blind signature scheme is a special form of blind signature which allowed a designated person called proxy signer to sign on behalf of original signers without knowing the content of the message. It combines the advantages of proxy signature and blind signature. Up to date, most proxy blind signature schemes rely on hard number theory problems, discrete logarithm, and bilinear pairings. Unfortunately, the above underlying number theory problems will be solvable in the postquantum era. Lattice-based cryptography is enjoying great interest these days, due to implementation simplicity and provable security reductions. Moreover, lattice-based cryptography is believed to be hard even for quantum computers. In this paper, we present a new identity-based proxy blind signature scheme from lattices without random oracles. The new scheme is proven to be strongly unforgeable under the standard hardness assumption of the short integer solution problem (SIS and the inhomogeneous small integer solution problem (ISIS. Furthermore, the secret key size and the signature length of our scheme are invariant and much shorter than those of the previous lattice-based proxy blind signature schemes. To the best of our knowledge, our construction is the first short lattice-based identity-based proxy blind signature scheme in the standard model.

  4. A Quantum Proxy Weak Blind Signature Scheme Based on Controlled Quantum Teleportation

    Science.gov (United States)

    Cao, Hai-Jing; Yu, Yao-Feng; Song, Qin; Gao, Lan-Xiang

    2015-04-01

    Proxy blind signature is applied to the electronic paying system, electronic voting system, mobile agent system, security of internet, etc. A quantum proxy weak blind signature scheme is proposed in this paper. It is based on controlled quantum teleportation. Five-qubit entangled state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, so it could guarantee not only the unconditional security of the scheme but also the anonymity of the messages owner.

  5. A Quantum Multi-Proxy Weak Blind Signature Scheme Based on Entanglement Swapping

    Science.gov (United States)

    Yan, LiLi; Chang, Yan; Zhang, ShiBin; Han, GuiHua; Sheng, ZhiWei

    2017-02-01

    In this paper, we present a multi-proxy weak blind signature scheme based on quantum entanglement swapping of Bell states. In the scheme, proxy signers can finish the signature instead of original singer with his/her authority. It can be applied to the electronic voting system, electronic paying system, etc. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. It could guarantee not only the unconditionally security but also the anonymity of the message owner. The security analysis shows the scheme satisfies the security features of multi-proxy weak signature, singers cannot disavowal his/her signature while the signature cannot be forged by others, and the message owner can be traced.

  6. A New Quantum Proxy Multi-signature Scheme Using Maximally Entangled Seven-Qubit States

    Science.gov (United States)

    Cao, Hai-Jing; Zhang, Jia-Fu; Liu, Jian; Li, Zeng-You

    2016-02-01

    In this paper, we propose a new secure quantum proxy multi-signature scheme using seven-qubit entangled quantum state as quantum channels, which may have applications in e-payment system, e-government, e-business, etc. This scheme is based on controlled quantum teleportation. The scheme uses the physical characteristics of quantum mechanics to guarantee its anonymity, verifiability, traceability, unforgetability and undeniability.

  7. An Anonymous Access Authentication Scheme Based on Proxy Ring Signature for CPS-WMNs

    Directory of Open Access Journals (Sweden)

    Tianhan Gao

    2017-01-01

    Full Text Available Access security and privacy have become a bottleneck for the popularization of future Cyber-Physical System (CPS networks. Furthermore, users’ need for privacy-preserved access during movement procedure is more urgent. To address the anonymous access authentication issue for CPS Wireless Mesh Network (CPS-WMN, a novel anonymous access authentication scheme based on proxy ring signature is proposed. A hierarchical authentication architecture is presented first. The scheme is then achieved from the aspect of intergroup and intragroup anonymous mutual authentication through proxy ring signature mechanism and certificateless signature mechanism, respectively. We present a formal security proof of the proposed protocol with SVO logic. The simulation and performance analysis demonstrate that the proposed scheme owns higher efficiency and adaptability than the typical one.

  8. Cryptanalytic Performance Appraisal of Improved CCH2 Proxy Multisignature Scheme

    Directory of Open Access Journals (Sweden)

    Raman Kumar

    2014-01-01

    Full Text Available Many of the signature schemes are proposed in which the t out of n threshold schemes are deployed, but they still lack the property of security. In this paper, we have discussed implementation of improved CCH1 and improved CCH2 proxy multisignature scheme based on elliptic curve cryptosystem. We have represented time complexity, space complexity, and computational overhead of improved CCH1 and CCH2 proxy multisignature schemes. We have presented cryptanalysis of improved CCH2 proxy multisignature scheme and showed that improved CCH2 scheme suffered from various attacks, that is, forgery attack and framing attack.

  9. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  10. Secure Mobile Agent from Leakage-Resilient Proxy Signatures

    Directory of Open Access Journals (Sweden)

    Fei Tang

    2015-01-01

    Full Text Available A mobile agent can sign a message in a remote server on behalf of a customer without exposing its secret key; it can be used not only to search for special products or services, but also to make a contract with a remote server. Hence a mobile agent system can be used for electronic commerce as an important key technology. In order to realize such a system, Lee et al. showed that a secure mobile agent can be constructed using proxy signatures. Intuitively, a proxy signature permits an entity (delegator to delegate its signing right to another entity (proxy to sign some specified messages on behalf of the delegator. However, the proxy signatures are often used in scenarios where the signing is done in an insecure environment, for example, the remote server of a mobile agent system. In such setting, an adversary could launch side-channel attacks to exploit some leakage information about the proxy key or even other secret states. The proxy signatures which are secure in the traditional security models obviously cannot provide such security. Based on this consideration, in this paper, we design a leakage-resilient proxy signature scheme for the secure mobile agent systems.

  11. An Efficient Identity-Based Proxy Blind Signature for Semioffline Services

    Directory of Open Access Journals (Sweden)

    Hongfei Zhu

    2018-01-01

    Full Text Available Fog computing extends the cloud computing to the network edge and allows deploying a new type of semioffline services, which can provide real-time transactions between two entities, while the central cloud server is offline and network edge devices are online. For an e-payment system and e-voting with such feature, proxy blind signature is a cornerstone to protect users’ privacy. However, the signature based on number theorem, such as hard mathematical problems on factoring problem, discrete logarithm problem, and bilinear pairings, cannot defeat quantum computers attack. Meanwhile, these schemes need to depend on complex public key infrastructure. Thus, we construct an identity-based proxy blind signature scheme based on number theorem research unit lattice, which can defeat quantum computers attack and does not need to depend on public key infrastructure. The security of the proposed scheme is dependent on Ring-Small Integer Solution problem over number theorem research unit lattice. The proposed scheme meets the properties of blind signature and proxy signature. Then we compare the proposed scheme with other existing proxy blind signature schemes; the result shows that the proposed scheme outperforms ZM scheme except in proxy signer’s signature size and can be more secure than TA scheme and MMHP scheme.

  12. A Directed Signature Scheme and its Applications

    OpenAIRE

    Lal, Sunder; Kumar, Manoj

    2004-01-01

    This paper presents a directed signature scheme with the property that the signature can be verified only with the help of signer or signature receiver. We also propose its applications to share verification of signatures and to threshold cryptosystems.

  13. Revocable identity-based proxy re-signature against signing key exposure.

    Science.gov (United States)

    Yang, Xiaodong; Chen, Chunlin; Ma, Tingchun; Wang, Jinli; Wang, Caifen

    2018-01-01

    Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key. Due to this transformation function, IDPRS is very useful in constructing privacy-preserving schemes for various information systems. Key revocation functionality is important in practical IDPRS for managing users dynamically; however, the existing IDPRS schemes do not provide revocation mechanisms that allow the removal of misbehaving or compromised users from the system. In this paper, we first introduce a notion called revocable identity-based proxy re-signature (RIDPRS) to achieve the revocation functionality. We provide a formal definition of RIDPRS as well as its security model. Then, we present a concrete RIDPRS scheme that can resist signing key exposure and prove that the proposed scheme is existentially unforgeable against adaptive chosen identity and message attacks in the standard model. To further improve the performance of signature verification in RIDPRS, we introduce a notion called server-aided revocable identity-based proxy re-signature (SA-RIDPRS). Moreover, we extend the proposed RIDPRS scheme to the SA-RIDPRS scheme and prove that this extended scheme is secure against adaptive chosen message and collusion attacks. The analysis results show that our two schemes remain efficient in terms of computational complexity when implementing user revocation procedures. In particular, in the SA-RIDPRS scheme, the verifier needs to perform only a bilinear pairing and four exponentiation operations to verify the validity of the signature. Compared with other IDPRS schemes in the standard model, our SA-RIDPRS scheme greatly reduces the computation overhead of verification.

  14. Method of Anti-Virus Protection Based on (n, t Threshold Proxy Signature with an Arbitrator

    Directory of Open Access Journals (Sweden)

    E. A. Tolyupa

    2014-01-01

    Full Text Available The article suggests the method of anti-virus protection of mobile devices based on the usage of proxy digital signatures and an (n;t-threshold proxy signature scheme with an arbitrator. The unique feature of the suggested method is in the absence of necessity to install anti-virus software in a mobile device. It will be enough only to have the software verifying digital signatures and the Internet. The method is used on the base of public keys infrastructure /PKI/, thus minimizing implementation expenses.

  15. An Arbitrated Quantum Signature Scheme without Entanglement*

    International Nuclear Information System (INIS)

    Li Hui-Ran; Luo Ming-Xing; Peng Dai-Yuan; Wang Xiao-Jun

    2017-01-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks . (paper)

  16. Tightly Secure Signatures From Lossy Identification Schemes

    OpenAIRE

    Abdalla , Michel; Fouque , Pierre-Alain; Lyubashevsky , Vadim; Tibouchi , Mehdi

    2015-01-01

    International audience; In this paper, we present three digital signature schemes with tight security reductions in the random oracle model. Our first signature scheme is a particularly efficient version of the short exponent discrete log-based scheme of Girault et al. (J Cryptol 19(4):463–487, 2006). Our scheme has a tight reduction to the decisional short discrete logarithm problem, while still maintaining the non-tight reduction to the computational version of the problem upon which the or...

  17. Quantum signature scheme for known quantum messages

    International Nuclear Information System (INIS)

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  18. A New Proxy Electronic Voting Scheme Achieved by Six-Particle Entangled States

    Science.gov (United States)

    Cao, Hai-Jing; Ding, Li-Yuan; Jiang, Xiu-Li; Li, Peng-Fei

    2018-03-01

    In this paper, we use quantum proxy signature to construct a new secret electronic voting scheme. In our scheme, six particles entangled states function as quantum channels. The voter Alice, the Vote Management Center Bob, the scrutineer Charlie only perform two particles measurements on the Bell bases to realize the electronic voting process. So the scheme reduces the technical difficulty and increases operation efficiency. We use quantum key distribution and one-time pad to guarantee its unconditional security. The significant advantage of our scheme is that transmitted information capacity is twice as much as the capacity of other schemes.

  19. Time-and-ID-Based Proxy Reencryption Scheme

    OpenAIRE

    Mtonga, Kambombo; Paul, Anand; Rho, Seungmin

    2014-01-01

    Time- and ID-based proxy reencryption scheme is proposed in this paper in which a type-based proxy reencryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. However, in some applications, the time within which the data was sampled or collected is very critical. In such applications, for example, healthcare and criminal investigations, the delegatee may be interested in only some of the messages with some types sampled wi...

  20. Digital Signature Schemes with Complementary Functionality and Applications

    OpenAIRE

    S. N. Kyazhin

    2012-01-01

    Digital signature schemes with additional functionality (an undeniable signature, a signature of the designated confirmee, a signature blind, a group signature, a signature of the additional protection) and examples of their application are considered. These schemes are more practical, effective and useful than schemes of ordinary digital signature.

  1. Design and Implementation of a Mobile Voting System Using a Novel Oblivious and Proxy Signature

    Directory of Open Access Journals (Sweden)

    Shin-Yan Chiou

    2017-01-01

    Full Text Available Electronic voting systems can make the voting process much more convenient. However, in such systems, if a server signs blank votes before users vote, it may cause undue multivoting. Furthermore, if users vote before the signing of the server, voting information will be leaked to the server and may be compromised. Blind signatures could be used to prevent leaking voting information from the server; however, malicious users could produce noncandidate signatures for illegal usage at that time or in the future. To overcome these problems, this paper proposes a novel oblivious signature scheme with a proxy signature function to satisfy security requirements such as information protection, personal privacy, and message verification and to ensure that no one can cheat other users (including the server. We propose an electronic voting system based on the proposed oblivious and proxy signature scheme and implement this scheme in a smartphone application to allow users to vote securely and conveniently. Security analyses and performance comparisons are provided to show the capability and efficiency of the proposed scheme.

  2. Quantum messages with signatures forgeable in arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Kim, Taewan; Choi, Jeong Woon; Jho, Nam-Su; Lee, Soojoon

    2015-01-01

    Even though a method to perfectly sign quantum messages has not been known, the arbitrated quantum signature scheme has been considered as one of the good candidates. However, its forgery problem has been an obstacle to the scheme becoming a successful method. In this paper, we consider one situation, which is slightly different from the forgery problem, that we use to check whether at least one quantum message with signature can be forged in a given scheme, although all the messages cannot be forged. If there are only a finite number of forgeable quantum messages in the scheme, then the scheme can be secured against the forgery attack by not sending forgeable quantum messages, and so our situation does not directly imply that we check whether the scheme is secure against the attack. However, if users run a given scheme without any consideration of forgeable quantum messages, then a sender might transmit such forgeable messages to a receiver and in such a case an attacker can forge the messages if the attacker knows them. Thus it is important and necessary to look into forgeable quantum messages. We show here that there always exists such a forgeable quantum message-signature pair for every known scheme with quantum encryption and rotation, and numerically show that there are no forgeable quantum message-signature pairs that exist in an arbitrated quantum signature scheme. (paper)

  3. Arbitrated quantum signature scheme with message recovery

    International Nuclear Information System (INIS)

    Lee, Hwayean; Hong, Changho; Kim, Hyunsang; Lim, Jongin; Yang, Hyung Jin

    2004-01-01

    Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed. One scheme uses a public board and the other does not. However both schemes provide confidentiality of the message and a higher efficiency in transmission

  4. Time-and-ID-Based Proxy Reencryption Scheme

    Directory of Open Access Journals (Sweden)

    Kambombo Mtonga

    2014-01-01

    Full Text Available Time- and ID-based proxy reencryption scheme is proposed in this paper in which a type-based proxy reencryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. However, in some applications, the time within which the data was sampled or collected is very critical. In such applications, for example, healthcare and criminal investigations, the delegatee may be interested in only some of the messages with some types sampled within some time bound instead of the entire subset. Hence, in order to carter for such situations, in this paper, we propose a time-and-identity-based proxy reencryption scheme that takes into account the time within which the data was collected as a factor to consider when categorizing data in addition to its type. Our scheme is based on Boneh and Boyen identity-based scheme (BB-IBE and Matsuo’s proxy reencryption scheme for identity-based encryption (IBE to IBE. We prove that our scheme is semantically secure in the standard model.

  5. Signature scheme based on bilinear pairs

    Science.gov (United States)

    Tong, Rui Y.; Geng, Yong J.

    2013-03-01

    An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.

  6. Security problem on arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Choi, Jeong Woon; Chang, Ku-Young; Hong, Dowon

    2011-01-01

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  7. Security problem on arbitrated quantum signature schemes

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Jeong Woon [Emerging Technology R and D Center, SK Telecom, Kyunggi 463-784 (Korea, Republic of); Chang, Ku-Young; Hong, Dowon [Cryptography Research Team, Electronics and Telecommunications Research Institute, Daejeon 305-700 (Korea, Republic of)

    2011-12-15

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  8. A group signature scheme based on quantum teleportation

    International Nuclear Information System (INIS)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu

    2010-01-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  9. A group signature scheme based on quantum teleportation

    Energy Technology Data Exchange (ETDEWEB)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu, E-mail: wxjun36@gmail.co [Information Countermeasure Technique Research Institute, Harbin Institute of Technology, Harbin 150001 (China)

    2010-05-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  10. Quantum signature scheme based on a quantum search algorithm

    International Nuclear Information System (INIS)

    Yoon, Chun Seok; Kang, Min Sung; Lim, Jong In; Yang, Hyung Jin

    2015-01-01

    We present a quantum signature scheme based on a two-qubit quantum search algorithm. For secure transmission of signatures, we use a quantum search algorithm that has not been used in previous quantum signature schemes. A two-step protocol secures the quantum channel, and a trusted center guarantees non-repudiation that is similar to other quantum signature schemes. We discuss the security of our protocol. (paper)

  11. Research on a New Signature Scheme on Blockchain

    Directory of Open Access Journals (Sweden)

    Chao Yuan

    2017-01-01

    Full Text Available With the rise of Bitcoin, blockchain which is the core technology of Bitcoin has received increasing attention. Privacy preserving and performance on blockchain are two research points in academia and business, but there are still some unresolved issues in both respects. An aggregate signature scheme is a digital signature that supports making signatures on many different messages generated by many different users. Using aggregate signature, the size of the signature could be shortened by compressing multiple signatures into a single signature. In this paper, a new signature scheme for transactions on blockchain based on the aggregate signature was proposed. It was worth noting that elliptic curve discrete logarithm problem and bilinear maps played major roles in our signature scheme. And the security properties of our signature scheme were proved. In our signature scheme, the amount will be hidden especially in the transactions which contain multiple inputs and outputs. Additionally, the size of the signature on transaction is constant regardless of the number of inputs and outputs that the transaction contains, which can improve the performance of signature. Finally, we gave an application scenario for our signature scheme which aims to achieve the transactions of big data on blockchain.

  12. A Digital Signature Scheme Based on MST3 Cryptosystems

    Directory of Open Access Journals (Sweden)

    Haibo Hong

    2014-01-01

    Full Text Available As special types of factorization of finite groups, logarithmic signature and cover have been used as the main components of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2, and MST3. Recently, Svaba et. al proposed a revised MST3 encryption scheme with greater security. Meanwhile, they put forward an idea of constructing signature schemes on the basis of logarithmic signatures and random covers. In this paper, we firstly design a secure digital signature scheme based on logarithmic signatures and random covers. In order to complete the task, we devise a new encryption scheme based on MST3 cryptosystems.

  13. Enhanced arbitrated quantum signature scheme using Bell states

    International Nuclear Information System (INIS)

    Wang Chao; Liu Jian-Wei; Shang Tao

    2014-01-01

    We investigate the existing arbitrated quantum signature schemes as well as their cryptanalysis, including intercept-resend attack and denial-of-service attack. By exploring the loopholes of these schemes, a malicious signatory may successfully disavow signed messages, or the receiver may actively negate the signature from the signatory without being detected. By modifying the existing schemes, we develop counter-measures to these attacks using Bell states. The newly proposed scheme puts forward the security of arbitrated quantum signature. Furthermore, several valuable topics are also presented for further research of the quantum signature scheme

  14. An Efficient Homomorphic Aggregate Signature Scheme Based on Lattice

    Directory of Open Access Journals (Sweden)

    Zhengjun Jing

    2014-01-01

    Full Text Available Homomorphic aggregate signature (HAS is a linearly homomorphic signature (LHS for multiple users, which can be applied for a variety of purposes, such as multi-source network coding and sensor data aggregation. In order to design an efficient postquantum secure HAS scheme, we borrow the idea of the lattice-based LHS scheme over binary field in the single-user case, and develop it into a new lattice-based HAS scheme in this paper. The security of the proposed scheme is proved by showing a reduction to the single-user case and the signature length remains invariant. Compared with the existing lattice-based homomorphic aggregate signature scheme, our new scheme enjoys shorter signature length and high efficiency.

  15. A novel quantum group signature scheme without using entangled states

    Science.gov (United States)

    Xu, Guang-Bao; Zhang, Ke-Jia

    2015-07-01

    In this paper, we propose a novel quantum group signature scheme. It can make the signer sign a message on behalf of the group without the help of group manager (the arbitrator), which is different from the previous schemes. In addition, a signature can be verified again when its signer disavows she has ever generated it. We analyze the validity and the security of the proposed signature scheme. Moreover, we discuss the advantages and the disadvantages of the new scheme and the existing ones. The results show that our scheme satisfies all the characteristics of a group signature and has more advantages than the previous ones. Like its classic counterpart, our scheme can be used in many application scenarios, such as e-government and e-business.

  16. Signature Schemes Secure against Hard-to-Invert Leakage

    DEFF Research Database (Denmark)

    Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus

    2012-01-01

    of the secret key. As a second contribution, we construct a signature scheme that achieves security for random messages assuming that the adversary is given a polynomial-time hard to invert function. Here, polynomial-hardness is required even when given the entire public-key – so called weak auxiliary input......-theoretically reveal the entire secret key. In this work, we propose the first constructions of digital signature schemes that are secure in the auxiliary input model. Our main contribution is a digital signature scheme that is secure against chosen message attacks when given an exponentially hard-to-invert function...... security. We show that such signature schemes readily give us auxiliary input secure identification schemes...

  17. A Secure and Efficient Certificateless Short Signature Scheme

    Directory of Open Access Journals (Sweden)

    Lin Cheng

    2013-07-01

    Full Text Available Certificateless public key cryptography combines advantage of traditional public key cryptography and identity-based public key cryptography as it avoids usage of certificates and resolves the key escrow problem. In 2007, Huang et al. classified adversaries against certificateless signatures according to their attack power into normal, strong and super adversaries (ordered by their attack power. In this paper, we propose a new certificateless short signature scheme and prove that it is secure against both of the super type I and the super type II adversaries. Our new scheme not only achieves the strongest security level but also has the shortest signature length (one group element. Compared with the other short certificateless signature schemes which have a similar security level, our new scheme has less operation cost.

  18. Review and Analysis of Cryptographic Schemes Implementing Threshold Signature

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-03-01

    Full Text Available This work is devoted to the study of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, ellipt ic curves and bilinear pairings were investigated. Different methods of generation and verification of threshold signatures were explored, e.g. used in a mobile agents, Internet banking and e-currency. The significance of the work is determined by the reduction of the level of counterfeit electronic documents, signed by certain group of users.

  19. A secure quantum group signature scheme based on Bell states

    International Nuclear Information System (INIS)

    Zhang Kejia; Song Tingting; Zuo Huijuan; Zhang Weiwei

    2013-01-01

    In this paper, we propose a new secure quantum group signature with Bell states, which may have applications in e-payment system, e-government, e-business, etc. Compared with the recent quantum group signature protocols, our scheme is focused on the most general situation in practice, i.e. only the arbitrator is trusted and no intermediate information needs to be stored in the signing phase to ensure the security. Furthermore, our scheme has achieved all the characteristics of group signature—anonymity, verifiability, traceability, unforgetability and undeniability, by using some current developed quantum and classical technologies. Finally, a feasible security analysis model for quantum group signature is presented. (paper)

  20. Quantum blind dual-signature scheme without arbitrator

    International Nuclear Information System (INIS)

    Li, Wei; Shi, Ronghua; Huang, Dazu; Shi, Jinjing; Guo, Ying

    2016-01-01

    Motivated by the elegant features of a bind signature, we suggest the design of a quantum blind dual-signature scheme with three phases, i.e., initial phase, signing phase and verification phase. Different from conventional schemes, legal messages are signed not only by the blind signatory but also by the sender in the signing phase. It does not rely much on an arbitrator in the verification phase as the previous quantum signature schemes usually do. The security is guaranteed by entanglement in quantum information processing. Security analysis demonstrates that the signature can be neither forged nor disavowed by illegal participants or attacker. It provides a potential application for e-commerce or e-payment systems with the current technology. (paper)

  1. Quantum blind dual-signature scheme without arbitrator

    Science.gov (United States)

    Li, Wei; Shi, Ronghua; Huang, Dazu; Shi, Jinjing; Guo, Ying

    2016-03-01

    Motivated by the elegant features of a bind signature, we suggest the design of a quantum blind dual-signature scheme with three phases, i.e., initial phase, signing phase and verification phase. Different from conventional schemes, legal messages are signed not only by the blind signatory but also by the sender in the signing phase. It does not rely much on an arbitrator in the verification phase as the previous quantum signature schemes usually do. The security is guaranteed by entanglement in quantum information processing. Security analysis demonstrates that the signature can be neither forged nor disavowed by illegal participants or attacker. It provides a potential application for e-commerce or e-payment systems with the current technology.

  2. Security analysis and improvements of arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Zou Xiangfu; Qiu Daowen

    2010-01-01

    A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. For signing quantum messages, some arbitrated quantum signature (AQS) schemes have been proposed. It was claimed that these AQS schemes could guarantee unconditional security. However, we show that they can be repudiated by the receiver Bob. To conquer this shortcoming, we construct an AQS scheme using a public board. The AQS scheme not only avoids being disavowed by the receiver but also preserves all merits in the existing schemes. Furthermore, we discover that entanglement is not necessary while all these existing AQS schemes depend on entanglement. Therefore, we present another AQS scheme without utilizing entangled states in the signing phase and the verifying phase. This scheme has three advantages: it does not utilize entangled states and it preserves all merits in the existing schemes; the signature can avoid being disavowed by the receiver; and it provides a higher efficiency in transmission and reduces the complexity of implementation.

  3. Signature scheme for the microscopic description of nuclear collective excitations

    International Nuclear Information System (INIS)

    Ogawa, K.

    1980-04-01

    The symmetries between the proton and neutron systems in a nucleus are described in terms of the signatures. Three kinds of signatures (i.e. the pn-, p anti n- and p anti p- (or n anti n-) signatures) are introduced and they are related to the appearance of various collective motions such as rotations or vibrations. It is shown that the pn-signature scheme provides a band-like structure of deformed nuclei, while the features associated with the quadrupole vibration are obtained in the p anti n- and p anti p-signature scheme. From the detail investigation of the p anti n-symmetric wave functions, it is concluded that the reguralities provided by the present shell model are more analogous to those of the γ-unstable surface vibration model (Wilets-Jean model) than to those of harmonic phonon model. (author)

  4. Network-based Arbitrated Quantum Signature Scheme with Graph State

    Science.gov (United States)

    Ma, Hongling; Li, Fei; Mao, Ningyi; Wang, Yijun; Guo, Ying

    2017-08-01

    Implementing an arbitrated quantum signature(QAS) through complex networks is an interesting cryptography technology in the literature. In this paper, we propose an arbitrated quantum signature for the multi-user-involved networks, whose topological structures are established by the encoded graph state. The determinative transmission of the shared keys, is enabled by the appropriate stabilizers performed on the graph state. The implementation of this scheme depends on the deterministic distribution of the multi-user-shared graph state on which the encoded message can be processed in signing and verifying phases. There are four parties involved, the signatory Alice, the verifier Bob, the arbitrator Trent and Dealer who assists the legal participants in the signature generation and verification. The security is guaranteed by the entanglement of the encoded graph state which is cooperatively prepared by legal participants in complex quantum networks.

  5. Fine-Grained Forward-Secure Signature Schemes without Random Oracles

    DEFF Research Database (Denmark)

    Camenisch, Jan; Koprowski, Maciej

    2006-01-01

    We propose the concept of fine-grained forward-secure signature schemes. Such signature schemes not only provide nonrepudiation w.r.t. past time periods the way ordinary forward-secure signature schemes do but, in addition, allow the signer to specify which signatures of the current time period...... remain valid when revoking the public key. This is an important advantage if the signer produces many signatures per time period as otherwise the signer would have to re-issue those signatures (and possibly re-negotiate the respective messages) with a new key.Apart from a formal model for fine......-grained forward-secure signature schemes, we present practical schemes and prove them secure under the strong RSA assumption only, i.e., we do not resort to the random oracle model to prove security. As a side-result, we provide an ordinary forward-secure scheme whose key-update time is significantly smaller than...

  6. XMSS : a practical forward secure signature scheme based on minimal security assumptions

    NARCIS (Netherlands)

    Buchmann, Johannes; Dahmen, Erik; Hülsing, Andreas; Yang, B.-Y.

    2011-01-01

    We present the hash-based signature scheme XMSS. It is the first provably (forward) secure and practical signature scheme with minimal security requirements: a pseudorandom and a second preimage resistant (hash) function family. Its signature size is reduced to less than 25% compared to the best

  7. A study of practical proxy reencryption with a keyword search scheme considering cloud storage structure.

    Science.gov (United States)

    Lee, Sun-Ho; Lee, Im-Yeong

    2014-01-01

    Data outsourcing services have emerged with the increasing use of digital information. They can be used to store data from various devices via networks that are easy to access. Unlike existing removable storage systems, storage outsourcing is available to many users because it has no storage limit and does not require a local storage medium. However, the reliability of storage outsourcing has become an important topic because many users employ it to store large volumes of data. To protect against unethical administrators and attackers, a variety of cryptography systems are used, such as searchable encryption and proxy reencryption. However, existing searchable encryption technology is inconvenient for use in storage outsourcing environments where users upload their data to be shared with others as necessary. In addition, some existing schemes are vulnerable to collusion attacks and have computing cost inefficiencies. In this paper, we analyze existing proxy re-encryption with keyword search.

  8. A Study of Practical Proxy Reencryption with a Keyword Search Scheme considering Cloud Storage Structure

    Directory of Open Access Journals (Sweden)

    Sun-Ho Lee

    2014-01-01

    Full Text Available Data outsourcing services have emerged with the increasing use of digital information. They can be used to store data from various devices via networks that are easy to access. Unlike existing removable storage systems, storage outsourcing is available to many users because it has no storage limit and does not require a local storage medium. However, the reliability of storage outsourcing has become an important topic because many users employ it to store large volumes of data. To protect against unethical administrators and attackers, a variety of cryptography systems are used, such as searchable encryption and proxy reencryption. However, existing searchable encryption technology is inconvenient for use in storage outsourcing environments where users upload their data to be shared with others as necessary. In addition, some existing schemes are vulnerable to collusion attacks and have computing cost inefficiencies. In this paper, we analyze existing proxy re-encryption with keyword search.

  9. Arbitrated quantum signature scheme based on χ-type entangled states

    International Nuclear Information System (INIS)

    Zuo, Huijuan; Huang, Wei; Qin, Sujuan

    2013-01-01

    An arbitrated quantum signature scheme, which is mainly applied in electronic-payment systems, is proposed and investigated. The χ-type entangled states are used for quantum key distribution and quantum signature in this protocol. Compared with previous quantum signature schemes which also utilize χ-type entangled states, the proposed scheme provides higher efficiency. Finally, we also analyze its security under various kinds of attacks. (paper)

  10. Arctic and Antarctic Oscillation signatures in tropical coral proxies over the South China Sea

    Directory of Open Access Journals (Sweden)

    D.-Y. Gong

    2009-05-01

    Full Text Available Arctic Oscillation (AO and Antarctic Oscillation (AAO are the leading modes of atmospheric circulation in mid-high latitudes. Previous studies have revealed that the climatic influences of the two modes are dominant in extra-tropical regions. This study finds that AO and AAO signals are also well recorded in coral proxies in the tropical South China Sea. There are significant interannual signals of AO and AAO in the strontium (Sr content, which represents the sea surface temperature (SST. Among all the seasons, the most significant correlation occurs during winter in both hemispheres: the strongest AO-Sr and AAO-Sr coral correlations occur in January and August, respectively. This study also determined that the Sr content lags behind AO and AAO by 1–3 months. Large-scale anomalies in sea level pressure and horizontal wind at 850 hPa level support the strength of AO/AAO-coral teleconnections. In addition, a comparison with oxygen isotope records from two coral sites in neighboring oceans yields significant AO and AAO signatures with similar time lags. These results help to better understand monsoon climates and their teleconnection to high-latitude climate changes.

  11. On the security of pairing-free certificateless digital signature schemes using ECC

    Directory of Open Access Journals (Sweden)

    Namita Tiwari

    2015-09-01

    Full Text Available I cryptanalyze the pairing-free digital signature scheme of Islam et al. which is proven secure against “adaptive chosen message attacks”. I introduce this type of forgery to analyze their scheme. Furthermore, I comment on general security issues that should be considered when making improvements on their scheme. My security analysis is also applicable to other digital signatures designed in a similar manner.

  12. A Provably Secure Aggregate Signature Scheme for Healthcare Wireless Sensor Networks.

    Science.gov (United States)

    Shen, Limin; Ma, Jianfeng; Liu, Ximeng; Miao, Meixia

    2016-11-01

    Wireless sensor networks (WSNs) are being used in a wide range of applications for healthcare monitoring, like heart rate monitors and blood pressure monitors, which can minimize the need for healthcare professionals. In medical system, sensors on or in patients produce medical data which can be easily compromised by a vast of attacks. Although signature schemes can protect data authenticity and data integrity, when the number of users involved in the medical system becomes huge, the bandwidth and storage cost will rise sharply so that existing signature schemes are inapplicability for WSNs. In this paper, we propose an efficient aggregate signature scheme for healthcare WSNs according to an improved security model, which can combine multiple signatures into a single aggregate signature. The length of such an aggregate signature may be as long as that of an individual one, which can greatly decrease the bandwidth and storage cost for networks.

  13. Sensor proxy mobile IPv6 (SPMIPv6)--a novel scheme for mobility supported IP-WSNs.

    Science.gov (United States)

    Islam, Md Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly.

  14. Quantum dual signature scheme based on coherent states with entanglement swapping

    International Nuclear Information System (INIS)

    Liu Jia-Li; Shi Rong-Hua; Shi Jin-Jing; Lv Ge-Li; Guo Ying

    2016-01-01

    A novel quantum dual signature scheme, which combines two signed messages expected to be sent to two diverse receivers Bob and Charlie, is designed by applying entanglement swapping with coherent states. The signatory Alice signs two different messages with unitary operations (corresponding to the secret keys) and applies entanglement swapping to generate a quantum dual signature. The dual signature is firstly sent to the verifier Bob who extracts and verifies the signature of one message and transmits the rest of the dual signature to the verifier Charlie who verifies the signature of the other message. The transmission of the dual signature is realized with quantum teleportation of coherent states. The analysis shows that the security of secret keys and the security criteria of the signature protocol can be greatly guaranteed. An extensional multi-party quantum dual signature scheme which considers the case with more than three participants is also proposed in this paper and this scheme can remain secure. The proposed schemes are completely suited for the quantum communication network including multiple participants and can be applied to the e-commerce system which requires a secure payment among the customer, business and bank. (paper)

  15. Quantum dual signature scheme based on coherent states with entanglement swapping

    Science.gov (United States)

    Liu, Jia-Li; Shi, Rong-Hua; Shi, Jin-Jing; Lv, Ge-Li; Guo, Ying

    2016-08-01

    A novel quantum dual signature scheme, which combines two signed messages expected to be sent to two diverse receivers Bob and Charlie, is designed by applying entanglement swapping with coherent states. The signatory Alice signs two different messages with unitary operations (corresponding to the secret keys) and applies entanglement swapping to generate a quantum dual signature. The dual signature is firstly sent to the verifier Bob who extracts and verifies the signature of one message and transmits the rest of the dual signature to the verifier Charlie who verifies the signature of the other message. The transmission of the dual signature is realized with quantum teleportation of coherent states. The analysis shows that the security of secret keys and the security criteria of the signature protocol can be greatly guaranteed. An extensional multi-party quantum dual signature scheme which considers the case with more than three participants is also proposed in this paper and this scheme can remain secure. The proposed schemes are completely suited for the quantum communication network including multiple participants and can be applied to the e-commerce system which requires a secure payment among the customer, business and bank. Project supported by the National Natural Science Foundation of China (Grant Nos. 61272495, 61379153, and 61401519) and the Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20130162110012).

  16. An ID-based Blind Signature Scheme from Bilinear Pairings

    OpenAIRE

    B.Umaprasada Rao; K.A.Ajmath

    2010-01-01

    Blind signatures, introduced by Chaum, allow a user to obtain a signature on a message without revealing any thing about the message to the signer. Blind signatures play on important role in plenty of applications such as e-voting, e-cash system where anonymity is of great concern. Identity based(ID-based) public key cryptography can be a good alternative for certified based public key setting, especially when efficient key management and moderate security are required. In this paper, we prop...

  17. An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model

    Directory of Open Access Journals (Sweden)

    Guomin Zhou

    2017-01-01

    Full Text Available Digital signature schemes with additional properties have broad applications, such as in protecting the identity of signers allowing a signer to anonymously sign a message in a group of signers (also known as a ring. While these number-theoretic problems are still secure at the time of this research, the situation could change with advances in quantum computing. There is a pressing need to design PKC schemes that are secure against quantum attacks. In this paper, we propose a novel code-based threshold ring signature scheme with a leader-participant model. A leader is appointed, who chooses some shared parameters for other signers to participate in the signing process. This leader-participant model enhances the performance because every participant including the leader could execute the decoding algorithm (as a part of signing process upon receiving the shared parameters from the leader. The time complexity of our scheme is close to Courtois et al.’s (2001 scheme. The latter is often used as a basis to construct other types of code-based signature schemes. Moreover, as a threshold ring signature scheme, our scheme is as efficient as the normal code-based ring signature.

  18. Risk analysis of the proxy life-cycle investments in the second pillar pension scheme in Croatia

    Directory of Open Access Journals (Sweden)

    Renata Kovačević

    2015-03-01

    Full Text Available In this article we analyze the expected risk of pension funds with different risk profiles in the proxy life-cycle model of investments for the 2nd pillar pension scheme in Croatia. The benefits of implementing proxy life-cycle investments, compared to the previous model of mandatory pension funds investments, are clearly visible in the total expected amount of accumulated savings from the risk/return perspective. However, those benefits are partially diminished by the fact that the expected risk of a pension fund with the lowest risk profile is not substantially different from the expected risk of a pension fund with a medium risk profile, due to the lack of diversification. Additionally, we analyze the robustness of the proxy life-cycle model to a sudden and severe market shock, where we determine the presence of risk for those members who choose to switch to a pension fund with a lower risk profile at an unfavorable moment.

  19. Key-Insulated Undetachable Digital Signature Scheme and Solution for Secure Mobile Agents in Electronic Commerce

    Directory of Open Access Journals (Sweden)

    Yang Shi

    2016-01-01

    Full Text Available Considering the security of both the customers’ hosts and the eShops’ servers, we introduce the idea of a key-insulated undetachable digital signature, enabling mobile agents to generate undetachable digital signatures on remote hosts with the key-insulated property of the original signer’s signing key. From the theoretical perspective, we provide the formal definition and security notion of a key-insulated undetachable digital signature. From the practical perspective, we propose a concrete scheme to secure mobile agents in electronic commerce. The scheme is mainly focused on protecting the signing key from leakage and preventing the misuse of the signature algorithm on malicious servers. Agents do not carry the signing key when they generate digital signatures on behalf of the original signer, so the key is protected on remote servers. Furthermore, if a hacker gains the signing key of the original signer, the hacker is still unable to forge a signature for any time period other than the key being accessed. In addition, the encrypted function is combined with the original signer’s requirement to prevent the misuse of signing algorithm. The scheme is constructed on gap Diffie–Hellman groups with provable security, and the performance testing indicates that the scheme is efficient.

  20. Supervised Multi-Authority Scheme with Blind Signature for IoT with Attribute Based Encryption

    Science.gov (United States)

    Nissenbaum, O. V.; Ponomarov, K. Y.; Zaharov, A. A.

    2018-04-01

    This article proposes a three-side cryptographic scheme for verifying device attributes with a Supervisor and a Certification Authority (CA) for attribute-based encryption. Two options are suggested: using a message authentication code and using a digital signature. The first version is suitable for networks with one CA, and the second one for networks with several CAs, including dynamic systems. Also, the addition of this scheme with a blind signature is proposed to preserve the confidentiality of the device attributes from the CA. The introduction gives a definition and a brief historical overview of attribute-based encryption (ABE), addresses the use of ABE in the Internet of Things.

  1. System for Anonymous Data Collection Based on Group Signature Scheme

    Directory of Open Access Journals (Sweden)

    David Troják

    2016-01-01

    Full Text Available This paper deals with an anonymous data collection in the Internet of Things (IoT. the privacy and anonymity of the data source is important for many IoT applications, such as in agriculture, health, and automotive. the proposed data‑collection system provides anonymity for the data sources by applying a cooperation group scheme. the group scheme also provides a low power consumption. the system is built upon the Tor (The Onion Router anonymous network, which is a part of the Internet darknet. the proposed system was designed for the Android devices on the client side and for Java environment on the server side. We evaluated the anonymous data collection in a real‑use scenario that covers selected data acquisition (e.g. signal strength from smartphones triggered by their geographical location change. the results show that the proposed system provides the sufficient data source anonymity, an effective revocation, a low computational cost and a low overhead.

  2. A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things

    Science.gov (United States)

    Yeh, Kuo-Hui; Su, Chunhua; Choo, Kim-Kwang Raymond; Chiu, Wayne

    2017-01-01

    Rapid advances in wireless communications and pervasive computing technologies have resulted in increasing interest and popularity of Internet-of-Things (IoT) architecture, ubiquitously providing intelligence and convenience to our daily life. In IoT-based network environments, smart objects are embedded everywhere as ubiquitous things connected in a pervasive manner. Ensuring security for interactions between these smart things is significantly more important, and a topic of ongoing interest. In this paper, we present a certificateless signature scheme for smart objects in IoT-based pervasive computing environments. We evaluate the utility of the proposed scheme in IoT-oriented testbeds, i.e., Arduino Uno and Raspberry PI 2. Experiment results present the practicability of the proposed scheme. Moreover, we revisit the scheme of Wang et al. (2015) and revealed that a malicious super type I adversary can easily forge a legitimate signature to cheat any receiver as he/she wishes in the scheme. The superiority of the proposed certificateless signature scheme over relevant studies is demonstrated in terms of the summarized security and performance comparisons. PMID:28468313

  3. A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things

    Directory of Open Access Journals (Sweden)

    Kuo-Hui Yeh

    2017-05-01

    Full Text Available Rapid advances in wireless communications and pervasive computing technologies have resulted in increasing interest and popularity of Internet-of-Things (IoT architecture, ubiquitously providing intelligence and convenience to our daily life. In IoT-based network environments, smart objects are embedded everywhere as ubiquitous things connected in a pervasive manner. Ensuring security for interactions between these smart things is significantly more important, and a topic of ongoing interest. In this paper, we present a certificateless signature scheme for smart objects in IoT-based pervasive computing environments. We evaluate the utility of the proposed scheme in IoT-oriented testbeds, i.e., Arduino Uno and Raspberry PI 2. Experiment results present the practicability of the proposed scheme. Moreover, we revisit the scheme of Wang et al. (2015 and revealed that a malicious super type I adversary can easily forge a legitimate signature to cheat any receiver as he/she wishes in the scheme. The superiority of the proposed certificateless signature scheme over relevant studies is demonstrated in terms of the summarized security and performance comparisons.

  4. A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things.

    Science.gov (United States)

    Yeh, Kuo-Hui; Su, Chunhua; Choo, Kim-Kwang Raymond; Chiu, Wayne

    2017-05-01

    Rapid advances in wireless communications and pervasive computing technologies have resulted in increasing interest and popularity of Internet-of-Things (IoT) architecture, ubiquitously providing intelligence and convenience to our daily life. In IoT-based network environments, smart objects are embedded everywhere as ubiquitous things connected in a pervasive manner. Ensuring security for interactions between these smart things is significantly more important, and a topic of ongoing interest. In this paper, we present a certificateless signature scheme for smart objects in IoT-based pervasive computing environments. We evaluate the utility of the proposed scheme in IoT-oriented testbeds, i.e., Arduino Uno and Raspberry PI 2. Experiment results present the practicability of the proposed scheme. Moreover, we revisit the scheme of Wang et al. (2015) and revealed that a malicious super type I adversary can easily forge a legitimate signature to cheat any receiver as he/she wishes in the scheme. The superiority of the proposed certificateless signature scheme over relevant studies is demonstrated in terms of the summarized security and performance comparisons.

  5. On the security of the Winternitz one-time signature scheme

    NARCIS (Netherlands)

    Buchmann, Johannes; Dahmen, Erik; Ereth, Sarah; Hülsing, Andreas; Rückert, Markus; Nitaj, A.; Pointcheval, D.

    2011-01-01

    We show that the Winternitz one-time signature scheme is existentially unforgeable under adaptive chosen message attacks when instantiated with a family of pseudo random functions. Compared to previous results, which require a collision resistant hash function, our result provides significantly

  6. Design and implementation of Ad-Hoc collaborative proxying scheme for reducing network energy waste

    Directory of Open Access Journals (Sweden)

    Rafiullah Khan

    2017-05-01

    Full Text Available Network devices are equipped with low power states but they are rarely activated due to their inability of maintaining network connectivity. Recently, Network Connectivity Proxy (NCP concept has been proposed in literature as an effective mechanism to exploit full potential of low power features on network devices by impersonating their virtual presence. However, the NCP concept faces several open issues and challenges especially related to proxying of TCP connections and majority of daily used proprietary closed-source applications. This paper presents a new approach for reducing network energy waste through intelligent collaboration among daily used devices (e.g., desktop computers, laptops, tablets, smartphones, etc. It guarantees to run applications on only and only one user device that is under active use at that specific moment. To reduce energy waste and allow idle devices to sleep, our approach also takes benefit from a light-weight home gateway proxy with very basic practically realizable functionalities. The proposed system not just reduces energy waste of fixed devices but also enables mobile devices to significantly improve their battery life. Our developed software prototypes allow devices to autonomously and seamlessly collaborate with each other without requiring any configuration or user input. Further, this paper also presents the basic performance evaluation of developed prototypes in real networking environments.

  7. Security analysis of boolean algebra based on Zhang-Wang digital signature scheme

    International Nuclear Information System (INIS)

    Zheng, Jinbin

    2014-01-01

    In 2005, Zhang and Wang proposed an improvement signature scheme without using one-way hash function and message redundancy. In this paper, we show that this scheme exits potential safety concerns through the analysis of boolean algebra, such as bitwise exclusive-or, and point out that mapping is not one to one between assembly instructions and machine code actually by means of the analysis of the result of the assembly program segment, and which possibly causes safety problems unknown to the software

  8. Security analysis of boolean algebra based on Zhang-Wang digital signature scheme

    Energy Technology Data Exchange (ETDEWEB)

    Zheng, Jinbin, E-mail: jbzheng518@163.com [School of Mathematics and Computer Science, Long Yan University, Longyan 364012 (China)

    2014-10-06

    In 2005, Zhang and Wang proposed an improvement signature scheme without using one-way hash function and message redundancy. In this paper, we show that this scheme exits potential safety concerns through the analysis of boolean algebra, such as bitwise exclusive-or, and point out that mapping is not one to one between assembly instructions and machine code actually by means of the analysis of the result of the assembly program segment, and which possibly causes safety problems unknown to the software.

  9. Cost-effective handoff scheme based on mobility-aware dual pointer forwarding in proxy mobile IPv6 networks.

    Science.gov (United States)

    Son, Seungsik; Jeong, Jongpil

    2014-01-01

    In this paper, a mobility-aware Dual Pointer Forwarding scheme (mDPF) is applied in Proxy Mobile IPv6 (PMIPv6) networks. The movement of a Mobile Node (MN) is classified as intra-domain and inter-domain handoff. When the MN moves, this scheme can reduce the high signaling overhead for intra-handoff/inter-handoff, because the Local Mobility Anchor (LMA) and Mobile Access Gateway (MAG) are connected by pointer chains. In other words, a handoff is aware of low mobility between the previously attached MAG (pMAG) and newly attached MAG (nMAG), and another handoff between the previously attached LMA (pLMA) and newly attached LMA (nLMA) is aware of high mobility. Based on these mobility-aware binding updates, the overhead of the packet delivery can be reduced. Also, we analyse the binding update cost and packet delivery cost for route optimization, based on the mathematical analytic model. Analytical results show that our mDPF outperforms the PMIPv6 and the other pointer forwarding schemes, in terms of reducing the total cost of signaling.

  10. Obfuscated RSUs Vector Based Signature Scheme for Detecting Conspiracy Sybil Attack in VANETs

    Directory of Open Access Journals (Sweden)

    Xia Feng

    2017-01-01

    Full Text Available Given the popularity of vehicular Ad hoc networks (VANETs in traffic management, a new challenging issue comes into traffic safety, that is, security of the networks, especially when the adversary breaks defence. Sybil attack, for example, is a potential security threat through forging several identities to carry out attacks in VANETs. At this point, the paper proposed a solution named DMON that is a Sybil attack detection method with obfuscated neighbor relationship of Road Side Units (RSUs. DMON presents a ring signature based identification scheme and replaces vehicles’ identities with their trajectory for the purpose of anonymity. Furthermore, the neighbor relationship of RSUs is obfuscated to achieve privacy preserving of locations. The proposed scheme has been formally proved in the views of security and performance. Simulation has also been implemented to validate the scheme, in which the findings reveal the lower computational overhead and higher detection rate comparing with other related solutions.

  11. Sensor Proxy Mobile IPv6 (SPMIPv6)—A Novel Scheme for Mobility Supported IP-WSNs

    Science.gov (United States)

    Islam, Md. Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly. PMID:22319386

  12. Sensor Proxy Mobile IPv6 (SPMIPv6—A Novel Scheme for Mobility Supported IP-WSNs

    Directory of Open Access Journals (Sweden)

    Md. Motaharul Islam

    2011-02-01

    Full Text Available IP based Wireless Sensor Networks (IP-WSNs are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6. We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly.

  13. Securing optical code-division multiple-access networks with a postswitching coding scheme of signature reconfiguration

    Science.gov (United States)

    Huang, Jen-Fa; Meng, Sheng-Hui; Lin, Ying-Chen

    2014-11-01

    The optical code-division multiple-access (OCDMA) technique is considered a good candidate for providing optical layer security. An enhanced OCDMA network security mechanism with a pseudonoise (PN) random digital signals type of maximal-length sequence (M-sequence) code switching to protect against eavesdropping is presented. Signature codes unique to individual OCDMA-network users are reconfigured according to the register state of the controlling electrical shift registers. Examples of signature reconfiguration following state switching of the controlling shift register for both the network user and the eavesdropper are numerically illustrated. Dynamically changing the PN state of the shift register to reconfigure the user signature sequence is shown; this hinders eavesdroppers' efforts to decode correct data sequences. The proposed scheme increases the probability of eavesdroppers committing errors in decoding and thereby substantially enhances the degree of an OCDMA network's confidentiality.

  14. Visit to general practitioners as a proxy for accessing chronic benefits by members of medical schemes, South Africa

    Directory of Open Access Journals (Sweden)

    Mncedisi M. Willie

    2012-10-01

    Full Text Available Background: Prescribed Minimum Benefits is a list of conditions that all medical schemes need to cover in full, and includes a select of chronic conditions. Chronic conditions affect people’s lifestyles and require ongoing management over a period of years for long-term survival. Objectives: This study examined the association between prevalence of selected chronic diseases and health service use, in particular visits to general practitioners (GPs by medical scheme members. Method: This was a retrospective study on medical schemes data. The median imputation method was employed to deal with missing and unreported chronic diseases prevalence. Multivariate logistic regression analysis was employed to assess effects of chronic disease prevalence, age stratum and scheme size on GP visits per annum. Results: The study showed that prevalence of asthma was significantly associated with more than three GP visits (OR = 1.081; 95% CI = 1.008–1.159, as was prevalence of type 2 diabetes (OR = 1.087; 95% CI = 1.027–1.152, whilst prevalence of hyperlipidaemia (OR = 0.92; 95% CI = 0.875–0.97 was more likely to be associated with less than three GP visits. Prevalence of hypertension was associated with more than three GP visits per year (OR = 1.132; 95% CI = 1.017–1.26. Conclusion: This study shows that scheme size, prevalence of chronic diseases such as asthma, type 2 diabetes, hyperlipidaemia and hypertension are related to GP visits. GPs and managed care programmes employed by schemes should give special attention to certain disease states with high prevalence rates in an effort to better manage them.

  15. An energy signature scheme for steam trap assessment and flow rate estimation using pipe-induced acoustic measurements

    Science.gov (United States)

    Olama, Mohammed M.; Allgood, Glenn O.; Kuruganti, Teja P.; Lake, Joe E.

    2012-06-01

    The US Congress has passed legislation dictating that all government agencies establish a plan and process for improving energy efficiencies at their sites. In response to this legislation, Oak Ridge National Laboratory (ORNL) has recently conducted a pilot study to explore the deployment of a wireless sensor system for a real-time measurement-based energy efficiency optimization framework within the steam distribution system within the ORNL campus. We make assessments on the real-time status of the distribution system by observing the state measurements of acoustic sensors mounted on the steam pipes/traps/valves. In this paper, we describe a spectral-based energy signature scheme that interprets acoustic vibration sensor data to estimate steam flow rates and assess steam traps health status. Experimental results show that the energy signature scheme has the potential to identify different steam trap health status and it has sufficient sensitivity to estimate steam flow rate. Moreover, results indicate a nearly quadratic relationship over the test region between the overall energy signature factor and flow rate in the pipe. The analysis based on estimated steam flow and steam trap status helps generate alerts that enable operators and maintenance personnel to take remedial action. The goal is to achieve significant energy-saving in steam lines by monitoring and acting on leaking steam pipes/traps/valves.

  16. Fair quantum blind signatures

    International Nuclear Information System (INIS)

    Tian-Yin, Wang; Qiao-Yan, Wen

    2010-01-01

    We present a new fair blind signature scheme based on the fundamental properties of quantum mechanics. In addition, we analyse the security of this scheme, and show that it is not possible to forge valid blind signatures. Moreover, comparisons between this scheme and public key blind signature schemes are also discussed. (general)

  17. Assessment of WRF microphysics schemes to simulate extreme precipitation events from the perspective of GMI radiative signatures

    Science.gov (United States)

    Choi, Y.; Shin, D. B.; Joh, M.

    2015-12-01

    Numerical simulations of precipitation depend to a large degree on the assumed cloud microphysics schemes representing the formation, growth and fallout of cloud droplets and ice crystals. Recent studies show that assumed cloud microphysics play a major role not only in forecasting precipitation, especially in cases of extreme precipitation events, but also in the quality of the passive microwave rainfall estimation. Evaluations of the various Weather Research Forecasting (WRF) model microphysics schemes in this study are based on a method that was originally developed to construct the a-priori databases of precipitation profiles and associated brightness temperatures (TBs) for precipitation retrievals. This methodology generates three-dimensional (3D) precipitation fields by matching the GPM dual frequency radar (DPR) reflectivity profiles with those calculated from cloud resolving model (CRM)-derived hydrometeor profiles. The method eventually provides 3D simulated precipitation fields over the DPR scan swaths. That is, atmospheric and hydrometeor profiles can be generated at each DPR pixel based on CRM and DPR reflectivity profiles. The generated raining systems over DPR observation fields can be applied to any radiometers that are unaccompanied with a radar for microwave radiative calculation with consideration of each sensor's channel and field of view. Assessment of the WRF model microphysics schemes for several typhoon cases in terms of emission and scattering signals of GMI will be discussed.

  18. Real Traceable Signatures

    Science.gov (United States)

    Chow, Sherman S. M.

    Traceable signature scheme extends a group signature scheme with an enhanced anonymity management mechanism. The group manager can compute a tracing trapdoor which enables anyone to test if a signature is signed by a given misbehaving user, while the only way to do so for group signatures requires revealing the signer of all signatures. Nevertheless, it is not tracing in a strict sense. For all existing schemes, T tracing agents need to recollect all N' signatures ever produced and perform RN' “checks” for R revoked users. This involves a high volume of transfer and computations. Increasing T increases the degree of parallelism for tracing but also the probability of “missing” some signatures in case some of the agents are dishonest.

  19. Unconditionally Secure Quantum Signatures

    Directory of Open Access Journals (Sweden)

    Ryan Amiri

    2015-08-01

    Full Text Available Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols—signatures based on the Rivest–Adleman–Shamir (RSA algorithm, the digital signature algorithm (DSA, and the elliptic curve digital signature algorithm (ECDSA—are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally securesecure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  20. Here be web proxies

    DEFF Research Database (Denmark)

    Weaver, Nicholas; Kreibich, Christian; Dam, Martin

    2014-01-01

    ,000 clients that include a novel proxy location technique based on traceroutes of the responses to TCP connection establishment requests, which provides additional clues regarding the purpose of the identified web proxies. Overall, we see 14% of Netalyzr-analyzed clients with results that suggest the presence...... of web proxies....

  1. Jemen - the Proxy War

    Directory of Open Access Journals (Sweden)

    Magdalena El Ghamari

    2015-12-01

    Full Text Available The military operation in Yemen is significant departure from Saudi Arabia's foreign policy tradition and customs. Riyadh has always relied on three strategies to pursue its interests abroad: wealth, establish a global network and muslim education and diplomacy and meadiation. The term "proxy war" has experienced a new popularity in stories on the Middle East. A proxy war is two opposing countries avoiding direct war, and instead supporting combatants that serve their interests. In some occasions, one country is a direct combatant whilst the other supporting its enemy. Various news sources began using the term to describe the conflict in Yemen immediately, as if on cue, after Saudi Arabia launched its bombing campaign against Houthi targets in Yemen on 25 March 2015. This is the reason, why author try to answer for following questions: Is the Yemen Conflict Devolves into Proxy War? and Who's fighting whom in Yemen's proxy war?" Research area includes the problem of proxy war in the Middle East. For sure, the real problem of proxy war must begin with the fact that the United States and its NATO allies opened the floodgates for regional proxy wars by the two major wars for regime change: in Iraq and Libya. Those two destabilising wars provided opportunities and motives for Sunni states across the Middle East to pursue their own sectarian and political power objectives through "proxy war".

  2. Witnessing entanglement by proxy

    International Nuclear Information System (INIS)

    Bäuml, Stefan; Bruß, Dagmar; Kampermann, Hermann; Huber, Marcus; Winter, Andreas

    2016-01-01

    Entanglement is a ubiquitous feature of low temperature systems and believed to be highly relevant for the dynamics of condensed matter properties and quantum computation even at higher temperatures. The experimental certification of this paradigmatic quantum effect in macroscopic high temperature systems is constrained by the limited access to the quantum state of the system. In this paper we show how macroscopic observables beyond the mean energy of the system can be exploited as proxy witnesses for entanglement detection. Using linear and semi-definite relaxations we show that all previous approaches to this problem can be outperformed by our proxies, i.e. entanglement can be certified at higher temperatures without access to any local observable. For an efficient computation of proxy witnesses one can resort to a generalised grand canonical ensemble, enabling entanglement certification even in complex systems with macroscopic particle numbers. (paper)

  3. Inferring climate variability from skewed proxy records

    Science.gov (United States)

    Emile-Geay, J.; Tingley, M.

    2013-12-01

    compared to other proxy records. (2) a multiproxy reconstruction of temperature over the Common Era (Mann et al., 2009), where we find that about one third of the records display significant departures from normality. Accordingly, accounting for skewness in proxy predictors has a notable influence on both reconstructed global mean and spatial patterns of temperature change. Inferring climate variability from skewed proxy records thus requires cares, but can be done with relatively simple tools. References - Mann, M. E., Z. Zhang, S. Rutherford, R. S. Bradley, M. K. Hughes, D. Shindell, C. Ammann, G. Faluvegi, and F. Ni (2009), Global signatures and dynamical origins of the little ice age and medieval climate anomaly, Science, 326(5957), 1256-1260, doi:10.1126/science.1177303. - Moy, C., G. Seltzer, D. Rodbell, and D. Anderson (2002), Variability of El Niño/Southern Oscillation activ- ity at millennial timescales during the Holocene epoch, Nature, 420(6912), 162-165.

  4. Munchausen by Proxy Syndrome

    Science.gov (United States)

    ... the Child Getting Help for the Parent or Caregiver Print Munchausen by proxy syndrome (MBPS) is a relatively rare form of child abuse that involves the exaggeration or fabrication of illnesses or symptoms by a primary caretaker. Also known as "medical child abuse," MBPS ...

  5. Signature Balancing

    NARCIS (Netherlands)

    Noordkamp, H.W.; Brink, M. van den

    2006-01-01

    Signatures are an important part of the design of a ship. In an ideal situation, signatures must be as low as possible. However, due to budget constraints it is most unlikely to reach this ideal situation. The arising question is which levels of signatures are optimal given the different scenarios

  6. Munchausen syndrome by proxy

    Directory of Open Access Journals (Sweden)

    Jovanović Aleksandar A.

    2005-01-01

    Full Text Available This review deals with bibliography on Munchausen syndrome by proxy (MSbP. The name of this disorder was introduced by English psychiatrist Roy Meadow who pointed to diagnostic difficulties as well as to serious medical and legal connotations of MSbP. MSbP was classified in DSM-IV among criteria sets provided for further study as "factitious disorder by proxy", while in ICD-10, though not explicitly cited, MSbP might be classified as "factitious disorders" F68.1. MSbP is a special form of abuse where the perpetrator induces somatic or mental symptoms of illness in the victim under his/her care and then persistently presents the victims for medical examinations and care. The victim is usually a preschool child and the perpetrator is the child's mother. Motivation for such pathological behavior of perpetrator is considered to be unconscious need to assume sick role by proxy while external incentives such as economic gain are absent. Conceptualization of MSbP development is still in the domain of psychodynamic speculation, its course is chronic and the prognosis is poor considering lack of consistent, efficient and specific treatment. The authors also present the case report of thirty-three year-old mother who had been abusing her nine year-old son both emotionally and physically over the last several years forcing him to, together with her, report to the police, medical and educational institutions that he had been the victim of rape, poisoning and beating by various individuals, especially teaching and medical staff. Mother manifested psychosis and her child presented with impaired cognitive development, emotional problems and conduct disorder.

  7. General Conversion for Obtaining Strongly Existentially Unforgeable Signatures

    Science.gov (United States)

    Teranishi, Isamu; Oyama, Takuro; Ogata, Wakaha

    We say that a signature scheme is strongly existentially unforgeable (SEU) if no adversary, given message/signature pairs adaptively, can generate a signature on a new message or a new signature on a previously signed message. We propose a general and efficient conversion in the standard model that transforms a secure signature scheme to SEU signature scheme. In order to construct that conversion, we use a chameleon commitment scheme. Here a chameleon commitment scheme is a variant of commitment scheme such that one can change the committed value after publishing the commitment if one knows the secret key. We define the chosen message security notion for the chameleon commitment scheme, and show that the signature scheme transformed by our proposed conversion satisfies the SEU property if the chameleon commitment scheme is chosen message secure. By modifying the proposed conversion, we also give a general and efficient conversion in the random oracle model, that transforms a secure signature scheme into a SEU signature scheme. This second conversion also uses a chameleon commitment scheme but only requires the key only attack security for it.

  8. Climate proxy data as groundwater tracers in regional flow systems

    Science.gov (United States)

    Clark, J. F.; Morrissey, S. K.; Stute, M.

    2008-05-01

    The isotopic and chemical signatures of groundwater reflect local climate conditions. By systematically analyzing groundwater and determining their hydrologic setting, records of past climates can be constructed. Because of their chemistries and relatively uncomplicated source functions, dissolved noble gases have yielded reliable records of continental temperatures for the last 30,000 to 50,000 years. Variations in the stable isotope compositions of groundwater due to long term climate changes have also been documented over these time scales. Because glacial - interglacial climate changes are relatively well known, these climate proxies can be used as "stratigraphic" markers within flow systems and used to distinguish groundwaters that have recharged during the Holocene from those recharged during the last glacial period, important time scales for distinguishing regional and local flow systems in many aquifers. In southern Georgia, the climate proxy tracers were able to identify leakage from surface aquifers into the Upper Floridan aquifer in areas previously thought to be confined. In south Florida, the transition between Holocene and glacial signatures in the Upper Floridan aquifer occurs mid-way between the recharge area and Lake Okeechobee. Down gradient of the lake, the proxies are uniform, indicating recharge during the last glacial period. Furthermore, there is no evidence for leakage from the shallow aquifers into the Upper Floridan. In the Lower Floridan, the climate proxies indicate that the saline water entered the aquifer after sea level rose to its present level.

  9. Quantum multi-signature protocol based on teleportation

    International Nuclear Information System (INIS)

    Wen Xiao-jun; Liu Yun; Sun Yu

    2007-01-01

    In this paper, a protocol which can be used in multi-user quantum signature is proposed. The scheme of signature and verification is based on the correlation of Greenberger-Horne-Zeilinger (GHZ) states and the controlled quantum teleportation. Different from the digital signatures, which are based on computational complexity, the proposed protocol has perfect security in the noiseless quantum channels. Compared to previous quantum signature schemes, this protocol can verify the signature independent of an arbitrator as well as realize multi-user signature together. (orig.)

  10. The Last Millennium Reanalysis: Improvements to proxies and proxy modeling

    Science.gov (United States)

    Tardif, R.; Hakim, G. J.; Emile-Geay, J.; Noone, D.; Anderson, D. M.

    2017-12-01

    The Last Millennium Reanalysis (LMR) employs a paleoclimate data assimilation (PDA) approach to produce climate field reconstructions (CFRs). Here, we focus on two key factors in PDA generated CFRs: the set of assimilated proxy records and forward models (FMs) used to estimate proxies from climate model output. In the initial configuration of the LMR [Hakim et al., 2016], the proxy dataset of [PAGES2k Consortium, 2013] was used, along with univariate linear FMs calibrated against annually-averaged 20th century temperature datasets. In an updated configuration, proxy records from the recent dataset [PAGES2k Consortium, 2017] are used, while a hierarchy of statistical FMs are tested: (1) univariate calibrated on annual temperature as in the initial configuration, (2) univariate against temperature as in (1) but calibration performed using expert-derived seasonality for individual proxy records, (3) as in (2) but expert proxy seasonality replaced by seasonal averaging determined objectively as part of the calibration process, (4) linear objective seasonal FMs as in (3) but objectively selecting relationships calibrated either on temperature or precipitation, and (5) bivariate linear models calibrated on temperature and precipitation with objectively-derived seasonality. (4) and (5) specifically aim at better representing the physical drivers of tree ring width proxies. Reconstructions generated using the CCSM4 Last Millennium simulation as an uninformed prior are evaluated against various 20th century data products. Results show the benefits of using the new proxy collection, particularly on the detrended global mean temperature and spatial patterns. The positive impact of using proper seasonality and temperature/moisture sensitivities for tree ring width records is also notable. This updated configuration will be used for the first generation of LMR-generated CFRs to be publicly released. These also provide a benchmark for future efforts aimed at evaluating the

  11. Lattice-Based Revocable Certificateless Signature

    Directory of Open Access Journals (Sweden)

    Ying-Hao Hung

    2017-10-01

    Full Text Available Certificateless signatures (CLS are noticeable because they may resolve the key escrow problem in ID-based signatures and break away the management problem regarding certificate in conventional signatures. However, the security of the mostly previous CLS schemes relies on the difficulty of solving discrete logarithm or large integer factorization problems. These two problems would be solved by quantum computers in the future so that the signature schemes based on them will also become insecure. For post-quantum cryptography, lattice-based cryptography is significant due to its efficiency and security. However, no study on addressing the revocation problem in the existing lattice-based CLS schemes is presented. In this paper, we focus on the revocation issue and present the first revocable CLS (RCLS scheme over lattices. Based on the short integer solution (SIS assumption over lattices, the proposed lattice-based RCLS scheme is shown to be existential unforgeability against adaptive chosen message attacks. By performance analysis and comparisons, the proposed lattice-based RCLS scheme is better than the previously proposed lattice-based CLS scheme, in terms of private key size, signature length and the revocation mechanism.

  12. Radiation signatures

    International Nuclear Information System (INIS)

    McGlynn, S.P.; Varma, M.N.

    1992-01-01

    A new concept for modelling radiation risk is proposed. This concept is based on the proposal that the spectrum of molecular lesions, which we dub ''the radiation signature'', can be used to identify the quality of the causal radiation. If the proposal concerning radiation signatures can be established then, in principle, both prospective and retrospective risk determination can be assessed on an individual basis. A major goal of biophysical modelling is to relate physical events such as ionization, excitation, etc. to the production of radiation carcinogenesis. A description of the physical events is provided by track structure. The track structure is determined by radiation quality, and it can be considered to be the ''physical signature'' of the radiation. Unfortunately, the uniqueness characteristics of this signature are dissipated in biological systems in ∼10 -9 s. Nonetheless, it is our contention that this physical disturbance of the biological system eventuates later, at ∼10 0 s, in molecular lesion spectra which also characterize the causal radiation. (author)

  13. Multi-proxy studies in palaeolimnology

    OpenAIRE

    Birks, Hilary H.; Birks, Harry John Betteley

    2006-01-01

    Multi-proxy studies are becoming increasingly common in palaeolimnology. Eight basic requirements and challenges for a multi-proxy study are outlined in this essay – definition of research questions, leadership, site selection and coring, data storage, chronology, presentation of results, numerical tools, and data interpretation. The nature of proxy data is discussed in terms of physical proxies and biotic proxies. Loss-on-ignition changes and the use of transfer functions are reviewed as exa...

  14. Secure Certificateless Signature with Revocation in the Standard Model

    Directory of Open Access Journals (Sweden)

    Tung-Tso Tsai

    2014-01-01

    previously proposed certificateless signature schemes were insecure under a considerably strong security model in the sense that they suffered from outsiders’ key replacement attacks or the attacks from the key generation center (KGC. In this paper, we propose a certificateless signature scheme without random oracles. Moreover, our scheme is secure under the strong security model and provides a public revocation mechanism, called revocable certificateless signature (RCLS. Under the standard computational Diffie-Hellman assumption, we formally demonstrate that our scheme possesses existential unforgeability against adaptive chosen-message attacks.

  15. Qualitative and Quantitative Sentiment Proxies

    DEFF Research Database (Denmark)

    Zhao, Zeyan; Ahmad, Khurshid

    2015-01-01

    Sentiment analysis is a content-analytic investigative framework for researchers, traders and the general public involved in financial markets. This analysis is based on carefully sourced and elaborately constructed proxies for market sentiment and has emerged as a basis for analysing movements...

  16. Motif signatures of transcribed enhancers

    KAUST Repository

    Kleftogiannis, Dimitrios

    2017-09-14

    In mammalian cells, transcribed enhancers (TrEn) play important roles in the initiation of gene expression and maintenance of gene expression levels in spatiotemporal manner. One of the most challenging questions in biology today is how the genomic characteristics of enhancers relate to enhancer activities. This is particularly critical, as several recent studies have linked enhancer sequence motifs to specific functional roles. To date, only a limited number of enhancer sequence characteristics have been investigated, leaving space for exploring the enhancers genomic code in a more systematic way. To address this problem, we developed a novel computational method, TELS, aimed at identifying predictive cell type/tissue specific motif signatures. We used TELS to compile a comprehensive catalog of motif signatures for all known TrEn identified by the FANTOM5 consortium across 112 human primary cells and tissues. Our results confirm that distinct cell type/tissue specific motif signatures characterize TrEn. These signatures allow discriminating successfully a) TrEn from random controls, proxy of non-enhancer activity, and b) cell type/tissue specific TrEn from enhancers expressed and transcribed in different cell types/tissues. TELS codes and datasets are publicly available at http://www.cbrc.kaust.edu.sa/TELS.

  17. Re-examining the security of blind quantum signature protocols

    International Nuclear Information System (INIS)

    Wang Mingming; Chen Xiubo; Niu Xinxin; Yang Yixian

    2012-01-01

    Recently, blind quantum signature (BQS) protocols have been proposed with the help of a third-party verifier. However, our research shows that some of the BQS protocols are unable to complete the blind signature task fairly if the verifier is dishonest. Indeed, these protocols can be viewed as variants of the classical digital signature scheme of symmetric-key cryptography. If nobody is trusted in such protocols, digital signature cannot be implemented since disagreements cannot be solved fairly.

  18. Sea ice and primary production proxies in surface sediments from a High Arctic Greenland fjord

    DEFF Research Database (Denmark)

    Ribeiro, Sofia; Sejr, Mikael K; Limoges, Audrey

    2017-01-01

    Monitoring Programme. Clear spatial gradients in organic carbon and biogenic silica contents reflected marine influence, nutrient availability and river-induced turbidity, in good agreement with in situ measurements. The sea ice proxy IP25 was detected at all sites but at low concentrations, indicating...... that IP25 records from fjords need to be carefully considered and not directly compared to marine settings. The sea ice-associated biomarker HBI III revealed an open-water signature, with highest concentrations near the mid-July ice edge. This proxy evaluation is an important step towards reliable......In order to establish a baseline for proxy-based reconstructions for the Young Sound–Tyrolerfjord system (Northeast Greenland), we analysed the spatial distribution of primary production and sea ice proxies in surface sediments from the fjord, against monitoring data from the Greenland Ecosystem...

  19. Shareholder Activism through the Proxy Process

    NARCIS (Netherlands)

    Renneboog, L.D.R.; Szilagyi, P.G.

    2009-01-01

    This paper provides evidence on the corporate governance role of shareholderinitiated proxy proposals. Previous studies debate over whether activists use proxy proposals to discipline firms or to simply advance their self-serving agendas, and whether proxy proposals are effective at all in

  20. Shareholder Activism Through the Proxy Process

    NARCIS (Netherlands)

    Renneboog, L.D.R.; Szilagyi, P.G.

    2009-01-01

    This paper provides evidence on the corporate governance role of shareholder-initiated proxy proposals. Previous studies debate over whether activists use proxy proposals to discipline firms or to simply advance their self-serving agendas, and whether proxy proposals are effective at all in

  1. Blind Quantum Signature with Blind Quantum Computation

    Science.gov (United States)

    Li, Wei; Shi, Ronghua; Guo, Ying

    2017-04-01

    Blind quantum computation allows a client without quantum abilities to interact with a quantum server to perform a unconditional secure computing protocol, while protecting client's privacy. Motivated by confidentiality of blind quantum computation, a blind quantum signature scheme is designed with laconic structure. Different from the traditional signature schemes, the signing and verifying operations are performed through measurement-based quantum computation. Inputs of blind quantum computation are securely controlled with multi-qubit entangled states. The unique signature of the transmitted message is generated by the signer without leaking information in imperfect channels. Whereas, the receiver can verify the validity of the signature using the quantum matching algorithm. The security is guaranteed by entanglement of quantum system for blind quantum computation. It provides a potential practical application for e-commerce in the cloud computing and first-generation quantum computation.

  2. Measuring SIP proxy server performance

    CERN Document Server

    Subramanian, Sureshkumar V

    2013-01-01

    Internet Protocol (IP) telephony is an alternative to the traditional Public Switched Telephone Networks (PSTN), and the Session Initiation Protocol (SIP) is quickly becoming a popular signaling protocol for VoIP-based applications. SIP is a peer-to-peer multimedia signaling protocol standardized by the Internet Engineering Task Force (IETF), and it plays a vital role in providing IP telephony services through its use of the SIP Proxy Server (SPS), a software application that provides call routing services by parsing and forwarding all the incoming SIP packets in an IP telephony network.SIP Pr

  3. On the security of a novel probabilistic signature based on bilinear square Diffie-Hellman problem and its extension.

    Science.gov (United States)

    Zhao, Zhenguo; Shi, Wenbo

    2014-01-01

    Probabilistic signature scheme has been widely used in modern electronic commerce since it could provide integrity, authenticity, and nonrepudiation. Recently, Wu and Lin proposed a novel probabilistic signature (PS) scheme using the bilinear square Diffie-Hellman (BSDH) problem. They also extended it to a universal designated verifier signature (UDVS) scheme. In this paper, we analyze the security of Wu et al.'s PS scheme and UDVS scheme. Through concrete attacks, we demonstrate both of their schemes are not unforgeable. The security analysis shows that their schemes are not suitable for practical applications.

  4. Colour schemes

    DEFF Research Database (Denmark)

    van Leeuwen, Theo

    2013-01-01

    This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation.......This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation....

  5. Awareness and Coverage of the National Health Insurance Scheme ...

    African Journals Online (AJOL)

    Sub- national levels possess a high degree of autonomy in a number of sectors including health. It is important to assess the level of coverage of the scheme among the formal sector workers in Nigeria as a proxy to gauge the extent of coverage of the scheme and derive suitable lessons that could be used in its expansion.

  6. Provably Secure and Subliminal-Free Variant of Schnorr Signature

    OpenAIRE

    Zhang , Yinghui; Li , Hui; Li , Xiaoqing; Zhu , Hui

    2013-01-01

    Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES); International audience; Subliminal channels present a severe challenge to information security. Currently, subliminal channels still exist in Schnorr signature. In this paper, we propose a subliminal-free variant of Schnorr signature. In the proposed scheme, an honest-but-curious warden is introduced to help the signer to generate a signature on a given message, but it is disallowed to sign messages independently. ...

  7. Detecting instabilities in tree-ring proxy calibration

    Directory of Open Access Journals (Sweden)

    H. Visser

    2010-06-01

    Full Text Available Evidence has been found for reduced sensitivity of tree growth to temperature in a number of forests at high northern latitudes and alpine locations. Furthermore, at some of these sites, emergent subpopulations of trees show negative growth trends with rising temperature. These findings are typically referred to as the "Divergence Problem" (DP. Given the high relevance of paleoclimatic reconstructions for policy-related studies, it is important for dendrochronologists to address this issue of potential model uncertainties associated with the DP. Here we address this issue by proposing a calibration technique, termed "stochastic response function" (SRF, which allows the presence or absence of any instabilities in growth response of trees (or any other climate proxy to their calibration target to be visualized and detected. Since this framework estimates confidence limits and subsequently provides statistical significance tests, the approach is also very well suited for proxy screening prior to the generation of a climate-reconstruction network.

    Two examples of tree growth/climate relationships are provided, one from the North American Arctic treeline and the other from the upper treeline in the European Alps. Instabilities were found to be present where stabilities were reported in the literature, and vice versa, stabilities were found where instabilities were reported. We advise to apply SRFs in future proxy-screening schemes, next to the use of correlations and RE/CE statistics. It will improve the strength of reconstruction hindcasts.

  8. Forged Signature Distinction Using Convolutional Neural Network for Feature Extraction

    Directory of Open Access Journals (Sweden)

    Seungsoo Nam

    2018-01-01

    Full Text Available This paper proposes a dynamic verification scheme for finger-drawn signatures in smartphones. As a dynamic feature, the movement of a smartphone is recorded with accelerometer sensors in the smartphone, in addition to the moving coordinates of the signature. To extract high-level longitudinal and topological features, the proposed scheme uses a convolution neural network (CNN for feature extraction, and not as a conventional classifier. We assume that a CNN trained with forged signatures can extract effective features (called S-vector, which are common in forging activities such as hesitation and delay before drawing the complicated part. The proposed scheme also exploits an autoencoder (AE as a classifier, and the S-vector is used as the input vector to the AE. An AE has high accuracy for the one-class distinction problem such as signature verification, and is also greatly dependent on the accuracy of input data. S-vector is valuable as the input of AE, and, consequently, could lead to improved verification accuracy especially for distinguishing forged signatures. Compared to the previous work, i.e., the MLP-based finger-drawn signature verification scheme, the proposed scheme decreases the equal error rate by 13.7%, specifically, from 18.1% to 4.4%, for discriminating forged signatures.

  9. Research on Signature Verification Method Based on Discrete Fréchet Distance

    Science.gov (United States)

    Fang, J. L.; Wu, W.

    2018-05-01

    This paper proposes a multi-feature signature template based on discrete Fréchet distance, which breaks through the limitation of traditional signature authentication using a single signature feature. It solves the online handwritten signature authentication signature global feature template extraction calculation workload, signature feature selection unreasonable problem. In this experiment, the false recognition rate (FAR) and false rejection rate (FRR) of the statistical signature are calculated and the average equal error rate (AEER) is calculated. The feasibility of the combined template scheme is verified by comparing the average equal error rate of the combination template and the original template.

  10. Tradable schemes

    NARCIS (Netherlands)

    J.K. Hoogland (Jiri); C.D.D. Neumann

    2000-01-01

    textabstractIn this article we present a new approach to the numerical valuation of derivative securities. The method is based on our previous work where we formulated the theory of pricing in terms of tradables. The basic idea is to fit a finite difference scheme to exact solutions of the pricing

  11. Signature-based User Authentication

    OpenAIRE

    Hámorník, Juraj

    2015-01-01

    This work aims on missing handwritten signature authentication in Windows. Result of this work is standalone software that allow users to log into Windows by writing signature. We focus on security of signature authentification and best overall user experience. We implemented signature authentification service that accept signature and return user access token if signature is genuine. Signature authentification is done by comparing given signature to signature patterns by their similarity. Si...

  12. 12 CFR 569.4 - Proxy soliciting material.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Proxy soliciting material. 569.4 Section 569.4 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PROXIES § 569.4 Proxy soliciting material. No solicitation of a proxy shall be made by means of any statement, form of proxy...

  13. 12 CFR 569.2 - Form of proxies.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Form of proxies. 569.2 Section 569.2 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PROXIES § 569.2 Form of proxies. Every form of proxy shall conform to the following requirements: (a) The proxy shall be revocable at will by...

  14. Electronic Signature Policy

    Science.gov (United States)

    Establishes the United States Environmental Protection Agency's approach to adopting electronic signature technology and best practices to ensure electronic signatures applied to official Agency documents are legally valid and enforceable

  15. Lesson 6: Signature Validation

    Science.gov (United States)

    Checklist items 13 through 17 are grouped under the Signature Validation Process, and represent CROMERR requirements that the system must satisfy as part of ensuring that electronic signatures it receives are valid.

  16. Exotic signatures from supersymmetry

    International Nuclear Information System (INIS)

    Hall, L.J.

    1989-08-01

    Minor changes to the standard supersymmetric model, such as soft flavor violation and R parity violation, cause large changes in the signatures. The origin of these changes and the resulting signatures are discussed. 15 refs., 7 figs., 2 tabs

  17. ARMed SPHINCS computing a 41KB signature in 16KB of RAM

    NARCIS (Netherlands)

    Hülsing, A.T.; Rijneveld, J.; Schwabe, P.; Cheng, C.-M.; Chung, K.-M.; Persiano, G.; Yang, B.-Y.

    2016-01-01

    This paper shows that it is feasible to implement the stateless hash-based signature scheme SPHINCS-256 on an embedded microprocessor with memory even smaller than a signature and limited computing power. We demonstrate that it is possible to generate and verify the 41KB signature on an ARM Cortex

  18. ARMed SPHINCS : computing a 41KB signature in 16KB of RAM

    NARCIS (Netherlands)

    Hülsing, A.T.; Rijneveld, J.; Schwabe, P.

    2015-01-01

    This paper shows that it is feasible to implement the stateless hash-based signature scheme SPHINCS-256 on a "very small device" with memory even smaller than a signature and limited computing power. We demonstrate that it is possible to generate and verify the 41\\,KB signature on an ARM Cortex M3

  19. SOFIA: MQ-based signatures in the QROM

    NARCIS (Netherlands)

    Chen, Ming Shing; Hülsing, Andreas; Rijneveld, Joost; Samardjiska, Simona; Schwabe, Peter

    2018-01-01

    We propose SOFIA, the first MQ -based signature scheme provably secure in the quantum-accessible random oracle model (QROM). Our construction relies on an extended version of Unruh’s transform for 5-pass identification schemes that we describe and prove secure both in the ROM and QROM. Based on a

  20. Efficient Fair Exchange from Identity-Based Signature

    Science.gov (United States)

    Yum, Dae Hyun; Lee, Pil Joong

    A fair exchange scheme is a protocol by which two parties Alice and Bob exchange items or services without allowing either party to gain advantages by quitting prematurely or otherwise misbehaving. To this end, modern cryptographic solutions use a semi-trusted arbitrator who involves only in cases where one party attempts to cheat or simply crashes. We call such a fair exchange scheme optimistic. When no registration is required between the signer and the arbitrator, we say that the fair exchange scheme is setup free. To date, the setup-free optimist fair exchange scheme under the standard RSA assumption was only possible from the generic construction of [12], which uses ring signatures. In this paper, we introduce a new setup-free optimistic fair exchange scheme under the standard RSA assumption. Our scheme uses the GQ identity-based signature and is more efficient than [12]. The construction can also be generalized by using various identity-based signature schemes. Our main technique is to allow each user to choose his (or her) own “random” public key in the identitybased signature scheme.

  1. Transparent Proxy for Secure E-Mail

    Science.gov (United States)

    Michalák, Juraj; Hudec, Ladislav

    2010-05-01

    The paper deals with the security of e-mail messages and e-mail server implementation by means of a transparent SMTP proxy. The security features include encryption and signing of transported messages. The goal is to design and implement a software proxy for secure e-mail including its monitoring, administration, encryption and signing keys administration. In particular, we focus on automatic public key on-the-fly encryption and signing of e-mail messages according to S/MIME standard by means of an embedded computer system whose function can be briefly described as a brouter with transparent SMTP proxy.

  2. Blinding for unanticipated signatures

    NARCIS (Netherlands)

    D. Chaum (David)

    1987-01-01

    textabstractPreviously known blind signature systems require an amount of computation at least proportional to the number of signature types, and also that the number of such types be fixed in advance. These requirements are not practical in some applications. Here, a new blind signature technique

  3. Blind Quantum Signature with Controlled Four-Particle Cluster States

    Science.gov (United States)

    Li, Wei; Shi, Jinjing; Shi, Ronghua; Guo, Ying

    2017-08-01

    A novel blind quantum signature scheme based on cluster states is introduced. Cluster states are a type of multi-qubit entangled states and it is more immune to decoherence than other entangled states. The controlled four-particle cluster states are created by acting controlled-Z gate on particles of four-particle cluster states. The presented scheme utilizes the above entangled states and simplifies the measurement basis to generate and verify the signature. Security analysis demonstrates that the scheme is unconditional secure. It can be employed to E-commerce systems in quantum scenario.

  4. Robotic Vehicle Proxy Simulation, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Energid Technologies proposes the development of a digital simulation that can replace robotic vehicles in field studies. This proxy simulation will model the...

  5. Arbitrated Quantum Signature with Hamiltonian Algorithm Based on Blind Quantum Computation

    Science.gov (United States)

    Shi, Ronghua; Ding, Wanting; Shi, Jinjing

    2018-03-01

    A novel arbitrated quantum signature (AQS) scheme is proposed motivated by the Hamiltonian algorithm (HA) and blind quantum computation (BQC). The generation and verification of signature algorithm is designed based on HA, which enables the scheme to rely less on computational complexity. It is unnecessary to recover original messages when verifying signatures since the blind quantum computation is applied, which can improve the simplicity and operability of our scheme. It is proved that the scheme can be deployed securely, and the extended AQS has some extensive applications in E-payment system, E-government, E-business, etc.

  6. Web proxy auto discovery for the WLCG

    CERN Document Server

    Dykstra, D; Blumenfeld, B; De Salvo, A; Dewhurst, A; Verguilov, V

    2017-01-01

    All four of the LHC experiments depend on web proxies (that is, squids) at each grid site to support software distribution by the CernVM FileSystem (CVMFS). CMS and ATLAS also use web proxies for conditions data distributed through the Frontier Distributed Database caching system. ATLAS & CMS each have their own methods for their grid jobs to find out which web proxies to use for Frontier at each site, and CVMFS has a third method. Those diverse methods limit usability and flexibility, particularly for opportunistic use cases, where an experiment’s jobs are run at sites that do not primarily support that experiment. This paper describes a new Worldwide LHC Computing Grid (WLCG) system for discovering the addresses of web proxies. The system is based on an internet standard called Web Proxy Auto Discovery (WPAD). WPAD is in turn based on another standard called Proxy Auto Configuration (PAC). Both the Frontier and CVMFS clients support this standard. The input into the WLCG system comes from squids regis...

  7. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

    Directory of Open Access Journals (Sweden)

    Dongwoo Kang

    Full Text Available The Proxy Mobile IPv6 (PMIPv6 is a network-based mobility management protocol that allows a Mobile Node(MN connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG. As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.

  8. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

    Science.gov (United States)

    Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick; Won, Dongho

    2017-01-01

    The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.

  9. Diffie-Hellman Key Based Authentication in Proxy Mobile IPv6

    Directory of Open Access Journals (Sweden)

    HyunGon Kim

    2010-01-01

    Full Text Available Wireless communication service providers have been showing strong interest in Proxy Mobile IPv6 for providing network-based IP mobility management. This could be a prominent way to support IP mobility to mobile nodes, because Proxy Mobile IPv6 requires minimal functionalities on the mobile node. While several extensions for Proxy Mobile IPv6 are being developed in the Internet Engineering Task Force, there has been little attentions paid to developing efficient authentication mechanisms. An authentication scheme for a mobility protocol must protect signaling messages against various security threats, e.g., session stealing attack, intercept attack by redirection, replay attack, and key exposure, while minimizing authentication latency. In this paper, we propose a Diffie-Hellman key based authentication scheme that utilizes the low layer signaling to exchange Diffie-Hellman variables and allows mobility service provisioning entities to exchange mobile node's profile and ongoing sessions securely. By utilizing the low layer signaling and context transfer between relevant nodes, the proposed authentication scheme minimizes authentication latency when the mobile node moves across different networks. In addition, thanks to the use of the Diffie-Hellman key agreement, pre-established security associations between mobility service provisioning entities are not required in the proposed authentication scheme so that network scalability in an operationally efficient manner is ensured. To ascertain its feasibility, security analysis and performance analysis are presented.

  10. Enhanced Predictive Handover for Fast Proxy Mobile IPv6

    Science.gov (United States)

    Jeon, Seil; Kang, Namhi; Kim, Younghan

    Proxy Mobile IPv6 (PMIPv6) has been proposed in order to overcome the limitations of host-based mobility management in IPv6 networks. However, packet losses during doing handover are still a problem. To solve this issue, several schemes have been developed, and can be classified into two approaches: predictive and reactive handover. Both approaches commonly use bi-directional tunnel between mobile access gateways (MAGs). In predictive schemes especially, mobility support for a mobile node (MN) is triggered by simplified link signal strength. Thereafter, the MN sends handover notification to its serving MAG, and is then able to initiate packet forwarding. Therefore, if the MN moves toward an unexpected MAG that does not have any pre-established tunnel with the serving MAG, it may lead to packet losses. In this paper, we define this problem as Early Packet Forwarding (EPF). As a solution, we propose an enhanced PMIPv6 scheme using two-phase tunnel control based on the IEEE 802.21 Media Independent Handover (MIH).

  11. 12 CFR 569.3 - Holders of proxies.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Holders of proxies. 569.3 Section 569.3 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PROXIES § 569.3 Holders of proxies. No proxy of a mutual savings association with a term greater than eleven months or solicited at...

  12. Water Isotope Proxy-Proxy and Proxy-Model Convergence for Late Pleistocene East Asian Monsoon Rainfall Reconstructions

    Science.gov (United States)

    Clemens, S. C.; Holbourn, A.; Kubota, Y.; Lee, K. E.; Liu, Z.; Chen, G.

    2017-12-01

    Confidence in reconstruction of East Asian paleomonsoon rainfall using precipitation isotope proxies is a matter of considerable debate, largely due to the lack of correlation between precipitation amount and isotopic composition in the present climate. We present four new, very highly resolved records spanning the past 300,000 years ( 200 year sample spacing) from IODP Site U1429 in the East China Sea. We demonstrate that all the orbital- and millennial-scale variance in the onshore Yangtze River Valley speleothem δ18O record1 is also embedded in the offshore Site U1429 seawater δ18O record (derived from the planktonic foraminifer Globigerinoides ruber and sea surface temperature reconstructions). Signal replication in these two independent terrestrial and marine archives, both controlled by the same monsoon system, uniquely identifies δ18O of precipitation as the primary driver of the precession-band variance in both records. This proxy-proxy convergence also eliminates a wide array of other drivers that have been called upon as potential contaminants to the precipitation δ18O signal recorded by these proxies. We compare East Asian precipitation isotope proxy records to precipitation amount from a CCSM3 transient climate model simulation of the past 300,000 years using realistic insolation, ice volume, greenhouse gasses, and sea level boundary conditions. This model-proxy comparison suggests that both Yangtze River Valley precipitation isotope proxies (seawater and speleothem δ18O) track changes in summer-monsoon rainfall amount at orbital time scales, as do precipitation isotope records from the Pearl River Valley2 (leaf wax δ2H) and Borneo3 (speleothem δ18O). Notably, these proxy records all have significantly different spectral structure indicating strongly regional rainfall patterns that are also consistent with model results. Transient, isotope-enabled model simulations will be necessary to more thoroughly evaluate these promising results, and to

  13. Radar Signature Calculation Facility

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: The calculation, analysis, and visualization of the spatially extended radar signatures of complex objects such as ships in a sea multipath environment and...

  14. Photonic quantum digital signatures operating over kilometer ranges in installed optical fiber

    Science.gov (United States)

    Collins, Robert J.; Fujiwara, Mikio; Amiri, Ryan; Honjo, Toshimori; Shimizu, Kaoru; Tamaki, Kiyoshi; Takeoka, Masahiro; Andersson, Erika; Buller, Gerald S.; Sasaki, Masahide

    2016-10-01

    The security of electronic communications is a topic that has gained noteworthy public interest in recent years. As a result, there is an increasing public recognition of the existence and importance of mathematically based approaches to digital security. Many of these implement digital signatures to ensure that a malicious party has not tampered with the message in transit, that a legitimate receiver can validate the identity of the signer and that messages are transferable. The security of most digital signature schemes relies on the assumed computational difficulty of solving certain mathematical problems. However, reports in the media have shown that certain implementations of such signature schemes are vulnerable to algorithmic breakthroughs and emerging quantum processing technologies. Indeed, even without quantum processors, the possibility remains that classical algorithmic breakthroughs will render these schemes insecure. There is ongoing research into information-theoretically secure signature schemes, where the security is guaranteed against an attacker with arbitrary computational resources. One such approach is quantum digital signatures. Quantum signature schemes can be made information-theoretically secure based on the laws of quantum mechanics while comparable classical protocols require additional resources such as anonymous broadcast and/or a trusted authority. Previously, most early demonstrations of quantum digital signatures required dedicated single-purpose hardware and operated over restricted ranges in a laboratory environment. Here, for the first time, we present a demonstration of quantum digital signatures conducted over several kilometers of installed optical fiber. The system reported here operates at a higher signature generation rate than previous fiber systems.

  15. Measurement-device-independent quantum digital signatures

    Science.gov (United States)

    Puthoor, Ittoop Vergheese; Amiri, Ryan; Wallden, Petros; Curty, Marcos; Andersson, Erika

    2016-08-01

    Digital signatures play an important role in software distribution, modern communication, and financial transactions, where it is important to detect forgery and tampering. Signatures are a cryptographic technique for validating the authenticity and integrity of messages, software, or digital documents. The security of currently used classical schemes relies on computational assumptions. Quantum digital signatures (QDS), on the other hand, provide information-theoretic security based on the laws of quantum physics. Recent work on QDS Amiri et al., Phys. Rev. A 93, 032325 (2016);, 10.1103/PhysRevA.93.032325 Yin, Fu, and Zeng-Bing, Phys. Rev. A 93, 032316 (2016), 10.1103/PhysRevA.93.032316 shows that such schemes do not require trusted quantum channels and are unconditionally secure against general coherent attacks. However, in practical QDS, just as in quantum key distribution (QKD), the detectors can be subjected to side-channel attacks, which can make the actual implementations insecure. Motivated by the idea of measurement-device-independent quantum key distribution (MDI-QKD), we present a measurement-device-independent QDS (MDI-QDS) scheme, which is secure against all detector side-channel attacks. Based on the rapid development of practical MDI-QKD, our MDI-QDS protocol could also be experimentally implemented, since it requires a similar experimental setup.

  16. Fighting terrorism in Africa by proxy

    DEFF Research Database (Denmark)

    Olsen, Gorm Rye

    2014-01-01

    The French intervention in Mali in early 2013 emphasizes that the decision-makers in Paris, Brussels, and Washington considered the establishment of the radical Islamist regime in Northern Mali a threat to their security interests. The widespread instability including the rise of radical Islamist...... groups in Somalia was perceived as a threat to western interests. It is the core argument of the paper if western powers decide to provide security in Africa, they will be inclined to use proxy instead of deploying own troops. Security provision by proxy in African means that African troops are doing...

  17. Web Proxy Auto Discovery for the WLCG

    Science.gov (United States)

    Dykstra, D.; Blomer, J.; Blumenfeld, B.; De Salvo, A.; Dewhurst, A.; Verguilov, V.

    2017-10-01

    All four of the LHC experiments depend on web proxies (that is, squids) at each grid site to support software distribution by the CernVM FileSystem (CVMFS). CMS and ATLAS also use web proxies for conditions data distributed through the Frontier Distributed Database caching system. ATLAS & CMS each have their own methods for their grid jobs to find out which web proxies to use for Frontier at each site, and CVMFS has a third method. Those diverse methods limit usability and flexibility, particularly for opportunistic use cases, where an experiment’s jobs are run at sites that do not primarily support that experiment. This paper describes a new Worldwide LHC Computing Grid (WLCG) system for discovering the addresses of web proxies. The system is based on an internet standard called Web Proxy Auto Discovery (WPAD). WPAD is in turn based on another standard called Proxy Auto Configuration (PAC). Both the Frontier and CVMFS clients support this standard. The input into the WLCG system comes from squids registered in the ATLAS Grid Information System (AGIS) and CMS SITECONF files, cross-checked with squids registered by sites in the Grid Configuration Database (GOCDB) and the OSG Information Management (OIM) system, and combined with some exceptions manually configured by people from ATLAS and CMS who operate WLCG Squid monitoring. WPAD servers at CERN respond to http requests from grid nodes all over the world with a PAC file that lists available web proxies, based on IP addresses matched from a database that contains the IP address ranges registered to organizations. Large grid sites are encouraged to supply their own WPAD web servers for more flexibility, to avoid being affected by short term long distance network outages, and to offload the WLCG WPAD servers at CERN. The CERN WPAD servers additionally support requests from jobs running at non-grid sites (particularly for LHC@Home) which they direct to the nearest publicly accessible web proxy servers. The responses

  18. Additive operator-difference schemes splitting schemes

    CERN Document Server

    Vabishchevich, Petr N

    2013-01-01

    Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy

  19. A Proxy Architecture to Enhance the Performance of WAP 2.0 by Data Compression

    Directory of Open Access Journals (Sweden)

    Yin Zhanping

    2005-01-01

    Full Text Available This paper presents a novel proxy architecture for wireless application protocol (WAP 2.0 employing an advanced data compression scheme. Though optional in WAP 2.0 , a proxy can isolate the wireless from the wired domain to prevent error propagations and to eliminate wireless session delays (WSD by enabling long-lived connections between the proxy and wireless terminals. The proposed data compression scheme combines content compression together with robust header compression (ROHC, which minimizes the air-interface traffic data, thus significantly reduces the wireless access time. By using the content compression at the transport layer, it also enables TLS tunneling, which overcomes the end-to-end security problem in WAP 1.x. Performance evaluations show that while WAP 1.x is optimized for narrowband wireless channels, WAP 2.0 utilizing TCP/IP outperforms WAP 1.x over wideband wireless channels even without compression. The proposed data compression scheme reduces the wireless access time of WAP 2.0 by over 45% in CDMA2000 1XRTT channels, and in low-speed IS-95 channels, substantially reduces access time to give comparable performance to WAP 1.x. The performance enhancement is mainly contributed by the reply content compression, with ROHC offering further enhancements.

  20. A Proxy Architecture to Enhance the Performance of WAP 2.0 by Data Compression

    Directory of Open Access Journals (Sweden)

    Yin Zhanping

    2005-01-01

    Full Text Available This paper presents a novel proxy architecture for wireless application protocol (WAP employing an advanced data compression scheme. Though optional in WAP , a proxy can isolate the wireless from the wired domain to prevent error propagations and to eliminate wireless session delays (WSD by enabling long-lived connections between the proxy and wireless terminals. The proposed data compression scheme combines content compression together with robust header compression (ROHC, which minimizes the air-interface traffic data, thus significantly reduces the wireless access time. By using the content compression at the transport layer, it also enables TLS tunneling, which overcomes the end-to-end security problem in WAP 1.x. Performance evaluations show that while WAP 1.x is optimized for narrowband wireless channels, WAP utilizing TCP/IP outperforms WAP 1.x over wideband wireless channels even without compression. The proposed data compression scheme reduces the wireless access time of WAP by over in CDMA2000 1XRTT channels, and in low-speed IS-95 channels, substantially reduces access time to give comparable performance to WAP 1.x. The performance enhancement is mainly contributed by the reply content compression, with ROHC offering further enhancements.

  1. Security Analysis of Randomize-Hash-then-Sign Digital Signatures

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Knudsen, Lars Ramkilde

    2012-01-01

    At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the security of digital signature algorithms based on these constructions. They showed that the security of signature schemes based on the two randomized hash function modes relies on properties similar...... functions, such as for the Davies-Meyer construction used in the popular hash functions such as MD5 designed by Rivest and the SHA family of hash functions designed by the National Security Agency (NSA), USA and published by NIST in the Federal Information Processing Standards (FIPS). We show an online...... 800-106. We discuss some important applications of our attacks and discuss their applicability on signature schemes based on hash functions with ‘built-in’ randomization. Finally, we compare our attacks on randomize-hash-then-sign schemes with the generic forgery attacks on the standard hash...

  2. Munchausen Syndrome by Proxy: A Family Affair.

    Science.gov (United States)

    Mehl, Albert L.; And Others

    1990-01-01

    The article reports on a case of Munchausen syndrome by proxy in which chronic illicit insulin was administered to a one-year-old child by her mother. Factitious illnesses continued despite psychiatric intervention. Retrospective review of medical records suggested 30 previous episodes of factitious illness within the family. (DB)

  3. 78 FR 70987 - Proxy Advisory Firm Roundtable

    Science.gov (United States)

    2013-11-27

    ... Firm Roundtable AGENCY: Securities and Exchange Commission. ACTION: Notice of roundtable discussion... advisory firms. The panel will be asked to discuss topics including the current state of proxy advisory firm use by investment advisers and institutional investors and potential changes that have been...

  4. Munchausen syndrome by proxy: a family anthology.

    Science.gov (United States)

    Pickford, E; Buchanan, N; McLaughlan, S

    1988-06-20

    While the Munchausen-by-proxy syndrome is well recognized, the story of one family has been related to describe some remarkable features. These include the psychopathology of the mother, the involvement of both children in the family, the great difficulty in obtaining proof of child abuse and, finally, the prosecution of the mother in the criminal court.

  5. Proxy-cryptocurrency payment system%基于代理的密码货币支付系统

    Institute of Scientific and Technical Information of China (English)

    傅晓彤; 陈思; 张宁

    2017-01-01

    The decentralized cryptocurrency which was based on block chain has been thought the most successful one in history. In the system, public keys were used as the users' accounts which guaranteed the anonymity in real transactions. However, all the transaction information was recorded in the block chain, it was a potential threat for users' privacy which might leak the payment information. Moreover, to avoid double-spending, it was agreed that the transaction on the target block was valid only if anotherk blocks were generated after the target one. The long waiting time reduced the ef-ficiency of the payment system. A model of payment system based on a proxy-cryptocurrency was proposed, and a solu-tion based on blind signature techniques was proposed. The scheme introduced a proxy in the payment phase, by which transaction confirmation time could be reduced and the transaction efficiency could be improved. Meanwhile, the system implements better anonymity, namely as the privacy protection function.%利用区块链技术实现的去中心化的密码货币被誉为有史以来最成功的密码货币.用户以公钥作为账户地址,使交易具备匿名性,即隐私的可保护性.然而区块链上记录的交易信息,会给用户隐私带来潜在的泄露威胁;此外,为了防止重复花费,系统约定只有在目标区块之后又有k个后续区块产生才能确认该目标区块上的交易是有效的,这段等待后续区块生成的时间较长,大大降低了交易效率.针对以上问题,提出一种基于代理的密码货币支付系统模型,并给出了基于盲签名算法的实现方案,通过在支付阶段引入代理,缩短了交易确认时间,提高了交易效率,同时,更好地实现了用户的匿名性即隐私保护功能.

  6. Kr-85 signatures for various plutonium production schemes

    Energy Technology Data Exchange (ETDEWEB)

    Stanoszek, Paul [Carl Friedrich von Weizsaecker-Centre for Science and Peace Research (Germany)

    2009-07-01

    Kr-85 is considered to be the best atmospheric indicator of unreported weapon-grade material production. This fact is based on the half-life of 10.76 years of Kr-85 and its chemical inactivity, which makes it even detectable after extended periods of cooling time. Kr-85 is produced as fission product during nuclear reactor operation and remains in the fuel until reprocessing starts. In order to determine the detectability of plutonium production the Kr-85 source term has to be assessed. The important issue of this presentation is the question on the minimum signal that an inspector can expect under the assumption that a proliferator minimizes his Kr-85 generation in order to circumvent a Kr-85 detection. A further assumption is that for nuclear weapon production a burn-up of typically around 2 MWd/kg is used. In addition, if clandestine plutonium production takes place, the source term might be used to estimate the amount of separated plutonium. The methodology of this study is based on a linkage between MCNPX and MATLAB. All results for actinide concentrations and Kr-85 are evaluated for different enrichments of U-235 and compared to known literature data. The Kr-85 source term per kilogram plutonium depends on the enrichments. As a result the lowest Kr-85 source term is found for depleted uranium.

  7. Comparing proxy and model estimates of hydroclimate variability and change over the Common Era

    Science.gov (United States)

    Hydro2k Consortium, Pages

    2017-12-01

    Water availability is fundamental to societies and ecosystems, but our understanding of variations in hydroclimate (including extreme events, flooding, and decadal periods of drought) is limited because of a paucity of modern instrumental observations that are distributed unevenly across the globe and only span parts of the 20th and 21st centuries. Such data coverage is insufficient for characterizing hydroclimate and its associated dynamics because of its multidecadal to centennial variability and highly regionalized spatial signature. High-resolution (seasonal to decadal) hydroclimatic proxies that span all or parts of the Common Era (CE) and paleoclimate simulations from climate models are therefore important tools for augmenting our understanding of hydroclimate variability. In particular, the comparison of the two sources of information is critical for addressing the uncertainties and limitations of both while enriching each of their interpretations. We review the principal proxy data available for hydroclimatic reconstructions over the CE and highlight the contemporary understanding of how these proxies are interpreted as hydroclimate indicators. We also review the available last-millennium simulations from fully coupled climate models and discuss several outstanding challenges associated with simulating hydroclimate variability and change over the CE. A specific review of simulated hydroclimatic changes forced by volcanic events is provided, as is a discussion of expected improvements in estimated radiative forcings, models, and their implementation in the future. Our review of hydroclimatic proxies and last-millennium model simulations is used as the basis for articulating a variety of considerations and best practices for how to perform proxy-model comparisons of CE hydroclimate. This discussion provides a framework for how best to evaluate hydroclimate variability and its associated dynamics using these comparisons and how they can better inform

  8. Server-Aided Verification Signature with Privacy for Mobile Computing

    Directory of Open Access Journals (Sweden)

    Lingling Xu

    2015-01-01

    Full Text Available With the development of wireless technology, much data communication and processing has been conducted in mobile devices with wireless connection. As we know that the mobile devices will always be resource-poor relative to static ones though they will improve in absolute ability, therefore, they cannot process some expensive computational tasks due to the constrained computational resources. According to this problem, server-aided computing has been studied in which the power-constrained mobile devices can outsource some expensive computation to a server with powerful resources in order to reduce their computational load. However, in existing server-aided verification signature schemes, the server can learn some information about the message-signature pair to be verified, which is undesirable especially when the message includes some secret information. In this paper, we mainly study the server-aided verification signatures with privacy in which the message-signature pair to be verified can be protected from the server. Two definitions of privacy for server-aided verification signatures are presented under collusion attacks between the server and the signer. Then based on existing signatures, two concrete server-aided verification signature schemes with privacy are proposed which are both proved secure.

  9. The Proxy Challenge: Why bespoke proxy indicators can help solve the anti-corruption measurement problem

    OpenAIRE

    Johnsøn, Jesper; Mason, Phil

    2013-01-01

    Practitioners working in anti-corruption face perennial challenges in measuring changes in corruption levels and evaluating whether anti-corruption efforts are successful. These two challenges are linked but not inseparable. To make progress on the latter front, that is, evaluating whether anti-corruption efforts are having an impact, the U4 Anti-Corruption Resource Centre and the UK Department for International Development are launching an exploration into the use of proxy indicators. Proxy ...

  10. Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings

    Directory of Open Access Journals (Sweden)

    Caixue Zhou

    2017-01-01

    Full Text Available Generalized signcryption (GSC can be applied as an encryption scheme, a signature scheme, or a signcryption scheme with only one algorithm and one key pair. A key-insulated mechanism can resolve the private key exposure problem. To ensure the security of cloud storage, we introduce the key-insulated mechanism into GSC and propose a concrete scheme without bilinear pairings in the certificateless cryptosystem setting. We provide a formal definition and a security model of certificateless key-insulated GSC. Then, we prove that our scheme is confidential under the computational Diffie-Hellman (CDH assumption and unforgeable under the elliptic curve discrete logarithm (EC-DL assumption. Our scheme also supports both random-access key update and secure key update. Finally, we evaluate the efficiency of our scheme and demonstrate that it is highly efficient. Thus, our scheme is more suitable for users who communicate with the cloud using mobile devices.

  11. Advanced Missile Signature Center

    Data.gov (United States)

    Federal Laboratory Consortium — The Advanced Missile Signature Center (AMSC) is a national facility supporting the Missile Defense Agency (MDA) and other DoD programs and customers with analysis,...

  12. THE ELECTRONIC SIGNATURE

    Directory of Open Access Journals (Sweden)

    Voiculescu Madalina Irena

    2009-05-01

    Full Text Available Article refers to significance and the digital signature in electronic commerce. Internet and electronic commerce open up many new opportunities for the consumer, yet, the security (or perceived lack of security of exchanging personal and financial data

  13. Digital signature feasibility study

    Science.gov (United States)

    2008-06-01

    The purpose of this study was to assess the advantages and disadvantages of using digital signatures to assist the Arizona Department of Transportation in conducting business. The Department is evaluating the potential of performing more electronic t...

  14. Physics Signatures at CLIC

    CERN Document Server

    Battaglia, Marco

    2001-01-01

    A set of signatures for physics processes of potential interests for the CLIC programme at = 1 - 5 TeV are discussed. These signatures, that may correspond to the manifestation of different scenarios of new physics as well as to Standard Model precision tests, are proposed as benchmarks for the optimisation of the CLIC accelerator parameters and for a first definition of the required detector response.

  15. Legal requirements governing proxy voting in Denmark

    DEFF Research Database (Denmark)

    Werlauff, Erik

    2008-01-01

    The requirements in Danish company law concerning proxy voting in companies whose shares have been accepted for listing on a regulated market have been successively tightened in recent years, and corporate governance principles have also led to the introduction of several requirements concerning...... proxy holders. A thorough knowledge of these requirements is important not only for the listed companies but also for their advisers and investors in Denmark and abroad. This article considers these requirements as well as the additional requirements which will derive from Directive 2007....../36 on the exercise of shareholders' rights in listed companies, which must be implemented by 3 August 2009. It is pointed out that companies may provide with advantage in their articles of association for both the existing and the forthcoming requirements at this early stage....

  16. Harvard Law School Proxy Access Roundtable

    OpenAIRE

    Bebchuk, Lucian Arye; Hirst, Scott

    2010-01-01

    This paper contains the proceedings of the Proxy Access Roundtable that was held by the Harvard Law School Program on Corporate Governance on October 7, 2009. The Roundtable brought together prominent participants in the debate - representing a range of perspectives and experiences - for a day of discussion on the subject. The day’s first two sessions focused on the question of whether the Securities and Exchange Commission should provide an access regime, or whether it should leave the adopt...

  17. Munchausen syndrome by proxy and child's rights

    International Nuclear Information System (INIS)

    Al-Haidar, Fatima A.

    2008-01-01

    Munchausen syndrome by proxy (MSBP) is an extreme form of child abuse in which perpetrators induce life-threatening conditions in their children. A case of MSBP is described in detail. Difficulties in diagnosis and management in this part of the world are presented. Until now, no national legal guidelines exist in the Kingdom of Saudi Arabia (KSA) to child abuse in general and MSBP in particular. Urgent guidelines, policies and legal system are required in the KSA. (author)

  18. Forecasting Lightning Threat Using WRF Proxy Fields

    Science.gov (United States)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  19. An ordination of life histories using morphological proxies: capital vs. income breeding in insects.

    Science.gov (United States)

    Davis, Robert B; Javoiš, Juhan; Kaasik, Ants; Õunap, Erki; Tammaru, Toomas

    2016-08-01

    Predictive classifications of life histories are essential for evolutionary ecology. While attempts to apply a single approach to all organisms may be overambitious, recent advances suggest that more narrow ordination schemes can be useful. However, these schemes mostly lack easily observable proxies of the position of a species on respective axes. It has been proposed that, in insects, the degree of capital (vs. income) breeding, reflecting the importance of adult feeding for reproduction, correlates with various ecological traits at the level of among-species comparison. We sought to prove these ideas via rigorous phylogenetic comparative analyses. We used experimentally derived life-history data for 57 species of European Geometridae (Lepidoptera), and an original phylogenetic reconstruction. The degree of capital breeding was estimated based on morphological proxies, including relative abdomen size of females. Applying Brownian-motion-based comparative analyses (with an original update to include error estimates), we demonstrated the associations between the degree of capital breeding and larval diet breadth, sexual size dimorphism, and reproductive season. Ornstein-Uhlenbeck model based phylogenetic analysis suggested a causal relationship between the degree of capital breeding and diet breadth. Our study indicates that the gradation from capital to income breeding is an informative axis to ordinate life-history strategies in flying insects which are affected by the fecundity vs. mobility trade off, with the availability of easy to record proxies contributing to its predictive power in practical contexts. © 2016 by the Ecological Society of America.

  20. Revocable ID-Based Signature with Short Size over Lattices

    Directory of Open Access Journals (Sweden)

    Ying-Hao Hung

    2017-01-01

    Full Text Available In the past, many ID-based signature (IBS schemes based on the integer factorization or discrete logarithm problems were proposed. With the progress on the development of quantum technology, IBS schemes mentioned above would become vulnerable. Recently, several IBS schemes over lattices were proposed to be secure against attacks in the quantum era. As conventional public-key settings, ID-based public-key settings have to offer a revocation mechanism to revoke misbehaving or malicious users. However, in the past, little work focuses on the revocation problem in the IBS schemes over lattices. In this article, we propose a new revocable IBS (RIBS scheme with short size over lattices. Based on the short integer solution (SIS assumption, we prove that the proposed RIBS scheme provides existential unforgeability against adaptive chosen-message attacks. As compared to the existing IBS schemes over lattices, our RIBS scheme has better performance in terms of signature size, signing key size, and the revocation mechanism with public channels.

  1. Scalable Arbitrated Quantum Signature of Classical Messages with Multi-Signers

    International Nuclear Information System (INIS)

    Yang Yuguang; Wang Yuan; Teng Yiwei; Chai Haiping; Wen Qiaoyan

    2010-01-01

    Unconditionally secure signature is an important part of quantum cryptography. Usually, a signature scheme only provides an environment for a single signer. Nevertheless, in real applications, many signers may collaboratively send a message to the verifier and convince the verifier that the message is actually transmitted by them. In this paper, we give a scalable arbitrated signature protocol of classical messages with multi-signers. Its security is analyzed and proved to be secure even with a compromised arbitrator. (general)

  2. Optimal Weight Assignment for a Chinese Signature File.

    Science.gov (United States)

    Liang, Tyne; And Others

    1996-01-01

    Investigates the performance of a character-based Chinese text retrieval scheme in which monogram keys and bigram keys are encoded into document signatures. Tests and verifies the theoretical predictions of the optimal weight assignments and the minimal false hit rate in experiments using a real Chinese corpus for disyllabic queries of different…

  3. A Weak Quantum Blind Signature with Entanglement Permutation

    Science.gov (United States)

    Lou, Xiaoping; Chen, Zhigang; Guo, Ying

    2015-09-01

    Motivated by the permutation encryption algorithm, a weak quantum blind signature (QBS) scheme is proposed. It involves three participants, including the sender Alice, the signatory Bob and the trusted entity Charlie, in four phases, i.e., initializing phase, blinding phase, signing phase and verifying phase. In a small-scale quantum computation network, Alice blinds the message based on a quantum entanglement permutation encryption algorithm that embraces the chaotic position string. Bob signs the blinded message with private parameters shared beforehand while Charlie verifies the signature's validity and recovers the original message. Analysis shows that the proposed scheme achieves the secure blindness for the signer and traceability for the message owner with the aid of the authentic arbitrator who plays a crucial role when a dispute arises. In addition, the signature can neither be forged nor disavowed by the malicious attackers. It has a wide application to E-voting and E-payment system, etc.

  4. Proxy Graph: Visual Quality Metrics of Big Graph Sampling.

    Science.gov (United States)

    Nguyen, Quan Hoang; Hong, Seok-Hee; Eades, Peter; Meidiana, Amyra

    2017-06-01

    Data sampling has been extensively studied for large scale graph mining. Many analyses and tasks become more efficient when performed on graph samples of much smaller size. The use of proxy objects is common in software engineering for analysis and interaction with heavy objects or systems. In this paper, we coin the term 'proxy graph' and empirically investigate how well a proxy graph visualization can represent a big graph. Our investigation focuses on proxy graphs obtained by sampling; this is one of the most common proxy approaches. Despite the plethora of data sampling studies, this is the first evaluation of sampling in the context of graph visualization. For an objective evaluation, we propose a new family of quality metrics for visual quality of proxy graphs. Our experiments cover popular sampling techniques. Our experimental results lead to guidelines for using sampling-based proxy graphs in visualization.

  5. The role of proxy information in missing data analysis.

    Science.gov (United States)

    Huang, Rong; Liang, Yuanyuan; Carrière, K C

    2005-10-01

    This article investigates the role of proxy data in dealing with the common problem of missing data in clinical trials using repeated measures designs. In an effort to avoid the missing data situation, some proxy information can be gathered. The question is how to treat proxy information, that is, is it always better to utilize proxy information when there are missing data? A model for repeated measures data with missing values is considered and a strategy for utilizing proxy information is developed. Then, simulations are used to compare the power of a test using proxy to simply utilizing all available data. It is concluded that using proxy information can be a useful alternative when such information is available. The implications for various clinical designs are also considered and a data collection strategy for efficiently estimating parameters is suggested.

  6. Uncertainty in hydrological signatures

    Science.gov (United States)

    McMillan, Hilary; Westerberg, Ida

    2015-04-01

    Information that summarises the hydrological behaviour or flow regime of a catchment is essential for comparing responses of different catchments to understand catchment organisation and similarity, and for many other modelling and water-management applications. Such information types derived as an index value from observed data are known as hydrological signatures, and can include descriptors of high flows (e.g. mean annual flood), low flows (e.g. mean annual low flow, recession shape), the flow variability, flow duration curve, and runoff ratio. Because the hydrological signatures are calculated from observed data such as rainfall and flow records, they are affected by uncertainty in those data. Subjective choices in the method used to calculate the signatures create a further source of uncertainty. Uncertainties in the signatures may affect our ability to compare different locations, to detect changes, or to compare future water resource management scenarios. The aim of this study was to contribute to the hydrological community's awareness and knowledge of data uncertainty in hydrological signatures, including typical sources, magnitude and methods for its assessment. We proposed a generally applicable method to calculate these uncertainties based on Monte Carlo sampling and demonstrated it for a variety of commonly used signatures. The study was made for two data rich catchments, the 50 km2 Mahurangi catchment in New Zealand and the 135 km2 Brue catchment in the UK. For rainfall data the uncertainty sources included point measurement uncertainty, the number of gauges used in calculation of the catchment spatial average, and uncertainties relating to lack of quality control. For flow data the uncertainty sources included uncertainties in stage/discharge measurement and in the approximation of the true stage-discharge relation by a rating curve. The resulting uncertainties were compared across the different signatures and catchments, to quantify uncertainty

  7. Practical quantum digital signature

    Science.gov (United States)

    Yin, Hua-Lei; Fu, Yao; Chen, Zeng-Bing

    2016-03-01

    Guaranteeing nonrepudiation, unforgeability as well as transferability of a signature is one of the most vital safeguards in today's e-commerce era. Based on fundamental laws of quantum physics, quantum digital signature (QDS) aims to provide information-theoretic security for this cryptographic task. However, up to date, the previously proposed QDS protocols are impractical due to various challenging problems and most importantly, the requirement of authenticated (secure) quantum channels between participants. Here, we present the first quantum digital signature protocol that removes the assumption of authenticated quantum channels while remaining secure against the collective attacks. Besides, our QDS protocol can be practically implemented over more than 100 km under current mature technology as used in quantum key distribution.

  8. Signatures of the Invisible

    CERN Multimedia

    Strom, D

    2003-01-01

    On the Net it is possible to take a look at art from afar via Virtual Museums. One such exhibition was recently in the New York Museum of Modern Art's branch, PS1. Entitled 'Signatures of the Invisible' it was a collaborative effort between artists and physicists (1/2 page).

  9. Reconfiguring waveguide-gratings-based M-signature codecs to enhance OCDMA network confidentiality

    Science.gov (United States)

    Huang, Jen-Fa; Chen, Kai-Sheng; Lin, Ying-Chen; Li, Chung-Yu

    2014-02-01

    A reconfiguration scheme based on composite signature codes over waveguide-gratings-based optical code-division multiple-access (OCDMA) network coder/decoders (codecs) is proposed in the paper. By using central control node to monitor network traffic condition and reconfigure the composite signature codes made up of maximal-length sequence (M-sequence) component codes and random changing the signature codes assigned for each user to improve the confidentiality performance in an OCDMA system. The proposed scheme is analyzed with some practical eavesdroppers' attacks.

  10. Continuous-variable quantum homomorphic signature

    Science.gov (United States)

    Li, Ke; Shang, Tao; Liu, Jian-wei

    2017-10-01

    Quantum cryptography is believed to be unconditionally secure because its security is ensured by physical laws rather than computational complexity. According to spectrum characteristic, quantum information can be classified into two categories, namely discrete variables and continuous variables. Continuous-variable quantum protocols have gained much attention for their ability to transmit more information with lower cost. To verify the identities of different data sources in a quantum network, we propose a continuous-variable quantum homomorphic signature scheme. It is based on continuous-variable entanglement swapping and provides additive and subtractive homomorphism. Security analysis shows the proposed scheme is secure against replay, forgery and repudiation. Even under nonideal conditions, it supports effective verification within a certain verification threshold.

  11. Implementation of fast handover for proxy mobile IPv6: Resolving out-of-order packets.

    Science.gov (United States)

    Kang, Byungseok; Anh, Khuong Quoc; Choo, Hyunseung

    2017-01-01

    Mobile IP allows for location-independent routing of IP datagrams on the Internet. Mobile IP specifies how a mobile node (MN) registers with its home agent and how the home agent routes datagrams to the MN through the tunnel. Current Mobile IP protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. Fast handover for Proxy Mobile IPv6 (FPMIPv6) is used to resolve handover latency and packet loss problems that occur in the Proxy Mobile IPv6 (PMIPv6) protocol. However, while implementing the FPMIPv6 scheme in a testbed, we encounter the out-of-order packet (OoOP) problem. The cause of this problem is the existence of two paths for data transmitted from a correspondent node (CN) to an MN. Since the problem affects the quality of service (QoS) of the network and the performance of the MN, we propose a new scheme using the last packet marker and packet buffering to solve this problem in FPMIPv6. The new Mobile Access Gateway (MAG) can control and deliver the data transmitted via the old path or the new path to an MN in order, using the last packet marker to notify the end of the data delivery in the old path and the packet buffering for holding the data delivered in the new path. We implement both the proposed scheme and FPMIPv6 in a testbed as a real network environment to demonstrate the correctness, cost effectiveness, and performance of the proposed scheme. A performance evaluation reveals that the proposed scheme can handle the OoOP problem efficiently.

  12. Implementation of fast handover for proxy mobile IPv6: Resolving out-of-order packets.

    Directory of Open Access Journals (Sweden)

    Byungseok Kang

    Full Text Available Mobile IP allows for location-independent routing of IP datagrams on the Internet. Mobile IP specifies how a mobile node (MN registers with its home agent and how the home agent routes datagrams to the MN through the tunnel. Current Mobile IP protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. Fast handover for Proxy Mobile IPv6 (FPMIPv6 is used to resolve handover latency and packet loss problems that occur in the Proxy Mobile IPv6 (PMIPv6 protocol. However, while implementing the FPMIPv6 scheme in a testbed, we encounter the out-of-order packet (OoOP problem. The cause of this problem is the existence of two paths for data transmitted from a correspondent node (CN to an MN. Since the problem affects the quality of service (QoS of the network and the performance of the MN, we propose a new scheme using the last packet marker and packet buffering to solve this problem in FPMIPv6. The new Mobile Access Gateway (MAG can control and deliver the data transmitted via the old path or the new path to an MN in order, using the last packet marker to notify the end of the data delivery in the old path and the packet buffering for holding the data delivered in the new path. We implement both the proposed scheme and FPMIPv6 in a testbed as a real network environment to demonstrate the correctness, cost effectiveness, and performance of the proposed scheme. A performance evaluation reveals that the proposed scheme can handle the OoOP problem efficiently.

  13. From 5-pass MQ-based identification to MQ-based signatures

    NARCIS (Netherlands)

    Chen, M.S.; Hülsing, A.; Rijneveld, J.; Samardjiska, S.; Schwabe, P.

    2016-01-01

    This paper presents MQDSS, the first signature scheme with a security reduction based on the problem of solving a multivariate system of quadratic equations (MQ problem). In order to construct this scheme we give a new security reduction for the Fiat-Shamir transform from a large class of 5-pass

  14. Validity of proxies and correction for proxy use when evaluating social determinants of health in stroke patients.

    Science.gov (United States)

    Skolarus, Lesli E; Sánchez, Brisa N; Morgenstern, Lewis B; Garcia, Nelda M; Smith, Melinda A; Brown, Devin L; Lisabeth, Lynda D

    2010-03-01

    The purpose of this study was to evaluate stroke patient-proxy agreement with respect to social determinants of health, including depression, optimism, and spirituality, and to explore approaches to minimize proxy-introduced bias. Stroke patient-proxy pairs from the Brain Attack Surveillance in Corpus Christi Project were interviewed (n=34). Evaluation of agreement between patient-proxy pairs included calculation of intraclass correlation coefficients, linear regression models (ProxyResponse=alpha(0)+alpha(1)PatientResponse+delta, where alpha(0)=0 and alpha(1)=1 denotes no bias) and kappa statistics. Bias introduced by proxies was quantified with simulation studies. In the simulated data, we applied 4 approaches to estimate regression coefficients of stroke outcome social determinants of health associations when only proxy data were available for some patients: (1) substituting proxy responses in place of patient responses; (2) including an indicator variable for proxy use; (3) using regression calibration with external validation; and (4) internal validation. Agreement was fair for depression (intraclass correlation coefficient, 0.41) and optimism (intraclass correlation coefficient, 0.48) and moderate for spirituality (kappa, 0.48 to 0.53). Responses of proxies were a biased measure of the patients' responses for depression, with alpha(0)=4.88 (CI, 2.24 to 7.52) and alpha(1)=0.39 (CI, 0.09 to 0.69), and for optimism, with alpha(0)=3.82 (CI, -1.04 to 8.69) and alpha(1)=0.81 (CI, 0.41 to 1.22). Regression calibration with internal validation was the most accurate method to correct for proxy-induced bias. Fair/moderate patient-proxy agreement was observed for social determinants of health. Stroke researchers who plan to study social determinants of health may consider performing validation studies so corrections for proxy use can be made.

  15. Optimizing TCP Performance over UMTS with Split TCP Proxy

    DEFF Research Database (Denmark)

    Hu, Liang; Dittmann, Lars

    2009-01-01

    . To cope with large delay bandwidth product, we propose a novel concept of split TCP proxy which is placed at GGSN between UNITS network and Internet. The split proxy divides the bandwidth delay product into two parts, resulting in two TCP connections with smaller bandwidth delay products which can...... be pipelined and thus operating at higher speeds. Simulation results show, the split TCP proxy can significantly improve the TCP performance in terms of RLC throughput under high bit rate DCH channel scenario (e.g.256 kbps). On the other hand, it only brings small performance improvement under low bit rate DCH...... scenario (e.g.64 kbps). Besides, the split TCP proxy brings more performance gain for downloading large files than downloading small ones. To the end, for the configuration of the split proxy, an aggressive initial TCP congestion window size (e.g. 10 MSS) at proxy is particularly useful for radio links...

  16. A Rational Threshold Signature Model and Protocol Based on Different Permissions

    Directory of Open Access Journals (Sweden)

    Bojun Wang

    2014-01-01

    Full Text Available This paper develops a novel model and protocol used in some specific scenarios, in which the participants of multiple groups with different permissions can finish the signature together. We apply the secret sharing scheme based on difference equation to the private key distribution phase and secret reconstruction phrase of our threshold signature scheme. In addition, our scheme can achieve the signature success because of the punishment strategy of the repeated rational secret sharing. Besides, the bit commitment and verification method used to detect players’ cheating behavior acts as a contributing factor to prevent the internal fraud. Using bit commitments, verifiable parameters, and time sequences, this paper constructs a dynamic game model, which has the features of threshold signature management with different permissions, cheat proof, and forward security.

  17. Estimation of sedimentary proxy records together with associated uncertainty

    OpenAIRE

    Goswami, B.; Heitzig, J.; Rehfeld, K.; Marwan, N.; Anoop, A.; Prasad, S.; Kurths, J.

    2014-01-01

    Sedimentary proxy records constitute a significant portion of the recorded evidence that allows us to investigate paleoclimatic conditions and variability. However, uncertainties in the dating of proxy archives limit our ability to fix the timing of past events and interpret proxy record intercomparisons. While there are various age-modeling approaches to improve the estimation of the age–depth relations of archives, relatively little focus has been placed on the propagation...

  18. Salmon: Robust Proxy Distribution for Censorship Circumvention

    Directory of Open Access Journals (Sweden)

    Douglas Frederick

    2016-10-01

    Full Text Available Many governments block their citizens’ access to much of the Internet. Simple workarounds are unreliable; censors quickly discover and patch them. Previously proposed robust approaches either have non-trivial obstacles to deployment, or rely on low-performance covert channels that cannot support typical Internet usage such as streaming video. We present Salmon, an incrementally deployable system designed to resist a censor with the resources of the “Great Firewall” of China. Salmon relies on a network of volunteers in uncensored countries to run proxy servers. Although any member of the public can become a user, Salmon protects the bulk of its servers from being discovered and blocked by the censor via an algorithm for quickly identifying malicious users. The algorithm entails identifying some users as especially trustworthy or suspicious, based on their actions. We impede Sybil attacks by requiring either an unobtrusive check of a social network account, or a referral from a trustworthy user.

  19. Development of six PROMIS pediatrics proxy-report item banks.

    Science.gov (United States)

    Irwin, Debra E; Gross, Heather E; Stucky, Brian D; Thissen, David; DeWitt, Esi Morgan; Lai, Jin Shei; Amtmann, Dagmar; Khastou, Leyla; Varni, James W; DeWalt, Darren A

    2012-02-22

    Pediatric self-report should be considered the standard for measuring patient reported outcomes (PRO) among children. However, circumstances exist when the child is too young, cognitively impaired, or too ill to complete a PRO instrument and a proxy-report is needed. This paper describes the development process including the proxy cognitive interviews and large-field-test survey methods and sample characteristics employed to produce item parameters for the Patient Reported Outcomes Measurement Information System (PROMIS) pediatric proxy-report item banks. The PROMIS pediatric self-report items were converted into proxy-report items before undergoing cognitive interviews. These items covered six domains (physical function, emotional distress, social peer relationships, fatigue, pain interference, and asthma impact). Caregivers (n = 25) of children ages of 5 and 17 years provided qualitative feedback on proxy-report items to assess any major issues with these items. From May 2008 to March 2009, the large-scale survey enrolled children ages 8-17 years to complete the self-report version and caregivers to complete the proxy-report version of the survey (n = 1548 dyads). Caregivers of children ages 5 to 7 years completed the proxy report survey (n = 432). In addition, caregivers completed other proxy instruments, PedsQL™ 4.0 Generic Core Scales Parent Proxy-Report version, PedsQL™ Asthma Module Parent Proxy-Report version, and KIDSCREEN Parent-Proxy-52. Item content was well understood by proxies and did not require item revisions but some proxies clearly noted that determining an answer on behalf of their child was difficult for some items. Dyads and caregivers of children ages 5-17 years old were enrolled in the large-scale testing. The majority were female (85%), married (70%), Caucasian (64%) and had at least a high school education (94%). Approximately 50% had children with a chronic health condition, primarily asthma, which was diagnosed or treated within 6

  20. Development of six PROMIS pediatrics proxy-report item banks

    Directory of Open Access Journals (Sweden)

    Irwin Debra E

    2012-02-01

    Full Text Available Abstract Background Pediatric self-report should be considered the standard for measuring patient reported outcomes (PRO among children. However, circumstances exist when the child is too young, cognitively impaired, or too ill to complete a PRO instrument and a proxy-report is needed. This paper describes the development process including the proxy cognitive interviews and large-field-test survey methods and sample characteristics employed to produce item parameters for the Patient Reported Outcomes Measurement Information System (PROMIS pediatric proxy-report item banks. Methods The PROMIS pediatric self-report items were converted into proxy-report items before undergoing cognitive interviews. These items covered six domains (physical function, emotional distress, social peer relationships, fatigue, pain interference, and asthma impact. Caregivers (n = 25 of children ages of 5 and 17 years provided qualitative feedback on proxy-report items to assess any major issues with these items. From May 2008 to March 2009, the large-scale survey enrolled children ages 8-17 years to complete the self-report version and caregivers to complete the proxy-report version of the survey (n = 1548 dyads. Caregivers of children ages 5 to 7 years completed the proxy report survey (n = 432. In addition, caregivers completed other proxy instruments, PedsQL™ 4.0 Generic Core Scales Parent Proxy-Report version, PedsQL™ Asthma Module Parent Proxy-Report version, and KIDSCREEN Parent-Proxy-52. Results Item content was well understood by proxies and did not require item revisions but some proxies clearly noted that determining an answer on behalf of their child was difficult for some items. Dyads and caregivers of children ages 5-17 years old were enrolled in the large-scale testing. The majority were female (85%, married (70%, Caucasian (64% and had at least a high school education (94%. Approximately 50% had children with a chronic health condition, primarily

  1. Finite Boltzmann schemes

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    2006-01-01

    In the special case of relaxation parameter = 1 lattice Boltzmann schemes for (convection) diffusion and fluid flow are equivalent to finite difference/volume (FD) schemes, and are thus coined finite Boltzmann (FB) schemes. We show that the equivalence is inherent to the homology of the

  2. Privacy protection schemes for fingerprint recognition systems

    Science.gov (United States)

    Marasco, Emanuela; Cukic, Bojan

    2015-05-01

    The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechanisms control access to personal information and limit the likelihood of intrusions. In this paper, image- and feature-level schemes for privacy protection in fingerprint recognition systems are reviewed. Storing only key features of a biometric signature can reduce the likelihood of biometric data being used for unintended purposes. In biometric cryptosystems and biometric-based key release, the biometric component verifies the identity of the user, while the cryptographic key protects the communication channel. Transformation-based approaches only a transformed version of the original biometric signature is stored. Different applications can use different transforms. Matching is performed in the transformed domain which enable the preservation of low error rates. Since such templates do not reveal information about individuals, they are referred to as cancelable templates. A compromised template can be re-issued using a different transform. At image-level, de-identification schemes can remove identifiers disclosed for objectives unrelated to the original purpose, while permitting other authorized uses of personal information. Fingerprint images can be de-identified by, for example, mixing fingerprints or removing gender signature. In both cases, degradation of matching performance is minimized.

  3. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks"

    Science.gov (United States)

    Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad

    2015-01-01

    Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes’ participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.’s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.’s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic. PMID:26580963

  4. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".

    Science.gov (United States)

    Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroaki; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad

    2015-01-01

    Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.

  5. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".

    Directory of Open Access Journals (Sweden)

    Mojtaba Alizadeh

    Full Text Available Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.

  6. On the pinned field image binarization for signature generation in image ownership verification method

    Directory of Open Access Journals (Sweden)

    Chang Hsuan

    2011-01-01

    Full Text Available Abstract The issue of pinned field image binarization for signature generation in the ownership verification of the protected image is investigated. The pinned field explores the texture information of the protected image and can be employed to enhance the watermark robustness. In the proposed method, four optimization schemes are utilized to determine the threshold values for transforming the pinned field into a binary feature image, which is then utilized to generate an effective signature image. Experimental results show that the utilization of optimization schemes can significantly improve the signature robustness from the previous method (Lee and Chang, Opt. Eng. 49 (9, 097005, 2010. While considering both the watermark retrieval rate and the computation speed, the genetic algorithm is strongly recommended. In addition, compared with Chang and Lin's scheme (J. Syst. Softw. 81 (7, 1118-1129, 2008, the proposed scheme also has better performance.

  7. Proxy-produced ethnographic work: what are the problems, issues, and dilemmas arising from proxy ethnography?

    DEFF Research Database (Denmark)

    Martinussen, Marie Louise; Højbjerg, Karin; Tamborg, Andreas Lindenskov

    2018-01-01

    This article addresses the implications of research-student cooperation in the production of empirical material. For the student to replace the experienced researcher and work under the researcher’s supervision, we call such work proxy-produced ethnographic work. The specific relations...... and positions arising from such a setup between the teacher/researcher and the proxy ethnographer/student are found to have implications for the ethnographies produced. This article’s main focus is to show how these relations and positions have not distorted the ethnographic work and the ethnographies but......, rather, have oriented it in certain ways. It is shown how the participating researchers – both senior and junior - have distinctive, incorporated dispositions with which they pre-consciously participate in an implicit and subtle relation that can make it very easy to overlook distortions during...

  8. Secret data embedding scheme modifying the frequency of ...

    Indian Academy of Sciences (India)

    such as banking, e-commerce, e-signature, distance learning, e-government ... received a growing attention in conjunction with the new tools and methods ... Essential points of the image processing and data embedding are clarified in the next section. ..... The proposed scheme's numerical performance is shown in table 6.

  9. Proxy indicators as measure of local economic dispositions in South ...

    African Journals Online (AJOL)

    in international markets. The proxy is a coincidental and pro-cyclic indicator, with a correlation of 0.86. Key similarities exist between the economy and the profitability of hardware stores, although the proxy is not as accurate as the volume of sales in hardware stores. The correlation is measured at 0.85. The profitability of the ...

  10. Tellurium Stable Isotopes as a Paleoredox Proxy

    Science.gov (United States)

    Wasserman, N.; Johnson, T. M.

    2017-12-01

    Despite arguments for variably-oxygenated shallow waters and anoxic deep marine waters, which delayed animal development until the Neoproterozoic Oxidation Event, the magnitude of atmospheric oxygen during the Proterozoic is still uncertain [1]. The evidence for low pO2 (<0.1-1% PAL) is based on geochemical and isotopic proxies, which track the mobilization of Fe and Mn on the continents. For example, large chromium isotope shifts occur at the Neoproterozoic Oxidation Event due to the initiation of Cr redox cycling, but this proxy is insensitive to fluctuations in the lower-pO2 conditions at other times during the Proterozoic. Tellurium, a metalloid with a lower threshold to oxidation, may be sensitive to pO2 shifts in a lower range. In the reduced forms, Te(-II) and Te(0), the element is insoluble and immobile. However, in the more oxidized phases, Te(IV) and Te(VI), Te can form soluble oxyanions (though it tends to adsorb to Fe-oxyhydroxides and clays) [2]. Te stable isotopes have been shown to fractionate during abiotic or biologic reduction of Te(VI) or Te(IV) to elemental Te(0) [3, 4]. Utilizing hydride generation MC-ICP-MS, we are able to obtain high precision (2σ 0.04‰) measurements of δ128Te/125Te for natural samples containing < 10 ng of Te. A suite of Phanerozoic and Proterozoic ironstones show significant variation in δ128Te/125Te (<0.5‰), suggesting that the Te redox cycle was active during the Proterozoic. Future directions will include Te isotope measurements of Precambrian paleosols to determine natural isotope variation before the Great Oxidation Event and experiments to determine fractionation during adsorption to Fe-oxyhydroxides. [1] Planavsky et al. (2014) Science 346 (6209), pp. 635-638 [2] Qin et al. (2017) Environmental Science and Technology 51 (11), pp 6027-6035 [3] Baesman et al. (2007) Applied Environmental Microbiology 73 (7), pp 2135-2143 [4] Smithers and Krause (1968) Canadian Journal of Chemistry 46(4): pp 583-591

  11. Perbandingan proxy pada linux dan windows untuk mempercepat browsing website

    Directory of Open Access Journals (Sweden)

    Dafwen Toresa

    2017-05-01

    Full Text Available AbstrakPada saat ini sangat banyak organisasi, baik pendidikan, pemerintahan,  maupun perusahaan swasta berusaha membatasi akses para pengguna ke internet dengan alasan bandwidth yang dimiliki mulai terasa lambat ketika para penggunanya mulai banyak yang melakukan browsing ke internet. Mempercepat akses browsing menjadi perhatian utama dengan memanfaatkan teknologi Proxy server. Penggunaan proxy server perlu mempertimbangkan sistem operasi pada server dan tool yang digunakan belum diketahui performansi terbaiknya pada sistem operasi apa.  Untuk itu dirasa perlu untuk menganalisis performan Proxy server pada sistem operasi berbeda yaitu Sistem Operasi Linux dengan tools Squid  dan Sistem Operasi Windows dengan tool Winroute. Kajian ini dilakukan untuk mengetahui perbandingan kecepatan browsing dari komputer pengguna (client. Browser yang digunakan di komputer pengguna adalah Mozilla Firefox. Penelitian ini menggunakan 2 komputer klien dengan pengujian masing-masingnya 5 kali pengujian pengaksesan/browsing web yang dituju melalui proxy server. Dari hasil pengujian yang dilakukan, diperoleh kesimpulan bahwa penerapan proxy server di sistem operasi linux dengan tools squid lebih cepat browsing dari klien menggunakan web browser yang sama dan komputer klien yang berbeda dari pada proxy server sistem operasi windows dengan tools winroute.  Kata kunci: Proxy, Bandwidth, Browsing, Squid, Winroute AbstractAt this time very many organizations, both education, government, and private companies try to limit the access of users to the internet on the grounds that the bandwidth owned began to feel slow when the users began to do a lot of browsing to the internet. Speed up browsing access is a major concern by utilizing Proxy server technology. The use of proxy servers need to consider the operating system on the server and the tool used is not yet known the best performance on what operating system. For that it is necessary to analyze Performance Proxy

  12. An in fiber experimental approach to photonic quantum digital signatures that does not require quantum memory

    Science.gov (United States)

    Collins, Robert J.; Donaldon, Ross J.; Dunjko, Vedran; Wallden, Petros; Clarke, Patrick J.; Andersson, Erika; Jeffers, John; Buller, Gerald S.

    2014-10-01

    Classical digital signatures are commonly used in e-mail, electronic financial transactions and other forms of electronic communications to ensure that messages have not been tampered with in transit, and that messages are transferrable. The security of commonly used classical digital signature schemes relies on the computational difficulty of inverting certain mathematical functions. However, at present, there are no such one-way functions which have been proven to be hard to invert. With enough computational resources certain implementations of classical public key cryptosystems can be, and have been, broken with current technology. It is nevertheless possible to construct information-theoretically secure signature schemes, including quantum digital signature schemes. Quantum signature schemes can be made information theoretically secure based on the laws of quantum mechanics, while classical comparable protocols require additional resources such as secret communication and a trusted authority. Early demonstrations of quantum digital signatures required quantum memory, rendering them impractical at present. Our present implementation is based on a protocol that does not require quantum memory. It also uses the new technique of unambiguous quantum state elimination, Here we report experimental results for a test-bed system, recorded with a variety of different operating parameters, along with a discussion of aspects of the system security.

  13. Signatures of topological superconductivity

    Energy Technology Data Exchange (ETDEWEB)

    Peng, Yang

    2017-07-19

    The prediction and experimental discovery of topological insulators brought the importance of topology in condensed matter physics into the limelight. Topology hence acts as a new dimension along which more and more new states of matter start to emerge. One of these topological states of matter, namely topological superconductors, comes into the focus because of their gapless excitations. These gapless excitations, especially in one dimensional topological superconductors, are Majorana zero modes localized at the ends of the superconductor and exhibit exotic nonabelian statistics, which can be potentially applied to fault-tolerant quantum computation. Given their highly interesting physical properties and potential applications to quantum computation, both theorists and experimentalists spend great efforts to realize topological supercondoctors and to detect Majoranas. In two projects within this thesis, we investigate the properties of Majorana zero modes in realistic materials which are absent in simple theoretical models. We find that the superconducting proximity effect, an essential ingredient in all existing platforms for topological superconductors, plays a significant role in determining the localization property of the Majoranas. Strong proximity coupling between the normal system and the superconducting substrate can lead to strongly localized Majoranas, which can explain the observation in a recent experiment. Motivated by experiments in Molenkamp's group, we also look at realistic quantum spin Hall Josephson junctions, in which charge puddles acting as magnetic impurities are coupled to the helical edge states. We find that with this setup, the junction generically realizes an exotic 8π periodic Josephson effect, which is absent in a pristine Josephson junction. In another two projects, we propose more pronounced signatures of Majoranas that are accessible with current experimental techniques. The first one is a transport measurement, which uses

  14. Modem Signature Analysis.

    Science.gov (United States)

    1982-10-01

    AD-A127 993 MODEM SIGNATURE ANALISIS (U) PAR TECHNOLOGY CORP NEW / HARTFORD NY V EDWARDS ET AL. OCT 82 RADC-TR-82-269 F30602-80-C-0264 NCLASSIFIED F/G...as an indication of the class clustering and separation between different classes in the modem data base. It is apparent from the projection that the...that as the clusters disperse, the likelihood of a sample crossing the boundary into an adjacent region and causing a symbol decision error increases. As

  15. Proxy SDN Controller for Wireless Networks

    Directory of Open Access Journals (Sweden)

    Won-Suk Kim

    2016-01-01

    Full Text Available Management of wireless networks as well as wired networks by using software-defined networking (SDN has been highlighted continually. However, control features of a wireless network differ from those of a wired network in several aspects. In this study, we identify the various inefficient points when controlling and managing wireless networks by using SDN and propose SDN-based control architecture called Proxcon to resolve these problems. Proxcon introduces the concept of a proxy SDN controller (PSC for the wireless network control, and the PSC entrusted with the role of a main controller performs control operations and provides the latest network state for a network administrator. To address the control inefficiency, Proxcon supports offloaded SDN operations for controlling wireless networks by utilizing the PSC, such as local control by each PSC, hybrid control utilizing the PSC and the main controller, and locally cooperative control utilizing the PSCs. The proposed architecture and the newly supported control operations can enhance scalability and response time when the logically centralized control plane responds to the various wireless network events. Through actual experiments, we verified that the proposed architecture could address the various control issues such as scalability, response time, and control overhead.

  16. Scheme Program Documentation Tools

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2004-01-01

    are separate and intended for different documentation purposes they are related to each other in several ways. Both tools are based on XML languages for tool setup and for documentation authoring. In addition, both tools rely on the LAML framework which---in a systematic way---makes an XML language available...... as named functions in Scheme. Finally, the Scheme Elucidator is able to integrate SchemeDoc resources as part of an internal documentation resource....

  17. Proxy comparisons for Paleogene sea water temperature reconstructions

    Science.gov (United States)

    de Bar, Marijke; de Nooijer, Lennart; Schouten, Stefan; Ziegler, Martin; Sluijs, Appy; Reichart, Gert-Jan

    2017-04-01

    Several studies have reconstructed Paleogene seawater temperatures, using single- or multi-proxy approaches (e.g. Hollis et al., 2012 and references therein), particularly comparing TEX86 with foraminiferal δ18O and Mg/Ca. Whereas trends often agree relatively well, absolute temperatures can differ significantly between proxies, possibly because they are often applied to (extreme) climate events/transitions (e.g. Sluijs et al., 2011), where certain assumptions underlying the temperature proxies may not hold true. A more general long-term multi-proxy temperature reconstruction, is therefore necessary to validate the different proxies and underlying presumed boundary conditions. Here we apply a multi-proxy approach using foraminiferal calcite and organic proxies to generate a low-resolution, long term (80 Myr) paleotemperature record for the Bass River core (New Jersey, North Atlantic). Oxygen (δ18O), clumped isotopes (Δ47) and Mg/Ca of benthic foraminifera, as well as the organic proxies MBT'-CBT, TEX86H, U37K' index and the LDI were determined on the same sediments. The youngest samples of Miocene age are characterized by a high BIT index (>0.8) and fractional abundance of the C32 1,15-diol (>0.6; de Bar et al., 2016) and the absence of foraminifera, all suggesting high continental input and shallow depths. The older sediment layers (˜30 to 90 Ma) display BIT values and C32 1,15-diol fractional abundances 28 ˚ C. In contrast, LDI temperatures were considerably lower and varied only between 21 and 19 ˚ C. MBT'-CBT derived mean annual temperatures for the ages of 9 and 20 Ma align well with the TEX86H SSTs. Overall, the agreement of the paleotemperature proxies in terms of main tendencies, and the covariation with the global benthic oxygen isotope compilation suggests that temperatures in this region varied in concert with global climate variability. The fact that offsets between the different proxies used here remain fairly constant down to 90 Ma ago

  18. Constraining Lipid Biomarker Paleoclimate Proxies in a Small Arctic Watershed

    Science.gov (United States)

    Dion-Kirschner, H.; McFarlin, J. M.; Axford, Y.; Osburn, M. R.

    2017-12-01

    Arctic amplification of climate change renders high-latitude environments unusually sensitive to changes in climatic conditions (Serreze and Barry, 2011). Lipid biomarkers, and their hydrogen and carbon isotopic compositions, can yield valuable paleoclimatic and paleoecological information. However, many variables affect the production and preservation of lipids and their constituent isotopes, including precipitation, plant growth conditions, biosynthesis mechanisms, and sediment depositional processes (Sachse et al., 2012). These variables are particularly poorly constrained for high-latitude environments, where trees are sparse or not present, and plants grow under continuous summer light and cool temperatures during a short growing season. Here we present a source-to-sink study of a single watershed from the Kangerlussuaq region of southwest Greenland. Our analytes from in and around `Little Sugarloaf Lake' (LSL) include terrestrial and aquatic plants, plankton, modern lake water, surface sediments, and a sediment core. This diverse sample set allows us to fulfill three goals: 1) We evaluate the production of lipids and isotopic signatures in the modern watershed in comparison to modern climate. Our data exhibit genus-level trends in leaf wax production and isotopic composition, and help clarify the difference between terrestrial and aquatic signals. 2) We evaluate the surface sediment of LSL to determine how lipid biomarkers from the watershed are incorporated into sediments. We constrain the relative contributions of terrestrial plants, aquatic plants, and other aquatic organisms to the sediment in this watershed. 3) We apply this modern source-to-sink calibration to the analysis of a 65 cm sediment core record. Our core is organic-rich, and relatively high deposition rates allow us to reconstruct paleoenvironmental changes with high resolution. Our work will help determine the veracity of these common paleoclimate proxies, specifically for research in

  19. Electronic Signature (eSig)

    Data.gov (United States)

    Department of Veterans Affairs — Beginning with the Government Paperwork Elimination Act of 1998 (GPEA), the Federal government has encouraged the use of electronic / digital signatures to enable...

  20. Expressiveness considerations of XML signatures

    DEFF Research Database (Denmark)

    Jensen, Meiko; Meyer, Christopher

    2011-01-01

    XML Signatures are used to protect XML-based Web Service communication against a broad range of attacks related to man-in-the-middle scenarios. However, due to the complexity of the Web Services specification landscape, the task of applying XML Signatures in a robust and reliable manner becomes...... more and more challenging. In this paper, we investigate this issue, describing how an attacker can still interfere with Web Services communication even in the presence of XML Signatures. Additionally, we discuss the interrelation of XML Signatures and XML Encryption, focussing on their security...

  1. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  2. Impact of prehistoric cooking practices on paleoenvironmental proxies in shell midden constituents

    Science.gov (United States)

    Müller, Peter; Staudigel, Philip; Murray, Sean T.; Westphal, Hildegard; Swart, Peter K.

    2016-04-01

    Paleoenvironmental proxy records such as oxygen isotopes of calcareous skeletal structures like fish otoliths or mollusk shells provide highest-resolution information about environmental conditions experienced by the organism. Accumulations of such skeletal structures by ancient coastal populations in so called "shell midden" deposits provide us with sub-seasonally resolved paleoclimate records covering time spans up to several millennia. Given their high temporal resolution, these deposits are increasingly used for paleoclimate reconstructions and complement our understanding of ancient climate changes. However, gathered as comestibles, most of these skeletal remains were subject to prehistoric cooking methods prior to deposition. The associated alteration of the chemical proxy signatures as well as the subsequent error for paleoenvironmental reconstructions remained almost entirely neglected so far. Here, we present clumped isotope, conventional oxygen and carbon isotopes as well as element:Ca ratios measured in modern bivalve shells after exposing them to different prehistoric cooking methods. Our data show that most cooking methods considerably alter commonly used paleoclimate proxy systems which can lead to substantial misinterpretations of ancient climate conditions. Since the magnitude of chemical alteration is not distinguishable from natural temperature variability in most coastal settings, the alteration of shell midden constituents by prehistoric cooking remains likely unnoticed in most cases. Thus, depending on the cooking method, pre-depositional heating might have introduced considerable errors into previous paleoclimate studies. However, our data also show that clumped isotope thermometry represents a suitable diagnostic tool to detect such pre-depositional cooking events and also allows differentiating between the most commonly applied prehistoric cooking methods.

  3. Application and Network-Cognizant Proxies - Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Antonio Ortega; Daniel C. Lee

    2003-03-24

    OAK B264 Application and Network-Cognizant Proxies - Final Report. Current networks show increasing heterogeneity both in terms of their bandwidths/delays and the applications they are required to support. This is a trend that is likely to intensify in the future, as real-time services, such as video, become more widely available and networking access over wireless links becomes more widespread. For this reason they propose that application-specific proxies, intermediate network nodes that broker the interactions between server and client, will become an increasingly important network element. These proxies will allow adaptation to changes in network characteristics without requiring a direct intervention of either server or client. Moreover, it will be possible to locate these proxies strategically at those points where a mismatch occurs between subdomains (for example, a proxy could be placed so as to act as a bridge between a reliable network domain and an unreliable one). This design philosophy favors scalability in the sense that the basic network infrastructure can remain unchanged while new functionality can be added to proxies, as required by the applications. While proxies can perform numerous generic functions, such as caching or security, they concentrate here on media-specific, and in particular video-specific, tasks. The goal of this project was to demonstrate that application- and network-specific knowledge at a proxy can improve overall performance especially under changing network conditions. They summarize below the work performed to address these issues. Particular effort was spent in studying caching techniques and on video classification to enable DiffServ delivery. other work included analysis of traffic characteristics, optimized media scheduling, coding techniques based on multiple description coding, and use of proxies to reduce computation costs. This work covered much of what was originally proposed but with a necessarily reduced scope.

  4. Web proxy cache replacement strategies simulation, implementation, and performance evaluation

    CERN Document Server

    ElAarag, Hala; Cobb, Jake

    2013-01-01

    This work presents a study of cache replacement strategies designed for static web content. Proxy servers can improve performance by caching static web content such as cascading style sheets, java script source files, and large files such as images. This topic is particularly important in wireless ad hoc networks, in which mobile devices act as proxy servers for a group of other mobile devices. Opening chapters present an introduction to web requests and the characteristics of web objects, web proxy servers and Squid, and artificial neural networks. This is followed by a comprehensive review o

  5. Multiresolution signal decomposition schemes

    NARCIS (Netherlands)

    J. Goutsias (John); H.J.A.M. Heijmans (Henk)

    1998-01-01

    textabstract[PNA-R9810] Interest in multiresolution techniques for signal processing and analysis is increasing steadily. An important instance of such a technique is the so-called pyramid decomposition scheme. This report proposes a general axiomatic pyramid decomposition scheme for signal analysis

  6. Adaptive protection scheme

    Directory of Open Access Journals (Sweden)

    R. Sitharthan

    2016-09-01

    Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.

  7. Signatures of Mechanosensitive Gating.

    Science.gov (United States)

    Morris, Richard G

    2017-01-10

    The question of how mechanically gated membrane channels open and close is notoriously difficult to address, especially if the protein structure is not available. This perspective highlights the relevance of micropipette-aspirated single-particle tracking-used to obtain a channel's diffusion coefficient, D, as a function of applied membrane tension, σ-as an indirect assay for determining functional behavior in mechanosensitive channels. While ensuring that the protein remains integral to the membrane, such methods can be used to identify not only the gating mechanism of a protein, but also associated physical moduli, such as torsional and dilational rigidity, which correspond to the protein's effective shape change. As an example, three distinct D-versus-σ "signatures" are calculated, corresponding to gating by dilation, gating by tilt, and gating by a combination of both dilation and tilt. Both advantages and disadvantages of the approach are discussed. Copyright © 2017 Biophysical Society. Published by Elsevier Inc. All rights reserved.

  8. Signatures de l'invisible

    CERN Multimedia

    CERN Press Office. Geneva

    2000-01-01

    "Signatures of the Invisible" is an unique collaboration between contemporary artists and contemporary physicists which has the potential to help redefine the relationship between science and art. "Signatures of the Invisible" is jointly organised by the London Institute - the world's largest college of art and design and CERN*, the world's leading particle physics laboratory. 12 leading visual artists:

  9. An interpretation of signature inversion

    International Nuclear Information System (INIS)

    Onishi, Naoki; Tajima, Naoki

    1988-01-01

    An interpretation in terms of the cranking model is presented to explain why signature inversion occurs for positive γ of the axially asymmetric deformation parameter and emerges into specific orbitals. By introducing a continuous variable, the eigenvalue equation can be reduced to a one dimensional Schroedinger equation by means of which one can easily understand the cause of signature inversion. (author)

  10. Cell short circuit, preshort signature

    Science.gov (United States)

    Lurie, C.

    1980-01-01

    Short-circuit events observed in ground test simulations of DSCS-3 battery in-orbit operations are analyzed. Voltage signatures appearing in the data preceding the short-circuit event are evaluated. The ground test simulation is briefly described along with performance during reconditioning discharges. Results suggest that a characteristic signature develops prior to a shorting event.

  11. Ship Signature Management System : Functionality

    NARCIS (Netherlands)

    Arciszewski, H.F.R.; Lier, L. van; Meijer, Y.G.S.; Noordkamp, H.W.; Wassenaar, A.S.

    2010-01-01

    A signature of a platform is the manner in which the platform manifests itself to a certain type of sensor and how observable it is when such a sensor is used to detect the platform. Because many military platforms use sensors in different media, it is the total of its different signatures that

  12. Munchausen Syndrome by Proxy: Unusual Manifestations and Disturbing Sequelae.

    Science.gov (United States)

    Porter, Gerald E.; And Others

    1994-01-01

    This study documents previously unreported findings in cases of Munchausen Syndrome by Proxy (in which a mother fabricates an illness in her child). In the reported case, esophageal perforation, retrograde intussusception, tooth loss, and bradycardia were found. (Author/DB)

  13. Ocean currents generate large footprints in marine palaeoclimate proxies

    NARCIS (Netherlands)

    van Sebille, E.; Scussolini, P.; Durgadoo, J.V.; Peeters, F.J.C.; Biastoch, A.; Weijer, W.; Turney, C.; Paris, C.B.; Zahn, R.

    2015-01-01

    Fossils of marine microorganisms such as planktic foraminifera are among the cornerstones of palaeoclimatological studies. It is often assumed that the proxies derived from their shells represent ocean conditions above the location where they were deposited. Planktic foraminifera, however, are

  14. Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization

    NARCIS (Netherlands)

    Tang, Qiang

    2011-01-01

    In this paper we investigate a new category of public key encryption schemes which supports equality test between ciphertexts. With this new primitive, two users, who possess their own public/private key pairs, can issue token(s) to a proxy to authorize it to perform equality test between their

  15. Proxy-rated quality of life in Alzheimer's disease

    DEFF Research Database (Denmark)

    Vogel, Asmus; Bhattacharya, Suvosree; Waldorff, Frans Boch

    2012-01-01

    The study investigated the change in proxy rated quality of life (QoL) of a large cohort of home living patients with Alzheimer's disease (AD) over a period of 36 months.......The study investigated the change in proxy rated quality of life (QoL) of a large cohort of home living patients with Alzheimer's disease (AD) over a period of 36 months....

  16. Applicability of a cognitive questionnaire in the elderly and proxy

    Directory of Open Access Journals (Sweden)

    Renata Areza Fegyveres

    Full Text Available Abstract The Informant Questionnaire on Cognitive Decline in the Elderly with the Proxy (IQCODE was developed as a screening tool for cognition alterations. Objectives: 1 To verify the applicability of IQCODE in the elderly with limited schooling, 2 To verify the reliability of the responses supplied by the aged and their proxies. Methods: Individuals of a Community Group were evaluated using the Mini-Mental State Examination (MMSE, IQCODE and Geriatric Depression Scale (GDS. The IQCODE was applied to informants and proxies. Results: We analyzed 44 individuals, aged between 58-82 years (M=66.8, SD=5.97 with mean elderly-schooling level of 3.75, SD=2.82 and 44 proxies aged 44.5 (SD=13.3, with mean schooling level of 8.25 (SD=4.3. The mean GDS was 8.22, SD=4.90 and 13 participants presented a score suggestive of depressive symptoms. The mean elderly IQCODE score was 3.26, SD=0.69 and 3.21, SD=0.65, for proxy responses. There was no statistical difference between these means. On the MMSE, the mean score was 24.20, SD=4.14 and 18 participants presented scores below the cut-off. The IQCODE answers by the elderly in this latter group were more congruent with MMSE than the answers of proxies. Conclusions: The applicability of the IQCODE in a population with little schooling was verified in that the proxy-report was similar to the elderly report. We can affirm that the elderly answers were more accurate than the proxies, as they were closer to MMSE score. The inclusion of a greater number of participants from community-dwelling settings is necessary to confirm the results obtained in this study.

  17. The Difference Between Using Proxy Server and VPN

    Directory of Open Access Journals (Sweden)

    David Dwiputra Kurniadi

    2015-11-01

    For example, looking for software, game through internet. But sometimes, there are some websites that cannot be opened as they have Internet Positive notificatio. To solve that problem, hacker found the solution by creating Proxy Server or VPN. In this time internet is very modern and very easy to access and there are a lot of Proxy Server and VPN that can be easly used.

  18. A Multi-Proxy Paradigm in the Pursuit of Ocean Paleoredox

    Science.gov (United States)

    Anbar, A. D.; Duan, Y.; Kendall, B.; Reinhard, C.; Severmann, S.; Lyons, T. W.

    2011-12-01

    Mo isotope systematics from such sources. By considering sedimentary Fe enrichments together with Fe isotopes, we find that the Mo enrichment correlates with the telltale signature of a shelf-to-basin Fe redox "shuttle". Uranium isotopes also exhibit variations indicative of redox transformations. This multi-proxy dataset therefore paints a robust picture of trace metal redox cycling consistent with the "whiff" interpretation.

  19. Leak Signature Space: An Original Representation for Robust Leak Location in Water Distribution Networks

    Directory of Open Access Journals (Sweden)

    Myrna V. Casillas

    2015-03-01

    Full Text Available In this paper, an original model-based scheme for leak location using pressure sensors in water distribution networks is introduced. The proposed approach is based on a new representation called the Leak Signature Space (LSS that associates a specific signature to each leak location being minimally affected by leak magnitude. The LSS considers a linear model approximation of the relation between pressure residuals and leaks that is projected onto a selected hyperplane. This new approach allows to infer the location of a given leak by comparing the position of its signature with other leak signatures. Moreover, two ways of improving the method’s robustness are proposed. First, by associating a domain of influence to each signature and second, through a time horizon analysis. The efficiency of the method is highlighted by means of a real network using several scenarios involving different number of sensors and considering the presence of noise in the measurements.

  20. CSR schemes in agribusiness

    DEFF Research Database (Denmark)

    Pötz, Katharina Anna; Haas, Rainer; Balzarova, Michaela

    2013-01-01

    of schemes that can be categorized on focus areas, scales, mechanisms, origins, types and commitment levels. Research limitations/implications – The findings contribute to conceptual and empirical research on existing models to compare and analyse CSR standards. Sampling technique and depth of analysis limit......Purpose – The rise of CSR followed a demand for CSR standards and guidelines. In a sector already characterized by a large number of standards, the authors seek to ask what CSR schemes apply to agribusiness, and how they can be systematically compared and analysed. Design....../methodology/approach – Following a deductive-inductive approach the authors develop a model to compare and analyse CSR schemes based on existing studies and on coding qualitative data on 216 CSR schemes. Findings – The authors confirm that CSR standards and guidelines have entered agribusiness and identify a complex landscape...

  1. Tabled Execution in Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  2. Evaluating statistical cloud schemes

    OpenAIRE

    Grützun, Verena; Quaas, Johannes; Morcrette , Cyril J.; Ament, Felix

    2015-01-01

    Statistical cloud schemes with prognostic probability distribution functions have become more important in atmospheric modeling, especially since they are in principle scale adaptive and capture cloud physics in more detail. While in theory the schemes have a great potential, their accuracy is still questionable. High-resolution three-dimensional observational data of water vapor and cloud water, which could be used for testing them, are missing. We explore the potential of ground-based re...

  3. Gamma spectrometry; level schemes

    International Nuclear Information System (INIS)

    Blachot, J.; Bocquet, J.P.; Monnand, E.; Schussler, F.

    1977-01-01

    The research presented dealt with: a new beta emitter, isomer of 131 Sn; the 136 I levels fed through the radioactive decay of 136 Te (20.9s); the A=145 chain (β decay of Ba, La and Ce, and level schemes for 145 La, 145 Ce, 145 Pr); the A=47 chain (La and Ce, β decay, and the level schemes of 147 Ce and 147 Pr) [fr

  4. Scheme of energy utilities

    International Nuclear Information System (INIS)

    2002-04-01

    This scheme defines the objectives relative to the renewable energies and the rational use of the energy in the framework of the national energy policy. It evaluates the needs and the potentialities of the regions and preconizes the actions between the government and the territorial organizations. The document is presented in four parts: the situation, the stakes and forecasts; the possible actions for new measures; the scheme management and the regional contributions analysis. (A.L.B.)

  5. Family factors in end-of-life decision-making: family conflict and proxy relationship.

    Science.gov (United States)

    Parks, Susan Mockus; Winter, Laraine; Santana, Abbie J; Parker, Barbara; Diamond, James J; Rose, Molly; Myers, Ronald E

    2011-02-01

    Few studies have examined proxy decision-making regarding end-of-life treatment decisions. Proxy accuracy is defined as whether proxy treatment choices are consistent with the expressed wishes of their index elder. The purpose of this study was to examine proxy accuracy in relation to two family factors that may influence proxy accuracy: perceived family conflict and type of elder-proxy relationship. Telephone interviews with 202 community-dwelling elders and their proxy decision makers were conducted including the Life-Support Preferences Questionnaire (LSPQ), and a measure of family conflict, and sociodemographic characteristics, including type of relationship. Elder-proxy accuracy was associated with the type of elder-proxy relationship. Adult children demonstrated the lowest elder-proxy accuracy and spousal proxies the highest elder-proxy accuracy. Elder-proxy accuracy was associated with family conflict. Proxies reporting higher family conflict had lower elder-proxy accuracy. No interaction between family conflict and relationship type was revealed. Spousal proxies were more accurate in their substituted judgment than adult children, and proxies who perceive higher degree of family conflict tended to be less accurate than those with lower family conflict. Health care providers should be aware of these family factors when discussing advance care planning.

  6. Quantitative use of Palaeo-Proxy Data in Global Circulation Models

    Science.gov (United States)

    Collins, M.

    2003-04-01

    It is arguably one of the ultimate aims of palaeo-modelling science to somehow "get the palaeo-proxy data into the model" i.e. to constrain the climate of the model the trajectory of the real climate recorded in the palaeo data. The traditional way of interfacing data with models is to use data assimilation. This presents a number of problems in the palaeo context as the data are more often representative of seasonal to annual or decadal climate and models have time steps of order minutes, hence the model increments are likely to be vanishingly small. Also, variational data assimilation schemes would require the adjoint of the coupled ocean-atmosphere model and the adjoint of the functions which translate model variables such as temperature and precipitation into the palaeo-proxies, both of which are hard to determine because of the high degree of non-linearity in the system and the wide range of space and time scales. An alternative is to add forward models of proxies to the model and run "many years" of simulation until an analog state is found which matches the palaeo data for each season, year, decade etc. Clearly "many years" might range from a few thousand years to almost infinity and depends on the number of degrees of freedom in the climate system and on the error characteristics of the palaeo data. The length of simulation required is probably beyond the supercomputer capacity of a single institution and hence an alternative is to use idle capacity of home and business personal computers - the climateprediction.net project.

  7. Initial Semantics for Strengthened Signatures

    Directory of Open Access Journals (Sweden)

    André Hirschowitz

    2012-02-01

    Full Text Available We give a new general definition of arity, yielding the companion notions of signature and associated syntax. This setting is modular in the sense requested by Ghani and Uustalu: merging two extensions of syntax corresponds to building an amalgamated sum. These signatures are too general in the sense that we are not able to prove the existence of an associated syntax in this general context. So we have to select arities and signatures for which there exists the desired initial monad. For this, we follow a track opened by Matthes and Uustalu: we introduce a notion of strengthened arity and prove that the corresponding signatures have initial semantics (i.e. associated syntax. Our strengthened arities admit colimits, which allows the treatment of the λ-calculus with explicit substitution.

  8. Retail applications of signature verification

    Science.gov (United States)

    Zimmerman, Thomas G.; Russell, Gregory F.; Heilper, Andre; Smith, Barton A.; Hu, Jianying; Markman, Dmitry; Graham, Jon E.; Drews, Clemens

    2004-08-01

    The dramatic rise in identity theft, the ever pressing need to provide convenience in checkout services to attract and retain loyal customers, and the growing use of multi-function signature captures devices in the retail sector provides favorable conditions for the deployment of dynamic signature verification (DSV) in retail settings. We report on the development of a DSV system to meet the needs of the retail sector. We currently have a database of approximately 10,000 signatures collected from 600 subjects and forgers. Previous work at IBM on DSV has been merged and extended to achieve robust performance on pen position data available from commercial point of sale hardware, achieving equal error rates on skilled forgeries and authentic signatures of 1.5% to 4%.

  9. Magnetic Signature Analysis & Validation System

    National Research Council Canada - National Science Library

    Vliet, Scott

    2001-01-01

    The Magnetic Signature Analysis and Validation (MAGSAV) System is a mobile platform that is used to measure, record, and analyze the perturbations to the earth's ambient magnetic field caused by object such as armored vehicles...

  10. Gradient-based model calibration with proxy-model assistance

    Science.gov (United States)

    Burrows, Wesley; Doherty, John

    2016-02-01

    Use of a proxy model in gradient-based calibration and uncertainty analysis of a complex groundwater model with large run times and problematic numerical behaviour is described. The methodology is general, and can be used with models of all types. The proxy model is based on a series of analytical functions that link all model outputs used in the calibration process to all parameters requiring estimation. In enforcing history-matching constraints during the calibration and post-calibration uncertainty analysis processes, the proxy model is run for the purposes of populating the Jacobian matrix, while the original model is run when testing parameter upgrades; the latter process is readily parallelized. Use of a proxy model in this fashion dramatically reduces the computational burden of complex model calibration and uncertainty analysis. At the same time, the effect of model numerical misbehaviour on calculation of local gradients is mitigated, this allowing access to the benefits of gradient-based analysis where lack of integrity in finite-difference derivatives calculation would otherwise have impeded such access. Construction of a proxy model, and its subsequent use in calibration of a complex model, and in analysing the uncertainties of predictions made by that model, is implemented in the PEST suite.

  11. Towards Symbolic Encryption Schemes

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik

    2012-01-01

    , namely an authenticated encryption scheme that is secure under chosen ciphertext attack. Therefore, many reasonable encryption schemes, such as AES in the CBC or CFB mode, are not among the implementation options. In this paper, we report new attacks on CBC and CFB based implementations of the well......Symbolic encryption, in the style of Dolev-Yao models, is ubiquitous in formal security models. In its common use, encryption on a whole message is specified as a single monolithic block. From a cryptographic perspective, however, this may require a resource-intensive cryptographic algorithm......-known Needham-Schroeder and Denning-Sacco protocols. To avoid such problems, we advocate the use of refined notions of symbolic encryption that have natural correspondence to standard cryptographic encryption schemes....

  12. Compact Spreader Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  13. 21 CFR 11.50 - Signature manifestations.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Signature manifestations. 11.50 Section 11.50 Food... RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.50 Signature manifestations. (a) Signed electronic...: (1) The printed name of the signer; (2) The date and time when the signature was executed; and (3...

  14. 76 FR 30542 - Adult Signature Services

    Science.gov (United States)

    2011-05-26

    ... POSTAL SERVICE 39 CFR Part 111 Adult Signature Services AGENCY: Postal Service\\TM\\. ACTION: Final..., Domestic Mail Manual (DMM[supreg]) 503.8, to add a new extra service called Adult Signature. This new service has two available options: Adult Signature Required and Adult Signature Restricted Delivery. DATES...

  15. 1 CFR 18.7 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 1 General Provisions 1 2010-01-01 2010-01-01 false Signature. 18.7 Section 18.7 General Provisions... PREPARATION AND TRANSMITTAL OF DOCUMENTS GENERALLY § 18.7 Signature. The original and each duplicate original... stamped beneath the signature. Initialed or impressed signatures will not be accepted. Documents submitted...

  16. Attribute-Based Digital Signature System

    NARCIS (Netherlands)

    Ibraimi, L.; Asim, Muhammad; Petkovic, M.

    2011-01-01

    An attribute-based digital signature system comprises a signature generation unit (1) for signing a message (m) by generating a signature (s) based on a user secret key (SK) associated with a set of user attributes, wherein the signature generation unit (1) is arranged for combining the user secret

  17. SIGNATURE: A workbench for gene expression signature analysis

    Directory of Open Access Journals (Sweden)

    Chang Jeffrey T

    2011-11-01

    Full Text Available Abstract Background The biological phenotype of a cell, such as a characteristic visual image or behavior, reflects activities derived from the expression of collections of genes. As such, an ability to measure the expression of these genes provides an opportunity to develop more precise and varied sets of phenotypes. However, to use this approach requires computational methods that are difficult to implement and apply, and thus there is a critical need for intelligent software tools that can reduce the technical burden of the analysis. Tools for gene expression analyses are unusually difficult to implement in a user-friendly way because their application requires a combination of biological data curation, statistical computational methods, and database expertise. Results We have developed SIGNATURE, a web-based resource that simplifies gene expression signature analysis by providing software, data, and protocols to perform the analysis successfully. This resource uses Bayesian methods for processing gene expression data coupled with a curated database of gene expression signatures, all carried out within a GenePattern web interface for easy use and access. Conclusions SIGNATURE is available for public use at http://genepattern.genome.duke.edu/signature/.

  18. New analytic unitarization schemes

    International Nuclear Information System (INIS)

    Cudell, J.-R.; Predazzi, E.; Selyugin, O. V.

    2009-01-01

    We consider two well-known classes of unitarization of Born amplitudes of hadron elastic scattering. The standard class, which saturates at the black-disk limit includes the standard eikonal representation, while the other class, which goes beyond the black-disk limit to reach the full unitarity circle, includes the U matrix. It is shown that the basic properties of these schemes are independent of the functional form used for the unitarization, and that U matrix and eikonal schemes can be extended to have similar properties. A common form of unitarization is proposed interpolating between both classes. The correspondence with different nonlinear equations are also briefly examined.

  19. Satellite Altimeters and Gravimeters as Proxy of the Indonesian Throughflow

    Science.gov (United States)

    Susanto, R. D.; Song, Y. T.

    2014-12-01

    The Indonesian Throughflow (ITF), the only pathway for interocean exchange between the Pacific to the Indian Ocean, plays an important role in global ocean circulation and climate. Yet, continuous ITF measurement is difficult and expensive. We demonstrate a plausible approach to derive the ITF transport proxy using satellite altimetry sea surface height (SSH), gravimetry ocean bottom pressure (OBP) data, in situ measurements from the Makassar Strait from 1996-1998 and 2004-2009, and a theoretical formulation. We first identified the optimal locations in the Pacific and Indian Ocean based on the optimal correlation between the ITF transport through the Makassar Strait and the pressure gradients, represented by the SSH and OBP differences between the Pacific and Indian Oceans at a 1° x 1° horizontal resolution. These geographical locations (centred at off-equatorial in the western Pacific Ocean and centred at along the equator in the eastern Indian Ocean) that control the strength and variability of the ITF transport in the Makassar Strait differ from early studies. The proxy time series follow the observation time series quite well, resolving the intraseasonal, monsoonal, and interannual signals with the 1993-2011 annual mean proxy transport of 11.6 ± 3.2 Sv. Our formulation provides a continuous approach to derive the ITF proxy as long as the satellite data are available. Such a continuous record would be difficult to achieve by in situ measurements alone due to logistical and financial challenges. Ideally, the proxy can be used to complement or fill in the gaps of the observations for a continuous ITF proxy for better understanding the ocean climate and validating ocean circulation models.

  20. Asian Eocene monsoons as revealed by leaf architectural signatures

    Science.gov (United States)

    Spicer, Robert A.; Yang, Jian; Herman, Alexei B.; Kodrul, Tatiana; Maslova, Natalia; Spicer, Teresa E. V.; Aleksandrova, Galina; Jin, Jianhua

    2016-09-01

    The onset and development of the Asian monsoon systems is a topic that has attracted considerable research effort but proxy data limitations, coupled with a diversity of definitions and metrics characterizing monsoon phenomena, have generated much debate. Failure of geological proxies to yield metrics capable of distinguishing between rainfall seasonality induced by migrations of the Inter-tropical Convergence Zone (ITCZ) from that attributable to topographically modified seasonal pressure reversals has frustrated attempts to understand mechanisms underpinning monsoon development and dynamics. Here we circumvent the use of such single climate parameter metrics in favor of detecting directly the distinctive attributes of different monsoon regimes encoded in leaf fossils. Leaf form adapts to the prevailing climate, particularly under the extreme seasonal stresses imposed by monsoons, so it is likely that fossil leaves carry a unique signature of past monsoon regimes. Leaf form trait spectra obtained from fossils from Eocene basins in southern China were compared with those seen in modern leaves growing under known climate regimes. The fossil leaf trait spectra, including those derived from previously published fossil floras from northwestern India, were most similar to those found in vegetation exposed to the modern Indonesia-Australia Monsoon (I-AM), which is largely a product of seasonal migrations of the ITCZ. The presence of this distinctive leaf physiognomic signature suggests that although a monsoon climate existed in Eocene time across southern Asia the characteristics of the modern topographically-enhanced South Asia Monsoon had yet to develop. By the Eocene leaves in South Asia had become well adapted to an I-AM type regime across many taxa and points to the existence of a pervasive monsoon climate prior to the Eocene. No fossil trait spectra typical of exposure to the modern East Asia monsoon were seen, suggesting the effects of this system in southern

  1. Modeling Profiles and Signatures of Enrichments

    Science.gov (United States)

    Ali, A.; Qualls, C.; Lucas, S. G.; Lombari, G.; Appenzeller, O.

    2014-12-01

    Anthropogenic and geochemical enrichment of soils and living matter have been well documented 1, 2, 3.Here we report on geochemical, anthropogenic and biological enrichments with heavy metals in Modern Peru and compared this to Modern and ancient data from New Mexico, USA. We established a signature derived from the quantities of 25 metals in various biological, fossil and soil materials. We also speculate that human adaptation to mercury toxicity may occur in remarkably short time spans during the Holocene. We found mercury concentrations in Modern pigeon feathers and llama wool from free foraging birds and animals in Albuquerque, NM, ranging from 0.006 to 0.019 mg/Kg of tissue. The values for Modern Peru ranged from 22.0 to 556 mg/Kg for the same tissues. We discovered, in 64 million-year-old fossilized plants from New Mexico (Paleocene Nacimiento Formation, San Juan Basin), a mercury concentration of 1.11 mg/Kg of fossil, whereas Modern plant material from the Rio Grande Basin in New Mexico contained no mercury. Profiling of metal content of these samples suggests that mercury is a proxy for anthropogenic rather than geochemical enrichment in the localities we examined. We found no overt signs of mercury toxicity in contemporaneous inhabitants of Huancavelica4, Peru; one of the ten most mercury-polluted places in the world and the mercury concentration in their hair is well below modern admissible levels. However, assessment of their annual scalp hair growth-rate showed marked reduction in growth (~ 5cm/yr) versus ~ 16cm/year for normal scalp hair from other continents4. This is consistent with a toxic effect of heavy metals on human metabolism and especially autonomic nervous system function in Huancavelica, Peru. Contemporaneous anthropogenic activities are known to increase heavy metal content in the biosphere with potentially toxic effects on humans. However, signs of human evolutionary adaptation to such toxins might already be evident in Peru4.

  2. The Intra-Industry Effects of Proxy Contests

    OpenAIRE

    Fang Chen; Jian Huang; Han Yu

    2018-01-01

    This paper is the first study on the intra-industry effects of proxy contests. Using a sample of proxy contests from January 1988 through December 2008, we identify a striking cross-sectional difference in market reaction to the target companies. As much as 61% of the target firms have a significant positive cumulative abnormal return (CARs) in the period (‒10, +10) around the announcement day, while 39% of the target firms have the negative CARs in the same event window. Moreover, we find th...

  3. Health anxiety by proxy in women with severe health anxiety

    DEFF Research Database (Denmark)

    Thorgaard, Mette Viller; Frostholm, Lisbeth; Walker, Lynn

    2017-01-01

    Health anxiety (HA) refers to excessive worries and anxiety about harbouring serious illness based on misinterpretation of bodily sensations or changes as signs of serious illness. Severe HA is associated with disability and high health care costs. However, the impact of parental HA on excessive...... concern with their children's health (health anxiety by proxy) is scantly investigated. The aim of this study is to investigate HA by proxy in mothers with severe HA. Fifty mothers with severe HA and two control groups were included, i.e. mothers with rheumatoid arthritis (N = 49) and healthy mothers (N...

  4. Privacy in wireless sensor networks using ring signature

    Directory of Open Access Journals (Sweden)

    Ashmita Debnath

    2014-07-01

    Full Text Available The veracity of a message from a sensor node must be verified in order to avoid a false reaction by the sink. This verification requires the authentication of the source node. The authentication process must also preserve the privacy such that the node and the sensed object are not endangered. In this work, a ring signature was proposed to authenticate the source node while preserving its spatial privacy. However, other nodes as signers and their numbers must be chosen to preclude the possibility of a traffic analysis attack by an adversary. The spatial uncertainty increases with the number of signers but requires larger memory size and communication overhead. This requirement can breach the privacy of the sensed object. To determine the effectiveness of the proposed scheme, the location estimate of a sensor node by an adversary and enhancement in the location uncertainty with a ring signature was evaluated. Using simulation studies, the ring signature was estimated to require approximately four members from the same neighbor region of the source node to sustain the privacy of the node. Furthermore, the ring signature was also determined to have a small overhead and not to adversely affect the performance of the sensor network.

  5. Oxygen Isotopes Archived in Subfossil Chironomids: Advancing a Promising Proxy for Lake Water Isotopes

    Science.gov (United States)

    Lasher, G. E.; Axford, Y.; Blair, N. E.

    2017-12-01

    Oxygen isotopes measured in subfossil chironomid head capsules (aquatic insect remains) in lake sediments are beginning to offer paleoclimate insights from previously under-studied areas of the world. Since the first published pilot study demonstrated the potential of chironomid δ18O to record lake water δ18O (Wooller et al., 2004), subsequent work has refined our understanding of this proxy: confirming via lab cultures that growth water controls head capsule δ18O (Wang et al., 2009), refining laboratory pretreatment protocols, and further validating the method by demonstrating strong agreement between carbonate and chironomid-derived paleo-isotope records (Verbruggen et al., 2009, 2010, 2011). However, outstanding questions remain, including the seasonality of chironomid growth, possible species-dependent vital effects, and diagenetic effects on the protein-chitin complex that comprise chironomid cuticles. To address some of these questions, we summarize available data from paired modern chironomid-lake water δ18O values from around the world and discuss climatic and environmental factors affecting chironomid isotopic signatures. We also present new data on the resistance of these subfossils to diagenesis and degradation throughout the late Quaternary using Fourier Transform Infrared Spectroscopy (FT-IR) and Pyrolysis Gas Chromatography Mass Spectrometry (Py-GC/MS) of chironomid remains up to >100,000 years old. As chironomids are nearly ubiquitous in lakes globally and, we argue, molecularly stable through glacial and interglacial cycles, this proxy has the potential to greatly expand the spatial and temporal resolution of Quaternary paleo-isotopes and thus climate records. In addition to reviewing and presenting new methodological advances, we also present applications of chironomid δ18O from millennial- to centennial-scale Holocene Greenland lake records.

  6. Pyrite as a proxy for the identification of former coastal lagoons in semiarid NE Brazil

    Science.gov (United States)

    Ferreira, Tiago O.; Nóbrega, Gabriel N.; Albuquerque, Antonia G. B. M.; Sartor, Lucas R.; Gomes, Irlene S.; Artur, Adriana G.; Otero, Xosé L.

    2015-10-01

    This work aimed to test the suitability of pyrite (FeS2) as a proxy for reconstructing past marine environmental conditions along the semiarid coast of Brazil. Morphological description combined with physicochemical analyses including Fe partitioning were conducted for soil depth profiles (30 and 60 cm depths) at three sites in two contrasting lagoons of the state of Ceará: a suspected former lagoon that would have been transformed into a freshwater "lake" at a site vegetated by Juncus effusus (site P1), and another lagoon with connection to the sea at sites vegetated by J. effusus (site P2) or Portulaca oleracea (site P3). Soil samples were collected in September 2010. Site P3 had more reducing conditions, reaching Eh values of -132 mV in the surface layer (0-10 cm), whereas minimum values for the P1 and P2 sites were +219 and +85 mV, respectively. Lower pyritic Fe values were found at site P1, with a degree of pyritization (DOP) ranging from 10 to 13%. At sites P2 and P3, DOP ranged from 9 to 67% and from 55 to 72%, respectively. These results are consistent with an interruption of tidal channels by eolian dune migration inducing strong changes in the hydrodynamics and physicochemical characteristics (lower salinity, oxidizing conditions) of these sites, causing the dieback of suspected former mangroves and a succession to freshwater marshes with an intermediate salt marsh stage. Together with other physicochemical signatures, pyrite can evidently serve as a useful proxy in tracking environmental changes in such ecotones, with implications for coastal management.

  7. Are fixed grain size ratios useful proxies for loess sedimentation dynamics? Experiences from Remizovka, Kazakhstan

    Science.gov (United States)

    Schulte, Philipp; Sprafke, Tobias; Rodrigues, Leonor; Fitzsimmons, Kathryn E.

    2018-04-01

    Loess-paleosol sequences (LPS) are sensitive terrestrial archives of past aeolian dynamics and paleoclimatic changes within the Quaternary. Grain size (GS) analysis is commonly used to interpret aeolian dynamics and climate influences on LPS, based on granulometric parameters such as specific GS classes, ratios of GS classes and statistical manipulation of GS data. However, the GS distribution of a loess sample is not solely a function of aeolian dynamics; rather complex polygenetic depositional and post-depositional processes must be taken into account. This study assesses the reliability of fixed GS ratios as proxies for past sedimentation dynamics using the case study of Remizovka in southeast Kazakhstan. Continuous sampling of the upper 8 m of the profile, which shows extremely weak pedogenic alteration and is therefore dominated by primary aeolian activity, indicates that fixed GS ratios do not adequately serve as proxies for loess sedimentation dynamics. We find through the calculation of single value parameters, that "true" variations within sensitive GS classes are masked by relative changes of the more frequent classes. Heatmap signatures provide the visualization of GS variability within LPS without significant data loss within the measured classes of a sample, or across all measured samples. We also examine the effect of two different commonly used laser diffraction devices on GS ratio calculation by duplicate measurements, the Beckman Coulter (LS13320) and a Malvern Mastersizer Hydro (MM2000), as well as the applicability and significance of the so-called "twin peak ratio" previously developed on samples from the same section. The LS13320 provides higher resolution results than the MM2000, nevertheless the GS ratios related to variations in the silt-sized fraction were comparable. However, we could not detect a twin peak within the coarse silt as detected in the original study using the same device. Our GS measurements differ from previous works at

  8. 4. Payment Schemes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 2. Electronic Commerce - Payment Schemes. V Rajaraman. Series Article Volume 6 Issue 2 February 2001 pp 6-13. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/006/02/0006-0013 ...

  9. Contract saving schemes

    NARCIS (Netherlands)

    Ronald, R.; Smith, S.J.; Elsinga, M.; Eng, O.S.; Fox O'Mahony, L.; Wachter, S.

    2012-01-01

    Contractual saving schemes for housing are institutionalised savings programmes normally linked to rights to loans for home purchase. They are diverse types as they have been developed differently in each national context, but normally fall into categories of open, closed, compulsory, and ‘free

  10. Alternative reprocessing schemes evaluation

    International Nuclear Information System (INIS)

    1979-02-01

    This paper reviews the parameters which determine the inaccessibility of the plutonium in reprocessing plants. Among the various parameters, the physical and chemical characteristics of the materials, the various processing schemes and the confinement are considered. The emphasis is placed on that latter parameter, and the advantages of an increased confinement in the socalled PIPEX reprocessing plant type are presented

  11. Introduction to association schemes

    NARCIS (Netherlands)

    Seidel, J.J.

    1991-01-01

    The present paper gives an introduction to the theory of association schemes, following Bose-Mesner (1959), Biggs (1974), Delsarte (1973), Bannai-Ito (1984) and Brouwer-Cohen-Neumaier (1989). Apart from definitions and many examples, also several proofs and some problems are included. The paragraphs

  12. Reaction schemes of immunoanalysis

    International Nuclear Information System (INIS)

    Delaage, M.; Barbet, J.

    1991-01-01

    The authors apply a general theory for multiple equilibria to the reaction schemes of immunoanalysis, competition and sandwich. This approach allows the manufacturer to optimize the system and provide the user with interpolation functions for the standard curve and its first derivative as well, thus giving access to variance [fr

  13. Alternative health insurance schemes

    DEFF Research Database (Denmark)

    Keiding, Hans; Hansen, Bodil O.

    2002-01-01

    In this paper, we present a simple model of health insurance with asymmetric information, where we compare two alternative ways of organizing the insurance market. Either as a competitive insurance market, where some risks remain uninsured, or as a compulsory scheme, where however, the level...... competitive insurance; this situation turns out to be at least as good as either of the alternatives...

  14. Signature molecular descriptor : advanced applications.

    Energy Technology Data Exchange (ETDEWEB)

    Visco, Donald Patrick, Jr. (Tennessee Technological University, Cookeville, TN)

    2010-04-01

    In this work we report on the development of the Signature Molecular Descriptor (or Signature) for use in the solution of inverse design problems as well as in highthroughput screening applications. The ultimate goal of using Signature is to identify novel and non-intuitive chemical structures with optimal predicted properties for a given application. We demonstrate this in three studies: green solvent design, glucocorticoid receptor ligand design and the design of inhibitors for Factor XIa. In many areas of engineering, compounds are designed and/or modified in incremental ways which rely upon heuristics or institutional knowledge. Often multiple experiments are performed and the optimal compound is identified in this brute-force fashion. Perhaps a traditional chemical scaffold is identified and movement of a substituent group around a ring constitutes the whole of the design process. Also notably, a chemical being evaluated in one area might demonstrate properties very attractive in another area and serendipity was the mechanism for solution. In contrast to such approaches, computer-aided molecular design (CAMD) looks to encompass both experimental and heuristic-based knowledge into a strategy that will design a molecule on a computer to meet a given target. Depending on the algorithm employed, the molecule which is designed might be quite novel (re: no CAS registration number) and/or non-intuitive relative to what is known about the problem at hand. While CAMD is a fairly recent strategy (dating to the early 1980s), it contains a variety of bottlenecks and limitations which have prevented the technique from garnering more attention in the academic, governmental and industrial institutions. A main reason for this is how the molecules are described in the computer. This step can control how models are developed for the properties of interest on a given problem as well as how to go from an output of the algorithm to an actual chemical structure. This report

  15. Quantum random oracle model for quantum digital signature

    Science.gov (United States)

    Shang, Tao; Lei, Qi; Liu, Jianwei

    2016-10-01

    The goal of this work is to provide a general security analysis tool, namely, the quantum random oracle (QRO), for facilitating the security analysis of quantum cryptographic protocols, especially protocols based on quantum one-way function. QRO is used to model quantum one-way function and different queries to QRO are used to model quantum attacks. A typical application of quantum one-way function is the quantum digital signature, whose progress has been hampered by the slow pace of the experimental realization. Alternatively, we use the QRO model to analyze the provable security of a quantum digital signature scheme and elaborate the analysis procedure. The QRO model differs from the prior quantum-accessible random oracle in that it can output quantum states as public keys and give responses to different queries. This tool can be a test bed for the cryptanalysis of more quantum cryptographic protocols based on the quantum one-way function.

  16. Adaptive Aft Signature Shaping of a Low-Boom Supersonic Aircraft Using Off-Body Pressures

    Science.gov (United States)

    Ordaz, Irian; Li, Wu

    2012-01-01

    The design and optimization of a low-boom supersonic aircraft using the state-of-the- art o -body aerodynamics and sonic boom analysis has long been a challenging problem. The focus of this paper is to demonstrate an e ective geometry parameterization scheme and a numerical optimization approach for the aft shaping of a low-boom supersonic aircraft using o -body pressure calculations. A gradient-based numerical optimization algorithm that models the objective and constraints as response surface equations is used to drive the aft ground signature toward a ramp shape. The design objective is the minimization of the variation between the ground signature and the target signature subject to several geometric and signature constraints. The target signature is computed by using a least-squares regression of the aft portion of the ground signature. The parameterization and the deformation of the geometry is performed with a NASA in- house shaping tool. The optimization algorithm uses the shaping tool to drive the geometric deformation of a horizontal tail with a parameterization scheme that consists of seven camber design variables and an additional design variable that describes the spanwise location of the midspan section. The demonstration cases show that numerical optimization using the state-of-the-art o -body aerodynamic calculations is not only feasible and repeatable but also allows the exploration of complex design spaces for which a knowledge-based design method becomes less effective.

  17. Data Cleaning Methods for Client and Proxy Logs

    NARCIS (Netherlands)

    Weinreich, H.; Obendorf, H.; Herder, E.; Edmonds, A.; Hawkey, K.; Kellar, M.; Turnbull, D.

    2006-01-01

    In this paper we present our experiences with the cleaning of Web client and proxy usage logs, based on a long-term browsing study with 25 participants. A detailed clickstream log, recorded using a Web intermediary, was combined with a second log of user interface actions, which was captured by a

  18. Comparison of independent proxies in the reconstruction of deep ...

    African Journals Online (AJOL)

    Independent proxies were assessed in two Late Quaternary sediment cores from the eastern South Atlantic to compare deep-water changes during the last 400 kyr. ... is exclusively observed during interglacials, with maximum factor loadings in ... only slightly without a significant glacial-interglacial pattern, as measured in a ...

  19. TEX86 paleothermometry : proxy validation and application in marine sediments

    NARCIS (Netherlands)

    Huguet, C.

    2007-01-01

    Determination of past sea surface temperature (SST) is of primary importance for the reconstruction of natural climatic changes, modelling of climate and reconstruction of ocean circulation. Recently, a new SST proxy was introduced, the TetraEther indeX of lipids with 86 carbons (TEX86), which is

  20. Shareholder Activism through Proxy Proposals : The European Perspective

    NARCIS (Netherlands)

    Cziraki, P.; Renneboog, L.D.R.; Szilagyi, P.G.

    2009-01-01

    This paper is the first to investigate the corporate governance role of shareholderinitiated proxy proposals in European firms. While proposals in the US are nonbinding even if they pass the shareholder vote, they are legally binding in the UK and most of Continental Europe. Nonetheless, submissions

  1. Munchausen Syndrome by Proxy: A Study of Psychopathology.

    Science.gov (United States)

    Bools, Christopher; And Others

    1994-01-01

    This study evaluated 100 mothers with Munchausen Syndrome by Proxy (the fabrication of illness by a mother in her child). Approximately half of the mothers had either smothered or poisoned their child as part of their fabrications. Lifetime psychiatric histories were reported for 47 of the mothers. The most notable psychopathology was personality…

  2. Slices: A shape-proxy based on planar sections

    KAUST Repository

    McCrae, James

    2011-12-01

    Minimalist object representations or shape-proxies that spark and inspire human perception of shape remain an incompletely understood, yet powerful aspect of visual communication. We explore the use of planar sections, i.e., the contours of intersection of planes with a 3D object, for creating shape abstractions, motivated by their popularity in art and engineering. We first perform a user study to show that humans do define consistent and similar planar section proxies for common objects. Interestingly, we observe a strong correlation between user-defined planes and geometric features of objects. Further we show that the problem of finding the minimum set of planes that capture a set of 3D geometric shape features is both NP-hard and not always the proxy a user would pick. Guided by the principles inferred from our user study, we present an algorithm that progressively selects planes to maximize feature coverage, which in turn influence the selection of subsequent planes. The algorithmic framework easily incorporates various shape features, while their relative importance values are computed and validated from the user study data. We use our algorithm to compute planar slices for various objects, validate their utility towards object abstraction using a second user study, and conclude showing the potential applications of the extracted planar slice shape proxies.

  3. Munchausen Syndrome by Proxy (MSBP): An Intergenerational Perspective.

    Science.gov (United States)

    Rappaport, Sol R.; Hochstadt, Neil J.

    1993-01-01

    Presents new information about Munchausen Syndrome by Proxy (MSBP), factitious disorder in which caretaker may induce or exaggerate medical illness in his or her child that may lead to illness and even death. Provides psychosocial history of caregiver using intergenerational model. Presents case of MSBP involving three siblings and information…

  4. Slices: A shape-proxy based on planar sections

    KAUST Repository

    McCrae, James; Singh, Karan S.; Mitra, Niloy J.

    2011-01-01

    of intersection of planes with a 3D object, for creating shape abstractions, motivated by their popularity in art and engineering. We first perform a user study to show that humans do define consistent and similar planar section proxies for common objects

  5. On randomizing hash functions to strengthen the security of digital signatures

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Knudsen, Lars Ramkilde

    2009-01-01

    Halevi and Krawczyk proposed a message randomization algorithm called RMX as a front-end tool to the hash-then-sign digital signature schemes such as DSS and RSA in order to free their reliance on the collision resistance property of the hash functions. They have shown that to forge a RMX-hash-th...... schemes that use Davies-Meyer schemes and a variant of RMX published by NIST in its Draft Special Publication (SP) 800-106. We discuss some important applications of our attack....

  6. An Improved Overloading Scheme for Downlink CDMA

    Directory of Open Access Journals (Sweden)

    Marc Moeneclaey

    2005-04-01

    Full Text Available An improved overloading scheme is presented for single-user detection in the downlink of multiple-access systems based on OCDMA/OCDMA (O/O. By displacing in time the orthogonal signatures of the two user sets that make up the overloaded system, the cross-correlation between the users of the two sets is reduced. For random O/O with square-root cosine rolloff chip pulses, the multiuser interference can be decreased by up to 50% (depending on the chip pulse bandwidth as compared to quasiorthogonal sequences (QOS that are presently part of the downlink standard of Cdma2000. This reduction of the multiuser interference gives rise to an increase of the achievable signal-to-interference-plus-noise ratio for a particular channel load.

  7. Distributed Group-Based Mobility Management Scheme in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Moneeb Gohar

    2017-01-01

    Full Text Available For group-based mobility management in 6LoWPAN-based wireless body area networks (WBAN, some schemes using the Proxy Mobile IPv6 (PMIP have been proposed. However, the existing PMIP-based mobility schemes tend to induce large registration delay and handover delay. To overcome such limitations, we propose a new distributed group-based mobility management scheme, in which the Local Mobility Anchor (LMA function is implemented by each Mobile Access Gateway (MAG and the handover operation is performed between two neighboring MAGs without the help of LMA. Besides, each MAG maintains the information of the group of mobile sensors and aggregates the Authentication-Authorization-Accounting (AAA query messages for a group of mobile sensors as a “single” message to decrease the control overhead. By numerical analysis, it is shown that the proposed scheme can reduce the registration and handover delays, compared to the existing PMIP-based mobility schemes.

  8. On the Use of Human Mobility Proxies for Modeling Epidemics

    Science.gov (United States)

    Tizzoni, Michele; Bajardi, Paolo; Decuyper, Adeline; Kon Kam King, Guillaume; Schneider, Christian M.; Blondel, Vincent; Smoreda, Zbigniew; González, Marta C.; Colizza, Vittoria

    2014-01-01

    Human mobility is a key component of large-scale spatial-transmission models of infectious diseases. Correctly modeling and quantifying human mobility is critical for improving epidemic control, but may be hindered by data incompleteness or unavailability. Here we explore the opportunity of using proxies for individual mobility to describe commuting flows and predict the diffusion of an influenza-like-illness epidemic. We consider three European countries and the corresponding commuting networks at different resolution scales, obtained from (i) official census surveys, (ii) proxy mobility data extracted from mobile phone call records, and (iii) the radiation model calibrated with census data. Metapopulation models defined on these countries and integrating the different mobility layers are compared in terms of epidemic observables. We show that commuting networks from mobile phone data capture the empirical commuting patterns well, accounting for more than 87% of the total fluxes. The distributions of commuting fluxes per link from mobile phones and census sources are similar and highly correlated, however a systematic overestimation of commuting traffic in the mobile phone data is observed. This leads to epidemics that spread faster than on census commuting networks, once the mobile phone commuting network is considered in the epidemic model, however preserving to a high degree the order of infection of newly affected locations. Proxies' calibration affects the arrival times' agreement across different models, and the observed topological and traffic discrepancies among mobility sources alter the resulting epidemic invasion patterns. Results also suggest that proxies perform differently in approximating commuting patterns for disease spread at different resolution scales, with the radiation model showing higher accuracy than mobile phone data when the seed is central in the network, the opposite being observed for peripheral locations. Proxies should therefore be

  9. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  10. Five Guidelines for Selecting Hydrological Signatures

    Science.gov (United States)

    McMillan, H. K.; Westerberg, I.; Branger, F.

    2017-12-01

    Hydrological signatures are index values derived from observed or modeled series of hydrological data such as rainfall, flow or soil moisture. They are designed to extract relevant information about hydrological behavior, such as to identify dominant processes, and to determine the strength, speed and spatiotemporal variability of the rainfall-runoff response. Hydrological signatures play an important role in model evaluation. They allow us to test whether particular model structures or parameter sets accurately reproduce the runoff generation processes within the watershed of interest. Most modeling studies use a selection of different signatures to capture different aspects of the catchment response, for example evaluating overall flow distribution as well as high and low flow extremes and flow timing. Such studies often choose their own set of signatures, or may borrow subsets of signatures used in multiple other works. The link between signature values and hydrological processes is not always straightforward, leading to uncertainty and variability in hydrologists' signature choices. In this presentation, we aim to encourage a more rigorous approach to hydrological signature selection, which considers the ability of signatures to represent hydrological behavior and underlying processes for the catchment and application in question. To this end, we propose a set of guidelines for selecting hydrological signatures. We describe five criteria that any hydrological signature should conform to: Identifiability, Robustness, Consistency, Representativeness, and Discriminatory Power. We describe an example of the design process for a signature, assessing possible signature designs against the guidelines above. Due to their ubiquity, we chose a signature related to the Flow Duration Curve, selecting the FDC mid-section slope as a proposed signature to quantify catchment overall behavior and flashiness. We demonstrate how assessment against each guideline could be used to

  11. Interactive Video Coding and Transmission over Heterogeneous Wired-to-Wireless IP Networks Using an Edge Proxy

    Directory of Open Access Journals (Sweden)

    Modestino James W

    2004-01-01

    Full Text Available Digital video delivered over wired-to-wireless networks is expected to suffer quality degradation from both packet loss and bit errors in the payload. In this paper, the quality degradation due to packet loss and bit errors in the payload are quantitatively evaluated and their effects are assessed. We propose the use of a concatenated forward error correction (FEC coding scheme employing Reed-Solomon (RS codes and rate-compatible punctured convolutional (RCPC codes to protect the video data from packet loss and bit errors, respectively. Furthermore, the performance of a joint source-channel coding (JSCC approach employing this concatenated FEC coding scheme for video transmission is studied. Finally, we describe an improved end-to-end architecture using an edge proxy in a mobile support station to implement differential error protection for the corresponding channel impairments expected on the two networks. Results indicate that with an appropriate JSCC approach and the use of an edge proxy, FEC-based error-control techniques together with passive error-recovery techniques can significantly improve the effective video throughput and lead to acceptable video delivery quality over time-varying heterogeneous wired-to-wireless IP networks.

  12. Selectively strippable paint schemes

    Science.gov (United States)

    Stein, R.; Thumm, D.; Blackford, Roger W.

    1993-03-01

    In order to meet the requirements of more environmentally acceptable paint stripping processes many different removal methods are under evaluation. These new processes can be divided into mechanical and chemical methods. ICI has developed a paint scheme with intermediate coat and fluid resistant polyurethane topcoat which can be stripped chemically in a short period of time with methylene chloride free and phenol free paint strippers.

  13. Scalable Nonlinear Compact Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Ghosh, Debojyoti [Argonne National Lab. (ANL), Argonne, IL (United States); Constantinescu, Emil M. [Univ. of Chicago, IL (United States); Brown, Jed [Univ. of Colorado, Boulder, CO (United States)

    2014-04-01

    In this work, we focus on compact schemes resulting in tridiagonal systems of equations, specifically the fifth-order CRWENO scheme. We propose a scalable implementation of the nonlinear compact schemes by implementing a parallel tridiagonal solver based on the partitioning/substructuring approach. We use an iterative solver for the reduced system of equations; however, we solve this system to machine zero accuracy to ensure that no parallelization errors are introduced. It is possible to achieve machine-zero convergence with few iterations because of the diagonal dominance of the system. The number of iterations is specified a priori instead of a norm-based exit criterion, and collective communications are avoided. The overall algorithm thus involves only point-to-point communication between neighboring processors. Our implementation of the tridiagonal solver differs from and avoids the drawbacks of past efforts in the following ways: it introduces no parallelization-related approximations (multiprocessor solutions are exactly identical to uniprocessor ones), it involves minimal communication, the mathematical complexity is similar to that of the Thomas algorithm on a single processor, and it does not require any communication and computation scheduling.

  14. Proxy-Produced Ethnographic Work: What Are the Problems, Issues, and Dilemmas Arising from Proxy-Ethnography?

    Science.gov (United States)

    Martinussen, Marie; Højbjerg, Karin; Tamborg, Andreas Lindenskov

    2018-01-01

    This article addresses the implications of researcher-student cooperation in the production of empirical material. For the student to replace the experienced researcher and work under the researcher's supervision, we call such work proxy-produced ethnographic work. Although there are clear advantages, the specific relations and positions arising…

  15. Evaluation of the sea ice proxy IP against observational and diatom proxy data in the SW Labrador Sea

    DEFF Research Database (Denmark)

    Weckström, K.; Andersen, M.L.; Kuijpers, A.

    2013-01-01

    The recent rapid decline in Arctic sea ice cover has increased the need to improve the accuracy of the sea ice component in climate models and to provide detailed long-term sea ice concentration records, which are only available via proxy data. Recently, the highly branched isoprenoid IP25...

  16. A privacy authentication scheme based on cloud for medical environment.

    Science.gov (United States)

    Chen, Chin-Ling; Yang, Tsai-Tung; Chiang, Mao-Lun; Shih, Tzay-Farn

    2014-11-01

    With the rapid development of the information technology, the health care technologies already became matured. Such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concerning issue. In spite of many literatures discussed about medical systems, these literatures should face many security challenges. The most important issue is patients' privacy. Therefore, we propose a privacy authentication scheme based on cloud environment. In our scheme, we use mobile device's characteristics, allowing peoples to use medical resources on the cloud environment to find medical advice conveniently. The digital signature is used to ensure the security of the medical information that is certified by the medical department in our proposed scheme.

  17. Calcium isotope signature: new proxy for net change in bone volume for chronic kidney disease and diabetic rats.

    Science.gov (United States)

    Tanaka, Yu-Ki; Yajima, Nobuyuki; Higuchi, Yusuke; Yamato, Hideyuki; Hirata, Takafumi

    2017-12-01

    Herein, we measure the Ca isotope ratios ( 44 Ca/ 42 Ca and 43 Ca/ 42 Ca) in serum and bone samples collected from rats with chronic kidney disease (CKD) or diabetes mellitus (DM). For the serum samples, the isotope ratios are lower for the CKD (δ 44 Ca/ 42 Ca serum = 0.16 ± 0.11‰; 2SD, n = 6) and the DM (δ 44 Ca/ 42 Ca serum = -0.11 ± 0.25‰; 2SD, n = 7) rats than that for the control rats (δ 44 Ca/ 42 Ca serum = 0.25 ± 0.04‰; 2SD, n = 7). Bone samples from two distinct positions of 20 rats in total, namely, the center and proximal parts of the tibial diaphysis, are subject to Ca isotope analysis. The resulting δ 44 Ca/ 42 Ca values for the bone of the proximal part are about 0.3‰ lower than that for the serum samples from the same rats. The larger isotope fractionations between the serum and bone are consistent with previously reported data for vertebrate animals (e.g., Skulan and DePaolo, 1999), which suggests the preferential incorporation of lighter Ca isotopes through bone formation. For the bones from the control and CKD rats, there were no differences in the δ 44 Ca/ 42 Ca values between the positions of the bone. In contrast, the δ 44 Ca/ 42 Ca values of the bone for the DM rats were different between the positions of the bone. Due to the lower bone turnover rate for the DM rats, the δ 44 Ca/ 42 Ca for the middle of the diaphysis can reflect the Ca isotopes in the bone formed prior to the progression of DM states. Thus, the resulting δ 44 Ca/ 42 Ca values show a clear correlation with bone mineral density (BMD). This can be due to the release of isotopically lighter Ca from the bone to the serum. In the present study, our data demonstrate that the δ 44 Ca/ 42 Ca value for serum can be used as a new biomarker for evaluating changes in bone turnover rate, followed by changes in bone volume.

  18. Costs, equity, efficiency and feasibility of identifying the poor in Ghana's National Health Insurance Scheme: empirical analysis of various strategies.

    NARCIS (Netherlands)

    Aryeetey, G.C.N.O.; Jehu-Appiah, C.; Spaan, E.; Agyepong, I.; Baltussen, R.M.

    2012-01-01

    Objectives To analyse the costs and evaluate the equity, efficiency and feasibility of four strategies to identify poor households for premium exemptions in Ghana's National Health Insurance Scheme (NHIS): means testing (MT), proxy means testing (PMT), participatory wealth ranking (PWR) and

  19. Signature Pedagogy in Theatre Arts

    Science.gov (United States)

    Kornetsky, Lisa

    2017-01-01

    Critique in undergraduate theatre programs is at the heart of training actors at all levels. It is accepted as the signature pedagogy and is practiced in multiple ways. This essay defines critique and presents the case for why it is used as the single most important way that performers come to understand the language, values, and discourse of the…

  20. Quark-Gluon Plasma Signatures

    CERN Document Server

    Vogt, Ramona

    1998-01-01

    Aspects of quark-gluon plasma signatures that can be measured by CMS are discussed. First the initial conditions of the system from minijet production are introduced, including shadowing effects. Color screening of the Upsilon family is then presented, followed by energy loss effects on charm and bottom hadrons, high Pt jets and global observables.

  1. Galaxy interactions : The HI signature

    NARCIS (Netherlands)

    Sancisi, R; Barnes, JE; Sanders, DB

    1999-01-01

    HI observations are an excellent tool for investigating tidal interactions. Ongoing major and minor interactions which can lead to traumatic mergers or to accretion and the triggering of star formation, show distinct HI signatures. Interactions and mergers in the recent past can also be recognized

  2. Magnetic signature of daily sampled urban atmospheric particles

    Science.gov (United States)

    Muxworthy, Adrian R.; Matzka, Jürgen; Davila, Alfonso Fernández; Petersen, Nikolai

    The magnetic signature of two sets of daily sampled particulate matter (PM) collected in Munich, Germany, were examined and compared to variations in other pollution data and meteorological data using principal component analysis. The magnetic signature arising from the magnetic minerals in the PM was examined using a fast and highly sensitive magnetic remanence measurement. The longest data set studied was 160 days, significantly longer than that of similar magnetic PM studies improving the statistical robustness. It was found that the variations in the mass-dependent magnetic parameters displayed a complicated relationship governed by both the meteorological conditions and the PM loading rate, whereas mineralogy/grain-size-dependent magnetic parameters displayed little variation. A six-fold increase in the number of vehicles passing the sampling locations only doubled the magnetic remanence of the samples, suggesting that the measured magnetic signature is in addition strongly influenced by dispersion rates. At both localities the saturation isothermal remanent magnetisation (SIRM) was found to be strongly correlated with the PM mass, and it is suggested that measuring SIRM as a proxy for PM monitoring is a viable alternative to magnetic susceptibility when the samples are magnetically too weak. The signal was found to be dominated by magnetite-like grains less than 100 nm in diameter which is thought to be derived primarily from vehicles. Such small grains are known to be particularly dangerous to humans. There was also evidence to suggest from magnetic stability parameters that the magnetite-like grains were covered with an oxidised rim. The concentration of magnetic PM was in the range of 0.3-0.5% by mass.

  3. Cretaceous honeycomb oysters (Pycnodonte vesicularis) as palaeoseasonality records: A multi-proxy study

    Science.gov (United States)

    de Winter, Niels J.; Vellekoop, Johan; Vorsselmans, Robin; Golreihan, Asefeh; Petersen, Sierra V.; Meyer, Kyle W.; Speijer, Robert P.; Claeys, Philippe

    2017-04-01

    Pycnodonte or "honeycomb-oysters" (Bivalvia: Gryphaeidea) is an extinct genus of calcite-producing bivalves which is found in abundance in Cretaceous to Pleistocene fossil beds worldwide. As such, Pycnodonte shells could be ideal tracers of palaeoclimate through time, with the capability to reconstruct sea water conditions and palaeotemperatures in a range of palaeoenvironmental settings. Only few studies have attempted to reconstruct palaeoclimate based on Pycnodonte shells and with variable degrees of success (e.g. Videt, 2003; Huyge et al., 2015). Our study investigates the shell growth, structure and chemical characteristics of Maastrichtian Pycnodonte vesicularis from Bajada de Jaguel in Argentina and aims to rigorously test the application of multiple palaeoenvironmental proxies on the shells of several Maastrichtian Pycnodonte oysters for palaeoclimate reconstruction. The preservation state of four calcite shells was assessed by fluorescence microscopy, cathodoluminescence and micro X-Ray Fluorescence (XRF) mapping. Their shell structure was investigated using a combination of XRF mapping, high-resolution color scanning and microCT scanning. Long integration time point-by-point XRF line scanning yielded high-resolution trace element profiles through the hinge of all shells. Microdrilled samples from the same locations on the shell were analyzed for trace element composition by ICP-MS and for stable carbon and oxygen isotopes by IRMS. Preservation of the calcite microstructure was found to be of sufficient quality to allow discussion of original shell porosity, annual growth increments and pristine chemical signatures of the bivalves. The combination of fluorescence and cathodoluminescence microscopy with XRF mapping and microCT scanning sheds light on the characteristic internal "honeycomb" structure of these extinct bivalves and allows comparison with that of the related extant Neopycnodonte bivalves (Wisshak et al., 2009). Furthermore, high resolution

  4. Distribution of biologic, anthropogenic, and volcanic constituents as a proxy for sediment transport in the San Francisco Bay Coastal System

    Science.gov (United States)

    McGann, Mary; Erikson, Li H.; Wan, Elmira; Powell, Charles; Maddocks, Rosalie F.; Barnard, P.L.; Jaffee, B.E.; Schoellhamer, D.H.

    2013-01-01

    Although conventional sediment parameters (mean grain size, sorting, and skewness) and provenance have typically been used to infer sediment transport pathways, most freshwater, brackish, and marine environments are also characterized by abundant sediment constituents of biological, and possibly anthropogenic and volcanic, origin that can provide additional insight into local sedimentary processes. The biota will be spatially distributed according to its response to environmental parameters such as water temperature, salinity, dissolved oxygen, organic carbon content, grain size, and intensity of currents and tidal flow, whereas the presence of anthropogenic and volcanic constituents will reflect proximity to source areas and whether they are fluvially- or aerially-transported. Because each of these constituents have a unique environmental signature, they are a more precise proxy for that source area than the conventional sedimentary process indicators. This San Francisco Bay Coastal System study demonstrates that by applying a multi-proxy approach, the primary sites of sediment transport can be identified. Many of these sites are far from where the constituents originated, showing that sediment transport is widespread in the region. Although not often used, identifying and interpreting the distribution of naturally-occurring and allochthonous biologic, anthropogenic, and volcanic sediment constituents is a powerful tool to aid in the investigation of sediment transport pathways in other coastal systems.

  5. ESCAP mobile training scheme.

    Science.gov (United States)

    Yasas, F M

    1977-01-01

    In response to a United Nations resolution, the Mobile Training Scheme (MTS) was set up to provide training to the trainers of national cadres engaged in frontline and supervisory tasks in social welfare and rural development. The training is innovative in its being based on an analysis of field realities. The MTS team consisted of a leader, an expert on teaching methods and materials, and an expert on action research and evaluation. The country's trainers from different departments were sent to villages to work for a short period and to report their problems in fulfilling their roles. From these grass roots experiences, they made an analysis of the job, determining what knowledge, attitude and skills it required. Analysis of daily incidents and problems were used to produce indigenous teaching materials drawn from actual field practice. How to consider the problems encountered through government structures for policy making and decisions was also learned. Tasks of the students were to identify the skills needed for role performance by job analysis, daily diaries and project histories; to analyze the particular community by village profiles; to produce indigenous teaching materials; and to practice the role skills by actual role performance. The MTS scheme was tried in Nepal in 1974-75; 3 training programs trained 25 trainers and 51 frontline workers; indigenous teaching materials were created; technical papers written; and consultations were provided. In Afghanistan the scheme was used in 1975-76; 45 participants completed the training; seminars were held; and an ongoing Council was created. It is hoped that the training program will be expanded to other countries.

  6. Bonus schemes and trading activity

    NARCIS (Netherlands)

    Pikulina, E.S.; Renneboog, L.D.R.; ter Horst, J.R.; Tobler, P.N.

    2014-01-01

    Little is known about how different bonus schemes affect traders' propensity to trade and which bonus schemes improve traders' performance. We study the effects of linear versus threshold bonus schemes on traders' behavior. Traders buy and sell shares in an experimental stock market on the basis of

  7. Certificateless short sequential and broadcast multisignature schemes using elliptic curve bilinear pairings

    Directory of Open Access Journals (Sweden)

    SK Hafizul Islam

    2014-01-01

    Full Text Available Several certificateless short signature and multisignature schemes based on traditional public key infrastructure (PKI or identity-based cryptosystem (IBC have been proposed in the literature; however, no certificateless short sequential (or serial multisignature (CL-SSMS or short broadcast (or parallel multisignature (CL-SBMS schemes have been proposed. In this paper, we propose two such new CL-SSMS and CL-SBMS schemes based on elliptic curve bilinear pairing. Like any certificateless public key cryptosystem (CL-PKC, the proposed schemes are free from the public key certificate management burden and the private key escrow problem as found in PKI- and IBC-based cryptosystems, respectively. In addition, the requirements of the expected security level and the fixed length signature with constant verification time have been achieved in our schemes. The schemes are communication efficient as the length of the multisignature is equivalent to a single elliptic curve point and thus become the shortest possible multisignature scheme. The proposed schemes are then suitable for communication systems having resource constrained devices such as PDAs, mobile phones, RFID chips, and sensors where the communication bandwidth, battery life, computing power and storage space are limited.

  8. Succesful labelling schemes

    DEFF Research Database (Denmark)

    Juhl, Hans Jørn; Stacey, Julia

    2001-01-01

    . In the spring of 2001 MAPP carried out an extensive consumer study with special emphasis on the Nordic environmentally friendly label 'the swan'. The purpose was to find out how much consumers actually know and use various labelling schemes. 869 households were contacted and asked to fill in a questionnaire...... it into consideration when I go shopping. The respondent was asked to pick the most suitable answer, which described her use of each label. 29% - also called 'the labelling blind' - responded that they basically only knew the recycling label and the Government controlled organic label 'Ø-mærket'. Another segment of 6...

  9. Scheme of stepmotor control

    International Nuclear Information System (INIS)

    Grashilin, V.A.; Karyshev, Yu.Ya.

    1982-01-01

    A 6-cycle scheme of step motor is described. The block-diagram and the basic circuit of the step motor control are presented. The step motor control comprises a pulse shaper, electronic commutator and power amplifiers. The step motor supply from 6-cycle electronic commutator provides for higher reliability and accuracy than from 3-cycle commutator. The control of step motor work is realised by the program given by the external source of control signals. Time-dependent diagrams for step motor control are presented. The specifications of the step-motor is given

  10. Evaluation of proxy-based millennial reconstruction methods

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Terry C.K.; Tsao, Min [University of Victoria, Department of Mathematics and Statistics, Victoria, BC (Canada); Zwiers, Francis W. [Environment Canada, Climate Research Division, Toronto, ON (Canada)

    2008-08-15

    A range of existing statistical approaches for reconstructing historical temperature variations from proxy data are compared using both climate model data and real-world paleoclimate proxy data. We also propose a new method for reconstruction that is based on a state-space time series model and Kalman filter algorithm. The state-space modelling approach and the recently developed RegEM method generally perform better than their competitors when reconstructing interannual variations in Northern Hemispheric mean surface air temperature. On the other hand, a variety of methods are seen to perform well when reconstructing surface air temperature variability on decadal time scales. An advantage of the new method is that it can incorporate additional, non-temperature, information into the reconstruction, such as the estimated response to external forcing, thereby permitting a simultaneous reconstruction and detection analysis as well as future projection. An application of these extensions is also demonstrated in the paper. (orig.)

  11. Adaptive proxy map server for efficient vector spatial data rendering

    Science.gov (United States)

    Sayar, Ahmet

    2013-01-01

    The rapid transmission of vector map data over the Internet is becoming a bottleneck of spatial data delivery and visualization in web-based environment because of increasing data amount and limited network bandwidth. In order to improve both the transmission and rendering performances of vector spatial data over the Internet, we propose a proxy map server enabling parallel vector data fetching as well as caching to improve the performance of web-based map servers in a dynamic environment. Proxy map server is placed seamlessly anywhere between the client and the final services, intercepting users' requests. It employs an efficient parallelization technique based on spatial proximity and data density in case distributed replica exists for the same spatial data. The effectiveness of the proposed technique is proved at the end of the article by the application of creating map images enriched with earthquake seismic data records.

  12. A case report of Factitious Disorder (Munchausen Syndrome by proxy

    Directory of Open Access Journals (Sweden)

    Mehdi Shirzadifar

    2014-09-01

    Full Text Available Background: In Factitious Disorder by proxy, one person (perpetrator induces the disease in another person, thereby seeking emotional needs during the treatment process Diagnosis of this disorder is very difficult and there is not much consensus over it among experts. Lack of timely diagnosis of this disorder may lead to serious harms in patients. Case presentation: We will introduce a 19 year-old boy with mental retardation and history of multiple admissions to psychiatric, internal, urology and surgery wards. He has a 12 year-old sister and a 4 year-old brother, both with history of multiple admissions to pediatrics and internal wards. The father of family was 48 years old with chronic mental disorder, drug dependency and history of multiple admissions to medical, psychiatry and neurology wards. The mother of this family was diagnosed with munchausen syndrome by proxy.

  13. Munchausen syndrome and Munchausen syndrome by proxy in dermatology.

    Science.gov (United States)

    Boyd, Alan S; Ritchie, Coleman; Likhari, Sunaina

    2014-08-01

    Patients with Munchausen syndrome purposefully injure themselves, often with the injection of foreign materials, to gain hospital admission and the attention associated with having a difficult-to-identify condition. Munchausen syndrome by proxy occurs when a child's caregiver, typically the mother, injures the child for the same reasons. Cases of Munchausen syndrome and Munchausen syndrome by proxy with primary cutaneous involvement appear to be rarely described in the literature suggesting either that diagnosis is not made readily or that it is, in fact, an uncommon disorder. At the center of both conditions is significant psychological pathology and treatment is difficult as many patients with Munchausen syndrome when confronted with these diagnostic possibilities simply leave the hospital. Little is known about the long-term outcome or prognosis of these patients. Copyright © 2014 American Academy of Dermatology, Inc. Published by Mosby, Inc. All rights reserved.

  14. Mobile Multicast in Hierarchical Proxy Mobile IPV6

    Science.gov (United States)

    Hafizah Mohd Aman, Azana; Hashim, Aisha Hassan A.; Mustafa, Amin; Abdullah, Khaizuran

    2013-12-01

    Mobile Internet Protocol Version 6 (MIPv6) environments have been developing very rapidly. Many challenges arise with the fast progress of MIPv6 technologies and its environment. Therefore the importance of improving the existing architecture and operations increases. One of the many challenges which need to be addressed is the need for performance improvement to support mobile multicast. Numerous approaches have been proposed to improve mobile multicast performance. This includes Context Transfer Protocol (CXTP), Hierarchical Mobile IPv6 (HMIPv6), Fast Mobile IPv6 (FMIPv6) and Proxy Mobile IPv6 (PMIPv6). This document describes multicast context transfer in hierarchical proxy mobile IPv6 (H-PMIPv6) to provide better multicasting performance in PMIPv6 domain.

  15. Accuracy of Caregiver Proxy Reports of Home Care Service Use.

    Science.gov (United States)

    Chappell, Neena L; Kadlec, Helena

    2016-12-01

    Although much of the research on service use by older adults with dementia relies on proxy reports by informal caregivers, little research assesses the accuracy of these reports, and that which does exist, does not focus on home care services. This brief report compares proxy reports by family caregivers to those with dementia with provincial Ministry of Health records collected for payment and monitoring. The four home care services examined include home nursing care, adult day care, home support, and respite care. Data come from a province-wide study of caregivers in British Columbia, Canada. Caregiver reports are largely consistent with Ministry records, ranging from 81.0% agreement for home support to 96.6% for respite care. Spouses living with the care recipient (the vast majority of the sample) are the most accurate. Others, whether living with the care recipient or not, have only a 50-50 chance of being correct.

  16. A comparison of proxy performance in coral biodiversity monitoring

    Science.gov (United States)

    Richards, Zoe T.

    2013-03-01

    The productivity and health of coral reef habitat is diminishing worldwide; however, the effect that habitat declines have on coral reef biodiversity is not known. Logistical and financial constraints mean that surveys of hard coral communities rarely collect data at the species level; hence it is important to know if there are proxy metrics that can reliably predict biodiversity. Here, the performances of six proxy metrics are compared using regression analyses on survey data from a location in the northern Great Barrier Reef. Results suggest generic richness is a strong explanatory variable for spatial patterns in species richness (explaining 82 % of the variation when measured on a belt transect). The most commonly used metric of reef health, percentage live coral cover, is not positively or linearly related to hard coral species richness. This result raises doubt as to whether management actions based on such reefscape information will be effective for the conservation of coral biodiversity.

  17. Online Signature Verification on MOBISIG Finger-Drawn Signature Corpus

    Directory of Open Access Journals (Sweden)

    Margit Antal

    2018-01-01

    Full Text Available We present MOBISIG, a pseudosignature dataset containing finger-drawn signatures from 83 users captured with a capacitive touchscreen-based mobile device. The database was captured in three sessions resulting in 45 genuine signatures and 20 skilled forgeries for each user. The database was evaluated by two state-of-the-art methods: a function-based system using local features and a feature-based system using global features. Two types of equal error rate computations are performed: one using a global threshold and the other using user-specific thresholds. The lowest equal error rate was 0.01% against random forgeries and 5.81% against skilled forgeries using user-specific thresholds that were computed a posteriori. However, these equal error rates were significantly raised to 1.68% (random forgeries case and 14.31% (skilled forgeries case using global thresholds. The same evaluation protocol was performed on the DooDB publicly available dataset. Besides verification performance evaluations conducted on the two finger-drawn datasets, we evaluated the quality of the samples and the users of the two datasets using basic quality measures. The results show that finger-drawn signatures can be used by biometric systems with reasonable accuracy.

  18. Unsupervised signature extraction from forensic logs

    NARCIS (Netherlands)

    Thaler, S.M.; Menkovski, V.; Petkovic, M.; Altun, Y.; Das, K.; Mielikäinen, T.; Malerba, D.; Stefanowski, J.; Read, J.; Žitnik, M.; Ceci, M.

    2017-01-01

    Signature extraction is a key part of forensic log analysis. It involves recognizing patterns in log lines such that log lines that originated from the same line of code are grouped together. A log signature consists of immutable parts and mutable parts. The immutable parts define the signature, and

  19. 7 CFR 718.9 - Signature requirements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Signature requirements. 718.9 Section 718.9... MULTIPLE PROGRAMS General Provisions § 718.9 Signature requirements. (a) When a program authorized by this chapter or Chapter XIV of this title requires the signature of a producer; landowner; landlord; or tenant...

  20. 42 CFR 424.36 - Signature requirements.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Signature requirements. 424.36 Section 424.36... (CONTINUED) MEDICARE PROGRAM CONDITIONS FOR MEDICARE PAYMENT Claims for Payment § 424.36 Signature requirements. (a) General rule. The beneficiary's own signature is required on the claim unless the beneficiary...

  1. 17 CFR 12.12 - Signature.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Signature. 12.12 Section 12.12... General Information and Preliminary Consideration of Pleadings § 12.12 Signature. (a) By whom. All... document on behalf of another person. (b) Effect. The signature on any document of any person acting either...

  2. 25 CFR 213.10 - Lessor's signature.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Lessor's signature. 213.10 Section 213.10 Indians BUREAU... MEMBERS OF FIVE CIVILIZED TRIBES, OKLAHOMA, FOR MINING How to Acquire Leases § 213.10 Lessor's signature... thumbprint which shall be designated as “right” or “left” thumbmark. Such signatures must be witnessed by two...

  3. Signature effects in 2-qp rotational bands

    International Nuclear Information System (INIS)

    Jain, A.K.; Goel, A.

    1992-01-01

    The authors briefly review the progress in understanding the 2-qp rotational bands in odd-odd nuclei. Signature effects and the phenomenon of signature inversion are discussed. The Coriolis coupling appears to have all the ingredients to explain the inversion. Some recent work on signature dependence in 2-qp bands of even-even nuclei is also discussed; interesting features are pointed out

  4. 27 CFR 17.6 - Signature authority.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Signature authority. 17.6... PRODUCTS General Provisions § 17.6 Signature authority. No claim, bond, tax return, or other required... other proper notification of signature authority has been filed with the TTB office where the required...

  5. High-speed high-security signatures

    NARCIS (Netherlands)

    Bernstein, D.J.; Duif, N.; Lange, T.; Schwabe, P.; Yang, B.Y.

    2011-01-01

    This paper shows that a $390 mass-market quad-core 2.4GHz Intel Westmere (Xeon E5620) CPU can create 108000 signatures per second and verify 71000 signatures per second on an elliptic curve at a 2128 security level. Public keys are 32 bytes, and signatures are 64 bytes. These performance figures

  6. Testing New Proxies for Photosymbiosis in the Fossil Record

    Science.gov (United States)

    Tornabene, C.; Martindale, R. C.; Schaller, M. F.

    2015-12-01

    Photosymbiosis is a mutualistic relationship that many corals have developed with dinoflagellates called zooxanthellae. The dinoflagellates, of the genus Symbiodinium, photosynthesize and provide corals with most of their energy, while in turn coral hosts live in waters where zooxanthellae have optimal exposure to sunlight. Thanks to this relationship, symbiotic corals calcify faster than non-symbiotic corals. Photosymbiosis is therefore considered the evolutionary innovation that allowed corals to become major reef-builders through geological time.This relationship is extremely difficult to study. Zooxanthellae, which are housed in the coral tissue, are not preserved in fossil coral skeletons, thus determining whether corals had symbionts requires a robust proxy. In order to address this critical question, the goal of this research is to test new proxies for ancient photosymbiosis. Currently the project is focused on assessing the nitrogen (δ15N) isotopes of corals' organic matrices, sensu Muscatine et al. (2005), as well as carbon and oxygen (δ13C, δ18O) isotopes of fossil coral skeletons. Samples from Modern, Pleistocene, Oligocene and Triassic coral skeletons were analyzed to test the validity of these proxies. Coral samples comprise both (interpreted) symbiotic and non-symbiotic fossil corals from the Oligocene and Triassic as well as symbiotic fossil corals from the Modern and Pleistocene to corroborate our findings with the results of Muscatine et al. (2005). Samples were tested for diagenesis through petrographic and scanning electron microscope (SEM) analyses to avoid contamination. Additionally, a novel technique that has not yet been applied to the fossil record was tested. The technique aims to recognize dinosterol, a dinoflagellate biomarker, in both modern and fossil coral samples. The premise of this proxy is that symbiotic corals should contain the dinoflagellate biomarker, whereas those lacking symbionts should lack dinosterol. Results from this

  7. Evaluation of Organic Proxies for Quantifying Past Primary Productivity

    Science.gov (United States)

    Raja, M.; Rosell-Melé, A.; Galbraith, E.

    2017-12-01

    Ocean primary productivity is a key element of the marine carbon cycle. However, its quantitative reconstruction in the past relies on the use of biogeochemical models as the available proxy approaches are qualitative at best. Here, we present an approach that evaluates the use of phytoplanktonic biomarkers (i.e. chlorins and alkenones) as quantitative proxies to reconstruct past changes in marine productivity. We compare biomarkers contents in a global suite of core-top sediments to sea-surface chlorophyll-a abundance estimated by satellites over the last 20 years, and the results are compared to total organic carbon (TOC). We also assess satellite data and detect satellite limitations and biases due to the complexity of optical properties and the actual defined algorithms. Our findings show that sedimentary chlorins can be used to track total sea-surface chlorophyll-a abundance as an indicator for past primary productivity. However, degradation processes restrict the application of this proxy to concentrations below a threshold value (1µg/g). Below this threshold, chlorins are a useful tool to identify reducing conditions when used as part of a multiproxy approach to assess redox sedimentary conditions (e.g. using Re, U). This is based on the link between anoxic/disoxic conditions and the flux of organic matter from the sea-surface to the sediments. We also show that TOC is less accurate than chlorins for estimating sea-surface chlorophyll-a due to the contribution of terrigenous organic matter, and the different degradation pathways of all organic compounds that TOC includes. Alkenones concentration also relates to primary productivity, but they are constrained by different processes in different regions. In conclusion, as lons as specific constraints are taken into account, our study evaluates the use of chlorins and alkenones as quantitative proxies of past primary productivity, with more accuracy than by using TOC.

  8. Analisis Algoritma Pergantian Cache Pada Proxy Web Server Internet Dengan Simulasi

    OpenAIRE

    Nurwarsito, Heru

    2007-01-01

    Pertumbuhan jumlah client internet dari waktu ke waktu terus bertambah, maka respon akses internet menjadi semakin lambat. Untuk membantu kecepatan akses tersebut maka diperlukan cache pada Proxy Server. Penelitian ini bertujuan untuk menganalisis performansi Proxy Server pada Jaringan Internet terhadap penggunaan algoritma pergantian cache-nya.Analisis Algoritma Pergantian Cache Pada Proxy Server didesain dengan metoda pemodelan simulasi jaringan internet yang terdiri dari Web server, Proxy ...

  9. Error characterization for asynchronous computations: Proxy equation approach

    Science.gov (United States)

    Sallai, Gabriella; Mittal, Ankita; Girimaji, Sharath

    2017-11-01

    Numerical techniques for asynchronous fluid flow simulations are currently under development to enable efficient utilization of massively parallel computers. These numerical approaches attempt to accurately solve time evolution of transport equations using spatial information at different time levels. The truncation error of asynchronous methods can be divided into two parts: delay dependent (EA) or asynchronous error and delay independent (ES) or synchronous error. The focus of this study is a specific asynchronous error mitigation technique called proxy-equation approach. The aim of this study is to examine these errors as a function of the characteristic wavelength of the solution. Mitigation of asynchronous effects requires that the asynchronous error be smaller than synchronous truncation error. For a simple convection-diffusion equation, proxy-equation error analysis identifies critical initial wave-number, λc. At smaller wave numbers, synchronous error are larger than asynchronous errors. We examine various approaches to increase the value of λc in order to improve the range of applicability of proxy-equation approach.

  10. Marine proxy evidence linking decadal North Pacific and Atlantic climate

    Energy Technology Data Exchange (ETDEWEB)

    Hetzinger, S. [University of Toronto Mississauga, CPS-Department, Mississauga, ON (Canada); Leibniz Institute of Marine Sciences, IFM-GEOMAR, Kiel (Germany); Halfar, J. [University of Toronto Mississauga, CPS-Department, Mississauga, ON (Canada); Mecking, J.V.; Keenlyside, N.S. [Leibniz Institute of Marine Sciences, IFM-GEOMAR, Kiel (Germany); University of Bergen, Geophysical Institute and Bjerknes Centre for Climate Research, Bergen (Norway); Kronz, A. [University of Goettingen, Geowissenschaftliches Zentrum, Goettingen (Germany); Steneck, R.S. [University of Maine, Darling Marine Center, Walpole, ME (United States); Adey, W.H. [Smithsonian Institution, Department of Botany, Washington, DC (United States); Lebednik, P.A. [ARCADIS U.S. Inc., Walnut Creek, CA (United States)

    2012-09-15

    Decadal- to multidecadal variability in the extra-tropical North Pacific is evident in 20th century instrumental records and has significant impacts on Northern Hemisphere climate and marine ecosystems. Several studies have discussed a potential linkage between North Pacific and Atlantic climate on various time scales. On decadal time scales no relationship could be confirmed, potentially due to sparse instrumental observations before 1950. Proxy data are limited and no multi-centennial high-resolution marine geochemical proxy records are available from the subarctic North Pacific. Here we present an annually-resolved record (1818-1967) of Mg/Ca variations from a North Pacific/Bering Sea coralline alga that extends our knowledge in this region beyond available data. It shows for the first time a statistically significant link between decadal fluctuations in sea-level pressure in the North Pacific and North Atlantic. The record is a lagged proxy for decadal-scale variations of the Aleutian Low. It is significantly related to regional sea surface temperature and the North Atlantic Oscillation (NAO) index in late boreal winter on these time scales. Our data show that on decadal time scales a weaker Aleutian Low precedes a negative NAO by several years. This atmospheric link can explain the coherence of decadal North Pacific and Atlantic Multidecadal Variability, as suggested by earlier studies using climate models and limited instrumental data. (orig.)

  11. Heinrich event 4 characterized by terrestrial proxies in southwestern Europe

    Directory of Open Access Journals (Sweden)

    J. M. López-García

    2013-05-01

    Full Text Available Heinrich event 4 (H4 is well documented in the North Atlantic Ocean as a cooling event that occurred between 39 and 40 Ka. Deep-sea cores around the Iberian Peninsula coastline have been analysed to characterize the H4 event, but there are no data on the terrestrial response to this event. Here we present for the first time an analysis of terrestrial proxies for characterizing the H4 event, using the small-vertebrate assemblage (comprising small mammals, squamates and amphibians from Terrassa Riera dels Canyars, an archaeo-palaeontological deposit located on the seaboard of the northeastern Iberian Peninsula. This assemblage shows that the H4 event is characterized in northeastern Iberia by harsher and drier terrestrial conditions than today. Our results were compared with other proxies such as pollen, charcoal, phytolith, avifauna and large-mammal data available for this site, as well as with the general H4 event fluctuations and with other sites where H4 and the previous and subsequent Heinrich events (H5 and H3 have been detected in the Mediterranean and Atlantic regions of the Iberian Peninsula. We conclude that the terrestrial proxies follow the same patterns as the climatic and environmental conditions detected by the deep-sea cores at the Iberian margins.

  12. Short-term indicators. Intensities as a proxy for savings

    Energy Technology Data Exchange (ETDEWEB)

    Boonekamp, P.G.M.; Gerdes, J. [ECN Policy Studies, Petten (Netherlands); Faberi, S. [Institute of Studies for the Integration of Systems ISIS, Rome (Italy)

    2013-12-15

    The ODYSSEE database on energy efficiency indicators (www.odyssee-indicators.org) has been set up to enable the monitoring and evaluation of realised energy efficiency improvements and related energy savings. The database covers the 27 EU countries as well as Norway and Croatia and data are available from 1990 on. This work contributes to the growing need for quantitative monitoring and evaluation of the impacts of energy policies and measures, both at the EU and national level, e.g. due to the Energy Services Directive and the proposed Energy Efficiency Directive. Because the underlying data become available only after some time, the savings figures are not always timely available. This is especially true for the ODEX efficiency indices per sector that rely on a number of indicators. Therefore, there is a need for so-called short-term indicators that become available shortly after the year has passed for which data are needed. The short term indicators do not replace the savings indicators but function as a proxy for the savings in the most recent year. This proxy value is faster available, but will be less accurate than the saving indicators themselves. The short term indicators have to be checked regularly with the ODEX indicators in order to see whether they can function still as a proxy.

  13. MUNCHAUSEN SYNDROME BY PROXY IN PEDIATRIC DENTISTRY: MYTH OR REALITY?

    Directory of Open Access Journals (Sweden)

    Veronica PINTILICIUC-ŞERBAN

    2017-06-01

    Full Text Available Background and aims: Munchausen syndrome by proxy is a condition traditionally comprising physical and mental abuse and medical neglect as a form of psychogenic maltreatment of the child, secondary to fabrication of a pediatric illness by the parent or guardian. The aim of our paper is to assess whether such condition occurs in current pediatric dental practice and to evidence certain situations in which the pediatric dentist should suspect this form of child abuse. Problem statement: Munchausen syndrome by proxy in pediatric dentistry may lead to serious chronic disabilities of the abused or neglected child, being one of the causes of treatment failure. Discussion: Prompt detection of such condition should be regarded as one of the duties of the practitioner who should be trained to report the suspected cases to the governmental child protective agencies. This should be regarded as a form of child abuse and neglect, and the responsible caregiver could be held liable when such wrongful actions cause harm or endanger child’s welfare. Conclusion: Munchausen syndrome by proxy should be regarded as a reality in current pediatric dental practice and dental teams should be trained to properly recognize, assess and manage such complex situations.

  14. Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage.

    Science.gov (United States)

    Wang, Shangping; Zhang, Xiaoxue; Zhang, Yaling

    2016-01-01

    Cipher-policy attribute-based encryption (CP-ABE) focus on the problem of access control, and keyword-based searchable encryption scheme focus on the problem of finding the files that the user interested in the cloud storage quickly. To design a searchable and attribute-based encryption scheme is a new challenge. In this paper, we propose an efficiently multi-user searchable attribute-based encryption scheme with attribute revocation and grant for cloud storage. In the new scheme the attribute revocation and grant processes of users are delegated to proxy server. Our scheme supports multi attribute are revoked and granted simultaneously. Moreover, the keyword searchable function is achieved in our proposed scheme. The security of our proposed scheme is reduced to the bilinear Diffie-Hellman (BDH) assumption. Furthermore, the scheme is proven to be secure under the security model of indistinguishability against selective ciphertext-policy and chosen plaintext attack (IND-sCP-CPA). And our scheme is also of semantic security under indistinguishability against chosen keyword attack (IND-CKA) in the random oracle model.

  15. Packet reversed packet combining scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2006-07-01

    The packet combining scheme is a well defined simple error correction scheme with erroneous copies at the receiver. It offers higher throughput combined with ARQ protocols in networks than that of basic ARQ protocols. But packet combining scheme fails to correct errors when the errors occur in the same bit locations of two erroneous copies. In the present work, we propose a scheme that will correct error if the errors occur at the same bit location of the erroneous copies. The proposed scheme when combined with ARQ protocol will offer higher throughput. (author)

  16. A full quantum network scheme

    International Nuclear Information System (INIS)

    Ma Hai-Qiang; Wei Ke-Jin; Yang Jian-Hui; Li Rui-Xue; Zhu Wu

    2014-01-01

    We present a full quantum network scheme using a modified BB84 protocol. Unlike other quantum network schemes, it allows quantum keys to be distributed between two arbitrary users with the help of an intermediary detecting user. Moreover, it has good expansibility and prevents all potential attacks using loopholes in a detector, so it is more practical to apply. Because the fiber birefringence effects are automatically compensated, the scheme is distinctly stable in principle and in experiment. The simple components for every user make our scheme easier for many applications. The experimental results demonstrate the stability and feasibility of this scheme. (general)

  17. Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security

    NARCIS (Netherlands)

    Weng, Jiang; Yang, Yanjiang; Tang, Qiang; Deng, Robert H.; Bao, Feng

    Recently, a variant of proxy re-encryption, named conditional proxy re-encryption (C-PRE), has been introduced. Compared with traditional proxy re-encryption, C-PRE enables the delegator to implement fine-grained delegation of decryption rights, and thus is more useful in many applications. In this

  18. Evaluation of patient and proxy responses on the activity measure for postacute care.

    Science.gov (United States)

    Jette, Alan M; Ni, Pengsheng; Rasch, Elizabeth K; Appelman, Jed; Sandel, M Elizabeth; Terdiman, Joseph; Chan, Leighton

    2012-03-01

    Our objective was to examine the agreement between adult patients with stroke and family member or clinician proxies in activity measure for postacute care (AM-PAC) summary scores for daily activity, basic mobility, and applied cognitive function. This study involved 67 patients with stroke admitted to a hospital within the Kaiser Permanente of Northern California system and were participants in a parent study on stroke outcomes. Each participant and proxy respondent completed the AM-PAC by personal or telephone interview at the point of hospital discharge or during ≥1 transitions to different postacute care settings. The results suggest that for patients with a stroke proxy, AM-PAC data are robust for family or clinician proxy assessment of basic mobility function and clinician proxy assessment of daily activity function, but less robust for family proxy assessment of daily activity function and for all proxy groups' assessments of applied cognitive function. The pattern of disagreement between patient and proxy was, on average, relatively small and random. There was little evidence of systematic bias between proxy and patient reports of their functional status. The degree of concordance between patient and proxy was similar for those with moderate to severe strokes compared with mild strokes. Patient and proxy ratings on the AM-PAC achieved adequate agreement for use in stroke research when using proxy respondents could reduce sample selection bias. The AM-PAC data can be implemented across institutional as well as community care settings while achieving precision and reducing respondent burden.

  19. Analysis of Quality of Proxy Questions in Health Surveys by Behavior Coding

    NARCIS (Netherlands)

    Benitez, I.; Padilla, J.L.; Ongena, Yfke

    2012-01-01

    The aim of this study is to show how to analyze the quality of questions for proxy informants by means of behavior coding. Proxy questions can undermine survey data quality because of the fact that proxies respond to questions on behalf of other people. Behavior coding can improve questions by

  20. The design and implementation about the project of optimizing proxy servers

    International Nuclear Information System (INIS)

    Wu Ling; Liu Baoxu

    2006-01-01

    Proxy server is an important facility in the network of an organization, which play an important role in security and access control and accelerating access of Internet. This article introduces the action of proxy servers, and expounds the resolutions to optimize proxy servers at IHEP: integration, dynamic domain name resolves and data synchronization. (authors)

  1. Nonlinear control of magnetic signatures

    Science.gov (United States)

    Niemoczynski, Bogdan

    Magnetic properties of ferrite structures are known to cause fluctuations in Earth's magnetic field around the object. These fluctuations are known as the object's magnetic signature and are unique based on the object's geometry and material. It is a common practice to neutralize magnetic signatures periodically after certain time intervals, however there is a growing interest to develop real time degaussing systems for various applications. Development of real time degaussing system is a challenging problem because of magnetic hysteresis and difficulties in measurement or estimation of near-field flux data. The goal of this research is to develop a real time feedback control system that can be used to minimize magnetic signatures for ferrite structures. Experimental work on controlling the magnetic signature of a cylindrical steel shell structure with a magnetic disturbance provided evidence that the control process substantially increased the interior magnetic flux. This means near field estimation using interior sensor data is likely to be inaccurate. Follow up numerical work for rectangular and cylindrical cross sections investigated variations in shell wall flux density under a variety of ambient excitation and applied disturbances. Results showed magnetic disturbances could corrupt interior sensor data and magnetic shielding due to the shell walls makes the interior very sensitive to noise. The magnetic flux inside the shell wall showed little variation due to inner disturbances and its high base value makes it less susceptible to noise. This research proceeds to describe a nonlinear controller to use the shell wall data as an input. A nonlinear plant model of magnetics is developed using a constant tau to represent domain rotation lag and a gain function k to describe the magnetic hysteresis curve for the shell wall. The model is justified by producing hysteresis curves for multiple materials, matching experimental data using a particle swarm algorithm, and

  2. Nonlinear analysis of dynamic signature

    Science.gov (United States)

    Rashidi, S.; Fallah, A.; Towhidkhah, F.

    2013-12-01

    Signature is a long trained motor skill resulting in well combination of segments like strokes and loops. It is a physical manifestation of complex motor processes. The problem, generally stated, is that how relative simplicity in behavior emerges from considerable complexity of perception-action system that produces behavior within an infinitely variable biomechanical and environmental context. To solve this problem, we present evidences which indicate that motor control dynamic in signing process is a chaotic process. This chaotic dynamic may explain a richer array of time series behavior in motor skill of signature. Nonlinear analysis is a powerful approach and suitable tool which seeks for characterizing dynamical systems through concepts such as fractal dimension and Lyapunov exponent. As a result, they can be analyzed in both horizontal and vertical for time series of position and velocity. We observed from the results that noninteger values for the correlation dimension indicates low dimensional deterministic dynamics. This result could be confirmed by using surrogate data tests. We have also used time series to calculate the largest Lyapunov exponent and obtain a positive value. These results constitute significant evidence that signature data are outcome of chaos in a nonlinear dynamical system of motor control.

  3. A Third-Party E-Payment Protocol Based on Quantum Group Blind Signature

    Science.gov (United States)

    Zhang, Jian-Zhong; Yang, Yuan-Yuan; Xie, Shu-Cui

    2017-09-01

    A third-party E-payment protocol based on quantum group blind signature is proposed in this paper. Our E-payment protocol could protect user's anonymity as the traditional E-payment systems do, and also have unconditional security which the classical E-payment systems can not provide. To achieve that, quantum key distribution, one-time pad and quantum group blind signature are adopted in our scheme. Furthermore, if there were a dispute, the manager Trent can identify who tells a lie.

  4. Spectral signature selection for mapping unvegetated soils

    Science.gov (United States)

    May, G. A.; Petersen, G. W.

    1975-01-01

    Airborne multispectral scanner data covering the wavelength interval from 0.40-2.60 microns were collected at an altitude of 1000 m above the terrain in southeastern Pennsylvania. Uniform training areas were selected within three sites from this flightline. Soil samples were collected from each site and a procedure developed to allow assignment of scan line and element number from the multispectral scanner data to each sampling location. These soil samples were analyzed on a spectrophotometer and laboratory spectral signatures were derived. After correcting for solar radiation and atmospheric attenuation, the laboratory signatures were compared to the spectral signatures derived from these same soils using multispectral scanner data. Both signatures were used in supervised and unsupervised classification routines. Computer-generated maps using the laboratory and multispectral scanner derived signatures resulted in maps that were similar to maps resulting from field surveys. Approximately 90% agreement was obtained between classification maps produced using multispectral scanner derived signatures and laboratory derived signatures.

  5. Time Series Based for Online Signature Verification

    Directory of Open Access Journals (Sweden)

    I Ketut Gede Darma Putra

    2013-11-01

    Full Text Available Signature verification system is to match the tested signature with a claimed signature. This paper proposes time series based for feature extraction method and dynamic time warping for match method. The system made by process of testing 900 signatures belong to 50 participants, 3 signatures for reference and 5 signatures from original user, simple imposters and trained imposters for signatures test. The final result system was tested with 50 participants with 3 references. This test obtained that system accuracy without imposters is 90,44897959% at threshold 44 with rejection errors (FNMR is 5,2% and acceptance errors (FMR is 4,35102%, when with imposters system accuracy is 80,1361% at threshold 27 with error rejection (FNMR is 15,6% and acceptance errors (average FMR is 4,263946%, with details as follows: acceptance errors is 0,391837%, acceptance errors simple imposters is 3,2% and acceptance errors trained imposters is 9,2%.

  6. Implementing Signature Neural Networks with Spiking Neurons.

    Science.gov (United States)

    Carrillo-Medina, José Luis; Latorre, Roberto

    2016-01-01

    Spiking Neural Networks constitute the most promising approach to develop realistic Artificial Neural Networks (ANNs). Unlike traditional firing rate-based paradigms, information coding in spiking models is based on the precise timing of individual spikes. It has been demonstrated that spiking ANNs can be successfully and efficiently applied to multiple realistic problems solvable with traditional strategies (e.g., data classification or pattern recognition). In recent years, major breakthroughs in neuroscience research have discovered new relevant computational principles in different living neural systems. Could ANNs benefit from some of these recent findings providing novel elements of inspiration? This is an intriguing question for the research community and the development of spiking ANNs including novel bio-inspired information coding and processing strategies is gaining attention. From this perspective, in this work, we adapt the core concepts of the recently proposed Signature Neural Network paradigm-i.e., neural signatures to identify each unit in the network, local information contextualization during the processing, and multicoding strategies for information propagation regarding the origin and the content of the data-to be employed in a spiking neural network. To the best of our knowledge, none of these mechanisms have been used yet in the context of ANNs of spiking neurons. This paper provides a proof-of-concept for their applicability in such networks. Computer simulations show that a simple network model like the discussed here exhibits complex self-organizing properties. The combination of multiple simultaneous encoding schemes allows the network to generate coexisting spatio-temporal patterns of activity encoding information in different spatio-temporal spaces. As a function of the network and/or intra-unit parameters shaping the corresponding encoding modality, different forms of competition among the evoked patterns can emerge even in the absence

  7. Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records

    NARCIS (Netherlands)

    Ibraimi, L.; Gangopadhyay, Aryya; Tang, Qiang; Hartel, Pieter H.; Jonker, Willem

    2010-01-01

    Commercial Web-based Personal-Health Record (PHR) systems can help patients to share their personal health records (PHRs) anytime from anywhere. PHRs are very sensitive data and an inappropriate disclosure may cause serious problems to an individual. Therefore commercial Web-based PHR systems have

  8. BSEA: A Blind Sealed-Bid E-Auction Scheme for E-Commerce Applications

    Directory of Open Access Journals (Sweden)

    Rohit Kumar Das

    2016-12-01

    Full Text Available Due to an increase in the number of internet users, electronic commerce has grown significantly during the last decade. Electronic auction (e-auction is one of the famous e-commerce applications. Even so, security and robustness of e-auction schemes still remain a challenge. Requirements like anonymity and privacy of the b i d value are under threat from the attackers. Any auction protocol must not leak the anonymity and the privacy of the b i d value of an honest Bidder. Keeping these requirements in mind, we have firstly proposed a controlled traceable blind signature scheme (CTBSS because e-auction schemes should be able to trace the Bidders. Using CTBSS, a blind sealed-bid electronic auction scheme is proposed (BSEA. We have incorporated the notion of blind signature to e-auction schemes. Moreover, both the schemes are based upon elliptic curve cryptography (ECC, which provides a similar level of security with a comparatively smaller key size than the discrete logarithm problem (DLP based e-auction protocols. The analysis shows that BSEA fulfills all the requirements of e-auction protocol, and the total computation overhead is lower than the existing schemes.

  9. Modified Aggressive Packet Combining Scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2010-06-01

    In this letter, a few schemes are presented to improve the performance of aggressive packet combining scheme (APC). To combat error in computer/data communication networks, ARQ (Automatic Repeat Request) techniques are used. Several modifications to improve the performance of ARQ are suggested by recent research and are found in literature. The important modifications are majority packet combining scheme (MjPC proposed by Wicker), packet combining scheme (PC proposed by Chakraborty), modified packet combining scheme (MPC proposed by Bhunia), and packet reversed packet combining (PRPC proposed by Bhunia) scheme. These modifications are appropriate for improving throughput of conventional ARQ protocols. Leung proposed an idea of APC for error control in wireless networks with the basic objective of error control in uplink wireless data network. We suggest a few modifications of APC to improve its performance in terms of higher throughput, lower delay and higher error correction capability. (author)

  10. Transmission usage cost allocation schemes

    International Nuclear Information System (INIS)

    Abou El Ela, A.A.; El-Sehiemy, R.A.

    2009-01-01

    This paper presents different suggested transmission usage cost allocation (TCA) schemes to the system individuals. Different independent system operator (ISO) visions are presented using the proportional rata and flow-based TCA methods. There are two proposed flow-based TCA schemes (FTCA). The first FTCA scheme generalizes the equivalent bilateral exchanges (EBE) concepts for lossy networks through two-stage procedure. The second FTCA scheme is based on the modified sensitivity factors (MSF). These factors are developed from the actual measurements of power flows in transmission lines and the power injections at different buses. The proposed schemes exhibit desirable apportioning properties and are easy to implement and understand. Case studies for different loading conditions are carried out to show the capability of the proposed schemes for solving the TCA problem. (author)

  11. Tracking variable sedimentation rates in orbitally forced paleoclimate proxy series

    Science.gov (United States)

    Li, M.; Kump, L. R.; Hinnov, L.

    2017-12-01

    This study addresses two fundamental issues in cyclostratigraphy: quantitative testing of orbital forcing in cyclic sedimentary sequences and tracking variable sedimentation rates. The methodology proposed here addresses these issues as an inverse problem, and estimates the product-moment correlation coefficient between the frequency spectra of orbital solutions and paleoclimate proxy series over a range of "test" sedimentation rates. It is inspired by the ASM method (1). The number of orbital parameters involved in the estimation is also considered. The method relies on the hypothesis that orbital forcing had a significant impact on the paleoclimate proxy variations, and thus is also tested. The null hypothesis of no astronomical forcing is evaluated using the Beta distribution, for which the shape parameters are estimated using a Monte Carlo simulation approach. We introduce a metric to estimate the most likely sedimentation rate using the product-moment correlation coefficient, H0 significance level, and the number of contributing orbital parameters, i.e., the CHO value. The CHO metric is applied with a sliding window to track variable sedimentation rates along the paleoclimate proxy series. Two forward models with uniform and variable sedimentation rates are evaluated to demonstrate the robustness of the method. The CHO method is applied to the classical Late Triassic Newark depth rank series; the estimated sedimentation rates match closely with previously published sedimentation rates and provide a more highly time-resolved estimate (2,3). References: (1) Meyers, S.R., Sageman, B.B., Amer. J. Sci., 307, 773-792, 2007; (2) Kent, D.V., Olsen, P.E., Muttoni, G., Earth-Sci. Rev.166, 153-180, 2017; (3) Li, M., Zhang, Y., Huang, C., Ogg, J., Hinnov, L., Wang, Y., Zou, Z., Li, L., 2017. Earth Plant. Sc. Lett. doi:10.1016/j.epsl.2017.07.015

  12. 350 Year Cloud Reconstruction Deduced from Northeast Caribbean Coral Proxies

    Science.gov (United States)

    Winter, A.; Sammarco, P. W.; Mikolajewicz, U.; Jury, M.; Zanchettin, D.

    2014-12-01

    Clouds are a major factor influencing the global climate and its response to external forcing through their implications for the global hydrological cycle, and hence for the planetary radiative budget. Clouds also contribute to regional climates and their variability through, e.g., the changes they induce in regional precipitation patterns. There have been very few studies of decadal and longer-term changes in cloud cover in the tropics and sub-tropics, both over land and the ocean. In the tropics, there is great uncertainty regarding how global warming will affect cloud cover. Observational satellite data are too short to unambiguously discern any temporal trends in cloud cover. Corals generally live in well-mixed coastal regions and can often record environmental conditions of large areas of the upper ocean. This is particularly the case at low latitudes. Scleractinian corals are sessile, epibenthic fauna, and the type of environmental information recorded at the location where the coral has been living is dependent upon the species of coral considered and proxy index of interest. Skeletons of scleractinian corals are considered to provide among the best records of high-resolution (sub-annual) environmental variability in the tropical and sub-tropical oceans. Zooxanthellate hermatypic corals in tropical and sub-tropical seas precipitate CaCO3 skeletons as they grow. This growth is made possible through the manufacture of CaCO3crystals, facilitated by the zooxanthellae. During the process of crystallization, the holobiont binds carbon of different isotopes into the crystals. Stable carbon isotope concentrations vary with a variety of environmental conditions. In the Caribbean, d13C in corals of the species Montastraea faveolata can be used as a proxy for changes in cloud cover. In this contribution, we will demonstrate that the stable isotope 13C varies concomitantly with cloud cover for the northeastern Caribbean region. Using this proxy we have been able to

  13. Polar cap index as a proxy for hemispheric Joule heating

    DEFF Research Database (Denmark)

    Chun, F.K.; Knipp, D.J.; McHarg, M.G.

    1999-01-01

    The polar cap (PC) index measures the level of geomagnetic activity in the polar cap based on magnetic perturbations from overhead ionospheric currents and distant field-aligned currents on the poleward edge of the nightside auroral oval. Because PC essentially measures the main sources of energy...... input into the polar cap, we propose to use PC as a proxy for the hemispheric Joule heat production rate (JH). In this study, JH is estimated from the Assimilative Mapping of Ionospheric Electrodynamics (AMIE) procedure. We fit hourly PC values to hourly averages of JH. Using a data base approximately...

  14. Infrared signatures for remote sensing

    International Nuclear Information System (INIS)

    McDowell, R.S.; Sharpe, S.W.; Kelly, J.F.

    1994-04-01

    PNL's capabilities for infrared and near-infrared spectroscopy include tunable-diode-laser (TDL) systems covering 300--3,000 cm -1 at 2 laser. PNL also has a beam expansion source with a 12-cm slit, which provides a 3-m effective path for gases at ∼10 K, giving a Doppler width of typically 10 MHz; and long-path static gas cells (to 100 m). In applying this equipment to signatures work, the authors emphasize the importance of high spectral resolution for detecting and identifying atmospheric interferences; for identifying the optimum analytical frequencies; for deriving, by spectroscopic analysis, the molecular parameters needed for modeling; and for obtaining data on species and/or bands that are not in existing databases. As an example of such spectroscopy, the authors have assigned and analyzed the C-Cl stretching region of CCl 4 at 770--800 cm -1 . This is an important potential signature species whose IR absorption has remained puzzling because of the natural isotopic mix, extensive hot-band structure, and a Fermi resonance involving a nearby combination band. Instrument development projects include the IR sniffer, a small high-sensitivity, high-discrimination (Doppler-limited) device for fence-line or downwind monitoring that is effective even in regions of atmospheric absorption; preliminary work has achieved sensitivities at the low-ppb level. Other work covers trace species detection with TDLs, and FM-modulated CO 2 laser LIDAR. The authors are planning a field experiment to interrogate the Hanford tank farm for signature species from Rattlesnake Mountain, a standoff of ca. 15 km, to be accompanied by simultaneous ground-truthing at the tanks

  15. Comparing performance of standard and iterative linear unmixing methods for hyperspectral signatures

    Science.gov (United States)

    Gault, Travis R.; Jansen, Melissa E.; DeCoster, Mallory E.; Jansing, E. David; Rodriguez, Benjamin M.

    2016-05-01

    Linear unmixing is a method of decomposing a mixed signature to determine the component materials that are present in sensor's field of view, along with the abundances at which they occur. Linear unmixing assumes that energy from the materials in the field of view is mixed in a linear fashion across the spectrum of interest. Traditional unmixing methods can take advantage of adjacent pixels in the decomposition algorithm, but is not the case for point sensors. This paper explores several iterative and non-iterative methods for linear unmixing, and examines their effectiveness at identifying the individual signatures that make up simulated single pixel mixed signatures, along with their corresponding abundances. The major hurdle addressed in the proposed method is that no neighboring pixel information is available for the spectral signature of interest. Testing is performed using two collections of spectral signatures from the Johns Hopkins University Applied Physics Laboratory's Signatures Database software (SigDB): a hand-selected small dataset of 25 distinct signatures from a larger dataset of approximately 1600 pure visible/near-infrared/short-wave-infrared (VIS/NIR/SWIR) spectra. Simulated spectra are created with three and four material mixtures randomly drawn from a dataset originating from SigDB, where the abundance of one material is swept in 10% increments from 10% to 90%with the abundances of the other materials equally divided amongst the remainder. For the smaller dataset of 25 signatures, all combinations of three or four materials are used to create simulated spectra, from which the accuracy of materials returned, as well as the correctness of the abundances, is compared to the inputs. The experiment is expanded to include the signatures from the larger dataset of almost 1600 signatures evaluated using a Monte Carlo scheme with 5000 draws of three or four materials to create the simulated mixed signatures. The spectral similarity of the inputs to the

  16. Application of blocking diagnosis methods to general circulation models. Part I: a novel detection scheme

    Energy Technology Data Exchange (ETDEWEB)

    Barriopedro, D. [Universidade de Lisboa, CGUL-IDL, Faculdade de Ciencias, Ed. C-8, Lisbon (Portugal); Universidad de Extremadura, Departamento de Fisica, Facultad de Ciencias, Badajoz (Spain); Garcia-Herrera, R. [Universidad Complutense de Madrid, Departamento de Fisica de la Tierra II, Facultad de C.C. Fisicas, Madrid (Spain); Trigo, R.M. [Universidade de Lisboa, CGUL-IDL, Faculdade de Ciencias, Ed. C-8, Lisbon (Portugal)

    2010-12-15

    This paper aims to provide a new blocking definition with applicability to observations and model simulations. An updated review of previous blocking detection indices is provided and some of their implications and caveats discussed. A novel blocking index is proposed by reconciling two traditional approaches based on anomaly and absolute flows. Blocks are considered from a complementary perspective as a signature in the anomalous height field capable of reversing the meridional jet-based height gradient in the total flow. The method succeeds in identifying 2-D persistent anomalies associated to a weather regime in the total flow with blockage of the westerlies. The new index accounts for the duration, intensity, extension, propagation, and spatial structure of a blocking event. In spite of its increased complexity, the detection efficiency of the method is improved without hampering the computational time. Furthermore, some misleading identification problems and artificial assumptions resulting from previous single blocking indices are avoided with the new approach. The characteristics of blocking for 40 years of reanalysis (1950-1989) over the Northern Hemisphere are described from the perspective of the new definition and compared to those resulting from two standard blocking indices and different critical thresholds. As compared to single approaches, the novel index shows a better agreement with reported proxies of blocking activity, namely climatological regions of simultaneous wave amplification and maximum band-pass filtered height standard deviation. An additional asset of the method is its adaptability to different data sets. As critical thresholds are specific of the data set employed, the method is useful for observations and model simulations of different resolutions, temporal lengths and time variant basic states, optimizing its value as a tool for model validation. Special attention has been paid on the devise of an objective scheme easily applicable

  17. GRAVITATIONAL WAVE SIGNATURES OF HYPERACCRETING COLLAPSAR DISKS

    International Nuclear Information System (INIS)

    Kotake, Kei; Takiwaki, Tomoya; Harikae, Seiji

    2012-01-01

    By performing two-dimensional special relativistic (SR) magnetohydrodynamic simulations, we study possible signatures of gravitational waves (GWs) in the context of the collapsar model for long-duration gamma-ray bursts. In our SR simulations, the central black hole is treated as an absorbing boundary. By doing so, we focus on the GWs generated by asphericities in neutrino emission and matter motions in the vicinity of the hyperaccreting disks. We compute nine models by adding initial angular momenta and magnetic fields parametrically to a precollapse core of a 35 M ☉ progenitor star. As for the microphysics, a realistic equation of state is employed and the neutrino cooling is taken into account via a multi-flavor neutrino leakage scheme. To accurately estimate GWs produced by anisotropic neutrino emission, we perform a ray-tracing analysis in general relativity by a post-processing procedure. By employing a stress formula that includes contributions from both magnetic fields and SR corrections, we also study the effects of magnetic fields on the gravitational waveforms. We find that the GW amplitudes from anisotropic neutrino emission show a monotonic increase with time, whose amplitudes are much larger than those from matter motions of the accreting material. We show that the increasing trend of the neutrino GWs stems from the excess of neutrino emission in the direction near parallel to the spin axis illuminated from the hyperaccreting disks. We point out that a recently proposed future space-based interferometer like Fabry-Perot-type DECIGO would permit the detection of these GW signals within ≈100 Mpc.

  18. Simulation of Wake Vortex Radiometric Detection via Jet Exhaust Proxy

    Science.gov (United States)

    Daniels, Taumi S.

    2015-01-01

    This paper describes an analysis of the potential of an airborne hyperspectral imaging IR instrument to infer wake vortices via turbine jet exhaust as a proxy. The goal was to determine the requirements for an imaging spectrometer or radiometer to effectively detect the exhaust plume, and by inference, the location of the wake vortices. The effort examines the gas spectroscopy of the various major constituents of turbine jet exhaust and their contributions to the modeled detectable radiance. Initially, a theoretical analysis of wake vortex proxy detection by thermal radiation was realized in a series of simulations. The first stage used the SLAB plume model to simulate turbine jet exhaust plume characteristics, including exhaust gas transport dynamics and concentrations. The second stage used these plume characteristics as input to the Line By Line Radiative Transfer Model (LBLRTM) to simulate responses from both an imaging IR hyperspectral spectrometer or radiometer. These numerical simulations generated thermal imagery that was compared with previously reported wake vortex temperature data. This research is a continuation of an effort to specify the requirements for an imaging IR spectrometer or radiometer to make wake vortex measurements. Results of the two-stage simulation will be reported, including instrument specifications for wake vortex thermal detection. These results will be compared with previously reported results for IR imaging spectrometer performance.

  19. Starspot variability as an X-ray radiation proxy

    Science.gov (United States)

    Arkhypov, Oleksiy V.; Khodachenko, Maxim L.; Lammer, Helmut; Güdel, Manuel; Lüftinger, Teresa; Johnstone, Colin P.

    2018-05-01

    Stellar X-ray emission plays an important role in the study of exoplanets as a proxy for stellar winds and as a basis for the prediction of extreme ultraviolet (EUV) flux, unavailable for direct measurements, which in their turn are important factors for the mass-loss of planetary atmospheres. Unfortunately, the detection thresholds limit the number of stars with the directly measured X-ray fluxes. At the same time, the known connection between the sunspots and X-ray sources allows using of the starspot variability as an accessible proxy for the stellar X-ray emission. To realize this approach, we analysed the light curves of 1729 main-sequence stars with rotation periods 0.5 X-ray to bolometric luminosity ratio Rx. As a result, the regressions for stellar X-ray luminosity Lx(P, Teff) and its related EUV analogue LEUV were obtained for the main-sequence stars. It was shown that these regressions allow prediction of average (over the considered stars) values of log (Lx) and log (LEUV) with typical errors of 0.26 and 0.22 dex, respectively. This, however, does not include the activity variations in particular stars related to their individual magnetic activity cycles.

  20. Attribute-Based Proxy Re-Encryption with Keyword Search

    Science.gov (United States)

    Shi, Yanfeng; Liu, Jiqiang; Han, Zhen; Zheng, Qingji; Zhang, Rui; Qiu, Shuo

    2014-01-01

    Keyword search on encrypted data allows one to issue the search token and conduct search operations on encrypted data while still preserving keyword privacy. In the present paper, we consider the keyword search problem further and introduce a novel notion called attribute-based proxy re-encryption with keyword search (), which introduces a promising feature: In addition to supporting keyword search on encrypted data, it enables data owners to delegate the keyword search capability to some other data users complying with the specific access control policy. To be specific, allows (i) the data owner to outsource his encrypted data to the cloud and then ask the cloud to conduct keyword search on outsourced encrypted data with the given search token, and (ii) the data owner to delegate other data users keyword search capability in the fine-grained access control manner through allowing the cloud to re-encrypted stored encrypted data with a re-encrypted data (embedding with some form of access control policy). We formalize the syntax and security definitions for , and propose two concrete constructions for : key-policy and ciphertext-policy . In the nutshell, our constructions can be treated as the integration of technologies in the fields of attribute-based cryptography and proxy re-encryption cryptography. PMID:25549257

  1. Attribute-based proxy re-encryption with keyword search.

    Science.gov (United States)

    Shi, Yanfeng; Liu, Jiqiang; Han, Zhen; Zheng, Qingji; Zhang, Rui; Qiu, Shuo

    2014-01-01

    Keyword search on encrypted data allows one to issue the search token and conduct search operations on encrypted data while still preserving keyword privacy. In the present paper, we consider the keyword search problem further and introduce a novel notion called attribute-based proxy re-encryption with keyword search (ABRKS), which introduces a promising feature: In addition to supporting keyword search on encrypted data, it enables data owners to delegate the keyword search capability to some other data users complying with the specific access control policy. To be specific, ABRKS allows (i) the data owner to outsource his encrypted data to the cloud and then ask the cloud to conduct keyword search on outsourced encrypted data with the given search token, and (ii) the data owner to delegate other data users keyword search capability in the fine-grained access control manner through allowing the cloud to re-encrypted stored encrypted data with a re-encrypted data (embedding with some form of access control policy). We formalize the syntax and security definitions for ABRKS, and propose two concrete constructions for ABRKS: key-policy ABRKS and ciphertext-policy ABRKS. In the nutshell, our constructions can be treated as the integration of technologies in the fields of attribute-based cryptography and proxy re-encryption cryptography.

  2. A Scalable proxy cache for Grid Data Access

    International Nuclear Information System (INIS)

    Cristian Cirstea, Traian; Just Keijser, Jan; Arthur Koeroo, Oscar; Starink, Ronald; Alan Templon, Jeffrey

    2012-01-01

    We describe a prototype grid proxy cache system developed at Nikhef, motivated by a desire to construct the first building block of a future https-based Content Delivery Network for grid infrastructures. Two goals drove the project: firstly to provide a “native view” of the grid for desktop-type users, and secondly to improve performance for physics-analysis type use cases, where multiple passes are made over the same set of data (residing on the grid). We further constrained the design by requiring that the system should be made of standard components wherever possible. The prototype that emerged from this exercise is a horizontally-scalable, cooperating system of web server / cache nodes, fronted by a customized webDAV server. The webDAV server is custom only in the sense that it supports http redirects (providing horizontal scaling) and that the authentication module has, as back end, a proxy delegation chain that can be used by the cache nodes to retrieve files from the grid. The prototype was deployed at Nikhef and tested at a scale of several terabytes of data and approximately one hundred fast cores of computing. Both small and large files were tested, in a number of scenarios, and with various numbers of cache nodes, in order to understand the scaling properties of the system. For properly-dimensioned cache-node hardware, the system showed speedup of several integer factors for the analysis-type use cases. These results and others are presented and discussed.

  3. Signature Curves Statistics of DNA Supercoils

    OpenAIRE

    Shakiban, Cheri; Lloyd, Peter

    2004-01-01

    In this paper we describe the Euclidean signature curves for two dimensional closed curves in the plane and their generalization to closed space curves. The focus will be on discrete numerical methods for approximating such curves. Further we will apply these numerical methods to plot the signature curves related to three-dimensional simulated DNA supercoils. Our primary focus will be on statistical analysis of the data generated for the signature curves of the supercoils. We will try to esta...

  4. On Randomizing Hash Functions to Strengthen the Security of Digital Signatures

    DEFF Research Database (Denmark)

    Halevi and Krawczyk proposed a message randomization algorithm called RMX as a front-end tool to the hash-then-sign digital signature schemes such as DSS and RSA in order to free their reliance on the collision resistance property of the hash functions. They have shown that to forge a RMX-hash-th...... that use Davies-Meyer schemes and a variant of RMX published by NIST in its Draft Special Publication (SP) 800-106. We discuss some important applications of our attack....

  5. Analyzing differences between patient and proxy on Patient Reported Outcomes in multiple sclerosis.

    Science.gov (United States)

    Sonder, Judith M; Holman, Rebecca; Knol, Dirk L; Bosma, Libertje V A E; Polman, Chris H; Uitdehaag, Bernard M J

    2013-11-15

    Proxy respondents, partners of multiple sclerosis (MS) patients, can provide valuable information on the MS patients' disease. In an earlier publication we found relatively good agreement on patient reported outcomes (PROs) measuring physical impact and functioning, but we found large differences on (neuro)psychological scales. We aim to identify patient and proxy related variables explaining differences between patients' and proxies' ratings on five PROs. We report on data from 175 MS patients and proxy respondents. Regression analyses were performed, using as dependent variable the mean differences on five scales: Physical and Psychological scale of the Multiple Sclerosis Impact Scale (MSIS-29), the Multiple Sclerosis Walking Scale (MSWS), Guy's Neurological Disability Scale (GNDS) and the Multiple Sclerosis Neuropsychological Screening Questionnaire (MSNQ). The independent variables were patient, proxy and disease related variables. Caregiver strain was significantly related to differences between patient and proxy scores for all five PROs. A higher level of patient anxiety on the HADS was linked to larger differences on all PROs except the GNDS. In addition, cognitive functioning, proxy depression, walking ability, proxy gender and MS related disability were contributing to the discrepancies. We found several patient and proxy factors that may contribute to discrepancies between patient and proxy scores on MS PROs. The most important factor is caregiver burden. © 2013 Elsevier B.V. All rights reserved.

  6. All-optical signatures of strong-field QED in the vacuum emission picture

    Science.gov (United States)

    Gies, Holger; Karbstein, Felix; Kohlfürst, Christian

    2018-02-01

    We study all-optical signatures of the effective nonlinear couplings among electromagnetic fields in the quantum vacuum, using the collision of two focused high-intensity laser pulses as an example. The experimental signatures of quantum vacuum nonlinearities are encoded in signal photons, whose kinematic and polarization properties differ from the photons constituting the macroscopic laser fields. We implement an efficient numerical algorithm allowing for the theoretical investigation of such signatures in realistic field configurations accessible in experiment. This algorithm is based on a vacuum emission scheme and can readily be adapted to the collision of more laser beams or further involved field configurations. We solve the case of two colliding pulses in full 3 +1 -dimensional spacetime and identify experimental geometries and parameter regimes with improved signal-to-noise ratios.

  7. Developing a proxy version of the Adult social care outcome toolkit (ASCOT).

    Science.gov (United States)

    Rand, Stacey; Caiels, James; Collins, Grace; Forder, Julien

    2017-05-19

    Social care-related quality of life is a key outcome indicator used in the evaluation of social care interventions and policy. It is not, however, always possible to collect quality of life data by self-report even with adaptations for people with cognitive or communication impairments. A new proxy-report version of the Adult Social Care Outcomes Toolkit (ASCOT) measure of social care-related quality of life was developed to address the issues of wider inclusion of people with cognitive or communication difficulties who may otherwise be systematically excluded. The development of the proxy-report ASCOT questionnaire was informed by literature review and earlier work that identified the key issues and challenges associated with proxy-reported outcomes. To evaluate the acceptability and content validity of the ASCOT-Proxy, qualitative cognitive interviews were conducted with unpaid carers or care workers of people with cognitive or communication impairments. The proxy respondents were invited to 'think aloud' while completing the questionnaire. Follow-up probes were asked to elicit further detail of the respondent's comprehension of the format, layout and content of each item and also how they weighed up the options to formulate a response. A total of 25 unpaid carers and care workers participated in three iterative rounds of cognitive interviews. The findings indicate that the items were well-understood and the concepts were consistent with the item definitions for the standard self-completion version of ASCOT with minor modifications to the draft ASCOT-Proxy. The ASCOT-Proxy allows respondents to rate the proxy-proxy and proxy-patient perspectives, which improved the acceptability of proxy report. A new proxy-report version of ASCOT was developed with evidence of its qualitative content validity and acceptability. The ASCOT-Proxy is ready for empirical testing of its suitability for data collection as a self-completion and/or interview questionnaire, and also

  8. Coordinated renewable energy support schemes

    DEFF Research Database (Denmark)

    Morthorst, P.E.; Jensen, S.G.

    2006-01-01

    . The first example covers countries with regional power markets that also regionalise their support schemes, the second countries with separate national power markets that regionalise their support schemes. The main findings indicate that the almost ideal situation exists if the region prior to regionalising...

  9. CANONICAL BACKWARD DIFFERENTIATION SCHEMES FOR ...

    African Journals Online (AJOL)

    This paper describes a new nonlinear backward differentiation schemes for the numerical solution of nonlinear initial value problems of first order ordinary differential equations. The schemes are based on rational interpolation obtained from canonical polynomials. They are A-stable. The test problems show that they give ...

  10. Institute of Geophysics, Planetary Physics, and Signatures

    Data.gov (United States)

    Federal Laboratory Consortium — The Institute of Geophysics, Planetary Physics, and Signatures at Los Alamos National Laboratory is committed to promoting and supporting high quality, cutting-edge...

  11. On reliable discovery of molecular signatures

    Directory of Open Access Journals (Sweden)

    Björkegren Johan

    2009-01-01

    Full Text Available Abstract Background Molecular signatures are sets of genes, proteins, genetic variants or other variables that can be used as markers for a particular phenotype. Reliable signature discovery methods could yield valuable insight into cell biology and mechanisms of human disease. However, it is currently not clear how to control error rates such as the false discovery rate (FDR in signature discovery. Moreover, signatures for cancer gene expression have been shown to be unstable, that is, difficult to replicate in independent studies, casting doubts on their reliability. Results We demonstrate that with modern prediction methods, signatures that yield accurate predictions may still have a high FDR. Further, we show that even signatures with low FDR may fail to replicate in independent studies due to limited statistical power. Thus, neither stability nor predictive accuracy are relevant when FDR control is the primary goal. We therefore develop a general statistical hypothesis testing framework that for the first time provides FDR control for signature discovery. Our method is demonstrated to be correct in simulation studies. When applied to five cancer data sets, the method was able to discover molecular signatures with 5% FDR in three cases, while two data sets yielded no significant findings. Conclusion Our approach enables reliable discovery of molecular signatures from genome-wide data with current sample sizes. The statistical framework developed herein is potentially applicable to a wide range of prediction problems in bioinformatics.

  12. Modeling the Thermal Signature of Natural Backgrounds

    National Research Council Canada - National Science Library

    Gamborg, Marius

    2002-01-01

    Two measuring stations have been established the purpose being to collect comprehensive databases of thermal signatures of background elements in addition to the prevailing meteorological conditions...

  13. Proxy and patient reports of health-related quality of life in a national cancer survey.

    Science.gov (United States)

    Roydhouse, Jessica K; Gutman, Roee; Keating, Nancy L; Mor, Vincent; Wilson, Ira B

    2018-01-05

    Proxy respondents are frequently used in surveys, including those assessing health-related quality of life (HRQOL). In cancer, most research involving proxies has been undertaken with paired proxy-patient populations, where proxy responses are compared to patient responses for the same individual. In these populations, proxy-patient differences are small and suggest proxy underestimation of patient HRQOL. In practice, however, proxy responses will only be used when patient responses are not available. The difference between proxy and patient reports of patient HRQOL where patients are not able to report for themselves in cancer is not known. The objective of this study was to evaluate the difference between patient and proxy reports of patient HRQOL in a large national cancer survey, and determine if this difference could be mitigated by adjusting for clinical and sociodemographic information about patients. Data were from the Cancer Care Outcomes Research and Surveillance (CanCORS) study. Patients or their proxies were recruited within 3-6 months of diagnosis with lung or colorectal cancer. HRQOL was measured using the SF-12 mental and physical composite scales. Differences of ½ SD (=5 points) were considered clinically significant. The primary independent variable was proxy status. Linear regression models were used to adjust for patient sociodemographic and clinical covariates, including cancer stage, patient age and education, and patient co-morbidities. Of 6471 respondents, 1011 (16%) were proxies. Before adjustment, average proxy-reported scores were lower for both physical (-6.7 points, 95% CI -7.4 to -5.9) and mental (-6 points, 95% CI -6.7 to -5.2) health. Proxy-reported scores remained lower after adjustment (physical: -5.8 points, -6.6 to -5; mental: -5.8 points, -6.6 to 5). Proxy-patient score differences remained clinically and statistically significant, even after adjustment for sociodemographic and clinical variables. Proxy-reported outcome scores

  14. Carbohydrates and phenols as quantitative molecular vegetation proxies in peats

    Science.gov (United States)

    Kaiser, K.; Benner, R. H.

    2012-12-01

    Vegetation in peatlands is intricately linked to local environmental conditions and climate. Here we use chemical analyses of carbohydrates and phenols to reconstruct paleovegetation in peat cores collected from 56.8°N (SIB04), 58.4°N (SIB06), 63.8°N (G137) and 66.5°N (E113) in the Western Siberian Lowland. Lignin phenols (vanillyl and syringyl phenols) were sensitive biomarkers for vascular plant contributions and provided additional information on the relative contributions of angiosperm and gymnosperm plants. Specific neutral sugar compositions allowed identification of sphagnum mosses, sedges (Cyperaceae) and lichens. Hydroxyphenols released by CuO oxidation were useful tracers of sphagnum moss contributions. The three independent molecular proxies were calibrated with a diverse group of peat-forming plants to yield quantitative estimates (%C) of vascular plant, sphagnum moss and lichen contributions in peat core samples. Correlation analysis indicated the three molecular proxies produced fairly similar results for paleovegetation compositions, generally within the error interval of each approach (≤26%). The lignin-based method generally lead to higher estimates of vascular plant vegetation. Several significant deviations were also observed due to different reactivities of carbohydrate and phenolic polymers during peat decomposition. Rapid vegetation changes on timescales of 50-200 years were observed in the southern cores SIB04 and SIB06 over the last 2000 years. Vanillyl and syringyl phenol ratios indicated these vegetation changes were largely due to varying inputs of angiosperm and gymnosperm plants. The northern permafrost cores G137 and E113 showed a more stable development. Lichens briefly replaced sphagnum mosses and vascular plants in both of these cores. Shifts in vegetation did not correlate well with Northern hemisphere climate variability over the last 2000 years. This suggested that direct climate forcing of peatland dynamics was overridden

  15. L1000CDS2: LINCS L1000 characteristic direction signatures search engine.

    Science.gov (United States)

    Duan, Qiaonan; Reid, St Patrick; Clark, Neil R; Wang, Zichen; Fernandez, Nicolas F; Rouillard, Andrew D; Readhead, Ben; Tritsch, Sarah R; Hodos, Rachel; Hafner, Marc; Niepel, Mario; Sorger, Peter K; Dudley, Joel T; Bavari, Sina; Panchal, Rekha G; Ma'ayan, Avi

    2016-01-01

    The library of integrated network-based cellular signatures (LINCS) L1000 data set currently comprises of over a million gene expression profiles of chemically perturbed human cell lines. Through unique several intrinsic and extrinsic benchmarking schemes, we demonstrate that processing the L1000 data with the characteristic direction (CD) method significantly improves signal to noise compared with the MODZ method currently used to compute L1000 signatures. The CD processed L1000 signatures are served through a state-of-the-art web-based search engine application called L1000CDS 2 . The L1000CDS 2 search engine provides prioritization of thousands of small-molecule signatures, and their pairwise combinations, predicted to either mimic or reverse an input gene expression signature using two methods. The L1000CDS 2 search engine also predicts drug targets for all the small molecules profiled by the L1000 assay that we processed. Targets are predicted by computing the cosine similarity between the L1000 small-molecule signatures and a large collection of signatures extracted from the gene expression omnibus (GEO) for single-gene perturbations in mammalian cells. We applied L1000CDS 2 to prioritize small molecules that are predicted to reverse expression in 670 disease signatures also extracted from GEO, and prioritized small molecules that can mimic expression of 22 endogenous ligand signatures profiled by the L1000 assay. As a case study, to further demonstrate the utility of L1000CDS 2 , we collected expression signatures from human cells infected with Ebola virus at 30, 60 and 120 min. Querying these signatures with L1000CDS 2 we identified kenpaullone, a GSK3B/CDK2 inhibitor that we show, in subsequent experiments, has a dose-dependent efficacy in inhibiting Ebola infection in vitro without causing cellular toxicity in human cell lines. In summary, the L1000CDS 2 tool can be applied in many biological and biomedical settings, while improving the extraction of

  16. Persistent solar signatures in cloud cover: spatial and temporal analysis

    International Nuclear Information System (INIS)

    Voiculescu, M; Usoskin, I

    2012-01-01

    A consensus regarding the impact of solar variability on cloud cover is far from being reached. Moreover, the impact of cloud cover on climate is among the least understood of all climate components. This motivated us to analyze the persistence of solar signals in cloud cover for the time interval 1984–2009, covering two full solar cycles. A spatial and temporal investigation of the response of low, middle and high cloud data to cosmic ray induced ionization (CRII) and UV irradiance (UVI) is performed in terms of coherence analysis of the two signals. For some key geographical regions the response of clouds to UVI and CRII is persistent over the entire time interval indicating a real link. In other regions, however, the relation is not consistent, being intermittent or out of phase, suggesting that some correlations are spurious. The constant in phase or anti-phase relationship between clouds and solar proxies over some regions, especially for low clouds with UVI and CRII, middle clouds with UVI and high clouds with CRII, definitely requires more study. Our results show that solar signatures in cloud cover persist in some key climate-defining regions for the entire time period and supports the idea that, if existing, solar effects are not visible at the global level and any analysis of solar effects on cloud cover (and, consequently, on climate) should be done at the regional level. (letter)

  17. Heterogeneity of Cr in Mytilus edulis: Implications for the Cr isotope system as a paleo-redox proxy

    Science.gov (United States)

    Bruggmann, Sylvie; Klaebe, Robert; Frei, Robert

    2017-04-01

    's Cr isotopic composition [3]. A detailed understanding of the processes causing the observed heterogeneity of [Cr] and δ53Cr in modern carbonate shells is crucial for the use of the Cr isotope system as a potential paleo-redox proxy. [1] Bonnand, P., James, R. H., Parkinson, I. J., Connelly, D. P., and Fairchild, I. J. (2013). The chromium isotopic composition of seawater and marine carbonates. Earth and Planetary Science Letters, 382:10-20. [2] Holmden, C., Jacobsen, A. D., Sageman, B. B., Hurgten, M. T. (2016). Response of the Cr isotope proxy to Cretaceous Ocean Anoxic Event 2 in a pelagic carbonate succession from the Western Interior Seaway. Geochimica et Cosmochimica Acta, 186:227-295. [3] Paulukat, C., Gilleaudeau, G. J., Chernyavskiy, P., Frei, R. (2016). The Cr-isotope signature of surface seawater -A global perspective. Chemical Geology, 444:101-109. [4] Pereira, N. S., Voegelin, A. R., Paulukat, C., Sial, A. N., Ferreira, V. P., and Frei, R. (2015). Chromium-isotope signatures in scleractinian corals from the Rocas Atoll, Tropical South Atlantic. Geobiology 1-14.

  18. Date Attachable Offline Electronic Cash Scheme

    Directory of Open Access Journals (Sweden)

    Chun-I Fan

    2014-01-01

    Full Text Available Electronic cash (e-cash is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling.

  19. Date attachable offline electronic cash scheme.

    Science.gov (United States)

    Fan, Chun-I; Sun, Wei-Zhe; Hau, Hoi-Tung

    2014-01-01

    Electronic cash (e-cash) is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling.

  20. Date Attachable Offline Electronic Cash Scheme

    Science.gov (United States)

    Sun, Wei-Zhe; Hau, Hoi-Tung

    2014-01-01

    Electronic cash (e-cash) is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling. PMID:24982931

  1. hybrid modulation scheme fo rid modulation scheme fo dulation

    African Journals Online (AJOL)

    eobe

    control technique is done through simulations and ex control technique .... HYBRID MODULATION SCHEME FOR CASCADED H-BRIDGE INVERTER CELLS. C. I. Odeh ..... and OR operations. Referring to ... MATLAB/SIMULINK environment.

  2. 21 CFR 11.70 - Signature/record linking.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Signature/record linking. 11.70 Section 11.70 Food... RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.70 Signature/record linking. Electronic signatures and handwritten signatures executed to electronic records shall be linked to their respective...

  3. STRONTIUM DISTRIBUTION IN UPPER DEVONIAN CONODONT ELEMENTS: A PALAEOBIOLOGICAL PROXY

    Directory of Open Access Journals (Sweden)

    ANDREY V. ZHURAVLEV

    2017-04-01

    Full Text Available Conodonts are an extinct group of marine animals possessing debated affinities. The conodont elements are composed of calcium phosphate [apatite (CaF] and collagen-like proteins. Distribution of Sr in the bioapatite of albid, lamellar and paralamellar tissues of some Upper Devonian conodont element crowns from NW Russia was studied by microprobe. The calcium phosphate of the lamellar and paralamellar tissues demonstrates periodical oscillation of Sr contents across the lamellae (0.4-0.5 wt% in the outer part of lamella, and 0.2 wt% in the inner part. The albid tissue contains Sr of less than 0.4 wt%. It is suggested that oscillations of Sr concentrations reflect the periodic growth of the lamellae, and the average Ca/Sr ratio can be a proxy of the growth rate.

  4. Interactive images: Cuboid proxies for smart image manipulation

    KAUST Repository

    Zheng, Youyi

    2012-07-01

    Images are static and lack important depth information about the underlying 3D scenes. We introduce interactive images in the context of man-made environments wherein objects are simple and regular, share various non-local relations (e.g., coplanarity, parallelism, etc.), and are often repeated. Our interactive framework creates partial scene reconstructions based on cuboid-proxies with minimal user interaction. It subsequently allows a range of intuitive image edits mimicking real-world behavior, which are otherwise difficult to achieve. Effectively, the user simply provides high-level semantic hints, while our system ensures plausible operations by conforming to the extracted non-local relations. We demonstrate our system on a range of real-world images and validate the plausibility of the results using a user study. © 2012 ACM 0730-0301/2012/08-ART99.

  5. Proxy studies of energy transfer to the magnetosphere

    International Nuclear Information System (INIS)

    Scurry, L.; Russell, C.T.

    1991-01-01

    The transfer of energy into the magnetosphere is studied using as proxy the Am geomagnetic index and multilinear regressions and correlations with solar wind data. In particular, the response of Am to the reconnection mechanism is examined in relation to the orientation of the interplanetary magnetic field as well as the upstream plasma parameters. A functional dependence of Am on clock angle, the orientation of the IMF in the plane perpendicular to the flow, is derived after first correcting the index for nonreconnection effects due to dynamic pressure and velocity. An examination of the effect of upstream magnetosonic Mach number shows the reconnection mechanism to become less efficient at high Mach numbers. The reconnection mechanism is shown to be slightly enhanced by higher dynamic pressures

  6. Towards a new paleotemperature proxy from reef coral occurrences.

    Science.gov (United States)

    Lauchstedt, Andreas; Pandolfi, John M; Kiessling, Wolfgang

    2017-09-05

    Global mean temperature is thought to have exceeded that of today during the last interglacial episode (LIG, ~ 125,000 yrs b.p.) but robust paleoclimate data are still rare in low latitudes. Occurrence data of tropical reef corals may provide new proxies of low latitude sea-surface temperatures. Using modern reef coral distributions we developed a geographically explicit model of sea surface temperatures. Applying this model to coral occurrence data of the LIG provides a latitudinal U-shaped pattern of temperature anomalies with cooler than modern temperatures around the equator and warmer subtropical climes. Our results agree with previously published estimates of LIG temperatures and suggest a poleward broadening of the habitable zone for reef corals during the LIG.

  7. 15 CFR 908.16 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Signature. 908.16 Section 908.16 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) NATIONAL OCEANIC... SUBMITTING REPORTS ON WEATHER MODIFICATION ACTIVITIES § 908.16 Signature. All reports filed with the National...

  8. 12 CFR 269b.731 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Signature. 269b.731 Section 269b.731 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM CHARGES OF UNFAIR LABOR PRACTICES General Rules § 269b.731 Signature. The original of each document filed shall be...

  9. The Pedagogic Signature of the Teaching Profession

    Science.gov (United States)

    Kiel, Ewald; Lerche, Thomas; Kollmannsberger, Markus; Oubaid, Viktor; Weiss, Sabine

    2016-01-01

    Lee S. Shulman deplores that the field of education as a profession does not have a pedagogic signature, which he characterizes as a synthesis of cognitive, practical and moral apprenticeship. In this context, the following study has three goals: 1) In the first theoretical part, the basic problems of constructing a pedagogic signature are…

  10. Infrared ship signature analysis and optimisation

    NARCIS (Netherlands)

    Neele, F.P.

    2005-01-01

    The last decade has seen an increase in the awareness of the infrared signature of naval ships. New ship designs show that infrared signature reduction measures are being incorporated, such as exhaust gas cooling systems, relocation of the exhausts and surface cooling systems. Hull and

  11. Does Social Work Have a Signature Pedagogy?

    Science.gov (United States)

    Earls Larrison, Tara; Korr, Wynne S.

    2013-01-01

    This article contributes to discourse on signature pedagogy by reconceptualizing how our pedagogies are understood and defined for social work education. We critique the view that field education is social work's signature pedagogy and consider what pedagogies are distinct about the teaching and learning of social work. Using Shulman's…

  12. Analysis of signature wrapping attacks and countermeasures

    DEFF Research Database (Denmark)

    Gajek, Sebastian; Jensen, Meiko; Liao, Lijun

    2009-01-01

    In recent research it turned out that Boolean verification, of digital signatures in the context of WSSecurity, is likely to fail: If parts of a SOAP message, are signed and the signature verification applied to, the whole document returns true, then nevertheless the, document may have been...

  13. 48 CFR 4.102 - Contractor's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Contractor's signature. 4.102 Section 4.102 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Contract Execution 4.102 Contractor's signature. (a) Individuals. A contract with an...

  14. One thousand years of fires: Integrating proxy and model data

    Directory of Open Access Journals (Sweden)

    Natalie Marie Kehrwald

    2016-04-01

    Full Text Available The current fires raging across Indonesia are emitting more carbon than the annual fossil fuel emissions of Germany or Japan, and the fires are still consuming vast tracts of rainforest and peatlands. The National Interagency Fire Center (www.nifc.gov notes that 2015 is one worst fire years on record in the U.S., where more than 9 million acres burned -- equivalent to the combined size of Massachusetts and New Jersey. The U.S. and Indonesian fires have already displaced tens of thousands of people, and their impacts on ecosystems are still unclear. In the case of Indonesia, the burning peat is destroying much of the existing soil, with unknown implications for the type of vegetation regrowth. Such large fires result from a combination of fire management practices, increasing anthropogenic land use, and a changing climate. The expected increase in fire activity in the upcoming decades has led to a surge in research trying to understand their causes, the factors that may have influenced similar times of fire activity in the past, and the implications of such fire activity in the future. Multiple types of complementary data provide information on the impacts of current fires and the extent of past fires. The wide array of data encompasses different spatial and temporal resolutions (Figure 1 and includes fire proxy information such as charcoal and tree ring fire scars, observational records, satellite products, modern emissions data, fire models within global land cover and vegetation models, and sociodemographic data for modeling past human land use and ignition frequency. Any single data type is more powerful when combined with another source of information. Merging model and proxy data enables analyses of how fire activity modifies vegetation distribution, air and water quality, and proximity to cities; these analyses in turn support land management decisions relating to conservation and development.

  15. Differences between Proxy and Patient Assessments of Cancer Care Experiences and Quality Ratings.

    Science.gov (United States)

    Roydhouse, Jessica K; Gutman, Roee; Keating, Nancy L; Mor, Vincent; Wilson, Ira B

    2018-04-01

    To assess the impact of proxy survey responses on cancer care experience reports and quality ratings. Secondary analysis of data from Cancer Care Outcomes Research and Surveillance (CanCORS). Recruitment occurred from 2003 to 2005. The study was a cross-sectional observational study. The respondents were patients with incident colorectal or lung cancer or their proxies. Analyses used linear regression models with an independent variable for proxy versus patient responses as well as study site and clinical covariates. The outcomes were experiences with medical care, nursing care, care coordination, and care quality rating. Multiple imputation was used for missing data. Among 6,471 respondents, 1,011 (16 percent) were proxies. The proportion of proxy respondents varied from 6 percent to 28 percent across study sites. Adjusted proxy scores were modestly higher for medical care experiences (+1.28 points [95 percent CI:+ 0.05 to +2.51]), but lower for nursing care (-2.81 [95 percent CI: -4.11 to -1.50]) and care coordination experiences (-2.98 [95 percent CI: -4.15 to -1.81]). There were no significant differences between adjusted patient and proxy ratings of quality. Proxy responses have small but statistically significant differences from patient responses. However, if ratings of care are used for financial incentives, such differences could be exaggerated across practices or areas if proxy use varies. © Health Research and Educational Trust.

  16. Novel proxies for reconstructing paleohydrology from ombrotrophic peatlands: biomarker and compound-specific H and C stable isotope ratios

    Science.gov (United States)

    Wang, J.; Nichols, J. E.; Huang, Y.

    2008-12-01

    Ombrotrophic peatlands are excellent archives for paleohydrologic information because they are hydrologically isolated from their surroundings. However, quantitative proxies for deciphering peatland archives are lacking. Here, we present development and application of novel organic geochemical methods for quantitative reconstruction of paleohydrology from the ombrotrophic sediments, and comparison of organic geochemical data with conventional paleoecological proxies. Application of these methods to the sediments of several North American and European peatlands has revealed significant changes in the hydroclimate throughout the Holocene. The plant assemblage living at the surface of the peatland is tightly controlled by surface moisture. Under wet conditions, Sphagnum mosses, with no active mechanism for drawing water from below the surface of the peatland, are dominant. During dry conditions, vascular plants are more productive relative to Sphagnum. A ratio of the abundance of two biomarkers representing Sphagnum and vascular plants sensitively records changes in hydrologic balance (Nichols et al., 2006, Org. Geochem. 37, 1505-1513). We have further developed stable isotope models to compute climate parameters from compound-specific H and C isotope ratios of biomarkers to create a more comprehensive climate reconstruction. Vascular plant leaf waxes carry the D/H ratio signature of precipitation that is little affected by evaporation, whereas the Sphagnum biomarker records isotopic ratios of the water at the peatland surface, which is strongly enriched by evaporation. Evaporation amount can be calculated using the differences between D/H ratios of the two types of biomarkers. C isotope ratios of Sphagnum biomarkers can also be used to quantify surface wetness. Methanotrophic bacteria live symbiotically with Sphagnum, providing isotopically light carbon for photosynthesis. These bacteria are more active when the Sphagnum is wet, thus providing more 13C-depleted CO2

  17. Extreme flood event reconstruction spanning the last century in the El Bibane Lagoon (southeastern Tunisia: a multi-proxy approach

    Directory of Open Access Journals (Sweden)

    A. Affouri

    2017-06-01

    Full Text Available Climate models project that rising atmospheric carbon dioxide concentrations will increase the frequency and the severity of some extreme weather events. The flood events represent a major risk for populations and infrastructures settled on coastal lowlands. Recent studies of lagoon sediments have enhanced our knowledge on extreme hydrological events such as palaeo-storms and on their relation with climate change over the last millennium. However, few studies have been undertaken to reconstruct past flood events from lagoon sediments. Here, the past flood activity was investigated using a multi-proxy approach combining sedimentological and geochemical analysis of surfaces sediments from a southeastern Tunisian catchment in order to trace the origin of sediment deposits in the El Bibane Lagoon. Three sediment sources were identified: marine, fluvial and aeolian. When applying this multi-proxy approach on core BL12-10, recovered from the El Bibane Lagoon, we can see that finer material, a high content of the clay and silt, and a high content of the elemental ratios (Fe ∕ Ca and Ti ∕ Ca characterise the sedimentological signature of the palaeo-flood levels identified in the lagoonal sequence. For the last century, which is the period covered by the BL12-10 short core, three palaeo-flood events were identified. The age of these flood events have been determined by 210Pb and 137Cs chronology and give ages of AD 1995 ± 6, 1970 ± 9 and 1945 ± 9. These results show a good temporal correlation with historical flood events recorded in southern Tunisia in the last century (AD 1932, 1969, 1979 and 1995. Our finding suggests that reconstruction of the history of the hydrological extreme events during the upper Holocene is possible in this location through the use of the sedimentary archives.

  18. Real time gamma-ray signature identifier

    Science.gov (United States)

    Rowland, Mark [Alamo, CA; Gosnell, Tom B [Moraga, CA; Ham, Cheryl [Livermore, CA; Perkins, Dwight [Livermore, CA; Wong, James [Dublin, CA

    2012-05-15

    A real time gamma-ray signature/source identification method and system using principal components analysis (PCA) for transforming and substantially reducing one or more comprehensive spectral libraries of nuclear materials types and configurations into a corresponding concise representation/signature(s) representing and indexing each individual predetermined spectrum in principal component (PC) space, wherein an unknown gamma-ray signature may be compared against the representative signature to find a match or at least characterize the unknown signature from among all the entries in the library with a single regression or simple projection into the PC space, so as to substantially reduce processing time and computing resources and enable real-time characterization and/or identification.

  19. DIGITAL SIGNATURE IN THE WAY OF LAW

    Directory of Open Access Journals (Sweden)

    Ruya Samlı

    2013-01-01

    Full Text Available Signature can be defined as a person’s name or special signs that he/she writes when he/she wants to indicate he/she wrote or confirm that writing. A person signs many times in his/her life. A person’s signature that is used for thousands of times for many things from formal documents to exams has importance for that person. Especially, signing in legal operations is an operation that can build important results. If a person’s signature is imitated by another person, he/she can become beholden, donate his/her whole wealth, commits offences or do some judicial operations. Today, because many operations can be done with digital environments and internet, signature operation that provides identity validation must also be carried to digital environment. In this paper digital signature concept that is approved for this reason and its situation in international areas and Turkish laws are investigated.

  20. Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Koprowski, Maciej

    2002-01-01

    not use any special properties of the group at hand. We prove an exponential lower bound on the generic complexity of root extraction, even if the algorithm can choose the public exponent itself. In other words, both the standard and the strong RSA assumption are provably true w.r.t. generic algorithms...... it in RSA groups without the original restriction that the modulus must be a product of safe primes. It can also be implemented in class groups. In all cases, security follows from a well defined complexity assumption (the strong root assumption), without relying on random oracles, and the assumption...

  1. A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things

    OpenAIRE

    Yeh, Kuo-Hui; Su, Chunhua; Choo, Kim-Kwang Raymond; Chiu, Wayne

    2017-01-01

    Rapid advances in wireless communications and pervasive computing technologies have resulted in increasing interest and popularity of Internet-of-Things (IoT) architecture, ubiquitously providing intelligence and convenience to our daily life. In IoT-based network environments, smart objects are embedded everywhere as ubiquitous things connected in a pervasive manner. Ensuring security for interactions between these smart things is significantly more important, and a topic of ongoing interest...

  2. A simple and robust method for connecting small-molecule drugs using gene-expression signatures

    Directory of Open Access Journals (Sweden)

    Gant Timothy W

    2008-06-01

    Full Text Available Abstract Background Interaction of a drug or chemical with a biological system can result in a gene-expression profile or signature characteristic of the event. Using a suitably robust algorithm these signatures can potentially be used to connect molecules with similar pharmacological or toxicological properties by gene expression profile. Lamb et al first proposed the Connectivity Map [Lamb et al (2006, Science 313, 1929–1935] to make successful connections among small molecules, genes, and diseases using genomic signatures. Results Here we have built on the principles of the Connectivity Map to present a simpler and more robust method for the construction of reference gene-expression profiles and for the connection scoring scheme, which importantly allows the valuation of statistical significance of all the connections observed. We tested the new method with two randomly generated gene signatures and three experimentally derived gene signatures (for HDAC inhibitors, estrogens, and immunosuppressive drugs, respectively. Our testing with this method indicates that it achieves a higher level of specificity and sensitivity and so advances the original method. Conclusion The method presented here not only offers more principled statistical procedures for testing connections, but more importantly it provides effective safeguard against false connections at the same time achieving increased sensitivity. With its robust performance, the method has potential use in the drug development pipeline for the early recognition of pharmacological and toxicological properties in chemicals and new drug candidates, and also more broadly in other 'omics sciences.

  3. Learning Global-Local Distance Metrics for Signature-Based Biometric Cryptosystems

    Directory of Open Access Journals (Sweden)

    George S. Eskander Ekladious

    2017-11-01

    Full Text Available Biometric traits, such as fingerprints, faces and signatures have been employed in bio-cryptosystems to secure cryptographic keys within digital security schemes. Reliable implementations of these systems employ error correction codes formulated as simple distance thresholds, although they may not effectively model the complex variability of behavioral biometrics like signatures. In this paper, a Global-Local Distance Metric (GLDM framework is proposed to learn cost-effective distance metrics, which reduce within-class variability and augment between-class variability, so that simple error correction thresholds of bio-cryptosystems provide high classification accuracy. First, a large number of samples from a development dataset are used to train a global distance metric that differentiates within-class from between-class samples of the population. Then, once user-specific samples are available for enrollment, the global metric is tuned to a local user-specific one. Proof-of-concept experiments on two reference offline signature databases confirm the viability of the proposed approach. Distance metrics are produced based on concise signature representations consisting of about 20 features and a single prototype. A signature-based bio-cryptosystem is designed using the produced metrics and has shown average classification error rates of about 7% and 17% for the PUCPR and the GPDS-300 databases, respectively. This level of performance is comparable to that obtained with complex state-of-the-art classifiers.

  4. Good governance for pension schemes

    CERN Document Server

    Thornton, Paul

    2011-01-01

    Regulatory and market developments have transformed the way in which UK private sector pension schemes operate. This has increased demands on trustees and advisors and the trusteeship governance model must evolve in order to remain fit for purpose. This volume brings together leading practitioners to provide an overview of what today constitutes good governance for pension schemes, from both a legal and a practical perspective. It provides the reader with an appreciation of the distinctive characteristics of UK occupational pension schemes, how they sit within the capital markets and their social and fiduciary responsibilities. Providing a holistic analysis of pension risk, both from the trustee and the corporate perspective, the essays cover the crucial role of the employer covenant, financing and investment risk, developments in longevity risk hedging and insurance de-risking, and best practice scheme administration.

  5. Optimum RA reactor fuelling scheme

    International Nuclear Information System (INIS)

    Strugar, P.; Nikolic, V.

    1965-10-01

    Ideal reactor refueling scheme can be achieved only by continuous fuel elements movement in the core, which is not possible, and thus approximations are applied. One of the possible approximations is discontinuous movement of fuel elements groups in radial direction. This enables higher burnup especially if axial exchange is possible. Analysis of refueling schemes in the RA reactor core and schemes with mixing the fresh and used fuel elements show that 30% higher burnup can be achieved by applying mixing, and even 40% if reactivity due to decrease in experimental space is taken into account. Up to now, mean burnup of 4400 MWd/t has been achieved, and the proposed fueling scheme with reduction of experimental space could achieve mean burnup of 6300 MWd/t which means about 25 Mwd/t per fuel channel [sr

  6. A Novel Iris Segmentation Scheme

    Directory of Open Access Journals (Sweden)

    Chen-Chung Liu

    2014-01-01

    Full Text Available One of the key steps in the iris recognition system is the accurate iris segmentation from its surrounding noises including pupil, sclera, eyelashes, and eyebrows of a captured eye-image. This paper presents a novel iris segmentation scheme which utilizes the orientation matching transform to outline the outer and inner iris boundaries initially. It then employs Delogne-Kåsa circle fitting (instead of the traditional Hough transform to further eliminate the outlier points to extract a more precise iris area from an eye-image. In the extracted iris region, the proposed scheme further utilizes the differences in the intensity and positional characteristics of the iris, eyelid, and eyelashes to detect and delete these noises. The scheme is then applied on iris image database, UBIRIS.v1. The experimental results show that the presented scheme provides a more effective and efficient iris segmentation than other conventional methods.

  7. Numerical schemes for explosion hazards

    International Nuclear Information System (INIS)

    Therme, Nicolas

    2015-01-01

    In nuclear facilities, internal or external explosions can cause confinement breaches and radioactive materials release in the environment. Hence, modeling such phenomena is crucial for safety matters. Blast waves resulting from explosions are modeled by the system of Euler equations for compressible flows, whereas Navier-Stokes equations with reactive source terms and level set techniques are used to simulate the propagation of flame front during the deflagration phase. The purpose of this thesis is to contribute to the creation of efficient numerical schemes to solve these complex models. The work presented here focuses on two major aspects: first, the development of consistent schemes for the Euler equations, then the buildup of reliable schemes for the front propagation. In both cases, explicit in time schemes are used, but we also introduce a pressure correction scheme for the Euler equations. Staggered discretization is used in space. It is based on the internal energy formulation of the Euler system, which insures its positivity and avoids tedious discretization of the total energy over staggered grids. A discrete kinetic energy balance is derived from the scheme and a source term is added in the discrete internal energy balance equation to preserve the exact total energy balance at the limit. High order methods of MUSCL type are used in the discrete convective operators, based solely on material velocity. They lead to positivity of density and internal energy under CFL conditions. This ensures that the total energy cannot grow and we can furthermore derive a discrete entropy inequality. Under stability assumptions of the discrete L8 and BV norms of the scheme's solutions one can prove that a sequence of converging discrete solutions necessarily converges towards the weak solution of the Euler system. Besides it satisfies a weak entropy inequality at the limit. Concerning the front propagation, we transform the flame front evolution equation (the so called

  8. Breeding schemes in reindeer husbandry

    Directory of Open Access Journals (Sweden)

    Lars Rönnegård

    2003-04-01

    Full Text Available The objective of the paper was to investigate annual genetic gain from selection (G, and the influence of selection on the inbreeding effective population size (Ne, for different possible breeding schemes within a reindeer herding district. The breeding schemes were analysed for different proportions of the population within a herding district included in the selection programme. Two different breeding schemes were analysed: an open nucleus scheme where males mix and mate between owner flocks, and a closed nucleus scheme where the males in non-selected owner flocks are culled to maximise G in the whole population. The theory of expected long-term genetic contributions was used and maternal effects were included in the analyses. Realistic parameter values were used for the population, modelled with 5000 reindeer in the population and a sex ratio of 14 adult females per male. The standard deviation of calf weights was 4.1 kg. Four different situations were explored and the results showed: 1. When the population was randomly culled, Ne equalled 2400. 2. When the whole population was selected on calf weights, Ne equalled 1700 and the total annual genetic gain (direct + maternal in calf weight was 0.42 kg. 3. For the open nucleus scheme, G increased monotonically from 0 to 0.42 kg as the proportion of the population included in the selection programme increased from 0 to 1.0, and Ne decreased correspondingly from 2400 to 1700. 4. In the closed nucleus scheme the lowest value of Ne was 1300. For a given proportion of the population included in the selection programme, the difference in G between a closed nucleus scheme and an open one was up to 0.13 kg. We conclude that for mass selection based on calf weights in herding districts with 2000 animals or more, there are no risks of inbreeding effects caused by selection.

  9. 48 CFR 804.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... signature. 804.101 Section 804.101 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS GENERAL ADMINISTRATIVE MATTERS Contract Execution 804.101 Contracting officer's signature. (a) If a... signature. ...

  10. Maximizing biomarker discovery by minimizing gene signatures

    Directory of Open Access Journals (Sweden)

    Chang Chang

    2011-12-01

    Full Text Available Abstract Background The use of gene signatures can potentially be of considerable value in the field of clinical diagnosis. However, gene signatures defined with different methods can be quite various even when applied the same disease and the same endpoint. Previous studies have shown that the correct selection of subsets of genes from microarray data is key for the accurate classification of disease phenotypes, and a number of methods have been proposed for the purpose. However, these methods refine the subsets by only considering each single feature, and they do not confirm the association between the genes identified in each gene signature and the phenotype of the disease. We proposed an innovative new method termed Minimize Feature's Size (MFS based on multiple level similarity analyses and association between the genes and disease for breast cancer endpoints by comparing classifier models generated from the second phase of MicroArray Quality Control (MAQC-II, trying to develop effective meta-analysis strategies to transform the MAQC-II signatures into a robust and reliable set of biomarker for clinical applications. Results We analyzed the similarity of the multiple gene signatures in an endpoint and between the two endpoints of breast cancer at probe and gene levels, the results indicate that disease-related genes can be preferably selected as the components of gene signature, and that the gene signatures for the two endpoints could be interchangeable. The minimized signatures were built at probe level by using MFS for each endpoint. By applying the approach, we generated a much smaller set of gene signature with the similar predictive power compared with those gene signatures from MAQC-II. Conclusions Our results indicate that gene signatures of both large and small sizes could perform equally well in clinical applications. Besides, consistency and biological significances can be detected among different gene signatures, reflecting the

  11. A Scheme for Verification on Data Integrity in Mobile Multicloud Computing Environment

    Directory of Open Access Journals (Sweden)

    Laicheng Cao

    2016-01-01

    Full Text Available In order to verify the data integrity in mobile multicloud computing environment, a MMCDIV (mobile multicloud data integrity verification scheme is proposed. First, the computability and nondegeneracy of verification can be obtained by adopting BLS (Boneh-Lynn-Shacham short signature scheme. Second, communication overhead is reduced based on HVR (Homomorphic Verifiable Response with random masking and sMHT (sequence-enforced Merkle hash tree construction. Finally, considering the resource constraints of mobile devices, data integrity is verified by lightweight computing and low data transmission. The scheme improves shortage that mobile device communication and computing power are limited, it supports dynamic data operation in mobile multicloud environment, and data integrity can be verified without using direct source file block. Experimental results also demonstrate that this scheme can achieve a lower cost of computing and communications.

  12. Genomic Signatures of Sexual Conflict.

    Science.gov (United States)

    Kasimatis, Katja R; Nelson, Thomas C; Phillips, Patrick C

    2017-10-30

    Sexual conflict is a specific class of intergenomic conflict that describes the reciprocal sex-specific fitness costs generated by antagonistic reproductive interactions. The potential for sexual conflict is an inherent property of having a shared genome between the sexes and, therefore, is an extreme form of an environment-dependent fitness effect. In this way, many of the predictions from environment-dependent selection can be used to formulate expected patterns of genome evolution under sexual conflict. However, the pleiotropic and transmission constraints inherent to having alleles move across sex-specific backgrounds from generation to generation further modulate the anticipated signatures of selection. We outline methods for detecting candidate sexual conflict loci both across and within populations. Additionally, we consider the ability of genome scans to identify sexually antagonistic loci by modeling allele frequency changes within males and females due to a single generation of selection. In particular, we highlight the need to integrate genotype, phenotype, and functional information to truly distinguish sexual conflict from other forms of sexual differentiation. © The American Genetic Association 2017. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  13. Transcriptomic signatures in cartilage ageing

    Science.gov (United States)

    2013-01-01

    Introduction Age is an important factor in the development of osteoarthritis. Microarray studies provide insight into cartilage aging but do not reveal the full transcriptomic phenotype of chondrocytes such as small noncoding RNAs, pseudogenes, and microRNAs. RNA-Seq is a powerful technique for the interrogation of large numbers of transcripts including nonprotein coding RNAs. The aim of the study was to characterise molecular mechanisms associated with age-related changes in gene signatures. Methods RNA for gene expression analysis using RNA-Seq and real-time PCR analysis was isolated from macroscopically normal cartilage of the metacarpophalangeal joints of eight horses; four young donors (4 years old) and four old donors (>15 years old). RNA sequence libraries were prepared following ribosomal RNA depletion and sequencing was undertaken using the Illumina HiSeq 2000 platform. Differentially expressed genes were defined using Benjamini-Hochberg false discovery rate correction with a generalised linear model likelihood ratio test (P ageing cartilage. Conclusion There was an age-related dysregulation of matrix, anabolic and catabolic cartilage factors. This study has increased our knowledge of transcriptional networks in cartilage ageing by providing a global view of the transcriptome. PMID:23971731

  14. Optical Signature Analysis of Tumbling Rocket Bodies via Laboratory Measurements

    Science.gov (United States)

    Cowardin, H.; Lederer, S.; Liou, J.-C.; Ojakangas, G.; Mulrooney, M.

    2012-09-01

    The NASA Orbital Debris Program Office has acquired telescopic lightcurve data on massive intact objects, specifically spent rocket bodies (R/Bs), to ascertain tumble rates in support of the Active Debris Removal (ADR) studies to help remediate the LEO environment. Tumble rates are needed to plan and develop proximity and docking operations for potential future ADR operations. To better characterize and model optical data acquired from ground-based telescopes, the Optical Measurements Center (OMC) at NASA/JSC emulates illumination conditions in space using equipment and techniques that parallel telescopic observations and source-target-sensor orientations. The OMC employs a 75-W Xenon arc lamp as a solar simulator, an SBIG CCD camera with standard Johnson/Bessel filters, and a robotic arm to simulate an object's position and rotation. The OMC does not attempt to replicate the rotation rates, but focuses on ascertaining how an object is rotating as seen from multiple phase angles. The two targets studied are scaled (1:48) SL-8 Cosmos 3M second stages. The first target is painted in the standard Russian government "gray" scheme and the second target is white/orange as used for commercial missions. This paper summarizes results of the two scaled rocket bodies, each observed in three independent rotation states: (a) spin-stabilized rotation (about the long axis), (b) end-over-end rotation, and (c) a 10 degree wobble about the center of mass. The first two cases represent simple spin about either primary axis. The third - what we call "wobble" - represents maximum principal axis rotation, with an inertia tensor that is offset from the symmetry axes. By comparing the resultant phase and orientation-dependent laboratory signatures with actual lightcurves derived from telescopic observations of orbiting R/Bs, we intend to assess the intrinsic R/B rotation states. In the simplest case, simulated R/B behavior coincides with principal axis spin states, while more complex R

  15. 47 CFR 51.513 - Proxies for forward-looking economic cost.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Proxies for forward-looking economic cost. 51... SERVICES (CONTINUED) INTERCONNECTION Pricing of Elements § 51.513 Proxies for forward-looking economic cost... a cost study that complies with the forward-looking economic cost based pricing methodology...

  16. An ethical analysis of proxy and waiver of consent in critical care research

    DEFF Research Database (Denmark)

    Berg, Ronan M G; Møller, Kirsten; Rossel, Peter J. Hancke

    2013-01-01

    It is a central principle in medical ethics that vulnerable patients are entitled to a degree of protection that reflects their vulnerability. In critical care research, this protection is often established by means of so-called proxy consent. Proxy consent for research participation constitutes...

  17. Testing the timing of radiocarbon-dated events between proxy archives

    NARCIS (Netherlands)

    Christen, J. A.; Mauquoy, D.; van der Plicht, J.; Bennett, K. D.; Blaauw, Maarten

    For interpreting past changes on a regional or global scale, the timings of proxy-inferred events are usually aligned with data from other locations. However, too often chronological uncertainties are ignored in proxy diagrams and multisite comparisons, making it possible for researchers to fall

  18. Proxy support for service discovery using mDNS/DNS-SD in low power networks

    NARCIS (Netherlands)

    Stolikj, M.; Verhoeven, R.; Cuijpers, P.J.L.; Lukkien, J.J.

    2014-01-01

    We present a solution for service discovery of resource constrained devices based on mDNS/DNS-SD. We extend the mDNS/DNS-SD service discovery protocol with support for proxy servers. Proxy servers temporarily store information about services offered on resource constrained devices and respond on

  19. Mixtures of Gaussians for uncertainty description in bivariate latent heat flux proxies

    NARCIS (Netherlands)

    Wójcik, R.; Troch, P.A.A.; Stricker, J.N.M.; Torfs, P.J.J.F.

    2006-01-01

    This paper proposes a new probabilistic approach for describing uncertainty in the ensembles of latent heat flux proxies. The proxies are obtained from hourly Bowen ratio and satellite-derived measurements, respectively, at several locations in the southern Great Plains region in the United States.

  20. Architecture of a bi-directional Bluetooth-UPnP proxy

    NARCIS (Netherlands)

    Delphinanto, A.; Lukkien, J.J.; Koonen, A.M.J.; Hartog, F.T.H. den; Madureira, A.J.P.S.; Niemegeers, I.G.M.M.; Selgert, F.

    2007-01-01

    The current service- and device discovery protocols are not platform- and network independent Therefore, proxy servers will be needed to extend the range of IP-based discovery protocols to non-IP domains. We developed an architecture of a proxy that enables UPnP devices and services to be discovered

  1. Reduction of a Ship's Magnetic Field Signatures

    CERN Document Server

    Holmes, John

    2008-01-01

    Decreasing the magnetic field signature of a naval vessel will reduce its susceptibility to detonating naval influence mines and the probability of a submarine being detected by underwater barriers and maritime patrol aircraft. Both passive and active techniques for reducing the magnetic signatures produced by a vessel's ferromagnetism, roll-induced eddy currents, corrosion-related sources, and stray fields are presented. Mathematical models of simple hull shapes are used to predict the levels of signature reduction that might be achieved through the use of alternate construction materials. Al

  2. Molecular signatures of thyroid follicular neoplasia

    DEFF Research Database (Denmark)

    Borup, R.; Rossing, M.; Henao, Ricardo

    2010-01-01

    The molecular pathways leading to thyroid follicular neoplasia are incompletely understood, and the diagnosis of follicular tumors is a clinical challenge. To provide leads to the pathogenesis and diagnosis of the tumors, we examined the global transcriptome signatures of follicular thyroid...... a mechanism for cancer progression, which is why we exploited the results in order to generate a molecular classifier that could identify 95% of all carcinomas. Validation employing public domain and cross-platform data demonstrated that the signature was robust and could diagnose follicular nodules...... and robust genetic signature for the diagnosis of FA and FC. Endocrine-Related Cancer (2010) 17 691-708...

  3. DIGITAL SIGNATURE IN THE WAY OF LAW

    OpenAIRE

    Ruya Samlı

    2013-01-01

    Signature can be defined as a person’s name or special signs that he/she writes when he/she wants to indicate he/she wrote or confirm that writing. A person signs many times in his/her life. A person’s signature that is used for thousands of times for many things from formal documents to exams has importance for that person. Especially, signing in legal operations is an operation that can build important results. If a person’s signature is imitated by another person, he/she can be...

  4. Signatures of flipped SU(5)

    Energy Technology Data Exchange (ETDEWEB)

    Abel, S.A. (Bristol Univ. (UK). H.H. Wills Physics Lab.); Whittingham, I. (James Cook Univ. of North Queensland, Townsville (Australia). Dept. of Physics)

    1990-02-22

    We examine the electric dipole moment of the neutron and flavour changing Z decays in the flipped SU(5) grand unification scheme. We find that the new couplings at energy scales above M{sub GUT} can lead to neutron electric dipole moments vertical strokedvertical stroke{approx equal} 10{sup -25} e cm and decays of the form Z{yields}banti s, santi b with a branching ratio Bsub(Z{yields}banti s,santi b) {approx equal} 10{sup -6}, of which a large proportion ({epsilon}{le}1/4) may be CP violating. The first two effects are found to be slightly suppressed in the currently popular no-scale theories, but the CP violation parameter, {epsilon}, is relatively theory independent. (orig.).

  5. Design, Implementation, and Performance Evaluation of Efficient PMIPv6 Based Mobile Multicast Sender Support Schemes

    Directory of Open Access Journals (Sweden)

    Lili Wang

    2015-01-01

    Full Text Available Proxy Mobile IPv6 (PMIPv6 is proposed as a promising network-based mobility management protocol, which does not need any participation of mobile nodes. PMIPv6 does not support the multicast well and most of the current research concentrates on the mobile multicast receiver. However, the mobile multicast sender is also very important and challenging, which has not been addressed well. Therefore, in this paper we propose two efficient PMIPv6 based mobile multicast sender support schemes which are PMIP bidirectional tunneling (PMIP-BT and PMIP direct routing (PMIP-DR. In the PMIP-BT, the multicast traffic can be delivered through the PMIPv6 bidirectional tunnel, while, in the PMIP-DR, the multicast data can be transmitted via an optimized direct multicast routing. Both of them can support the multicast sender mobility transparently enabled in the PMIPv6 networks. We evaluate the performance of the proposed schemes by theoretical analysis, and the numerical results show that the proposed schemes have a better performance in terms of the signaling cost than the current schemes. Meanwhile, the proposed schemes are also implemented on the test bed, and the experimental results not only verify the validity and feasibility of our proposed schemes, but also conclude the different scenarios to which they are applicable.

  6. Pseudo-proxy evaluation of climate field reconstruction methods of North Atlantic climate based on an annually resolved marine proxy network

    Directory of Open Access Journals (Sweden)

    M. Pyrina

    2017-10-01

    Full Text Available Two statistical methods are tested to reconstruct the interannual variations in past sea surface temperatures (SSTs of the North Atlantic (NA Ocean over the past millennium based on annually resolved and absolutely dated marine proxy records of the bivalve mollusk Arctica islandica. The methods are tested in a pseudo-proxy experiment (PPE setup using state-of-the-art climate models (CMIP5 Earth system models and reanalysis data from the COBE2 SST data set. The methods were applied in the virtual reality provided by global climate simulations and reanalysis data to reconstruct the past NA SSTs using pseudo-proxy records that mimic the statistical characteristics and network of Arctica islandica. The multivariate linear regression methods evaluated here are principal component regression and canonical correlation analysis. Differences in the skill of the climate field reconstruction (CFR are assessed according to different calibration periods and different proxy locations within the NA basin. The choice of the climate model used as a surrogate reality in the PPE has a more profound effect on the CFR skill than the calibration period and the statistical reconstruction method. The differences between the two methods are clearer for the MPI-ESM model due to its higher spatial resolution in the NA basin. The pseudo-proxy results of the CCSM4 model are closer to the pseudo-proxy results based on the reanalysis data set COBE2. Conducting PPEs using noise-contaminated pseudo-proxies instead of noise-free pseudo-proxies is important for the evaluation of the methods, as more spatial differences in the reconstruction skill are revealed. Both methods are appropriate for the reconstruction of the temporal evolution of the NA SSTs, even though they lead to a great loss of variance away from the proxy sites. Under reasonable assumptions about the characteristics of the non-climate noise in the proxy records, our results show that the marine network of Arctica

  7. Limiting exercise options: depending on a proxy may inhibit exercise self-management.

    Science.gov (United States)

    Shields, Christopher A; Brawley, Lawrence R

    2007-07-01

    We examined the influence of proxy-assistance on exercisers' social cognitions and behavior. Fifty-six fitness class participants reported preference for proxy-assistance and reacted to exercising in different contexts. A 2 (proxy-led vs self-managed exercise context) by 2 (preferred assistance) MANOVA revealed significant assistance by context interactions for self-regulatory efficacy (SRE) and difficulty. Regarding self-managed exercise, high-assistance individuals expressed lower SRE and higher difficulty. Chi-square analysis revealed that significantly fewer high-assistance participants chose self-managed exercise. A one-way MANOVA on preferred assistance indicated that high-assistance participants were less confident, satisfied and perceived their self-managed exercise as more difficult. Results support Bandura's theorizing that use of a proxy can limit SRE of those preferring the proxy's control of their behavior.

  8. Host, family and community proxies for infections potentially associated with leukaemia

    International Nuclear Information System (INIS)

    Law, G. R.

    2008-01-01

    Three hypotheses have proposed the involvement of infections in the aetiology of childhood leukaemia, suggesting either a specific leukemogenic infection or a series of common infections that lead to a dys-regulation of the immune system. Much of the evidence for the link with infections has been based on epidemiological observations, often using proxy measures of infection. Proxy measures include population mixing, parental occupation, age distribution of incidence, spatial and space-time clustering of cases, birth order and day care during infancy. This paper discusses the proxies used and examines to what extent a commonly used proxy measure, birth order, is a fair representation of either specific infections or general infectious load. It is clear that although leukaemia, and other diseases, may be linked with infections, one needs to (1) measure specific and general infections with more accuracy and (2) understand how proxy measures relate to real infections in the population. (authors)

  9. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad; Alnuweiri, Hussein M.; Alouini, Mohamed-Slim

    2012-01-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  10. Nonlinear secret image sharing scheme.

    Science.gov (United States)

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.

  11. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad

    2012-09-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  12. Validation and application of a death proxy in adult cancer patients.

    Science.gov (United States)

    Mealing, Nicole M; Dobbins, Timothy A; Pearson, Sallie-Anne

    2012-07-01

    PURPOSE: Fact of death is not always available on data sets used for pharmacoepidemiological research. Proxies may be an appropriate substitute in the absence of death data. The purposes of this study were to validate a proxy for death in adult cancer patients and to assess its performance when estimating survival in two cohorts of cancer patients. METHODS: We evaluated 30-, 60-, 90- and 180-day proxies overall and by cancer type using data from 12 394 Australian veterans with lung, colorectal, breast or prostate cancer. The proxy indicated death if the difference between the last dispensing record and the end of the observational period exceeded the proxy cutoff. We then compared actual survival to 90-day proxy estimates in a subset of 4090 veterans with 'full entitlements' for pharmaceutical items and in 3704 Australian women receiving trastuzumab for HER2+ metastatic breast cancer. RESULTS: The 90-day proxy was optimal with an overall sensitivity of 99.3% (95%CI: 98.4-99.7) and a specificity of 97.6% (95%CI: 91.8-99.4). These measures remained high when evaluated by cancer type and spread of disease. The application of the proxy using the most conservative date of death estimate (date of last dispensing) generally underestimated survival, with estimates up to 3 months shorter than survival based on fact of death. CONCLUSIONS: A 90-day death proxy is a robust substitute to identify death in a chronic population when fact of death is not available. The proxy is likely to be valid across a range of chronic diseases as it relies on the presence of 'regular' dispensing records for individual patients. Copyright © 2011 John Wiley & Sons, Ltd. Copyright © 2011 John Wiley & Sons, Ltd.

  13. Cognitive-Behavioral Therapy for Body Dysmorphic Disorder by Proxy.

    Science.gov (United States)

    Greenberg, Jennifer L; Mothi, Suraj Sarvode; Wilhelm, Sabine

    2016-07-01

    Body dysmorphic disorder (BDD) is a distressing or impairing preoccupation with a perceived defect in physical appearance. BDD by proxy (BDDBP) is a significant but understudied variant of BDD in which the primary preoccupation involves perceived imperfections of another person. Like BDD, individuals with BDDBP engage in time-consuming rituals to "fix" the other person's appearance or alleviate distress. Avoidance is common and the impact of BDDBP on social functioning is profound. Cognitive-behavioral therapy (CBT) is the best-studied and most promising psychological treatment for BDD, but no studies have examined its generalizability to the BDDBP variant. We tested feasibility, acceptability, and treatment outcome of CBT modified for BDDBP in a sample of 6 adults with primary BDDBP. Treatment was delivered in weekly individual sessions over 12-20weeks. Mean symptom severity (BDDBP-YBOCS) dropped from the moderately severe range at pretreatment to the subclinical range at posttreatment, t(6)=10.7, p<.001, d=3.3. One hundred percent of treatment completers were responders (≥30% reduction in BDDBP-YBOCS). Insight also improved. Treatment gains were maintained at 3-month follow-up. To our knowledge, this represents the first treatment study for BDDBP. Copyright © 2016. Published by Elsevier Ltd.

  14. Magnetic susceptibility: a proxy method of estimating increased pollution

    International Nuclear Information System (INIS)

    Kluciarova, D.; Gregorova, D.; Tunyi, I.

    2004-01-01

    A need for rapid and inexpensive (proxy) methods of outlining areas exposed to increased pollution by atmospheric particulates of industrial origin caused scientists in various fields to use and validate different non-traditional (or non-chemical) techniques. Among them, soil magnetometry seems to be a suitable tool. This method is based on the knowledge that ferrimagnetic particles, namely magnetite, are produced from pyrite during combustion of fossil fuel. Besides the combustion processes, magnetic particles can also originate from road traffic, for example, or can be included in various waste-water outlets. In our study we examine the magnetic susceptibility as a convenient measure of determining the concentration of (ferri) magnetic minerals by rapid and non-destructive means. We used for measure KLY-2 Kappabridge. Concentration of ferrimagnetic minerals in different soils is linked to pollution sources. Higher χ values were observed in soils on the territory in Istebne (47383x10 -6 SI ). The susceptibility anomaly may be caused by particular geological circumstances and can be related to high content of ferromagnetic minerals in the host rocks. Positive correlation of magnetic susceptibility are conditioned by industrial contamination mainly by metal working factories and by traffic. The proposed method can be successfully applied in determining heavy metal pollution of soils on the city territories. (authors)

  15. Medieval Horse Stable; The Results of Multi Proxy Interdisciplinary Research

    Science.gov (United States)

    Dejmal, Miroslav; Lisá, Lenka; Fišáková Nývltová, Miriam; Bajer, Aleš; Petr, Libor; Kočár, Petr; Kočárová, Romana; Nejman, Ladislav; Rybníček, Michal; Sůvová, Zdenka; Culp, Randy; Vavrčík, Hanuš

    2014-01-01

    A multi proxy approach was applied in the reconstruction of the architecture of Medieval horse stable architecture, the maintenance practices associated with that structure as well as horse alimentation at the beginning of 13th century in Central Europe. Finally, an interpretation of the local vegetation structure along Morava River, Czech Republic is presented. The investigated stable experienced two construction phases. The infill was well preserved and its composition reflects maintenance practices. The uppermost part of the infill was composed of fresh stabling, which accumulated within a few months at the end of summer. Horses from different backgrounds were kept in the stable and this is reflected in the results of isotope analyses. Horses were fed meadow grasses as well as woody vegetation, millet, oat, and less commonly hemp, wheat and rye. Three possible explanations of stable usage are suggested. The stable was probably used on a temporary basis for horses of workers employed at the castle, courier horses and horses used in battle. PMID:24670874

  16. Identification of climatic state with limited proxy data

    Directory of Open Access Journals (Sweden)

    J. D. Annan

    2012-07-01

    Full Text Available We investigate the identifiability of the climate by limited proxy data. We test a data assimilation approach through perfect model pseudoproxy experiments, using a simple likelihood-based weighting based on the particle filtering process. Our experimental set-up enables us to create a massive 10 000-member ensemble at modest computational cost, thus enabling us to generate statistically robust results. We find that the method works well when data are sparse and imprecise, but in this case the reconstruction has a rather low accuracy as indicated by residual RMS errors. Conversely, when data are relatively plentiful and accurate, the estimate tracks the target closely, at least when considering the hemispheric mean. However, in this case, our prior ensemble size of 10 000 appears to be inadequate to correctly represent the true posterior, and the regional performance is poor. Using correlations to assess performance gives a more encouraging picture, with significant correlations ranging from about 0.3 when data are sparse to values over 0.7 when data are plentiful, but the residual RMS errors are substantial in all cases. Our results imply that caution is required in interpreting climate reconstructions, especially when considering the regional scale, as skill on this basis is markedly lower than on the large scale of hemispheric mean temperature.

  17. Music Therapy by Proxy: Using Humanised Images in Song

    Directory of Open Access Journals (Sweden)

    Carol Chambers

    2013-07-01

    Full Text Available Developing awareness, exploration and expression of emotionally sensitive issues can be difficult for some clients in music therapy. They may find it hard to express emotion through improvised music and may turn instead to the perceived security of the repetition of known songs.This paper presents the results from a completed research PhD, a qualitative case study based on naturalistic clinical practice, which examined the song choices of one woman in a medium-secure forensic unit over the three-year course of her music therapy. A descriptive narrative account was subjected to analysis according to a modified form of therapeutic narrative analysis (Aldridge and Aldridge 2002, resulting in the abstraction of a series of generative metaphoric images, framed within a chronological series of events. Crucially, these images were found to be humanised figures, yet they were also emotionally decentred or depersonalised. When approached from the philosophical and methodological perspective of behaviourism, which views these as conditioned responses associating music with life experiences as part of a process of developing self-identity, such images can be seen to provide an unspoken voice for the client’s feelings to be expressed in a manner that is personally revealing, socially acceptable, culturally accessible and therapeutically constructive.I assert that using these third-person characters as a form of proxy facilitates mutual reference and experimentation, and places music firmly at the heart of a socially constructed process of music therapy.

  18. Solar radio proxies for improved satellite orbit prediction

    Science.gov (United States)

    Yaya, Philippe; Hecker, Louis; Dudok de Wit, Thierry; Fèvre, Clémence Le; Bruinsma, Sean

    2017-12-01

    Specification and forecasting of solar drivers to thermosphere density models is critical for satellite orbit prediction and debris avoidance. Satellite operators routinely forecast orbits up to 30 days into the future. This requires forecasts of the drivers to these orbit prediction models such as the solar Extreme-UV (EUV) flux and geomagnetic activity. Most density models use the 10.7 cm radio flux (F10.7 index) as a proxy for solar EUV. However, daily measurements at other centimetric wavelengths have also been performed by the Nobeyama Radio Observatory (Japan) since the 1950's, thereby offering prospects for improving orbit modeling. Here we present a pre-operational service at the Collecte Localisation Satellites company that collects these different observations in one single homogeneous dataset and provides a 30 days forecast on a daily basis. Interpolation and preprocessing algorithms were developed to fill in missing data and remove anomalous values. We compared various empirical time series prediction techniques and selected a multi-wavelength non-recursive analogue neural network. The prediction of the 30 cm flux, and to a lesser extent that of the 10.7 cm flux, performs better than NOAA's present prediction of the 10.7 cm flux, especially during periods of high solar activity. In addition, we find that the DTM-2013 density model (Drag Temperature Model) performs better with (past and predicted) values of the 30 cm radio flux than with the 10.7 flux.

  19. Magnetic Signature of Brushless Electric Motors

    National Research Council Canada - National Science Library

    Clarke, David

    2006-01-01

    Brushless electric motors are used in a number of underwater vehicles. When these underwater vehicles are used for mine clearance operations the magnetic signature of the brushless motors is important...

  20. Magnetic signature surveillance of nuclear fuel

    International Nuclear Information System (INIS)

    Bernatowicz, H.; Schoenig, F.C.

    1981-01-01

    Typical nuclear fuel material contains tramp ferromagnetic particles of random size and distribution. Also, selected amounts of paramagnetic or ferromagnetic material can be added at random or at known positions in the fuel material. The fuel material in its non-magnetic container is scanned along its length by magnetic susceptibility detecting apparatus whereby susceptibility changes along its length are obtained and provide a unique signal waveform of the container of fuel material as a signature thereof. The output signature is stored. At subsequent times in its life the container is again scanned and respective signatures obtained which are compared with the initially obtained signature, any differences indicating alteration or tampering with the fuel material. If the fuel material includes a paramagnetic additive by taking two measurements along the container the effects thereof can be cancelled out. (author)

  1. Signature for the shape of the universe

    International Nuclear Information System (INIS)

    Gomero, G.I.; Reboucas, M.J.; Teixeira, A.F.F.

    2001-03-01

    If the universe has a nontrival shape (topology) the sky may show multiple correlated images of cosmic objects. These correlations can be counched in terms of distance correlations. We propose a statistical quantity which can be used to reveal the topological signature of any Roberston-Walker (RW) spacetime with nontrivial topology. We also show through computer-aided simulations how one can extract the topological signatures of flat elliptic and hyperbolic RW universes with nontrivial topology. (author)

  2. Signature-based store checking buffer

    Science.gov (United States)

    Sridharan, Vilas; Gurumurthi, Sudhanva

    2015-06-02

    A system and method for optimizing redundant output verification, are provided. A hardware-based store fingerprint buffer receives multiple instances of output from multiple instances of computation. The store fingerprint buffer generates a signature from the content included in the multiple instances of output. When a barrier is reached, the store fingerprint buffer uses the signature to verify the content is error-free.

  3. Neutral signature Walker-VSI metrics

    International Nuclear Information System (INIS)

    Coley, A; McNutt, D; Musoke, N; Brooks, D; Hervik, S

    2014-01-01

    We will construct explicit examples of four-dimensional neutral signature Walker (but not necessarily degenerate Kundt) spaces for which all of the polynomial scalar curvature invariants vanish. We then investigate the properties of some particular subclasses of Ricci flat spaces. We also briefly describe some four-dimensional neutral signature Einstein spaces for which all of the polynomial scalar curvature invariants are constant. (paper)

  4. Electrical Injection Schemes for Nanolasers

    DEFF Research Database (Denmark)

    Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten

    2014-01-01

    Three electrical injection schemes based on recently demonstrated electrically pumped photonic crystal nanolasers have been numerically investigated: 1) a vertical p-i-n junction through a post structure; 2) a lateral p-i-n junction with a homostructure; and 3) a lateral p-i-n junction....... For this analysis, the properties of different schemes, i.e., electrical resistance, threshold voltage, threshold current, and internal efficiency as energy requirements for optical interconnects are compared and the physics behind the differences is discussed....

  5. Signal multiplexing scheme for LINAC

    International Nuclear Information System (INIS)

    Sujo, C.I.; Mohan, Shyam; Joshi, Gopal; Singh, S.K.; Karande, Jitendra

    2004-01-01

    For the proper operation of the LINAC some signals, RF (radio frequency) as well as LF (low frequency) have to be available at the Master Control Station (MCS). These signals are needed to control, calibrate and characterize the RF fields in the resonators. This can be achieved by proper multiplexing of various signals locally and then routing the selected signals to the MCS. A multiplexing scheme has been designed and implemented, which will allow the signals from the selected cavity to the MCS. High isolation between channels and low insertion loss for a given signal are important issues while selecting the multiplexing scheme. (author)

  6. Capacity-achieving CPM schemes

    OpenAIRE

    Perotti, Alberto; Tarable, Alberto; Benedetto, Sergio; Montorsi, Guido

    2008-01-01

    The pragmatic approach to coded continuous-phase modulation (CPM) is proposed as a capacity-achieving low-complexity alternative to the serially-concatenated CPM (SC-CPM) coding scheme. In this paper, we first perform a selection of the best spectrally-efficient CPM modulations to be embedded into SC-CPM schemes. Then, we consider the pragmatic capacity (a.k.a. BICM capacity) of CPM modulations and optimize it through a careful design of the mapping between input bits and CPM waveforms. The s...

  7. Different collectivity in the two signatures of the i13/2 stemming band in 167Yb

    International Nuclear Information System (INIS)

    Petkov, P; Gladnishki, K A; Dewald, A; Fransen, C; Hackstein, M; Jolie, J; Pissulla, Th; Rother, W; Zell, K O; Möller, O; Reese, M; Deloncle, I

    2014-01-01

    Six lifetimes have been determined in the 5/2 + [642] band from vi 13/2 parentage in 167 Yb by means of Recoil distance Doppler-shift (RDDS) measurements carried out at the Cologne FN tandem. The deduced transition strengths and the level scheme are reasonably described by Particle plus triaxial rotor model (PTRM) calculations except for the behavior of the quadrupole collectivity in the two signatures of the 5/2 + [642] band. In that band, the quadrupole collectivity of the favored signature is appreciably larger than this of the unfavored signature. The effect increases with increasing the spin. Naturally, the rigid PTRM cannot explain these features, but the structure of its wave functions suggests a possible solution. It is associated with the enhanced contribution of low-Ω orbitals from vi 13/2 parentage in the favored signature compared to the unfavored one. This could selectively increase the deformation of the favored signature band members and give rise to a dynamic shape coexistence taking place between the two signatures which needs quantitative explanation by future theoretical work.

  8. Understanding the Cognitive and Affective Mechanisms that Underlie Proxy Risk Perceptions among Caregivers of Asthmatic Children.

    Science.gov (United States)

    Shepperd, James A; Lipsey, Nikolette P; Pachur, Thorsten; Waters, Erika A

    2018-07-01

    Medical decisions made on behalf of another person-particularly those made by adult caregivers for their minor children-are often informed by the decision maker's beliefs about the treatment's risks and benefits. However, we know little about the cognitive and affective mechanisms influencing such "proxy" risk perceptions and about how proxy risk perceptions are related to prominent judgment phenomena. Adult caregivers of minor children with asthma ( N = 132) completed an online, cross-sectional survey assessing 1) cognitions and affects that form the basis of the availability, representativeness, and affect heuristics; 2) endorsement of the absent-exempt and the better-than-average effect; and 3) proxy perceived risk and unrealistic comparative optimism of an asthma exacerbation. We used the Pediatric Asthma Control and Communication Instrument (PACCI) to assess asthma severity. Respondents with higher scores on availability, representativeness, and negative affect indicated higher proxy risk perceptions and (for representativeness only) lower unrealistic optimism, irrespective of asthma severity. Conversely, respondents who showed a stronger display of the better-than-average effect indicated lower proxy risk perceptions but did not differ in unrealistic optimism. The absent-exempt effect was unrelated to proxy risk perceptions and unrealistic optimism. Heuristic judgment processes appear to contribute to caregivers' proxy risk perceptions of their child's asthma exacerbation risk. Moreover, the display of other, possibly erroneous, judgment phenomena is associated with lower caregiver risk perceptions. Designing interventions that target these mechanisms may help caregivers work with their children to reduce exacerbation risk.

  9. Photospheric activity of the Sun with VIRGO and GOLF. Comparison with standard activity proxies

    Science.gov (United States)

    Salabert, D.; García, R. A.; Jiménez, A.; Bertello, L.; Corsaro, E.; Pallé, P. L.

    2017-12-01

    We study the variability of solar activity using new photospheric proxies originally developed for the analysis of stellar magnetism with the CoRoT and Kepler photometric observations. These proxies were obtained by tracking the temporal modulations in the observations associated with the spots and magnetic features as the Sun rotates. We analyzed 21 yr of observations, spanning solar cycles 23 and 24, collected by the space-based photometric VIRGO and radial velocity GOLF instruments on board the SoHO satellite. We then calculated the photospheric activity proxy Sph is for each of the three VIRGO photometers and the associated Svel proxy from the radial velocity GOLF observations. Comparisons with several standard solar activity proxies sensitive to different layers of the Sun demonstrate that these new activity proxies, Sph and Svel, provide a new manner to monitor solar activity. We show that both the long- and short-term magnetic variabilities respectively associated with the 11-yr cycle and the quasi-biennial oscillation are well monitored, and that the magnetic field interaction between the subsurface, photosphere, and chromosphere of the Sun was modified between Cycle 24 and Cycle 23. Furthermore, the photometric proxies show a wavelength dependence of the response function of the solar photosphere among the three channels of the VIRGO photometers, providing inputs for the study of the stellar magnetism of Sun-like stars.

  10. Solar radio proxies for improved satellite orbit prediction

    Directory of Open Access Journals (Sweden)

    Yaya Philippe

    2017-01-01

    Full Text Available Specification and forecasting of solar drivers to thermosphere density models is critical for satellite orbit prediction and debris avoidance. Satellite operators routinely forecast orbits up to 30 days into the future. This requires forecasts of the drivers to these orbit prediction models such as the solar Extreme-UV (EUV flux and geomagnetic activity. Most density models use the 10.7 cm radio flux (F10.7 index as a proxy for solar EUV. However, daily measurements at other centimetric wavelengths have also been performed by the Nobeyama Radio Observatory (Japan since the 1950's, thereby offering prospects for improving orbit modeling. Here we present a pre-operational service at the Collecte Localisation Satellites company that collects these different observations in one single homogeneous dataset and provides a 30 days forecast on a daily basis. Interpolation and preprocessing algorithms were developed to fill in missing data and remove anomalous values. We compared various empirical time series prediction techniques and selected a multi-wavelength non-recursive analogue neural network. The prediction of the 30 cm flux, and to a lesser extent that of the 10.7 cm flux, performs better than NOAA's present prediction of the 10.7 cm flux, especially during periods of high solar activity. In addition, we find that the DTM-2013 density model (Drag Temperature Model performs better with (past and predicted values of the 30 cm radio flux than with the 10.7 flux.

  11. Simulated airplane headache: a proxy towards identification of underlying mechanisms.

    Science.gov (United States)

    Bui, Sebastian Bao Dinh; Petersen, Torben; Poulsen, Jeppe Nørgaard; Gazerani, Parisa

    2017-12-01

    Airplane Headache (AH) occurs during flights and often appears as an intense, short lasting headache during take-off or landing. Reports are limited on pathological mechanisms underlying the occurrence of this headache. Proper diagnosis and treatments would benefit from identification of potential pathways involved in AH pathogenesis. This study aimed at providing a simulated airplane headache condition as a proxy towards identification of its underlying mechanisms. Fourteen participants including 7 volunteers suffering from AH and 7 healthy matched controls were recruited after meeting the diagnostic and safety criteria based on an approved study protocol. Simulation of AH was achieved by entering a pressure chamber with similar characteristics of an airplane flight. Selected potential biomarkers including salivary prostaglandin E 2 (PGE 2 ), cortisol, facial thermo-images, blood pressure, pulse, and saturation pulse oxygen (SPO) were defined and values were collected before, during and after flight simulation in the pressure chamber. Salivary samples were analyzed with ELISA techniques, while data analysis and statistical tests were handled with SPSS version 22.0. All participants in the AH-group experienced a headache attack similar to AH experience during flight. The non-AH-group did not experience any headaches. Our data showed that the values for PGE 2 , cortisol and SPO were significantly different in the AH-group in comparison with the non-AH-group during the flight simulation in the pressure chamber. The pressure chamber proved useful not only to provoke AH-like attack but also to study potential biomarkers for AH in this study. PGE 2 , and cortisol levels together with SPO presented dysregulation during the simulated AH-attack in affected individuals compared with healthy controls. Based on these findings we propose to use pressure chamber as a model to induce AH, and thus assess new potential biomarkers for AH in future studies.

  12. On 165Ho level scheme

    International Nuclear Information System (INIS)

    Ardisson, Claire; Ardisson, Gerard.

    1976-01-01

    A 165 Ho level scheme was constructed which led to the interpretation of sixty γ rays belonging to the decay of 165 Dy. A new 702.9keV level was identified to be the 5/2 - member of the 1/2 ) 7541{ Nilsson orbit. )] [fr

  13. Homogenization scheme for acoustic metamaterials

    KAUST Repository

    Yang, Min; Ma, Guancong; Wu, Ying; Yang, Zhiyu; Sheng, Ping

    2014-01-01

    the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost

  14. Homogenization scheme for acoustic metamaterials

    KAUST Repository

    Yang, Min

    2014-02-26

    We present a homogenization scheme for acoustic metamaterials that is based on reproducing the lowest orders of scattering amplitudes from a finite volume of metamaterials. This approach is noted to differ significantly from that of coherent potential approximation, which is based on adjusting the effective-medium parameters to minimize scatterings in the long-wavelength limit. With the aid of metamaterials’ eigenstates, the effective parameters, such as mass density and elastic modulus can be obtained by matching the surface responses of a metamaterial\\'s structural unit cell with a piece of homogenized material. From the Green\\'s theorem applied to the exterior domain problem, matching the surface responses is noted to be the same as reproducing the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost exactly with numerical simulations and experiments and the scheme\\'s validity is constrained by the number of dominant surface multipoles instead of the usual long-wavelength assumption. In particular, the validity extends to the full band in one dimension and to regimes near the boundaries of the Brillouin zone in two dimensions.

  15. New practicable Siberian Snake schemes

    International Nuclear Information System (INIS)

    Steffen, K.

    1983-07-01

    Siberian Snake schemes can be inserted in ring accelerators for making the spin tune almost independent of energy. Two such schemes are here suggested which lend particularly well to practical application over a wide energy range. Being composed of horizontal and vertical bending magnets, the proposed snakes are designed to have a small maximum beam excursion in one plane. By applying in this plane a bending correction that varies with energy, they can be operated at fixed geometry in the other plane where most of the bending occurs, thus avoiding complicated magnet motion or excessively large magnet apertures that would otherwise be needed for large energy variations. The first of the proposed schemes employs a pair of standard-type Siberian Snakes, i.e. of the usual 1st and 2nd kind which rotate the spin about the longitudinal and the transverse horizontal axis, respectively. The second scheme employs a pair of novel-type snakes which rotate the spin about either one of the horizontal axes that are at 45 0 to the beam direction. In obvious reference to these axes, they are called left-pointed and right-pointed snakes. (orig.)

  16. Nonlinear Secret Image Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Sang-Ho Shin

    2014-01-01

    efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB and 1.74tlog2⁡m bit-per-pixel (bpp, respectively.

  17. A Black Hole Spectral Signature

    Science.gov (United States)

    Titarchuk, Lev; Laurent, Philippe

    2000-03-01

    An accreting black hole is, by definition, characterized by the drain. Namely, the matter falls into a black hole much the same way as water disappears down a drain matter goes in and nothing comes out. As this can only happen in a black hole, it provides a way to see ``a black hole'', an unique observational signature. The accretion proceeds almost in a free-fall manner close to the black hole horizon, where the strong gravitational field dominates the pressure forces. In this paper we present analytical calculations and Monte-Carlo simulations of the specific features of X-ray spectra formed as a result of upscattering of the soft (disk) photons in the converging inflow (CI) into the black hole. The full relativistic treatment has been implemented to reproduce these spectra. We show that spectra in the soft state of black hole systems (BHS) can be described as the sum of a thermal (disk) component and the convolution of some fraction of this component with the CI upscattering spread (Greens) function. The latter boosted photon component is seen as an extended power-law at energies much higher than the characteristic energy of the soft photons. We demonstrate the stability of the power spectral index over a wide range of the plasma temperature 0 - 10 keV and mass accretion rates (higher than 2 in Eddington units). We also demonstrate that the sharp high energy cutoff occurs at energies of 200-400 keV which are related to the average energy of electrons mec2 impinging upon the event horizon. The spectrum is practically identical to the standard thermal Comptonization spectrum when the CI plasma temperature is getting of order of 50 keV (the typical ones for the hard state of BHS). In this case one can see the effect of the bulk motion only at high energies where there is an excess in the CI spectrum with respect to the pure thermal one. Furthermore we demonstrate that the change of spectral shapes from the soft X-ray state to the hard X-ray state is clearly to be

  18. Validating a proxy for disease progression in metastatic cancer patients using prescribing and dispensing data.

    Science.gov (United States)

    Joshi, Vikram; Adelstein, Barbara-Ann; Schaffer, Andrea; Srasuebkul, Preeyaporn; Dobbins, Timothy; Pearson, Sallie-Anne

    2017-10-01

    Routine data collections are used increasingly to examine outcomes of real-world cancer drug use. These datasets lack clinical details about important endpoints such as disease progression. To validate a proxy for disease progression in metastatic cancer patients using prescribing and dispensing claims. We used data from a cohort study of patients undergoing chemotherapy who provided informed consent to the collection of cancer-treatment data from medical records and linkage to pharmaceutical claims. We derived proxy decision rules based on changes to drug treatment in prescription histories (n = 36 patients) and validated the proxy in prescribing data (n = 62 patients). We adapted the decision rules and validated the proxy in dispensing data (n = 109). Our gold standard was disease progression ascertained in patient medical records. Individual progression episodes were the unit of analysis for sensitivity and Positive Predictive Value (PPV) calculations and specificity and Negative Predictive Value (NPV) were calculated at the patient level. The sensitivity of our proxy in prescribing data was 74.3% (95% Confidence Interval (CI), 55.6-86.6%) and PPV 61.2% (95% CI, 45.0-75.3%); specificity and NPV were 87.8% (95% CI, 73.8-95.9%) and 100% (95% CI, 90.3-100%), respectively. In dispensing data, the sensitivity of our proxy was 64% (95% CI, 55.0-77.0%) and PPV 56.0% (95% CI, 43.0-69.0%); specificity and NPV were 81% (95% CI, 70.05-89.0%) and 91.0% (95% CI, 82.0-97.0%), respectively. Our proxy overestimated episodes of disease progression. The proxy's performance is likely to improve if the date of prescribing is used instead of date of dispensing in claims data and by incorporating medical service claims (such as imaging prior to drug changes) in the algorithm. Our proxy is not sufficiently robust for use in real world comparative effectiveness research for cancer medicines. © 2016 John Wiley & Sons Australia, Ltd.

  19. The relationship between proxy reported health-related quality of life and parental distress: gender differences.

    Science.gov (United States)

    Davis, E; Davies, B; Waters, E; Priest, N

    2008-11-01

    Although primary caregiver proxy reports of health-related quality of life (HRQOL) are often used for healthcare decision making when child self-reports are unable to be collected (because of a variety of reasons such as child illness, disability or age), we have little understanding of the correlates of parent-proxy reports. The aim of this study was to examine the relationship between parental depression and parent-proxy reported QOL for primary caregivers (mothers and fathers), using a multidimensional HRQOL instrument. It was hypothesized that maternal depression would be negatively correlated with maternal reported HRQOL, but that paternal depression would not be correlated with paternal reported HRQOL. Data were from parents of children aged 4-5 years (n = 4983) involved in the Longitudinal Study of Australian Children. A questionnaire assessing parental depression (Kessler-6) and proxy reported HRQOL (Pediatric Quality of Life Inventory) was completed by the primary caregiver. For maternal primary caregivers, maternal depression was negatively correlated with all domains of maternal proxy reports of HRQOL (r = -0.24 to r = -0.36). For paternal primary caregivers, there was no relationship between paternal depression and paternal proxy reports of HRQOL. Multiple regression analyses demonstrated that maternal depression was a significant predictor of total HRQOL, accounting for 12% of the variance. For paternal mental health, depression did not predict parent-proxy reported total HRQOL. These results highlight the importance of assessing maternal mental health when measuring proxy reported QOL. Further research is needed in this area to examine the relationship between parental depression and proxy reported HRQOL (including both mothers and fathers, where possible), as well as child self-reported HRQOL.

  20. [Validity and reliability of the spanish EQ-5D-Y proxy version].

    Science.gov (United States)

    Gusi, N; Perez-Sousa, M A; Gozalo-Delgado, M; Olivares, P R

    2014-10-01

    A proxy version of the EQ-5D-Y, a questionnaire to evaluate the Health Related Quality of Life (HRQoL) in children and adolescents, has recently been developed. There are currently no data on the validity and reliability of this tool. The objective of this study was to analyze the validity and reliability of the EQ-5D-Y proxy version. A core set of self-report tools, including the Spanish version of the EQ-5D-Y were administered to a group of Spanish children and adolescents drawn from the general population. A similar core set of internationally standardized proxy tools, including the EQ-5D-Y proxy version were administered to their parents. Test-retest reliability was determined, and correlations with other generic measurements of HRQoL were calculated. Additionally, known group validity was examined by comparing groups with a priori expected differences in HRQoL. The agreement between the self-report and proxy version responses was also calculated. A total of 477 children and adolescents and their parents participated in the study. One week later, 158 participants completed the EQ-5D-Y/EQ-5D-Y proxy to facilitate reliability analysis. Agreement between the test-retest scores was higher than 88% for EQ-5D-Y self-report, and proxy version. Correlations with other health measurements showed similar convergent validity to that observed in the international EQ-5D-Y. Agreement between the self-report and proxy versions ranged from 72.9% to 97.1%. The results provide preliminary evidence of the reliability and validity of the EQ-5D-Y proxy version. Copyright © 2013 Asociación Española de Pediatría. Published by Elsevier Espana. All rights reserved.

  1. Sincronización de estadísticas entre servidores y proxies

    OpenAIRE

    Catullo, María José

    1999-01-01

    Un caching proxy server colecciona todas las páginas que pasan a través de él, así cuando un usuario pregunta por una página, el proxy server, si la tiene, la retoma de su cache, sin necesidad de acceder al servidor real. De ésta manera se ahorra ancho de banda y se agilizan las respuestas. Cada requerimiento que arriba a un proxy ó a un servidor, se almacena en archivos de logs. Existen varios tipos de archivos de logs, que se utilizan para auditoría del rendimiento, monitoreo, control de...

  2. Does Twitter trigger bursts in signature collections?

    Directory of Open Access Journals (Sweden)

    Rui Yamaguchi

    Full Text Available INTRODUCTION: The quantification of social media impacts on societal and political events is a difficult undertaking. The Japanese Society of Oriental Medicine started a signature-collecting campaign to oppose a medical policy of the Government Revitalization Unit to exclude a traditional Japanese medicine, "Kampo," from the public insurance system. The signature count showed a series of aberrant bursts from November 26 to 29, 2009. In the same interval, the number of messages on Twitter including the keywords "Signature" and "Kampo," increased abruptly. Moreover, the number of messages on an Internet forum that discussed the policy and called for signatures showed a train of spikes. METHODS AND FINDINGS: In order to estimate the contributions of social media, we developed a statistical model with state-space modeling framework that distinguishes the contributions of multiple social media in time-series of collected public opinions. We applied the model to the time-series of signature counts of the campaign and quantified contributions of two social media, i.e., Twitter and an Internet forum, by the estimation. We found that a considerable portion (78% of the signatures was affected from either of the social media throughout the campaign and the Twitter effect (26% was smaller than the Forum effect (52% in total, although Twitter probably triggered the initial two bursts of signatures. Comparisons of the estimated profiles of the both effects suggested distinctions between the social media in terms of sustainable impact of messages or tweets. Twitter shows messages on various topics on a time-line; newer messages push out older ones. Twitter may diminish the impact of messages that are tweeted intermittently. CONCLUSIONS: The quantification of social media impacts is beneficial to better understand people's tendency and may promote developing strategies to engage public opinions effectively. Our proposed method is a promising tool to explore

  3. Does Twitter trigger bursts in signature collections?

    Science.gov (United States)

    Yamaguchi, Rui; Imoto, Seiya; Kami, Masahiro; Watanabe, Kenji; Miyano, Satoru; Yuji, Koichiro

    2013-01-01

    The quantification of social media impacts on societal and political events is a difficult undertaking. The Japanese Society of Oriental Medicine started a signature-collecting campaign to oppose a medical policy of the Government Revitalization Unit to exclude a traditional Japanese medicine, "Kampo," from the public insurance system. The signature count showed a series of aberrant bursts from November 26 to 29, 2009. In the same interval, the number of messages on Twitter including the keywords "Signature" and "Kampo," increased abruptly. Moreover, the number of messages on an Internet forum that discussed the policy and called for signatures showed a train of spikes. In order to estimate the contributions of social media, we developed a statistical model with state-space modeling framework that distinguishes the contributions of multiple social media in time-series of collected public opinions. We applied the model to the time-series of signature counts of the campaign and quantified contributions of two social media, i.e., Twitter and an Internet forum, by the estimation. We found that a considerable portion (78%) of the signatures was affected from either of the social media throughout the campaign and the Twitter effect (26%) was smaller than the Forum effect (52%) in total, although Twitter probably triggered the initial two bursts of signatures. Comparisons of the estimated profiles of the both effects suggested distinctions between the social media in terms of sustainable impact of messages or tweets. Twitter shows messages on various topics on a time-line; newer messages push out older ones. Twitter may diminish the impact of messages that are tweeted intermittently. The quantification of social media impacts is beneficial to better understand people's tendency and may promote developing strategies to engage public opinions effectively. Our proposed method is a promising tool to explore information hidden in social phenomena.

  4. Design And Implementation of Low Area/Power Elliptic Curve Digital Signature Hardware Core

    Directory of Open Access Journals (Sweden)

    Anissa Sghaier

    2017-06-01

    Full Text Available The Elliptic Curve Digital Signature Algorithm(ECDSA is the analog to the Digital Signature Algorithm(DSA. Based on the elliptic curve, which uses a small key compared to the others public-key algorithms, ECDSA is the most suitable scheme for environments where processor power and storage are limited. This paper focuses on the hardware implementation of the ECDSA over elliptic curveswith the 163-bit key length recommended by the NIST (National Institute of Standards and Technology. It offers two services: signature generation and signature verification. The proposed processor integrates an ECC IP, a Secure Hash Standard 2 IP (SHA-2 Ip and Random Number Generator IP (RNG IP. Thus, all IPs will be optimized, and different types of RNG will be implemented in order to choose the most appropriate one. A co-simulation was done to verify the ECDSA processor using MATLAB Software. All modules were implemented on a Xilinx Virtex 5 ML 50 FPGA platform; they require respectively 9670 slices, 2530 slices and 18,504 slices. FPGA implementations represent generally the first step for obtaining faster ASIC implementations. Further, the proposed design was also implemented on an ASIC CMOS 45-nm technology; it requires a 0.257 mm2 area cell achieving a maximum frequency of 532 MHz and consumes 63.444 (mW. Furthermore, in this paper, we analyze the security of our proposed ECDSA processor against the no correctness check for input points and restart attacks.

  5. Evaluation of the convergence between "self-reporters" and "proxies" in a disability questionnaire by means of behaviour coding method

    NARCIS (Netherlands)

    Benitez Baena, Isabel; Padilla Garcia, Jose Luis; Ongena, Yfke

    Household surveys often require including proxy reporters to obtain information about other household members who cannot be interviewed. The participation of proxies can undermine survey data quality due to the fact that proxies must respond to questions thinking about other people. The objectives

  6. Isotopic signatures of eelgrass (Zostera marina L.) as bioindicator of anthropogenic nutrient input in the western Baltic Sea

    International Nuclear Information System (INIS)

    Schubert, Philipp R.; Karez, Rolf; Reusch, Thorsten B.H.; Dierking, Jan

    2013-01-01

    Highlights: • Anthropogenic nitrogen (N) inputs are a global problem, but difficult to quantify. • We tested the use of eelgrass δ 15 N as proxy of such inputs in the Baltic Sea. • The method revealed distinct spatial patterns in sewage N across a eutrophic bay. • Traditional eutrophication measures corroborated the results from δ 15 N values. • Eelgrass δ 15 N ratios have high potential as proxy of sewage-derived N in the Baltic. -- Abstract: Eutrophication is a global environmental problem. Better management of this threat requires more accurate assessments of anthropogenic nitrogen (N) inputs to coastal systems than can be obtained with traditional measures. Recently, primary producer N isotopic signatures have emerged as useful proxy of such inputs. Here, we demonstrated for the first time the applicability of this method using the widespread eelgrass (Zostera marina) in the highly eutrophic Baltic Sea. Spatial availability of sewage N across a bay with one major sewage outflow predicted by eelgrass δ 15 N was high near and downstream of the outflow compared to upstream, but returned to upstream levels within 4 km downstream from the outfall. General conclusions were corroborated by traditional eutrophication measures, but in contrast to these measures were fully quantitative. Eelgrass N isotope ratios therefore show high potential for coastal screens of eutrophication in the Baltic Sea, and in other areas with eelgrass meadows

  7. Longitudinal proxy measurements in multiple sclerosis: patient-proxy agreement on the impact of MS on daily life over a period of two years

    Directory of Open Access Journals (Sweden)

    Thompson Alan J

    2008-02-01

    Full Text Available Abstract Background The use of self-report measurements in clinical settings is increasing. However, in patients with limitations that interfere with reliable self-assessment such as cognitive impairment or mood disturbances, as may be the case in multiple sclerosis (MS, data collection might be problematic. In these situations, information obtained from proxy respondents (e.g. partners may replace self-ratings. The aim of this study was to examine the value of proxy ratings at separate points in time and to assess patient-proxy agreement on possible changes in disease impact of MS. Methods Fifty-six MS patients and their partners completed the Multiple Sclerosis Impact Scale (MSIS-29 at baseline and follow-up, two years later. Patient-proxy agreement was assessed at both time points by calculating intraclass correlation coefficients (ICCs, exact and global agreement and the mean directional differences between groups. Agreement of change over time was assessed by calculating ICCs between change scores. In parallel, global ratings of both patients and proxy respondents of the extent to which the patient had improved or deteriorated over the past two years were collected to validate possible changes on the MSIS-29. Results At both time points, agreement on the physical scale was higher than agreement on the psychological scale (ICCs at baseline were 0.81 for the physical scale and 0.72 for the psychological scale; at follow-up, the ICC values were 0.86 and 0.65 respectively. At follow-up, statistically significant mean differences between patients and proxies were noted for the physical scale (-4.8 ± 12.7, p = 0.006 and the psychological scale (-8.9 ± 18.8, p = 0.001. Agreement between change scores on the MSIS-29 was fair (ICC Conclusion Proxy respondents could act as a reliable source of information in cross-sectional studies. Moreover, results suggested that agreement on change over time might be better for proxy respondents compared to

  8. Calculated NWIS signatures for enriched uranium metal

    International Nuclear Information System (INIS)

    Valentine, T.E.; Mihalczo, J.T.; Koehler, P.E.

    1995-01-01

    Nuclear Weapons Identification System (NWIS) signatures have been calculated using a Monte Carlo transport code for measurement configurations of a 252 Cf source, detectors, and a uranium metal casting. NWIS signatures consist of a wide variety of time-and frequency-analysis signatures such as the time distribution of neutrons after californium fission, the time distribution of counts in a detector after a previous count, the number of times n pulses occur in a time interval, and various frequency-analysis signatures, such as auto-power and cross-power spectral densities, coherences, and a ratio of spectral densities. This ratio is independent of detection efficiency. The analysis presented here, using the MCNP-DSP code, evaluates the applicability of this method for measurement of the 235 U content of 19-kg castings of depleted uranium and uranium with enrichments of 20, 40, 60, 80, 90, and 93.2 wt % 235 U. The dependence of the wide variety of NWIS signatures on 235 U content and possible configurations of a measurement system are presented. These preliminary calculations indicate short measurement times. Additional calculations are being performed to optimize the source-detector-moderator-casting configuration for the shortest measurement time. Although the NWIS method was developed for nuclear weapons identification, the development of a small processor now allows it to be also applied in a practical way to subcriticality measurements, nuclear fuel process monitoring and qualitative nondestructive assay of special nuclear material

  9. A Fast lattice-based polynomial digital signature system for m-commerce

    Science.gov (United States)

    Wei, Xinzhou; Leung, Lin; Anshel, Michael

    2003-01-01

    The privacy and data integrity are not guaranteed in current wireless communications due to the security hole inside the Wireless Application Protocol (WAP) version 1.2 gateway. One of the remedies is to provide an end-to-end security in m-commerce by applying application level security on top of current WAP1.2. The traditional security technologies like RSA and ECC applied on enterprise's server are not practical for wireless devices because wireless devices have relatively weak computation power and limited memory compared with server. In this paper, we developed a lattice based polynomial digital signature system based on NTRU's Polynomial Authentication and Signature Scheme (PASS), which enabled the feasibility of applying high-level security on both server and wireless device sides.

  10. Generation of flat wideband chaos with suppressed time delay signature by using optical time lens.

    Science.gov (United States)

    Jiang, Ning; Wang, Chao; Xue, Chenpeng; Li, Guilan; Lin, Shuqing; Qiu, Kun

    2017-06-26

    We propose a flat wideband chaos generation scheme that shows excellent time delay signature suppression effect, by injecting the chaotic output of general external cavity semiconductor laser into an optical time lens module composed of a phase modulator and two dispersive units. The numerical results demonstrate that by properly setting the parameters of the driving signal of phase modulator and the accumulated dispersion of dispersive units, the relaxation oscillation in chaos can be eliminated, wideband chaos generation with an efficient bandwidth up to several tens of GHz can be achieved, and the RF spectrum of generated chaotic signal is nearly as flat as uniform distribution. Moreover, the periodicity of chaos induced by the external cavity modes can be simultaneously destructed by the optical time lens module, based on this the time delay signature can be completely suppressed.

  11. Integrating Iris and Signature Traits for Personal Authentication Using User-SpecificWeighting

    Directory of Open Access Journals (Sweden)

    Serestina Viriri

    2012-03-01

    Full Text Available Biometric systems based on uni-modal traits are characterized by noisy sensor data, restricted degrees of freedom, non-universality and are susceptible to spoof attacks. Multi-modal biometric systems seek to alleviate some of these drawbacks by providing multiple evidences of the same identity. In this paper, a user-score-based weighting technique for integrating the iris and signature traits is presented. This user-specific weighting technique has proved to be an efficient and effective fusion scheme which increases the authentication accuracy rate of multi-modal biometric systems. The weights are used to indicate the importance of matching scores output by each biometrics trait. The experimental results show that our biometric system based on the integration of iris and signature traits achieve a false rejection rate (FRR of 0.08% and a false acceptance rate (FAR of 0.01%.

  12. EBAA: An efficient broadcast authentication scheme for ADS-B communication based on IBS-MR

    Directory of Open Access Journals (Sweden)

    Yang Haomiao

    2014-06-01

    Full Text Available Automatic dependent surveillance-broadcast (ADS-B systems can broadcast satellite-based aircraft position, identification, etc., periodically, and are now on track to replace radar to become the backbone of next-generation air traffic management (ATM systems. However, ADS-B systems suffer severe cyber-security problems due to the broadcast-type data link and the lack of designed-in security measures. Especially, since ADS-B messages are unauthenticated, it is easy to insert fake aircraft into a system via spoofing or insertion of false messages. Unfortunately, the authentication for ADS-B messages has not yet been well studied. In this paper, based on identity-based signature with message recovery (IBS-MR, an efficient broadcast authentication scheme for ADS-B messages is proposed. The security analysis demonstrates that the scheme can achieve authenticity and integrity of ADS-B broadcast messages, as well as adaptive evolution of broadcasters’ private keys. The performance evaluation shows that the scheme is computationally efficient for typical avionics devices with limited resources. Furthermore, the scheme achieves low communication overhead since broadcast messages can be recovered from signatures, and thus it is suitable for low-bandwidth ADS-B data link.

  13. Global Tsunami Database: Adding Geologic Deposits, Proxies, and Tools

    Science.gov (United States)

    Brocko, V. R.; Varner, J.

    2007-12-01

    A result of collaboration between NOAA's National Geophysical Data Center (NGDC) and the Cooperative Institute for Research in the Environmental Sciences (CIRES), the Global Tsunami Database includes instrumental records, human observations, and now, information inferred from the geologic record. Deep Ocean Assessment and Reporting of Tsunamis (DART) data, historical reports, and information gleaned from published tsunami deposit research build a multi-faceted view of tsunami hazards and their history around the world. Tsunami history provides clues to what might happen in the future, including frequency of occurrence and maximum wave heights. However, instrumental and written records commonly span too little time to reveal the full range of a region's tsunami hazard. The sedimentary deposits of tsunamis, identified with the aid of modern analogs, increasingly complement instrumental and human observations. By adding the component of tsunamis inferred from the geologic record, the Global Tsunami Database extends the record of tsunamis backward in time. Deposit locations, their estimated age and descriptions of the deposits themselves fill in the tsunami record. Tsunamis inferred from proxies, such as evidence for coseismic subsidence, are included to estimate recurrence intervals, but are flagged to highlight the absence of a physical deposit. Authors may submit their own descriptions and upload digital versions of publications. Users may sort by any populated field, including event, location, region, age of deposit, author, publication type (extract information from peer reviewed publications only, if you wish), grain size, composition, presence/absence of plant material. Users may find tsunami deposit references for a given location, event or author; search for particular properties of tsunami deposits; and even identify potential collaborators. Users may also download public-domain documents. Data and information may be viewed using tools designed to extract and

  14. A multi-proxy perspective on millennium-long climate variability in the Southern Pyrenees

    NARCIS (Netherlands)

    Morellón, M.; Pérez-Sanz, A.; Corella, J.P.; Büntgen, U.; Catalán, J.; González-Samprizé, P.; González-Trueba, J.J.; López-Sáez, J.A.; Moreno, A.; Pla-Rabes, S.; Saz-Sánchez, M.Á.; Scussolini, P.; Serrano, E.; Steinhilber, F.; Stefanova, V.; Vegas-Vilarrúbia, T.; Valero-Garcés, B.

    2012-01-01

    This paper reviews multi-proxy paleoclimatic reconstructions with robust age-control derived from lacustrine, dendrochronological and geomorphological records and characterizes the main environmental changes that occurred in the Southern Pyrenees during the last millennium. Warmer and relatively

  15. RESPONSE OF THREE PALEO-PRIMARY PRODUCTION PROXY MEASURES TO DEVELOPMENT OF AN URBAN ESTUARY

    Science.gov (United States)

    In this study we present a novel comparison of three proxy indicators of paleoproductivity, pigments, biogenic silica (BSi), and cysts of autotrophic dinoflagellates measured in cored sediments from New Bedford Harbor, Massachusetts. In addition to detailed historical reports we ...

  16. Middleware Proxy: A Request-Driven Messaging Broker For High Volume Data Distribution

    CERN Document Server

    Sliwinski, W; Dworak, A

    2014-01-01

    Nowadays, all major infrastructures and data centres (commercial and scientific) make an extensive use of the publish-subscribe messaging paradigm, which helps to decouple the message sender (publisher) from the message receiver (consumer). This paradigm is also heavily used in the CERN Accelerator Control system, in Proxy broker - critical part of the Controls Middleware (CMW) project. Proxy provides the aforementioned publish-subscribe facility and also supports execution of synchronous read and write operations. Moreover, it enables service scalability and dramatically reduces the network resources and overhead (CPU and memory) on publisher machine, required to serve all subscriptions. Proxy was developed in modern C++, using state of the art programming techniques (e.g. Boost) and following recommended software patterns for achieving low-latency and high concurrency. The outstanding performance of the Proxy infrastructure was confirmed during the last 3 years by delivering the high volume of LHC equipment...

  17. Multiple water isotope proxy reconstruction of extremely low last glacial temperatures in Eastern Beringia (Western Arctic)

    NARCIS (Netherlands)

    Porter, Trevor J.; Froese, Duane G.; Feakins, Sarah J.; Bindeman, Ilya N.; Mahony, Matthew E.; Pautler, Brent G.; Reichart, Gert-Jan; Sanborn, Paul T.; Simpson, Myrna J.; Weijers, Johan W H

    2016-01-01

    Precipitation isotopes are commonly used for paleothermometry in high latitude regions. Here we present multiple water isotope proxies from the same sedimentary context - perennially frozen loess deposits in the Klondike Goldfields in central Yukon, Canada, representing parts of Marine Isotope

  18. Technical Note: Correcting for signal attenuation from noisy proxy data in climate reconstructions

    KAUST Repository

    Ammann, C. M.; Genton, M. G.; Li, B.

    2010-01-01

    regression parameter estimation can lead to substantial amplitude attenuation if the predictors carry significant amounts of noise. This issue is known as "Measurement Error" (Fuller, 1987; Carroll et al., 2006). Climate proxies derived from tree-rings, ice

  19. Support Schemes and Ownership Structures

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Costa, Ana

    , Denmark, France and Portugal. Another crucial aspect for the diffusion of the mCHP technology is possible ownership structures. These may range from full consumer ownership to ownership by utilities and energy service companies, which is discussed in Section 6. Finally, a conclusion (Section 7) wraps up......In recent years, fuel cell based micro‐combined heat and power has received increasing attention due to its potential contribution to energy savings, efficiency gains, customer proximity and flexibility in operation and capacity size. The FC4Home project assesses technical and economic aspects...... of support scheme simultaneously affects risk and technological development, which is the focus of Section 4. Subsequent to this conceptual overview, Section 5 takes a glance at the national application of support schemes for mCHP in practice, notably in the three country cases of the FC4Home project...

  20. [PICS: pharmaceutical inspection cooperation scheme].

    Science.gov (United States)

    Morénas, J

    2009-01-01

    The pharmaceutical inspection cooperation scheme (PICS) is a structure containing 34 participating authorities located worldwide (October 2008). It has been created in 1995 on the basis of the pharmaceutical inspection convention (PIC) settled by the European free trade association (EFTA) in1970. This scheme has different goals as to be an international recognised body in the field of good manufacturing practices (GMP), for training inspectors (by the way of an annual seminar and experts circles related notably to active pharmaceutical ingredients [API], quality risk management, computerized systems, useful for the writing of inspection's aide-memoires). PICS is also leading to high standards for GMP inspectorates (through regular crossed audits) and being a room for exchanges on technical matters between inspectors but also between inspectors and pharmaceutical industry.

  1. Project financing renewable energy schemes

    International Nuclear Information System (INIS)

    Brandler, A.

    1993-01-01

    The viability of many Renewable Energy projects is critically dependent upon the ability of these projects to secure the necessary financing on acceptable terms. The principal objective of the study was to provide an overview to project developers of project financing techniques and the conditions under which project finance for Renewable Energy schemes could be raised, focussing on the potential sources of finance, the typical project financing structures that could be utilised for Renewable Energy schemes and the risk/return and security requirements of lenders, investors and other potential sources of financing. A second objective is to describe the appropriate strategy and tactics for developers to adopt in approaching the financing markets for such projects. (author)

  2. Network Regulation and Support Schemes

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Jacobsen, Henrik

    2009-01-01

    -in tariffs to market-based quota systems, and network regulation approaches, comprising rate-of-return and incentive regulation. National regulation and the vertical structure of the electricity sector shape the incentives of market agents, notably of distributed generators and network operators......At present, there exists no explicit European policy framework on distributed generation. Various Directives encompass distributed generation; inherently, their implementation is to the discretion of the Member States. The latter have adopted different kinds of support schemes, ranging from feed....... This article seeks to investigate the interactions between the policy dimensions of support schemes and network regulation and how they affect the deployment of distributed generation. Firstly, a conceptual analysis examines how the incentives of the different market agents are affected. In particular...

  3. Distance labeling schemes for trees

    DEFF Research Database (Denmark)

    Alstrup, Stephen; Gørtz, Inge Li; Bistrup Halvorsen, Esben

    2016-01-01

    We consider distance labeling schemes for trees: given a tree with n nodes, label the nodes with binary strings such that, given the labels of any two nodes, one can determine, by looking only at the labels, the distance in the tree between the two nodes. A lower bound by Gavoille et al. [Gavoille...... variants such as, for example, small distances in trees [Alstrup et al., SODA, 2003]. We improve the known upper and lower bounds of exact distance labeling by showing that 1/4 log2(n) bits are needed and that 1/2 log2(n) bits are sufficient. We also give (1 + ε)-stretch labeling schemes using Theta...

  4. Small-scale classification schemes

    DEFF Research Database (Denmark)

    Hertzum, Morten

    2004-01-01

    Small-scale classification schemes are used extensively in the coordination of cooperative work. This study investigates the creation and use of a classification scheme for handling the system requirements during the redevelopment of a nation-wide information system. This requirements...... classification inherited a lot of its structure from the existing system and rendered requirements that transcended the framework laid out by the existing system almost invisible. As a result, the requirements classification became a defining element of the requirements-engineering process, though its main...... effects remained largely implicit. The requirements classification contributed to constraining the requirements-engineering process by supporting the software engineers in maintaining some level of control over the process. This way, the requirements classification provided the software engineers...

  5. Usable Authentication with an Offline Trusted Device Proxy Architecture (long version)

    OpenAIRE

    Johansen, Christian; Jøsang, Audun; Migdal, Denis

    2016-01-01

    Client platform infection poses a significant threat to secure user authentication. Com- bining vulnerable client platforms with special security devices, as often the case in e- banking, can increase significantly the security. This paper describes a new architecture where a security proxy on the client platform communicates with both a trusted security device and the server application. The proxy switches between two TLS channels, one from the client and another from the trusted device. The...

  6. Reliability of proxy respondents for patients with stroke: a systematic review.

    Science.gov (United States)

    Oczkowski, Colin; O'Donnell, Martin

    2010-01-01

    Proxy respondents are an important aspect of stroke medicine and research. We performed a systematic review of studies evaluating the reliability of proxy respondents for stroke patients. Studies were identified by searches of MEDLINE, Google, and the Cochrane Library between January 1969 and June 2008. All were prospective or cross-sectional studies reporting the reliability of proxy respondents for patients with a history of previous stroke or transient ischemic attack. One author abstracted data. For each study, intraclass correlation (ICC) or the k-statistic was categorized as poor (0.80). Thirteen studies, with a total of 2618 participants, met our inclusion criteria. Most studies recruited patients >3 months after their stroke. Of these studies, 5 (360 participants; 5 scales) evaluated reliability of proxy respondents for activities of daily living (ADL), and 9 (2334 participants; 9 scales) evaluated reliability of proxy respondents for quality of life (QoL). One study evaluated both. In studies, the ICC/k for scales ranged from 0.61 to 0.91 for ADL and from 0.41 to 0.8 for QoL. Most studies reported that proxy respondents overestimated impairments compared with patient self-reports. Stroke severity and objective nature of questions were the most consistent determinants of disagreement between stroke patient and proxy respondent. Our data indicate that beyond the acute stroke period, the reliability of proxy respondents for validated scales of ADL was substantial to excellent, while that of scales for QoL was moderate to substantial. Copyright (c) 2010 National Stroke Association. Published by Elsevier Inc. All rights reserved.

  7. Proxy-Reports in the Ascertainment of Disability Prevalence with American Community Survey Data.

    Science.gov (United States)

    Siordia, C

    2014-01-01

    Population estimates on disability prevalence inform policy makers and public health professionals. Understanding how factors capable of affecting measurement (e.g., proxy-report) vary in the population is important for establishing level of confidence in sample-derived population estimates. To establish how use of proxy-reports varies by six disability types stratified by sex, race-ethnicity, and age group. Specific aim is achieved by investigating the number of proxy-reports used amongst the disable population. Cross-sectional study using American Community Survey (ACS) Public Use Microdata Sample (PUMS) 3-year file collected during 2009-2011 survey period. Community-dwelling population in continental United States (US). The unweighted count of 6,003,183 individuals in the microdata are said to represent about 193,277,485 individuals in the continental US population. Stratified disability period estimates are computed. Amongst the disable: the number of proxy-reports; allocations; and Person Inflation Ratios (PRIs) are presented by disability type. Half of all the reported disabilities are derived through the use of proxy-report. In addition, high rates of item-allocation and PRIs are generally found in race-ethnic minorities. Proxy-report use and PRIs are lower for those aged > 65-but not allocation rates. Although use of proxy report in the ascertainment of disability varies in complex ways, data suggest prevalence of proxy reports is lowest amongst Non-Latino-Black females ages 21 to 64. Efforts toward providing clinicians with high quality descriptive epidemiology should continue as a reliable thermometer for measuring disability in the population is needed.

  8. Human rights of children with intellectual disabilities: comparing self-ratings and proxy ratings.

    Science.gov (United States)

    Huus, K; Granlund, M; Bornman, J; Lygnegård, F

    2015-11-01

    A child rights-based approach to research articulates well with Article 12 of the United Nations Convention on the Rights of the Child (CRC) and highlights the importance and value of including children's own views about aspects that concern them. The aim of this study is to compare children with intellectual disability's own ratings (as self-raters) to those of their primary caregivers (as proxy raters) regarding human rights of children. The study also aims to establish whether there is an inter-rater agreement between the self-raters and proxy raters concerning Maslow's hierarchy of needs. This study is nested in a larger study examining the human rights of children with intellectual disability in South Africa. In total, 162 children with intellectual disability from 11 schools across three provinces and their primary caregivers participated by answering parts of a Children's Rights Questionnaire (CRQ) developed by the researchers based on the United Nation's CRC. We compared the answers for six questions in the questionnaire that were addressed to self-raters (children) and proxy raters (primary caregivers) in the same way. Questions regarding basic needs, such as access to clean water or whether the child had food to eat at home, were answered similarly by self-raters and proxy raters. Larger differences were found when self-raters and proxy raters were asked about whether the child had things or friends to play with at home. Socio-economic variables seemed to affect whether self-raters and proxy raters answered similarly. The results underscore the importance of promoting children's rights to express themselves by considering the opinions of both the children as self-raters and their primary caregivers as proxy raters - not only the latter. The results indicate that it is especially important to include children's own voices when more complex needs are surveyed. Agreement between self- and proxy ratings could be affected by socio-economic circumstances.

  9. Evaluating and Optimizing Online Advertising: Forget the Click, but There Are Good Proxies.

    Science.gov (United States)

    Dalessandro, Brian; Hook, Rod; Perlich, Claudia; Provost, Foster

    2015-06-01

    Online systems promise to improve advertisement targeting via the massive and detailed data available. However, there often is too few data on exactly the outcome of interest, such as purchases, for accurate campaign evaluation and optimization (due to low conversion rates, cold start periods, lack of instrumentation of offline purchases, and long purchase cycles). This paper presents a detailed treatment of proxy modeling, which is based on the identification of a suitable alternative (proxy) target variable when data on the true objective is in short supply (or even completely nonexistent). The paper has a two-fold contribution. First, the potential of proxy modeling is demonstrated clearly, based on a massive-scale experiment across 58 real online advertising campaigns. Second, we assess the value of different specific proxies for evaluating and optimizing online display advertising, showing striking results. The results include bad news and good news. The most commonly cited and used proxy is a click on an ad. The bad news is that across a large number of campaigns, clicks are not good proxies for evaluation or for optimization: clickers do not resemble buyers. The good news is that an alternative sort of proxy performs remarkably well: observed visits to the brand's website. Specifically, predictive models built based on brand site visits-which are much more common than purchases-do a remarkably good job of predicting which browsers will make a purchase. The practical bottom line: evaluating and optimizing campaigns using clicks seems wrongheaded; however, there is an easy and attractive alternative-use a well-chosen site-visit proxy instead.

  10. Trace element ink spiking for signature authentication

    International Nuclear Information System (INIS)

    Hatzistavros, V.S.; Kallithrakas-Kontos, N.G.

    2008-01-01

    Signature authentication is a critical question in forensic document examination. Last years the evolution of personal computers made signature copying a quite easy task, so the development of new ways for signature authentication is crucial. In the present work a commercial ink was spiked with many trace elements in various concentrations. Inorganic and organometallic ink soluble compounds were used as spiking agents, whilst ink retained its initial properties. The spiked inks were used for paper writing and the documents were analyzed by a non destructive method, the energy dispersive X-ray fluorescence. The thin target model was proved right for quantitative analysis and a very good linear relationship of the intensity (X-ray signal) against concentration was estimated for all used elements. Intensity ratios between different elements in the same ink gave very stable results, independent on the writing alterations. The impact of time both to written document and prepared inks was also investigated. (author)

  11. A Methodology for Calculating Radiation Signatures

    Energy Technology Data Exchange (ETDEWEB)

    Klasky, Marc Louis [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Wilcox, Trevor [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Bathke, Charles G. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); James, Michael R. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-05-01

    A rigorous formalism is presented for calculating radiation signatures from both Special Nuclear Material (SNM) as well as radiological sources. The use of MCNP6 in conjunction with CINDER/ORIGEN is described to allow for the determination of both neutron and photon leakages from objects of interest. In addition, a description of the use of MCNP6 to properly model the background neutron and photon sources is also presented. Examinations of the physics issues encountered in the modeling are investigated so as to allow for guidance in the user discerning the relevant physics to incorporate into general radiation signature calculations. Furthermore, examples are provided to assist in delineating the pertinent physics that must be accounted for. Finally, examples of detector modeling utilizing MCNP are provided along with a discussion on the generation of Receiver Operating Curves, which are the suggested means by which to determine detectability radiation signatures emanating from objects.

  12. Cryptanalysis of the arbitrated quantum signature protocols

    International Nuclear Information System (INIS)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-01-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  13. Molecular Signature in HCV-Positive Lymphomas

    Directory of Open Access Journals (Sweden)

    Valli De Re

    2012-01-01

    Full Text Available Hepatitis C virus (HCV is a positive, single-stranded RNA virus, which has been associated to different subtypes of B-cell non-Hodgkin lymphoma (B-NHL. Cumulative evidence suggests an HCV-related antigen driven process in the B-NHL development. The underlying molecular signature associated to HCV-related B-NHL has to date remained obscure. In this review, we discuss the recent developments in this field with a special mention to different sets of genes whose expression is associated with BCR coupled to Blys signaling which in turn was found to be linked to B-cell maturation stages and NF-κb transcription factor. Even if recent progress on HCV-B-NHL signature has been made, the precise relationship between HCV and lymphoma development and phenotype signature remain to be clarified.

  14. Selection signatures in worldwide sheep populations.

    Science.gov (United States)

    Fariello, Maria-Ines; Servin, Bertrand; Tosser-Klopp, Gwenola; Rupp, Rachel; Moreno, Carole; San Cristobal, Magali; Boitard, Simon

    2014-01-01

    The diversity of populations in domestic species offers great opportunities to study genome response to selection. The recently published Sheep HapMap dataset is a great example of characterization of the world wide genetic diversity in sheep. In this study, we re-analyzed the Sheep HapMap dataset to identify selection signatures in worldwide sheep populations. Compared to previous analyses, we made use of statistical methods that (i) take account of the hierarchical structure of sheep populations, (ii) make use of linkage disequilibrium information and (iii) focus specifically on either recent or older selection signatures. We show that this allows pinpointing several new selection signatures in the sheep genome and distinguishing those related to modern breeding objectives and to earlier post-domestication constraints. The newly identified regions, together with the ones previously identified, reveal the extensive genome response to selection on morphology, color and adaptation to new environments.

  15. Biomarker Gene Signature Discovery Integrating Network Knowledge

    Directory of Open Access Journals (Sweden)

    Holger Fröhlich

    2012-02-01

    Full Text Available Discovery of prognostic and diagnostic biomarker gene signatures for diseases, such as cancer, is seen as a major step towards a better personalized medicine. During the last decade various methods, mainly coming from the machine learning or statistical domain, have been proposed for that purpose. However, one important obstacle for making gene signatures a standard tool in clinical diagnosis is the typical low reproducibility of these signatures combined with the difficulty to achieve a clear biological interpretation. For that purpose in the last years there has been a growing interest in approaches that try to integrate information from molecular interaction networks. Here we review the current state of research in this field by giving an overview about so-far proposed approaches.

  16. Estimating physiological skin parameters from hyperspectral signatures

    Science.gov (United States)

    Vyas, Saurabh; Banerjee, Amit; Burlina, Philippe

    2013-05-01

    We describe an approach for estimating human skin parameters, such as melanosome concentration, collagen concentration, oxygen saturation, and blood volume, using hyperspectral radiometric measurements (signatures) obtained from in vivo skin. We use a computational model based on Kubelka-Munk theory and the Fresnel equations. This model forward maps the skin parameters to a corresponding multiband reflectance spectra. Machine-learning-based regression is used to generate the inverse map, and hence estimate skin parameters from hyperspectral signatures. We test our methods using synthetic and in vivo skin signatures obtained in the visible through the short wave infrared domains from 24 patients of both genders and Caucasian, Asian, and African American ethnicities. Performance validation shows promising results: good agreement with the ground truth and well-established physiological precepts. These methods have potential use in the characterization of skin abnormalities and in minimally-invasive prescreening of malignant skin cancers.

  17. Cambridge community Optometry Glaucoma Scheme.

    Science.gov (United States)

    Keenan, Jonathan; Shahid, Humma; Bourne, Rupert R; White, Andrew J; Martin, Keith R

    2015-04-01

    With a higher life expectancy, there is an increased demand for hospital glaucoma services in the United Kingdom. The Cambridge community Optometry Glaucoma Scheme (COGS) was initiated in 2010, where new referrals for suspected glaucoma are evaluated by community optometrists with a special interest in glaucoma, with virtual electronic review and validation by a consultant ophthalmologist with special interest in glaucoma. 1733 patients were evaluated by this scheme between 2010 and 2013. Clinical assessment is performed by the optometrist at a remote site. Goldmann applanation tonometry, pachymetry, monoscopic colour optic disc photographs and automated Humphrey visual field testing are performed. A clinical decision is made as to whether a patient has glaucoma or is a suspect, and referred on or discharged as a false positive referral. The clinical findings, optic disc photographs and visual field test results are transmitted electronically for virtual review by a consultant ophthalmologist. The number of false positive referrals from initial referral into the scheme. Of the patients, 46.6% were discharged at assessment and a further 5.7% were discharged following virtual review. Of the patients initially discharged, 2.8% were recalled following virtual review. Following assessment at the hospital, a further 10.5% were discharged after a single visit. The COGS community-based glaucoma screening programme is a safe and effective way of evaluating glaucoma referrals in the community and reducing false-positive referrals for glaucoma into the hospital system. © 2014 Royal Australian and New Zealand College of Ophthalmologists.

  18. New schemes for particle accelerators

    International Nuclear Information System (INIS)

    Nishida, Y.

    1985-01-01

    In the present paper, the authors propose new schemes for realizing the v/sub p/xB accelerator, by using no plasma system for producing the strong longitudinal waves. The first method is to use a grating for obtaining extended interaction of an electron beam moving along the grating surface with light beam incident also along the surface. Here, the light beam propagates obliquely to the grating grooves for producing strong electric field, and the electron beam propagates in parallel to the light beam. The static magnetic field is applied perpendicularly to the grating surface. In the present system, the beam interacts synchronously with the p-polarized wave which has the electric field be parallel to the grating surface. Another conventional scheme is to use a delay circuit. Here, the light beam propagates obliquely between a pair of array of conductor fins or slots. The phase velocity of the spatial harmonics in the y-direction (right angle to the array of slots) is slower than the speed of light. With the aid of powerful laser light or microwave source, it should be possible to miniaturise linacs by using the v/sub p/xB effect and schemes proposed here

  19. A Memory Efficient Network Encryption Scheme

    Science.gov (United States)

    El-Fotouh, Mohamed Abo; Diepold, Klaus

    In this paper, we studied the two widely used encryption schemes in network applications. Shortcomings have been found in both schemes, as these schemes consume either more memory to gain high throughput or low memory with low throughput. The need has aroused for a scheme that has low memory requirements and in the same time possesses high speed, as the number of the internet users increases each day. We used the SSM model [1], to construct an encryption scheme based on the AES. The proposed scheme possesses high throughput together with low memory requirements.

  20. Peripheral blood signatures of lead exposure.

    Directory of Open Access Journals (Sweden)

    Heather G LaBreche

    Full Text Available BACKGROUND: Current evidence indicates that even low-level lead (Pb exposure can have detrimental effects, especially in children. We tested the hypothesis that Pb exposure alters gene expression patterns in peripheral blood cells and that these changes reflect dose-specific alterations in the activity of particular pathways. METHODOLOGY/PRINCIPAL FINDING: Using Affymetrix Mouse Genome 430 2.0 arrays, we examined gene expression changes in the peripheral blood of female Balb/c mice following exposure to per os lead acetate trihydrate or plain drinking water for two weeks and after a two-week recovery period. Data sets were RMA-normalized and dose-specific signatures were generated using established methods of supervised classification and binary regression. Pathway activity was analyzed using the ScoreSignatures module from GenePattern. CONCLUSIONS/SIGNIFICANCE: The low-level Pb signature was 93% sensitive and 100% specific in classifying samples a leave-one-out crossvalidation. The high-level Pb signature demonstrated 100% sensitivity and specificity in the leave-one-out crossvalidation. These two signatures exhibited dose-specificity in their ability to predict Pb exposure and had little overlap in terms of constituent genes. The signatures also seemed to reflect current levels of Pb exposure rather than past exposure. Finally, the two doses showed differential activation of cellular pathways. Low-level Pb exposure increased activity of the interferon-gamma pathway, whereas high-level Pb exposure increased activity of the E2F1 pathway.

  1. System Identification Based Proxy Model of a Reservoir under Water Injection

    Directory of Open Access Journals (Sweden)

    Berihun M. Negash

    2017-01-01

    Full Text Available Simulation of numerical reservoir models with thousands and millions of grid blocks may consume a significant amount of time and effort, even when high performance processors are used. In cases where the simulation runs are required for sensitivity analysis, dynamic control, and optimization, the act needs to be repeated several times by continuously changing parameters. This makes it even more time-consuming. Currently, proxy models that are based on response surface are being used to lessen the time required for running simulations during sensitivity analysis and optimization. Proxy models are lighter mathematical models that run faster and perform in place of heavier models that require large computations. Nevertheless, to acquire data for modeling and validation and develop the proxy model itself, hundreds of simulation runs are required. In this paper, a system identification based proxy model that requires only a single simulation run and a properly designed excitation signal was proposed and evaluated using a benchmark case study. The results show that, with proper design of excitation signal and proper selection of model structure, system identification based proxy models are found to be practical and efficient alternatives for mimicking the performance of numerical reservoir models. The resulting proxy models have potential applications for dynamic well control and optimization.

  2. Validation of a proxy for estrogen receptor status in breast cancer patients using dispensing data.

    Science.gov (United States)

    Srasuebkul, Preeyaporn; Dobbins, Timothy A; Pearson, Sallie-Anne

    2014-06-01

    To assess the performance of a proxy for estrogen receptor (ER) status in breast cancer patients using dispensing data. We derived our proxy using 167 patients. ER+ patients had evidence of at least one dispensing record for hormone therapy during the lookback period, irrespective of diagnosis date and ER- had no dispensing records for hormone therapy during the period. We validated the proxy against our gold standard, ER status from pathology reports or medical records. We assessed the proxy's performance using three lookback periods: 4.5 years, 2 years, 1 year. More than half of our cohort (62%) were >50 years, 54% had stage III/IV breast cancer at recruitment, (46%) were diagnosed with breast cancer in 2009 and 23% were diagnosed before 2006. Sensitivity and specificity were high for the 4.5 year lookback period (93%, 95% CI: 86-96%; and 95%: 83-99%), respectively) and remained high for the 2-year lookback period (91%: 84-95%; and 95%: 83-99%). Sensitivity decreased (83%: 75.2-89%) but specificity remained high (95%: 83-99%) using the 1-year lookback period and the period is long enough to allow sufficient time for hormone therapy to be dispensed. Our proxy accurately infers ER status in studies of breast cancer treatment based on secondary health data. The proxy is most robust with a minimum lookback period of 2 years. © 2012 Wiley Publishing Asia Pty Ltd.

  3. Pattern-mixture models for analyzing normal outcome data with proxy respondents.

    Science.gov (United States)

    Shardell, Michelle; Hicks, Gregory E; Miller, Ram R; Langenberg, Patricia; Magaziner, Jay

    2010-06-30

    Studies of older adults often involve interview questions regarding subjective constructs such as perceived disability. In some studies, when subjects are unable (e.g. due to cognitive impairment) or unwilling to respond to these questions, proxies (e.g. relatives or other care givers) are recruited to provide responses in place of the subject. Proxies are usually not approached to respond on behalf of subjects who respond for themselves; thus, for each subject, data from only one of the subject or proxy are available. Typically, proxy responses are simply substituted for missing subject responses, and standard complete-data analyses are performed. However, this approach may introduce measurement error and produce biased parameter estimates. In this paper, we propose using pattern-mixture models that relate non-identifiable parameters to identifiable parameters to analyze data with proxy respondents. We posit three interpretable pattern-mixture restrictions to be used with proxy data, and we propose estimation procedures using maximum likelihood and multiple imputation. The methods are applied to a cohort of elderly hip-fracture patients. (c) 2010 John Wiley & Sons, Ltd.

  4. How to integrate proxy data from two informants in life event assessment in psychological autopsy.

    Science.gov (United States)

    Zhang, Jie; Wang, Youqing; Fang, Le

    2018-04-27

    Life event assessment is an important part in psychological autopsy, and how to integrate its proxy data from two informants is a major methodological issue which needs solving. Totally 416 living subjects and their two informants were interviewed by psychological autopsy, and life events were assessed with Paykel's Interview for Recent Life Events. Validities of integrated proxy data using six psychological autopsy information reconstruction methods were evaluated, with living subjects' self-reports used as gold-standard criteria. For all the life events, average value of Youden Indexes for proxy data by type C information reconstruction method (choosing positive value from two informants) was larger than other five methods'. For family life related events, proxy data by type 1st information reconstruction method were not significantly different from living subjects' self-reports (P = 0.828). For all other life events, proxy data by type C information reconstruction method were not significantly different from the gold-standard. Choosing positive value is a relatively better method for integrating dichotomous (positive vs. negative) proxy data from two informants in life event assessment in psychological autopsy, except for family life related events. In that case, using information provided by 1st informants (mainly family member) is recommended.

  5. Technical Note: Probabilistically constraining proxy age–depth models within a Bayesian hierarchical reconstruction model

    Directory of Open Access Journals (Sweden)

    J. P. Werner

    2015-03-01

    Full Text Available Reconstructions of the late-Holocene climate rely heavily upon proxies that are assumed to be accurately dated by layer counting, such as measurements of tree rings, ice cores, and varved lake sediments. Considerable advances could be achieved if time-uncertain proxies were able to be included within these multiproxy reconstructions, and if time uncertainties were recognized and correctly modeled for proxies commonly treated as free of age model errors. Current approaches for accounting for time uncertainty are generally limited to repeating the reconstruction using each one of an ensemble of age models, thereby inflating the final estimated uncertainty – in effect, each possible age model is given equal weighting. Uncertainties can be reduced by exploiting the inferred space–time covariance structure of the climate to re-weight the possible age models. Here, we demonstrate how Bayesian hierarchical climate reconstruction models can be augmented to account for time-uncertain proxies. Critically, although a priori all age models are given equal probability of being correct, the probabilities associated with the age models are formally updated within the Bayesian framework, thereby reducing uncertainties. Numerical experiments show that updating the age model probabilities decreases uncertainty in the resulting reconstructions, as compared with the current de facto standard of sampling over all age models, provided there is sufficient information from other data sources in the spatial region of the time-uncertain proxy. This approach can readily be generalized to non-layer-counted proxies, such as those derived from marine sediments.

  6. Testing the benthic foraminiferal B/Ca proxy in a hydrothermal vent environment to determine its validity under extreme conditions

    Science.gov (United States)

    Clementi, V.; Haynes, L.; Hoenisch, B.; Costa, K.; McManus, J. F.

    2016-12-01

    The boron to calcium ratio (B/Ca) and boron isotopic composition of the benthic foraminifer C. wuellerstorfi have become frequently used proxies for reconstructing carbonate chemistry in ocean bottom waters. However, elevated boron isotope data from a site proximal to the Clipperton Fracture Zone on the East Pacific Rise have led to the hypothesis that boron derived from hydrothermal fluids may be incorporated into benthic foraminifer shells (1). To date there is no comparable evidence for B/Ca at sites adjacent to hydrothermal vent systems, but hydrothermal vent fluid at the Juan de Fuca Ridge in the northeast Pacific Ocean can have boron concentrations nearly twice as high as ambient seawater (2), and other studies have documented increased levels of trace element incorporation in foraminifers living near hydrothermal vents (3). If the same effect holds true for B/Ca, the proxy may be compromised in sediments near hydrothermal vent sites. Here we present C. wuellerstorfi B/Ca data from a sediment core 5 km west of the Juan de Fuca Ridge, North Cleft Segment, to study the influence of vent fluid chemistry and partial shell dissolution on B/Ca and other trace element ratios. Our results do not show a strong hydrothermal signature on B/Ca despite the elevated boron concentrations of modern vent fluids and close proximity to the ridge. However, partial shell dissolution appears to have a significant impact on B/Ca ratios, calling for careful sample selection in future reconstructions from the region. Analysis of B/Ca and other trace element ratios across a ridge transect at a time of documented high hydrothermal activity—as indicated by high sediment hydrothermal Fe fluxes—may determine whether the hydrothermal signal is recorded further downstream from the vent fluid source. (1) Raitzsch, M. and Hönisch, B. (2010). Geology 40(5). (2) Seyfried Jr., W.E. et al. (2003). Journal of Geophys. Res.:Solid Earth 108(B9). (3) Munsel, D. et al. (2010). Biogeosci. 7.7.

  7. Doppler Velocity Signatures of Idealized Elliptical Vortices

    Directory of Open Access Journals (Sweden)

    Wen-Chau Lee

    2006-01-01

    Full Text Available Doppler radar observations have revealed a class of atmospheric vortices (tropical cyclones, tornadoes, dust devils that possess elliptical radar reflectivity signatures. One famous example is Typhoon Herb (1996 that maintained its elliptical reflectivity structure over a 40-hour period. Theoretical work and dual-Doppler analyses of observed tropical cyclones have suggested two physical mechanisms that can explain the formation of two types of elliptical vortices observed in nature, namely, the combination of a circular vortex with either a wavenumber two vortex Rossby wave or a deformation field. The characteristics of these two types of elliptical vortices and their corresponding Doppler velocity signatures have not been previously examined.

  8. KEA-71 Smart Current Signature Sensor (SCSS)

    Science.gov (United States)

    Perotti, Jose M.

    2010-01-01

    This slide presentation reviews the development and uses of the Smart Current Signature Sensor (SCSS), also known as the Valve Health Monitor (VHM) system. SCSS provides a way to not only monitor real-time the valve's operation in a non invasive manner, but also to monitor its health (Fault Detection and Isolation) and identify potential faults and/or degradation in the near future (Prediction/Prognosis). This technology approach is not only applicable for solenoid valves, and it could be extrapolated to other electrical components with repeatable electrical current signatures such as motors.

  9. Plasma Signatures of Radial Field Power Dropouts

    International Nuclear Information System (INIS)

    Lucek, E.A.; Horbury, T.S.; Balogh, A.; McComas, D.J.

    1998-01-01

    A class of small scale structures, with a near-radial magnetic field and a drop in magnetic field fluctuation power, have recently been identified in the polar solar wind. An earlier study of 24 events, each lasting for 6 hours or more, identified no clear plasma signature. In an extension of that work, radial intervals lasting for 4 hours or more (89 in total), have been used to search for a statistically significant plasma signature. It was found that, despite considerable variations between intervals, there was a small but significant drop, on average, in plasma temperature, density and β during these events

  10. Transient thermal camouflage and heat signature control

    Science.gov (United States)

    Yang, Tian-Zhi; Su, Yishu; Xu, Weikai; Yang, Xiao-Dong

    2016-09-01

    Thermal metamaterials have been proposed to manipulate heat flux as a new way to cloak or camouflage objects in the infrared world. To date, however, thermal metamaterials only operate in the steady-state and exhibit detectable, transient heat signatures. In this letter, the theoretical basis for a thermal camouflaging technique with controlled transient diffusion is presented. This technique renders an object invisible in real time. More importantly, the thermal camouflaging device instantaneously generates a pre-designed heat signature and behaves as a perfect thermal illusion device. A metamaterial coating with homogeneous and isotropic thermal conductivity, density, and volumetric heat capacity was fabricated and very good camouflaging performance was achieved.

  11. Voltage-induced switching with magnetoresistance signature in magnetic nano-filaments

    International Nuclear Information System (INIS)

    Sokolov, A; Sabirianov, I; Sabirianov, R; Doudin, B

    2009-01-01

    Large hysteretic resistance changes are reported on sub-100 nm diameter metallic nanowires including thin dielectric junctions. Bi-stable 50% switching in a double junction geometry is modeled in terms of an occupation-driven metal-insulator transition in one of the two junctions, using the generalized Poisson expressions of Oka and Nagaosa (2005 Phys. Rev. Lett. 95 266403). It illustrates how a band bending scheme can be generalized for strongly correlated electron systems. The magnetic constituents of the nanowires provide a magnetoresistive signature of the two resistance states, confirming our model and enabling a four states device application.

  12. Preservation of Fe Isotope Proxies in the Rock Record

    Science.gov (United States)

    Johnson, C.; Beard, B.; Valley, J.; Valaas, E.

    2005-12-01

    Iron isotope variations provide powerful constraints on redox conditions and pathways involved during biogeochemical cycling of Fe in surface and near-surface environments. The relative isotopic homogeneity of igneous rocks and most bulk weathering products contrasts with the significant isotopic variations (4 per mil in 56Fe/54Fe) that accompany oxidation of Fe(II)aq, precipitation of sulfides, and reduction by bacteria. These isotopic variations often reflect intrinsic (equilibrium) Fe isotope fractionations between minerals and aqueous species whose interactions may be directly or indirectly catalyzed by bacteria. In addition, Fe isotope exchange may be limited between reactive Fe pools in low-temperature aqueous-sediment environments, fundamentally reflecting disequilibrium effects. In the absence of significant sulfide, dissimilatory Fe(III) reduction by bacteria produces relatively low 56Fe/54Fe ratios for Fe(II)aq and associated biogenic minerals such as magnetite and siderite. In contrast, Fe(II)aq that exchanges with Fe sulfides (FeS and pyrite) is relatively enriched in 56Fe/54Fe ratios. In modern and ancient environments, anoxic diagenesis tends to produce products that have low 56Fe/54Fe ratios, whereas oxidation of Fe(II)aq from hydrothermal sources tends to produce ferric Fe products that have high 56Fe/54Fe ratios. Redox cycling by bacteria tends to produce reactive ferric Fe reservoirs that have low 56Fe/54Fe ratios. Application of Fe isotopes as a proxy for redox conditions in the ancient rock record depends upon the preservation potential during metamorphism, given the fact that most Archean sedimentary sequences have been subjected to regional greenschist- to granulite-facies metamorphism. The 1.9 Ga banded iron formations (BIFs) of the Lake Superior region that are intruded by large ~1 Ga intrusions (e.g., Duluth gabbro) provide a test of the preservation potential for primary, low-temperature Fe isotope variations in sedimentary rocks. 56Fe/54

  13. Lava delta deformation as a proxy for submarine slope instability

    Science.gov (United States)

    Di Traglia, Federico; Nolesini, Teresa; Solari, Lorenzo; Ciampalini, Andrea; Frodella, William; Steri, Damiano; Allotta, Benedetto; Rindi, Andrea; Marini, Lorenzo; Monni, Niccolò; Galardi, Emanuele; Casagli, Nicola

    2018-04-01

    the 30 December 2002 landslide, which involved the lava delta and its surrounding areas. InSAR data provided the post-effusive deformation field after the 2007 and 2014 flank eruptions, whereas LEM results highlighted that the accumulation of lava flows on the prone-to-failure SdF submarine slope is the main cause of the detected lava delta deformation. Lava delta instability, measured also at Pico Island (Azores) and Kilauea volcano (Hawaii), is evidence of the broader spectrum of instability phenomena that take place in the coastal or submarine area of the flanks of the volcanoes. At Kilauea, past lava deltas have moved faster than the surrounding slope and the recorded movements relate only to the collapses of the deltas themselves, producing rapid mass wasting near the coasts. In contrast, at Stromboli and Pico, lava deltas move at the same velocity as the surrounding slope. In these cases, the displacement at lava deltas can be considered as a proxy for the deformation of submarine slides. There are very few studies dealing with lava delta deformation, thus, the analysis presented in this work will benefit the monitoring of submarine slopes in other prone-to-failure coastal or island volcanic systems which have the potential to generate tsunamis.

  14. COMPUTER-IMPLEMENTED METHOD OF PERFORMING A SEARCH USING SIGNATURES

    DEFF Research Database (Denmark)

    2017-01-01

    A computer-implemented method of processing a query vector and a data vector), comprising: generating a set of masks and a first set of multiple signatures and a second set of multiple signatures by applying the set of masks to the query vector and the data vector, respectively, and generating...... candidate pairs, of a first signature and a second signature, by identifying matches of a first signature and a second signature. The set of masks comprises a configuration of the elements that is a Hadamard code; a permutation of a Hadamard code; or a code that deviates from a Hadamard code...

  15. Decoupling schemes for the SSC Collider

    International Nuclear Information System (INIS)

    Cai, Y.; Bourianoff, G.; Cole, B.; Meinke, R.; Peterson, J.; Pilat, F.; Stampke, S.; Syphers, M.; Talman, R.

    1993-05-01

    A decoupling system is designed for the SSC Collider. This system can accommodate three decoupling schemes by using 44 skew quadrupoles in the different configurations. Several decoupling schemes are studied and compared in this paper

  16. Renormalization scheme-invariant perturbation theory

    International Nuclear Information System (INIS)

    Dhar, A.

    1983-01-01

    A complete solution to the problem of the renormalization scheme dependence of perturbative approximants to physical quantities is presented. An equation is derived which determines any physical quantity implicitly as a function of only scheme independent variables. (orig.)

  17. Wireless Broadband Access and Accounting Schemes

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    In this paper, we propose two wireless broadband access and accounting schemes. In both schemes, the accounting system adopts RADIUS protocol, but the access system adopts SSH and SSL protocols respectively.

  18. Reliability and validity of a self-administration version of DEMQOL-Proxy.

    Science.gov (United States)

    Hendriks, A A Jolijn; Smith, Sarah C; Chrysanthaki, Theopisti; Black, Nick

    2017-07-01

    This study aimed to investigate the reliability and validity of a self-administered version of DEMQOL-Proxy, a disease-specific instrument that measures health-related quality of life in people with dementia. The sample consisted of 173 informal carers of people with dementia, aged 29 to 89 years old. Carers were mostly female, White/White British and closely related to the patient. They completed DEMQOL-Proxy (self-administered), EQ-5D-3L (proxy reported about the person with dementia), EQ-5D-3L (self-reported about their own health) and the Zarit Burden Interview. Using well-established methods from classical test theory, we evaluated scale level acceptability, reliability and convergent, discriminant and known-groups validity of DEMQOL-Proxy. DEMQOL-Proxy (self-administered) showed high acceptability (3.5% missing data and 0% scores at floor or ceiling), high internal consistency reliability (α = 0.93) and good convergent and discriminant validity. Amongst others, we found a moderately high correlation with EQ-5D-3L proxy reported (r = 0.52) and low to essentially zero correlations with EQ-5D-3L self-reported (r = 0.20) and carer and patient background variables (r ≤ 0.20). As predicted, DEMQOL-Proxy (self-administered) showed a modest correlation with DEMQOL (r = 0.32). Known-groups differences on health-related quality of life (comparing people with versus people without cognitive impairment) were of moderate effect size (d = 0.38) and in the expected direction. DEMQOL-Proxy (self-administered) has comparable acceptability, reliability and validity with DEMQOL-Proxy (interviewer administered). DEMQOL-Proxy (self-administered) can be used in a wider variety of contexts than its interviewer-administered version, including routine use in busy clinics. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  19. LPPS: A Distributed Cache Pushing Based K-Anonymity Location Privacy Preserving Scheme

    Directory of Open Access Journals (Sweden)

    Ming Chen

    2016-01-01

    Full Text Available Recent years have witnessed the rapid growth of location-based services (LBSs for mobile social network applications. To enable location-based services, mobile users are required to report their location information to the LBS servers and receive answers of location-based queries. Location privacy leak happens when such servers are compromised, which has been a primary concern for information security. To address this issue, we propose the Location Privacy Preservation Scheme (LPPS based on distributed cache pushing. Unlike existing solutions, LPPS deploys distributed cache proxies to cover users mostly visited locations and proactively push cache content to mobile users, which can reduce the risk of leaking users’ location information. The proposed LPPS includes three major process. First, we propose an algorithm to find the optimal deployment of proxies to cover popular locations. Second, we present cache strategies for location-based queries based on the Markov chain model and propose update and replacement strategies for cache content maintenance. Third, we introduce a privacy protection scheme which is proved to achieve k-anonymity guarantee for location-based services. Extensive experiments illustrate that the proposed LPPS achieves decent service coverage ratio and cache hit ratio with lower communication overhead compared to existing solutions.

  20. Lorentz violations and Euclidean signature metrics

    International Nuclear Information System (INIS)

    Barbero G, J. Fernando; Villasenor, Eduardo J.S.

    2003-01-01

    We show that the families of effective actions considered by Jacobson et al. to study Lorentz invariance violations contain a class of models that represent pure general relativity with a Euclidean signature. We also point out that some members of this family of actions preserve Lorentz invariance in a generalized sense