WorldWideScience

Sample records for proxy signature scheme

  1. Some Proxy Signature and Designated verifier Signature Schemes over Braid Groups

    OpenAIRE

    Lal, Sunder; Verma, Vandani

    2009-01-01

    Braids groups provide an alternative to number theoretic public cryptography and can be implemented quite efficiently. The paper proposes five signature schemes: Proxy Signature, Designated Verifier, Bi-Designated Verifier, Designated Verifier Proxy Signature And Bi-Designated Verifier Proxy Signature scheme based on braid groups. We also discuss the security aspects of each of the proposed schemes.

  2. Improvement of a Quantum Proxy Blind Signature Scheme

    Science.gov (United States)

    Zhang, Jia-Lei; Zhang, Jian-Zhong; Xie, Shu-Cui

    2018-06-01

    Improvement of a quantum proxy blind signature scheme is proposed in this paper. Six-qubit entangled state functions as quantum channel. In our scheme, a trust party Trent is introduced so as to avoid David's dishonest behavior. The receiver David verifies the signature with the help of Trent in our scheme. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, delegation, signature and verification. Security analysis proves that our scheme has the properties of undeniability, unforgeability, anonymity and can resist some common attacks.

  3. A Lattice-Based Identity-Based Proxy Blind Signature Scheme in the Standard Model

    Directory of Open Access Journals (Sweden)

    Lili Zhang

    2014-01-01

    Full Text Available A proxy blind signature scheme is a special form of blind signature which allowed a designated person called proxy signer to sign on behalf of original signers without knowing the content of the message. It combines the advantages of proxy signature and blind signature. Up to date, most proxy blind signature schemes rely on hard number theory problems, discrete logarithm, and bilinear pairings. Unfortunately, the above underlying number theory problems will be solvable in the postquantum era. Lattice-based cryptography is enjoying great interest these days, due to implementation simplicity and provable security reductions. Moreover, lattice-based cryptography is believed to be hard even for quantum computers. In this paper, we present a new identity-based proxy blind signature scheme from lattices without random oracles. The new scheme is proven to be strongly unforgeable under the standard hardness assumption of the short integer solution problem (SIS and the inhomogeneous small integer solution problem (ISIS. Furthermore, the secret key size and the signature length of our scheme are invariant and much shorter than those of the previous lattice-based proxy blind signature schemes. To the best of our knowledge, our construction is the first short lattice-based identity-based proxy blind signature scheme in the standard model.

  4. A Quantum Multi-Proxy Weak Blind Signature Scheme Based on Entanglement Swapping

    Science.gov (United States)

    Yan, LiLi; Chang, Yan; Zhang, ShiBin; Han, GuiHua; Sheng, ZhiWei

    2017-02-01

    In this paper, we present a multi-proxy weak blind signature scheme based on quantum entanglement swapping of Bell states. In the scheme, proxy signers can finish the signature instead of original singer with his/her authority. It can be applied to the electronic voting system, electronic paying system, etc. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. It could guarantee not only the unconditionally security but also the anonymity of the message owner. The security analysis shows the scheme satisfies the security features of multi-proxy weak signature, singers cannot disavowal his/her signature while the signature cannot be forged by others, and the message owner can be traced.

  5. A Quantum Proxy Weak Blind Signature Scheme Based on Controlled Quantum Teleportation

    Science.gov (United States)

    Cao, Hai-Jing; Yu, Yao-Feng; Song, Qin; Gao, Lan-Xiang

    2015-04-01

    Proxy blind signature is applied to the electronic paying system, electronic voting system, mobile agent system, security of internet, etc. A quantum proxy weak blind signature scheme is proposed in this paper. It is based on controlled quantum teleportation. Five-qubit entangled state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, so it could guarantee not only the unconditional security of the scheme but also the anonymity of the messages owner.

  6. An Anonymous Access Authentication Scheme Based on Proxy Ring Signature for CPS-WMNs

    Directory of Open Access Journals (Sweden)

    Tianhan Gao

    2017-01-01

    Full Text Available Access security and privacy have become a bottleneck for the popularization of future Cyber-Physical System (CPS networks. Furthermore, users’ need for privacy-preserved access during movement procedure is more urgent. To address the anonymous access authentication issue for CPS Wireless Mesh Network (CPS-WMN, a novel anonymous access authentication scheme based on proxy ring signature is proposed. A hierarchical authentication architecture is presented first. The scheme is then achieved from the aspect of intergroup and intragroup anonymous mutual authentication through proxy ring signature mechanism and certificateless signature mechanism, respectively. We present a formal security proof of the proposed protocol with SVO logic. The simulation and performance analysis demonstrate that the proposed scheme owns higher efficiency and adaptability than the typical one.

  7. A New Quantum Proxy Multi-signature Scheme Using Maximally Entangled Seven-Qubit States

    Science.gov (United States)

    Cao, Hai-Jing; Zhang, Jia-Fu; Liu, Jian; Li, Zeng-You

    2016-02-01

    In this paper, we propose a new secure quantum proxy multi-signature scheme using seven-qubit entangled quantum state as quantum channels, which may have applications in e-payment system, e-government, e-business, etc. This scheme is based on controlled quantum teleportation. The scheme uses the physical characteristics of quantum mechanics to guarantee its anonymity, verifiability, traceability, unforgetability and undeniability.

  8. An Efficient Identity-Based Proxy Blind Signature for Semioffline Services

    Directory of Open Access Journals (Sweden)

    Hongfei Zhu

    2018-01-01

    Full Text Available Fog computing extends the cloud computing to the network edge and allows deploying a new type of semioffline services, which can provide real-time transactions between two entities, while the central cloud server is offline and network edge devices are online. For an e-payment system and e-voting with such feature, proxy blind signature is a cornerstone to protect users’ privacy. However, the signature based on number theorem, such as hard mathematical problems on factoring problem, discrete logarithm problem, and bilinear pairings, cannot defeat quantum computers attack. Meanwhile, these schemes need to depend on complex public key infrastructure. Thus, we construct an identity-based proxy blind signature scheme based on number theorem research unit lattice, which can defeat quantum computers attack and does not need to depend on public key infrastructure. The security of the proposed scheme is dependent on Ring-Small Integer Solution problem over number theorem research unit lattice. The proposed scheme meets the properties of blind signature and proxy signature. Then we compare the proposed scheme with other existing proxy blind signature schemes; the result shows that the proposed scheme outperforms ZM scheme except in proxy signer’s signature size and can be more secure than TA scheme and MMHP scheme.

  9. Revocable identity-based proxy re-signature against signing key exposure.

    Science.gov (United States)

    Yang, Xiaodong; Chen, Chunlin; Ma, Tingchun; Wang, Jinli; Wang, Caifen

    2018-01-01

    Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key. Due to this transformation function, IDPRS is very useful in constructing privacy-preserving schemes for various information systems. Key revocation functionality is important in practical IDPRS for managing users dynamically; however, the existing IDPRS schemes do not provide revocation mechanisms that allow the removal of misbehaving or compromised users from the system. In this paper, we first introduce a notion called revocable identity-based proxy re-signature (RIDPRS) to achieve the revocation functionality. We provide a formal definition of RIDPRS as well as its security model. Then, we present a concrete RIDPRS scheme that can resist signing key exposure and prove that the proposed scheme is existentially unforgeable against adaptive chosen identity and message attacks in the standard model. To further improve the performance of signature verification in RIDPRS, we introduce a notion called server-aided revocable identity-based proxy re-signature (SA-RIDPRS). Moreover, we extend the proposed RIDPRS scheme to the SA-RIDPRS scheme and prove that this extended scheme is secure against adaptive chosen message and collusion attacks. The analysis results show that our two schemes remain efficient in terms of computational complexity when implementing user revocation procedures. In particular, in the SA-RIDPRS scheme, the verifier needs to perform only a bilinear pairing and four exponentiation operations to verify the validity of the signature. Compared with other IDPRS schemes in the standard model, our SA-RIDPRS scheme greatly reduces the computation overhead of verification.

  10. Secure Mobile Agent from Leakage-Resilient Proxy Signatures

    Directory of Open Access Journals (Sweden)

    Fei Tang

    2015-01-01

    Full Text Available A mobile agent can sign a message in a remote server on behalf of a customer without exposing its secret key; it can be used not only to search for special products or services, but also to make a contract with a remote server. Hence a mobile agent system can be used for electronic commerce as an important key technology. In order to realize such a system, Lee et al. showed that a secure mobile agent can be constructed using proxy signatures. Intuitively, a proxy signature permits an entity (delegator to delegate its signing right to another entity (proxy to sign some specified messages on behalf of the delegator. However, the proxy signatures are often used in scenarios where the signing is done in an insecure environment, for example, the remote server of a mobile agent system. In such setting, an adversary could launch side-channel attacks to exploit some leakage information about the proxy key or even other secret states. The proxy signatures which are secure in the traditional security models obviously cannot provide such security. Based on this consideration, in this paper, we design a leakage-resilient proxy signature scheme for the secure mobile agent systems.

  11. Cryptanalytic Performance Appraisal of Improved CCH2 Proxy Multisignature Scheme

    Directory of Open Access Journals (Sweden)

    Raman Kumar

    2014-01-01

    Full Text Available Many of the signature schemes are proposed in which the t out of n threshold schemes are deployed, but they still lack the property of security. In this paper, we have discussed implementation of improved CCH1 and improved CCH2 proxy multisignature scheme based on elliptic curve cryptosystem. We have represented time complexity, space complexity, and computational overhead of improved CCH1 and CCH2 proxy multisignature schemes. We have presented cryptanalysis of improved CCH2 proxy multisignature scheme and showed that improved CCH2 scheme suffered from various attacks, that is, forgery attack and framing attack.

  12. Design and Implementation of a Mobile Voting System Using a Novel Oblivious and Proxy Signature

    Directory of Open Access Journals (Sweden)

    Shin-Yan Chiou

    2017-01-01

    Full Text Available Electronic voting systems can make the voting process much more convenient. However, in such systems, if a server signs blank votes before users vote, it may cause undue multivoting. Furthermore, if users vote before the signing of the server, voting information will be leaked to the server and may be compromised. Blind signatures could be used to prevent leaking voting information from the server; however, malicious users could produce noncandidate signatures for illegal usage at that time or in the future. To overcome these problems, this paper proposes a novel oblivious signature scheme with a proxy signature function to satisfy security requirements such as information protection, personal privacy, and message verification and to ensure that no one can cheat other users (including the server. We propose an electronic voting system based on the proposed oblivious and proxy signature scheme and implement this scheme in a smartphone application to allow users to vote securely and conveniently. Security analyses and performance comparisons are provided to show the capability and efficiency of the proposed scheme.

  13. Method of Anti-Virus Protection Based on (n, t Threshold Proxy Signature with an Arbitrator

    Directory of Open Access Journals (Sweden)

    E. A. Tolyupa

    2014-01-01

    Full Text Available The article suggests the method of anti-virus protection of mobile devices based on the usage of proxy digital signatures and an (n;t-threshold proxy signature scheme with an arbitrator. The unique feature of the suggested method is in the absence of necessity to install anti-virus software in a mobile device. It will be enough only to have the software verifying digital signatures and the Internet. The method is used on the base of public keys infrastructure /PKI/, thus minimizing implementation expenses.

  14. A New Proxy Electronic Voting Scheme Achieved by Six-Particle Entangled States

    Science.gov (United States)

    Cao, Hai-Jing; Ding, Li-Yuan; Jiang, Xiu-Li; Li, Peng-Fei

    2018-03-01

    In this paper, we use quantum proxy signature to construct a new secret electronic voting scheme. In our scheme, six particles entangled states function as quantum channels. The voter Alice, the Vote Management Center Bob, the scrutineer Charlie only perform two particles measurements on the Bell bases to realize the electronic voting process. So the scheme reduces the technical difficulty and increases operation efficiency. We use quantum key distribution and one-time pad to guarantee its unconditional security. The significant advantage of our scheme is that transmitted information capacity is twice as much as the capacity of other schemes.

  15. Time-and-ID-Based Proxy Reencryption Scheme

    Directory of Open Access Journals (Sweden)

    Kambombo Mtonga

    2014-01-01

    Full Text Available Time- and ID-based proxy reencryption scheme is proposed in this paper in which a type-based proxy reencryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. However, in some applications, the time within which the data was sampled or collected is very critical. In such applications, for example, healthcare and criminal investigations, the delegatee may be interested in only some of the messages with some types sampled within some time bound instead of the entire subset. Hence, in order to carter for such situations, in this paper, we propose a time-and-identity-based proxy reencryption scheme that takes into account the time within which the data was collected as a factor to consider when categorizing data in addition to its type. Our scheme is based on Boneh and Boyen identity-based scheme (BB-IBE and Matsuo’s proxy reencryption scheme for identity-based encryption (IBE to IBE. We prove that our scheme is semantically secure in the standard model.

  16. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  17. Quantum signature scheme for known quantum messages

    International Nuclear Information System (INIS)

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  18. Digital Signature Schemes with Complementary Functionality and Applications

    OpenAIRE

    S. N. Kyazhin

    2012-01-01

    Digital signature schemes with additional functionality (an undeniable signature, a signature of the designated confirmee, a signature blind, a group signature, a signature of the additional protection) and examples of their application are considered. These schemes are more practical, effective and useful than schemes of ordinary digital signature.

  19. Quantum messages with signatures forgeable in arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Kim, Taewan; Choi, Jeong Woon; Jho, Nam-Su; Lee, Soojoon

    2015-01-01

    Even though a method to perfectly sign quantum messages has not been known, the arbitrated quantum signature scheme has been considered as one of the good candidates. However, its forgery problem has been an obstacle to the scheme becoming a successful method. In this paper, we consider one situation, which is slightly different from the forgery problem, that we use to check whether at least one quantum message with signature can be forged in a given scheme, although all the messages cannot be forged. If there are only a finite number of forgeable quantum messages in the scheme, then the scheme can be secured against the forgery attack by not sending forgeable quantum messages, and so our situation does not directly imply that we check whether the scheme is secure against the attack. However, if users run a given scheme without any consideration of forgeable quantum messages, then a sender might transmit such forgeable messages to a receiver and in such a case an attacker can forge the messages if the attacker knows them. Thus it is important and necessary to look into forgeable quantum messages. We show here that there always exists such a forgeable quantum message-signature pair for every known scheme with quantum encryption and rotation, and numerically show that there are no forgeable quantum message-signature pairs that exist in an arbitrated quantum signature scheme. (paper)

  20. A group signature scheme based on quantum teleportation

    International Nuclear Information System (INIS)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu

    2010-01-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  1. A group signature scheme based on quantum teleportation

    Energy Technology Data Exchange (ETDEWEB)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu, E-mail: wxjun36@gmail.co [Information Countermeasure Technique Research Institute, Harbin Institute of Technology, Harbin 150001 (China)

    2010-05-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  2. An Arbitrated Quantum Signature Scheme without Entanglement*

    International Nuclear Information System (INIS)

    Li Hui-Ran; Luo Ming-Xing; Peng Dai-Yuan; Wang Xiao-Jun

    2017-01-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks . (paper)

  3. Research on a New Signature Scheme on Blockchain

    Directory of Open Access Journals (Sweden)

    Chao Yuan

    2017-01-01

    Full Text Available With the rise of Bitcoin, blockchain which is the core technology of Bitcoin has received increasing attention. Privacy preserving and performance on blockchain are two research points in academia and business, but there are still some unresolved issues in both respects. An aggregate signature scheme is a digital signature that supports making signatures on many different messages generated by many different users. Using aggregate signature, the size of the signature could be shortened by compressing multiple signatures into a single signature. In this paper, a new signature scheme for transactions on blockchain based on the aggregate signature was proposed. It was worth noting that elliptic curve discrete logarithm problem and bilinear maps played major roles in our signature scheme. And the security properties of our signature scheme were proved. In our signature scheme, the amount will be hidden especially in the transactions which contain multiple inputs and outputs. Additionally, the size of the signature on transaction is constant regardless of the number of inputs and outputs that the transaction contains, which can improve the performance of signature. Finally, we gave an application scenario for our signature scheme which aims to achieve the transactions of big data on blockchain.

  4. Time-and-ID-Based Proxy Reencryption Scheme

    OpenAIRE

    Mtonga, Kambombo; Paul, Anand; Rho, Seungmin

    2014-01-01

    Time- and ID-based proxy reencryption scheme is proposed in this paper in which a type-based proxy reencryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. However, in some applications, the time within which the data was sampled or collected is very critical. In such applications, for example, healthcare and criminal investigations, the delegatee may be interested in only some of the messages with some types sampled wi...

  5. Enhanced arbitrated quantum signature scheme using Bell states

    International Nuclear Information System (INIS)

    Wang Chao; Liu Jian-Wei; Shang Tao

    2014-01-01

    We investigate the existing arbitrated quantum signature schemes as well as their cryptanalysis, including intercept-resend attack and denial-of-service attack. By exploring the loopholes of these schemes, a malicious signatory may successfully disavow signed messages, or the receiver may actively negate the signature from the signatory without being detected. By modifying the existing schemes, we develop counter-measures to these attacks using Bell states. The newly proposed scheme puts forward the security of arbitrated quantum signature. Furthermore, several valuable topics are also presented for further research of the quantum signature scheme

  6. Fine-Grained Forward-Secure Signature Schemes without Random Oracles

    DEFF Research Database (Denmark)

    Camenisch, Jan; Koprowski, Maciej

    2006-01-01

    We propose the concept of fine-grained forward-secure signature schemes. Such signature schemes not only provide nonrepudiation w.r.t. past time periods the way ordinary forward-secure signature schemes do but, in addition, allow the signer to specify which signatures of the current time period...... remain valid when revoking the public key. This is an important advantage if the signer produces many signatures per time period as otherwise the signer would have to re-issue those signatures (and possibly re-negotiate the respective messages) with a new key.Apart from a formal model for fine......-grained forward-secure signature schemes, we present practical schemes and prove them secure under the strong RSA assumption only, i.e., we do not resort to the random oracle model to prove security. As a side-result, we provide an ordinary forward-secure scheme whose key-update time is significantly smaller than...

  7. An Efficient Homomorphic Aggregate Signature Scheme Based on Lattice

    Directory of Open Access Journals (Sweden)

    Zhengjun Jing

    2014-01-01

    Full Text Available Homomorphic aggregate signature (HAS is a linearly homomorphic signature (LHS for multiple users, which can be applied for a variety of purposes, such as multi-source network coding and sensor data aggregation. In order to design an efficient postquantum secure HAS scheme, we borrow the idea of the lattice-based LHS scheme over binary field in the single-user case, and develop it into a new lattice-based HAS scheme in this paper. The security of the proposed scheme is proved by showing a reduction to the single-user case and the signature length remains invariant. Compared with the existing lattice-based homomorphic aggregate signature scheme, our new scheme enjoys shorter signature length and high efficiency.

  8. Signature Schemes Secure against Hard-to-Invert Leakage

    DEFF Research Database (Denmark)

    Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus

    2012-01-01

    of the secret key. As a second contribution, we construct a signature scheme that achieves security for random messages assuming that the adversary is given a polynomial-time hard to invert function. Here, polynomial-hardness is required even when given the entire public-key – so called weak auxiliary input......-theoretically reveal the entire secret key. In this work, we propose the first constructions of digital signature schemes that are secure in the auxiliary input model. Our main contribution is a digital signature scheme that is secure against chosen message attacks when given an exponentially hard-to-invert function...... security. We show that such signature schemes readily give us auxiliary input secure identification schemes...

  9. Quantum blind dual-signature scheme without arbitrator

    International Nuclear Information System (INIS)

    Li, Wei; Shi, Ronghua; Huang, Dazu; Shi, Jinjing; Guo, Ying

    2016-01-01

    Motivated by the elegant features of a bind signature, we suggest the design of a quantum blind dual-signature scheme with three phases, i.e., initial phase, signing phase and verification phase. Different from conventional schemes, legal messages are signed not only by the blind signatory but also by the sender in the signing phase. It does not rely much on an arbitrator in the verification phase as the previous quantum signature schemes usually do. The security is guaranteed by entanglement in quantum information processing. Security analysis demonstrates that the signature can be neither forged nor disavowed by illegal participants or attacker. It provides a potential application for e-commerce or e-payment systems with the current technology. (paper)

  10. Quantum blind dual-signature scheme without arbitrator

    Science.gov (United States)

    Li, Wei; Shi, Ronghua; Huang, Dazu; Shi, Jinjing; Guo, Ying

    2016-03-01

    Motivated by the elegant features of a bind signature, we suggest the design of a quantum blind dual-signature scheme with three phases, i.e., initial phase, signing phase and verification phase. Different from conventional schemes, legal messages are signed not only by the blind signatory but also by the sender in the signing phase. It does not rely much on an arbitrator in the verification phase as the previous quantum signature schemes usually do. The security is guaranteed by entanglement in quantum information processing. Security analysis demonstrates that the signature can be neither forged nor disavowed by illegal participants or attacker. It provides a potential application for e-commerce or e-payment systems with the current technology.

  11. Quantum signature scheme based on a quantum search algorithm

    International Nuclear Information System (INIS)

    Yoon, Chun Seok; Kang, Min Sung; Lim, Jong In; Yang, Hyung Jin

    2015-01-01

    We present a quantum signature scheme based on a two-qubit quantum search algorithm. For secure transmission of signatures, we use a quantum search algorithm that has not been used in previous quantum signature schemes. A two-step protocol secures the quantum channel, and a trusted center guarantees non-repudiation that is similar to other quantum signature schemes. We discuss the security of our protocol. (paper)

  12. Signature scheme based on bilinear pairs

    Science.gov (United States)

    Tong, Rui Y.; Geng, Yong J.

    2013-03-01

    An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.

  13. Tightly Secure Signatures From Lossy Identification Schemes

    OpenAIRE

    Abdalla , Michel; Fouque , Pierre-Alain; Lyubashevsky , Vadim; Tibouchi , Mehdi

    2015-01-01

    International audience; In this paper, we present three digital signature schemes with tight security reductions in the random oracle model. Our first signature scheme is a particularly efficient version of the short exponent discrete log-based scheme of Girault et al. (J Cryptol 19(4):463–487, 2006). Our scheme has a tight reduction to the decisional short discrete logarithm problem, while still maintaining the non-tight reduction to the computational version of the problem upon which the or...

  14. A Directed Signature Scheme and its Applications

    OpenAIRE

    Lal, Sunder; Kumar, Manoj

    2004-01-01

    This paper presents a directed signature scheme with the property that the signature can be verified only with the help of signer or signature receiver. We also propose its applications to share verification of signatures and to threshold cryptosystems.

  15. A Digital Signature Scheme Based on MST3 Cryptosystems

    Directory of Open Access Journals (Sweden)

    Haibo Hong

    2014-01-01

    Full Text Available As special types of factorization of finite groups, logarithmic signature and cover have been used as the main components of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2, and MST3. Recently, Svaba et. al proposed a revised MST3 encryption scheme with greater security. Meanwhile, they put forward an idea of constructing signature schemes on the basis of logarithmic signatures and random covers. In this paper, we firstly design a secure digital signature scheme based on logarithmic signatures and random covers. In order to complete the task, we devise a new encryption scheme based on MST3 cryptosystems.

  16. A Secure and Efficient Certificateless Short Signature Scheme

    Directory of Open Access Journals (Sweden)

    Lin Cheng

    2013-07-01

    Full Text Available Certificateless public key cryptography combines advantage of traditional public key cryptography and identity-based public key cryptography as it avoids usage of certificates and resolves the key escrow problem. In 2007, Huang et al. classified adversaries against certificateless signatures according to their attack power into normal, strong and super adversaries (ordered by their attack power. In this paper, we propose a new certificateless short signature scheme and prove that it is secure against both of the super type I and the super type II adversaries. Our new scheme not only achieves the strongest security level but also has the shortest signature length (one group element. Compared with the other short certificateless signature schemes which have a similar security level, our new scheme has less operation cost.

  17. A novel quantum group signature scheme without using entangled states

    Science.gov (United States)

    Xu, Guang-Bao; Zhang, Ke-Jia

    2015-07-01

    In this paper, we propose a novel quantum group signature scheme. It can make the signer sign a message on behalf of the group without the help of group manager (the arbitrator), which is different from the previous schemes. In addition, a signature can be verified again when its signer disavows she has ever generated it. We analyze the validity and the security of the proposed signature scheme. Moreover, we discuss the advantages and the disadvantages of the new scheme and the existing ones. The results show that our scheme satisfies all the characteristics of a group signature and has more advantages than the previous ones. Like its classic counterpart, our scheme can be used in many application scenarios, such as e-government and e-business.

  18. Security analysis and improvements of arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Zou Xiangfu; Qiu Daowen

    2010-01-01

    A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. For signing quantum messages, some arbitrated quantum signature (AQS) schemes have been proposed. It was claimed that these AQS schemes could guarantee unconditional security. However, we show that they can be repudiated by the receiver Bob. To conquer this shortcoming, we construct an AQS scheme using a public board. The AQS scheme not only avoids being disavowed by the receiver but also preserves all merits in the existing schemes. Furthermore, we discover that entanglement is not necessary while all these existing AQS schemes depend on entanglement. Therefore, we present another AQS scheme without utilizing entangled states in the signing phase and the verifying phase. This scheme has three advantages: it does not utilize entangled states and it preserves all merits in the existing schemes; the signature can avoid being disavowed by the receiver; and it provides a higher efficiency in transmission and reduces the complexity of implementation.

  19. Arbitrated quantum signature scheme with message recovery

    International Nuclear Information System (INIS)

    Lee, Hwayean; Hong, Changho; Kim, Hyunsang; Lim, Jongin; Yang, Hyung Jin

    2004-01-01

    Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed. One scheme uses a public board and the other does not. However both schemes provide confidentiality of the message and a higher efficiency in transmission

  20. Arbitrated quantum signature scheme based on χ-type entangled states

    International Nuclear Information System (INIS)

    Zuo, Huijuan; Huang, Wei; Qin, Sujuan

    2013-01-01

    An arbitrated quantum signature scheme, which is mainly applied in electronic-payment systems, is proposed and investigated. The χ-type entangled states are used for quantum key distribution and quantum signature in this protocol. Compared with previous quantum signature schemes which also utilize χ-type entangled states, the proposed scheme provides higher efficiency. Finally, we also analyze its security under various kinds of attacks. (paper)

  1. Quantum dual signature scheme based on coherent states with entanglement swapping

    International Nuclear Information System (INIS)

    Liu Jia-Li; Shi Rong-Hua; Shi Jin-Jing; Lv Ge-Li; Guo Ying

    2016-01-01

    A novel quantum dual signature scheme, which combines two signed messages expected to be sent to two diverse receivers Bob and Charlie, is designed by applying entanglement swapping with coherent states. The signatory Alice signs two different messages with unitary operations (corresponding to the secret keys) and applies entanglement swapping to generate a quantum dual signature. The dual signature is firstly sent to the verifier Bob who extracts and verifies the signature of one message and transmits the rest of the dual signature to the verifier Charlie who verifies the signature of the other message. The transmission of the dual signature is realized with quantum teleportation of coherent states. The analysis shows that the security of secret keys and the security criteria of the signature protocol can be greatly guaranteed. An extensional multi-party quantum dual signature scheme which considers the case with more than three participants is also proposed in this paper and this scheme can remain secure. The proposed schemes are completely suited for the quantum communication network including multiple participants and can be applied to the e-commerce system which requires a secure payment among the customer, business and bank. (paper)

  2. Review and Analysis of Cryptographic Schemes Implementing Threshold Signature

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-03-01

    Full Text Available This work is devoted to the study of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, ellipt ic curves and bilinear pairings were investigated. Different methods of generation and verification of threshold signatures were explored, e.g. used in a mobile agents, Internet banking and e-currency. The significance of the work is determined by the reduction of the level of counterfeit electronic documents, signed by certain group of users.

  3. Security problem on arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Choi, Jeong Woon; Chang, Ku-Young; Hong, Dowon

    2011-01-01

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  4. Security problem on arbitrated quantum signature schemes

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Jeong Woon [Emerging Technology R and D Center, SK Telecom, Kyunggi 463-784 (Korea, Republic of); Chang, Ku-Young; Hong, Dowon [Cryptography Research Team, Electronics and Telecommunications Research Institute, Daejeon 305-700 (Korea, Republic of)

    2011-12-15

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  5. Quantum dual signature scheme based on coherent states with entanglement swapping

    Science.gov (United States)

    Liu, Jia-Li; Shi, Rong-Hua; Shi, Jin-Jing; Lv, Ge-Li; Guo, Ying

    2016-08-01

    A novel quantum dual signature scheme, which combines two signed messages expected to be sent to two diverse receivers Bob and Charlie, is designed by applying entanglement swapping with coherent states. The signatory Alice signs two different messages with unitary operations (corresponding to the secret keys) and applies entanglement swapping to generate a quantum dual signature. The dual signature is firstly sent to the verifier Bob who extracts and verifies the signature of one message and transmits the rest of the dual signature to the verifier Charlie who verifies the signature of the other message. The transmission of the dual signature is realized with quantum teleportation of coherent states. The analysis shows that the security of secret keys and the security criteria of the signature protocol can be greatly guaranteed. An extensional multi-party quantum dual signature scheme which considers the case with more than three participants is also proposed in this paper and this scheme can remain secure. The proposed schemes are completely suited for the quantum communication network including multiple participants and can be applied to the e-commerce system which requires a secure payment among the customer, business and bank. Project supported by the National Natural Science Foundation of China (Grant Nos. 61272495, 61379153, and 61401519) and the Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20130162110012).

  6. A Provably Secure Aggregate Signature Scheme for Healthcare Wireless Sensor Networks.

    Science.gov (United States)

    Shen, Limin; Ma, Jianfeng; Liu, Ximeng; Miao, Meixia

    2016-11-01

    Wireless sensor networks (WSNs) are being used in a wide range of applications for healthcare monitoring, like heart rate monitors and blood pressure monitors, which can minimize the need for healthcare professionals. In medical system, sensors on or in patients produce medical data which can be easily compromised by a vast of attacks. Although signature schemes can protect data authenticity and data integrity, when the number of users involved in the medical system becomes huge, the bandwidth and storage cost will rise sharply so that existing signature schemes are inapplicability for WSNs. In this paper, we propose an efficient aggregate signature scheme for healthcare WSNs according to an improved security model, which can combine multiple signatures into a single aggregate signature. The length of such an aggregate signature may be as long as that of an individual one, which can greatly decrease the bandwidth and storage cost for networks.

  7. XMSS : a practical forward secure signature scheme based on minimal security assumptions

    NARCIS (Netherlands)

    Buchmann, Johannes; Dahmen, Erik; Hülsing, Andreas; Yang, B.-Y.

    2011-01-01

    We present the hash-based signature scheme XMSS. It is the first provably (forward) secure and practical signature scheme with minimal security requirements: a pseudorandom and a second preimage resistant (hash) function family. Its signature size is reduced to less than 25% compared to the best

  8. An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model

    Directory of Open Access Journals (Sweden)

    Guomin Zhou

    2017-01-01

    Full Text Available Digital signature schemes with additional properties have broad applications, such as in protecting the identity of signers allowing a signer to anonymously sign a message in a group of signers (also known as a ring. While these number-theoretic problems are still secure at the time of this research, the situation could change with advances in quantum computing. There is a pressing need to design PKC schemes that are secure against quantum attacks. In this paper, we propose a novel code-based threshold ring signature scheme with a leader-participant model. A leader is appointed, who chooses some shared parameters for other signers to participate in the signing process. This leader-participant model enhances the performance because every participant including the leader could execute the decoding algorithm (as a part of signing process upon receiving the shared parameters from the leader. The time complexity of our scheme is close to Courtois et al.’s (2001 scheme. The latter is often used as a basis to construct other types of code-based signature schemes. Moreover, as a threshold ring signature scheme, our scheme is as efficient as the normal code-based ring signature.

  9. Signature scheme for the microscopic description of nuclear collective excitations

    International Nuclear Information System (INIS)

    Ogawa, K.

    1980-04-01

    The symmetries between the proton and neutron systems in a nucleus are described in terms of the signatures. Three kinds of signatures (i.e. the pn-, p anti n- and p anti p- (or n anti n-) signatures) are introduced and they are related to the appearance of various collective motions such as rotations or vibrations. It is shown that the pn-signature scheme provides a band-like structure of deformed nuclei, while the features associated with the quadrupole vibration are obtained in the p anti n- and p anti p-signature scheme. From the detail investigation of the p anti n-symmetric wave functions, it is concluded that the reguralities provided by the present shell model are more analogous to those of the γ-unstable surface vibration model (Wilets-Jean model) than to those of harmonic phonon model. (author)

  10. A secure quantum group signature scheme based on Bell states

    International Nuclear Information System (INIS)

    Zhang Kejia; Song Tingting; Zuo Huijuan; Zhang Weiwei

    2013-01-01

    In this paper, we propose a new secure quantum group signature with Bell states, which may have applications in e-payment system, e-government, e-business, etc. Compared with the recent quantum group signature protocols, our scheme is focused on the most general situation in practice, i.e. only the arbitrator is trusted and no intermediate information needs to be stored in the signing phase to ensure the security. Furthermore, our scheme has achieved all the characteristics of group signature—anonymity, verifiability, traceability, unforgetability and undeniability, by using some current developed quantum and classical technologies. Finally, a feasible security analysis model for quantum group signature is presented. (paper)

  11. On the security of pairing-free certificateless digital signature schemes using ECC

    Directory of Open Access Journals (Sweden)

    Namita Tiwari

    2015-09-01

    Full Text Available I cryptanalyze the pairing-free digital signature scheme of Islam et al. which is proven secure against “adaptive chosen message attacks”. I introduce this type of forgery to analyze their scheme. Furthermore, I comment on general security issues that should be considered when making improvements on their scheme. My security analysis is also applicable to other digital signatures designed in a similar manner.

  12. A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things

    Science.gov (United States)

    Yeh, Kuo-Hui; Su, Chunhua; Choo, Kim-Kwang Raymond; Chiu, Wayne

    2017-01-01

    Rapid advances in wireless communications and pervasive computing technologies have resulted in increasing interest and popularity of Internet-of-Things (IoT) architecture, ubiquitously providing intelligence and convenience to our daily life. In IoT-based network environments, smart objects are embedded everywhere as ubiquitous things connected in a pervasive manner. Ensuring security for interactions between these smart things is significantly more important, and a topic of ongoing interest. In this paper, we present a certificateless signature scheme for smart objects in IoT-based pervasive computing environments. We evaluate the utility of the proposed scheme in IoT-oriented testbeds, i.e., Arduino Uno and Raspberry PI 2. Experiment results present the practicability of the proposed scheme. Moreover, we revisit the scheme of Wang et al. (2015) and revealed that a malicious super type I adversary can easily forge a legitimate signature to cheat any receiver as he/she wishes in the scheme. The superiority of the proposed certificateless signature scheme over relevant studies is demonstrated in terms of the summarized security and performance comparisons. PMID:28468313

  13. A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things

    Directory of Open Access Journals (Sweden)

    Kuo-Hui Yeh

    2017-05-01

    Full Text Available Rapid advances in wireless communications and pervasive computing technologies have resulted in increasing interest and popularity of Internet-of-Things (IoT architecture, ubiquitously providing intelligence and convenience to our daily life. In IoT-based network environments, smart objects are embedded everywhere as ubiquitous things connected in a pervasive manner. Ensuring security for interactions between these smart things is significantly more important, and a topic of ongoing interest. In this paper, we present a certificateless signature scheme for smart objects in IoT-based pervasive computing environments. We evaluate the utility of the proposed scheme in IoT-oriented testbeds, i.e., Arduino Uno and Raspberry PI 2. Experiment results present the practicability of the proposed scheme. Moreover, we revisit the scheme of Wang et al. (2015 and revealed that a malicious super type I adversary can easily forge a legitimate signature to cheat any receiver as he/she wishes in the scheme. The superiority of the proposed certificateless signature scheme over relevant studies is demonstrated in terms of the summarized security and performance comparisons.

  14. A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things.

    Science.gov (United States)

    Yeh, Kuo-Hui; Su, Chunhua; Choo, Kim-Kwang Raymond; Chiu, Wayne

    2017-05-01

    Rapid advances in wireless communications and pervasive computing technologies have resulted in increasing interest and popularity of Internet-of-Things (IoT) architecture, ubiquitously providing intelligence and convenience to our daily life. In IoT-based network environments, smart objects are embedded everywhere as ubiquitous things connected in a pervasive manner. Ensuring security for interactions between these smart things is significantly more important, and a topic of ongoing interest. In this paper, we present a certificateless signature scheme for smart objects in IoT-based pervasive computing environments. We evaluate the utility of the proposed scheme in IoT-oriented testbeds, i.e., Arduino Uno and Raspberry PI 2. Experiment results present the practicability of the proposed scheme. Moreover, we revisit the scheme of Wang et al. (2015) and revealed that a malicious super type I adversary can easily forge a legitimate signature to cheat any receiver as he/she wishes in the scheme. The superiority of the proposed certificateless signature scheme over relevant studies is demonstrated in terms of the summarized security and performance comparisons.

  15. Key-Insulated Undetachable Digital Signature Scheme and Solution for Secure Mobile Agents in Electronic Commerce

    Directory of Open Access Journals (Sweden)

    Yang Shi

    2016-01-01

    Full Text Available Considering the security of both the customers’ hosts and the eShops’ servers, we introduce the idea of a key-insulated undetachable digital signature, enabling mobile agents to generate undetachable digital signatures on remote hosts with the key-insulated property of the original signer’s signing key. From the theoretical perspective, we provide the formal definition and security notion of a key-insulated undetachable digital signature. From the practical perspective, we propose a concrete scheme to secure mobile agents in electronic commerce. The scheme is mainly focused on protecting the signing key from leakage and preventing the misuse of the signature algorithm on malicious servers. Agents do not carry the signing key when they generate digital signatures on behalf of the original signer, so the key is protected on remote servers. Furthermore, if a hacker gains the signing key of the original signer, the hacker is still unable to forge a signature for any time period other than the key being accessed. In addition, the encrypted function is combined with the original signer’s requirement to prevent the misuse of signing algorithm. The scheme is constructed on gap Diffie–Hellman groups with provable security, and the performance testing indicates that the scheme is efficient.

  16. On the security of the Winternitz one-time signature scheme

    NARCIS (Netherlands)

    Buchmann, Johannes; Dahmen, Erik; Ereth, Sarah; Hülsing, Andreas; Rückert, Markus; Nitaj, A.; Pointcheval, D.

    2011-01-01

    We show that the Winternitz one-time signature scheme is existentially unforgeable under adaptive chosen message attacks when instantiated with a family of pseudo random functions. Compared to previous results, which require a collision resistant hash function, our result provides significantly

  17. Network-based Arbitrated Quantum Signature Scheme with Graph State

    Science.gov (United States)

    Ma, Hongling; Li, Fei; Mao, Ningyi; Wang, Yijun; Guo, Ying

    2017-08-01

    Implementing an arbitrated quantum signature(QAS) through complex networks is an interesting cryptography technology in the literature. In this paper, we propose an arbitrated quantum signature for the multi-user-involved networks, whose topological structures are established by the encoded graph state. The determinative transmission of the shared keys, is enabled by the appropriate stabilizers performed on the graph state. The implementation of this scheme depends on the deterministic distribution of the multi-user-shared graph state on which the encoded message can be processed in signing and verifying phases. There are four parties involved, the signatory Alice, the verifier Bob, the arbitrator Trent and Dealer who assists the legal participants in the signature generation and verification. The security is guaranteed by the entanglement of the encoded graph state which is cooperatively prepared by legal participants in complex quantum networks.

  18. Supervised Multi-Authority Scheme with Blind Signature for IoT with Attribute Based Encryption

    Science.gov (United States)

    Nissenbaum, O. V.; Ponomarov, K. Y.; Zaharov, A. A.

    2018-04-01

    This article proposes a three-side cryptographic scheme for verifying device attributes with a Supervisor and a Certification Authority (CA) for attribute-based encryption. Two options are suggested: using a message authentication code and using a digital signature. The first version is suitable for networks with one CA, and the second one for networks with several CAs, including dynamic systems. Also, the addition of this scheme with a blind signature is proposed to preserve the confidentiality of the device attributes from the CA. The introduction gives a definition and a brief historical overview of attribute-based encryption (ABE), addresses the use of ABE in the Internet of Things.

  19. Risk analysis of the proxy life-cycle investments in the second pillar pension scheme in Croatia

    Directory of Open Access Journals (Sweden)

    Renata Kovačević

    2015-03-01

    Full Text Available In this article we analyze the expected risk of pension funds with different risk profiles in the proxy life-cycle model of investments for the 2nd pillar pension scheme in Croatia. The benefits of implementing proxy life-cycle investments, compared to the previous model of mandatory pension funds investments, are clearly visible in the total expected amount of accumulated savings from the risk/return perspective. However, those benefits are partially diminished by the fact that the expected risk of a pension fund with the lowest risk profile is not substantially different from the expected risk of a pension fund with a medium risk profile, due to the lack of diversification. Additionally, we analyze the robustness of the proxy life-cycle model to a sudden and severe market shock, where we determine the presence of risk for those members who choose to switch to a pension fund with a lower risk profile at an unfavorable moment.

  20. Security analysis of boolean algebra based on Zhang-Wang digital signature scheme

    International Nuclear Information System (INIS)

    Zheng, Jinbin

    2014-01-01

    In 2005, Zhang and Wang proposed an improvement signature scheme without using one-way hash function and message redundancy. In this paper, we show that this scheme exits potential safety concerns through the analysis of boolean algebra, such as bitwise exclusive-or, and point out that mapping is not one to one between assembly instructions and machine code actually by means of the analysis of the result of the assembly program segment, and which possibly causes safety problems unknown to the software

  1. Security analysis of boolean algebra based on Zhang-Wang digital signature scheme

    Energy Technology Data Exchange (ETDEWEB)

    Zheng, Jinbin, E-mail: jbzheng518@163.com [School of Mathematics and Computer Science, Long Yan University, Longyan 364012 (China)

    2014-10-06

    In 2005, Zhang and Wang proposed an improvement signature scheme without using one-way hash function and message redundancy. In this paper, we show that this scheme exits potential safety concerns through the analysis of boolean algebra, such as bitwise exclusive-or, and point out that mapping is not one to one between assembly instructions and machine code actually by means of the analysis of the result of the assembly program segment, and which possibly causes safety problems unknown to the software.

  2. Fair quantum blind signatures

    International Nuclear Information System (INIS)

    Tian-Yin, Wang; Qiao-Yan, Wen

    2010-01-01

    We present a new fair blind signature scheme based on the fundamental properties of quantum mechanics. In addition, we analyse the security of this scheme, and show that it is not possible to forge valid blind signatures. Moreover, comparisons between this scheme and public key blind signature schemes are also discussed. (general)

  3. A study of practical proxy reencryption with a keyword search scheme considering cloud storage structure.

    Science.gov (United States)

    Lee, Sun-Ho; Lee, Im-Yeong

    2014-01-01

    Data outsourcing services have emerged with the increasing use of digital information. They can be used to store data from various devices via networks that are easy to access. Unlike existing removable storage systems, storage outsourcing is available to many users because it has no storage limit and does not require a local storage medium. However, the reliability of storage outsourcing has become an important topic because many users employ it to store large volumes of data. To protect against unethical administrators and attackers, a variety of cryptography systems are used, such as searchable encryption and proxy reencryption. However, existing searchable encryption technology is inconvenient for use in storage outsourcing environments where users upload their data to be shared with others as necessary. In addition, some existing schemes are vulnerable to collusion attacks and have computing cost inefficiencies. In this paper, we analyze existing proxy re-encryption with keyword search.

  4. Real Traceable Signatures

    Science.gov (United States)

    Chow, Sherman S. M.

    Traceable signature scheme extends a group signature scheme with an enhanced anonymity management mechanism. The group manager can compute a tracing trapdoor which enables anyone to test if a signature is signed by a given misbehaving user, while the only way to do so for group signatures requires revealing the signer of all signatures. Nevertheless, it is not tracing in a strict sense. For all existing schemes, T tracing agents need to recollect all N' signatures ever produced and perform RN' “checks” for R revoked users. This involves a high volume of transfer and computations. Increasing T increases the degree of parallelism for tracing but also the probability of “missing” some signatures in case some of the agents are dishonest.

  5. A Study of Practical Proxy Reencryption with a Keyword Search Scheme considering Cloud Storage Structure

    Directory of Open Access Journals (Sweden)

    Sun-Ho Lee

    2014-01-01

    Full Text Available Data outsourcing services have emerged with the increasing use of digital information. They can be used to store data from various devices via networks that are easy to access. Unlike existing removable storage systems, storage outsourcing is available to many users because it has no storage limit and does not require a local storage medium. However, the reliability of storage outsourcing has become an important topic because many users employ it to store large volumes of data. To protect against unethical administrators and attackers, a variety of cryptography systems are used, such as searchable encryption and proxy reencryption. However, existing searchable encryption technology is inconvenient for use in storage outsourcing environments where users upload their data to be shared with others as necessary. In addition, some existing schemes are vulnerable to collusion attacks and have computing cost inefficiencies. In this paper, we analyze existing proxy re-encryption with keyword search.

  6. General Conversion for Obtaining Strongly Existentially Unforgeable Signatures

    Science.gov (United States)

    Teranishi, Isamu; Oyama, Takuro; Ogata, Wakaha

    We say that a signature scheme is strongly existentially unforgeable (SEU) if no adversary, given message/signature pairs adaptively, can generate a signature on a new message or a new signature on a previously signed message. We propose a general and efficient conversion in the standard model that transforms a secure signature scheme to SEU signature scheme. In order to construct that conversion, we use a chameleon commitment scheme. Here a chameleon commitment scheme is a variant of commitment scheme such that one can change the committed value after publishing the commitment if one knows the secret key. We define the chosen message security notion for the chameleon commitment scheme, and show that the signature scheme transformed by our proposed conversion satisfies the SEU property if the chameleon commitment scheme is chosen message secure. By modifying the proposed conversion, we also give a general and efficient conversion in the random oracle model, that transforms a secure signature scheme into a SEU signature scheme. This second conversion also uses a chameleon commitment scheme but only requires the key only attack security for it.

  7. Unconditionally Secure Quantum Signatures

    Directory of Open Access Journals (Sweden)

    Ryan Amiri

    2015-08-01

    Full Text Available Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols—signatures based on the Rivest–Adleman–Shamir (RSA algorithm, the digital signature algorithm (DSA, and the elliptic curve digital signature algorithm (ECDSA—are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally securesecure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  8. Lattice-Based Revocable Certificateless Signature

    Directory of Open Access Journals (Sweden)

    Ying-Hao Hung

    2017-10-01

    Full Text Available Certificateless signatures (CLS are noticeable because they may resolve the key escrow problem in ID-based signatures and break away the management problem regarding certificate in conventional signatures. However, the security of the mostly previous CLS schemes relies on the difficulty of solving discrete logarithm or large integer factorization problems. These two problems would be solved by quantum computers in the future so that the signature schemes based on them will also become insecure. For post-quantum cryptography, lattice-based cryptography is significant due to its efficiency and security. However, no study on addressing the revocation problem in the existing lattice-based CLS schemes is presented. In this paper, we focus on the revocation issue and present the first revocable CLS (RCLS scheme over lattices. Based on the short integer solution (SIS assumption over lattices, the proposed lattice-based RCLS scheme is shown to be existential unforgeability against adaptive chosen message attacks. By performance analysis and comparisons, the proposed lattice-based RCLS scheme is better than the previously proposed lattice-based CLS scheme, in terms of private key size, signature length and the revocation mechanism.

  9. Cost-effective handoff scheme based on mobility-aware dual pointer forwarding in proxy mobile IPv6 networks.

    Science.gov (United States)

    Son, Seungsik; Jeong, Jongpil

    2014-01-01

    In this paper, a mobility-aware Dual Pointer Forwarding scheme (mDPF) is applied in Proxy Mobile IPv6 (PMIPv6) networks. The movement of a Mobile Node (MN) is classified as intra-domain and inter-domain handoff. When the MN moves, this scheme can reduce the high signaling overhead for intra-handoff/inter-handoff, because the Local Mobility Anchor (LMA) and Mobile Access Gateway (MAG) are connected by pointer chains. In other words, a handoff is aware of low mobility between the previously attached MAG (pMAG) and newly attached MAG (nMAG), and another handoff between the previously attached LMA (pLMA) and newly attached LMA (nLMA) is aware of high mobility. Based on these mobility-aware binding updates, the overhead of the packet delivery can be reduced. Also, we analyse the binding update cost and packet delivery cost for route optimization, based on the mathematical analytic model. Analytical results show that our mDPF outperforms the PMIPv6 and the other pointer forwarding schemes, in terms of reducing the total cost of signaling.

  10. Securing optical code-division multiple-access networks with a postswitching coding scheme of signature reconfiguration

    Science.gov (United States)

    Huang, Jen-Fa; Meng, Sheng-Hui; Lin, Ying-Chen

    2014-11-01

    The optical code-division multiple-access (OCDMA) technique is considered a good candidate for providing optical layer security. An enhanced OCDMA network security mechanism with a pseudonoise (PN) random digital signals type of maximal-length sequence (M-sequence) code switching to protect against eavesdropping is presented. Signature codes unique to individual OCDMA-network users are reconfigured according to the register state of the controlling electrical shift registers. Examples of signature reconfiguration following state switching of the controlling shift register for both the network user and the eavesdropper are numerically illustrated. Dynamically changing the PN state of the shift register to reconfigure the user signature sequence is shown; this hinders eavesdroppers' efforts to decode correct data sequences. The proposed scheme increases the probability of eavesdroppers committing errors in decoding and thereby substantially enhances the degree of an OCDMA network's confidentiality.

  11. Obfuscated RSUs Vector Based Signature Scheme for Detecting Conspiracy Sybil Attack in VANETs

    Directory of Open Access Journals (Sweden)

    Xia Feng

    2017-01-01

    Full Text Available Given the popularity of vehicular Ad hoc networks (VANETs in traffic management, a new challenging issue comes into traffic safety, that is, security of the networks, especially when the adversary breaks defence. Sybil attack, for example, is a potential security threat through forging several identities to carry out attacks in VANETs. At this point, the paper proposed a solution named DMON that is a Sybil attack detection method with obfuscated neighbor relationship of Road Side Units (RSUs. DMON presents a ring signature based identification scheme and replaces vehicles’ identities with their trajectory for the purpose of anonymity. Furthermore, the neighbor relationship of RSUs is obfuscated to achieve privacy preserving of locations. The proposed scheme has been formally proved in the views of security and performance. Simulation has also been implemented to validate the scheme, in which the findings reveal the lower computational overhead and higher detection rate comparing with other related solutions.

  12. Arctic and Antarctic Oscillation signatures in tropical coral proxies over the South China Sea

    Directory of Open Access Journals (Sweden)

    D.-Y. Gong

    2009-05-01

    Full Text Available Arctic Oscillation (AO and Antarctic Oscillation (AAO are the leading modes of atmospheric circulation in mid-high latitudes. Previous studies have revealed that the climatic influences of the two modes are dominant in extra-tropical regions. This study finds that AO and AAO signals are also well recorded in coral proxies in the tropical South China Sea. There are significant interannual signals of AO and AAO in the strontium (Sr content, which represents the sea surface temperature (SST. Among all the seasons, the most significant correlation occurs during winter in both hemispheres: the strongest AO-Sr and AAO-Sr coral correlations occur in January and August, respectively. This study also determined that the Sr content lags behind AO and AAO by 1–3 months. Large-scale anomalies in sea level pressure and horizontal wind at 850 hPa level support the strength of AO/AAO-coral teleconnections. In addition, a comparison with oxygen isotope records from two coral sites in neighboring oceans yields significant AO and AAO signatures with similar time lags. These results help to better understand monsoon climates and their teleconnection to high-latitude climate changes.

  13. Efficient Fair Exchange from Identity-Based Signature

    Science.gov (United States)

    Yum, Dae Hyun; Lee, Pil Joong

    A fair exchange scheme is a protocol by which two parties Alice and Bob exchange items or services without allowing either party to gain advantages by quitting prematurely or otherwise misbehaving. To this end, modern cryptographic solutions use a semi-trusted arbitrator who involves only in cases where one party attempts to cheat or simply crashes. We call such a fair exchange scheme optimistic. When no registration is required between the signer and the arbitrator, we say that the fair exchange scheme is setup free. To date, the setup-free optimist fair exchange scheme under the standard RSA assumption was only possible from the generic construction of [12], which uses ring signatures. In this paper, we introduce a new setup-free optimistic fair exchange scheme under the standard RSA assumption. Our scheme uses the GQ identity-based signature and is more efficient than [12]. The construction can also be generalized by using various identity-based signature schemes. Our main technique is to allow each user to choose his (or her) own “random” public key in the identitybased signature scheme.

  14. Quantum multi-signature protocol based on teleportation

    International Nuclear Information System (INIS)

    Wen Xiao-jun; Liu Yun; Sun Yu

    2007-01-01

    In this paper, a protocol which can be used in multi-user quantum signature is proposed. The scheme of signature and verification is based on the correlation of Greenberger-Horne-Zeilinger (GHZ) states and the controlled quantum teleportation. Different from the digital signatures, which are based on computational complexity, the proposed protocol has perfect security in the noiseless quantum channels. Compared to previous quantum signature schemes, this protocol can verify the signature independent of an arbitrator as well as realize multi-user signature together. (orig.)

  15. An energy signature scheme for steam trap assessment and flow rate estimation using pipe-induced acoustic measurements

    Science.gov (United States)

    Olama, Mohammed M.; Allgood, Glenn O.; Kuruganti, Teja P.; Lake, Joe E.

    2012-06-01

    The US Congress has passed legislation dictating that all government agencies establish a plan and process for improving energy efficiencies at their sites. In response to this legislation, Oak Ridge National Laboratory (ORNL) has recently conducted a pilot study to explore the deployment of a wireless sensor system for a real-time measurement-based energy efficiency optimization framework within the steam distribution system within the ORNL campus. We make assessments on the real-time status of the distribution system by observing the state measurements of acoustic sensors mounted on the steam pipes/traps/valves. In this paper, we describe a spectral-based energy signature scheme that interprets acoustic vibration sensor data to estimate steam flow rates and assess steam traps health status. Experimental results show that the energy signature scheme has the potential to identify different steam trap health status and it has sufficient sensitivity to estimate steam flow rate. Moreover, results indicate a nearly quadratic relationship over the test region between the overall energy signature factor and flow rate in the pipe. The analysis based on estimated steam flow and steam trap status helps generate alerts that enable operators and maintenance personnel to take remedial action. The goal is to achieve significant energy-saving in steam lines by monitoring and acting on leaking steam pipes/traps/valves.

  16. Sensor proxy mobile IPv6 (SPMIPv6)--a novel scheme for mobility supported IP-WSNs.

    Science.gov (United States)

    Islam, Md Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly.

  17. Secure Certificateless Signature with Revocation in the Standard Model

    Directory of Open Access Journals (Sweden)

    Tung-Tso Tsai

    2014-01-01

    previously proposed certificateless signature schemes were insecure under a considerably strong security model in the sense that they suffered from outsiders’ key replacement attacks or the attacks from the key generation center (KGC. In this paper, we propose a certificateless signature scheme without random oracles. Moreover, our scheme is secure under the strong security model and provides a public revocation mechanism, called revocable certificateless signature (RCLS. Under the standard computational Diffie-Hellman assumption, we formally demonstrate that our scheme possesses existential unforgeability against adaptive chosen-message attacks.

  18. Diffie-Hellman Key Based Authentication in Proxy Mobile IPv6

    Directory of Open Access Journals (Sweden)

    HyunGon Kim

    2010-01-01

    Full Text Available Wireless communication service providers have been showing strong interest in Proxy Mobile IPv6 for providing network-based IP mobility management. This could be a prominent way to support IP mobility to mobile nodes, because Proxy Mobile IPv6 requires minimal functionalities on the mobile node. While several extensions for Proxy Mobile IPv6 are being developed in the Internet Engineering Task Force, there has been little attentions paid to developing efficient authentication mechanisms. An authentication scheme for a mobility protocol must protect signaling messages against various security threats, e.g., session stealing attack, intercept attack by redirection, replay attack, and key exposure, while minimizing authentication latency. In this paper, we propose a Diffie-Hellman key based authentication scheme that utilizes the low layer signaling to exchange Diffie-Hellman variables and allows mobility service provisioning entities to exchange mobile node's profile and ongoing sessions securely. By utilizing the low layer signaling and context transfer between relevant nodes, the proposed authentication scheme minimizes authentication latency when the mobile node moves across different networks. In addition, thanks to the use of the Diffie-Hellman key agreement, pre-established security associations between mobility service provisioning entities are not required in the proposed authentication scheme so that network scalability in an operationally efficient manner is ensured. To ascertain its feasibility, security analysis and performance analysis are presented.

  19. Climate proxy data as groundwater tracers in regional flow systems

    Science.gov (United States)

    Clark, J. F.; Morrissey, S. K.; Stute, M.

    2008-05-01

    The isotopic and chemical signatures of groundwater reflect local climate conditions. By systematically analyzing groundwater and determining their hydrologic setting, records of past climates can be constructed. Because of their chemistries and relatively uncomplicated source functions, dissolved noble gases have yielded reliable records of continental temperatures for the last 30,000 to 50,000 years. Variations in the stable isotope compositions of groundwater due to long term climate changes have also been documented over these time scales. Because glacial - interglacial climate changes are relatively well known, these climate proxies can be used as "stratigraphic" markers within flow systems and used to distinguish groundwaters that have recharged during the Holocene from those recharged during the last glacial period, important time scales for distinguishing regional and local flow systems in many aquifers. In southern Georgia, the climate proxy tracers were able to identify leakage from surface aquifers into the Upper Floridan aquifer in areas previously thought to be confined. In south Florida, the transition between Holocene and glacial signatures in the Upper Floridan aquifer occurs mid-way between the recharge area and Lake Okeechobee. Down gradient of the lake, the proxies are uniform, indicating recharge during the last glacial period. Furthermore, there is no evidence for leakage from the shallow aquifers into the Upper Floridan. In the Lower Floridan, the climate proxies indicate that the saline water entered the aquifer after sea level rose to its present level.

  20. Sensor Proxy Mobile IPv6 (SPMIPv6)—A Novel Scheme for Mobility Supported IP-WSNs

    Science.gov (United States)

    Islam, Md. Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly. PMID:22319386

  1. Sensor Proxy Mobile IPv6 (SPMIPv6—A Novel Scheme for Mobility Supported IP-WSNs

    Directory of Open Access Journals (Sweden)

    Md. Motaharul Islam

    2011-02-01

    Full Text Available IP based Wireless Sensor Networks (IP-WSNs are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6. We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly.

  2. Forged Signature Distinction Using Convolutional Neural Network for Feature Extraction

    Directory of Open Access Journals (Sweden)

    Seungsoo Nam

    2018-01-01

    Full Text Available This paper proposes a dynamic verification scheme for finger-drawn signatures in smartphones. As a dynamic feature, the movement of a smartphone is recorded with accelerometer sensors in the smartphone, in addition to the moving coordinates of the signature. To extract high-level longitudinal and topological features, the proposed scheme uses a convolution neural network (CNN for feature extraction, and not as a conventional classifier. We assume that a CNN trained with forged signatures can extract effective features (called S-vector, which are common in forging activities such as hesitation and delay before drawing the complicated part. The proposed scheme also exploits an autoencoder (AE as a classifier, and the S-vector is used as the input vector to the AE. An AE has high accuracy for the one-class distinction problem such as signature verification, and is also greatly dependent on the accuracy of input data. S-vector is valuable as the input of AE, and, consequently, could lead to improved verification accuracy especially for distinguishing forged signatures. Compared to the previous work, i.e., the MLP-based finger-drawn signature verification scheme, the proposed scheme decreases the equal error rate by 13.7%, specifically, from 18.1% to 4.4%, for discriminating forged signatures.

  3. An ID-based Blind Signature Scheme from Bilinear Pairings

    OpenAIRE

    B.Umaprasada Rao; K.A.Ajmath

    2010-01-01

    Blind signatures, introduced by Chaum, allow a user to obtain a signature on a message without revealing any thing about the message to the signer. Blind signatures play on important role in plenty of applications such as e-voting, e-cash system where anonymity is of great concern. Identity based(ID-based) public key cryptography can be a good alternative for certified based public key setting, especially when efficient key management and moderate security are required. In this paper, we prop...

  4. A security and privacy preserving e-prescription system based on smart cards.

    Science.gov (United States)

    Hsu, Chien-Lung; Lu, Chung-Fu

    2012-12-01

    In 2002, Ateniese and Medeiros proposed an e-prescription system, in which the patient can store e-prescription and related information using smart card. Latter, Yang et al. proposed a novel smart-card based e-prescription system based on Ateniese and Medeiros's system in 2004. Yang et al. considered the privacy issues of prescription data and adopted the concept of a group signature to provide patient's privacy protection. To make the e-prescription system more realistic, they further applied a proxy signature to allow a patient to delegate his signing capability to other people. This paper proposed a novel security and privacy preserving e-prescription system model based on smart cards. A new role, chemist, is included in the system model for settling the medicine dispute. We further presented a concrete identity-based (ID-based) group signature scheme and an ID-based proxy signature scheme to realize the proposed model. Main property of an ID-based system is that public key is simple user's identity and can be verified without extra public key certificates. Our ID-based group signature scheme can allow doctors to sign e-prescription anonymously. In a case of a medical dispute, identities of the doctors can be identified. The proposed ID-based proxy signature scheme can improve signing delegation and allows a delegation chain. The proposed e-prescription system based on our proposed two cryptographic schemes is more practical and efficient than Yang et al.'s system in terms of security, communication overheads, computational costs, practical considerations.

  5. Arbitrated Quantum Signature with Hamiltonian Algorithm Based on Blind Quantum Computation

    Science.gov (United States)

    Shi, Ronghua; Ding, Wanting; Shi, Jinjing

    2018-03-01

    A novel arbitrated quantum signature (AQS) scheme is proposed motivated by the Hamiltonian algorithm (HA) and blind quantum computation (BQC). The generation and verification of signature algorithm is designed based on HA, which enables the scheme to rely less on computational complexity. It is unnecessary to recover original messages when verifying signatures since the blind quantum computation is applied, which can improve the simplicity and operability of our scheme. It is proved that the scheme can be deployed securely, and the extended AQS has some extensive applications in E-payment system, E-government, E-business, etc.

  6. Inferring climate variability from skewed proxy records

    Science.gov (United States)

    Emile-Geay, J.; Tingley, M.

    2013-12-01

    compared to other proxy records. (2) a multiproxy reconstruction of temperature over the Common Era (Mann et al., 2009), where we find that about one third of the records display significant departures from normality. Accordingly, accounting for skewness in proxy predictors has a notable influence on both reconstructed global mean and spatial patterns of temperature change. Inferring climate variability from skewed proxy records thus requires cares, but can be done with relatively simple tools. References - Mann, M. E., Z. Zhang, S. Rutherford, R. S. Bradley, M. K. Hughes, D. Shindell, C. Ammann, G. Faluvegi, and F. Ni (2009), Global signatures and dynamical origins of the little ice age and medieval climate anomaly, Science, 326(5957), 1256-1260, doi:10.1126/science.1177303. - Moy, C., G. Seltzer, D. Rodbell, and D. Anderson (2002), Variability of El Niño/Southern Oscillation activ- ity at millennial timescales during the Holocene epoch, Nature, 420(6912), 162-165.

  7. Photonic quantum digital signatures operating over kilometer ranges in installed optical fiber

    Science.gov (United States)

    Collins, Robert J.; Fujiwara, Mikio; Amiri, Ryan; Honjo, Toshimori; Shimizu, Kaoru; Tamaki, Kiyoshi; Takeoka, Masahiro; Andersson, Erika; Buller, Gerald S.; Sasaki, Masahide

    2016-10-01

    The security of electronic communications is a topic that has gained noteworthy public interest in recent years. As a result, there is an increasing public recognition of the existence and importance of mathematically based approaches to digital security. Many of these implement digital signatures to ensure that a malicious party has not tampered with the message in transit, that a legitimate receiver can validate the identity of the signer and that messages are transferable. The security of most digital signature schemes relies on the assumed computational difficulty of solving certain mathematical problems. However, reports in the media have shown that certain implementations of such signature schemes are vulnerable to algorithmic breakthroughs and emerging quantum processing technologies. Indeed, even without quantum processors, the possibility remains that classical algorithmic breakthroughs will render these schemes insecure. There is ongoing research into information-theoretically secure signature schemes, where the security is guaranteed against an attacker with arbitrary computational resources. One such approach is quantum digital signatures. Quantum signature schemes can be made information-theoretically secure based on the laws of quantum mechanics while comparable classical protocols require additional resources such as anonymous broadcast and/or a trusted authority. Previously, most early demonstrations of quantum digital signatures required dedicated single-purpose hardware and operated over restricted ranges in a laboratory environment. Here, for the first time, we present a demonstration of quantum digital signatures conducted over several kilometers of installed optical fiber. The system reported here operates at a higher signature generation rate than previous fiber systems.

  8. Sea ice and primary production proxies in surface sediments from a High Arctic Greenland fjord

    DEFF Research Database (Denmark)

    Ribeiro, Sofia; Sejr, Mikael K; Limoges, Audrey

    2017-01-01

    Monitoring Programme. Clear spatial gradients in organic carbon and biogenic silica contents reflected marine influence, nutrient availability and river-induced turbidity, in good agreement with in situ measurements. The sea ice proxy IP25 was detected at all sites but at low concentrations, indicating...... that IP25 records from fjords need to be carefully considered and not directly compared to marine settings. The sea ice-associated biomarker HBI III revealed an open-water signature, with highest concentrations near the mid-July ice edge. This proxy evaluation is an important step towards reliable......In order to establish a baseline for proxy-based reconstructions for the Young Sound–Tyrolerfjord system (Northeast Greenland), we analysed the spatial distribution of primary production and sea ice proxies in surface sediments from the fjord, against monitoring data from the Greenland Ecosystem...

  9. A Proxy Architecture to Enhance the Performance of WAP 2.0 by Data Compression

    Directory of Open Access Journals (Sweden)

    Yin Zhanping

    2005-01-01

    Full Text Available This paper presents a novel proxy architecture for wireless application protocol (WAP employing an advanced data compression scheme. Though optional in WAP , a proxy can isolate the wireless from the wired domain to prevent error propagations and to eliminate wireless session delays (WSD by enabling long-lived connections between the proxy and wireless terminals. The proposed data compression scheme combines content compression together with robust header compression (ROHC, which minimizes the air-interface traffic data, thus significantly reduces the wireless access time. By using the content compression at the transport layer, it also enables TLS tunneling, which overcomes the end-to-end security problem in WAP 1.x. Performance evaluations show that while WAP 1.x is optimized for narrowband wireless channels, WAP utilizing TCP/IP outperforms WAP 1.x over wideband wireless channels even without compression. The proposed data compression scheme reduces the wireless access time of WAP by over in CDMA2000 1XRTT channels, and in low-speed IS-95 channels, substantially reduces access time to give comparable performance to WAP 1.x. The performance enhancement is mainly contributed by the reply content compression, with ROHC offering further enhancements.

  10. Blind Quantum Signature with Blind Quantum Computation

    Science.gov (United States)

    Li, Wei; Shi, Ronghua; Guo, Ying

    2017-04-01

    Blind quantum computation allows a client without quantum abilities to interact with a quantum server to perform a unconditional secure computing protocol, while protecting client's privacy. Motivated by confidentiality of blind quantum computation, a blind quantum signature scheme is designed with laconic structure. Different from the traditional signature schemes, the signing and verifying operations are performed through measurement-based quantum computation. Inputs of blind quantum computation are securely controlled with multi-qubit entangled states. The unique signature of the transmitted message is generated by the signer without leaking information in imperfect channels. Whereas, the receiver can verify the validity of the signature using the quantum matching algorithm. The security is guaranteed by entanglement of quantum system for blind quantum computation. It provides a potential practical application for e-commerce in the cloud computing and first-generation quantum computation.

  11. Blind Quantum Signature with Controlled Four-Particle Cluster States

    Science.gov (United States)

    Li, Wei; Shi, Jinjing; Shi, Ronghua; Guo, Ying

    2017-08-01

    A novel blind quantum signature scheme based on cluster states is introduced. Cluster states are a type of multi-qubit entangled states and it is more immune to decoherence than other entangled states. The controlled four-particle cluster states are created by acting controlled-Z gate on particles of four-particle cluster states. The presented scheme utilizes the above entangled states and simplifies the measurement basis to generate and verify the signature. Security analysis demonstrates that the scheme is unconditional secure. It can be employed to E-commerce systems in quantum scenario.

  12. A Rational Threshold Signature Model and Protocol Based on Different Permissions

    Directory of Open Access Journals (Sweden)

    Bojun Wang

    2014-01-01

    Full Text Available This paper develops a novel model and protocol used in some specific scenarios, in which the participants of multiple groups with different permissions can finish the signature together. We apply the secret sharing scheme based on difference equation to the private key distribution phase and secret reconstruction phrase of our threshold signature scheme. In addition, our scheme can achieve the signature success because of the punishment strategy of the repeated rational secret sharing. Besides, the bit commitment and verification method used to detect players’ cheating behavior acts as a contributing factor to prevent the internal fraud. Using bit commitments, verifiable parameters, and time sequences, this paper constructs a dynamic game model, which has the features of threshold signature management with different permissions, cheat proof, and forward security.

  13. On the security of a novel probabilistic signature based on bilinear square Diffie-Hellman problem and its extension.

    Science.gov (United States)

    Zhao, Zhenguo; Shi, Wenbo

    2014-01-01

    Probabilistic signature scheme has been widely used in modern electronic commerce since it could provide integrity, authenticity, and nonrepudiation. Recently, Wu and Lin proposed a novel probabilistic signature (PS) scheme using the bilinear square Diffie-Hellman (BSDH) problem. They also extended it to a universal designated verifier signature (UDVS) scheme. In this paper, we analyze the security of Wu et al.'s PS scheme and UDVS scheme. Through concrete attacks, we demonstrate both of their schemes are not unforgeable. The security analysis shows that their schemes are not suitable for practical applications.

  14. Revocable ID-Based Signature with Short Size over Lattices

    Directory of Open Access Journals (Sweden)

    Ying-Hao Hung

    2017-01-01

    Full Text Available In the past, many ID-based signature (IBS schemes based on the integer factorization or discrete logarithm problems were proposed. With the progress on the development of quantum technology, IBS schemes mentioned above would become vulnerable. Recently, several IBS schemes over lattices were proposed to be secure against attacks in the quantum era. As conventional public-key settings, ID-based public-key settings have to offer a revocation mechanism to revoke misbehaving or malicious users. However, in the past, little work focuses on the revocation problem in the IBS schemes over lattices. In this article, we propose a new revocable IBS (RIBS scheme with short size over lattices. Based on the short integer solution (SIS assumption, we prove that the proposed RIBS scheme provides existential unforgeability against adaptive chosen-message attacks. As compared to the existing IBS schemes over lattices, our RIBS scheme has better performance in terms of signature size, signing key size, and the revocation mechanism with public channels.

  15. A Proxy Architecture to Enhance the Performance of WAP 2.0 by Data Compression

    Directory of Open Access Journals (Sweden)

    Yin Zhanping

    2005-01-01

    Full Text Available This paper presents a novel proxy architecture for wireless application protocol (WAP 2.0 employing an advanced data compression scheme. Though optional in WAP 2.0 , a proxy can isolate the wireless from the wired domain to prevent error propagations and to eliminate wireless session delays (WSD by enabling long-lived connections between the proxy and wireless terminals. The proposed data compression scheme combines content compression together with robust header compression (ROHC, which minimizes the air-interface traffic data, thus significantly reduces the wireless access time. By using the content compression at the transport layer, it also enables TLS tunneling, which overcomes the end-to-end security problem in WAP 1.x. Performance evaluations show that while WAP 1.x is optimized for narrowband wireless channels, WAP 2.0 utilizing TCP/IP outperforms WAP 1.x over wideband wireless channels even without compression. The proposed data compression scheme reduces the wireless access time of WAP 2.0 by over 45% in CDMA2000 1XRTT channels, and in low-speed IS-95 channels, substantially reduces access time to give comparable performance to WAP 1.x. The performance enhancement is mainly contributed by the reply content compression, with ROHC offering further enhancements.

  16. Security Analysis of Randomize-Hash-then-Sign Digital Signatures

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Knudsen, Lars Ramkilde

    2012-01-01

    At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the security of digital signature algorithms based on these constructions. They showed that the security of signature schemes based on the two randomized hash function modes relies on properties similar...... functions, such as for the Davies-Meyer construction used in the popular hash functions such as MD5 designed by Rivest and the SHA family of hash functions designed by the National Security Agency (NSA), USA and published by NIST in the Federal Information Processing Standards (FIPS). We show an online...... 800-106. We discuss some important applications of our attacks and discuss their applicability on signature schemes based on hash functions with ‘built-in’ randomization. Finally, we compare our attacks on randomize-hash-then-sign schemes with the generic forgery attacks on the standard hash...

  17. Design and implementation of Ad-Hoc collaborative proxying scheme for reducing network energy waste

    Directory of Open Access Journals (Sweden)

    Rafiullah Khan

    2017-05-01

    Full Text Available Network devices are equipped with low power states but they are rarely activated due to their inability of maintaining network connectivity. Recently, Network Connectivity Proxy (NCP concept has been proposed in literature as an effective mechanism to exploit full potential of low power features on network devices by impersonating their virtual presence. However, the NCP concept faces several open issues and challenges especially related to proxying of TCP connections and majority of daily used proprietary closed-source applications. This paper presents a new approach for reducing network energy waste through intelligent collaboration among daily used devices (e.g., desktop computers, laptops, tablets, smartphones, etc. It guarantees to run applications on only and only one user device that is under active use at that specific moment. To reduce energy waste and allow idle devices to sleep, our approach also takes benefit from a light-weight home gateway proxy with very basic practically realizable functionalities. The proposed system not just reduces energy waste of fixed devices but also enables mobile devices to significantly improve their battery life. Our developed software prototypes allow devices to autonomously and seamlessly collaborate with each other without requiring any configuration or user input. Further, this paper also presents the basic performance evaluation of developed prototypes in real networking environments.

  18. Server-Aided Verification Signature with Privacy for Mobile Computing

    Directory of Open Access Journals (Sweden)

    Lingling Xu

    2015-01-01

    Full Text Available With the development of wireless technology, much data communication and processing has been conducted in mobile devices with wireless connection. As we know that the mobile devices will always be resource-poor relative to static ones though they will improve in absolute ability, therefore, they cannot process some expensive computational tasks due to the constrained computational resources. According to this problem, server-aided computing has been studied in which the power-constrained mobile devices can outsource some expensive computation to a server with powerful resources in order to reduce their computational load. However, in existing server-aided verification signature schemes, the server can learn some information about the message-signature pair to be verified, which is undesirable especially when the message includes some secret information. In this paper, we mainly study the server-aided verification signatures with privacy in which the message-signature pair to be verified can be protected from the server. Two definitions of privacy for server-aided verification signatures are presented under collusion attacks between the server and the signer. Then based on existing signatures, two concrete server-aided verification signature schemes with privacy are proposed which are both proved secure.

  19. Reconfiguring waveguide-gratings-based M-signature codecs to enhance OCDMA network confidentiality

    Science.gov (United States)

    Huang, Jen-Fa; Chen, Kai-Sheng; Lin, Ying-Chen; Li, Chung-Yu

    2014-02-01

    A reconfiguration scheme based on composite signature codes over waveguide-gratings-based optical code-division multiple-access (OCDMA) network coder/decoders (codecs) is proposed in the paper. By using central control node to monitor network traffic condition and reconfigure the composite signature codes made up of maximal-length sequence (M-sequence) component codes and random changing the signature codes assigned for each user to improve the confidentiality performance in an OCDMA system. The proposed scheme is analyzed with some practical eavesdroppers' attacks.

  20. Measurement-device-independent quantum digital signatures

    Science.gov (United States)

    Puthoor, Ittoop Vergheese; Amiri, Ryan; Wallden, Petros; Curty, Marcos; Andersson, Erika

    2016-08-01

    Digital signatures play an important role in software distribution, modern communication, and financial transactions, where it is important to detect forgery and tampering. Signatures are a cryptographic technique for validating the authenticity and integrity of messages, software, or digital documents. The security of currently used classical schemes relies on computational assumptions. Quantum digital signatures (QDS), on the other hand, provide information-theoretic security based on the laws of quantum physics. Recent work on QDS Amiri et al., Phys. Rev. A 93, 032325 (2016);, 10.1103/PhysRevA.93.032325 Yin, Fu, and Zeng-Bing, Phys. Rev. A 93, 032316 (2016), 10.1103/PhysRevA.93.032316 shows that such schemes do not require trusted quantum channels and are unconditionally secure against general coherent attacks. However, in practical QDS, just as in quantum key distribution (QKD), the detectors can be subjected to side-channel attacks, which can make the actual implementations insecure. Motivated by the idea of measurement-device-independent quantum key distribution (MDI-QKD), we present a measurement-device-independent QDS (MDI-QDS) scheme, which is secure against all detector side-channel attacks. Based on the rapid development of practical MDI-QKD, our MDI-QDS protocol could also be experimentally implemented, since it requires a similar experimental setup.

  1. SOFIA: MQ-based signatures in the QROM

    NARCIS (Netherlands)

    Chen, Ming Shing; Hülsing, Andreas; Rijneveld, Joost; Samardjiska, Simona; Schwabe, Peter

    2018-01-01

    We propose SOFIA, the first MQ -based signature scheme provably secure in the quantum-accessible random oracle model (QROM). Our construction relies on an extended version of Unruh’s transform for 5-pass identification schemes that we describe and prove secure both in the ROM and QROM. Based on a

  2. Re-examining the security of blind quantum signature protocols

    International Nuclear Information System (INIS)

    Wang Mingming; Chen Xiubo; Niu Xinxin; Yang Yixian

    2012-01-01

    Recently, blind quantum signature (BQS) protocols have been proposed with the help of a third-party verifier. However, our research shows that some of the BQS protocols are unable to complete the blind signature task fairly if the verifier is dishonest. Indeed, these protocols can be viewed as variants of the classical digital signature scheme of symmetric-key cryptography. If nobody is trusted in such protocols, digital signature cannot be implemented since disagreements cannot be solved fairly.

  3. Motif signatures of transcribed enhancers

    KAUST Repository

    Kleftogiannis, Dimitrios

    2017-09-14

    In mammalian cells, transcribed enhancers (TrEn) play important roles in the initiation of gene expression and maintenance of gene expression levels in spatiotemporal manner. One of the most challenging questions in biology today is how the genomic characteristics of enhancers relate to enhancer activities. This is particularly critical, as several recent studies have linked enhancer sequence motifs to specific functional roles. To date, only a limited number of enhancer sequence characteristics have been investigated, leaving space for exploring the enhancers genomic code in a more systematic way. To address this problem, we developed a novel computational method, TELS, aimed at identifying predictive cell type/tissue specific motif signatures. We used TELS to compile a comprehensive catalog of motif signatures for all known TrEn identified by the FANTOM5 consortium across 112 human primary cells and tissues. Our results confirm that distinct cell type/tissue specific motif signatures characterize TrEn. These signatures allow discriminating successfully a) TrEn from random controls, proxy of non-enhancer activity, and b) cell type/tissue specific TrEn from enhancers expressed and transcribed in different cell types/tissues. TELS codes and datasets are publicly available at http://www.cbrc.kaust.edu.sa/TELS.

  4. Awareness and Coverage of the National Health Insurance Scheme ...

    African Journals Online (AJOL)

    Sub- national levels possess a high degree of autonomy in a number of sectors including health. It is important to assess the level of coverage of the scheme among the formal sector workers in Nigeria as a proxy to gauge the extent of coverage of the scheme and derive suitable lessons that could be used in its expansion.

  5. Provably Secure and Subliminal-Free Variant of Schnorr Signature

    OpenAIRE

    Zhang , Yinghui; Li , Hui; Li , Xiaoqing; Zhu , Hui

    2013-01-01

    Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES); International audience; Subliminal channels present a severe challenge to information security. Currently, subliminal channels still exist in Schnorr signature. In this paper, we propose a subliminal-free variant of Schnorr signature. In the proposed scheme, an honest-but-curious warden is introduced to help the signer to generate a signature on a given message, but it is disallowed to sign messages independently. ...

  6. ARMed SPHINCS computing a 41KB signature in 16KB of RAM

    NARCIS (Netherlands)

    Hülsing, A.T.; Rijneveld, J.; Schwabe, P.; Cheng, C.-M.; Chung, K.-M.; Persiano, G.; Yang, B.-Y.

    2016-01-01

    This paper shows that it is feasible to implement the stateless hash-based signature scheme SPHINCS-256 on an embedded microprocessor with memory even smaller than a signature and limited computing power. We demonstrate that it is possible to generate and verify the 41KB signature on an ARM Cortex

  7. An in fiber experimental approach to photonic quantum digital signatures that does not require quantum memory

    Science.gov (United States)

    Collins, Robert J.; Donaldon, Ross J.; Dunjko, Vedran; Wallden, Petros; Clarke, Patrick J.; Andersson, Erika; Jeffers, John; Buller, Gerald S.

    2014-10-01

    Classical digital signatures are commonly used in e-mail, electronic financial transactions and other forms of electronic communications to ensure that messages have not been tampered with in transit, and that messages are transferrable. The security of commonly used classical digital signature schemes relies on the computational difficulty of inverting certain mathematical functions. However, at present, there are no such one-way functions which have been proven to be hard to invert. With enough computational resources certain implementations of classical public key cryptosystems can be, and have been, broken with current technology. It is nevertheless possible to construct information-theoretically secure signature schemes, including quantum digital signature schemes. Quantum signature schemes can be made information theoretically secure based on the laws of quantum mechanics, while classical comparable protocols require additional resources such as secret communication and a trusted authority. Early demonstrations of quantum digital signatures required quantum memory, rendering them impractical at present. Our present implementation is based on a protocol that does not require quantum memory. It also uses the new technique of unambiguous quantum state elimination, Here we report experimental results for a test-bed system, recorded with a variety of different operating parameters, along with a discussion of aspects of the system security.

  8. ARMed SPHINCS : computing a 41KB signature in 16KB of RAM

    NARCIS (Netherlands)

    Hülsing, A.T.; Rijneveld, J.; Schwabe, P.

    2015-01-01

    This paper shows that it is feasible to implement the stateless hash-based signature scheme SPHINCS-256 on a "very small device" with memory even smaller than a signature and limited computing power. We demonstrate that it is possible to generate and verify the 41\\,KB signature on an ARM Cortex M3

  9. On the pinned field image binarization for signature generation in image ownership verification method

    Directory of Open Access Journals (Sweden)

    Chang Hsuan

    2011-01-01

    Full Text Available Abstract The issue of pinned field image binarization for signature generation in the ownership verification of the protected image is investigated. The pinned field explores the texture information of the protected image and can be employed to enhance the watermark robustness. In the proposed method, four optimization schemes are utilized to determine the threshold values for transforming the pinned field into a binary feature image, which is then utilized to generate an effective signature image. Experimental results show that the utilization of optimization schemes can significantly improve the signature robustness from the previous method (Lee and Chang, Opt. Eng. 49 (9, 097005, 2010. While considering both the watermark retrieval rate and the computation speed, the genetic algorithm is strongly recommended. In addition, compared with Chang and Lin's scheme (J. Syst. Softw. 81 (7, 1118-1129, 2008, the proposed scheme also has better performance.

  10. A Weak Quantum Blind Signature with Entanglement Permutation

    Science.gov (United States)

    Lou, Xiaoping; Chen, Zhigang; Guo, Ying

    2015-09-01

    Motivated by the permutation encryption algorithm, a weak quantum blind signature (QBS) scheme is proposed. It involves three participants, including the sender Alice, the signatory Bob and the trusted entity Charlie, in four phases, i.e., initializing phase, blinding phase, signing phase and verifying phase. In a small-scale quantum computation network, Alice blinds the message based on a quantum entanglement permutation encryption algorithm that embraces the chaotic position string. Bob signs the blinded message with private parameters shared beforehand while Charlie verifies the signature's validity and recovers the original message. Analysis shows that the proposed scheme achieves the secure blindness for the signer and traceability for the message owner with the aid of the authentic arbitrator who plays a crucial role when a dispute arises. In addition, the signature can neither be forged nor disavowed by the malicious attackers. It has a wide application to E-voting and E-payment system, etc.

  11. Enhanced Predictive Handover for Fast Proxy Mobile IPv6

    Science.gov (United States)

    Jeon, Seil; Kang, Namhi; Kim, Younghan

    Proxy Mobile IPv6 (PMIPv6) has been proposed in order to overcome the limitations of host-based mobility management in IPv6 networks. However, packet losses during doing handover are still a problem. To solve this issue, several schemes have been developed, and can be classified into two approaches: predictive and reactive handover. Both approaches commonly use bi-directional tunnel between mobile access gateways (MAGs). In predictive schemes especially, mobility support for a mobile node (MN) is triggered by simplified link signal strength. Thereafter, the MN sends handover notification to its serving MAG, and is then able to initiate packet forwarding. Therefore, if the MN moves toward an unexpected MAG that does not have any pre-established tunnel with the serving MAG, it may lead to packet losses. In this paper, we define this problem as Early Packet Forwarding (EPF). As a solution, we propose an enhanced PMIPv6 scheme using two-phase tunnel control based on the IEEE 802.21 Media Independent Handover (MIH).

  12. Research on Signature Verification Method Based on Discrete Fréchet Distance

    Science.gov (United States)

    Fang, J. L.; Wu, W.

    2018-05-01

    This paper proposes a multi-feature signature template based on discrete Fréchet distance, which breaks through the limitation of traditional signature authentication using a single signature feature. It solves the online handwritten signature authentication signature global feature template extraction calculation workload, signature feature selection unreasonable problem. In this experiment, the false recognition rate (FAR) and false rejection rate (FRR) of the statistical signature are calculated and the average equal error rate (AEER) is calculated. The feasibility of the combined template scheme is verified by comparing the average equal error rate of the combination template and the original template.

  13. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

    Directory of Open Access Journals (Sweden)

    Dongwoo Kang

    Full Text Available The Proxy Mobile IPv6 (PMIPv6 is a network-based mobility management protocol that allows a Mobile Node(MN connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG. As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.

  14. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

    Science.gov (United States)

    Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick; Won, Dongho

    2017-01-01

    The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.

  15. Detecting instabilities in tree-ring proxy calibration

    Directory of Open Access Journals (Sweden)

    H. Visser

    2010-06-01

    Full Text Available Evidence has been found for reduced sensitivity of tree growth to temperature in a number of forests at high northern latitudes and alpine locations. Furthermore, at some of these sites, emergent subpopulations of trees show negative growth trends with rising temperature. These findings are typically referred to as the "Divergence Problem" (DP. Given the high relevance of paleoclimatic reconstructions for policy-related studies, it is important for dendrochronologists to address this issue of potential model uncertainties associated with the DP. Here we address this issue by proposing a calibration technique, termed "stochastic response function" (SRF, which allows the presence or absence of any instabilities in growth response of trees (or any other climate proxy to their calibration target to be visualized and detected. Since this framework estimates confidence limits and subsequently provides statistical significance tests, the approach is also very well suited for proxy screening prior to the generation of a climate-reconstruction network.

    Two examples of tree growth/climate relationships are provided, one from the North American Arctic treeline and the other from the upper treeline in the European Alps. Instabilities were found to be present where stabilities were reported in the literature, and vice versa, stabilities were found where instabilities were reported. We advise to apply SRFs in future proxy-screening schemes, next to the use of correlations and RE/CE statistics. It will improve the strength of reconstruction hindcasts.

  16. Scalable Arbitrated Quantum Signature of Classical Messages with Multi-Signers

    International Nuclear Information System (INIS)

    Yang Yuguang; Wang Yuan; Teng Yiwei; Chai Haiping; Wen Qiaoyan

    2010-01-01

    Unconditionally secure signature is an important part of quantum cryptography. Usually, a signature scheme only provides an environment for a single signer. Nevertheless, in real applications, many signers may collaboratively send a message to the verifier and convince the verifier that the message is actually transmitted by them. In this paper, we give a scalable arbitrated signature protocol of classical messages with multi-signers. Its security is analyzed and proved to be secure even with a compromised arbitrator. (general)

  17. Water Isotope Proxy-Proxy and Proxy-Model Convergence for Late Pleistocene East Asian Monsoon Rainfall Reconstructions

    Science.gov (United States)

    Clemens, S. C.; Holbourn, A.; Kubota, Y.; Lee, K. E.; Liu, Z.; Chen, G.

    2017-12-01

    Confidence in reconstruction of East Asian paleomonsoon rainfall using precipitation isotope proxies is a matter of considerable debate, largely due to the lack of correlation between precipitation amount and isotopic composition in the present climate. We present four new, very highly resolved records spanning the past 300,000 years ( 200 year sample spacing) from IODP Site U1429 in the East China Sea. We demonstrate that all the orbital- and millennial-scale variance in the onshore Yangtze River Valley speleothem δ18O record1 is also embedded in the offshore Site U1429 seawater δ18O record (derived from the planktonic foraminifer Globigerinoides ruber and sea surface temperature reconstructions). Signal replication in these two independent terrestrial and marine archives, both controlled by the same monsoon system, uniquely identifies δ18O of precipitation as the primary driver of the precession-band variance in both records. This proxy-proxy convergence also eliminates a wide array of other drivers that have been called upon as potential contaminants to the precipitation δ18O signal recorded by these proxies. We compare East Asian precipitation isotope proxy records to precipitation amount from a CCSM3 transient climate model simulation of the past 300,000 years using realistic insolation, ice volume, greenhouse gasses, and sea level boundary conditions. This model-proxy comparison suggests that both Yangtze River Valley precipitation isotope proxies (seawater and speleothem δ18O) track changes in summer-monsoon rainfall amount at orbital time scales, as do precipitation isotope records from the Pearl River Valley2 (leaf wax δ2H) and Borneo3 (speleothem δ18O). Notably, these proxy records all have significantly different spectral structure indicating strongly regional rainfall patterns that are also consistent with model results. Transient, isotope-enabled model simulations will be necessary to more thoroughly evaluate these promising results, and to

  18. The Last Millennium Reanalysis: Improvements to proxies and proxy modeling

    Science.gov (United States)

    Tardif, R.; Hakim, G. J.; Emile-Geay, J.; Noone, D.; Anderson, D. M.

    2017-12-01

    The Last Millennium Reanalysis (LMR) employs a paleoclimate data assimilation (PDA) approach to produce climate field reconstructions (CFRs). Here, we focus on two key factors in PDA generated CFRs: the set of assimilated proxy records and forward models (FMs) used to estimate proxies from climate model output. In the initial configuration of the LMR [Hakim et al., 2016], the proxy dataset of [PAGES2k Consortium, 2013] was used, along with univariate linear FMs calibrated against annually-averaged 20th century temperature datasets. In an updated configuration, proxy records from the recent dataset [PAGES2k Consortium, 2017] are used, while a hierarchy of statistical FMs are tested: (1) univariate calibrated on annual temperature as in the initial configuration, (2) univariate against temperature as in (1) but calibration performed using expert-derived seasonality for individual proxy records, (3) as in (2) but expert proxy seasonality replaced by seasonal averaging determined objectively as part of the calibration process, (4) linear objective seasonal FMs as in (3) but objectively selecting relationships calibrated either on temperature or precipitation, and (5) bivariate linear models calibrated on temperature and precipitation with objectively-derived seasonality. (4) and (5) specifically aim at better representing the physical drivers of tree ring width proxies. Reconstructions generated using the CCSM4 Last Millennium simulation as an uninformed prior are evaluated against various 20th century data products. Results show the benefits of using the new proxy collection, particularly on the detrended global mean temperature and spatial patterns. The positive impact of using proper seasonality and temperature/moisture sensitivities for tree ring width records is also notable. This updated configuration will be used for the first generation of LMR-generated CFRs to be publicly released. These also provide a benchmark for future efforts aimed at evaluating the

  19. From 5-pass MQ-based identification to MQ-based signatures

    NARCIS (Netherlands)

    Chen, M.S.; Hülsing, A.; Rijneveld, J.; Samardjiska, S.; Schwabe, P.

    2016-01-01

    This paper presents MQDSS, the first signature scheme with a security reduction based on the problem of solving a multivariate system of quadratic equations (MQ problem). In order to construct this scheme we give a new security reduction for the Fiat-Shamir transform from a large class of 5-pass

  20. Implementation of fast handover for proxy mobile IPv6: Resolving out-of-order packets.

    Science.gov (United States)

    Kang, Byungseok; Anh, Khuong Quoc; Choo, Hyunseung

    2017-01-01

    Mobile IP allows for location-independent routing of IP datagrams on the Internet. Mobile IP specifies how a mobile node (MN) registers with its home agent and how the home agent routes datagrams to the MN through the tunnel. Current Mobile IP protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. Fast handover for Proxy Mobile IPv6 (FPMIPv6) is used to resolve handover latency and packet loss problems that occur in the Proxy Mobile IPv6 (PMIPv6) protocol. However, while implementing the FPMIPv6 scheme in a testbed, we encounter the out-of-order packet (OoOP) problem. The cause of this problem is the existence of two paths for data transmitted from a correspondent node (CN) to an MN. Since the problem affects the quality of service (QoS) of the network and the performance of the MN, we propose a new scheme using the last packet marker and packet buffering to solve this problem in FPMIPv6. The new Mobile Access Gateway (MAG) can control and deliver the data transmitted via the old path or the new path to an MN in order, using the last packet marker to notify the end of the data delivery in the old path and the packet buffering for holding the data delivered in the new path. We implement both the proposed scheme and FPMIPv6 in a testbed as a real network environment to demonstrate the correctness, cost effectiveness, and performance of the proposed scheme. A performance evaluation reveals that the proposed scheme can handle the OoOP problem efficiently.

  1. Implementation of fast handover for proxy mobile IPv6: Resolving out-of-order packets.

    Directory of Open Access Journals (Sweden)

    Byungseok Kang

    Full Text Available Mobile IP allows for location-independent routing of IP datagrams on the Internet. Mobile IP specifies how a mobile node (MN registers with its home agent and how the home agent routes datagrams to the MN through the tunnel. Current Mobile IP protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. Fast handover for Proxy Mobile IPv6 (FPMIPv6 is used to resolve handover latency and packet loss problems that occur in the Proxy Mobile IPv6 (PMIPv6 protocol. However, while implementing the FPMIPv6 scheme in a testbed, we encounter the out-of-order packet (OoOP problem. The cause of this problem is the existence of two paths for data transmitted from a correspondent node (CN to an MN. Since the problem affects the quality of service (QoS of the network and the performance of the MN, we propose a new scheme using the last packet marker and packet buffering to solve this problem in FPMIPv6. The new Mobile Access Gateway (MAG can control and deliver the data transmitted via the old path or the new path to an MN in order, using the last packet marker to notify the end of the data delivery in the old path and the packet buffering for holding the data delivered in the new path. We implement both the proposed scheme and FPMIPv6 in a testbed as a real network environment to demonstrate the correctness, cost effectiveness, and performance of the proposed scheme. A performance evaluation reveals that the proposed scheme can handle the OoOP problem efficiently.

  2. Comparing proxy and model estimates of hydroclimate variability and change over the Common Era

    Science.gov (United States)

    Hydro2k Consortium, Pages

    2017-12-01

    Water availability is fundamental to societies and ecosystems, but our understanding of variations in hydroclimate (including extreme events, flooding, and decadal periods of drought) is limited because of a paucity of modern instrumental observations that are distributed unevenly across the globe and only span parts of the 20th and 21st centuries. Such data coverage is insufficient for characterizing hydroclimate and its associated dynamics because of its multidecadal to centennial variability and highly regionalized spatial signature. High-resolution (seasonal to decadal) hydroclimatic proxies that span all or parts of the Common Era (CE) and paleoclimate simulations from climate models are therefore important tools for augmenting our understanding of hydroclimate variability. In particular, the comparison of the two sources of information is critical for addressing the uncertainties and limitations of both while enriching each of their interpretations. We review the principal proxy data available for hydroclimatic reconstructions over the CE and highlight the contemporary understanding of how these proxies are interpreted as hydroclimate indicators. We also review the available last-millennium simulations from fully coupled climate models and discuss several outstanding challenges associated with simulating hydroclimate variability and change over the CE. A specific review of simulated hydroclimatic changes forced by volcanic events is provided, as is a discussion of expected improvements in estimated radiative forcings, models, and their implementation in the future. Our review of hydroclimatic proxies and last-millennium model simulations is used as the basis for articulating a variety of considerations and best practices for how to perform proxy-model comparisons of CE hydroclimate. This discussion provides a framework for how best to evaluate hydroclimate variability and its associated dynamics using these comparisons and how they can better inform

  3. Multi-proxy studies in palaeolimnology

    OpenAIRE

    Birks, Hilary H.; Birks, Harry John Betteley

    2006-01-01

    Multi-proxy studies are becoming increasingly common in palaeolimnology. Eight basic requirements and challenges for a multi-proxy study are outlined in this essay – definition of research questions, leadership, site selection and coring, data storage, chronology, presentation of results, numerical tools, and data interpretation. The nature of proxy data is discussed in terms of physical proxies and biotic proxies. Loss-on-ignition changes and the use of transfer functions are reviewed as exa...

  4. Here be web proxies

    DEFF Research Database (Denmark)

    Weaver, Nicholas; Kreibich, Christian; Dam, Martin

    2014-01-01

    ,000 clients that include a novel proxy location technique based on traceroutes of the responses to TCP connection establishment requests, which provides additional clues regarding the purpose of the identified web proxies. Overall, we see 14% of Netalyzr-analyzed clients with results that suggest the presence...... of web proxies....

  5. Certificateless short sequential and broadcast multisignature schemes using elliptic curve bilinear pairings

    Directory of Open Access Journals (Sweden)

    SK Hafizul Islam

    2014-01-01

    Full Text Available Several certificateless short signature and multisignature schemes based on traditional public key infrastructure (PKI or identity-based cryptosystem (IBC have been proposed in the literature; however, no certificateless short sequential (or serial multisignature (CL-SSMS or short broadcast (or parallel multisignature (CL-SBMS schemes have been proposed. In this paper, we propose two such new CL-SSMS and CL-SBMS schemes based on elliptic curve bilinear pairing. Like any certificateless public key cryptosystem (CL-PKC, the proposed schemes are free from the public key certificate management burden and the private key escrow problem as found in PKI- and IBC-based cryptosystems, respectively. In addition, the requirements of the expected security level and the fixed length signature with constant verification time have been achieved in our schemes. The schemes are communication efficient as the length of the multisignature is equivalent to a single elliptic curve point and thus become the shortest possible multisignature scheme. The proposed schemes are then suitable for communication systems having resource constrained devices such as PDAs, mobile phones, RFID chips, and sensors where the communication bandwidth, battery life, computing power and storage space are limited.

  6. Jemen - the Proxy War

    Directory of Open Access Journals (Sweden)

    Magdalena El Ghamari

    2015-12-01

    Full Text Available The military operation in Yemen is significant departure from Saudi Arabia's foreign policy tradition and customs. Riyadh has always relied on three strategies to pursue its interests abroad: wealth, establish a global network and muslim education and diplomacy and meadiation. The term "proxy war" has experienced a new popularity in stories on the Middle East. A proxy war is two opposing countries avoiding direct war, and instead supporting combatants that serve their interests. In some occasions, one country is a direct combatant whilst the other supporting its enemy. Various news sources began using the term to describe the conflict in Yemen immediately, as if on cue, after Saudi Arabia launched its bombing campaign against Houthi targets in Yemen on 25 March 2015. This is the reason, why author try to answer for following questions: Is the Yemen Conflict Devolves into Proxy War? and Who's fighting whom in Yemen's proxy war?" Research area includes the problem of proxy war in the Middle East. For sure, the real problem of proxy war must begin with the fact that the United States and its NATO allies opened the floodgates for regional proxy wars by the two major wars for regime change: in Iraq and Libya. Those two destabilising wars provided opportunities and motives for Sunni states across the Middle East to pursue their own sectarian and political power objectives through "proxy war".

  7. An ordination of life histories using morphological proxies: capital vs. income breeding in insects.

    Science.gov (United States)

    Davis, Robert B; Javoiš, Juhan; Kaasik, Ants; Õunap, Erki; Tammaru, Toomas

    2016-08-01

    Predictive classifications of life histories are essential for evolutionary ecology. While attempts to apply a single approach to all organisms may be overambitious, recent advances suggest that more narrow ordination schemes can be useful. However, these schemes mostly lack easily observable proxies of the position of a species on respective axes. It has been proposed that, in insects, the degree of capital (vs. income) breeding, reflecting the importance of adult feeding for reproduction, correlates with various ecological traits at the level of among-species comparison. We sought to prove these ideas via rigorous phylogenetic comparative analyses. We used experimentally derived life-history data for 57 species of European Geometridae (Lepidoptera), and an original phylogenetic reconstruction. The degree of capital breeding was estimated based on morphological proxies, including relative abdomen size of females. Applying Brownian-motion-based comparative analyses (with an original update to include error estimates), we demonstrated the associations between the degree of capital breeding and larval diet breadth, sexual size dimorphism, and reproductive season. Ornstein-Uhlenbeck model based phylogenetic analysis suggested a causal relationship between the degree of capital breeding and diet breadth. Our study indicates that the gradation from capital to income breeding is an informative axis to ordinate life-history strategies in flying insects which are affected by the fecundity vs. mobility trade off, with the availability of easy to record proxies contributing to its predictive power in practical contexts. © 2016 by the Ecological Society of America.

  8. BSEA: A Blind Sealed-Bid E-Auction Scheme for E-Commerce Applications

    Directory of Open Access Journals (Sweden)

    Rohit Kumar Das

    2016-12-01

    Full Text Available Due to an increase in the number of internet users, electronic commerce has grown significantly during the last decade. Electronic auction (e-auction is one of the famous e-commerce applications. Even so, security and robustness of e-auction schemes still remain a challenge. Requirements like anonymity and privacy of the b i d value are under threat from the attackers. Any auction protocol must not leak the anonymity and the privacy of the b i d value of an honest Bidder. Keeping these requirements in mind, we have firstly proposed a controlled traceable blind signature scheme (CTBSS because e-auction schemes should be able to trace the Bidders. Using CTBSS, a blind sealed-bid electronic auction scheme is proposed (BSEA. We have incorporated the notion of blind signature to e-auction schemes. Moreover, both the schemes are based upon elliptic curve cryptography (ECC, which provides a similar level of security with a comparatively smaller key size than the discrete logarithm problem (DLP based e-auction protocols. The analysis shows that BSEA fulfills all the requirements of e-auction protocol, and the total computation overhead is lower than the existing schemes.

  9. Continuous-variable quantum homomorphic signature

    Science.gov (United States)

    Li, Ke; Shang, Tao; Liu, Jian-wei

    2017-10-01

    Quantum cryptography is believed to be unconditionally secure because its security is ensured by physical laws rather than computational complexity. According to spectrum characteristic, quantum information can be classified into two categories, namely discrete variables and continuous variables. Continuous-variable quantum protocols have gained much attention for their ability to transmit more information with lower cost. To verify the identities of different data sources in a quantum network, we propose a continuous-variable quantum homomorphic signature scheme. It is based on continuous-variable entanglement swapping and provides additive and subtractive homomorphism. Security analysis shows the proposed scheme is secure against replay, forgery and repudiation. Even under nonideal conditions, it supports effective verification within a certain verification threshold.

  10. On randomizing hash functions to strengthen the security of digital signatures

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Knudsen, Lars Ramkilde

    2009-01-01

    Halevi and Krawczyk proposed a message randomization algorithm called RMX as a front-end tool to the hash-then-sign digital signature schemes such as DSS and RSA in order to free their reliance on the collision resistance property of the hash functions. They have shown that to forge a RMX-hash-th...... schemes that use Davies-Meyer schemes and a variant of RMX published by NIST in its Draft Special Publication (SP) 800-106. We discuss some important applications of our attack....

  11. Validity of proxies and correction for proxy use when evaluating social determinants of health in stroke patients.

    Science.gov (United States)

    Skolarus, Lesli E; Sánchez, Brisa N; Morgenstern, Lewis B; Garcia, Nelda M; Smith, Melinda A; Brown, Devin L; Lisabeth, Lynda D

    2010-03-01

    The purpose of this study was to evaluate stroke patient-proxy agreement with respect to social determinants of health, including depression, optimism, and spirituality, and to explore approaches to minimize proxy-introduced bias. Stroke patient-proxy pairs from the Brain Attack Surveillance in Corpus Christi Project were interviewed (n=34). Evaluation of agreement between patient-proxy pairs included calculation of intraclass correlation coefficients, linear regression models (ProxyResponse=alpha(0)+alpha(1)PatientResponse+delta, where alpha(0)=0 and alpha(1)=1 denotes no bias) and kappa statistics. Bias introduced by proxies was quantified with simulation studies. In the simulated data, we applied 4 approaches to estimate regression coefficients of stroke outcome social determinants of health associations when only proxy data were available for some patients: (1) substituting proxy responses in place of patient responses; (2) including an indicator variable for proxy use; (3) using regression calibration with external validation; and (4) internal validation. Agreement was fair for depression (intraclass correlation coefficient, 0.41) and optimism (intraclass correlation coefficient, 0.48) and moderate for spirituality (kappa, 0.48 to 0.53). Responses of proxies were a biased measure of the patients' responses for depression, with alpha(0)=4.88 (CI, 2.24 to 7.52) and alpha(1)=0.39 (CI, 0.09 to 0.69), and for optimism, with alpha(0)=3.82 (CI, -1.04 to 8.69) and alpha(1)=0.81 (CI, 0.41 to 1.22). Regression calibration with internal validation was the most accurate method to correct for proxy-induced bias. Fair/moderate patient-proxy agreement was observed for social determinants of health. Stroke researchers who plan to study social determinants of health may consider performing validation studies so corrections for proxy use can be made.

  12. Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings

    Directory of Open Access Journals (Sweden)

    Caixue Zhou

    2017-01-01

    Full Text Available Generalized signcryption (GSC can be applied as an encryption scheme, a signature scheme, or a signcryption scheme with only one algorithm and one key pair. A key-insulated mechanism can resolve the private key exposure problem. To ensure the security of cloud storage, we introduce the key-insulated mechanism into GSC and propose a concrete scheme without bilinear pairings in the certificateless cryptosystem setting. We provide a formal definition and a security model of certificateless key-insulated GSC. Then, we prove that our scheme is confidential under the computational Diffie-Hellman (CDH assumption and unforgeable under the elliptic curve discrete logarithm (EC-DL assumption. Our scheme also supports both random-access key update and secure key update. Finally, we evaluate the efficiency of our scheme and demonstrate that it is highly efficient. Thus, our scheme is more suitable for users who communicate with the cloud using mobile devices.

  13. 12 CFR 569.4 - Proxy soliciting material.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Proxy soliciting material. 569.4 Section 569.4 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PROXIES § 569.4 Proxy soliciting material. No solicitation of a proxy shall be made by means of any statement, form of proxy...

  14. 12 CFR 569.2 - Form of proxies.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Form of proxies. 569.2 Section 569.2 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PROXIES § 569.2 Form of proxies. Every form of proxy shall conform to the following requirements: (a) The proxy shall be revocable at will by...

  15. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".

    Science.gov (United States)

    Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroaki; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad

    2015-01-01

    Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.

  16. Optimal Weight Assignment for a Chinese Signature File.

    Science.gov (United States)

    Liang, Tyne; And Others

    1996-01-01

    Investigates the performance of a character-based Chinese text retrieval scheme in which monogram keys and bigram keys are encoded into document signatures. Tests and verifies the theoretical predictions of the optimal weight assignments and the minimal false hit rate in experiments using a real Chinese corpus for disyllabic queries of different…

  17. Interactive Video Coding and Transmission over Heterogeneous Wired-to-Wireless IP Networks Using an Edge Proxy

    Directory of Open Access Journals (Sweden)

    Modestino James W

    2004-01-01

    Full Text Available Digital video delivered over wired-to-wireless networks is expected to suffer quality degradation from both packet loss and bit errors in the payload. In this paper, the quality degradation due to packet loss and bit errors in the payload are quantitatively evaluated and their effects are assessed. We propose the use of a concatenated forward error correction (FEC coding scheme employing Reed-Solomon (RS codes and rate-compatible punctured convolutional (RCPC codes to protect the video data from packet loss and bit errors, respectively. Furthermore, the performance of a joint source-channel coding (JSCC approach employing this concatenated FEC coding scheme for video transmission is studied. Finally, we describe an improved end-to-end architecture using an edge proxy in a mobile support station to implement differential error protection for the corresponding channel impairments expected on the two networks. Results indicate that with an appropriate JSCC approach and the use of an edge proxy, FEC-based error-control techniques together with passive error-recovery techniques can significantly improve the effective video throughput and lead to acceptable video delivery quality over time-varying heterogeneous wired-to-wireless IP networks.

  18. Shareholder Activism through the Proxy Process

    NARCIS (Netherlands)

    Renneboog, L.D.R.; Szilagyi, P.G.

    2009-01-01

    This paper provides evidence on the corporate governance role of shareholderinitiated proxy proposals. Previous studies debate over whether activists use proxy proposals to discipline firms or to simply advance their self-serving agendas, and whether proxy proposals are effective at all in

  19. Shareholder Activism Through the Proxy Process

    NARCIS (Netherlands)

    Renneboog, L.D.R.; Szilagyi, P.G.

    2009-01-01

    This paper provides evidence on the corporate governance role of shareholder-initiated proxy proposals. Previous studies debate over whether activists use proxy proposals to discipline firms or to simply advance their self-serving agendas, and whether proxy proposals are effective at all in

  20. Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization

    NARCIS (Netherlands)

    Tang, Qiang

    2011-01-01

    In this paper we investigate a new category of public key encryption schemes which supports equality test between ciphertexts. With this new primitive, two users, who possess their own public/private key pairs, can issue token(s) to a proxy to authorize it to perform equality test between their

  1. Impact of prehistoric cooking practices on paleoenvironmental proxies in shell midden constituents

    Science.gov (United States)

    Müller, Peter; Staudigel, Philip; Murray, Sean T.; Westphal, Hildegard; Swart, Peter K.

    2016-04-01

    Paleoenvironmental proxy records such as oxygen isotopes of calcareous skeletal structures like fish otoliths or mollusk shells provide highest-resolution information about environmental conditions experienced by the organism. Accumulations of such skeletal structures by ancient coastal populations in so called "shell midden" deposits provide us with sub-seasonally resolved paleoclimate records covering time spans up to several millennia. Given their high temporal resolution, these deposits are increasingly used for paleoclimate reconstructions and complement our understanding of ancient climate changes. However, gathered as comestibles, most of these skeletal remains were subject to prehistoric cooking methods prior to deposition. The associated alteration of the chemical proxy signatures as well as the subsequent error for paleoenvironmental reconstructions remained almost entirely neglected so far. Here, we present clumped isotope, conventional oxygen and carbon isotopes as well as element:Ca ratios measured in modern bivalve shells after exposing them to different prehistoric cooking methods. Our data show that most cooking methods considerably alter commonly used paleoclimate proxy systems which can lead to substantial misinterpretations of ancient climate conditions. Since the magnitude of chemical alteration is not distinguishable from natural temperature variability in most coastal settings, the alteration of shell midden constituents by prehistoric cooking remains likely unnoticed in most cases. Thus, depending on the cooking method, pre-depositional heating might have introduced considerable errors into previous paleoclimate studies. However, our data also show that clumped isotope thermometry represents a suitable diagnostic tool to detect such pre-depositional cooking events and also allows differentiating between the most commonly applied prehistoric cooking methods.

  2. Secret data embedding scheme modifying the frequency of ...

    Indian Academy of Sciences (India)

    such as banking, e-commerce, e-signature, distance learning, e-government ... received a growing attention in conjunction with the new tools and methods ... Essential points of the image processing and data embedding are clarified in the next section. ..... The proposed scheme's numerical performance is shown in table 6.

  3. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks"

    Science.gov (United States)

    Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad

    2015-01-01

    Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes’ participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.’s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.’s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic. PMID:26580963

  4. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".

    Directory of Open Access Journals (Sweden)

    Mojtaba Alizadeh

    Full Text Available Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.

  5. Adaptive Aft Signature Shaping of a Low-Boom Supersonic Aircraft Using Off-Body Pressures

    Science.gov (United States)

    Ordaz, Irian; Li, Wu

    2012-01-01

    The design and optimization of a low-boom supersonic aircraft using the state-of-the- art o -body aerodynamics and sonic boom analysis has long been a challenging problem. The focus of this paper is to demonstrate an e ective geometry parameterization scheme and a numerical optimization approach for the aft shaping of a low-boom supersonic aircraft using o -body pressure calculations. A gradient-based numerical optimization algorithm that models the objective and constraints as response surface equations is used to drive the aft ground signature toward a ramp shape. The design objective is the minimization of the variation between the ground signature and the target signature subject to several geometric and signature constraints. The target signature is computed by using a least-squares regression of the aft portion of the ground signature. The parameterization and the deformation of the geometry is performed with a NASA in- house shaping tool. The optimization algorithm uses the shaping tool to drive the geometric deformation of a horizontal tail with a parameterization scheme that consists of seven camber design variables and an additional design variable that describes the spanwise location of the midspan section. The demonstration cases show that numerical optimization using the state-of-the-art o -body aerodynamic calculations is not only feasible and repeatable but also allows the exploration of complex design spaces for which a knowledge-based design method becomes less effective.

  6. 12 CFR 569.3 - Holders of proxies.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Holders of proxies. 569.3 Section 569.3 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PROXIES § 569.3 Holders of proxies. No proxy of a mutual savings association with a term greater than eleven months or solicited at...

  7. System for Anonymous Data Collection Based on Group Signature Scheme

    Directory of Open Access Journals (Sweden)

    David Troják

    2016-01-01

    Full Text Available This paper deals with an anonymous data collection in the Internet of Things (IoT. the privacy and anonymity of the data source is important for many IoT applications, such as in agriculture, health, and automotive. the proposed data‑collection system provides anonymity for the data sources by applying a cooperation group scheme. the group scheme also provides a low power consumption. the system is built upon the Tor (The Onion Router anonymous network, which is a part of the Internet darknet. the proposed system was designed for the Android devices on the client side and for Java environment on the server side. We evaluated the anonymous data collection in a real‑use scenario that covers selected data acquisition (e.g. signal strength from smartphones triggered by their geographical location change. the results show that the proposed system provides the sufficient data source anonymity, an effective revocation, a low computational cost and a low overhead.

  8. Quantitative use of Palaeo-Proxy Data in Global Circulation Models

    Science.gov (United States)

    Collins, M.

    2003-04-01

    It is arguably one of the ultimate aims of palaeo-modelling science to somehow "get the palaeo-proxy data into the model" i.e. to constrain the climate of the model the trajectory of the real climate recorded in the palaeo data. The traditional way of interfacing data with models is to use data assimilation. This presents a number of problems in the palaeo context as the data are more often representative of seasonal to annual or decadal climate and models have time steps of order minutes, hence the model increments are likely to be vanishingly small. Also, variational data assimilation schemes would require the adjoint of the coupled ocean-atmosphere model and the adjoint of the functions which translate model variables such as temperature and precipitation into the palaeo-proxies, both of which are hard to determine because of the high degree of non-linearity in the system and the wide range of space and time scales. An alternative is to add forward models of proxies to the model and run "many years" of simulation until an analog state is found which matches the palaeo data for each season, year, decade etc. Clearly "many years" might range from a few thousand years to almost infinity and depends on the number of degrees of freedom in the climate system and on the error characteristics of the palaeo data. The length of simulation required is probably beyond the supercomputer capacity of a single institution and hence an alternative is to use idle capacity of home and business personal computers - the climateprediction.net project.

  9. A Multi-Proxy Paradigm in the Pursuit of Ocean Paleoredox

    Science.gov (United States)

    Anbar, A. D.; Duan, Y.; Kendall, B.; Reinhard, C.; Severmann, S.; Lyons, T. W.

    2011-12-01

    Mo isotope systematics from such sources. By considering sedimentary Fe enrichments together with Fe isotopes, we find that the Mo enrichment correlates with the telltale signature of a shelf-to-basin Fe redox "shuttle". Uranium isotopes also exhibit variations indicative of redox transformations. This multi-proxy dataset therefore paints a robust picture of trace metal redox cycling consistent with the "whiff" interpretation.

  10. Design of Provider-Provisioned Website Protection Scheme against Malware Distribution

    Science.gov (United States)

    Yagi, Takeshi; Tanimoto, Naoto; Hariu, Takeo; Itoh, Mitsutaka

    Vulnerabilities in web applications expose computer networks to security threats, and many websites are used by attackers as hopping sites to attack other websites and user terminals. These incidents prevent service providers from constructing secure networking environments. To protect websites from attacks exploiting vulnerabilities in web applications, service providers use web application firewalls (WAFs). WAFs filter accesses from attackers by using signatures, which are generated based on the exploit codes of previous attacks. However, WAFs cannot filter unknown attacks because the signatures cannot reflect new types of attacks. In service provider environments, the number of exploit codes has recently increased rapidly because of the spread of vulnerable web applications that have been developed through cloud computing. Thus, generating signatures for all exploit codes is difficult. To solve these problems, our proposed scheme detects and filters malware downloads that are sent from websites which have already received exploit codes. In addition, to collect information for detecting malware downloads, web honeypots, which automatically extract the communication records of exploit codes, are used. According to the results of experiments using a prototype, our scheme can filter attacks automatically so that service providers can provide secure and cost-effective network environments.

  11. Privacy protection schemes for fingerprint recognition systems

    Science.gov (United States)

    Marasco, Emanuela; Cukic, Bojan

    2015-05-01

    The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechanisms control access to personal information and limit the likelihood of intrusions. In this paper, image- and feature-level schemes for privacy protection in fingerprint recognition systems are reviewed. Storing only key features of a biometric signature can reduce the likelihood of biometric data being used for unintended purposes. In biometric cryptosystems and biometric-based key release, the biometric component verifies the identity of the user, while the cryptographic key protects the communication channel. Transformation-based approaches only a transformed version of the original biometric signature is stored. Different applications can use different transforms. Matching is performed in the transformed domain which enable the preservation of low error rates. Since such templates do not reveal information about individuals, they are referred to as cancelable templates. A compromised template can be re-issued using a different transform. At image-level, de-identification schemes can remove identifiers disclosed for objectives unrelated to the original purpose, while permitting other authorized uses of personal information. Fingerprint images can be de-identified by, for example, mixing fingerprints or removing gender signature. In both cases, degradation of matching performance is minimized.

  12. Distributed Group-Based Mobility Management Scheme in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Moneeb Gohar

    2017-01-01

    Full Text Available For group-based mobility management in 6LoWPAN-based wireless body area networks (WBAN, some schemes using the Proxy Mobile IPv6 (PMIP have been proposed. However, the existing PMIP-based mobility schemes tend to induce large registration delay and handover delay. To overcome such limitations, we propose a new distributed group-based mobility management scheme, in which the Local Mobility Anchor (LMA function is implemented by each Mobile Access Gateway (MAG and the handover operation is performed between two neighboring MAGs without the help of LMA. Besides, each MAG maintains the information of the group of mobile sensors and aggregates the Authentication-Authorization-Accounting (AAA query messages for a group of mobile sensors as a “single” message to decrease the control overhead. By numerical analysis, it is shown that the proposed scheme can reduce the registration and handover delays, compared to the existing PMIP-based mobility schemes.

  13. A Third-Party E-Payment Protocol Based on Quantum Group Blind Signature

    Science.gov (United States)

    Zhang, Jian-Zhong; Yang, Yuan-Yuan; Xie, Shu-Cui

    2017-09-01

    A third-party E-payment protocol based on quantum group blind signature is proposed in this paper. Our E-payment protocol could protect user's anonymity as the traditional E-payment systems do, and also have unconditional security which the classical E-payment systems can not provide. To achieve that, quantum key distribution, one-time pad and quantum group blind signature are adopted in our scheme. Furthermore, if there were a dispute, the manager Trent can identify who tells a lie.

  14. On Randomizing Hash Functions to Strengthen the Security of Digital Signatures

    DEFF Research Database (Denmark)

    Halevi and Krawczyk proposed a message randomization algorithm called RMX as a front-end tool to the hash-then-sign digital signature schemes such as DSS and RSA in order to free their reliance on the collision resistance property of the hash functions. They have shown that to forge a RMX-hash-th...... that use Davies-Meyer schemes and a variant of RMX published by NIST in its Draft Special Publication (SP) 800-106. We discuss some important applications of our attack....

  15. Witnessing entanglement by proxy

    International Nuclear Information System (INIS)

    Bäuml, Stefan; Bruß, Dagmar; Kampermann, Hermann; Huber, Marcus; Winter, Andreas

    2016-01-01

    Entanglement is a ubiquitous feature of low temperature systems and believed to be highly relevant for the dynamics of condensed matter properties and quantum computation even at higher temperatures. The experimental certification of this paradigmatic quantum effect in macroscopic high temperature systems is constrained by the limited access to the quantum state of the system. In this paper we show how macroscopic observables beyond the mean energy of the system can be exploited as proxy witnesses for entanglement detection. Using linear and semi-definite relaxations we show that all previous approaches to this problem can be outperformed by our proxies, i.e. entanglement can be certified at higher temperatures without access to any local observable. For an efficient computation of proxy witnesses one can resort to a generalised grand canonical ensemble, enabling entanglement certification even in complex systems with macroscopic particle numbers. (paper)

  16. Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage.

    Science.gov (United States)

    Wang, Shangping; Zhang, Xiaoxue; Zhang, Yaling

    2016-01-01

    Cipher-policy attribute-based encryption (CP-ABE) focus on the problem of access control, and keyword-based searchable encryption scheme focus on the problem of finding the files that the user interested in the cloud storage quickly. To design a searchable and attribute-based encryption scheme is a new challenge. In this paper, we propose an efficiently multi-user searchable attribute-based encryption scheme with attribute revocation and grant for cloud storage. In the new scheme the attribute revocation and grant processes of users are delegated to proxy server. Our scheme supports multi attribute are revoked and granted simultaneously. Moreover, the keyword searchable function is achieved in our proposed scheme. The security of our proposed scheme is reduced to the bilinear Diffie-Hellman (BDH) assumption. Furthermore, the scheme is proven to be secure under the security model of indistinguishability against selective ciphertext-policy and chosen plaintext attack (IND-sCP-CPA). And our scheme is also of semantic security under indistinguishability against chosen keyword attack (IND-CKA) in the random oracle model.

  17. Application and Network-Cognizant Proxies - Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Antonio Ortega; Daniel C. Lee

    2003-03-24

    OAK B264 Application and Network-Cognizant Proxies - Final Report. Current networks show increasing heterogeneity both in terms of their bandwidths/delays and the applications they are required to support. This is a trend that is likely to intensify in the future, as real-time services, such as video, become more widely available and networking access over wireless links becomes more widespread. For this reason they propose that application-specific proxies, intermediate network nodes that broker the interactions between server and client, will become an increasingly important network element. These proxies will allow adaptation to changes in network characteristics without requiring a direct intervention of either server or client. Moreover, it will be possible to locate these proxies strategically at those points where a mismatch occurs between subdomains (for example, a proxy could be placed so as to act as a bridge between a reliable network domain and an unreliable one). This design philosophy favors scalability in the sense that the basic network infrastructure can remain unchanged while new functionality can be added to proxies, as required by the applications. While proxies can perform numerous generic functions, such as caching or security, they concentrate here on media-specific, and in particular video-specific, tasks. The goal of this project was to demonstrate that application- and network-specific knowledge at a proxy can improve overall performance especially under changing network conditions. They summarize below the work performed to address these issues. Particular effort was spent in studying caching techniques and on video classification to enable DiffServ delivery. other work included analysis of traffic characteristics, optimized media scheduling, coding techniques based on multiple description coding, and use of proxies to reduce computation costs. This work covered much of what was originally proposed but with a necessarily reduced scope.

  18. Web proxy auto discovery for the WLCG

    CERN Document Server

    Dykstra, D; Blumenfeld, B; De Salvo, A; Dewhurst, A; Verguilov, V

    2017-01-01

    All four of the LHC experiments depend on web proxies (that is, squids) at each grid site to support software distribution by the CernVM FileSystem (CVMFS). CMS and ATLAS also use web proxies for conditions data distributed through the Frontier Distributed Database caching system. ATLAS & CMS each have their own methods for their grid jobs to find out which web proxies to use for Frontier at each site, and CVMFS has a third method. Those diverse methods limit usability and flexibility, particularly for opportunistic use cases, where an experiment’s jobs are run at sites that do not primarily support that experiment. This paper describes a new Worldwide LHC Computing Grid (WLCG) system for discovering the addresses of web proxies. The system is based on an internet standard called Web Proxy Auto Discovery (WPAD). WPAD is in turn based on another standard called Proxy Auto Configuration (PAC). Both the Frontier and CVMFS clients support this standard. The input into the WLCG system comes from squids regis...

  19. Asian Eocene monsoons as revealed by leaf architectural signatures

    Science.gov (United States)

    Spicer, Robert A.; Yang, Jian; Herman, Alexei B.; Kodrul, Tatiana; Maslova, Natalia; Spicer, Teresa E. V.; Aleksandrova, Galina; Jin, Jianhua

    2016-09-01

    The onset and development of the Asian monsoon systems is a topic that has attracted considerable research effort but proxy data limitations, coupled with a diversity of definitions and metrics characterizing monsoon phenomena, have generated much debate. Failure of geological proxies to yield metrics capable of distinguishing between rainfall seasonality induced by migrations of the Inter-tropical Convergence Zone (ITCZ) from that attributable to topographically modified seasonal pressure reversals has frustrated attempts to understand mechanisms underpinning monsoon development and dynamics. Here we circumvent the use of such single climate parameter metrics in favor of detecting directly the distinctive attributes of different monsoon regimes encoded in leaf fossils. Leaf form adapts to the prevailing climate, particularly under the extreme seasonal stresses imposed by monsoons, so it is likely that fossil leaves carry a unique signature of past monsoon regimes. Leaf form trait spectra obtained from fossils from Eocene basins in southern China were compared with those seen in modern leaves growing under known climate regimes. The fossil leaf trait spectra, including those derived from previously published fossil floras from northwestern India, were most similar to those found in vegetation exposed to the modern Indonesia-Australia Monsoon (I-AM), which is largely a product of seasonal migrations of the ITCZ. The presence of this distinctive leaf physiognomic signature suggests that although a monsoon climate existed in Eocene time across southern Asia the characteristics of the modern topographically-enhanced South Asia Monsoon had yet to develop. By the Eocene leaves in South Asia had become well adapted to an I-AM type regime across many taxa and points to the existence of a pervasive monsoon climate prior to the Eocene. No fossil trait spectra typical of exposure to the modern East Asia monsoon were seen, suggesting the effects of this system in southern

  20. A privacy authentication scheme based on cloud for medical environment.

    Science.gov (United States)

    Chen, Chin-Ling; Yang, Tsai-Tung; Chiang, Mao-Lun; Shih, Tzay-Farn

    2014-11-01

    With the rapid development of the information technology, the health care technologies already became matured. Such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concerning issue. In spite of many literatures discussed about medical systems, these literatures should face many security challenges. The most important issue is patients' privacy. Therefore, we propose a privacy authentication scheme based on cloud environment. In our scheme, we use mobile device's characteristics, allowing peoples to use medical resources on the cloud environment to find medical advice conveniently. The digital signature is used to ensure the security of the medical information that is certified by the medical department in our proposed scheme.

  1. Privacy in wireless sensor networks using ring signature

    Directory of Open Access Journals (Sweden)

    Ashmita Debnath

    2014-07-01

    Full Text Available The veracity of a message from a sensor node must be verified in order to avoid a false reaction by the sink. This verification requires the authentication of the source node. The authentication process must also preserve the privacy such that the node and the sensed object are not endangered. In this work, a ring signature was proposed to authenticate the source node while preserving its spatial privacy. However, other nodes as signers and their numbers must be chosen to preclude the possibility of a traffic analysis attack by an adversary. The spatial uncertainty increases with the number of signers but requires larger memory size and communication overhead. This requirement can breach the privacy of the sensed object. To determine the effectiveness of the proposed scheme, the location estimate of a sensor node by an adversary and enhancement in the location uncertainty with a ring signature was evaluated. Using simulation studies, the ring signature was estimated to require approximately four members from the same neighbor region of the source node to sustain the privacy of the node. Furthermore, the ring signature was also determined to have a small overhead and not to adversely affect the performance of the sensor network.

  2. EBAA: An efficient broadcast authentication scheme for ADS-B communication based on IBS-MR

    Directory of Open Access Journals (Sweden)

    Yang Haomiao

    2014-06-01

    Full Text Available Automatic dependent surveillance-broadcast (ADS-B systems can broadcast satellite-based aircraft position, identification, etc., periodically, and are now on track to replace radar to become the backbone of next-generation air traffic management (ATM systems. However, ADS-B systems suffer severe cyber-security problems due to the broadcast-type data link and the lack of designed-in security measures. Especially, since ADS-B messages are unauthenticated, it is easy to insert fake aircraft into a system via spoofing or insertion of false messages. Unfortunately, the authentication for ADS-B messages has not yet been well studied. In this paper, based on identity-based signature with message recovery (IBS-MR, an efficient broadcast authentication scheme for ADS-B messages is proposed. The security analysis demonstrates that the scheme can achieve authenticity and integrity of ADS-B broadcast messages, as well as adaptive evolution of broadcasters’ private keys. The performance evaluation shows that the scheme is computationally efficient for typical avionics devices with limited resources. Furthermore, the scheme achieves low communication overhead since broadcast messages can be recovered from signatures, and thus it is suitable for low-bandwidth ADS-B data link.

  3. Development of six PROMIS pediatrics proxy-report item banks.

    Science.gov (United States)

    Irwin, Debra E; Gross, Heather E; Stucky, Brian D; Thissen, David; DeWitt, Esi Morgan; Lai, Jin Shei; Amtmann, Dagmar; Khastou, Leyla; Varni, James W; DeWalt, Darren A

    2012-02-22

    Pediatric self-report should be considered the standard for measuring patient reported outcomes (PRO) among children. However, circumstances exist when the child is too young, cognitively impaired, or too ill to complete a PRO instrument and a proxy-report is needed. This paper describes the development process including the proxy cognitive interviews and large-field-test survey methods and sample characteristics employed to produce item parameters for the Patient Reported Outcomes Measurement Information System (PROMIS) pediatric proxy-report item banks. The PROMIS pediatric self-report items were converted into proxy-report items before undergoing cognitive interviews. These items covered six domains (physical function, emotional distress, social peer relationships, fatigue, pain interference, and asthma impact). Caregivers (n = 25) of children ages of 5 and 17 years provided qualitative feedback on proxy-report items to assess any major issues with these items. From May 2008 to March 2009, the large-scale survey enrolled children ages 8-17 years to complete the self-report version and caregivers to complete the proxy-report version of the survey (n = 1548 dyads). Caregivers of children ages 5 to 7 years completed the proxy report survey (n = 432). In addition, caregivers completed other proxy instruments, PedsQL™ 4.0 Generic Core Scales Parent Proxy-Report version, PedsQL™ Asthma Module Parent Proxy-Report version, and KIDSCREEN Parent-Proxy-52. Item content was well understood by proxies and did not require item revisions but some proxies clearly noted that determining an answer on behalf of their child was difficult for some items. Dyads and caregivers of children ages 5-17 years old were enrolled in the large-scale testing. The majority were female (85%), married (70%), Caucasian (64%) and had at least a high school education (94%). Approximately 50% had children with a chronic health condition, primarily asthma, which was diagnosed or treated within 6

  4. Leak Signature Space: An Original Representation for Robust Leak Location in Water Distribution Networks

    Directory of Open Access Journals (Sweden)

    Myrna V. Casillas

    2015-03-01

    Full Text Available In this paper, an original model-based scheme for leak location using pressure sensors in water distribution networks is introduced. The proposed approach is based on a new representation called the Leak Signature Space (LSS that associates a specific signature to each leak location being minimally affected by leak magnitude. The LSS considers a linear model approximation of the relation between pressure residuals and leaks that is projected onto a selected hyperplane. This new approach allows to infer the location of a given leak by comparing the position of its signature with other leak signatures. Moreover, two ways of improving the method’s robustness are proposed. First, by associating a domain of influence to each signature and second, through a time horizon analysis. The efficiency of the method is highlighted by means of a real network using several scenarios involving different number of sensors and considering the presence of noise in the measurements.

  5. Pseudo-proxy evaluation of climate field reconstruction methods of North Atlantic climate based on an annually resolved marine proxy network

    Directory of Open Access Journals (Sweden)

    M. Pyrina

    2017-10-01

    Full Text Available Two statistical methods are tested to reconstruct the interannual variations in past sea surface temperatures (SSTs of the North Atlantic (NA Ocean over the past millennium based on annually resolved and absolutely dated marine proxy records of the bivalve mollusk Arctica islandica. The methods are tested in a pseudo-proxy experiment (PPE setup using state-of-the-art climate models (CMIP5 Earth system models and reanalysis data from the COBE2 SST data set. The methods were applied in the virtual reality provided by global climate simulations and reanalysis data to reconstruct the past NA SSTs using pseudo-proxy records that mimic the statistical characteristics and network of Arctica islandica. The multivariate linear regression methods evaluated here are principal component regression and canonical correlation analysis. Differences in the skill of the climate field reconstruction (CFR are assessed according to different calibration periods and different proxy locations within the NA basin. The choice of the climate model used as a surrogate reality in the PPE has a more profound effect on the CFR skill than the calibration period and the statistical reconstruction method. The differences between the two methods are clearer for the MPI-ESM model due to its higher spatial resolution in the NA basin. The pseudo-proxy results of the CCSM4 model are closer to the pseudo-proxy results based on the reanalysis data set COBE2. Conducting PPEs using noise-contaminated pseudo-proxies instead of noise-free pseudo-proxies is important for the evaluation of the methods, as more spatial differences in the reconstruction skill are revealed. Both methods are appropriate for the reconstruction of the temporal evolution of the NA SSTs, even though they lead to a great loss of variance away from the proxy sites. Under reasonable assumptions about the characteristics of the non-climate noise in the proxy records, our results show that the marine network of Arctica

  6. All-optical signatures of strong-field QED in the vacuum emission picture

    Science.gov (United States)

    Gies, Holger; Karbstein, Felix; Kohlfürst, Christian

    2018-02-01

    We study all-optical signatures of the effective nonlinear couplings among electromagnetic fields in the quantum vacuum, using the collision of two focused high-intensity laser pulses as an example. The experimental signatures of quantum vacuum nonlinearities are encoded in signal photons, whose kinematic and polarization properties differ from the photons constituting the macroscopic laser fields. We implement an efficient numerical algorithm allowing for the theoretical investigation of such signatures in realistic field configurations accessible in experiment. This algorithm is based on a vacuum emission scheme and can readily be adapted to the collision of more laser beams or further involved field configurations. We solve the case of two colliding pulses in full 3 +1 -dimensional spacetime and identify experimental geometries and parameter regimes with improved signal-to-noise ratios.

  7. The role of proxy information in missing data analysis.

    Science.gov (United States)

    Huang, Rong; Liang, Yuanyuan; Carrière, K C

    2005-10-01

    This article investigates the role of proxy data in dealing with the common problem of missing data in clinical trials using repeated measures designs. In an effort to avoid the missing data situation, some proxy information can be gathered. The question is how to treat proxy information, that is, is it always better to utilize proxy information when there are missing data? A model for repeated measures data with missing values is considered and a strategy for utilizing proxy information is developed. Then, simulations are used to compare the power of a test using proxy to simply utilizing all available data. It is concluded that using proxy information can be a useful alternative when such information is available. The implications for various clinical designs are also considered and a data collection strategy for efficiently estimating parameters is suggested.

  8. Transparent Proxy for Secure E-Mail

    Science.gov (United States)

    Michalák, Juraj; Hudec, Ladislav

    2010-05-01

    The paper deals with the security of e-mail messages and e-mail server implementation by means of a transparent SMTP proxy. The security features include encryption and signing of transported messages. The goal is to design and implement a software proxy for secure e-mail including its monitoring, administration, encryption and signing keys administration. In particular, we focus on automatic public key on-the-fly encryption and signing of e-mail messages according to S/MIME standard by means of an embedded computer system whose function can be briefly described as a brouter with transparent SMTP proxy.

  9. Visit to general practitioners as a proxy for accessing chronic benefits by members of medical schemes, South Africa

    Directory of Open Access Journals (Sweden)

    Mncedisi M. Willie

    2012-10-01

    Full Text Available Background: Prescribed Minimum Benefits is a list of conditions that all medical schemes need to cover in full, and includes a select of chronic conditions. Chronic conditions affect people’s lifestyles and require ongoing management over a period of years for long-term survival. Objectives: This study examined the association between prevalence of selected chronic diseases and health service use, in particular visits to general practitioners (GPs by medical scheme members. Method: This was a retrospective study on medical schemes data. The median imputation method was employed to deal with missing and unreported chronic diseases prevalence. Multivariate logistic regression analysis was employed to assess effects of chronic disease prevalence, age stratum and scheme size on GP visits per annum. Results: The study showed that prevalence of asthma was significantly associated with more than three GP visits (OR = 1.081; 95% CI = 1.008–1.159, as was prevalence of type 2 diabetes (OR = 1.087; 95% CI = 1.027–1.152, whilst prevalence of hyperlipidaemia (OR = 0.92; 95% CI = 0.875–0.97 was more likely to be associated with less than three GP visits. Prevalence of hypertension was associated with more than three GP visits per year (OR = 1.132; 95% CI = 1.017–1.26. Conclusion: This study shows that scheme size, prevalence of chronic diseases such as asthma, type 2 diabetes, hyperlipidaemia and hypertension are related to GP visits. GPs and managed care programmes employed by schemes should give special attention to certain disease states with high prevalence rates in an effort to better manage them.

  10. Proxy comparisons for Paleogene sea water temperature reconstructions

    Science.gov (United States)

    de Bar, Marijke; de Nooijer, Lennart; Schouten, Stefan; Ziegler, Martin; Sluijs, Appy; Reichart, Gert-Jan

    2017-04-01

    Several studies have reconstructed Paleogene seawater temperatures, using single- or multi-proxy approaches (e.g. Hollis et al., 2012 and references therein), particularly comparing TEX86 with foraminiferal δ18O and Mg/Ca. Whereas trends often agree relatively well, absolute temperatures can differ significantly between proxies, possibly because they are often applied to (extreme) climate events/transitions (e.g. Sluijs et al., 2011), where certain assumptions underlying the temperature proxies may not hold true. A more general long-term multi-proxy temperature reconstruction, is therefore necessary to validate the different proxies and underlying presumed boundary conditions. Here we apply a multi-proxy approach using foraminiferal calcite and organic proxies to generate a low-resolution, long term (80 Myr) paleotemperature record for the Bass River core (New Jersey, North Atlantic). Oxygen (δ18O), clumped isotopes (Δ47) and Mg/Ca of benthic foraminifera, as well as the organic proxies MBT'-CBT, TEX86H, U37K' index and the LDI were determined on the same sediments. The youngest samples of Miocene age are characterized by a high BIT index (>0.8) and fractional abundance of the C32 1,15-diol (>0.6; de Bar et al., 2016) and the absence of foraminifera, all suggesting high continental input and shallow depths. The older sediment layers (˜30 to 90 Ma) display BIT values and C32 1,15-diol fractional abundances 28 ˚ C. In contrast, LDI temperatures were considerably lower and varied only between 21 and 19 ˚ C. MBT'-CBT derived mean annual temperatures for the ages of 9 and 20 Ma align well with the TEX86H SSTs. Overall, the agreement of the paleotemperature proxies in terms of main tendencies, and the covariation with the global benthic oxygen isotope compilation suggests that temperatures in this region varied in concert with global climate variability. The fact that offsets between the different proxies used here remain fairly constant down to 90 Ma ago

  11. Proxy Graph: Visual Quality Metrics of Big Graph Sampling.

    Science.gov (United States)

    Nguyen, Quan Hoang; Hong, Seok-Hee; Eades, Peter; Meidiana, Amyra

    2017-06-01

    Data sampling has been extensively studied for large scale graph mining. Many analyses and tasks become more efficient when performed on graph samples of much smaller size. The use of proxy objects is common in software engineering for analysis and interaction with heavy objects or systems. In this paper, we coin the term 'proxy graph' and empirically investigate how well a proxy graph visualization can represent a big graph. Our investigation focuses on proxy graphs obtained by sampling; this is one of the most common proxy approaches. Despite the plethora of data sampling studies, this is the first evaluation of sampling in the context of graph visualization. For an objective evaluation, we propose a new family of quality metrics for visual quality of proxy graphs. Our experiments cover popular sampling techniques. Our experimental results lead to guidelines for using sampling-based proxy graphs in visualization.

  12. Development of six PROMIS pediatrics proxy-report item banks

    Directory of Open Access Journals (Sweden)

    Irwin Debra E

    2012-02-01

    Full Text Available Abstract Background Pediatric self-report should be considered the standard for measuring patient reported outcomes (PRO among children. However, circumstances exist when the child is too young, cognitively impaired, or too ill to complete a PRO instrument and a proxy-report is needed. This paper describes the development process including the proxy cognitive interviews and large-field-test survey methods and sample characteristics employed to produce item parameters for the Patient Reported Outcomes Measurement Information System (PROMIS pediatric proxy-report item banks. Methods The PROMIS pediatric self-report items were converted into proxy-report items before undergoing cognitive interviews. These items covered six domains (physical function, emotional distress, social peer relationships, fatigue, pain interference, and asthma impact. Caregivers (n = 25 of children ages of 5 and 17 years provided qualitative feedback on proxy-report items to assess any major issues with these items. From May 2008 to March 2009, the large-scale survey enrolled children ages 8-17 years to complete the self-report version and caregivers to complete the proxy-report version of the survey (n = 1548 dyads. Caregivers of children ages 5 to 7 years completed the proxy report survey (n = 432. In addition, caregivers completed other proxy instruments, PedsQL™ 4.0 Generic Core Scales Parent Proxy-Report version, PedsQL™ Asthma Module Parent Proxy-Report version, and KIDSCREEN Parent-Proxy-52. Results Item content was well understood by proxies and did not require item revisions but some proxies clearly noted that determining an answer on behalf of their child was difficult for some items. Dyads and caregivers of children ages 5-17 years old were enrolled in the large-scale testing. The majority were female (85%, married (70%, Caucasian (64% and had at least a high school education (94%. Approximately 50% had children with a chronic health condition, primarily

  13. Web Proxy Auto Discovery for the WLCG

    Science.gov (United States)

    Dykstra, D.; Blomer, J.; Blumenfeld, B.; De Salvo, A.; Dewhurst, A.; Verguilov, V.

    2017-10-01

    All four of the LHC experiments depend on web proxies (that is, squids) at each grid site to support software distribution by the CernVM FileSystem (CVMFS). CMS and ATLAS also use web proxies for conditions data distributed through the Frontier Distributed Database caching system. ATLAS & CMS each have their own methods for their grid jobs to find out which web proxies to use for Frontier at each site, and CVMFS has a third method. Those diverse methods limit usability and flexibility, particularly for opportunistic use cases, where an experiment’s jobs are run at sites that do not primarily support that experiment. This paper describes a new Worldwide LHC Computing Grid (WLCG) system for discovering the addresses of web proxies. The system is based on an internet standard called Web Proxy Auto Discovery (WPAD). WPAD is in turn based on another standard called Proxy Auto Configuration (PAC). Both the Frontier and CVMFS clients support this standard. The input into the WLCG system comes from squids registered in the ATLAS Grid Information System (AGIS) and CMS SITECONF files, cross-checked with squids registered by sites in the Grid Configuration Database (GOCDB) and the OSG Information Management (OIM) system, and combined with some exceptions manually configured by people from ATLAS and CMS who operate WLCG Squid monitoring. WPAD servers at CERN respond to http requests from grid nodes all over the world with a PAC file that lists available web proxies, based on IP addresses matched from a database that contains the IP address ranges registered to organizations. Large grid sites are encouraged to supply their own WPAD web servers for more flexibility, to avoid being affected by short term long distance network outages, and to offload the WLCG WPAD servers at CERN. The CERN WPAD servers additionally support requests from jobs running at non-grid sites (particularly for LHC@Home) which they direct to the nearest publicly accessible web proxy servers. The responses

  14. Cretaceous honeycomb oysters (Pycnodonte vesicularis) as palaeoseasonality records: A multi-proxy study

    Science.gov (United States)

    de Winter, Niels J.; Vellekoop, Johan; Vorsselmans, Robin; Golreihan, Asefeh; Petersen, Sierra V.; Meyer, Kyle W.; Speijer, Robert P.; Claeys, Philippe

    2017-04-01

    Pycnodonte or "honeycomb-oysters" (Bivalvia: Gryphaeidea) is an extinct genus of calcite-producing bivalves which is found in abundance in Cretaceous to Pleistocene fossil beds worldwide. As such, Pycnodonte shells could be ideal tracers of palaeoclimate through time, with the capability to reconstruct sea water conditions and palaeotemperatures in a range of palaeoenvironmental settings. Only few studies have attempted to reconstruct palaeoclimate based on Pycnodonte shells and with variable degrees of success (e.g. Videt, 2003; Huyge et al., 2015). Our study investigates the shell growth, structure and chemical characteristics of Maastrichtian Pycnodonte vesicularis from Bajada de Jaguel in Argentina and aims to rigorously test the application of multiple palaeoenvironmental proxies on the shells of several Maastrichtian Pycnodonte oysters for palaeoclimate reconstruction. The preservation state of four calcite shells was assessed by fluorescence microscopy, cathodoluminescence and micro X-Ray Fluorescence (XRF) mapping. Their shell structure was investigated using a combination of XRF mapping, high-resolution color scanning and microCT scanning. Long integration time point-by-point XRF line scanning yielded high-resolution trace element profiles through the hinge of all shells. Microdrilled samples from the same locations on the shell were analyzed for trace element composition by ICP-MS and for stable carbon and oxygen isotopes by IRMS. Preservation of the calcite microstructure was found to be of sufficient quality to allow discussion of original shell porosity, annual growth increments and pristine chemical signatures of the bivalves. The combination of fluorescence and cathodoluminescence microscopy with XRF mapping and microCT scanning sheds light on the characteristic internal "honeycomb" structure of these extinct bivalves and allows comparison with that of the related extant Neopycnodonte bivalves (Wisshak et al., 2009). Furthermore, high resolution

  15. The Proxy Challenge: Why bespoke proxy indicators can help solve the anti-corruption measurement problem

    OpenAIRE

    Johnsøn, Jesper; Mason, Phil

    2013-01-01

    Practitioners working in anti-corruption face perennial challenges in measuring changes in corruption levels and evaluating whether anti-corruption efforts are successful. These two challenges are linked but not inseparable. To make progress on the latter front, that is, evaluating whether anti-corruption efforts are having an impact, the U4 Anti-Corruption Resource Centre and the UK Department for International Development are launching an exploration into the use of proxy indicators. Proxy ...

  16. Learning Global-Local Distance Metrics for Signature-Based Biometric Cryptosystems

    Directory of Open Access Journals (Sweden)

    George S. Eskander Ekladious

    2017-11-01

    Full Text Available Biometric traits, such as fingerprints, faces and signatures have been employed in bio-cryptosystems to secure cryptographic keys within digital security schemes. Reliable implementations of these systems employ error correction codes formulated as simple distance thresholds, although they may not effectively model the complex variability of behavioral biometrics like signatures. In this paper, a Global-Local Distance Metric (GLDM framework is proposed to learn cost-effective distance metrics, which reduce within-class variability and augment between-class variability, so that simple error correction thresholds of bio-cryptosystems provide high classification accuracy. First, a large number of samples from a development dataset are used to train a global distance metric that differentiates within-class from between-class samples of the population. Then, once user-specific samples are available for enrollment, the global metric is tuned to a local user-specific one. Proof-of-concept experiments on two reference offline signature databases confirm the viability of the proposed approach. Distance metrics are produced based on concise signature representations consisting of about 20 features and a single prototype. A signature-based bio-cryptosystem is designed using the produced metrics and has shown average classification error rates of about 7% and 17% for the PUCPR and the GPDS-300 databases, respectively. This level of performance is comparable to that obtained with complex state-of-the-art classifiers.

  17. Costs, equity, efficiency and feasibility of identifying the poor in Ghana's National Health Insurance Scheme: empirical analysis of various strategies.

    NARCIS (Netherlands)

    Aryeetey, G.C.N.O.; Jehu-Appiah, C.; Spaan, E.; Agyepong, I.; Baltussen, R.M.

    2012-01-01

    Objectives To analyse the costs and evaluate the equity, efficiency and feasibility of four strategies to identify poor households for premium exemptions in Ghana's National Health Insurance Scheme (NHIS): means testing (MT), proxy means testing (PMT), participatory wealth ranking (PWR) and

  18. LPPS: A Distributed Cache Pushing Based K-Anonymity Location Privacy Preserving Scheme

    Directory of Open Access Journals (Sweden)

    Ming Chen

    2016-01-01

    Full Text Available Recent years have witnessed the rapid growth of location-based services (LBSs for mobile social network applications. To enable location-based services, mobile users are required to report their location information to the LBS servers and receive answers of location-based queries. Location privacy leak happens when such servers are compromised, which has been a primary concern for information security. To address this issue, we propose the Location Privacy Preservation Scheme (LPPS based on distributed cache pushing. Unlike existing solutions, LPPS deploys distributed cache proxies to cover users mostly visited locations and proactively push cache content to mobile users, which can reduce the risk of leaking users’ location information. The proposed LPPS includes three major process. First, we propose an algorithm to find the optimal deployment of proxies to cover popular locations. Second, we present cache strategies for location-based queries based on the Markov chain model and propose update and replacement strategies for cache content maintenance. Third, we introduce a privacy protection scheme which is proved to achieve k-anonymity guarantee for location-based services. Extensive experiments illustrate that the proposed LPPS achieves decent service coverage ratio and cache hit ratio with lower communication overhead compared to existing solutions.

  19. Magnetic signature of daily sampled urban atmospheric particles

    Science.gov (United States)

    Muxworthy, Adrian R.; Matzka, Jürgen; Davila, Alfonso Fernández; Petersen, Nikolai

    The magnetic signature of two sets of daily sampled particulate matter (PM) collected in Munich, Germany, were examined and compared to variations in other pollution data and meteorological data using principal component analysis. The magnetic signature arising from the magnetic minerals in the PM was examined using a fast and highly sensitive magnetic remanence measurement. The longest data set studied was 160 days, significantly longer than that of similar magnetic PM studies improving the statistical robustness. It was found that the variations in the mass-dependent magnetic parameters displayed a complicated relationship governed by both the meteorological conditions and the PM loading rate, whereas mineralogy/grain-size-dependent magnetic parameters displayed little variation. A six-fold increase in the number of vehicles passing the sampling locations only doubled the magnetic remanence of the samples, suggesting that the measured magnetic signature is in addition strongly influenced by dispersion rates. At both localities the saturation isothermal remanent magnetisation (SIRM) was found to be strongly correlated with the PM mass, and it is suggested that measuring SIRM as a proxy for PM monitoring is a viable alternative to magnetic susceptibility when the samples are magnetically too weak. The signal was found to be dominated by magnetite-like grains less than 100 nm in diameter which is thought to be derived primarily from vehicles. Such small grains are known to be particularly dangerous to humans. There was also evidence to suggest from magnetic stability parameters that the magnetite-like grains were covered with an oxidised rim. The concentration of magnetic PM was in the range of 0.3-0.5% by mass.

  20. Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security

    NARCIS (Netherlands)

    Weng, Jiang; Yang, Yanjiang; Tang, Qiang; Deng, Robert H.; Bao, Feng

    Recently, a variant of proxy re-encryption, named conditional proxy re-encryption (C-PRE), has been introduced. Compared with traditional proxy re-encryption, C-PRE enables the delegator to implement fine-grained delegation of decryption rights, and thus is more useful in many applications. In this

  1. Optimizing TCP Performance over UMTS with Split TCP Proxy

    DEFF Research Database (Denmark)

    Hu, Liang; Dittmann, Lars

    2009-01-01

    . To cope with large delay bandwidth product, we propose a novel concept of split TCP proxy which is placed at GGSN between UNITS network and Internet. The split proxy divides the bandwidth delay product into two parts, resulting in two TCP connections with smaller bandwidth delay products which can...... be pipelined and thus operating at higher speeds. Simulation results show, the split TCP proxy can significantly improve the TCP performance in terms of RLC throughput under high bit rate DCH channel scenario (e.g.256 kbps). On the other hand, it only brings small performance improvement under low bit rate DCH...... scenario (e.g.64 kbps). Besides, the split TCP proxy brings more performance gain for downloading large files than downloading small ones. To the end, for the configuration of the split proxy, an aggressive initial TCP congestion window size (e.g. 10 MSS) at proxy is particularly useful for radio links...

  2. Different collectivity in the two signatures of the i13/2 stemming band in 167Yb

    International Nuclear Information System (INIS)

    Petkov, P; Gladnishki, K A; Dewald, A; Fransen, C; Hackstein, M; Jolie, J; Pissulla, Th; Rother, W; Zell, K O; Möller, O; Reese, M; Deloncle, I

    2014-01-01

    Six lifetimes have been determined in the 5/2 + [642] band from vi 13/2 parentage in 167 Yb by means of Recoil distance Doppler-shift (RDDS) measurements carried out at the Cologne FN tandem. The deduced transition strengths and the level scheme are reasonably described by Particle plus triaxial rotor model (PTRM) calculations except for the behavior of the quadrupole collectivity in the two signatures of the 5/2 + [642] band. In that band, the quadrupole collectivity of the favored signature is appreciably larger than this of the unfavored signature. The effect increases with increasing the spin. Naturally, the rigid PTRM cannot explain these features, but the structure of its wave functions suggests a possible solution. It is associated with the enhanced contribution of low-Ω orbitals from vi 13/2 parentage in the favored signature compared to the unfavored one. This could selectively increase the deformation of the favored signature band members and give rise to a dynamic shape coexistence taking place between the two signatures which needs quantitative explanation by future theoretical work.

  3. A Scheme for Verification on Data Integrity in Mobile Multicloud Computing Environment

    Directory of Open Access Journals (Sweden)

    Laicheng Cao

    2016-01-01

    Full Text Available In order to verify the data integrity in mobile multicloud computing environment, a MMCDIV (mobile multicloud data integrity verification scheme is proposed. First, the computability and nondegeneracy of verification can be obtained by adopting BLS (Boneh-Lynn-Shacham short signature scheme. Second, communication overhead is reduced based on HVR (Homomorphic Verifiable Response with random masking and sMHT (sequence-enforced Merkle hash tree construction. Finally, considering the resource constraints of mobile devices, data integrity is verified by lightweight computing and low data transmission. The scheme improves shortage that mobile device communication and computing power are limited, it supports dynamic data operation in mobile multicloud environment, and data integrity can be verified without using direct source file block. Experimental results also demonstrate that this scheme can achieve a lower cost of computing and communications.

  4. Comparing performance of standard and iterative linear unmixing methods for hyperspectral signatures

    Science.gov (United States)

    Gault, Travis R.; Jansen, Melissa E.; DeCoster, Mallory E.; Jansing, E. David; Rodriguez, Benjamin M.

    2016-05-01

    Linear unmixing is a method of decomposing a mixed signature to determine the component materials that are present in sensor's field of view, along with the abundances at which they occur. Linear unmixing assumes that energy from the materials in the field of view is mixed in a linear fashion across the spectrum of interest. Traditional unmixing methods can take advantage of adjacent pixels in the decomposition algorithm, but is not the case for point sensors. This paper explores several iterative and non-iterative methods for linear unmixing, and examines their effectiveness at identifying the individual signatures that make up simulated single pixel mixed signatures, along with their corresponding abundances. The major hurdle addressed in the proposed method is that no neighboring pixel information is available for the spectral signature of interest. Testing is performed using two collections of spectral signatures from the Johns Hopkins University Applied Physics Laboratory's Signatures Database software (SigDB): a hand-selected small dataset of 25 distinct signatures from a larger dataset of approximately 1600 pure visible/near-infrared/short-wave-infrared (VIS/NIR/SWIR) spectra. Simulated spectra are created with three and four material mixtures randomly drawn from a dataset originating from SigDB, where the abundance of one material is swept in 10% increments from 10% to 90%with the abundances of the other materials equally divided amongst the remainder. For the smaller dataset of 25 signatures, all combinations of three or four materials are used to create simulated spectra, from which the accuracy of materials returned, as well as the correctness of the abundances, is compared to the inputs. The experiment is expanded to include the signatures from the larger dataset of almost 1600 signatures evaluated using a Monte Carlo scheme with 5000 draws of three or four materials to create the simulated mixed signatures. The spectral similarity of the inputs to the

  5. Family factors in end-of-life decision-making: family conflict and proxy relationship.

    Science.gov (United States)

    Parks, Susan Mockus; Winter, Laraine; Santana, Abbie J; Parker, Barbara; Diamond, James J; Rose, Molly; Myers, Ronald E

    2011-02-01

    Few studies have examined proxy decision-making regarding end-of-life treatment decisions. Proxy accuracy is defined as whether proxy treatment choices are consistent with the expressed wishes of their index elder. The purpose of this study was to examine proxy accuracy in relation to two family factors that may influence proxy accuracy: perceived family conflict and type of elder-proxy relationship. Telephone interviews with 202 community-dwelling elders and their proxy decision makers were conducted including the Life-Support Preferences Questionnaire (LSPQ), and a measure of family conflict, and sociodemographic characteristics, including type of relationship. Elder-proxy accuracy was associated with the type of elder-proxy relationship. Adult children demonstrated the lowest elder-proxy accuracy and spousal proxies the highest elder-proxy accuracy. Elder-proxy accuracy was associated with family conflict. Proxies reporting higher family conflict had lower elder-proxy accuracy. No interaction between family conflict and relationship type was revealed. Spousal proxies were more accurate in their substituted judgment than adult children, and proxies who perceive higher degree of family conflict tended to be less accurate than those with lower family conflict. Health care providers should be aware of these family factors when discussing advance care planning.

  6. A Fast lattice-based polynomial digital signature system for m-commerce

    Science.gov (United States)

    Wei, Xinzhou; Leung, Lin; Anshel, Michael

    2003-01-01

    The privacy and data integrity are not guaranteed in current wireless communications due to the security hole inside the Wireless Application Protocol (WAP) version 1.2 gateway. One of the remedies is to provide an end-to-end security in m-commerce by applying application level security on top of current WAP1.2. The traditional security technologies like RSA and ECC applied on enterprise's server are not practical for wireless devices because wireless devices have relatively weak computation power and limited memory compared with server. In this paper, we developed a lattice based polynomial digital signature system based on NTRU's Polynomial Authentication and Signature Scheme (PASS), which enabled the feasibility of applying high-level security on both server and wireless device sides.

  7. Quantum random oracle model for quantum digital signature

    Science.gov (United States)

    Shang, Tao; Lei, Qi; Liu, Jianwei

    2016-10-01

    The goal of this work is to provide a general security analysis tool, namely, the quantum random oracle (QRO), for facilitating the security analysis of quantum cryptographic protocols, especially protocols based on quantum one-way function. QRO is used to model quantum one-way function and different queries to QRO are used to model quantum attacks. A typical application of quantum one-way function is the quantum digital signature, whose progress has been hampered by the slow pace of the experimental realization. Alternatively, we use the QRO model to analyze the provable security of a quantum digital signature scheme and elaborate the analysis procedure. The QRO model differs from the prior quantum-accessible random oracle in that it can output quantum states as public keys and give responses to different queries. This tool can be a test bed for the cryptanalysis of more quantum cryptographic protocols based on the quantum one-way function.

  8. L1000CDS2: LINCS L1000 characteristic direction signatures search engine.

    Science.gov (United States)

    Duan, Qiaonan; Reid, St Patrick; Clark, Neil R; Wang, Zichen; Fernandez, Nicolas F; Rouillard, Andrew D; Readhead, Ben; Tritsch, Sarah R; Hodos, Rachel; Hafner, Marc; Niepel, Mario; Sorger, Peter K; Dudley, Joel T; Bavari, Sina; Panchal, Rekha G; Ma'ayan, Avi

    2016-01-01

    The library of integrated network-based cellular signatures (LINCS) L1000 data set currently comprises of over a million gene expression profiles of chemically perturbed human cell lines. Through unique several intrinsic and extrinsic benchmarking schemes, we demonstrate that processing the L1000 data with the characteristic direction (CD) method significantly improves signal to noise compared with the MODZ method currently used to compute L1000 signatures. The CD processed L1000 signatures are served through a state-of-the-art web-based search engine application called L1000CDS 2 . The L1000CDS 2 search engine provides prioritization of thousands of small-molecule signatures, and their pairwise combinations, predicted to either mimic or reverse an input gene expression signature using two methods. The L1000CDS 2 search engine also predicts drug targets for all the small molecules profiled by the L1000 assay that we processed. Targets are predicted by computing the cosine similarity between the L1000 small-molecule signatures and a large collection of signatures extracted from the gene expression omnibus (GEO) for single-gene perturbations in mammalian cells. We applied L1000CDS 2 to prioritize small molecules that are predicted to reverse expression in 670 disease signatures also extracted from GEO, and prioritized small molecules that can mimic expression of 22 endogenous ligand signatures profiled by the L1000 assay. As a case study, to further demonstrate the utility of L1000CDS 2 , we collected expression signatures from human cells infected with Ebola virus at 30, 60 and 120 min. Querying these signatures with L1000CDS 2 we identified kenpaullone, a GSK3B/CDK2 inhibitor that we show, in subsequent experiments, has a dose-dependent efficacy in inhibiting Ebola infection in vitro without causing cellular toxicity in human cell lines. In summary, the L1000CDS 2 tool can be applied in many biological and biomedical settings, while improving the extraction of

  9. Perbandingan proxy pada linux dan windows untuk mempercepat browsing website

    Directory of Open Access Journals (Sweden)

    Dafwen Toresa

    2017-05-01

    Full Text Available AbstrakPada saat ini sangat banyak organisasi, baik pendidikan, pemerintahan,  maupun perusahaan swasta berusaha membatasi akses para pengguna ke internet dengan alasan bandwidth yang dimiliki mulai terasa lambat ketika para penggunanya mulai banyak yang melakukan browsing ke internet. Mempercepat akses browsing menjadi perhatian utama dengan memanfaatkan teknologi Proxy server. Penggunaan proxy server perlu mempertimbangkan sistem operasi pada server dan tool yang digunakan belum diketahui performansi terbaiknya pada sistem operasi apa.  Untuk itu dirasa perlu untuk menganalisis performan Proxy server pada sistem operasi berbeda yaitu Sistem Operasi Linux dengan tools Squid  dan Sistem Operasi Windows dengan tool Winroute. Kajian ini dilakukan untuk mengetahui perbandingan kecepatan browsing dari komputer pengguna (client. Browser yang digunakan di komputer pengguna adalah Mozilla Firefox. Penelitian ini menggunakan 2 komputer klien dengan pengujian masing-masingnya 5 kali pengujian pengaksesan/browsing web yang dituju melalui proxy server. Dari hasil pengujian yang dilakukan, diperoleh kesimpulan bahwa penerapan proxy server di sistem operasi linux dengan tools squid lebih cepat browsing dari klien menggunakan web browser yang sama dan komputer klien yang berbeda dari pada proxy server sistem operasi windows dengan tools winroute.  Kata kunci: Proxy, Bandwidth, Browsing, Squid, Winroute AbstractAt this time very many organizations, both education, government, and private companies try to limit the access of users to the internet on the grounds that the bandwidth owned began to feel slow when the users began to do a lot of browsing to the internet. Speed up browsing access is a major concern by utilizing Proxy server technology. The use of proxy servers need to consider the operating system on the server and the tool used is not yet known the best performance on what operating system. For that it is necessary to analyze Performance Proxy

  10. Signature-based User Authentication

    OpenAIRE

    Hámorník, Juraj

    2015-01-01

    This work aims on missing handwritten signature authentication in Windows. Result of this work is standalone software that allow users to log into Windows by writing signature. We focus on security of signature authentification and best overall user experience. We implemented signature authentification service that accept signature and return user access token if signature is genuine. Signature authentification is done by comparing given signature to signature patterns by their similarity. Si...

  11. Estimation of sedimentary proxy records together with associated uncertainty

    OpenAIRE

    Goswami, B.; Heitzig, J.; Rehfeld, K.; Marwan, N.; Anoop, A.; Prasad, S.; Kurths, J.

    2014-01-01

    Sedimentary proxy records constitute a significant portion of the recorded evidence that allows us to investigate paleoclimatic conditions and variability. However, uncertainties in the dating of proxy archives limit our ability to fix the timing of past events and interpret proxy record intercomparisons. While there are various age-modeling approaches to improve the estimation of the age–depth relations of archives, relatively little focus has been placed on the propagation...

  12. Analisis Algoritma Pergantian Cache Pada Proxy Web Server Internet Dengan Simulasi

    OpenAIRE

    Nurwarsito, Heru

    2007-01-01

    Pertumbuhan jumlah client internet dari waktu ke waktu terus bertambah, maka respon akses internet menjadi semakin lambat. Untuk membantu kecepatan akses tersebut maka diperlukan cache pada Proxy Server. Penelitian ini bertujuan untuk menganalisis performansi Proxy Server pada Jaringan Internet terhadap penggunaan algoritma pergantian cache-nya.Analisis Algoritma Pergantian Cache Pada Proxy Server didesain dengan metoda pemodelan simulasi jaringan internet yang terdiri dari Web server, Proxy ...

  13. Gradient-based model calibration with proxy-model assistance

    Science.gov (United States)

    Burrows, Wesley; Doherty, John

    2016-02-01

    Use of a proxy model in gradient-based calibration and uncertainty analysis of a complex groundwater model with large run times and problematic numerical behaviour is described. The methodology is general, and can be used with models of all types. The proxy model is based on a series of analytical functions that link all model outputs used in the calibration process to all parameters requiring estimation. In enforcing history-matching constraints during the calibration and post-calibration uncertainty analysis processes, the proxy model is run for the purposes of populating the Jacobian matrix, while the original model is run when testing parameter upgrades; the latter process is readily parallelized. Use of a proxy model in this fashion dramatically reduces the computational burden of complex model calibration and uncertainty analysis. At the same time, the effect of model numerical misbehaviour on calculation of local gradients is mitigated, this allowing access to the benefits of gradient-based analysis where lack of integrity in finite-difference derivatives calculation would otherwise have impeded such access. Construction of a proxy model, and its subsequent use in calibration of a complex model, and in analysing the uncertainties of predictions made by that model, is implemented in the PEST suite.

  14. Signature Balancing

    NARCIS (Netherlands)

    Noordkamp, H.W.; Brink, M. van den

    2006-01-01

    Signatures are an important part of the design of a ship. In an ideal situation, signatures must be as low as possible. However, due to budget constraints it is most unlikely to reach this ideal situation. The arising question is which levels of signatures are optimal given the different scenarios

  15. Developing a proxy version of the Adult social care outcome toolkit (ASCOT).

    Science.gov (United States)

    Rand, Stacey; Caiels, James; Collins, Grace; Forder, Julien

    2017-05-19

    Social care-related quality of life is a key outcome indicator used in the evaluation of social care interventions and policy. It is not, however, always possible to collect quality of life data by self-report even with adaptations for people with cognitive or communication impairments. A new proxy-report version of the Adult Social Care Outcomes Toolkit (ASCOT) measure of social care-related quality of life was developed to address the issues of wider inclusion of people with cognitive or communication difficulties who may otherwise be systematically excluded. The development of the proxy-report ASCOT questionnaire was informed by literature review and earlier work that identified the key issues and challenges associated with proxy-reported outcomes. To evaluate the acceptability and content validity of the ASCOT-Proxy, qualitative cognitive interviews were conducted with unpaid carers or care workers of people with cognitive or communication impairments. The proxy respondents were invited to 'think aloud' while completing the questionnaire. Follow-up probes were asked to elicit further detail of the respondent's comprehension of the format, layout and content of each item and also how they weighed up the options to formulate a response. A total of 25 unpaid carers and care workers participated in three iterative rounds of cognitive interviews. The findings indicate that the items were well-understood and the concepts were consistent with the item definitions for the standard self-completion version of ASCOT with minor modifications to the draft ASCOT-Proxy. The ASCOT-Proxy allows respondents to rate the proxy-proxy and proxy-patient perspectives, which improved the acceptability of proxy report. A new proxy-report version of ASCOT was developed with evidence of its qualitative content validity and acceptability. The ASCOT-Proxy is ready for empirical testing of its suitability for data collection as a self-completion and/or interview questionnaire, and also

  16. An analytic regularisation scheme on curved space–times with applications to cosmological space–times

    International Nuclear Information System (INIS)

    Géré, Antoine; Hack, Thomas-Paul; Pinamonti, Nicola

    2016-01-01

    We develop a renormalisation scheme for time-ordered products in interacting field theories on curved space–times that consists of an analytic regularisation of Feynman amplitudes and a minimal subtraction of the resulting pole parts. This scheme is directly applicable to space–times with Lorentzian signature, manifestly generally covariant, invariant under any space–time isometries present, and constructed to all orders in perturbation theory. Moreover, the scheme correctly captures the nongeometric state-dependent contribution of Feynman amplitudes, and it is well suited for practical computations. To illustrate this last point, we compute explicit examples on a generic curved space–time and demonstrate how momentum space computations in cosmological space–times can be performed in our scheme. In this work, we discuss only scalar fields in four space–time dimensions, but we argue that the renormalisation scheme can be directly generalised to other space–time dimensions and field theories with higher spin as well as to theories with local gauge invariance. (paper)

  17. Munchausen by Proxy Syndrome

    Science.gov (United States)

    ... the Child Getting Help for the Parent or Caregiver Print Munchausen by proxy syndrome (MBPS) is a relatively rare form of child abuse that involves the exaggeration or fabrication of illnesses or symptoms by a primary caretaker. Also known as "medical child abuse," MBPS ...

  18. Reliability and validity of a self-administration version of DEMQOL-Proxy.

    Science.gov (United States)

    Hendriks, A A Jolijn; Smith, Sarah C; Chrysanthaki, Theopisti; Black, Nick

    2017-07-01

    This study aimed to investigate the reliability and validity of a self-administered version of DEMQOL-Proxy, a disease-specific instrument that measures health-related quality of life in people with dementia. The sample consisted of 173 informal carers of people with dementia, aged 29 to 89 years old. Carers were mostly female, White/White British and closely related to the patient. They completed DEMQOL-Proxy (self-administered), EQ-5D-3L (proxy reported about the person with dementia), EQ-5D-3L (self-reported about their own health) and the Zarit Burden Interview. Using well-established methods from classical test theory, we evaluated scale level acceptability, reliability and convergent, discriminant and known-groups validity of DEMQOL-Proxy. DEMQOL-Proxy (self-administered) showed high acceptability (3.5% missing data and 0% scores at floor or ceiling), high internal consistency reliability (α = 0.93) and good convergent and discriminant validity. Amongst others, we found a moderately high correlation with EQ-5D-3L proxy reported (r = 0.52) and low to essentially zero correlations with EQ-5D-3L self-reported (r = 0.20) and carer and patient background variables (r ≤ 0.20). As predicted, DEMQOL-Proxy (self-administered) showed a modest correlation with DEMQOL (r = 0.32). Known-groups differences on health-related quality of life (comparing people with versus people without cognitive impairment) were of moderate effect size (d = 0.38) and in the expected direction. DEMQOL-Proxy (self-administered) has comparable acceptability, reliability and validity with DEMQOL-Proxy (interviewer administered). DEMQOL-Proxy (self-administered) can be used in a wider variety of contexts than its interviewer-administered version, including routine use in busy clinics. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  19. Validation and application of a death proxy in adult cancer patients.

    Science.gov (United States)

    Mealing, Nicole M; Dobbins, Timothy A; Pearson, Sallie-Anne

    2012-07-01

    PURPOSE: Fact of death is not always available on data sets used for pharmacoepidemiological research. Proxies may be an appropriate substitute in the absence of death data. The purposes of this study were to validate a proxy for death in adult cancer patients and to assess its performance when estimating survival in two cohorts of cancer patients. METHODS: We evaluated 30-, 60-, 90- and 180-day proxies overall and by cancer type using data from 12 394 Australian veterans with lung, colorectal, breast or prostate cancer. The proxy indicated death if the difference between the last dispensing record and the end of the observational period exceeded the proxy cutoff. We then compared actual survival to 90-day proxy estimates in a subset of 4090 veterans with 'full entitlements' for pharmaceutical items and in 3704 Australian women receiving trastuzumab for HER2+ metastatic breast cancer. RESULTS: The 90-day proxy was optimal with an overall sensitivity of 99.3% (95%CI: 98.4-99.7) and a specificity of 97.6% (95%CI: 91.8-99.4). These measures remained high when evaluated by cancer type and spread of disease. The application of the proxy using the most conservative date of death estimate (date of last dispensing) generally underestimated survival, with estimates up to 3 months shorter than survival based on fact of death. CONCLUSIONS: A 90-day death proxy is a robust substitute to identify death in a chronic population when fact of death is not available. The proxy is likely to be valid across a range of chronic diseases as it relies on the presence of 'regular' dispensing records for individual patients. Copyright © 2011 John Wiley & Sons, Ltd. Copyright © 2011 John Wiley & Sons, Ltd.

  20. Design, Implementation, and Performance Evaluation of Efficient PMIPv6 Based Mobile Multicast Sender Support Schemes

    Directory of Open Access Journals (Sweden)

    Lili Wang

    2015-01-01

    Full Text Available Proxy Mobile IPv6 (PMIPv6 is proposed as a promising network-based mobility management protocol, which does not need any participation of mobile nodes. PMIPv6 does not support the multicast well and most of the current research concentrates on the mobile multicast receiver. However, the mobile multicast sender is also very important and challenging, which has not been addressed well. Therefore, in this paper we propose two efficient PMIPv6 based mobile multicast sender support schemes which are PMIP bidirectional tunneling (PMIP-BT and PMIP direct routing (PMIP-DR. In the PMIP-BT, the multicast traffic can be delivered through the PMIPv6 bidirectional tunnel, while, in the PMIP-DR, the multicast data can be transmitted via an optimized direct multicast routing. Both of them can support the multicast sender mobility transparently enabled in the PMIPv6 networks. We evaluate the performance of the proposed schemes by theoretical analysis, and the numerical results show that the proposed schemes have a better performance in terms of the signaling cost than the current schemes. Meanwhile, the proposed schemes are also implemented on the test bed, and the experimental results not only verify the validity and feasibility of our proposed schemes, but also conclude the different scenarios to which they are applicable.

  1. Fighting terrorism in Africa by proxy

    DEFF Research Database (Denmark)

    Olsen, Gorm Rye

    2014-01-01

    The French intervention in Mali in early 2013 emphasizes that the decision-makers in Paris, Brussels, and Washington considered the establishment of the radical Islamist regime in Northern Mali a threat to their security interests. The widespread instability including the rise of radical Islamist...... groups in Somalia was perceived as a threat to western interests. It is the core argument of the paper if western powers decide to provide security in Africa, they will be inclined to use proxy instead of deploying own troops. Security provision by proxy in African means that African troops are doing...

  2. A Robust Blind Quantum Copyright Protection Method for Colored Images Based on Owner's Signature

    Science.gov (United States)

    Heidari, Shahrokh; Gheibi, Reza; Houshmand, Monireh; Nagata, Koji

    2017-08-01

    Watermarking is the imperceptible embedding of watermark bits into multimedia data in order to use for different applications. Among all its applications, copyright protection is the most prominent usage which conceals information about the owner in the carrier, so as to prohibit others from assertion copyright. This application requires high level of robustness. In this paper, a new blind quantum copyright protection method based on owners's signature in RGB images is proposed. The method utilizes one of the RGB channels as indicator and two remained channels are used for embedding information about the owner. In our contribution the owner's signature is considered as a text. Therefore, in order to embed in colored image as watermark, a new quantum representation of text based on ASCII character set is offered. Experimental results which are analyzed in MATLAB environment, exhibit that the presented scheme shows good performance against attacks and can be used to find out who the real owner is. Finally, the discussed quantum copyright protection method is compared with a related work that our analysis confirm that the presented scheme is more secure and applicable than the previous ones currently found in the literature.

  3. Applicability of a cognitive questionnaire in the elderly and proxy

    Directory of Open Access Journals (Sweden)

    Renata Areza Fegyveres

    Full Text Available Abstract The Informant Questionnaire on Cognitive Decline in the Elderly with the Proxy (IQCODE was developed as a screening tool for cognition alterations. Objectives: 1 To verify the applicability of IQCODE in the elderly with limited schooling, 2 To verify the reliability of the responses supplied by the aged and their proxies. Methods: Individuals of a Community Group were evaluated using the Mini-Mental State Examination (MMSE, IQCODE and Geriatric Depression Scale (GDS. The IQCODE was applied to informants and proxies. Results: We analyzed 44 individuals, aged between 58-82 years (M=66.8, SD=5.97 with mean elderly-schooling level of 3.75, SD=2.82 and 44 proxies aged 44.5 (SD=13.3, with mean schooling level of 8.25 (SD=4.3. The mean GDS was 8.22, SD=4.90 and 13 participants presented a score suggestive of depressive symptoms. The mean elderly IQCODE score was 3.26, SD=0.69 and 3.21, SD=0.65, for proxy responses. There was no statistical difference between these means. On the MMSE, the mean score was 24.20, SD=4.14 and 18 participants presented scores below the cut-off. The IQCODE answers by the elderly in this latter group were more congruent with MMSE than the answers of proxies. Conclusions: The applicability of the IQCODE in a population with little schooling was verified in that the proxy-report was similar to the elderly report. We can affirm that the elderly answers were more accurate than the proxies, as they were closer to MMSE score. The inclusion of a greater number of participants from community-dwelling settings is necessary to confirm the results obtained in this study.

  4. Munchausen syndrome by proxy

    Directory of Open Access Journals (Sweden)

    Jovanović Aleksandar A.

    2005-01-01

    Full Text Available This review deals with bibliography on Munchausen syndrome by proxy (MSbP. The name of this disorder was introduced by English psychiatrist Roy Meadow who pointed to diagnostic difficulties as well as to serious medical and legal connotations of MSbP. MSbP was classified in DSM-IV among criteria sets provided for further study as "factitious disorder by proxy", while in ICD-10, though not explicitly cited, MSbP might be classified as "factitious disorders" F68.1. MSbP is a special form of abuse where the perpetrator induces somatic or mental symptoms of illness in the victim under his/her care and then persistently presents the victims for medical examinations and care. The victim is usually a preschool child and the perpetrator is the child's mother. Motivation for such pathological behavior of perpetrator is considered to be unconscious need to assume sick role by proxy while external incentives such as economic gain are absent. Conceptualization of MSbP development is still in the domain of psychodynamic speculation, its course is chronic and the prognosis is poor considering lack of consistent, efficient and specific treatment. The authors also present the case report of thirty-three year-old mother who had been abusing her nine year-old son both emotionally and physically over the last several years forcing him to, together with her, report to the police, medical and educational institutions that he had been the victim of rape, poisoning and beating by various individuals, especially teaching and medical staff. Mother manifested psychosis and her child presented with impaired cognitive development, emotional problems and conduct disorder.

  5. Evaluation of patient and proxy responses on the activity measure for postacute care.

    Science.gov (United States)

    Jette, Alan M; Ni, Pengsheng; Rasch, Elizabeth K; Appelman, Jed; Sandel, M Elizabeth; Terdiman, Joseph; Chan, Leighton

    2012-03-01

    Our objective was to examine the agreement between adult patients with stroke and family member or clinician proxies in activity measure for postacute care (AM-PAC) summary scores for daily activity, basic mobility, and applied cognitive function. This study involved 67 patients with stroke admitted to a hospital within the Kaiser Permanente of Northern California system and were participants in a parent study on stroke outcomes. Each participant and proxy respondent completed the AM-PAC by personal or telephone interview at the point of hospital discharge or during ≥1 transitions to different postacute care settings. The results suggest that for patients with a stroke proxy, AM-PAC data are robust for family or clinician proxy assessment of basic mobility function and clinician proxy assessment of daily activity function, but less robust for family proxy assessment of daily activity function and for all proxy groups' assessments of applied cognitive function. The pattern of disagreement between patient and proxy was, on average, relatively small and random. There was little evidence of systematic bias between proxy and patient reports of their functional status. The degree of concordance between patient and proxy was similar for those with moderate to severe strokes compared with mild strokes. Patient and proxy ratings on the AM-PAC achieved adequate agreement for use in stroke research when using proxy respondents could reduce sample selection bias. The AM-PAC data can be implemented across institutional as well as community care settings while achieving precision and reducing respondent burden.

  6. Proxy-rated quality of life in Alzheimer's disease

    DEFF Research Database (Denmark)

    Vogel, Asmus; Bhattacharya, Suvosree; Waldorff, Frans Boch

    2012-01-01

    The study investigated the change in proxy rated quality of life (QoL) of a large cohort of home living patients with Alzheimer's disease (AD) over a period of 36 months.......The study investigated the change in proxy rated quality of life (QoL) of a large cohort of home living patients with Alzheimer's disease (AD) over a period of 36 months....

  7. SIGNATURE: A workbench for gene expression signature analysis

    Directory of Open Access Journals (Sweden)

    Chang Jeffrey T

    2011-11-01

    Full Text Available Abstract Background The biological phenotype of a cell, such as a characteristic visual image or behavior, reflects activities derived from the expression of collections of genes. As such, an ability to measure the expression of these genes provides an opportunity to develop more precise and varied sets of phenotypes. However, to use this approach requires computational methods that are difficult to implement and apply, and thus there is a critical need for intelligent software tools that can reduce the technical burden of the analysis. Tools for gene expression analyses are unusually difficult to implement in a user-friendly way because their application requires a combination of biological data curation, statistical computational methods, and database expertise. Results We have developed SIGNATURE, a web-based resource that simplifies gene expression signature analysis by providing software, data, and protocols to perform the analysis successfully. This resource uses Bayesian methods for processing gene expression data coupled with a curated database of gene expression signatures, all carried out within a GenePattern web interface for easy use and access. Conclusions SIGNATURE is available for public use at http://genepattern.genome.duke.edu/signature/.

  8. Longitudinal proxy measurements in multiple sclerosis: patient-proxy agreement on the impact of MS on daily life over a period of two years

    Directory of Open Access Journals (Sweden)

    Thompson Alan J

    2008-02-01

    Full Text Available Abstract Background The use of self-report measurements in clinical settings is increasing. However, in patients with limitations that interfere with reliable self-assessment such as cognitive impairment or mood disturbances, as may be the case in multiple sclerosis (MS, data collection might be problematic. In these situations, information obtained from proxy respondents (e.g. partners may replace self-ratings. The aim of this study was to examine the value of proxy ratings at separate points in time and to assess patient-proxy agreement on possible changes in disease impact of MS. Methods Fifty-six MS patients and their partners completed the Multiple Sclerosis Impact Scale (MSIS-29 at baseline and follow-up, two years later. Patient-proxy agreement was assessed at both time points by calculating intraclass correlation coefficients (ICCs, exact and global agreement and the mean directional differences between groups. Agreement of change over time was assessed by calculating ICCs between change scores. In parallel, global ratings of both patients and proxy respondents of the extent to which the patient had improved or deteriorated over the past two years were collected to validate possible changes on the MSIS-29. Results At both time points, agreement on the physical scale was higher than agreement on the psychological scale (ICCs at baseline were 0.81 for the physical scale and 0.72 for the psychological scale; at follow-up, the ICC values were 0.86 and 0.65 respectively. At follow-up, statistically significant mean differences between patients and proxies were noted for the physical scale (-4.8 ± 12.7, p = 0.006 and the psychological scale (-8.9 ± 18.8, p = 0.001. Agreement between change scores on the MSIS-29 was fair (ICC Conclusion Proxy respondents could act as a reliable source of information in cross-sectional studies. Moreover, results suggested that agreement on change over time might be better for proxy respondents compared to

  9. The design and implementation about the project of optimizing proxy servers

    International Nuclear Information System (INIS)

    Wu Ling; Liu Baoxu

    2006-01-01

    Proxy server is an important facility in the network of an organization, which play an important role in security and access control and accelerating access of Internet. This article introduces the action of proxy servers, and expounds the resolutions to optimize proxy servers at IHEP: integration, dynamic domain name resolves and data synchronization. (authors)

  10. Pattern-mixture models for analyzing normal outcome data with proxy respondents.

    Science.gov (United States)

    Shardell, Michelle; Hicks, Gregory E; Miller, Ram R; Langenberg, Patricia; Magaziner, Jay

    2010-06-30

    Studies of older adults often involve interview questions regarding subjective constructs such as perceived disability. In some studies, when subjects are unable (e.g. due to cognitive impairment) or unwilling to respond to these questions, proxies (e.g. relatives or other care givers) are recruited to provide responses in place of the subject. Proxies are usually not approached to respond on behalf of subjects who respond for themselves; thus, for each subject, data from only one of the subject or proxy are available. Typically, proxy responses are simply substituted for missing subject responses, and standard complete-data analyses are performed. However, this approach may introduce measurement error and produce biased parameter estimates. In this paper, we propose using pattern-mixture models that relate non-identifiable parameters to identifiable parameters to analyze data with proxy respondents. We posit three interpretable pattern-mixture restrictions to be used with proxy data, and we propose estimation procedures using maximum likelihood and multiple imputation. The methods are applied to a cohort of elderly hip-fracture patients. (c) 2010 John Wiley & Sons, Ltd.

  11. Reliability of proxy respondents for patients with stroke: a systematic review.

    Science.gov (United States)

    Oczkowski, Colin; O'Donnell, Martin

    2010-01-01

    Proxy respondents are an important aspect of stroke medicine and research. We performed a systematic review of studies evaluating the reliability of proxy respondents for stroke patients. Studies were identified by searches of MEDLINE, Google, and the Cochrane Library between January 1969 and June 2008. All were prospective or cross-sectional studies reporting the reliability of proxy respondents for patients with a history of previous stroke or transient ischemic attack. One author abstracted data. For each study, intraclass correlation (ICC) or the k-statistic was categorized as poor (0.80). Thirteen studies, with a total of 2618 participants, met our inclusion criteria. Most studies recruited patients >3 months after their stroke. Of these studies, 5 (360 participants; 5 scales) evaluated reliability of proxy respondents for activities of daily living (ADL), and 9 (2334 participants; 9 scales) evaluated reliability of proxy respondents for quality of life (QoL). One study evaluated both. In studies, the ICC/k for scales ranged from 0.61 to 0.91 for ADL and from 0.41 to 0.8 for QoL. Most studies reported that proxy respondents overestimated impairments compared with patient self-reports. Stroke severity and objective nature of questions were the most consistent determinants of disagreement between stroke patient and proxy respondent. Our data indicate that beyond the acute stroke period, the reliability of proxy respondents for validated scales of ADL was substantial to excellent, while that of scales for QoL was moderate to substantial. Copyright (c) 2010 National Stroke Association. Published by Elsevier Inc. All rights reserved.

  12. Proxy-produced ethnographic work: what are the problems, issues, and dilemmas arising from proxy ethnography?

    DEFF Research Database (Denmark)

    Martinussen, Marie Louise; Højbjerg, Karin; Tamborg, Andreas Lindenskov

    2018-01-01

    This article addresses the implications of research-student cooperation in the production of empirical material. For the student to replace the experienced researcher and work under the researcher’s supervision, we call such work proxy-produced ethnographic work. The specific relations...... and positions arising from such a setup between the teacher/researcher and the proxy ethnographer/student are found to have implications for the ethnographies produced. This article’s main focus is to show how these relations and positions have not distorted the ethnographic work and the ethnographies but......, rather, have oriented it in certain ways. It is shown how the participating researchers – both senior and junior - have distinctive, incorporated dispositions with which they pre-consciously participate in an implicit and subtle relation that can make it very easy to overlook distortions during...

  13. Analyzing differences between patient and proxy on Patient Reported Outcomes in multiple sclerosis.

    Science.gov (United States)

    Sonder, Judith M; Holman, Rebecca; Knol, Dirk L; Bosma, Libertje V A E; Polman, Chris H; Uitdehaag, Bernard M J

    2013-11-15

    Proxy respondents, partners of multiple sclerosis (MS) patients, can provide valuable information on the MS patients' disease. In an earlier publication we found relatively good agreement on patient reported outcomes (PROs) measuring physical impact and functioning, but we found large differences on (neuro)psychological scales. We aim to identify patient and proxy related variables explaining differences between patients' and proxies' ratings on five PROs. We report on data from 175 MS patients and proxy respondents. Regression analyses were performed, using as dependent variable the mean differences on five scales: Physical and Psychological scale of the Multiple Sclerosis Impact Scale (MSIS-29), the Multiple Sclerosis Walking Scale (MSWS), Guy's Neurological Disability Scale (GNDS) and the Multiple Sclerosis Neuropsychological Screening Questionnaire (MSNQ). The independent variables were patient, proxy and disease related variables. Caregiver strain was significantly related to differences between patient and proxy scores for all five PROs. A higher level of patient anxiety on the HADS was linked to larger differences on all PROs except the GNDS. In addition, cognitive functioning, proxy depression, walking ability, proxy gender and MS related disability were contributing to the discrepancies. We found several patient and proxy factors that may contribute to discrepancies between patient and proxy scores on MS PROs. The most important factor is caregiver burden. © 2013 Elsevier B.V. All rights reserved.

  14. Integrating Iris and Signature Traits for Personal Authentication Using User-SpecificWeighting

    Directory of Open Access Journals (Sweden)

    Serestina Viriri

    2012-03-01

    Full Text Available Biometric systems based on uni-modal traits are characterized by noisy sensor data, restricted degrees of freedom, non-universality and are susceptible to spoof attacks. Multi-modal biometric systems seek to alleviate some of these drawbacks by providing multiple evidences of the same identity. In this paper, a user-score-based weighting technique for integrating the iris and signature traits is presented. This user-specific weighting technique has proved to be an efficient and effective fusion scheme which increases the authentication accuracy rate of multi-modal biometric systems. The weights are used to indicate the importance of matching scores output by each biometrics trait. The experimental results show that our biometric system based on the integration of iris and signature traits achieve a false rejection rate (FRR of 0.08% and a false acceptance rate (FAR of 0.01%.

  15. The Difference Between Using Proxy Server and VPN

    Directory of Open Access Journals (Sweden)

    David Dwiputra Kurniadi

    2015-11-01

    For example, looking for software, game through internet. But sometimes, there are some websites that cannot be opened as they have Internet Positive notificatio. To solve that problem, hacker found the solution by creating Proxy Server or VPN. In this time internet is very modern and very easy to access and there are a lot of Proxy Server and VPN that can be easly used.

  16. Heterogeneity of Cr in Mytilus edulis: Implications for the Cr isotope system as a paleo-redox proxy

    Science.gov (United States)

    Bruggmann, Sylvie; Klaebe, Robert; Frei, Robert

    2017-04-01

    's Cr isotopic composition [3]. A detailed understanding of the processes causing the observed heterogeneity of [Cr] and δ53Cr in modern carbonate shells is crucial for the use of the Cr isotope system as a potential paleo-redox proxy. [1] Bonnand, P., James, R. H., Parkinson, I. J., Connelly, D. P., and Fairchild, I. J. (2013). The chromium isotopic composition of seawater and marine carbonates. Earth and Planetary Science Letters, 382:10-20. [2] Holmden, C., Jacobsen, A. D., Sageman, B. B., Hurgten, M. T. (2016). Response of the Cr isotope proxy to Cretaceous Ocean Anoxic Event 2 in a pelagic carbonate succession from the Western Interior Seaway. Geochimica et Cosmochimica Acta, 186:227-295. [3] Paulukat, C., Gilleaudeau, G. J., Chernyavskiy, P., Frei, R. (2016). The Cr-isotope signature of surface seawater -A global perspective. Chemical Geology, 444:101-109. [4] Pereira, N. S., Voegelin, A. R., Paulukat, C., Sial, A. N., Ferreira, V. P., and Frei, R. (2015). Chromium-isotope signatures in scleractinian corals from the Rocas Atoll, Tropical South Atlantic. Geobiology 1-14.

  17. Signatures of Majorana bound states in one-dimensional topological superconductors

    International Nuclear Information System (INIS)

    Pientka, Falko

    2014-01-01

    Topological states of matter have fascinated condensed matter physicists for the past three decades. Famous examples include the integer and fractional quantum Hall states exhibiting a spectacular conductance quantization as well as topological insulators in two and three dimensions featuring gapless Dirac fermions at the boundary. Very recently, novel topological phases in superconductors have been subject of intense experimental and theoretical investigation. One-dimensional topological superconductors are particularly intriguing as they host exotic Majorana end states. These are zero-energy bound states with nonabelian exchange statistics potentially useful for topologically protected quantum computing. Recent theoretical and experimental advances have put the realization of Majorana states within reach of current measurement techniques. In this thesis we investigate signatures of Majorana bound states in realistic experiments aiming to improve the theoretical understanding of ongoing experimental efforts and to design novel measurement schemes, which exhibit convincing signatures of Majoranas. In particular we account for nonideal experimental conditions which can lead to qualitatively new features. Possible signatures of Majoranas can be accessed in the Josephson current through a weak link between two topological superconductors although the signatures in the dc Josephson effect are typically obscured by inevitable quasiparticle relaxation in the superconductor. Here we propose a measurement scheme in mesoscopic superconducting rings, where Majorana signatures persist even for infinitely fast relaxation. In a separate project we outline an alternative to the standard Josephson experiment in topological superconductors based on quantum wires. We delineate how Majoranas can be detected, when the Josephson current is induced by noncollinear magnetic fields applied to the two banks of the junction instead of a superconducting phase difference. Another important

  18. The Intra-Industry Effects of Proxy Contests

    OpenAIRE

    Fang Chen; Jian Huang; Han Yu

    2018-01-01

    This paper is the first study on the intra-industry effects of proxy contests. Using a sample of proxy contests from January 1988 through December 2008, we identify a striking cross-sectional difference in market reaction to the target companies. As much as 61% of the target firms have a significant positive cumulative abnormal return (CARs) in the period (‒10, +10) around the announcement day, while 39% of the target firms have the negative CARs in the same event window. Moreover, we find th...

  19. Architecture of a bi-directional Bluetooth-UPnP proxy

    NARCIS (Netherlands)

    Delphinanto, A.; Lukkien, J.J.; Koonen, A.M.J.; Hartog, F.T.H. den; Madureira, A.J.P.S.; Niemegeers, I.G.M.M.; Selgert, F.

    2007-01-01

    The current service- and device discovery protocols are not platform- and network independent Therefore, proxy servers will be needed to extend the range of IP-based discovery protocols to non-IP domains. We developed an architecture of a proxy that enables UPnP devices and services to be discovered

  20. Isotopic signatures of eelgrass (Zostera marina L.) as bioindicator of anthropogenic nutrient input in the western Baltic Sea

    International Nuclear Information System (INIS)

    Schubert, Philipp R.; Karez, Rolf; Reusch, Thorsten B.H.; Dierking, Jan

    2013-01-01

    Highlights: • Anthropogenic nitrogen (N) inputs are a global problem, but difficult to quantify. • We tested the use of eelgrass δ 15 N as proxy of such inputs in the Baltic Sea. • The method revealed distinct spatial patterns in sewage N across a eutrophic bay. • Traditional eutrophication measures corroborated the results from δ 15 N values. • Eelgrass δ 15 N ratios have high potential as proxy of sewage-derived N in the Baltic. -- Abstract: Eutrophication is a global environmental problem. Better management of this threat requires more accurate assessments of anthropogenic nitrogen (N) inputs to coastal systems than can be obtained with traditional measures. Recently, primary producer N isotopic signatures have emerged as useful proxy of such inputs. Here, we demonstrated for the first time the applicability of this method using the widespread eelgrass (Zostera marina) in the highly eutrophic Baltic Sea. Spatial availability of sewage N across a bay with one major sewage outflow predicted by eelgrass δ 15 N was high near and downstream of the outflow compared to upstream, but returned to upstream levels within 4 km downstream from the outfall. General conclusions were corroborated by traditional eutrophication measures, but in contrast to these measures were fully quantitative. Eelgrass N isotope ratios therefore show high potential for coastal screens of eutrophication in the Baltic Sea, and in other areas with eelgrass meadows

  1. Proxy-cryptocurrency payment system%基于代理的密码货币支付系统

    Institute of Scientific and Technical Information of China (English)

    傅晓彤; 陈思; 张宁

    2017-01-01

    The decentralized cryptocurrency which was based on block chain has been thought the most successful one in history. In the system, public keys were used as the users' accounts which guaranteed the anonymity in real transactions. However, all the transaction information was recorded in the block chain, it was a potential threat for users' privacy which might leak the payment information. Moreover, to avoid double-spending, it was agreed that the transaction on the target block was valid only if anotherk blocks were generated after the target one. The long waiting time reduced the ef-ficiency of the payment system. A model of payment system based on a proxy-cryptocurrency was proposed, and a solu-tion based on blind signature techniques was proposed. The scheme introduced a proxy in the payment phase, by which transaction confirmation time could be reduced and the transaction efficiency could be improved. Meanwhile, the system implements better anonymity, namely as the privacy protection function.%利用区块链技术实现的去中心化的密码货币被誉为有史以来最成功的密码货币.用户以公钥作为账户地址,使交易具备匿名性,即隐私的可保护性.然而区块链上记录的交易信息,会给用户隐私带来潜在的泄露威胁;此外,为了防止重复花费,系统约定只有在目标区块之后又有k个后续区块产生才能确认该目标区块上的交易是有效的,这段等待后续区块生成的时间较长,大大降低了交易效率.针对以上问题,提出一种基于代理的密码货币支付系统模型,并给出了基于盲签名算法的实现方案,通过在支付阶段引入代理,缩短了交易确认时间,提高了交易效率,同时,更好地实现了用户的匿名性即隐私保护功能.

  2. Distribution of biologic, anthropogenic, and volcanic constituents as a proxy for sediment transport in the San Francisco Bay Coastal System

    Science.gov (United States)

    McGann, Mary; Erikson, Li H.; Wan, Elmira; Powell, Charles; Maddocks, Rosalie F.; Barnard, P.L.; Jaffee, B.E.; Schoellhamer, D.H.

    2013-01-01

    Although conventional sediment parameters (mean grain size, sorting, and skewness) and provenance have typically been used to infer sediment transport pathways, most freshwater, brackish, and marine environments are also characterized by abundant sediment constituents of biological, and possibly anthropogenic and volcanic, origin that can provide additional insight into local sedimentary processes. The biota will be spatially distributed according to its response to environmental parameters such as water temperature, salinity, dissolved oxygen, organic carbon content, grain size, and intensity of currents and tidal flow, whereas the presence of anthropogenic and volcanic constituents will reflect proximity to source areas and whether they are fluvially- or aerially-transported. Because each of these constituents have a unique environmental signature, they are a more precise proxy for that source area than the conventional sedimentary process indicators. This San Francisco Bay Coastal System study demonstrates that by applying a multi-proxy approach, the primary sites of sediment transport can be identified. Many of these sites are far from where the constituents originated, showing that sediment transport is widespread in the region. Although not often used, identifying and interpreting the distribution of naturally-occurring and allochthonous biologic, anthropogenic, and volcanic sediment constituents is a powerful tool to aid in the investigation of sediment transport pathways in other coastal systems.

  3. Slices: A shape-proxy based on planar sections

    KAUST Repository

    McCrae, James

    2011-12-01

    Minimalist object representations or shape-proxies that spark and inspire human perception of shape remain an incompletely understood, yet powerful aspect of visual communication. We explore the use of planar sections, i.e., the contours of intersection of planes with a 3D object, for creating shape abstractions, motivated by their popularity in art and engineering. We first perform a user study to show that humans do define consistent and similar planar section proxies for common objects. Interestingly, we observe a strong correlation between user-defined planes and geometric features of objects. Further we show that the problem of finding the minimum set of planes that capture a set of 3D geometric shape features is both NP-hard and not always the proxy a user would pick. Guided by the principles inferred from our user study, we present an algorithm that progressively selects planes to maximize feature coverage, which in turn influence the selection of subsequent planes. The algorithmic framework easily incorporates various shape features, while their relative importance values are computed and validated from the user study data. We use our algorithm to compute planar slices for various objects, validate their utility towards object abstraction using a second user study, and conclude showing the potential applications of the extracted planar slice shape proxies.

  4. Differences between Proxy and Patient Assessments of Cancer Care Experiences and Quality Ratings.

    Science.gov (United States)

    Roydhouse, Jessica K; Gutman, Roee; Keating, Nancy L; Mor, Vincent; Wilson, Ira B

    2018-04-01

    To assess the impact of proxy survey responses on cancer care experience reports and quality ratings. Secondary analysis of data from Cancer Care Outcomes Research and Surveillance (CanCORS). Recruitment occurred from 2003 to 2005. The study was a cross-sectional observational study. The respondents were patients with incident colorectal or lung cancer or their proxies. Analyses used linear regression models with an independent variable for proxy versus patient responses as well as study site and clinical covariates. The outcomes were experiences with medical care, nursing care, care coordination, and care quality rating. Multiple imputation was used for missing data. Among 6,471 respondents, 1,011 (16 percent) were proxies. The proportion of proxy respondents varied from 6 percent to 28 percent across study sites. Adjusted proxy scores were modestly higher for medical care experiences (+1.28 points [95 percent CI:+ 0.05 to +2.51]), but lower for nursing care (-2.81 [95 percent CI: -4.11 to -1.50]) and care coordination experiences (-2.98 [95 percent CI: -4.15 to -1.81]). There were no significant differences between adjusted patient and proxy ratings of quality. Proxy responses have small but statistically significant differences from patient responses. However, if ratings of care are used for financial incentives, such differences could be exaggerated across practices or areas if proxy use varies. © Health Research and Educational Trust.

  5. Qualitative and Quantitative Sentiment Proxies

    DEFF Research Database (Denmark)

    Zhao, Zeyan; Ahmad, Khurshid

    2015-01-01

    Sentiment analysis is a content-analytic investigative framework for researchers, traders and the general public involved in financial markets. This analysis is based on carefully sourced and elaborately constructed proxies for market sentiment and has emerged as a basis for analysing movements...

  6. Host, family and community proxies for infections potentially associated with leukaemia

    International Nuclear Information System (INIS)

    Law, G. R.

    2008-01-01

    Three hypotheses have proposed the involvement of infections in the aetiology of childhood leukaemia, suggesting either a specific leukemogenic infection or a series of common infections that lead to a dys-regulation of the immune system. Much of the evidence for the link with infections has been based on epidemiological observations, often using proxy measures of infection. Proxy measures include population mixing, parental occupation, age distribution of incidence, spatial and space-time clustering of cases, birth order and day care during infancy. This paper discusses the proxies used and examines to what extent a commonly used proxy measure, birth order, is a fair representation of either specific infections or general infectious load. It is clear that although leukaemia, and other diseases, may be linked with infections, one needs to (1) measure specific and general infections with more accuracy and (2) understand how proxy measures relate to real infections in the population. (authors)

  7. Web proxy cache replacement strategies simulation, implementation, and performance evaluation

    CERN Document Server

    ElAarag, Hala; Cobb, Jake

    2013-01-01

    This work presents a study of cache replacement strategies designed for static web content. Proxy servers can improve performance by caching static web content such as cascading style sheets, java script source files, and large files such as images. This topic is particularly important in wireless ad hoc networks, in which mobile devices act as proxy servers for a group of other mobile devices. Opening chapters present an introduction to web requests and the characteristics of web objects, web proxy servers and Squid, and artificial neural networks. This is followed by a comprehensive review o

  8. Forecasting Lightning Threat Using WRF Proxy Fields

    Science.gov (United States)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  9. Analysis of Quality of Proxy Questions in Health Surveys by Behavior Coding

    NARCIS (Netherlands)

    Benitez, I.; Padilla, J.L.; Ongena, Yfke

    2012-01-01

    The aim of this study is to show how to analyze the quality of questions for proxy informants by means of behavior coding. Proxy questions can undermine survey data quality because of the fact that proxies respond to questions on behalf of other people. Behavior coding can improve questions by

  10. Oxygen Isotopes Archived in Subfossil Chironomids: Advancing a Promising Proxy for Lake Water Isotopes

    Science.gov (United States)

    Lasher, G. E.; Axford, Y.; Blair, N. E.

    2017-12-01

    Oxygen isotopes measured in subfossil chironomid head capsules (aquatic insect remains) in lake sediments are beginning to offer paleoclimate insights from previously under-studied areas of the world. Since the first published pilot study demonstrated the potential of chironomid δ18O to record lake water δ18O (Wooller et al., 2004), subsequent work has refined our understanding of this proxy: confirming via lab cultures that growth water controls head capsule δ18O (Wang et al., 2009), refining laboratory pretreatment protocols, and further validating the method by demonstrating strong agreement between carbonate and chironomid-derived paleo-isotope records (Verbruggen et al., 2009, 2010, 2011). However, outstanding questions remain, including the seasonality of chironomid growth, possible species-dependent vital effects, and diagenetic effects on the protein-chitin complex that comprise chironomid cuticles. To address some of these questions, we summarize available data from paired modern chironomid-lake water δ18O values from around the world and discuss climatic and environmental factors affecting chironomid isotopic signatures. We also present new data on the resistance of these subfossils to diagenesis and degradation throughout the late Quaternary using Fourier Transform Infrared Spectroscopy (FT-IR) and Pyrolysis Gas Chromatography Mass Spectrometry (Py-GC/MS) of chironomid remains up to >100,000 years old. As chironomids are nearly ubiquitous in lakes globally and, we argue, molecularly stable through glacial and interglacial cycles, this proxy has the potential to greatly expand the spatial and temporal resolution of Quaternary paleo-isotopes and thus climate records. In addition to reviewing and presenting new methodological advances, we also present applications of chironomid δ18O from millennial- to centennial-scale Holocene Greenland lake records.

  11. Statistical framework for evaluation of climate model simulations by use of climate proxy data from the last millennium – Part 2: A pseudo-proxy study addressing the amplitude of solar forcing

    Directory of Open Access Journals (Sweden)

    A. Hind

    2012-08-01

    Full Text Available The statistical framework of Part 1 (Sundberg et al., 2012, for comparing ensemble simulation surface temperature output with temperature proxy and instrumental records, is implemented in a pseudo-proxy experiment. A set of previously published millennial forced simulations (Max Planck Institute – COSMOS, including both "low" and "high" solar radiative forcing histories together with other important forcings, was used to define "true" target temperatures as well as pseudo-proxy and pseudo-instrumental series. In a global land-only experiment, using annual mean temperatures at a 30-yr time resolution with realistic proxy noise levels, it was found that the low and high solar full-forcing simulations could be distinguished. In an additional experiment, where pseudo-proxies were created to reflect a current set of proxy locations and noise levels, the low and high solar forcing simulations could only be distinguished when the latter served as targets. To improve detectability of the low solar simulations, increasing the signal-to-noise ratio in local temperature proxies was more efficient than increasing the spatial coverage of the proxy network. The experiences gained here will be of guidance when these methods are applied to real proxy and instrumental data, for example when the aim is to distinguish which of the alternative solar forcing histories is most compatible with the observed/reconstructed climate.

  12. Robotic Vehicle Proxy Simulation, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Energid Technologies proposes the development of a digital simulation that can replace robotic vehicles in field studies. This proxy simulation will model the...

  13. System Identification Based Proxy Model of a Reservoir under Water Injection

    Directory of Open Access Journals (Sweden)

    Berihun M. Negash

    2017-01-01

    Full Text Available Simulation of numerical reservoir models with thousands and millions of grid blocks may consume a significant amount of time and effort, even when high performance processors are used. In cases where the simulation runs are required for sensitivity analysis, dynamic control, and optimization, the act needs to be repeated several times by continuously changing parameters. This makes it even more time-consuming. Currently, proxy models that are based on response surface are being used to lessen the time required for running simulations during sensitivity analysis and optimization. Proxy models are lighter mathematical models that run faster and perform in place of heavier models that require large computations. Nevertheless, to acquire data for modeling and validation and develop the proxy model itself, hundreds of simulation runs are required. In this paper, a system identification based proxy model that requires only a single simulation run and a properly designed excitation signal was proposed and evaluated using a benchmark case study. The results show that, with proper design of excitation signal and proper selection of model structure, system identification based proxy models are found to be practical and efficient alternatives for mimicking the performance of numerical reservoir models. The resulting proxy models have potential applications for dynamic well control and optimization.

  14. Voltage-induced switching with magnetoresistance signature in magnetic nano-filaments

    International Nuclear Information System (INIS)

    Sokolov, A; Sabirianov, I; Sabirianov, R; Doudin, B

    2009-01-01

    Large hysteretic resistance changes are reported on sub-100 nm diameter metallic nanowires including thin dielectric junctions. Bi-stable 50% switching in a double junction geometry is modeled in terms of an occupation-driven metal-insulator transition in one of the two junctions, using the generalized Poisson expressions of Oka and Nagaosa (2005 Phys. Rev. Lett. 95 266403). It illustrates how a band bending scheme can be generalized for strongly correlated electron systems. The magnetic constituents of the nanowires provide a magnetoresistive signature of the two resistance states, confirming our model and enabling a four states device application.

  15. A simple and robust method for connecting small-molecule drugs using gene-expression signatures

    Directory of Open Access Journals (Sweden)

    Gant Timothy W

    2008-06-01

    Full Text Available Abstract Background Interaction of a drug or chemical with a biological system can result in a gene-expression profile or signature characteristic of the event. Using a suitably robust algorithm these signatures can potentially be used to connect molecules with similar pharmacological or toxicological properties by gene expression profile. Lamb et al first proposed the Connectivity Map [Lamb et al (2006, Science 313, 1929–1935] to make successful connections among small molecules, genes, and diseases using genomic signatures. Results Here we have built on the principles of the Connectivity Map to present a simpler and more robust method for the construction of reference gene-expression profiles and for the connection scoring scheme, which importantly allows the valuation of statistical significance of all the connections observed. We tested the new method with two randomly generated gene signatures and three experimentally derived gene signatures (for HDAC inhibitors, estrogens, and immunosuppressive drugs, respectively. Our testing with this method indicates that it achieves a higher level of specificity and sensitivity and so advances the original method. Conclusion The method presented here not only offers more principled statistical procedures for testing connections, but more importantly it provides effective safeguard against false connections at the same time achieving increased sensitivity. With its robust performance, the method has potential use in the drug development pipeline for the early recognition of pharmacological and toxicological properties in chemicals and new drug candidates, and also more broadly in other 'omics sciences.

  16. Limiting exercise options: depending on a proxy may inhibit exercise self-management.

    Science.gov (United States)

    Shields, Christopher A; Brawley, Lawrence R

    2007-07-01

    We examined the influence of proxy-assistance on exercisers' social cognitions and behavior. Fifty-six fitness class participants reported preference for proxy-assistance and reacted to exercising in different contexts. A 2 (proxy-led vs self-managed exercise context) by 2 (preferred assistance) MANOVA revealed significant assistance by context interactions for self-regulatory efficacy (SRE) and difficulty. Regarding self-managed exercise, high-assistance individuals expressed lower SRE and higher difficulty. Chi-square analysis revealed that significantly fewer high-assistance participants chose self-managed exercise. A one-way MANOVA on preferred assistance indicated that high-assistance participants were less confident, satisfied and perceived their self-managed exercise as more difficult. Results support Bandura's theorizing that use of a proxy can limit SRE of those preferring the proxy's control of their behavior.

  17. [Validity and reliability of the spanish EQ-5D-Y proxy version].

    Science.gov (United States)

    Gusi, N; Perez-Sousa, M A; Gozalo-Delgado, M; Olivares, P R

    2014-10-01

    A proxy version of the EQ-5D-Y, a questionnaire to evaluate the Health Related Quality of Life (HRQoL) in children and adolescents, has recently been developed. There are currently no data on the validity and reliability of this tool. The objective of this study was to analyze the validity and reliability of the EQ-5D-Y proxy version. A core set of self-report tools, including the Spanish version of the EQ-5D-Y were administered to a group of Spanish children and adolescents drawn from the general population. A similar core set of internationally standardized proxy tools, including the EQ-5D-Y proxy version were administered to their parents. Test-retest reliability was determined, and correlations with other generic measurements of HRQoL were calculated. Additionally, known group validity was examined by comparing groups with a priori expected differences in HRQoL. The agreement between the self-report and proxy version responses was also calculated. A total of 477 children and adolescents and their parents participated in the study. One week later, 158 participants completed the EQ-5D-Y/EQ-5D-Y proxy to facilitate reliability analysis. Agreement between the test-retest scores was higher than 88% for EQ-5D-Y self-report, and proxy version. Correlations with other health measurements showed similar convergent validity to that observed in the international EQ-5D-Y. Agreement between the self-report and proxy versions ranged from 72.9% to 97.1%. The results provide preliminary evidence of the reliability and validity of the EQ-5D-Y proxy version. Copyright © 2013 Asociación Española de Pediatría. Published by Elsevier Espana. All rights reserved.

  18. Implementation of RSA 2048-bit and AES 256-bit with Digital Signature for Secure Electronic Health Record Application

    Directory of Open Access Journals (Sweden)

    Mohamad Ali Sadikin

    2016-10-01

    Full Text Available This research addresses the implementation of encryption and digital signature technique for electronic health record to prevent cybercrime such as robbery, modification and unauthorised access. In this research, RSA 2048-bit algorithm, AES 256-bit and SHA 256 will be implemented in Java programming language. Secure Electronic Health Record Information (SEHR application design is intended to combine given services, such as confidentiality, integrity, authentication, and nonrepudiation. Cryptography is used to ensure the file records and electronic documents for detailed information on the medical past, present and future forecasts that have been given only to the intended patients. The document will be encrypted using an encryption algorithm based on NIST Standard. In the application, there are two schemes, namely the protection and verification scheme. This research uses black-box testing and whitebox testing to test the software input, output, and code without testing the process and design that occurs in the system.We demonstrated the implementation of cryptography in SEHR. The implementation of encryption and digital signature in this research can prevent archive thievery.

  19. Testing the timing of radiocarbon-dated events between proxy archives

    NARCIS (Netherlands)

    Christen, J. A.; Mauquoy, D.; van der Plicht, J.; Bennett, K. D.; Blaauw, Maarten

    For interpreting past changes on a regional or global scale, the timings of proxy-inferred events are usually aligned with data from other locations. However, too often chronological uncertainties are ignored in proxy diagrams and multisite comparisons, making it possible for researchers to fall

  20. Radiation signatures

    International Nuclear Information System (INIS)

    McGlynn, S.P.; Varma, M.N.

    1992-01-01

    A new concept for modelling radiation risk is proposed. This concept is based on the proposal that the spectrum of molecular lesions, which we dub ''the radiation signature'', can be used to identify the quality of the causal radiation. If the proposal concerning radiation signatures can be established then, in principle, both prospective and retrospective risk determination can be assessed on an individual basis. A major goal of biophysical modelling is to relate physical events such as ionization, excitation, etc. to the production of radiation carcinogenesis. A description of the physical events is provided by track structure. The track structure is determined by radiation quality, and it can be considered to be the ''physical signature'' of the radiation. Unfortunately, the uniqueness characteristics of this signature are dissipated in biological systems in ∼10 -9 s. Nonetheless, it is our contention that this physical disturbance of the biological system eventuates later, at ∼10 0 s, in molecular lesion spectra which also characterize the causal radiation. (author)

  1. Proxy and patient reports of health-related quality of life in a national cancer survey.

    Science.gov (United States)

    Roydhouse, Jessica K; Gutman, Roee; Keating, Nancy L; Mor, Vincent; Wilson, Ira B

    2018-01-05

    Proxy respondents are frequently used in surveys, including those assessing health-related quality of life (HRQOL). In cancer, most research involving proxies has been undertaken with paired proxy-patient populations, where proxy responses are compared to patient responses for the same individual. In these populations, proxy-patient differences are small and suggest proxy underestimation of patient HRQOL. In practice, however, proxy responses will only be used when patient responses are not available. The difference between proxy and patient reports of patient HRQOL where patients are not able to report for themselves in cancer is not known. The objective of this study was to evaluate the difference between patient and proxy reports of patient HRQOL in a large national cancer survey, and determine if this difference could be mitigated by adjusting for clinical and sociodemographic information about patients. Data were from the Cancer Care Outcomes Research and Surveillance (CanCORS) study. Patients or their proxies were recruited within 3-6 months of diagnosis with lung or colorectal cancer. HRQOL was measured using the SF-12 mental and physical composite scales. Differences of ½ SD (=5 points) were considered clinically significant. The primary independent variable was proxy status. Linear regression models were used to adjust for patient sociodemographic and clinical covariates, including cancer stage, patient age and education, and patient co-morbidities. Of 6471 respondents, 1011 (16%) were proxies. Before adjustment, average proxy-reported scores were lower for both physical (-6.7 points, 95% CI -7.4 to -5.9) and mental (-6 points, 95% CI -6.7 to -5.2) health. Proxy-reported scores remained lower after adjustment (physical: -5.8 points, -6.6 to -5; mental: -5.8 points, -6.6 to 5). Proxy-patient score differences remained clinically and statistically significant, even after adjustment for sociodemographic and clinical variables. Proxy-reported outcome scores

  2. A Secure and Privacy-Preserving Navigation Scheme Using Spatial Crowdsourcing in Fog-Based VANETs

    Science.gov (United States)

    Wang, Lingling; Liu, Guozhu; Sun, Lijun

    2017-01-01

    Fog-based VANETs (Vehicular ad hoc networks) is a new paradigm of vehicular ad hoc networks with the advantages of both vehicular cloud and fog computing. Real-time navigation schemes based on fog-based VANETs can promote the scheme performance efficiently. In this paper, we propose a secure and privacy-preserving navigation scheme by using vehicular spatial crowdsourcing based on fog-based VANETs. Fog nodes are used to generate and release the crowdsourcing tasks, and cooperatively find the optimal route according to the real-time traffic information collected by vehicles in their coverage areas. Meanwhile, the vehicle performing the crowdsourcing task can get a reasonable reward. The querying vehicle can retrieve the navigation results from each fog node successively when entering its coverage area, and follow the optimal route to the next fog node until it reaches the desired destination. Our scheme fulfills the security and privacy requirements of authentication, confidentiality and conditional privacy preservation. Some cryptographic primitives, including the Elgamal encryption algorithm, AES, randomized anonymous credentials and group signatures, are adopted to achieve this goal. Finally, we analyze the security and the efficiency of the proposed scheme. PMID:28338620

  3. A Secure and Privacy-Preserving Navigation Scheme Using Spatial Crowdsourcing in Fog-Based VANETs.

    Science.gov (United States)

    Wang, Lingling; Liu, Guozhu; Sun, Lijun

    2017-03-24

    Fog-based VANETs (Vehicular ad hoc networks) is a new paradigm of vehicular ad hoc networks with the advantages of both vehicular cloud and fog computing. Real-time navigation schemes based on fog-based VANETs can promote the scheme performance efficiently. In this paper, we propose a secure and privacy-preserving navigation scheme by using vehicular spatial crowdsourcing based on fog-based VANETs. Fog nodes are used to generate and release the crowdsourcing tasks, and cooperatively find the optimal route according to the real-time traffic information collected by vehicles in their coverage areas. Meanwhile, the vehicle performing the crowdsourcing task can get a reasonable reward. The querying vehicle can retrieve the navigation results from each fog node successively when entering its coverage area, and follow the optimal route to the next fog node until it reaches the desired destination. Our scheme fulfills the security and privacy requirements of authentication, confidentiality and conditional privacy preservation. Some cryptographic primitives, including the Elgamal encryption algorithm, AES, randomized anonymous credentials and group signatures, are adopted to achieve this goal. Finally, we analyze the security and the efficiency of the proposed scheme.

  4. 47 CFR 51.513 - Proxies for forward-looking economic cost.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Proxies for forward-looking economic cost. 51... SERVICES (CONTINUED) INTERCONNECTION Pricing of Elements § 51.513 Proxies for forward-looking economic cost... a cost study that complies with the forward-looking economic cost based pricing methodology...

  5. Error characterization for asynchronous computations: Proxy equation approach

    Science.gov (United States)

    Sallai, Gabriella; Mittal, Ankita; Girimaji, Sharath

    2017-11-01

    Numerical techniques for asynchronous fluid flow simulations are currently under development to enable efficient utilization of massively parallel computers. These numerical approaches attempt to accurately solve time evolution of transport equations using spatial information at different time levels. The truncation error of asynchronous methods can be divided into two parts: delay dependent (EA) or asynchronous error and delay independent (ES) or synchronous error. The focus of this study is a specific asynchronous error mitigation technique called proxy-equation approach. The aim of this study is to examine these errors as a function of the characteristic wavelength of the solution. Mitigation of asynchronous effects requires that the asynchronous error be smaller than synchronous truncation error. For a simple convection-diffusion equation, proxy-equation error analysis identifies critical initial wave-number, λc. At smaller wave numbers, synchronous error are larger than asynchronous errors. We examine various approaches to increase the value of λc in order to improve the range of applicability of proxy-equation approach.

  6. Satellite Altimeters and Gravimeters as Proxy of the Indonesian Throughflow

    Science.gov (United States)

    Susanto, R. D.; Song, Y. T.

    2014-12-01

    The Indonesian Throughflow (ITF), the only pathway for interocean exchange between the Pacific to the Indian Ocean, plays an important role in global ocean circulation and climate. Yet, continuous ITF measurement is difficult and expensive. We demonstrate a plausible approach to derive the ITF transport proxy using satellite altimetry sea surface height (SSH), gravimetry ocean bottom pressure (OBP) data, in situ measurements from the Makassar Strait from 1996-1998 and 2004-2009, and a theoretical formulation. We first identified the optimal locations in the Pacific and Indian Ocean based on the optimal correlation between the ITF transport through the Makassar Strait and the pressure gradients, represented by the SSH and OBP differences between the Pacific and Indian Oceans at a 1° x 1° horizontal resolution. These geographical locations (centred at off-equatorial in the western Pacific Ocean and centred at along the equator in the eastern Indian Ocean) that control the strength and variability of the ITF transport in the Makassar Strait differ from early studies. The proxy time series follow the observation time series quite well, resolving the intraseasonal, monsoonal, and interannual signals with the 1993-2011 annual mean proxy transport of 11.6 ± 3.2 Sv. Our formulation provides a continuous approach to derive the ITF proxy as long as the satellite data are available. Such a continuous record would be difficult to achieve by in situ measurements alone due to logistical and financial challenges. Ideally, the proxy can be used to complement or fill in the gaps of the observations for a continuous ITF proxy for better understanding the ocean climate and validating ocean circulation models.

  7. Proxy-Produced Ethnographic Work: What Are the Problems, Issues, and Dilemmas Arising from Proxy-Ethnography?

    Science.gov (United States)

    Martinussen, Marie; Højbjerg, Karin; Tamborg, Andreas Lindenskov

    2018-01-01

    This article addresses the implications of researcher-student cooperation in the production of empirical material. For the student to replace the experienced researcher and work under the researcher's supervision, we call such work proxy-produced ethnographic work. Although there are clear advantages, the specific relations and positions arising…

  8. Pyrite as a proxy for the identification of former coastal lagoons in semiarid NE Brazil

    Science.gov (United States)

    Ferreira, Tiago O.; Nóbrega, Gabriel N.; Albuquerque, Antonia G. B. M.; Sartor, Lucas R.; Gomes, Irlene S.; Artur, Adriana G.; Otero, Xosé L.

    2015-10-01

    This work aimed to test the suitability of pyrite (FeS2) as a proxy for reconstructing past marine environmental conditions along the semiarid coast of Brazil. Morphological description combined with physicochemical analyses including Fe partitioning were conducted for soil depth profiles (30 and 60 cm depths) at three sites in two contrasting lagoons of the state of Ceará: a suspected former lagoon that would have been transformed into a freshwater "lake" at a site vegetated by Juncus effusus (site P1), and another lagoon with connection to the sea at sites vegetated by J. effusus (site P2) or Portulaca oleracea (site P3). Soil samples were collected in September 2010. Site P3 had more reducing conditions, reaching Eh values of -132 mV in the surface layer (0-10 cm), whereas minimum values for the P1 and P2 sites were +219 and +85 mV, respectively. Lower pyritic Fe values were found at site P1, with a degree of pyritization (DOP) ranging from 10 to 13%. At sites P2 and P3, DOP ranged from 9 to 67% and from 55 to 72%, respectively. These results are consistent with an interruption of tidal channels by eolian dune migration inducing strong changes in the hydrodynamics and physicochemical characteristics (lower salinity, oxidizing conditions) of these sites, causing the dieback of suspected former mangroves and a succession to freshwater marshes with an intermediate salt marsh stage. Together with other physicochemical signatures, pyrite can evidently serve as a useful proxy in tracking environmental changes in such ecotones, with implications for coastal management.

  9. Electronic Signature Policy

    Science.gov (United States)

    Establishes the United States Environmental Protection Agency's approach to adopting electronic signature technology and best practices to ensure electronic signatures applied to official Agency documents are legally valid and enforceable

  10. Foraminifera Models to Interrogate Ostensible Proxy-Model Discrepancies During Late Pliocene

    Science.gov (United States)

    Jacobs, P.; Dowsett, H. J.; de Mutsert, K.

    2017-12-01

    Planktic foraminifera faunal assemblages have been used in the reconstruction of past oceanic states (e.g. the Last Glacial Maximum, the mid-Piacenzian Warm Period). However these reconstruction efforts have typically relied on inverse modeling using transfer functions or the modern analog technique, which by design seek to translate foraminifera into one or two target oceanic variables, primarily sea surface temperature (SST). These reconstructed SST data have then been used to test the performance of climate models, and discrepancies have been attributed to shortcomings in climate model processes and/or boundary conditions. More recently forward proxy models or proxy system models have been used to leverage the multivariate nature of proxy relationships to their environment, and to "bring models into proxy space". Here we construct ecological models of key planktic foraminifera taxa, calibrated and validated with World Ocean Atlas (WO13) oceanographic data. Multiple modeling methods (e.g. multilayer perceptron neural networks, Mahalanobis distance, logistic regression, and maximum entropy) are investigated to ensure robust results. The resulting models are then driven by a Late Pliocene climate model simulation with biogeochemical as well as temperature variables. Similarities and differences with previous model-proxy comparisons (e.g. PlioMIP) are discussed.

  11. Blinding for unanticipated signatures

    NARCIS (Netherlands)

    D. Chaum (David)

    1987-01-01

    textabstractPreviously known blind signature systems require an amount of computation at least proportional to the number of signature types, and also that the number of such types be fixed in advance. These requirements are not practical in some applications. Here, a new blind signature technique

  12. An Improved Overloading Scheme for Downlink CDMA

    Directory of Open Access Journals (Sweden)

    Marc Moeneclaey

    2005-04-01

    Full Text Available An improved overloading scheme is presented for single-user detection in the downlink of multiple-access systems based on OCDMA/OCDMA (O/O. By displacing in time the orthogonal signatures of the two user sets that make up the overloaded system, the cross-correlation between the users of the two sets is reduced. For random O/O with square-root cosine rolloff chip pulses, the multiuser interference can be decreased by up to 50% (depending on the chip pulse bandwidth as compared to quasiorthogonal sequences (QOS that are presently part of the downlink standard of Cdma2000. This reduction of the multiuser interference gives rise to an increase of the achievable signal-to-interference-plus-noise ratio for a particular channel load.

  13. 1 CFR 18.7 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 1 General Provisions 1 2010-01-01 2010-01-01 false Signature. 18.7 Section 18.7 General Provisions... PREPARATION AND TRANSMITTAL OF DOCUMENTS GENERALLY § 18.7 Signature. The original and each duplicate original... stamped beneath the signature. Initialed or impressed signatures will not be accepted. Documents submitted...

  14. Attribute-Based Digital Signature System

    NARCIS (Netherlands)

    Ibraimi, L.; Asim, Muhammad; Petkovic, M.

    2011-01-01

    An attribute-based digital signature system comprises a signature generation unit (1) for signing a message (m) by generating a signature (s) based on a user secret key (SK) associated with a set of user attributes, wherein the signature generation unit (1) is arranged for combining the user secret

  15. Design And Implementation of Low Area/Power Elliptic Curve Digital Signature Hardware Core

    Directory of Open Access Journals (Sweden)

    Anissa Sghaier

    2017-06-01

    Full Text Available The Elliptic Curve Digital Signature Algorithm(ECDSA is the analog to the Digital Signature Algorithm(DSA. Based on the elliptic curve, which uses a small key compared to the others public-key algorithms, ECDSA is the most suitable scheme for environments where processor power and storage are limited. This paper focuses on the hardware implementation of the ECDSA over elliptic curveswith the 163-bit key length recommended by the NIST (National Institute of Standards and Technology. It offers two services: signature generation and signature verification. The proposed processor integrates an ECC IP, a Secure Hash Standard 2 IP (SHA-2 Ip and Random Number Generator IP (RNG IP. Thus, all IPs will be optimized, and different types of RNG will be implemented in order to choose the most appropriate one. A co-simulation was done to verify the ECDSA processor using MATLAB Software. All modules were implemented on a Xilinx Virtex 5 ML 50 FPGA platform; they require respectively 9670 slices, 2530 slices and 18,504 slices. FPGA implementations represent generally the first step for obtaining faster ASIC implementations. Further, the proposed design was also implemented on an ASIC CMOS 45-nm technology; it requires a 0.257 mm2 area cell achieving a maximum frequency of 532 MHz and consumes 63.444 (mW. Furthermore, in this paper, we analyze the security of our proposed ECDSA processor against the no correctness check for input points and restart attacks.

  16. Additive operator-difference schemes splitting schemes

    CERN Document Server

    Vabishchevich, Petr N

    2013-01-01

    Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy

  17. Proxy indicators as measure of local economic dispositions in South ...

    African Journals Online (AJOL)

    in international markets. The proxy is a coincidental and pro-cyclic indicator, with a correlation of 0.86. Key similarities exist between the economy and the profitability of hardware stores, although the proxy is not as accurate as the volume of sales in hardware stores. The correlation is measured at 0.85. The profitability of the ...

  18. Proxy-Reports in the Ascertainment of Disability Prevalence with American Community Survey Data.

    Science.gov (United States)

    Siordia, C

    2014-01-01

    Population estimates on disability prevalence inform policy makers and public health professionals. Understanding how factors capable of affecting measurement (e.g., proxy-report) vary in the population is important for establishing level of confidence in sample-derived population estimates. To establish how use of proxy-reports varies by six disability types stratified by sex, race-ethnicity, and age group. Specific aim is achieved by investigating the number of proxy-reports used amongst the disable population. Cross-sectional study using American Community Survey (ACS) Public Use Microdata Sample (PUMS) 3-year file collected during 2009-2011 survey period. Community-dwelling population in continental United States (US). The unweighted count of 6,003,183 individuals in the microdata are said to represent about 193,277,485 individuals in the continental US population. Stratified disability period estimates are computed. Amongst the disable: the number of proxy-reports; allocations; and Person Inflation Ratios (PRIs) are presented by disability type. Half of all the reported disabilities are derived through the use of proxy-report. In addition, high rates of item-allocation and PRIs are generally found in race-ethnic minorities. Proxy-report use and PRIs are lower for those aged > 65-but not allocation rates. Although use of proxy report in the ascertainment of disability varies in complex ways, data suggest prevalence of proxy reports is lowest amongst Non-Latino-Black females ages 21 to 64. Efforts toward providing clinicians with high quality descriptive epidemiology should continue as a reliable thermometer for measuring disability in the population is needed.

  19. Evaluating and Optimizing Online Advertising: Forget the Click, but There Are Good Proxies.

    Science.gov (United States)

    Dalessandro, Brian; Hook, Rod; Perlich, Claudia; Provost, Foster

    2015-06-01

    Online systems promise to improve advertisement targeting via the massive and detailed data available. However, there often is too few data on exactly the outcome of interest, such as purchases, for accurate campaign evaluation and optimization (due to low conversion rates, cold start periods, lack of instrumentation of offline purchases, and long purchase cycles). This paper presents a detailed treatment of proxy modeling, which is based on the identification of a suitable alternative (proxy) target variable when data on the true objective is in short supply (or even completely nonexistent). The paper has a two-fold contribution. First, the potential of proxy modeling is demonstrated clearly, based on a massive-scale experiment across 58 real online advertising campaigns. Second, we assess the value of different specific proxies for evaluating and optimizing online display advertising, showing striking results. The results include bad news and good news. The most commonly cited and used proxy is a click on an ad. The bad news is that across a large number of campaigns, clicks are not good proxies for evaluation or for optimization: clickers do not resemble buyers. The good news is that an alternative sort of proxy performs remarkably well: observed visits to the brand's website. Specifically, predictive models built based on brand site visits-which are much more common than purchases-do a remarkably good job of predicting which browsers will make a purchase. The practical bottom line: evaluating and optimizing campaigns using clicks seems wrongheaded; however, there is an easy and attractive alternative-use a well-chosen site-visit proxy instead.

  20. Five Guidelines for Selecting Hydrological Signatures

    Science.gov (United States)

    McMillan, H. K.; Westerberg, I.; Branger, F.

    2017-12-01

    Hydrological signatures are index values derived from observed or modeled series of hydrological data such as rainfall, flow or soil moisture. They are designed to extract relevant information about hydrological behavior, such as to identify dominant processes, and to determine the strength, speed and spatiotemporal variability of the rainfall-runoff response. Hydrological signatures play an important role in model evaluation. They allow us to test whether particular model structures or parameter sets accurately reproduce the runoff generation processes within the watershed of interest. Most modeling studies use a selection of different signatures to capture different aspects of the catchment response, for example evaluating overall flow distribution as well as high and low flow extremes and flow timing. Such studies often choose their own set of signatures, or may borrow subsets of signatures used in multiple other works. The link between signature values and hydrological processes is not always straightforward, leading to uncertainty and variability in hydrologists' signature choices. In this presentation, we aim to encourage a more rigorous approach to hydrological signature selection, which considers the ability of signatures to represent hydrological behavior and underlying processes for the catchment and application in question. To this end, we propose a set of guidelines for selecting hydrological signatures. We describe five criteria that any hydrological signature should conform to: Identifiability, Robustness, Consistency, Representativeness, and Discriminatory Power. We describe an example of the design process for a signature, assessing possible signature designs against the guidelines above. Due to their ubiquity, we chose a signature related to the Flow Duration Curve, selecting the FDC mid-section slope as a proposed signature to quantify catchment overall behavior and flashiness. We demonstrate how assessment against each guideline could be used to

  1. Sincronización de estadísticas entre servidores y proxies

    OpenAIRE

    Catullo, María José

    1999-01-01

    Un caching proxy server colecciona todas las páginas que pasan a través de él, así cuando un usuario pregunta por una página, el proxy server, si la tiene, la retoma de su cache, sin necesidad de acceder al servidor real. De ésta manera se ahorra ancho de banda y se agilizan las respuestas. Cada requerimiento que arriba a un proxy ó a un servidor, se almacena en archivos de logs. Existen varios tipos de archivos de logs, que se utilizan para auditoría del rendimiento, monitoreo, control de...

  2. Generation of flat wideband chaos with suppressed time delay signature by using optical time lens.

    Science.gov (United States)

    Jiang, Ning; Wang, Chao; Xue, Chenpeng; Li, Guilan; Lin, Shuqing; Qiu, Kun

    2017-06-26

    We propose a flat wideband chaos generation scheme that shows excellent time delay signature suppression effect, by injecting the chaotic output of general external cavity semiconductor laser into an optical time lens module composed of a phase modulator and two dispersive units. The numerical results demonstrate that by properly setting the parameters of the driving signal of phase modulator and the accumulated dispersion of dispersive units, the relaxation oscillation in chaos can be eliminated, wideband chaos generation with an efficient bandwidth up to several tens of GHz can be achieved, and the RF spectrum of generated chaotic signal is nearly as flat as uniform distribution. Moreover, the periodicity of chaos induced by the external cavity modes can be simultaneously destructed by the optical time lens module, based on this the time delay signature can be completely suppressed.

  3. Incipient-signature identification of mechanical anomalies in a ship-borne satellite antenna system using an ensemble multiwavelet

    International Nuclear Information System (INIS)

    He, Shuilong; Zi, Yanyang; Chen, Jinglong; Chen, Binqiang; He, Zhengjia; Zhao, Chenlu; Yuan, Jing

    2014-01-01

    The instrumented tracking and telemetry ship with a ship-borne satellite antenna (SSA) is the critical device to ensure high quality of space exploration work. To effectively detect mechanical anomalies that can lead to unexpected downtime of the SSA, an ensemble multiwavelet (EM) is presented for identifying the anomaly related incipient-signatures within the measured dynamic signals. Rather than using a predetermined basis as in a conventional multiwavelet, an EM optimizes the matching basis which satisfactorily adapts to the anomaly related incipient-signatures. The construction technique of an EM is based on the conjunction of a two-scale similarity transform (TST) and lifting scheme (LS). For the technique above, the TST improves the regularity by increasing the approximation order of multiscaling functions, while subsequently the LS enhances the smoothness and localizability via utilizing the vanishing moment of multiwavelet functions. Moreover, combining the Hilbert transform with EM decomposition, we identify the incipient-signatures induced by the mechanical anomalies from the measured dynamic signals. A numerical simulation and two successful applications of diagnosis cases (a planetary gearbox and a roller bearing) demonstrate that the proposed technique is capable of dealing with the challenging incipient-signature identification task even though spectral complexity, as well as the strong amplitude/frequency modulation effect, is present in the dynamic signals. (paper)

  4. Uncertainty in hydrological signatures

    Science.gov (United States)

    McMillan, Hilary; Westerberg, Ida

    2015-04-01

    Information that summarises the hydrological behaviour or flow regime of a catchment is essential for comparing responses of different catchments to understand catchment organisation and similarity, and for many other modelling and water-management applications. Such information types derived as an index value from observed data are known as hydrological signatures, and can include descriptors of high flows (e.g. mean annual flood), low flows (e.g. mean annual low flow, recession shape), the flow variability, flow duration curve, and runoff ratio. Because the hydrological signatures are calculated from observed data such as rainfall and flow records, they are affected by uncertainty in those data. Subjective choices in the method used to calculate the signatures create a further source of uncertainty. Uncertainties in the signatures may affect our ability to compare different locations, to detect changes, or to compare future water resource management scenarios. The aim of this study was to contribute to the hydrological community's awareness and knowledge of data uncertainty in hydrological signatures, including typical sources, magnitude and methods for its assessment. We proposed a generally applicable method to calculate these uncertainties based on Monte Carlo sampling and demonstrated it for a variety of commonly used signatures. The study was made for two data rich catchments, the 50 km2 Mahurangi catchment in New Zealand and the 135 km2 Brue catchment in the UK. For rainfall data the uncertainty sources included point measurement uncertainty, the number of gauges used in calculation of the catchment spatial average, and uncertainties relating to lack of quality control. For flow data the uncertainty sources included uncertainties in stage/discharge measurement and in the approximation of the true stage-discharge relation by a rating curve. The resulting uncertainties were compared across the different signatures and catchments, to quantify uncertainty

  5. Legal requirements governing proxy voting in Denmark

    DEFF Research Database (Denmark)

    Werlauff, Erik

    2008-01-01

    The requirements in Danish company law concerning proxy voting in companies whose shares have been accepted for listing on a regulated market have been successively tightened in recent years, and corporate governance principles have also led to the introduction of several requirements concerning...... proxy holders. A thorough knowledge of these requirements is important not only for the listed companies but also for their advisers and investors in Denmark and abroad. This article considers these requirements as well as the additional requirements which will derive from Directive 2007....../36 on the exercise of shareholders' rights in listed companies, which must be implemented by 3 August 2009. It is pointed out that companies may provide with advantage in their articles of association for both the existing and the forthcoming requirements at this early stage....

  6. Assessment of WRF microphysics schemes to simulate extreme precipitation events from the perspective of GMI radiative signatures

    Science.gov (United States)

    Choi, Y.; Shin, D. B.; Joh, M.

    2015-12-01

    Numerical simulations of precipitation depend to a large degree on the assumed cloud microphysics schemes representing the formation, growth and fallout of cloud droplets and ice crystals. Recent studies show that assumed cloud microphysics play a major role not only in forecasting precipitation, especially in cases of extreme precipitation events, but also in the quality of the passive microwave rainfall estimation. Evaluations of the various Weather Research Forecasting (WRF) model microphysics schemes in this study are based on a method that was originally developed to construct the a-priori databases of precipitation profiles and associated brightness temperatures (TBs) for precipitation retrievals. This methodology generates three-dimensional (3D) precipitation fields by matching the GPM dual frequency radar (DPR) reflectivity profiles with those calculated from cloud resolving model (CRM)-derived hydrometeor profiles. The method eventually provides 3D simulated precipitation fields over the DPR scan swaths. That is, atmospheric and hydrometeor profiles can be generated at each DPR pixel based on CRM and DPR reflectivity profiles. The generated raining systems over DPR observation fields can be applied to any radiometers that are unaccompanied with a radar for microwave radiative calculation with consideration of each sensor's channel and field of view. Assessment of the WRF model microphysics schemes for several typhoon cases in terms of emission and scattering signals of GMI will be discussed.

  7. PREVENTIVE SIGNATURE MODEL FOR SECURE CLOUD DEPLOYMENT THROUGH FUZZY DATA ARRAY COMPUTATION

    Directory of Open Access Journals (Sweden)

    R. Poorvadevi

    2017-01-01

    Full Text Available Cloud computing is a resource pool which offers boundless services by the form of resources to its end users whoever heavily depends on cloud service providers. Cloud is providing the service access across the geographic locations in an efficient way. However it is offering numerous services, client end system is not having adequate methods, security policies and other protocols for using the cloud customer secret level transactions and other privacy related information. So, this proposed model brings the solution for securing the cloud user confidential data, Application deployment and also identifying the genuineness of the user by applying the scheme which is referred as fuzzy data array computation. Fuzzy data array computation provides an effective system is called signature retrieval and evaluation system through which customer’s data can be safeguarded along with their application. This signature system can be implemented on the cloud environment using the cloud sim 3.0 simulator tools. It facilitates the security operation over the data centre and cloud vendor locations in an effective manner.

  8. 76 FR 30542 - Adult Signature Services

    Science.gov (United States)

    2011-05-26

    ... POSTAL SERVICE 39 CFR Part 111 Adult Signature Services AGENCY: Postal Service\\TM\\. ACTION: Final..., Domestic Mail Manual (DMM[supreg]) 503.8, to add a new extra service called Adult Signature. This new service has two available options: Adult Signature Required and Adult Signature Restricted Delivery. DATES...

  9. Middleware Proxy: A Request-Driven Messaging Broker For High Volume Data Distribution

    CERN Document Server

    Sliwinski, W; Dworak, A

    2014-01-01

    Nowadays, all major infrastructures and data centres (commercial and scientific) make an extensive use of the publish-subscribe messaging paradigm, which helps to decouple the message sender (publisher) from the message receiver (consumer). This paradigm is also heavily used in the CERN Accelerator Control system, in Proxy broker - critical part of the Controls Middleware (CMW) project. Proxy provides the aforementioned publish-subscribe facility and also supports execution of synchronous read and write operations. Moreover, it enables service scalability and dramatically reduces the network resources and overhead (CPU and memory) on publisher machine, required to serve all subscriptions. Proxy was developed in modern C++, using state of the art programming techniques (e.g. Boost) and following recommended software patterns for achieving low-latency and high concurrency. The outstanding performance of the Proxy infrastructure was confirmed during the last 3 years by delivering the high volume of LHC equipment...

  10. Photospheric activity of the Sun with VIRGO and GOLF. Comparison with standard activity proxies

    Science.gov (United States)

    Salabert, D.; García, R. A.; Jiménez, A.; Bertello, L.; Corsaro, E.; Pallé, P. L.

    2017-12-01

    We study the variability of solar activity using new photospheric proxies originally developed for the analysis of stellar magnetism with the CoRoT and Kepler photometric observations. These proxies were obtained by tracking the temporal modulations in the observations associated with the spots and magnetic features as the Sun rotates. We analyzed 21 yr of observations, spanning solar cycles 23 and 24, collected by the space-based photometric VIRGO and radial velocity GOLF instruments on board the SoHO satellite. We then calculated the photospheric activity proxy Sph is for each of the three VIRGO photometers and the associated Svel proxy from the radial velocity GOLF observations. Comparisons with several standard solar activity proxies sensitive to different layers of the Sun demonstrate that these new activity proxies, Sph and Svel, provide a new manner to monitor solar activity. We show that both the long- and short-term magnetic variabilities respectively associated with the 11-yr cycle and the quasi-biennial oscillation are well monitored, and that the magnetic field interaction between the subsurface, photosphere, and chromosphere of the Sun was modified between Cycle 24 and Cycle 23. Furthermore, the photometric proxies show a wavelength dependence of the response function of the solar photosphere among the three channels of the VIRGO photometers, providing inputs for the study of the stellar magnetism of Sun-like stars.

  11. Mixtures of Gaussians for uncertainty description in bivariate latent heat flux proxies

    NARCIS (Netherlands)

    Wójcik, R.; Troch, P.A.A.; Stricker, J.N.M.; Torfs, P.J.J.F.

    2006-01-01

    This paper proposes a new probabilistic approach for describing uncertainty in the ensembles of latent heat flux proxies. The proxies are obtained from hourly Bowen ratio and satellite-derived measurements, respectively, at several locations in the southern Great Plains region in the United States.

  12. Mobile Multicast in Hierarchical Proxy Mobile IPV6

    Science.gov (United States)

    Hafizah Mohd Aman, Azana; Hashim, Aisha Hassan A.; Mustafa, Amin; Abdullah, Khaizuran

    2013-12-01

    Mobile Internet Protocol Version 6 (MIPv6) environments have been developing very rapidly. Many challenges arise with the fast progress of MIPv6 technologies and its environment. Therefore the importance of improving the existing architecture and operations increases. One of the many challenges which need to be addressed is the need for performance improvement to support mobile multicast. Numerous approaches have been proposed to improve mobile multicast performance. This includes Context Transfer Protocol (CXTP), Hierarchical Mobile IPv6 (HMIPv6), Fast Mobile IPv6 (FMIPv6) and Proxy Mobile IPv6 (PMIPv6). This document describes multicast context transfer in hierarchical proxy mobile IPv6 (H-PMIPv6) to provide better multicasting performance in PMIPv6 domain.

  13. A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents

    Science.gov (United States)

    Kabir, Muhammad N.; Alginahi, Yasser M.

    2014-01-01

    This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. Such issues were largely addressed in the literature for images, audio, and video, with only a few papers addressing the challenge of sensitive plain-text media under known constraints. Specifically, with text as the predominant online communication medium, it becomes crucial that techniques are deployed to protect such information. A number of digital-signature, hashing, and watermarking schemes have been proposed that essentially bind source data or embed invisible data in a cover media to achieve its goal. While many such complex schemes with resource redundancies are sufficient in offline and less-sensitive texts, this paper proposes a hybrid approach based on zero-watermarking and digital-signature-like manipulations for sensitive text documents in order to achieve content originality and integrity verification without physically modifying the cover text in anyway. The proposed algorithm was implemented and shown to be robust against undetected content modifications and is capable of confirming proof of originality whilst detecting and locating deliberate/nondeliberate tampering. Additionally, enhancements in resource utilisation and reduced redundancies were achieved in comparison to traditional encryption-based approaches. Finally, analysis and remarks are made about the current state of the art, and future research issues are discussed under the given constraints. PMID:25254247

  14. A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents

    Directory of Open Access Journals (Sweden)

    Omar Tayan

    2014-01-01

    Full Text Available This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. Such issues were largely addressed in the literature for images, audio, and video, with only a few papers addressing the challenge of sensitive plain-text media under known constraints. Specifically, with text as the predominant online communication medium, it becomes crucial that techniques are deployed to protect such information. A number of digital-signature, hashing, and watermarking schemes have been proposed that essentially bind source data or embed invisible data in a cover media to achieve its goal. While many such complex schemes with resource redundancies are sufficient in offline and less-sensitive texts, this paper proposes a hybrid approach based on zero-watermarking and digital-signature-like manipulations for sensitive text documents in order to achieve content originality and integrity verification without physically modifying the cover text in anyway. The proposed algorithm was implemented and shown to be robust against undetected content modifications and is capable of confirming proof of originality whilst detecting and locating deliberate/nondeliberate tampering. Additionally, enhancements in resource utilisation and reduced redundancies were achieved in comparison to traditional encryption-based approaches. Finally, analysis and remarks are made about the current state of the art, and future research issues are discussed under the given constraints.

  15. Lesson 6: Signature Validation

    Science.gov (United States)

    Checklist items 13 through 17 are grouped under the Signature Validation Process, and represent CROMERR requirements that the system must satisfy as part of ensuring that electronic signatures it receives are valid.

  16. 21 CFR 11.50 - Signature manifestations.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Signature manifestations. 11.50 Section 11.50 Food... RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.50 Signature manifestations. (a) Signed electronic...: (1) The printed name of the signer; (2) The date and time when the signature was executed; and (3...

  17. Human rights of children with intellectual disabilities: comparing self-ratings and proxy ratings.

    Science.gov (United States)

    Huus, K; Granlund, M; Bornman, J; Lygnegård, F

    2015-11-01

    A child rights-based approach to research articulates well with Article 12 of the United Nations Convention on the Rights of the Child (CRC) and highlights the importance and value of including children's own views about aspects that concern them. The aim of this study is to compare children with intellectual disability's own ratings (as self-raters) to those of their primary caregivers (as proxy raters) regarding human rights of children. The study also aims to establish whether there is an inter-rater agreement between the self-raters and proxy raters concerning Maslow's hierarchy of needs. This study is nested in a larger study examining the human rights of children with intellectual disability in South Africa. In total, 162 children with intellectual disability from 11 schools across three provinces and their primary caregivers participated by answering parts of a Children's Rights Questionnaire (CRQ) developed by the researchers based on the United Nation's CRC. We compared the answers for six questions in the questionnaire that were addressed to self-raters (children) and proxy raters (primary caregivers) in the same way. Questions regarding basic needs, such as access to clean water or whether the child had food to eat at home, were answered similarly by self-raters and proxy raters. Larger differences were found when self-raters and proxy raters were asked about whether the child had things or friends to play with at home. Socio-economic variables seemed to affect whether self-raters and proxy raters answered similarly. The results underscore the importance of promoting children's rights to express themselves by considering the opinions of both the children as self-raters and their primary caregivers as proxy raters - not only the latter. The results indicate that it is especially important to include children's own voices when more complex needs are surveyed. Agreement between self- and proxy ratings could be affected by socio-economic circumstances.

  18. The relationship between proxy reported health-related quality of life and parental distress: gender differences.

    Science.gov (United States)

    Davis, E; Davies, B; Waters, E; Priest, N

    2008-11-01

    Although primary caregiver proxy reports of health-related quality of life (HRQOL) are often used for healthcare decision making when child self-reports are unable to be collected (because of a variety of reasons such as child illness, disability or age), we have little understanding of the correlates of parent-proxy reports. The aim of this study was to examine the relationship between parental depression and parent-proxy reported QOL for primary caregivers (mothers and fathers), using a multidimensional HRQOL instrument. It was hypothesized that maternal depression would be negatively correlated with maternal reported HRQOL, but that paternal depression would not be correlated with paternal reported HRQOL. Data were from parents of children aged 4-5 years (n = 4983) involved in the Longitudinal Study of Australian Children. A questionnaire assessing parental depression (Kessler-6) and proxy reported HRQOL (Pediatric Quality of Life Inventory) was completed by the primary caregiver. For maternal primary caregivers, maternal depression was negatively correlated with all domains of maternal proxy reports of HRQOL (r = -0.24 to r = -0.36). For paternal primary caregivers, there was no relationship between paternal depression and paternal proxy reports of HRQOL. Multiple regression analyses demonstrated that maternal depression was a significant predictor of total HRQOL, accounting for 12% of the variance. For paternal mental health, depression did not predict parent-proxy reported total HRQOL. These results highlight the importance of assessing maternal mental health when measuring proxy reported QOL. Further research is needed in this area to examine the relationship between parental depression and proxy reported HRQOL (including both mothers and fathers, where possible), as well as child self-reported HRQOL.

  19. 21 CFR 11.70 - Signature/record linking.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Signature/record linking. 11.70 Section 11.70 Food... RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.70 Signature/record linking. Electronic signatures and handwritten signatures executed to electronic records shall be linked to their respective...

  20. Comparing children's GPS tracks with geospatial proxies for exposure to junk food.

    Science.gov (United States)

    Sadler, Richard C; Gilliland, Jason A

    2015-01-01

    Various geospatial techniques have been employed to estimate children's exposure to environmental cardiometabolic risk factors, including junk food. But many studies uncritically rely on exposure proxies which differ greatly from actual exposure. Misrepresentation of exposure by researchers could lead to poor decisions and ineffective policymaking. This study conducts a GIS-based analysis of GPS tracks--'activity spaces'--and 21 proxies for activity spaces (e.g. buffers, container approaches) for a sample of 526 children (ages 9-14) in London, Ontario, Canada. These measures are combined with a validated food environment database (including fast food and convenience stores) to create a series of junk food exposure estimates and quantify the errors resulting from use of different proxy methods. Results indicate that exposure proxies consistently underestimate exposure to junk foods by as much as 68%. This underestimation is important to policy development because children are exposed to more junk food than estimated using typical methods. Copyright © 2015 Elsevier Ltd. All rights reserved.

  1. On the Use of Human Mobility Proxies for Modeling Epidemics

    Science.gov (United States)

    Tizzoni, Michele; Bajardi, Paolo; Decuyper, Adeline; Kon Kam King, Guillaume; Schneider, Christian M.; Blondel, Vincent; Smoreda, Zbigniew; González, Marta C.; Colizza, Vittoria

    2014-01-01

    Human mobility is a key component of large-scale spatial-transmission models of infectious diseases. Correctly modeling and quantifying human mobility is critical for improving epidemic control, but may be hindered by data incompleteness or unavailability. Here we explore the opportunity of using proxies for individual mobility to describe commuting flows and predict the diffusion of an influenza-like-illness epidemic. We consider three European countries and the corresponding commuting networks at different resolution scales, obtained from (i) official census surveys, (ii) proxy mobility data extracted from mobile phone call records, and (iii) the radiation model calibrated with census data. Metapopulation models defined on these countries and integrating the different mobility layers are compared in terms of epidemic observables. We show that commuting networks from mobile phone data capture the empirical commuting patterns well, accounting for more than 87% of the total fluxes. The distributions of commuting fluxes per link from mobile phones and census sources are similar and highly correlated, however a systematic overestimation of commuting traffic in the mobile phone data is observed. This leads to epidemics that spread faster than on census commuting networks, once the mobile phone commuting network is considered in the epidemic model, however preserving to a high degree the order of infection of newly affected locations. Proxies' calibration affects the arrival times' agreement across different models, and the observed topological and traffic discrepancies among mobility sources alter the resulting epidemic invasion patterns. Results also suggest that proxies perform differently in approximating commuting patterns for disease spread at different resolution scales, with the radiation model showing higher accuracy than mobile phone data when the seed is central in the network, the opposite being observed for peripheral locations. Proxies should therefore be

  2. Expressiveness considerations of XML signatures

    DEFF Research Database (Denmark)

    Jensen, Meiko; Meyer, Christopher

    2011-01-01

    XML Signatures are used to protect XML-based Web Service communication against a broad range of attacks related to man-in-the-middle scenarios. However, due to the complexity of the Web Services specification landscape, the task of applying XML Signatures in a robust and reliable manner becomes...... more and more challenging. In this paper, we investigate this issue, describing how an attacker can still interfere with Web Services communication even in the presence of XML Signatures. Additionally, we discuss the interrelation of XML Signatures and XML Encryption, focussing on their security...

  3. 17 CFR 12.12 - Signature.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Signature. 12.12 Section 12.12... General Information and Preliminary Consideration of Pleadings § 12.12 Signature. (a) By whom. All... document on behalf of another person. (b) Effect. The signature on any document of any person acting either...

  4. High-speed high-security signatures

    NARCIS (Netherlands)

    Bernstein, D.J.; Duif, N.; Lange, T.; Schwabe, P.; Yang, B.Y.

    2011-01-01

    This paper shows that a $390 mass-market quad-core 2.4GHz Intel Westmere (Xeon E5620) CPU can create 108000 signatures per second and verify 71000 signatures per second on an elliptic curve at a 2128 security level. Public keys are 32 bytes, and signatures are 64 bytes. These performance figures

  5. Calcium isotopic composition of high-latitude proxy carrier Neogloboquadrina pachyderma (sin.

    Directory of Open Access Journals (Sweden)

    A. Eisenhauer

    2009-01-01

    Full Text Available The accurate reconstruction of sea surface temperature (SST history in climate-sensitive regions (e.g. tropical and polar oceans became a challenging task in palaeoceanographic research. Biogenic shell carbonate SST proxies successfully developed for tropical regions often fail in cool water environments. Their major regional shortcomings and the cryptic diversity now found within the major high latitude proxy carrier Neogloboquadrina pachyderma (sin. highlight an urgent need to explore complementary SST proxies for these cool-water regions. Here we incorporate the genetic component into a calibration study of a new SST proxy for the high latitudes. We found that the calcium isotopic composition (δ44/40Ca of calcite from genotyped net catches and core-top samples of the planktonic foraminifera Neogloboquadrina pachyderma (sin. is related to temperature and unaffected by genetic variations. The temperature sensitivity has been found to be 0.17 (±0.02‰ per 1°C, highlighting its potential for downcore applications in open marine cool-water environments. Our results further indicate that in extreme polar environments, below a critical threshold temperature of 2.0 (±0.5°C associated with salinities below 33.0 (±0.5‰, a prominent shift in biomineralization affects the δ44/40Ca of genotyped and core-top N. pachyderma (sin., becoming insensitive to temperature. These findings highlight the need of more systematic calibration studies on single planktonic foraminiferal species in order to unravel species-specific factors influencing the temperature sensitivity of Ca isotope fractionation and to validate the proxies' applicability.

  6. 78 FR 70987 - Proxy Advisory Firm Roundtable

    Science.gov (United States)

    2013-11-27

    ... Firm Roundtable AGENCY: Securities and Exchange Commission. ACTION: Notice of roundtable discussion... advisory firms. The panel will be asked to discuss topics including the current state of proxy advisory firm use by investment advisers and institutional investors and potential changes that have been...

  7. The effects of extrinsic motivation on signature authorship opinions in forensic signature blind trials.

    Science.gov (United States)

    Dewhurst, Tahnee N; Found, Bryan; Ballantyne, Kaye N; Rogers, Doug

    2014-03-01

    Expertise studies in forensic handwriting examination involve comparisons of Forensic Handwriting Examiners' (FHEs) opinions with lay-persons on blind tests. All published studies of this type have reported real and demonstrable skill differences between the specialist and lay groups. However, critics have proposed that any difference shown may be indicative of a lack of motivation on the part of lay participants, rather than a real difference in skill. It has been suggested that qualified FHEs would be inherently more motivated to succeed in blinded validation trials, as their professional reputations could be at risk, should they perform poorly on the task provided. Furthermore, critics suggest that lay-persons would be unlikely to be highly motivated to succeed, as they would have no fear of negative consequences should they perform badly. In an effort to investigate this concern, a blind signature trial was designed and administered to forty lay-persons. Participants were required to compare known (exemplar) signatures of an individual to questioned signatures and asked to express an opinion regarding whether the writer of the known signatures wrote each of the questioned signatures. The questioned signatures comprised a mixture of genuine, disguised and simulated signatures. The forty participants were divided into two separate groupings. Group 'A' were requested to complete the trial as directed and were advised that for each correct answer they would be financially rewarded, for each incorrect answer they would be financially penalized, and for each inconclusive opinion they would receive neither penalty nor reward. Group 'B' was requested to complete the trial as directed, with no mention of financial recompense or penalty. The results of this study do not support the proposition that motivation rather than skill difference is the source of the statistical difference in opinions between individuals' results in blinded signature proficiency trials. Crown

  8. Evaluation of the sea ice proxy IP against observational and diatom proxy data in the SW Labrador Sea

    DEFF Research Database (Denmark)

    Weckström, K.; Andersen, M.L.; Kuijpers, A.

    2013-01-01

    The recent rapid decline in Arctic sea ice cover has increased the need to improve the accuracy of the sea ice component in climate models and to provide detailed long-term sea ice concentration records, which are only available via proxy data. Recently, the highly branched isoprenoid IP25...

  9. Exotic signatures from supersymmetry

    International Nuclear Information System (INIS)

    Hall, L.J.

    1989-08-01

    Minor changes to the standard supersymmetric model, such as soft flavor violation and R parity violation, cause large changes in the signatures. The origin of these changes and the resulting signatures are discussed. 15 refs., 7 figs., 2 tabs

  10. Comparing Apples to Apples: Paleoclimate Model-Data comparison via Proxy System Modeling

    Science.gov (United States)

    Dee, Sylvia; Emile-Geay, Julien; Evans, Michael; Noone, David

    2014-05-01

    The wealth of paleodata spanning the last millennium (hereinafter LM) provides an invaluable testbed for CMIP5-class GCMs. However, comparing GCM output to paleodata is non-trivial. High-resolution paleoclimate proxies generally contain a multivariate and non-linear response to regional climate forcing. Disentangling the multivariate environmental influences on proxies like corals, speleothems, and trees can be complex due to spatiotemporal climate variability, non-stationarity, and threshold dependence. Given these and other complications, many paleodata-GCM comparisons take a leap of faith, relating climate fields (e.g. precipitation, temperature) to geochemical signals in proxy data (e.g. δ18O in coral aragonite or ice cores) (e.g. Braconnot et al., 2012). Isotope-enabled GCMs are a step in the right direction, with water isotopes providing a connector point between GCMs and paleodata. However, such studies are still rare, and isotope fields are not archived as part of LM PMIP3 simulations. More importantly, much of the complexity in how proxy systems record and transduce environmental signals remains unaccounted for. In this study we use proxy system models (PSMs, Evans et al., 2013) to bridge this conceptual gap. A PSM mathematically encodes the mechanistic understanding of the physical, geochemical and, sometimes biological influences on each proxy. To translate GCM output to proxy space, we have synthesized a comprehensive, consistently formatted package of published PSMs, including δ18O in corals, tree ring cellulose, speleothems, and ice cores. Each PSM is comprised of three sub-models: sensor, archive, and observation. For the first time, these different components are coupled together for four major proxy types, allowing uncertainties due to both dating and signal interpretation to be treated within a self-consistent framework. The output of this process is an ensemble of many (say N = 1,000) realizations of the proxy network, all equally plausible

  11. Is MGNREG Scheme complementary to fishing activities? A study on some selected states of India

    Directory of Open Access Journals (Sweden)

    Chiranjib Neogi

    2016-01-01

    Full Text Available Freshwater fish output is taken as a proxy variable for empirical assessment of indirect benefits in terms of enhanced quantity of freshwater fish (output cultivation. It is not unlikely to assess empirically the productivity of subsidized public scheme when rural development or rural asset generations are underlined in the said scheme, MGNREG Act, 2005. Rainwater harvesting is a major component part of the scheme since about 49.5 per cent of the total fund is already utilized on water conservation and obviously it has an impact on the cultivation of freshwater fish output. Time series data on annual expenditure on MGNREG and corresponding freshwater fish output at the state level are taken during the period 2006-07 to 2013-14 for 16 major Indian states. Fixed effect model and random effect models are being applied and the Hausman specification test suggests that fixed effect model is more appropriate than random effect model. Significant differences among the intercepts of the selected states are revealed as per F test. The results of fixed effect panel regression establish that fish output is enhanced by 0.000257 thousand tones or 0.26 tones if MGNREG expenditure rises by one crore or 10 million rupees.

  12. On reliable discovery of molecular signatures

    Directory of Open Access Journals (Sweden)

    Björkegren Johan

    2009-01-01

    Full Text Available Abstract Background Molecular signatures are sets of genes, proteins, genetic variants or other variables that can be used as markers for a particular phenotype. Reliable signature discovery methods could yield valuable insight into cell biology and mechanisms of human disease. However, it is currently not clear how to control error rates such as the false discovery rate (FDR in signature discovery. Moreover, signatures for cancer gene expression have been shown to be unstable, that is, difficult to replicate in independent studies, casting doubts on their reliability. Results We demonstrate that with modern prediction methods, signatures that yield accurate predictions may still have a high FDR. Further, we show that even signatures with low FDR may fail to replicate in independent studies due to limited statistical power. Thus, neither stability nor predictive accuracy are relevant when FDR control is the primary goal. We therefore develop a general statistical hypothesis testing framework that for the first time provides FDR control for signature discovery. Our method is demonstrated to be correct in simulation studies. When applied to five cancer data sets, the method was able to discover molecular signatures with 5% FDR in three cases, while two data sets yielded no significant findings. Conclusion Our approach enables reliable discovery of molecular signatures from genome-wide data with current sample sizes. The statistical framework developed herein is potentially applicable to a wide range of prediction problems in bioinformatics.

  13. Expert versus proxy rating of verbal communicative ability of people with aphasia after stroke.

    Science.gov (United States)

    de Jong-Hagelstein, Marjolein; Kros, Lieke; Lingsma, Hester F; Dippel, Diederik W J; Koudstaal, Peter J; Visch-Brink, Evy G

    2012-11-01

    In randomized clinical trials of aphasia treatment, a functional outcome measure like the Amsterdam-Nijmegen Everyday Language Test (ANELT), administered by speech-language therapists, is often used. However, the agreement between this expert rating and the judgment of the proxy about the quality of the daily life communication of the person with aphasia is largely unknown. We examined the association between ANELT scores by speech-language therapists and proxy judgments on the Partner Communication Questionnaire both at 3 and 6 months in 39 people with aphasia after stroke. We also determined which factors affected the level of agreement between expert and proxy judgment of the communicative ability at 6 months in 53 people with aphasia. We found moderate agreement (at 3 months r = .662; p = aphasia, measured with the Aphasia Severity Rating Scale, was associated with better agreement. In conclusion, although proxies were slightly more positive than experts, we found moderate agreement between expert and proxy rating of verbal communicative ability of people with aphasia after stroke, especially in milder cases.

  14. Evaluation of proxy-based millennial reconstruction methods

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Terry C.K.; Tsao, Min [University of Victoria, Department of Mathematics and Statistics, Victoria, BC (Canada); Zwiers, Francis W. [Environment Canada, Climate Research Division, Toronto, ON (Canada)

    2008-08-15

    A range of existing statistical approaches for reconstructing historical temperature variations from proxy data are compared using both climate model data and real-world paleoclimate proxy data. We also propose a new method for reconstruction that is based on a state-space time series model and Kalman filter algorithm. The state-space modelling approach and the recently developed RegEM method generally perform better than their competitors when reconstructing interannual variations in Northern Hemispheric mean surface air temperature. On the other hand, a variety of methods are seen to perform well when reconstructing surface air temperature variability on decadal time scales. An advantage of the new method is that it can incorporate additional, non-temperature, information into the reconstruction, such as the estimated response to external forcing, thereby permitting a simultaneous reconstruction and detection analysis as well as future projection. An application of these extensions is also demonstrated in the paper. (orig.)

  15. An ethical analysis of proxy and waiver of consent in critical care research

    DEFF Research Database (Denmark)

    Berg, Ronan M G; Møller, Kirsten; Rossel, Peter J. Hancke

    2013-01-01

    It is a central principle in medical ethics that vulnerable patients are entitled to a degree of protection that reflects their vulnerability. In critical care research, this protection is often established by means of so-called proxy consent. Proxy consent for research participation constitutes...

  16. Usable Authentication with an Offline Trusted Device Proxy Architecture (long version)

    OpenAIRE

    Johansen, Christian; Jøsang, Audun; Migdal, Denis

    2016-01-01

    Client platform infection poses a significant threat to secure user authentication. Com- bining vulnerable client platforms with special security devices, as often the case in e- banking, can increase significantly the security. This paper describes a new architecture where a security proxy on the client platform communicates with both a trusted security device and the server application. The proxy switches between two TLS channels, one from the client and another from the trusted device. The...

  17. Validating a proxy for disease progression in metastatic cancer patients using prescribing and dispensing data.

    Science.gov (United States)

    Joshi, Vikram; Adelstein, Barbara-Ann; Schaffer, Andrea; Srasuebkul, Preeyaporn; Dobbins, Timothy; Pearson, Sallie-Anne

    2017-10-01

    Routine data collections are used increasingly to examine outcomes of real-world cancer drug use. These datasets lack clinical details about important endpoints such as disease progression. To validate a proxy for disease progression in metastatic cancer patients using prescribing and dispensing claims. We used data from a cohort study of patients undergoing chemotherapy who provided informed consent to the collection of cancer-treatment data from medical records and linkage to pharmaceutical claims. We derived proxy decision rules based on changes to drug treatment in prescription histories (n = 36 patients) and validated the proxy in prescribing data (n = 62 patients). We adapted the decision rules and validated the proxy in dispensing data (n = 109). Our gold standard was disease progression ascertained in patient medical records. Individual progression episodes were the unit of analysis for sensitivity and Positive Predictive Value (PPV) calculations and specificity and Negative Predictive Value (NPV) were calculated at the patient level. The sensitivity of our proxy in prescribing data was 74.3% (95% Confidence Interval (CI), 55.6-86.6%) and PPV 61.2% (95% CI, 45.0-75.3%); specificity and NPV were 87.8% (95% CI, 73.8-95.9%) and 100% (95% CI, 90.3-100%), respectively. In dispensing data, the sensitivity of our proxy was 64% (95% CI, 55.0-77.0%) and PPV 56.0% (95% CI, 43.0-69.0%); specificity and NPV were 81% (95% CI, 70.05-89.0%) and 91.0% (95% CI, 82.0-97.0%), respectively. Our proxy overestimated episodes of disease progression. The proxy's performance is likely to improve if the date of prescribing is used instead of date of dispensing in claims data and by incorporating medical service claims (such as imaging prior to drug changes) in the algorithm. Our proxy is not sufficiently robust for use in real world comparative effectiveness research for cancer medicines. © 2016 John Wiley & Sons Australia, Ltd.

  18. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  19. Munchausen Syndrome by Proxy: A Family Affair.

    Science.gov (United States)

    Mehl, Albert L.; And Others

    1990-01-01

    The article reports on a case of Munchausen syndrome by proxy in which chronic illicit insulin was administered to a one-year-old child by her mother. Factitious illnesses continued despite psychiatric intervention. Retrospective review of medical records suggested 30 previous episodes of factitious illness within the family. (DB)

  20. Real time gamma-ray signature identifier

    Science.gov (United States)

    Rowland, Mark [Alamo, CA; Gosnell, Tom B [Moraga, CA; Ham, Cheryl [Livermore, CA; Perkins, Dwight [Livermore, CA; Wong, James [Dublin, CA

    2012-05-15

    A real time gamma-ray signature/source identification method and system using principal components analysis (PCA) for transforming and substantially reducing one or more comprehensive spectral libraries of nuclear materials types and configurations into a corresponding concise representation/signature(s) representing and indexing each individual predetermined spectrum in principal component (PC) space, wherein an unknown gamma-ray signature may be compared against the representative signature to find a match or at least characterize the unknown signature from among all the entries in the library with a single regression or simple projection into the PC space, so as to substantially reduce processing time and computing resources and enable real-time characterization and/or identification.

  1. Evaluation of Organic Proxies for Quantifying Past Primary Productivity

    Science.gov (United States)

    Raja, M.; Rosell-Melé, A.; Galbraith, E.

    2017-12-01

    Ocean primary productivity is a key element of the marine carbon cycle. However, its quantitative reconstruction in the past relies on the use of biogeochemical models as the available proxy approaches are qualitative at best. Here, we present an approach that evaluates the use of phytoplanktonic biomarkers (i.e. chlorins and alkenones) as quantitative proxies to reconstruct past changes in marine productivity. We compare biomarkers contents in a global suite of core-top sediments to sea-surface chlorophyll-a abundance estimated by satellites over the last 20 years, and the results are compared to total organic carbon (TOC). We also assess satellite data and detect satellite limitations and biases due to the complexity of optical properties and the actual defined algorithms. Our findings show that sedimentary chlorins can be used to track total sea-surface chlorophyll-a abundance as an indicator for past primary productivity. However, degradation processes restrict the application of this proxy to concentrations below a threshold value (1µg/g). Below this threshold, chlorins are a useful tool to identify reducing conditions when used as part of a multiproxy approach to assess redox sedimentary conditions (e.g. using Re, U). This is based on the link between anoxic/disoxic conditions and the flux of organic matter from the sea-surface to the sediments. We also show that TOC is less accurate than chlorins for estimating sea-surface chlorophyll-a due to the contribution of terrigenous organic matter, and the different degradation pathways of all organic compounds that TOC includes. Alkenones concentration also relates to primary productivity, but they are constrained by different processes in different regions. In conclusion, as lons as specific constraints are taken into account, our study evaluates the use of chlorins and alkenones as quantitative proxies of past primary productivity, with more accuracy than by using TOC.

  2. Elemental signature of terrigenous sediment runoff as recorded in coastal salt ponds: US Virgin Islands

    International Nuclear Information System (INIS)

    Larson, Rebekka A.; Brooks, Gregg R.; Devine, Barry; Schwing, Patrick T.; Holmes, Charles W.; Jilbert, Tom; Reichart, Gert-Jan

    2015-01-01

    A high-resolution, multi-proxy approach is utilized on mm- to cm-scale laminated coastal salt pond sediments from St. John, U.S. Virgin Islands, to determine: (1) the sedimentological signature of depositional events/processes, (2) link this sedimentological signature with known depositional events/processes in the historical (past ∼100 years) record; and, (3) project back into the recent geologic past (past ∼1400 years) to investigate the natural variability of depositional events/processes. High-resolution, short-lived radioisotope geochronology ("2"1"0Pb, "1"3"7Cs, "7Be) combined with high-resolution elemental scanning techniques (scanning XRF and scanning LA-ICP-MS) allows for the direct comparison of well-preserved salt pond deposits to historical records of depositional events (e.g., runoff/rainfall, tropical cyclones, tsunamis) to identify the sedimentary signature of each type of event. There is a robust sedimentary record of terrigenous sediment runoff linked to the frequency of rainfall events that exceed a threshold of ∼12 mm/day (minimum to mobilize and transport sediment) for study sites. This is manifested in the sedimentary record as increases in terrigenous indicator elements (%Al, %Fe, %Ti, %Si), which agree well with rainfall records over the past ∼50 years. Variability in the sedimentary record over the past ∼100 years reflects decadal-scale fluctuations between periods of increased frequency of rainfall events, and decreased frequency of rainfall events. Dm-scale variability in terrigenous indicator elements over the past ∼1400 years represents the natural system variability on a decadal–centennial scale, and provides a high-resolution, long-term baseline of natural variability of rainfall/runoff events. A period of increased terrigenous sediment delivery during the 1700s and 1800s likely indicates increased erosion in response to anthropogenic activities associated with the island’s plantation era, and perhaps increased

  3. Fine-grained policy control in U.S. Army Research Laboratory (ARL) multimodal signatures database

    Science.gov (United States)

    Bennett, Kelly; Grueneberg, Keith; Wood, David; Calo, Seraphin

    2014-06-01

    The U.S. Army Research Laboratory (ARL) Multimodal Signatures Database (MMSDB) consists of a number of colocated relational databases representing a collection of data from various sensors. Role-based access to this data is granted to external organizations such as DoD contractors and other government agencies through a client Web portal. In the current MMSDB system, access control is only at the database and firewall level. In order to offer finer grained security, changes to existing user profile schemas and authentication mechanisms are usually needed. In this paper, we describe a software middleware architecture and implementation that allows fine-grained access control to the MMSDB at a dataset, table, and row level. Result sets from MMSDB queries issued in the client portal are filtered with the use of a policy enforcement proxy, with minimal changes to the existing client software and database. Before resulting data is returned to the client, policies are evaluated to determine if the user or role is authorized to access the data. Policies can be authored to filter data at the row, table or column level of a result set. The system uses various technologies developed in the International Technology Alliance in Network and Information Science (ITA) for policy-controlled information sharing and dissemination1. Use of the Policy Management Library provides a mechanism for the management and evaluation of policies to support finer grained access to the data in the MMSDB system. The GaianDB is a policy-enabled, federated database that acts as a proxy between the client application and the MMSDB system.

  4. Contracts, covenants and advance care planning: an empirical study of the moral obligations of patient and proxy.

    Science.gov (United States)

    Fins, Joseph J; Maltby, Barbara S; Friedmann, Erika; Greene, Michele G; Norris, Kaye; Adelman, Ronald; Byock, Ira

    2005-01-01

    Previously we had speculated that the patient-proxy relationship existed on a contractual to covenantal continuum. In order to assess this hypothesis, and to better understand the moral obligations of the patient-proxy relationship, we surveyed 50 patient-proxy pairs as well as 52 individuals who had acted as proxies for someone who had died. Using structured vignettes representative of three distinct disease trajectories (cancer, acute stroke, and congestive heart failure), we assessed whether respondents believed that proxies should follow explicit instructions regarding life-sustaining therapy and act contractually or whether more discretionary or covenantal judgments were ethically permissible. Additional variables included the valence of initial patient instructions--for example, "to do nothing" or "to do everything"--as well as the quality of information available to the proxy. Responses were graded on a contractual to covenantal continuum using a modified Likert scale employing a prospectively scored survey instrument. Our data indicate that the patient-proxy relationship exists on a contractual to covenantal continuum and that variables such as disease trajectory, the clarity of prognosis, instructional valence, and the quality of patient instructions result in statistically significant differences in response. The use of interpretative or covenantal judgment was desired by patients and proxies when the prognosis was grim, even if initial instructions were to pursue more aggressive care. Nonetheless, there was a valence effect: patients and proxies intended that negative instructions to be left alone be heeded. These data suggest that the delegation of patient self-determination is morally complex. Advance care planning should take into account both the exercise of autonomy and the interpretative burdens assumed by the proxy. Patients and proxies think inductively and contextually. Neither group viewed deviation from patient instructions as a violation of

  5. Validity of proxy data obtained by different psychological autopsy information reconstruction techniques.

    Science.gov (United States)

    Fang, L; Zhang, J

    2010-01-01

    Two informants were interviewed for each of 416 living controls (individuals sampled from the normal population) interviewed in a Chinese case-control psychological autopsy study. The validity of proxy data, obtained using seven psychological autopsy information reconstruction techniques (types 1, 2 and A - E), was evaluated, with living controls' self reports used as the gold-standard. Proxy data for reconstruction technique types 1, 2 and D on the Impulsivity Inventory Scale (total impulsivity score) were no different from the living controls' self report gold standard, whereas data for types A and E were smaller than data from living controls. On the 'acceptance or resignation' sub-scale of the avoidance coping dimension of the Moos Coping Response Inventory, information obtained by reconstruction technique types 1 and D was not significantly different from the living controls' self reports, whereas proxy data from types 2, A and E were smaller than those from the living controls. No statistically significant differences were identified for other proxy data obtained by reconstruction technique types 1, 2, A, D and E. These results indicate that using a second informant does not significantly enhance information reconstruction for the target.

  6. Deuterium values from volcanic glass: A paleoelevation proxy for Oregon's Cascade Range

    Science.gov (United States)

    Carlson, T. B.; Bershaw, J. T.

    2016-12-01

    Hydrated volcanic glass has been used as a proxy to constrain Cenozoic paleoclimate across many of the world's mountain ranges. However, there are concerns that volcanic glass may not preserve the isotopic composition of syndepositional meteoric water. The Cascades are an excellent location to study the validity of hydrated volcanic glass as a paleoenvironmental proxy for several reasons. Moisture is derived from a single oceanic source and falls as orographic precipitation in the Cascades, leading to a characteristic altitude effect, or inverse relationship between elevation and the isotopic composition of meteoric water (δD). In addition, past studies have inferred uplift of the Cascades and an increase in the rain shadow effect since the Eocene through independent methods such as changing fossil assemblages, and other isotopic proxies including carbonates and fossil teeth. In this study, δD values of two hydrated tuff samples are compared: one prior to ( 29 Ma) and one following ( 5 Ma) the onset of High Cascade volcanism. The isotopic composition of these samples are interpreted in the context of modern water across the range to understand the potential of volcanic glass as a proxy for paleoelevation in the Pacific Northwest.

  7. Optical Signature Analysis of Tumbling Rocket Bodies via Laboratory Measurements

    Science.gov (United States)

    Cowardin, H.; Lederer, S.; Liou, J.-C.; Ojakangas, G.; Mulrooney, M.

    2012-09-01

    The NASA Orbital Debris Program Office has acquired telescopic lightcurve data on massive intact objects, specifically spent rocket bodies (R/Bs), to ascertain tumble rates in support of the Active Debris Removal (ADR) studies to help remediate the LEO environment. Tumble rates are needed to plan and develop proximity and docking operations for potential future ADR operations. To better characterize and model optical data acquired from ground-based telescopes, the Optical Measurements Center (OMC) at NASA/JSC emulates illumination conditions in space using equipment and techniques that parallel telescopic observations and source-target-sensor orientations. The OMC employs a 75-W Xenon arc lamp as a solar simulator, an SBIG CCD camera with standard Johnson/Bessel filters, and a robotic arm to simulate an object's position and rotation. The OMC does not attempt to replicate the rotation rates, but focuses on ascertaining how an object is rotating as seen from multiple phase angles. The two targets studied are scaled (1:48) SL-8 Cosmos 3M second stages. The first target is painted in the standard Russian government "gray" scheme and the second target is white/orange as used for commercial missions. This paper summarizes results of the two scaled rocket bodies, each observed in three independent rotation states: (a) spin-stabilized rotation (about the long axis), (b) end-over-end rotation, and (c) a 10 degree wobble about the center of mass. The first two cases represent simple spin about either primary axis. The third - what we call "wobble" - represents maximum principal axis rotation, with an inertia tensor that is offset from the symmetry axes. By comparing the resultant phase and orientation-dependent laboratory signatures with actual lightcurves derived from telescopic observations of orbiting R/Bs, we intend to assess the intrinsic R/B rotation states. In the simplest case, simulated R/B behavior coincides with principal axis spin states, while more complex R

  8. 42 CFR 424.36 - Signature requirements.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Signature requirements. 424.36 Section 424.36... (CONTINUED) MEDICARE PROGRAM CONDITIONS FOR MEDICARE PAYMENT Claims for Payment § 424.36 Signature requirements. (a) General rule. The beneficiary's own signature is required on the claim unless the beneficiary...

  9. Unsupervised signature extraction from forensic logs

    NARCIS (Netherlands)

    Thaler, S.M.; Menkovski, V.; Petkovic, M.; Altun, Y.; Das, K.; Mielikäinen, T.; Malerba, D.; Stefanowski, J.; Read, J.; Žitnik, M.; Ceci, M.

    2017-01-01

    Signature extraction is a key part of forensic log analysis. It involves recognizing patterns in log lines such that log lines that originated from the same line of code are grouped together. A log signature consists of immutable parts and mutable parts. The immutable parts define the signature, and

  10. How to integrate proxy data from two informants in life event assessment in psychological autopsy.

    Science.gov (United States)

    Zhang, Jie; Wang, Youqing; Fang, Le

    2018-04-27

    Life event assessment is an important part in psychological autopsy, and how to integrate its proxy data from two informants is a major methodological issue which needs solving. Totally 416 living subjects and their two informants were interviewed by psychological autopsy, and life events were assessed with Paykel's Interview for Recent Life Events. Validities of integrated proxy data using six psychological autopsy information reconstruction methods were evaluated, with living subjects' self-reports used as gold-standard criteria. For all the life events, average value of Youden Indexes for proxy data by type C information reconstruction method (choosing positive value from two informants) was larger than other five methods'. For family life related events, proxy data by type 1st information reconstruction method were not significantly different from living subjects' self-reports (P = 0.828). For all other life events, proxy data by type C information reconstruction method were not significantly different from the gold-standard. Choosing positive value is a relatively better method for integrating dichotomous (positive vs. negative) proxy data from two informants in life event assessment in psychological autopsy, except for family life related events. In that case, using information provided by 1st informants (mainly family member) is recommended.

  11. Retail applications of signature verification

    Science.gov (United States)

    Zimmerman, Thomas G.; Russell, Gregory F.; Heilper, Andre; Smith, Barton A.; Hu, Jianying; Markman, Dmitry; Graham, Jon E.; Drews, Clemens

    2004-08-01

    The dramatic rise in identity theft, the ever pressing need to provide convenience in checkout services to attract and retain loyal customers, and the growing use of multi-function signature captures devices in the retail sector provides favorable conditions for the deployment of dynamic signature verification (DSV) in retail settings. We report on the development of a DSV system to meet the needs of the retail sector. We currently have a database of approximately 10,000 signatures collected from 600 subjects and forgers. Previous work at IBM on DSV has been merged and extended to achieve robust performance on pen position data available from commercial point of sale hardware, achieving equal error rates on skilled forgeries and authentic signatures of 1.5% to 4%.

  12. Are fixed grain size ratios useful proxies for loess sedimentation dynamics? Experiences from Remizovka, Kazakhstan

    Science.gov (United States)

    Schulte, Philipp; Sprafke, Tobias; Rodrigues, Leonor; Fitzsimmons, Kathryn E.

    2018-04-01

    Loess-paleosol sequences (LPS) are sensitive terrestrial archives of past aeolian dynamics and paleoclimatic changes within the Quaternary. Grain size (GS) analysis is commonly used to interpret aeolian dynamics and climate influences on LPS, based on granulometric parameters such as specific GS classes, ratios of GS classes and statistical manipulation of GS data. However, the GS distribution of a loess sample is not solely a function of aeolian dynamics; rather complex polygenetic depositional and post-depositional processes must be taken into account. This study assesses the reliability of fixed GS ratios as proxies for past sedimentation dynamics using the case study of Remizovka in southeast Kazakhstan. Continuous sampling of the upper 8 m of the profile, which shows extremely weak pedogenic alteration and is therefore dominated by primary aeolian activity, indicates that fixed GS ratios do not adequately serve as proxies for loess sedimentation dynamics. We find through the calculation of single value parameters, that "true" variations within sensitive GS classes are masked by relative changes of the more frequent classes. Heatmap signatures provide the visualization of GS variability within LPS without significant data loss within the measured classes of a sample, or across all measured samples. We also examine the effect of two different commonly used laser diffraction devices on GS ratio calculation by duplicate measurements, the Beckman Coulter (LS13320) and a Malvern Mastersizer Hydro (MM2000), as well as the applicability and significance of the so-called "twin peak ratio" previously developed on samples from the same section. The LS13320 provides higher resolution results than the MM2000, nevertheless the GS ratios related to variations in the silt-sized fraction were comparable. However, we could not detect a twin peak within the coarse silt as detected in the original study using the same device. Our GS measurements differ from previous works at

  13. Quick, “Imputation-free” meta-analysis with proxy-SNPs

    Directory of Open Access Journals (Sweden)

    Meesters Christian

    2012-09-01

    Full Text Available Abstract Background Meta-analysis (MA is widely used to pool genome-wide association studies (GWASes in order to a increase the power to detect strong or weak genotype effects or b as a result verification method. As a consequence of differing SNP panels among genotyping chips, imputation is the method of choice within GWAS consortia to avoid losing too many SNPs in a MA. YAMAS (Yet Another Meta Analysis Software, however, enables cross-GWAS conclusions prior to finished and polished imputation runs, which eventually are time-consuming. Results Here we present a fast method to avoid forfeiting SNPs present in only a subset of studies, without relying on imputation. This is accomplished by using reference linkage disequilibrium data from 1,000 Genomes/HapMap projects to find proxy-SNPs together with in-phase alleles for SNPs missing in at least one study. MA is conducted by combining association effect estimates of a SNP and those of its proxy-SNPs. Our algorithm is implemented in the MA software YAMAS. Association results from GWAS analysis applications can be used as input files for MA, tremendously speeding up MA compared to the conventional imputation approach. We show that our proxy algorithm is well-powered and yields valuable ad hoc results, possibly providing an incentive for follow-up studies. We propose our method as a quick screening step prior to imputation-based MA, as well as an additional main approach for studies without available reference data matching the ethnicities of study participants. As a proof of principle, we analyzed six dbGaP Type II Diabetes GWAS and found that the proxy algorithm clearly outperforms naïve MA on the p-value level: for 17 out of 23 we observe an improvement on the p-value level by a factor of more than two, and a maximum improvement by a factor of 2127. Conclusions YAMAS is an efficient and fast meta-analysis program which offers various methods, including conventional MA as well as inserting proxy

  14. 7 CFR 718.9 - Signature requirements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Signature requirements. 718.9 Section 718.9... MULTIPLE PROGRAMS General Provisions § 718.9 Signature requirements. (a) When a program authorized by this chapter or Chapter XIV of this title requires the signature of a producer; landowner; landlord; or tenant...

  15. 27 CFR 17.6 - Signature authority.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Signature authority. 17.6... PRODUCTS General Provisions § 17.6 Signature authority. No claim, bond, tax return, or other required... other proper notification of signature authority has been filed with the TTB office where the required...

  16. Multiscale combination of climate model simulations and proxy records over the last millennium

    Science.gov (United States)

    Chen, Xin; Xing, Pei; Luo, Yong; Nie, Suping; Zhao, Zongci; Huang, Jianbin; Tian, Qinhua

    2018-05-01

    To highlight the compatibility of climate model simulation and proxy reconstruction at different timescales, a timescale separation merging method combining proxy records and climate model simulations is presented. Annual mean surface temperature anomalies for the last millennium (851-2005 AD) at various scales over the land of the Northern Hemisphere were reconstructed with 2° × 2° spatial resolution, using an optimal interpolation (OI) algorithm. All target series were decomposed using an ensemble empirical mode decomposition method followed by power spectral analysis. Four typical components were obtained at inter-annual, decadal, multidecadal, and centennial timescales. A total of 323 temperature-sensitive proxy chronologies were incorporated after screening for each component. By scaling the proxy components using variance matching and applying a localized OI algorithm to all four components point by point, we obtained merged surface temperatures. Independent validation indicates that the most significant improvement was for components at the inter-annual scale, but this became less evident with increasing timescales. In mid-latitude land areas, 10-30% of grids were significantly corrected at the inter-annual scale. By assimilating the proxy records, the merged results reduced the gap in response to volcanic forcing between a pure reconstruction and simulation. Difficulty remained in verifying the centennial information and quantifying corresponding uncertainties, so additional effort should be devoted to this aspect in future research.

  17. Health anxiety by proxy in women with severe health anxiety

    DEFF Research Database (Denmark)

    Thorgaard, Mette Viller; Frostholm, Lisbeth; Walker, Lynn

    2017-01-01

    Health anxiety (HA) refers to excessive worries and anxiety about harbouring serious illness based on misinterpretation of bodily sensations or changes as signs of serious illness. Severe HA is associated with disability and high health care costs. However, the impact of parental HA on excessive...... concern with their children's health (health anxiety by proxy) is scantly investigated. The aim of this study is to investigate HA by proxy in mothers with severe HA. Fifty mothers with severe HA and two control groups were included, i.e. mothers with rheumatoid arthritis (N = 49) and healthy mothers (N...

  18. Performance of Solar Proxy Options of IRI-Plas Model for Equinox Seasons

    Science.gov (United States)

    Sezen, Umut; Gulyaeva, Tamara L.; Arikan, Feza

    2018-02-01

    International Reference Ionosphere (IRI) is the most acclaimed climatic model of the ionosphere. Since 2009, the range of the IRI model has been extended to the Global Positioning System (GPS) orbital height of 20,000 km in the plasmasphere. The new model, which is called IRI extended to Plasmasphere (IRI-Plas), can input not only the ionosonde foF2 and hmF2 but also the GPS-total electron content (TEC). IRI-Plas has been provided at www.ionolab.org, where online computation of ionospheric parameters is accomplished through a user-friendly interface. The solar proxies that are available in IRI-Plas can be listed as sunspot number (SSN1), SSN2, F10.7, global electron content (GEC), TEC, IG, Mg II, Lyman-α, and GEC_RZ. In this study, ionosonde foF2 data are compared with IRI-Plas foF2 values with the Consultative Committee International Radio (CCIR) and International Union of Radio Science (URSI) model choices for each solar proxy, with or without the GPS-TEC input for the equinox months of October 2011 and March 2015. It has been observed that the best fitting model choices in Root Mean Square (RMS) and Normalized RMS (NRMS) sense are the Jet Propulsion Laboratory global ionospheric maps-TEC input with Lyman-α solar proxy option for both months. The input of TEC definitely lowers the difference between the model and ionosonde foF2 values. The IG and Mg II solar proxies produce similar model foF2 values, and they usually are the second and third best fits to the ionosonde foF2 for the midlatitude ionosphere. In high-latitude regions, Jet Propulsion Laboratory global ionospheric map-TEC inputs to IRI-Plas with Lyman-α, GEC_RZ, and TEC solar proxies are the best choices. In equatorial region, the best fitting solar proxies are IG, Lyman-α, and Mg II.

  19. Online Signature Verification on MOBISIG Finger-Drawn Signature Corpus

    Directory of Open Access Journals (Sweden)

    Margit Antal

    2018-01-01

    Full Text Available We present MOBISIG, a pseudosignature dataset containing finger-drawn signatures from 83 users captured with a capacitive touchscreen-based mobile device. The database was captured in three sessions resulting in 45 genuine signatures and 20 skilled forgeries for each user. The database was evaluated by two state-of-the-art methods: a function-based system using local features and a feature-based system using global features. Two types of equal error rate computations are performed: one using a global threshold and the other using user-specific thresholds. The lowest equal error rate was 0.01% against random forgeries and 5.81% against skilled forgeries using user-specific thresholds that were computed a posteriori. However, these equal error rates were significantly raised to 1.68% (random forgeries case and 14.31% (skilled forgeries case using global thresholds. The same evaluation protocol was performed on the DooDB publicly available dataset. Besides verification performance evaluations conducted on the two finger-drawn datasets, we evaluated the quality of the samples and the users of the two datasets using basic quality measures. The results show that finger-drawn signatures can be used by biometric systems with reasonable accuracy.

  20. 48 CFR 804.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... signature. 804.101 Section 804.101 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS GENERAL ADMINISTRATIVE MATTERS Contract Execution 804.101 Contracting officer's signature. (a) If a... signature. ...

  1. Multiple imputation using linked proxy outcome data resulted in important bias reduction and efficiency gains: a simulation study.

    Science.gov (United States)

    Cornish, R P; Macleod, J; Carpenter, J R; Tilling, K

    2017-01-01

    When an outcome variable is missing not at random (MNAR: probability of missingness depends on outcome values), estimates of the effect of an exposure on this outcome are often biased. We investigated the extent of this bias and examined whether the bias can be reduced through incorporating proxy outcomes obtained through linkage to administrative data as auxiliary variables in multiple imputation (MI). Using data from the Avon Longitudinal Study of Parents and Children (ALSPAC) we estimated the association between breastfeeding and IQ (continuous outcome), incorporating linked attainment data (proxies for IQ) as auxiliary variables in MI models. Simulation studies explored the impact of varying the proportion of missing data (from 20 to 80%), the correlation between the outcome and its proxy (0.1-0.9), the strength of the missing data mechanism, and having a proxy variable that was incomplete. Incorporating a linked proxy for the missing outcome as an auxiliary variable reduced bias and increased efficiency in all scenarios, even when 80% of the outcome was missing. Using an incomplete proxy was similarly beneficial. High correlations (> 0.5) between the outcome and its proxy substantially reduced the missing information. Consistent with this, ALSPAC analysis showed inclusion of a proxy reduced bias and improved efficiency. Gains with additional proxies were modest. In longitudinal studies with loss to follow-up, incorporating proxies for this study outcome obtained via linkage to external sources of data as auxiliary variables in MI models can give practically important bias reduction and efficiency gains when the study outcome is MNAR.

  2. Role of Advance Care Planning in Proxy Decision Making Among Individuals With Dementia and Their Family Caregivers.

    Science.gov (United States)

    Kwak, Jung; De Larwelle, Jessica A; Valuch, Katharine O'Connell; Kesler, Toni

    2016-01-01

    Health care proxies make important end-of-life decisions for individuals with dementia. A cross-sectional survey was conducted to examine the role of advance care planning in proxy decision making for 141 individuals with cognitive impairment, Alzheimer's disease, or other types of dementia. Proxies who did not know the preferences of individuals with dementia for life support treatments reported greater understanding of their values. Proxies of individuals with dementia who did not want life support treatments anticipated receiving less support and were more uncertain in decision making. The greater knowledge proxies had about dementia trajectory, family support, and trust of physicians, the more informed, clearer, and less uncertain they were in decision making. In addition to advance care planning, multiple factors influence proxy decision making, which should be considered in developing interventions and future research to support informed decision making for individuals with dementia and their families. Copyright 2016, SLACK Incorporated.

  3. Perancangan Aplikasi Undeniable Digital Signature Dengan Algoritma Chaum’s Blind Signature

    OpenAIRE

    Simanjuntak, Martin Dennain

    2012-01-01

    Desperaty need a securiry system in the exchange of information via computer media, so that information can not be accessed by unauthorized parties. One of the security system is to use a system of digital signatures as a means of authenticating the authenticity of digital document that are exchanged. By using a digital a digital signature system is undeniable, the security system can be generated digital document exchange, where the system is free from the from of rejection...

  4. Practical quantum digital signature

    Science.gov (United States)

    Yin, Hua-Lei; Fu, Yao; Chen, Zeng-Bing

    2016-03-01

    Guaranteeing nonrepudiation, unforgeability as well as transferability of a signature is one of the most vital safeguards in today's e-commerce era. Based on fundamental laws of quantum physics, quantum digital signature (QDS) aims to provide information-theoretic security for this cryptographic task. However, up to date, the previously proposed QDS protocols are impractical due to various challenging problems and most importantly, the requirement of authenticated (secure) quantum channels between participants. Here, we present the first quantum digital signature protocol that removes the assumption of authenticated quantum channels while remaining secure against the collective attacks. Besides, our QDS protocol can be practically implemented over more than 100 km under current mature technology as used in quantum key distribution.

  5. Image-Based Airborne Sensors: A Combined Approach for Spectral Signatures Classification through Deterministic Simulated Annealing

    Science.gov (United States)

    Guijarro, María; Pajares, Gonzalo; Herrera, P. Javier

    2009-01-01

    The increasing technology of high-resolution image airborne sensors, including those on board Unmanned Aerial Vehicles, demands automatic solutions for processing, either on-line or off-line, the huge amountds of image data sensed during the flights. The classification of natural spectral signatures in images is one potential application. The actual tendency in classification is oriented towards the combination of simple classifiers. In this paper we propose a combined strategy based on the Deterministic Simulated Annealing (DSA) framework. The simple classifiers used are the well tested supervised parametric Bayesian estimator and the Fuzzy Clustering. The DSA is an optimization approach, which minimizes an energy function. The main contribution of DSA is its ability to avoid local minima during the optimization process thanks to the annealing scheme. It outperforms simple classifiers used for the combination and some combined strategies, including a scheme based on the fuzzy cognitive maps and an optimization approach based on the Hopfield neural network paradigm. PMID:22399989

  6. 25 CFR 213.10 - Lessor's signature.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Lessor's signature. 213.10 Section 213.10 Indians BUREAU... MEMBERS OF FIVE CIVILIZED TRIBES, OKLAHOMA, FOR MINING How to Acquire Leases § 213.10 Lessor's signature... thumbprint which shall be designated as “right” or “left” thumbmark. Such signatures must be witnessed by two...

  7. Initial Semantics for Strengthened Signatures

    Directory of Open Access Journals (Sweden)

    André Hirschowitz

    2012-02-01

    Full Text Available We give a new general definition of arity, yielding the companion notions of signature and associated syntax. This setting is modular in the sense requested by Ghani and Uustalu: merging two extensions of syntax corresponds to building an amalgamated sum. These signatures are too general in the sense that we are not able to prove the existence of an associated syntax in this general context. So we have to select arities and signatures for which there exists the desired initial monad. For this, we follow a track opened by Matthes and Uustalu: we introduce a notion of strengthened arity and prove that the corresponding signatures have initial semantics (i.e. associated syntax. Our strengthened arities admit colimits, which allows the treatment of the λ-calculus with explicit substitution.

  8. Spectral signature selection for mapping unvegetated soils

    Science.gov (United States)

    May, G. A.; Petersen, G. W.

    1975-01-01

    Airborne multispectral scanner data covering the wavelength interval from 0.40-2.60 microns were collected at an altitude of 1000 m above the terrain in southeastern Pennsylvania. Uniform training areas were selected within three sites from this flightline. Soil samples were collected from each site and a procedure developed to allow assignment of scan line and element number from the multispectral scanner data to each sampling location. These soil samples were analyzed on a spectrophotometer and laboratory spectral signatures were derived. After correcting for solar radiation and atmospheric attenuation, the laboratory signatures were compared to the spectral signatures derived from these same soils using multispectral scanner data. Both signatures were used in supervised and unsupervised classification routines. Computer-generated maps using the laboratory and multispectral scanner derived signatures resulted in maps that were similar to maps resulting from field surveys. Approximately 90% agreement was obtained between classification maps produced using multispectral scanner derived signatures and laboratory derived signatures.

  9. Time Series Based for Online Signature Verification

    Directory of Open Access Journals (Sweden)

    I Ketut Gede Darma Putra

    2013-11-01

    Full Text Available Signature verification system is to match the tested signature with a claimed signature. This paper proposes time series based for feature extraction method and dynamic time warping for match method. The system made by process of testing 900 signatures belong to 50 participants, 3 signatures for reference and 5 signatures from original user, simple imposters and trained imposters for signatures test. The final result system was tested with 50 participants with 3 references. This test obtained that system accuracy without imposters is 90,44897959% at threshold 44 with rejection errors (FNMR is 5,2% and acceptance errors (FMR is 4,35102%, when with imposters system accuracy is 80,1361% at threshold 27 with error rejection (FNMR is 15,6% and acceptance errors (average FMR is 4,263946%, with details as follows: acceptance errors is 0,391837%, acceptance errors simple imposters is 3,2% and acceptance errors trained imposters is 9,2%.

  10. Genome signature analysis of thermal virus metagenomes reveals Archaea and thermophilic signatures.

    Science.gov (United States)

    Pride, David T; Schoenfeld, Thomas

    2008-09-17

    Metagenomic analysis provides a rich source of biological information for otherwise intractable viral communities. However, study of viral metagenomes has been hampered by its nearly complete reliance on BLAST algorithms for identification of DNA sequences. We sought to develop algorithms for examination of viral metagenomes to identify the origin of sequences independent of BLAST algorithms. We chose viral metagenomes obtained from two hot springs, Bear Paw and Octopus, in Yellowstone National Park, as they represent simple microbial populations where comparatively large contigs were obtained. Thermal spring metagenomes have high proportions of sequences without significant Genbank homology, which has hampered identification of viruses and their linkage with hosts. To analyze each metagenome, we developed a method to classify DNA fragments using genome signature-based phylogenetic classification (GSPC), where metagenomic fragments are compared to a database of oligonucleotide signatures for all previously sequenced Bacteria, Archaea, and viruses. From both Bear Paw and Octopus hot springs, each assembled contig had more similarity to other metagenome contigs than to any sequenced microbial genome based on GSPC analysis, suggesting a genome signature common to each of these extreme environments. While viral metagenomes from Bear Paw and Octopus share some similarity, the genome signatures from each locale are largely unique. GSPC using a microbial database predicts most of the Octopus metagenome has archaeal signatures, while bacterial signatures predominate in Bear Paw; a finding consistent with those of Genbank BLAST. When using a viral database, the majority of the Octopus metagenome is predicted to belong to archaeal virus Families Globuloviridae and Fuselloviridae, while none of the Bear Paw metagenome is predicted to belong to archaeal viruses. As expected, when microbial and viral databases are combined, each of the Octopus and Bear Paw metagenomic contigs

  11. Signatures de l'invisible

    CERN Multimedia

    CERN Press Office. Geneva

    2000-01-01

    "Signatures of the Invisible" is an unique collaboration between contemporary artists and contemporary physicists which has the potential to help redefine the relationship between science and art. "Signatures of the Invisible" is jointly organised by the London Institute - the world's largest college of art and design and CERN*, the world's leading particle physics laboratory. 12 leading visual artists:

  12. Measuring SIP proxy server performance

    CERN Document Server

    Subramanian, Sureshkumar V

    2013-01-01

    Internet Protocol (IP) telephony is an alternative to the traditional Public Switched Telephone Networks (PSTN), and the Session Initiation Protocol (SIP) is quickly becoming a popular signaling protocol for VoIP-based applications. SIP is a peer-to-peer multimedia signaling protocol standardized by the Internet Engineering Task Force (IETF), and it plays a vital role in providing IP telephony services through its use of the SIP Proxy Server (SPS), a software application that provides call routing services by parsing and forwarding all the incoming SIP packets in an IP telephony network.SIP Pr

  13. Graphite-(Mo,W)S2 intergrowth as a palaeoenvironmental proxy in metasedimentary rocks

    Science.gov (United States)

    Cabral, Alexandre Raphael; Zeh, Armin; da Silva Viana, Nívea Cristina; Schirmer, Thomas; Lehmann, Bernd

    2017-12-01

    Molybdenum enrichment in pristine organic-C-rich sedimentary rocks forms the basis for inferring the presence of dissolved oxygen in seawater. Organic matter removes dissolved hexavalent Mo from seawater where anoxic and euxinic conditions are attained. However, it is unknown whether this Mo-based proxy is retained under metamorphic conditions where organic C is no longer preserved. Here, we describe aggregates of graphite and molybdenite (MoS2) containing up to 21 mass per cent of W as tungstenite (WS2) in solid solution. These aggregates are disseminated in a sulfide-rich Mn-silicate-carbonate rock (queluzite), metamorphosed under amphibolite-facies conditions within the Archaean Barbacena greenstone belt in Minas Gerais, Brazil. Our finding indicates that: (i) W is, like Mo, a palaeoenvironmental proxy; (ii) the W proxy is sensitive to high fS2/fO2 environments; (iii) both Mo and W proxies survive amphibolite-facies overprint as (Mo,W)S2 intergrown with graphite. Archaean greenstones are potential candidates for storing palaeoenvironmental information as (Mo,W)S2-graphite intergrowths.

  14. Servidor proxy caché: comprensión y asimilación tecnológica

    Directory of Open Access Journals (Sweden)

    Carlos E. Gómez

    2012-01-01

    Full Text Available Los proveedores de acceso a Internet usualmente incluyen el concepto de aceleradores de Internet para reducir el tiempo promedio que tarda un navegador en obtener los archivos solicitados. Para los administradores del sistema es difícil elegir la configuración del servidor proxy caché, ya que es necesario decidir los valores que se deben usar en diferentes variables. En este artículo se presenta la forma como se abordó el proceso de comprensión y asimilación tecnológica del servicio de proxy caché, un servicio de alto impacto organizacional. Además, este artículo es producto del proyecto de investigación “Análisis de configuraciones de servidores proxy caché”, en el cual se estudiaron aspectos relevantes del rendimiento de Squid como servidor proxy caché.

  15. Slices: A shape-proxy based on planar sections

    KAUST Repository

    McCrae, James; Singh, Karan S.; Mitra, Niloy J.

    2011-01-01

    of intersection of planes with a 3D object, for creating shape abstractions, motivated by their popularity in art and engineering. We first perform a user study to show that humans do define consistent and similar planar section proxies for common objects

  16. Technical Note: Probabilistically constraining proxy age–depth models within a Bayesian hierarchical reconstruction model

    Directory of Open Access Journals (Sweden)

    J. P. Werner

    2015-03-01

    Full Text Available Reconstructions of the late-Holocene climate rely heavily upon proxies that are assumed to be accurately dated by layer counting, such as measurements of tree rings, ice cores, and varved lake sediments. Considerable advances could be achieved if time-uncertain proxies were able to be included within these multiproxy reconstructions, and if time uncertainties were recognized and correctly modeled for proxies commonly treated as free of age model errors. Current approaches for accounting for time uncertainty are generally limited to repeating the reconstruction using each one of an ensemble of age models, thereby inflating the final estimated uncertainty – in effect, each possible age model is given equal weighting. Uncertainties can be reduced by exploiting the inferred space–time covariance structure of the climate to re-weight the possible age models. Here, we demonstrate how Bayesian hierarchical climate reconstruction models can be augmented to account for time-uncertain proxies. Critically, although a priori all age models are given equal probability of being correct, the probabilities associated with the age models are formally updated within the Bayesian framework, thereby reducing uncertainties. Numerical experiments show that updating the age model probabilities decreases uncertainty in the resulting reconstructions, as compared with the current de facto standard of sampling over all age models, provided there is sufficient information from other data sources in the spatial region of the time-uncertain proxy. This approach can readily be generalized to non-layer-counted proxies, such as those derived from marine sediments.

  17. Assessing the quality of life of children with sickle cell anaemia using self-, parent-proxy, and health care professional-proxy reports.

    Science.gov (United States)

    Constantinou, Christina; Payne, Nicola; Inusa, Baba

    2015-05-01

    The quality of life (QoL) of children with sickle cell anaemia (SCA) in the United Kingdom has not been examined, and a discrepancy measure based on Gap theory has rarely been used. This study investigated whether (1) child self-reports of QoL using a discrepancy measure (the Generic Children's QoL Measure; GCQ) are lower than those from healthy children, (2) proxy reports from parents and health care professionals are lower than child self-reports, and (3) demographic and disease severity indicators are related to QoL. An interdependent groups, cross-sectional design was implemented. Seventy-four children with SCA, their parent, and members of their health care team completed the GCQ. Demographic and disease severity indicators were recorded. GCQ data from healthy children were obtained from the UK Data Archive. Contrary to past research, when examining generic discrepancy QoL, children with SCA did not report a lower QoL than healthy children, and parent- and health care professional-proxy reports were not lower than child self-reports. Few of the demographic and disease severity indicators were related to QoL. Proxy reports may be used to gain a more complete picture of QoL, but should not be a substitute for self-reports. The explanation for the relatively high levels of QoL reported is not clear, but children with SCA may have realistic expectations about their ideal-self, place greater emphasis on aspects other than health in shaping their QoL, and define achievements within the limits of their illness. Future research should focus on psychological factors in explaining QoL. Statement of contribution What is already known on this subject? Children with sickle cell disease (SCD) generally have a reduced QoL compared with healthy children, but there appears to be no research measuring QoL in paediatric SCD in the United Kingdom. Proxy QoL reports from parents are often lower than child self-reports, but there is less research examining proxy reports from health

  18. Maximizing biomarker discovery by minimizing gene signatures

    Directory of Open Access Journals (Sweden)

    Chang Chang

    2011-12-01

    Full Text Available Abstract Background The use of gene signatures can potentially be of considerable value in the field of clinical diagnosis. However, gene signatures defined with different methods can be quite various even when applied the same disease and the same endpoint. Previous studies have shown that the correct selection of subsets of genes from microarray data is key for the accurate classification of disease phenotypes, and a number of methods have been proposed for the purpose. However, these methods refine the subsets by only considering each single feature, and they do not confirm the association between the genes identified in each gene signature and the phenotype of the disease. We proposed an innovative new method termed Minimize Feature's Size (MFS based on multiple level similarity analyses and association between the genes and disease for breast cancer endpoints by comparing classifier models generated from the second phase of MicroArray Quality Control (MAQC-II, trying to develop effective meta-analysis strategies to transform the MAQC-II signatures into a robust and reliable set of biomarker for clinical applications. Results We analyzed the similarity of the multiple gene signatures in an endpoint and between the two endpoints of breast cancer at probe and gene levels, the results indicate that disease-related genes can be preferably selected as the components of gene signature, and that the gene signatures for the two endpoints could be interchangeable. The minimized signatures were built at probe level by using MFS for each endpoint. By applying the approach, we generated a much smaller set of gene signature with the similar predictive power compared with those gene signatures from MAQC-II. Conclusions Our results indicate that gene signatures of both large and small sizes could perform equally well in clinical applications. Besides, consistency and biological significances can be detected among different gene signatures, reflecting the

  19. Munchausen syndrome by proxy: a family anthology.

    Science.gov (United States)

    Pickford, E; Buchanan, N; McLaughlan, S

    1988-06-20

    While the Munchausen-by-proxy syndrome is well recognized, the story of one family has been related to describe some remarkable features. These include the psychopathology of the mother, the involvement of both children in the family, the great difficulty in obtaining proof of child abuse and, finally, the prosecution of the mother in the criminal court.

  20. Understanding the Cognitive and Affective Mechanisms that Underlie Proxy Risk Perceptions among Caregivers of Asthmatic Children.

    Science.gov (United States)

    Shepperd, James A; Lipsey, Nikolette P; Pachur, Thorsten; Waters, Erika A

    2018-07-01

    Medical decisions made on behalf of another person-particularly those made by adult caregivers for their minor children-are often informed by the decision maker's beliefs about the treatment's risks and benefits. However, we know little about the cognitive and affective mechanisms influencing such "proxy" risk perceptions and about how proxy risk perceptions are related to prominent judgment phenomena. Adult caregivers of minor children with asthma ( N = 132) completed an online, cross-sectional survey assessing 1) cognitions and affects that form the basis of the availability, representativeness, and affect heuristics; 2) endorsement of the absent-exempt and the better-than-average effect; and 3) proxy perceived risk and unrealistic comparative optimism of an asthma exacerbation. We used the Pediatric Asthma Control and Communication Instrument (PACCI) to assess asthma severity. Respondents with higher scores on availability, representativeness, and negative affect indicated higher proxy risk perceptions and (for representativeness only) lower unrealistic optimism, irrespective of asthma severity. Conversely, respondents who showed a stronger display of the better-than-average effect indicated lower proxy risk perceptions but did not differ in unrealistic optimism. The absent-exempt effect was unrelated to proxy risk perceptions and unrealistic optimism. Heuristic judgment processes appear to contribute to caregivers' proxy risk perceptions of their child's asthma exacerbation risk. Moreover, the display of other, possibly erroneous, judgment phenomena is associated with lower caregiver risk perceptions. Designing interventions that target these mechanisms may help caregivers work with their children to reduce exacerbation risk.

  1. Short-term indicators. Intensities as a proxy for savings

    Energy Technology Data Exchange (ETDEWEB)

    Boonekamp, P.G.M.; Gerdes, J. [ECN Policy Studies, Petten (Netherlands); Faberi, S. [Institute of Studies for the Integration of Systems ISIS, Rome (Italy)

    2013-12-15

    The ODYSSEE database on energy efficiency indicators (www.odyssee-indicators.org) has been set up to enable the monitoring and evaluation of realised energy efficiency improvements and related energy savings. The database covers the 27 EU countries as well as Norway and Croatia and data are available from 1990 on. This work contributes to the growing need for quantitative monitoring and evaluation of the impacts of energy policies and measures, both at the EU and national level, e.g. due to the Energy Services Directive and the proposed Energy Efficiency Directive. Because the underlying data become available only after some time, the savings figures are not always timely available. This is especially true for the ODEX efficiency indices per sector that rely on a number of indicators. Therefore, there is a need for so-called short-term indicators that become available shortly after the year has passed for which data are needed. The short term indicators do not replace the savings indicators but function as a proxy for the savings in the most recent year. This proxy value is faster available, but will be less accurate than the saving indicators themselves. The short term indicators have to be checked regularly with the ODEX indicators in order to see whether they can function still as a proxy.

  2. Proxy support for service discovery using mDNS/DNS-SD in low power networks

    NARCIS (Netherlands)

    Stolikj, M.; Verhoeven, R.; Cuijpers, P.J.L.; Lukkien, J.J.

    2014-01-01

    We present a solution for service discovery of resource constrained devices based on mDNS/DNS-SD. We extend the mDNS/DNS-SD service discovery protocol with support for proxy servers. Proxy servers temporarily store information about services offered on resource constrained devices and respond on

  3. Spatial linkages between coral proxies of terrestrial runoff across a large embayment in Madagascar

    Directory of Open Access Journals (Sweden)

    C. A. Grove

    2012-08-01

    Full Text Available Coral cores provide vital climate reconstructions for site-specific temporal variability in river flow and sediment load. Yet, their ability to record spatial differences across multiple catchments is relatively unknown. Here, we investigate spatial linkages between four coral proxies of terrestrial runoff and their relationships between sites. Coral cores were drilled in and around Antongil Bay, the largest bay in Madagascar, and individually analysed for fifteen years of continuous luminescence (G / B, Ba / Ca, δ18Osw and δ13C data. Each coral core was drilled close to individual river mouths (≥ 7 km, and proxy data were compared to modelled river discharge and sediment runoff data for the three corresponding catchments. A reasonable agreement between terrestrial runoff proxies with modelled river discharge and sediment yield was observed. Some inconsistencies between proxy and modelled data are likely linked to proxy behaviour, watershed size and local environmental physiochemical parameters. In general, the further a coral resided from its river source, the weaker the proxy relationship was with modelled data and other corals, due to mixing gradients and currents. Nevertheless, we demonstrate that two coral Ba / Ca and luminescence (G / B records influenced by the same watershed are reproducible. Furthermore, a strong Ba / Ca relationship was observed between two cores from distant watersheds, with baseline averages in agreement with modelled sediment runoff data. As humic acids behave conservatively in the water column, luminescence (G / B data gave the highest regional correlations between cores, and showed the most consistent relationship with site specific modelled discharge. No statistical relationship was observed between cores in terms of interannual δ18Osw and δ13C, meaning corals were recording a localised signal at their respective sites, confounded by vital

  4. Radar micro-doppler signatures processing and applications

    CERN Document Server

    Chen, Victor C; Miceli, William J

    2014-01-01

    Radar Micro-Doppler Signatures: Processing and applications concentrates on the processing and application of radar micro-Doppler signatures in real world situations, providing readers with a good working knowledge on a variety of applications of radar micro-Doppler signatures.

  5. A distributed authentication and authorization scheme for in-network big data sharing

    Directory of Open Access Journals (Sweden)

    Ruidong Li

    2017-11-01

    Full Text Available Big data has a strong demand for a network infrastructure with the capability to support data sharing and retrieval efficiently. Information-centric networking (ICN is an emerging approach to satisfy this demand, where big data is cached ubiquitously in the network and retrieved using data names. However, existing authentication and authorization schemes rely mostly on centralized servers to provide certification and mediation services for data retrieval. This causes considerable traffic overhead for the secure distributed sharing of data. To solve this problem, we employ identity-based cryptography (IBC to propose a Distributed Authentication and Authorization Scheme (DAAS, where an identity-based signature (IBS is used to achieve distributed verifications of the identities of publishers and users. Moreover, Ciphertext-Policy Attribute-based encryption (CP-ABE is used to enable the distributed and fine-grained authorization. DAAS consists of three phases: initialization, secure data publication, and secure data retrieval, which seamlessly integrate authentication and authorization with the interest/data communication paradigm in ICN. In particular, we propose trustworthy registration and Network Operator and Authority Manifest (NOAM dissemination to provide initial secure registration and enable efficient authentication for global data retrieval. Meanwhile, Attribute Manifest (AM distribution coupled with automatic attribute update is proposed to reduce the cost of attribute retrieval. We examine the performance of the proposed DAAS, which shows that it can achieve a lower bandwidth cost than existing schemes.

  6. Gearbox Fault Features Extraction Using Vibration Measurements and Novel Adaptive Filtering Scheme

    Directory of Open Access Journals (Sweden)

    Ghalib R. Ibrahim

    2012-01-01

    Full Text Available Vibration signals measured from a gearbox are complex multicomponent signals, generated by tooth meshing, gear shaft rotation, gearbox resonance vibration signatures, and a substantial amount of noise. This paper presents a novel scheme for extracting gearbox fault features using adaptive filtering techniques for enhancing condition features, meshing frequency sidebands. A modified least mean square (LMS algorithm is examined and validated using only one accelerometer, instead of using two accelerometers in traditional arrangement, as the main signal and a desired signal is artificially generated from the measured shaft speed and gear meshing frequencies. The proposed scheme is applied to a signal simulated from gearbox frequencies with a numerous values of step size. Findings confirm that 10−5 step size invariably produces more accurate results and there has been a substantial improvement in signal clarity (better signal-to-noise ratio, which makes meshing frequency sidebands more discernible. The developed scheme is validated via a number of experiments carried out using two-stage helical gearbox for a healthy pair of gears and a pair suffering from a tooth breakage with severity fault 1 (25% tooth removal and fault 2 (50% tooth removal under loads (0%, and 80% of the total load. The experimental results show remarkable improvements and enhance gear condition features. This paper illustrates that the new approach offers a more effective way to detect early faults.

  7. Testing New Proxies for Photosymbiosis in the Fossil Record

    Science.gov (United States)

    Tornabene, C.; Martindale, R. C.; Schaller, M. F.

    2015-12-01

    Photosymbiosis is a mutualistic relationship that many corals have developed with dinoflagellates called zooxanthellae. The dinoflagellates, of the genus Symbiodinium, photosynthesize and provide corals with most of their energy, while in turn coral hosts live in waters where zooxanthellae have optimal exposure to sunlight. Thanks to this relationship, symbiotic corals calcify faster than non-symbiotic corals. Photosymbiosis is therefore considered the evolutionary innovation that allowed corals to become major reef-builders through geological time.This relationship is extremely difficult to study. Zooxanthellae, which are housed in the coral tissue, are not preserved in fossil coral skeletons, thus determining whether corals had symbionts requires a robust proxy. In order to address this critical question, the goal of this research is to test new proxies for ancient photosymbiosis. Currently the project is focused on assessing the nitrogen (δ15N) isotopes of corals' organic matrices, sensu Muscatine et al. (2005), as well as carbon and oxygen (δ13C, δ18O) isotopes of fossil coral skeletons. Samples from Modern, Pleistocene, Oligocene and Triassic coral skeletons were analyzed to test the validity of these proxies. Coral samples comprise both (interpreted) symbiotic and non-symbiotic fossil corals from the Oligocene and Triassic as well as symbiotic fossil corals from the Modern and Pleistocene to corroborate our findings with the results of Muscatine et al. (2005). Samples were tested for diagenesis through petrographic and scanning electron microscope (SEM) analyses to avoid contamination. Additionally, a novel technique that has not yet been applied to the fossil record was tested. The technique aims to recognize dinosterol, a dinoflagellate biomarker, in both modern and fossil coral samples. The premise of this proxy is that symbiotic corals should contain the dinoflagellate biomarker, whereas those lacking symbionts should lack dinosterol. Results from this

  8. Shareholder Activism through Proxy Proposals : The European Perspective

    NARCIS (Netherlands)

    Cziraki, P.; Renneboog, L.D.R.; Szilagyi, P.G.

    2009-01-01

    This paper is the first to investigate the corporate governance role of shareholderinitiated proxy proposals in European firms. While proposals in the US are nonbinding even if they pass the shareholder vote, they are legally binding in the UK and most of Continental Europe. Nonetheless, submissions

  9. Physics Signatures at CLIC

    CERN Document Server

    Battaglia, Marco

    2001-01-01

    A set of signatures for physics processes of potential interests for the CLIC programme at = 1 - 5 TeV are discussed. These signatures, that may correspond to the manifestation of different scenarios of new physics as well as to Standard Model precision tests, are proposed as benchmarks for the optimisation of the CLIC accelerator parameters and for a first definition of the required detector response.

  10. Validation of a proxy for estrogen receptor status in breast cancer patients using dispensing data.

    Science.gov (United States)

    Srasuebkul, Preeyaporn; Dobbins, Timothy A; Pearson, Sallie-Anne

    2014-06-01

    To assess the performance of a proxy for estrogen receptor (ER) status in breast cancer patients using dispensing data. We derived our proxy using 167 patients. ER+ patients had evidence of at least one dispensing record for hormone therapy during the lookback period, irrespective of diagnosis date and ER- had no dispensing records for hormone therapy during the period. We validated the proxy against our gold standard, ER status from pathology reports or medical records. We assessed the proxy's performance using three lookback periods: 4.5 years, 2 years, 1 year. More than half of our cohort (62%) were >50 years, 54% had stage III/IV breast cancer at recruitment, (46%) were diagnosed with breast cancer in 2009 and 23% were diagnosed before 2006. Sensitivity and specificity were high for the 4.5 year lookback period (93%, 95% CI: 86-96%; and 95%: 83-99%), respectively) and remained high for the 2-year lookback period (91%: 84-95%; and 95%: 83-99%). Sensitivity decreased (83%: 75.2-89%) but specificity remained high (95%: 83-99%) using the 1-year lookback period and the period is long enough to allow sufficient time for hormone therapy to be dispensed. Our proxy accurately infers ER status in studies of breast cancer treatment based on secondary health data. The proxy is most robust with a minimum lookback period of 2 years. © 2012 Wiley Publishing Asia Pty Ltd.

  11. Harvard Law School Proxy Access Roundtable

    OpenAIRE

    Bebchuk, Lucian Arye; Hirst, Scott

    2010-01-01

    This paper contains the proceedings of the Proxy Access Roundtable that was held by the Harvard Law School Program on Corporate Governance on October 7, 2009. The Roundtable brought together prominent participants in the debate - representing a range of perspectives and experiences - for a day of discussion on the subject. The day’s first two sessions focused on the question of whether the Securities and Exchange Commission should provide an access regime, or whether it should leave the adopt...

  12. Proxy decision making and dementia: Using Construal Level Theory to analyse the thoughts of decision makers.

    Science.gov (United States)

    Convey, Helen; Holt, Janet; Summers, Barbara

    2018-03-08

    This study explored the feasibility of using Construal Level Theory to analyse proxy decision maker thinking about a hypothetical ethical dilemma, relating to a person who has dementia. Proxy decision makers make decisions on behalf of individuals who are living with dementia when dementia affects that individual's decision making ability. Ethical dilemmas arise because there is a need to balance the individual's past and contemporary values and views. Understanding of how proxy decision makers respond is incomplete. Construal Level Theory contends that individuals imagine reactions and make predications about the future by crossing psychological distance. This involves abstract thinking, giving meaning to decisions. There is no empirical evidence of Construal Level Theory being used to analyse proxy decision maker thinking. Exploring the feasibility of using Construal Level Theory to understand dementia carer thinking regarding proxy decisions may provide insights which inform the support given. Descriptive qualitative research with semi-structured interviews. Seven participants were interviewed using a hypothetical dementia care scenario in February 2016. Interview transcripts were analysed for themes. Construal Level Theory was applied to analyse participant responses within themes using the Linguistic Category Model. Participants travelled across psychological distance, using abstract thinking to clarify goals and provide a basis for decisions. When thinking concretely participants established boundaries regarding the ethical dilemma. Construal Level Theory gives insight into proxy decision maker thinking and the levels of abstraction used. Understanding what dementia carers think about when making proxy decisions may help nurses to understand their perspectives and to provide appropriate support. © 2018 John Wiley & Sons Ltd.

  13. Follow up of a robust meta-signature to identify Zika virus infection in Aedes aegypti: another brick in the wall

    Directory of Open Access Journals (Sweden)

    Eduardo Fukutani

    2018-05-01

    Full Text Available The mosquito Aedes aegypti is the main vector of several arthropod-borne diseases that have global impacts. In a previous meta-analysis, our group identified a vector gene set containing 110 genes strongly associated with infections of dengue, West Nile and yellow fever viruses. Of these 110 genes, four genes allowed a highly accurate classification of infected status. More recently, a new study of Ae. aegypti infected with Zika virus (ZIKV was published, providing new data to investigate whether this “infection” gene set is also altered during a ZIKV infection. Our hypothesis is that the infection-associated signature may also serve as a proxy to classify the ZIKV infection in the vector. Raw data associated with the NCBI/BioProject were downloaded and re-analysed. A total of 18 paired-end replicates corresponding to three ZIKV-infected samples and three controls were included in this study. The nMDS technique with a logistic regression was used to obtain the probabilities of belonging to a given class. Thus, to compare both gene sets, we used the area under the curve and performed a comparison using the bootstrap method. Our meta-signature was able to separate the infected mosquitoes from the controls with good predictive power to classify the Zika-infected mosquitoes.

  14. Follow up of a robust meta-signature to identify Zika virus infection in Aedes aegypti: another brick in the wall.

    Science.gov (United States)

    Fukutani, Eduardo; Rodrigues, Moreno; Kasprzykowski, José Irahe; Araujo, Cintia Figueiredo de; Paschoal, Alexandre Rossi; Ramos, Pablo Ivan Pereira; Fukutani, Kiyoshi Ferreira; Queiroz, Artur Trancoso Lopo de

    2018-01-01

    The mosquito Aedes aegypti is the main vector of several arthropod-borne diseases that have global impacts. In a previous meta-analysis, our group identified a vector gene set containing 110 genes strongly associated with infections of dengue, West Nile and yellow fever viruses. Of these 110 genes, four genes allowed a highly accurate classification of infected status. More recently, a new study of Ae. aegypti infected with Zika virus (ZIKV) was published, providing new data to investigate whether this "infection" gene set is also altered during a ZIKV infection. Our hypothesis is that the infection-associated signature may also serve as a proxy to classify the ZIKV infection in the vector. Raw data associated with the NCBI/BioProject were downloaded and re-analysed. A total of 18 paired-end replicates corresponding to three ZIKV-infected samples and three controls were included in this study. The nMDS technique with a logistic regression was used to obtain the probabilities of belonging to a given class. Thus, to compare both gene sets, we used the area under the curve and performed a comparison using the bootstrap method. Our meta-signature was able to separate the infected mosquitoes from the controls with good predictive power to classify the Zika-infected mosquitoes.

  15. Genome signature analysis of thermal virus metagenomes reveals Archaea and thermophilic signatures

    Directory of Open Access Journals (Sweden)

    Pride David T

    2008-09-01

    Full Text Available Abstract Background Metagenomic analysis provides a rich source of biological information for otherwise intractable viral communities. However, study of viral metagenomes has been hampered by its nearly complete reliance on BLAST algorithms for identification of DNA sequences. We sought to develop algorithms for examination of viral metagenomes to identify the origin of sequences independent of BLAST algorithms. We chose viral metagenomes obtained from two hot springs, Bear Paw and Octopus, in Yellowstone National Park, as they represent simple microbial populations where comparatively large contigs were obtained. Thermal spring metagenomes have high proportions of sequences without significant Genbank homology, which has hampered identification of viruses and their linkage with hosts. To analyze each metagenome, we developed a method to classify DNA fragments using genome signature-based phylogenetic classification (GSPC, where metagenomic fragments are compared to a database of oligonucleotide signatures for all previously sequenced Bacteria, Archaea, and viruses. Results From both Bear Paw and Octopus hot springs, each assembled contig had more similarity to other metagenome contigs than to any sequenced microbial genome based on GSPC analysis, suggesting a genome signature common to each of these extreme environments. While viral metagenomes from Bear Paw and Octopus share some similarity, the genome signatures from each locale are largely unique. GSPC using a microbial database predicts most of the Octopus metagenome has archaeal signatures, while bacterial signatures predominate in Bear Paw; a finding consistent with those of Genbank BLAST. When using a viral database, the majority of the Octopus metagenome is predicted to belong to archaeal virus Families Globuloviridae and Fuselloviridae, while none of the Bear Paw metagenome is predicted to belong to archaeal viruses. As expected, when microbial and viral databases are combined, each of

  16. 48 CFR 204.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Contracting officer's signature. 204.101 Section 204.101 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS... officer's signature. Follow the procedures at PGI 204.101 for signature of contract documents. [71 FR 9268...

  17. Extreme flood event reconstruction spanning the last century in the El Bibane Lagoon (southeastern Tunisia: a multi-proxy approach

    Directory of Open Access Journals (Sweden)

    A. Affouri

    2017-06-01

    Full Text Available Climate models project that rising atmospheric carbon dioxide concentrations will increase the frequency and the severity of some extreme weather events. The flood events represent a major risk for populations and infrastructures settled on coastal lowlands. Recent studies of lagoon sediments have enhanced our knowledge on extreme hydrological events such as palaeo-storms and on their relation with climate change over the last millennium. However, few studies have been undertaken to reconstruct past flood events from lagoon sediments. Here, the past flood activity was investigated using a multi-proxy approach combining sedimentological and geochemical analysis of surfaces sediments from a southeastern Tunisian catchment in order to trace the origin of sediment deposits in the El Bibane Lagoon. Three sediment sources were identified: marine, fluvial and aeolian. When applying this multi-proxy approach on core BL12-10, recovered from the El Bibane Lagoon, we can see that finer material, a high content of the clay and silt, and a high content of the elemental ratios (Fe ∕ Ca and Ti ∕ Ca characterise the sedimentological signature of the palaeo-flood levels identified in the lagoonal sequence. For the last century, which is the period covered by the BL12-10 short core, three palaeo-flood events were identified. The age of these flood events have been determined by 210Pb and 137Cs chronology and give ages of AD 1995 ± 6, 1970 ± 9 and 1945 ± 9. These results show a good temporal correlation with historical flood events recorded in southern Tunisia in the last century (AD 1932, 1969, 1979 and 1995. Our finding suggests that reconstruction of the history of the hydrological extreme events during the upper Holocene is possible in this location through the use of the sedimentary archives.

  18. Can specific transcriptional regulators assemble a universal cancer signature?

    Science.gov (United States)

    Roy, Janine; Isik, Zerrin; Pilarsky, Christian; Schroeder, Michael

    2013-10-01

    Recently, there is a lot of interest in using biomarker signatures derived from gene expression data to predict cancer progression. We assembled signatures of 25 published datasets covering 13 types of cancers. How do these signatures compare with each other? On one hand signatures answering the same biological question should overlap, whereas signatures predicting different cancer types should differ. On the other hand, there could also be a Universal Cancer Signature that is predictive independently of the cancer type. Initially, we generate signatures for all datasets using classical approaches such as t-test and fold change and then, we explore signatures resulting from a network-based method, that applies the random surfer model of Google's PageRank algorithm. We show that the signatures as published by the authors and the signatures generated with classical methods do not overlap - not even for the same cancer type - whereas the network-based signatures strongly overlap. Selecting 10 out of 37 universal cancer genes gives the optimal prediction for all cancers thus taking a first step towards a Universal Cancer Signature. We furthermore analyze and discuss the involved genes in terms of the Hallmarks of cancer and in particular single out SP1, JUN/FOS and NFKB1 and examine their specific role in cancer progression.

  19. 36 CFR 1150.22 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Signature of documents. 1150.22 Section 1150.22 Parks, Forests, and Public Property ARCHITECTURAL AND TRANSPORTATION BARRIERS... Documents for Proceedings on Citations § 1150.22 Signature of documents. The signature of a party...

  20. A New Proxy Measurement Algorithm with Application to the Estimation of Vertical Ground Reaction Forces Using Wearable Sensors.

    Science.gov (United States)

    Guo, Yuzhu; Storm, Fabio; Zhao, Yifan; Billings, Stephen A; Pavic, Aleksandar; Mazzà, Claudia; Guo, Ling-Zhong

    2017-09-22

    Measurement of the ground reaction forces (GRF) during walking is typically limited to laboratory settings, and only short observations using wearable pressure insoles have been reported so far. In this study, a new proxy measurement method is proposed to estimate the vertical component of the GRF (vGRF) from wearable accelerometer signals. The accelerations are used as the proxy variable. An orthogonal forward regression algorithm (OFR) is employed to identify the dynamic relationships between the proxy variables and the measured vGRF using pressure-sensing insoles. The obtained model, which represents the connection between the proxy variable and the vGRF, is then used to predict the latter. The results have been validated using pressure insoles data collected from nine healthy individuals under two outdoor walking tasks in non-laboratory settings. The results show that the vGRFs can be reconstructed with high accuracy (with an average prediction error of less than 5.0%) using only one wearable sensor mounted at the waist (L5, fifth lumbar vertebra). Proxy measures with different sensor positions are also discussed. Results show that the waist acceleration-based proxy measurement is more stable with less inter-task and inter-subject variability than the proxy measures based on forehead level accelerations. The proposed proxy measure provides a promising low-cost method for monitoring ground reaction forces in real-life settings and introduces a novel generic approach for replacing the direct determination of difficult to measure variables in many applications.

  1. A New Proxy Measurement Algorithm with Application to the Estimation of Vertical Ground Reaction Forces Using Wearable Sensors

    Directory of Open Access Journals (Sweden)

    Yuzhu Guo

    2017-09-01

    Full Text Available Measurement of the ground reaction forces (GRF during walking is typically limited to laboratory settings, and only short observations using wearable pressure insoles have been reported so far. In this study, a new proxy measurement method is proposed to estimate the vertical component of the GRF (vGRF from wearable accelerometer signals. The accelerations are used as the proxy variable. An orthogonal forward regression algorithm (OFR is employed to identify the dynamic relationships between the proxy variables and the measured vGRF using pressure-sensing insoles. The obtained model, which represents the connection between the proxy variable and the vGRF, is then used to predict the latter. The results have been validated using pressure insoles data collected from nine healthy individuals under two outdoor walking tasks in non-laboratory settings. The results show that the vGRFs can be reconstructed with high accuracy (with an average prediction error of less than 5.0% using only one wearable sensor mounted at the waist (L5, fifth lumbar vertebra. Proxy measures with different sensor positions are also discussed. Results show that the waist acceleration-based proxy measurement is more stable with less inter-task and inter-subject variability than the proxy measures based on forehead level accelerations. The proposed proxy measure provides a promising low-cost method for monitoring ground reaction forces in real-life settings and introduces a novel generic approach for replacing the direct determination of difficult to measure variables in many applications.

  2. Heinrich event 4 characterized by terrestrial proxies in southwestern Europe

    Directory of Open Access Journals (Sweden)

    J. M. López-García

    2013-05-01

    Full Text Available Heinrich event 4 (H4 is well documented in the North Atlantic Ocean as a cooling event that occurred between 39 and 40 Ka. Deep-sea cores around the Iberian Peninsula coastline have been analysed to characterize the H4 event, but there are no data on the terrestrial response to this event. Here we present for the first time an analysis of terrestrial proxies for characterizing the H4 event, using the small-vertebrate assemblage (comprising small mammals, squamates and amphibians from Terrassa Riera dels Canyars, an archaeo-palaeontological deposit located on the seaboard of the northeastern Iberian Peninsula. This assemblage shows that the H4 event is characterized in northeastern Iberia by harsher and drier terrestrial conditions than today. Our results were compared with other proxies such as pollen, charcoal, phytolith, avifauna and large-mammal data available for this site, as well as with the general H4 event fluctuations and with other sites where H4 and the previous and subsequent Heinrich events (H5 and H3 have been detected in the Mediterranean and Atlantic regions of the Iberian Peninsula. We conclude that the terrestrial proxies follow the same patterns as the climatic and environmental conditions detected by the deep-sea cores at the Iberian margins.

  3. MUNCHAUSEN SYNDROME BY PROXY IN PEDIATRIC DENTISTRY: MYTH OR REALITY?

    Directory of Open Access Journals (Sweden)

    Veronica PINTILICIUC-ŞERBAN

    2017-06-01

    Full Text Available Background and aims: Munchausen syndrome by proxy is a condition traditionally comprising physical and mental abuse and medical neglect as a form of psychogenic maltreatment of the child, secondary to fabrication of a pediatric illness by the parent or guardian. The aim of our paper is to assess whether such condition occurs in current pediatric dental practice and to evidence certain situations in which the pediatric dentist should suspect this form of child abuse. Problem statement: Munchausen syndrome by proxy in pediatric dentistry may lead to serious chronic disabilities of the abused or neglected child, being one of the causes of treatment failure. Discussion: Prompt detection of such condition should be regarded as one of the duties of the practitioner who should be trained to report the suspected cases to the governmental child protective agencies. This should be regarded as a form of child abuse and neglect, and the responsible caregiver could be held liable when such wrongful actions cause harm or endanger child’s welfare. Conclusion: Munchausen syndrome by proxy should be regarded as a reality in current pediatric dental practice and dental teams should be trained to properly recognize, assess and manage such complex situations.

  4. PROXY-BASED PATCHING STREAM TRANSMISSION STRATEGY IN MOBILE STREAMING MEDIA SYSTEM

    Institute of Scientific and Technical Information of China (English)

    Liao Jianxin; Lei Zhengxiong; Ma Xutao; Zhu Xiaomin

    2006-01-01

    A mobile transmission strategy, PMPatching (Proxy-based Mobile Patching) transmission strategy is proposed, it applies to the proxy-based mobile streaming media system in Wideband Code Division Multiple Access (WCDMA) network. Performance of the whole system can be improved by using patching stream to transmit anterior part of the suffix that had been played back, and by batching all the demands for the suffix arrived in prefix period and patching stream transmission threshold period. Experimental results show that this strategy can efficiently reduce average network transmission cost and number of channels consumed in central streaming media server.

  5. 17 CFR 201.65 - Identity and signature.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Identity and signature. 201.65... of 1934 § 201.65 Identity and signature. Applications pursuant to this subpart may omit the identity, mailing address, and signature of the applicant; provided, that such identity, mailing address and...

  6. 15 CFR 908.16 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Signature. 908.16 Section 908.16 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) NATIONAL OCEANIC... SUBMITTING REPORTS ON WEATHER MODIFICATION ACTIVITIES § 908.16 Signature. All reports filed with the National...

  7. An Authenticated Key Agreement Scheme Based on Cyclic Automorphism Subgroups of Random Orders

    Directory of Open Access Journals (Sweden)

    Yang Jun

    2017-01-01

    Full Text Available Group-based cryptography is viewed as a modern cryptographic candidate solution to blocking quantum computer attacks, and key exchange protocols on the Internet are one of the primitives to ensure the security of communication. In 2016 Habeeb et al proposed a “textbook” key exchange protocol based on the semidirect product of two groups, which is insecure for use in real-world applications. In this paper, after discarding the unnecessary disguising notion of semidirect product in the protocol, we establish a simplified yet enhanced authenticated key agreement scheme based on cyclic automorphism subgroups of random orders by making hybrid use of certificates and symmetric-key encryption as challenge-and-responses in the public-key setting. Its passive security is formally analyzed, which is relative to the cryptographic hardness assumption of a computational number-theoretic problem. Cryptanalysis of this scheme shows that it is secure against the intruder-in-the-middle attack even in the worst case of compromising the signatures, and provides explicit key confirmation to both parties.

  8. Data Cleaning Methods for Client and Proxy Logs

    NARCIS (Netherlands)

    Weinreich, H.; Obendorf, H.; Herder, E.; Edmonds, A.; Hawkey, K.; Kellar, M.; Turnbull, D.

    2006-01-01

    In this paper we present our experiences with the cleaning of Web client and proxy usage logs, based on a long-term browsing study with 25 participants. A detailed clickstream log, recorded using a Web intermediary, was combined with a second log of user interface actions, which was captured by a

  9. Munchausen Syndrome by Proxy (MSBP): An Intergenerational Perspective.

    Science.gov (United States)

    Rappaport, Sol R.; Hochstadt, Neil J.

    1993-01-01

    Presents new information about Munchausen Syndrome by Proxy (MSBP), factitious disorder in which caretaker may induce or exaggerate medical illness in his or her child that may lead to illness and even death. Provides psychosocial history of caregiver using intergenerational model. Presents case of MSBP involving three siblings and information…

  10. Improving the Authentication Scheme and Access Control Protocol for VANETs

    Directory of Open Access Journals (Sweden)

    Wei-Chen Wu

    2014-11-01

    Full Text Available Privacy and security are very important in vehicular ad hoc networks (VANETs. VANETs are negatively affected by any malicious user’s behaviors, such as bogus information and replay attacks on the disseminated messages. Among various security threats, privacy preservation is one of the new challenges of protecting users’ private information. Existing authentication protocols to secure VANETs raise challenges, such as certificate distribution and reduction of the strong reliance on tamper-proof devices. In 2011, Yeh et al. proposed a PAACP: a portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks. However, PAACP in the authorization phase is breakable and cannot maintain privacy in VANETs. In this paper, we present a cryptanalysis of an attachable blind signature and demonstrate that the PAACP’s authorized credential (AC is not secure and private, even if the AC is secretly stored in a tamper-proof device. An eavesdropper can construct an AC from an intercepted blind document. Any eavesdropper can determine who has which access privileges to access which service. For this reason, this paper copes with these challenges and proposes an efficient scheme. We conclude that an improving authentication scheme and access control protocol for VANETs not only resolves the problems that have appeared, but also is more secure and efficient.

  11. Methodological Considerations in Couples' Fertility Intentions: Missing Men and the Viability of Women's Proxy Reports.

    Science.gov (United States)

    Stykes, J Bart

    2018-02-19

    Introduction Recent efforts show potential to advance research on unintended childbearing by taking a couple-level approach. However, this work has neither adequately addressed methodological concerns stemming from the challenges associated with male fertility data nor considered the viability of women's proxy reports of fathers intentions. Methods Data from the Early Childhood Longitudinal Study, Birth Cohort (ECLS-B) were used to assess the implications of low response rates among men on couples' unintended childbearing. Then, the accuracy of women's proxy reports of fathers intentions was assessed. Weighted logistic regression analyses were conducted to determine how women's characteristics were associated with men's survey participation whereas weighted multinomial logistic regression analyses were applied to determine how women's characteristics were linked with the accuracy of her proxy report. Results Almost half (46%) of women cannot be matched with data from the child's father, and this discrepancy is most problematic for women who are black, foreign-born, less educated, and unmarried at birth. Women's proxy reports appear viable as 75% of women's reports are consistent with men's responses. Yet, proxy reports underestimate disagreement in couples' intentions as mothers who intended the birth are at an increased risk of "inaccurately" reporting that fathers share their intentions. Discussion Direct approaches to couples' intentions yield privileged samples and systematically omit women at the greatest risk of an unintended birth. However, proxies underestimate disagreement in couples' intentions-a key contribution to the couple approach. Accordingly each approach has its own merits which must be considered in light of specified research questions.

  12. 34 CFR 101.32 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Signature of documents. 101.32 Section 101.32 Education Regulations of the Offices of the Department of Education OFFICE FOR CIVIL RIGHTS, DEPARTMENT OF EDUCATION... Documents § 101.32 Signature of documents. The signature of a party, authorized officer, employee or...

  13. 29 CFR 102.116 - Signature of orders.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 2 2010-07-01 2010-07-01 false Signature of orders. 102.116 Section 102.116 Labor Regulations Relating to Labor NATIONAL LABOR RELATIONS BOARD RULES AND REGULATIONS, SERIES 8 Certification and Signature of Documents § 102.116 Signature of orders. The executive secretary or the associate executive...

  14. Application of blocking diagnosis methods to general circulation models. Part I: a novel detection scheme

    Energy Technology Data Exchange (ETDEWEB)

    Barriopedro, D. [Universidade de Lisboa, CGUL-IDL, Faculdade de Ciencias, Ed. C-8, Lisbon (Portugal); Universidad de Extremadura, Departamento de Fisica, Facultad de Ciencias, Badajoz (Spain); Garcia-Herrera, R. [Universidad Complutense de Madrid, Departamento de Fisica de la Tierra II, Facultad de C.C. Fisicas, Madrid (Spain); Trigo, R.M. [Universidade de Lisboa, CGUL-IDL, Faculdade de Ciencias, Ed. C-8, Lisbon (Portugal)

    2010-12-15

    This paper aims to provide a new blocking definition with applicability to observations and model simulations. An updated review of previous blocking detection indices is provided and some of their implications and caveats discussed. A novel blocking index is proposed by reconciling two traditional approaches based on anomaly and absolute flows. Blocks are considered from a complementary perspective as a signature in the anomalous height field capable of reversing the meridional jet-based height gradient in the total flow. The method succeeds in identifying 2-D persistent anomalies associated to a weather regime in the total flow with blockage of the westerlies. The new index accounts for the duration, intensity, extension, propagation, and spatial structure of a blocking event. In spite of its increased complexity, the detection efficiency of the method is improved without hampering the computational time. Furthermore, some misleading identification problems and artificial assumptions resulting from previous single blocking indices are avoided with the new approach. The characteristics of blocking for 40 years of reanalysis (1950-1989) over the Northern Hemisphere are described from the perspective of the new definition and compared to those resulting from two standard blocking indices and different critical thresholds. As compared to single approaches, the novel index shows a better agreement with reported proxies of blocking activity, namely climatological regions of simultaneous wave amplification and maximum band-pass filtered height standard deviation. An additional asset of the method is its adaptability to different data sets. As critical thresholds are specific of the data set employed, the method is useful for observations and model simulations of different resolutions, temporal lengths and time variant basic states, optimizing its value as a tool for model validation. Special attention has been paid on the devise of an objective scheme easily applicable

  15. On signature change in p-adic space-times

    International Nuclear Information System (INIS)

    Dragovic, B.G.

    1991-01-01

    Change of signature by linear coordinate transformations in p-adic space-times is considered. In this paper it is shown that there exists arbitrary change of trivial signature in Q p n for all n ≥ 1 if p ≡ 1 (mod 4). In other cases it is possible to change only even number of the signs of the signature. The authors suggest new concept of signature with respect to distinct quadratic extensions, of Q p . If space-time dimension is restricted to four there is no signature change

  16. Munchausen Syndrome by Proxy: Unusual Manifestations and Disturbing Sequelae.

    Science.gov (United States)

    Porter, Gerald E.; And Others

    1994-01-01

    This study documents previously unreported findings in cases of Munchausen Syndrome by Proxy (in which a mother fabricates an illness in her child). In the reported case, esophageal perforation, retrograde intussusception, tooth loss, and bradycardia were found. (Author/DB)

  17. Signature Curves Statistics of DNA Supercoils

    OpenAIRE

    Shakiban, Cheri; Lloyd, Peter

    2004-01-01

    In this paper we describe the Euclidean signature curves for two dimensional closed curves in the plane and their generalization to closed space curves. The focus will be on discrete numerical methods for approximating such curves. Further we will apply these numerical methods to plot the signature curves related to three-dimensional simulated DNA supercoils. Our primary focus will be on statistical analysis of the data generated for the signature curves of the supercoils. We will try to esta...

  18. Shifty: A Weight-Shifting Dynamic Passive Haptic Proxy to Enhance Object Perception in Virtual Reality.

    Science.gov (United States)

    Zenner, Andre; Kruger, Antonio

    2017-04-01

    We define the concept of Dynamic Passive Haptic Feedback (DPHF) for virtual reality by introducing the weight-shifting physical DPHF proxy object Shifty. This concept combines actuators known from active haptics and physical proxies known from passive haptics to construct proxies that automatically adapt their passive haptic feedback. We describe the concept behind our ungrounded weight-shifting DPHF proxy Shifty and the implementation of our prototype. We then investigate how Shifty can, by automatically changing its internal weight distribution, enhance the user's perception of virtual objects interacted with in two experiments. In a first experiment, we show that Shifty can enhance the perception of virtual objects changing in shape, especially in length and thickness. Here, Shifty was shown to increase the user's fun and perceived realism significantly, compared to an equivalent passive haptic proxy. In a second experiment, Shifty is used to pick up virtual objects of different virtual weights. The results show that Shifty enhances the perception of weight and thus the perceived realism by adapting its kinesthetic feedback to the picked-up virtual object. In the same experiment, we additionally show that specific combinations of haptic, visual and auditory feedback during the pick-up interaction help to compensate for visual-haptic mismatch perceived during the shifting process.

  19. Evaluation of the convergence between "self-reporters" and "proxies" in a disability questionnaire by means of behaviour coding method

    NARCIS (Netherlands)

    Benitez Baena, Isabel; Padilla Garcia, Jose Luis; Ongena, Yfke

    Household surveys often require including proxy reporters to obtain information about other household members who cannot be interviewed. The participation of proxies can undermine survey data quality due to the fact that proxies must respond to questions thinking about other people. The objectives

  20. Parent proxy-reported quality of life for children with cerebral palsy: is it related to parental psychosocial distress?

    Science.gov (United States)

    Davis, E; Mackinnon, A; Waters, E

    2012-07-01

    Parent-proxy reports of quality of life (QOL) are often used to guide decisions about children with cerebral palsy (CP), although little is known about the factors that influence parent-proxy reports. The aim of this study was to examine (i) the relationship between parental psychosocial distress and parent proxy-reported QOL; and (ii) whether parental psychosocial distress mediates the relationship between child impairment and proxy-reported QOL. A sample of 201 primary caregivers of children aged 4-12 years with CP completed the Cerebral Palsy Quality of Life Questionnaire for Children, a condition-specific QOL instrument, and a measure of psychosocial distress, the Kessler 10. The children, evenly distributed by gender (56% male) were sampled across Gross Motor Function Classification System levels (Level I = 18%, II = 28%, III = 14%, IV = 11%, V = 27%). Consistent with the hypotheses, parental distress was negatively correlated with all domains of parent proxy-reported QOL (r = -0.18 to r = -0.55). The relationship between impairment and proxy-reported QOL was mediated by parental distress for five of the seven domains of QOL (social well-being and acceptance, feelings about functioning, participation and physical health, emotional well-being and self-esteem, and pain and impact of disability). Child impairment did not predict access to services or family health. This is the first study that assesses the relationship between parental distress and proxy-reported QOL for children with CP. Although the cross-sectional nature of the available data precludes any statements of causality, the results suggest that, when using parent proxy, the parents' psychological state should also be measured. This is particularly important when, as is often the case for child disability research, proxy-reported QOL are the only available data. © 2011 Blackwell Publishing Ltd.

  1. 45 CFR 81.32 - Signature of documents.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Signature of documents. 81.32 Section 81.32 Public... UNDER PART 80 OF THIS TITLE Form, Execution, Service and Filing of Documents § 81.32 Signature of documents. The signature of a party, authorized officer, employee or attorney constitutes a certificate that...

  2. Modeling the lexical morphology of Western handwritten signatures.

    Directory of Open Access Journals (Sweden)

    Moises Diaz-Cabrera

    Full Text Available A handwritten signature is the final response to a complex cognitive and neuromuscular process which is the result of the learning process. Because of the many factors involved in signing, it is possible to study the signature from many points of view: graphologists, forensic experts, neurologists and computer vision experts have all examined them. Researchers study written signatures for psychiatric, penal, health and automatic verification purposes. As a potentially useful, multi-purpose study, this paper is focused on the lexical morphology of handwritten signatures. This we understand to mean the identification, analysis, and description of the signature structures of a given signer. In this work we analyze different public datasets involving 1533 signers from different Western geographical areas. Some relevant characteristics of signature lexical morphology have been selected, examined in terms of their probability distribution functions and modeled through a General Extreme Value distribution. This study suggests some useful models for multi-disciplinary sciences which depend on handwriting signatures.

  3. Simple proxies for estimating the concentrations of monoterpenes and their oxidation products at a boreal forest site

    Directory of Open Access Journals (Sweden)

    J. Kontkanen

    2016-10-01

    Full Text Available The oxidation products of monoterpenes likely have a crucial role in the formation and growth of aerosol particles in boreal forests. However, the continuous measurements of monoterpene concentrations are usually not available on decadal timescales, and the direct measurements of the concentrations of monoterpene oxidation product have so far been scarce. In this study we developed proxies for the concentrations of monoterpenes and their oxidation products at a boreal forest site in Hyytiälä, southern Finland. For deriving the proxies we used the monoterpene concentration measured with a proton transfer reaction mass spectrometer (PTR-MS during 2006–2013. Our proxies for the monoterpene concentration take into account the temperature-controlled emissions from the forest ecosystem, the dilution caused by the mixing within the boundary layer and different oxidation processes. All the versions of our proxies captured the seasonal variation of the monoterpene concentration, the typical proxy-to-measurements ratios being between 0.8 and 1.3 in summer and between 0.6 and 2.6 in winter. In addition, the proxies were able to describe the diurnal variation of the monoterpene concentration rather well, especially in summer months. By utilizing one of the proxies, we calculated the concentration of oxidation products of monoterpenes by considering their production in the oxidation and their loss due to condensation on aerosol particles. The concentration of oxidation products was found to have a clear seasonal cycle, with a maximum in summer and a minimum in winter. The concentration of oxidation products was lowest in the morning or around noon and highest in the evening. In the future, our proxies for the monoterpene concentration and their oxidation products can be used, for example, in the analysis of new particle formation and growth in boreal environments.

  4. Munchausen Syndrome by Proxy: A Study of Psychopathology.

    Science.gov (United States)

    Bools, Christopher; And Others

    1994-01-01

    This study evaluated 100 mothers with Munchausen Syndrome by Proxy (the fabrication of illness by a mother in her child). Approximately half of the mothers had either smothered or poisoned their child as part of their fabrications. Lifetime psychiatric histories were reported for 47 of the mothers. The most notable psychopathology was personality…

  5. Ocean currents generate large footprints in marine palaeoclimate proxies

    NARCIS (Netherlands)

    van Sebille, E.; Scussolini, P.; Durgadoo, J.V.; Peeters, F.J.C.; Biastoch, A.; Weijer, W.; Turney, C.; Paris, C.B.; Zahn, R.

    2015-01-01

    Fossils of marine microorganisms such as planktic foraminifera are among the cornerstones of palaeoclimatological studies. It is often assumed that the proxies derived from their shells represent ocean conditions above the location where they were deposited. Planktic foraminifera, however, are

  6. Deuterium Values from Hydrated Volcanic Glass: A Paleoelevation Proxy for Oregon's Cascade Range

    Science.gov (United States)

    Carlson, T. B.; Bershaw, J. T.; Cassel, E. J.

    2017-12-01

    Deuterium ratios (δD) of hydrated volcanic glass have been used to reconstruct Cenozoic paleoenvironments. However, the reliability and proper sample preparation protocol have been debated. The Cascades are an excellent location to study the validity of hydrated volcanic glass as a paleoelevation proxy for several reasons. Moisture is largely derived from a single oceanic source and falls as orographic precipitation in the Cascades, leading to a characteristic altitude effect, or inverse relationship between elevation and the isotopic composition of meteoric water (δD). Additionally, past studies have inferred uplift of the Cascades since the Miocene based on changing fossil assemblages, tectonic models, and other isotopic proxies including soil carbonates and fossil teeth. In this study, hydrated volcanic ash samples from the lee of the Cascades were rinsed with hydrochloric acid and sonicated before glass shards were hand-selected and analyzed for δD and wt. % water. These preliminary results exhibited δD values becoming enriched with time, a trend opposite of other paleowater proxy studies in the area. A possible explanation for this trend is contamination due to inadequate removal of materials adhered to shard surfaces that can readily exchange with environmental water. Recent research asserts that hydrofluoric acid (HF) etching during sample preparation is necessary to accurately measure δD values of syndepositional water. Volcanic ash samples were reanalyzed after preparation using HF abrasion and heavy liquid separation. The data from these two subsets are interpreted in the context of modern water across the range, as well as other paleowater proxy and geologic studies to determine the implications of volcanic glass as a paleoelevation proxy in the Pacific Northwest.

  7. Signature molecular descriptor : advanced applications.

    Energy Technology Data Exchange (ETDEWEB)

    Visco, Donald Patrick, Jr. (Tennessee Technological University, Cookeville, TN)

    2010-04-01

    In this work we report on the development of the Signature Molecular Descriptor (or Signature) for use in the solution of inverse design problems as well as in highthroughput screening applications. The ultimate goal of using Signature is to identify novel and non-intuitive chemical structures with optimal predicted properties for a given application. We demonstrate this in three studies: green solvent design, glucocorticoid receptor ligand design and the design of inhibitors for Factor XIa. In many areas of engineering, compounds are designed and/or modified in incremental ways which rely upon heuristics or institutional knowledge. Often multiple experiments are performed and the optimal compound is identified in this brute-force fashion. Perhaps a traditional chemical scaffold is identified and movement of a substituent group around a ring constitutes the whole of the design process. Also notably, a chemical being evaluated in one area might demonstrate properties very attractive in another area and serendipity was the mechanism for solution. In contrast to such approaches, computer-aided molecular design (CAMD) looks to encompass both experimental and heuristic-based knowledge into a strategy that will design a molecule on a computer to meet a given target. Depending on the algorithm employed, the molecule which is designed might be quite novel (re: no CAS registration number) and/or non-intuitive relative to what is known about the problem at hand. While CAMD is a fairly recent strategy (dating to the early 1980s), it contains a variety of bottlenecks and limitations which have prevented the technique from garnering more attention in the academic, governmental and industrial institutions. A main reason for this is how the molecules are described in the computer. This step can control how models are developed for the properties of interest on a given problem as well as how to go from an output of the algorithm to an actual chemical structure. This report

  8. DOUBLE DYNAMO SIGNATURES IN A GLOBAL MHD SIMULATION AND MEAN-FIELD DYNAMOS

    Energy Technology Data Exchange (ETDEWEB)

    Beaudoin, Patrice; Simard, Corinne; Cossette, Jean-François; Charbonneau, Paul [Département de Physique, Université de Montréal, C.P. 6128, Succ. Centre-Ville, Montréal, Québec, H3C 3J7 (Canada)

    2016-08-01

    The 11 year solar activity cycle is the most prominent periodic manifestation of the magnetohydrodynamical (MHD) large-scale dynamo operating in the solar interior, yet longer and shorter (quasi-) periodicities are also present. The so-called “quasi-biennial” signal appearing in many proxies of solar activity has been gaining increasing attention since its detection in p -mode frequency shifts, which suggests a subphotospheric origin. A number of candidate mechanisms have been proposed, including beating between co-existing global dynamo modes, dual dynamos operating in spatially separated regions of the solar interior, and Rossby waves driving short-period oscillations in the large-scale solar magnetic field produced by the 11 year activity cycle. In this article, we analyze a global MHD simulation of solar convection producing regular large-scale magnetic cycles, and detect and characterize shorter periodicities developing therein. By constructing kinematic mean-field α {sup 2}Ω dynamo models incorporating the turbulent electromotive force (emf) extracted from that same simulation, we find that dual-dynamo behavior materializes in fairly wide regions of the model’s parameters space. This suggests that the origin of the similar behavior detected in the MHD simulation lies with the joint complexity of the turbulent emf and differential rotation profile, rather that with dynamical interactions such as those mediated by Rossby waves. Analysis of the simulation also reveals that the dual dynamo operating therein leaves a double-period signature in the temperature field, consistent with a dual-period helioseismic signature. Order-of-magnitude estimates for the magnitude of the expected frequency shifts are commensurate with helioseismic measurements. Taken together, our results support the hypothesis that the solar quasi-biennial oscillations are associated with a secondary dynamo process operating in the outer reaches of the solar convection zone.

  9. Ship Signature Management System : Functionality

    NARCIS (Netherlands)

    Arciszewski, H.F.R.; Lier, L. van; Meijer, Y.G.S.; Noordkamp, H.W.; Wassenaar, A.S.

    2010-01-01

    A signature of a platform is the manner in which the platform manifests itself to a certain type of sensor and how observable it is when such a sensor is used to detect the platform. Because many military platforms use sensors in different media, it is the total of its different signatures that

  10. Quercus macrocarpa annual, early- and latewood widths as hydroclimatic proxies, southeastern Saskatchewan, Canada

    International Nuclear Information System (INIS)

    Vanstone, Jessica R; Sauchyn, David J

    2010-01-01

    Fluctuations in size of annual ring-widths of Quercus species suggest that environmental factors influence the size and density of vessels within the ring, either by acting as a limiting factor for growth or through fine tuning of the wood structure to environmental factors. The purpose of this study is to assess the potential of Q. macrocarpa to provide multiple dendroclimatic proxies for the Canadian Prairies, by investigating growth responses of annual, early- and latewood widths to regional climate variability. Results indicate that ring width chronologies, from southeastern Saskatchewan capture regional signals related to moisture and drought conditions. Correlations suggest that late-wood widths are more representative of annual ring-widths, than are early-wood widths, and are the best proxy of seasonal fluctuations in climate. Thus regression models that include latewood widths were able to account for more variance in the Palmer Drought Severity Index (PDSI) than when annual ring-widths are used as the only proxy. This study demonstrates that Q. macrocarpa can provide multiple dendroclimatic proxies for investigating large scale climatic fluctuations at annual and sub-annual time scales. It is novel in terms of sub-annual analysis of tree-rings in a region that previously lacked dendrochronological research.

  11. [Analysis of prevalence of self-reported hearing loss and associated factors: primary versus proxy informant].

    Science.gov (United States)

    Quevedo, André Luis Alves de; Leotti, Vanessa Bielefeldt; Goulart, Bárbara Niegia Garcia de

    2017-07-03

    The objective was to evaluate differences between prevalence rates for self-reported hearing loss and associated factors, obtained from responses by primary and proxy informants in a Population-Based Study on Human Communication Disorders (DCH-POP in Portuguese). This was a study on epidemiological methods using data from a cross-sectional household survey with a sample of 1,253 individuals from Southern Brazil. To verify differences between prevalence rates comparing primary informants and proxy informants, we used the chi-square or Fisher's exact test for categorical variables and Mann-Whitney for continuous variables. The log-binomial model was adjusted for hearing loss as the dependent variable, considering three datasets: the entire sample, only primary informants, and only proxy informants, estimating association by prevalence ratios. In the final models, only the independent variables age and dizziness were associated with hearing loss, independently of the dataset that was used. Proxy informants generally underestimated the prevalence rates for the target outcomes, when compared to primary informants.

  12. Optical Proxies for Terrestrial Dissolved Organic Matter in Estuaries and Coastal Waters

    Directory of Open Access Journals (Sweden)

    Christopher L. Osburn

    2016-01-01

    Full Text Available Optical proxies, especially DOM fluorescence, were used to track terrestrial DOM fluxes through estuaries and coastal waters by comparing models developed for several coastal ecosystems. Key to using optical properties is validating and calibrating them with chemical measurements, such as lignin-derived phenols - a proxy to quantify terrestrial DOM. Utilizing parallel factor analysis (PARAFAC, and comparing models statistically using the OpenFluor database (http://www.openfluor.org we have found common, ubiquitous fluorescing components which correlate most strongly with lignin phenol concentrations in several estuarine and coastal environments. Optical proxies for lignin were computed for the following regions: Mackenzie River Estuary, Atchafalaya River Estuary, Charleston Harbor, Chesapeake Bay, and Neuse River Estuary. The slope of linear regression models relating CDOM absorption at 350 nm (a350 to DOC and to lignin, varied 5 to 10 fold among systems. Where seasonal observations were available from a region, there were distinct seasonal differences in equation parameters for these optical proxies. Despite variability, overall models using single linear regression were developed that related dissolved organic carbon (DOC concentration to CDOM (DOC = 40×a350+138; R2 = 0.77; N = 130 and lignin (Σ8 to CDOM (Σ8 = 2.03×a350-0.5; R2 = 0.87; N = 130. This wide variability suggested that local or regional optical models should be developed for predicting terrestrial DOM flux into coastal oceans and taken into account when upscaling to remote sensing observations and calibrations.

  13. Cell short circuit, preshort signature

    Science.gov (United States)

    Lurie, C.

    1980-01-01

    Short-circuit events observed in ground test simulations of DSCS-3 battery in-orbit operations are analyzed. Voltage signatures appearing in the data preceding the short-circuit event are evaluated. The ground test simulation is briefly described along with performance during reconditioning discharges. Results suggest that a characteristic signature develops prior to a shorting event.

  14. Opportunities and limitations related to the application of plant-derived lipid molecular proxies in soil science

    Directory of Open Access Journals (Sweden)

    B. Jansen

    2017-11-01

    Full Text Available The application of lipids in soils as molecular proxies, also often referred to as biomarkers, has dramatically increased in the last decades. Applications range from inferring changes in past vegetation composition, climate, and/or human presence to unraveling the input and turnover of soil organic matter (SOM. The molecules used are extractable and non-extractable lipids, including ester-bound lipids. In addition, the carbon or hydrogen isotopic composition of such molecules is used. While holding great promise, the application of soil lipids as molecular proxies comes with several constraining factors, the most important of which are (i variability in the molecular composition of plant-derived organic matter both internally and between individual plants, (ii variability in (the relative contribution of input pathways into the soil, and (iii the transformation and/or (selective degradation of (some of the molecules once present in the soil. Unfortunately, the information about such constraining factors and their impact on the applicability of molecular proxies is fragmented and scattered. The purpose of this study is to provide a critical review of the current state of knowledge with respect to the applicability of molecular proxies in soil science, specifically focusing on the factors constraining such applicability. Variability in genetic, ontogenetic, and environmental factors influences plant n-alkane patterns in such a way that no unique compounds or specific molecular proxies pointing to, for example, plant community differences or environmental influences, exist. Other components, such as n-alcohols, n-fatty acids, and cutin- and suberin-derived monomers, have received far less attention in this respect. Furthermore, there is a high diversity of input pathways offering both opportunities and limitations for the use of molecular proxies at the same time. New modeling approaches might offer a possibility to unravel such mixed input

  15. Munchausen syndrome and Munchausen syndrome by proxy in dermatology.

    Science.gov (United States)

    Boyd, Alan S; Ritchie, Coleman; Likhari, Sunaina

    2014-08-01

    Patients with Munchausen syndrome purposefully injure themselves, often with the injection of foreign materials, to gain hospital admission and the attention associated with having a difficult-to-identify condition. Munchausen syndrome by proxy occurs when a child's caregiver, typically the mother, injures the child for the same reasons. Cases of Munchausen syndrome and Munchausen syndrome by proxy with primary cutaneous involvement appear to be rarely described in the literature suggesting either that diagnosis is not made readily or that it is, in fact, an uncommon disorder. At the center of both conditions is significant psychological pathology and treatment is difficult as many patients with Munchausen syndrome when confronted with these diagnostic possibilities simply leave the hospital. Little is known about the long-term outcome or prognosis of these patients. Copyright © 2014 American Academy of Dermatology, Inc. Published by Mosby, Inc. All rights reserved.

  16. The electronic identification, signature and security of information systems

    Directory of Open Access Journals (Sweden)

    Horovèák Pavel

    2002-12-01

    Full Text Available The contribution deals with the actual methods and technologies of information and communication systems security. It introduces the overview of electronic identification elements such as static password, dynamic password and single sign-on. Into this category belong also biometric and dynamic characteristics of verified person. Widespread is authentication based on identification elements ownership, such as various cards and authentication calculators. In the next part is specified a definition and characterization of electronic signature, its basic functions and certificate categories. Practical utilization of electronic signature consists of electronic signature acquirement, signature of outgoing email message, receiving of electronic signature and verification of electronic signature. The use of electronic signature is continuously growing and in connection with legislation development it exercises in all resorts.

  17. Linking Concurrent Self-Reports and Retrospective Proxy Reports About the Last Year of Life: A Prevailing Picture of Life Satisfaction Decline

    Science.gov (United States)

    Gerstorf, Denis; Ram, Nilam; Schupp, Jürgen; Sprangers, Mirjam A. G.; Wagner, Gert G.

    2014-01-01

    Objective. We examined the extent to which retrospective proxy reports of well-being mirror participant self-reports at 12–24 months before death and how proxy reports of well-being change over the last year of life. We also explored the role of sociodemographic, cognitive, and health factors of both participants and proxies in moderating such associations. Method. We used retrospective proxy ratings obtained in the German Socio-Economic Panel Study (N = 164; age at death = 19–99 years). Results. Results revealed moderate agreement between self- and proxy reports (r = .42), but proxies, on average, overestimated participants’ life satisfaction by two thirds of a scale point on a 0–10 scale (or 0.4 SD). Discrepancies were particularly pronounced when proxies themselves reported low life satisfaction. Over the last year of life, participants were viewed to have experienced declines in life satisfaction (−0.54 SD). Declines were stronger for ill participants and proxies who reported low life satisfaction. Discussion. Results qualify theoretical expectations and empirical results based on self-report data that are typically available 1 or 2 years before death. We discuss that retrospective proxy reports in panel surveys can be used as a hypothesis-generating tool to gather insights into late life. PMID:23766436

  18. COMPUTER-IMPLEMENTED METHOD OF PERFORMING A SEARCH USING SIGNATURES

    DEFF Research Database (Denmark)

    2017-01-01

    A computer-implemented method of processing a query vector and a data vector), comprising: generating a set of masks and a first set of multiple signatures and a second set of multiple signatures by applying the set of masks to the query vector and the data vector, respectively, and generating...... candidate pairs, of a first signature and a second signature, by identifying matches of a first signature and a second signature. The set of masks comprises a configuration of the elements that is a Hadamard code; a permutation of a Hadamard code; or a code that deviates from a Hadamard code...

  19. Marine proxy evidence linking decadal North Pacific and Atlantic climate

    Energy Technology Data Exchange (ETDEWEB)

    Hetzinger, S. [University of Toronto Mississauga, CPS-Department, Mississauga, ON (Canada); Leibniz Institute of Marine Sciences, IFM-GEOMAR, Kiel (Germany); Halfar, J. [University of Toronto Mississauga, CPS-Department, Mississauga, ON (Canada); Mecking, J.V.; Keenlyside, N.S. [Leibniz Institute of Marine Sciences, IFM-GEOMAR, Kiel (Germany); University of Bergen, Geophysical Institute and Bjerknes Centre for Climate Research, Bergen (Norway); Kronz, A. [University of Goettingen, Geowissenschaftliches Zentrum, Goettingen (Germany); Steneck, R.S. [University of Maine, Darling Marine Center, Walpole, ME (United States); Adey, W.H. [Smithsonian Institution, Department of Botany, Washington, DC (United States); Lebednik, P.A. [ARCADIS U.S. Inc., Walnut Creek, CA (United States)

    2012-09-15

    Decadal- to multidecadal variability in the extra-tropical North Pacific is evident in 20th century instrumental records and has significant impacts on Northern Hemisphere climate and marine ecosystems. Several studies have discussed a potential linkage between North Pacific and Atlantic climate on various time scales. On decadal time scales no relationship could be confirmed, potentially due to sparse instrumental observations before 1950. Proxy data are limited and no multi-centennial high-resolution marine geochemical proxy records are available from the subarctic North Pacific. Here we present an annually-resolved record (1818-1967) of Mg/Ca variations from a North Pacific/Bering Sea coralline alga that extends our knowledge in this region beyond available data. It shows for the first time a statistically significant link between decadal fluctuations in sea-level pressure in the North Pacific and North Atlantic. The record is a lagged proxy for decadal-scale variations of the Aleutian Low. It is significantly related to regional sea surface temperature and the North Atlantic Oscillation (NAO) index in late boreal winter on these time scales. Our data show that on decadal time scales a weaker Aleutian Low precedes a negative NAO by several years. This atmospheric link can explain the coherence of decadal North Pacific and Atlantic Multidecadal Variability, as suggested by earlier studies using climate models and limited instrumental data. (orig.)

  20. Signature effects in 2-qp rotational bands

    International Nuclear Information System (INIS)

    Jain, A.K.; Goel, A.

    1992-01-01

    The authors briefly review the progress in understanding the 2-qp rotational bands in odd-odd nuclei. Signature effects and the phenomenon of signature inversion are discussed. The Coriolis coupling appears to have all the ingredients to explain the inversion. Some recent work on signature dependence in 2-qp bands of even-even nuclei is also discussed; interesting features are pointed out

  1. Time-dependent delayed signatures from energetic photon interrogations

    International Nuclear Information System (INIS)

    Norman, Daren R.; Jones, James L.; Blackburn, Brandon W.; Haskell, Kevin J.; Johnson, James T.; Watson, Scott M.; Hunt, Alan W.; Spaulding, Randy; Harmon, Frank

    2007-01-01

    Pulsed photonuclear interrogation environments generated by 8-24 MeV electron linac are rich with time-dependent, material-specific, radiation signatures. Nitrogen-based explosives and nuclear materials can be detected by exploiting these signatures in different delayed-time regions. Numerical and experimental results presented in this paper show the unique time and energy dependence of these signatures. It is shown that appropriate delayed-time windows are essential to acquire material-specific signatures in pulsed photonuclear assessment environments. These developments demonstrate that pulsed, high-energy, photon-inspection environments can be exploited for time-dependent, material-specific signatures through the proper operation of specialized detectors and detection methods

  2. Peripheral blood signatures of lead exposure.

    Directory of Open Access Journals (Sweden)

    Heather G LaBreche

    Full Text Available BACKGROUND: Current evidence indicates that even low-level lead (Pb exposure can have detrimental effects, especially in children. We tested the hypothesis that Pb exposure alters gene expression patterns in peripheral blood cells and that these changes reflect dose-specific alterations in the activity of particular pathways. METHODOLOGY/PRINCIPAL FINDING: Using Affymetrix Mouse Genome 430 2.0 arrays, we examined gene expression changes in the peripheral blood of female Balb/c mice following exposure to per os lead acetate trihydrate or plain drinking water for two weeks and after a two-week recovery period. Data sets were RMA-normalized and dose-specific signatures were generated using established methods of supervised classification and binary regression. Pathway activity was analyzed using the ScoreSignatures module from GenePattern. CONCLUSIONS/SIGNIFICANCE: The low-level Pb signature was 93% sensitive and 100% specific in classifying samples a leave-one-out crossvalidation. The high-level Pb signature demonstrated 100% sensitivity and specificity in the leave-one-out crossvalidation. These two signatures exhibited dose-specificity in their ability to predict Pb exposure and had little overlap in terms of constituent genes. The signatures also seemed to reflect current levels of Pb exposure rather than past exposure. Finally, the two doses showed differential activation of cellular pathways. Low-level Pb exposure increased activity of the interferon-gamma pathway, whereas high-level Pb exposure increased activity of the E2F1 pathway.

  3. Magnetic signature surveillance of nuclear fuel

    International Nuclear Information System (INIS)

    Bernatowicz, H.; Schoenig, F.C.

    1981-01-01

    Typical nuclear fuel material contains tramp ferromagnetic particles of random size and distribution. Also, selected amounts of paramagnetic or ferromagnetic material can be added at random or at known positions in the fuel material. The fuel material in its non-magnetic container is scanned along its length by magnetic susceptibility detecting apparatus whereby susceptibility changes along its length are obtained and provide a unique signal waveform of the container of fuel material as a signature thereof. The output signature is stored. At subsequent times in its life the container is again scanned and respective signatures obtained which are compared with the initially obtained signature, any differences indicating alteration or tampering with the fuel material. If the fuel material includes a paramagnetic additive by taking two measurements along the container the effects thereof can be cancelled out. (author)

  4. Exact analysis of Packet Reversed Packet Combining Scheme and Modified Packet Combining Scheme; and a combined scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2007-07-01

    Packet combining scheme is a well defined simple error correction scheme for the detection and correction of errors at the receiver. Although it permits a higher throughput when compared to other basic ARQ protocols, packet combining (PC) scheme fails to correct errors when errors occur in the same bit locations of copies. In a previous work, a scheme known as Packet Reversed Packet Combining (PRPC) Scheme that will correct errors which occur at the same bit location of erroneous copies, was studied however PRPC does not handle a situation where a packet has more than 1 error bit. The Modified Packet Combining (MPC) Scheme that can correct double or higher bit errors was studied elsewhere. Both PRPC and MPC schemes are believed to offer higher throughput in previous studies, however neither adequate investigation nor exact analysis was done to substantiate this claim of higher throughput. In this work, an exact analysis of both PRPC and MPC is carried out and the results reported. A combined protocol (PRPC and MPC) is proposed and the analysis shows that it is capable of offering even higher throughput and better error correction capability at high bit error rate (BER) and larger packet size. (author)

  5. Signature-based store checking buffer

    Science.gov (United States)

    Sridharan, Vilas; Gurumurthi, Sudhanva

    2015-06-02

    A system and method for optimizing redundant output verification, are provided. A hardware-based store fingerprint buffer receives multiple instances of output from multiple instances of computation. The store fingerprint buffer generates a signature from the content included in the multiple instances of output. When a barrier is reached, the store fingerprint buffer uses the signature to verify the content is error-free.

  6. Neutral signature Walker-VSI metrics

    International Nuclear Information System (INIS)

    Coley, A; McNutt, D; Musoke, N; Brooks, D; Hervik, S

    2014-01-01

    We will construct explicit examples of four-dimensional neutral signature Walker (but not necessarily degenerate Kundt) spaces for which all of the polynomial scalar curvature invariants vanish. We then investigate the properties of some particular subclasses of Ricci flat spaces. We also briefly describe some four-dimensional neutral signature Einstein spaces for which all of the polynomial scalar curvature invariants are constant. (paper)

  7. An interpretation of signature inversion

    International Nuclear Information System (INIS)

    Onishi, Naoki; Tajima, Naoki

    1988-01-01

    An interpretation in terms of the cranking model is presented to explain why signature inversion occurs for positive γ of the axially asymmetric deformation parameter and emerges into specific orbitals. By introducing a continuous variable, the eigenvalue equation can be reduced to a one dimensional Schroedinger equation by means of which one can easily understand the cause of signature inversion. (author)

  8. Acoustic Signature Monitoring and Management of Naval Platforms

    NARCIS (Netherlands)

    Basten, T.G.H.; Jong, C.A.F. de; Graafland, F.; Hof, J. van 't

    2015-01-01

    Acoustic signatures make naval platforms susceptible to detection by threat sensors. The variable operational conditions and lifespan of a platform cause variations in the acoustic signature. To deal with these variations, a real time signature monitoring capability is being developed, with advisory

  9. Date Attachable Offline Electronic Cash Scheme

    Directory of Open Access Journals (Sweden)

    Chun-I Fan

    2014-01-01

    Full Text Available Electronic cash (e-cash is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling.

  10. Date attachable offline electronic cash scheme.

    Science.gov (United States)

    Fan, Chun-I; Sun, Wei-Zhe; Hau, Hoi-Tung

    2014-01-01

    Electronic cash (e-cash) is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling.

  11. Date Attachable Offline Electronic Cash Scheme

    Science.gov (United States)

    Sun, Wei-Zhe; Hau, Hoi-Tung

    2014-01-01

    Electronic cash (e-cash) is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling. PMID:24982931

  12. Level of agreement between patient and proxy responses to the EQ-5D health questionnaire 12 months after injury.

    Science.gov (United States)

    Gabbe, Belinda J; Lyons, Ronan A; Sutherland, Ann M; Hart, Melissa J; Cameron, Peter A

    2012-04-01

    Health-related quality of life represents a patient's experiences and expectations and should be collected from the patient. In trauma, collection of information from the patient can be challenging, particularly for subgroups where cognitive impairment is prevalent, increasing reliance on proxy reporting. This study assessed the agreement between patient and proxy reporting of health-related quality of life 12 months after injury. The Victorian State Trauma Registry and Victorian Orthopaedic Trauma Outcomes Registry collect EQ-5D data at 12 months after injury. Cases where data were collected from the patient and proxy were extracted. Agreement between patient and proxy responses was compared using kappa (K) coefficients for the individual EQ-5D items, and Bland-Altman plots and Wilcoxon signed-rank tests for the EQ-5D summary score and visual analog scale (VAS). Agreement between patient and proxy respondents was substantial for the mobility (K = 0.61) and personal care items (K = 0.67) and moderate for the usual activities (K = 0.50), pain/discomfort (K = 0.42), and anxiety/depression items (K = 0.47). The mean difference between proxy and patient-reported scores for the VAS (0.74, 95% confidence interval: -2.73, 4.21) and the EQ-5D summary score (-0.02, 95% confidence interval: -0.07, 0.03) was small, but the limits of agreement were wide (-34.22 to 35.71 for VAS and -0.55 to 0.51 for summary score), suggesting no systematic bias. Although proxy and patient responses for the EQ-5D VAS may differ, the differences show random variability rather than systematic bias. Group comparisons using proxy responses are unlikely to be biased, but proxy responses should be used with caution when assessing individual patient recovery.

  13. A new proxy measure for state-level gun ownership in studies of firearm injury prevention.

    Science.gov (United States)

    Siegel, Michael; Ross, Craig S; King, Charles

    2014-06-01

    Since many states are considering gun control laws, researchers need reliable data on rates of gun ownership at the state level. Survey measures of gun ownership in all 50 states, however, are only available for 3 years, and no state-level data have been collected since 2004. Consequently, the National Research Council has declared the development of a valid proxy that can be constructed from accessible, annual, state-level data to be a priority. While such a proxy does exist (the proportion of suicides in a state committed using a gun (FS/S), its correlation with state estimates of gun ownership in recent years is only 0.80. Using state-level data for the years 2001, 2002 and 2004, we developed an improved proxy for state-level gun ownership that uses FS/S (firearm suicides divided by all suicides) and also the per capita number of hunting licenses. We validated this measure using data from surveys of gun ownership conducted in 48 states during 1996 and 1999, and in 21 states during 1995-1998. Adding per capita hunting licenses to the proxy increased its correlation with survey-measured gun ownership from 0.80 to 0.95. The correlations of the new proxy with gun ownership in the two validation studies were 0.95 and 0.97. We conclude that the combination of FS/S and per capita hunting licenses improves substantially upon FS/S alone. This new proxy is easily computed from data that are available annually by state and may be useful for investigating the effect of gun prevalence on firearm-related morbidity and mortality. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  14. He said, she said: The gender wage gap according to self and proxy reports in the Current Population Survey.

    Science.gov (United States)

    Reynolds, Jeremy; Wenger, Jeffrey B

    2012-03-01

    Roughly half the labor force data in the Current Population Survey (CPS) are provided by proxy respondents, and since 1979, men's reliance on proxies has dropped dramatically while women's reliance on proxies has increased. Few authors, however, have examined how combining these first-hand and second-hand reports may influence our understanding of long-term economic trends. We exploit the outgoing rotation group structure of the CPS by matching individual records one year apart, and we find that self-reported wages are higher than proxy-reported wages even after controlling for all time invariant characteristics. Furthermore, we find that changes in the use of proxy respondents by men and women since 1979 have made current estimates of the gender wage gap larger than they would have been without changes in reporting status. This suggests that the gender wage gap has closed more than previously estimated. We recommend that researchers combine self and proxy responses with great care, especially when analyzing time trends or making gender comparisons. Copyright © 2011 Elsevier Inc. All rights reserved.

  15. A comparison of proxy performance in coral biodiversity monitoring

    Science.gov (United States)

    Richards, Zoe T.

    2013-03-01

    The productivity and health of coral reef habitat is diminishing worldwide; however, the effect that habitat declines have on coral reef biodiversity is not known. Logistical and financial constraints mean that surveys of hard coral communities rarely collect data at the species level; hence it is important to know if there are proxy metrics that can reliably predict biodiversity. Here, the performances of six proxy metrics are compared using regression analyses on survey data from a location in the northern Great Barrier Reef. Results suggest generic richness is a strong explanatory variable for spatial patterns in species richness (explaining 82 % of the variation when measured on a belt transect). The most commonly used metric of reef health, percentage live coral cover, is not positively or linearly related to hard coral species richness. This result raises doubt as to whether management actions based on such reefscape information will be effective for the conservation of coral biodiversity.

  16. 48 CFR 4.102 - Contractor's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Contractor's signature. 4.102 Section 4.102 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Contract Execution 4.102 Contractor's signature. (a) Individuals. A contract with an...

  17. DIGITAL SIGNATURE IN THE WAY OF LAW

    Directory of Open Access Journals (Sweden)

    Ruya Samlı

    2013-01-01

    Full Text Available Signature can be defined as a person’s name or special signs that he/she writes when he/she wants to indicate he/she wrote or confirm that writing. A person signs many times in his/her life. A person’s signature that is used for thousands of times for many things from formal documents to exams has importance for that person. Especially, signing in legal operations is an operation that can build important results. If a person’s signature is imitated by another person, he/she can become beholden, donate his/her whole wealth, commits offences or do some judicial operations. Today, because many operations can be done with digital environments and internet, signature operation that provides identity validation must also be carried to digital environment. In this paper digital signature concept that is approved for this reason and its situation in international areas and Turkish laws are investigated.

  18. Signature change events: a challenge for quantum gravity?

    International Nuclear Information System (INIS)

    White, Angela; Weinfurtner, Silke; Visser, Matt

    2010-01-01

    Within the framework of either Euclidean (functional integral) quantum gravity or canonical general relativity the signature of the manifold is a priori unconstrained. Furthermore, recent developments in the emergent spacetime programme have led to a physically feasible implementation of (analogue) signature change events. This suggests that it is time to revisit the sometimes controversial topic of signature change in general relativity. Specifically, we shall focus on the behaviour of a quantum field defined on a manifold containing regions of different signature. We emphasize that regardless of the underlying classical theory, there are severe problems associated with any quantum field theory residing on a signature-changing background. (Such as the production of what is naively an infinite number of particles, with an infinite energy density.) We show how the problem of quantum fields exposed to finite regions of Euclidean-signature (Riemannian) geometry has similarities with the quantum barrier penetration problem. Finally we raise the question as to whether signature change transitions could be fully understood and dynamically generated within (modified) classical general relativity, or whether they require the knowledge of a theory of quantum gravity.

  19. Starry messages: Searching for signatures of interstellar archaeology

    Energy Technology Data Exchange (ETDEWEB)

    Carrigan, Richard A., Jr.; /Fermilab

    2009-12-01

    Searching for signatures of cosmic-scale archaeological artifacts such as Dyson spheres or Kardashev civilizations is an interesting alternative to conventional SETI. Uncovering such an artifact does not require the intentional transmission of a signal on the part of the original civilization. This type of search is called interstellar archaeology or sometimes cosmic archaeology. The detection of intelligence elsewhere in the Universe with interstellar archaeology or SETI would have broad implications for science. For example, the constraints of the anthropic principle would have to be loosened if a different type of intelligence was discovered elsewhere. A variety of interstellar archaeology signatures are discussed including non-natural planetary atmospheric constituents, stellar doping with isotopes of nuclear wastes, Dyson spheres, as well as signatures of stellar and galactic-scale engineering. The concept of a Fermi bubble due to interstellar migration is introduced in the discussion of galactic signatures. These potential interstellar archaeological signatures are classified using the Kardashev scale. A modified Drake equation is used to evaluate the relative challenges of finding various sources. With few exceptions interstellar archaeological signatures are clouded and beyond current technological capabilities. However SETI for so-called cultural transmissions and planetary atmosphere signatures are within reach.

  20. Completeness and utility of interview data from proxy respondents in prenatal care research in rural China.

    Science.gov (United States)

    Nwaru, Bright I; Klemetti, Reija; Yuan, Shen; Kun, Huang; Wang, Yang; Hemminki, Elina

    2012-05-01

    In household surveys, the use of data provided by relatives can increase response rates and generalisability of research findings. This study assessed the quality of data from relatives and the impact of the data source on the association between the use of prenatal care and pregnancy outcomes. Data for 3,673 new mothers and 293 proxy respondents were available from a house-hold survey in 2008-2009 in rural China. Analyses were performed using chi-square test, ANOVA, Kruskal-Wallis test, and logistic regression models. Differences in the studied variables were small, but proxy respondents were slightly more likely to have missing data than the new mothers. Differences and missing data were more common for the use of prenatal care and outcome variables (mode of delivery, place of delivery, birth weight, use of postnatal care, and gestational age at birth) than for the background characteristics of the participants. Husbands' reports were closer to the index reports than that of the other proxies. The associations between the exposures and outcomes were mostly similar between the proxy and index respondents. Relatives can be interviewed instead of women to study prenatal care without a substantial negative impact on study results. Studies using proxy respondents should stratify the analysis by type of respondents.

  1. Signature Pedagogies in Support of Teachers' Professional Learning

    Science.gov (United States)

    Parker, Melissa; Patton, Kevin; O'Sullivan, Mary

    2016-01-01

    Signature pedagogies [Shulman, L. 2005. "Signature pedagogies in the professions." "Daedalus" 134 (3): 52--59.] are a focus of teacher educators seeking to improve teaching and teacher education. The purpose of this paper is to present a preliminary common language of signature pedagogies for teacher professional development…

  2. Characteristics and Validation Techniques for PCA-Based Gene-Expression Signatures

    Directory of Open Access Journals (Sweden)

    Anders E. Berglund

    2017-01-01

    Full Text Available Background. Many gene-expression signatures exist for describing the biological state of profiled tumors. Principal Component Analysis (PCA can be used to summarize a gene signature into a single score. Our hypothesis is that gene signatures can be validated when applied to new datasets, using inherent properties of PCA. Results. This validation is based on four key concepts. Coherence: elements of a gene signature should be correlated beyond chance. Uniqueness: the general direction of the data being examined can drive most of the observed signal. Robustness: if a gene signature is designed to measure a single biological effect, then this signal should be sufficiently strong and distinct compared to other signals within the signature. Transferability: the derived PCA gene signature score should describe the same biology in the target dataset as it does in the training dataset. Conclusions. The proposed validation procedure ensures that PCA-based gene signatures perform as expected when applied to datasets other than those that the signatures were trained upon. Complex signatures, describing multiple independent biological components, are also easily identified.

  3. Infrared ship signature analysis and optimisation

    NARCIS (Netherlands)

    Neele, F.P.

    2005-01-01

    The last decade has seen an increase in the awareness of the infrared signature of naval ships. New ship designs show that infrared signature reduction measures are being incorporated, such as exhaust gas cooling systems, relocation of the exhausts and surface cooling systems. Hull and

  4. Cellulose and Lignin Carbon Isotope Signatures in Sphagnum Moss Reveal Complementary Environmental Properties

    Science.gov (United States)

    Loisel, J.; Nichols, J. E.; Kaiser, K.; Beilman, D. W.; Yu, Z.

    2016-12-01

    The carbon isotope signature (δ13C) of Sphagnum moss is increasingly used as a proxy for past surface wetness in peatlands. However, conflicting interpretations of these carbon isotope records have recently been published. While the water film hypothesis suggests that the presence of a thick (thin) water film around hollow (hummock) mosses leads to less (more) negative δ13C values, the carbon source hypothesis poses that a significant (insignificant) amount of CH4 assimilation by hollow (hummock) mosses leads to more (less) negative δ13C values. To evaluate these competing mechanisms and their impact on moss δ13C, we gathered 30 moss samples from 6 peatlands in southern Patagonia. Samples were collected along a strong hydrological gradient, from very dry hummocks (80 cm above water table depth) to submerged hollows (5 cm below water surface). These peat bogs have the advantage of being colonized by a single cosmopolitan moss species, Sphagnum magellanicum, limiting potential biases introduced by species-specific carbon discrimination. We measured δ13C from stem cellulose and leaf waxes on the same samples to quantify compound-specific carbon signatures. We found that stem cellulose and leaf-wax lipids were both strongly negatively correlated with moss water content, suggesting a primary role of water film thickness on carbon assimilation. In addition, isotopic fractionation during wax synthesis was greater than for cellulose. This offset decreases as conditions get drier, due to (i) a more effective carbon assimilation, or (ii) CH4 uptake through symbiosis with methanotrophic bacteria within the leaves of wet mosses. Biochemical analysis (carbohydrates, amino acids, hydrophenols, cutin acids) of surface moss are currently being conducted to characterize moss carbon allocation under different hydrological conditions. Overall, this modern calibration work should be of use for interpreting carbon isotope records from peatlands.

  5. Comparison of independent proxies in the reconstruction of deep ...

    African Journals Online (AJOL)

    Independent proxies were assessed in two Late Quaternary sediment cores from the eastern South Atlantic to compare deep-water changes during the last 400 kyr. ... is exclusively observed during interglacials, with maximum factor loadings in ... only slightly without a significant glacial-interglacial pattern, as measured in a ...

  6. A Signature Comparing Android Mobile Application Utilizing Feature Extracting Algorithms

    Directory of Open Access Journals (Sweden)

    Paul Grafilon

    2017-08-01

    Full Text Available The paper presented one of the application that can be done using smartphones camera. Nowadays forgery is one of the most undetected crimes. With the forensic technology used today it is still difficult for authorities to compare and define what a real signature is and what a forged signature is. A signature is a legal representation of a person. All transactions are based on a signature. Forgers may use a signature to sign illegal contracts and withdraw from bank accounts undetected. A signature can also be forged during election periods for repeated voting. Addressing the issues a signature should always be secure. Signature verification is a reduced problem that still poses a real challenge for researchers. The literature on signature verification is quite extensive and shows two main areas of research off-line and on-line systems. Off-line systems deal with a static image of the signature i.e. the result of the action of signing while on-line systems work on the dynamic process of generating the signature i.e. the action of signing itself. The researchers have found a way to resolve the concerns. A mobile application that integrates the camera to take a picture of a signature analyzes it and compares it to other signatures for verification. It will exist to help citizens to be more cautious and aware with issues regarding the signatures. This might also be relevant to help organizations and institutions such as banks and insurance companies in verifying signatures that may avoid unwanted transactions and identity theft. Furthermore this might help the authorities in the never ending battle against crime especially against forgers and thieves. The project aimed to design and develop a mobile application that integrates the smartphone camera for verifying and comparing signatures for security using the best algorithm possible. As the result of the development the said smartphone camera application is functional and reliable.

  7. Finite Boltzmann schemes

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    2006-01-01

    In the special case of relaxation parameter = 1 lattice Boltzmann schemes for (convection) diffusion and fluid flow are equivalent to finite difference/volume (FD) schemes, and are thus coined finite Boltzmann (FB) schemes. We show that the equivalence is inherent to the homology of the

  8. Novel proxies for reconstructing paleohydrology from ombrotrophic peatlands: biomarker and compound-specific H and C stable isotope ratios

    Science.gov (United States)

    Wang, J.; Nichols, J. E.; Huang, Y.

    2008-12-01

    Ombrotrophic peatlands are excellent archives for paleohydrologic information because they are hydrologically isolated from their surroundings. However, quantitative proxies for deciphering peatland archives are lacking. Here, we present development and application of novel organic geochemical methods for quantitative reconstruction of paleohydrology from the ombrotrophic sediments, and comparison of organic geochemical data with conventional paleoecological proxies. Application of these methods to the sediments of several North American and European peatlands has revealed significant changes in the hydroclimate throughout the Holocene. The plant assemblage living at the surface of the peatland is tightly controlled by surface moisture. Under wet conditions, Sphagnum mosses, with no active mechanism for drawing water from below the surface of the peatland, are dominant. During dry conditions, vascular plants are more productive relative to Sphagnum. A ratio of the abundance of two biomarkers representing Sphagnum and vascular plants sensitively records changes in hydrologic balance (Nichols et al., 2006, Org. Geochem. 37, 1505-1513). We have further developed stable isotope models to compute climate parameters from compound-specific H and C isotope ratios of biomarkers to create a more comprehensive climate reconstruction. Vascular plant leaf waxes carry the D/H ratio signature of precipitation that is little affected by evaporation, whereas the Sphagnum biomarker records isotopic ratios of the water at the peatland surface, which is strongly enriched by evaporation. Evaporation amount can be calculated using the differences between D/H ratios of the two types of biomarkers. C isotope ratios of Sphagnum biomarkers can also be used to quantify surface wetness. Methanotrophic bacteria live symbiotically with Sphagnum, providing isotopically light carbon for photosynthesis. These bacteria are more active when the Sphagnum is wet, thus providing more 13C-depleted CO2

  9. Munchausen syndrome by proxy and child's rights

    International Nuclear Information System (INIS)

    Al-Haidar, Fatima A.

    2008-01-01

    Munchausen syndrome by proxy (MSBP) is an extreme form of child abuse in which perpetrators induce life-threatening conditions in their children. A case of MSBP is described in detail. Difficulties in diagnosis and management in this part of the world are presented. Until now, no national legal guidelines exist in the Kingdom of Saudi Arabia (KSA) to child abuse in general and MSBP in particular. Urgent guidelines, policies and legal system are required in the KSA. (author)

  10. 21 CFR 1309.32 - Application forms; contents; signature.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Application forms; contents; signature. 1309.32... Application forms; contents; signature. (a) Any person who is required to be registered pursuant to § 1309.21... this paragraph and shall contain the signature of the individual being authorized to sign the...

  11. 38 CFR 18b.21 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Signature of documents. 18b.21 Section 18b.21 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS... Documents § 18b.21 Signature of documents. The signature of a party, authorized officer, employee, or...

  12. Detection of chemical explosives using multiple photon signatures

    International Nuclear Information System (INIS)

    Loschke, K.W.; Dunn, W.L.

    2008-01-01

    Full text: A template-matching procedure to aid in rapid detection of improvised explosive devices (IEDs) is being investigated. Multiple photon-scattered and photon-induced positron annihilation radiation responses are being used as part of a photon-neutron signature-based radiation scanning (SBRS) approach (see companion reference for description of the neutron component), in an attempt to detect chemical explosives at safe standoff distances. Many past and present photon interrogation methods are based on imaging. Imaging techniques seek to determine at high special resolution the internal structure of a target of interest. Our technique simply seeks to determine if an unknown target contains a detectable amount of chemical explosives by comparing multiple responses (signatures) that depend on both density and composition of portions of a target. In the photon component, beams of photons are used to create back-streaming signatures, which are dependent on the density and composition of part of the target being interrogated. These signatures are compared to templates, which are collections of the same signatures if the interrogated volume contained a significant amount of explosives. The signature analysis produces a figure-of-merit and a standard deviation of the figure-of-merit. These two metrics are used to filter safe from dangerous targets. Experiments have been conducted that show that explosive surrogates (fertilizers) can be distinguished from several inert materials using these photon signatures, demonstrating that these signatures can be used effectively to help IEDs

  13. A case report of Factitious Disorder (Munchausen Syndrome by proxy

    Directory of Open Access Journals (Sweden)

    Mehdi Shirzadifar

    2014-09-01

    Full Text Available Background: In Factitious Disorder by proxy, one person (perpetrator induces the disease in another person, thereby seeking emotional needs during the treatment process Diagnosis of this disorder is very difficult and there is not much consensus over it among experts. Lack of timely diagnosis of this disorder may lead to serious harms in patients. Case presentation: We will introduce a 19 year-old boy with mental retardation and history of multiple admissions to psychiatric, internal, urology and surgery wards. He has a 12 year-old sister and a 4 year-old brother, both with history of multiple admissions to pediatrics and internal wards. The father of family was 48 years old with chronic mental disorder, drug dependency and history of multiple admissions to medical, psychiatry and neurology wards. The mother of this family was diagnosed with munchausen syndrome by proxy.

  14. Starspot variability as an X-ray radiation proxy

    Science.gov (United States)

    Arkhypov, Oleksiy V.; Khodachenko, Maxim L.; Lammer, Helmut; Güdel, Manuel; Lüftinger, Teresa; Johnstone, Colin P.

    2018-05-01

    Stellar X-ray emission plays an important role in the study of exoplanets as a proxy for stellar winds and as a basis for the prediction of extreme ultraviolet (EUV) flux, unavailable for direct measurements, which in their turn are important factors for the mass-loss of planetary atmospheres. Unfortunately, the detection thresholds limit the number of stars with the directly measured X-ray fluxes. At the same time, the known connection between the sunspots and X-ray sources allows using of the starspot variability as an accessible proxy for the stellar X-ray emission. To realize this approach, we analysed the light curves of 1729 main-sequence stars with rotation periods 0.5 X-ray to bolometric luminosity ratio Rx. As a result, the regressions for stellar X-ray luminosity Lx(P, Teff) and its related EUV analogue LEUV were obtained for the main-sequence stars. It was shown that these regressions allow prediction of average (over the considered stars) values of log (Lx) and log (LEUV) with typical errors of 0.26 and 0.22 dex, respectively. This, however, does not include the activity variations in particular stars related to their individual magnetic activity cycles.

  15. On the construction of a time base and the elimination of averaging errors in proxy records

    Science.gov (United States)

    Beelaerts, V.; De Ridder, F.; Bauwens, M.; Schmitz, N.; Pintelon, R.

    2009-04-01

    Proxies are sources of climate information which are stored in natural archives (e.g. ice-cores, sediment layers on ocean floors and animals with calcareous marine skeletons). Measuring these proxies produces very short records and mostly involves sampling solid substrates, which is subject to the following two problems: Problem 1: Natural archives are equidistantly sampled at a distance grid along their accretion axis. Starting from these distance series, a time series needs to be constructed, as comparison of different data records is only meaningful on a time grid. The time series will be non-equidistant, as the accretion rate is non-constant. Problem 2: A typical example of sampling solid substrates is drilling. Because of the dimensions of the drill, the holes drilled will not be infinitesimally small. Consequently, samples are not taken at a point in distance, but rather over a volume in distance. This holds for most sampling methods in solid substrates. As a consequence, when the continuous proxy signal is sampled, it will be averaged over the volume of the sample, resulting in an underestimation of the amplitude. Whether this averaging effect is significant, depends on the volume of the sample and the variations of interest of the proxy signal. Starting from the measured signal, the continuous signal needs to be reconstructed in order eliminate these averaging errors. The aim is to provide an efficient identification algorithm to identify the non-linearities in the distance-time relationship, called time base distortions, and to correct for the averaging effects. Because this is a parametric method, an assumption about the proxy signal needs to be made: the proxy record on a time base is assumed to be harmonic, this is an obvious assumption because natural archives often exhibit a seasonal cycle. In a first approach the averaging effects are assumed to be in one direction only, i.e. the direction of the axis on which the measurements were performed. The

  16. The utilisation experience of the enhanced electronic signature when managing orders

    Directory of Open Access Journals (Sweden)

    Pavel A. Muzychkin

    2017-01-01

    Full Text Available Major universities with a number of branches, located throughout the country, have joined Plekhanov Russian University of Economics and there was a problem of operational coordination of managerial decision-making, coordination of command and control of their implementation. The problem needed to be solved very quickly as many orders have to be issued in a short period. It was necessary to develop and introduce the electronic document flow system to provide coordination of the projects’ orders on the number of students at the university branches on higher education programmes, postgraduate and vocational secondary education, and ensuring legal validity of the electronic documents.Cryptography techniques, encryption standard (National State Standard, Russian Federation legislation, university’s corporate network, electronic document flow system “DELO”, enhanced electronic signature services such as Crypto Pro CSP, CARMA and EDSIGN.Electronic approval technology between the head University and its branches with the use of the enhanced unqualified electronic signature was suggested. Two ways of exchanging documents were developed and implemented in order to make the scheme work:1 Sending documents via the corporate e-mail, using National State Standard encryption.2 Document exchange via “DELO”, electronic document flow system. The first stage has provided the document exchange, using the enciphered information with the enhanced electronic signature. At the same time, the problem of creating secure data channels between the remote university branches was solved. During the second stage, when the branches were introduced into the university’s corporate network through the secure data channels, they also gained access to the “DELO”, electronic document flow system. From the end of December 2014 up to November 2016, around 3000 orders, concerning the students were entered into the system.This method was applied not only at the

  17. FIR signature verification system characterizing dynamics of handwriting features

    Science.gov (United States)

    Thumwarin, Pitak; Pernwong, Jitawat; Matsuura, Takenobu

    2013-12-01

    This paper proposes an online signature verification method based on the finite impulse response (FIR) system characterizing time-frequency characteristics of dynamic handwriting features. First, the barycenter determined from both the center point of signature and two adjacent pen-point positions in the signing process, instead of one pen-point position, is used to reduce the fluctuation of handwriting motion. In this paper, among the available dynamic handwriting features, motion pressure and area pressure are employed to investigate handwriting behavior. Thus, the stable dynamic handwriting features can be described by the relation of the time-frequency characteristics of the dynamic handwriting features. In this study, the aforesaid relation can be represented by the FIR system with the wavelet coefficients of the dynamic handwriting features as both input and output of the system. The impulse response of the FIR system is used as the individual feature for a particular signature. In short, the signature can be verified by evaluating the difference between the impulse responses of the FIR systems for a reference signature and the signature to be verified. The signature verification experiments in this paper were conducted using the SUBCORPUS MCYT-100 signature database consisting of 5,000 signatures from 100 signers. The proposed method yielded equal error rate (EER) of 3.21% on skilled forgeries.

  18. Benefits of applying a proxy eligibility period when using electronic health records for outcomes research: a simulation study.

    Science.gov (United States)

    Yu, Tzy-Chyi; Zhou, Huanxue

    2015-06-09

    Electronic health records (EHRs) can provide valuable data for outcomes research. However, unlike administrative claims databases, EHRs lack eligibility tables or a standard way to define the benefit coverage period, which could lead to underreporting of healthcare utilization or outcomes, and could result in surveillance bias. We tested the effect of using a proxy eligibility period (eligibility proxy) when estimating a range of health resource utilization and outcomes parameters under varying degrees of missing encounter data. We applied an eligibility proxy to create a benchmark cohort of chronic obstructive pulmonary disease (COPD) patients with 12 months of follow-up, with the assumption of no missing encounter data. The benchmark cohort provided parameter estimates for comparison with 9,000 simulated datasets representing 10-90% of COPD patients (by 10th percentiles) with between 1 and 11 months of continuous missing data. Two analyses, one for datasets using an eligibility proxy and one for those without an eligibility proxy, were performed on the 9,000 datasets to assess estimator performance under increasing levels of missing data. Estimates for each study variable were compared with those from the benchmark dataset, and performance was evaluated using bias, percentage change, and root-mean-square error. The benchmark dataset contained 6,717 COPD patients, whereas the simulated datasets where the eligibility proxy was applied had between 671 and 6,045 patients depending on the percentage of missing data. Parameter estimates had better performance when an eligibility proxy based on the first and last month of observed activity was applied. This finding was consistent across a range of variables representing patient comorbidities, symptoms, outcomes, health resource utilization, and medications, regardless of the measures of performance used. Without the eligibility proxy, all evaluated parameters were consistently underestimated. In a large COPD patient

  19. Molecular signatures of thyroid follicular neoplasia

    DEFF Research Database (Denmark)

    Borup, R.; Rossing, M.; Henao, Ricardo

    2010-01-01

    The molecular pathways leading to thyroid follicular neoplasia are incompletely understood, and the diagnosis of follicular tumors is a clinical challenge. To provide leads to the pathogenesis and diagnosis of the tumors, we examined the global transcriptome signatures of follicular thyroid...... a mechanism for cancer progression, which is why we exploited the results in order to generate a molecular classifier that could identify 95% of all carcinomas. Validation employing public domain and cross-platform data demonstrated that the signature was robust and could diagnose follicular nodules...... and robust genetic signature for the diagnosis of FA and FC. Endocrine-Related Cancer (2010) 17 691-708...

  20. High-Resolution Mg/Ca Ratios in a Coralline Red Alga as a Proxy for Bering Sea Temperature Variations and Teleconnections

    Science.gov (United States)

    Halfar, J.; Steffen, H.; Kronz, A.; Steneck, R. S.; Adey, W.; Lebednik, P. A.

    2009-05-01

    We present the first continuous high-resolution record of Mg/Ca variations within an encrusting coralline red alga of the species Clathromorphum nereostratum from Amchitka Island, Aleutian Islands. Mg/Ca ratios of individual growth increments were analyzed by measuring a single point electron microprobe transect yielding a resolution of 15 samples/year on average, generating a continuous record from 1830 to 1967 of algal Mg/Ca variations. Results show that Mg/Ca ratios in the high-Mg calcite skeleton display pronounced annual cyclicity and archive late spring to late fall sea surface temperature (SST) corresponding to the main season of algal growth. Mg/Ca values correlate well to local SST (ERSSTJun-Nov, 1902-1967; r = 0.73 for 5-year mean), as well as to an air temperature record from the same region. Our data correlate well to a shorter Mg/Ca record from a second site, corroborating the ability of the alga to reliably record regional environmental signals. In addition, Mg/Ca ratios relate well to a 29-year stable oxygen isotope time series measured on the same sample, which provides additional support for the use of Mg as a paleotemperature proxy in coralline red algae, that is, unlike stable oxygen isotopes, not influenced by salinity fluctuations. High spatial correlation to large-scale SST variability in the North Pacific is observed, with patterns of strongest correlation following the direction of major oceanographic features (i.e., the signature of the Alaska Current and the Alaskan Stream), which play a key role in the exchange of water masses between the North Pacific and the Bering Sea through Aleutian Island passages. The time series further displays significant teleconnections with the signature of the Pacific Decadal Oscillation in the northeast Pacific and the Atlantic Multidecadal Oscillation.

  1. A nonlinear multi-proxy model based on manifold learning to reconstruct water temperature from high resolution trace element profiles in biogenic carbonates

    Directory of Open Access Journals (Sweden)

    M. Bauwens

    2010-11-01

    Full Text Available A long standing problem in paleoceanography concerns the reconstruction of water temperature from δ18O carbonate. It is problematic in the case of freshwater influenced environments because the δ18O isotopic composition of the ambient water (related to salinity needs to be known. In this paper we argue for the use of a nonlinear multi-proxy method called Weight Determination by Manifold Regularization (WDMR to develop a temperature reconstruction model that is less sensitive to salinity variations. The motivation for using this type of model is twofold: firstly, observed nonlinear relations between specific proxies and water temperature motivate the use of nonlinear models. Secondly, the use of multi-proxy models enables salinity related variations of a given temperature proxy to be explained by salinity-related information carried by a separate proxy. Our findings confirm that Mg/Ca is a powerful paleothermometer and highlight that reconstruction performance based on this proxy is improved significantly by combining its information with the information for other trace elements in multi-proxy models. Although the models presented here are black-box models that do not use any prior knowledge about the proxies, the comparison of model reconstruction performances based on different proxy combinations do yield useful information about proxy characteristics. Using Mg/Ca, Sr/Ca, Ba/Ca and Pb/Ca the WDMR model enables a temperature reconstruction with a root mean squared error of ± 2.19 °C for a salinity range between 15 and 32.

  2. gLExec and MyProxy integration in the ATLAS/OSG PanDA workload management system

    International Nuclear Information System (INIS)

    Caballero, J; Hover, J; Maeno, T; Potekhin, M; Wenaus, T; Zhao, X; Litmaath, M; Nilsson, P

    2010-01-01

    Worker nodes on the grid exhibit great diversity, making it difficult to offer uniform processing resources. A pilot job architecture, which probes the environment on the remote worker node before pulling down a payload job, can help. Pilot jobs become smart wrappers, preparing an appropriate environment for job execution and providing logging and monitoring capabilities. PanDA (Production and Distributed Analysis), an ATLAS and OSG workload management system, follows this design. However, in the simplest (and most efficient) pilot submission approach of identical pilots carrying the same identifying grid proxy, end-user accounting by the site can only be done with application-level information (PanDA maintains its own end-user accounting), and end-user jobs run with the identity and privileges of the proxy carried by the pilots, which may be seen as a security risk. To address these issues, we have enabled PanDA to use gLExec, a tool provided by EGEE which runs payload jobs under an end-user's identity. End-user proxies are pre-staged in a credential caching service, MyProxy, and the information needed by the pilots to access them is stored in the PanDA DB. gLExec then extracts from the user's proxy the proper identity under which to run. We describe the deployment, installation, and configuration of gLExec, and how PanDA components have been augmented to use it. We describe how difficulties were overcome, and how security risks have been mitigated. Results are presented from OSG and EGEE Grid environments performing ATLAS analysis using PanDA and gLExec.

  3. 350 Year Cloud Reconstruction Deduced from Northeast Caribbean Coral Proxies

    Science.gov (United States)

    Winter, A.; Sammarco, P. W.; Mikolajewicz, U.; Jury, M.; Zanchettin, D.

    2014-12-01

    Clouds are a major factor influencing the global climate and its response to external forcing through their implications for the global hydrological cycle, and hence for the planetary radiative budget. Clouds also contribute to regional climates and their variability through, e.g., the changes they induce in regional precipitation patterns. There have been very few studies of decadal and longer-term changes in cloud cover in the tropics and sub-tropics, both over land and the ocean. In the tropics, there is great uncertainty regarding how global warming will affect cloud cover. Observational satellite data are too short to unambiguously discern any temporal trends in cloud cover. Corals generally live in well-mixed coastal regions and can often record environmental conditions of large areas of the upper ocean. This is particularly the case at low latitudes. Scleractinian corals are sessile, epibenthic fauna, and the type of environmental information recorded at the location where the coral has been living is dependent upon the species of coral considered and proxy index of interest. Skeletons of scleractinian corals are considered to provide among the best records of high-resolution (sub-annual) environmental variability in the tropical and sub-tropical oceans. Zooxanthellate hermatypic corals in tropical and sub-tropical seas precipitate CaCO3 skeletons as they grow. This growth is made possible through the manufacture of CaCO3crystals, facilitated by the zooxanthellae. During the process of crystallization, the holobiont binds carbon of different isotopes into the crystals. Stable carbon isotope concentrations vary with a variety of environmental conditions. In the Caribbean, d13C in corals of the species Montastraea faveolata can be used as a proxy for changes in cloud cover. In this contribution, we will demonstrate that the stable isotope 13C varies concomitantly with cloud cover for the northeastern Caribbean region. Using this proxy we have been able to

  4. The construction of Shenzhen's carbon emission trading scheme

    International Nuclear Information System (INIS)

    Jiang, Jing Jing; Ye, Bin; Ma, Xiao Ming

    2014-01-01

    The Shenzhen ETS is the first urban-level “cap-and-trade” carbon emissions trading scheme to operate in China. This paper gives an overview of the economic and emissions situation in Shenzhen and focuses on the development of the Shenzhen ETS regulatory framework. It is devised as an ETS with an intensity-based cap, output-based allocation and a market for trading of allowances. The design of the Shenzhen ETS attaches great importance to coordinate the dynamic relationships between economic growth, industrial transition and emissions control. The cap and its allocation are determined by carbon intensity reduction targets and economic output, with an aim to slow down emissions growth while mitigating shocks from economic fluctuation and industrial adjustment to market stability. The Shenzhen ETS features extensive coverage consisting of three types of regulated entities and four categories of covered emissions, in order to control carbon emissions by both improving energy efficiency and restraining growing energy demand. A competitive game theory method is created for allocation of free allowances to manufacturing enterprises. Mechanisms for carbon offsets and market stabilization are developed to promote active and orderly trading in the carbon market. Moreover, several challenges and their policy choices are detailed for the development of the Shenzhen ETS. - Highlights: • The Shenzhen ETS is the first urban-level “cap-and-trade” carbon emission trading scheme operated in China. • This paper focuses on the construction of Shenzhen carbon emission trading scheme. It is devised as the intensity-based cap, output-based allocation and allowance trade carbon market. • It has some signatures in the general principles, coverage and scope, cap and allocation and other mechanisms. • Several challenges and their policy choices are detailed for the development of Shenzhen ETS

  5. Adaptive proxy map server for efficient vector spatial data rendering

    Science.gov (United States)

    Sayar, Ahmet

    2013-01-01

    The rapid transmission of vector map data over the Internet is becoming a bottleneck of spatial data delivery and visualization in web-based environment because of increasing data amount and limited network bandwidth. In order to improve both the transmission and rendering performances of vector spatial data over the Internet, we propose a proxy map server enabling parallel vector data fetching as well as caching to improve the performance of web-based map servers in a dynamic environment. Proxy map server is placed seamlessly anywhere between the client and the final services, intercepting users' requests. It employs an efficient parallelization technique based on spatial proximity and data density in case distributed replica exists for the same spatial data. The effectiveness of the proposed technique is proved at the end of the article by the application of creating map images enriched with earthquake seismic data records.

  6. Accuracy of Caregiver Proxy Reports of Home Care Service Use.

    Science.gov (United States)

    Chappell, Neena L; Kadlec, Helena

    2016-12-01

    Although much of the research on service use by older adults with dementia relies on proxy reports by informal caregivers, little research assesses the accuracy of these reports, and that which does exist, does not focus on home care services. This brief report compares proxy reports by family caregivers to those with dementia with provincial Ministry of Health records collected for payment and monitoring. The four home care services examined include home nursing care, adult day care, home support, and respite care. Data come from a province-wide study of caregivers in British Columbia, Canada. Caregiver reports are largely consistent with Ministry records, ranging from 81.0% agreement for home support to 96.6% for respite care. Spouses living with the care recipient (the vast majority of the sample) are the most accurate. Others, whether living with the care recipient or not, have only a 50-50 chance of being correct.

  7. Assessment of the Coral Temperature Proxies for Orbicella faveolata in the Southwestern Gulf of Mexico

    Science.gov (United States)

    Vara, M. A.; DeLong, K. L.; Herrmann, A. D.; Ouellette, G., Jr.; Richey, J. N.

    2017-12-01

    Coral Sr/Ca is a robust proxy of sea surface temperature (SST); however, discrepancies in the Sr/Ca-SST relationship among colonies of the same species may reduce confidence in absolute temperature reconstructions. Furthermore, terrestrial carbonate weathering can provide local sources of Sr and/or Ca to coastal waters that may disrupt the temperature-based coral Sr/Ca signal. Thus other trace metal SST proxies have been suggested to circumvent these issues (Li/Ca, Li/Mg, and Sr-U). Coral Ba/Ca has been used as a proxy for runoff and coastal upwelling, and therefore may be used to identify intervals when these processes overprint the Sr/Ca-SST signal. This study tests multiple coral SST proxies using reproducibility assessments to determine the best performing SST proxy. We conduct these assessments with cores recovered in 1991 by the U.S. Geological Survey from five Orbicella faveolata colonies from three reefs offshore of Veracruz, Mexico (19.06°N, 96.93°W) in water depths varying from 3 to 12 m. Previous studies found micromilling the complex skeletal structure of O. faveolata challenging and that monthly resolution may not recover full seasonal cycles. We use a laser ablation inductively coupled plasma mass spectrometer to simultaneously sample this coral's structure at weekly intervals spanning 8 years for Li/Ca, Li/Mg, Sr-U, Sr/Ca, and Ba/Ca. Here we found coral Li/Ca means and seasonal variations are similar among colonies thus this proxy may capture absolute temperature and SST variability. Similar to previous research with Porites corals, Li/Ca in these O. faveolata corals decreases with increases in SST with similar slopes and intercepts. During the last 10 years of these corals' lives, coral Sr/Ca analysis reveals a mean shift among colonies suggesting an external source could have disrupted the Sr/Ca signal, possibly seasonal runoff and/or winter upwelling common to Veracruz waters. Coral Ba/Ca analyses reveals elevated values in winters that coincide

  8. 12 CFR 269b.731 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Signature. 269b.731 Section 269b.731 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM CHARGES OF UNFAIR LABOR PRACTICES General Rules § 269b.731 Signature. The original of each document filed shall be...

  9. Reduction of a Ship's Magnetic Field Signatures

    CERN Document Server

    Holmes, John

    2008-01-01

    Decreasing the magnetic field signature of a naval vessel will reduce its susceptibility to detonating naval influence mines and the probability of a submarine being detected by underwater barriers and maritime patrol aircraft. Both passive and active techniques for reducing the magnetic signatures produced by a vessel's ferromagnetism, roll-induced eddy currents, corrosion-related sources, and stray fields are presented. Mathematical models of simple hull shapes are used to predict the levels of signature reduction that might be achieved through the use of alternate construction materials. Al

  10. Proxy records of Holocene storm events in coastal barrier systems: Storm-wave induced markers

    Science.gov (United States)

    Goslin, Jérôme; Clemmensen, Lars B.

    2017-10-01

    Extreme storm events in the coastal zone are one of the main forcing agents of short-term coastal system behavior. As such, storms represent a major threat to human activities concentrated along the coasts worldwide. In order to better understand the frequency of extreme events like storms, climate science must rely on longer-time records than the century-scale records of instrumental weather data. Proxy records of storm-wave or storm-wind induced activity in coastal barrier systems deposits have been widely used worldwide in recent years to document past storm events during the last millennia. This review provides a detailed state-of-the-art compilation of the proxies available from coastal barrier systems to reconstruct Holocene storm chronologies (paleotempestology). The present paper aims (I) to describe the erosional and depositional processes caused by storm-wave action in barrier and back-barrier systems (i.e. beach ridges, storm scarps and washover deposits), (ii) to understand how storm records can be extracted from barrier and back-barrier sedimentary bodies using stratigraphical, sedimentological, micro-paleontological and geochemical proxies and (iii) to show how to obtain chronological control on past storm events recorded in the sedimentary successions. The challenges that paleotempestology studies still face in the reconstruction of representative and reliable storm-chronologies using these various proxies are discussed, and future research prospects are outlined.

  11. Planktonic Foraminifera Proxies Calibration Off the NW Iberian Margin: Nutrients Approach

    Science.gov (United States)

    Salgueiro, E.; Castro, C. G.; Zuniga, D.; Martin, P. A.; Groeneveld, J.; de la Granda, F.; Villaceiros-Robineau, N.; Alonso-Perez, F.; Alberto, A.; Rodrigues, T.; Rufino, M. M.; Abrantes, F. F. G.; Voelker, A. H. L.

    2014-12-01

    Planktonic foraminifera (PF) shells preserved in marine sediments are a useful tool to reconstruct productivity conditions at different geological timescales. However, the accuracy of these paleoreconstructions depends on the data set and calibration quality. Several calibration works have been defining and improving the use of proxies for productivity and nutrient cycling parameters. Our contribution is centred on a multi-proxy calibration at a regional coastal upwelling system. To minimize the existing uncertainties affecting the use of trace elements and C stable isotopes as productivity proxy in the high productivity upwelling areas, we investigate the content and distribution of Ba/Ca and δ13C in the water column, its transference into the planktonic foraminifera shells, and, how the living planktonic foraminifera Ba/Ca and δ13C signal is related to the same planktonic foraminiferal species preserved in the sediment record. This study is based on a large data set from two stations (RAIA - 75m water depth, and CALIBERIA - 350m water depth) located off the NW Iberian margin (41.5-42.5ºN; 9-10ºW), and includes: i) two year monthly water column data (temperature, salinity, nutrients, chlorophyll a, Ba/Ca, and δ13C-DIC); ii) seasonal Ba/Ca, δ13C in several living PF species at both stations; and iii) Ba/Ca and δ13C in several PF species from a large set of core-top sediment samples in the study region. Additionally, total organic carbon and total alkenones were also measured in the sediment. Our results showed the link between productivity proxies in the surface sediment foraminifera assemblage and the processes regulating the actual phytoplankton dynamics in an upwelling area. The understanding of this relationship has special relevance since it gives fundamental information related to the past oceanic biogeochemistry and/or climate and improves the prevision of future changes against possible climate variability due to anthropogenic forcing.

  12. New Proxies for Climate change parameters: Foram Culturing and Pteropod Potentials

    Science.gov (United States)

    Keul, N.; Schneider, R. R.; Langer, G.; Bijma, J.; Peijnenburg, K. T.

    2017-12-01

    Global climate change is one of the most pressing challenges our society is currently facing and strong efforts are made to simulate future climate conditions. To better validate models that aim at predicting global temperature rise as a consequence of anthropogenic CO2 emissions, accurate atmospheric paleo-CO2 estimates in combination with temperature reconstructions are necessary. Consequently there is a strong need for reliable proxies, allowing reconstruction of climate change. With respect to foraminifera a combination of laboratory experiments and modeling is presented, to show the isolated impact of the different parameters of the carbonate system on trace element composition of their shells. We focus on U/Ca and Sr/Ca ratios, which have recently been established as new proxies reflecting changes in the carbonate system of seawater. While U/Ca correlates with carbonate ion concentration, Sr/Ca is primarily influenced by DIC. The latter is particularly promising since the impact of additional parameters is relatively well constrained and hence, Sr/Ca ratios may allow higher accuracy in carbonate system parameter reconstructions. Furthermore, our results will be discussed on how to advance our knowledge about foraminiferal biomineralization. Pteropods, among the first responders to ocean acidification and warming, are explored as carriers of marine paleoenvironmental signals. In order to characterize the stable isotopic composition of aragonitic pteropod shells and their variation in response to climate change parameters, pteropod shells were collected along a latitudinal transect in the Atlantic Ocean. By comparing shell oxygen isotopic composition to depth changes of the calculated aragonite equilibrium oxygen isotope values, we infer shallow calcification depths for Heliconoides inflatus (75 m), rendering this species a good potential proxy carrier for past variations in surface ocean properties. Furthermore, we demonstrate that indeed, pteropod shells are

  13. Testing the benthic foraminiferal B/Ca proxy in a hydrothermal vent environment to determine its validity under extreme conditions

    Science.gov (United States)

    Clementi, V.; Haynes, L.; Hoenisch, B.; Costa, K.; McManus, J. F.

    2016-12-01

    The boron to calcium ratio (B/Ca) and boron isotopic composition of the benthic foraminifer C. wuellerstorfi have become frequently used proxies for reconstructing carbonate chemistry in ocean bottom waters. However, elevated boron isotope data from a site proximal to the Clipperton Fracture Zone on the East Pacific Rise have led to the hypothesis that boron derived from hydrothermal fluids may be incorporated into benthic foraminifer shells (1). To date there is no comparable evidence for B/Ca at sites adjacent to hydrothermal vent systems, but hydrothermal vent fluid at the Juan de Fuca Ridge in the northeast Pacific Ocean can have boron concentrations nearly twice as high as ambient seawater (2), and other studies have documented increased levels of trace element incorporation in foraminifers living near hydrothermal vents (3). If the same effect holds true for B/Ca, the proxy may be compromised in sediments near hydrothermal vent sites. Here we present C. wuellerstorfi B/Ca data from a sediment core 5 km west of the Juan de Fuca Ridge, North Cleft Segment, to study the influence of vent fluid chemistry and partial shell dissolution on B/Ca and other trace element ratios. Our results do not show a strong hydrothermal signature on B/Ca despite the elevated boron concentrations of modern vent fluids and close proximity to the ridge. However, partial shell dissolution appears to have a significant impact on B/Ca ratios, calling for careful sample selection in future reconstructions from the region. Analysis of B/Ca and other trace element ratios across a ridge transect at a time of documented high hydrothermal activity—as indicated by high sediment hydrothermal Fe fluxes—may determine whether the hydrothermal signal is recorded further downstream from the vent fluid source. (1) Raitzsch, M. and Hönisch, B. (2010). Geology 40(5). (2) Seyfried Jr., W.E. et al. (2003). Journal of Geophys. Res.:Solid Earth 108(B9). (3) Munsel, D. et al. (2010). Biogeosci. 7.7.

  14. Does Twitter trigger bursts in signature collections?

    Science.gov (United States)

    Yamaguchi, Rui; Imoto, Seiya; Kami, Masahiro; Watanabe, Kenji; Miyano, Satoru; Yuji, Koichiro

    2013-01-01

    The quantification of social media impacts on societal and political events is a difficult undertaking. The Japanese Society of Oriental Medicine started a signature-collecting campaign to oppose a medical policy of the Government Revitalization Unit to exclude a traditional Japanese medicine, "Kampo," from the public insurance system. The signature count showed a series of aberrant bursts from November 26 to 29, 2009. In the same interval, the number of messages on Twitter including the keywords "Signature" and "Kampo," increased abruptly. Moreover, the number of messages on an Internet forum that discussed the policy and called for signatures showed a train of spikes. In order to estimate the contributions of social media, we developed a statistical model with state-space modeling framework that distinguishes the contributions of multiple social media in time-series of collected public opinions. We applied the model to the time-series of signature counts of the campaign and quantified contributions of two social media, i.e., Twitter and an Internet forum, by the estimation. We found that a considerable portion (78%) of the signatures was affected from either of the social media throughout the campaign and the Twitter effect (26%) was smaller than the Forum effect (52%) in total, although Twitter probably triggered the initial two bursts of signatures. Comparisons of the estimated profiles of the both effects suggested distinctions between the social media in terms of sustainable impact of messages or tweets. Twitter shows messages on various topics on a time-line; newer messages push out older ones. Twitter may diminish the impact of messages that are tweeted intermittently. The quantification of social media impacts is beneficial to better understand people's tendency and may promote developing strategies to engage public opinions effectively. Our proposed method is a promising tool to explore information hidden in social phenomena.

  15. Does Twitter trigger bursts in signature collections?

    Directory of Open Access Journals (Sweden)

    Rui Yamaguchi

    Full Text Available INTRODUCTION: The quantification of social media impacts on societal and political events is a difficult undertaking. The Japanese Society of Oriental Medicine started a signature-collecting campaign to oppose a medical policy of the Government Revitalization Unit to exclude a traditional Japanese medicine, "Kampo," from the public insurance system. The signature count showed a series of aberrant bursts from November 26 to 29, 2009. In the same interval, the number of messages on Twitter including the keywords "Signature" and "Kampo," increased abruptly. Moreover, the number of messages on an Internet forum that discussed the policy and called for signatures showed a train of spikes. METHODS AND FINDINGS: In order to estimate the contributions of social media, we developed a statistical model with state-space modeling framework that distinguishes the contributions of multiple social media in time-series of collected public opinions. We applied the model to the time-series of signature counts of the campaign and quantified contributions of two social media, i.e., Twitter and an Internet forum, by the estimation. We found that a considerable portion (78% of the signatures was affected from either of the social media throughout the campaign and the Twitter effect (26% was smaller than the Forum effect (52% in total, although Twitter probably triggered the initial two bursts of signatures. Comparisons of the estimated profiles of the both effects suggested distinctions between the social media in terms of sustainable impact of messages or tweets. Twitter shows messages on various topics on a time-line; newer messages push out older ones. Twitter may diminish the impact of messages that are tweeted intermittently. CONCLUSIONS: The quantification of social media impacts is beneficial to better understand people's tendency and may promote developing strategies to engage public opinions effectively. Our proposed method is a promising tool to explore

  16. Poor-to-moderate agreement between self and proxy interviews of mobile phone use.

    Science.gov (United States)

    Hutter, Hans-Peter; Ehrenhöfer, Lisa; Freuis, Edith; Hartl, Patrik; Kundi, Michael

    2012-10-01

    In epidemiological studies, cases cannot always be interviewed due to them being too ill or already deceased. Under these circumstances, proxy interviews are often conducted; however, the veridicality of information about mobile phone use gained by proxy interviews has been doubted. The issue is undecided due to the lack of empirical data. We conducted a study of 119 heterosexual couples. Both partners answered two questionnaires about mobile phone use, one about their own use and one about their partner's use. Overall agreement assessed using Cohen's kappa, Passing and Bablok regression, and concordance coefficients between self and proxy data was poor to moderate (e.g., concordance coefficients of 0.55 for duration of use). The only item with good agreement was whether or not a prepaid phone was used (Cohen's kappa 0.78 and 0.63 for male and female estimates, respectively), and to a lesser degree, the onset of mobile phone use (concordance coefficients of 0.66 and 0.61). Poorest agreement was obtained for the side of the head the mobile phone was held during calls (kappa coefficients of 0.20 and 0.24 for female and male estimates, respectively). We conclude that the assessment of mobile phone use by proxy data cannot be relied on except for information about onset of mobile phone use, use of prepaid or contract phones, and, to a lesser degree, duration of daily use. Agreement concerning the important information about side of the head the mobile phone is held during calls was poorest and only slightly better than chance. Copyright © 2012 Wiley Periodicals, Inc.

  17. Modeling ground vehicle acoustic signatures for analysis and synthesis

    International Nuclear Information System (INIS)

    Haschke, G.; Stanfield, R.

    1995-01-01

    Security and weapon systems use acoustic sensor signals to classify and identify moving ground vehicles. Developing robust signal processing algorithms for this is expensive, particularly in presence of acoustic clutter or countermeasures. This paper proposes a parametric ground vehicle acoustic signature model to aid the system designer in understanding which signature features are important, developing corresponding feature extraction algorithms and generating low-cost, high-fidelity synthetic signatures for testing. The authors have proposed computer-generated acoustic signatures of armored, tracked ground vehicles to deceive acoustic-sensored smart munitions. They have developed quantitative measures of how accurately a synthetic acoustic signature matches those produced by actual vehicles. This paper describes parameters of the model used to generate these synthetic signatures and suggests methods for extracting these parameters from signatures of valid vehicle encounters. The model incorporates wide-bandwidth and narrow- bandwidth components that are modulated in a pseudo-random fashion to mimic the time dynamics of valid vehicle signatures. Narrow- bandwidth feature extraction techniques estimate frequency, amplitude and phase information contained in a single set of narrow frequency- band harmonics. Wide-bandwidth feature extraction techniques estimate parameters of a correlated-noise-floor model. Finally, the authors propose a method of modeling the time dynamics of the harmonic amplitudes as a means adding necessary time-varying features to the narrow-bandwidth signal components. The authors present results of applying this modeling technique to acoustic signatures recorded during encounters with one armored, tracked vehicle. Similar modeling techniques can be applied to security systems

  18. Adaptive protection scheme

    Directory of Open Access Journals (Sweden)

    R. Sitharthan

    2016-09-01

    Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.

  19. DIGITAL SIGNATURE IN THE WAY OF LAW

    OpenAIRE

    Ruya Samlı

    2013-01-01

    Signature can be defined as a person’s name or special signs that he/she writes when he/she wants to indicate he/she wrote or confirm that writing. A person signs many times in his/her life. A person’s signature that is used for thousands of times for many things from formal documents to exams has importance for that person. Especially, signing in legal operations is an operation that can build important results. If a person’s signature is imitated by another person, he/she can be...

  20. Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme

    Science.gov (United States)

    Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook

    1995-01-01

    Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.

  1. Attribute-based proxy re-encryption with keyword search.

    Science.gov (United States)

    Shi, Yanfeng; Liu, Jiqiang; Han, Zhen; Zheng, Qingji; Zhang, Rui; Qiu, Shuo

    2014-01-01

    Keyword search on encrypted data allows one to issue the search token and conduct search operations on encrypted data while still preserving keyword privacy. In the present paper, we consider the keyword search problem further and introduce a novel notion called attribute-based proxy re-encryption with keyword search (ABRKS), which introduces a promising feature: In addition to supporting keyword search on encrypted data, it enables data owners to delegate the keyword search capability to some other data users complying with the specific access control policy. To be specific, ABRKS allows (i) the data owner to outsource his encrypted data to the cloud and then ask the cloud to conduct keyword search on outsourced encrypted data with the given search token, and (ii) the data owner to delegate other data users keyword search capability in the fine-grained access control manner through allowing the cloud to re-encrypted stored encrypted data with a re-encrypted data (embedding with some form of access control policy). We formalize the syntax and security definitions for ABRKS, and propose two concrete constructions for ABRKS: key-policy ABRKS and ciphertext-policy ABRKS. In the nutshell, our constructions can be treated as the integration of technologies in the fields of attribute-based cryptography and proxy re-encryption cryptography.

  2. Attribute-Based Proxy Re-Encryption with Keyword Search

    Science.gov (United States)

    Shi, Yanfeng; Liu, Jiqiang; Han, Zhen; Zheng, Qingji; Zhang, Rui; Qiu, Shuo

    2014-01-01

    Keyword search on encrypted data allows one to issue the search token and conduct search operations on encrypted data while still preserving keyword privacy. In the present paper, we consider the keyword search problem further and introduce a novel notion called attribute-based proxy re-encryption with keyword search (), which introduces a promising feature: In addition to supporting keyword search on encrypted data, it enables data owners to delegate the keyword search capability to some other data users complying with the specific access control policy. To be specific, allows (i) the data owner to outsource his encrypted data to the cloud and then ask the cloud to conduct keyword search on outsourced encrypted data with the given search token, and (ii) the data owner to delegate other data users keyword search capability in the fine-grained access control manner through allowing the cloud to re-encrypted stored encrypted data with a re-encrypted data (embedding with some form of access control policy). We formalize the syntax and security definitions for , and propose two concrete constructions for : key-policy and ciphertext-policy . In the nutshell, our constructions can be treated as the integration of technologies in the fields of attribute-based cryptography and proxy re-encryption cryptography. PMID:25549257

  3. Signature detection and matching for document image retrieval.

    Science.gov (United States)

    Zhu, Guangyu; Zheng, Yefeng; Doermann, David; Jaeger, Stefan

    2009-11-01

    As one of the most pervasive methods of individual identification and document authentication, signatures present convincing evidence and provide an important form of indexing for effective document image processing and retrieval in a broad range of applications. However, detection and segmentation of free-form objects such as signatures from clustered background is currently an open document analysis problem. In this paper, we focus on two fundamental problems in signature-based document image retrieval. First, we propose a novel multiscale approach to jointly detecting and segmenting signatures from document images. Rather than focusing on local features that typically have large variations, our approach captures the structural saliency using a signature production model and computes the dynamic curvature of 2D contour fragments over multiple scales. This detection framework is general and computationally tractable. Second, we treat the problem of signature retrieval in the unconstrained setting of translation, scale, and rotation invariant nonrigid shape matching. We propose two novel measures of shape dissimilarity based on anisotropic scaling and registration residual error and present a supervised learning framework for combining complementary shape information from different dissimilarity metrics using LDA. We quantitatively study state-of-the-art shape representations, shape matching algorithms, measures of dissimilarity, and the use of multiple instances as query in document image retrieval. We further demonstrate our matching techniques in offline signature verification. Extensive experiments using large real-world collections of English and Arabic machine-printed and handwritten documents demonstrate the excellent performance of our approaches.

  4. Light is an active contributor to the vital effects of coral skeleton proxies

    Science.gov (United States)

    Juillet-Leclerc, Anne; Reynaud, Stéphanie; Dissard, Delphine; Tisserand, Guillaume; Ferrier-Pagès, Christine

    2014-09-01

    Symbiotic colonies of the coral Acropora sp. were cultured in a factorial design of three temperatures (21, 25 and 28 °C) and two light intensities (200 and 400 μmol photon m-2 s-1), under constant conditions. A temperature of 25 °C and a light intensity of 200 μmol photon m-2 s-1 was the starting culture condition. Metabolic (photosynthesis, respiration, calcification and surface expansion rate) and geochemical measurements (δ18O, δ13C, Sr/Ca and Mg/Ca) were conducted on 6 colonies for each experimental condition. Metabolic measurements confirmed that respiration, photosynthesis, calcification and surface expansion rate responded to the combined effect of temperature and light. Under each light intensity, mean calcification rate was linearly correlated with mean photosynthetic activity. Geochemical measurements were also influenced by temperature and, to a lesser degree, by light. All geochemical proxies measured on 6 nubbins showed a wide scattering of values, regardless of the environmental condition. Compared to the other proxies, δ18O exhibited a different behavior. It was the only proxy exhibiting temperature tracer behavior. However, while mean values of Sr/Ca, Mg/Ca and δ13C were well correlated, the correlation between the later and mean δ18O differed with light level. This suggests that both skeleton deposition and temperature oxygen fractionation differs according to light intensity. Overall, the effect of light on geochemical values seems to compromise the use of proxy calibrations solely based on temperature influence. Under high light conditions, the great amplitude shown by individual net photosynthesis is directly proportional to the highly variable zooxanthellae density. As light is affecting all of the proxies, we thus assume that the strong geochemical variability observed could be explained by various algae densities, each nubbin responding according to its zooxanthellae amount. Accordingly, we suggest that each symbiosome (the

  5. Proxying UPnP service discovery and access to a non-IP Bluetooth network on a mobile phone

    NARCIS (Netherlands)

    Delphinanto, A.; Koonen, A.M.J.; Hartog, den F.T.H.; Peeters, M.E.

    2007-01-01

    The current service-and device discovery protocols are not platform-and network independent. Therefore, proxy servers will be needed to extend the range of IP-based discovery protocols to non-IP domains. We developed an architecture of a proxy that enables Universal Plug and Play (UPnP) devices and

  6. TEX86 paleothermometry : proxy validation and application in marine sediments

    NARCIS (Netherlands)

    Huguet, C.

    2007-01-01

    Determination of past sea surface temperature (SST) is of primary importance for the reconstruction of natural climatic changes, modelling of climate and reconstruction of ocean circulation. Recently, a new SST proxy was introduced, the TetraEther indeX of lipids with 86 carbons (TEX86), which is

  7. TEX₈₆ paleothermometry : proxy validation and application in marine sediments

    NARCIS (Netherlands)

    Huguet, Carme

    2007-01-01

    Determination of past sea surface temperature (SST) is of primary importance for the reconstruction of natural climatic changes, modelling of climate and reconstruction of ocean circulation. Recently, a new SST proxy was introduced, the TetraEther indeX of lipids with 86 carbons (TEX₈₆), which is

  8. Constraining Lipid Biomarker Paleoclimate Proxies in a Small Arctic Watershed

    Science.gov (United States)

    Dion-Kirschner, H.; McFarlin, J. M.; Axford, Y.; Osburn, M. R.

    2017-12-01

    Arctic amplification of climate change renders high-latitude environments unusually sensitive to changes in climatic conditions (Serreze and Barry, 2011). Lipid biomarkers, and their hydrogen and carbon isotopic compositions, can yield valuable paleoclimatic and paleoecological information. However, many variables affect the production and preservation of lipids and their constituent isotopes, including precipitation, plant growth conditions, biosynthesis mechanisms, and sediment depositional processes (Sachse et al., 2012). These variables are particularly poorly constrained for high-latitude environments, where trees are sparse or not present, and plants grow under continuous summer light and cool temperatures during a short growing season. Here we present a source-to-sink study of a single watershed from the Kangerlussuaq region of southwest Greenland. Our analytes from in and around `Little Sugarloaf Lake' (LSL) include terrestrial and aquatic plants, plankton, modern lake water, surface sediments, and a sediment core. This diverse sample set allows us to fulfill three goals: 1) We evaluate the production of lipids and isotopic signatures in the modern watershed in comparison to modern climate. Our data exhibit genus-level trends in leaf wax production and isotopic composition, and help clarify the difference between terrestrial and aquatic signals. 2) We evaluate the surface sediment of LSL to determine how lipid biomarkers from the watershed are incorporated into sediments. We constrain the relative contributions of terrestrial plants, aquatic plants, and other aquatic organisms to the sediment in this watershed. 3) We apply this modern source-to-sink calibration to the analysis of a 65 cm sediment core record. Our core is organic-rich, and relatively high deposition rates allow us to reconstruct paleoenvironmental changes with high resolution. Our work will help determine the veracity of these common paleoclimate proxies, specifically for research in

  9. POLAR NETWORK INDEX AS A MAGNETIC PROXY FOR THE SOLAR CYCLE STUDIES

    International Nuclear Information System (INIS)

    Priyal, Muthu; Banerjee, Dipankar; Ravindra, B.; Singh, Jagdev; Karak, Bidya Binay; Muñoz-Jaramillo, Andrés; Choudhuri, Arnab Rai

    2014-01-01

    The Sun has a polar magnetic field which oscillates with the 11 yr sunspot cycle. This polar magnetic field is an important component of the dynamo process which operates in the solar convection zone and produces the sunspot cycle. We have direct systematic measurements of the Sun's polar magnetic field only from about the mid-1970s. There are, however, indirect proxies which give us information about this field at earlier times. The Ca-K spectroheliograms taken at the Kodaikanal Solar Observatory during 1904-2007 have now been digitized with 4k × 4k CCD and have higher resolution (∼0.86 arcsec) than the other available historical data sets. From these Ca-K spectroheliograms, we have developed a completely new proxy (polar network index, hereafter PNI) for the Sun's polar magnetic field. We calculate PNI from the digitized images using an automated algorithm and calibrate our measured PNI against the polar field as measured by the Wilcox Solar Observatory for the period 1976-1990. This calibration allows us to estimate the polar fields for the earlier period up to 1904. The dynamo calculations performed with this proxy as input data reproduce reasonably well the Sun's magnetic behavior for the past century

  10. POLAR NETWORK INDEX AS A MAGNETIC PROXY FOR THE SOLAR CYCLE STUDIES

    Energy Technology Data Exchange (ETDEWEB)

    Priyal, Muthu; Banerjee, Dipankar; Ravindra, B.; Singh, Jagdev [Indian Institute of Astrophysics,Koramangala, Bengaluru 560034 (India); Karak, Bidya Binay [Nordita, KTH Royal Institute of Technology and Stockholm University (Sweden); Muñoz-Jaramillo, Andrés [Montana State University, Bozeman, MT 59717 (United States); Choudhuri, Arnab Rai, E-mail: mpriya@iiap.res.in, E-mail: dipu@iiap.res.in [Indian Institute of Science, Bangalore (India)

    2014-09-20

    The Sun has a polar magnetic field which oscillates with the 11 yr sunspot cycle. This polar magnetic field is an important component of the dynamo process which operates in the solar convection zone and produces the sunspot cycle. We have direct systematic measurements of the Sun's polar magnetic field only from about the mid-1970s. There are, however, indirect proxies which give us information about this field at earlier times. The Ca-K spectroheliograms taken at the Kodaikanal Solar Observatory during 1904-2007 have now been digitized with 4k × 4k CCD and have higher resolution (∼0.86 arcsec) than the other available historical data sets. From these Ca-K spectroheliograms, we have developed a completely new proxy (polar network index, hereafter PNI) for the Sun's polar magnetic field. We calculate PNI from the digitized images using an automated algorithm and calibrate our measured PNI against the polar field as measured by the Wilcox Solar Observatory for the period 1976-1990. This calibration allows us to estimate the polar fields for the earlier period up to 1904. The dynamo calculations performed with this proxy as input data reproduce reasonably well the Sun's magnetic behavior for the past century.

  11. Security-enhanced chaos communication with time-delay signature suppression and phase encryption.

    Science.gov (United States)

    Xue, Chenpeng; Jiang, Ning; Lv, Yunxin; Wang, Chao; Li, Guilan; Lin, Shuqing; Qiu, Kun

    2016-08-15

    A security-enhanced chaos communication scheme with time delay signature (TDS) suppression and phase-encrypted feedback light is proposed, in virtue of dual-loop feedback with independent high-speed phase modulation. We numerically investigate the property of TDS suppression in the intensity and phase space and quantitatively discuss security of the proposed system by calculating the bit error rate of eavesdroppers who try to crack the system by directly filtering the detected signal or by using a similar semiconductor laser to synchronize the link signal and extract the data. The results show that TDS embedded in the chaotic carrier can be well suppressed by properly setting the modulation frequency, which can keep the time delay a secret from the eavesdropper. Moreover, because the feedback light is encrypted, without the accurate time delay and key, the eavesdropper cannot reconstruct the symmetric operation conditions and decode the correct data.

  12. 48 CFR 4.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Contracting officer's signature. 4.101 Section 4.101 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Contract Execution 4.101 Contracting officer's signature. Only contracting officers shall...

  13. Assessing 5 years of GOSAT Proxy XCH4 data and associated uncertainties

    Directory of Open Access Journals (Sweden)

    R. J. Parker

    2015-11-01

    Full Text Available We present 5 years of GOSAT XCH4 retrieved using the "proxy" approach. The Proxy XCH4 data are validated against ground-based TCCON observations and are found to be of high quality with a small bias of 4.8 ppb (∼ 0.27 % and a single-sounding precision of 13.4 ppb (∼ 0.74 %. The station-to-station bias (ameasure of the relative accuracy is found to be 4.2 ppb. For the first time the XCH4 / XCO2 ratio component of the Proxy retrieval is validated (bias of 0.014 ppb ppm−1 (∼ 0.30 %, single-sounding precision of 0.033 ppb ppm−1 (∼ 0.72 %. The uncertainty relating to the model XCO2 component of the Proxy XCH4 is assessed through the use of an ensemble of XCO2 models. While each individual XCO2 model is found to agree well with the TCCON validation data (r = 0.94–0.97, it is not possible to select one model as the best from our comparisons. The median XCO2 value of the ensemble has a smaller scatter against TCCON (a standard deviation of 0.92 ppm than any of the individual models whilst maintaining a small bias (0.15 ppm. This model median XCO2 is used to calculate the Proxy XCH4 with the maximum deviation of the ensemble from the median used as an estimate of the uncertainty. We compare this uncertainty to the a posteriori retrieval error (which is assumed to reduce with sqrt(N and find typically that the model XCO2 uncertainty becomes significant during summer months when the a posteriori error is at its lowest due to the increase in signal related to increased summertime reflected sunlight. We assess the significance of these model and retrieval uncertainties on flux inversion by comparing the GOSAT XCH4 against modelled XCH4 from TM5-4DVAR constrained by NOAA surface observations (MACC reanalysis scenario S1-NOAA. We find that for the majority of regions the differences are much larger than the estimated uncertainties. Our findings show that useful information will be provided to the inversions for the majority of regions in addition

  14. 37 CFR 2.74 - Form and signature of amendment.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Form and signature of... signature of amendment. (a) Form of Amendment. Amendments should be set forth clearly and completely... record. (b) Signature. A request for amendment of an application must be signed by the applicant, someone...

  15. 21 CFR 11.200 - Electronic signature components and controls.

    Science.gov (United States)

    2010-04-01

    ... signature components and controls. (a) Electronic signatures that are not based upon biometrics shall: (1) Employ at least two distinct identification components such as an identification code and password. (i... signatures based upon biometrics shall be designed to ensure that they cannot be used by anyone other than...

  16. THE ELECTRONIC SIGNATURE

    Directory of Open Access Journals (Sweden)

    Voiculescu Madalina Irena

    2009-05-01

    Full Text Available Article refers to significance and the digital signature in electronic commerce. Internet and electronic commerce open up many new opportunities for the consumer, yet, the security (or perceived lack of security of exchanging personal and financial data

  17. Staggering in signature partners of A∼190 mass region of superdeformed rotational bands

    International Nuclear Information System (INIS)

    Uma, V.S.; Goel, Alpana; Yadav, Archana

    2014-01-01

    This paper discuss about ΔI=1 signature splitting in signature partner pairs of A∼190 mass region. Around twenty signature partner pairs (usually called as two bands, each with a fixed signature) have been reported in this mass region. For these signature pairs, band head moment of inertia (J 0 ) and intrinsic structure of each pair of signature partners have been found as almost identical. Also, these signature partner pairs showed large amplitude signature splitting. As each of the two signature partner forms a regular spin sequence and signature bands are not equivalent in terms of energies. This difference in energies results in signature splitting

  18. Compensation scheme for online neutron detection using a Gd-covered CdZnTe sensor

    Energy Technology Data Exchange (ETDEWEB)

    Dumazert, Jonathan, E-mail: jonathan.dumazert@cea.fr; Coulon, Romain; Kondrasovs, Vladimir; Boudergui, Karim

    2017-06-11

    The development of portable and personal neutron dosimeters requires compact and efficient radiation sensors. Gd-157, Gd-155 and Cd-113 nuclei present the highest cross-sections for thermal neutron capture among natural isotopes. In order to allow for the exploitation of the low and medium-energy radiative signature of the said captures, the contribution of gamma background radiation, falling into the same energy range, needs to be cancelled out. This paper introduces a thermal neutron detector based on a twin-dense semiconductor scheme. The neutron-sensitive channel takes the form of a Gd-covered CdZnTe crystal, a high density and effective atomic number detection medium. The background compensation will be carried out by means of an identical CdZnTe sensor with a Tb cover. The setting of a hypothesis test aims at discriminating the signal generated by the signature of thermal neutron captures in Gd from statistical fluctuations over the compensation of both independent channels. The measurement campaign conducted with an integrated single-channel chain and two metal Gd and Tb covers, under Cs-137 and Cf-252 irradiations, provides first quantitative results on gamma-rejection and neutron sensitivity. The described study of concept gives grounds for a portable, online-compatible device, operable in conventional to controlled environments.

  19. 22 CFR 92.28 - Signature of affiant on affidavit.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Signature of affiant on affidavit. 92.28 Section 92.28 Foreign Relations DEPARTMENT OF STATE LEGAL AND RELATED SERVICES NOTARIAL AND RELATED SERVICES Specific Notarial Acts § 92.28 Signature of affiant on affidavit. The signature of the affiant is...

  20. Induced Temporal Signatures for Point-Source Detection

    International Nuclear Information System (INIS)

    Stephens, Daniel L.; Runkle, Robert C.; Carlson, Deborah K.; Peurrung, Anthony J.; Seifert, Allen; Wyatt, Cory R.

    2005-01-01

    Detection of radioactive point-sized sources is inherently divided into two regimes encompassing stationary and moving detectors. The two cases differ in their treatment of background radiation and its influence on detection sensitivity. In the stationary detector case the statistical fluctuation of the background determines the minimum detectable quantity. In the moving detector case the detector may be subjected to widely and irregularly varying background radiation, as a result of geographical and environmental variation. This significant systematic variation, in conjunction with the statistical variation of the background, requires a conservative threshold to be selected to yield the same false-positive rate as the stationary detection case. This results in lost detection sensitivity for real sources. This work focuses on a simple and practical modification of the detector geometry that increase point-source recognition via a distinctive temporal signature. A key part of this effort is the integrated development of both detector geometries that induce a highly distinctive signature for point sources and the development of statistical algorithms able to optimize detection of this signature amidst varying background. The identification of temporal signatures for point sources has been demonstrated and compared with the canonical method showing good results. This work demonstrates that temporal signatures are efficient at increasing point-source discrimination in a moving detector system

  1. Optical/Infrared Signatures for Space-Based Remote Sensing

    National Research Council Canada - National Science Library

    Picard, R. H; Dewan, E. M; Winick, J. R; O'Neil, R. R

    2007-01-01

    This report describes work carried out under the Air Force Research Laboratory's basic research task in optical remote-sensing signatures, entitled Optical / Infrared Signatures for Space-Based Remote Sensing...

  2. Health-related quality of life in children and adolescents: Current normative data, determinants and reliability on proxy-report.

    Science.gov (United States)

    Meyer, Michael; Oberhoffer, Renate; Hock, Julia; Giegerich, Tobias; Müller, Jan

    2016-06-01

    Health-related quality of life (HrQoL) is a multidimensional concept including self-reported measures of physical and mental health. Throughout the last decades, HrQoL has become a more and more important outcome measure not only in clinical conditions. This study evaluates current HrQoL of healthy children and adolescents, determinants of HrQoL, and the agreement between self- and proxy-report. From April 2012 to July 2013, we prospectively examined 530 healthy children (13.2 ± 2.1 years, 236 girls) and their parents on their childrens HrQoL using the KINDL-R self-report questionnaire and the parent's proxy-report. Data was compared to the established reference value from 2007 and the agreement of self- and parent's proxy-report was assessed by calculation of intraclass correlation coefficient (ICC). In general, the HrQoL improved compared to references in both children's (104.5 ± 12.6 % of predicted reference value, P proxy-report (104.3 ± 12.3 % of predicted reference value, P proxy-report (ICC: .774). Only in the domains 'self-esteem' (ICC: .558) and 'Emotional well-being' (ICC: .612) the agreements were moderate. HrQoL perception has increased throughout the past 10 years and worsens with increasing age. Moreover, the parent's proxy-report of the KINDL-R questionnaire is a good supplementary method to provide additional information regarding to children's HrQoL. © 2016 Paediatrics and Child Health Division (The Royal Australasian College of Physicians).

  3. Analysis of signature wrapping attacks and countermeasures

    DEFF Research Database (Denmark)

    Gajek, Sebastian; Jensen, Meiko; Liao, Lijun

    2009-01-01

    In recent research it turned out that Boolean verification, of digital signatures in the context of WSSecurity, is likely to fail: If parts of a SOAP message, are signed and the signature verification applied to, the whole document returns true, then nevertheless the, document may have been...

  4. Persistent solar signatures in cloud cover: spatial and temporal analysis

    International Nuclear Information System (INIS)

    Voiculescu, M; Usoskin, I

    2012-01-01

    A consensus regarding the impact of solar variability on cloud cover is far from being reached. Moreover, the impact of cloud cover on climate is among the least understood of all climate components. This motivated us to analyze the persistence of solar signals in cloud cover for the time interval 1984–2009, covering two full solar cycles. A spatial and temporal investigation of the response of low, middle and high cloud data to cosmic ray induced ionization (CRII) and UV irradiance (UVI) is performed in terms of coherence analysis of the two signals. For some key geographical regions the response of clouds to UVI and CRII is persistent over the entire time interval indicating a real link. In other regions, however, the relation is not consistent, being intermittent or out of phase, suggesting that some correlations are spurious. The constant in phase or anti-phase relationship between clouds and solar proxies over some regions, especially for low clouds with UVI and CRII, middle clouds with UVI and high clouds with CRII, definitely requires more study. Our results show that solar signatures in cloud cover persist in some key climate-defining regions for the entire time period and supports the idea that, if existing, solar effects are not visible at the global level and any analysis of solar effects on cloud cover (and, consequently, on climate) should be done at the regional level. (letter)

  5. Statistical framework for evaluation of climate model simulations by use of climate proxy data from the last millennium - Part 1: Theory

    Science.gov (United States)

    Sundberg, R.; Moberg, A.; Hind, A.

    2012-08-01

    A statistical framework for comparing the output of ensemble simulations from global climate models with networks of climate proxy and instrumental records has been developed, focusing on near-surface temperatures for the last millennium. This framework includes the formulation of a joint statistical model for proxy data, instrumental data and simulation data, which is used to optimize a quadratic distance measure for ranking climate model simulations. An essential underlying assumption is that the simulations and the proxy/instrumental series have a shared component of variability that is due to temporal changes in external forcing, such as volcanic aerosol load, solar irradiance or greenhouse gas concentrations. Two statistical tests have been formulated. Firstly, a preliminary test establishes whether a significant temporal correlation exists between instrumental/proxy and simulation data. Secondly, the distance measure is expressed in the form of a test statistic of whether a forced simulation is closer to the instrumental/proxy series than unforced simulations. The proposed framework allows any number of proxy locations to be used jointly, with different seasons, record lengths and statistical precision. The goal is to objectively rank several competing climate model simulations (e.g. with alternative model parameterizations or alternative forcing histories) by means of their goodness of fit to the unobservable true past climate variations, as estimated from noisy proxy data and instrumental observations.

  6. Implication of biomarkers signatures of the Ulleung Basin, East Sea, during the Pleistocene

    Science.gov (United States)

    Choi, Jiyoung; Lee, Kyung Eun; Kim, Ji-Hoon; Bahk, Jang-Jun; Yoo, Dong-Geun

    2014-05-01

    In this study, the molecular distribution of the n-alkanes, alkenone and C/N ratio and δ13C of bulk sediment were used to assess changes in organic matter (OM) source and transport which could be related with paleoclimate change. The proxy records corresponding to the Pleistocene have been obtained from the well-studied the Ulleung Basin Gas Hydrate Expedition 2 (UBGH2) site 11 in the Ulleung Basin, East Sea. The distribution of carbon preference index (CPI) of n-alkane encountered in this study confirmed the importance of terrestrial OM in the marine sediment. Alkenone has been widely applied for sea surface temperature (SST) reconstruction. The data results show that CPI values generally increase with decreasing paleo-SST. Plot of C/N ratio versus δ13C shows a predominance of marine algae origin in the study area. It may indicate that the minimum CPI in warm period is related with the contribution of probably enhanced biodegradation, while the maximum CPI value in cold period result from restrain of OM input associated with sea level lowering. It is likely that the vertical variations of the biomarkers signature reflect the shifts in sedimentary environment and transportation related with change of ocean currents and sea level during the Pleistocene period.

  7. Molecular Signature in HCV-Positive Lymphomas

    Directory of Open Access Journals (Sweden)

    Valli De Re

    2012-01-01

    Full Text Available Hepatitis C virus (HCV is a positive, single-stranded RNA virus, which has been associated to different subtypes of B-cell non-Hodgkin lymphoma (B-NHL. Cumulative evidence suggests an HCV-related antigen driven process in the B-NHL development. The underlying molecular signature associated to HCV-related B-NHL has to date remained obscure. In this review, we discuss the recent developments in this field with a special mention to different sets of genes whose expression is associated with BCR coupled to Blys signaling which in turn was found to be linked to B-cell maturation stages and NF-κb transcription factor. Even if recent progress on HCV-B-NHL signature has been made, the precise relationship between HCV and lymphoma development and phenotype signature remain to be clarified.

  8. 32 CFR 842.6 - Signature on the claim form.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Signature on the claim form. 842.6 Section 842.6... ADMINISTRATIVE CLAIMS General Information § 842.6 Signature on the claim form. The claimant or authorized agent... authorized agent signing for a claimant shows, after the signature, the title or capacity and attaches...

  9. Thermal signature measurements for ammonium nitrate/fuel mixtures by laser heating

    International Nuclear Information System (INIS)

    Nazarian, Ashot; Presser, Cary

    2016-01-01

    Highlights: • LDTR is a useful diagnostic for characterizing AN/fuel mixture thermochemical behavior. • Each AN/fuel mixture thermal signature was different. • AN/fuel mixture signature features were defined by the individual constituents. • Baseline signatures changed after an experiment. - Abstract: Measurements were carried out to obtain thermal signatures of several ammonium nitrate/fuel (ANF) mixtures, using a laser-heating technique referred to as the laser-driven thermal reactor (LDTR). The mixtures were ammonium nitrate (AN)/kerosene, AN/ethylene glycol, AN/paraffin wax, AN/petroleum jelly, AN/confectioner's sugar, AN/cellulose (tissue paper), nitromethane/cellulose, nitrobenzene/cellulose, AN/cellulose/nitromethane, AN/cellulose/nitrobenzene. These mixtures were also compared with AN/nitromethane and AN/diesel fuel oil, obtained from an earlier investigation. Thermograms for the mixtures, as well as individual constituents, were compared to better understand how sample thermal signature changes with mixture composition. This is the first step in development of a thermal-signature database, to be used along with other signature databases, to improve identification of energetic substances of unknown composition. The results indicated that each individual thermal signature was associated unambiguously with a particular mixture composition. The signature features of a particular mixture were shaped by the individual constituent signatures. It was also uncovered that the baseline signature was modified after an experiment due to coating of unreacted residue on the substrate surface and a change in the reactor sphere oxide layer. Thus, care was required to pre-oxidize the sphere prior to an experiment. A minimum sample mass (which was dependent on composition) was required to detect the signature characteristics. Increased laser power served to magnify signal strength while preserving the signature features. For the mixtures examined, the thermal

  10. Cubic Bezier Curve Approach for Automated Offline Signature Verification with Intrusion Identification

    Directory of Open Access Journals (Sweden)

    Arun Vijayaragavan

    2014-01-01

    Full Text Available Authentication is a process of identifying person’s rights over a system. Many authentication types are used in various systems, wherein biometrics authentication systems are of a special concern. Signature verification is a basic biometric authentication technique used widely. The signature matching algorithm uses image correlation and graph matching technique which provides false rejection or acceptance. We proposed a model to compare knowledge from signature. Intrusion in the signature repository system results in copy of the signature that leads to false acceptance. Our approach uses a Bezier curve algorithm to identify the curve points and uses the behaviors of the signature for verification. An analyzing mobile agent is used to identify the input signature parameters and compare them with reference signature repository. It identifies duplication of signature over intrusion and rejects it. Experiments are conducted on a database with thousands of signature images from various sources and the results are favorable.

  11. 27 CFR 70.52 - Signature presumed authentic.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false Signature presumed authentic. 70.52 Section 70.52 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE... Collection of Excise and Special (Occupational) Tax Collection-General Provisions § 70.52 Signature presumed...

  12. 13 CFR 134.209 - Requirement of signature.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Requirement of signature. 134.209 Section 134.209 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION RULES OF PROCEDURE GOVERNING... of signature. Every written submission to OHA, other than evidence, must be signed by the party...

  13. Electronic Signature (eSig)

    Data.gov (United States)

    Department of Veterans Affairs — Beginning with the Government Paperwork Elimination Act of 1998 (GPEA), the Federal government has encouraged the use of electronic / digital signatures to enable...

  14. Radar Signature Calculation Facility

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: The calculation, analysis, and visualization of the spatially extended radar signatures of complex objects such as ships in a sea multipath environment and...

  15. Uncertainty in hydrological signatures for gauged and ungauged catchments

    Science.gov (United States)

    Westerberg, Ida K.; Wagener, Thorsten; Coxon, Gemma; McMillan, Hilary K.; Castellarin, Attilio; Montanari, Alberto; Freer, Jim

    2016-03-01

    Reliable information about hydrological behavior is needed for water-resource management and scientific investigations. Hydrological signatures quantify catchment behavior as index values, and can be predicted for ungauged catchments using a regionalization procedure. The prediction reliability is affected by data uncertainties for the gauged catchments used in prediction and by uncertainties in the regionalization procedure. We quantified signature uncertainty stemming from discharge data uncertainty for 43 UK catchments and propagated these uncertainties in signature regionalization, while accounting for regionalization uncertainty with a weighted-pooling-group approach. Discharge uncertainty was estimated using Monte Carlo sampling of multiple feasible rating curves. For each sampled rating curve, a discharge time series was calculated and used in deriving the gauged signature uncertainty distribution. We found that the gauged uncertainty varied with signature type, local measurement conditions and catchment behavior, with the highest uncertainties (median relative uncertainty ±30-40% across all catchments) for signatures measuring high- and low-flow magnitude and dynamics. Our regionalization method allowed assessing the role and relative magnitudes of the gauged and regionalized uncertainty sources in shaping the signature uncertainty distributions predicted for catchments treated as ungauged. We found that (1) if the gauged uncertainties were neglected there was a clear risk of overconditioning the regionalization inference, e.g., by attributing catchment differences resulting from gauged uncertainty to differences in catchment behavior, and (2) uncertainty in the regionalization results was lower for signatures measuring flow distribution (e.g., mean flow) than flow dynamics (e.g., autocorrelation), and for average flows (and then high flows) compared to low flows.

  16. ADAGE signature analysis: differential expression analysis with data-defined gene sets.

    Science.gov (United States)

    Tan, Jie; Huyck, Matthew; Hu, Dongbo; Zelaya, René A; Hogan, Deborah A; Greene, Casey S

    2017-11-22

    Gene set enrichment analysis and overrepresentation analyses are commonly used methods to determine the biological processes affected by a differential expression experiment. This approach requires biologically relevant gene sets, which are currently curated manually, limiting their availability and accuracy in many organisms without extensively curated resources. New feature learning approaches can now be paired with existing data collections to directly extract functional gene sets from big data. Here we introduce a method to identify perturbed processes. In contrast with methods that use curated gene sets, this approach uses signatures extracted from public expression data. We first extract expression signatures from public data using ADAGE, a neural network-based feature extraction approach. We next identify signatures that are differentially active under a given treatment. Our results demonstrate that these signatures represent biological processes that are perturbed by the experiment. Because these signatures are directly learned from data without supervision, they can identify uncurated or novel biological processes. We implemented ADAGE signature analysis for the bacterial pathogen Pseudomonas aeruginosa. For the convenience of different user groups, we implemented both an R package (ADAGEpath) and a web server ( http://adage.greenelab.com ) to run these analyses. Both are open-source to allow easy expansion to other organisms or signature generation methods. We applied ADAGE signature analysis to an example dataset in which wild-type and ∆anr mutant cells were grown as biofilms on the Cystic Fibrosis genotype bronchial epithelial cells. We mapped active signatures in the dataset to KEGG pathways and compared with pathways identified using GSEA. The two approaches generally return consistent results; however, ADAGE signature analysis also identified a signature that revealed the molecularly supported link between the MexT regulon and Anr. We designed

  17. Advanced Missile Signature Center

    Data.gov (United States)

    Federal Laboratory Consortium — The Advanced Missile Signature Center (AMSC) is a national facility supporting the Missile Defense Agency (MDA) and other DoD programs and customers with analysis,...

  18. Understanding the milk-to-feed price ratio as a proxy for dairy farm profitability.

    Science.gov (United States)

    Wolf, C A

    2010-10-01

    This research examines the definition, historical pattern, and utility of the milk-to-feed price ratio (MF) as a measure of dairy farm profitability. The MF was generally an acceptable proxy of profitability in an annual sense from 1985 to 2006. The MF was steady at an average of 2.8 from 1985 to 2006 even as average annual milk price in nominal terms increased from $12 to $14/hundredweight. An alternative proxy for profitability is income over feed costs, which is measured in dollars per hundredweight. Comparison with an actual profit measure, rate of return on assets, is used to examine the appropriateness of the proxies. The volatility from 2007 to 2009 resulted in MF being a poor measure of profitability over that period. The implication is that MF is not the preferred measure of profitability when a significant change in the pattern of one or both price series occurs. Income over feed cost is a better measure of profitability in periods of volatility. Copyright © 2010 American Dairy Science Association. Published by Elsevier Inc. All rights reserved.

  19. 25 CFR 117.33 - Signature of illiterates.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Signature of illiterates. 117.33 Section 117.33 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR FINANCIAL ACTIVITIES DEPOSIT AND EXPENDITURE OF... Signature of illiterates. An Indian who cannot write shall be required to endorse checks payable to his...

  20. 12 CFR 350.6 - Signature and attestation.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Signature and attestation. 350.6 Section 350.6 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY DISCLOSURE OF FINANCIAL AND OTHER INFORMATION BY FDIC-INSURED STATE NONMEMBER BANKS § 350.6 Signature and...