WorldWideScience

Sample records for rss signature recognition

  1. Features Speech Signature Image Recognition on Mobile Devices

    Directory of Open Access Journals (Sweden)

    Alexander Mikhailovich Alyushin

    2015-12-01

    Full Text Available The algorithms fordynamic spectrograms images recognition, processing and soundspeech signature (SS weredeveloped. The software for mobile phones, thatcan recognize speech signatureswas prepared. The investigation of the SS recognition speed on its boundarytypes was conducted. Recommendations on the boundary types choice in the optimal ratio of recognitionspeed and required space were given.

  2. Searchable Signatures: Context and the Struggle for Recognition

    Directory of Open Access Journals (Sweden)

    Gina Schlesselman-Tarango

    2013-09-01

    Full Text Available Social networking sites made possible through Web 2.0 allow for unique user-generated tags called “searchable signatures.”  These tags move beyond the descriptive and act as means for users to assert online individual and group identities.  A study of searchable signatures on the Instagram application demonstrates that these types of tags are valuable not only because they allow for both individuals and groups to engage in what social theorist Axel Honneth calls the struggle for recognition, but also because they provide contextual use data and sociohistorical information so important to the understanding of digital objects.  This article explores how searchable signatures might be used by both patrons and staff in library environments.

  3. Graphic Symbol Recognition using Graph Based Signature and Bayesian Network Classifier

    OpenAIRE

    Luqman, Muhammad Muzzamil; Brouard, Thierry; Ramel, Jean-Yves

    2010-01-01

    We present a new approach for recognition of complex graphic symbols in technical documents. Graphic symbol recognition is a well known challenge in the field of document image analysis and is at heart of most graphic recognition systems. Our method uses structural approach for symbol representation and statistical classifier for symbol recognition. In our system we represent symbols by their graph based signatures: a graphic symbol is vectorized and is converted to an attributed relational g...

  4. RSS (http://www.iaees.org/publications/journals/ces/rss.xml

    Directory of Open Access Journals (Sweden)

    Computational Ecology and Software (ISSN 2220-721X

    Full Text Available Computational Ecology and Software ISSN 2220-721X URL: http://www.iaees.org/publications/journals/ces/online-version.asp RSS: http://www.iaees.org/publications/journals/ces/rss.xml E-mail: ces@iaees.org Editor-in-Chief: WenJun Zhang Aims and Scope COMPUTATIONAL ECOLOGY AND SOFTWARE (ISSN 2220-721X is an open access, peer-reviewed online journal that considers scientific articles in all different areas of computational ecology. It is the transactions of the International Society of Computational Ecology. The journal is concerned with the ecological researches, constructions and applications of theories and methods of computational sciences including computational mathematics, computational statistics and computer science. It features the simulation, approximation, prediction, recognition, and classification of ecological issues. Intensive computation is one of the major stresses of the journal. The journal welcomes research articles, short communications, review articles, perspectives, and book reviews. The journal also supports the activities of the International Society of Computational Ecology. The topics to be covered by CES include, but are not limited to: •Computation intensive methods, numerical and optimization methods, differential and difference equation modeling and simulation, prediction, recognition, classification, statistical computation (Bayesian computing, randomization, bootstrapping, Monte Carlo techniques, stochastic process, etc., agent-based modeling, individual-based modeling, artificial neural networks, knowledge based systems, machine learning, genetic algorithms, data exploration, network analysis and computation, databases, ecological modeling and computation using Geographical Information Systems, satellite imagery, and other computation intensive theories and methods. •Artificial ecosystems, artificial life, complexity of ecosystems and virtual reality. •The development, evaluation and validation of software and

  5. Zone-based RSS Reporting for Location Fingerprinting

    DEFF Research Database (Denmark)

    Kjærgaard, Mikkel Baun; Treu, Georg; Linnhoff–Popien, Claudia

    2007-01-01

    In typical location fingerprinting systems a tracked terminal reports sampled Received Signal Strength (RSS) values to a location server, which estimates its position based on a database of pre-recorded RSS fingerprints. So far, poll-based and periodic RSS reporting has been proposed. However......, for supporting proactive Location-based Services (LBSs), triggered by pre-defined spatial events, the periodic protocol is inefficient. Hence, this paper introduces zone-based RSS reporting: the location server translates geographical zones defined by the LBS into RSS-based representations, which are dynamically...

  6. Application of RSS in Special Libraries

    Directory of Open Access Journals (Sweden)

    Shima Moradi

    2007-07-01

    Full Text Available Despite of ever increasing scope and volume of online information content and the constant need for easy accessibility to these contents, experts in various subject matters always face time constraints when searching for information or looking up their intended resource. Meanwhile, special libraries are faced with diminishing resources, time and human resource needed for providing services and meeting the information need of the said experts. Nowadays Push Technologies, in form of RSS could be used to speed up on-time information dissemination. RSS feeds could spontaneously deliver information to the users. These could be posted on webpages or read by RSS readers. RSS has numerous applications such as web page content update, reading lists, table of contents, current awareness, guides etc. The present paper while outlining RSS as one of the next generation web tools, would point out its various advantages and applications in the new generation of libraries (Lib 2.0,particularly the special libraries. It would also offer pointers to its application in meeting the information needs of experts and users in such libraries.

  7. Dynamic Gesture Recognition with a Terahertz Radar Based on Range Profile Sequences and Doppler Signatures.

    Science.gov (United States)

    Zhou, Zhi; Cao, Zongjie; Pi, Yiming

    2017-12-21

    The frequency of terahertz radar ranges from 0.1 THz to 10 THz, which is higher than that of microwaves. Multi-modal signals, including high-resolution range profile (HRRP) and Doppler signatures, can be acquired by the terahertz radar system. These two kinds of information are commonly used in automatic target recognition; however, dynamic gesture recognition is rarely discussed in the terahertz regime. In this paper, a dynamic gesture recognition system using a terahertz radar is proposed, based on multi-modal signals. The HRRP sequences and Doppler signatures were first achieved from the radar echoes. Considering the electromagnetic scattering characteristics, a feature extraction model is designed using location parameter estimation of scattering centers. Dynamic Time Warping (DTW) extended to multi-modal signals is used to accomplish the classifications. Ten types of gesture signals, collected from a terahertz radar, are applied to validate the analysis and the recognition system. The results of the experiment indicate that the recognition rate reaches more than 91%. This research verifies the potential applications of dynamic gesture recognition using a terahertz radar.

  8. LANSCE radiation security system (RSS)

    International Nuclear Information System (INIS)

    Gallegos, F.R.

    1996-01-01

    The Radiation Security System (RSS) is an engineered safety system which automatically terminates transmission of accelerated ion beams in response to pre-defined abnormal conditions. It is one of the four major mechanisms used to protect people from radiation hazards induced by accelerated pulsed ion beams at the Los Alamos Neutron Science Center (LANSCE). The others are shielding, administrative policies and procedures, and qualified, trained personnel. Prompt radiation hazards at the half-mile long LANSCE accelerator exist due to average beam intensities ranging from 1 milli-amp for H + beam to 100 micro-amps for the high intensity H - beam. Experimental programs are supplied with variable energy (maximum 800 MeV), pulse-width (maximum 1 msec), and pulse frequency (maximum 120 Hz) ion beams. The RSS includes personnel access control systems, beam spill monitoring systems, and beam current level limiting systems. It is a stand-alone system with redundant logic chains. A fault of the RSS will cause the insertion of fusible beam plugs in the accelerator low energy beam transport. The design philosophy, description, and operation of the RSS are described in this paper

  9. Amplify Your Professional Knowledge through RSS

    Science.gov (United States)

    Stephens, Wendy

    2012-01-01

    In the championship playoffs of professional learning tools, this author contends that there is a clear-cut victor. Customizable, platform-agnostic, able to circumvent filters--both browser and network-imposed--RSS is the best professional learning tool. Reading sites via RSS has appeal for those who want the raw information. With a well-honed…

  10. The Remote Security Station (RSS) final report

    International Nuclear Information System (INIS)

    Pletta, J.B.; Amai, W.A.; Klarer, P.; Frank, D.; Carlson, J.; Byrne, R.

    1992-10-01

    The Remote Security Station (RSS) was developed by Sandia National Laboratories for the Defense Nuclear Agency to investigate issues pertaining to robotics and sensor fusion in physical security systems. This final report documents the status of the RSS program at its completion in April 1992. The RSS system consists of the Man Portable Security Station (MaPSS) and the Telemanaged Mobile Security Station (TMSS), which are integrated by the Operator's Control Unit (OCU) into a flexible exterior perimeter security system. The RSS system uses optical, infrared, microwave, and acoustic intrusion detection sensors in conjunction with sensor fusion techniques to increase the probability of detection and to decrease the nuisance alarm rate of the system. Major improvements to the system developed during the final year are an autonomous patrol capability, which allows TMSS to execute security patrols with limited operator interaction, and a neural network approach to sensor fusion, which significantly improves the system's ability to filter out nuisance alarms due to adverse weather conditions

  11. How to Build an RSS 20 Feed

    CERN Document Server

    Woodman, Mark

    2006-01-01

    The little orange feed icons are everywhere on the web. From search engines to shopping sites to blogs, Really Simple Syndication (RSS 2.0) has become one of the hottest web technologies going. RSS 2.0 is a powerful - yet surprisingly easy - way to distributing timely content to a web-based audience. This Short Cut will give you the hands-on knowledge you need to build an RSS 2.0 feed. Along the way you'll learn not only the mechanics of building a feed, but industry-accepted best practices for creating feeds that perform well in various situations. Are you ready? Roll up your sleeves, c

  12. Cleaning and Processing RSS measurements for Location Fingerprinting

    DEFF Research Database (Denmark)

    Kjærgaard, Mikkel Baun

    2007-01-01

    Handling variations in sampled Received Signal Strength (RSS) is neassary for achieving robust location fingerprinting (LF). Current research has only proposed limited system-specific models for how to handle the cleaning of RSS variations. However, this paper propose a novel model for both...

  13. RssAB signaling coordinates early development of surface multicellularity in Serratia marcescens.

    Directory of Open Access Journals (Sweden)

    Yu-Huan Tsai

    Full Text Available Bacteria can coordinate several multicellular behaviors in response to environmental changes. Among these, swarming and biofilm formation have attracted significant attention for their correlation with bacterial pathogenicity. However, little is known about when and where the signaling occurs to trigger either swarming or biofilm formation. We have previously identified an RssAB two-component system involved in the regulation of swarming motility and biofilm formation in Serratia marcescens. Here we monitored the RssAB signaling status within single cells by tracing the location of the translational fusion protein EGFP-RssB following development of swarming or biofilm formation. RssAB signaling is specifically activated before surface migration in swarming development and during the early stage of biofilm formation. The activation results in the release of RssB from its cognate inner membrane sensor kinase, RssA, to the cytoplasm where the downstream gene promoters are located. Such dynamic localization of RssB requires phosphorylation of this regulator. By revealing the temporal activation of RssAB signaling following development of surface multicellular behavior, our findings contribute to an improved understanding of how bacteria coordinate their lifestyle on a surface.

  14. Technical Evaluation Report 58: RSS Windows Editors: First impressions

    Directory of Open Access Journals (Sweden)

    Steve Swettenham

    2006-12-01

    Full Text Available An RSS feed is a list of topics made available from a webpage via a standard XML file format known as RSS, an abbreviation of either Really Simple Syndication or Rich Site Summary (Wikipedia, 2006. The end-user subscribes to their favorite Internet content site via RSS-aware software. Once subscribed, announcements with appropriate links are “pushed” from the publishing site whenever new material is added to that site (see Figure 1. This allows notification of new content of possible interest, fed with anonymity to subscribers, and reduces email clutter.

  15. A New Adaptive Structural Signature for Symbol Recognition by Using a Galois Lattice as a Classifier.

    Science.gov (United States)

    Coustaty, M; Bertet, K; Visani, M; Ogier, J

    2011-08-01

    In this paper, we propose a new approach for symbol recognition using structural signatures and a Galois lattice as a classifier. The structural signatures are based on topological graphs computed from segments which are extracted from the symbol images by using an adapted Hough transform. These structural signatures-that can be seen as dynamic paths which carry high-level information-are robust toward various transformations. They are classified by using a Galois lattice as a classifier. The performance of the proposed approach is evaluated based on the GREC'03 symbol database, and the experimental results we obtain are encouraging.

  16. Using GeoRSS feeds to distribute house renting and selling information based on Google map

    Science.gov (United States)

    Nong, Yu; Wang, Kun; Miao, Lei; Chen, Fei

    2007-06-01

    Geographically Encoded Objects RSS (GeoRSS) is a way to encode location in RSS feeds. RSS is a widely supported format for syndication of news and weblogs, and is extendable to publish any sort of itemized data. When Weblogs explode since RSS became new portals, Geo-tagged feed is necessary to show the location that story tells. Geographically Encoded Objects adopts the core of RSS framework, making itself the map annotations specified in the RSS XML format. The case studied illuminates that GeoRSS could be maximally concise in representation and conception, so it's simple to manipulate generation and then mashup GeoRSS feeds with Google Map through API to show the real estate information with other attribute in the information window. After subscribe to feeds of concerned subjects, users could easily check for new bulletin showing on map through syndication. The primary design goal of GeoRSS is to make spatial data creation as easy as regular Web content development. However, it does more for successfully bridging the gap between traditional GIS professionals and amateurs, Web map hackers, and numerous services that enable location-based content for its simplicity and effectiveness.

  17. The remote security station (RSS)

    International Nuclear Information System (INIS)

    Pletta, J.B.

    1991-01-01

    This paper reports that, as an outgrowth of research into physical security systems, Sandia is investigating robotic technologies for improving physical security performance and flexibility. Robotic systems have the potential to allow more effective utilization of security personnel, especially in scenarios where they might be exposed to harm. They also can supplement fixed site installations where sensors have failed or where transient assets are present. The Remote Security Station (RSS) program for the defense Nuclear Agency is developing a proof-of-principle robotic system which will be used to evaluate the role, and associated cost, of robotic technologies in exterior physical security systems. The RSS consists of three primary elements: a fixed but quickly moveable tripod with intrusion detection sensors and assessment camera; a mobile robotic platform with a functionally identical security module; and a control console which allows an operator to perform security functions and teleoperate the mobile platform

  18. Mobile robot trajectory tracking using noisy RSS measurements: an RFID approach.

    Science.gov (United States)

    Miah, M Suruz; Gueaieb, Wail

    2014-03-01

    Most RF beacons-based mobile robot navigation techniques rely on approximating line-of-sight (LOS) distances between the beacons and the robot. This is mostly performed using the robot's received signal strength (RSS) measurements from the beacons. However, accurate mapping between the RSS measurements and the LOS distance is almost impossible to achieve in reverberant environments. This paper presents a partially-observed feedback controller for a wheeled mobile robot where the feedback signal is in the form of noisy RSS measurements emitted from radio frequency identification (RFID) tags. The proposed controller requires neither an accurate mapping between the LOS distance and the RSS measurements, nor the linearization of the robot model. The controller performance is demonstrated through numerical simulations and real-time experiments. ©2013 Published by ISA. All rights reserved.

  19. RSS (http://www.iaees.org/publications/journals/arthropods/rss.xml

    Directory of Open Access Journals (Sweden)

    Arthropods (ISSN 2224-4255

    Full Text Available Arthropods ISSN 2224-4255 URL: http://www.iaees.org/publications/journals/arthropods/online-version.asp RSS: http://www.iaees.org/publications/journals/arthropods/rss.xml E-mail: arthropods@iaees.org Editor-in-Chief: WenJun Zhang Aims and Scope ARTHROPODS (ISSN 2224-4255 is an international journal devoted to the publication of articles on various aspects of arthropods, e.g., ecology, biogeography, systematics, biodiversity (species diversity, genetic diversity, et al., conservation, control, etc. The journal provides a forum for examining the importance of arthropods in biosphere (both terrestrial and marine ecosystems and human life in such fields as agriculture, forestry, fishery, environmental management and human health. The scope of Arthropods is wide and embraces all arthropods-insects, arachnids, crustaceans, centipedes, millipedes, and other arthropods. Articles/short communications on new taxa (species, genus, families, orders, etc. and new records of arthropods are particularly welcome. Authors can submit their works to the email box of this journal, arthropods@iaees.org. All manuscripts submitted to this journal must be previously unpublished and may not be considered for publication elsewhere at any time during review period of this journal. Authors are asked to read Author Guidelines before submitting manuscripts. In addition to free submissions from authors around the world, special issues are also accepted. The organizer of a special issue can collect submissions (yielded from a research project, a research group, etc. on a specific research topic, or submissions of a scientific conference for publication of special issue.

  20. Individual odor recognition in birds: an endogenous olfactory signature on petrels' feathers?

    Science.gov (United States)

    Bonadonna, Francesco; Miguel, Eve; Grosbois, Vladimir; Jouventin, Pierre; Bessiere, Jean-Marie

    2007-09-01

    A growing body of evidence indicates that odors are used in individual, sexual, and species recognition in vertebrates, and may be reliable signals of quality and compatibility. Petrels are seabirds that exhibit an acute sense of smell. During the breeding period, many species of petrels live in dense colonies on small oceanic islands and form pairs that use individual underground burrows. Mates alternate between parental duties and foraging trips at sea. Returning from the ocean at night (to avoid bird predators), petrels must find their nest burrow. Antarctic prions, Pachyptila desolata, are thought to identify their nest by recognizing their partner's odor, suggesting the existence of an individual odor signature. We used gas chromatography and mass spectrometry to analyze extracts obtained from the feathers of 13 birds. The chemical profile of a single bird was more similar to itself, from year to year, than to that of any other bird. The profile contained up to a hundred volatile lipids, but the odor signature may be based on the presence or absence of a few specific compounds. Our results show that the odor signature in Antarctic prions is probably endogenous, suggesting that in some species of petrels it may broadcast compatibility and quality of potential mates.

  1. Teaching pain recognition through art: the Ramsay-Caravaggio sedation scale.

    Science.gov (United States)

    Poropat, Federico; Cozzi, Giorgio; Magnolato, Andrea; Monasta, Lorenzo; Borrometi, Fabio; Krauss, Baruch; Ventura, Alessandro; Barbi, Egidio

    2018-01-31

    Clinical observation is a key component of medical ability, enabling immediate evaluation of the patient's emotional state and contributing to a clinical clue that leads to final decision making. In medical schools, the art of learning to look can be taught using medical humanities and especially visual arts. By presenting a Ramsay sedation score (RSS) integrated with Caravaggio's paintings during a procedural sedation conference for pediatric residents, we want to test the effectiveness of this approach to improve the quality of learning. In this preliminary study, we presented videos showing sedated pediatric patients in the setting of a procedural sedation lesson to two randomized groups of residents, one attending a lesson on RSS explained through the masterpieces of Caravaggio, the other without artistic support. A week later we tested their learning with ten multi-choice questions focused on theoretical questions about sedation monitoring and ten more questions focused on recognizing the appropriate RSS viewing the videos. The primary outcome was the comparison of the total number of RSS layers properly recognized in both groups. We also evaluated the appreciation of the residents of the use of works of art integrated with the lesson. Eleven students were randomized to each group. Two residents in the standard lesson did not attend the test. The percentage of correct answers on the theoretical part was similar, 82% in the art group and 89% in the other (p > 0.05). No difference was found in the video recognition part of the RSS recognition test. Residents exposed to paintings shown great appreciation for the integration of the lesson with the Caravaggio's masterpieces. Adding artwork to a standard medical conference does not improve the performance of student tests, although this approach has been greatly appreciated by residents.

  2. Rotating Shadowband Spectroradiometer (RSS) Handbook

    Energy Technology Data Exchange (ETDEWEB)

    Kiedron, P; Schlemmer, J; Klassen, M

    2005-01-01

    The rotating shawdowband spectroradiometer (RSS) implements the same automated shadowbanding technique used by the multifilter rotating shadowband radiometer (MFRSR), and so it too provides spectrally-resolved, direct-normal, diffuse-horizontal, and total-horizontal irradiances, and can be calibrated in situ via Langley regression. The irradiance spectra are measured simultaneously at all spectral elements (pixels) in 360-nm to 1050-nm range.

  3. RSS (http://www.iaees.org/publications/journals/environsc/rss.xml

    Directory of Open Access Journals (Sweden)

    Environmental Skeptics and Critics (ISSN 2224-4263

    Full Text Available Environmental Skeptics and Critics ISSN 2224-4263 URL: http://www.iaees.org/publications/journals/environsc/online-version.asp RSS: http://www.iaees.org/publications/journals/environsc/rss.xml E-mail: environsc@iaees.org Editor-in-Chief: WenJun Zhang Aims and Scope The more truth is debated, the clearer it becomes. Science will not proceed without debate and controversy. Wide and in-depth debate and controversy on human's knowledge, attitudes, policies and practices on the environment determines the future of our planet. There are numerous controversial and potentially controversial issues on environmental sciences and practices. ENVIRONMENTAL SKEPTICS and CRITICS (ISSN 2224-4263 is an international journal devoted to the publication of skeptical and critical articles/short communications/letters on theories, viewpoints, methodologies, practices, policies, etc., in ecological and environmental areas. The journal provides a forum for questioning, disputing, arguing, challenging, criticizing and judging known theories, methdologies, practices, and policies, etc., or presenting different ideas. The scope of Environmental Skeptics and Critics is wide and embraces all controversial, non-conclusive or unexplained issues in ecological and environmental areas. Authors can submit their works to the email box of this journal, environsc@iaees.org. All manuscripts submitted to this journal must be previously unpublished and may not be considered for publication elsewhere at any time during review period of this journal. Authors are asked to read Author Guidelines before submitting manuscripts. In addition to free submissions from authors around the world, special issues are also accepted. The organizer of a special issue can collect submissions (yielded from a research project, a research group, etc. on a specific research topic, or submissions of a scientific conference for publication of special issue.

  4. Benefits and Impact of Joint Metric of AOA/RSS/TOF on Indoor Localization Error

    Directory of Open Access Journals (Sweden)

    Qing Jiang

    2016-10-01

    Full Text Available The emerging techniques in the Fifth Generation (5G communication system, like the millimeter-Wave (mmWave and massive Multiple Input Multiple Output (MIMO, make it possible to measure the Angle-Of-arrival (AOA, Receive Signal Strength (RSS and Time-Of-flight (TOF by using various types of mobile devices. At the same time, there is always significant interest in the high-precision localization techniques based on the joint metric of AOA/RSS/TOF, which enable one to overcome the drawback of the single metric-based localization. Motivated by this concern, we rely on the Cramer–Rao Lower Bound (CRLB to analyze the localization errors of RSS/AOA, RSS/TOF, AOA/TOF and the Joint Metric of AOA/RSS/TOF (JMART-based localization. The error bounds derived in this paper can be selected as the benchmarking results to evaluate the indoor localization performance. Finally, extensive simulations are conducted to support our claim.

  5. Theoretical Bound of CRLB for Energy Efficient Technique of RSS-Based Factor Graph Geolocation

    Science.gov (United States)

    Kahar Aziz, Muhammad Reza; Heriansyah; Saputra, EfaMaydhona; Musa, Ardiansyah

    2018-03-01

    To support the increase of wireless geolocation development as the key of the technology in the future, this paper proposes theoretical bound derivation, i.e., Cramer Rao lower bound (CRLB) for energy efficient of received signal strength (RSS)-based factor graph wireless geolocation technique. The theoretical bound derivation is crucially important to evaluate whether the energy efficient technique of RSS-based factor graph wireless geolocation is effective as well as to open the opportunity to further innovation of the technique. The CRLB is derived in this paper by using the Fisher information matrix (FIM) of the main formula of the RSS-based factor graph geolocation technique, which is lied on the Jacobian matrix. The simulation result shows that the derived CRLB has the highest accuracy as a bound shown by its lowest root mean squared error (RMSE) curve compared to the RMSE curve of the RSS-based factor graph geolocation technique. Hence, the derived CRLB becomes the lower bound for the efficient technique of RSS-based factor graph wireless geolocation.

  6. RSS-based localization of isotropically decaying source with unknown power and pathloss factor

    International Nuclear Information System (INIS)

    Sun, Shunyuan; Sun, Li; Ding, Zhiguo

    2016-01-01

    This paper addresses the localization of an isotropically decaying source based on the received signal strength (RSS) measurements that are collected from nearby active sensors that are position-known and wirelessly connected, and it propose a novel iterative algorithm for RSS-based source localization in order to improve the location accuracy and realize real-time location and automatic monitoring for hospital patients and medical equipment in the smart hospital. In particular, we consider the general case where the source power and pathloss factor are both unknown. For such a source localization problem, we propose an iterative algorithm, in which the unknown source position and two other unknown parameters (i.e. the source power and pathloss factor) are estimated in an alternating way based on each other, with our proposed sub-optimum initial estimate on source position obtained based on the RSS measurements that are collected from a few (closest) active sensors with largest RSS values. Analysis and simulation study show that our proposed iterative algorithm guarantees globally convergence to the least-squares (LS) solution, where for our suitably assumed independent and identically distributed (i.i.d.) zero-mean Gaussian RSS measurement errors the converged localization performance achieves the optimum that corresponds to the Cramer–Rao lower bound (CRLB).

  7. ManA is regulated by RssAB signaling and promotes motility in Serratia marcescens.

    Science.gov (United States)

    Soo, Po-Chi; Horng, Yu-Tze; Chang, Yung-Lin; Tsai, Wei-Wen; Jeng, Wen-Yih; Lu, Chia-Chen; Lai, Hsin-Chih

    2014-01-01

    Serratia marcescens swarms on 0.8% LB agar at 30 °C but not at 37 °C. To understand the molecular mechanism regulating Serratia swarming, transposon mutagenesis was performed to screen for mutants that swarmed at 37 °C. In one mutant, S. marcescens WW100, the transposon was inserted in the upstream region of manA, which encodes mannose-6-phosphate isomerase, a type I phosphomannose isomerase. The transcriptional and translational levels of manA were higher in S. marcescens WW100 than in the wild-type strain. S. marcescens WW100 produced more serrawettin W1 (biosurfactant) than the wild-type, as detected by thin-layer chromatography, to promote surface motility by reducing surface tension. Serratia swarming was previously shown to be negatively regulated by the RssA-RssB two-component system. An electrophoretic mobility shift assay (EMSA) indicated that phosphorylated RssB (the response regulator) binds upstream of the transposon insertion site and manA in S. marcescens WW100. Analysis by real-time RT-PCR (qRT-PCR) revealed that, compared to the wild-type level, manA mRNA was increased in the rssA deletion mutant. The results indicated that RssA-RssB signaling directly represses the expression of manA and that overexpression of manA increases the production of serrawettin for Serratia swarming at 37 °C. Copyright © 2013 Institut Pasteur. All rights reserved.

  8. Wireless Indoor Location Estimation Based on Neural Network RSS Signature Recognition (LENSR)

    Energy Technology Data Exchange (ETDEWEB)

    Kurt Derr; Milos Manic

    2008-06-01

    Location Based Services (LBS), context aware applications, and people and object tracking depend on the ability to locate mobile devices, also known as localization, in the wireless landscape. Localization enables a diverse set of applications that include, but are not limited to, vehicle guidance in an industrial environment, security monitoring, self-guided tours, personalized communications services, resource tracking, mobile commerce services, guiding emergency workers during fire emergencies, habitat monitoring, environmental surveillance, and receiving alerts. This paper presents a new neural network approach (LENSR) based on a competitive topological Counter Propagation Network (CPN) with k-nearest neighborhood vector mapping, for indoor location estimation based on received signal strength. The advantage of this approach is both speed and accuracy. The tested accuracy of the algorithm was 90.6% within 1 meter and 96.4% within 1.5 meters. Several approaches for location estimation using WLAN technology were reviewed for comparison of results.

  9. RSS (http://www.iaees.org/publications/journals/nb/rss.xml

    Directory of Open Access Journals (Sweden)

    Network Biology (ISSN 2220-8879

    Full Text Available Network Biology ISSN 2220-8879 URL: http://www.iaees.org/publications/journals/nb/online-version.asp RSS: http://www.iaees.org/publications/journals/nb/rss.xml E-mail: networkbiology@iaees.org Editor-in-Chief: WenJun Zhang Aims and Scope NETWORK BIOLOGY (ISSN 2220-8879; CODEN NBEICS is an open access, peer-reviewed international journal that considers scientific articles in all different areas of network biology. It is the transactions of the International Society of Network Biology. It dedicates to the latest advances in network biology. The goal of this journal is to keep a record of the state-of-the-art research and promote the research work in these fast moving areas. The topics to be covered by Network Biology include, but are not limited to: •Theories, algorithms and programs of network analysis •Innovations and applications of biological networks •Ecological networks, food webs and natural equilibrium •Co-evolution, co-extinction, biodiversity conservation •Metabolic networks, protein-protein interaction networks, biochemical reaction networks, gene networks, transcriptional regulatory networks, cell cycle networks, phylogenetic networks, network motifs •Physiological networks •Network regulation of metabolic processes, human diseases and ecological systems •Social networks, epidemiological networks •System complexity, self-organized systems, emergence of biological systems, agent-based modeling, individual-based modeling, neural network modeling, and other network-based modeling, etc. We are also interested in short communications that clearly address a specific issue or completely present a new ecological network, food web, or metabolic or gene network, etc. Authors can submit their works to the email box of this journal, networkbiology@iaees.org. All manuscripts submitted to this journal must be previously unpublished and may not be considered for publication elsewhere at any time during review period of this journal

  10. Texture recognition of medical images with the ICM method

    International Nuclear Information System (INIS)

    Kinser, Jason M.; Wang Guisong

    2004-01-01

    The Integrated Cortical Model (ICM) is based upon several models of the mammalian visual cortex and produces pulse images over several iterations. These pulse images tend to isolate segments, edges, and textures that are inherent in the input image. To create a texture recognition engine the pulse spectrum of individual pixels are collected and used to develop a recognition library. Recognition is performed by comparing pulse spectra of unclassified regions of images with the known regions. Because signatures are smaller than images, signature-based computation is quite efficient and parasites can be recognized quickly. The precision of this method depends on the representative of signatures and classification. Our experiment results support the theoretical findings and show perspectives of practical applications of ICM-based method. The advantage of ICM method is using signatures to represent objects. ICM can extract the internal features of objects and represent them with signatures. Signature classification is critical for the precision of recognition

  11. Different importance of the volatile and non-volatile fractions of an olfactory signature for individual social recognition in rats versus mice and short-term versus long-term memory.

    Science.gov (United States)

    Noack, Julia; Richter, Karin; Laube, Gregor; Haghgoo, Hojjat Allah; Veh, Rüdiger W; Engelmann, Mario

    2010-11-01

    When tested in the olfactory cued social recognition/discrimination test, rats and mice differ in their retention of a recognition memory for a previously encountered conspecific juvenile: Rats are able to recognize a given juvenile for approximately 45 min only whereas mice show not only short-term, but also long-term recognition memory (≥ 24 h). Here we modified the social recognition/social discrimination procedure to investigate the neurobiological mechanism(s) underlying the species differences. We presented a conspecific juvenile repeatedly to the experimental subjects and monitored the investigation duration as a measure for recognition. Presentation of only the volatile fraction of the juvenile olfactory signature was sufficient for both short- and long-term recognition in mice but not rats. Applying additional volatile, mono-molecular odours to the "to be recognized" juveniles failed to affect short-term memory in both species, but interfered with long-term recognition in mice. Finally immunocytochemical analysis of c-Fos as a marker for cellular activation, revealed that juvenile exposure stimulated areas involved in the processing of olfactory signals in both the main and the accessory olfactory bulb in mice. In rats, we measured an increased c-Fos synthesis almost exclusively in cells of the accessory olfactory bulb. Our data suggest that the species difference in the retention of social recognition memory is based on differences in the processing of the volatile versus non-volatile fraction of the individuals' olfactory signature. The non-volatile fraction is sufficient for retaining a short-term social memory only. Long-term social memory - as observed in mice - requires a processing of both the volatile and non-volatile fractions of the olfactory signature. Copyright © 2010 Elsevier Inc. All rights reserved.

  12. Application of RSS in Special Libraries

    OpenAIRE

    Shima Moradi

    2007-01-01

    Despite of ever increasing scope and volume of online information content and the constant need for easy accessibility to these contents, experts in various subject matters always face time constraints when searching for information or looking up their intended resource. Meanwhile, special libraries are faced with diminishing resources, time and human resource needed for providing services and meeting the information need of the said experts. Nowadays Push Technologies, in form of RSS could b...

  13. Monitoring of phytopathogenic Ralstonia solanacearum cells using green fluorescent protein-expressing plasmid derived from bacteriophage phiRSS1.

    Science.gov (United States)

    Kawasaki, Takeru; Satsuma, Hideki; Fujie, Makoto; Usami, Shoji; Yamada, Takashi

    2007-12-01

    A green fluorescent protein (GFP)-expressing plasmid was constructed from a filamentous bacteriophage phiRSS1 that infects the phytopathogen Ralstonia solanacearum. This plasmid designated as pRSS12 (4.7 kbp in size) consists of an approximately 2248 bp region of the phiRSS1 RF DNA, including ORF1-ORF3 and the intergenic region (IG), and a Km cassette in addition to the GFP gene. It was easily introduced by electroporation and stably maintained even without selective pressure in strains of R. solanacearum of different races and biovars. Strong green fluorescence emitted from pRSS12-transformed bacterial cells was easily monitored in tomato tissues (stem, petiole, and root) after infection as well as from soil samples. These results suggest that pRSS12 can serve as an easy-to-use GFP-tagging tool for any given strain of R. solanacearum in cytological as well as field studies.

  14. Human-Induced Effects on RSS Ranging Measurements for Cooperative Positioning

    DEFF Research Database (Denmark)

    Della Rosa, Francescantonio; Pelosi, Mauro; Nurmi, Jari

    2012-01-01

    of human-induced perturbations for enhancing the final positioning accuracy through cooperative schemes has been assessed. It has been proved that the effect of cooperation is very limited if human factors are not taken into account when performing experimental activities.......We present experimental evaluations of human-induced perturbations on received-signal-strength-(RSS-) based ranging measurements for cooperative mobile positioning. To the best of our knowledge, this work is the first attempt to gain insight and understand the impact of both body loss and hand grip...... on the RSS for enhancing proximity measurements among neighbouring devices in cooperative scenarios. Our main contribution is represented by experimental investigations. Analysis of the errors introduced in the distance estimation using path-loss-based methods has been carried out. Moreover, the exploitation...

  15. Visual Sentiment Analysis of RSS News Feeds Featuring the US Presidential Election in 2008

    OpenAIRE

    Wanner, Franz; Rohrdantz, Christian; Mansmann, Florian; Oelke, Daniela; Keim, Daniel A.

    2009-01-01

    The technology behind RSS feeds offers great possibilities to retrieve more news items than ever. In contrast to these technical developments, human capabilities to read all these news items have not increased likewise. To bridge this gap, this paper presents a visual analytics tool for conducting semi-automatic sentiment analysis of large news feeds. While the tool automatically retrieves and analyzes RSS feeds with respect to positive and negative opinion words, the more demanding news anal...

  16. Rashtriya Swayamsewak Sangh (RSS): History, Ideology and Its Influences on Indian Policy Towards Pakistan

    Science.gov (United States)

    2015-05-21

    www.ciaonet.org/pbei/csis/sam/sam55/. 32 Pathak, K. K. Of Jaswant Singh, the BJP and the RSS. Mumbai : The Rajaji Foundation, 2010. Accessed 10 August...common holy ground, a common blood and a common culture . It is also noteworthy to mention that Buddhists, Jains and Sikhs were included in this...martin-marty/hindu-fundamentalism _b_5352547.html . 71 Ibid. 72 Pathak, K. K. Of Jaswant Singh, the BJP and the RSS. Mumbai : The Rajaji

  17. An RSS based location estimation technique for cognitive relay networks

    KAUST Repository

    Qaraqe, Khalid A.; Hussain, Syed Imtiaz; Ç elebi, Hasari Burak; Abdallah, Mohamed M.; Alouini, Mohamed-Slim

    2010-01-01

    In this paper, a received signal strength (RSS) based location estimation method is proposed for a cooperative wireless relay network where the relay is a cognitive radio. We propose a method for the considered cognitive relay network to determine

  18. Monitoring growth and movement of Ralstonia solanacearum cells harboring plasmid pRSS12 derived from bacteriophage phiRSS1.

    Science.gov (United States)

    Fujie, Makoto; Takamoto, Hirofumi; Kawasaki, Takeru; Fujiwara, Akiko; Yamada, Takashi

    2010-02-01

    We monitored growth and movement of Ralstonia solanacearum harboring the plasmid pRSS12 in tomato seedlings. The plasmid contains a gene for green fluorescent protein (GFP) and is stably maintained in R. solanacearum cells without selection pressure. Bacteria harboring the plasmid can be tracked in planta by visualizing GFP fluorescence. Stems of seedlings were infected with R. solanacearum cells transformed with pRSS12, and bacterial growth and movement, particularly around the vascular bundles, were monitored for more than 7 days. Our results showed that vascular bundles are independent of each other within the stem, and that it takes a long time for R. solanacearum cells to migrate from one vascular bundle to another. For real-time monitoring of bacteria in planta, tomato seedlings were grown on agar medium and bacterial suspension was applied to the root apex. The bacterial invasion process was monitored by fluorescent microscopy. Bacteria invaded taproots within 6 h, and movement of the bacteria was observed until 144 h after inoculation. In susceptible tomato cultivars, strong GFP fluorescence was observed in hypocotyls and lateral roots as well as the taproot. In resistant cultivars, however, GFP fluorescence was rarely observed on lateral roots. Our results show that this monitoring system can be used to assess bacterial pathogenicity efficiently. Copyright (c) 2009 The Society for Biotechnology, Japan. Published by Elsevier B.V. All rights reserved.

  19. Compressed RSS Measurement for Communication and Sensing in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Yanchao Zhao

    2017-01-01

    Full Text Available The receiving signal strength (RSS is crucial for the Internet of Things (IoT, as it is the key foundation for communication resource allocation, localization, interference management, sensing, and so on. Aside from its significance, the measurement process could be tedious, time consuming, inaccurate, and involving human operations. The state-of-the-art works usually applied the fashion of “measure a few, predict many,” which use measurement calibrated models to generate the RSS for the whole networks. However, this kind of methods still cannot provide accurate results in a short duration with low measurement cost. In addition, they also require careful scheduling of the measurement which is vulnerable to measurement conflict. In this paper, we propose a compressive sensing- (CS- based RSS measurement solution, which is conflict-tolerant, time-efficient, and accuracy-guaranteed without any model-calibrate operation. The CS-based solution takes advantage of compressive sensing theory to enable simultaneous measurement in the same channel, which reduces the time cost to the level of O(log⁡N (where N is the network size and works well for sparse networks. Extensive experiments based on real data trace are conducted to show the efficiency of the proposed solutions.

  20. A Multi-Sensor RSS Spatial Sensing-Based Robust Stochastic Optimization Algorithm for Enhanced Wireless Tethering

    Science.gov (United States)

    Parasuraman, Ramviyas; Fabry, Thomas; Molinari, Luca; Kershaw, Keith; Di Castro, Mario; Masi, Alessandro; Ferre, Manuel

    2014-01-01

    The reliability of wireless communication in a network of mobile wireless robot nodes depends on the received radio signal strength (RSS). When the robot nodes are deployed in hostile environments with ionizing radiations (such as in some scientific facilities), there is a possibility that some electronic components may fail randomly (due to radiation effects), which causes problems in wireless connectivity. The objective of this paper is to maximize robot mission capabilities by maximizing the wireless network capacity and to reduce the risk of communication failure. Thus, in this paper, we consider a multi-node wireless tethering structure called the “server-relay-client” framework that uses (multiple) relay nodes in between a server and a client node. We propose a robust stochastic optimization (RSO) algorithm using a multi-sensor-based RSS sampling method at the relay nodes to efficiently improve and balance the RSS between the source and client nodes to improve the network capacity and to provide redundant networking abilities. We use pre-processing techniques, such as exponential moving averaging and spatial averaging filters on the RSS data for smoothing. We apply a receiver spatial diversity concept and employ a position controller on the relay node using a stochastic gradient ascent method for self-positioning the relay node to achieve the RSS balancing task. The effectiveness of the proposed solution is validated by extensive simulations and field experiments in CERN facilities. For the field trials, we used a youBot mobile robot platform as the relay node, and two stand-alone Raspberry Pi computers as the client and server nodes. The algorithm has been proven to be robust to noise in the radio signals and to work effectively even under non-line-of-sight conditions. PMID:25615734

  1. The Primary Care Electronic Library: RSS feeds using SNOMED-CT indexing for dynamic content delivery.

    Science.gov (United States)

    Robinson, Judas; de Lusignan, Simon; Kostkova, Patty; Madge, Bruce; Marsh, A; Biniaris, C

    2006-01-01

    Rich Site Summary (RSS) feeds are a method for disseminating and syndicating the contents of a website using extensible mark-up language (XML). The Primary Care Electronic Library (PCEL) distributes recent additions to the site in the form of an RSS feed. When new resources are added to PCEL, they are manually assigned medical subject headings (MeSH terms), which are then automatically mapped to SNOMED-CT terms using the Unified Medical Language System (UMLS) Metathesaurus. The library is thus searchable using MeSH or SNOMED-CT. Our syndicate partner wished to have remote access to PCEL coronary heart disease (CHD) information resources based on SNOMED-CT search terms. To pilot the supply of relevant information resources in response to clinically coded requests, using RSS syndication for transmission between web servers. Our syndicate partner provided a list of CHD SNOMED-CT terms to its end-users, a list which was coded according to UMLS specifications. When the end-user requested relevant information resources, this request was relayed from our syndicate partner's web server to the PCEL web server. The relevant resources were retrieved from the PCEL MySQL database. This database is accessed using a server side scripting language (PHP), which enables the production of dynamic RSS feeds on the basis of Source Asserted Identifiers (CODEs) contained in UMLS. Retrieving resources using SNOMED-CT terms using syndication can be used to build a functioning application. The process from request to display of syndicated resources took less than one second. The results of the pilot illustrate that it is possible to exchange data between servers using RSS syndication. This method could be utilised dynamically to supply digital library resources to a clinical system with SNOMED-CT data used as the standard of reference.

  2. A Multi-Sensor RSS Spatial Sensing-Based Robust Stochastic Optimization Algorithm for Enhanced Wireless Tethering

    Directory of Open Access Journals (Sweden)

    Ramviyas Parasuraman

    2014-12-01

    Full Text Available The reliability of wireless communication in a network of mobile wireless robot nodes depends on the received radio signal strength (RSS. When the robot nodes are deployed in hostile environments with ionizing radiations (such as in some scientific facilities, there is a possibility that some electronic components may fail randomly (due to radiation effects, which causes problems in wireless connectivity. The objective of this paper is to maximize robot mission capabilities by maximizing the wireless network capacity and to reduce the risk of communication failure. Thus, in this paper, we consider a multi-node wireless tethering structure called the “server-relay-client” framework that uses (multiple relay nodes in between a server and a client node. We propose a robust stochastic optimization (RSO algorithm using a multi-sensor-based RSS sampling method at the relay nodes to efficiently improve and balance the RSS between the source and client nodes to improve the network capacity and to provide redundant networking abilities. We use pre-processing techniques, such as exponential moving averaging and spatial averaging filters on the RSS data for smoothing. We apply a receiver spatial diversity concept and employ a position controller on the relay node using a stochastic gradient ascent method for self-positioning the relay node to achieve the RSS balancing task. The effectiveness of the proposed solution is validated by extensive simulations and field experiments in CERN facilities. For the field trials, we used a youBot mobile robot platform as the relay node, and two stand-alone Raspberry Pi computers as the client and server nodes. The algorithm has been proven to be robust to noise in the radio signals and to work effectively even under non-line-of-sight conditions.

  3. Acoustic signature recognition technique for Human-Object Interactions (HOI) in persistent surveillance systems

    Science.gov (United States)

    Alkilani, Amjad; Shirkhodaie, Amir

    2013-05-01

    Handling, manipulation, and placement of objects, hereon called Human-Object Interaction (HOI), in the environment generate sounds. Such sounds are readily identifiable by the human hearing. However, in the presence of background environment noises, recognition of minute HOI sounds is challenging, though vital for improvement of multi-modality sensor data fusion in Persistent Surveillance Systems (PSS). Identification of HOI sound signatures can be used as precursors to detection of pertinent threats that otherwise other sensor modalities may miss to detect. In this paper, we present a robust method for detection and classification of HOI events via clustering of extracted features from training of HOI acoustic sound waves. In this approach, salient sound events are preliminary identified and segmented from background via a sound energy tracking method. Upon this segmentation, frequency spectral pattern of each sound event is modeled and its features are extracted to form a feature vector for training. To reduce dimensionality of training feature space, a Principal Component Analysis (PCA) technique is employed to expedite fast classification of test feature vectors, a kd-tree and Random Forest classifiers are trained for rapid classification of training sound waves. Each classifiers employs different similarity distance matching technique for classification. Performance evaluations of classifiers are compared for classification of a batch of training HOI acoustic signatures. Furthermore, to facilitate semantic annotation of acoustic sound events, a scheme based on Transducer Mockup Language (TML) is proposed. The results demonstrate the proposed approach is both reliable and effective, and can be extended to future PSS applications.

  4. A Multi-Sensor RSS Spatial Sensing-Based Robust Stochastic Optimization Algorithm for Enhanced Wireless Tethering

    CERN Document Server

    Parasuraman, Ramviyas; Molinari, Luca; Kershaw, Keith; Di Castro, Mario; Masi, Alessandro; Ferre, Manuel

    2014-01-01

    The reliability of wireless communication in a network of mobile wireless robot nodes depends on the received radio signal strength (RSS). When the robot nodes are deployed in hostile environments with ionizing radiations (such as in some scientific facilities), there is a possibility that some electronic components may fail randomly (due to radiation effects), which causes problems in wireless connectivity. The objective of this paper is to maximize robot mission capabilities by maximizing the wireless network capacity and to reduce the risk of communication failure. Thus, in this paper, we consider a multi-node wireless tethering structure called the “server-relay-client” framework that uses (multiple) relay nodes in between a server and a client node. We propose a robust stochastic optimization (RSO) algorithm using a multi-sensor-based RSS sampling method at the relay nodes to efficiently improve and balance the RSS between the source and client nodes to improve the network capacity and to provide red...

  5. Fils RSS | CRDI - Centre de recherches pour le développement ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Cliquez sur le fil pour ajouter votre site ou votre lecteur RSS préféré Fil de financement du CRDI Fil des nouvelles du CRDI Fil des perspectives du CRDI Fil des projets du CRDI Fil des publications du CRDI.

  6. Machine Learning Untuk Estimasi Posisi Objek Berbasis RSS Fingerprint Menggunakan IEEE 802.11g Pada Lantai 3 Gedung JTETI UGM

    Directory of Open Access Journals (Sweden)

    Chairani Chairani

    2015-05-01

    Full Text Available Penelitian ini membahas tentang estimasi posisi (localization objek dalam gedung menggunakan jaringan wireless atau IEEE 802.11g dengan pendekatan Machine Learning. Metode pada pengukuran RSS menggunakan RSS-based fingerprint.  Algoritma Machine Learning yang digunakan dalam memperkirakan lokasi dari pengukuran RSS-based menggunakan Naive Bayes.  Localization dilakukan pada lantai 3 gedung Jurusan Teknik Elektro dan Teknologi Informasi (JTETI dengan luas 1969,68 m2 dan memiliki 5 buah titik penempatan access point (AP. Untuk membentuk peta fingerprint digunakan dimensi 1 m x 1 m sehingga terbentuk grid sebanyak  1893 buah. Dengan menggunakan software Net Surveyor terkumpul data kekuatan sinyal yang diterima (RSS dari jaringan wireless ke perangkat penerima (laptop sebanyak 86.980 record. Hasil nilai rata-rata error jarak estimasi untuk localization seluruh ruangan di lantai 3 dengan menggunakan algoritma Naive Bayes pada fase offline tahap learning adalah 6,29 meter. Untuk fase online dan tahap post learning diperoleh rata-rata error jarak estimasi sebesar 7,82 meter.

  7. Geophysical signature recognition of aquifuge and relatively impermeable interbed in ore-hosting sandstone layer at sandstone-type uranium deposit

    International Nuclear Information System (INIS)

    Zhao Xigang; Wu Hanning; Bai Guanjun; Zhu Huanqiao; Jia Heng

    2006-01-01

    Geophysical signature recognition of aquifuge and relatively impermeable interbed in ore-hosting aquifer has been carried out a Shihongtan uranium deposit by using comprehensive logging data. The spatial distribution of above aquifuge and impermeable interbed is discussed, and the relation of these layers to sandstone-type uranium deposit, and their impact to in-situ leach mining technology are discussed. It is suggested that the aquifuge and relatively impermeable interbed bring about significant effect to the formation of interlayer oxidation zone sandstone-type uranium deposit, as well as to in-situ leach mining of the deposit. (authors)

  8. Radiation safety system (RSS) backbones: Design, engineering, fabrication and installation

    International Nuclear Information System (INIS)

    Wilmarth, J.E.; Sturrock, J.C.; Gallegos, F.R.

    1998-01-01

    The Radiation Safety System (RSS) Backbones are part of an electrical/electronic/mechanical system insuring safe access and exclusion of personnel to areas at the Los Alamos Neutron Science Center (LANSCE) accelerator. The RSS Backbones control the safety fusible beam plugs which terminate transmission of accelerated ion beams in response to predefined conditions. Any beam or access fault of the backbone inputs will cause insertion of the beam plugs in the low energy beam transport. The Backbones serve the function of tying the beam plugs to the access control systems, beam spill monitoring systems and current-level limiting systems. In some ways the Backbones may be thought of as a spinal column with beam plugs at the head and nerve centers along the spinal column. The two Linac Backbone segments and experimental area segments form a continuous cable plant over 3,500 feet from beam plugs to the tip on the longest tail. The Backbones were installed in compliance with current safety standards, such as installation of the two segments in separate conduits or tray. Monitoring for ground-faults and input wiring verification was an added enhancement to the system. The system has the capability to be tested remotely

  9. RSS SSMIS OCEAN PRODUCT GRIDS DAILY FROM DMSP F17 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSMIS Ocean Product Grids Daily from DMSP F17 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  10. RSS SSMIS OCEAN PRODUCT GRIDS DAILY FROM DMSP F16 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSMIS Ocean Product Grids Daily from DMSP F16 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  11. Research on Signature Verification Method Based on Discrete Fréchet Distance

    Science.gov (United States)

    Fang, J. L.; Wu, W.

    2018-05-01

    This paper proposes a multi-feature signature template based on discrete Fréchet distance, which breaks through the limitation of traditional signature authentication using a single signature feature. It solves the online handwritten signature authentication signature global feature template extraction calculation workload, signature feature selection unreasonable problem. In this experiment, the false recognition rate (FAR) and false rejection rate (FRR) of the statistical signature are calculated and the average equal error rate (AEER) is calculated. The feasibility of the combined template scheme is verified by comparing the average equal error rate of the combination template and the original template.

  12. RSS SSM/I OCEAN PRODUCT GRIDS DAILY FROM DMSP F14 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids Daily from DMSP F14 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  13. RSS SSM/I OCEAN PRODUCT GRIDS DAILY FROM DMSP F11 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids Daily from DMSP F11 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  14. RSS SSM/I OCEAN PRODUCT GRIDS DAILY FROM DMSP F13 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids Daily from DMSP F13 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  15. Physics of Automatic Target Recognition

    CERN Document Server

    Sadjadi, Firooz

    2007-01-01

    Physics of Automatic Target Recognition addresses the fundamental physical bases of sensing, and information extraction in the state-of-the art automatic target recognition field. It explores both passive and active multispectral sensing, polarimetric diversity, complex signature exploitation, sensor and processing adaptation, transformation of electromagnetic and acoustic waves in their interactions with targets, background clutter, transmission media, and sensing elements. The general inverse scattering, and advanced signal processing techniques and scientific evaluation methodologies being used in this multi disciplinary field will be part of this exposition. The issues of modeling of target signatures in various spectral modalities, LADAR, IR, SAR, high resolution radar, acoustic, seismic, visible, hyperspectral, in diverse geometric aspects will be addressed. The methods for signal processing and classification will cover concepts such as sensor adaptive and artificial neural networks, time reversal filt...

  16. Automatic recognition of smoke-plume signatures in lidar signal

    Science.gov (United States)

    Utkin, Andrei B.; Lavrov, Alexander; Vilar, Rui

    2008-10-01

    A simple and robust algorithm for lidar-signal classification based on the fast extraction of sufficiently pronounced peaks and their recognition with a perceptron, whose efficiency is enhanced by a fast nonlinear preprocessing that increases the signal dimension, is reported. The method allows smoke-plume recognition with an error rate as small as 0.31% (19 misdetections and 4 false alarms in analyzing a test set of 7409 peaks).

  17. Use of RSS feeds for the implementation of clinical reminder.

    Science.gov (United States)

    Chi, Wen-Chou; Wen, Chia-Hsien; Lin, Chih-Yu; Poon, Sek-Kwong; Huang, Shih-Che

    2012-06-01

    A computer-based reminder system can help physicians get right information and make right decisions in daily clinical work in time. This study presents a RSS-based Clinical Reminding System (RCRS) designed for reminding clinicians to deal with their varied unfinished clinical works. The RCRS was implemented in a hospital to automatically generate messages for every clinician on the basis of clinical information gathered from the hospital information system (HIS) and send them by RSS feed. In order to allow all physicians to participate in the project, the RCRS was integrated with the Computerized Physician Order Entry (COPE) system to provide messages whenever a clinician logs in the HIS; the connection on screen lets the clinician easily make some response. The system can help clinicians focus on patient care without keeping track of the schedule of clinical chores stored in various systems. Two physicians, also directors from Clinical Informatics Research & Development Center (CIRD) who were appointed as project leaders of the RCRS project who went through the entire development process were chosen as interviewees to obtain a preliminary evaluation of the system. The results show the "Information Content" of this system was suggested to be modified, and "Information Accuracy", "Formats", "Ease of use" and "Timeliness" of the system were appropriate to meet the system design purposes.

  18. Reading the viral signature by Toll-like receptors and other pattern recognition receptors.

    Science.gov (United States)

    Mogensen, Trine H; Paludan, Søren R

    2005-03-01

    Successful host defense against viral infections relies on early production of type I interferon (IFN) and subsequent activation of a cellular cytotoxic response. The acute IFN and inflammatory response against virus infections is mediated by cellular pattern-recognition receptors (PRRs) that recognize specific molecular structures on viral particles or products of viral replication. Toll-like receptors (TLRs) constitute a class of membrane-bound PRRs capable of detecting microbial infections. While TLR2 and TLR4, which were first identified to recognize Gram-positive and Gram-negative bacteria, respectively, sense specific viral proteins on the cell surface, TLRs 3, 7, 8, and 9 serve as receptors for viral nucleic acids in endosomic compartments. In addition to TLRs, cells express cytoplasmic PRRs such as the RNA helicase retinoic acid inducible gene I and the kinase double-stranded RNA-activated protein kinase R, both of which sense dsRNA, a characteristic signature of viral replication, and initiate a protective cellular response. Here we review the recent progress in our understanding of PRRs and viral infections and discuss the molecular and cellular responses evoked by virus-activated PRRs. Finally, we look into what is currently known about the role of PRRs in viral infections in vivo.

  19. Rotation, scale, and translation invariant pattern recognition using feature extraction

    Science.gov (United States)

    Prevost, Donald; Doucet, Michel; Bergeron, Alain; Veilleux, Luc; Chevrette, Paul C.; Gingras, Denis J.

    1997-03-01

    A rotation, scale and translation invariant pattern recognition technique is proposed.It is based on Fourier- Mellin Descriptors (FMD). Each FMD is taken as an independent feature of the object, and a set of those features forms a signature. FMDs are naturally rotation invariant. Translation invariance is achieved through pre- processing. A proper normalization of the FMDs gives the scale invariance property. This approach offers the double advantage of providing invariant signatures of the objects, and a dramatic reduction of the amount of data to process. The compressed invariant feature signature is next presented to a multi-layered perceptron neural network. This final step provides some robustness to the classification of the signatures, enabling good recognition behavior under anamorphically scaled distortion. We also present an original feature extraction technique, adapted to optical calculation of the FMDs. A prototype optical set-up was built, and experimental results are presented.

  20. Efficient Underwater RSS Value to Distance Inversion Using the Lambert Function

    Directory of Open Access Journals (Sweden)

    Majid Hosseini

    2014-01-01

    Full Text Available There are many applications for using wireless sensor networks (WSN in ocean science; however, identifying the exact location of a sensor by itself (localization is still a challenging problem, where global positioning system (GPS devices are not applicable underwater. Precise distance measurement between two sensors is a tool of localization and received signal strength (RSS, reflecting transmission loss (TL phenomena, is widely used in terrestrial WSNs for that matter. Underwater acoustic sensor networks have not been used (UASN, due to the complexity of the TL function. In this paper, we addressed these problems by expressing underwater TL via the Lambert W function, for accurate distance inversion by the Halley method, and compared this to Newton-Raphson inversion. Mathematical proof, MATLAB simulation, and real device implementation demonstrate the accuracy and efficiency of the proposed equation in distance calculation, with fewer iterations, computation stability for short and long distances, and remarkably short processing time. Then, the sensitivities of Lambert W function and Newton-Raphson inversion to alteration in TL were examined. The simulation results showed that Lambert W function is more stable to errors than Newton-Raphson inversion. Finally, with a likelihood method, it was shown that RSS is a practical tool for distance measurement in UASN.

  1. RSS SSM/I OCEAN PRODUCT GRIDS MONTHLY AVERAGE FROM DMSP F15 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids Monthly Average from DMSP F15 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special...

  2. Signatures of molecular recognition from the topography of ...

    Indian Academy of Sciences (India)

    Administrator

    cules through non-covalent bonding such as hydro- gen bonding ... tion exhibit complementarity of certain properties ... of molecular recognition has been given in terms of .... VA and VB correspond to the monomer MESP in the composite.

  3. RSS SSM/I OCEAN PRODUCT GRIDS WEEKLY AVERAGE FROM DMSP F15 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids Weekly Average from DMSP F15 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  4. RSS SSMIS OCEAN PRODUCT GRIDS 3-DAY AVERAGE FROM DMSP F16 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSMIS Ocean Product Grids 3-Day Average from DMSP F16 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  5. RSS SSM/I OCEAN PRODUCT GRIDS WEEKLY AVERAGE FROM DMSP F10 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids Weekly Average from DMSP F10 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  6. RSS SSM/I OCEAN PRODUCT GRIDS WEEKLY AVERAGE FROM DMSP F8 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Products Grid Weekly Average from DMSP F8 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  7. On the Dynamic RSS Feedbacks of Indoor Fingerprinting Databases for Localization Reliability Improvement.

    Science.gov (United States)

    Wen, Xiaoyang; Tao, Wenyuan; Own, Chung-Ming; Pan, Zhenjiang

    2016-08-15

    Location data is one of the most widely used context data types in context-aware and ubiquitous computing applications. To support locating applications in indoor environments, numerous systems with different deployment costs and positioning accuracies have been developed over the past decade. One useful method, based on received signal strength (RSS), provides a set of signal transmission access points. However, compiling a remeasurement RSS database involves a high cost, which is impractical in dynamically changing environments, particularly in highly crowded areas. In this study, we propose a dynamic estimation resampling method for certain locations chosen from a set of remeasurement fingerprinting databases. Our proposed method adaptively applies different, newly updated and offline fingerprinting points according to the temporal and spatial strength of the location. To achieve accuracy within a simulated area, the proposed method requires approximately 3% of the feedback to attain a double correctness probability comparable to similar methods; in a real environment, our proposed method can obtain excellent 1 m accuracy errors in the positioning system.

  8. On the Dynamic RSS Feedbacks of Indoor Fingerprinting Databases for Localization Reliability Improvement

    Directory of Open Access Journals (Sweden)

    Xiaoyang Wen

    2016-08-01

    Full Text Available Location data is one of the most widely used context data types in context-aware and ubiquitous computing applications. To support locating applications in indoor environments, numerous systems with different deployment costs and positioning accuracies have been developed over the past decade. One useful method, based on received signal strength (RSS, provides a set of signal transmission access points. However, compiling a remeasurement RSS database involves a high cost, which is impractical in dynamically changing environments, particularly in highly crowded areas. In this study, we propose a dynamic estimation resampling method for certain locations chosen from a set of remeasurement fingerprinting databases. Our proposed method adaptively applies different, newly updated and offline fingerprinting points according to the temporal and spatial strength of the location. To achieve accuracy within a simulated area, the proposed method requires approximately 3% of the feedback to attain a double correctness probability comparable to similar methods; in a real environment, our proposed method can obtain excellent 1 m accuracy errors in the positioning system.

  9. NOAA Climate Data Record (CDR) of SSM/I and SSMIS Microwave Brightness Temperatures, RSS Version 7

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This Version 7 NOAA Fundamental Climate Data Record (CDR) from Remote Sensing Systems (RSS) contains brightness temperatures that have been inter-calibrated and...

  10. Toward noncooperative iris recognition: a classification approach using multiple signatures.

    Science.gov (United States)

    Proença, Hugo; Alexandre, Luís A

    2007-04-01

    This paper focuses on noncooperative iris recognition, i.e., the capture of iris images at large distances, under less controlled lighting conditions, and without active participation of the subjects. This increases the probability of capturing very heterogeneous images (regarding focus, contrast, or brightness) and with several noise factors (iris obstructions and reflections). Current iris recognition systems are unable to deal with noisy data and substantially increase their error rates, especially the false rejections, in these conditions. We propose an iris classification method that divides the segmented and normalized iris image into six regions, makes an independent feature extraction and comparison for each region, and combines each of the dissimilarity values through a classification rule. Experiments show a substantial decrease, higher than 40 percent, of the false rejection rates in the recognition of noisy iris images.

  11. Penelitian “rubber blend” antara karet alam rss dengan karet sintesis jsr 0061 untuk sol ringan sesuai sni 12-0778-1989

    Directory of Open Access Journals (Sweden)

    Penny Setyowati

    1997-12-01

    Full Text Available The objective of this research is to find composision of rubber blend of RSS and JSR 0061 and Carbon black for preparation light rubber sole compound and stabile on high process temperature that give the best fisical properties and the best sole product at moulding vulcanization trial. The best rubber compound to be reached at the compound formulation R III with composision of RSS 90 phr, JSR 0061 10 phr dan carbon black 40 phr.

  12. The Primary Care Electronic Library: RSS feeds using SNOMED-CT indexing for dynamic content delivery

    Directory of Open Access Journals (Sweden)

    Judas Robinson

    2006-12-01

    Conclusion The results of the pilot illustrate that it is possible to exchange data between servers using RSS syndication. This method could be utilised dynamically to supply digital library resources to a clinical system with SNOMED-CTdata used as the standard of reference.

  13. RSS SSM/I OCEAN PRODUCT GRIDS 3-DAY AVERAGE FROM DMSP F14 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids 3-Day Average from DMSP F14 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  14. RSS SSM/I OCEAN PRODUCT GRIDS 3-DAY AVERAGE FROM DMSP F10 NETCDF V7

    Data.gov (United States)

    National Aeronautics and Space Administration — The RSS SSM/I Ocean Product Grids 3-Day Average from DMSP F10 netCDF dataset is part of the collection of Special Sensor Microwave/Imager (SSM/I) and Special Sensor...

  15. Recognition of social identity in ants

    DEFF Research Database (Denmark)

    Bos, Nick; d'Ettorre, Patrizia

    2012-01-01

    Recognizing the identity of others, from the individual to the group level, is a hallmark of society. Ants, and other social insects, have evolved advanced societies characterized by efficient social recognition systems. Colony identity is mediated by colony specific signature mixtures, a blend...

  16. Electronic signatures and their specificity in national and European regulations

    Directory of Open Access Journals (Sweden)

    R. MATEFI

    2017-07-01

    Full Text Available The paper aims to emphasize the particularities of the electronic signature by reference to the national as well as to the European legislation, trying to point out its utility in the business environment as well as the controversies in this matter. The starting point of this analysis was the Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures, which establishes the legal framework for electronic signatures and the recognition of certification-service providers. Its main aim was to ease its use and help it become legally recognized within all EU countries.

  17. SUSTENTABILIDADE NA GESTÃO DE RESÍDUOS DE SERVIÇOS DE SAÚDE (RSS EM INSTITUIÇÕES DE SAÚDE: UM OVERVIEW SOBRE O ESTADO DA ARTE

    Directory of Open Access Journals (Sweden)

    Jackeline Neres dos Santos

    2013-09-01

    Full Text Available O desenvolvimento da sociedade moderna nas últimas décadas principalmente nos quesitos tecnológico e industrial trouxe um conjunto de melhorias significativas à população no âmbito da saúde, infraestrutura, educação, saneamento básico entre outras. No entanto, o mesmo desenvolvimento que alavanca a qualidade de vida da população, proporciona novos desafios à sociedade moderna como, por exemplo, a grande produção e o gerenciamento dos Resíduos de Serviços de Saúde – RSS. O presente trabalho teve como principal objetivo realizar um levantamento do atual estado da arte sobre o tema sustentabilidade na gestão de Resíduos de Serviços de Saúde (RSS em instituições de saúde brasileiras destacando o papel do enfermeiro junto a equipes multidisciplinares no tratamento do tema. Foram consultadas fontes bibliográficas consolidadas tais como ivros, revistas, teses, dissertações, monografias e publicações científicas obtidas via repertórios científicos como Web Of Science, Scientific Electronic Library Online (SciELO, Google Acadêmico, Biblioteca Virtual em Saúde (BVS e Literatura Latino-Americana e do Caribe em Ciências da Saúde (LILACS, desde 2005. Temas como: (i Legislação Vigente para Área; (ii Atual Panorama dos RSS no Brasil; (iii Discussão sobre o Papel do Enfermeiro no Gerenciamento dos RSS – Aspectos gerais, Papel do enfermeiro à luz da Teoria Ambientalista de Florence Nightingale, Gerenciamento dos RSS: papel do enfermeiro versus custo; (iv Destinação e Eliminação Adequada para os RSS; e (v Sustentabilidade Ambiental no Gerenciamento dos RSS foram levantados, investigados e discutidos.

  18. A connecter-like factor, CacA, links RssB/RpoS and the CpxR/CpxA two-component system in Salmonella.

    Science.gov (United States)

    Kato, Akinori; Hayashi, Hironori; Nomura, Wataru; Emori, Haruka; Hagihara, Kei; Utsumi, Ryutaro

    2012-10-02

    Bacteria integrate numerous environmental stimuli when generating cellular responses. Increasing numbers of examples describe how one two-component system (TCS) responds to signals detected by the sensor of another TCS. However, the molecular mechanisms underlying this phenomenon remain poorly defined. Here, we report a connector-like factor that affects the activity of the CpxR/CpxA two-component system in Salmonella enterica serovar Typhimurium. We isolated a clone that induced the expression of a cpxP-lac gene fusion from a high-copy-number plasmid pool of random Salmonella genomic fragments. A 63-amino acid protein, CacA, was responsible for the CpxA/CpxR-dependent activation of the cpxP gene. The CpxR-activated genes cpxP and spy exhibited approximately 30% and 50% reductions in transcription, respectively, in a clean cacA deletion mutant strain in comparison to wild-type. From 33 response regulator (RR) deletion mutants, we identified that the RssB regulator represses cacA transcription. Substitution mutations in a conserved -10 region harboring the RNA polymerase recognition sequence, which is well conserved with a known RpoS -10 region consensus sequence, rendered the cacA promoter RpoS-independent. The CacA-mediated induction of cpxP transcription was affected in a trxA deletion mutant, which encodes thioredoxin 1, suggesting a role for cysteine thiol-disulfide exchange(s) in CacA-dependent Cpx activation. We identified CacA as an activator of the CpxR/CpxA system in the plasmid clone. We propose that CacA may integrate the regulatory status of RssB/RpoS into the CpxR/CpxA system. Future investigations are necessary to thoroughly elucidate how CacA activates the CpxR/CpxA system.

  19. A connecter-like factor, CacA, links RssB/RpoS and the CpxR/CpxA two-component system in Salmonella

    Directory of Open Access Journals (Sweden)

    Kato Akinori

    2012-10-01

    Full Text Available Abstract Background Bacteria integrate numerous environmental stimuli when generating cellular responses. Increasing numbers of examples describe how one two-component system (TCS responds to signals detected by the sensor of another TCS. However, the molecular mechanisms underlying this phenomenon remain poorly defined. Results Here, we report a connector-like factor that affects the activity of the CpxR/CpxA two-component system in Salmonella enterica serovar Typhimurium. We isolated a clone that induced the expression of a cpxP-lac gene fusion from a high-copy-number plasmid pool of random Salmonella genomic fragments. A 63-amino acid protein, CacA, was responsible for the CpxA/CpxR-dependent activation of the cpxP gene. The CpxR-activated genes cpxP and spy exhibited approximately 30% and 50% reductions in transcription, respectively, in a clean cacA deletion mutant strain in comparison to wild-type. From 33 response regulator (RR deletion mutants, we identified that the RssB regulator represses cacA transcription. Substitution mutations in a conserved -10 region harboring the RNA polymerase recognition sequence, which is well conserved with a known RpoS -10 region consensus sequence, rendered the cacA promoter RpoS-independent. The CacA-mediated induction of cpxP transcription was affected in a trxA deletion mutant, which encodes thioredoxin 1, suggesting a role for cysteine thiol-disulfide exchange(s in CacA-dependent Cpx activation. Conclusions We identified CacA as an activator of the CpxR/CpxA system in the plasmid clone. We propose that CacA may integrate the regulatory status of RssB/RpoS into the CpxR/CpxA system. Future investigations are necessary to thoroughly elucidate how CacA activates the CpxR/CpxA system.

  20. Privacy protection schemes for fingerprint recognition systems

    Science.gov (United States)

    Marasco, Emanuela; Cukic, Bojan

    2015-05-01

    The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechanisms control access to personal information and limit the likelihood of intrusions. In this paper, image- and feature-level schemes for privacy protection in fingerprint recognition systems are reviewed. Storing only key features of a biometric signature can reduce the likelihood of biometric data being used for unintended purposes. In biometric cryptosystems and biometric-based key release, the biometric component verifies the identity of the user, while the cryptographic key protects the communication channel. Transformation-based approaches only a transformed version of the original biometric signature is stored. Different applications can use different transforms. Matching is performed in the transformed domain which enable the preservation of low error rates. Since such templates do not reveal information about individuals, they are referred to as cancelable templates. A compromised template can be re-issued using a different transform. At image-level, de-identification schemes can remove identifiers disclosed for objectives unrelated to the original purpose, while permitting other authorized uses of personal information. Fingerprint images can be de-identified by, for example, mixing fingerprints or removing gender signature. In both cases, degradation of matching performance is minimized.

  1. Induced Temporal Signatures for Point-Source Detection

    International Nuclear Information System (INIS)

    Stephens, Daniel L.; Runkle, Robert C.; Carlson, Deborah K.; Peurrung, Anthony J.; Seifert, Allen; Wyatt, Cory R.

    2005-01-01

    Detection of radioactive point-sized sources is inherently divided into two regimes encompassing stationary and moving detectors. The two cases differ in their treatment of background radiation and its influence on detection sensitivity. In the stationary detector case the statistical fluctuation of the background determines the minimum detectable quantity. In the moving detector case the detector may be subjected to widely and irregularly varying background radiation, as a result of geographical and environmental variation. This significant systematic variation, in conjunction with the statistical variation of the background, requires a conservative threshold to be selected to yield the same false-positive rate as the stationary detection case. This results in lost detection sensitivity for real sources. This work focuses on a simple and practical modification of the detector geometry that increase point-source recognition via a distinctive temporal signature. A key part of this effort is the integrated development of both detector geometries that induce a highly distinctive signature for point sources and the development of statistical algorithms able to optimize detection of this signature amidst varying background. The identification of temporal signatures for point sources has been demonstrated and compared with the canonical method showing good results. This work demonstrates that temporal signatures are efficient at increasing point-source discrimination in a moving detector system

  2. BOREAS RSS-7 Landsat TM LAI IMages of the SSA and NSA

    Science.gov (United States)

    Hall, Forrest G. (Editor); Nickeson, Jaime (Editor); Chen, Jing; Cihlar, Josef

    2000-01-01

    The BOReal Ecosystem-Atmosphere Study Remote Sensing Science (BOREAS RSS-7) team used Landsat Thematic Mapper (TM) images processed at CCRS to produce images of Leaf Area Index (LAI) for the BOREAS study areas. Two images acquired on 06-Jun and 09-Aug-1991 were used for the SSA, and one image acquired on 09-Jun-1994 was used for the NSA. The LAI images are based on ground measurements and Landsat TM Reduced Simple Ratio (RSR) images. The data are stored in binary image-format files.

  3. A Markov Random Field Groupwise Registration Framework for Face Recognition.

    Science.gov (United States)

    Liao, Shu; Shen, Dinggang; Chung, Albert C S

    2014-04-01

    In this paper, we propose a new framework for tackling face recognition problem. The face recognition problem is formulated as groupwise deformable image registration and feature matching problem. The main contributions of the proposed method lie in the following aspects: (1) Each pixel in a facial image is represented by an anatomical signature obtained from its corresponding most salient scale local region determined by the survival exponential entropy (SEE) information theoretic measure. (2) Based on the anatomical signature calculated from each pixel, a novel Markov random field based groupwise registration framework is proposed to formulate the face recognition problem as a feature guided deformable image registration problem. The similarity between different facial images are measured on the nonlinear Riemannian manifold based on the deformable transformations. (3) The proposed method does not suffer from the generalizability problem which exists commonly in learning based algorithms. The proposed method has been extensively evaluated on four publicly available databases: FERET, CAS-PEAL-R1, FRGC ver 2.0, and the LFW. It is also compared with several state-of-the-art face recognition approaches, and experimental results demonstrate that the proposed method consistently achieves the highest recognition rates among all the methods under comparison.

  4. Aging in biometrics: an experimental analysis on on-line signature.

    Directory of Open Access Journals (Sweden)

    Javier Galbally

    Full Text Available The first consistent and reproducible evaluation of the effect of aging on dynamic signature is reported. Experiments are carried out on a database generated from two previous datasets which were acquired, under very similar conditions, in 6 sessions distributed in a 15-month time span. Three different systems, representing the current most popular approaches in signature recognition, are used in the experiments, proving the degradation suffered by this trait with the passing of time. Several template update strategies are also studied as possible measures to reduce the impact of aging on the system's performance. Different results regarding the way in which signatures tend to change with time, and their most and least stable features, are also given.

  5. CERN alerter-RSS based system for information broadcast to all CERN offices

    International Nuclear Information System (INIS)

    Otto, R

    2008-01-01

    Nearly every large organization uses a tool to broadcast messages and information across the internal campus (messages like alerts announcing interruption in services or just information about upcoming events). These tools typically allow administrators (operators) to send 'targeted' messages which are sent only to specific groups of users or computers, e/g only those located in a specified building or connected to a particular computing service. CERN has a long history of such tools: CERNVMS's SPM q uotMESSAGE command, Zephyr [2] and the most recent the NICE Alerter based on the NNTP protocol. The NICE Alerter used on all Windows-based computers had to be phased out as a consequence of phasing out NNTP at CERN. The new solution to broadcast information messages on the CERN campus continues to provide the service based on cross-platform technologies, hence minimizing custom developments and relying on commercial software as much as possible. The new system, called CERN Alerter, is based on RSS (Really Simple Syndication) [9] for the transport protocol and uses Microsoft SharePoint as the backend for database and posting interface. The windows-based client relies on Internet Explorer 7.0 with custom code to trigger the window pop-ups and the notifications for new events. Linux and Mac OS X clients could also rely on any RSS readers to subscribe to targeted notifications. The paper covers the architecture and implementation aspects of the new system

  6. A signature correlation study of ground target VHF/UHF ISAR imagery

    Science.gov (United States)

    Gatesman, Andrew J.; Beaudoin, Christopher J.; Giles, Robert H.; Kersey, William T.; Waldman, Jerry; Carter, Steve; Nixon, William E.

    2003-09-01

    VV and HH-polarized radar signatures of several ground targets were acquired in the VHF/UHF band (171-342 MHz) by using 1/35th scale models and an indoor radar range operating from 6 to 12 GHz. Data were processed into medianized radar cross sections as well as focused, ISAR imagery. Measurement validation was confirmed by comparing the radar cross section of a test object with a method of moments radar cross section prediction code. The signatures of several vehicles from three vehicle classes (tanks, trunks, and TELs) were measured and a signature cross-correlation study was performed. The VHF/UHF band is currently being exploited for its foliage penetration ability, however, the coarse image resolution which results from the relatively long radar wavelengths suggests a more challenging target recognition problem. One of the study's goals was to determine the amount of unique signature content in VHF/UHF ISAR imagery of military ground vehicles. Open-field signatures are compared with each other as well as with simplified shapes of similar size. Signatures were also acquired on one vehicle in a variety of configurations to determine the impact of monitor target variations on the signature content at these frequencies.

  7. The contribution of the body and motion to whole person recognition.

    Science.gov (United States)

    Simhi, Noa; Yovel, Galit

    2016-05-01

    While the importance of faces in person recognition has been the subject of many studies, there are relatively few studies examining recognition of the whole person in motion even though this most closely resembles daily experience. Most studies examining the whole body in motion use point light displays, which have many advantages but are impoverished and unnatural compared to real life. To determine which factors are used when recognizing the whole person in motion we conducted two experiments using naturalistic videos. In Experiment 1 we used a matching task in which the first stimulus in each pair could either be a video or multiple still images from a video of the full body. The second stimulus, on which person recognition was performed, could be an image of either the full body or face alone. We found that the body contributed to person recognition beyond the face, but only after exposure to motion. Since person recognition was performed on still images, the contribution of motion to person recognition was mediated by form-from-motion processes. To assess whether dynamic identity signatures may also contribute to person recognition, in Experiment 2 we presented people in motion and examined person recognition from videos compared to still images. Results show that dynamic identity signatures did not contribute to person recognition beyond form-from-motion processes. We conclude that the face, body and form-from-motion processes all appear to play a role in unfamiliar person recognition, suggesting the importance of considering the whole body and motion when examining person perception. Copyright © 2016 Elsevier Ltd. All rights reserved.

  8. An RSS based location estimation technique for cognitive relay networks

    KAUST Repository

    Qaraqe, Khalid A.

    2010-11-01

    In this paper, a received signal strength (RSS) based location estimation method is proposed for a cooperative wireless relay network where the relay is a cognitive radio. We propose a method for the considered cognitive relay network to determine the location of the source using the direct and the relayed signal at the destination. We derive the Cramer-Rao lower bound (CRLB) expressions separately for x and y coordinates of the location estimate. We analyze the effects of cognitive behaviour of the relay on the performance of the proposed method. We also discuss and quantify the reliability of the location estimate using the proposed technique if the source is not stationary. The overall performance of the proposed method is presented through simulations. ©2010 IEEE.

  9. A universal entropy-driven mechanism for thioredoxin–target recognition

    Science.gov (United States)

    Palde, Prakash B.; Carroll, Kate S.

    2015-01-01

    Cysteine residues in cytosolic proteins are maintained in their reduced state, but can undergo oxidation owing to posttranslational modification during redox signaling or under conditions of oxidative stress. In large part, the reduction of oxidized protein cysteines is mediated by a small 12-kDa thiol oxidoreductase, thioredoxin (Trx). Trx provides reducing equivalents for central metabolic enzymes and is implicated in redox regulation of a wide number of target proteins, including transcription factors. Despite its importance in cellular redox homeostasis, the precise mechanism by which Trx recognizes target proteins, especially in the absence of any apparent signature binding sequence or motif, remains unknown. Knowledge of the forces associated with the molecular recognition that governs Trx–protein interactions is fundamental to our understanding of target specificity. To gain insight into Trx–target recognition, we have thermodynamically characterized the noncovalent interactions between Trx and target proteins before S-S reduction using isothermal titration calorimetry (ITC). Our findings indicate that Trx recognizes the oxidized form of its target proteins with exquisite selectivity, compared with their reduced counterparts. Furthermore, we show that recognition is dependent on the conformational restriction inherent to oxidized targets. Significantly, the thermodynamic signatures for multiple Trx targets reveal favorable entropic contributions as the major recognition force dictating these protein–protein interactions. Taken together, our data afford significant new insight into the molecular forces responsible for Trx–target recognition and should aid the design of new strategies for thiol oxidoreductase inhibition. PMID:26080424

  10. BOREAS RSS-20 POLDER C-130 Measurements of Surface BRDF

    Science.gov (United States)

    Leroy, Marc; Hall, Forrest G. (Editor); Nickerson, Jaime (Editor); Smith, David E. (Technical Monitor)

    2000-01-01

    This Boreal Ecosystem-Atmosphere Study (BOREAS) Remote Sensing Science (RSS)-20 data set contains measurements of surface bidirectional reflectance distribution function (BRDF) made by the polarization and Directionality of Earth reflectances (POLDER) instrument over several surface types (pine, spruce, fen) of the BOREAS southern study area (SSA) during the 1994 intensive field campaigns (IFCs). Single-point BRDF values were acquired either from the NASA Ames Research Center (ARC) C-130 aircraft or from a NASA Wallops Flight Facility (WFF) helicopter. A related data set collected from the helicopter platform is available as is POLDER imagery acquired from the C-130. The data are stored in tabular ASCII files. The data files are available on a CD-ROM (see document number 20010000884) or from the Oak Ridge National Laboratory (ORNL) Distributed Active Archive Center (DAAC).

  11. Karakteristik karet ebonit yang dibuat dengan berbagai variasi rasio RSS I/Riklim dan jumlah belerang

    Directory of Open Access Journals (Sweden)

    Penny Setyowati

    2004-07-01

    Full Text Available The aim of the research was to study the influence of utilization of sulphur and reclaim rubber on the characteristics of ebonite rubber, and also to determine the optimum utilization of reclaim rubber and sulphur which yield good physical properties. Ebonite rubber was made by special natural rubber of RSS I (Ribbed Smoke Sheet I mixed with reclaimed rubber at ratio 80/20, 70/30 and 60/40 part hundred rubber/part hundred rubber (phr/phr and utilization of sulphur 30, 40, and 50 phr and also additives respectively. Mixing was done by using open mill, and vulcanization was conducted at early temperature 1200C for 2 hours, and it was continued by post curing at temperature 1500C for 2 hours. The physical properties such as tensile strength, elongation at break, D shore hardness, and izod impact of ebonite rubber vulcanized were determined. The result indicated that characteristics of ebonite rubber was significantly influenced by the amount of added sulphur and 40 phr reclaim rubber or at ratio of RSS I to reclaim rubber 60 to 40 phr/phr. However, the physical properties of ebonite rubber was able to meet the standard quality of group 2 regarding to Classification Hard Rubber issued by ASTM D 2135

  12. Vehicle recognition by using acoustic signature and classic DSP techniques

    Directory of Open Access Journals (Sweden)

    María Fernanda Díaz Velásquez

    2016-06-01

    Full Text Available This paper shows the application of the classic technique of digital signal processing (DSP, the cross-correlation, used for the detection of acoustic signatures of road traffic in Cali city, Colombia. Future goal is to build a detection software that through real time measures allows us estimate the levels of acoustic pollution in the city by using simulation models of road traffic, in the framework of environmentally-friendly smart cities. Final results of the experimental tests showed an accuracy of 71.43% for specific vehicle detection.

  13. Feature-based RNN target recognition

    Science.gov (United States)

    Bakircioglu, Hakan; Gelenbe, Erol

    1998-09-01

    Detection and recognition of target signatures in sensory data obtained by synthetic aperture radar (SAR), forward- looking infrared, or laser radar, have received considerable attention in the literature. In this paper, we propose a feature based target classification methodology to detect and classify targets in cluttered SAR images, that makes use of selective signature data from sensory data, together with a neural network technique which uses a set of trained networks based on the Random Neural Network (RNN) model (Gelenbe 89, 90, 91, 93) which is trained to act as a matched filter. We propose and investigate radial features of target shapes that are invariant to rotation, translation, and scale, to characterize target and clutter signatures. These features are then used to train a set of learning RNNs which can be used to detect targets within clutter with high accuracy, and to classify the targets or man-made objects from natural clutter. Experimental data from SAR imagery is used to illustrate and validate the proposed method, and to calculate Receiver Operating Characteristics which illustrate the performance of the proposed algorithm.

  14. Autonomous target recognition using remotely sensed surface vibration measurements

    Science.gov (United States)

    Geurts, James; Ruck, Dennis W.; Rogers, Steven K.; Oxley, Mark E.; Barr, Dallas N.

    1993-09-01

    The remotely measured surface vibration signatures of tactical military ground vehicles are investigated for use in target classification and identification friend or foe (IFF) systems. The use of remote surface vibration sensing by a laser radar reduces the effects of partial occlusion, concealment, and camouflage experienced by automatic target recognition systems using traditional imagery in a tactical battlefield environment. Linear Predictive Coding (LPC) efficiently represents the vibration signatures and nearest neighbor classifiers exploit the LPC feature set using a variety of distortion metrics. Nearest neighbor classifiers achieve an 88 percent classification rate in an eight class problem, representing a classification performance increase of thirty percent from previous efforts. A novel confidence figure of merit is implemented to attain a 100 percent classification rate with less than 60 percent rejection. The high classification rates are achieved on a target set which would pose significant problems to traditional image-based recognition systems. The targets are presented to the sensor in a variety of aspects and engine speeds at a range of 1 kilometer. The classification rates achieved demonstrate the benefits of using remote vibration measurement in a ground IFF system. The signature modeling and classification system can also be used to identify rotary and fixed-wing targets.

  15. Recognition of social identity in ants

    Directory of Open Access Journals (Sweden)

    Nick eBos

    2012-03-01

    Full Text Available Recognizing the identity of others, from the individual to the group level, is a hallmark of society. Ants, and other social insects, have evolved advanced societies characterized by efficient social recognition systems. Colony identity is mediated by colony specific signature mixtures, a blend of hydrocarbons present on the cuticle of every individual (the label. Recognition occurs when an ant encounters another individual, and compares the label it perceives to an internal representation of its own colony odor (the template. A mismatch between label and template leads to rejection of the encountered individual. Although advances have been made in our understanding of how the label is produced and acquired, contradictory evidence exists about information processing of recognition cues. Here, we review the literature on template acquisition in ants and address how and when the template is formed, where in the nervous system it is localized, and the possible role of learning. We combine seemingly contradictory evidence in to a novel, parsimonious theory for the information processing of nestmate recognition cues.

  16. Hand Gesture Recognition Using Ultrasonic Waves

    KAUST Repository

    AlSharif, Mohammed Hussain

    2016-04-01

    Gesturing is a natural way of communication between people and is used in our everyday conversations. Hand gesture recognition systems are used in many applications in a wide variety of fields, such as mobile phone applications, smart TVs, video gaming, etc. With the advances in human-computer interaction technology, gesture recognition is becoming an active research area. There are two types of devices to detect gestures; contact based devices and contactless devices. Using ultrasonic waves for determining gestures is one of the ways that is employed in contactless devices. Hand gesture recognition utilizing ultrasonic waves will be the focus of this thesis work. This thesis presents a new method for detecting and classifying a predefined set of hand gestures using a single ultrasonic transmitter and a single ultrasonic receiver. This method uses a linear frequency modulated ultrasonic signal. The ultrasonic signal is designed to meet the project requirements such as the update rate, the range of detection, etc. Also, it needs to overcome hardware limitations such as the limited output power, transmitter, and receiver bandwidth, etc. The method can be adapted to other hardware setups. Gestures are identified based on two main features; range estimation of the moving hand and received signal strength (RSS). These two factors are estimated using two simple methods; channel impulse response (CIR) and cross correlation (CC) of the reflected ultrasonic signal from the gesturing hand. A customized simple hardware setup was used to classify a set of hand gestures with high accuracy. The detection and classification were done using methods of low computational cost. This makes the proposed method to have a great potential for the implementation in many devices including laptops and mobile phones. The predefined set of gestures can be used for many control applications.

  17. PubMed Informer: Monitoring MEDLINE/PubMed through E-mail Alerts, SMS, PDA downloads and RSS feeds

    Science.gov (United States)

    Muin, Michael; Fontelo, Paul; Ackerman, Michael

    2005-01-01

    Summary PubMed Informer is a Web-based monitoring tool for topics of interest from MEDLINE/PubMed primarily designed for healthcare professionals. Five tracking methods are available: Web access, e-mail, Short Message Service (SMS), PDA downloads and RSS feeds. PubMed Informer delivers focused search updates and specific information to users with varying information-seeking practices. PMID:16779344

  18. Face recognition in the thermal infrared domain

    Science.gov (United States)

    Kowalski, M.; Grudzień, A.; Palka, N.; Szustakowski, M.

    2017-10-01

    Biometrics refers to unique human characteristics. Each unique characteristic may be used to label and describe individuals and for automatic recognition of a person based on physiological or behavioural properties. One of the most natural and the most popular biometric trait is a face. The most common research methods on face recognition are based on visible light. State-of-the-art face recognition systems operating in the visible light spectrum achieve very high level of recognition accuracy under controlled environmental conditions. Thermal infrared imagery seems to be a promising alternative or complement to visible range imaging due to its relatively high resistance to illumination changes. A thermal infrared image of the human face presents its unique heat-signature and can be used for recognition. The characteristics of thermal images maintain advantages over visible light images, and can be used to improve algorithms of human face recognition in several aspects. Mid-wavelength or far-wavelength infrared also referred to as thermal infrared seems to be promising alternatives. We present the study on 1:1 recognition in thermal infrared domain. The two approaches we are considering are stand-off face verification of non-moving person as well as stop-less face verification on-the-move. The paper presents methodology of our studies and challenges for face recognition systems in the thermal infrared domain.

  19. Subregion-Specific Proteomic Signature in the Hippocampus for Recognition Processes in Adult Mice

    Directory of Open Access Journals (Sweden)

    Lukas M. von Ziegler

    2018-03-01

    Full Text Available Summary: The hippocampal formation is a brain structure essential for higher-order cognitive functions. It has a complex anatomical organization and cellular composition, and hippocampal subregions have different properties and functional roles. In this study, we used SWATH-MS to determine whether the proteomes of hippocampus areas CA1 and CA3 can explain the commonalities or specificities of these subregions in basal conditions and after recognition memory. We show that the proteomes of areas CA1 and CA3 are largely different in basal conditions and that differential changes and dynamics in protein expression are induced in these areas after recognition of an object or object location. While changes are consistent across both recognition paradigms in area CA1, they are not in area CA3, suggesting distinct proteomic responses in areas CA1 and CA3 for memory formation. : How does the proteome differ in hippocampus areas CA1 and CA3? von Ziegler et al. identify the proteomes of areas CA1 and CA3 and characterize their dynamics during different recognition processes in adult mice. Keywords: hippocampus, areas CA1 and CA3, proteome, dynamics, object memory, object location memory, mass spectrometry, SWATH-MS, mice, bioinformatic tools

  20. Arabic CWR Based on Correlation of Normalized Signatures of Words Images

    Directory of Open Access Journals (Sweden)

    Hala S. Zaghloul

    2007-12-01

    Full Text Available The traditional methods for Arabic OCR (AOCR based on segmentation of each word into a set of characters. The Arabic language is of cursive nature, and the character's shape depends on its position in the word. There are about 100 shape of the characters have to be classified, and some of them may be overlapped. Our approach use a normalized signature of the time signal of the pulse coupled neural network PCNN, supported with some shape primitives to represent the number of the word complementary and their positions within the image of the word. A lookup dictionary of words with its signatures was constructed, and structured in groups using a decision tree. The tested signature was routed through the tree to the nearest group, and then the signature and its related word with higher correlation within the selected group will be the classified. This method overcome many difficulties arise in cursive word recognition CWR for printed script with different font type and size; also it shows higher accuracy for the classification process, 96%.

  1. Photonic quantum digital signatures operating over kilometer ranges in installed optical fiber

    Science.gov (United States)

    Collins, Robert J.; Fujiwara, Mikio; Amiri, Ryan; Honjo, Toshimori; Shimizu, Kaoru; Tamaki, Kiyoshi; Takeoka, Masahiro; Andersson, Erika; Buller, Gerald S.; Sasaki, Masahide

    2016-10-01

    The security of electronic communications is a topic that has gained noteworthy public interest in recent years. As a result, there is an increasing public recognition of the existence and importance of mathematically based approaches to digital security. Many of these implement digital signatures to ensure that a malicious party has not tampered with the message in transit, that a legitimate receiver can validate the identity of the signer and that messages are transferable. The security of most digital signature schemes relies on the assumed computational difficulty of solving certain mathematical problems. However, reports in the media have shown that certain implementations of such signature schemes are vulnerable to algorithmic breakthroughs and emerging quantum processing technologies. Indeed, even without quantum processors, the possibility remains that classical algorithmic breakthroughs will render these schemes insecure. There is ongoing research into information-theoretically secure signature schemes, where the security is guaranteed against an attacker with arbitrary computational resources. One such approach is quantum digital signatures. Quantum signature schemes can be made information-theoretically secure based on the laws of quantum mechanics while comparable classical protocols require additional resources such as anonymous broadcast and/or a trusted authority. Previously, most early demonstrations of quantum digital signatures required dedicated single-purpose hardware and operated over restricted ranges in a laboratory environment. Here, for the first time, we present a demonstration of quantum digital signatures conducted over several kilometers of installed optical fiber. The system reported here operates at a higher signature generation rate than previous fiber systems.

  2. RSS based CERN Alerter. Information broadcast to all CERN offices.

    CERN Multimedia

    Otto, R

    2007-01-01

    Nearly every large organization uses a tool to broadcast messages and information across the internal campus (messages like alerts announcing interruption in services or just information about upcoming events). These tools typically allow administrators (operators) to send "targeted" messages which are sent only to specific groups of users or computers, e/g only those located in a specified building or connected to a particular computing service. CERN has a long history of such tools: CERNVMS€™s SPM_quotMESSAGE command, Zephyr and the most recent the NICE Alerter based on the NNTP protocol. The NICE Alerter used on all Windows-based computers had to be phased out as a consequence of phasing out NNTP at CERN. The new solution to broadcast information messages on the CERN campus continues to provide the service based on cross-platform technologies, hence minimizing custom developments and relying on commercial software as much as possible. The new system, called CERN Alerter, is based on RSS (Really Simpl...

  3. 37 CFR 11.18 - Signature and certificate for correspondence filed in the Office.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Signature and certificate for correspondence filed in the Office. 11.18 Section 11.18 Patents, Trademarks, and Copyrights UNITED STATES PATENT AND TRADEMARK OFFICE, DEPARTMENT OF COMMERCE REPRESENTATION OF OTHERS BEFORE THE UNITED STATES PATENT AND TRADEMARK OFFICE Recognition...

  4. Augmenting the impact of technology adoption with financial incentive to improve radiology report signature times.

    Science.gov (United States)

    Andriole, Katherine P; Prevedello, Luciano M; Dufault, Allen; Pezeshk, Parham; Bransfield, Robert; Hanson, Richard; Doubilet, Peter M; Seltzer, Steven E; Khorasani, Ramin

    2010-03-01

    Radiology report signature time (ST) can be a substantial component of total report turnaround time. Poor turnaround time resulting from lengthy ST can adversely affect patient care. The combination of technology adoption with financial incentive was evaluated to determine if ST improvement can be augmented and sustained. This prospective study was performed at a 751-bed, urban, tertiary care adult teaching hospital. Test-site imaging volume approximated 48,000 examinations per month. The radiology department has 100 trainees and 124 attending radiologists serving multiple institutions. Over a study period of 4 years and 4 months, three interventions focused on radiologist signature performance were implemented: 1) a notification paging application that alerted radiologists when reports were ready for signature, 2) a picture archiving and communications systems (PACS)-integrated speech recognition report generation system, and 3) a departmental financial incentive to reward radiologists semiannually for ST performance. Signature time was compared before and after the interventions. Wilcoxon and linear regression statistical analyses were used to assess the significance of trends. Technology adoption (paging plus speech recognition) reduced median ST from >5 to 24 to 15 to 18 hours (P financial incentive further improved 80th-percentile ST to 4 to 8 hours (P Technology interventions coupled with financial incentive can result in synergistic and sustainable improvement in radiologist report-signing behavior. The addition of a financial incentive leads to better performance than that achievable through technology alone.

  5. Accentuate or repeat? Brain signatures of developmental periods in infant word recognition.

    Science.gov (United States)

    Männel, Claudia; Friederici, Angela D

    2013-01-01

    Language acquisition has long been discussed as an interaction between biological preconditions and environmental input. This general interaction seems particularly salient in lexical acquisition, where infants are already able to detect unknown words in sentences at 7 months of age, guided by phonological and statistical information in the speech input. While this information results from the linguistic structure of a given language, infants also exploit situational information, such as speakers' additional word accentuation and word repetition. The current study investigated the developmental trajectory of infants' sensitivity to these two situational input cues in word recognition. Testing infants at 6, 9, and 12 months of age, we hypothesized that different age groups are differentially sensitive to accentuation and repetition. In a familiarization-test paradigm, event-related brain potentials (ERPs) revealed age-related differences in infants' word recognition as a function of situational input cues: at 6 months infants only recognized previously accentuated words, at 9 months both accentuation and repetition played a role, while at 12 months only repetition was effective. These developmental changes are suggested to result from infants' advancing linguistic experience and parallel auditory cortex maturation. Our data indicate very narrow and specific input-sensitive periods in infant word recognition, with accentuation being effective prior to repetition. Copyright © 2013 Elsevier Ltd. All rights reserved.

  6. Hydrogen Sulfide Sensing through Reactive Sulfur Species (RSS) and Nitroxyl (HNO) in Enterococcus faecalis.

    Science.gov (United States)

    Shen, Jiangchuan; Walsh, Brenna J C; Flores-Mireles, Ana Lidia; Peng, Hui; Zhang, Yifan; Zhang, Yixiang; Trinidad, Jonathan C; Hultgren, Scott J; Giedroc, David P

    2018-05-17

    Recent studies of hydrogen sulfide (H 2 S) signaling implicate low molecular weight (LMW) thiol persulfides and other reactive sulfur species (RSS) as signaling effectors. Here, we show that a CstR protein from the human pathogen Enterococcus faecalis ( E. faecalis), previously identified in Staphylococcus aureus ( S. aureus), is an RSS-sensing repressor that transcriptionally regulates a cst-like operon in response to both exogenous sulfide stress and Angeli's salt, a precursor of nitroxyl (HNO). E. faecalis CstR reacts with coenzyme A persulfide (CoASSH) to form interprotomer disulfide and trisulfide bridges between C32 and C61', which negatively regulate DNA binding to a consensus CstR DNA operator. A Δ cstR strain exhibits deficiency in catheter colonization in a catheter-associated urinary tract infection (CAUTI) mouse model, suggesting sulfide regulation and homeostasis is critical for pathogenicity. Cellular polysulfide metabolite profiling of sodium sulfide-stressed E. faecalis confirms an increase in both inorganic polysulfides and LMW thiols and persulfides sensed by CstR. The cst-like operon encodes two authentic thiosulfate sulfurtransferases and an enzyme we characterize here as an NADH and FAD-dependent coenzyme A (CoA) persulfide reductase (CoAPR) that harbors an N-terminal CoA disulfide reductase (CDR) domain and a C-terminal rhodanese homology domain (RHD). Both cysteines in the CDR (C42) and RHD (C508) domains are required for CoAPR activity and complementation of a sulfide-induced growth phenotype of a S. aureus strain lacking cstB, encoding a nonheme Fe II persulfide dioxygenase. We propose that S. aureus CstB and E. faecalis CoAPR employ orthogonal chemistries to lower CoASSH that accumulates under conditions of cellular sulfide toxicity and signaling.

  7. Memory Distortion and Its Avoidance: An Event-Related Potentials Study on False Recognition and Correct Rejection.

    Science.gov (United States)

    Cadavid, Sara; Beato, Maria Soledad

    2016-01-01

    Memory researchers have long been captivated by the nature of memory distortions and have made efforts to identify the neural correlates of true and false memories. However, the underlying mechanisms of avoiding false memories by correctly rejecting related lures remains underexplored. In this study, we employed a variant of the Deese/Roediger-McDermott paradigm to explore neural signatures of committing and avoiding false memories. ERP were obtained for True recognition, False recognition, Correct rejection of new items, and, more importantly, Correct rejection of related lures. With these ERP data, early-frontal, left-parietal, and late right-frontal old/new effects (associated with familiarity, recollection, and monitoring processes, respectively) were analysed. Results indicated that there were similar patterns for True and False recognition in all three old/new effects analysed in our study. Also, False recognition and Correct rejection of related lures activities seemed to share common underlying familiarity-based processes. The ERP similarities between False recognition and Correct rejection of related lures disappeared when recollection processes were examined because only False recognition presented a parietal old/new effect. This finding supported the view that actual false recollections underlie false memories, providing evidence consistent with previous behavioural research and with most ERP and neuroimaging studies. Later, with the onset of monitoring processes, False recognition and Correct rejection of related lures waveforms presented, again, clearly dissociated patterns. Specifically, False recognition and True recognition showed more positive going patterns than Correct rejection of related lures signal and Correct rejection of new items signature. Since False recognition and Correct rejection of related lures triggered familiarity-recognition processes, our results suggest that deciding which items are studied is based more on recollection

  8. Memory Distortion and Its Avoidance: An Event-Related Potentials Study on False Recognition and Correct Rejection.

    Directory of Open Access Journals (Sweden)

    Sara Cadavid

    Full Text Available Memory researchers have long been captivated by the nature of memory distortions and have made efforts to identify the neural correlates of true and false memories. However, the underlying mechanisms of avoiding false memories by correctly rejecting related lures remains underexplored. In this study, we employed a variant of the Deese/Roediger-McDermott paradigm to explore neural signatures of committing and avoiding false memories. ERP were obtained for True recognition, False recognition, Correct rejection of new items, and, more importantly, Correct rejection of related lures. With these ERP data, early-frontal, left-parietal, and late right-frontal old/new effects (associated with familiarity, recollection, and monitoring processes, respectively were analysed. Results indicated that there were similar patterns for True and False recognition in all three old/new effects analysed in our study. Also, False recognition and Correct rejection of related lures activities seemed to share common underlying familiarity-based processes. The ERP similarities between False recognition and Correct rejection of related lures disappeared when recollection processes were examined because only False recognition presented a parietal old/new effect. This finding supported the view that actual false recollections underlie false memories, providing evidence consistent with previous behavioural research and with most ERP and neuroimaging studies. Later, with the onset of monitoring processes, False recognition and Correct rejection of related lures waveforms presented, again, clearly dissociated patterns. Specifically, False recognition and True recognition showed more positive going patterns than Correct rejection of related lures signal and Correct rejection of new items signature. Since False recognition and Correct rejection of related lures triggered familiarity-recognition processes, our results suggest that deciding which items are studied is based more on

  9. Gesture recognition for smart home applications using portable radar sensors.

    Science.gov (United States)

    Wan, Qian; Li, Yiran; Li, Changzhi; Pal, Ranadip

    2014-01-01

    In this article, we consider the design of a human gesture recognition system based on pattern recognition of signatures from a portable smart radar sensor. Powered by AAA batteries, the smart radar sensor operates in the 2.4 GHz industrial, scientific and medical (ISM) band. We analyzed the feature space using principle components and application-specific time and frequency domain features extracted from radar signals for two different sets of gestures. We illustrate that a nearest neighbor based classifier can achieve greater than 95% accuracy for multi class classification using 10 fold cross validation when features are extracted based on magnitude differences and Doppler shifts as compared to features extracted through orthogonal transformations. The reported results illustrate the potential of intelligent radars integrated with a pattern recognition system for high accuracy smart home and health monitoring purposes.

  10. Signature-based User Authentication

    OpenAIRE

    Hámorník, Juraj

    2015-01-01

    This work aims on missing handwritten signature authentication in Windows. Result of this work is standalone software that allow users to log into Windows by writing signature. We focus on security of signature authentification and best overall user experience. We implemented signature authentification service that accept signature and return user access token if signature is genuine. Signature authentification is done by comparing given signature to signature patterns by their similarity. Si...

  11. Hand Gesture Recognition Using Ultrasonic Waves

    KAUST Repository

    AlSharif, Mohammed Hussain

    2016-01-01

    estimation of the moving hand and received signal strength (RSS). These two factors are estimated using two simple methods; channel impulse response (CIR) and cross correlation (CC) of the reflected ultrasonic signal from the gesturing hand. A customized

  12. Escala de Autoestima de Rosenberg (EAR: validade fatorial e consistência interna Rosenberg Self-Esteem Scale (RSS: factorial validity and internal consistency

    Directory of Open Access Journals (Sweden)

    Juliana Burges Sbicigo

    2010-12-01

    Full Text Available O objetivo deste estudo foi investigar as propriedades psicométricas da Escala de Autoestima de Rosenberg (EAR para adolescentes. Participaram 4.757 adolescentes, com idades entre 14 e 18 anos (M=15,77; DP=1,22, de nove cidades brasileiras. Os participantes responderam a uma versão da EAR adaptada para o Brasil. A análise fatorial exploratória apontou uma estrutura bidimensional, com 51.4% da variância explicada, que foi sustentada pela análise fatorial confirmatória. As análises de consistência interna realizadas por meio do coeficiente alfa de Cronbach, confiabilidade composta e variância extraída indicaram bons valores de fidedignidade. Diferenças nos escores de autoestima em função do sexo e da idade não foram encontradas. Conclui-se que a EAR apresenta qualidades psicométricas satisfatórias, mostrando-se um instrumento confiável para medir autoestima em adolescentes brasileiros.The aim of this study was to investigate the psychometrics properties of the Rosenberg Self-Esteem Scale (RSS for adolescents. The sample was composed of 4.757 adolescents, with ages between 14 and 18 years old (M=15.77; SD=1.22 in nine Brazilian cities. Participants responded to an adapted version of the RSS for Brazil. Exploratory factorial analysis showed a bidimensional structure, with 51.4% of explained variance. This result was supported by confirmatory factor analysis. The internal consistency analysis by Cronbach alpha coefficient, composite reliability and extracted variance indicated good reliability. Differences in self-esteem for gender and age were not found. These findings show that RSS has satisfactory psychometric qualities and it's a reliable instrument to assess self-esteem in Brazilian adolescents.

  13. Real Traceable Signatures

    Science.gov (United States)

    Chow, Sherman S. M.

    Traceable signature scheme extends a group signature scheme with an enhanced anonymity management mechanism. The group manager can compute a tracing trapdoor which enables anyone to test if a signature is signed by a given misbehaving user, while the only way to do so for group signatures requires revealing the signer of all signatures. Nevertheless, it is not tracing in a strict sense. For all existing schemes, T tracing agents need to recollect all N' signatures ever produced and perform RN' “checks” for R revoked users. This involves a high volume of transfer and computations. Increasing T increases the degree of parallelism for tracing but also the probability of “missing” some signatures in case some of the agents are dishonest.

  14. Signature Balancing

    NARCIS (Netherlands)

    Noordkamp, H.W.; Brink, M. van den

    2006-01-01

    Signatures are an important part of the design of a ship. In an ideal situation, signatures must be as low as possible. However, due to budget constraints it is most unlikely to reach this ideal situation. The arising question is which levels of signatures are optimal given the different scenarios

  15. Design of Genomic Signatures of Pathogen Identification & Characterization

    Energy Technology Data Exchange (ETDEWEB)

    Slezak, T; Gardner, S; Allen, J; Vitalis, E; Jaing, C

    2010-02-09

    of species and strains is not always possible. In contrast, protein recognition signatures composed of antibodies or synthetic high-affinity ligands offer extremely fast results but require a large quantity of the target to be present. False positives/negatives are also a problem with some protein-based techniques (home pregnancy kits use this basic approach).

  16. BOREAS RSS-8 BIOME-BGC SSA Simulation of Annual Water and Carbon Fluxes

    Science.gov (United States)

    Hall, Forrest G. (Editor); Nickeson, Jaime (Editor); Kimball, John

    2000-01-01

    The BOREAS RSS-8 team performed research to evaluate the effect of seasonal weather and landcover heterogeneity on boreal forest regional water and carbon fluxes using a process-level ecosystem model, BIOME-BGC, coupled with remote sensing-derived parameter maps of key state variables. This data set contains derived maps of landcover type and crown and stem biomass as model inputs to determine annual evapotranspiration, gross primary production, autotrophic respiration, and net primary productivity within the BOREAS SSA-MSA, at a 30-m spatial resolution. Model runs were conducted over a 3-year period from 1994-1996; images are provided for each of those years. The data are stored in binary image format. The data files are available on a CD-ROM (see document number 20010000884), or from the Oak Ridge National Laboratory (ORNL) Distributed Active Archive Center (DAAC).

  17. Methods of extending signatures and training without ground information. [data processing, pattern recognition

    Science.gov (United States)

    Henderson, R. G.; Thomas, G. S.; Nalepka, R. F.

    1975-01-01

    Methods of performing signature extension, using LANDSAT-1 data, are explored. The emphasis is on improving the performance and cost-effectiveness of large area wheat surveys. Two methods were developed: ASC, and MASC. Two methods, Ratio, and RADIFF, previously used with aircraft data were adapted to and tested on LANDSAT-1 data. An investigation into the sources and nature of between scene data variations was included. Initial investigations into the selection of training fields without in situ ground truth were undertaken.

  18. Algorithms for Hyperspectral Endmember Extraction and Signature Classification with Morphological Dendritic Networks

    Science.gov (United States)

    Schmalz, M.; Ritter, G.

    Accurate multispectral or hyperspectral signature classification is key to the nonimaging detection and recognition of space objects. Additionally, signature classification accuracy depends on accurate spectral endmember determination [1]. Previous approaches to endmember computation and signature classification were based on linear operators or neural networks (NNs) expressed in terms of the algebra (R, +, x) [1,2]. Unfortunately, class separation in these methods tends to be suboptimal, and the number of signatures that can be accurately classified often depends linearly on the number of NN inputs. This can lead to poor endmember distinction, as well as potentially significant classification errors in the presence of noise or densely interleaved signatures. In contrast to traditional CNNs, autoassociative morphological memories (AMM) are a construct similar to Hopfield autoassociatived memories defined on the (R, +, ?,?) lattice algebra [3]. Unlimited storage and perfect recall of noiseless real valued patterns has been proven for AMMs [4]. However, AMMs suffer from sensitivity to specific noise models, that can be characterized as erosive and dilative noise. On the other hand, the prior definition of a set of endmembers corresponds to material spectra lying on vertices of the minimum convex region covering the image data. These vertices can be characterized as morphologically independent patterns. It has further been shown that AMMs can be based on dendritic computation [3,6]. These techniques yield improved accuracy and class segmentation/separation ability in the presence of highly interleaved signature data. In this paper, we present a procedure for endmember determination based on AMM noise sensitivity, which employs morphological dendritic computation. We show that detected endmembers can be exploited by AMM based classification techniques, to achieve accurate signature classification in the presence of noise, closely spaced or interleaved signatures, and

  19. A disseminação seletiva da informação e a tecnologia RSS nas bibliotecas de Tribunais em Brasília

    Directory of Open Access Journals (Sweden)

    Thiago Gomes Eirão

    2015-09-01

    Full Text Available A pesquisa teve como objetivo verificar a utilização do serviço de disseminação seletiva da informação (DSI e a tecnologia RSS em bibliotecas de Tribunais em Brasília. Esse estudo foi proposto para identificar como os serviços de referência de tais bibliotecas veem a validade do serviço de disseminação seletiva e mais especificamente a tecnologia RSS como instrumentos para o desenvolvimento de novos produtos e serviços de informação com o foco nas necessidades do usuário. Ao todo foram visitadas seis instituições do poder Judiciário que possuem sede em Brasília. A amostra dos respondentes foi composta por doze profissionais formados em Biblioteconomia, que atuavam no serviço de referência dos respectivos órgãos. A técnica de pesquisa utilizada foi a entrevista semiaberta. Para obtenção das respostas foi utilizado um roteiro de perguntas que permitia ao entrevistador aprofundar as questões a partir das respostas concedidas pelos entrevistados. Os resultados obtidos demonstraram que os profissionais ainda veem utilidade do serviço de DSI, apesar de apenas duas das bibliotecas visitadas o utilizarem. Também foi possível verificar que os profissionais vislumbram a utilização da tecnologia RSS nos serviços de referência, apesar de nenhuma biblioteca visitada já ter pensado na utilização da tecnologia e os sites dessas bibliotecas ainda possuírem uma baixa disponibilização de serviços e utilização.

  20. Self-recognition of avatar motion: how do I know it's me?

    Science.gov (United States)

    Cook, Richard; Johnston, Alan; Heyes, Cecilia

    2012-02-22

    When motion is isolated from form cues and viewed from third-person perspectives, individuals are able to recognize their own whole body movements better than those of friends. Because we rarely see our own bodies in motion from third-person viewpoints, this self-recognition advantage may indicate a contribution to perception from the motor system. Our first experiment provides evidence that recognition of self-produced and friends' motion dissociate, with only the latter showing sensitivity to orientation. Through the use of selectively disrupted avatar motion, our second experiment shows that self-recognition of facial motion is mediated by knowledge of the local temporal characteristics of one's own actions. Specifically, inverted self-recognition was unaffected by disruption of feature configurations and trajectories, but eliminated by temporal distortion. While actors lack third-person visual experience of their actions, they have a lifetime of proprioceptive, somatosensory, vestibular and first-person-visual experience. These sources of contingent feedback may provide actors with knowledge about the temporal properties of their actions, potentially supporting recognition of characteristic rhythmic variation when viewing self-produced motion. In contrast, the ability to recognize the motion signatures of familiar others may be dependent on configural topographic cues.

  1. Approaches to determining the reliability of a multimodal three-dimensional dynamic signature

    Directory of Open Access Journals (Sweden)

    Yury E. Kozlov

    2018-03-01

    Full Text Available The market of modern mobile applications has increasingly strict requirements for the authentication system reliability. This article examines an authentication method using a multimodal three-dimensional dynamic signature (MTDS, that can be used both as a main and additional method of user authentication in mobile applications. It is based on the use of gesture in the air performed by two independent mobile devices as an identifier. The MTDS method has certain advantages over currently used biometric methods, including fingerprint authentication, face recognition and voice recognition. A multimodal three-dimensional dynamic signature allows quickly changing an authentication gesture, as well as concealing the authentication procedure using gestures that do not attract attention. Despite all its advantages, the MTDS method has certain limitations, the main one is building functionally dynamic complex (FDC skills required for accurate repeating an authentication gesture. To correctly create MTDS need to have a system for assessing the reliability of gestures. Approaches to the solution of this task are grouped in this article according to methods of their implementation. Two of the approaches can be implemented only with the use of a server as a centralized MTDS processing center and one approach can be implemented using smartphone's own computing resources. The final part of the article provides data of testing one of these methods on a template performing the MTDS authentication.

  2. Some Proxy Signature and Designated verifier Signature Schemes over Braid Groups

    OpenAIRE

    Lal, Sunder; Verma, Vandani

    2009-01-01

    Braids groups provide an alternative to number theoretic public cryptography and can be implemented quite efficiently. The paper proposes five signature schemes: Proxy Signature, Designated Verifier, Bi-Designated Verifier, Designated Verifier Proxy Signature And Bi-Designated Verifier Proxy Signature scheme based on braid groups. We also discuss the security aspects of each of the proposed schemes.

  3. Joint sparse representation for robust multimodal biometrics recognition.

    Science.gov (United States)

    Shekhar, Sumit; Patel, Vishal M; Nasrabadi, Nasser M; Chellappa, Rama

    2014-01-01

    Traditional biometric recognition systems rely on a single biometric signature for authentication. While the advantage of using multiple sources of information for establishing the identity has been widely recognized, computational models for multimodal biometrics recognition have only recently received attention. We propose a multimodal sparse representation method, which represents the test data by a sparse linear combination of training data, while constraining the observations from different modalities of the test subject to share their sparse representations. Thus, we simultaneously take into account correlations as well as coupling information among biometric modalities. A multimodal quality measure is also proposed to weigh each modality as it gets fused. Furthermore, we also kernelize the algorithm to handle nonlinearity in data. The optimization problem is solved using an efficient alternative direction method. Various experiments show that the proposed method compares favorably with competing fusion-based methods.

  4. Advances in biometrics for secure human authentication and recognition

    CERN Document Server

    Kisku, Dakshina Ranjan; Sing, Jamuna Kanta

    2013-01-01

    GENERAL BIOMETRICSSecurity and Reliability Assessment for Biometric Systems; Gayatri MirajkarReview of Human Recognition Based on Retinal Images; Amin DehghaniADVANCED TOPICS IN BIOMETRICSVisual Speech as Behavioral Biometric; Preety Singh, Vijay Laxmi, and Manoj Singh GaurHuman Gait Signature for Biometric Authentication; Vijay JohnHand-Based Biometric for Personal Identification Using Correlation Filter Classifier; Mohammed Saigaa , Abdallah Meraoumia , Salim Chitroub, and Ahmed BouridaneOn Deciding the Dynamic Periocular Boundary for Human Recognition; Sambit Bakshi , Pankaj Kumar Sa, and Banshidhar MajhiRetention of Electrocardiogram Features Insignificantly Devalorized as an Effect of Watermarking for a Multimodal Biometric Authentication System; Nilanjan Dey, Bijurika Nandi, Poulami Das, Achintya Das, and Sheli Sinha ChaudhuriFacial Feature Point Extraction for Object Identification Using Discrete Contourlet Transform and Principal Component Analysis; N. G. Chitaliya and A. I. TrivediCASE STUDIES AND LA...

  5. SIGNATURE: A workbench for gene expression signature analysis

    Directory of Open Access Journals (Sweden)

    Chang Jeffrey T

    2011-11-01

    Full Text Available Abstract Background The biological phenotype of a cell, such as a characteristic visual image or behavior, reflects activities derived from the expression of collections of genes. As such, an ability to measure the expression of these genes provides an opportunity to develop more precise and varied sets of phenotypes. However, to use this approach requires computational methods that are difficult to implement and apply, and thus there is a critical need for intelligent software tools that can reduce the technical burden of the analysis. Tools for gene expression analyses are unusually difficult to implement in a user-friendly way because their application requires a combination of biological data curation, statistical computational methods, and database expertise. Results We have developed SIGNATURE, a web-based resource that simplifies gene expression signature analysis by providing software, data, and protocols to perform the analysis successfully. This resource uses Bayesian methods for processing gene expression data coupled with a curated database of gene expression signatures, all carried out within a GenePattern web interface for easy use and access. Conclusions SIGNATURE is available for public use at http://genepattern.genome.duke.edu/signature/.

  6. A new NMIS characteristic signature acquisition method based on time-domain fission correlation spectrum

    International Nuclear Information System (INIS)

    Wei Biao; Feng Peng; Yang Fan; Ren Yong

    2014-01-01

    To deal with the disadvantages of the homogeneous signature of the nuclear material identification system (NMIS) and limited methods to extract the characteristic parameters of the nuclear materials, an enhanced method using the combination of the Time-of-Flight (TOF) and the Pulse Shape Discrimination (PSD) was introduced into the traditional characteristic parameters extraction and recognition system of the NMIS. With the help of the PSD, the γ signal and the neutron signal can be discriminated. Further based on the differences of the neutron-γ flight time of the detectors in various positions, a new time-domain signature reflecting the position information of unknown nuclear material was investigated. The simulation result showed that the algorithm is feasible and helpful to identify the relative position of unknown nuclear material. (authors)

  7. A simple and robust method for connecting small-molecule drugs using gene-expression signatures

    Directory of Open Access Journals (Sweden)

    Gant Timothy W

    2008-06-01

    Full Text Available Abstract Background Interaction of a drug or chemical with a biological system can result in a gene-expression profile or signature characteristic of the event. Using a suitably robust algorithm these signatures can potentially be used to connect molecules with similar pharmacological or toxicological properties by gene expression profile. Lamb et al first proposed the Connectivity Map [Lamb et al (2006, Science 313, 1929–1935] to make successful connections among small molecules, genes, and diseases using genomic signatures. Results Here we have built on the principles of the Connectivity Map to present a simpler and more robust method for the construction of reference gene-expression profiles and for the connection scoring scheme, which importantly allows the valuation of statistical significance of all the connections observed. We tested the new method with two randomly generated gene signatures and three experimentally derived gene signatures (for HDAC inhibitors, estrogens, and immunosuppressive drugs, respectively. Our testing with this method indicates that it achieves a higher level of specificity and sensitivity and so advances the original method. Conclusion The method presented here not only offers more principled statistical procedures for testing connections, but more importantly it provides effective safeguard against false connections at the same time achieving increased sensitivity. With its robust performance, the method has potential use in the drug development pipeline for the early recognition of pharmacological and toxicological properties in chemicals and new drug candidates, and also more broadly in other 'omics sciences.

  8. The Pointer Optimization Strategy Based on the distributed RSs in the Mobile IP Network%移动IP中基于分布式注册服务器的指针优化策略

    Institute of Scientific and Technical Information of China (English)

    康凯; 郭伟; 吴诗其

    2002-01-01

    Mobility management is one of the key problems in the mobile communication techniques. The performance of the mobile communication networks is heavily depended on the effectiveness of the mobility management. In this paper, we have presented a protocol of the mobility management in the mobile IP networks, based on the distributed RSs. When the mobile user in the inactive connection handoffs, some pointers are constructed and modified by the RSs and routers. It can realize the local registration; only when a call arrives, the possible update operations of the mobile database are needed. Consequently, the access of the RS is limited, and the cost of the mobility management is also reduced.

  9. Unconditionally Secure Quantum Signatures

    Directory of Open Access Journals (Sweden)

    Ryan Amiri

    2015-08-01

    Full Text Available Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols—signatures based on the Rivest–Adleman–Shamir (RSA algorithm, the digital signature algorithm (DSA, and the elliptic curve digital signature algorithm (ECDSA—are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally securesecure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  10. Uav Positioning and Collision Avoidance Based on RSS Measurements

    Science.gov (United States)

    Masiero, A.; Fissore, F.; Guarnieri, A.; Pirotti, F.; Vettore, A.

    2015-08-01

    In recent years, Unmanned Aerial Vehicles (UAVs) are attracting more and more attention in both the research and industrial communities: indeed, the possibility to use them in a wide range of remote sensing applications makes them a very flexible and attractive solution in both civil and commercial cases (e.g. precision agriculture, security and control, monitoring of sites, exploration of areas difficult to reach). Most of the existing UAV positioning systems rely on the use of the GPS signal. Despite this can be a satisfactory solution in open environments where the GPS signal is available, there are several operating conditions of interest where it is unavailable or unreliable (e.g. close to high buildings, or mountains, in indoor environments). Consequently, a different approach has to be adopted in these cases. This paper considers the use ofWiFi measurements in order to obtain position estimations of the device of interest. More specifically, to limit the costs for the devices involved in the positioning operations, an approach based on radio signal strengths (RSS) measurements is considered. Thanks to the use of a Kalman filter, the proposed approach takes advantage of the temporal dynamic of the device of interest in order to improve the positioning results initially provided by means of maximum likelihood estimations. The considered UAVs are assumed to be provided with communication devices, which can allow them to communicate with each other in order to improve their cooperation abilities. In particular, the collision avoidance problem is examined in this work.

  11. Utilising E-on Vue and Unity 3D scenes to generate synthetic images and videos for visible signature analysis

    Science.gov (United States)

    Madden, Christopher S.; Richards, Noel J.; Culpepper, Joanne B.

    2016-10-01

    This paper investigates the ability to develop synthetic scenes in an image generation tool, E-on Vue, and a gaming engine, Unity 3D, which can be used to generate synthetic imagery of target objects across a variety of conditions in land environments. Developments within these tools and gaming engines have allowed the computer gaming industry to dramatically enhance the realism of the games they develop; however they utilise short cuts to ensure that the games run smoothly in real-time to create an immersive effect. Whilst these short cuts may have an impact upon the realism of the synthetic imagery, they do promise a much more time efficient method of developing imagery of different environmental conditions and to investigate the dynamic aspect of military operations that is currently not evaluated in signature analysis. The results presented investigate how some of the common image metrics used in target acquisition modelling, namely the Δμ1, Δμ2, Δμ3, RSS, and Doyle metrics, perform on the synthetic scenes generated by E-on Vue and Unity 3D compared to real imagery of similar scenes. An exploration of the time required to develop the various aspects of the scene to enhance its realism are included, along with an overview of the difficulties associated with trying to recreate specific locations as a virtual scene. This work is an important start towards utilising virtual worlds for visible signature evaluation, and evaluating how equivalent synthetic imagery is to real photographs.

  12. Radiation signatures

    International Nuclear Information System (INIS)

    McGlynn, S.P.; Varma, M.N.

    1992-01-01

    A new concept for modelling radiation risk is proposed. This concept is based on the proposal that the spectrum of molecular lesions, which we dub ''the radiation signature'', can be used to identify the quality of the causal radiation. If the proposal concerning radiation signatures can be established then, in principle, both prospective and retrospective risk determination can be assessed on an individual basis. A major goal of biophysical modelling is to relate physical events such as ionization, excitation, etc. to the production of radiation carcinogenesis. A description of the physical events is provided by track structure. The track structure is determined by radiation quality, and it can be considered to be the ''physical signature'' of the radiation. Unfortunately, the uniqueness characteristics of this signature are dissipated in biological systems in ∼10 -9 s. Nonetheless, it is our contention that this physical disturbance of the biological system eventuates later, at ∼10 0 s, in molecular lesion spectra which also characterize the causal radiation. (author)

  13. Target Tracking with Sensor Navigation Using Coupled RSS and AoA Measurements

    Directory of Open Access Journals (Sweden)

    Slavisa Tomic

    2017-11-01

    Full Text Available This work addresses the problem of tracking a signal-emitting mobile target in wireless sensor networks (WSNs with navigated mobile sensors. The sensors are properly equipped to acquire received signal strength (RSS and angle of arrival (AoA measurements from the received signal, while the target transmit power is assumed not known. We start by showing how to linearize the highly non-linear measurement model. Then, by employing a Bayesian approach, we combine the linearized observation model with prior knowledge extracted from the state transition model. Based on the maximum a posteriori (MAP principle and the Kalman filtering (KF framework, we propose new MAP and KF algorithms, respectively. We also propose a simple and efficient mobile sensor navigation procedure, which allows us to further enhance the estimation accuracy of our algorithms with a reduced number of sensors. Model flaws, which result in imperfect knowledge about the path loss exponent (PLE and the true mobile sensors’ locations, are taken into consideration. We have carried out an extensive simulation study, and our results confirm the superiority of the proposed algorithms, as well as the effectiveness of the proposed navigation routine.

  14. Visual Sharpness Contingency in Recognition Memory for Orientation: Mnemonic Illusion Suppressed by Sensory Signature

    Science.gov (United States)

    Martin, Maryanne; Jones, Gregory V.

    2006-01-01

    A striking finding about human memory is that people's level of accuracy in remembering the orientation of heads on coins is often not simply at the chance level but significantly below it. However, S. W. Kelly, A. M. Burton, T. Kato, and S. Akamatsu (2001) reported that this is not so when two-alternative forced-choice visual recognition is…

  15. Electronic Signature Policy

    Science.gov (United States)

    Establishes the United States Environmental Protection Agency's approach to adopting electronic signature technology and best practices to ensure electronic signatures applied to official Agency documents are legally valid and enforceable

  16. Mother Vocal Recognition in Antarctic Fur Seal Arctocephalus gazella Pups: A Two-Step Process.

    Directory of Open Access Journals (Sweden)

    Thierry Aubin

    Full Text Available In otariids, mother's recognition by pups is essential to their survival since females nurse exclusively their own young and can be very aggressive towards non-kin. Antarctic fur seal, Arctocephalus gazella, come ashore to breed and form dense colonies. During the 4-month lactation period, females alternate foraging trips at sea with suckling period ashore. On each return to the colony, females and pups first use vocalizations to find each other among several hundred conspecifics and olfaction is used as a final check. Such vocal identification has to be highly efficient. In this present study, we investigated the components of the individual vocal signature used by pups to identify their mothers by performing playback experiments on pups with synthetic signals. We thus tested the efficiency of this individual vocal signature by performing propagation tests and by testing pups at different playback distances. Pups use both amplitude and frequency modulations to identify their mother's voice, as well as the energy spectrum. Propagation tests showed that frequency modulations propagated reliably up to 64m, whereas amplitude modulations and spectral content greatly were highly degraded for distances over 8m. Playback on pups at different distances suggested that the individual identification is a two-step process: at long range, pups identified first the frequency modulation pattern of their mother's calls, and other components of the vocal signature at closer range. The individual vocal recognition system developed by Antarctic fur seals is well adapted to face the main constraint of finding kin in a crowd.

  17. Blinding for unanticipated signatures

    NARCIS (Netherlands)

    D. Chaum (David)

    1987-01-01

    textabstractPreviously known blind signature systems require an amount of computation at least proportional to the number of signature types, and also that the number of such types be fixed in advance. These requirements are not practical in some applications. Here, a new blind signature technique

  18. 1 CFR 18.7 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 1 General Provisions 1 2010-01-01 2010-01-01 false Signature. 18.7 Section 18.7 General Provisions... PREPARATION AND TRANSMITTAL OF DOCUMENTS GENERALLY § 18.7 Signature. The original and each duplicate original... stamped beneath the signature. Initialed or impressed signatures will not be accepted. Documents submitted...

  19. Attribute-Based Digital Signature System

    NARCIS (Netherlands)

    Ibraimi, L.; Asim, Muhammad; Petkovic, M.

    2011-01-01

    An attribute-based digital signature system comprises a signature generation unit (1) for signing a message (m) by generating a signature (s) based on a user secret key (SK) associated with a set of user attributes, wherein the signature generation unit (1) is arranged for combining the user secret

  20. Condition monitoring of machinery using motor current signature analysis

    International Nuclear Information System (INIS)

    Kryter, R.C.; Haynes, H.D.

    1989-01-01

    Motor current signature analysis (MCSA) is a powerful monitoring tool for motor-driven equipment that provides a nonintrusive means for detecting the presence of mechanical and electrical abnormalities in the motor and the driven equipment, including altered conditions in the process ''downstream'' of the motor-driven equipment. It was developed at the Oak Ridge National Laboratory as a means for determining the effects of aging and service wear systems, but it is applicable to a broad range of machinery. MCSA is based on the recognition that an electric motor (ac or dc) driving a mechanical load acts as an efficient and permanently available transducer by sensing mechanical load variations, large and small, long-term and rapid, and converting them into variations in the induced current generated in the motor windings. These motor current variations are carried by the electrical cables processes as desired. Motor current signatures, obtained in both time and over time to provide early indication of degradation. Successful applications of MCSA technology (patent applied for) include not only motor-operated valves but also pumps of various designs, blowers, and air conditioning systems. Examples are presented briefly, and speculation regarding the applicability of MCSA to a broader range of equipment monitoring and production line testing is also given. 1 ref., 13 figs

  1. Fair quantum blind signatures

    International Nuclear Information System (INIS)

    Tian-Yin, Wang; Qiao-Yan, Wen

    2010-01-01

    We present a new fair blind signature scheme based on the fundamental properties of quantum mechanics. In addition, we analyse the security of this scheme, and show that it is not possible to forge valid blind signatures. Moreover, comparisons between this scheme and public key blind signature schemes are also discussed. (general)

  2. Five Guidelines for Selecting Hydrological Signatures

    Science.gov (United States)

    McMillan, H. K.; Westerberg, I.; Branger, F.

    2017-12-01

    Hydrological signatures are index values derived from observed or modeled series of hydrological data such as rainfall, flow or soil moisture. They are designed to extract relevant information about hydrological behavior, such as to identify dominant processes, and to determine the strength, speed and spatiotemporal variability of the rainfall-runoff response. Hydrological signatures play an important role in model evaluation. They allow us to test whether particular model structures or parameter sets accurately reproduce the runoff generation processes within the watershed of interest. Most modeling studies use a selection of different signatures to capture different aspects of the catchment response, for example evaluating overall flow distribution as well as high and low flow extremes and flow timing. Such studies often choose their own set of signatures, or may borrow subsets of signatures used in multiple other works. The link between signature values and hydrological processes is not always straightforward, leading to uncertainty and variability in hydrologists' signature choices. In this presentation, we aim to encourage a more rigorous approach to hydrological signature selection, which considers the ability of signatures to represent hydrological behavior and underlying processes for the catchment and application in question. To this end, we propose a set of guidelines for selecting hydrological signatures. We describe five criteria that any hydrological signature should conform to: Identifiability, Robustness, Consistency, Representativeness, and Discriminatory Power. We describe an example of the design process for a signature, assessing possible signature designs against the guidelines above. Due to their ubiquity, we chose a signature related to the Flow Duration Curve, selecting the FDC mid-section slope as a proposed signature to quantify catchment overall behavior and flashiness. We demonstrate how assessment against each guideline could be used to

  3. BOREAS RSS-15 SIR-C and Landsat TM Biomass and Landcover Maps of the NSA

    Science.gov (United States)

    Hall, Forrest G. (Editor); Nickeson, Jaime (Editor); Ranson, K. Jon

    2000-01-01

    As part of BOREAS, the RSS-15 team conducted an investigation using SIR-C, X-SAR, and Landsat TM data for estimating total above-ground dry biomass for the SSA and NSA modeling grids and component biomass for the SSA. Relationships of backscatter to total biomass and total biomass to foliage, branch, and bole biomass were used to estimate biomass density across the landscape. The procedure involved image classification with SAR and Landsat TM data and development of simple mapping techniques using combinations of SAR channels. For the SSA, the SIR-C data used were acquired on 06-Oct-1994, and the Landsat TM data used were acquired on 02-Sep-1995. The maps of the NSA were developed from SIR-C data acquired on 13-Apr-1994. The data files are available on a CD-ROM (see document number 20010000884), or from the Oak Ridge National Laboratory (ORNL) Distributed Active Archive Center (DAAC).

  4. Quantum messages with signatures forgeable in arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Kim, Taewan; Choi, Jeong Woon; Jho, Nam-Su; Lee, Soojoon

    2015-01-01

    Even though a method to perfectly sign quantum messages has not been known, the arbitrated quantum signature scheme has been considered as one of the good candidates. However, its forgery problem has been an obstacle to the scheme becoming a successful method. In this paper, we consider one situation, which is slightly different from the forgery problem, that we use to check whether at least one quantum message with signature can be forged in a given scheme, although all the messages cannot be forged. If there are only a finite number of forgeable quantum messages in the scheme, then the scheme can be secured against the forgery attack by not sending forgeable quantum messages, and so our situation does not directly imply that we check whether the scheme is secure against the attack. However, if users run a given scheme without any consideration of forgeable quantum messages, then a sender might transmit such forgeable messages to a receiver and in such a case an attacker can forge the messages if the attacker knows them. Thus it is important and necessary to look into forgeable quantum messages. We show here that there always exists such a forgeable quantum message-signature pair for every known scheme with quantum encryption and rotation, and numerically show that there are no forgeable quantum message-signature pairs that exist in an arbitrated quantum signature scheme. (paper)

  5. MGN V RSS SPHERICAL HARMONIC AND GRAVITY MAP DATA V1.0

    Data.gov (United States)

    National Aeronautics and Space Administration — The gravitational signature of Venus was determined from velocity perturbations of the Pioneer Venus Orbiter (PVO) and the Magellan spacecraft as measured from the...

  6. Uncertainty in hydrological signatures

    Science.gov (United States)

    McMillan, Hilary; Westerberg, Ida

    2015-04-01

    Information that summarises the hydrological behaviour or flow regime of a catchment is essential for comparing responses of different catchments to understand catchment organisation and similarity, and for many other modelling and water-management applications. Such information types derived as an index value from observed data are known as hydrological signatures, and can include descriptors of high flows (e.g. mean annual flood), low flows (e.g. mean annual low flow, recession shape), the flow variability, flow duration curve, and runoff ratio. Because the hydrological signatures are calculated from observed data such as rainfall and flow records, they are affected by uncertainty in those data. Subjective choices in the method used to calculate the signatures create a further source of uncertainty. Uncertainties in the signatures may affect our ability to compare different locations, to detect changes, or to compare future water resource management scenarios. The aim of this study was to contribute to the hydrological community's awareness and knowledge of data uncertainty in hydrological signatures, including typical sources, magnitude and methods for its assessment. We proposed a generally applicable method to calculate these uncertainties based on Monte Carlo sampling and demonstrated it for a variety of commonly used signatures. The study was made for two data rich catchments, the 50 km2 Mahurangi catchment in New Zealand and the 135 km2 Brue catchment in the UK. For rainfall data the uncertainty sources included point measurement uncertainty, the number of gauges used in calculation of the catchment spatial average, and uncertainties relating to lack of quality control. For flow data the uncertainty sources included uncertainties in stage/discharge measurement and in the approximation of the true stage-discharge relation by a rating curve. The resulting uncertainties were compared across the different signatures and catchments, to quantify uncertainty

  7. 76 FR 30542 - Adult Signature Services

    Science.gov (United States)

    2011-05-26

    ... POSTAL SERVICE 39 CFR Part 111 Adult Signature Services AGENCY: Postal Service\\TM\\. ACTION: Final..., Domestic Mail Manual (DMM[supreg]) 503.8, to add a new extra service called Adult Signature. This new service has two available options: Adult Signature Required and Adult Signature Restricted Delivery. DATES...

  8. Investigating Patterns for Self-Induced Emotion Recognition from EEG Signals

    Science.gov (United States)

    Zeng, Ying; Yang, Kai; Tong, Li; Yan, Bin

    2018-01-01

    Most current approaches to emotion recognition are based on neural signals elicited by affective materials such as images, sounds and videos. However, the application of neural patterns in the recognition of self-induced emotions remains uninvestigated. In this study we inferred the patterns and neural signatures of self-induced emotions from electroencephalogram (EEG) signals. The EEG signals of 30 participants were recorded while they watched 18 Chinese movie clips which were intended to elicit six discrete emotions, including joy, neutrality, sadness, disgust, anger and fear. After watching each movie clip the participants were asked to self-induce emotions by recalling a specific scene from each movie. We analyzed the important features, electrode distribution and average neural patterns of different self-induced emotions. Results demonstrated that features related to high-frequency rhythm of EEG signals from electrodes distributed in the bilateral temporal, prefrontal and occipital lobes have outstanding performance in the discrimination of emotions. Moreover, the six discrete categories of self-induced emotion exhibit specific neural patterns and brain topography distributions. We achieved an average accuracy of 87.36% in the discrimination of positive from negative self-induced emotions and 54.52% in the classification of emotions into six discrete categories. Our research will help promote the development of comprehensive endogenous emotion recognition methods. PMID:29534515

  9. Investigating Patterns for Self-Induced Emotion Recognition from EEG Signals.

    Science.gov (United States)

    Zhuang, Ning; Zeng, Ying; Yang, Kai; Zhang, Chi; Tong, Li; Yan, Bin

    2018-03-12

    Most current approaches to emotion recognition are based on neural signals elicited by affective materials such as images, sounds and videos. However, the application of neural patterns in the recognition of self-induced emotions remains uninvestigated. In this study we inferred the patterns and neural signatures of self-induced emotions from electroencephalogram (EEG) signals. The EEG signals of 30 participants were recorded while they watched 18 Chinese movie clips which were intended to elicit six discrete emotions, including joy, neutrality, sadness, disgust, anger and fear. After watching each movie clip the participants were asked to self-induce emotions by recalling a specific scene from each movie. We analyzed the important features, electrode distribution and average neural patterns of different self-induced emotions. Results demonstrated that features related to high-frequency rhythm of EEG signals from electrodes distributed in the bilateral temporal, prefrontal and occipital lobes have outstanding performance in the discrimination of emotions. Moreover, the six discrete categories of self-induced emotion exhibit specific neural patterns and brain topography distributions. We achieved an average accuracy of 87.36% in the discrimination of positive from negative self-induced emotions and 54.52% in the classification of emotions into six discrete categories. Our research will help promote the development of comprehensive endogenous emotion recognition methods.

  10. Lesson 6: Signature Validation

    Science.gov (United States)

    Checklist items 13 through 17 are grouped under the Signature Validation Process, and represent CROMERR requirements that the system must satisfy as part of ensuring that electronic signatures it receives are valid.

  11. 21 CFR 11.50 - Signature manifestations.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Signature manifestations. 11.50 Section 11.50 Food... RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.50 Signature manifestations. (a) Signed electronic...: (1) The printed name of the signer; (2) The date and time when the signature was executed; and (3...

  12. 21 CFR 11.70 - Signature/record linking.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Signature/record linking. 11.70 Section 11.70 Food... RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.70 Signature/record linking. Electronic signatures and handwritten signatures executed to electronic records shall be linked to their respective...

  13. Expressiveness considerations of XML signatures

    DEFF Research Database (Denmark)

    Jensen, Meiko; Meyer, Christopher

    2011-01-01

    XML Signatures are used to protect XML-based Web Service communication against a broad range of attacks related to man-in-the-middle scenarios. However, due to the complexity of the Web Services specification landscape, the task of applying XML Signatures in a robust and reliable manner becomes...... more and more challenging. In this paper, we investigate this issue, describing how an attacker can still interfere with Web Services communication even in the presence of XML Signatures. Additionally, we discuss the interrelation of XML Signatures and XML Encryption, focussing on their security...

  14. Digital Signature Schemes with Complementary Functionality and Applications

    OpenAIRE

    S. N. Kyazhin

    2012-01-01

    Digital signature schemes with additional functionality (an undeniable signature, a signature of the designated confirmee, a signature blind, a group signature, a signature of the additional protection) and examples of their application are considered. These schemes are more practical, effective and useful than schemes of ordinary digital signature.

  15. 17 CFR 12.12 - Signature.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Signature. 12.12 Section 12.12... General Information and Preliminary Consideration of Pleadings § 12.12 Signature. (a) By whom. All... document on behalf of another person. (b) Effect. The signature on any document of any person acting either...

  16. High-speed high-security signatures

    NARCIS (Netherlands)

    Bernstein, D.J.; Duif, N.; Lange, T.; Schwabe, P.; Yang, B.Y.

    2011-01-01

    This paper shows that a $390 mass-market quad-core 2.4GHz Intel Westmere (Xeon E5620) CPU can create 108000 signatures per second and verify 71000 signatures per second on an elliptic curve at a 2128 security level. Public keys are 32 bytes, and signatures are 64 bytes. These performance figures

  17. Paternal kin recognition in the high frequency / ultrasonic range in a solitary foraging mammal

    Directory of Open Access Journals (Sweden)

    Kessler Sharon E

    2012-11-01

    Full Text Available Abstract Background Kin selection is a driving force in the evolution of mammalian social complexity. Recognition of paternal kin using vocalizations occurs in taxa with cohesive, complex social groups. This is the first investigation of paternal kin recognition via vocalizations in a small-brained, solitary foraging mammal, the grey mouse lemur (Microcebus murinus, a frequent model for ancestral primates. We analyzed the high frequency/ultrasonic male advertisement (courtship call and alarm call. Results Multi-parametric analyses of the calls’ acoustic parameters and discriminant function analyses showed that advertisement calls, but not alarm calls, contain patrilineal signatures. Playback experiments controlling for familiarity showed that females paid more attention to advertisement calls from unrelated males than from their fathers. Reactions to alarm calls from unrelated males and fathers did not differ. Conclusions 1 Findings provide the first evidence of paternal kin recognition via vocalizations in a small-brained, solitarily foraging mammal. 2 High predation, small body size, and dispersed social systems may select for acoustic paternal kin recognition in the high frequency/ultrasonic ranges, thus limiting risks of inbreeding and eavesdropping by predators or conspecific competitors. 3 Paternal kin recognition via vocalizations in mammals is not dependent upon a large brain and high social complexity, but may already have been an integral part of the dispersed social networks from which more complex, kin-based sociality emerged.

  18. Consequences of temporary inhibition of the medial amygdala on social recognition memory performance in mice

    Directory of Open Access Journals (Sweden)

    Julia eNoack

    2015-04-01

    Full Text Available Different lines of investigation suggest that the medial amygdala is causally involved in the processing of information linked to social behaviour in rodents. Here we investigated the consequences of temporary inhibition of the medial amygdala by bilateral injections of lidocaine on long-term social recognition memory as tested in the social discrimination task. Lidocaine or control NaCl solution was infused immediately before learning or before retrieval. Our data show that lidocaine infusion immediately before learning did not affect long-term memory retrieval. However, intra-amygdalar lidocaine infusions immediately before choice interfered with correct memory retrieval. Analysis of the aggressive behaviour measured simultaneously during all sessions in the social recognition memory task support the impression that the lidocaine dosage used here was effective as it – at least partially – reduced the aggressive behaviour shown by the experimental subjects towards the juveniles. Surprisingly, also infusions of NaCl solution blocked recognition memory at both injection time points. The results are interpreted in the context of the importance of the medial amygdala for the processing of non-volatile odours as a major contributor to the olfactory signature for social recognition memory.

  19. Non-Cooperative Target Recognition by Means of Singular Value Decomposition Applied to Radar High Resolution Range Profiles

    Directory of Open Access Journals (Sweden)

    Patricia López-Rodríguez

    2014-12-01

    Full Text Available Radar high resolution range profiles are widely used among the target recognition community for the detection and identification of flying targets. In this paper, singular value decomposition is applied to extract the relevant information and to model each aircraft as a subspace. The identification algorithm is based on angle between subspaces and takes place in a transformed domain. In order to have a wide database of radar signatures and evaluate the performance, simulated range profiles are used as the recognition database while the test samples comprise data of actual range profiles collected in a measurement campaign. Thanks to the modeling of aircraft as subspaces only the valuable information of each target is used in the recognition process. Thus, one of the main advantages of using singular value decomposition, is that it helps to overcome the notable dissimilarities found in the shape and signal-to-noise ratio between actual and simulated profiles due to their difference in nature. Despite these differences, the recognition rates obtained with the algorithm are quite promising.

  20. ClusType: Effective Entity Recognition and Typing by Relation Phrase-Based Clustering

    Science.gov (United States)

    Ren, Xiang; El-Kishky, Ahmed; Wang, Chi; Tao, Fangbo; Voss, Clare R.; Ji, Heng; Han, Jiawei

    2015-01-01

    Entity recognition is an important but challenging research problem. In reality, many text collections are from specific, dynamic, or emerging domains, which poses significant new challenges for entity recognition with increase in name ambiguity and context sparsity, requiring entity detection without domain restriction. In this paper, we investigate entity recognition (ER) with distant-supervision and propose a novel relation phrase-based ER framework, called ClusType, that runs data-driven phrase mining to generate entity mention candidates and relation phrases, and enforces the principle that relation phrases should be softly clustered when propagating type information between their argument entities. Then we predict the type of each entity mention based on the type signatures of its co-occurring relation phrases and the type indicators of its surface name, as computed over the corpus. Specifically, we formulate a joint optimization problem for two tasks, type propagation with relation phrases and multi-view relation phrase clustering. Our experiments on multiple genres—news, Yelp reviews and tweets—demonstrate the effectiveness and robustness of ClusType, with an average of 37% improvement in F1 score over the best compared method. PMID:26705503

  1. Global Situational Awareness with Free Tools

    Science.gov (United States)

    2015-01-15

    also be use in a closed environment • It’s cool, and people like cool 14© 2015 Carnegie Mellon University Google Earth Demo attempted-recon Signature...multiple data sources • Snort (Snorby on Security Onion) • Nagios • SharePoint RSS • Flow • Others • Leverage standard data formats • Keyhole Markup Language

  2. The effects of extrinsic motivation on signature authorship opinions in forensic signature blind trials.

    Science.gov (United States)

    Dewhurst, Tahnee N; Found, Bryan; Ballantyne, Kaye N; Rogers, Doug

    2014-03-01

    Expertise studies in forensic handwriting examination involve comparisons of Forensic Handwriting Examiners' (FHEs) opinions with lay-persons on blind tests. All published studies of this type have reported real and demonstrable skill differences between the specialist and lay groups. However, critics have proposed that any difference shown may be indicative of a lack of motivation on the part of lay participants, rather than a real difference in skill. It has been suggested that qualified FHEs would be inherently more motivated to succeed in blinded validation trials, as their professional reputations could be at risk, should they perform poorly on the task provided. Furthermore, critics suggest that lay-persons would be unlikely to be highly motivated to succeed, as they would have no fear of negative consequences should they perform badly. In an effort to investigate this concern, a blind signature trial was designed and administered to forty lay-persons. Participants were required to compare known (exemplar) signatures of an individual to questioned signatures and asked to express an opinion regarding whether the writer of the known signatures wrote each of the questioned signatures. The questioned signatures comprised a mixture of genuine, disguised and simulated signatures. The forty participants were divided into two separate groupings. Group 'A' were requested to complete the trial as directed and were advised that for each correct answer they would be financially rewarded, for each incorrect answer they would be financially penalized, and for each inconclusive opinion they would receive neither penalty nor reward. Group 'B' was requested to complete the trial as directed, with no mention of financial recompense or penalty. The results of this study do not support the proposition that motivation rather than skill difference is the source of the statistical difference in opinions between individuals' results in blinded signature proficiency trials. Crown

  3. Multiwaveband simulation-based signature analysis of camouflaged human dismounts in cluttered environments with TAIThermIR and MuSES

    Science.gov (United States)

    Packard, Corey D.; Klein, Mark D.; Viola, Timothy S.; Hepokoski, Mark A.

    2016-10-01

    The ability to predict electro-optical (EO) signatures of diverse targets against cluttered backgrounds is paramount for signature evaluation and/or management. Knowledge of target and background signatures is essential for a variety of defense-related applications. While there is no substitute for measured target and background signatures to determine contrast and detection probability, the capability to simulate any mission scenario with desired environmental conditions is a tremendous asset for defense agencies. In this paper, a systematic process for the thermal and visible-through-infrared simulation of camouflaged human dismounts in cluttered outdoor environments is presented. This process, utilizing the thermal and EO/IR radiance simulation tool TAIThermIR (and MuSES), provides a repeatable and accurate approach for analyzing contrast, signature and detectability of humans in multiple wavebands. The engineering workflow required to combine natural weather boundary conditions and the human thermoregulatory module developed by ThermoAnalytics is summarized. The procedure includes human geometry creation, human segmental physiology description and transient physical temperature prediction using environmental boundary conditions and active thermoregulation. Radiance renderings, which use Sandford-Robertson BRDF optical surface property descriptions and are coupled with MODTRAN for the calculation of atmospheric effects, are demonstrated. Sensor effects such as optical blurring and photon noise can be optionally included, increasing the accuracy of detection probability outputs that accompany each rendering. This virtual evaluation procedure has been extensively validated and provides a flexible evaluation process that minimizes the difficulties inherent in human-subject field testing. Defense applications such as detection probability assessment, camouflage pattern evaluation, conspicuity tests and automatic target recognition are discussed.

  4. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  5. Exotic signatures from supersymmetry

    International Nuclear Information System (INIS)

    Hall, L.J.

    1989-08-01

    Minor changes to the standard supersymmetric model, such as soft flavor violation and R parity violation, cause large changes in the signatures. The origin of these changes and the resulting signatures are discussed. 15 refs., 7 figs., 2 tabs

  6. Research on a New Signature Scheme on Blockchain

    Directory of Open Access Journals (Sweden)

    Chao Yuan

    2017-01-01

    Full Text Available With the rise of Bitcoin, blockchain which is the core technology of Bitcoin has received increasing attention. Privacy preserving and performance on blockchain are two research points in academia and business, but there are still some unresolved issues in both respects. An aggregate signature scheme is a digital signature that supports making signatures on many different messages generated by many different users. Using aggregate signature, the size of the signature could be shortened by compressing multiple signatures into a single signature. In this paper, a new signature scheme for transactions on blockchain based on the aggregate signature was proposed. It was worth noting that elliptic curve discrete logarithm problem and bilinear maps played major roles in our signature scheme. And the security properties of our signature scheme were proved. In our signature scheme, the amount will be hidden especially in the transactions which contain multiple inputs and outputs. Additionally, the size of the signature on transaction is constant regardless of the number of inputs and outputs that the transaction contains, which can improve the performance of signature. Finally, we gave an application scenario for our signature scheme which aims to achieve the transactions of big data on blockchain.

  7. Quantum multi-signature protocol based on teleportation

    International Nuclear Information System (INIS)

    Wen Xiao-jun; Liu Yun; Sun Yu

    2007-01-01

    In this paper, a protocol which can be used in multi-user quantum signature is proposed. The scheme of signature and verification is based on the correlation of Greenberger-Horne-Zeilinger (GHZ) states and the controlled quantum teleportation. Different from the digital signatures, which are based on computational complexity, the proposed protocol has perfect security in the noiseless quantum channels. Compared to previous quantum signature schemes, this protocol can verify the signature independent of an arbitrator as well as realize multi-user signature together. (orig.)

  8. Extraction of human gait signatures: an inverse kinematic approach using Groebner basis theory applied to gait cycle analysis

    Science.gov (United States)

    Barki, Anum; Kendricks, Kimberly; Tuttle, Ronald F.; Bunker, David J.; Borel, Christoph C.

    2013-05-01

    This research highlights the results obtained from applying the method of inverse kinematics, using Groebner basis theory, to the human gait cycle to extract and identify lower extremity gait signatures. The increased threat from suicide bombers and the force protection issues of today have motivated a team at Air Force Institute of Technology (AFIT) to research pattern recognition in the human gait cycle. The purpose of this research is to identify gait signatures of human subjects and distinguish between subjects carrying a load to those subjects without a load. These signatures were investigated via a model of the lower extremities based on motion capture observations, in particular, foot placement and the joint angles for subjects affected by carrying extra load on the body. The human gait cycle was captured and analyzed using a developed toolkit consisting of an inverse kinematic motion model of the lower extremity and a graphical user interface. Hip, knee, and ankle angles were analyzed to identify gait angle variance and range of motion. Female subjects exhibited the most knee angle variance and produced a proportional correlation between knee flexion and load carriage.

  9. A Study on the use of Facebook, RSS, Blogs and Twitter (Web2.0) among selected academic libraries from 6 Gulf countries namely: Kingdom of Saudi Arabia, United Arab Emirates, Qatar, Bahrain, Oman and Kuwait

    KAUST Repository

    Ramli, Rindra M.

    2014-01-01

    This paper aims to explore and study the current usage trends of Web2.0 namely Facebook, RSS, Blogs and Twitter among selected higher education institutions’ libraries in 6 gulf countries namely: Kingdom of Saudi Arabia, United Arab Emirates, Qatar

  10. A Directed Signature Scheme and its Applications

    OpenAIRE

    Lal, Sunder; Kumar, Manoj

    2004-01-01

    This paper presents a directed signature scheme with the property that the signature can be verified only with the help of signer or signature receiver. We also propose its applications to share verification of signatures and to threshold cryptosystems.

  11. On reliable discovery of molecular signatures

    Directory of Open Access Journals (Sweden)

    Björkegren Johan

    2009-01-01

    Full Text Available Abstract Background Molecular signatures are sets of genes, proteins, genetic variants or other variables that can be used as markers for a particular phenotype. Reliable signature discovery methods could yield valuable insight into cell biology and mechanisms of human disease. However, it is currently not clear how to control error rates such as the false discovery rate (FDR in signature discovery. Moreover, signatures for cancer gene expression have been shown to be unstable, that is, difficult to replicate in independent studies, casting doubts on their reliability. Results We demonstrate that with modern prediction methods, signatures that yield accurate predictions may still have a high FDR. Further, we show that even signatures with low FDR may fail to replicate in independent studies due to limited statistical power. Thus, neither stability nor predictive accuracy are relevant when FDR control is the primary goal. We therefore develop a general statistical hypothesis testing framework that for the first time provides FDR control for signature discovery. Our method is demonstrated to be correct in simulation studies. When applied to five cancer data sets, the method was able to discover molecular signatures with 5% FDR in three cases, while two data sets yielded no significant findings. Conclusion Our approach enables reliable discovery of molecular signatures from genome-wide data with current sample sizes. The statistical framework developed herein is potentially applicable to a wide range of prediction problems in bioinformatics.

  12. 8 CFR 1292.2 - Organizations qualified for recognition; requests for recognition; withdrawal of recognition...

    Science.gov (United States)

    2010-01-01

    ...; requests for recognition; withdrawal of recognition; accreditation of representatives; roster. 1292.2...; requests for recognition; withdrawal of recognition; accreditation of representatives; roster. (a) Qualifications of organizations. A non-profit religious, charitable, social service, or similar organization...

  13. Threshold models of recognition and the recognition heuristic

    Directory of Open Access Journals (Sweden)

    Edgar Erdfelder

    2011-02-01

    Full Text Available According to the recognition heuristic (RH theory, decisions follow the recognition principle: Given a high validity of the recognition cue, people should prefer recognized choice options compared to unrecognized ones. Assuming that the memory strength of choice options is strongly correlated with both the choice criterion and recognition judgments, the RH is a reasonable strategy that approximates optimal decisions with a minimum of cognitive effort (Davis-Stober, Dana, and Budescu, 2010. However, theories of recognition memory are not generally compatible with this assumption. For example, some threshold models of recognition presume that recognition judgments can arise from two types of cognitive states: (1 certainty states in which judgments are almost perfectly correlated with memory strength and (2 uncertainty states in which recognition judgments reflect guessing rather than differences in memory strength. We report an experiment designed to test the prediction that the RH applies to certainty states only. Our results show that memory states rather than recognition judgments affect use of recognition information in binary decisions.

  14. Real time gamma-ray signature identifier

    Science.gov (United States)

    Rowland, Mark [Alamo, CA; Gosnell, Tom B [Moraga, CA; Ham, Cheryl [Livermore, CA; Perkins, Dwight [Livermore, CA; Wong, James [Dublin, CA

    2012-05-15

    A real time gamma-ray signature/source identification method and system using principal components analysis (PCA) for transforming and substantially reducing one or more comprehensive spectral libraries of nuclear materials types and configurations into a corresponding concise representation/signature(s) representing and indexing each individual predetermined spectrum in principal component (PC) space, wherein an unknown gamma-ray signature may be compared against the representative signature to find a match or at least characterize the unknown signature from among all the entries in the library with a single regression or simple projection into the PC space, so as to substantially reduce processing time and computing resources and enable real-time characterization and/or identification.

  15. Adaptative numerical methods for transport problems in safety nuclear reactors by the use of perturbations signatures and processes

    International Nuclear Information System (INIS)

    Doriath, J.Y.

    1983-05-01

    The need for increasingly accurate nuclear reactor performance data has led to increasingly sophisticated methods for solving the Boltzmann transport equation. This work has revealed the need for analyzing the functional signatures of the neutron flux using pattern recognition techniques to relate the local and overall phases of reactor calculations according to the desired parameters. This approach makes it possible to develop procedures based on a reference calculations and designed to evaluate the disturbances due to changes in physical media and to media interface modifications [fr

  16. 42 CFR 424.36 - Signature requirements.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Signature requirements. 424.36 Section 424.36... (CONTINUED) MEDICARE PROGRAM CONDITIONS FOR MEDICARE PAYMENT Claims for Payment § 424.36 Signature requirements. (a) General rule. The beneficiary's own signature is required on the claim unless the beneficiary...

  17. Unsupervised signature extraction from forensic logs

    NARCIS (Netherlands)

    Thaler, S.M.; Menkovski, V.; Petkovic, M.; Altun, Y.; Das, K.; Mielikäinen, T.; Malerba, D.; Stefanowski, J.; Read, J.; Žitnik, M.; Ceci, M.

    2017-01-01

    Signature extraction is a key part of forensic log analysis. It involves recognizing patterns in log lines such that log lines that originated from the same line of code are grouped together. A log signature consists of immutable parts and mutable parts. The immutable parts define the signature, and

  18. Photon signature analysis using template matching

    Energy Technology Data Exchange (ETDEWEB)

    Bradley, D.A., E-mail: d.a.bradley@surrey.ac.uk [Department of Physics, University of Surrey, Guildford GU2 7XH (United Kingdom); Hashim, S., E-mail: suhairul@utm.my [Department of Physics, Universiti Teknologi Malaysia, 81310 Skudai, Johor (Malaysia); Saripan, M.I. [Faculty of Engineering, Universiti Putra Malaysia, 43400 Serdang, Selangor (Malaysia); Wells, K. [Centre for Vision, Speech and Signal Processing, University of Surrey, Guildford GU2 7XH (United Kingdom); Dunn, W.L. [Department of Mechanical and Nuclear Engineering, Kansas State University, 3002 Rathbone Hall, Manhattan, KS 66506 (United States)

    2011-10-01

    We describe an approach to detect improvised explosive devices (IEDs) by using a template matching procedure. This approach relies on the signature due to backstreaming {gamma} photons from various targets. In this work we have simulated cylindrical targets of aluminum, iron, copper, water and ammonium nitrate (nitrogen-rich fertilizer). We simulate 3.5 MeV source photons distributed on a plane inside a shielded area using Monte Carlo N-Particle (MCNP{sup TM}) code version 5 (V5). The 3.5 MeV source gamma rays yield 511 keV peaks due to pair production and scattered gamma rays. In this work, we simulate capture of those photons that backstream, after impinging on the target element, toward a NaI detector. The captured backstreamed photons are expected to produce a unique spectrum that will become part of a simple signal processing recognition system based on the template matching method. Different elements were simulated using different sets of random numbers in the Monte Carlo simulation. To date, the sum of absolute differences (SAD) method has been used to match the template. In the examples investigated, template matching was found to detect all elements correctly.

  19. Retail applications of signature verification

    Science.gov (United States)

    Zimmerman, Thomas G.; Russell, Gregory F.; Heilper, Andre; Smith, Barton A.; Hu, Jianying; Markman, Dmitry; Graham, Jon E.; Drews, Clemens

    2004-08-01

    The dramatic rise in identity theft, the ever pressing need to provide convenience in checkout services to attract and retain loyal customers, and the growing use of multi-function signature captures devices in the retail sector provides favorable conditions for the deployment of dynamic signature verification (DSV) in retail settings. We report on the development of a DSV system to meet the needs of the retail sector. We currently have a database of approximately 10,000 signatures collected from 600 subjects and forgers. Previous work at IBM on DSV has been merged and extended to achieve robust performance on pen position data available from commercial point of sale hardware, achieving equal error rates on skilled forgeries and authentic signatures of 1.5% to 4%.

  20. Quantum signature scheme for known quantum messages

    International Nuclear Information System (INIS)

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  1. 7 CFR 718.9 - Signature requirements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Signature requirements. 718.9 Section 718.9... MULTIPLE PROGRAMS General Provisions § 718.9 Signature requirements. (a) When a program authorized by this chapter or Chapter XIV of this title requires the signature of a producer; landowner; landlord; or tenant...

  2. 27 CFR 17.6 - Signature authority.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Signature authority. 17.6... PRODUCTS General Provisions § 17.6 Signature authority. No claim, bond, tax return, or other required... other proper notification of signature authority has been filed with the TTB office where the required...

  3. Online Signature Verification on MOBISIG Finger-Drawn Signature Corpus

    Directory of Open Access Journals (Sweden)

    Margit Antal

    2018-01-01

    Full Text Available We present MOBISIG, a pseudosignature dataset containing finger-drawn signatures from 83 users captured with a capacitive touchscreen-based mobile device. The database was captured in three sessions resulting in 45 genuine signatures and 20 skilled forgeries for each user. The database was evaluated by two state-of-the-art methods: a function-based system using local features and a feature-based system using global features. Two types of equal error rate computations are performed: one using a global threshold and the other using user-specific thresholds. The lowest equal error rate was 0.01% against random forgeries and 5.81% against skilled forgeries using user-specific thresholds that were computed a posteriori. However, these equal error rates were significantly raised to 1.68% (random forgeries case and 14.31% (skilled forgeries case using global thresholds. The same evaluation protocol was performed on the DooDB publicly available dataset. Besides verification performance evaluations conducted on the two finger-drawn datasets, we evaluated the quality of the samples and the users of the two datasets using basic quality measures. The results show that finger-drawn signatures can be used by biometric systems with reasonable accuracy.

  4. 48 CFR 804.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... signature. 804.101 Section 804.101 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS GENERAL ADMINISTRATIVE MATTERS Contract Execution 804.101 Contracting officer's signature. (a) If a... signature. ...

  5. Perancangan Aplikasi Undeniable Digital Signature Dengan Algoritma Chaum’s Blind Signature

    OpenAIRE

    Simanjuntak, Martin Dennain

    2012-01-01

    Desperaty need a securiry system in the exchange of information via computer media, so that information can not be accessed by unauthorized parties. One of the security system is to use a system of digital signatures as a means of authenticating the authenticity of digital document that are exchanged. By using a digital a digital signature system is undeniable, the security system can be generated digital document exchange, where the system is free from the from of rejection...

  6. Practical quantum digital signature

    Science.gov (United States)

    Yin, Hua-Lei; Fu, Yao; Chen, Zeng-Bing

    2016-03-01

    Guaranteeing nonrepudiation, unforgeability as well as transferability of a signature is one of the most vital safeguards in today's e-commerce era. Based on fundamental laws of quantum physics, quantum digital signature (QDS) aims to provide information-theoretic security for this cryptographic task. However, up to date, the previously proposed QDS protocols are impractical due to various challenging problems and most importantly, the requirement of authenticated (secure) quantum channels between participants. Here, we present the first quantum digital signature protocol that removes the assumption of authenticated quantum channels while remaining secure against the collective attacks. Besides, our QDS protocol can be practically implemented over more than 100 km under current mature technology as used in quantum key distribution.

  7. 25 CFR 213.10 - Lessor's signature.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Lessor's signature. 213.10 Section 213.10 Indians BUREAU... MEMBERS OF FIVE CIVILIZED TRIBES, OKLAHOMA, FOR MINING How to Acquire Leases § 213.10 Lessor's signature... thumbprint which shall be designated as “right” or “left” thumbmark. Such signatures must be witnessed by two...

  8. Pattern recognition

    CERN Document Server

    Theodoridis, Sergios

    2003-01-01

    Pattern recognition is a scientific discipline that is becoming increasingly important in the age of automation and information handling and retrieval. Patter Recognition, 2e covers the entire spectrum of pattern recognition applications, from image analysis to speech recognition and communications. This book presents cutting-edge material on neural networks, - a set of linked microprocessors that can form associations and uses pattern recognition to ""learn"" -and enhances student motivation by approaching pattern recognition from the designer's point of view. A direct result of more than 10

  9. Initial Semantics for Strengthened Signatures

    Directory of Open Access Journals (Sweden)

    André Hirschowitz

    2012-02-01

    Full Text Available We give a new general definition of arity, yielding the companion notions of signature and associated syntax. This setting is modular in the sense requested by Ghani and Uustalu: merging two extensions of syntax corresponds to building an amalgamated sum. These signatures are too general in the sense that we are not able to prove the existence of an associated syntax in this general context. So we have to select arities and signatures for which there exists the desired initial monad. For this, we follow a track opened by Matthes and Uustalu: we introduce a notion of strengthened arity and prove that the corresponding signatures have initial semantics (i.e. associated syntax. Our strengthened arities admit colimits, which allows the treatment of the λ-calculus with explicit substitution.

  10. Spectral signature selection for mapping unvegetated soils

    Science.gov (United States)

    May, G. A.; Petersen, G. W.

    1975-01-01

    Airborne multispectral scanner data covering the wavelength interval from 0.40-2.60 microns were collected at an altitude of 1000 m above the terrain in southeastern Pennsylvania. Uniform training areas were selected within three sites from this flightline. Soil samples were collected from each site and a procedure developed to allow assignment of scan line and element number from the multispectral scanner data to each sampling location. These soil samples were analyzed on a spectrophotometer and laboratory spectral signatures were derived. After correcting for solar radiation and atmospheric attenuation, the laboratory signatures were compared to the spectral signatures derived from these same soils using multispectral scanner data. Both signatures were used in supervised and unsupervised classification routines. Computer-generated maps using the laboratory and multispectral scanner derived signatures resulted in maps that were similar to maps resulting from field surveys. Approximately 90% agreement was obtained between classification maps produced using multispectral scanner derived signatures and laboratory derived signatures.

  11. Time Series Based for Online Signature Verification

    Directory of Open Access Journals (Sweden)

    I Ketut Gede Darma Putra

    2013-11-01

    Full Text Available Signature verification system is to match the tested signature with a claimed signature. This paper proposes time series based for feature extraction method and dynamic time warping for match method. The system made by process of testing 900 signatures belong to 50 participants, 3 signatures for reference and 5 signatures from original user, simple imposters and trained imposters for signatures test. The final result system was tested with 50 participants with 3 references. This test obtained that system accuracy without imposters is 90,44897959% at threshold 44 with rejection errors (FNMR is 5,2% and acceptance errors (FMR is 4,35102%, when with imposters system accuracy is 80,1361% at threshold 27 with error rejection (FNMR is 15,6% and acceptance errors (average FMR is 4,263946%, with details as follows: acceptance errors is 0,391837%, acceptance errors simple imposters is 3,2% and acceptance errors trained imposters is 9,2%.

  12. Genome signature analysis of thermal virus metagenomes reveals Archaea and thermophilic signatures.

    Science.gov (United States)

    Pride, David T; Schoenfeld, Thomas

    2008-09-17

    Metagenomic analysis provides a rich source of biological information for otherwise intractable viral communities. However, study of viral metagenomes has been hampered by its nearly complete reliance on BLAST algorithms for identification of DNA sequences. We sought to develop algorithms for examination of viral metagenomes to identify the origin of sequences independent of BLAST algorithms. We chose viral metagenomes obtained from two hot springs, Bear Paw and Octopus, in Yellowstone National Park, as they represent simple microbial populations where comparatively large contigs were obtained. Thermal spring metagenomes have high proportions of sequences without significant Genbank homology, which has hampered identification of viruses and their linkage with hosts. To analyze each metagenome, we developed a method to classify DNA fragments using genome signature-based phylogenetic classification (GSPC), where metagenomic fragments are compared to a database of oligonucleotide signatures for all previously sequenced Bacteria, Archaea, and viruses. From both Bear Paw and Octopus hot springs, each assembled contig had more similarity to other metagenome contigs than to any sequenced microbial genome based on GSPC analysis, suggesting a genome signature common to each of these extreme environments. While viral metagenomes from Bear Paw and Octopus share some similarity, the genome signatures from each locale are largely unique. GSPC using a microbial database predicts most of the Octopus metagenome has archaeal signatures, while bacterial signatures predominate in Bear Paw; a finding consistent with those of Genbank BLAST. When using a viral database, the majority of the Octopus metagenome is predicted to belong to archaeal virus Families Globuloviridae and Fuselloviridae, while none of the Bear Paw metagenome is predicted to belong to archaeal viruses. As expected, when microbial and viral databases are combined, each of the Octopus and Bear Paw metagenomic contigs

  13. Signatures de l'invisible

    CERN Multimedia

    CERN Press Office. Geneva

    2000-01-01

    "Signatures of the Invisible" is an unique collaboration between contemporary artists and contemporary physicists which has the potential to help redefine the relationship between science and art. "Signatures of the Invisible" is jointly organised by the London Institute - the world's largest college of art and design and CERN*, the world's leading particle physics laboratory. 12 leading visual artists:

  14. A group signature scheme based on quantum teleportation

    International Nuclear Information System (INIS)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu

    2010-01-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  15. A group signature scheme based on quantum teleportation

    Energy Technology Data Exchange (ETDEWEB)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu, E-mail: wxjun36@gmail.co [Information Countermeasure Technique Research Institute, Harbin Institute of Technology, Harbin 150001 (China)

    2010-05-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  16. Maximizing biomarker discovery by minimizing gene signatures

    Directory of Open Access Journals (Sweden)

    Chang Chang

    2011-12-01

    Full Text Available Abstract Background The use of gene signatures can potentially be of considerable value in the field of clinical diagnosis. However, gene signatures defined with different methods can be quite various even when applied the same disease and the same endpoint. Previous studies have shown that the correct selection of subsets of genes from microarray data is key for the accurate classification of disease phenotypes, and a number of methods have been proposed for the purpose. However, these methods refine the subsets by only considering each single feature, and they do not confirm the association between the genes identified in each gene signature and the phenotype of the disease. We proposed an innovative new method termed Minimize Feature's Size (MFS based on multiple level similarity analyses and association between the genes and disease for breast cancer endpoints by comparing classifier models generated from the second phase of MicroArray Quality Control (MAQC-II, trying to develop effective meta-analysis strategies to transform the MAQC-II signatures into a robust and reliable set of biomarker for clinical applications. Results We analyzed the similarity of the multiple gene signatures in an endpoint and between the two endpoints of breast cancer at probe and gene levels, the results indicate that disease-related genes can be preferably selected as the components of gene signature, and that the gene signatures for the two endpoints could be interchangeable. The minimized signatures were built at probe level by using MFS for each endpoint. By applying the approach, we generated a much smaller set of gene signature with the similar predictive power compared with those gene signatures from MAQC-II. Conclusions Our results indicate that gene signatures of both large and small sizes could perform equally well in clinical applications. Besides, consistency and biological significances can be detected among different gene signatures, reflecting the

  17. Lattice-Based Revocable Certificateless Signature

    Directory of Open Access Journals (Sweden)

    Ying-Hao Hung

    2017-10-01

    Full Text Available Certificateless signatures (CLS are noticeable because they may resolve the key escrow problem in ID-based signatures and break away the management problem regarding certificate in conventional signatures. However, the security of the mostly previous CLS schemes relies on the difficulty of solving discrete logarithm or large integer factorization problems. These two problems would be solved by quantum computers in the future so that the signature schemes based on them will also become insecure. For post-quantum cryptography, lattice-based cryptography is significant due to its efficiency and security. However, no study on addressing the revocation problem in the existing lattice-based CLS schemes is presented. In this paper, we focus on the revocation issue and present the first revocable CLS (RCLS scheme over lattices. Based on the short integer solution (SIS assumption over lattices, the proposed lattice-based RCLS scheme is shown to be existential unforgeability against adaptive chosen message attacks. By performance analysis and comparisons, the proposed lattice-based RCLS scheme is better than the previously proposed lattice-based CLS scheme, in terms of private key size, signature length and the revocation mechanism.

  18. General Conversion for Obtaining Strongly Existentially Unforgeable Signatures

    Science.gov (United States)

    Teranishi, Isamu; Oyama, Takuro; Ogata, Wakaha

    We say that a signature scheme is strongly existentially unforgeable (SEU) if no adversary, given message/signature pairs adaptively, can generate a signature on a new message or a new signature on a previously signed message. We propose a general and efficient conversion in the standard model that transforms a secure signature scheme to SEU signature scheme. In order to construct that conversion, we use a chameleon commitment scheme. Here a chameleon commitment scheme is a variant of commitment scheme such that one can change the committed value after publishing the commitment if one knows the secret key. We define the chosen message security notion for the chameleon commitment scheme, and show that the signature scheme transformed by our proposed conversion satisfies the SEU property if the chameleon commitment scheme is chosen message secure. By modifying the proposed conversion, we also give a general and efficient conversion in the random oracle model, that transforms a secure signature scheme into a SEU signature scheme. This second conversion also uses a chameleon commitment scheme but only requires the key only attack security for it.

  19. Reactor coolant pump testing using motor current signatures analysis

    Energy Technology Data Exchange (ETDEWEB)

    Burstein, N.; Bellamy, J.

    1996-12-01

    This paper describes reactor coolant pump motor testing carried out at Florida Power Corporation`s Crystal River plant using Framatome Technologies` new EMPATH (Electric Motor Performance Analysis and Trending Hardware) system. EMPATH{trademark} uses an improved form of Motor Current Signature Analysis (MCSA), technology, originally developed at Oak Ridge National Laboratories, for detecting deterioration in the rotors of AC induction motors. Motor Current Signature Analysis (MCSA) is a monitoring tool for motor driven equipment that provides a non-intrusive means for detecting the presence of mechanical and electrical abnormalities in the motor and the driven equipment. The base technology was developed at the Oak Ridge National Laboratory as a means for determining the affects of aging and service wear specifically on motor-operated valves used in nuclear power plant safety systems, but it is applicable to a broad range of electric machinery. MCSA is based on the recognition that an electric motor (ac or dc) driving a mechanical load acts as an efficient and permanently available transducer by sensing mechanical load variations, large and small, long-term and rapid, and converting them into variations in the induced current generated in the motor windings. The motor current variations, resulting from changes in load caused by gears, pulleys, friction, bearings, and other conditions that may change over the life of the motor, are carried by the electrical cables powering the motor and are extracted at any convenient location along the motor lead. These variations modulate the 60 Hz carrier frequency and appear as sidebands in the spectral plot.

  20. 8 CFR 292.2 - Organizations qualified for recognition; requests for recognition; withdrawal of recognition...

    Science.gov (United States)

    2010-01-01

    ...; requests for recognition; withdrawal of recognition; accreditation of representatives; roster. 292.2...; withdrawal of recognition; accreditation of representatives; roster. (a) Qualifications of organizations. A non-profit religious, charitable, social service, or similar organization established in the United...

  1. Radar micro-doppler signatures processing and applications

    CERN Document Server

    Chen, Victor C; Miceli, William J

    2014-01-01

    Radar Micro-Doppler Signatures: Processing and applications concentrates on the processing and application of radar micro-Doppler signatures in real world situations, providing readers with a good working knowledge on a variety of applications of radar micro-Doppler signatures.

  2. Physics Signatures at CLIC

    CERN Document Server

    Battaglia, Marco

    2001-01-01

    A set of signatures for physics processes of potential interests for the CLIC programme at = 1 - 5 TeV are discussed. These signatures, that may correspond to the manifestation of different scenarios of new physics as well as to Standard Model precision tests, are proposed as benchmarks for the optimisation of the CLIC accelerator parameters and for a first definition of the required detector response.

  3. Genome signature analysis of thermal virus metagenomes reveals Archaea and thermophilic signatures

    Directory of Open Access Journals (Sweden)

    Pride David T

    2008-09-01

    Full Text Available Abstract Background Metagenomic analysis provides a rich source of biological information for otherwise intractable viral communities. However, study of viral metagenomes has been hampered by its nearly complete reliance on BLAST algorithms for identification of DNA sequences. We sought to develop algorithms for examination of viral metagenomes to identify the origin of sequences independent of BLAST algorithms. We chose viral metagenomes obtained from two hot springs, Bear Paw and Octopus, in Yellowstone National Park, as they represent simple microbial populations where comparatively large contigs were obtained. Thermal spring metagenomes have high proportions of sequences without significant Genbank homology, which has hampered identification of viruses and their linkage with hosts. To analyze each metagenome, we developed a method to classify DNA fragments using genome signature-based phylogenetic classification (GSPC, where metagenomic fragments are compared to a database of oligonucleotide signatures for all previously sequenced Bacteria, Archaea, and viruses. Results From both Bear Paw and Octopus hot springs, each assembled contig had more similarity to other metagenome contigs than to any sequenced microbial genome based on GSPC analysis, suggesting a genome signature common to each of these extreme environments. While viral metagenomes from Bear Paw and Octopus share some similarity, the genome signatures from each locale are largely unique. GSPC using a microbial database predicts most of the Octopus metagenome has archaeal signatures, while bacterial signatures predominate in Bear Paw; a finding consistent with those of Genbank BLAST. When using a viral database, the majority of the Octopus metagenome is predicted to belong to archaeal virus Families Globuloviridae and Fuselloviridae, while none of the Bear Paw metagenome is predicted to belong to archaeal viruses. As expected, when microbial and viral databases are combined, each of

  4. 48 CFR 204.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Contracting officer's signature. 204.101 Section 204.101 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS... officer's signature. Follow the procedures at PGI 204.101 for signature of contract documents. [71 FR 9268...

  5. An individual and a sex odor signature in kittiwakes? Study of the semiochemical composition of preen secretion and preen down feathers

    Science.gov (United States)

    Leclaire, Sarah; Merkling, Thomas; Raynaud, Christine; Giacinti, Géraldine; Bessière, Jean-Marie; Hatch, Scott A.; Danchin, Étienne

    2011-07-01

    The importance of olfaction in birds' social behavior has long been denied. Avian chemical signaling has thus been relatively unexplored. The black-legged kittiwake provides a particularly appropriate model for investigating this topic. Kittiwakes preferentially mate with genetically dissimilar individuals, but the cues used to assess genetic characteristics remain unknown. As in other vertebrates, their body odors may carry individual and sexual signatures thus potentially reliably signaling individual genetic makeup. Here, we test whether body odors in preen gland secretion and preen down feathers in kittiwakes may provide a sex and an individual signature. Using gas chromatography and mass spectrometry, we found that male and female odors differ quantitatively, suggesting that scent may be one of the multiple cues used by birds to discriminate between sexes. We further detected an individual signature in the volatile and nonvolatile fractions of preen secretion and preen down feathers. These results suggest that kittiwake body odor may function as a signal associated with mate recognition. It further suggests that preen odor might broadcast the genetic makeup of individuals, and could be used in mate choice to assess the genetic compatibility of potential mates.

  6. Can specific transcriptional regulators assemble a universal cancer signature?

    Science.gov (United States)

    Roy, Janine; Isik, Zerrin; Pilarsky, Christian; Schroeder, Michael

    2013-10-01

    Recently, there is a lot of interest in using biomarker signatures derived from gene expression data to predict cancer progression. We assembled signatures of 25 published datasets covering 13 types of cancers. How do these signatures compare with each other? On one hand signatures answering the same biological question should overlap, whereas signatures predicting different cancer types should differ. On the other hand, there could also be a Universal Cancer Signature that is predictive independently of the cancer type. Initially, we generate signatures for all datasets using classical approaches such as t-test and fold change and then, we explore signatures resulting from a network-based method, that applies the random surfer model of Google's PageRank algorithm. We show that the signatures as published by the authors and the signatures generated with classical methods do not overlap - not even for the same cancer type - whereas the network-based signatures strongly overlap. Selecting 10 out of 37 universal cancer genes gives the optimal prediction for all cancers thus taking a first step towards a Universal Cancer Signature. We furthermore analyze and discuss the involved genes in terms of the Hallmarks of cancer and in particular single out SP1, JUN/FOS and NFKB1 and examine their specific role in cancer progression.

  7. 36 CFR 1150.22 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Signature of documents. 1150.22 Section 1150.22 Parks, Forests, and Public Property ARCHITECTURAL AND TRANSPORTATION BARRIERS... Documents for Proceedings on Citations § 1150.22 Signature of documents. The signature of a party...

  8. 17 CFR 201.65 - Identity and signature.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Identity and signature. 201.65... of 1934 § 201.65 Identity and signature. Applications pursuant to this subpart may omit the identity, mailing address, and signature of the applicant; provided, that such identity, mailing address and...

  9. 15 CFR 908.16 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Signature. 908.16 Section 908.16 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) NATIONAL OCEANIC... SUBMITTING REPORTS ON WEATHER MODIFICATION ACTIVITIES § 908.16 Signature. All reports filed with the National...

  10. 34 CFR 101.32 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Signature of documents. 101.32 Section 101.32 Education Regulations of the Offices of the Department of Education OFFICE FOR CIVIL RIGHTS, DEPARTMENT OF EDUCATION... Documents § 101.32 Signature of documents. The signature of a party, authorized officer, employee or...

  11. 29 CFR 102.116 - Signature of orders.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 2 2010-07-01 2010-07-01 false Signature of orders. 102.116 Section 102.116 Labor Regulations Relating to Labor NATIONAL LABOR RELATIONS BOARD RULES AND REGULATIONS, SERIES 8 Certification and Signature of Documents § 102.116 Signature of orders. The executive secretary or the associate executive...

  12. R2NA: Received Signal Strength (RSS Ratio-Based Node Authentication for Body Area Network

    Directory of Open Access Journals (Sweden)

    Yang Wu

    2013-12-01

    Full Text Available The body area network (BAN is an emerging branch of wireless sensor networks for personalized applications. The services in BAN usually have a high requirement on security, especially for the medical diagnosis. One of the fundamental directions to ensure security in BAN is how to provide node authentication. Traditional research using cryptography relies on prior secrets shared among nodes, which leads to high resource cost. In addition, most existing non-cryptographic solutions exploit out-of-band (OOB channels, but they need the help of additional hardware support or significant modifications to the system software. To avoid the above problems, this paper presents a proximity-based node authentication scheme, which only uses wireless modules equipped on sensors. With only one sensor and one control unit (CU in BAN, we could detect a unique physical layer characteristic, namely, the difference between the received signal strength (RSS measured on different devices in BAN. Through the above-mentioned particular difference, we can tell whether the sender is close enough to be legitimate. We validate our scheme through both theoretical analysis and experiments, which are conducted on the real Shimmer nodes. The results demonstrate that our proposed scheme has a good security performance.

  13. On signature change in p-adic space-times

    International Nuclear Information System (INIS)

    Dragovic, B.G.

    1991-01-01

    Change of signature by linear coordinate transformations in p-adic space-times is considered. In this paper it is shown that there exists arbitrary change of trivial signature in Q p n for all n ≥ 1 if p ≡ 1 (mod 4). In other cases it is possible to change only even number of the signs of the signature. The authors suggest new concept of signature with respect to distinct quadratic extensions, of Q p . If space-time dimension is restricted to four there is no signature change

  14. Signature Curves Statistics of DNA Supercoils

    OpenAIRE

    Shakiban, Cheri; Lloyd, Peter

    2004-01-01

    In this paper we describe the Euclidean signature curves for two dimensional closed curves in the plane and their generalization to closed space curves. The focus will be on discrete numerical methods for approximating such curves. Further we will apply these numerical methods to plot the signature curves related to three-dimensional simulated DNA supercoils. Our primary focus will be on statistical analysis of the data generated for the signature curves of the supercoils. We will try to esta...

  15. 45 CFR 81.32 - Signature of documents.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Signature of documents. 81.32 Section 81.32 Public... UNDER PART 80 OF THIS TITLE Form, Execution, Service and Filing of Documents § 81.32 Signature of documents. The signature of a party, authorized officer, employee or attorney constitutes a certificate that...

  16. Modeling the lexical morphology of Western handwritten signatures.

    Directory of Open Access Journals (Sweden)

    Moises Diaz-Cabrera

    Full Text Available A handwritten signature is the final response to a complex cognitive and neuromuscular process which is the result of the learning process. Because of the many factors involved in signing, it is possible to study the signature from many points of view: graphologists, forensic experts, neurologists and computer vision experts have all examined them. Researchers study written signatures for psychiatric, penal, health and automatic verification purposes. As a potentially useful, multi-purpose study, this paper is focused on the lexical morphology of handwritten signatures. This we understand to mean the identification, analysis, and description of the signature structures of a given signer. In this work we analyze different public datasets involving 1533 signers from different Western geographical areas. Some relevant characteristics of signature lexical morphology have been selected, examined in terms of their probability distribution functions and modeled through a General Extreme Value distribution. This study suggests some useful models for multi-disciplinary sciences which depend on handwriting signatures.

  17. Signature molecular descriptor : advanced applications.

    Energy Technology Data Exchange (ETDEWEB)

    Visco, Donald Patrick, Jr. (Tennessee Technological University, Cookeville, TN)

    2010-04-01

    In this work we report on the development of the Signature Molecular Descriptor (or Signature) for use in the solution of inverse design problems as well as in highthroughput screening applications. The ultimate goal of using Signature is to identify novel and non-intuitive chemical structures with optimal predicted properties for a given application. We demonstrate this in three studies: green solvent design, glucocorticoid receptor ligand design and the design of inhibitors for Factor XIa. In many areas of engineering, compounds are designed and/or modified in incremental ways which rely upon heuristics or institutional knowledge. Often multiple experiments are performed and the optimal compound is identified in this brute-force fashion. Perhaps a traditional chemical scaffold is identified and movement of a substituent group around a ring constitutes the whole of the design process. Also notably, a chemical being evaluated in one area might demonstrate properties very attractive in another area and serendipity was the mechanism for solution. In contrast to such approaches, computer-aided molecular design (CAMD) looks to encompass both experimental and heuristic-based knowledge into a strategy that will design a molecule on a computer to meet a given target. Depending on the algorithm employed, the molecule which is designed might be quite novel (re: no CAS registration number) and/or non-intuitive relative to what is known about the problem at hand. While CAMD is a fairly recent strategy (dating to the early 1980s), it contains a variety of bottlenecks and limitations which have prevented the technique from garnering more attention in the academic, governmental and industrial institutions. A main reason for this is how the molecules are described in the computer. This step can control how models are developed for the properties of interest on a given problem as well as how to go from an output of the algorithm to an actual chemical structure. This report

  18. Ship Signature Management System : Functionality

    NARCIS (Netherlands)

    Arciszewski, H.F.R.; Lier, L. van; Meijer, Y.G.S.; Noordkamp, H.W.; Wassenaar, A.S.

    2010-01-01

    A signature of a platform is the manner in which the platform manifests itself to a certain type of sensor and how observable it is when such a sensor is used to detect the platform. Because many military platforms use sensors in different media, it is the total of its different signatures that

  19. Cell short circuit, preshort signature

    Science.gov (United States)

    Lurie, C.

    1980-01-01

    Short-circuit events observed in ground test simulations of DSCS-3 battery in-orbit operations are analyzed. Voltage signatures appearing in the data preceding the short-circuit event are evaluated. The ground test simulation is briefly described along with performance during reconditioning discharges. Results suggest that a characteristic signature develops prior to a shorting event.

  20. Challenges and Specifications for Robust Face and Gait Recognition Systems for Surveillance Application

    Directory of Open Access Journals (Sweden)

    BUCIU Ioan

    2014-05-01

    Full Text Available Automated person recognition (APR based on biometric signals addresses the process of automatically recognize a person according to his physiological traits (face, voice, iris, fingerprint, ear shape, body odor, electroencephalogram – EEG, electrocardiogram, or hand geometry, or behavioural patterns (gait, signature, hand-grip, lip movement. The paper aims at briefly presenting the current challenges for two specific non-cooperative biometric approaches, namely face and gait biometrics as well as approaches that consider combination of the two in the attempt of a more robust system for accurate APR, in the context of surveillance application. Open problems from both sides are also pointed out.

  1. The electronic identification, signature and security of information systems

    Directory of Open Access Journals (Sweden)

    Horovèák Pavel

    2002-12-01

    Full Text Available The contribution deals with the actual methods and technologies of information and communication systems security. It introduces the overview of electronic identification elements such as static password, dynamic password and single sign-on. Into this category belong also biometric and dynamic characteristics of verified person. Widespread is authentication based on identification elements ownership, such as various cards and authentication calculators. In the next part is specified a definition and characterization of electronic signature, its basic functions and certificate categories. Practical utilization of electronic signature consists of electronic signature acquirement, signature of outgoing email message, receiving of electronic signature and verification of electronic signature. The use of electronic signature is continuously growing and in connection with legislation development it exercises in all resorts.

  2. COMPUTER-IMPLEMENTED METHOD OF PERFORMING A SEARCH USING SIGNATURES

    DEFF Research Database (Denmark)

    2017-01-01

    A computer-implemented method of processing a query vector and a data vector), comprising: generating a set of masks and a first set of multiple signatures and a second set of multiple signatures by applying the set of masks to the query vector and the data vector, respectively, and generating...... candidate pairs, of a first signature and a second signature, by identifying matches of a first signature and a second signature. The set of masks comprises a configuration of the elements that is a Hadamard code; a permutation of a Hadamard code; or a code that deviates from a Hadamard code...

  3. Signature effects in 2-qp rotational bands

    International Nuclear Information System (INIS)

    Jain, A.K.; Goel, A.

    1992-01-01

    The authors briefly review the progress in understanding the 2-qp rotational bands in odd-odd nuclei. Signature effects and the phenomenon of signature inversion are discussed. The Coriolis coupling appears to have all the ingredients to explain the inversion. Some recent work on signature dependence in 2-qp bands of even-even nuclei is also discussed; interesting features are pointed out

  4. Time-dependent delayed signatures from energetic photon interrogations

    International Nuclear Information System (INIS)

    Norman, Daren R.; Jones, James L.; Blackburn, Brandon W.; Haskell, Kevin J.; Johnson, James T.; Watson, Scott M.; Hunt, Alan W.; Spaulding, Randy; Harmon, Frank

    2007-01-01

    Pulsed photonuclear interrogation environments generated by 8-24 MeV electron linac are rich with time-dependent, material-specific, radiation signatures. Nitrogen-based explosives and nuclear materials can be detected by exploiting these signatures in different delayed-time regions. Numerical and experimental results presented in this paper show the unique time and energy dependence of these signatures. It is shown that appropriate delayed-time windows are essential to acquire material-specific signatures in pulsed photonuclear assessment environments. These developments demonstrate that pulsed, high-energy, photon-inspection environments can be exploited for time-dependent, material-specific signatures through the proper operation of specialized detectors and detection methods

  5. Modeling the origins of mammalian sociality: moderate evidence for matrilineal signatures in mouse lemur vocalizations.

    Science.gov (United States)

    Kessler, Sharon E; Radespiel, Ute; Hasiniaina, Alida I F; Leliveld, Lisette M C; Nash, Leanne T; Zimmermann, Elke

    2014-02-20

    moderately distinctive by matriline. Because sleeping groups consisted of close maternal kin, both genetics and social learning may have generated these acoustic signatures. As mouse lemurs are models for solitary foragers, we recommend further studies testing whether the lemurs use these calls to recognize kin. This would enable further modeling of how kin recognition in ancestral species could have shaped the evolution of complex sociality.

  6. Peripheral blood signatures of lead exposure.

    Directory of Open Access Journals (Sweden)

    Heather G LaBreche

    Full Text Available BACKGROUND: Current evidence indicates that even low-level lead (Pb exposure can have detrimental effects, especially in children. We tested the hypothesis that Pb exposure alters gene expression patterns in peripheral blood cells and that these changes reflect dose-specific alterations in the activity of particular pathways. METHODOLOGY/PRINCIPAL FINDING: Using Affymetrix Mouse Genome 430 2.0 arrays, we examined gene expression changes in the peripheral blood of female Balb/c mice following exposure to per os lead acetate trihydrate or plain drinking water for two weeks and after a two-week recovery period. Data sets were RMA-normalized and dose-specific signatures were generated using established methods of supervised classification and binary regression. Pathway activity was analyzed using the ScoreSignatures module from GenePattern. CONCLUSIONS/SIGNIFICANCE: The low-level Pb signature was 93% sensitive and 100% specific in classifying samples a leave-one-out crossvalidation. The high-level Pb signature demonstrated 100% sensitivity and specificity in the leave-one-out crossvalidation. These two signatures exhibited dose-specificity in their ability to predict Pb exposure and had little overlap in terms of constituent genes. The signatures also seemed to reflect current levels of Pb exposure rather than past exposure. Finally, the two doses showed differential activation of cellular pathways. Low-level Pb exposure increased activity of the interferon-gamma pathway, whereas high-level Pb exposure increased activity of the E2F1 pathway.

  7. Optical Pattern Recognition

    Science.gov (United States)

    Yu, Francis T. S.; Jutamulia, Suganda

    2008-10-01

    Contributors; Preface; 1. Pattern recognition with optics Francis T. S. Yu and Don A. Gregory; 2. Hybrid neural networks for nonlinear pattern recognition Taiwei Lu; 3. Wavelets, optics, and pattern recognition Yao Li and Yunglong Sheng; 4. Applications of the fractional Fourier transform to optical pattern recognition David Mendlovic, Zeev Zalesky and Haldum M. Oxaktas; 5. Optical implementation of mathematical morphology Tien-Hsin Chao; 6. Nonlinear optical correlators with improved discrimination capability for object location and recognition Leonid P. Yaroslavsky; 7. Distortion-invariant quadratic filters Gregory Gheen; 8. Composite filter synthesis as applied to pattern recognition Shizhou Yin and Guowen Lu; 9. Iterative procedures in electro-optical pattern recognition Joseph Shamir; 10. Optoelectronic hybrid system for three-dimensional object pattern recognition Guoguang Mu, Mingzhe Lu and Ying Sun; 11. Applications of photrefractive devices in optical pattern recognition Ziangyang Yang; 12. Optical pattern recognition with microlasers Eung-Gi Paek; 13. Optical properties and applications of bacteriorhodopsin Q. Wang Song and Yu-He Zhang; 14. Liquid-crystal spatial light modulators Aris Tanone and Suganda Jutamulia; 15. Representations of fully complex functions on real-time spatial light modulators Robert W. Cohn and Laurence G. Hassbrook; Index.

  8. Magnetic signature surveillance of nuclear fuel

    International Nuclear Information System (INIS)

    Bernatowicz, H.; Schoenig, F.C.

    1981-01-01

    Typical nuclear fuel material contains tramp ferromagnetic particles of random size and distribution. Also, selected amounts of paramagnetic or ferromagnetic material can be added at random or at known positions in the fuel material. The fuel material in its non-magnetic container is scanned along its length by magnetic susceptibility detecting apparatus whereby susceptibility changes along its length are obtained and provide a unique signal waveform of the container of fuel material as a signature thereof. The output signature is stored. At subsequent times in its life the container is again scanned and respective signatures obtained which are compared with the initially obtained signature, any differences indicating alteration or tampering with the fuel material. If the fuel material includes a paramagnetic additive by taking two measurements along the container the effects thereof can be cancelled out. (author)

  9. A new selective developmental deficit: Impaired object recognition with normal face recognition.

    Science.gov (United States)

    Germine, Laura; Cashdollar, Nathan; Düzel, Emrah; Duchaine, Bradley

    2011-05-01

    Studies of developmental deficits in face recognition, or developmental prosopagnosia, have shown that individuals who have not suffered brain damage can show face recognition impairments coupled with normal object recognition (Duchaine and Nakayama, 2005; Duchaine et al., 2006; Nunn et al., 2001). However, no developmental cases with the opposite dissociation - normal face recognition with impaired object recognition - have been reported. The existence of a case of non-face developmental visual agnosia would indicate that the development of normal face recognition mechanisms does not rely on the development of normal object recognition mechanisms. To see whether a developmental variant of non-face visual object agnosia exists, we conducted a series of web-based object and face recognition tests to screen for individuals showing object recognition memory impairments but not face recognition impairments. Through this screening process, we identified AW, an otherwise normal 19-year-old female, who was then tested in the lab on face and object recognition tests. AW's performance was impaired in within-class visual recognition memory across six different visual categories (guns, horses, scenes, tools, doors, and cars). In contrast, she scored normally on seven tests of face recognition, tests of memory for two other object categories (houses and glasses), and tests of recall memory for visual shapes. Testing confirmed that her impairment was not related to a general deficit in lower-level perception, object perception, basic-level recognition, or memory. AW's results provide the first neuropsychological evidence that recognition memory for non-face visual object categories can be selectively impaired in individuals without brain damage or other memory impairment. These results indicate that the development of recognition memory for faces does not depend on intact object recognition memory and provide further evidence for category-specific dissociations in visual

  10. An Arbitrated Quantum Signature Scheme without Entanglement*

    International Nuclear Information System (INIS)

    Li Hui-Ran; Luo Ming-Xing; Peng Dai-Yuan; Wang Xiao-Jun

    2017-01-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks . (paper)

  11. Signature-based store checking buffer

    Science.gov (United States)

    Sridharan, Vilas; Gurumurthi, Sudhanva

    2015-06-02

    A system and method for optimizing redundant output verification, are provided. A hardware-based store fingerprint buffer receives multiple instances of output from multiple instances of computation. The store fingerprint buffer generates a signature from the content included in the multiple instances of output. When a barrier is reached, the store fingerprint buffer uses the signature to verify the content is error-free.

  12. Neutral signature Walker-VSI metrics

    International Nuclear Information System (INIS)

    Coley, A; McNutt, D; Musoke, N; Brooks, D; Hervik, S

    2014-01-01

    We will construct explicit examples of four-dimensional neutral signature Walker (but not necessarily degenerate Kundt) spaces for which all of the polynomial scalar curvature invariants vanish. We then investigate the properties of some particular subclasses of Ricci flat spaces. We also briefly describe some four-dimensional neutral signature Einstein spaces for which all of the polynomial scalar curvature invariants are constant. (paper)

  13. An interpretation of signature inversion

    International Nuclear Information System (INIS)

    Onishi, Naoki; Tajima, Naoki

    1988-01-01

    An interpretation in terms of the cranking model is presented to explain why signature inversion occurs for positive γ of the axially asymmetric deformation parameter and emerges into specific orbitals. By introducing a continuous variable, the eigenvalue equation can be reduced to a one dimensional Schroedinger equation by means of which one can easily understand the cause of signature inversion. (author)

  14. Acoustic Signature Monitoring and Management of Naval Platforms

    NARCIS (Netherlands)

    Basten, T.G.H.; Jong, C.A.F. de; Graafland, F.; Hof, J. van 't

    2015-01-01

    Acoustic signatures make naval platforms susceptible to detection by threat sensors. The variable operational conditions and lifespan of a platform cause variations in the acoustic signature. To deal with these variations, a real time signature monitoring capability is being developed, with advisory

  15. Secure method for biometric-based recognition with integrated cryptographic functions.

    Science.gov (United States)

    Chiou, Shin-Yan

    2013-01-01

    Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied.

  16. Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions

    Directory of Open Access Journals (Sweden)

    Shin-Yan Chiou

    2013-01-01

    Full Text Available Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied.

  17. 48 CFR 4.102 - Contractor's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Contractor's signature. 4.102 Section 4.102 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Contract Execution 4.102 Contractor's signature. (a) Individuals. A contract with an...

  18. DIGITAL SIGNATURE IN THE WAY OF LAW

    Directory of Open Access Journals (Sweden)

    Ruya Samlı

    2013-01-01

    Full Text Available Signature can be defined as a person’s name or special signs that he/she writes when he/she wants to indicate he/she wrote or confirm that writing. A person signs many times in his/her life. A person’s signature that is used for thousands of times for many things from formal documents to exams has importance for that person. Especially, signing in legal operations is an operation that can build important results. If a person’s signature is imitated by another person, he/she can become beholden, donate his/her whole wealth, commits offences or do some judicial operations. Today, because many operations can be done with digital environments and internet, signature operation that provides identity validation must also be carried to digital environment. In this paper digital signature concept that is approved for this reason and its situation in international areas and Turkish laws are investigated.

  19. Signature change events: a challenge for quantum gravity?

    International Nuclear Information System (INIS)

    White, Angela; Weinfurtner, Silke; Visser, Matt

    2010-01-01

    Within the framework of either Euclidean (functional integral) quantum gravity or canonical general relativity the signature of the manifold is a priori unconstrained. Furthermore, recent developments in the emergent spacetime programme have led to a physically feasible implementation of (analogue) signature change events. This suggests that it is time to revisit the sometimes controversial topic of signature change in general relativity. Specifically, we shall focus on the behaviour of a quantum field defined on a manifold containing regions of different signature. We emphasize that regardless of the underlying classical theory, there are severe problems associated with any quantum field theory residing on a signature-changing background. (Such as the production of what is naively an infinite number of particles, with an infinite energy density.) We show how the problem of quantum fields exposed to finite regions of Euclidean-signature (Riemannian) geometry has similarities with the quantum barrier penetration problem. Finally we raise the question as to whether signature change transitions could be fully understood and dynamically generated within (modified) classical general relativity, or whether they require the knowledge of a theory of quantum gravity.

  20. Starry messages: Searching for signatures of interstellar archaeology

    Energy Technology Data Exchange (ETDEWEB)

    Carrigan, Richard A., Jr.; /Fermilab

    2009-12-01

    Searching for signatures of cosmic-scale archaeological artifacts such as Dyson spheres or Kardashev civilizations is an interesting alternative to conventional SETI. Uncovering such an artifact does not require the intentional transmission of a signal on the part of the original civilization. This type of search is called interstellar archaeology or sometimes cosmic archaeology. The detection of intelligence elsewhere in the Universe with interstellar archaeology or SETI would have broad implications for science. For example, the constraints of the anthropic principle would have to be loosened if a different type of intelligence was discovered elsewhere. A variety of interstellar archaeology signatures are discussed including non-natural planetary atmospheric constituents, stellar doping with isotopes of nuclear wastes, Dyson spheres, as well as signatures of stellar and galactic-scale engineering. The concept of a Fermi bubble due to interstellar migration is introduced in the discussion of galactic signatures. These potential interstellar archaeological signatures are classified using the Kardashev scale. A modified Drake equation is used to evaluate the relative challenges of finding various sources. With few exceptions interstellar archaeological signatures are clouded and beyond current technological capabilities. However SETI for so-called cultural transmissions and planetary atmosphere signatures are within reach.

  1. Signature Pedagogies in Support of Teachers' Professional Learning

    Science.gov (United States)

    Parker, Melissa; Patton, Kevin; O'Sullivan, Mary

    2016-01-01

    Signature pedagogies [Shulman, L. 2005. "Signature pedagogies in the professions." "Daedalus" 134 (3): 52--59.] are a focus of teacher educators seeking to improve teaching and teacher education. The purpose of this paper is to present a preliminary common language of signature pedagogies for teacher professional development…

  2. Characteristics and Validation Techniques for PCA-Based Gene-Expression Signatures

    Directory of Open Access Journals (Sweden)

    Anders E. Berglund

    2017-01-01

    Full Text Available Background. Many gene-expression signatures exist for describing the biological state of profiled tumors. Principal Component Analysis (PCA can be used to summarize a gene signature into a single score. Our hypothesis is that gene signatures can be validated when applied to new datasets, using inherent properties of PCA. Results. This validation is based on four key concepts. Coherence: elements of a gene signature should be correlated beyond chance. Uniqueness: the general direction of the data being examined can drive most of the observed signal. Robustness: if a gene signature is designed to measure a single biological effect, then this signal should be sufficiently strong and distinct compared to other signals within the signature. Transferability: the derived PCA gene signature score should describe the same biology in the target dataset as it does in the training dataset. Conclusions. The proposed validation procedure ensures that PCA-based gene signatures perform as expected when applied to datasets other than those that the signatures were trained upon. Complex signatures, describing multiple independent biological components, are also easily identified.

  3. Quantum blind dual-signature scheme without arbitrator

    International Nuclear Information System (INIS)

    Li, Wei; Shi, Ronghua; Huang, Dazu; Shi, Jinjing; Guo, Ying

    2016-01-01

    Motivated by the elegant features of a bind signature, we suggest the design of a quantum blind dual-signature scheme with three phases, i.e., initial phase, signing phase and verification phase. Different from conventional schemes, legal messages are signed not only by the blind signatory but also by the sender in the signing phase. It does not rely much on an arbitrator in the verification phase as the previous quantum signature schemes usually do. The security is guaranteed by entanglement in quantum information processing. Security analysis demonstrates that the signature can be neither forged nor disavowed by illegal participants or attacker. It provides a potential application for e-commerce or e-payment systems with the current technology. (paper)

  4. Quantum blind dual-signature scheme without arbitrator

    Science.gov (United States)

    Li, Wei; Shi, Ronghua; Huang, Dazu; Shi, Jinjing; Guo, Ying

    2016-03-01

    Motivated by the elegant features of a bind signature, we suggest the design of a quantum blind dual-signature scheme with three phases, i.e., initial phase, signing phase and verification phase. Different from conventional schemes, legal messages are signed not only by the blind signatory but also by the sender in the signing phase. It does not rely much on an arbitrator in the verification phase as the previous quantum signature schemes usually do. The security is guaranteed by entanglement in quantum information processing. Security analysis demonstrates that the signature can be neither forged nor disavowed by illegal participants or attacker. It provides a potential application for e-commerce or e-payment systems with the current technology.

  5. Infrared ship signature analysis and optimisation

    NARCIS (Netherlands)

    Neele, F.P.

    2005-01-01

    The last decade has seen an increase in the awareness of the infrared signature of naval ships. New ship designs show that infrared signature reduction measures are being incorporated, such as exhaust gas cooling systems, relocation of the exhausts and surface cooling systems. Hull and

  6. Fine-Grained Forward-Secure Signature Schemes without Random Oracles

    DEFF Research Database (Denmark)

    Camenisch, Jan; Koprowski, Maciej

    2006-01-01

    We propose the concept of fine-grained forward-secure signature schemes. Such signature schemes not only provide nonrepudiation w.r.t. past time periods the way ordinary forward-secure signature schemes do but, in addition, allow the signer to specify which signatures of the current time period...... remain valid when revoking the public key. This is an important advantage if the signer produces many signatures per time period as otherwise the signer would have to re-issue those signatures (and possibly re-negotiate the respective messages) with a new key.Apart from a formal model for fine......-grained forward-secure signature schemes, we present practical schemes and prove them secure under the strong RSA assumption only, i.e., we do not resort to the random oracle model to prove security. As a side-result, we provide an ordinary forward-secure scheme whose key-update time is significantly smaller than...

  7. A Signature Comparing Android Mobile Application Utilizing Feature Extracting Algorithms

    Directory of Open Access Journals (Sweden)

    Paul Grafilon

    2017-08-01

    Full Text Available The paper presented one of the application that can be done using smartphones camera. Nowadays forgery is one of the most undetected crimes. With the forensic technology used today it is still difficult for authorities to compare and define what a real signature is and what a forged signature is. A signature is a legal representation of a person. All transactions are based on a signature. Forgers may use a signature to sign illegal contracts and withdraw from bank accounts undetected. A signature can also be forged during election periods for repeated voting. Addressing the issues a signature should always be secure. Signature verification is a reduced problem that still poses a real challenge for researchers. The literature on signature verification is quite extensive and shows two main areas of research off-line and on-line systems. Off-line systems deal with a static image of the signature i.e. the result of the action of signing while on-line systems work on the dynamic process of generating the signature i.e. the action of signing itself. The researchers have found a way to resolve the concerns. A mobile application that integrates the camera to take a picture of a signature analyzes it and compares it to other signatures for verification. It will exist to help citizens to be more cautious and aware with issues regarding the signatures. This might also be relevant to help organizations and institutions such as banks and insurance companies in verifying signatures that may avoid unwanted transactions and identity theft. Furthermore this might help the authorities in the never ending battle against crime especially against forgers and thieves. The project aimed to design and develop a mobile application that integrates the smartphone camera for verifying and comparing signatures for security using the best algorithm possible. As the result of the development the said smartphone camera application is functional and reliable.

  8. 21 CFR 1309.32 - Application forms; contents; signature.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Application forms; contents; signature. 1309.32... Application forms; contents; signature. (a) Any person who is required to be registered pursuant to § 1309.21... this paragraph and shall contain the signature of the individual being authorized to sign the...

  9. 38 CFR 18b.21 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Signature of documents. 18b.21 Section 18b.21 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS... Documents § 18b.21 Signature of documents. The signature of a party, authorized officer, employee, or...

  10. Detection of chemical explosives using multiple photon signatures

    International Nuclear Information System (INIS)

    Loschke, K.W.; Dunn, W.L.

    2008-01-01

    Full text: A template-matching procedure to aid in rapid detection of improvised explosive devices (IEDs) is being investigated. Multiple photon-scattered and photon-induced positron annihilation radiation responses are being used as part of a photon-neutron signature-based radiation scanning (SBRS) approach (see companion reference for description of the neutron component), in an attempt to detect chemical explosives at safe standoff distances. Many past and present photon interrogation methods are based on imaging. Imaging techniques seek to determine at high special resolution the internal structure of a target of interest. Our technique simply seeks to determine if an unknown target contains a detectable amount of chemical explosives by comparing multiple responses (signatures) that depend on both density and composition of portions of a target. In the photon component, beams of photons are used to create back-streaming signatures, which are dependent on the density and composition of part of the target being interrogated. These signatures are compared to templates, which are collections of the same signatures if the interrogated volume contained a significant amount of explosives. The signature analysis produces a figure-of-merit and a standard deviation of the figure-of-merit. These two metrics are used to filter safe from dangerous targets. Experiments have been conducted that show that explosive surrogates (fertilizers) can be distinguished from several inert materials using these photon signatures, demonstrating that these signatures can be used effectively to help IEDs

  11. Speech Recognition

    Directory of Open Access Journals (Sweden)

    Adrian Morariu

    2009-01-01

    Full Text Available This paper presents a method of speech recognition by pattern recognition techniques. Learning consists in determining the unique characteristics of a word (cepstral coefficients by eliminating those characteristics that are different from one word to another. For learning and recognition, the system will build a dictionary of words by determining the characteristics of each word to be used in the recognition. Determining the characteristics of an audio signal consists in the following steps: noise removal, sampling it, applying Hamming window, switching to frequency domain through Fourier transform, calculating the magnitude spectrum, filtering data, determining cepstral coefficients.

  12. The genomic signature of human rhinoviruses A, B and C.

    Directory of Open Access Journals (Sweden)

    Spyridon Megremis

    Full Text Available Human rhinoviruses are single stranded positive sense RNA viruses that are presented in more than 50% of acute upper respiratory tract infections. Despite extensive studies on the genetic diversity of the virus, little is known about the forces driving it. In order to explain this diversity, many research groups have focused on protein sequence requirements for viable, functional and transmissible virus but have missed out an important aspect of viral evolution such as the genomic ontology of the virus. This study presents for the first time the genomic signature of 111 fully sequenced HRV strains from all three groups HRV-A, HRV-B and HRV-C. We observed an HRV genome tendency to eliminate CpG and UpA dinucleotides, coupling with over-representation of UpG and CpA. We propose a specific mechanism which describes how rapid changes in the HRV genomic sequence can take place under the strict control of conservation of the polypeptide backbone. Moreover, the distribution of the observed under- and over-represented dinucleotides along the HRV genome is presented. Distance matrice tables based on CpG and UpA odds ratios were constructed and viewed as heatmaps and distance trees. None of the suppressions can be attributed to codon usage or in RNA secondary structure requirements. Since viral recognition is dependent on RNA motifs rich in CpG and UpA, it is possible that the overall described genome evolution mechanism acts in order to protect the virus from host recognition.

  13. Topographic gradient based site characterization in India complemented by strong ground-motion spectral attributes

    KAUST Repository

    Nath, Sankar Kumar; Thingbaijam, Kiran Kumar; Adhikari, M. D.; Nayak, Avinash; Devaraj, N.; Ghosh, Soumalya K.; Mahajan, Arun K.

    2013-01-01

    We appraise topographic-gradient approach for site classification that employs correlations between 30. m column averaged shear-wave velocity and topographic gradients. Assessments based on site classifications reported from cities across India indicate that the approach is reasonably viable at regional level. Additionally, we experiment three techniques for site classification based on strong ground-motion recordings, namely Horizontal-to-Vertical Spectral Ratio (HVSR), Response Spectra Shape (RSS), and Horizontal-to-Vertical Response Spectral Ratio (HVRSR) at the strong motion stations located across the Himalayas and northeast India. Statistical tests on the results indicate that these three techniques broadly differentiate soil and rock sites while RSS and HVRSR yield better signatures. The results also support the implemented site classification in the light of strong ground-motion spectral attributes observed in different parts of the globe. © 2013 Elsevier Ltd.

  14. Topographic gradient based site characterization in India complemented by strong ground-motion spectral attributes

    KAUST Repository

    Nath, Sankar Kumar

    2013-12-01

    We appraise topographic-gradient approach for site classification that employs correlations between 30. m column averaged shear-wave velocity and topographic gradients. Assessments based on site classifications reported from cities across India indicate that the approach is reasonably viable at regional level. Additionally, we experiment three techniques for site classification based on strong ground-motion recordings, namely Horizontal-to-Vertical Spectral Ratio (HVSR), Response Spectra Shape (RSS), and Horizontal-to-Vertical Response Spectral Ratio (HVRSR) at the strong motion stations located across the Himalayas and northeast India. Statistical tests on the results indicate that these three techniques broadly differentiate soil and rock sites while RSS and HVRSR yield better signatures. The results also support the implemented site classification in the light of strong ground-motion spectral attributes observed in different parts of the globe. © 2013 Elsevier Ltd.

  15. Enhanced arbitrated quantum signature scheme using Bell states

    International Nuclear Information System (INIS)

    Wang Chao; Liu Jian-Wei; Shang Tao

    2014-01-01

    We investigate the existing arbitrated quantum signature schemes as well as their cryptanalysis, including intercept-resend attack and denial-of-service attack. By exploring the loopholes of these schemes, a malicious signatory may successfully disavow signed messages, or the receiver may actively negate the signature from the signatory without being detected. By modifying the existing schemes, we develop counter-measures to these attacks using Bell states. The newly proposed scheme puts forward the security of arbitrated quantum signature. Furthermore, several valuable topics are also presented for further research of the quantum signature scheme

  16. Development of an Intelligent Ultrasonic Signature Classification Software for Discrimination of Flaws in Weldments

    International Nuclear Information System (INIS)

    Kim, H. J.; Song, S. J.; Jeong, H. D.

    1997-01-01

    Ultrasonic pattern recognition is the most effective approach to the problem of discriminating types of flaws in weldments based on ultrasonic flaw signals. In spite of significant progress in the research on this methodology, it has not been widely used in many practical ultrasonic inspections of weldments in industry. Hence, for the convenient application of this approach in many practical situations, we develop an intelligent ultrasonic signature classification software which can discriminate types of flaws in weldments based on their ultrasonic signals using various tools in artificial intelligence such as neural networks. This software shows the excellent performance in an experimental problem where flaws in weldments are classified into two categories of cracks and non-cracks. This performance demonstrates the high possibility of this software as a practical tool for ultrasonic flaw classification in weldments

  17. Recognition and Toleration

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2010-01-01

    Recognition and toleration are ways of relating to the diversity characteristic of multicultural societies. The article concerns the possible meanings of toleration and recognition, and the conflict that is often claimed to exist between these two approaches to diversity. Different forms...... or interpretations of recognition and toleration are considered, confusing and problematic uses of the terms are noted, and the compatibility of toleration and recognition is discussed. The article argues that there is a range of legitimate and importantly different conceptions of both toleration and recognition...

  18. FIR signature verification system characterizing dynamics of handwriting features

    Science.gov (United States)

    Thumwarin, Pitak; Pernwong, Jitawat; Matsuura, Takenobu

    2013-12-01

    This paper proposes an online signature verification method based on the finite impulse response (FIR) system characterizing time-frequency characteristics of dynamic handwriting features. First, the barycenter determined from both the center point of signature and two adjacent pen-point positions in the signing process, instead of one pen-point position, is used to reduce the fluctuation of handwriting motion. In this paper, among the available dynamic handwriting features, motion pressure and area pressure are employed to investigate handwriting behavior. Thus, the stable dynamic handwriting features can be described by the relation of the time-frequency characteristics of the dynamic handwriting features. In this study, the aforesaid relation can be represented by the FIR system with the wavelet coefficients of the dynamic handwriting features as both input and output of the system. The impulse response of the FIR system is used as the individual feature for a particular signature. In short, the signature can be verified by evaluating the difference between the impulse responses of the FIR systems for a reference signature and the signature to be verified. The signature verification experiments in this paper were conducted using the SUBCORPUS MCYT-100 signature database consisting of 5,000 signatures from 100 signers. The proposed method yielded equal error rate (EER) of 3.21% on skilled forgeries.

  19. Quantum signature scheme based on a quantum search algorithm

    International Nuclear Information System (INIS)

    Yoon, Chun Seok; Kang, Min Sung; Lim, Jong In; Yang, Hyung Jin

    2015-01-01

    We present a quantum signature scheme based on a two-qubit quantum search algorithm. For secure transmission of signatures, we use a quantum search algorithm that has not been used in previous quantum signature schemes. A two-step protocol secures the quantum channel, and a trusted center guarantees non-repudiation that is similar to other quantum signature schemes. We discuss the security of our protocol. (paper)

  20. ANÁLISIS DE DATOS DE PACIENTES SUBAGUDOS CON INFORMACIÓN REGISTRADA EN EL CONJUNTO MINIMO BASICO DE DATOS SOCIOSANITARIOS (CMBD-RSS

    Directory of Open Access Journals (Sweden)

    Cristina Meléndez Frigola

    2016-01-01

    Full Text Available Fundamentos: Es necesario profundizar en el conocimiento del conjunto mínimo básico de datos (CMBD-RSS de la línea sociosanitaria de pacientes subagudos (con patología crónica asociada y frecuentes ingresos. El objetivo de este estudio fue conocer las características sanitarias de este tipo de pacientes. Métodos: Muestra de 660 pacientes que ingresaron en camas de subagudos del Hospital Santa Caterina (Región Sanitaria Girona, de octubre de 2013 a diciembre de 2014. La fuente de información fue el CMBD-RSS. Se realizó análisis estadístico descriptivo y se verificó la relación entre variables: número de días de estancia y edad, procedencia del paciente y días de estancia (Significación de Mann-Whitney; diagnóstico principal y días de estancia (Kruskal-Wallis. Se contrastaron la procedencia y el diagnóstico principal mediante χ2 de Pearson y el coeficiente V de Cramer. Resultados: La edad media de las personas de la muestra fue de 83 años, el 55% eran mujeres. Los cinco grupos de enfermedades que concentraron el 80% de los diagnósticos de los pacientes fueron trastorno mental, enfermedades del sistema nervioso, cardiovasculares, respiratoria e infecciones genitourinarias. Los pacientes que procedieron del hospital, tuvieron una estancia media 8 días inferior a los procedentes de domicilio (9 días. En el 80% de los casos se retornó al domicilio al alta. Conclusiones: Las personas con patología crónica asociada con frecuentes ingresos hospitalarios configuran un grupo de riesgo importante. La elevada edad y la descompensación clínica añaden complejidad. Una correcta valoración del paciente al inicio del episodio facilita la asignación del recurso más adecuado. En la muestra estudiada se plasman las patologías más prevalentes, la procedencia, la estancia media y el destino al alta.

  1. Molecular signatures of thyroid follicular neoplasia

    DEFF Research Database (Denmark)

    Borup, R.; Rossing, M.; Henao, Ricardo

    2010-01-01

    The molecular pathways leading to thyroid follicular neoplasia are incompletely understood, and the diagnosis of follicular tumors is a clinical challenge. To provide leads to the pathogenesis and diagnosis of the tumors, we examined the global transcriptome signatures of follicular thyroid...... a mechanism for cancer progression, which is why we exploited the results in order to generate a molecular classifier that could identify 95% of all carcinomas. Validation employing public domain and cross-platform data demonstrated that the signature was robust and could diagnose follicular nodules...... and robust genetic signature for the diagnosis of FA and FC. Endocrine-Related Cancer (2010) 17 691-708...

  2. Motif signatures of transcribed enhancers

    KAUST Repository

    Kleftogiannis, Dimitrios

    2017-09-14

    In mammalian cells, transcribed enhancers (TrEn) play important roles in the initiation of gene expression and maintenance of gene expression levels in spatiotemporal manner. One of the most challenging questions in biology today is how the genomic characteristics of enhancers relate to enhancer activities. This is particularly critical, as several recent studies have linked enhancer sequence motifs to specific functional roles. To date, only a limited number of enhancer sequence characteristics have been investigated, leaving space for exploring the enhancers genomic code in a more systematic way. To address this problem, we developed a novel computational method, TELS, aimed at identifying predictive cell type/tissue specific motif signatures. We used TELS to compile a comprehensive catalog of motif signatures for all known TrEn identified by the FANTOM5 consortium across 112 human primary cells and tissues. Our results confirm that distinct cell type/tissue specific motif signatures characterize TrEn. These signatures allow discriminating successfully a) TrEn from random controls, proxy of non-enhancer activity, and b) cell type/tissue specific TrEn from enhancers expressed and transcribed in different cell types/tissues. TELS codes and datasets are publicly available at http://www.cbrc.kaust.edu.sa/TELS.

  3. Re-thinking employee recognition: understanding employee experiences of recognition

    OpenAIRE

    Smith, Charlotte

    2013-01-01

    Despite widespread acceptance of the importance of employee recognition for both individuals and organisations and evidence of its increasing use in organisations, employee recognition has received relatively little focused attention from academic researchers. Particularly lacking is research exploring the lived experience of employee recognition and the interpretations and meanings which individuals give to these experiences. Drawing on qualitative interviews conducted as part of my PhD rese...

  4. 12 CFR 269b.731 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Signature. 269b.731 Section 269b.731 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM CHARGES OF UNFAIR LABOR PRACTICES General Rules § 269b.731 Signature. The original of each document filed shall be...

  5. Marked Object Recognition Multitouch Screen Printed Touchpad for Interactive Applications.

    Science.gov (United States)

    Nunes, Jivago Serrado; Castro, Nelson; Gonçalves, Sergio; Pereira, Nélson; Correia, Vitor; Lanceros-Mendez, Senentxu

    2017-12-01

    The market for interactive platforms is rapidly growing, and touchscreens have been incorporated in an increasing number of devices. Thus, the area of smart objects and devices is strongly increasing by adding interactive touch and multimedia content, leading to new uses and capabilities. In this work, a flexible screen printed sensor matrix is fabricated based on silver ink in a polyethylene terephthalate (PET) substrate. Diamond shaped capacitive electrodes coupled with conventional capacitive reading electronics enables fabrication of a highly functional capacitive touchpad, and also allows for the identification of marked objects. For the latter, the capacitive signatures are identified by intersecting points and distances between them. Thus, this work demonstrates the applicability of a low cost method using royalty-free geometries and technologies for the development of flexible multitouch touchpads for the implementation of interactive and object recognition applications.

  6. Marked Object Recognition Multitouch Screen Printed Touchpad for Interactive Applications

    Directory of Open Access Journals (Sweden)

    Jivago Serrado Nunes

    2017-12-01

    Full Text Available The market for interactive platforms is rapidly growing, and touchscreens have been incorporated in an increasing number of devices. Thus, the area of smart objects and devices is strongly increasing by adding interactive touch and multimedia content, leading to new uses and capabilities. In this work, a flexible screen printed sensor matrix is fabricated based on silver ink in a polyethylene terephthalate (PET substrate. Diamond shaped capacitive electrodes coupled with conventional capacitive reading electronics enables fabrication of a highly functional capacitive touchpad, and also allows for the identification of marked objects. For the latter, the capacitive signatures are identified by intersecting points and distances between them. Thus, this work demonstrates the applicability of a low cost method using royalty-free geometries and technologies for the development of flexible multitouch touchpads for the implementation of interactive and object recognition applications.

  7. Reduction of a Ship's Magnetic Field Signatures

    CERN Document Server

    Holmes, John

    2008-01-01

    Decreasing the magnetic field signature of a naval vessel will reduce its susceptibility to detonating naval influence mines and the probability of a submarine being detected by underwater barriers and maritime patrol aircraft. Both passive and active techniques for reducing the magnetic signatures produced by a vessel's ferromagnetism, roll-induced eddy currents, corrosion-related sources, and stray fields are presented. Mathematical models of simple hull shapes are used to predict the levels of signature reduction that might be achieved through the use of alternate construction materials. Al

  8. Use of the recognition heuristic depends on the domain's recognition validity, not on the recognition validity of selected sets of objects.

    Science.gov (United States)

    Pohl, Rüdiger F; Michalkiewicz, Martha; Erdfelder, Edgar; Hilbig, Benjamin E

    2017-07-01

    According to the recognition-heuristic theory, decision makers solve paired comparisons in which one object is recognized and the other not by recognition alone, inferring that recognized objects have higher criterion values than unrecognized ones. However, success-and thus usefulness-of this heuristic depends on the validity of recognition as a cue, and adaptive decision making, in turn, requires that decision makers are sensitive to it. To this end, decision makers could base their evaluation of the recognition validity either on the selected set of objects (the set's recognition validity), or on the underlying domain from which the objects were drawn (the domain's recognition validity). In two experiments, we manipulated the recognition validity both in the selected set of objects and between domains from which the sets were drawn. The results clearly show that use of the recognition heuristic depends on the domain's recognition validity, not on the set's recognition validity. In other words, participants treat all sets as roughly representative of the underlying domain and adjust their decision strategy adaptively (only) with respect to the more general environment rather than the specific items they are faced with.

  9. Does Twitter trigger bursts in signature collections?

    Science.gov (United States)

    Yamaguchi, Rui; Imoto, Seiya; Kami, Masahiro; Watanabe, Kenji; Miyano, Satoru; Yuji, Koichiro

    2013-01-01

    The quantification of social media impacts on societal and political events is a difficult undertaking. The Japanese Society of Oriental Medicine started a signature-collecting campaign to oppose a medical policy of the Government Revitalization Unit to exclude a traditional Japanese medicine, "Kampo," from the public insurance system. The signature count showed a series of aberrant bursts from November 26 to 29, 2009. In the same interval, the number of messages on Twitter including the keywords "Signature" and "Kampo," increased abruptly. Moreover, the number of messages on an Internet forum that discussed the policy and called for signatures showed a train of spikes. In order to estimate the contributions of social media, we developed a statistical model with state-space modeling framework that distinguishes the contributions of multiple social media in time-series of collected public opinions. We applied the model to the time-series of signature counts of the campaign and quantified contributions of two social media, i.e., Twitter and an Internet forum, by the estimation. We found that a considerable portion (78%) of the signatures was affected from either of the social media throughout the campaign and the Twitter effect (26%) was smaller than the Forum effect (52%) in total, although Twitter probably triggered the initial two bursts of signatures. Comparisons of the estimated profiles of the both effects suggested distinctions between the social media in terms of sustainable impact of messages or tweets. Twitter shows messages on various topics on a time-line; newer messages push out older ones. Twitter may diminish the impact of messages that are tweeted intermittently. The quantification of social media impacts is beneficial to better understand people's tendency and may promote developing strategies to engage public opinions effectively. Our proposed method is a promising tool to explore information hidden in social phenomena.

  10. Does Twitter trigger bursts in signature collections?

    Directory of Open Access Journals (Sweden)

    Rui Yamaguchi

    Full Text Available INTRODUCTION: The quantification of social media impacts on societal and political events is a difficult undertaking. The Japanese Society of Oriental Medicine started a signature-collecting campaign to oppose a medical policy of the Government Revitalization Unit to exclude a traditional Japanese medicine, "Kampo," from the public insurance system. The signature count showed a series of aberrant bursts from November 26 to 29, 2009. In the same interval, the number of messages on Twitter including the keywords "Signature" and "Kampo," increased abruptly. Moreover, the number of messages on an Internet forum that discussed the policy and called for signatures showed a train of spikes. METHODS AND FINDINGS: In order to estimate the contributions of social media, we developed a statistical model with state-space modeling framework that distinguishes the contributions of multiple social media in time-series of collected public opinions. We applied the model to the time-series of signature counts of the campaign and quantified contributions of two social media, i.e., Twitter and an Internet forum, by the estimation. We found that a considerable portion (78% of the signatures was affected from either of the social media throughout the campaign and the Twitter effect (26% was smaller than the Forum effect (52% in total, although Twitter probably triggered the initial two bursts of signatures. Comparisons of the estimated profiles of the both effects suggested distinctions between the social media in terms of sustainable impact of messages or tweets. Twitter shows messages on various topics on a time-line; newer messages push out older ones. Twitter may diminish the impact of messages that are tweeted intermittently. CONCLUSIONS: The quantification of social media impacts is beneficial to better understand people's tendency and may promote developing strategies to engage public opinions effectively. Our proposed method is a promising tool to explore

  11. Re-examining the security of blind quantum signature protocols

    International Nuclear Information System (INIS)

    Wang Mingming; Chen Xiubo; Niu Xinxin; Yang Yixian

    2012-01-01

    Recently, blind quantum signature (BQS) protocols have been proposed with the help of a third-party verifier. However, our research shows that some of the BQS protocols are unable to complete the blind signature task fairly if the verifier is dishonest. Indeed, these protocols can be viewed as variants of the classical digital signature scheme of symmetric-key cryptography. If nobody is trusted in such protocols, digital signature cannot be implemented since disagreements cannot be solved fairly.

  12. Blind Quantum Signature with Blind Quantum Computation

    Science.gov (United States)

    Li, Wei; Shi, Ronghua; Guo, Ying

    2017-04-01

    Blind quantum computation allows a client without quantum abilities to interact with a quantum server to perform a unconditional secure computing protocol, while protecting client's privacy. Motivated by confidentiality of blind quantum computation, a blind quantum signature scheme is designed with laconic structure. Different from the traditional signature schemes, the signing and verifying operations are performed through measurement-based quantum computation. Inputs of blind quantum computation are securely controlled with multi-qubit entangled states. The unique signature of the transmitted message is generated by the signer without leaking information in imperfect channels. Whereas, the receiver can verify the validity of the signature using the quantum matching algorithm. The security is guaranteed by entanglement of quantum system for blind quantum computation. It provides a potential practical application for e-commerce in the cloud computing and first-generation quantum computation.

  13. Graphical symbol recognition

    OpenAIRE

    K.C. , Santosh; Wendling , Laurent

    2015-01-01

    International audience; The chapter focuses on one of the key issues in document image processing i.e., graphical symbol recognition. Graphical symbol recognition is a sub-field of a larger research domain: pattern recognition. The chapter covers several approaches (i.e., statistical, structural and syntactic) and specially designed symbol recognition techniques inspired by real-world industrial problems. It, in general, contains research problems, state-of-the-art methods that convey basic s...

  14. Modeling ground vehicle acoustic signatures for analysis and synthesis

    International Nuclear Information System (INIS)

    Haschke, G.; Stanfield, R.

    1995-01-01

    Security and weapon systems use acoustic sensor signals to classify and identify moving ground vehicles. Developing robust signal processing algorithms for this is expensive, particularly in presence of acoustic clutter or countermeasures. This paper proposes a parametric ground vehicle acoustic signature model to aid the system designer in understanding which signature features are important, developing corresponding feature extraction algorithms and generating low-cost, high-fidelity synthetic signatures for testing. The authors have proposed computer-generated acoustic signatures of armored, tracked ground vehicles to deceive acoustic-sensored smart munitions. They have developed quantitative measures of how accurately a synthetic acoustic signature matches those produced by actual vehicles. This paper describes parameters of the model used to generate these synthetic signatures and suggests methods for extracting these parameters from signatures of valid vehicle encounters. The model incorporates wide-bandwidth and narrow- bandwidth components that are modulated in a pseudo-random fashion to mimic the time dynamics of valid vehicle signatures. Narrow- bandwidth feature extraction techniques estimate frequency, amplitude and phase information contained in a single set of narrow frequency- band harmonics. Wide-bandwidth feature extraction techniques estimate parameters of a correlated-noise-floor model. Finally, the authors propose a method of modeling the time dynamics of the harmonic amplitudes as a means adding necessary time-varying features to the narrow-bandwidth signal components. The authors present results of applying this modeling technique to acoustic signatures recorded during encounters with one armored, tracked vehicle. Similar modeling techniques can be applied to security systems

  15. Signatures of positive selection in Toll-like receptor (TLR genes in mammals

    Directory of Open Access Journals (Sweden)

    Areal Helena

    2011-12-01

    Full Text Available Abstract Background Toll-like receptors (TLRs are a major class of pattern recognition receptors (PRRs expressed in the cell surface or membrane compartments of immune and non-immune cells. TLRs are encoded by a multigene family and represent the first line of defense against pathogens by detecting foreigner microbial molecular motifs, the pathogen-associated molecular patterns (PAMPs. TLRs are also important by triggering the adaptive immunity in vertebrates. They are characterized by the presence of leucine-rich repeats (LRRs in the ectodomain, which are associated with the PAMPs recognition. The direct recognition of different pathogens by TLRs might result in different evolutionary adaptations important to understand the dynamics of the host-pathogen interplay. Ten mammal TLR genes, viral (TLR3, 7, 8, 9 and non-viral (TLR1-6, 10, were selected to identify signatures of positive selection that might have been imposed by interacting pathogens and to clarify if viral and non-viral TLRs might display different patterns of molecular evolution. Results By using Maximum Likelihood approaches, evidence of positive selection was found in all the TLRs studied. The number of positively selected codons (PSC ranged between 2-26 codons (0.25%-2.65% with the non-viral TLR4 as the receptor with higher percentage of positively selected codons (2.65%, followed by the viral TLR8 (2.50%. The results indicated that viral and non-viral TLRs are similarly under positive selection. Almost all TLRs have at least one PSC located in the LRR ectodomain which underlies the importance of the pathogen recognition by this region. Conclusions Our results are not in line with previous studies on primates and birds that identified more codons under positive selection in non-viral TLRs. This might be explained by the fact that both primates and birds are homogeneous groups probably being affected by only a restricted number of related viruses with equivalent motifs to be

  16. DIGITAL SIGNATURE IN THE WAY OF LAW

    OpenAIRE

    Ruya Samlı

    2013-01-01

    Signature can be defined as a person’s name or special signs that he/she writes when he/she wants to indicate he/she wrote or confirm that writing. A person signs many times in his/her life. A person’s signature that is used for thousands of times for many things from formal documents to exams has importance for that person. Especially, signing in legal operations is an operation that can build important results. If a person’s signature is imitated by another person, he/she can be...

  17. An Efficient Homomorphic Aggregate Signature Scheme Based on Lattice

    Directory of Open Access Journals (Sweden)

    Zhengjun Jing

    2014-01-01

    Full Text Available Homomorphic aggregate signature (HAS is a linearly homomorphic signature (LHS for multiple users, which can be applied for a variety of purposes, such as multi-source network coding and sensor data aggregation. In order to design an efficient postquantum secure HAS scheme, we borrow the idea of the lattice-based LHS scheme over binary field in the single-user case, and develop it into a new lattice-based HAS scheme in this paper. The security of the proposed scheme is proved by showing a reduction to the single-user case and the signature length remains invariant. Compared with the existing lattice-based homomorphic aggregate signature scheme, our new scheme enjoys shorter signature length and high efficiency.

  18. A Digital Signature Scheme Based on MST3 Cryptosystems

    Directory of Open Access Journals (Sweden)

    Haibo Hong

    2014-01-01

    Full Text Available As special types of factorization of finite groups, logarithmic signature and cover have been used as the main components of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2, and MST3. Recently, Svaba et. al proposed a revised MST3 encryption scheme with greater security. Meanwhile, they put forward an idea of constructing signature schemes on the basis of logarithmic signatures and random covers. In this paper, we firstly design a secure digital signature scheme based on logarithmic signatures and random covers. In order to complete the task, we devise a new encryption scheme based on MST3 cryptosystems.

  19. Signature detection and matching for document image retrieval.

    Science.gov (United States)

    Zhu, Guangyu; Zheng, Yefeng; Doermann, David; Jaeger, Stefan

    2009-11-01

    As one of the most pervasive methods of individual identification and document authentication, signatures present convincing evidence and provide an important form of indexing for effective document image processing and retrieval in a broad range of applications. However, detection and segmentation of free-form objects such as signatures from clustered background is currently an open document analysis problem. In this paper, we focus on two fundamental problems in signature-based document image retrieval. First, we propose a novel multiscale approach to jointly detecting and segmenting signatures from document images. Rather than focusing on local features that typically have large variations, our approach captures the structural saliency using a signature production model and computes the dynamic curvature of 2D contour fragments over multiple scales. This detection framework is general and computationally tractable. Second, we treat the problem of signature retrieval in the unconstrained setting of translation, scale, and rotation invariant nonrigid shape matching. We propose two novel measures of shape dissimilarity based on anisotropic scaling and registration residual error and present a supervised learning framework for combining complementary shape information from different dissimilarity metrics using LDA. We quantitatively study state-of-the-art shape representations, shape matching algorithms, measures of dissimilarity, and the use of multiple instances as query in document image retrieval. We further demonstrate our matching techniques in offline signature verification. Extensive experiments using large real-world collections of English and Arabic machine-printed and handwritten documents demonstrate the excellent performance of our approaches.

  20. Server-Aided Verification Signature with Privacy for Mobile Computing

    Directory of Open Access Journals (Sweden)

    Lingling Xu

    2015-01-01

    Full Text Available With the development of wireless technology, much data communication and processing has been conducted in mobile devices with wireless connection. As we know that the mobile devices will always be resource-poor relative to static ones though they will improve in absolute ability, therefore, they cannot process some expensive computational tasks due to the constrained computational resources. According to this problem, server-aided computing has been studied in which the power-constrained mobile devices can outsource some expensive computation to a server with powerful resources in order to reduce their computational load. However, in existing server-aided verification signature schemes, the server can learn some information about the message-signature pair to be verified, which is undesirable especially when the message includes some secret information. In this paper, we mainly study the server-aided verification signatures with privacy in which the message-signature pair to be verified can be protected from the server. Two definitions of privacy for server-aided verification signatures are presented under collusion attacks between the server and the signer. Then based on existing signatures, two concrete server-aided verification signature schemes with privacy are proposed which are both proved secure.

  1. A pattern recognition approach based on DTW for automatic transient identification in nuclear power plants

    International Nuclear Information System (INIS)

    Galbally, Javier; Galbally, David

    2015-01-01

    Highlights: • Novel transient identification method for NPPs. • Low-complexity. • Low training data requirements. • High accuracy. • Fully reproducible protocol carried out on a real benchmark. - Abstract: Automatic identification of transients in nuclear power plants (NPPs) allows monitoring the fatigue damage accumulated by critical components during plant operation, and is therefore of great importance for ensuring that usage factors remain within the original design bases postulated by the plant designer. Although several schemes to address this important issue have been explored in the literature, there is still no definitive solution available. In the present work, a new method for automatic transient identification is proposed, based on the Dynamic Time Warping (DTW) algorithm, largely used in other related areas such as signature or speech recognition. The novel transient identification system is evaluated on real operational data following a rigorous pattern recognition protocol. Results show the high accuracy of the proposed approach, which is combined with other interesting features such as its low complexity and its very limited requirements of training data

  2. Th1/2 Immune Response Signature Predicts Outcome after Dose-Dense Immunochemotherapy in Patients with High Risk Diffuse Large B-Cell Lymphoma – Results from Nordic Lymphoma Group Trials

    DEFF Research Database (Denmark)

    M, Autio; Jørgensen, Judit Meszaros; SK, Leivonen

    treatment-specific roles in diffuse large B-cell lymphoma. For the high risk DLBCL patients treated with dose-dense immunochemotherapy, high expression of type 1/2 immune response signature genes predicts a poor outcome. A detailed characterization of immune cell composition in the tumor microenvironment......Introduction: Despite better therapeutic options and improved survival of diffuse large B-cell lymphoma (DLBCL), 30-40% of the patients still relapse and have dismal prognosis. Recently, the impact of genomic aberrations, allowing lymphoma cells to escape immune recognition on DLBCL pathogenesis...... has been recognized. However, whether immune related signatures could be used as determinants for treatment outcome has not been rigorously evaluated. Here, our aim was to elucidate the immunologic characteristics of the tumor microenvironment, and associate the findings with outcome in patients...

  3. 48 CFR 4.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Contracting officer's signature. 4.101 Section 4.101 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Contract Execution 4.101 Contracting officer's signature. Only contracting officers shall...

  4. 37 CFR 2.74 - Form and signature of amendment.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Form and signature of... signature of amendment. (a) Form of Amendment. Amendments should be set forth clearly and completely... record. (b) Signature. A request for amendment of an application must be signed by the applicant, someone...

  5. 21 CFR 11.200 - Electronic signature components and controls.

    Science.gov (United States)

    2010-04-01

    ... signature components and controls. (a) Electronic signatures that are not based upon biometrics shall: (1) Employ at least two distinct identification components such as an identification code and password. (i... signatures based upon biometrics shall be designed to ensure that they cannot be used by anyone other than...

  6. Signature Schemes Secure against Hard-to-Invert Leakage

    DEFF Research Database (Denmark)

    Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus

    2012-01-01

    of the secret key. As a second contribution, we construct a signature scheme that achieves security for random messages assuming that the adversary is given a polynomial-time hard to invert function. Here, polynomial-hardness is required even when given the entire public-key – so called weak auxiliary input......-theoretically reveal the entire secret key. In this work, we propose the first constructions of digital signature schemes that are secure in the auxiliary input model. Our main contribution is a digital signature scheme that is secure against chosen message attacks when given an exponentially hard-to-invert function...... security. We show that such signature schemes readily give us auxiliary input secure identification schemes...

  7. THE ELECTRONIC SIGNATURE

    Directory of Open Access Journals (Sweden)

    Voiculescu Madalina Irena

    2009-05-01

    Full Text Available Article refers to significance and the digital signature in electronic commerce. Internet and electronic commerce open up many new opportunities for the consumer, yet, the security (or perceived lack of security of exchanging personal and financial data

  8. Staggering in signature partners of A∼190 mass region of superdeformed rotational bands

    International Nuclear Information System (INIS)

    Uma, V.S.; Goel, Alpana; Yadav, Archana

    2014-01-01

    This paper discuss about ΔI=1 signature splitting in signature partner pairs of A∼190 mass region. Around twenty signature partner pairs (usually called as two bands, each with a fixed signature) have been reported in this mass region. For these signature pairs, band head moment of inertia (J 0 ) and intrinsic structure of each pair of signature partners have been found as almost identical. Also, these signature partner pairs showed large amplitude signature splitting. As each of the two signature partner forms a regular spin sequence and signature bands are not equivalent in terms of energies. This difference in energies results in signature splitting

  9. Comparative study of methods for recognition of an unknown person's action from a video sequence

    Science.gov (United States)

    Hori, Takayuki; Ohya, Jun; Kurumisawa, Jun

    2009-02-01

    This paper proposes a Tensor Decomposition Based method that can recognize an unknown person's action from a video sequence, where the unknown person is not included in the database (tensor) used for the recognition. The tensor consists of persons, actions and time-series image features. For the observed unknown person's action, one of the actions stored in the tensor is assumed. Using the motion signature obtained from the assumption, the unknown person's actions are synthesized. The actions of one of the persons in the tensor are replaced by the synthesized actions. Then, the core tensor for the replaced tensor is computed. This process is repeated for the actions and persons. For each iteration, the difference between the replaced and original core tensors is computed. The assumption that gives the minimal difference is the action recognition result. For the time-series image features to be stored in the tensor and to be extracted from the observed video sequence, the human body silhouette's contour shape based feature is used. To show the validity of our proposed method, our proposed method is experimentally compared with Nearest Neighbor rule and Principal Component analysis based method. Experiments using 33 persons' seven kinds of action show that our proposed method achieves better recognition accuracies for the seven actions than the other methods.

  10. 22 CFR 92.28 - Signature of affiant on affidavit.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Signature of affiant on affidavit. 92.28 Section 92.28 Foreign Relations DEPARTMENT OF STATE LEGAL AND RELATED SERVICES NOTARIAL AND RELATED SERVICES Specific Notarial Acts § 92.28 Signature of affiant on affidavit. The signature of the affiant is...

  11. Statistical Pattern Recognition

    CERN Document Server

    Webb, Andrew R

    2011-01-01

    Statistical pattern recognition relates to the use of statistical techniques for analysing data measurements in order to extract information and make justified decisions.  It is a very active area of study and research, which has seen many advances in recent years. Applications such as data mining, web searching, multimedia data retrieval, face recognition, and cursive handwriting recognition, all require robust and efficient pattern recognition techniques. This third edition provides an introduction to statistical pattern theory and techniques, with material drawn from a wide range of fields,

  12. Optical/Infrared Signatures for Space-Based Remote Sensing

    National Research Council Canada - National Science Library

    Picard, R. H; Dewan, E. M; Winick, J. R; O'Neil, R. R

    2007-01-01

    This report describes work carried out under the Air Force Research Laboratory's basic research task in optical remote-sensing signatures, entitled Optical / Infrared Signatures for Space-Based Remote Sensing...

  13. Signature scheme based on bilinear pairs

    Science.gov (United States)

    Tong, Rui Y.; Geng, Yong J.

    2013-03-01

    An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.

  14. Different neural processes accompany self-recognition in photographs across the lifespan: an ERP study using dizygotic twins.

    Science.gov (United States)

    Butler, David L; Mattingley, Jason B; Cunnington, Ross; Suddendorf, Thomas

    2013-01-01

    Our appearance changes over time, yet we can recognize ourselves in photographs from across the lifespan. Researchers have extensively studied self-recognition in photographs and have proposed that specific neural correlates are involved, but few studies have examined self-recognition using images from different periods of life. Here we compared ERP responses to photographs of participants when they were 5-15, 16-25, and 26-45 years old. We found marked differences between the responses to photographs from these time periods in terms of the neural markers generally assumed to reflect (i) the configural processing of faces (i.e., the N170), (ii) the matching of the currently perceived face to a representation already stored in memory (i.e., the P250), and (iii) the retrieval of information about the person being recognized (i.e., the N400). There was no uniform neural signature of visual self-recognition. To test whether there was anything specific to self-recognition in these brain responses, we also asked participants to identify photographs of their dizygotic twins taken from the same time periods. Critically, this allowed us to minimize the confounding effects of exposure, for it is likely that participants have been similarly exposed to each other's faces over the lifespan. The same pattern of neural response emerged with only one exception: the neural marker reflecting the retrieval of mnemonic information (N400) differed across the lifespan for self but not for twin. These results, as well as our novel approach using twins and photographs from across the lifespan, have wide-ranging consequences for the study of self-recognition and the nature of our personal identity through time.

  15. Different neural processes accompany self-recognition in photographs across the lifespan: an ERP study using dizygotic twins.

    Directory of Open Access Journals (Sweden)

    David L Butler

    Full Text Available Our appearance changes over time, yet we can recognize ourselves in photographs from across the lifespan. Researchers have extensively studied self-recognition in photographs and have proposed that specific neural correlates are involved, but few studies have examined self-recognition using images from different periods of life. Here we compared ERP responses to photographs of participants when they were 5-15, 16-25, and 26-45 years old. We found marked differences between the responses to photographs from these time periods in terms of the neural markers generally assumed to reflect (i the configural processing of faces (i.e., the N170, (ii the matching of the currently perceived face to a representation already stored in memory (i.e., the P250, and (iii the retrieval of information about the person being recognized (i.e., the N400. There was no uniform neural signature of visual self-recognition. To test whether there was anything specific to self-recognition in these brain responses, we also asked participants to identify photographs of their dizygotic twins taken from the same time periods. Critically, this allowed us to minimize the confounding effects of exposure, for it is likely that participants have been similarly exposed to each other's faces over the lifespan. The same pattern of neural response emerged with only one exception: the neural marker reflecting the retrieval of mnemonic information (N400 differed across the lifespan for self but not for twin. These results, as well as our novel approach using twins and photographs from across the lifespan, have wide-ranging consequences for the study of self-recognition and the nature of our personal identity through time.

  16. Analysis of signature wrapping attacks and countermeasures

    DEFF Research Database (Denmark)

    Gajek, Sebastian; Jensen, Meiko; Liao, Lijun

    2009-01-01

    In recent research it turned out that Boolean verification, of digital signatures in the context of WSSecurity, is likely to fail: If parts of a SOAP message, are signed and the signature verification applied to, the whole document returns true, then nevertheless the, document may have been...

  17. Molecular Signature in HCV-Positive Lymphomas

    Directory of Open Access Journals (Sweden)

    Valli De Re

    2012-01-01

    Full Text Available Hepatitis C virus (HCV is a positive, single-stranded RNA virus, which has been associated to different subtypes of B-cell non-Hodgkin lymphoma (B-NHL. Cumulative evidence suggests an HCV-related antigen driven process in the B-NHL development. The underlying molecular signature associated to HCV-related B-NHL has to date remained obscure. In this review, we discuss the recent developments in this field with a special mention to different sets of genes whose expression is associated with BCR coupled to Blys signaling which in turn was found to be linked to B-cell maturation stages and NF-κb transcription factor. Even if recent progress on HCV-B-NHL signature has been made, the precise relationship between HCV and lymphoma development and phenotype signature remain to be clarified.

  18. 32 CFR 842.6 - Signature on the claim form.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Signature on the claim form. 842.6 Section 842.6... ADMINISTRATIVE CLAIMS General Information § 842.6 Signature on the claim form. The claimant or authorized agent... authorized agent signing for a claimant shows, after the signature, the title or capacity and attaches...

  19. Rotation-invariant neural pattern recognition system with application to coin recognition.

    Science.gov (United States)

    Fukumi, M; Omatu, S; Takeda, F; Kosaka, T

    1992-01-01

    In pattern recognition, it is often necessary to deal with problems to classify a transformed pattern. A neural pattern recognition system which is insensitive to rotation of input pattern by various degrees is proposed. The system consists of a fixed invariance network with many slabs and a trainable multilayered network. The system was used in a rotation-invariant coin recognition problem to distinguish between a 500 yen coin and a 500 won coin. The results show that the approach works well for variable rotation pattern recognition.

  20. Implementing Signature Neural Networks with Spiking Neurons.

    Science.gov (United States)

    Carrillo-Medina, José Luis; Latorre, Roberto

    2016-01-01

    Spiking Neural Networks constitute the most promising approach to develop realistic Artificial Neural Networks (ANNs). Unlike traditional firing rate-based paradigms, information coding in spiking models is based on the precise timing of individual spikes. It has been demonstrated that spiking ANNs can be successfully and efficiently applied to multiple realistic problems solvable with traditional strategies (e.g., data classification or pattern recognition). In recent years, major breakthroughs in neuroscience research have discovered new relevant computational principles in different living neural systems. Could ANNs benefit from some of these recent findings providing novel elements of inspiration? This is an intriguing question for the research community and the development of spiking ANNs including novel bio-inspired information coding and processing strategies is gaining attention. From this perspective, in this work, we adapt the core concepts of the recently proposed Signature Neural Network paradigm-i.e., neural signatures to identify each unit in the network, local information contextualization during the processing, and multicoding strategies for information propagation regarding the origin and the content of the data-to be employed in a spiking neural network. To the best of our knowledge, none of these mechanisms have been used yet in the context of ANNs of spiking neurons. This paper provides a proof-of-concept for their applicability in such networks. Computer simulations show that a simple network model like the discussed here exhibits complex self-organizing properties. The combination of multiple simultaneous encoding schemes allows the network to generate coexisting spatio-temporal patterns of activity encoding information in different spatio-temporal spaces. As a function of the network and/or intra-unit parameters shaping the corresponding encoding modality, different forms of competition among the evoked patterns can emerge even in the absence

  1. Thermal signature measurements for ammonium nitrate/fuel mixtures by laser heating

    International Nuclear Information System (INIS)

    Nazarian, Ashot; Presser, Cary

    2016-01-01

    Highlights: • LDTR is a useful diagnostic for characterizing AN/fuel mixture thermochemical behavior. • Each AN/fuel mixture thermal signature was different. • AN/fuel mixture signature features were defined by the individual constituents. • Baseline signatures changed after an experiment. - Abstract: Measurements were carried out to obtain thermal signatures of several ammonium nitrate/fuel (ANF) mixtures, using a laser-heating technique referred to as the laser-driven thermal reactor (LDTR). The mixtures were ammonium nitrate (AN)/kerosene, AN/ethylene glycol, AN/paraffin wax, AN/petroleum jelly, AN/confectioner's sugar, AN/cellulose (tissue paper), nitromethane/cellulose, nitrobenzene/cellulose, AN/cellulose/nitromethane, AN/cellulose/nitrobenzene. These mixtures were also compared with AN/nitromethane and AN/diesel fuel oil, obtained from an earlier investigation. Thermograms for the mixtures, as well as individual constituents, were compared to better understand how sample thermal signature changes with mixture composition. This is the first step in development of a thermal-signature database, to be used along with other signature databases, to improve identification of energetic substances of unknown composition. The results indicated that each individual thermal signature was associated unambiguously with a particular mixture composition. The signature features of a particular mixture were shaped by the individual constituent signatures. It was also uncovered that the baseline signature was modified after an experiment due to coating of unreacted residue on the substrate surface and a change in the reactor sphere oxide layer. Thus, care was required to pre-oxidize the sphere prior to an experiment. A minimum sample mass (which was dependent on composition) was required to detect the signature characteristics. Increased laser power served to magnify signal strength while preserving the signature features. For the mixtures examined, the thermal

  2. Cubic Bezier Curve Approach for Automated Offline Signature Verification with Intrusion Identification

    Directory of Open Access Journals (Sweden)

    Arun Vijayaragavan

    2014-01-01

    Full Text Available Authentication is a process of identifying person’s rights over a system. Many authentication types are used in various systems, wherein biometrics authentication systems are of a special concern. Signature verification is a basic biometric authentication technique used widely. The signature matching algorithm uses image correlation and graph matching technique which provides false rejection or acceptance. We proposed a model to compare knowledge from signature. Intrusion in the signature repository system results in copy of the signature that leads to false acceptance. Our approach uses a Bezier curve algorithm to identify the curve points and uses the behaviors of the signature for verification. An analyzing mobile agent is used to identify the input signature parameters and compare them with reference signature repository. It identifies duplication of signature over intrusion and rejects it. Experiments are conducted on a database with thousands of signature images from various sources and the results are favorable.

  3. 27 CFR 70.52 - Signature presumed authentic.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false Signature presumed authentic. 70.52 Section 70.52 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE... Collection of Excise and Special (Occupational) Tax Collection-General Provisions § 70.52 Signature presumed...

  4. 13 CFR 134.209 - Requirement of signature.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Requirement of signature. 134.209 Section 134.209 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION RULES OF PROCEDURE GOVERNING... of signature. Every written submission to OHA, other than evidence, must be signed by the party...

  5. Electronic Signature (eSig)

    Data.gov (United States)

    Department of Veterans Affairs — Beginning with the Government Paperwork Elimination Act of 1998 (GPEA), the Federal government has encouraged the use of electronic / digital signatures to enable...

  6. Radar Signature Calculation Facility

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: The calculation, analysis, and visualization of the spatially extended radar signatures of complex objects such as ships in a sea multipath environment and...

  7. Uncertainty in hydrological signatures for gauged and ungauged catchments

    Science.gov (United States)

    Westerberg, Ida K.; Wagener, Thorsten; Coxon, Gemma; McMillan, Hilary K.; Castellarin, Attilio; Montanari, Alberto; Freer, Jim

    2016-03-01

    Reliable information about hydrological behavior is needed for water-resource management and scientific investigations. Hydrological signatures quantify catchment behavior as index values, and can be predicted for ungauged catchments using a regionalization procedure. The prediction reliability is affected by data uncertainties for the gauged catchments used in prediction and by uncertainties in the regionalization procedure. We quantified signature uncertainty stemming from discharge data uncertainty for 43 UK catchments and propagated these uncertainties in signature regionalization, while accounting for regionalization uncertainty with a weighted-pooling-group approach. Discharge uncertainty was estimated using Monte Carlo sampling of multiple feasible rating curves. For each sampled rating curve, a discharge time series was calculated and used in deriving the gauged signature uncertainty distribution. We found that the gauged uncertainty varied with signature type, local measurement conditions and catchment behavior, with the highest uncertainties (median relative uncertainty ±30-40% across all catchments) for signatures measuring high- and low-flow magnitude and dynamics. Our regionalization method allowed assessing the role and relative magnitudes of the gauged and regionalized uncertainty sources in shaping the signature uncertainty distributions predicted for catchments treated as ungauged. We found that (1) if the gauged uncertainties were neglected there was a clear risk of overconditioning the regionalization inference, e.g., by attributing catchment differences resulting from gauged uncertainty to differences in catchment behavior, and (2) uncertainty in the regionalization results was lower for signatures measuring flow distribution (e.g., mean flow) than flow dynamics (e.g., autocorrelation), and for average flows (and then high flows) compared to low flows.

  8. ADAGE signature analysis: differential expression analysis with data-defined gene sets.

    Science.gov (United States)

    Tan, Jie; Huyck, Matthew; Hu, Dongbo; Zelaya, René A; Hogan, Deborah A; Greene, Casey S

    2017-11-22

    Gene set enrichment analysis and overrepresentation analyses are commonly used methods to determine the biological processes affected by a differential expression experiment. This approach requires biologically relevant gene sets, which are currently curated manually, limiting their availability and accuracy in many organisms without extensively curated resources. New feature learning approaches can now be paired with existing data collections to directly extract functional gene sets from big data. Here we introduce a method to identify perturbed processes. In contrast with methods that use curated gene sets, this approach uses signatures extracted from public expression data. We first extract expression signatures from public data using ADAGE, a neural network-based feature extraction approach. We next identify signatures that are differentially active under a given treatment. Our results demonstrate that these signatures represent biological processes that are perturbed by the experiment. Because these signatures are directly learned from data without supervision, they can identify uncurated or novel biological processes. We implemented ADAGE signature analysis for the bacterial pathogen Pseudomonas aeruginosa. For the convenience of different user groups, we implemented both an R package (ADAGEpath) and a web server ( http://adage.greenelab.com ) to run these analyses. Both are open-source to allow easy expansion to other organisms or signature generation methods. We applied ADAGE signature analysis to an example dataset in which wild-type and ∆anr mutant cells were grown as biofilms on the Cystic Fibrosis genotype bronchial epithelial cells. We mapped active signatures in the dataset to KEGG pathways and compared with pathways identified using GSEA. The two approaches generally return consistent results; however, ADAGE signature analysis also identified a signature that revealed the molecularly supported link between the MexT regulon and Anr. We designed

  9. Recognition of Frequency Modulated Whistle-Like Sounds by a Bottlenose Dolphin (Tursiops truncatus) and Humans with Transformations in Amplitude, Duration and Frequency

    Science.gov (United States)

    Branstetter, Brian K.; DeLong, Caroline M.; Dziedzic, Brandon; Black, Amy; Bakhtiari, Kimberly

    2016-01-01

    Bottlenose dolphins (Tursiops truncatus) use the frequency contour of whistles produced by conspecifics for individual recognition. Here we tested a bottlenose dolphin’s (Tursiops truncatus) ability to recognize frequency modulated whistle-like sounds using a three alternative matching-to-sample paradigm. The dolphin was first trained to select a specific object (object A) in response to a specific sound (sound A) for a total of three object-sound associations. The sounds were then transformed by amplitude, duration, or frequency transposition while still preserving the frequency contour of each sound. For comparison purposes, 30 human participants completed an identical task with the same sounds, objects, and training procedure. The dolphin’s ability to correctly match objects to sounds was robust to changes in amplitude with only a minor decrement in performance for short durations. The dolphin failed to recognize sounds that were frequency transposed by plus or minus ½ octaves. Human participants demonstrated robust recognition with all acoustic transformations. The results indicate that this dolphin’s acoustic recognition of whistle-like sounds was constrained by absolute pitch. Unlike human speech, which varies considerably in average frequency, signature whistles are relatively stable in frequency, which may have selected for a whistle recognition system invariant to frequency transposition. PMID:26863519

  10. Recognition of Frequency Modulated Whistle-Like Sounds by a Bottlenose Dolphin (Tursiops truncatus and Humans with Transformations in Amplitude, Duration and Frequency.

    Directory of Open Access Journals (Sweden)

    Brian K Branstetter

    Full Text Available Bottlenose dolphins (Tursiops truncatus use the frequency contour of whistles produced by conspecifics for individual recognition. Here we tested a bottlenose dolphin's (Tursiops truncatus ability to recognize frequency modulated whistle-like sounds using a three alternative matching-to-sample paradigm. The dolphin was first trained to select a specific object (object A in response to a specific sound (sound A for a total of three object-sound associations. The sounds were then transformed by amplitude, duration, or frequency transposition while still preserving the frequency contour of each sound. For comparison purposes, 30 human participants completed an identical task with the same sounds, objects, and training procedure. The dolphin's ability to correctly match objects to sounds was robust to changes in amplitude with only a minor decrement in performance for short durations. The dolphin failed to recognize sounds that were frequency transposed by plus or minus ½ octaves. Human participants demonstrated robust recognition with all acoustic transformations. The results indicate that this dolphin's acoustic recognition of whistle-like sounds was constrained by absolute pitch. Unlike human speech, which varies considerably in average frequency, signature whistles are relatively stable in frequency, which may have selected for a whistle recognition system invariant to frequency transposition.

  11. Advanced Missile Signature Center

    Data.gov (United States)

    Federal Laboratory Consortium — The Advanced Missile Signature Center (AMSC) is a national facility supporting the Missile Defense Agency (MDA) and other DoD programs and customers with analysis,...

  12. 25 CFR 117.33 - Signature of illiterates.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Signature of illiterates. 117.33 Section 117.33 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR FINANCIAL ACTIVITIES DEPOSIT AND EXPENDITURE OF... Signature of illiterates. An Indian who cannot write shall be required to endorse checks payable to his...

  13. 12 CFR 350.6 - Signature and attestation.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Signature and attestation. 350.6 Section 350.6 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY DISCLOSURE OF FINANCIAL AND OTHER INFORMATION BY FDIC-INSURED STATE NONMEMBER BANKS § 350.6 Signature and...

  14. The Electrophysiological Signature of Remember-Know Is Confounded with Memory Strength and Cannot Be Interpreted as Evidence for Dual-process Theory of Recognition.

    Science.gov (United States)

    Brezis, Noam; Bronfman, Zohar Z; Yovel, Galit; Goshen-Gottstein, Yonatan

    2017-02-01

    The quantity and nature of the processes underlying recognition memory remains an open question. A majority of behavioral, neuropsychological, and brain studies have suggested that recognition memory is supported by two dissociable processes: recollection and familiarity. It has been conversely argued, however, that recollection and familiarity map onto a single continuum of mnemonic strength and hence that recognition memory is mediated by a single process. Previous electrophysiological studies found marked dissociations between recollection and familiarity, which have been widely held as corroborating the dual-process account. However, it remains unknown whether a strength interpretation can likewise apply for these findings. Here we describe an ERP study, using a modified remember-know (RK) procedure, which allowed us to control for mnemonic strength. We find that ERPs of high and low mnemonic strength mimicked the electrophysiological distinction between R and K responses, in a lateral positive component (LPC), 500-1000 msec poststimulus onset. Critically, when contrasting strength with RK experience, by comparing weak R to strong K responses, the electrophysiological signal mapped onto strength, not onto subjective RK experience. Invoking the LPC as support for dual-process accounts may, therefore, be amiss.

  15. Quantum dual signature scheme based on coherent states with entanglement swapping

    International Nuclear Information System (INIS)

    Liu Jia-Li; Shi Rong-Hua; Shi Jin-Jing; Lv Ge-Li; Guo Ying

    2016-01-01

    A novel quantum dual signature scheme, which combines two signed messages expected to be sent to two diverse receivers Bob and Charlie, is designed by applying entanglement swapping with coherent states. The signatory Alice signs two different messages with unitary operations (corresponding to the secret keys) and applies entanglement swapping to generate a quantum dual signature. The dual signature is firstly sent to the verifier Bob who extracts and verifies the signature of one message and transmits the rest of the dual signature to the verifier Charlie who verifies the signature of the other message. The transmission of the dual signature is realized with quantum teleportation of coherent states. The analysis shows that the security of secret keys and the security criteria of the signature protocol can be greatly guaranteed. An extensional multi-party quantum dual signature scheme which considers the case with more than three participants is also proposed in this paper and this scheme can remain secure. The proposed schemes are completely suited for the quantum communication network including multiple participants and can be applied to the e-commerce system which requires a secure payment among the customer, business and bank. (paper)

  16. Real-Time Capable Micro-Doppler Signature Decomposition of Walking Human Limbs

    OpenAIRE

    Abdulatif, Sherif; Aziz, Fady; Kleiner, Bernhard; Schneider, Urs

    2017-01-01

    Unique micro-Doppler signature ($\\boldsymbol{\\mu}$-D) of a human body motion can be analyzed as the superposition of different body parts $\\boldsymbol{\\mu}$-D signatures. Extraction of human limbs $\\boldsymbol{\\mu}$-D signatures in real-time can be used to detect, classify and track human motion especially for safety application. In this paper, two methods are combined to simulate $\\boldsymbol{\\mu}$-D signatures of a walking human. Furthermore, a novel limbs $\\mu$-D signature time independent...

  17. 17 CFR 201.153 - Filing of papers: Signature requirement and effect.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Filing of papers: Signature... COMMISSION RULES OF PRACTICE Rules of Practice General Rules § 201.153 Filing of papers: Signature... telephone number on every filing. (b) Effect of signature. (1) The signature of a counsel or party shall...

  18. A Secure and Efficient Certificateless Short Signature Scheme

    Directory of Open Access Journals (Sweden)

    Lin Cheng

    2013-07-01

    Full Text Available Certificateless public key cryptography combines advantage of traditional public key cryptography and identity-based public key cryptography as it avoids usage of certificates and resolves the key escrow problem. In 2007, Huang et al. classified adversaries against certificateless signatures according to their attack power into normal, strong and super adversaries (ordered by their attack power. In this paper, we propose a new certificateless short signature scheme and prove that it is secure against both of the super type I and the super type II adversaries. Our new scheme not only achieves the strongest security level but also has the shortest signature length (one group element. Compared with the other short certificateless signature schemes which have a similar security level, our new scheme has less operation cost.

  19. ANALYSIS OF DIGITAL SIGNATURE RULE IN THE ELECTRONIC COMMERCE LAW OF INDONESIA

    Directory of Open Access Journals (Sweden)

    Irna Nurhayati

    2015-02-01

    Full Text Available The Indonesian legislature has enacted the Information and Electronic Transaction Bill (the Bill in 2003, in which digital signature as a technology specific electronic (e commerce has been promoted. The promotion of digital signature is still problematic, since there is an uncertainty whether Indonesia can develop well a required viable technology of digital signature. Moreover, there is a gap between the actual use of digital signature and the projections of future utilization of digital signature by interested parties on e-commerce. This paper will discuss the reason of the Indonesian legislature promotes digital signature. It will then analyse the gap between the actual use of digital signature and the projections of future utilization of digital signature by interested parties on e-commerce. This paper will finally argue whether the promotion of digital signature of the Bill is useful for the growth of e-commerce in Indonesia.

  20. 12 CFR 18.6 - Signature and attestation.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Signature and attestation. 18.6 Section 18.6 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY DISCLOSURE OF FINANCIAL AND OTHER INFORMATION BY NATIONAL BANKS § 18.6 Signature and attestation. A duly authorized officer of the...

  1. Does Social Work Have a Signature Pedagogy?

    Science.gov (United States)

    Earls Larrison, Tara; Korr, Wynne S.

    2013-01-01

    This article contributes to discourse on signature pedagogy by reconceptualizing how our pedagogies are understood and defined for social work education. We critique the view that field education is social work's signature pedagogy and consider what pedagogies are distinct about the teaching and learning of social work. Using Shulman's…

  2. Improvement of a Quantum Proxy Blind Signature Scheme

    Science.gov (United States)

    Zhang, Jia-Lei; Zhang, Jian-Zhong; Xie, Shu-Cui

    2018-06-01

    Improvement of a quantum proxy blind signature scheme is proposed in this paper. Six-qubit entangled state functions as quantum channel. In our scheme, a trust party Trent is introduced so as to avoid David's dishonest behavior. The receiver David verifies the signature with the help of Trent in our scheme. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, delegation, signature and verification. Security analysis proves that our scheme has the properties of undeniability, unforgeability, anonymity and can resist some common attacks.

  3. The Pedagogic Signature of the Teaching Profession

    Science.gov (United States)

    Kiel, Ewald; Lerche, Thomas; Kollmannsberger, Markus; Oubaid, Viktor; Weiss, Sabine

    2016-01-01

    Lee S. Shulman deplores that the field of education as a profession does not have a pedagogic signature, which he characterizes as a synthesis of cognitive, practical and moral apprenticeship. In this context, the following study has three goals: 1) In the first theoretical part, the basic problems of constructing a pedagogic signature are…

  4. Efficient Fair Exchange from Identity-Based Signature

    Science.gov (United States)

    Yum, Dae Hyun; Lee, Pil Joong

    A fair exchange scheme is a protocol by which two parties Alice and Bob exchange items or services without allowing either party to gain advantages by quitting prematurely or otherwise misbehaving. To this end, modern cryptographic solutions use a semi-trusted arbitrator who involves only in cases where one party attempts to cheat or simply crashes. We call such a fair exchange scheme optimistic. When no registration is required between the signer and the arbitrator, we say that the fair exchange scheme is setup free. To date, the setup-free optimist fair exchange scheme under the standard RSA assumption was only possible from the generic construction of [12], which uses ring signatures. In this paper, we introduce a new setup-free optimistic fair exchange scheme under the standard RSA assumption. Our scheme uses the GQ identity-based signature and is more efficient than [12]. The construction can also be generalized by using various identity-based signature schemes. Our main technique is to allow each user to choose his (or her) own “random” public key in the identitybased signature scheme.

  5. Analysis of Non-contact Acousto Thermal Signature Data (Postprint)

    Science.gov (United States)

    2016-02-01

    AFRL-RX-WP-JA-2016-0321 ANALYSIS OF NON-CONTACT ACOUSTO-THERMAL SIGNATURE DATA (POSTPRINT) Amanda K. Criner AFRL/RX...October 2014 – 16 September 2015 4. TITLE AND SUBTITLE ANALYSIS OF NON-CONTACT ACOUSTO-THERMAL SIGNATURE DATA (POSTPRINT) 5a. CONTRACT NUMBER...words) The non-contact acousto-thermal signature (NCATS) is a nondestructive evaluation technique with potential to detect fatigue in materials such as

  6. Automated defect spatial signature analysis for semiconductor manufacturing process

    Science.gov (United States)

    Tobin, Jr., Kenneth W.; Gleason, Shaun S.; Karnowski, Thomas P.; Sari-Sarraf, Hamed

    1999-01-01

    An apparatus and method for performing automated defect spatial signature alysis on a data set representing defect coordinates and wafer processing information includes categorizing data from the data set into a plurality of high level categories, classifying the categorized data contained in each high level category into user-labeled signature events, and correlating the categorized, classified signature events to a present or incipient anomalous process condition.

  7. Familiar Person Recognition: Is Autonoetic Consciousness More Likely to Accompany Face Recognition Than Voice Recognition?

    Science.gov (United States)

    Barsics, Catherine; Brédart, Serge

    2010-11-01

    Autonoetic consciousness is a fundamental property of human memory, enabling us to experience mental time travel, to recollect past events with a feeling of self-involvement, and to project ourselves in the future. Autonoetic consciousness is a characteristic of episodic memory. By contrast, awareness of the past associated with a mere feeling of familiarity or knowing relies on noetic consciousness, depending on semantic memory integrity. Present research was aimed at evaluating whether conscious recollection of episodic memories is more likely to occur following the recognition of a familiar face than following the recognition of a familiar voice. Recall of semantic information (biographical information) was also assessed. Previous studies that investigated the recall of biographical information following person recognition used faces and voices of famous people as stimuli. In this study, the participants were presented with personally familiar people's voices and faces, thus avoiding the presence of identity cues in the spoken extracts and allowing a stricter control of frequency exposure with both types of stimuli (voices and faces). In the present study, the rate of retrieved episodic memories, associated with autonoetic awareness, was significantly higher from familiar faces than familiar voices even though the level of overall recognition was similar for both these stimuli domains. The same pattern was observed regarding semantic information retrieval. These results and their implications for current Interactive Activation and Competition person recognition models are discussed.

  8. 37 CFR 1.4 - Nature of correspondence and signature requirements.

    Science.gov (United States)

    2010-07-01

    ... signature requirements. 1.4 Section 1.4 Patents, Trademarks, and Copyrights UNITED STATES PATENT AND... General Information and Correspondence § 1.4 Nature of correspondence and signature requirements. (a...) Handwritten signature. Each piece of correspondence, except as provided in paragraphs (d)(2), (d)(3), (e) and...

  9. Searches with long-lived or unusual signatures

    CERN Document Server

    Haug, S; The ATLAS collaboration

    2013-01-01

    We present recent ATLAS and CMS results from searches with long-lived and unusual signatures. They are based on analysis of LHC proton-proton collisions at center of mass energies at 7 and 8 TeV. Long-lived and heavy particles may cause peculiar signatures in the detectors, but are in several Standard Model extensions well motivated.

  10. A Methodology for Calculating Radiation Signatures

    Energy Technology Data Exchange (ETDEWEB)

    Klasky, Marc Louis [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Wilcox, Trevor [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Bathke, Charles G. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); James, Michael R. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-05-01

    A rigorous formalism is presented for calculating radiation signatures from both Special Nuclear Material (SNM) as well as radiological sources. The use of MCNP6 in conjunction with CINDER/ORIGEN is described to allow for the determination of both neutron and photon leakages from objects of interest. In addition, a description of the use of MCNP6 to properly model the background neutron and photon sources is also presented. Examinations of the physics issues encountered in the modeling are investigated so as to allow for guidance in the user discerning the relevant physics to incorporate into general radiation signature calculations. Furthermore, examples are provided to assist in delineating the pertinent physics that must be accounted for. Finally, examples of detector modeling utilizing MCNP are provided along with a discussion on the generation of Receiver Operating Curves, which are the suggested means by which to determine detectability radiation signatures emanating from objects.

  11. Selection signatures in worldwide sheep populations.

    Science.gov (United States)

    Fariello, Maria-Ines; Servin, Bertrand; Tosser-Klopp, Gwenola; Rupp, Rachel; Moreno, Carole; San Cristobal, Magali; Boitard, Simon

    2014-01-01

    The diversity of populations in domestic species offers great opportunities to study genome response to selection. The recently published Sheep HapMap dataset is a great example of characterization of the world wide genetic diversity in sheep. In this study, we re-analyzed the Sheep HapMap dataset to identify selection signatures in worldwide sheep populations. Compared to previous analyses, we made use of statistical methods that (i) take account of the hierarchical structure of sheep populations, (ii) make use of linkage disequilibrium information and (iii) focus specifically on either recent or older selection signatures. We show that this allows pinpointing several new selection signatures in the sheep genome and distinguishing those related to modern breeding objectives and to earlier post-domestication constraints. The newly identified regions, together with the ones previously identified, reveal the extensive genome response to selection on morphology, color and adaptation to new environments.

  12. Treatment-independent miRNA signature in blood of wilms tumor patients

    Directory of Open Access Journals (Sweden)

    Schmitt Jana

    2012-08-01

    Full Text Available Abstract Background Blood-born miRNA signatures have recently been reported for various tumor diseases. Here, we compared the miRNA signature in Wilms tumor patients prior and after preoperative chemotherapy according to SIOP protocol 2001. Results We did not find a significant difference between miRNA signature of both groups. However both, Wilms tumor patients prior and after chemotherapy showed a miRNA signature different from healthy controls. The signature of Wilms tumor patients prior to chemotherapy showed an accuracy of 97.5% and of patients after chemotherapy an accuracy of 97.0%, each as compared to healthy controls. Conclusion Our results provide evidence for a blood-born Wilms tumor miRNA signature largely independent of four weeks preoperative chemotherapy treatment.

  13. Calculated NWIS signatures for enriched uranium metal

    International Nuclear Information System (INIS)

    Valentine, T.E.; Mihalczo, J.T.; Koehler, P.E.

    1995-01-01

    Nuclear Weapons Identification System (NWIS) signatures have been calculated using a Monte Carlo transport code for measurement configurations of a 252 Cf source, detectors, and a uranium metal casting. NWIS signatures consist of a wide variety of time-and frequency-analysis signatures such as the time distribution of neutrons after californium fission, the time distribution of counts in a detector after a previous count, the number of times n pulses occur in a time interval, and various frequency-analysis signatures, such as auto-power and cross-power spectral densities, coherences, and a ratio of spectral densities. This ratio is independent of detection efficiency. The analysis presented here, using the MCNP-DSP code, evaluates the applicability of this method for measurement of the 235 U content of 19-kg castings of depleted uranium and uranium with enrichments of 20, 40, 60, 80, 90, and 93.2 wt % 235 U. The dependence of the wide variety of NWIS signatures on 235 U content and possible configurations of a measurement system are presented. These preliminary calculations indicate short measurement times. Additional calculations are being performed to optimize the source-detector-moderator-casting configuration for the shortest measurement time. Although the NWIS method was developed for nuclear weapons identification, the development of a small processor now allows it to be also applied in a practical way to subcriticality measurements, nuclear fuel process monitoring and qualitative nondestructive assay of special nuclear material

  14. 46 CFR 2.01-30 - Delegation of OCMI signature authority.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Delegation of OCMI signature authority. 2.01-30 Section... VESSEL INSPECTIONS Inspecting and Certificating of Vessels § 2.01-30 Delegation of OCMI signature authority. The Officer in Charge, Marine Inspection, may redelegate signature authority for documents issued...

  15. [Prosopagnosia and facial expression recognition].

    Science.gov (United States)

    Koyama, Shinichi

    2014-04-01

    This paper reviews clinical neuropsychological studies that have indicated that the recognition of a person's identity and the recognition of facial expressions are processed by different cortical and subcortical areas of the brain. The fusiform gyrus, especially the right fusiform gyrus, plays an important role in the recognition of identity. The superior temporal sulcus, amygdala, and medial frontal cortex play important roles in facial-expression recognition. Both facial recognition and facial-expression recognition are highly intellectual processes that involve several regions of the brain.

  16. 7 CFR 1956.68 - Compromise or adjustment without debtor's signature.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 14 2010-01-01 2009-01-01 true Compromise or adjustment without debtor's signature... Loan Programs and Multi-Family Housing § 1956.68 Compromise or adjustment without debtor's signature... made to obtain the debtor's signature and the date(s) of such effort. (c) The specific reasons why it...

  17. Quantum dual signature scheme based on coherent states with entanglement swapping

    Science.gov (United States)

    Liu, Jia-Li; Shi, Rong-Hua; Shi, Jin-Jing; Lv, Ge-Li; Guo, Ying

    2016-08-01

    A novel quantum dual signature scheme, which combines two signed messages expected to be sent to two diverse receivers Bob and Charlie, is designed by applying entanglement swapping with coherent states. The signatory Alice signs two different messages with unitary operations (corresponding to the secret keys) and applies entanglement swapping to generate a quantum dual signature. The dual signature is firstly sent to the verifier Bob who extracts and verifies the signature of one message and transmits the rest of the dual signature to the verifier Charlie who verifies the signature of the other message. The transmission of the dual signature is realized with quantum teleportation of coherent states. The analysis shows that the security of secret keys and the security criteria of the signature protocol can be greatly guaranteed. An extensional multi-party quantum dual signature scheme which considers the case with more than three participants is also proposed in this paper and this scheme can remain secure. The proposed schemes are completely suited for the quantum communication network including multiple participants and can be applied to the e-commerce system which requires a secure payment among the customer, business and bank. Project supported by the National Natural Science Foundation of China (Grant Nos. 61272495, 61379153, and 61401519) and the Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20130162110012).

  18. Pattern recognition with magnonic holographic memory device

    International Nuclear Information System (INIS)

    Kozhevnikov, A.; Dudko, G.; Filimonov, Y.; Gertz, F.; Khitun, A.

    2015-01-01

    In this work, we present experimental data demonstrating the possibility of using magnonic holographic devices for pattern recognition. The prototype eight-terminal device consists of a magnetic matrix with micro-antennas placed on the periphery of the matrix to excite and detect spin waves. The principle of operation is based on the effect of spin wave interference, which is similar to the operation of optical holographic devices. Input information is encoded in the phases of the spin waves generated on the edges of the magnonic matrix, while the output corresponds to the amplitude of the inductive voltage produced by the interfering spin waves on the other side of the matrix. The level of the output voltage depends on the combination of the input phases as well as on the internal structure of the magnonic matrix. Experimental data collected for several magnonic matrixes show the unique output signatures in which maxima and minima correspond to specific input phase patterns. Potentially, magnonic holographic devices may provide a higher storage density compare to optical counterparts due to a shorter wavelength and compatibility with conventional electronic devices. The challenges and shortcoming of the magnonic holographic devices are also discussed

  19. Methyl-CpG island-associated genome signature tags

    Science.gov (United States)

    Dunn, John J

    2014-05-20

    Disclosed is a method for analyzing the organismic complexity of a sample through analysis of the nucleic acid in the sample. In the disclosed method, through a series of steps, including digestion with a type II restriction enzyme, ligation of capture adapters and linkers and digestion with a type IIS restriction enzyme, genome signature tags are produced. The sequences of a statistically significant number of the signature tags are determined and the sequences are used to identify and quantify the organisms in the sample. Various embodiments of the invention described herein include methods for using single point genome signature tags to analyze the related families present in a sample, methods for analyzing sequences associated with hyper- and hypo-methylated CpG islands, methods for visualizing organismic complexity change in a sampling location over time and methods for generating the genome signature tag profile of a sample of fragmented DNA.

  20. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  1. Cryptanalysis of the arbitrated quantum signature protocols

    International Nuclear Information System (INIS)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-01-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  2. Biomarker Gene Signature Discovery Integrating Network Knowledge

    Directory of Open Access Journals (Sweden)

    Holger Fröhlich

    2012-02-01

    Full Text Available Discovery of prognostic and diagnostic biomarker gene signatures for diseases, such as cancer, is seen as a major step towards a better personalized medicine. During the last decade various methods, mainly coming from the machine learning or statistical domain, have been proposed for that purpose. However, one important obstacle for making gene signatures a standard tool in clinical diagnosis is the typical low reproducibility of these signatures combined with the difficulty to achieve a clear biological interpretation. For that purpose in the last years there has been a growing interest in approaches that try to integrate information from molecular interaction networks. Here we review the current state of research in this field by giving an overview about so-far proposed approaches.

  3. An Efficient Identity-Based Proxy Blind Signature for Semioffline Services

    Directory of Open Access Journals (Sweden)

    Hongfei Zhu

    2018-01-01

    Full Text Available Fog computing extends the cloud computing to the network edge and allows deploying a new type of semioffline services, which can provide real-time transactions between two entities, while the central cloud server is offline and network edge devices are online. For an e-payment system and e-voting with such feature, proxy blind signature is a cornerstone to protect users’ privacy. However, the signature based on number theorem, such as hard mathematical problems on factoring problem, discrete logarithm problem, and bilinear pairings, cannot defeat quantum computers attack. Meanwhile, these schemes need to depend on complex public key infrastructure. Thus, we construct an identity-based proxy blind signature scheme based on number theorem research unit lattice, which can defeat quantum computers attack and does not need to depend on public key infrastructure. The security of the proposed scheme is dependent on Ring-Small Integer Solution problem over number theorem research unit lattice. The proposed scheme meets the properties of blind signature and proxy signature. Then we compare the proposed scheme with other existing proxy blind signature schemes; the result shows that the proposed scheme outperforms ZM scheme except in proxy signer’s signature size and can be more secure than TA scheme and MMHP scheme.

  4. Forged Signature Distinction Using Convolutional Neural Network for Feature Extraction

    Directory of Open Access Journals (Sweden)

    Seungsoo Nam

    2018-01-01

    Full Text Available This paper proposes a dynamic verification scheme for finger-drawn signatures in smartphones. As a dynamic feature, the movement of a smartphone is recorded with accelerometer sensors in the smartphone, in addition to the moving coordinates of the signature. To extract high-level longitudinal and topological features, the proposed scheme uses a convolution neural network (CNN for feature extraction, and not as a conventional classifier. We assume that a CNN trained with forged signatures can extract effective features (called S-vector, which are common in forging activities such as hesitation and delay before drawing the complicated part. The proposed scheme also exploits an autoencoder (AE as a classifier, and the S-vector is used as the input vector to the AE. An AE has high accuracy for the one-class distinction problem such as signature verification, and is also greatly dependent on the accuracy of input data. S-vector is valuable as the input of AE, and, consequently, could lead to improved verification accuracy especially for distinguishing forged signatures. Compared to the previous work, i.e., the MLP-based finger-drawn signature verification scheme, the proposed scheme decreases the equal error rate by 13.7%, specifically, from 18.1% to 4.4%, for discriminating forged signatures.

  5. Signature Pedagogies for E-Learning in Higher Education and Beyond

    Science.gov (United States)

    Eaton, Sarah Elaine; Brown, Barbara; Schroeder, Meadow; Lock, Jennifer; Jacobsen, Michele

    2017-01-01

    Purpose: This report explores the notion of signature pedagogies within the field of e-learning for higher education. Methodology: We build on previous work that examined signature pedagogies in education, linking the concepts of signature pedagogies, the profession of education and e-learning as a means to help educators develop their practice…

  6. Provably Secure and Subliminal-Free Variant of Schnorr Signature

    OpenAIRE

    Zhang , Yinghui; Li , Hui; Li , Xiaoqing; Zhu , Hui

    2013-01-01

    Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES); International audience; Subliminal channels present a severe challenge to information security. Currently, subliminal channels still exist in Schnorr signature. In this paper, we propose a subliminal-free variant of Schnorr signature. In the proposed scheme, an honest-but-curious warden is introduced to help the signer to generate a signature on a given message, but it is disallowed to sign messages independently. ...

  7. Pupil dilation during recognition memory: Isolating unexpected recognition from judgment uncertainty.

    Science.gov (United States)

    Mill, Ravi D; O'Connor, Akira R; Dobbins, Ian G

    2016-09-01

    Optimally discriminating familiar from novel stimuli demands a decision-making process informed by prior expectations. Here we demonstrate that pupillary dilation (PD) responses during recognition memory decisions are modulated by expectations, and more specifically, that pupil dilation increases for unexpected compared to expected recognition. Furthermore, multi-level modeling demonstrated that the time course of the dilation during each individual trial contains separable early and late dilation components, with the early amplitude capturing unexpected recognition, and the later trailing slope reflecting general judgment uncertainty or effort. This is the first demonstration that the early dilation response during recognition is dependent upon observer expectations and that separate recognition expectation and judgment uncertainty components are present in the dilation time course of every trial. The findings provide novel insights into adaptive memory-linked orienting mechanisms as well as the general cognitive underpinnings of the pupillary index of autonomic nervous system activity. Copyright © 2016 Elsevier B.V. All rights reserved.

  8. Serum reactome induced by Bordetella pertussis infection and Pertussis vaccines: qualitative differences in serum antibody recognition patterns revealed by peptide microarray analysis.

    Science.gov (United States)

    Valentini, Davide; Ferrara, Giovanni; Advani, Reza; Hallander, Hans O; Maeurer, Markus J

    2015-07-01

    Pertussis (whooping cough) remains a public health problem despite extensive vaccination strategies. Better understanding of the host-pathogen interaction and the detailed B. pertussis (Bp) target recognition pattern will help in guided vaccine design. We characterized the specific epitope antigen recognition profiles of serum antibodies ('the reactome') induced by whooping cough and B. pertussis (Bp) vaccines from a case-control study conducted in 1996 in infants enrolled in a Bp vaccine trial in Sweden (Gustafsson, NEJM, 1996, 334, 349-355). Sera from children with whooping cough, vaccinated with Diphtheria Tetanus Pertussis (DTP) whole-cell (wc), acellular 5 (DPTa5), or with the 2 component (a2) vaccines and from infants receiving only DT (n=10 for each group) were tested with high-content peptide microarrays containing 17 Bp proteins displayed as linear (n=3175) peptide stretches. Slides were incubated with serum and peptide-IgG complexes detected with Cy5-labeled goat anti-human IgG and analyzed using a GenePix 4000B microarray scanner, followed by statistical analysis, using PAM (Prediction Analysis for Microarrays) and the identification of uniquely recognized peptide epitopes. 367/3,085 (11.9%) peptides were recognized in 10/10 sera from children with whooping cough, 239 (7.7%) in DTPwc, 259 (8.4%) in DTPa5, 105 (3.4%) DTPa2, 179 (5.8%) in the DT groups. Recognition of strongly recognized peptides was similar between whooping cough and DPTwc, but statistically different between whooping cough vs. DTPa5 (p<0.05), DTPa2 and DT (p<0.001 vs. both) vaccines. 6/3,085 and 2/3,085 peptides were exclusively recognized in (10/10) sera from children with whooping cough and DTPa2 vaccination, respectively. DTPwc resembles more closely the whooping cough reactome as compared to acellular vaccines. We could identify a unique recognition signature common for each vaccination group (10/10 children). Peptide microarray technology allows detection of subtle differences in

  9. Secure Mobile Agent from Leakage-Resilient Proxy Signatures

    Directory of Open Access Journals (Sweden)

    Fei Tang

    2015-01-01

    Full Text Available A mobile agent can sign a message in a remote server on behalf of a customer without exposing its secret key; it can be used not only to search for special products or services, but also to make a contract with a remote server. Hence a mobile agent system can be used for electronic commerce as an important key technology. In order to realize such a system, Lee et al. showed that a secure mobile agent can be constructed using proxy signatures. Intuitively, a proxy signature permits an entity (delegator to delegate its signing right to another entity (proxy to sign some specified messages on behalf of the delegator. However, the proxy signatures are often used in scenarios where the signing is done in an insecure environment, for example, the remote server of a mobile agent system. In such setting, an adversary could launch side-channel attacks to exploit some leakage information about the proxy key or even other secret states. The proxy signatures which are secure in the traditional security models obviously cannot provide such security. Based on this consideration, in this paper, we design a leakage-resilient proxy signature scheme for the secure mobile agent systems.

  10. Digital signature feasibility study

    Science.gov (United States)

    2008-06-01

    The purpose of this study was to assess the advantages and disadvantages of using digital signatures to assist the Arizona Department of Transportation in conducting business. The Department is evaluating the potential of performing more electronic t...

  11. Tumor Microenvironment Gene Signature as a Prognostic Classifier and Therapeutic Target

    Science.gov (United States)

    2016-06-01

    AWARD NUMBER: W81XWH-14-1-0107 TITLE: Tumor Microenvironment Gene Signature as a Prognostic Classifier and Therapeutic Target PRINCIPAL...AND SUBTITLE Tumor Microenvironment Gene Signature as a 5a. CONTRACT NUMBER W81XWH-14-1-0107 Prognostic Classifier and Therapeutic Target 5b...gene signature that correlates with poor survival in ovarian cancer patients. We are refining this gene signature to develop biomarkers for the

  12. Methods and apparatus for multi-parameter acoustic signature inspection

    Energy Technology Data Exchange (ETDEWEB)

    Diaz, Aaron A [Richland, WA; Samuel, Todd J [Pasco, WA; Valencia, Juan D [Kennewick, WA; Gervais, Kevin L [Richland, WA; Tucker, Brian J [Pasco, WA; Kirihara, Leslie J [Richland, WA; Skorpik, James R [Kennewick, WA; Reid, Larry D [Benton City, WA; Munley, John T [Benton City, WA; Pappas, Richard A [Richland, WA; Wright, Bob W [West Richland, WA; Panetta, Paul D [Richland, WA; Thompson, Jason S [Richland, WA

    2007-07-24

    A multiparameter acoustic signature inspection device and method are described for non-invasive inspection of containers. Dual acoustic signatures discriminate between various fluids and materials for identification of the same.

  13. Kernel learning algorithms for face recognition

    CERN Document Server

    Li, Jun-Bao; Pan, Jeng-Shyang

    2013-01-01

    Kernel Learning Algorithms for Face Recognition covers the framework of kernel based face recognition. This book discusses the advanced kernel learning algorithms and its application on face recognition. This book also focuses on the theoretical deviation, the system framework and experiments involving kernel based face recognition. Included within are algorithms of kernel based face recognition, and also the feasibility of the kernel based face recognition method. This book provides researchers in pattern recognition and machine learning area with advanced face recognition methods and its new

  14. Thermal Signature Measurements for Ammonium Nitrate/Fuel Mixtures by Laser Heating.

    Science.gov (United States)

    Nazarian, Ashot; Presser, Cary

    2016-01-10

    Measurements were carried out to obtain thermal signatures of several ammonium nitrate/fuel (ANF) mixtures, using a laser-heating technique referred to as the laser-driven thermal reactor (LDTR). The mixtures were ammonium nitrate (AN)/kerosene, AN/ethylene glycol, AN/paraffin wax, AN/petroleum jelly, AN/confectioner's sugar, AN/cellulose (tissue paper), nitromethane/cellulose, nitrobenzene/cellulose, AN/cellulose/nitromethane, AN/cellulose/nitrobenzene. These mixtures were also compared with AN/nitromethane and AN/diesel fuel oil, obtained from an earlier investigation. Thermograms for the mixtures, as well as individual constituents, were compared to better understand how the sample thermal signature changes with mixture composition. This is the first step in development of a thermal-signature database, to be used along with other signature databases, to improve identification of energetic substances of unknown composition. The results indicated that each individual thermal signature was associated unambiguously with a particular mixture composition. The signature features of a particular mixture were shaped by the individual constituent signatures. It was also uncovered that the baseline signature was modified after an experiment due to coating of unreacted residue on the substrate surface and a change in the reactor sphere oxide layer. Thus, care was required to pre-oxidize the sphere prior to an experiment. A minimum sample mass (which was dependent on composition) was required to detect the signature characteristics. Increased laser power served to magnify signal strength while preserving the signature features. For the mixtures examined, the thermal response of each ANF mixture was found to be different, which was based on the mixture composition and the thermal behavior of each mixture constituent.

  15. 26 CFR 301.6064-1 - Signature presumed authentic.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Signature presumed authentic. 301.6064-1 Section 301.6064-1 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE TREASURY (CONTINUED....6064-1 Signature presumed authentic. An individual's name signed to a return, statement, or other...

  16. Galectin-3 coats the membrane of breast cells and makes a signature of tumours

    KAUST Repository

    Simone, Giuseppina; Malara, Natalia Maria; Trunzo, Valentina; Renne, Maria; Perozziello, Gerardo; Di Fabrizio, Enzo M.; Manz, Andreas

    2014-01-01

    Galectin-3, β-galactoside-binding lectin, coats the membrane of most cancer cells and is involved in metastasis and endothelium recognition as well as in evading immune surveillance through killing of activated T cells. To flag galectin as a biomarker of tumours and metastasis, it is pivotal to understand the role of this protein in different tumours and at different stages. Breast tumours have an anomalous behaviour of the galectin-3 compared to other tumour cells. Herein, FACS sorting and galactoside based assays were used to investigate the role of galectin-3 in metastasis and metastatisation of breast cancer cells. Breast galectin fingerprint at the FACS displayed a higher amount in healthy cells, compared to metastatic cells. The microfluidic assay was able to isolate tumour and metastatic cells more than healthy breast cells. Investigation was performed on samples from patients with breast tumours at stage I and stage III whilst MCF7 and EPH-4 cells were used to perform preliminary investigations. The readout of the conditioned medium (from culturing of stage I cells) fingerprint by FACS evidenced high expression of free galectin. Analysis of the results established that the galectin coating the membrane, by galactoside recognition of the breast cells, and engaged by the cells to form protein-carbohydrate complexes inside the microfluidic assay, resembled the tumour signature of tumours in breast cells whilst the galectin free is independent of those mechanisms. © 2014 The Royal Society of Chemistry.

  17. Molecular signatures for the Crenarchaeota and the Thaumarchaeota.

    Science.gov (United States)

    Gupta, Radhey S; Shami, Ali

    2011-02-01

    Crenarchaeotes found in mesophilic marine environments were recently placed into a new phylum of Archaea called the Thaumarchaeota. However, very few molecular characteristics of this new phylum are currently known which can be used to distinguish them from the Crenarchaeota. In addition, their relationships to deep-branching archaeal lineages are unclear. We report here detailed analyses of protein sequences from Crenarchaeota and Thaumarchaeota that have identified many conserved signature indels (CSIs) and signature proteins (SPs) (i.e., proteins for which all significant blast hits are from these groups) that are specific for these archaeal groups. Of the identified signatures 6 CSIs and 13 SPs are specific for the Crenarchaeota phylum; 6 CSIs and >250 SPs are uniquely found in various Thaumarchaeota (viz. Cenarchaeum symbiosum, Nitrosopumilus maritimus and a number of uncultured marine crenarchaeotes) and 3 CSIs and ~10 SPs are found in both Thaumarchaeota and Crenarchaeota species. Some of the molecular signatures are also present in Korarchaeum cryptofilum, which forms the independent phylum Korarchaeota. Although some of these molecular signatures suggest a distant shared ancestry between Thaumarchaeota and Crenarchaeota, our identification of large numbers of Thaumarchaeota-specific proteins and their deep branching between the Crenarchaeota and Euryarchaeota phyla in phylogenetic trees shows that they are distinct from both Crenarchaeota and Euryarchaeota in both genetic and phylogenetic terms. These observations support the placement of marine mesophilic archaea into the separate phylum Thaumarchaeota. Additionally, many CSIs and SPs have been found that are specific for different orders within Crenarchaeota (viz. Sulfolobales-3 CSIs and 169 SPs, Thermoproteales-5 CSIs and 25 SPs, Desulfurococcales-4 SPs, and Sulfolobales and Desulfurococcales-2 CSIs and 18 SPs). The signatures described here provide novel means for distinguishing the Crenarchaeota and

  18. Early signatures of regime shifts in gene expression dynamics

    Science.gov (United States)

    Pal, Mainak; Pal, Amit Kumar; Ghosh, Sayantari; Bose, Indrani

    2013-06-01

    Recently, a large number of studies have been carried out on the early signatures of sudden regime shifts in systems as diverse as ecosystems, financial markets, population biology and complex diseases. The signatures of regime shifts in gene expression dynamics are less systematically investigated. In this paper, we consider sudden regime shifts in the gene expression dynamics described by a fold-bifurcation model involving bistability and hysteresis. We consider two alternative models, models 1 and 2, of competence development in the bacterial population B. subtilis and determine some early signatures of the regime shifts between competence and noncompetence. We use both deterministic and stochastic formalisms for the purpose of our study. The early signatures studied include the critical slowing down as a transition point is approached, rising variance and the lag-1 autocorrelation function, skewness and a ratio of two mean first passage times. Some of the signatures could provide the experimental basis for distinguishing between bistability and excitability as the correct mechanism for the development of competence.

  19. Spatially Resolved Isotopic Source Signatures of Wetland Methane Emissions

    Science.gov (United States)

    Ganesan, A. L.; Stell, A. C.; Gedney, N.; Comyn-Platt, E.; Hayman, G.; Rigby, M.; Poulter, B.; Hornibrook, E. R. C.

    2018-04-01

    We present the first spatially resolved wetland δ13C(CH4) source signature map based on data characterizing wetland ecosystems and demonstrate good agreement with wetland signatures derived from atmospheric observations. The source signature map resolves a latitudinal difference of 10‰ between northern high-latitude (mean -67.8‰) and tropical (mean -56.7‰) wetlands and shows significant regional variations on top of the latitudinal gradient. We assess the errors in inverse modeling studies aiming to separate CH4 sources and sinks by comparing atmospheric δ13C(CH4) derived using our spatially resolved map against the common assumption of globally uniform wetland δ13C(CH4) signature. We find a larger interhemispheric gradient, a larger high-latitude seasonal cycle, and smaller trend over the period 2000-2012. The implication is that erroneous CH4 fluxes would be derived to compensate for the biases imposed by not utilizing spatially resolved signatures for the largest source of CH4 emissions. These biases are significant when compared to the size of observed signals.

  20. Early signatures of regime shifts in gene expression dynamics

    International Nuclear Information System (INIS)

    Pal, Mainak; Pal, Amit Kumar; Ghosh, Sayantari; Bose, Indrani

    2013-01-01

    Recently, a large number of studies have been carried out on the early signatures of sudden regime shifts in systems as diverse as ecosystems, financial markets, population biology and complex diseases. The signatures of regime shifts in gene expression dynamics are less systematically investigated. In this paper, we consider sudden regime shifts in the gene expression dynamics described by a fold-bifurcation model involving bistability and hysteresis. We consider two alternative models, models 1 and 2, of competence development in the bacterial population B. subtilis and determine some early signatures of the regime shifts between competence and noncompetence. We use both deterministic and stochastic formalisms for the purpose of our study. The early signatures studied include the critical slowing down as a transition point is approached, rising variance and the lag-1 autocorrelation function, skewness and a ratio of two mean first passage times. Some of the signatures could provide the experimental basis for distinguishing between bistability and excitability as the correct mechanism for the development of competence. (paper)

  1. Signature scheme for the microscopic description of nuclear collective excitations

    International Nuclear Information System (INIS)

    Ogawa, K.

    1980-04-01

    The symmetries between the proton and neutron systems in a nucleus are described in terms of the signatures. Three kinds of signatures (i.e. the pn-, p anti n- and p anti p- (or n anti n-) signatures) are introduced and they are related to the appearance of various collective motions such as rotations or vibrations. It is shown that the pn-signature scheme provides a band-like structure of deformed nuclei, while the features associated with the quadrupole vibration are obtained in the p anti n- and p anti p-signature scheme. From the detail investigation of the p anti n-symmetric wave functions, it is concluded that the reguralities provided by the present shell model are more analogous to those of the γ-unstable surface vibration model (Wilets-Jean model) than to those of harmonic phonon model. (author)

  2. Hyperspectral signature analysis of skin parameters

    Science.gov (United States)

    Vyas, Saurabh; Banerjee, Amit; Garza, Luis; Kang, Sewon; Burlina, Philippe

    2013-02-01

    The temporal analysis of changes in biological skin parameters, including melanosome concentration, collagen concentration and blood oxygenation, may serve as a valuable tool in diagnosing the progression of malignant skin cancers and in understanding the pathophysiology of cancerous tumors. Quantitative knowledge of these parameters can also be useful in applications such as wound assessment, and point-of-care diagnostics, amongst others. We propose an approach to estimate in vivo skin parameters using a forward computational model based on Kubelka-Munk theory and the Fresnel Equations. We use this model to map the skin parameters to their corresponding hyperspectral signature. We then use machine learning based regression to develop an inverse map from hyperspectral signatures to skin parameters. In particular, we employ support vector machine based regression to estimate the in vivo skin parameters given their corresponding hyperspectral signature. We build on our work from SPIE 2012, and validate our methodology on an in vivo dataset. This dataset consists of 241 signatures collected from in vivo hyperspectral imaging of patients of both genders and Caucasian, Asian and African American ethnicities. In addition, we also extend our methodology past the visible region and through the short-wave infrared region of the electromagnetic spectrum. We find promising results when comparing the estimated skin parameters to the ground truth, demonstrating good agreement with well-established physiological precepts. This methodology can have potential use in non-invasive skin anomaly detection and for developing minimally invasive pre-screening tools.

  3. Sudden Event Recognition: A Survey

    Directory of Open Access Journals (Sweden)

    Mohd Asyraf Zulkifley

    2013-08-01

    Full Text Available Event recognition is one of the most active research areas in video surveillance fields. Advancement in event recognition systems mainly aims to provide convenience, safety and an efficient lifestyle for humanity. A precise, accurate and robust approach is necessary to enable event recognition systems to respond to sudden changes in various uncontrolled environments, such as the case of an emergency, physical threat and a fire or bomb alert. The performance of sudden event recognition systems depends heavily on the accuracy of low level processing, like detection, recognition, tracking and machine learning algorithms. This survey aims to detect and characterize a sudden event, which is a subset of an abnormal event in several video surveillance applications. This paper discusses the following in detail: (1 the importance of a sudden event over a general anomalous event; (2 frameworks used in sudden event recognition; (3 the requirements and comparative studies of a sudden event recognition system and (4 various decision-making approaches for sudden event recognition. The advantages and drawbacks of using 3D images from multiple cameras for real-time application are also discussed. The paper concludes with suggestions for future research directions in sudden event recognition.

  4. Invariance Signatures: Characterizing contours by their departures from invariance

    OpenAIRE

    Squire, David; Caelli, Terry M.

    1997-01-01

    In this paper, a new invariant feature of two-dimensional contours is reported: the Invariance Signature. The Invariance Signature is a measure of the degree to which a contour is invariant under a variety of transformations, derived from the theory of Lie transformation groups. It is shown that the Invariance Signature is itself invariant under shift, rotation and scaling of the contour. Since it is derived from local properties of the contour, it is well-suited to a neural network implement...

  5. An ID-based Blind Signature Scheme from Bilinear Pairings

    OpenAIRE

    B.Umaprasada Rao; K.A.Ajmath

    2010-01-01

    Blind signatures, introduced by Chaum, allow a user to obtain a signature on a message without revealing any thing about the message to the signer. Blind signatures play on important role in plenty of applications such as e-voting, e-cash system where anonymity is of great concern. Identity based(ID-based) public key cryptography can be a good alternative for certified based public key setting, especially when efficient key management and moderate security are required. In this paper, we prop...

  6. Influence of triaxiality on the signature inversion in odd-odd nuclei

    International Nuclear Information System (INIS)

    Zheng, R.R.; Luo, X.D.; Timar, J.; Sohler, S.; Nyako, B.M.; Zolnai, L.; Paul, E.S.

    2004-01-01

    Complete text of publication follows. Signature inversion in the A ∼ 100 region has been reported earlier only in the case of the odd-odd 98 Rh nucleus. Our studies on the 100-103 Rh isotopes and a close inspection of the known πg 9/2 νh 11/ 2 bands of the Rh (Z = 45) and Ag (Z = 47) isotopes revealed that the signature splitting effects, earlier considered as quenchings of signature splitting, are not only quenchings but signature inversions. Indeed, the energetically favored signature at low spins in these πg 9/2 νh 11/2 bands is the α = 1 branch (odd spins) instead of the expected α = 0 branch (even spins). The systematic occurrence of signature inversion in this mass region is discussed in Refs. together with attempts to understand its behavior qualitatively. Among many attempts for interpreting the mechanism of signature inversion in odd-odd nuclei, a model using an axially symmetric rotor plus two quasi-particles has already been successfully applied to describe the observed signature inversions in the A ∼ 80 and A ∼ 160 mass regions. According to this model the signature inversion is caused by the competition between the Coriolis and the proton-neutron residual interactions in low K space. Such calculations have been also successfully applied to the π g9/2 νh 11/2 bands in the odd-odd 98 Rh and 102 Rh nuclei. Recent observations of chiral band structures in the nearby Rh nuclei suggest a possibility of triaxiality in these nuclei, too. In the present work we examined the possible influence of triaxiality on the signature inversion using a triaxial rotor plus two-quasiparticle model and compared the results with the experimental data of 98 Rh and 102 Rh. The calculations provided a better agreement with the experiment than the axially symmetric calculations. Compared to the axially symmetric case, the triaxiality applied in the Hamiltonian enlarges the amplitudes of high-spin signature zigzags at small triaxial deformation and might push the

  7. Comparison of transcriptomic signature of post-Chernobyl and postradiotherapy thyroid tumors.

    Science.gov (United States)

    Ory, Catherine; Ugolin, Nicolas; Hofman, Paul; Schlumberger, Martin; Likhtarev, Illya A; Chevillard, Sylvie

    2013-11-01

    We previously identified two highly discriminating and predictive radiation-induced transcriptomic signatures by comparing series of sporadic and postradiotherapy thyroid tumors (322-gene signature), and by reanalyzing a previously published data set of sporadic and post-Chernobyl thyroid tumors (106-gene signature). The aim of the present work was (i) to compare the two signatures in terms of gene expression deregulations and molecular features/pathways, and (ii) to test the capacity of the postradiotherapy signature in classifying the post-Chernobyl series of tumors and reciprocally of the post-Chernobyl signature in classifying the postradiotherapy-induced tumors. We now explored if postradiotherapy and post-Chernobyl papillary thyroid carcinomas (PTC) display common molecular features by comparing molecular pathways deregulated in the two tumor series, and tested the potential of gene subsets of the postradiotherapy signature to classify the post-Chernobyl series (14 sporadic and 12 post-Chernobyl PTC), and reciprocally of gene subsets of the post-Chernobyl signature to classify the postradiotherapy series (15 sporadic and 12 postradiotherapy PTC), by using conventional principal component analysis. We found that the five genes common to the two signatures classified the learning/training tumors (used to search these signatures) of both the postradiotherapy (seven PTC) and the post-Chernobyl (six PTC) thyroid tumor series as compared with the sporadic tumors (seven sporadic PTC in each series). Importantly, these five genes were also effective for classifying independent series of postradiotherapy (five PTC) and post-Chernobyl (six PTC) tumors compared to independent series of sporadic tumors (eight PTC and six PTC respectively; testing tumors). Moreover, part of each postradiotherapy (32 genes) and post-Chernobyl signature (16 genes) cross-classified the respective series of thyroid tumors. Finally, several molecular pathways deregulated in post

  8. Spinors, superalgebras and the signature of space-time

    CERN Document Server

    Ferrara, S.

    2001-01-01

    Superconformal algebras embedding space-time in any dimension and signature are considered. Different real forms of the $R$-symmetries arise both for usual space-time signature (one time) and for Euclidean or exotic signatures (more than one times). Application of these superalgebras are found in the context of supergravities with 32 supersymmetries, in any dimension $D \\leq 11$. These theories are related to $D = 11, M, M^*$ and $M^\\prime$ theories or $D = 10$, IIB, IIB$^*$ theories when compactified on Lorentzian tori. All dimensionally reduced theories fall in three distinct phases specified by the number of (128 bosonic) positive and negative norm states: $(n^+,n^-) = (128,0), (64,64), (72,56)$.

  9. A Provably Secure Aggregate Signature Scheme for Healthcare Wireless Sensor Networks.

    Science.gov (United States)

    Shen, Limin; Ma, Jianfeng; Liu, Ximeng; Miao, Meixia

    2016-11-01

    Wireless sensor networks (WSNs) are being used in a wide range of applications for healthcare monitoring, like heart rate monitors and blood pressure monitors, which can minimize the need for healthcare professionals. In medical system, sensors on or in patients produce medical data which can be easily compromised by a vast of attacks. Although signature schemes can protect data authenticity and data integrity, when the number of users involved in the medical system becomes huge, the bandwidth and storage cost will rise sharply so that existing signature schemes are inapplicability for WSNs. In this paper, we propose an efficient aggregate signature scheme for healthcare WSNs according to an improved security model, which can combine multiple signatures into a single aggregate signature. The length of such an aggregate signature may be as long as that of an individual one, which can greatly decrease the bandwidth and storage cost for networks.

  10. Observation of a 27-day solar signature in noctilucent cloud altitude

    Science.gov (United States)

    Köhnke, Merlin C.; von Savigny, Christian; Robert, Charles E.

    2018-05-01

    Previous studies have identified solar 27-day signatures in several parameters in the Mesosphere/Lower thermosphere region, including temperature and Noctilucent cloud (NLC) occurrence frequency. In this study we report on a solar 27-day signature in NLC altitude with peak-to-peak variations of about 400 m. We use SCIAMACHY limb-scatter observations from 2002 to 2012 to detect NLCs. The superposed epoch analysis method is applied to extract solar 27-day signatures. A 27-day signature in NLC altitude can be identified in both hemispheres in the SCIAMACHY dataset, but the signature is more pronounced in the northern hemisphere. The solar signature in NLC altitude is found to be in phase with solar activity and temperature for latitudes ≳ 70 ° N. We provide a qualitative explanation for the positive correlation between solar activity and NLC altitude based on published model simulations.

  11. A Quantum Multi-Proxy Weak Blind Signature Scheme Based on Entanglement Swapping

    Science.gov (United States)

    Yan, LiLi; Chang, Yan; Zhang, ShiBin; Han, GuiHua; Sheng, ZhiWei

    2017-02-01

    In this paper, we present a multi-proxy weak blind signature scheme based on quantum entanglement swapping of Bell states. In the scheme, proxy signers can finish the signature instead of original singer with his/her authority. It can be applied to the electronic voting system, electronic paying system, etc. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. It could guarantee not only the unconditionally security but also the anonymity of the message owner. The security analysis shows the scheme satisfies the security features of multi-proxy weak signature, singers cannot disavowal his/her signature while the signature cannot be forged by others, and the message owner can be traced.

  12. Influence of triaxiality on the signature inversion in odd-odd nuclei

    International Nuclear Information System (INIS)

    Zheng Renrong; Zhu Shunquan; Luo Xiangdong; Gizon, A.; Gizon, J.; Paul, E.S.

    2004-01-01

    The nature of signature inversion in the πg 9/2 νh 11/2 bands of odd-odd 98,102 Rh nuclei is studied. Calculations are performed by using a triaxial rotor plus two-quasiparticle model and are compared with the experimentally observed signature inversions. The calculations reproduce well the observations and suggest that, in these bands, the signature inversion can be interpreted mainly as a competition between the Coriolis and the proton-neutron residual interactions in low K space. The triaxiality applied in the Hamiltonian enlarges the amplitudes of high spin signature zigzags at small triaxial deformation and might push the signature inversion point to higher spin at large triaxial deformation

  13. L1000FWD: Fireworks visualization of drug-induced transcriptomic signatures.

    Science.gov (United States)

    Wang, Zichen; Lachmann, Alexander; Keenan, Alexandra B; Ma'ayan, Avi

    2018-02-06

    As part of the NIH Library of Integrated Network-based Cellular Signatures (LINCS) program, hundreds of thousands of transcriptomic signatures were generated with the L1000 technology, profiling the response of human cell lines to over 20,000 small molecule compounds. This effort is a promising approach toward revealing the mechanisms-of-action (MOA) for marketed drugs and other less studied potential therapeutic compounds. L1000 fireworks display (L1000FWD) is a web application that provides interactive visualization of over 16,000 drug and small-molecule induced gene expression signatures. L1000FWD enables coloring of signatures by different attributes such as cell type, time point, concentration, as well as drug attributes such as MOA and clinical phase. Signature similarity search is implemented to enable the search for mimicking or opposing signatures given as input of up and down gene sets. Each point on the L1000FWD interactive map is linked to a signature landing page, which provides multifaceted knowledge from various sources about the signature and the drug. Notably such information includes most frequent diagnoses, co-prescribed drugs and age distribution of prescriptions as extracted from the Mount Sinai Health System electronic medical records (EMR). Overall, L1000FWD serves as a platform for identifying functions for novel small molecules using unsupervised clustering, as well as for exploring drug MOA. L1000FWD is freely accessible at: http://amp.pharm.mssm.edu/L1000FWD. avi.maayan@mssm.edu. Supplementary data are available at Bioinformatics online. © The Author (2018). Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  14. Revocable identity-based proxy re-signature against signing key exposure.

    Science.gov (United States)

    Yang, Xiaodong; Chen, Chunlin; Ma, Tingchun; Wang, Jinli; Wang, Caifen

    2018-01-01

    Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key. Due to this transformation function, IDPRS is very useful in constructing privacy-preserving schemes for various information systems. Key revocation functionality is important in practical IDPRS for managing users dynamically; however, the existing IDPRS schemes do not provide revocation mechanisms that allow the removal of misbehaving or compromised users from the system. In this paper, we first introduce a notion called revocable identity-based proxy re-signature (RIDPRS) to achieve the revocation functionality. We provide a formal definition of RIDPRS as well as its security model. Then, we present a concrete RIDPRS scheme that can resist signing key exposure and prove that the proposed scheme is existentially unforgeable against adaptive chosen identity and message attacks in the standard model. To further improve the performance of signature verification in RIDPRS, we introduce a notion called server-aided revocable identity-based proxy re-signature (SA-RIDPRS). Moreover, we extend the proposed RIDPRS scheme to the SA-RIDPRS scheme and prove that this extended scheme is secure against adaptive chosen message and collusion attacks. The analysis results show that our two schemes remain efficient in terms of computational complexity when implementing user revocation procedures. In particular, in the SA-RIDPRS scheme, the verifier needs to perform only a bilinear pairing and four exponentiation operations to verify the validity of the signature. Compared with other IDPRS schemes in the standard model, our SA-RIDPRS scheme greatly reduces the computation overhead of verification.

  15. Effect of External Vibration on PZT Impedance Signature

    Directory of Open Access Journals (Sweden)

    Yaowen Yang

    2008-11-01

    Full Text Available Piezoelectric ceramic Lead Zirconate Titanate (PZT transducers, working on the principle of electromechanical impedance (EMI, are increasingly applied for structural health monitoring (SHM in aerospace, civil and mechanical engineering. The PZT transducers are usually surface bonded to or embedded in a structure and subjected to actuation so as to interrogate the structure at the desired frequency range. The interrogation results in the electromechanical admittance (inverse of EMI signatures which can be used to estimate the structural health or integrity according to the changes of the signatures. In the existing EMI method, the monitored structure is only excited by the PZT transducers for the interrogating of EMI signature, while the vibration of the structure caused by the external excitations other than the PZT actuation is not considered. However, many structures work under vibrations in practice. To monitor such structures, issues related to the effects of vibration on the EMI signature need to be addressed because these effects may lead to misinterpretation of the structural health. This paper develops an EMI model for beam structures, which takes into account the effect of beam vibration caused by the external excitations. An experimental study is carried out to verify the theoretical model. A lab size specimen with different external excitations is tested and the effect of vibration on EMI signature is discussed.

  16. Effect of External Vibration on PZT Impedance Signature.

    Science.gov (United States)

    Yang, Yaowen; Miao, Aiwei

    2008-11-01

    Piezoelectric ceramic Lead Zirconate Titanate (PZT) transducers, working on the principle of electromechanical impedance (EMI), are increasingly applied for structural health monitoring (SHM) in aerospace, civil and mechanical engineering. The PZT transducers are usually surface bonded to or embedded in a structure and subjected to actuation so as to interrogate the structure at the desired frequency range. The interrogation results in the electromechanical admittance (inverse of EMI) signatures which can be used to estimate the structural health or integrity according to the changes of the signatures. In the existing EMI method, the monitored structure is only excited by the PZT transducers for the interrogating of EMI signature, while the vibration of the structure caused by the external excitations other than the PZT actuation is not considered. However, many structures work under vibrations in practice. To monitor such structures, issues related to the effects of vibration on the EMI signature need to be addressed because these effects may lead to misinterpretation of the structural health. This paper develops an EMI model for beam structures, which takes into account the effect of beam vibration caused by the external excitations. An experimental study is carried out to verify the theoretical model. A lab size specimen with different external excitations is tested and the effect of vibration on EMI signature is discussed.

  17. The Improvement of Behavior Recognition Accuracy of Micro Inertial Accelerometer by Secondary Recognition Algorithm

    Directory of Open Access Journals (Sweden)

    Yu Liu

    2014-05-01

    Full Text Available Behaviors of “still”, “walking”, “running”, “jumping”, “upstairs” and “downstairs” can be recognized by micro inertial accelerometer of low cost. By using the features as inputs to the well-trained BP artificial neural network which is selected as classifier, those behaviors can be recognized. But the experimental results show that the recognition accuracy is not satisfactory. This paper presents secondary recognition algorithm and combine it with BP artificial neural network to improving the recognition accuracy. The Algorithm is verified by the Android mobile platform, and the recognition accuracy can be improved more than 8 %. Through extensive testing statistic analysis, the recognition accuracy can reach 95 % through BP artificial neural network and the secondary recognition, which is a reasonable good result from practical point of view.

  18. 17 CFR 201.140 - Commission orders and decisions: Signature and availability.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Commission orders and decisions: Signature and availability. 201.140 Section 201.140 Commodity and Securities Exchanges SECURITIES... and decisions: Signature and availability. (a) Signature required. All orders and decisions of the...

  19. The spectrum of genomic signatures: from dinucleotides to chaos game representation.

    Science.gov (United States)

    Wang, Yingwei; Hill, Kathleen; Singh, Shiva; Kari, Lila

    2005-02-14

    In the post genomic era, access to complete genome sequence data for numerous diverse species has opened multiple avenues for examining and comparing primary DNA sequence organization of entire genomes. Previously, the concept of a genomic signature was introduced with the observation of species-type specific Dinucleotide Relative Abundance Profiles (DRAPs); dinucleotides were identified as the subsequences with the greatest bias in representation in a majority of genomes. Herein, we demonstrate that DRAP is one particular genomic signature contained within a broader spectrum of signatures. Within this spectrum, an alternative genomic signature, Chaos Game Representation (CGR), provides a unique visualization of patterns in sequence organization. A genomic signature is associated with a particular integer order or subsequence length that represents a measure of the resolution or granularity in the analysis of primary DNA sequence organization. We quantitatively explore the organizational information provided by genomic signatures of different orders through different distance measures, including a novel Image Distance. The Image Distance and other existing distance measures are evaluated by comparing the phylogenetic trees they generate for 26 complete mitochondrial genomes from a diversity of species. The phylogenetic tree generated by the Image Distance is compatible with the known relatedness of species. Quantitative evaluation of the spectrum of genomic signatures may be used to ultimately gain insight into the determinants and biological relevance of the genome signatures.

  20. Nonlinear analysis of dynamic signature

    Science.gov (United States)

    Rashidi, S.; Fallah, A.; Towhidkhah, F.

    2013-12-01

    Signature is a long trained motor skill resulting in well combination of segments like strokes and loops. It is a physical manifestation of complex motor processes. The problem, generally stated, is that how relative simplicity in behavior emerges from considerable complexity of perception-action system that produces behavior within an infinitely variable biomechanical and environmental context. To solve this problem, we present evidences which indicate that motor control dynamic in signing process is a chaotic process. This chaotic dynamic may explain a richer array of time series behavior in motor skill of signature. Nonlinear analysis is a powerful approach and suitable tool which seeks for characterizing dynamical systems through concepts such as fractal dimension and Lyapunov exponent. As a result, they can be analyzed in both horizontal and vertical for time series of position and velocity. We observed from the results that noninteger values for the correlation dimension indicates low dimensional deterministic dynamics. This result could be confirmed by using surrogate data tests. We have also used time series to calculate the largest Lyapunov exponent and obtain a positive value. These results constitute significant evidence that signature data are outcome of chaos in a nonlinear dynamical system of motor control.

  1. Passive Infrared Signature Augmentation of Full-Scale Plastic Targets

    National Research Council Canada - National Science Library

    Gebus, Lisa M; Sanders, Jeffrey S

    2002-01-01

    ... (IR), and radar signatures of threat systems. To address this need, a program was initiated by TMO to augment an existing full-scale, vacuum-formed plastic target with sufficient signature fidelity to adequately stress U.S...

  2. Secure Certificateless Signature with Revocation in the Standard Model

    Directory of Open Access Journals (Sweden)

    Tung-Tso Tsai

    2014-01-01

    previously proposed certificateless signature schemes were insecure under a considerably strong security model in the sense that they suffered from outsiders’ key replacement attacks or the attacks from the key generation center (KGC. In this paper, we propose a certificateless signature scheme without random oracles. Moreover, our scheme is secure under the strong security model and provides a public revocation mechanism, called revocable certificateless signature (RCLS. Under the standard computational Diffie-Hellman assumption, we formally demonstrate that our scheme possesses existential unforgeability against adaptive chosen-message attacks.

  3. Review and Analysis of Cryptographic Schemes Implementing Threshold Signature

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-03-01

    Full Text Available This work is devoted to the study of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, ellipt ic curves and bilinear pairings were investigated. Different methods of generation and verification of threshold signatures were explored, e.g. used in a mobile agents, Internet banking and e-currency. The significance of the work is determined by the reduction of the level of counterfeit electronic documents, signed by certain group of users.

  4. Arbitrated quantum signature scheme based on χ-type entangled states

    International Nuclear Information System (INIS)

    Zuo, Huijuan; Huang, Wei; Qin, Sujuan

    2013-01-01

    An arbitrated quantum signature scheme, which is mainly applied in electronic-payment systems, is proposed and investigated. The χ-type entangled states are used for quantum key distribution and quantum signature in this protocol. Compared with previous quantum signature schemes which also utilize χ-type entangled states, the proposed scheme provides higher efficiency. Finally, we also analyze its security under various kinds of attacks. (paper)

  5. Extending the similarity-based XML multicast approach with digital signatures

    DEFF Research Database (Denmark)

    Azzini, Antonia; Marrara, Stefania; Jensen, Meiko

    2009-01-01

    This paper investigates the interplay between similarity-based SOAP message aggregation and digital signature application. An overview on the approaches resulting from the different orders for the tasks of signature application, verification, similarity aggregation and splitting is provided....... Depending on the intersection between similarity-aggregated and signed SOAP message parts, the paper discusses three different cases of signature application, and sketches their applicability and performance implications....

  6. Landscape and variation of RNA secondary structure across the human transcriptome.

    Science.gov (United States)

    Wan, Yue; Qu, Kun; Zhang, Qiangfeng Cliff; Flynn, Ryan A; Manor, Ohad; Ouyang, Zhengqing; Zhang, Jiajing; Spitale, Robert C; Snyder, Michael P; Segal, Eran; Chang, Howard Y

    2014-01-30

    In parallel to the genetic code for protein synthesis, a second layer of information is embedded in all RNA transcripts in the form of RNA structure. RNA structure influences practically every step in the gene expression program. However, the nature of most RNA structures or effects of sequence variation on structure are not known. Here we report the initial landscape and variation of RNA secondary structures (RSSs) in a human family trio (mother, father and their child). This provides a comprehensive RSS map of human coding and non-coding RNAs. We identify unique RSS signatures that demarcate open reading frames and splicing junctions, and define authentic microRNA-binding sites. Comparison of native deproteinized RNA isolated from cells versus refolded purified RNA suggests that the majority of the RSS information is encoded within RNA sequence. Over 1,900 transcribed single nucleotide variants (approximately 15% of all transcribed single nucleotide variants) alter local RNA structure. We discover simple sequence and spacing rules that determine the ability of point mutations to impact RSSs. Selective depletion of 'riboSNitches' versus structurally synonymous variants at precise locations suggests selection for specific RNA shapes at thousands of sites, including 3' untranslated regions, binding sites of microRNAs and RNA-binding proteins genome-wide. These results highlight the potentially broad contribution of RNA structure and its variation to gene regulation.

  7. The recognition and interpretation of micro-particle impacts on space craft surfaces

    Science.gov (United States)

    Kearsley, Anton

    Modern analysis instruments now allow the rapid examination of returned spacecraft surfaces, enabling the location and identification of impact features, and the attribution of their impactor origins. This paper describes application of novel electron, ion and micro-X-ray Fluorescence techniques to impacts on diverse compositions of substrate, including solar cell glass, poly-sulfone and fluoro-polymer-impregnated glass fibre composites, multilayer insulation foils, aluminium and titanium alloys. Examples will include two generations of solar cells and stiffener materials from the Hubble Space Telescope (HST), Beta-cloth from the NASA Mir-Trek cover blanket, aluminised Kapton foils from the Japanese Space Flyer Unit (SFU) and the European Retrievable Carrier (EuReCa), Al-alloy plates from the Long Duration Exposure Facility (LDEF), Al foils from the NASA Stardust mission, Al-alloy and Zinc orthotitanate (ZOT) painted alloy plate from HST, and titanium alloys from a re-entered titanium pressure tank. Each type of spacecraft surface poses unique problems of analysis, especially in the recognition of extraneous signatures from the impacting particle, especially if a complex chemical composition is already present in the target. For example, solar cells provide an excellent capture and analysis medium for monitoring fluxes of micrometre-scale orbital debris from solid rocket motor firings in low Earth orbit. However, they provide a hard and dense capture medium upon which substantial modification of the impactor may occur, making the precise identification of micrometeoroid components difficult. Unfortunately, extensive spallation by larger (> 100 micrometre) particle impacts on the thin and brittle structure of solar cells also usually results in complete loss of impactor signature. Although thick alloy surfaces may prevent complete impact penetration, the analysis of particle residues within their deep concavity has proven difficult, until the recent introduction of

  8. SIGNATURES OF LONG-LIVED SPIRAL PATTERNS

    International Nuclear Information System (INIS)

    Martínez-García, Eric E.; González-Lópezlira, Rosa A.

    2013-01-01

    Azimuthal age/color gradients across spiral arms are a signature of long-lived spirals. From a sample of 19 normal (or weakly barred) spirals where we have previously found azimuthal age/color gradient candidates, 13 objects were further selected if a two-armed grand-design pattern survived in a surface density stellar mass map. Mass maps were obtained from optical and near-infrared imaging, by comparison with a Monte Carlo library of stellar population synthesis models that allowed us to obtain the mass-to-light ratio in the J band, (M/L) J , as a function of (g – i) versus (i – J) color. The selected spirals were analyzed with Fourier methods in search of other signatures of long-lived modes related to the gradients, such as the gradient divergence toward corotation, and the behavior of the phase angle of the two-armed spiral in different wavebands, as expected from theory. The results show additional signatures of long-lived spirals in at least 50% of the objects.

  9. Flow-Signature Analysis of Water Consumption in Nonresidential Building Water Networks Using High-Resolution and Medium-Resolution Smart Meter Data: Two Case Studies

    Science.gov (United States)

    Clifford, Eoghan; Mulligan, Sean; Comer, Joanne; Hannon, Louise

    2018-01-01

    Real-time monitoring of water consumption activities can be an effective mechanism to achieve efficient water network management. This approach, largely enabled by the advent of smart metering technologies, is gradually being practiced in domestic and industrial contexts. In particular, identifying water consumption habits from flow-signatures, i.e., the specific end-usage patterns, is being investigated as a means for conservation in both the residential and nonresidential context. However, the quality of meter data is bivariate (dependent on number of meters and data temporal resolution) and as a result, planning a smart metering scheme is relatively difficult with no generic design approach available. In this study, a comprehensive medium-resolution to high-resolution smart metering program was implemented at two nonresidential trial sites to evaluate the effect of spatial and temporal data aggregation. It was found that medium-resolution water meter data were capable of exposing regular, continuous, peak use, and diurnal patterns which reflect group wide end-usage characteristics. The high-resolution meter data permitted flow-signature at a personal end-use level. Through this unique opportunity to observe water usage characteristics via flow-signature patterns, newly defined hydraulic-based design coefficients determined from Poisson rectangular pulse were developed to intuitively aid in the process of pattern discovery with implications for automated activity recognition applications. A smart meter classification and siting index was introduced which categorizes meter resolution in terms of their suitable application.

  10. 24 CFR 1710.117 - Cost sheet, signature of Senior Executive Officer.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 5 2010-04-01 2010-04-01 false Cost sheet, signature of Senior... REGISTRATION Reporting Requirements § 1710.117 Cost sheet, signature of Senior Executive Officer. (a) Cost... description of our subdivision and development plans. Signature of Senior Executive Officer (2) Cost sheet...

  11. Signature splitting in nuclear rotational bands: Neutron i13/2 systematics

    International Nuclear Information System (INIS)

    Mueller, W.F.; Jensen, H.J.; Reviol, W.; Riedinger, L.L.; Yu, C.; Zhang, J.; Nazarewicz, W.; Wyss, R.

    1994-01-01

    Experimental values of signature splitting in νi 13/2 rotational bands in odd-N even-Z nuclei in the Z=62--78 region are collected and presented. A procedure is introduced to calculate signature splitting within the cranked deformed Woods-Saxon model. In the theoretical treatment, deformation parameters are obtained by minimizing the total Routhians of individual νi 13/2 bands, and the procedure accounts for the possibility that the two signatures have different deformations and pairing gaps. Experimental signature splitting data for νi 13/2 bands in Dy, Er, Yb, Hf, W, and Os nuclei are compared with calculated values. The sensitivity of calculated signature splitting to changes in deformation, pairing, and other model parameters is presented

  12. The Legal Recognition of Sign Languages

    Science.gov (United States)

    De Meulder, Maartje

    2015-01-01

    This article provides an analytical overview of the different types of explicit legal recognition of sign languages. Five categories are distinguished: constitutional recognition, recognition by means of general language legislation, recognition by means of a sign language law or act, recognition by means of a sign language law or act including…

  13. Search for non-standard SUSY signatures in CMS

    International Nuclear Information System (INIS)

    Teyssier, Daniel

    2008-01-01

    New studies of the CMS collaboration are presented on the sensitivity to searches for non-standard signatures of particular SUSY scenarios. These signatures include non-pointing photons as well as pairs of prompt photons as expected GMSB SUSY models, as well as heavy stable charged particles produced in split supersymmetry models, long lived staus from GMSB SUSY and long lived stops in other SUSY scenarios. Detailed detector simulation is used for the study, and all relevant Standard Model background and detector effects that can mimic these special signatures are included. It is shown that with already with less than 100 pb -1 the CMS sensitivity will probe an interesting as yet by data unexplored parameter range of these models.

  14. Security of the arbitrated quantum signature protocols revisited

    International Nuclear Information System (INIS)

    Kejia, Zhang; Dan, Li; Qi, Su

    2014-01-01

    Recently, much attention has been paid to the study of arbitrated quantum signature (AQS). Among these studies, the cryptanalysis of some AQS protocols and a series of improved ideas have been proposed. Compared with the previous analysis, we present a security criterion, which can judge whether an AQS protocol is able to prevent the receiver (i.e. one participant in the signature protocol) from forging a legal signature. According to our results, it can be seen that most AQS protocols which are based on the Zeng and Keitel (ZK) model are susceptible to a forgery attack. Furthermore, we present an improved idea of the ZK protocol. Finally, some supplement discussions and several interesting topics are provided. (paper)

  15. The Source Signature Estimator - System Improvements and Applications

    Energy Technology Data Exchange (ETDEWEB)

    Sabel, Per; Brink, Mundy; Eidsvig, Seija; Jensen, Lars

    1998-12-31

    This presentation relates briefly to the first part of the joint project on post-survey analysis of shot-by-shot based source signature estimation. The improvements of a Source Signature Estimator system are analysed. The notional source method can give suboptimal results when not inputting the real array geometry, i.e. actual separations between the sub-arrays of an air gun array, to the notional source algorithm. This constraint has been addressed herein and was implemented for the first time in the field in summer 1997. The second part of this study will show the potential advantages for interpretation when the signature estimates are then to be applied in the data processing. 5 refs., 1 fig.

  16. A sessional blind signature based on quantum cryptography

    Science.gov (United States)

    Khodambashi, Siavash; Zakerolhosseini, Ali

    2014-01-01

    In this paper, we present a sessional blind signature protocol whose security is guaranteed by fundamental principles of quantum physics. It allows a message owner to get his message signed by an authorized signatory. However, the signatory is not capable of reading the message contents and everyone can verify authenticity of the message. For this purpose, we took advantage of a sessional signature as well as quantum entangled pairs which are generated with respect to it in our proposed protocol. We describe our proposed blind signature through an example and briefly discuss about its unconditional security. Due to the feasibility of the protocol, it can be widely employed for e-payment, e-government, e-business and etc.

  17. Human activity recognition and prediction

    CERN Document Server

    2016-01-01

    This book provides a unique view of human activity recognition, especially fine-grained human activity structure learning, human-interaction recognition, RGB-D data based action recognition, temporal decomposition, and causality learning in unconstrained human activity videos. The techniques discussed give readers tools that provide a significant improvement over existing methodologies of video content understanding by taking advantage of activity recognition. It links multiple popular research fields in computer vision, machine learning, human-centered computing, human-computer interaction, image classification, and pattern recognition. In addition, the book includes several key chapters covering multiple emerging topics in the field. Contributed by top experts and practitioners, the chapters present key topics from different angles and blend both methodology and application, composing a solid overview of the human activity recognition techniques. .

  18. Comparing performance of standard and iterative linear unmixing methods for hyperspectral signatures

    Science.gov (United States)

    Gault, Travis R.; Jansen, Melissa E.; DeCoster, Mallory E.; Jansing, E. David; Rodriguez, Benjamin M.

    2016-05-01

    Linear unmixing is a method of decomposing a mixed signature to determine the component materials that are present in sensor's field of view, along with the abundances at which they occur. Linear unmixing assumes that energy from the materials in the field of view is mixed in a linear fashion across the spectrum of interest. Traditional unmixing methods can take advantage of adjacent pixels in the decomposition algorithm, but is not the case for point sensors. This paper explores several iterative and non-iterative methods for linear unmixing, and examines their effectiveness at identifying the individual signatures that make up simulated single pixel mixed signatures, along with their corresponding abundances. The major hurdle addressed in the proposed method is that no neighboring pixel information is available for the spectral signature of interest. Testing is performed using two collections of spectral signatures from the Johns Hopkins University Applied Physics Laboratory's Signatures Database software (SigDB): a hand-selected small dataset of 25 distinct signatures from a larger dataset of approximately 1600 pure visible/near-infrared/short-wave-infrared (VIS/NIR/SWIR) spectra. Simulated spectra are created with three and four material mixtures randomly drawn from a dataset originating from SigDB, where the abundance of one material is swept in 10% increments from 10% to 90%with the abundances of the other materials equally divided amongst the remainder. For the smaller dataset of 25 signatures, all combinations of three or four materials are used to create simulated spectra, from which the accuracy of materials returned, as well as the correctness of the abundances, is compared to the inputs. The experiment is expanded to include the signatures from the larger dataset of almost 1600 signatures evaluated using a Monte Carlo scheme with 5000 draws of three or four materials to create the simulated mixed signatures. The spectral similarity of the inputs to the

  19. Right Limbic FDG-PET Hypometabolism Correlates with Emotion Recognition and Attribution in Probable Behavioral Variant of Frontotemporal Dementia Patients.

    Directory of Open Access Journals (Sweden)

    Chiara Cerami

    Full Text Available The behavioural variant of frontotemporal dementia (bvFTD is a rare disease mainly affecting the social brain. FDG-PET fronto-temporal hypometabolism is a supportive feature for the diagnosis. It may also provide specific functional metabolic signatures for altered socio-emotional processing. In this study, we evaluated the emotion recognition and attribution deficits and FDG-PET cerebral metabolic patterns at the group and individual levels in a sample of sporadic bvFTD patients, exploring the cognitive-functional correlations. Seventeen probable mild bvFTD patients (10 male and 7 female; age 67.8±9.9 were administered standardized and validated version of social cognition tasks assessing the recognition of basic emotions and the attribution of emotions and intentions (i.e., Ekman 60-Faces test-Ek60F and Story-based Empathy task-SET. FDG-PET was analysed using an optimized voxel-based SPM method at the single-subject and group levels. Severe deficits of emotion recognition and processing characterized the bvFTD condition. At the group level, metabolic dysfunction in the right amygdala, temporal pole, and middle cingulate cortex was highly correlated to the emotional recognition and attribution performances. At the single-subject level, however, heterogeneous impairments of social cognition tasks emerged, and different metabolic patterns, involving limbic structures and prefrontal cortices, were also observed. The derangement of a right limbic network is associated with altered socio-emotional processing in bvFTD patients, but different hypometabolic FDG-PET patterns and heterogeneous performances on social tasks at an individual level exist.

  20. The curse of namespaces in the domain of XML signature

    DEFF Research Database (Denmark)

    Jensen, Meiko; Liao, Lijun; Schwenk, Jörg

    2009-01-01

    The XML signature wrapping attack is one of the most discussed security issues of the Web Services security community during the last years. Until now, the issue has not been solved, and all countermeasure approaches proposed so far were shown to be insufficient. In this paper, we present yet...... another way to perform signature wrapping attacks by using the XML namespace injection technique. We show that the interplay of XML Signature, XPath, and the XML namespace concept has severe flaws that can be exploited for an attack, and that XML namespaces in general pose real troubles to digital...... signatures in the XML domain. Additionally, we present and discuss some new approaches in countering the proposed attack vector....

  1. Radar automatic target recognition (ATR) and non-cooperative target recognition (NCTR)

    CERN Document Server

    Blacknell, David

    2013-01-01

    The ability to detect and locate targets by day or night, over wide areas, regardless of weather conditions has long made radar a key sensor in many military and civil applications. However, the ability to automatically and reliably distinguish different targets represents a difficult challenge. Radar Automatic Target Recognition (ATR) and Non-Cooperative Target Recognition (NCTR) captures material presented in the NATO SET-172 lecture series to provide an overview of the state-of-the-art and continuing challenges of radar target recognition. Topics covered include the problem as applied to th

  2. Recognition and Toleration

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2010-01-01

    Recognition and toleration are ways of relating to the diversity characteristic of multicultural societies. The article concerns the possible meanings of toleration and recognition, and the conflict that is often claimed to exist between these two approaches to diversity. Different forms or inter...

  3. Circulating neutrophil transcriptome may reveal intracranial aneurysm signature.

    Directory of Open Access Journals (Sweden)

    Vincent M Tutino

    Full Text Available Unruptured intracranial aneurysms (IAs are typically asymptomatic and undetected except for incidental discovery on imaging. Blood-based diagnostic biomarkers could lead to improvements in IA management. This exploratory study examined circulating neutrophils to determine whether they carry RNA expression signatures of IAs.Blood samples were collected from patients receiving cerebral angiography. Eleven samples were collected from patients with IAs and 11 from patients without IAs as controls. Samples from the two groups were paired based on demographics and comorbidities. RNA was extracted from isolated neutrophils and subjected to next-generation RNA sequencing to obtain differential expressions for identification of an IA-associated signature. Bioinformatics analyses, including gene set enrichment analysis and Ingenuity Pathway Analysis, were used to investigate the biological function of all differentially expressed transcripts.Transcriptome profiling identified 258 differentially expressed transcripts in patients with and without IAs. Expression differences were consistent with peripheral neutrophil activation. An IA-associated RNA expression signature was identified in 82 transcripts (p<0.05, fold-change ≥2. This signature was able to separate patients with and without IAs on hierarchical clustering. Furthermore, in an independent, unpaired, replication cohort of patients with IAs (n = 5 and controls (n = 5, the 82 transcripts separated 9 of 10 patients into their respective groups.Preliminary findings show that RNA expression from circulating neutrophils carries an IA-associated signature. These findings highlight a potential to use predictive biomarkers from peripheral blood samples to identify patients with IAs.

  4. Signature for the shape of the universe

    International Nuclear Information System (INIS)

    Gomero, G.I.; Reboucas, M.J.; Teixeira, A.F.F.

    2001-03-01

    If the universe has a nontrival shape (topology) the sky may show multiple correlated images of cosmic objects. These correlations can be counched in terms of distance correlations. We propose a statistical quantity which can be used to reveal the topological signature of any Roberston-Walker (RW) spacetime with nontrivial topology. We also show through computer-aided simulations how one can extract the topological signatures of flat elliptic and hyperbolic RW universes with nontrivial topology. (author)

  5. 76 FR 75461 - Express Mail Domestic Postage Refund Policy and Waiver of Signature

    Science.gov (United States)

    2011-12-02

    ... POSTAL SERVICE 39 CFR Part 111 Express Mail Domestic Postage Refund Policy and Waiver of Signature... to 30 days after the date of mailing, and to change the Express Mail ``waiver of signature'' standard for domestic items by obtaining an addressee's signature only when the mailer selects the ``signature...

  6. Estimating physiological skin parameters from hyperspectral signatures

    Science.gov (United States)

    Vyas, Saurabh; Banerjee, Amit; Burlina, Philippe

    2013-05-01

    We describe an approach for estimating human skin parameters, such as melanosome concentration, collagen concentration, oxygen saturation, and blood volume, using hyperspectral radiometric measurements (signatures) obtained from in vivo skin. We use a computational model based on Kubelka-Munk theory and the Fresnel equations. This model forward maps the skin parameters to a corresponding multiband reflectance spectra. Machine-learning-based regression is used to generate the inverse map, and hence estimate skin parameters from hyperspectral signatures. We test our methods using synthetic and in vivo skin signatures obtained in the visible through the short wave infrared domains from 24 patients of both genders and Caucasian, Asian, and African American ethnicities. Performance validation shows promising results: good agreement with the ground truth and well-established physiological precepts. These methods have potential use in the characterization of skin abnormalities and in minimally-invasive prescreening of malignant skin cancers.

  7. Super-recognition in development: A case study of an adolescent with extraordinary face recognition skills.

    Science.gov (United States)

    Bennetts, Rachel J; Mole, Joseph; Bate, Sarah

    2017-09-01

    Face recognition abilities vary widely. While face recognition deficits have been reported in children, it is unclear whether superior face recognition skills can be encountered during development. This paper presents O.B., a 14-year-old female with extraordinary face recognition skills: a "super-recognizer" (SR). O.B. demonstrated exceptional face-processing skills across multiple tasks, with a level of performance that is comparable to adult SRs. Her superior abilities appear to be specific to face identity: She showed an exaggerated face inversion effect and her superior abilities did not extend to object processing or non-identity aspects of face recognition. Finally, an eye-movement task demonstrated that O.B. spent more time than controls examining the nose - a pattern previously reported in adult SRs. O.B. is therefore particularly skilled at extracting and using identity-specific facial cues, indicating that face and object recognition are dissociable during development, and that super recognition can be detected in adolescence.

  8. Air-gun signature modelling considering the influence of mechanical structure factors

    International Nuclear Information System (INIS)

    Li, Guofa; Liu, Zhao; Wang, Jianhua; Cao, Mingqiang

    2014-01-01

    In marine seismic prospecting, as the air-gun array is usually composed of different types of air-guns, the signature modelling of different air-guns is particularly important to the array design. Different types of air-guns have different mechanical structures, which directly or indirectly affect the signatures. In order to simulate the influence of the mechanical structure, five parameters—the throttling constant, throttling power law exponent, mass release efficiency, fluid viscosity and heat transfer coefficient—are used in signature modelling. Through minimizing the energy relative error between the simulated and the measured signatures by the simulated annealing method, the five optimal parameters can be estimated. The method is tested in a field experiment, and the consistency between the simulated and the measured signatures is improved with the optimal parameters. (paper)

  9. A motivational determinant of facial emotion recognition: regulatory focus affects recognition of emotions in faces.

    Science.gov (United States)

    Sassenrath, Claudia; Sassenberg, Kai; Ray, Devin G; Scheiter, Katharina; Jarodzka, Halszka

    2014-01-01

    Two studies examined an unexplored motivational determinant of facial emotion recognition: observer regulatory focus. It was predicted that a promotion focus would enhance facial emotion recognition relative to a prevention focus because the attentional strategies associated with promotion focus enhance performance on well-learned or innate tasks - such as facial emotion recognition. In Study 1, a promotion or a prevention focus was experimentally induced and better facial emotion recognition was observed in a promotion focus compared to a prevention focus. In Study 2, individual differences in chronic regulatory focus were assessed and attention allocation was measured using eye tracking during the facial emotion recognition task. Results indicated that the positive relation between a promotion focus and facial emotion recognition is mediated by shorter fixation duration on the face which reflects a pattern of attention allocation matched to the eager strategy in a promotion focus (i.e., striving to make hits). A prevention focus did not have an impact neither on perceptual processing nor on facial emotion recognition. Taken together, these findings demonstrate important mechanisms and consequences of observer motivational orientation for facial emotion recognition.

  10. Pattern recognition & machine learning

    CERN Document Server

    Anzai, Y

    1992-01-01

    This is the first text to provide a unified and self-contained introduction to visual pattern recognition and machine learning. It is useful as a general introduction to artifical intelligence and knowledge engineering, and no previous knowledge of pattern recognition or machine learning is necessary. Basic for various pattern recognition and machine learning methods. Translated from Japanese, the book also features chapter exercises, keywords, and summaries.

  11. 7 CFR Appendix B to Subpart E of... - Certificate of Incumbency and Signature

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 14 2010-01-01 2009-01-01 true Certificate of Incumbency and Signature B Appendix B... Signature U.S. Department of Agriculture—Farmers Home Administration or its successor agency under Public... successor agency under Public Law 103-354 and that the signature appearing below and that the signatures...

  12. A REVIEW: OPTICAL CHARACTER RECOGNITION

    OpenAIRE

    Swati Tomar*1 & Amit Kishore2

    2018-01-01

    This paper presents detailed review in the field of Optical Character Recognition. Various techniques are determine that have been proposed to realize the center of character recognition in an optical character recognition system. Even though, sufficient studies and papers are describes the techniques for converting textual content from a paper document into machine readable form. Optical character recognition is a process where the computer understands automatically the image of handwritten ...

  13. Distinct mutational signatures characterize concurrent loss of polymerase proofreading and mismatch repair.

    Science.gov (United States)

    Haradhvala, N J; Kim, J; Maruvka, Y E; Polak, P; Rosebrock, D; Livitz, D; Hess, J M; Leshchiner, I; Kamburov, A; Mouw, K W; Lawrence, M S; Getz, G

    2018-05-01

    Fidelity of DNA replication is maintained using polymerase proofreading and the mismatch repair pathway. Tumors with loss of function of either mechanism have elevated mutation rates with characteristic mutational signatures. Here we report that tumors with concurrent loss of both polymerase proofreading and mismatch repair function have mutational patterns that are not a simple sum of the signatures of the individual alterations, but correspond to distinct, previously unexplained signatures: COSMIC database signatures 14 and 20. We then demonstrate that in all five cases in which the chronological order of events could be determined, polymerase epsilon proofreading alterations precede the defect in mismatch repair. Overall, we illustrate that multiple distinct mutational signatures can result from different combinations of a smaller number of mutational processes (of either damage or repair), which can influence the interpretation and discovery of mutational signatures.

  14. Restrictive partially blind signature for resource-constrained information systems

    NARCIS (Netherlands)

    Qiu, Weidong; Gong, Zheng; Liu, Bozhong; Long, Yu; Chen, Kefei

    2010-01-01

    Restrictive partially blind signature, which is designed for privacy oriented information systems, allows a user to obtain a blind signature from a signer whilst the blind message must obey some certain rules. In order to reduce storage and communication costs, several public-key cryptosystems are

  15. The 82-plex plasma protein signature that predicts increasing inflammation

    DEFF Research Database (Denmark)

    Tepel, Martin; Beck, Hans C; Tan, Qihua

    2015-01-01

    The objective of the study was to define the specific plasma protein signature that predicts the increase of the inflammation marker C-reactive protein from index day to next-day using proteome analysis and novel bioinformatics tools. We performed a prospective study of 91 incident kidney....... The prediction model selected and validated 82 plasma proteins which determined increased next-day C-reactive protein (area under receiver-operator-characteristics curve, 0.772; 95% confidence interval, 0.669 to 0.876; P signature (P ....001) was associated with observed increased next-day C-reactive protein. The 82-plex protein signature outperformed routine clinical procedures. The category-free net reclassification index improved with 82-plex plasma protein signature (total net reclassification index, 88.3%). Using the 82-plex plasma protein...

  16. A novel quantum group signature scheme without using entangled states

    Science.gov (United States)

    Xu, Guang-Bao; Zhang, Ke-Jia

    2015-07-01

    In this paper, we propose a novel quantum group signature scheme. It can make the signer sign a message on behalf of the group without the help of group manager (the arbitrator), which is different from the previous schemes. In addition, a signature can be verified again when its signer disavows she has ever generated it. We analyze the validity and the security of the proposed signature scheme. Moreover, we discuss the advantages and the disadvantages of the new scheme and the existing ones. The results show that our scheme satisfies all the characteristics of a group signature and has more advantages than the previous ones. Like its classic counterpart, our scheme can be used in many application scenarios, such as e-government and e-business.

  17. Nonlinear control of magnetic signatures

    Science.gov (United States)

    Niemoczynski, Bogdan

    Magnetic properties of ferrite structures are known to cause fluctuations in Earth's magnetic field around the object. These fluctuations are known as the object's magnetic signature and are unique based on the object's geometry and material. It is a common practice to neutralize magnetic signatures periodically after certain time intervals, however there is a growing interest to develop real time degaussing systems for various applications. Development of real time degaussing system is a challenging problem because of magnetic hysteresis and difficulties in measurement or estimation of near-field flux data. The goal of this research is to develop a real time feedback control system that can be used to minimize magnetic signatures for ferrite structures. Experimental work on controlling the magnetic signature of a cylindrical steel shell structure with a magnetic disturbance provided evidence that the control process substantially increased the interior magnetic flux. This means near field estimation using interior sensor data is likely to be inaccurate. Follow up numerical work for rectangular and cylindrical cross sections investigated variations in shell wall flux density under a variety of ambient excitation and applied disturbances. Results showed magnetic disturbances could corrupt interior sensor data and magnetic shielding due to the shell walls makes the interior very sensitive to noise. The magnetic flux inside the shell wall showed little variation due to inner disturbances and its high base value makes it less susceptible to noise. This research proceeds to describe a nonlinear controller to use the shell wall data as an input. A nonlinear plant model of magnetics is developed using a constant tau to represent domain rotation lag and a gain function k to describe the magnetic hysteresis curve for the shell wall. The model is justified by producing hysteresis curves for multiple materials, matching experimental data using a particle swarm algorithm, and

  18. Scalable Arbitrated Quantum Signature of Classical Messages with Multi-Signers

    International Nuclear Information System (INIS)

    Yang Yuguang; Wang Yuan; Teng Yiwei; Chai Haiping; Wen Qiaoyan

    2010-01-01

    Unconditionally secure signature is an important part of quantum cryptography. Usually, a signature scheme only provides an environment for a single signer. Nevertheless, in real applications, many signers may collaboratively send a message to the verifier and convince the verifier that the message is actually transmitted by them. In this paper, we give a scalable arbitrated signature protocol of classical messages with multi-signers. Its security is analyzed and proved to be secure even with a compromised arbitrator. (general)

  19. Tightly Secure Signatures From Lossy Identification Schemes

    OpenAIRE

    Abdalla , Michel; Fouque , Pierre-Alain; Lyubashevsky , Vadim; Tibouchi , Mehdi

    2015-01-01

    International audience; In this paper, we present three digital signature schemes with tight security reductions in the random oracle model. Our first signature scheme is a particularly efficient version of the short exponent discrete log-based scheme of Girault et al. (J Cryptol 19(4):463–487, 2006). Our scheme has a tight reduction to the decisional short discrete logarithm problem, while still maintaining the non-tight reduction to the computational version of the problem upon which the or...

  20. Challenging ocular image recognition

    Science.gov (United States)

    Pauca, V. Paúl; Forkin, Michael; Xu, Xiao; Plemmons, Robert; Ross, Arun A.

    2011-06-01

    Ocular recognition is a new area of biometric investigation targeted at overcoming the limitations of iris recognition performance in the presence of non-ideal data. There are several advantages for increasing the area beyond the iris, yet there are also key issues that must be addressed such as size of the ocular region, factors affecting performance, and appropriate corpora to study these factors in isolation. In this paper, we explore and identify some of these issues with the goal of better defining parameters for ocular recognition. An empirical study is performed where iris recognition methods are contrasted with texture and point operators on existing iris and face datasets. The experimental results show a dramatic recognition performance gain when additional features are considered in the presence of poor quality iris data, offering strong evidence for extending interest beyond the iris. The experiments also highlight the need for the direct collection of additional ocular imagery.

  1. Selective forgery of RSA signatures with fixed-pattern padding

    NARCIS (Netherlands)

    Lenstra, A.K.; Shparlinski, I.E.; Naccache, D.; Paillier, P.

    2002-01-01

    We present a practical selective forgery attack against RSA signatures with fixed-pattern padding shorter than two thirds of the modulus length. Our result extends the practical existential forgery of such RSA signatures that was presented at Crypto 2001. For an n-bit modulus the heuristic

  2. Comparison of transcriptomic signature of post-Chernobyl and post radiotherapy thyroid tumors

    International Nuclear Information System (INIS)

    Ory, Catherine; Ugolin, Nicolas; Chevillard, Sylvie; Hofman, Paul; Schlumberger, Martin; Likhtarev, Illya A.

    2013-01-01

    We previously identified two highly discriminating and predictive radiation-induced transcriptomic signatures by comparing series of sporadic and post radiotherapy thyroid tumors (322-gene signature), and by reanalyzing a previously published data set of sporadic and post-Chernobyl thyroid tumors (106-gene signature). The aim of the present work was (i) to compare the two signatures in terms of gene expression de-regulations and molecular features/pathways, and (ii) to test the capacity of the post radiotherapy signature in classifying the post-Chernobyl series of tumors and reciprocally of the post-Chernobyl signature in classifying the post radiotherapy-induced tumors. We now explored if post radiotherapy and post-Chernobyl papillary thyroid carcinomas (PTC) display common molecular features by comparing molecular pathways deregulated in the two tumor series, and tested the potential of gene subsets of the post radiotherapy signature to classify the post-Chernobyl series (14 sporadic and 12 post-Chernobyl PTC), and reciprocally of gene subsets of the post-Chernobyl signature to classify the post radiotherapy series (15 sporadic and 12 post radiotherapy PTC), by using conventional principal component analysis. We found that the five genes common to the two signatures classified the learning/training tumors (used to search these signatures) of both the post radiotherapy (seven PTC) and the post-Chernobyl (six PTC) thyroid tumor series as compared with the sporadic tumors (seven sporadic PTC in each series). Importantly, these five genes were also effective for classifying independent series of post radiotherapy (five PTC) and post-Chernobyl (six PTC) tumors compared to independent series of sporadic tumors (eight PTC and six PTC respectively; testing tumors). Moreover, part of each post radiotherapy (32 genes) and post-Chernobyl signature (16 genes) cross-classified the respective series of thyroid tumors. Finally, several molecular pathways deregulated in post

  3. SOIL RESPIRED D13C SIGNATURES REFLECT ROOT EXUDATE OR ROOT TURNOVER SIGNATURES IN AN ELEVATED CO2 AND OZONE MESOCOSM EXPERIMENT

    Science.gov (United States)

    Bulk tissue and root and soil respired d13C signatures were measured throughout the soil profile in a Ponderosa Pine mesocosm experiment exposed to ambient and elevated CO2 concentrations. For the ambient treatment, root (0-1mm, 1-2mm, and >2mm) and soil d13C signatures were ?24...

  4. Distinct microbiological signatures associated with triple negative breast cancer.

    Science.gov (United States)

    Banerjee, Sagarika; Wei, Zhi; Tan, Fei; Peck, Kristen N; Shih, Natalie; Feldman, Michael; Rebbeck, Timothy R; Alwine, James C; Robertson, Erle S

    2015-10-15

    Infectious agents are the third highest human cancer risk factor and may have a greater role in the origin and/or progression of cancers, and related pathogenesis. Thus, knowing the specific viruses and microbial agents associated with a cancer type may provide insights into cause, diagnosis and treatment. We utilized a pan-pathogen array technology to identify the microbial signatures associated with triple negative breast cancer (TNBC). This technology detects low copy number and fragmented genomes extracted from formalin-fixed paraffin embedded archival tissues. The results, validated by PCR and sequencing, define a microbial signature present in TNBC tissue which was underrepresented in normal tissue. Hierarchical clustering analysis displayed two broad microbial signatures, one prevalent in bacteria and parasites and one prevalent in viruses. These signatures demonstrate a new paradigm in our understanding of the link between microorganisms and cancer, as causative or commensal in the tumor microenvironment and provide new diagnostic potential.

  5. Signatures of topological superconductivity

    Energy Technology Data Exchange (ETDEWEB)

    Peng, Yang

    2017-07-19

    The prediction and experimental discovery of topological insulators brought the importance of topology in condensed matter physics into the limelight. Topology hence acts as a new dimension along which more and more new states of matter start to emerge. One of these topological states of matter, namely topological superconductors, comes into the focus because of their gapless excitations. These gapless excitations, especially in one dimensional topological superconductors, are Majorana zero modes localized at the ends of the superconductor and exhibit exotic nonabelian statistics, which can be potentially applied to fault-tolerant quantum computation. Given their highly interesting physical properties and potential applications to quantum computation, both theorists and experimentalists spend great efforts to realize topological supercondoctors and to detect Majoranas. In two projects within this thesis, we investigate the properties of Majorana zero modes in realistic materials which are absent in simple theoretical models. We find that the superconducting proximity effect, an essential ingredient in all existing platforms for topological superconductors, plays a significant role in determining the localization property of the Majoranas. Strong proximity coupling between the normal system and the superconducting substrate can lead to strongly localized Majoranas, which can explain the observation in a recent experiment. Motivated by experiments in Molenkamp's group, we also look at realistic quantum spin Hall Josephson junctions, in which charge puddles acting as magnetic impurities are coupled to the helical edge states. We find that with this setup, the junction generically realizes an exotic 8π periodic Josephson effect, which is absent in a pristine Josephson junction. In another two projects, we propose more pronounced signatures of Majoranas that are accessible with current experimental techniques. The first one is a transport measurement, which uses

  6. On psychoanalytic supervision as signature pedagogy.

    Science.gov (United States)

    Watkins, C Edward

    2014-04-01

    What is signature pedagogy in psychoanalytic education? This paper examines that question, considering why psychoanalytic supervision best deserves that designation. In focusing on supervision as signature pedagogy, I accentuate its role in building psychoanalytic habits of mind, habits of hand, and habits of heart, and transforming theory and self-knowledge into practical product. Other facets of supervision as signature pedagogy addressed in this paper include its features of engagement, uncertainty, formation, and pervasiveness, as well as levels of surface, deep, and implicit structure. Epistemological, ontological, and axiological in nature, psychoanalytic supervision engages trainees in learning to do, think, and value what psychoanalytic practitioners in the field do, think, and value: It is, most fundamentally, professional preparation for competent, "good work." In this paper, effort is made to shine a light on and celebrate the pivotal role of supervision in "making" or developing budding psychoanalysts and psychoanalytic psychotherapists. Now over a century old, psychoanalytic supervision remains unparalleled in (1) connecting and integrating conceptualization and practice, (2) transforming psychoanalytic theory and self-knowledge into an informed analyzing instrument, and (3) teaching, transmitting, and perpetuating the traditions, practice, and culture of psychoanalytic treatment.

  7. L1000CDS2: LINCS L1000 characteristic direction signatures search engine.

    Science.gov (United States)

    Duan, Qiaonan; Reid, St Patrick; Clark, Neil R; Wang, Zichen; Fernandez, Nicolas F; Rouillard, Andrew D; Readhead, Ben; Tritsch, Sarah R; Hodos, Rachel; Hafner, Marc; Niepel, Mario; Sorger, Peter K; Dudley, Joel T; Bavari, Sina; Panchal, Rekha G; Ma'ayan, Avi

    2016-01-01

    The library of integrated network-based cellular signatures (LINCS) L1000 data set currently comprises of over a million gene expression profiles of chemically perturbed human cell lines. Through unique several intrinsic and extrinsic benchmarking schemes, we demonstrate that processing the L1000 data with the characteristic direction (CD) method significantly improves signal to noise compared with the MODZ method currently used to compute L1000 signatures. The CD processed L1000 signatures are served through a state-of-the-art web-based search engine application called L1000CDS 2 . The L1000CDS 2 search engine provides prioritization of thousands of small-molecule signatures, and their pairwise combinations, predicted to either mimic or reverse an input gene expression signature using two methods. The L1000CDS 2 search engine also predicts drug targets for all the small molecules profiled by the L1000 assay that we processed. Targets are predicted by computing the cosine similarity between the L1000 small-molecule signatures and a large collection of signatures extracted from the gene expression omnibus (GEO) for single-gene perturbations in mammalian cells. We applied L1000CDS 2 to prioritize small molecules that are predicted to reverse expression in 670 disease signatures also extracted from GEO, and prioritized small molecules that can mimic expression of 22 endogenous ligand signatures profiled by the L1000 assay. As a case study, to further demonstrate the utility of L1000CDS 2 , we collected expression signatures from human cells infected with Ebola virus at 30, 60 and 120 min. Querying these signatures with L1000CDS 2 we identified kenpaullone, a GSK3B/CDK2 inhibitor that we show, in subsequent experiments, has a dose-dependent efficacy in inhibiting Ebola infection in vitro without causing cellular toxicity in human cell lines. In summary, the L1000CDS 2 tool can be applied in many biological and biomedical settings, while improving the extraction of

  8. Trace element ink spiking for signature authentication

    International Nuclear Information System (INIS)

    Hatzistavros, V.S.; Kallithrakas-Kontos, N.G.

    2008-01-01

    Signature authentication is a critical question in forensic document examination. Last years the evolution of personal computers made signature copying a quite easy task, so the development of new ways for signature authentication is crucial. In the present work a commercial ink was spiked with many trace elements in various concentrations. Inorganic and organometallic ink soluble compounds were used as spiking agents, whilst ink retained its initial properties. The spiked inks were used for paper writing and the documents were analyzed by a non destructive method, the energy dispersive X-ray fluorescence. The thin target model was proved right for quantitative analysis and a very good linear relationship of the intensity (X-ray signal) against concentration was estimated for all used elements. Intensity ratios between different elements in the same ink gave very stable results, independent on the writing alterations. The impact of time both to written document and prepared inks was also investigated. (author)

  9. A Lattice-Based Identity-Based Proxy Blind Signature Scheme in the Standard Model

    Directory of Open Access Journals (Sweden)

    Lili Zhang

    2014-01-01

    Full Text Available A proxy blind signature scheme is a special form of blind signature which allowed a designated person called proxy signer to sign on behalf of original signers without knowing the content of the message. It combines the advantages of proxy signature and blind signature. Up to date, most proxy blind signature schemes rely on hard number theory problems, discrete logarithm, and bilinear pairings. Unfortunately, the above underlying number theory problems will be solvable in the postquantum era. Lattice-based cryptography is enjoying great interest these days, due to implementation simplicity and provable security reductions. Moreover, lattice-based cryptography is believed to be hard even for quantum computers. In this paper, we present a new identity-based proxy blind signature scheme from lattices without random oracles. The new scheme is proven to be strongly unforgeable under the standard hardness assumption of the short integer solution problem (SIS and the inhomogeneous small integer solution problem (ISIS. Furthermore, the secret key size and the signature length of our scheme are invariant and much shorter than those of the previous lattice-based proxy blind signature schemes. To the best of our knowledge, our construction is the first short lattice-based identity-based proxy blind signature scheme in the standard model.

  10. Signatures of the Invisible

    CERN Multimedia

    Strom, D

    2003-01-01

    On the Net it is possible to take a look at art from afar via Virtual Museums. One such exhibition was recently in the New York Museum of Modern Art's branch, PS1. Entitled 'Signatures of the Invisible' it was a collaborative effort between artists and physicists (1/2 page).

  11. Magnetic Signature Analysis & Validation System

    National Research Council Canada - National Science Library

    Vliet, Scott

    2001-01-01

    The Magnetic Signature Analysis and Validation (MAGSAV) System is a mobile platform that is used to measure, record, and analyze the perturbations to the earth's ambient magnetic field caused by object such as armored vehicles...

  12. Genetic specificity of face recognition.

    Science.gov (United States)

    Shakeshaft, Nicholas G; Plomin, Robert

    2015-10-13

    Specific cognitive abilities in diverse domains are typically found to be highly heritable and substantially correlated with general cognitive ability (g), both phenotypically and genetically. Recent twin studies have found the ability to memorize and recognize faces to be an exception, being similarly heritable but phenotypically substantially uncorrelated both with g and with general object recognition. However, the genetic relationships between face recognition and other abilities (the extent to which they share a common genetic etiology) cannot be determined from phenotypic associations. In this, to our knowledge, first study of the genetic associations between face recognition and other domains, 2,000 18- and 19-year-old United Kingdom twins completed tests assessing their face recognition, object recognition, and general cognitive abilities. Results confirmed the substantial heritability of face recognition (61%), and multivariate genetic analyses found that most of this genetic influence is unique and not shared with other cognitive abilities.

  13. Face Detection and Recognition

    National Research Council Canada - National Science Library

    Jain, Anil K

    2004-01-01

    This report describes research efforts towards developing algorithms for a robust face recognition system to overcome many of the limitations found in existing two-dimensional facial recognition systems...

  14. A Space-Based Observational Strategy for Hydrogen Cosmology Using Dynamic Polarimetry and Pattern Recognition

    Science.gov (United States)

    Burns, Jack O.; Nhan, Bang; Bradley, Richard F.; Tauscher, Keith A.; Rapetti, David; Switzer, Eric

    2018-06-01

    The redshifted 21-cm monopole is expected to be a powerful probe of the epoch of the first stars and galaxies (10 polarimetry that separates the polarized foreground from the unpolarized 21-cm signal. Initial results from a ground-based prototype called the Cosmic Twilight Polarimeter will be described which tentatively reveal the presence of the expected polarization signature from the foreground. Dynamic polarimetry, when combined with sophisticated pattern recognition techniques based on training sets, machine learning, and statistical information criteria offer promise for precise extraction of the 21-cm spectrum. We describe a new SmallSat mission concept, the Dark Ages Polarimetry Pathfinder (DAPPer), that will utilize these novel approaches for extending the recent detection of a 78 MHz signal down to lower frequencies where we can uniquely probe evidence for the first stars and dark matter.

  15. Forensic Face Recognition: A Survey

    NARCIS (Netherlands)

    Ali, Tauseef; Spreeuwers, Lieuwe Jan; Veldhuis, Raymond N.J.; Quaglia, Adamo; Epifano, Calogera M.

    2012-01-01

    The improvements of automatic face recognition during the last 2 decades have disclosed new applications like border control and camera surveillance. A new application field is forensic face recognition. Traditionally, face recognition by human experts has been used in forensics, but now there is a

  16. Voice Recognition in Face-Blind Patients

    Science.gov (United States)

    Liu, Ran R.; Pancaroglu, Raika; Hills, Charlotte S.; Duchaine, Brad; Barton, Jason J. S.

    2016-01-01

    Right or bilateral anterior temporal damage can impair face recognition, but whether this is an associative variant of prosopagnosia or part of a multimodal disorder of person recognition is an unsettled question, with implications for cognitive and neuroanatomic models of person recognition. We assessed voice perception and short-term recognition of recently heard voices in 10 subjects with impaired face recognition acquired after cerebral lesions. All 4 subjects with apperceptive prosopagnosia due to lesions limited to fusiform cortex had intact voice discrimination and recognition. One subject with bilateral fusiform and anterior temporal lesions had a combined apperceptive prosopagnosia and apperceptive phonagnosia, the first such described case. Deficits indicating a multimodal syndrome of person recognition were found only in 2 subjects with bilateral anterior temporal lesions. All 3 subjects with right anterior temporal lesions had normal voice perception and recognition, 2 of whom performed normally on perceptual discrimination of faces. This confirms that such lesions can cause a modality-specific associative prosopagnosia. PMID:25349193

  17. Invariant Face recognition Using Infrared Images

    International Nuclear Information System (INIS)

    Zahran, E.G.

    2012-01-01

    Over the past few decades, face recognition has become a rapidly growing research topic due to the increasing demands in many applications of our daily life such as airport surveillance, personal identification in law enforcement, surveillance systems, information safety, securing financial transactions, and computer security. The objective of this thesis is to develop a face recognition system capable of recognizing persons with a high recognition capability, low processing time, and under different illumination conditions, and different facial expressions. The thesis presents a study for the performance of the face recognition system using two techniques; the Principal Component Analysis (PCA), and the Zernike Moments (ZM). The performance of the recognition system is evaluated according to several aspects including the recognition rate, and the processing time. Face recognition systems that use visual images are sensitive to variations in the lighting conditions and facial expressions. The performance of these systems may be degraded under poor illumination conditions or for subjects of various skin colors. Several solutions have been proposed to overcome these limitations. One of these solutions is to work in the Infrared (IR) spectrum. IR images have been suggested as an alternative source of information for detection and recognition of faces, when there is little or no control over lighting conditions. This arises from the fact that these images are formed due to thermal emissions from skin, which is an intrinsic property because these emissions depend on the distribution of blood vessels under the skin. On the other hand IR face recognition systems still have limitations with temperature variations and recognition of persons wearing eye glasses. In this thesis we will fuse IR images with visible images to enhance the performance of face recognition systems. Images are fused using the wavelet transform. Simulation results show that the fusion of visible and

  18. End-Stop Exemplar Based Recognition

    DEFF Research Database (Denmark)

    Olsen, Søren I.

    2003-01-01

    An approach to exemplar based recognition of visual shapes is presented. The shape information is described by attributed interest points (keys) detected by an end-stop operator. The attributes describe the statistics of lines and edges local to the interest point, the position of neighboring int...... interest points, and (in the training phase) a list of recognition names. Recognition is made by a simple voting procedure. Preliminary experiments indicate that the recognition is robust to noise, small deformations, background clutter and partial occlusion....

  19. Speech Recognition on Mobile Devices

    DEFF Research Database (Denmark)

    Tan, Zheng-Hua; Lindberg, Børge

    2010-01-01

    in the mobile context covering motivations, challenges, fundamental techniques and applications. Three ASR architectures are introduced: embedded speech recognition, distributed speech recognition and network speech recognition. Their pros and cons and implementation issues are discussed. Applications within......The enthusiasm of deploying automatic speech recognition (ASR) on mobile devices is driven both by remarkable advances in ASR technology and by the demand for efficient user interfaces on such devices as mobile phones and personal digital assistants (PDAs). This chapter presents an overview of ASR...

  20. Markov Models for Handwriting Recognition

    CERN Document Server

    Plotz, Thomas

    2011-01-01

    Since their first inception, automatic reading systems have evolved substantially, yet the recognition of handwriting remains an open research problem due to its substantial variation in appearance. With the introduction of Markovian models to the field, a promising modeling and recognition paradigm was established for automatic handwriting recognition. However, no standard procedures for building Markov model-based recognizers have yet been established. This text provides a comprehensive overview of the application of Markov models in the field of handwriting recognition, covering both hidden

  1. XMSS : a practical forward secure signature scheme based on minimal security assumptions

    NARCIS (Netherlands)

    Buchmann, Johannes; Dahmen, Erik; Hülsing, Andreas; Yang, B.-Y.

    2011-01-01

    We present the hash-based signature scheme XMSS. It is the first provably (forward) secure and practical signature scheme with minimal security requirements: a pseudorandom and a second preimage resistant (hash) function family. Its signature size is reduced to less than 25% compared to the best

  2. Intrinsic Chirality and Prochirality at Air/R-(+)- and S-(-)-Limonene Interfaces: Spectral Signatures with Interference Chiral Sum-Frequency Generation Vibrational Spectroscopy

    Energy Technology Data Exchange (ETDEWEB)

    Fu, Li; Zhang, Yun; Wei, Zhehao; Wang, Hongfei

    2014-06-04

    We report in this work detailed measurements on the chiral and achiral sum-frequency vibrational spectra in the C-H stretching vibration region (2800-3050cm-1) of the air/liquid interfaces of R-limonene and S-limonene, using the recently developed high-resolution broadband sum-frequency generation vibrational spectroscopy (HR-BB-SFG-VS). The achiral SFG spectra of R-limonene and S-limonene, as well as the equal amount (50/50) racemic mixture show that the enantiomers are with the same interfacial orientations. The interference chiral SFG spectra of the limonene enantiomers exhibit spectral signature from chiral response of the Cα-H stretching mode, and spectral signature from prochiral response of the CH2 asymmetric stretching mode, respectively. The chiral spectral feature of the Cα-H stretching mode changes sign from R-limonene to S-limonene, and disappears for the 50/50 racemic mixture. While the prochiral spectral feature of the CH2 asymmetric stretching mode is the same for R-limonene and S-limonene, and also surprisingly remains the same for the 50/50 racemic mixture. These results provided detail information in understanding the structure and chirality of molecular interfaces, and demonstrated the sensitivity and potential of SFG-VS as unique spectroscopic tool for chirality characterization and chiral recognition at the molecular interface.

  3. Examining ERP correlates of recognition memory: Evidence of accurate source recognition without recollection

    Science.gov (United States)

    Addante, Richard, J.; Ranganath, Charan; Yonelinas, Andrew, P.

    2012-01-01

    Recollection is typically associated with high recognition confidence and accurate source memory. However, subjects sometimes make accurate source memory judgments even for items that are not confidently recognized, and it is not known whether these responses are based on recollection or some other memory process. In the current study, we measured event related potentials (ERPs) while subjects made item and source memory confidence judgments in order to determine whether recollection supported accurate source recognition responses for items that were not confidently recognized. In line with previous studies, we found that recognition memory was associated with two ERP effects: an early on-setting FN400 effect, and a later parietal old-new effect [Late Positive Component (LPC)], which have been associated with familiarity and recollection, respectively. The FN400 increased gradually with item recognition confidence, whereas the LPC was only observed for highly confident recognition responses. The LPC was also related to source accuracy, but only for items that had received a high confidence item recognition response; accurate source judgments to items that were less confidently recognized did not exhibit the typical ERP correlate of recollection or familiarity, but rather showed a late, broadly distributed negative ERP difference. The results indicate that accurate source judgments of episodic context can occur even when recollection fails. PMID:22548808

  4. LAVA: An Open-Source Approach To Designing LAMP (Loop-Mediated Isothermal Amplification DNA Signatures

    Directory of Open Access Journals (Sweden)

    Gardner Shea N

    2011-06-01

    Full Text Available Abstract Background We developed an extendable open-source Loop-mediated isothermal AMPlification (LAMP signature design program called LAVA (LAMP Assay Versatile Analysis. LAVA was created in response to limitations of existing LAMP signature programs. Results LAVA identifies combinations of six primer regions for basic LAMP signatures, or combinations of eight primer regions for LAMP signatures with loop primers, which can be used as LAMP signatures. The identified primers are conserved among target organism sequences. Primer combinations are optimized based on lengths, melting temperatures, and spacing among primer sites. We compare LAMP signature candidates for Staphylococcus aureus created both by LAVA and by PrimerExplorer. We also include signatures from a sample run targeting all strains of Mycobacterium tuberculosis. Conclusions We have designed and demonstrated new software for identifying signature candidates appropriate for LAMP assays. The software is available for download at http://lava-dna.googlecode.com/.

  5. Evaluating music emotion recognition:Lessons from music genre recognition?

    OpenAIRE

    Sturm, Bob L.

    2013-01-01

    A fundamental problem with nearly all work in music genre recognition (MGR)is that evaluation lacks validity with respect to the principal goals of MGR. This problem also occurs in the evaluation of music emotion recognition (MER). Standard approaches to evaluation, though easy to implement, do not reliably differentiate between recognizing genre or emotion from music, or by virtue of confounding factors in signals (e.g., equalization). We demonstrate such problems for evaluating an MER syste...

  6. A Prototype of Mathematical Treatment of Pen Pressure Data for Signature Verification.

    Science.gov (United States)

    Li, Chi-Keung; Wong, Siu-Kay; Chim, Lai-Chu Joyce

    2018-01-01

    A prototype using simple mathematical treatment of the pen pressure data recorded by a digital pen movement recording device was derived. In this study, a total of 48 sets of signature and initial specimens were collected. Pearson's correlation coefficient was used to compare the data of the pen pressure patterns. From the 820 pair comparisons of the 48 sets of genuine signatures, a high degree of matching was found in which 95.4% (782 pairs) and 80% (656 pairs) had rPA > 0.7 and rPA > 0.8, respectively. In the comparison of the 23 forged signatures with their corresponding control signatures, 20 of them (89.2% of pairs) had rPA values prototype could be used as a complementary technique to improve the objectivity of signature examination and also has a good potential to be developed as a tool for automated signature identification. © 2017 American Academy of Forensic Sciences.

  7. Image Processing Based Signature Verification Technique to Reduce Fraud in Financial Institutions

    Directory of Open Access Journals (Sweden)

    Hussein Walid

    2016-01-01

    Full Text Available Handwritten signature is broadly utilized as personal verification in financial institutions ensures the necessity for a robust automatic signature verification tool. This tool aims to reduce fraud in all related financial transactions’ sectors. This paper proposes an online, robust, and automatic signature verification technique using the recent advances in image processing and machine learning. Once the image of a handwritten signature for a customer is captured, several pre-processing steps are performed on it including filtration and detection of the signature edges. Afterwards, a feature extraction process is applied on the image to extract Speeded up Robust Features (SURF and Scale-Invariant Feature Transform (SIFT features. Finally, a verification process is developed and applied to compare the extracted image features with those stored in the database for the specified customer. Results indicate high accuracy, simplicity, and rapidity of the developed technique, which are the main criteria to judge a signature verification tool in banking and other financial institutions.

  8. Word Recognition in Auditory Cortex

    Science.gov (United States)

    DeWitt, Iain D. J.

    2013-01-01

    Although spoken word recognition is more fundamental to human communication than text recognition, knowledge of word-processing in auditory cortex is comparatively impoverished. This dissertation synthesizes current models of auditory cortex, models of cortical pattern recognition, models of single-word reading, results in phonetics and results in…

  9. [Comparative studies of face recognition].

    Science.gov (United States)

    Kawai, Nobuyuki

    2012-07-01

    Every human being is proficient in face recognition. However, the reason for and the manner in which humans have attained such an ability remain unknown. These questions can be best answered-through comparative studies of face recognition in non-human animals. Studies in both primates and non-primates show that not only primates, but also non-primates possess the ability to extract information from their conspecifics and from human experimenters. Neural specialization for face recognition is shared with mammals in distant taxa, suggesting that face recognition evolved earlier than the emergence of mammals. A recent study indicated that a social insect, the golden paper wasp, can distinguish their conspecific faces, whereas a closely related species, which has a less complex social lifestyle with just one queen ruling a nest of underlings, did not show strong face recognition for their conspecifics. Social complexity and the need to differentiate between one another likely led humans to evolve their face recognition abilities.

  10. Is having similar eye movement patterns during face learning and recognition beneficial for recognition performance? Evidence from hidden Markov modeling.

    Science.gov (United States)

    Chuk, Tim; Chan, Antoni B; Hsiao, Janet H

    2017-12-01

    The hidden Markov model (HMM)-based approach for eye movement analysis is able to reflect individual differences in both spatial and temporal aspects of eye movements. Here we used this approach to understand the relationship between eye movements during face learning and recognition, and its association with recognition performance. We discovered holistic (i.e., mainly looking at the face center) and analytic (i.e., specifically looking at the two eyes in addition to the face center) patterns during both learning and recognition. Although for both learning and recognition, participants who adopted analytic patterns had better recognition performance than those with holistic patterns, a significant positive correlation between the likelihood of participants' patterns being classified as analytic and their recognition performance was only observed during recognition. Significantly more participants adopted holistic patterns during learning than recognition. Interestingly, about 40% of the participants used different patterns between learning and recognition, and among them 90% switched their patterns from holistic at learning to analytic at recognition. In contrast to the scan path theory, which posits that eye movements during learning have to be recapitulated during recognition for the recognition to be successful, participants who used the same or different patterns during learning and recognition did not differ in recognition performance. The similarity between their learning and recognition eye movement patterns also did not correlate with their recognition performance. These findings suggested that perceptuomotor memory elicited by eye movement patterns during learning does not play an important role in recognition. In contrast, the retrieval of diagnostic information for recognition, such as the eyes for face recognition, is a better predictor for recognition performance. Copyright © 2017 Elsevier Ltd. All rights reserved.

  11. Neural Signatures of Trust During Human-Automation Interactions

    Science.gov (United States)

    2016-04-01

    also automated devices such as a Global Positioning System. For instance, to provide advanced safety measures, the Transportation Safety...AFRL-AFOSR-VA-TR-2016-0160 Neural Signatures of Trust during Human- Automation Interactions Frank Krueger GEORGE MASON UNIVERSITY Final Report 04/01...SUBTITLE Neural Signatures of Trust during Human- Automation Interactions 5a. CONTRACT NUMBER FA9550-13-1-0017 5b. GRANT NUMBER 5c. PROGRAM ELEMENT

  12. PSA response signatures - a powerful new prognostic indicator after radiation for prostate cancer?

    International Nuclear Information System (INIS)

    Denham, James W.; Lamb, David S.; Joseph, David; Matthews, John; Atkinson, Chris; Spry, Nigel A.; Duchesne, Gillian; Ebert, Martin; Steigler, Allison; D'Este, Catherine

    2009-01-01

    Background: We sought to determine whether inter-patient variations in pattern of PSA changes after radiation exist and, if so, are they prognostically significant. Methods: In the Trans-Tasman Radiation Oncology Group (TROG) 96.01 randomized controlled trial, patients with T2b,c,3,4 N0 prostate cancer (PC) were randomised to 0, 3 or 6 months maximal androgen deprivation prior to 66 Gy to the prostate and seminal vesicles (XRT). Patterns of anatomical site of failure were one of the trial endpoints. Serial serum PSA's were mandated at all follow-up visits. Pattern recognition software was developed to characterize PSA response 'signatures' (PRS) after therapy in individual patients. Results: By 2000, 270 eligible patients were randomised to radiation alone. Individual patient PSA values were observed to descend after radiation according to one of two characteristic 'signatures': single exponential (PRS Type 1), non-exponential (PRS Type 2). Compared to PRS Type 1, men with PRS Type 2 (50% of the group) had lower PSA nadir (nPSA) levels (p < .0001), longer doubling times on relapse (p = .006) and significantly lower rates of local (hazard ratio [HR]: 0.47, 95% confidence interval [0.30-0.75], p = .0014) and distant failure (HR: 0.25[0.13-0.46], p < .0001), death due to PC (HR: 0.20[0.10-0.42], p < .0001) and death due to any cause (HR: 0.37 [0.23-0.60], p < .0001). PRS retained its powerful prognostic significance in Cox models that incorporated all key pre-treatment covariates and nPSA. Conclusions: PRS reflect the presence of tumor phenotypes that vary substantially in their clinical behavior and response to XRT. Molecular characterization is now necessary

  13. KEA-71 Smart Current Signature Sensor (SCSS)

    Science.gov (United States)

    Perotti, Jose M.

    2010-01-01

    This slide presentation reviews the development and uses of the Smart Current Signature Sensor (SCSS), also known as the Valve Health Monitor (VHM) system. SCSS provides a way to not only monitor real-time the valve's operation in a non invasive manner, but also to monitor its health (Fault Detection and Isolation) and identify potential faults and/or degradation in the near future (Prediction/Prognosis). This technology approach is not only applicable for solenoid valves, and it could be extrapolated to other electrical components with repeatable electrical current signatures such as motors.

  14. Quark-Gluon Plasma Signatures

    CERN Document Server

    Vogt, Ramona

    1998-01-01

    Aspects of quark-gluon plasma signatures that can be measured by CMS are discussed. First the initial conditions of the system from minijet production are introduced, including shadowing effects. Color screening of the Upsilon family is then presented, followed by energy loss effects on charm and bottom hadrons, high Pt jets and global observables.

  15. ARMed SPHINCS computing a 41KB signature in 16KB of RAM

    NARCIS (Netherlands)

    Hülsing, A.T.; Rijneveld, J.; Schwabe, P.; Cheng, C.-M.; Chung, K.-M.; Persiano, G.; Yang, B.-Y.

    2016-01-01

    This paper shows that it is feasible to implement the stateless hash-based signature scheme SPHINCS-256 on an embedded microprocessor with memory even smaller than a signature and limited computing power. We demonstrate that it is possible to generate and verify the 41KB signature on an ARM Cortex

  16. Visual Recognition Memory across Contexts

    Science.gov (United States)

    Jones, Emily J. H.; Pascalis, Olivier; Eacott, Madeline J.; Herbert, Jane S.

    2011-01-01

    In two experiments, we investigated the development of representational flexibility in visual recognition memory during infancy using the Visual Paired Comparison (VPC) task. In Experiment 1, 6- and 9-month-old infants exhibited recognition when familiarization and test occurred in the same room, but showed no evidence of recognition when…

  17. Privacy in wireless sensor networks using ring signature

    Directory of Open Access Journals (Sweden)

    Ashmita Debnath

    2014-07-01

    Full Text Available The veracity of a message from a sensor node must be verified in order to avoid a false reaction by the sink. This verification requires the authentication of the source node. The authentication process must also preserve the privacy such that the node and the sensed object are not endangered. In this work, a ring signature was proposed to authenticate the source node while preserving its spatial privacy. However, other nodes as signers and their numbers must be chosen to preclude the possibility of a traffic analysis attack by an adversary. The spatial uncertainty increases with the number of signers but requires larger memory size and communication overhead. This requirement can breach the privacy of the sensed object. To determine the effectiveness of the proposed scheme, the location estimate of a sensor node by an adversary and enhancement in the location uncertainty with a ring signature was evaluated. Using simulation studies, the ring signature was estimated to require approximately four members from the same neighbor region of the source node to sustain the privacy of the node. Furthermore, the ring signature was also determined to have a small overhead and not to adversely affect the performance of the sensor network.

  18. ARMed SPHINCS : computing a 41KB signature in 16KB of RAM

    NARCIS (Netherlands)

    Hülsing, A.T.; Rijneveld, J.; Schwabe, P.

    2015-01-01

    This paper shows that it is feasible to implement the stateless hash-based signature scheme SPHINCS-256 on a "very small device" with memory even smaller than a signature and limited computing power. We demonstrate that it is possible to generate and verify the 41\\,KB signature on an ARM Cortex M3

  19. Spatial Signature Estimation with an Uncalibrated Uniform Linear Array

    Directory of Open Access Journals (Sweden)

    Xiang Cao

    2015-06-01

    Full Text Available In this paper, the problem of spatial signature estimation using a uniform linear array (ULA with unknown sensor gain and phase errors is considered. As is well known, the directions-of-arrival (DOAs can only be determined within an unknown rotational angle in this array model. However, the phase ambiguity has no impact on the identification of the spatial signature. Two auto-calibration methods are presented for spatial signature estimation. In our methods, the rotational DOAs and model error parameters are firstly obtained, and the spatial signature is subsequently calculated. The first method extracts two subarrays from the ULA to construct an estimator, and the elements of the array can be used several times in one subarray. The other fully exploits multiple invariances in the interior of the sensor array, and a multidimensional nonlinear problem is formulated. A Gauss–Newton iterative algorithm is applied for solving it. The first method can provide excellent initial inputs for the second one. The effectiveness of the proposed algorithms is demonstrated by several simulation results.

  20. Special Nuclear Material Gamma-Ray Signatures for Reachback Analysts

    Energy Technology Data Exchange (ETDEWEB)

    Karpius, Peter Joseph [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Myers, Steven Charles [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-08-29

    These are slides on special nuclear material gamma-ray signatures for reachback analysts for an LSS Spectroscopy course. The closing thoughts for this presentation are the following: SNM materials have definite spectral signatures that should be readily recognizable to analysts in both bare and shielded configurations. One can estimate burnup of plutonium using certain pairs of peaks that are a few keV apart. In most cases, one cannot reliably estimate uranium enrichment in an analogous way to the estimation of plutonium burnup. The origin of the most intense peaks from some SNM items may be indirect and from ‘associated nuclides.' Indirect SNM signatures sometimes have commonalities with the natural gamma-ray background.

  1. Mirage: a visible signature evaluation tool

    Science.gov (United States)

    Culpepper, Joanne B.; Meehan, Alaster J.; Shao, Q. T.; Richards, Noel

    2017-10-01

    This paper presents the Mirage visible signature evaluation tool, designed to provide a visible signature evaluation capability that will appropriately reflect the effect of scene content on the detectability of targets, providing a capability to assess visible signatures in the context of the environment. Mirage is based on a parametric evaluation of input images, assessing the value of a range of image metrics and combining them using the boosted decision tree machine learning method to produce target detectability estimates. It has been developed using experimental data from photosimulation experiments, where human observers search for vehicle targets in a variety of digital images. The images used for tool development are synthetic (computer generated) images, showing vehicles in many different scenes and exhibiting a wide variation in scene content. A preliminary validation has been performed using k-fold cross validation, where 90% of the image data set was used for training and 10% of the image data set was used for testing. The results of the k-fold validation from 200 independent tests show a prediction accuracy between Mirage predictions of detection probability and observed probability of detection of r(262) = 0:63, p Pearson correlation) and a MAE = 0:21 (mean absolute error).

  2. Measurement-device-independent quantum digital signatures

    Science.gov (United States)

    Puthoor, Ittoop Vergheese; Amiri, Ryan; Wallden, Petros; Curty, Marcos; Andersson, Erika

    2016-08-01

    Digital signatures play an important role in software distribution, modern communication, and financial transactions, where it is important to detect forgery and tampering. Signatures are a cryptographic technique for validating the authenticity and integrity of messages, software, or digital documents. The security of currently used classical schemes relies on computational assumptions. Quantum digital signatures (QDS), on the other hand, provide information-theoretic security based on the laws of quantum physics. Recent work on QDS Amiri et al., Phys. Rev. A 93, 032325 (2016);, 10.1103/PhysRevA.93.032325 Yin, Fu, and Zeng-Bing, Phys. Rev. A 93, 032316 (2016), 10.1103/PhysRevA.93.032316 shows that such schemes do not require trusted quantum channels and are unconditionally secure against general coherent attacks. However, in practical QDS, just as in quantum key distribution (QKD), the detectors can be subjected to side-channel attacks, which can make the actual implementations insecure. Motivated by the idea of measurement-device-independent quantum key distribution (MDI-QKD), we present a measurement-device-independent QDS (MDI-QDS) scheme, which is secure against all detector side-channel attacks. Based on the rapid development of practical MDI-QKD, our MDI-QDS protocol could also be experimentally implemented, since it requires a similar experimental setup.

  3. Assessing the robustness of quantitative fatty acid signature analysis to assumption violations

    Science.gov (United States)

    Bromaghin, Jeffrey F.; Budge, Suzanne M.; Thiemann, Gregory W.; Rode, Karyn D.

    2016-01-01

      Knowledge of animal diets can provide important insights into life history and ecology, relationships among species in a community and potential response to ecosystem change or perturbation. Quantitative fatty acid signature analysis (QFASA) is a method of estimating diets from data on the composition, or signature, of fatty acids stored in adipose tissue. Given data on signatures of potential prey, a predator diet is estimated by minimizing the distance between its signature and a mixture of prey signatures. Calibration coefficients, constants derived from feeding trials, are used to account for differential metabolism of individual fatty acids. QFASA has been widely applied since its introduction and several variants of the original estimator have appeared in the literature. However, work to compare the statistical properties of QFASA estimators has been limited.

  4. Non Audio-Video gesture recognition system

    DEFF Research Database (Denmark)

    Craciunescu, Razvan; Mihovska, Albena Dimitrova; Kyriazakos, Sofoklis

    2016-01-01

    Gesture recognition is a topic in computer science and language technology with the goal of interpreting human gestures via mathematical algorithms. Gestures can originate from any bodily motion or state but commonly originate from the face or hand. Current research focus includes on the emotion...... recognition from the face and hand gesture recognition. Gesture recognition enables humans to communicate with the machine and interact naturally without any mechanical devices. This paper investigates the possibility to use non-audio/video sensors in order to design a low-cost gesture recognition device...

  5. Comparing Face Detection and Recognition Techniques

    OpenAIRE

    Korra, Jyothi

    2016-01-01

    This paper implements and compares different techniques for face detection and recognition. One is find where the face is located in the images that is face detection and second is face recognition that is identifying the person. We study three techniques in this paper: Face detection using self organizing map (SOM), Face recognition by projection and nearest neighbor and Face recognition using SVM.

  6. Exemplar Based Recognition of Visual Shapes

    DEFF Research Database (Denmark)

    Olsen, Søren I.

    2005-01-01

    This paper presents an approach of visual shape recognition based on exemplars of attributed keypoints. Training is performed by storing exemplars of keypoints detected in labeled training images. Recognition is made by keypoint matching and voting according to the labels for the matched keypoint....... The matching is insensitive to rotations, limited scalings and small deformations. The recognition is robust to noise, background clutter and partial occlusion. Recognition is possible from few training images and improve with the number of training images.......This paper presents an approach of visual shape recognition based on exemplars of attributed keypoints. Training is performed by storing exemplars of keypoints detected in labeled training images. Recognition is made by keypoint matching and voting according to the labels for the matched keypoints...

  7. Superficial Priming in Episodic Recognition

    Science.gov (United States)

    Dopkins, Stephen; Sargent, Jesse; Ngo, Catherine T.

    2010-01-01

    We explored the effect of superficial priming in episodic recognition and found it to be different from the effect of semantic priming in episodic recognition. Participants made recognition judgments to pairs of items, with each pair consisting of a prime item and a test item. Correct positive responses to the test item were impeded if the prime…

  8. An algorithm to discover gene signatures with predictive potential

    Directory of Open Access Journals (Sweden)

    Hallett Robin M

    2010-09-01

    Full Text Available Abstract Background The advent of global gene expression profiling has generated unprecedented insight into our molecular understanding of cancer, including breast cancer. For example, human breast cancer patients display significant diversity in terms of their survival, recurrence, metastasis as well as response to treatment. These patient outcomes can be predicted by the transcriptional programs of their individual breast tumors. Predictive gene signatures allow us to correctly classify human breast tumors into various risk groups as well as to more accurately target therapy to ensure more durable cancer treatment. Results Here we present a novel algorithm to generate gene signatures with predictive potential. The method first classifies the expression intensity for each gene as determined by global gene expression profiling as low, average or high. The matrix containing the classified data for each gene is then used to score the expression of each gene based its individual ability to predict the patient characteristic of interest. Finally, all examined genes are ranked based on their predictive ability and the most highly ranked genes are included in the master gene signature, which is then ready for use as a predictor. This method was used to accurately predict the survival outcomes in a cohort of human breast cancer patients. Conclusions We confirmed the capacity of our algorithm to generate gene signatures with bona fide predictive ability. The simplicity of our algorithm will enable biological researchers to quickly generate valuable gene signatures without specialized software or extensive bioinformatics training.

  9. Specification for projects of radiogeologic recognition

    International Nuclear Information System (INIS)

    1979-01-01

    This instruction is a guidance to achievement of radiogeologic recognition projects. The radiogeologic recognition is a prospecting method that join the classic geologic recognition with measures of rock radioactivity. (C.M.)

  10. 15 CFR 80.4 - Signature of persons unable to sign their name.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Signature of persons unable to sign... POPULATION SCHEDULES § 80.4 Signature of persons unable to sign their name. A person requesting Census information who is unable to sign his or her name shall make an “X” mark where signature is required, and the...

  11. Why recognition is rational

    Directory of Open Access Journals (Sweden)

    Clintin P. Davis-Stober

    2010-07-01

    Full Text Available The Recognition Heuristic (Gigerenzer and Goldstein, 1996; Goldstein and Gigerenzer, 2002 makes the counter-intuitive prediction that a decision maker utilizing less information may do as well as, or outperform, an idealized decision maker utilizing more information. We lay a theoretical foundation for the use of single-variable heuristics such as the Recognition Heuristic as an optimal decision strategy within a linear modeling framework. We identify conditions under which over-weighting a single predictor is a mini-max strategy among a class of a priori chosen weights based on decision heuristics with respect to a measure of statistical lack of fit we call ``risk''. These strategies, in turn, outperform standard multiple regression as long as the amount of data available is limited. We also show that, under related conditions, weighting only one variable and ignoring all others produces the same risk as ignoring the single variable and weighting all others. This approach has the advantage of generalizing beyond the original environment of the Recognition Heuristic to situations with more than two choice options, binary or continuous representations of recognition, and to other single variable heuristics. We analyze the structure of data used in some prior recognition tasks and find that it matches the sufficient conditions for optimality in our results. Rather than being a poor or adequate substitute for a compensatory model, the Recognition Heuristic closely approximates an optimal strategy when a decision maker has finite data about the world.

  12. Infant visual attention and object recognition.

    Science.gov (United States)

    Reynolds, Greg D

    2015-05-15

    This paper explores the role visual attention plays in the recognition of objects in infancy. Research and theory on the development of infant attention and recognition memory are reviewed in three major sections. The first section reviews some of the major findings and theory emerging from a rich tradition of behavioral research utilizing preferential looking tasks to examine visual attention and recognition memory in infancy. The second section examines research utilizing neural measures of attention and object recognition in infancy as well as research on brain-behavior relations in the early development of attention and recognition memory. The third section addresses potential areas of the brain involved in infant object recognition and visual attention. An integrated synthesis of some of the existing models of the development of visual attention is presented which may account for the observed changes in behavioral and neural measures of visual attention and object recognition that occur across infancy. Copyright © 2015 Elsevier B.V. All rights reserved.

  13. Anogenital distance as a phenotypic signature through infancy

    DEFF Research Database (Denmark)

    Priskorn, Lærke; Petersen, Jørgen H; Jørgensen, Niels

    2018-01-01

    BACKGROUND: Anogenital distance (AGD) has been suggested to represent a phenotypic signature reflecting in utero androgen action. However, it is not known whether an individual's AGD at birth correlates to AGD later in life. We investigate correlations of AGD between 3 and 18 months and asses rep......-up through childhood and puberty will reveal whether AGD represents a phenotypic signature throughout life.Pediatric Research accepted article preview online, 20 November 2017. doi:10.1038/pr.2017.287....

  14. Plasma Signatures of Radial Field Power Dropouts

    International Nuclear Information System (INIS)

    Lucek, E.A.; Horbury, T.S.; Balogh, A.; McComas, D.J.

    1998-01-01

    A class of small scale structures, with a near-radial magnetic field and a drop in magnetic field fluctuation power, have recently been identified in the polar solar wind. An earlier study of 24 events, each lasting for 6 hours or more, identified no clear plasma signature. In an extension of that work, radial intervals lasting for 4 hours or more (89 in total), have been used to search for a statistically significant plasma signature. It was found that, despite considerable variations between intervals, there was a small but significant drop, on average, in plasma temperature, density and β during these events

  15. Security problem on arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Choi, Jeong Woon; Chang, Ku-Young; Hong, Dowon

    2011-01-01

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  16. Molecular signatures database (MSigDB) 3.0.

    Science.gov (United States)

    Liberzon, Arthur; Subramanian, Aravind; Pinchback, Reid; Thorvaldsdóttir, Helga; Tamayo, Pablo; Mesirov, Jill P

    2011-06-15

    Well-annotated gene sets representing the universe of the biological processes are critical for meaningful and insightful interpretation of large-scale genomic data. The Molecular Signatures Database (MSigDB) is one of the most widely used repositories of such sets. We report the availability of a new version of the database, MSigDB 3.0, with over 6700 gene sets, a complete revision of the collection of canonical pathways and experimental signatures from publications, enhanced annotations and upgrades to the web site. MSigDB is freely available for non-commercial use at http://www.broadinstitute.org/msigdb.

  17. Security problem on arbitrated quantum signature schemes

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Jeong Woon [Emerging Technology R and D Center, SK Telecom, Kyunggi 463-784 (Korea, Republic of); Chang, Ku-Young; Hong, Dowon [Cryptography Research Team, Electronics and Telecommunications Research Institute, Daejeon 305-700 (Korea, Republic of)

    2011-12-15

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  18. Spectral decomposition of MR spectroscopy signatures with use of eigenanalysis

    International Nuclear Information System (INIS)

    Hearshen, D.O.; Windham, J.P.; Roebuck, J.R.; Helpern, J.A.

    1989-01-01

    Partial-volume contamination and overlapping resonances are common problems in whole-body MR spectroscopy and can affect absolute or relative intensity and chemical-shift measurements. One technique, based on solution of constrained eigenvalue problems, treats spectra as N-dimensional signatures and minimizes contributions of undesired signatures while maximizing contributions of desired signatures in compromised spectra. Computer simulations and both high-resolution (400-MHz) and whole-body (63.8-MHz) phantom studies tested accuracy and reproducibility of spectral decomposition. Results demonstrated excellent decomposition and good reproducibility within certain constraints. The authors conclude that eigenanalysis may improve quantitation of spectra without introducing operator bias

  19. The effects of different representations on static structure analysis of computer malware signatures.

    Science.gov (United States)

    Narayanan, Ajit; Chen, Yi; Pang, Shaoning; Tao, Ban

    2013-01-01

    The continuous growth of malware presents a problem for internet computing due to increasingly sophisticated techniques for disguising malicious code through mutation and the time required to identify signatures for use by antiviral software systems (AVS). Malware modelling has focused primarily on semantics due to the intended actions and behaviours of viral and worm code. The aim of this paper is to evaluate a static structure approach to malware modelling using the growing malware signature databases now available. We show that, if malware signatures are represented as artificial protein sequences, it is possible to apply standard sequence alignment techniques in bioinformatics to improve accuracy of distinguishing between worm and virus signatures. Moreover, aligned signature sequences can be mined through traditional data mining techniques to extract metasignatures that help to distinguish between viral and worm signatures. All bioinformatics and data mining analysis were performed on publicly available tools and Weka.

  20. Observational Signatures Of Agn Feedback Across Cosmic Time

    Science.gov (United States)

    Wylezalek, Dominika

    2017-06-01

    While many compelling models of AGN feedback exist, there is no clear data-driven picture of how winds are launched, how they propagate through the galaxy and what impact they have on the galactic gas. Recent work suggests that AGN luminosity plays an important role. The following described projects focus on understanding the power, reach and impact of feedback processes exerted by AGN of different power. I first describe recent efforts in our group of relating feedback signatures in powerful quasars to the specific star formation rate in their host galaxies, where our results are consistent with the AGN having a `negative' impact through feedback on the galaxies' star formation history. Feedback signatures seem to be best observable in gas-rich galaxies where the coupling of the AGN-driven wind to the gas is strongest, in agreement with recent simulations. But how and where does this quenching happen? Is it accomplished through the mechanical action of jets or through nuclear winds driven by radiation pressure? Finally, I show that AGN signatures and AGN-driven winds can be easily hidden and not be apparent in the integrated spectrum of a galaxy hosting a low/intermediate-luminosity AGN. Using data from the new SDSS-IV MaNGA survey, we have developed a new AGN selection algorithm tailored to IFU data and we are uncovering a much more nuanced picture of AGN activity allowing us to discover AGN signatures at large distances from the galaxy center. This implies that large IFU surveys, such as the SDSS-IV MaNGA survey, might uncover many previously unknown AGN and feedback signatures related to them. Outflows and feedback from low- and intermediate-luminosity AGN might have been underestimated in the past but can potentially significantly contribute to the AGN/host-galaxy self-regulation.

  1. Magnetic Signature of Brushless Electric Motors

    National Research Council Canada - National Science Library

    Clarke, David

    2006-01-01

    Brushless electric motors are used in a number of underwater vehicles. When these underwater vehicles are used for mine clearance operations the magnetic signature of the brushless motors is important...

  2. Probabilistic Open Set Recognition

    Science.gov (United States)

    Jain, Lalit Prithviraj

    Real-world tasks in computer vision, pattern recognition and machine learning often touch upon the open set recognition problem: multi-class recognition with incomplete knowledge of the world and many unknown inputs. An obvious way to approach such problems is to develop a recognition system that thresholds probabilities to reject unknown classes. Traditional rejection techniques are not about the unknown; they are about the uncertain boundary and rejection around that boundary. Thus traditional techniques only represent the "known unknowns". However, a proper open set recognition algorithm is needed to reduce the risk from the "unknown unknowns". This dissertation examines this concept and finds existing probabilistic multi-class recognition approaches are ineffective for true open set recognition. We hypothesize the cause is due to weak adhoc assumptions combined with closed-world assumptions made by existing calibration techniques. Intuitively, if we could accurately model just the positive data for any known class without overfitting, we could reject the large set of unknown classes even under this assumption of incomplete class knowledge. For this, we formulate the problem as one of modeling positive training data by invoking statistical extreme value theory (EVT) near the decision boundary of positive data with respect to negative data. We provide a new algorithm called the PI-SVM for estimating the unnormalized posterior probability of class inclusion. This dissertation also introduces a new open set recognition model called Compact Abating Probability (CAP), where the probability of class membership decreases in value (abates) as points move from known data toward open space. We show that CAP models improve open set recognition for multiple algorithms. Leveraging the CAP formulation, we go on to describe the novel Weibull-calibrated SVM (W-SVM) algorithm, which combines the useful properties of statistical EVT for score calibration with one-class and binary

  3. Hemispheric lateralization of linguistic prosody recognition in comparison to speech and speaker recognition.

    Science.gov (United States)

    Kreitewolf, Jens; Friederici, Angela D; von Kriegstein, Katharina

    2014-11-15

    Hemispheric specialization for linguistic prosody is a controversial issue. While it is commonly assumed that linguistic prosody and emotional prosody are preferentially processed in the right hemisphere, neuropsychological work directly comparing processes of linguistic prosody and emotional prosody suggests a predominant role of the left hemisphere for linguistic prosody processing. Here, we used two functional magnetic resonance imaging (fMRI) experiments to clarify the role of left and right hemispheres in the neural processing of linguistic prosody. In the first experiment, we sought to confirm previous findings showing that linguistic prosody processing compared to other speech-related processes predominantly involves the right hemisphere. Unlike previous studies, we controlled for stimulus influences by employing a prosody and speech task using the same speech material. The second experiment was designed to investigate whether a left-hemispheric involvement in linguistic prosody processing is specific to contrasts between linguistic prosody and emotional prosody or whether it also occurs when linguistic prosody is contrasted against other non-linguistic processes (i.e., speaker recognition). Prosody and speaker tasks were performed on the same stimulus material. In both experiments, linguistic prosody processing was associated with activity in temporal, frontal, parietal and cerebellar regions. Activation in temporo-frontal regions showed differential lateralization depending on whether the control task required recognition of speech or speaker: recognition of linguistic prosody predominantly involved right temporo-frontal areas when it was contrasted against speech recognition; when contrasted against speaker recognition, recognition of linguistic prosody predominantly involved left temporo-frontal areas. The results show that linguistic prosody processing involves functions of both hemispheres and suggest that recognition of linguistic prosody is based on

  4. Galaxy interactions : The HI signature

    NARCIS (Netherlands)

    Sancisi, R; Barnes, JE; Sanders, DB

    1999-01-01

    HI observations are an excellent tool for investigating tidal interactions. Ongoing major and minor interactions which can lead to traumatic mergers or to accretion and the triggering of star formation, show distinct HI signatures. Interactions and mergers in the recent past can also be recognized

  5. Modem Signature Analysis.

    Science.gov (United States)

    1982-10-01

    AD-A127 993 MODEM SIGNATURE ANALISIS (U) PAR TECHNOLOGY CORP NEW / HARTFORD NY V EDWARDS ET AL. OCT 82 RADC-TR-82-269 F30602-80-C-0264 NCLASSIFIED F/G...as an indication of the class clustering and separation between different classes in the modem data base. It is apparent from the projection that the...that as the clusters disperse, the likelihood of a sample crossing the boundary into an adjacent region and causing a symbol decision error increases. As

  6. 48 CFR 2917.504-70 - Signature authority and internal procedures.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Signature authority and internal procedures. 2917.504-70 Section 2917.504-70 Federal Acquisition Regulations System DEPARTMENT OF... The Economy Act 2917.504-70 Signature authority and internal procedures. (a) A DOL contracting officer...

  7. Circulating neutrophil transcriptome may reveal intracranial aneurysm signature

    Science.gov (United States)

    Tutino, Vincent M.; Poppenberg, Kerry E.; Jiang, Kaiyu; Jarvis, James N.; Sun, Yijun; Sonig, Ashish; Siddiqui, Adnan H.; Snyder, Kenneth V.; Levy, Elad I.; Kolega, John

    2018-01-01

    Background Unruptured intracranial aneurysms (IAs) are typically asymptomatic and undetected except for incidental discovery on imaging. Blood-based diagnostic biomarkers could lead to improvements in IA management. This exploratory study examined circulating neutrophils to determine whether they carry RNA expression signatures of IAs. Methods Blood samples were collected from patients receiving cerebral angiography. Eleven samples were collected from patients with IAs and 11 from patients without IAs as controls. Samples from the two groups were paired based on demographics and comorbidities. RNA was extracted from isolated neutrophils and subjected to next-generation RNA sequencing to obtain differential expressions for identification of an IA-associated signature. Bioinformatics analyses, including gene set enrichment analysis and Ingenuity Pathway Analysis, were used to investigate the biological function of all differentially expressed transcripts. Results Transcriptome profiling identified 258 differentially expressed transcripts in patients with and without IAs. Expression differences were consistent with peripheral neutrophil activation. An IA-associated RNA expression signature was identified in 82 transcripts (pIAs on hierarchical clustering. Furthermore, in an independent, unpaired, replication cohort of patients with IAs (n = 5) and controls (n = 5), the 82 transcripts separated 9 of 10 patients into their respective groups. Conclusion Preliminary findings show that RNA expression from circulating neutrophils carries an IA-associated signature. These findings highlight a potential to use predictive biomarkers from peripheral blood samples to identify patients with IAs. PMID:29342213

  8. Fossil Signatures Using Elemental Abundance Distributions and Bayesian Probabilistic Classification

    Science.gov (United States)

    Hoover, Richard B.; Storrie-Lombardi, Michael C.

    2004-01-01

    Elemental abundances (C6, N7, O8, Na11, Mg12, Al3, P15, S16, Cl17, K19, Ca20, Ti22, Mn25, Fe26, and Ni28) were obtained for a set of terrestrial fossils and the rock matrix surrounding them. Principal Component Analysis extracted five factors accounting for the 92.5% of the data variance, i.e. information content, of the elemental abundance data. Hierarchical Cluster Analysis provided unsupervised sample classification distinguishing fossil from matrix samples on the basis of either raw abundances or PCA input that agreed strongly with visual classification. A stochastic, non-linear Artificial Neural Network produced a Bayesian probability of correct sample classification. The results provide a quantitative probabilistic methodology for discriminating terrestrial fossils from the surrounding rock matrix using chemical information. To demonstrate the applicability of these techniques to the assessment of meteoritic samples or in situ extraterrestrial exploration, we present preliminary data on samples of the Orgueil meteorite. In both systems an elemental signature produces target classification decisions remarkably consistent with morphological classification by a human expert using only structural (visual) information. We discuss the possibility of implementing a complexity analysis metric capable of automating certain image analysis and pattern recognition abilities of the human eye using low magnification optical microscopy images and discuss the extension of this technique across multiple scales.

  9. Measurement-Device Independency Analysis of Continuous-Variable Quantum Digital Signature

    Directory of Open Access Journals (Sweden)

    Tao Shang

    2018-04-01

    Full Text Available With the practical implementation of continuous-variable quantum cryptographic protocols, security problems resulting from measurement-device loopholes are being given increasing attention. At present, research on measurement-device independency analysis is limited in quantum key distribution protocols, while there exist different security problems for different protocols. Considering the importance of quantum digital signature in quantum cryptography, in this paper, we attempt to analyze the measurement-device independency of continuous-variable quantum digital signature, especially continuous-variable quantum homomorphic signature. Firstly, we calculate the upper bound of the error rate of a protocol. If it is negligible on condition that all measurement devices are untrusted, the protocol is deemed to be measurement-device-independent. Then, we simplify the calculation by using the characteristics of continuous variables and prove the measurement-device independency of the protocol according to the calculation result. In addition, the proposed analysis method can be extended to other quantum cryptographic protocols besides continuous-variable quantum homomorphic signature.

  10. Viewpoint Manifolds for Action Recognition

    Directory of Open Access Journals (Sweden)

    Souvenir Richard

    2009-01-01

    Full Text Available Abstract Action recognition from video is a problem that has many important applications to human motion analysis. In real-world settings, the viewpoint of the camera cannot always be fixed relative to the subject, so view-invariant action recognition methods are needed. Previous view-invariant methods use multiple cameras in both the training and testing phases of action recognition or require storing many examples of a single action from multiple viewpoints. In this paper, we present a framework for learning a compact representation of primitive actions (e.g., walk, punch, kick, sit that can be used for video obtained from a single camera for simultaneous action recognition and viewpoint estimation. Using our method, which models the low-dimensional structure of these actions relative to viewpoint, we show recognition rates on a publicly available dataset previously only achieved using multiple simultaneous views.

  11. Infrared signature modelling of a rocket jet plume - comparison with flight measurements

    International Nuclear Information System (INIS)

    Rialland, V; Perez, P; Roblin, A; Guy, A; Gueyffier, D; Smithson, T

    2016-01-01

    The infrared signature modelling of rocket plumes is a challenging problem involving rocket geometry, propellant composition, combustion modelling, trajectory calculations, fluid mechanics, atmosphere modelling, calculation of gas and particles radiative properties and of radiative transfer through the atmosphere. This paper presents ONERA simulation tools chained together to achieve infrared signature prediction, and the comparison of the estimated and measured signatures of an in-flight rocket plume. We consider the case of a solid rocket motor with aluminized propellant, the Black Brant sounding rocket. The calculation case reproduces the conditions of an experimental rocket launch, performed at White Sands in 1997, for which we obtained high quality infrared signature data sets from DRDC Valcartier. The jet plume is calculated using an in-house CFD software called CEDRE. The plume infrared signature is then computed on the spectral interval 1900-5000 cm -1 with a step of 5 cm -1 . The models and their hypotheses are presented and discussed. Then the resulting plume properties, radiance and spectra are detailed. Finally, the estimated infrared signature is compared with the spectral imaging measurements. The discrepancies are analyzed and discussed. (paper)

  12. Physiological arousal in processing recognition information

    Directory of Open Access Journals (Sweden)

    Guy Hochman

    2010-07-01

    Full Text Available The recognition heuristic (RH; Goldstein and Gigerenzer, 2002 suggests that, when applicable, probabilistic inferences are based on a noncompensatory examination of whether an object is recognized or not. The overall findings on the processes that underlie this fast and frugal heuristic are somewhat mixed, and many studies have expressed the need for considering a more compensatory integration of recognition information. Regardless of the mechanism involved, it is clear that recognition has a strong influence on choices, and this finding might be explained by the fact that recognition cues arouse affect and thus receive more attention than cognitive cues. To test this assumption, we investigated whether recognition results in a direct affective signal by measuring physiological arousal (i.e., peripheral arterial tone in the established city-size task. We found that recognition of cities does not directly result in increased physiological arousal. Moreover, the results show that physiological arousal increased with increasing inconsistency between recognition information and additional cue information. These findings support predictions derived by a compensatory Parallel Constraint Satisfaction model rather than predictions of noncompensatory models. Additional results concerning confidence ratings, response times, and choice proportions further demonstrated that recognition information and other cognitive cues are integrated in a compensatory manner.

  13. Page Recognition: Quantum Leap In Recognition Technology

    Science.gov (United States)

    Miller, Larry

    1989-07-01

    No milestone has proven as elusive as the always-approaching "year of the LAN," but the "year of the scanner" might claim the silver medal. Desktop scanners have been around almost as long as personal computers. And everyone thinks they are used for obvious desktop-publishing and business tasks like scanning business documents, magazine articles and other pages, and translating those words into files your computer understands. But, until now, the reality fell far short of the promise. Because it's true that scanners deliver an accurate image of the page to your computer, but the software to recognize this text has been woefully disappointing. Old optical-character recognition (OCR) software recognized such a limited range of pages as to be virtually useless to real users. (For example, one OCR vendor specified 12-point Courier font from an IBM Selectric typewriter: the same font in 10-point, or from a Diablo printer, was unrecognizable!) Computer dealers have told me the chasm between OCR expectations and reality is so broad and deep that nine out of ten prospects leave their stores in disgust when they learn the limitations. And this is a very important, very unfortunate gap. Because the promise of recognition -- what people want it to do -- carries with it tremendous improvements in our productivity and ability to get tons of written documents into our computers where we can do real work with it. The good news is that a revolutionary new development effort has led to the new technology of "page recognition," which actually does deliver the promise we've always wanted from OCR. I'm sure every reader appreciates the breakthrough represented by the laser printer and page-makeup software, a combination so powerful it created new reasons for buying a computer. A similar breakthrough is happening right now in page recognition: the Macintosh (and, I must admit, other personal computers) equipped with a moderately priced scanner and OmniPage software (from Caere

  14. A Rational Threshold Signature Model and Protocol Based on Different Permissions

    Directory of Open Access Journals (Sweden)

    Bojun Wang

    2014-01-01

    Full Text Available This paper develops a novel model and protocol used in some specific scenarios, in which the participants of multiple groups with different permissions can finish the signature together. We apply the secret sharing scheme based on difference equation to the private key distribution phase and secret reconstruction phrase of our threshold signature scheme. In addition, our scheme can achieve the signature success because of the punishment strategy of the repeated rational secret sharing. Besides, the bit commitment and verification method used to detect players’ cheating behavior acts as a contributing factor to prevent the internal fraud. Using bit commitments, verifiable parameters, and time sequences, this paper constructs a dynamic game model, which has the features of threshold signature management with different permissions, cheat proof, and forward security.

  15. Field Education as the Signature Pedagogy of Social Work Education

    Science.gov (United States)

    Wayne, Julianne; Bogo, Marion; Raskin, Miriam

    2010-01-01

    In its EPAS, CSWE (2008) identifies field education as the signature pedagogy (Shulman, 2005b) of social work education. This article analyzes the field education-signature pedagogy fit. It finds congruence in selected organizational arrangements that are pervasive and routine, and disparities with respect to expectations about public student…

  16. New particles and their experimental signatures

    International Nuclear Information System (INIS)

    Ellis, J.; Gelmini, G.; Kowalski, H.

    1984-08-01

    This report summarizes work done by our theoretical working group on exotic particles before, during and since the Lausanne meeting. We discuss the motivations, rates and experimental signatures for new physics and new particles in the 1 TeV mass range. Section 2 reviews some of the motivations for expecting new physics in this range. Of particular interest is the physics of gauge symmetry breaking. In section 3 we discuss the rates and experimental signatures of new particles predicted by theoretical models of gauge symmetry breaking, notably the Higgs boson supersymmetry and technicolour. Among the signatures we discuss are multiple Wsup(+-) and/or Z 0 events (for the Higgs), missing transverse energy (for supersymmetry) and multiple anti tt events (for the Higgs and technicolour). We provide many examples of final state differential distributions in rapidity and Psub(T), particularly for Higgses and for supersymmetry. We also analyse some physics backgrounds to the new particle production processes which interest us. Examples include W + W - , Z 0 Z 0 , W(anti tt) and (anti tt) production as backgrounds to Higgs production. However, we do not consider in detail non-physics backgrounds such as the jet fluctuation background to missing energy signals for supersymmetry production. Section 4 summarizes our preliminary conclusions on the observability at a high energy hadron collider of the new particles studied in this report. (orig./HSI)

  17. A prospective blood RNA signature for tuberculosis disease risk

    Science.gov (United States)

    Zak, Daniel E.; Penn-Nicholson, Adam; Scriba, Thomas J.; Thompson, Ethan; Suliman, Sara; Amon, Lynn M.; Mahomed, Hassan; Erasmus, Mzwandile; Whatney, Wendy; Hussey, Gregory D.; Abrahams, Deborah; Kafaar, Fazlin; Hawkridge, Tony; Verver, Suzanne; Hughes, E. Jane; Ota, Martin; Sutherland, Jayne; Howe, Rawleigh; Dockrell, Hazel M.; Boom, W. Henry; Thiel, Bonnie; Ottenhoff, Tom H.M.; Mayanja-Kizza, Harriet; Crampin, Amelia C; Downing, Katrina; Hatherill, Mark; Valvo, Joe; Shankar, Smitha; Parida, Shreemanta K; Kaufmann, Stefan H.E.; Walzl, Gerhard; Aderem, Alan; Hanekom, Willem A.

    2016-01-01

    Background Identification of blood biomarkers that prospectively predict progression of Mycobacterium tuberculosis infection to tuberculosis disease may lead to interventions that impact the epidemic. Methods Healthy, M. tuberculosis infected South African adolescents were followed for 2 years; blood was collected every 6 months. A prospective signature of risk was derived from whole blood RNA-Sequencing data by comparing participants who ultimately developed active tuberculosis disease (progressors) with those who remained healthy (matched controls). After adaptation to multiplex qRT-PCR, the signature was used to predict tuberculosis disease in untouched adolescent samples and in samples from independent cohorts of South African and Gambian adult progressors and controls. The latter participants were household contacts of adults with active pulmonary tuberculosis disease. Findings Of 6,363 adolescents screened, 46 progressors and 107 matched controls were identified. A 16 gene signature of risk was identified. The signature predicted tuberculosis progression with a sensitivity of 66·1% (95% confidence interval, 63·2–68·9) and a specificity of 80·6% (79·2–82·0) in the 12 months preceding tuberculosis diagnosis. The risk signature was validated in an untouched group of adolescents (p=0·018 for RNA-Seq and p=0·0095 for qRT-PCR) and in the independent South African and Gambian cohorts (p values Bill and Melinda Gates Foundation, the National Institutes of Health, Aeras, the European Union and the South African Medical Research Council (detail at end of text). PMID:27017310

  18. Incorporating X–ray summing into gamma–gamma signature quantification

    International Nuclear Information System (INIS)

    Britton, R.; Jackson, M.J.; Davies, A.V.

    2016-01-01

    A method for quantifying coincidence signatures has been extended to incorporate the effects of X–ray summing, and tested using a high–efficiency γ–γ system. An X–ray library has been created, allowing all possible γ, X–ray and conversion electron cascades to be generated. The equations for calculating efficiency and cascade summing corrected coincidence signature probabilities have also been extended from a two γ, two detector ‘special case’ to an arbitrarily large system. The coincidence library generated is fully searchable by energy, nuclide, coincidence pair, γ multiplicity, cascade probability and the half–life of the cascade, allowing the user to quickly identify coincidence signatures of interest. The method and software described is inherently flexible, as it only requires evaluated nuclear data, an X–ray library, and accurate efficiency characterisations to quickly and easily calculate coincidence signature probabilities for a variety of systems. Additional uses for the software include the fast identification of γ coincidence signals with required multiplicities and branching ratios, identification of the optimal coincidence signatures to measure for a particular system, and the calculation of cascade summing corrections for single detector systems. - Highlights: • Method for incorporating X-ray summing into coincidence measurements developed. • Calculation routines have been extended to an arbitrarily large detector system, and re-written to take advantage of multiple computing cores. • Data collected in list-mode with all events timestamped for offline coincidence analysis. • Coincidence analysis of environmental samples will dramatically improve the detection sensitivity achievable.

  19. Thermal imaging comparison of Signature, Infiniti, and Stellaris phacoemulsification systems.

    Science.gov (United States)

    Ryoo, Na Kyung; Kwon, Ji-Won; Wee, Won Ryang; Miller, Kevin M; Han, Young Keun

    2013-10-12

    To compare the heat production of 3 different phacoemulsification machines under strict laboratory test conditions. More specifically, the thermal behavior was analyzed between the torsional modality of the Infiniti system and longitudinal modalities of the Abbot WhiteStar Signature Phacoemulsification system and Bausch and Lomb Stellaris system. Experiments were performed under in-vitro conditions in this study.Three phacoemulsification handpieces (Infiniti, Signature, and Stellaris) were inserted into balanced salt solution-filled silicone test chambers and were imaged side-by-side by using a thermal camera. Incision compression was simulated by suspending 30.66-gram weights from the silicone chambers. The irrigation flow rate was set at 0, 1, 2, 3, 4, and 5 cc/min and the phacoemulsification power on the instrument consoles was set at 40, 60, 80, and 100%. The highest temperatures generated from each handpiece around the point of compression were measured at 0, 10, 30, and 60 seconds. Under the same displayed phacoemulsification power settings, the peak temperatures measured when using the Infiniti were lower than when using the other two machines, and the Signature was cooler than the Stellaris. At 10 seconds, torsional phacoemulsification with Infiniti at 100% power showed data comparable to that of the Signature at 80% and the Stellaris at 60%. At 30 seconds, the temperature from the Infiniti at 100% power was lower than the Signature at 60% and the Stellaris at 40%. Torsional phacoemulsification with the Infiniti generates less heat than longitudinal phacoemulsification with the Signature and the Stellaris. Lower operating temperatures indicate lower heat generation within the same fluid volume, which may provide additional thermal protection during cataract surgery.

  20. The dependence of cusp ion signatures on the reconnection rate

    Directory of Open Access Journals (Sweden)

    S. K. Morley

    2003-04-01

    Full Text Available The interpretation of structure in cusp ion dispersions is important for helping to understand the temporal and spatial structure of magnetopause reconnection. "Stepped" and "sawtooth" signatures have been shown to be caused by temporal variations in the reconnection rate under the same physical conditions for different satellite trajectories. The present paper shows that even for a single satellite path, a change in the amplitude of any reconnection pulses can alter the observed signature and even turn sawtooth into stepped forms and vice versa. On 20 August 1998, the Defense Meteorological Satellite Program (DMSP craft F-14 crossed the cusp just to the south of Longyearbyen, returning on the following orbit. The two passes by the DMSP F-14 satellites have very similar trajectories and the open-closed field line boundary (OCB crossings, as estimated from the SSJ/4 precipitating particle data and Polar UVI images, imply a similarly-shaped polar cap, yet the cusp ion dispersion signatures differ substantially. The cusp crossing at 08:54 UT displays a stepped ion dispersion previously considered to be typical of a meridional pass, whereas the crossing at 10:38 UT is a sawtooth form ion dispersion, previously considered typical of a satellite travelling longitudinally with respect to the OCB. It is shown that this change in dispersed ion signature is likely to be due to a change in the amplitude of the pulses in the reconnection rate, causing the stepped signature. Modelling of the low-energy ion cutoff under different conditions has reproduced the forms of signature observed.Key words. Ionosphere (particle precipitation Magnetospheric physics (energetic particles, precipitating, magnetopause, cusp and boundary layers